Posts

Using the Linux Remote System | (SSH)

Image
  What is the remote system?  Remote support makes use of remote access (or distant desktop) software to provide technicians with quick access to a remote device from any location at any time. This means they can give remote support without having to physically visit the equipment. How to Access Remote Linux Desktop?  There are two different way to connect with your Linux machine remotely 1.       RDP ( Remote Desktop Protocol ) 2.       SSH shell ( Secure Shell ) Remote Desktop Protocol(RDP):          Remote Desktop Protocol (RDP) is a Microsoft-developed proprietary protocol that allows a user to connect to another computer through a network connection using a graphical interface. RDP servers are included with Windows operating systems, and there is also an RDP server for Unix and OS X. Secure Shell:      ssh  stands for  “Secure Shell” .         It is a protocol used to securely connect to a remote server/system. ssh is secure in the sense that it transfers the data in encrypted for

Amazon CloudWatch

Image
  Introduction: For DevOps engineers, developers,and IT managers, Amazon CloudWatch provides a observance and observability resolution. CloudWatch provides information and unjust insights to assist you monitor your applications, reply to system-wide performance changes, optimise resource usage, and acquire one read of operational health. CloudWatch gathers information logs, analytics, and events to produce you one read of AWS resources, applications, and services running on each AWS and on-premises servers. you will use CloudWatch to find abnormal behaviour in your environments, trigger alarms, show logs and metrics facet by facet, take machine-driven actions, troubleshoot problems, and uncover insights to stay your apps running swimmingly. How it works CloudWatch collects observance and operational information within the type of logs, metrics, and events, and visualises it exploitation machine-driven dashboards to produce you one read of your AWS resources, applications, and services

Amazon S3 and Types of Storage technology.

Image
  Storage : Storage is the process of storing digital data in a data storage device utilizing computer technology. Storage is a technique that allows a computer to retain data for an indefinite or temporary period of time. Other names for storage include computer data storage and electronic data storage. Examples of storage Technology : Computer data is stored on four different types of media: Magnetic storage Optical storage Solid-state storage Cloud Storage Magnetic storage devices: Magnetic storage is one of the most popular types of computer storage. This technology is usually seen on super-sized HDDs or hybrid hard drives. Floppy diskette Hard drive Magnetic strip SuperDisk Optical storage devices Optical storage, which reads and writes data using lasers and lights, is a prevalent type of storage. Blu-ray disc CD-ROM disc CD-R and CD-RW disc. Solid-state storage devices As solid-state storage (flash memory) grows more affordable, it has displaced most magnetic and optical media as

What exactly is AWS IoT?

Image
AWS IoT connects the IoT devices to other IoT devices and AWS cloud services. Device software from AWS IoT will help you incorporate your IoT devices into AWS IoT-based solutions. If your devices are compatible with AWS IoT, AWS IoT will link them to AWS cloud services. You can choose the most suitable and up-to-date technologies for your solution with AWS IoT. AWS IoT Core supports the following protocols to help you control and maintain your IoT devices in the field:  MQTT (Message Queuing and Telemetry Transport) MQTT over WSS (Websockets Secure) HTTPS (Hypertext Transfer Protocol - Secure) LoRaWAN (Long Range Wide Area Network) The MQTT and MQTT over WSS protocols are supported by the AWS IoT Core message broker, which allows devices and clients to publish and subscribe to messages. It also operates with computers and clients that use the HTTPS protocol to send messages. Link and control wireless LoRaWAN (low-power long-range Wide Area Network) devices with AWS IoT Core for LoRaWAN

Recycle E-waste.

Image
    What is meant by E-waste. E-waste could be a standard, informal name for electronic merchandise nearing the tip of their "useful life." Computers, televisions, VCRs, stereos, copiers, and fax machines area unit common electronic merchandise. several of those merchandise is reused, refurbished, or recycled.   How is E-waste Harmful. As mentioned, E-waste contains noxious elements that area unit dangerous to human health, like mercury, lead, cadmium, polybrominated flame retardants, barium, and Li. The negative health effects of those toxins on humans embody brain, heart, liver, kidney, and systema skeletale injury.   Why is it necessary to manage E-waste.   When e-waste is tossed into landfills, these chemicals leach into the soil, polluting the bottomwater similarly because the air. physical science area unit fabricated from elements that contain valuable raw materials. employment recent devices saves energy. Reusing recent devices forestall e-waste by keeping it out of l

Introduction Risk management

Image
What is Information Security Risk Management? Information security risk management, or ISRM, is that the method of managing risks related to the utilization of knowledge technology. It involves distinguishing, assessing, and treating risks to the confidentiality, integrity, ANd convenience of an organization’s assets. the top goal of this method is to treat risks in accordance with AN organization’s overall risk tolerance. Businesses shouldn’t expect to eliminate all risks; rather, they ought to look for to spot and come through a suitable risk level for his or her organization.       So the main components of Risk Assessment are:         Threats         Vulnerability         Impact (i.e. potential loss)         Likelihood of occurrence    Why risk management is very important in info security? Information security risk management (ISRM) is that the method of distinguishing, evaluating, and treating risks round the organisation’s valuable info. It addresses uncertainties around those a