Congestion of the network is a phenomenon which consists of deterioration of the quality of services caused by the overloading of network nodes, so the term is associated primarily with large networks, in which large amounts of data are being transmitted. Congestion has several causes: either the routers are not fast enough, their CPUs are too slow, and they do not manage to quit queuing queues...
Rights and capabilities in Linux
1. Primary access rights in Linux 2. Capabilities in Linux 3. Testing capabilities in Linux 1. Primary access rights in Linux. In Linux, the primary access rights to a file are visible after the ls call with the -l option. These can be seen in the first field of an entry corresponding to a file. This 10-character field is made up of four sub-fields. The first sub-field consists of a single...
What is vsftpd or Very Secure FTP Daemon
The File Transfer Protocol or FTP is a protocol used to access files on servers from private computer networks or the Internet. FTP has been used since 1985 and is now widely used. Many FTP servers around the world allow you to connect to them anywhere on the Internet, and files placed on them are then transferred (uploaded or downloaded). Very Secure FTP Daemon does not bring significant changes...
What is MD5
MD5 (Message Digest Algorithm 5) is a unidirectional hash-like cryptographic function that delivers a fixed 128-bit length value. The value calculated using the MD5 function (shortly md5sum) is widely used as a check amount when checking the integrity of the files. The MD5 algorithm It is the latest in a series of algorithms designed by Ronald Rivest, a professor at the Massachusetts Institute of...
What is SMTP
A network protocol is a set of rules that computers must follow to change the information in a network. Network protocols that operate on the Internet are part of the suite of Internet protocols. Unlike most Internet protocols that need to be explained at the network packet level, email protocols are simple command/response protocols that can be understood and easy to handle. SMTP (Simple Mail...
What is Netstat
The Netstat command is one of the most powerful utilities that are offered in search of a secure network configuration. Although the process table will show that daemons have been launched from the command line, and the /etc/inetd.conf file shows you those that are controlled by inetd, the netstat command is the last “authority” in port diagnostics that the Linux server listen to them...
What is inetd
Inetd is a super-server daemon found on many UNIX systems. It first appeared on BSD version 4.3 and is usually located in /usr/sbin/inetd. Before discussing the inetd process, I want to explain that in Linux and Unix, the processes running in the background are called daemons. In popular culture, a daemon is a spirit that influences the character or personality. Coming back to inetd, at first...
What is the RTCP protocol
RTCP is a protocol that only deals with answers, syncing data, and the user interface but does not carry data at all, and is closely related to RTP. RTP delivers the actual data, while RTCP is used to send control packets to participants in a call. The primary function is to provide reports on the quality of the services provided by RTP. The first feature provides feedback to sources about...
What is UDP
User Datagram Protocol or UDP is a communication protocol for computers that belongs to the Transport Level of the standard OSI model. Together with Internet Protocol (IP), it makes it possible to deliver messages to a network. Unlike the TCP protocol, UDP is a non-connection communication module. It is similar to the postal system, meaning that packets of information (mail) are generally sent...
What is Leafpad
Leafpad is a minimalist text editor for Unix-like operating systems that has little dependency on other software. Leafpad was developed in C and has a graphical user interface based on GTK +. It is distributed in the GNU General Public License as free software. Leafpad is a text editor like Notepad in Windows. Its main features are automatic character recognition of the code character and copy...