Introduction There are various ways to connect to a network e.g. using GUI. A GUI lists all the available networks/ SSIDs and we just have to click, enter password(if the connection is secured) and done. The other ways to connect include NetworkManager(a daemon), nmcli(a cli to control NetworkManager), wpa_supplicant(a relatively low level tool). wpa_supplicant is […]
If you haven’t read my post on gpg, please do that as it highlights the basics of gpg. Having said that, we can sign a file using gpg in different ways. Let’s explore that. There are basically two ways to sign a file – attached and detached way. In attached signature, single file in generated […]
Public key, also known as asymmetric encryption involves two keys i.e. public key and private key. It helps two parties to communicate with each other in a much secure way. The whole process can be described as follows: Adam wants to send a secret message to his friend Eve. Both have generated keys in their […]
The most common types of encryption are Symmetric encryption and Asymmetric encryption. Let’s see how they differ. Symmetric encryption This encryption uses only one key for both encryption and decryption. Let’s say you want to share a secret data with your friend. In symmetric encryption, both you and your friend will have a common key […]
du stands for disk usage. It is a Linux command to check disk usage. Let’s quickly see how we can use du. du – outputs disk space used by all directories and sub-directories in the current directorydu -a – outputs disk space used by all files, directories and sub-directories in the current directory du * […]
typedef keyword in C can be used to write an alias to a type(int, long, long long int, struct, etc.). Let’s see how we can do that We gave int an alias/ new name of myint, which allowed us to declare a variable n like so: myint n;The above line is the same as writingint […]
Welcome to stackpointer!