Skip to content
Suyash Jain Suyash Jain

Your Tech Buddy

  • AWS
  • IaC
  • Docker
  • Database
  • Networking
  • Linux
  • Scripting
    • API-CLI
    • Python
  • Cyber Security
    • IT Security
    • Personal Security
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Linux

  • Home
  • Linux
Posted inLinux

Resurrect Your Lost Files: The Magic of the “extundelete” command

extundelete is a powerful Linux utility designed to recover deleted files from ext3 and ext4 filesystems. It works by scanning the filesystem for traces of deleted files and restoring them,…
Posted by Tech Bytes With Suyash January 7, 2025
Dominate Disk Space Issues With The Ultimate Tool: “ncdu"
Posted inLinux

Dominate Disk Space Issues With The Ultimate Tool: “ncdu”

Tired of running out of disk space without warning? Imagine receiving automated reports highlighting storage hogs, all neatly packaged for quick action. With the magic of ncdu and a pinch…
Posted by Suyash Jain December 30, 2024
Unlocking the Secrets of Your Linux System: How Auditd Keeps You One Step Ahead of Threats
Posted inLinux

Unlocking the Secrets of Your Linux System: How Auditd Keeps You One Step Ahead of Threats

Let’s talk about auditd, a powerful tool for monitoring and auditing your Linux system. Have you ever wondered how you can track exactly what happens on your server, like file…
Posted by Tech Bytes With Suyash December 26, 2024
Neutralize XSS in Its Tracks: Master Content Security Policy Now!
Posted inLinux

Neutralize XSS in Its Tracks: Master Content Security Policy Now!

Content-Security-Policy (CSP) is an essential security header used to protect web applications from a variety of attacks, including Cross-Site Scripting (XSS), clickjacking, and data injection attacks. How it Works!! CSP…
Posted by Suyash Jain December 17, 2024
Posted inLinux

Secret Security Headers: Your Website’s Hidden Defense Shields!

Security headers are a critical component of web security. They help protect websites and their users by mitigating a variety of attacks, including Cross-Site Scripting (XSS), Clickjacking, and other code…
Posted by Suyash Jain December 17, 2024
Protect Your Linux: Avoid the Nightmare of ‘rm -rf /’ with These Lifesaving Tips!
Posted inLinux

Protect Your Linux: Avoid the Nightmare of ‘rm -rf /’ with These Lifesaving Tips!

Imagine this: it’s late at night, and you’re troubleshooting a critical issue on a production Linux server. Under pressure, you type out a command to clean up some unnecessary files,…
Posted by Suyash Jain December 16, 2024
Effortless Integration: Mount AWS S3 Bucket on Linux Like a Pro!
Posted inAmazon Web Services Linux

Effortless Integration: Mount AWS S3 Bucket on Linux Like a Pro!

Many a times, I need to send backup files to the AWS S3 bucket, and there are many ways to do that; most commonly, system administrators use AWS CLI commands…
Posted by Suyash Jain December 16, 2024
Is Your Disk Space Disappearing? Discover the Top 20 Largest Files and Directories on Linux with This Simple Script!
Posted inLinux

Is Your Disk Space Disappearing? Discover the Top 20 Largest Files and Directories on Linux with This Simple Script!

I know every system administrator faces this issue of unknowing Disk space consumption; this is a nightmare ☹ So being a lazy system administrator, I tried to write a script…
Posted by Suyash Jain December 16, 2024
New to Linux System Administration? Don’t Miss These 10 Tips!
Posted inLinux

New to Linux System Administration? Don’t Miss These 10 Tips!

So, you’ve stepped into the world of Linux system administration — exciting, right? I started my career as Network administrator but then 2 RHEL 8 servers were handed over to me to…
Posted by Suyash Jain December 16, 2024
Certified Ethical Hacker (CEH V13) Practice Exam Guide
Posted inLinux

Certified Ethical Hacker (CEH V13) Practice Exam Guide

500 Practice Questions and Explanations for Exam Success:Looking to pass the Certified Ethical Hacker (CEH V13) exam and elevate your career in cybersecurity? The CEH V13 Practice Exam Guide is…
Posted by Tech Bytes With Suyash December 16, 2024

Posts navigation

1 2 Next page

Categories

  • Amazon Web Services
  • IT Security
  • Linux
  • Threads

Recent Posts

  • AWS Free Tier Trap 2025 – What’s REALLY Free & What’s Not!
  • Resurrect Your Lost Files: The Magic of the “extundelete” command
  • Dominate Disk Space Issues With The Ultimate Tool: “ncdu”
  • Unlocking the Secrets of Your Linux System: How Auditd Keeps You One Step Ahead of Threats
  • History Facts of Computer #1
  • Neutralize XSS in Its Tracks: Master Content Security Policy Now!
  • Secret Security Headers: Your Website’s Hidden Defense Shields!
  • Protect Your Linux: Avoid the Nightmare of ‘rm -rf /’ with These Lifesaving Tips!
  • Paid vs. Free SSL: The Truth They Don’t Want You to Know!
  • Effortless Integration: Mount AWS S3 Bucket on Linux Like a Pro!
Copyright 2025 — Suyash Jain. All rights reserved. Bloghash WordPress Theme
Scroll to Top