Author : Reetesh Gupta

310 posts

As technology continues to expand many digital marketing experts are beginning to learn more and more about SVG images and trying to identify if having SVG images on their site is beneficial to their SEO strategy or not. SVG or Scalable Vector Graphic is an XML language and used for animations and creating images in the web designing process. …
Ubuntu includes a variety of utilities for connecting to secure shell servers. The standard “ssh” command connects to the remote SSH server and provides a terminal prompt that you can use to run commands on, but you can also use the secure copy, or “scp,” command, which connects to a remote SSH server and transfers …
Sift Science is an SaaS startup based in San Francisco, CA. We help our customers fight fraud using large-scale, real time machine learning (aka predictive analytics). Fraud is most commonly associated with chargebacks and other transactional fraud, but can also include spam accounts and fake postings (ex: classifieds, marketplaces etc) Using large-scale machine learning is …
Zip and Unzip via SSH: Everything You Need to Know Compressing and extracting files is not only common on desktop computers. You may need to do the same things on your VPS. Zipping and unzipping files make it easy for you to download and move data around. To perform these actions,  you need to run …
Sometimes you would need to extract or create an archive file, i.e to install a script, you would usually download an archive and extract it to continue the installation. The very first step in the process would be to identify the exact archive type by looking at the file extension. The most common archive types …
Restoring a backup from a ZIP file – like the ones generated by our downloadable backup feature – can sometimes be a lengthy process. If you unzip a ZIP file locally on your computer before uploading the backup with SFTP, you’ll likely run into a bottleneck because SFTP can only transfer a limited number of files …
Introduction to S3 and EC2 file copy In this article, we are going to see how to copy files from ec2 instance to S3 bucket and vice versa, with the help of IAM roles and without having to use the AWS access key and secrets in the server. In AWS technical terms. Copying files from …
What is SSH SSH, or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet. The service was created as a secure replacement for the unencrypted Telnet and uses cryptographic techniques to ensure that all communication to and from the remote server happens in an …
SSH, the Secure Shell, is a popular, powerful, software-based approach to network security.[2] Whenever data is sent by a computer to the network, SSH automatically encrypts (scrambles) it. Then, when the data reaches its intended recipient, SSH automatically decrypts (unscrambles) it. The result is transparent encryption: users can work normally, unaware that their communications are safely encrypted on …
Amazon’s Virtual Private Cloud (VPC) is a foundational AWS service in both the Compute and Network AWS categories. Being foundational means that other AWS services, such as Elastic Compute Cloud (EC2), cannot be accessed without an underlying VPC network. Amazon VPC and Subnets Amazon VPC enables you to connect your on-premises resources to AWS infrastructure …
PAGE TOP
error

Enjoy this blog? Please spread the word :)

RSS
Follow by Email