In this tutorial, we will learn 10 useful Linux tcpdump examples and tcpdump options to analyze the traffic flow on a Linux machine. This tutorial covers the basic tcpdump filters like source ip, host, interface, specific port, udp port, write to file, all interfaces etc. Capture traffic on specific interface ( -i) Capture ip or …
Linux
The copy module in Ansible is used to copy files or directories from the local machine to a remote machine. It can also copy files between remote machines. The syntax for the Ansible copy module is as follows: – name: Copy file to remote machine copy: src: /path/to/local/file dest: /absolute/path/on/remote/machine [optional parameters] The copy module …
Python string is a built-in type sequence. Strings can be used to handle textual data in Python. Python Strings are immutable sequences of Unicode points. There are several built-in Python string methods that allow us to easily make modifications to strings in Python. In this tutorial we will cover the .upper(), .lower(), .count(), .find(), .replace() …
The len() function is a built-in function in Python that returns the length of a given object. The object can be a list, string, tuple or dict. The function returns an integer value which is the length of the object. Use Len function to find the length of a String in Python A string in …
A Python list is a collection of items in a particular order. We can make a list that includes the letters of the alphabet, the digits from 0–9, or the names of all the people in our family. We can put anything we want into a list, and the items in our list don’t have …
Linux find command is a powerful tool that can be used to locate and manage files and directories based on a wide range of search criteria. This post will cover how to delete files with find exec rm in Linux. However, some solutions in this article can be dangerous if we don’t correctly use them. …
The ssh known_hosts file is a file that stores the public key of all of the servers that you have connected using ssh. This file is used to verify the identity of servers in the future. Ssh can automatically add keys to this file, but they can be added manually as well. In this article, …
If you’ve ever tried to connect to a remote server using ssh, and received an error message that says “Host key verification failed,” you know how frustrating it can be. This article will show you three ways to fix the problem. What is a Host Key in SSH? A Host key is a unique identifier …
Recently we got some questions from our readers about how to find IP address in Linux. To address these inquiries, we’re dedicating this article to explore the various commands and tools available in Linux for discovering your system’s IP address. From Wikipedia, IP address is a numerical label assigned to each device in a computer …
DNS is a system by which a browser or other software converts a domain name to a IP4 or IP6 address. Each time we access a website the browser needs to convert the domain name to a IP4/IP6 address using a DNS server. The DNS server configured on our computer could be automatically selected by …