×


Search For:


Rsync from Linux to Windows share

This article will guide you on how to use #Rsync to transfer #files from #Linux to #Windows share.

cwRsync is an implementation of rsync for Windows. rsync uses a file transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. #cwRsync can be used for remote file backup and synchronization from/to Windows systems.

Syntax of rsync #command:

1. -v, –verbose Verbose output.

2. -q, –quiet suppress message output.

3. -a, –archive archive files and directory while synchronizing ( -a equal to following options -rlptgoD).

4. -r, –recursive sync files and directories recursively.

5. -b, –backup take the backup during synchronization.


Azure PowerShell context objects How to manage them

This article will guide you on how to manage #Azure #PowerShell #context #objects. Azure PowerShell context objects are to hold subscription and authentication information. 

Azure PowerShell is basically an extension of #Windows PowerShell. It lets Windows PowerShell users control Azure's robust functionality. From the command line, Azure PowerShell programmers use preset scripts called cmdlets to perform complex tasks like provisioning virtual #machines (#VMs) or creating #cloud services.

To select Azure subscription in PowerShell:

1. Enter Login-AzAccount and hit enter, then provide your user id and password.

2. Get-AzureSubscription (this will give you the list of subscription).

3. Select-AzureRmSubscription -SubscriptionId xxxxx-xxxxx-xxxxxx-xxxx (this way you can set which particular subscription you want to use).


HTTP Flood DDOS Attack How to Mitigate the attack

This article will guide you on how to recover from DDoS attacks. Basically, protecting the web server against #DDoS #attacks is important. You can apply these measures to mitigate the error from causing troubles.

DNS #flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker targets one or more Domain Name System (#DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

To prevent DDoS attacks:

1. Buy more bandwidth. 

2. Build redundancy into your infrastructure. 

3. Configure your network hardware against DDoS attacks. 

4. Deploy anti-DDoS hardware and #software #modules. 

5. Deploy a DDoS protection appliance. 

6. Protect your DNS servers.


Share Data between Docker Containers

This article will guide you on steps to share #data between #docker #containers. To mount a data volume to a container add the --mount flag to the docker run #command. It adds the volume to the specified container, where it stores the data produced inside the virtual 3environment.

From the Docker #host, as Docker Volumes: Volumes are stored in an area of the host filesystem that's managed by Docker. Bind mounts can map to any folder in the host filesystem, so access can't be controlled from a Docker process and can pose a security risk as a container could access sensitive OS folders.

A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.

To copy from Docker to local container:

1. First, set the #path in your localhost to where the file is stored.

2. Next set the path in your docker container to where you want to store the file inside your docker container.

3. Then copy the file which you want to store in your docker container with the help of CP command.


Pros and Cons of Outsourcing Customer Service

In this article, you will see the different pros and cons to #outsourcing #customer #service. However, each case is unique. We should know best if outsourcing customer service could be the right way.

Outsourcing to someone who specialises in delivery of that part of your process, and therefore has up-to-date systems, technology and staff, can improve the quality of that service by reducing costs, improving final output quality or freeing up your internal staff for other roles they could be performing.

However, the flexible solutions allow you to consider the best-case scenario. Consider all possibilities and pick a scaleable, high-quality solution that best fits the business profile.

Benefits of outsourcing customer service:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.


Wget SSL error How to fix it

This article will guide you on steps to fix #Wget #SSL error which is a generic #error that pops an error message "Unable to establish SSL connection" .
To support encrypted HTTP ( #HTTPS ) downloads, Wget must be compiled with an external SSL library, currently #OpenSSL. If Wget is compiled without SSL support, none of these options are available."
You might need to check whether the version of wget you are using supports #SSL.