Operations | Monitoring | ITSM | DevOps | Cloud

July 2022

What is Bashtop? Setup, Commands, and Shortcuts

Usually, we have top and htop to monitor the Linux system and get to know the running processes along with CPU and Memory utilization. But these commands have certain limitations which refrain them from giving a detailed overview of the system performance. This limitation is overcome by the alternative called Bashtop. In this blog, we will learn about Bashtop, its advantages, and disadvantages along with its shortcuts and installation guide.

What is User Datagram Protocol (UDP)?

One of the easiest transport layer protocols available in the TCP/IP protocol suite is the User Datagram Protocol (UDP). The communication mechanism involved is minimal. With UDP, neither the receiver nor the sender receives any acknowledgements of packets received. This protocol's shortcoming makes it unreliable and easier to process than many other protocols. Although UDP is considered an unreliable transport protocol, it uses IP services to ensure the best attempts are made to deliver data.

IPv4 vs IPv6 - What are the Differences?

An IP (Internet Protocol) address is a numerical label which is used for addressing he location and identification of the network interface for the devices connected to the computer network. The most used and popular IP version is IPv4 which uses 32-bit for IP addresses. Since the IPv4 became popular and the IPv4 addresses are getting depleted, Ipv6 is now used which uses 128-bit for the IP addresses.

API Security - Threats & Best Practices

An API is an interface that allows other software programs to access and execute software programs. Software programs exchange data and communicate via this code. Communicating between products and services without requiring users to understand how they work. Social networks, games, database systems, and devices use web APIs to connect with applications.

Personally Identifiable Information (PII) - A Beginner's Guide

PII stand for Personally Identifiable Information, so protecting Personally Identifiable Information (PII) is a top priority for companies small and large, as well as government agencies. Companies are amassing increasing amounts of data on their employees, customers, and partners, making PII security more important than ever. It's critical to understand what PII is and how to protect it. Personal information can be divided into two categories.

Generating Secure Passwords for your Linux Server

Having a strong password is necessary to protect our information from being accessible by others. A strong password should be difficult to be identified, guess or decrypt by the attackers. Mostly, while entering passwords, we will be prompted to enter the upper case and lowercase letters along with numbers and special characters. But thinking of a new password every time is very difficult and most people end up repeating the same password for every website and application they use.

A Guide on How to Monitor GraphQL APIs

GraphQL has replaced REST since its debut in 2015 and has gained popularity. It provides the flexibility frontend developers have longed for. The days of begging with backend developers for single-purpose endpoints are over. Now, a query can provide all the necessary data and request it at once, theoretically reducing latency by a significant amount. Everything was much easier with REST, especially monitoring.

Cross-Site Request Forgery - Threat To Open Web Applications

Cross-site request forgery (CSRF) is an attack that tricks a user's browser into sending a malicious HTTP request to another website. This malicious HTTP request looks like it was sent by the user, but it actually comes from the attacker. A cross-site request forgery (CSRF) attempts to execute a change rather than trying to download personal data. Once an attack is executed there is no way for the attacker to directly monitor the result so attackers often execute multiple forgeries.

Top 7 Java Performance Metrics to Monitor

Today, almost any metric you can think of can be tracked down and reported, as opposed to the past when the software was traditionally provided in boxes and its performance in production could not be predicted. The issues we are currently facing are not due to a lack of information, but rather to an abundance and scale of information. This becomes significantly more difficult to manage when dozens or even hundreds of servers are in use.

What is Transmission Control Protocol (TCP) and How it works?

The Transmission Control Protocol provides reliable, ordered and, sometimes, time-sensitive data flow between applications across a network. As well as economizes network use by attempting to improve error-handling capability and providing reliable data transmission. The Transmission Control Protocol is the underlying communication protocol for a wide variety of applications, including web servers and websites, email applications, FTP and peer-to-peer apps.

DevOps Best Practices for Database

DevOps has been bridging the gap between the development and operations teams for more than a decade. It is eliminating the organizational barriers between the two and automates the delivery process. It's time to start treating databases the same way we treat the delivery pipeline when applying DevOps. When we have a large database, automation is crucial. When the database has too much information, changing a table can take ages and block further changes like inserts, updates, or deletes.

Minify CSS and JavaScript to accelerate website speed

Minification is the technique of terminating all undue extra characters from the source code. This method reduces file sizes, allowing for faster load times and less bandwidth load. Less code appearing in front-end web pages also leads to a more compact, faster-loading website. Most importantly, minification speeds up web pages for users on limited data plans, allowing them to enjoy your content with less worry about exceeding their download quota.