Root Install

  • Home
  • About
  • Contact Us
  • Tutorials
    • linux
    • system administration
    • ethical hacking
    • python
    • database
    • hacking-tools

Author: Zaher Talab

How to Install and Set Up the Kubernetes Dashboard

Posted on April, 2022April, 2022 by Zaher Talab

Introduction

Kubernetes is a cornerstone for the development of microservices SaaS and cloud-native software. Microservices necessarily need container technology and container orchestration since their architecture usually addresses a large number of containers. 

In this context, the Kubernetes dashboard is the … Read more

Tagged cloud computing, devops, system administration

How to Extract All Links from PDF in Linux

Posted on March, 2022March, 2022 by Zaher Talab

PDF files are one of the most common online documents formats. In many cases, you will need to extract URLs from a specific pdf file. Whether this file is on your desktop or the web, if you are a Linux … Read more

Tagged linux, pdf

A Simplification of Kubernetes Architecture and its Components

Posted on February, 2022February, 2022 by Zaher Talab
Image from: https://www.aquasec.com/cloud-native-academy/kubernetes-101/kubernetes-architecture/

Kubernetes as an orchestration platform for containers is similar to a whole human community or a national state. As in that, every single container is as a citizen in it. Many metaphors are used to explain Kubernetes … Read more

Tagged cloud computing, devops

What is CircleCI

Posted on February, 2022February, 2022 by Zaher Talab

Continuous Integration/Continuous Deployment (CI/CD) has become the most common development practice in the last decades for software development. Therefore, many CI/CD automation platforms emerged to get the most out of CI/CD. One of the most powerful among them is CircleCI. … Read more

Tagged ci/cd, devops, system administration

How to Install Hydra on Ubuntu

Posted on February, 2022February, 2023 by Zaher Talab

Since Ubuntu became the most popular Linux distribution, it’s better to use it than using other distributions. Unlike Kali Linux, Ubuntu doesn’t have built-in brute-force attack tools for ethical hacking, such as performing penetration tests.

So it would help if … Read more

Tagged cracking, ethical hacking

Tags

c++ ci/cd cloud computing cracking curl database devops docker ethical-hacking ethical hacking FFmpeg forensics hacking-tools javascript linux metadata networking pdf python scapy steganography system administration ubuntu windows

Recent Posts

  • 7 Best Tools To Test MITM (Man In The Middle) Attacks
  • Top 8 Tools To Protect Against Botnet Attacks
  • Linux Malware on the Rise: Tops Attacks to Look for and How to Protect Against Them
  • Top 5 Malware Scanners for Linux
  • Exposing Ransomware in Linux-based Multi-cloud Environments

Copyright © Root Install 2023

  • Privacy Policy
  • Contact Us
  • About