28 discussions
151 commentsMost recent: 002.03.Constructors and Destructors by utkarshraj273October 23
20 discussions
62 commentsMost recent: 20. Tracking Page Faults for Processes by riteshtyagi725October 2024
5 discussions
16 commentsMost recent: 5. Using `pidstat` for Process Monitori… by mdaliakbarOctober 2024
21 discussions
52 commentsMost recent: Process-Management-Introduction. Issues… by sidharthseelaMarch 15
20 discussions
48 commentsMost recent: 4. Understanding Process IDs in Unix Sy… by riteshtyagi725November 2024
20 discussions
41 commentsMost recent: 20. Example Scenario of `fork()` Execut… by gaurav133232June 2024
24 discussions
58 commentsMost recent: 8. Replace the current process with the… by akashbhandariNovember 2024
20 discussions
40 commentsMost recent: 20: Comparing Wrong and Right Ways to U… by gaurav133232June 2024
20 discussions
40 commentsMost recent: 20. Kernel Data Structures for Managing… by gaurav133232July 2024
22 discussions
35 commentsMost recent: 11. Overview and Syntax of sigaction by gaurav133232July 2024
1 discussion
3 commentsMost recent: Queries. 003.08.Inter-Process-Communica… by dshikha492August 2024
21 discussions
62 commentsMost recent: 8. What is the purpose of the `semget()… by dshikha492November 5
21 discussions
40 commentsMost recent: 16. Describe the role of the `void *(*s… by abhinandan2971vermaNovember 2024
36 discussions
67 commentsMost recent: What is Software Ports? What is their R… by dshikha492June 17
11 discussions
21 commentsMost recent: 005.01.10. Security Measures and IOCTL by nirmalpg124May 2024
5 discussions
10 commentsMost recent: 5.How does Systemd manage the system's … by gaurav133232March 2024
5 discussions
15 commentsMost recent: 3.How does the BIOS facilitate the init… by mdaliakbarMay 2024
5 discussions
11 commentsMost recent: 3. What is the Power-On Self-Test (POST) by mdaliakbarMay 2024
5 discussions
10 commentsMost recent: 5. With the transition from BIOS to UEF… by gaurav133232March 2024
1 discussion
4 commentsMost recent: Queries and Discussions. 05.Understandi… by dshikha492November 2024
31 discussions
69 commentsMost recent: Loops and Iterations. Issues, queries, … by sidharthseelaJune 22
10 discussions
133 commentsMost recent: 1.Introduction-to-networking. initial s… by jeewanrawatJune 8
10 discussions
100 commentsMost recent: 9.What role does the operating system p… by jeewanrawatJune 8
10 discussions
72 commentsMost recent: 9.Why is it important to understand the… by jeewanrawatJune 8
20 discussions
102 commentsMost recent: 4.a host being attached to multiple sub… by sheenu.1885881June 8
10 discussions
37 commentsMost recent: 3.what is the purpose of the default ro… by sheenu.1885881June 8
5 discussions
20 commentsMost recent: 1. Can you explain the significance of … by jainh10022000June 10
20 discussions
75 commentsMost recent: 9.What is the significance of the fe80:… by jainh10022000June 11
10 discussions
30 commentsMost recent: 10.Describe the -4 and -6 options for b… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. Explain the limitation mentioned in … by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.In the context of exploring the hardw… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.Explain the steps involved in adding … by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.Describe the unique approach offered … by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.system service for network configurat… by mohdmohsinkhaneeFebruary 2024
10 discussions
30 commentsMost recent: 10.Explain the concept of dispatching i… by mohdmohsinkhaneeFebruary 2024
19 discussions
41 commentsMost recent: 10.significance of the loopback interfa… by mohdmohsinkhaneeFebruary 2024
10 discussions
30 commentsMost recent: 10.How does UDP handle error detection by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.Discuss the two DHCP clients ISC dhcl… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. Discuss the significance of the glo… by mohdmohsinkhaneeFebruary 2024
5 discussions
16 commentsMost recent: 5. Why is Network Address Translation (… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.What challenge arises when hosts on p… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.What kernel configurations, iptables … by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. What advantages do custom Linux firm… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. In the filter table of iptables, thr… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5.a friend's machine at 192.168.34.37 i… by mohdmohsinkhaneeFebruary 2024
10 discussions
15 commentsMost recent: 5. Discuss the potential consequences a… by gaurav133232February 2024
5 discussions
10 commentsMost recent: 5. Why does ARP only apply to machines … by gaurav133232February 2024
5 discussions
10 commentsMost recent: 5.Linux utilities iw and wpa_supplicant… by gaurav133232February 2024
3 discussions
6 commentsMost recent: 3. Describe the process and significanc… by gaurav133232March 2024
2 discussions
4 commentsMost recent: 2. Discuss the differences in handling … by gaurav133232March 2024
5 discussions
10 commentsMost recent: 5. How can one verify the authenticity … by gaurav133232March 2024
3 discussions
6 commentsMost recent: 3. Discuss specific use cases for Telne… by gaurav133232February 2024
5 discussions
19 commentsMost recent: 5. With secure protocols like SSH, in w… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. In the context of TELNET, what role … by mohdmohsinkhaneeFebruary 2024
3 discussions
10 commentsMost recent: 3. Describe process,purpose of option n… by mohdmohsinkhaneeFebruary 2024
3 discussions
6 commentsMost recent: 3. How do the three modes of TELNET ope… by mohdmohsinkhaneeFebruary 2024
5 discussions
15 commentsMost recent: 5. Given Telnet's vulnerability to eave… by mohdmohsinkhaneeFebruary 2024
3 discussions
7 commentsMost recent: 3. Describe a scenario where using Teln… by mohdmohsinkhaneeFebruary 2024
5 discussions
7 commentsMost recent: 2. Describe the process of installing a… by mohdmohsinkhaneeFebruary 2024
3 discussions
5 commentsMost recent: 1. Discuss security implications of usi… by mohdmohsinkhaneeFebruary 2024
5 discussions
22 commentsMost recent: Parallel Port Device Driver development… by niranjanOctober 2021
2 discussions
120 commentsMost recent: Slogan for EmbLogic and EmbLogicians... by gaurav133232August 2023It looks like you're new here. If you want to get involved, click one of these buttons!