Open in app

Sign In

Write

Sign In

Mohammad Humayun Khan
Mohammad Humayun Khan

15 Followers

Home

About

Nov 28, 2021

What all you need to know about Unikernels | Characteristics, Implementation, and Benefits.

In today’s world, as developers, our end goal is, most of the time, to successfully run an application. We also know that container technology is helping us achieve this end goal. To run containers, we need to ship the entire user-space libraries of the respective distribution with the application. In…

Operating Systems

4 min read

What all you need to know about Unikernels | Characteristics, Implementation, and Benefits.
What all you need to know about Unikernels | Characteristics, Implementation, and Benefits.
Operating Systems

4 min read


Nov 26, 2021

Popular Micro OSes for containers you should know

The current technological trend is to run applications in containers. In this context, it makes a lot of sense to eliminate all the packages and services of the host Operating System (OS), which are not essential for running containers. With that in mind, various vendors have come forward with specialized…

Computer Science

7 min read

Popular Micro OSes for containers you should know
Popular Micro OSes for containers you should know
Computer Science

7 min read


Nov 20, 2021

What happens when you type a URL on the browser and press Enter

It is one of the most famous questions that is asked a lot in technical interviews. In this post, we’ll see from start to finish, what actually happens, from typing a legit URL and pressing enter to get the correct response from the browser. At the point of typing the…

Computer Science

7 min read

What happens when you type a URL on the browser and press Enter
What happens when you type a URL on the browser and press Enter
Computer Science

7 min read


Nov 9, 2021

How to protect ourselves from different types of internet attacks?

In this post, we’ll look into some ways using which, any organization or individual can protect themselves up to a certain level from many common types of internet attacks. …

Security

4 min read

How to protect ourselves from different types of internet attacks?
How to protect ourselves from different types of internet attacks?
Security

4 min read


Nov 9, 2021

Demystifying some of the most common attacks over the internet that you may not know

In this fast-moving internet-savvy world, there are a lot of attacks happening over the internet that you may not even know about. Millions of systems are attacked every single day and Hackers use a plethora of tools and technologies to attack these systems. …

Security

6 min read

Demystifying some of the most common attacks over the internet that you may not know
Demystifying some of the most common attacks over the internet that you may not know
Security

6 min read


Nov 9, 2021

What are the functions of each layer in TCP/IP?

We know that the OSI model gives us the idealized network communications protocol family. TCP/IP does not correspond to this model directly, as it either combines several OSI layers into a single layer or does not use certain layers at all. We see in the table below the OSI model…

Tcp

3 min read

What are the functions of each layer in TCP/IP?
What are the functions of each layer in TCP/IP?
Tcp

3 min read


Nov 8, 2021

How an application file is transferred over TCP/IP

Let’s look at a brief overview of the dominant network models. The Open Systems Interconnection (OSI) 7-layer model is used to characterize and standardize the communication functions of telecommunication or computing systems. The TCP/IP 5-layer model was developed for the US Department of Defense’s packet switching network ARPANET (Advanced Research…

Tcp

4 min read

How an application file is transferred over TCP/IP
How an application file is transferred over TCP/IP
Tcp

4 min read


Jul 17, 2021

Sign your work on Git locally using GPG keys | Commit signature verification

Here, I’ll show you how you can sign your commits on git using GPG keys so that they are marked as verified on GitHub and others can be confident that these commits come from a genuine source and are not been tampered with. …

Git

6 min read

Sign your work on Git locally using GPG keys | Commit signature verification
Sign your work on Git locally using GPG keys | Commit signature verification
Git

6 min read


Jul 17, 2021

Understanding PGP Encryption | Creating a key-pair using gpg4win on Windows

So, the first question that everyone must be having in their minds is what exactly is PGP? PGP stands for Pretty Good Privacy and it is one of the most widely used email encryption systems in the world. …

Encryption

4 min read

Understanding PGP Encryption | Creating a key-pair using gpg4win on Windows
Understanding PGP Encryption | Creating a key-pair using gpg4win on Windows
Encryption

4 min read


Nov 9, 2020

The art of concentration and focus

You may not realize it, but the mind is very powerful. It is unlimited in potential. You can create anything you desire just by letting the mind do what it was created by God to do. Every person on this planet has the same capacity in their brain but not…

Focus

4 min read

The art of concentration and focus
The art of concentration and focus
Focus

4 min read

Mohammad Humayun Khan

Mohammad Humayun Khan

15 Followers

Software Engineer in making!

Following
  • The Educative Team

    The Educative Team

  • Arslan Ahmad

    Arslan Ahmad

  • Netflix Technology Blog

    Netflix Technology Blog

  • William Wen

    William Wen

  • Aryannayakk

    Aryannayakk

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech