RSA and SHA

RSA and SHA are two different cryptographic algorithms used for different purposes. RSA is an asymmetric encryption algorithm, while SHA is a hash function. RSA RSA is primarily used for encryption and digital signatures. It is based on the mathematical problem of factorization, and it uses a pair of keys (public and private) to encrypt and decrypt messages. RSA is commonly used in secure email, online banking, and other secure communication protocols. ...

July 28, 2024 · 3 min

Apache server concepts

httpd.conf vs .htacess httpd.conf and .htaccess are both configuration files used in Apache web server, but they have different scopes and purposes. 1. httpd.conf httpd.conf is the main configuration file for Apache, which contains global configuration settings that apply to the entire server. It is usually located in the Apache installation directory or in the /etc/httpd/ (or /etc/apache2/ on some systems) directory, and it requires administrative privileges to edit. The httpd.conf file is used to configure various aspects of the Apache server, including server-wide settings such as server name, ports, server modules, virtual hosts, and security settings. Changes made to httpd.conf require a server restart to take effect. ...

July 20, 2024 · 9 min

MongoDB StatefulSet Setup

Creating a MongoDB Replica Set with authentication using StatefulSets involves several steps. Below is a manifest example for deploying a MongoDB Replica Set with authentication using StatefulSets in Kubernetes. This assumes you have a Kubernetes cluster set up and kubectl configured. Create a Secret for MongoDB Authentication: Create a Kubernetes Secret to store the MongoDB admin credentials. You can encode the username and password using echo -n 'yourpassword' | base64: ...

July 11, 2024 · 2 min

MongoDB notes

WiredTiger WiredTiger is a high-performance, open-source storage engine used by MongoDB to store and manage data. WiredTiger is designed to support high concurrency and high throughput workloads while maintaining low latency and high reliability. It is optimized for modern hardware architectures, including solid-state drives (SSDs), multi-core processors, and large memory configurations. Key features of WiredTiger: Document-level concurrency control: Allows multiple operations on the same document to be processed concurrently, improving performance and reducing lock contention. ...

July 8, 2024 · 6 min