top of page
Search


What Really Happens When You Shutdown a Linux Server ?
Introduction A Linux shutdown is more than just turning off a machine — it is a controlled process that protects running services, active users, and critical data. Understanding what happens during shutdown helps administrators troubleshoot delays, prevent corruption, and manage systems more confidently. [root@siddhesh ~]# shutdown -h now But very few actually know what happens after this command is executed . A shutdown is not just turning off the power.It is a well-orches

Siddhesh Kadam
3 min read


Building a CI/CD Pipeline with AWS CodeCommit & CodePipeline to Deploy a Static Website on S3
AWS CodePipeline provides a native AWS continuous deployment pipeline to manage web application deployments from the source code repository to the deployment of our web application. In this blog, we will walk through setting up AWS CodePipeline to continuously deploy our web application to S3 . We will walk through the prerequisites to set up our pipeline by setting up our source code repository with AWS CodeCommit and creating an S3 bucket to host static web application

Siddhesh Kadam
2 min read


From Install to Injection: Hands-on SQLMap Tutorial on Linux
Disclaimer : This blog is strictly for educational and authorized security testing only. Always take written permission before testing any application. Unauthorized testing is illegal. Introduction SQL Injection is still one of the most common and dangerous web vulnerabilities. Even today, many internal tools, admin panels, and legacy applications are exposed due to weak input validation. sqlmap is an open-source penetration testing tool that automates the process of detect

Siddhesh Kadam
3 min read


Advanced Intrusion Detection Environment (AIDE) on RHEL / Rocky / CentOS
System integrity is one of the most overlooked areas in Linux security. Firewalls, SELinux, and antivirus tools are common, but they do not tell you if critical system files were modified silently . This is where AIDE (Advanced Intrusion Detection Environment) fits perfectly. In this blog, I’ll walk through what AIDE is, how it works, how to configure it properly , and how to interpret its output on RHEL, Rocky Linux, and CentOS . All commands shown below were executed manu

Siddhesh Kadam
3 min read


Setting up ntfy Push Notification Server on Rocky / RHEL using Nginx
Push notifications are no longer limited to mobile apps or big SaaS platforms. With ntfy , you can send instant push notifications to your mobile or desktop using simple HTTP requests. This makes it extremely useful for DevOps alerts, cron jobs, CI/CD pipelines, monitoring systems, and server-side scripts . In this blog, we’ll set up ntfy on a Rocky Linux / RHEL server and securely expose it using Nginx as a reverse proxy. What is ntfy? ntfy is a lightweight, open-source

Siddhesh Kadam
3 min read


Understanding and Managing ARP Cache in Linux: A Complete Technical Guide
Managing the ARP cache effectively is essential for maintaining smooth network communication on Linux systems. Both Red Hat Enterprise Linux (RHEL) and Rocky Linux rely on the Address Resolution Protocol (ARP) to map IP addresses to MAC addresses within a local network. Understanding how to view, modify, and clear the ARP cache can help troubleshoot network issues, improve security, and optimize system performance. This post explores ARP cache management on RHEL and Rocky Lin

Siddhesh Kadam
4 min read
bottom of page
