2
2
Checksums are values derived from a set of data, typically generated using a
mathematical algorithm. They are used to verify the integrity of data during
transmission or storage.
The primary purpose of a checksum is to detect errors or corruption that may
have occurred in the data. Common checksum algorythms: MD5, SHA-1, and SHA-256
A deb file is an archive that contains data. Marked with the .deb extension, it
is used to easily distribute and install programs for Linux Debian and
derivatives.
A deb is a standard Unix ar archive that contains your application and other
utility files. The most important one is the control file, which stores the
information about
the deb package and the program it installs.
Linux bundle files (used to install VMWARE on Ubuntu, for instance) are shell
scripts which self-extract a program in order to install it.
you can make bundle file executable via command: chmod +x file_name.bundle
and after run it ./file_name.bundle
The dpkg (Debian Package) command is a low-level package management tool used in
Debian-based and Debian-derived Linux distributions to perform package-related
operations.
underlying way of installing packages ex: sudo dpkg -i package_name.deb ( -i or
--install: This option tells dpkg to install the specified Debian package file)
In newer hardware, the boot menu and the associated firmware have transitioned
from traditional BIOS (Basic Input/Output System) to UEFI (Unified Extensible
Firmware Interface).
UEFI is the modern replacement for the legacy BIOS system, but its backwards
mostly compatible. Many UEFI systems feature Legacy BIOS Compatibility Mode.
UEFI provides more advanced features and better support for modern hardware,
including faster boot times, support for larger hard drives, and improved
security features.
exact key and procedure to access the UEFI/BIOS settings and boot menu may vary
depending on your computer's manufacturer and model. best way is to search by
hardware manufacturer & model.
You can access the UEFI/BIOS settings and the boot menu during the boot process,
typically by pressing a specific key (e.g., F2, F12, Del) as your computer
starts up.
GNU GRUB or simply GRUB(GNU GRand Unified Bootloader) - popular and widely used
bootloader software in the open-source and Linux communities. GRUB plays a
crucial role in the
boot process of many operating systems, including various Linux distributions
and some versions of Windows
Bridged and NAT (Network Address Translation) are two different network modes or
configurations commonly used in virtualization and networking. These modes
determine how
virtual machines (VMs) in a virtualization environment interact with the
physical network and the outside world.
*In a bridged network mode, each virtual machine is assigned an IP address from
the same subnet as the physical network to which the host computer is connected.
VMs can directly access and communicate with devices on the physical network.
Virtual machines in bridged mode are visible and identifiable as separate
devices on the physical network. Can be accessed from other computers on the
same network.
There is no network address translation involved in a bridged network. VMs have
their own IP addresses, and communication is one-to-one with the physical
network.
*In a NAT network mode, VMs are assigned IP addresses from a private subnet
created by the virtualization software. These private IP addresses are not
visible
or accessible from the physical network
Communication between VMs and the physical network is mediated by network
address translation. The host computer acts as a NAT router, translating
requests from VMs to use
its own IP address when communicating with external networks.
hypervisor can take the role of a virtual switch. In this case, each virtual
machine has a MAC address and the hypevisor switches frames from one virtual
machine to another,
just like an Ethernet switch would do. Virtual switches have several advantages:
it is very easy to reconfigure them, it is possible to augment the switch with
additional
functionality, for instance for additional security.
<Going from a hardware configuration for the host kernel to a configuration for
the guest OS is known as a world switch.>