Posts

How to download Linkedin Video

Image
  Below is the process to download video from linkedin. Step 1- Select video link which you want to download and copy this link. Step2- Paste this copied link into the below URL and choose video format in which you want to download. https://www.expertsphp.com/instagram-reels-downloader.php 

How to setup open AI GPT in local machine

Image
What is OpenAI-  OpenAI is a research company that aims to promote and develop friendly AI in a way that benefits humanity as a whole. The company was founded in December 2015 by Elon Musk, Sam Altman, Greg Brockman, Ilya Sutskever, Wojciech Zaremba, and John Schulman. OpenAI conducts research in various areas of AI, including machine learning, computer vision, and natural language processing. The company also provides a platform for others to build and deploy AI models, and it has released several state-of-the-art models, such as GPT-3, that have been widely adopted in industry and academia. To set up OpenAI GPT on your local machine, you will need to follow these steps: 1. Install the OpenAI API client by running the command pip install openai in your terminal. 2. Obtain an API key from the OpenAI website by signing up for an account. 3. Set the API key as an environment variable by running the command export OPENAI_API_KEY=your_api_key. 4. Use the OpenAI API client to interact with

How to upload bulk Email alias in Google Workspace

Image
  Prerequisites-  1) You should have superadmin privilege 2) GAM tool download it from below link https://github.com/GAM-team/GAM/releases After configuration GAM tool (Followed the screen instructions ). Prepare your data sheet and upload file with 1 or 2 records. if this goes success then you can upload whole data. gam csv raghvendra.csv gam create alias ~alias user ~user  (user- primary email id) field will be like this user- xyz.com and in alias -second second email ids

Top Security Tools for AWS Cloud

AWS provides security tools designed to improve both account security and application and service security. An AWS account is an attack vector, as resources and data are accessible through the public application programming interface (API). Implementing a secure identity and access management strategy helps prevent leaking data — such as in S3 buckets — to the public. AWS’s many tools provide insights into your configured permissions and access patterns, and record all actions for compliance and audit purposes. Applications and services hosted in AWS are susceptible to different kinds of threats from the outside. Cross-site scripting (XSS), SQL injection, and brute-force attacks target public endpoints. Distributed denial-of-service (DDoS) attacks may attempt to bring down your services, potentially compromising your architecture security. Without proper management, sensitive information — such as database credentials — may leak. Therefore, it's critical that organizations migratin

Amazon-web-services – AWS S3 display file inline instead of force download

Image
For some reason files in my S3 bucket are being forced as downloads instead of displaying in-line so if I copy an image link and paste it into address bar and then navigate to displaying file or show option to downloading so in  this case you will have to make change in object metadata and add below field type in the configuration. Type- System defined Key- Content-Type Value- image/jpeg (You can select value from the drop down)

Change TimeZone in CentOS/RHEL 8/7

             Step 1- Check date and timezone           Command- date           Step 2- timedatectl list-timezones           (Select your timezone from this list and run with below command )           Step 3- timedatectl set-timezone America/Los_Angeles

Best cyber security practices for Enterprises to stay secure

In wake of the rising incidences of targeted attacks on enterprises, there is no way organizations can afford to ignore the importance of cyber security. Regardless of the size and type of enterprise, even a small data breach or cyber-attack could mean millions of dollars of loss, crippling the economy of enterprise. It is for this reason that as a thumb rule, enterprises start following these good cyber security practices, in order to be cyber secure against known and unknown threats: Invest in Security Solutions – An enterprise may be subjected to various kinds of threats and thus, to ensure enterprise-wide security, it is a good practise to invest in a variety of security solutions that cover the changing needs of an organization. Use Complex & Unique Password – As a thumb rule, enterprises must encourage employees to use strong and unique passwords and prohibit them from sharing their credentials. Invest in Training – Educate and train employees about cyber security so that the