1 00:00:00,060 --> 00:00:05,460 Hello, everyone, in this video, we are going to learn about communication, comments of politics 2 00:00:06,240 --> 00:00:11,400 while working on Linux operating system, you will need to communicate with other devices or other operating 3 00:00:11,400 --> 00:00:11,840 system. 4 00:00:12,600 --> 00:00:18,090 And for this, there are some basic utilities that you can make use of this utility can help you to 5 00:00:18,090 --> 00:00:20,880 communicate with other network are the operating system. 6 00:00:20,880 --> 00:00:26,270 And in users, those utilities are age being independently. 7 00:00:26,850 --> 00:00:28,980 In this video, we're going to learn about them. 8 00:00:29,510 --> 00:00:29,820 Follow. 9 00:00:30,240 --> 00:00:31,350 Go to your class machine. 10 00:00:32,190 --> 00:00:36,540 Now, let's start with this is age is this age which stand for sickle-cell. 11 00:00:37,240 --> 00:00:44,280 It is used to connect with remote computers, securely compatible it this is a secure where in the client 12 00:00:44,280 --> 00:00:49,220 or server connection is authenticated using a digital certificate and passwords are encrypted. 13 00:00:49,920 --> 00:00:56,100 It is widely used by the system administrator to control remotely nexavar the command to login to the 14 00:00:56,430 --> 00:00:56,970 next machine. 15 00:00:56,970 --> 00:01:02,160 Using SICAD on your terminal is S.H. then the user name of the remote system. 16 00:01:03,390 --> 00:01:04,150 Then Ed. 17 00:01:05,320 --> 00:01:08,490 And the IP address of the system, no gender. 18 00:01:09,920 --> 00:01:17,570 Then will ask you to enter the password once you are logging, you can execute anyone who wants to stem 19 00:01:17,570 --> 00:01:18,370 from your program. 20 00:01:20,500 --> 00:01:26,650 Now, let's see, the pink on the pink one is commonly used to check whether your connection to the 21 00:01:26,650 --> 00:01:27,930 server is healthy or not. 22 00:01:29,200 --> 00:01:34,540 This code is also used for analyzing network and host connection, tracking network performance and 23 00:01:34,540 --> 00:01:37,470 managing it and listing hardware and software uses. 24 00:01:38,800 --> 00:01:43,260 The command of using ping is on and typing. 25 00:01:44,440 --> 00:01:49,340 Then the Target IP address are hosting and it ended here. 26 00:01:49,460 --> 00:01:53,020 A system has invited a packet, the IP address of the hostname. 27 00:01:54,310 --> 00:01:59,710 If even one of the bigger picture does not return or allows you to suggest an error in the connection 28 00:02:00,190 --> 00:02:04,700 easily internet is check using this common knowledge. 29 00:02:04,720 --> 00:02:12,220 See that effective common FTB stand for wild unsupportable is the most preferred protocol or transfer 30 00:02:12,220 --> 00:02:13,150 amongst computer. 31 00:02:13,780 --> 00:02:19,510 You can use it to be logging and establish a connection with a remote host to upload and download files 32 00:02:19,750 --> 00:02:22,480 and also navigate through the common established. 33 00:02:22,480 --> 00:02:29,890 The connection to a remote host is on a terminal FGB FTB then put the target IP address or hostname 34 00:02:30,280 --> 00:02:30,970 and enter. 35 00:02:31,750 --> 00:02:36,160 Once you enter the command, you do ask for authentication, username and password. 36 00:02:37,240 --> 00:02:42,700 Once the connection is established and you are Loveleen, you use the command to perform different action. 37 00:02:43,150 --> 00:02:46,500 Whatever I show in my directory management and manipulation video part. 38 00:02:48,220 --> 00:02:54,080 Now it's time for then it is same like S.H. but let's take you in. 39 00:02:54,100 --> 00:02:59,200 It helps to connect remotely next computer and run program remotely and conduct administration. 40 00:03:00,250 --> 00:03:03,910 This is similar to rewarding stuff which are found in this machine. 41 00:03:05,600 --> 00:03:08,530 The common for this is there and the hostname. 42 00:03:10,770 --> 00:03:18,270 OK, now we all know about the basic communication common on now it's time for a quick webapp secure 43 00:03:18,270 --> 00:03:22,920 communication between Linux and other different computer networks, anybody that is possibly using their 44 00:03:22,920 --> 00:03:23,760 securities. 45 00:03:24,870 --> 00:03:30,780 The government check whether the connection with the host name or IP address is working on a piece of 46 00:03:30,780 --> 00:03:33,300 paper protocol for sending and receiving large files. 47 00:03:33,900 --> 00:03:39,120 You can establish an effective connection to a remote host and then use common for uploading downloading 48 00:03:39,120 --> 00:03:45,660 files and also can browse through varieties that would really help you connect to that computer and 49 00:03:45,660 --> 00:03:46,050 work on. 50 00:03:46,500 --> 00:03:47,980 So, guys, that's all for this video. 51 00:03:47,980 --> 00:03:49,580 What I would like to see you. 52 00:03:49,980 --> 00:03:53,910 So give it a big thumbs up and share this video and also comment down below. 53 00:03:53,910 --> 00:03:58,100 If I missed something, you know, next video, we are going to learn about some networking common. 54 00:03:58,620 --> 00:03:59,910 So Trindall care.