background preloader

Linux

Facebook Twitter

Certification

Distributions. Cheat Sheet : All Cheat Sheets in one page. Containrs. Weave - All you need to connect, observe and control your containers. What You Will Build Weave provides a software network optimized for visualizing and communicating with applications distributed within Docker containers.

Weave - All you need to connect, observe and control your containers

Using tools and protocols that are familiar to you, Weave’s network topology lets you to communicate between containerized apps distributed across multiple networks or hosts more quickly and efficiently. With Weave you focus on developing your application, rather than your infrastructure. As demonstrated in this tutorial, Weave works seamlessly with other tools such as Vagrant. Vagrant provides an easy way to provision, and set up your hosts. Specifically, in this example: Bash Hackers Wiki Front page [Bash Hackers Wiki] Cheat Sheet: Crontab by Example. Today's article may be pretty basic for regular readers but hopefully some may find it useful.

Cheat Sheet: Crontab by Example

This article will cover creating a crontab entry and show some examples of common crontabs. The Cron daemon is a service that runs on all main distributions of Unix and Linux and specifically designed to execute commands at a given time. These jobs commonly refereed to as cronjobs are one of the essential tools in a Systems Administrators tool box.

Creating crontabs is something every level of Unix/Linux Sysadmin should know like the back of their hand. LINUX. How to Learn bash shell and scripting – The best tutorials for bash beginners. Linux System Administrator's Guide. Bash String Manipulation Examples – Length, Substring, Find and Replace. In bash shell, when you use a dollar sign followed by a variable name, shell expands the variable with its value.

Bash String Manipulation Examples – Length, Substring, Find and Replace

This feature of shell is called parameter expansion. But parameter expansion has numerous other forms which allow you to expand a parameter and modify the value or substitute other values in the expansion process. In this article, let us review how to use the parameter expansion concept for string manipulation operations. This article is part of the on-going bash tutorial series. Unix and Linux. Man page. Explainshell.com - match command-line arguments to their help text. ShellCheck – Online shell script analyzer.

Manage, share and source your aliases online. LinuxCommand.org: Learn the Linux command line. Write shell scripts. Examplenow - Linux, UNIX command line examples. Useful Unix commands for data science. Imagine you have a 4.2GB CSV file.

Useful Unix commands for data science

It has over 12 million records and 50 columns. All you need from this file is the sum of all values in one particular column. How would you do it? Writing a script in python/ruby/perl/whatever would probably take a few minutes and then even more time for the script to actually complete. A database and SQL would be fairly quick, but then you'd have load the data, which is kind of a pain. Thankfully, the Unix utilities exist and they're awesome. Let's assume our data, which we'll call data.csv, is pipe-delimited ( | ), and we want to sum the fourth column of the file. cat data.csv | awk -F "|" '{ sum += $4 } END { printf "%.2f\n", sum }' The above line says: It took less than two minutes to run on the entire file - much faster than other options and written in a lot fewer characters.

For those who are a bit newer to the command line than the rest of this post assumes, Hilary previously wrote a nice introduction to it. Other commands grep sed Additional Resources: Unix. Linux. Cron. LINUX. Ubuntu. Genaral commands Unix. Distrowatch. Arch. Manjaro official. LINUX. Coursera.org. Web Search Results.

Ubuntu

Uninstall Survey. Recently I was developing at home, where I do not have Visual Assist; it was so much slower.

Uninstall Survey

It was like programming with stone knives and bearskins. Visual Assist has been so good I don't notice it anymore – until I use an IDE without it. Then, I wonder what's wrong with the IDE. David Smith Tyco Electronics We rely heavily on Visual Assist in my office. Rasmus Anthin Surgical Science Inc Visual Assist has proven to always increase productivity. Kristoffer Danielsson Kaysoft. Linux-Unix Cheat Sheets - The Ultimate Collection. HowtoForge - Linux Howtos and Tutorials.

XenoCafe - Learn Linux the easy way with our free comprehensive tutorials for beginners. Linux Commands - A practical reference. The Incredible Guide to NEW Ubuntu (Karmic Koala) [PDF] Beginner's Guide to Nmap. Ever wondered how attackers know what ports are open on a system?

Beginner's Guide to Nmap

Or how to find out what services a computer is running without just asking the site admin? You can do all this and more with a handy little tool called Nmap. What is Nmap? Short for "network mapper," nmap is a veritable toolshed of functionality to perform network scans. It can be used for security scans, simply to identify what services a host is running, to "fingerprint" the operating system and applications on a host, the type of firewall a host is using, or to do a quick inventory of a local network. It's famous, too. In this tutorial, I'll cover some of the basics of using Nmap and provide some examples you can use quickly.