background preloader

The Bash Hackers Wiki

The Bash Hackers Wiki
Related:  Systèmes et IT

Help Manual - Software Changing Desktop Environments Change Repository Location Creating and Extracting compressed files File Encryption Getting Software Installing Software Linux Equivalents of Windows Programs Lite Software - Install Software Lite Software - Remove Software Lite Sources Lite Tweaks - Bootup Fix - Clear Memory - Default Web Browser - Hibernate, Suspend Lite Updates Notify PPA - Adding PPA - Removing Software Updates Country Location Uninstalling Software Updates Wine - Run Windows programs Getting Software Getting software on Linux is easier than on Windows. The vast majority of programs that you may want/need to install are all centrally located in what are called software repositories (repos). There are a few common methods for installing and removing software. IMPORTANT: Before you run Install/Remove Software for the first time, read this first. Installing Software 1. 2. type in your search query. 3. 4. 5. 6. Uninstalling Software 1. 2. Top of page Updates Enter your password. Lite Sources

Awk - A Tutorial and Introduction - by Bruce Barnett Your browser does not have Javascript enabled. I use Javascript for analytics, and to show ads which pay for the maintenance Last modified: Thu Apr 23 16:37:47 EDT 2015 Part of the Unix tutorials And then there's My blog Table of Contents Copyright 1994,1995 Bruce Barnett and General Electric Company Copyright 2001, 2004, 2013, 2014 Bruce Barnett All rights reserved You are allowed to print copies of this tutorial for your personal use, and link to this page, but you are not allowed to make electronic copies, or redistribute this tutorial in any form without permission. Original version written in 1994 and published in the Sun Observer Awk is an extremely versatile programming language for working on files. The examples given below have the extensions of the executing script as part of the filename. Why learn AWK? In the past I have covered grep and sed. AWK - the (very old) original from AT&T NAWK - A newer, improved version from AT&T GAWK - The Free Software foundation's version Basic Structure

Customize your internet with an open source search engine A long time ago, the internet was small enough to be indexed by a few people who gathered the names and locations of all websites and listed them each by topic on a page or in a printed book. As the World Wide Web network grew, the "web rings" convention developed, in which sites with a similar theme or topic or sensibility banded together to form a circular path to each member. A visitor to any site in the ring could click a button to proceed to the next or previous site in the ring to discover new sites relevant to their interest. Then for a while, it seemed the internet outgrew itself. Everyone was online, there was a lot of redundancy and spam, and there was no way to find anything. Yahoo and AOL and CompuServe and similar services had unique approaches, but it wasn't until Google came along that the modern model took hold. Why choose an open source alternative? Search engines like Google and DuckDuckGo are demonstrably effective. Install YaCy $ /opt/yacy/startYACY.sh &

Tech Stuff - Regular Expressions - A Gentle User Guide and Tutorial A Regular Expression is the term used to describe a codified method of searching invented, or defined, by the American mathematician Stephen Kleene. The syntax (language format) described on this page is compliant with extended regular expressions (EREs) defined in IEEE POSIX 1003.2 (Section 2.8). EREs are now commonly supported by Apache, PERL, PHP4, Javascript 1.3+, MS Visual Studio, most visual editors, vi, emac, the GNU family of tools (including grep, awk and sed) as well as many others. Extended Regular Expressions (EREs) will support Basic Regular Expressions (BREs are essentially a subset of EREs). Translation: The page has been translated into Bulgarian, courtesy of Albert Ward - thanks. Contents A Gentle Introduction: - the Basics Simple Searches Brackets, Ranges and Negation [] , - and ^ Search Positioning (aka Anchors) ^ and $ Iteration (aka Quantifiers) ? The title is deceptive. Some Definitions before we start Our Example Target Strings Simple Matching Positioning (or Anchors)

Create web user interfaces with Qt WebAssembly instead of JavaScript When I first heard about WebAssembly and the possibility of creating web user interfaces with Qt, just like I would in ordinary C++, I decided to take a deeper look at the technology. My open source project Pythonic is completely Python-based (PyQt), and I use C++ at work; therefore, this minimal, straightforward WebAssembly tutorial uses Python on the backend and C++ Qt WebAssembly for the frontend. It is aimed at programmers who, like me, are not familiar with web development. git clone cd wasm_qt_example python mysite.py Then visit with your favorite browser. What is WebAssembly? WebAssembly (often shortened to Wasm) is designed primarily to execute portable binary code in web applications to achieve high-execution performance. Toolchain There is a getting started guide on the Qt wiki. To get executable WebAssembly code, simply pass your Qt C++ application through Emscripten. #! The versions on my (Fedora 30) build system are:

Write a Tumblelog Application with Flask and MongoEngine Introduction This tutorial describes the process for creating a basic tumblelog application using the popular Flask Python web-framework in conjunction with the MongoDB database. The tumblelog will consist of two parts: A public site that lets people view posts and comment on them.An admin site that lets you add and change posts. This tutorial assumes that you are already familiar with Flask and have a basic familiarity with MongoDB and have installed MongoDB. Where to get help If you’re having trouble going through this tutorial, please post a message to mongodb-user or join the IRC chat in #mongodb on irc.freenode.net to chat with other MongoDB users who might be able to help. Installation Begin by installing packages required by later steps in this tutorial. Prerequisite This tutorial uses pip to install packages and virtualenv to isolate Python environments. pip install virtualenv virtualenv myproject To activate myproject environment at the system prompt, use the following command: Note

Create a First-Person Shooter In Godot – Part 1 – Godot Tutorials Introduction Welcome to the tutorial, and get ready to learn some in-demand skills for creating first-person shooter games! Throughout this tutorial, we will work with the 3D aspects of the Godot game engine to enhance your foundations when it comes to action game development. Additionally, we’ll be creating a first-person shooter from scratch, which will show you how to set up the FPS player and camera, enemies, efficient shooting mechanics, health and ammo pickups, and more. Before we begin, it’s important to know that a basic understanding of the Godot engine is required. If this is your first time using Godot, I recommend you read through the How to Make Games with the Godot Game Engine post first. Project Files For this project, we’ll be using a handful of pre-made assets such as models and textures. You can download the assets for the project here.You can download the complete FPS project here. Player Authentication with Azure PlayFab Let’s Begin To begin, create a new Godot project.

TDD your API » Balanced: Blog On August 16, 2012, a process kicked off at Balanced. It still isn’t finished, but this week was a major milestone, and I’d like to share our progress with you. That process is a new development methodology for APIs. Rather than trying to give it some grand name, I’m calling this “TDD for APIs.” How do you TDD an API? If you’re not familiar, here’s the basic outline of Test Driven Development: Write a test for some behavior you’d like to introduce into your system. To say that there’s a large amount of literature on the benefits of this approach would be an understatement. So how is this different when applied to the API context? Create a separate project for your API tests. There’s another aspect which is important, though. Push to card was the first real feature we’ve built in this way. Origins Humble beginnings. There were three big questions to tackle: How can we validate that our API is working as intended? An initial solution It was settled that reStructured Text was the answer. Whew!

Latacora - Stop Using Encrypted Email Email is unsafe and cannot be made safe. The tools we have today to encrypt email are badly flawed. Even if those flaws were fixed, email would remain unsafe. Its problems cannot plausibly be mitigated. Avoid encrypted email. Technologists hate this argument. Most email encryption on the Internet is performative, done as a status signal or show of solidarity. But we have to consider more than the LARP cases. The least interesting problems with encrypted email have to do with PGP. Here’s why. If messages can be sent in plaintext, they will be sent in plaintext. Email is end-to-end unencrypted [1] by default. The clearest example of this problem is something every user of encrypted email has seen: the inevitable unencrypted reply. Even if modern email tools didn’t make it difficult to encrypt messages, the Internet email system would still be designed to expect plaintext. Serious secure messengers foreclose on this possibility. Metadata is as important as content, and email leaks it.

Hackers Were Inside Citrix for Five Months Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee accounts for weak passwords. Citrix provides software used by hundreds of thousands of clients worldwide, including most of the Fortune 100 companies. It is perhaps best known for selling virtual private networking (VPN) software that lets users remotely access networks and computers over an encrypted connection. In March 2019, the Federal Bureau of Investigation (FBI) alerted Citrix they had reason to believe cybercriminals had gained access to the company’s internal network. But in a letter sent to affected individuals dated Feb. 10, 2020, Citrix disclosed additional details about the incident.

Offshoring roulette: lessons from outsourcing to India, China and the Philippines I've had this blog post in one form or another of draft for several years now. I hesitated to complete it, in part because at the best of times cultural observations can easily be misinterpreted and also in part because of the role I had in working with many outsourcing vendors across Asia. Whilst the former hesitation has in no way changed, the latter has and I think it's a genuinely interesting topic worth sharing, particularly before my outsourcing memories fade too far. One thing before I begin: these are opinions based on personal observations. Here's what I've learned over many years of outsourcing software projects to India, China and the Philippines. Who am I to talk about offshoring / outsourcing / other cultures? In what is now a former life, I spent a great deal of time sending work overseas. The region covers everything from Pakistan in the west to obviously China, over to Japan and down to my corner of the world in Australia and New Zealand. Why outsource? Why offshore? India

Related: