Posts

Showing posts from June, 2024

regex Part 1 - Data Manipulation

Image
  LPI E - Data Manipulation 3.2 Searching and Extracting Data from Files Part 1 of 2 Part 2:   Regular Expressions (regex) In this blog post, we will explore some of the most common commands that are used to search and extract data from files in Linux. Specifically, we will be discussing   grep less cat head tail sort cut wc The blog will finish by showing how to use the data manipulation tools for I/O Redirection and giving several examples for Regular Expressions (regex) to use when analyzing text within the Linux Terminal. grep Command The grep command is used to search for patterns in a file or set of files. The syntax for using grep is as follows: $ grep pattern filename For example, if we want to search for the word "apple" in a file called "fruits.txt", we can use the following command: $ grep apple fruits.txt This will display all the lines in the file that contain the word "apple". The grep command is also capable of using regular expressions to s

regex Part 2 - Searching

Image
  LPI E - Data Manipulation 3.2 Searching and Extracting Data from Files Regular Expressions (regex) Part 2 of 2 Part 1:  Data Manip Tools regex is a powerful tool for searching and manipulating text in Linux and are patterns that describe a set of strings. It is commonly used in commands like grep, sed, awk, and others.  It be used in combination with Linux terminal commands to filter and manipulate text output. Here are some basic examples of how to use regular expressions for I/O redirection with Linux terminal commands ( I/O redirection is a way to redirect the input or output of a command to a file or another command. ) The dot (.) character For example, the regular expression "c.t" matches any string that contains a "c" followed by any single character and then a "t". This would match "cat", "cot", "cut", and so on.  Matching any character : $ ls | grep '.*\...' In this command, the dot (.) character matches any

umask Contol Center

Image
Interstellar Permissions Unmasking umask for Galactic File Control Welcome to the captivating world of umask mastery in the Linux terminal, mighty captains! As you embark on this thrilling adventure, the umask command becomes your ultimate tool. It empowers you to finely adjust the permissions of files and directories, granting or restricting access to various in-game entities. This command serves as your portal to reshape file and directory permissions, allowing for a truly personalized and tailored gaming experience. Take your Examination, Captain! We need to make sure you can navigate this ship: 👮👇 https://www.certificationmethods.com/2023/05/lpi-e-umask-test.html Now let's explore this System! Display the current umask value: $ umask This command simply displays the current umask value in the terminal. It provides the octal representation of the umask, where each digit corresponds to the permissions subtracted from the owner, group, and others, respectively. Set a new umask v

Linux Life Cycles

Image
Linux Distribution Cycles Linux is an open-source operating system, which means that anyone can view, modify, and distribute the source code. Because of this, there are many different versions or "distributions" of Linux available, each with its own release and maintenance cycle.  Understanding the differences between the release and maintenance cycles for Linux distributions is important for system administrators, developers, and users who want to ensure that their systems are secure and up-to-date.  We will explore the key differences between release cycles and maintenance cycles for Linux distributions, including their purpose, duration, and frequency. Read a test review of subject here: https://www.certificationmethods.com/2023/06/lpi-e-exam-review-13.html Practice Exam Questions at End Release Cycle The release cycle refers to the process by which a new version of a Linux distribution is developed, tested, and released to the public. The release cycle is usually divided