Using sha256sum command for ensuring file integrity
1.0 SHA-2 A cryptographic hash function (CHF) is an algorithm to map arbitrary size data, called the message, to a fixed sized bit array, called the hash value, or message…
1.0 SHA-2 A cryptographic hash function (CHF) is an algorithm to map arbitrary size data, called the message, to a fixed sized bit array, called the hash value, or message…
Input and Output (I/O) All programs need to interact with the external world which makes I/O important. Programs store data in files which provide large persistent storage. In this post…
Files There are two basic concepts in Unix - processes and files. The processes do things and files keep all the important data. An efficient filesystem is important for an…
1.0 Introduction Given an nginx web server log file, we might like to know who are the visitors to our website. One can go line by line through the log…
Git is a source code management system originally developed by Linus Torvalds in 2005. Git can be used locally on a user's system and also in a distributed environment with…
bash idioms are tiny scripts, mostly one-liners, that accomplish a lot and can be used as building blocks in bigger scripts. 1.0 Find most frequent words Suppose we have a…
1.0 comm The comm command compares two sorted files and gives output in three columns. The first column has lines which are present only in the first file. The second…
1.0 grep grep is a program for searching a given string pattern in files. It searches the files for the pattern and prints the lines that contain strings matching the…
1.0 SHELL A shell provides a user interface to a computer system. There are two types of shells, the command line interface (CLI) and the graphical user interface (GUI). In…
File Permissions In Linux, each files has nine permission bits. There are three basic permissions, read (r), write (w) and execute (x), for a file. These three permissions are there…