11-26-2019
Beginning my programming/scripting path
Hey all,
I am senior network security admin and started my cyber security master study 2 month ago. I definitely believe in my network and network security skills therefore want to mostly hardening cyber qualities. Along with cyber security I am really interested in programming which I believe will benefit my Cyber career very much. I have already started learning BASH Scripting and after some time I will try learning Python because these 2 are only ones which really catch my interest.
As you known learning and practicing are different things. Me personally usually get mostly from practicing. Therefore I would like to find any source like with task and answers in other page which can challenge me with BASH Scripting exercises so that I can work on them. Do you know any website which can I get benefit from?
Thanks in advance!
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I just did a quick search for 'script' and browsed the Shell Programming and Scripting Q & A category, but didn't spot a thread that might help me.
I'm wanting to get into shell programming and scripting (including automating a lot of manual processes, i.e. renaming files, replacing characters... (4 Replies)
Discussion started by: HLee1981
4 Replies
2. Shell Programming and Scripting
Hi,
iam having the file as follows:
ABCDEFGH|0987654321234567
ABCDEFGH|0987654321234523
ABCDEFGH|0987654321234556
ABCDEFGH|0987654321234545
POIUYTRE|1234567890890678
POIUYTRE|1209867757352567
POIUYTRE|5463879088797131
POIUYTRE|5468980091344456
pls provide me the split command
... (14 Replies)
Discussion started by: nivas
14 Replies
3. Shell Programming and Scripting
I want to compare some files.
say iam having 2 sets of files ,each is having some 10 files.
ie,
file1
1a.txt
1b.txt
1c.txt
...
file2
2a.txt
2b.txt
2c.txt
...
i need to read line by line of this files parralley..
ie.. i want to read file1 first line that is 1a.txt and file2... (2 Replies)
Discussion started by: nivas
2 Replies
4. Shell Programming and Scripting
Hi,
Iam having file1 as follows:
ERTYUIOU|1234567689089767688
FDHJHKJH|6817738971783893499
JFKDKLLUI|9080986766433498444
FILE2
ERTYUIOU|1234567689089767688 resh@abc_com 767637218328322332 893589893499 asdsddssd ... (21 Replies)
Discussion started by: nivas
21 Replies
5. Infrastructure Monitoring
# set date to your spec: this is month/day/yr/hr/min/sec:
sysdate=`date '+%m/%d/%Y-%H:%M:%S'`
# get the last line before the history file is modified
tail -1 /tmp/hosthistory.txt |while read lastdate mydevices
do
echo $lastdate
echo $mydevices
done
LIST = 'ypcat hosts|| sort... (11 Replies)
Discussion started by: lemseffert
11 Replies
6. Shell Programming and Scripting
Hi All,
How do I code a password with multiple special characters in it.
Example: password is P#utar&@
None of the belwo options worked
1. passwd="P#utar&@"
2. passwd='P#utar&@'
Any help will be greatly appreciated. (3 Replies)
Discussion started by: afredri
3 Replies
7. Shell Programming and Scripting
RCS file: /home/rcap/.APCVS/regs/rc/power/analysis/pow_rtl/renes_setup.g,v
Working file: ./power/analysis/pow_rtl/renes_setup.g
head: 1.14
branch:
locks: strict
access list:
symbolic names:
br_2010_101_200: 1.13.0.12
br_2010_101_100: 1.13.0.10
br_2009_91_200:... (3 Replies)
Discussion started by: harjinder
3 Replies
8. Shell Programming and Scripting
I was trying out some new series to get it print
1
1 2
1 2 3
1 2 3 4
1 2 3 4 5
and the seond one is
1
2 2
3 3 3
4 4 4 4
5 5 5 5 5
but was unable to get the result. (5 Replies)
Discussion started by: harjinder
5 Replies
9. Shell Programming and Scripting
hi,
i am trying this while loop and i only want that it should only read food as pizza....no other entry should be taken here.
#!/usr/bin/perl -w
$food = " ";
while ( $food ne 'pizza' )
{
print 'enter what you had last night: ';
chomp ($food = <STDIN>);
#print $food ;
}
... (2 Replies)
Discussion started by: kullu
2 Replies
10. UNIX for Beginners Questions & Answers
I need to manipulate one Database file on Solaris 11 in which contains more than 5000 lines of data file path like this:
'/data1/oradata/DBNAME/system01.dbf',
'/data7/oradata/DBNAME/undotbs1_01.dbf',
'/data1/oradata/DBNAME/sysaux01.dbf',
'/data28/oradata/DBNAME/userdata01.dbf',
... (6 Replies)
Discussion started by: duke0001
6 Replies
timed(8) System Manager's Manual timed(8)
Name
timed - time server daemon
Syntax
/usr/etc/timed [ -i | -n network ][ -E ][ -M ][ -t ]
Description
The daemon synchronizes a host's time with the time of other machines in a local area network running It is normally invoked at boot time
from the file.
Servers running slow down the clocks of some machines and speed up the clocks of others to bring them all to the average network time. The
average network time is computed from measurements of clock differences with the Internet Communication Message Protocol (ICMP) timestamp
request message.
The service provided by is based on a master-slave scheme. When is started on a machine, it asks the master for the network time and sets
the host's clock to that time. After that, it accepts synchronization messages periodically sent by the master and calls the or routine to
perform any corrections on the host's clock.
It also communicates with the command to set the date globally, and with the control program, If the machine running the master crashes,
then the slaves elect a new master from among slaves running with the flag set. The flag provides time synchronization on any attached
networks where no current master server is detected. Such a server propagates the time computed by the top-level master. At least one
daemon on each network must run with the option set to allow it to become a master.
Options
-E Overrides the input of slaves. Use the flag in conjunction with the flag. It specifies that a master should not average the times
of the slaves to calculate the network time but should distribute the time of its local host as the network time. This flag allows
a master to distribute time to a network while the network time is controlled by an outside agent such as the Network Time Protocol.
[-i | -n] network
-i Specifies a network to ignore. Each network that appears as an argument to the flag is added to the list of networks that
will ignore. If the flag is used, accesses all networks to which the host is connected except for those networks specified
as arguments to the flag.
-n Specifies a network to use. When the is started, it gathers information about all the network devices connected to the local
host. If neither the flag nor the flag is used, tries to access all the network devices connected to the local host. The
network argument to the flag is the name of a network that should access.
If the switch is used, only those networks specified by the flag are accessed.
Do not use the and flags together.
-M Allows a slave time server to become a master time server if the master server crashes. A system running the daemon without the
flag set remains a slave. The daemon checks for a master time server on each network to which it is connected. It requests syn-
chronization service from the first master server it locates.
-t Enables to trace the messages it receives in the file Tracing can be enabled or disabled with the program.
Restrictions
Any system running with the and options set is eligible to become the master, and distribute its local time to all systems running on its
network. Run the Network Time Protocol daemon, instead of to prevent this behavior.
Files
Invokes the daemon each time the system boots
Tracing file for
Log file for master
See Also
date(1), adjtime(2), gettimeofday(2), networks(5), ntpd(8), timedc(8)
Introduction to Networking and Distributed System Services
timed(8)