Look no further than MacOSX. It thrives because of BSD Unix. As does: iOS. So, that device you're likely holding is powered by BSD Unix. Light and Fast are irrefutable hallmarks of BSD Unix. It is embedded in so many applications that it is a must-know in your OS | Distro toolbox. Certainly Linux is supreme on many fronts, but, BSD is a mighty contender.
Regular Expressions (RegExes), as cryptic as they can appear, provide critical
services in parsing information; particularly textual. Virtually every tool that
handles text provides hooks to RegExes to simplify our ability to reduce result-sets
to the essential bits. In this release, explore RegExes within the context of the
NginX web service.
We have grown accustomed to one-time-passwords in 2FA applications as a means
to significantly improve the security of our digital services and lives. As such,
it may be worth spending some time exploring such integrations in NginX to help
provide such services to clients. In this release, we will generate ‘rolling’
one-time-codes that can be used to restrict access to content.
Request | Response. That is the ordinary flow of HTTP(s) communications.
Embedded in each Request, is the Prefix of interest you would like the web
server, in this case NginX, to consider. NginX searches for Locations that
are ideal and processes the rule(s) therein, rendering fabulous HTML, even if
error-bound. Locations map web space, to File System (FS), and other spaces.
Spend a bit studying NginX Locations in this release.
cURL. OR, is it CURL? OR, curl? It manifest as all aforementioned for various reasons.
Client URL is the BOSS $SHELL utility for interacting with Request|Response targets;
HTTP[s] Servers. With 'curl', a browser is more-or-less relegated; sans JavaScript.
Sample HTTP Server responses with cURL as needed to help debug | tweak your HTTP services.
Regardless of Linux Distro in employ, there are commonalities concerning Security that
must be factored into your configuration equation to achive a proper posture. In this
release, we explore those commonalities that resurface across-the-board. Spend some time
familiarizing with them, and, apply sensible policies to your Instances accordingly.
Simple, streamlined packaging of content with a plethora of add-ons that extend
tar‘s range of capabilities, makes this utility invaluable. The need arises
frequently to reduce content trees to simpler representations or bundles, often for
simplified transport.
Spend some time rolling and handling disparate content in this release.
Of all the inavluable utilities, ‘dd’ ranks among the list of critical. Whenever
the need arises to generate exact, bit-level copies of data, regardless of IO source,
use ‘dd’ to accomplish your goals.
Explore data duplication with ‘dd’. Use dd to image, mirror, compress, copy data as needed.
Symbolic links provide a variety of useful shortcut mechanisms in Nix-based environments.
Examples include, but are not limited to: simple shortcuts, name reincarnations, cross-device file access,
intra-device access, permissions circumvention, and reduced storage usage with hard links. Explore some use-cases.
Explore Symbolic Links as they relate to common use-cases and Applications.
Invariably as a Python Coder, you will deal with files. The ability to use $SHELL-inspired
constructs to filter file lists can be invaluable in improving your productivity. In this
Release, we cover the basics of file-globbing patterns in Python.
The Path to a file contains multiple parts; among them, the directory location
and the target file name, or, the initial instance of the object's presence in the
file system. It is often requisite when automating tasks to manipulate the Path,
including but not limited to extracting the Base Name of the file object for a variety
of reasons. Let's explore some common Base Name manipulations in this release.