Clone a Git repository into a specific folder | Techie Delight
This post will discuss how to clone a Git repository into a specific folder... The standard approach to clone is repository is using the git-clone command.
rsync is a CLI tool that covers various use cases. Transfering data, creating backups or archives, mirroring data sets, integrity checks, and many more.
Reference for this article: rsync version 3.2.
Daemonize: running a Python script as a daemon - Ronan Lopes
A daemon is a program that runs in background in your operational system. They’re usually processes that runs for an undefined amount of time executing tasks that don’t depend on the user. On a UNIX system, you may have some examples as syslogd (logging system) and sshd (handles remote connections by SSH protocol) – you can notice that both of them end with letter “d”, indicating they run as a daemon. In a previous post I showed how to implement a Bot for collecting daily points on Gokano with Mechanize and suggested as a future work to daemonize that algorithm. In that kind of application, it’s not practical to keep the console open while the script runs, once you usually want to keep it running indefinitely. You could also want to run that script on a remote server (like an Amzon EC2 machine, for example) through SSH. Once you daemonize it, you can run it and close the connection without killing the process. In python, there are many libraries to daemonize your code. In my tests, I personally liked Daemonize a little bit more. With a few lines of code you can configure your script to run on background. You can install Daemonize through …
Automating Python Scripts with Systemd: A Step-by-Step Guide – TecAdmin
How to autorun a Python script using systemd. How to create own systemd service using Python script. How to configure Python script to start as systemd.
In this tutorial, you'll learn how you can work with files in Python by using built-in modules to perform practical tasks that involve groups of files, like renaming them, moving them around, archiving them, and getting their metadata.
Fish - The User-Friendly Interactive Shell for Linux
The Fish is a command-line shell that is designed to be user-friendly, interactive, and provide additional features compared to traditional shells like Bash.
What is Difftastic? Difftasic is a CLI tool that allows you to compare files based on their syntax rather than rely on line-by-line matching. For example, this means that if you had the following files, Difftastic would not detect any differences. $ cat vlans_1.json { "vlans": [100, 200,
How to Install an iSCSI Storage Server on Ubuntu 22.04
iSCSI stands for Internet Small Computer System Interface is a Storage Area Network protocol that can be used to share block devices such as HDD/SSD p...
How to monitor permission, ownership or any other change to a particular directory or file - Red Hat Customer Portal
How to monitor the permission change and ownership change of a particular directory or file? How to configure auditd to find how a file was modified in Red Hat Enterprise Linux? What tool can audit files at a directory level? How do I monitor files or directories using auditd in Red Hat Enterprise Linux ? How do I monitor a file or directory to see which user or program has accessed or modified data ?
Jellyfin is free software for building a media server. It lets you collect, manage, and stream your media files from multiple devices or clients. This...
Zero Configuration Networking with Linux - Linux.com
Author: Peter Enseleit Zero Configuration Networking (Zeroconf) is a standard method of establishing communications between computers and allowing them to advertise and access each others’ resources. It is designed to ease some of the complexities involved in computer networking — in fact, it is designed to remove them altogether, by requiring no user configuration at […]
Docker is now widely used in DevOps due to its ease of use and intuitive user experience. In this series, you'll learn everything there is to know about Docker, from its internals to exploiting misconfigurations to securing your Docker environment.