The document provides 6 examples of using the dd command in Linux to backup disks and partitions. It describes using dd to make full backups of hard disks by copying from one disk to another, create disk images, restore from disk images, create floppy disk and CDROM images, and backup partitions. dd allows for bit-by-bit copies and restoration of storage devices and creates ISO image files. The examples cover full disk, partition, floppy, and CDROM backups using dd and specifying the input and output files and block sizes.
RH202 CertMagic Exam contains all the questions and answers to pass RH202 IT Exam on first try. The Questions & answers are verified and selected by professionals in the field and ensure accuracy and efficiency throughout the whole Product
RH202 CertMagic Exam contains all the questions and answers to pass RH202 IT Exam on first try. The Questions & answers are verified and selected by professionals in the field and ensure accuracy and efficiency throughout the whole Product
Control is the last function of management. Success or failure of planning depends on the success or failure of controlling.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
Control is the last function of management. Success or failure of planning depends on the success or failure of controlling.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
Why everyone is excited about Docker (and you should too...) - Carlo Bonamic...Codemotion
In less than two years Docker went from first line of code to major Open Source project with contributions from all the big names in IT. Everyone is excited, but what's in for me - as a Dev or Ops? In short, Docker makes creating Development, Test and even Production environments an order of magnitude simpler, faster and completely portable across both local and cloud infrastructure. We will start from Docker main concepts: how to create a Linux Container from base images, run your application in it, and version your runtimes as you would with source code, and finish with a concrete example.
This is the notes of a presentation I gave to our IT dept., people who know a lot about VMs! They include a description of differences betwen a VM and a container, why would someone would want to use Docker, how it works (at 30,000 feet), some hints of what are the hub and orchestration, some Dockerfiles examples: jenkins slave, jenkins master, sinopia server, etc. and finally some new features Docker is going to propose in the future and how I intend to mix Configuration tools, such as Ansible, and Docker.
Docker helped to bring container technologies to the masses. Already, giants joined the movement, either claiming long time usage (like Google) or trying to catch up momentum (like Microsoft). This talk was about discovering docker and its ecosystem, from a devops and practical point of view. My slides presented at Anchor Coworking on December 27th, 2014.
How Secure Is Your Container? ContainerCon Berlin 2016Phil Estes
A conference talk at ContainerCon Europe in Berlin, Germany, given on October 5th, 2016. This is a slightly modified version of my talk first used at Docker London in July 2016.
An introduction to Docker (Docker.io). Just a brief overview that describes a little of what Docker has to offer. The talk was hosted at kWantera HQ in Pittsburgh PA.
It's an introduction to using codespaces to develop web applications without any local setup. At the end, there is a link to a video explaining the slides and doing the practices mentioned in the slides.
Real-World Docker: 10 Things We've Learned RightScale
Docker has taken the world of software by storm, offering the promise of a portable way to build and ship software - including software running in the cloud. The RightScale development team has been diving into Docker for several projects, and we'll share our lessons learned on using Docker for our cloud-based applications.
Introduction to Docker at SF Peninsula Software Development Meetup @GuidewiredotCloud
Docker is an open-source project to easily create lightweight, portable, self-sufficient containers from any application. The same container that a developer builds and tests on a laptop can run at scale, in production, on VMs, bare metal, OpenStack clusters, public clouds and more.
It is a simple introduction to the containers world, starting from LXC to arrive to the Docker Platform.
The presentation is focused on the first steps in the docker environment and the scenarious from a developer point of view.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
6 examples to backup linux using dd command (including disk to disk)
1. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
Home
About
Free
eBook
Archives
Best
of
the
Blog
Contact
6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
to
Disk)
by
Sasikala
on
October
11,
2010
0 Like 11 Tweet 41
Data
loss
will
be
costly.
At
the
very
least,
criCcal
data
loss
will
have
a
financial
impact
on
companies
of
all
sizes.
In
some
cases,
it
can
cost
your
job.
I’ve
seen
cases
where
sysadmins
learned
this
in
the
hard
way.
There
are
several
ways
to
backup
a
Linux
system,
including
rsync
and
rsnapshot
that
we
discussed
a
while
back.
This
arCcle
provides
6
pracCcal
examples
on
using
dd
command
to
backup
the
Linux
system.
dd
is
a
powerful
UNIX
uClity,
which
is
used
by
the
Linux
kernel
makefiles
to
make
boot
images.
It
can
also
be
used
to
copy
data.
Only
superuser
can
execute
dd
command.
Warning:
While
using
dd
command,
if
you
are
not
careful,
and
if
you
don’t
know
what
you
are
doing,
you
will
lose
your
data!
Example
1.
Backup
En>re
Harddisk
To
backup
an
enCre
copy
of
a
hard
disk
to
another
hard
disk
connected
to
the
same
system,
execute
the
dd
command
as
shown
below.
1
of
8 18
Apr
12
7:06
pm
2. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
In
this
dd
command
example,
the
UNIX
device
name
of
the
source
hard
disk
is
/dev/hda,
and
device
name
of
the
target
hard
disk
is
/dev/hdb.
# dd if=/dev/sda of=/dev/sdb
“if”
represents
inpu_ile,
and
“of”
represents
output
file.
So
the
exact
copy
of
/dev/sda
will
be
available
in
/dev/sdb.
If
there
are
any
errors,
the
above
command
will
fail.
If
you
give
the
parameter
“conv=noerror”
then
it
will
conCnue
to
copy
if
there
are
read
errors.
Input
file
and
output
file
should
be
menConed
very
carefully,
if
you
menCon
source
device
in
the
target
and
vice
versa,
you
might
loss
all
your
data.
In
the
copy
of
hard
drive
to
hard
drive
using
dd
command
given
below,
sync
opCon
allows
you
to
copy
everything
using
synchronized
I/O.
# dd if=/dev/sda of=/dev/sdb conv=noerror,sync
Example
2.
Create
an
Image
of
a
Hard
Disk
Instead
of
taking
a
backup
of
the
hard
disk,
you
can
create
an
image
file
of
the
hard
disk
and
save
it
in
other
storage
devices.There
are
many
advantages
to
backing
up
your
data
to
a
disk
image,
one
being
the
ease
of
use.
This
method
is
typically
faster
than
other
types
of
backups,
enabling
you
to
quickly
restore
data
following
an
unexpected
catastrophe.
# dd if=/dev/hda of=~/hdadisk.img
The
above
creates
the
image
of
a
harddisk
/dev/hda.
Refer
our
earlier
arCcle
How
to
view
initrd.image
for
more
details.
Example
3.
Restore
using
Hard
Disk
Image
To
restore
a
hard
disk
with
the
image
file
of
an
another
hard
disk,
use
the
following
dd
command
example.
# dd if=hdadisk.img of=/dev/hdb
The
image
file
hdadisk.img
file,
is
the
image
of
a
/dev/hda,
so
the
above
command
will
restore
the
image
of
/dev/hda
to
/dev/hdb.
Example
4.
Crea>ng
a
Floppy
Image
Using
dd
command,
you
can
create
a
copy
of
the
floppy
image
very
quickly.
In
input
file,
give
the
floppy
device
locaCon,
and
in
the
output
file,
give
the
name
of
your
floppy
image
file
as
shown
below.
# dd if=/dev/fd0 of=myfloppy.img
Example
5.
Backup
a
Par>>on
You
can
use
the
device
name
of
a
parCCon
in
the
input
file,
and
in
the
output
either
you
can
specify
your
target
path
or
image
file
as
shown
in
the
dd
command
example
below.
# dd if=/dev/hda1 of=~/partition1.img
Example
6.
CDROM
Backup
dd
command
allows
you
to
create
an
iso
file
from
a
source
file.
So
we
can
insert
the
CD
and
enter
dd
command
to
create
an
iso
file
of
a
CD
content.
# dd if=/dev/cdrom of=tgsservice.iso bs=2048
dd
command
reads
one
block
of
input
and
process
it
and
writes
it
into
an
output
file.
You
can
specify
the
block
size
for
input
and
output
file.
In
the
above
dd
command
example,
the
parameter
“bs”
specifies
the
block
size
for
the
both
the
input
and
output
file.
So
dd
uses
2048bytes
as
a
block
size
in
the
above
command.
2
of
8 18
Apr
12
7:06
pm
3. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
Note:
If
CD
is
auto
mounted,
before
creaCng
an
iso
image
using
dd
command,
its
always
good
if
you
unmount
the
CD
device
to
avoid
any
unnecessary
access
to
the
CD
ROM.
0 Tweet 41 Like 11
Share
Comment
If
you
enjoyed
this
ar>cle,
you
might
also
like..
1. 50
Linux
Sysadmin
Tutorials
Awk
IntroducCon
–
7
Awk
Print
Examples
2. 50
Most
Frequently
Used
Linux
Commands
(With
Examples)
Advanced
Sed
SubsCtuCon
Examples
3. Top
25
Best
Linux
Performance
Monitoring
and
Debugging
8
EssenCal
Vim
Editor
NavigaCon
Fundamentals
Tools
25
Most
Frequently
Used
Linux
IPTables
Rules
4. Mommy,
I
found
it!
–
15
PracCcal
Linux
Find
Command
Examples
Examples
Turbocharge
PuTTY
with
12
Powerful
Add-‐Ons
5. Linux
101
Hacks
2nd
EdiCon
eBook
{
14
comments…
read
them
below
or
add
one
}
1
pupu
October
11,
2010
at
4:31
am
I
recommend
using
‘dd’
on
unmounted/readonly
devices
only.
You
never
know
what
changes
in
the
middle
of
this
kind
of
backup.
Dd
doesn’t
lock
your
filesystem.
It
will
read
and
write
blindly
and
if
you
don’t
know
what
you
are
doing,
well…
2
rene
October
11,
2010
at
6:49
am
Will
this
work
with
a
hard
drive
with
both
Windows
and
Linux
on
it?
3
Jorge
Cedi
October
11,
2010
at
11:53
am
You
can
backup
a
usb
key
with
dd
4
ciastek
October
12,
2010
at
5:46
pm
Thanks
for
nice
examples.
When
and
why
should
i
use
synchronized
I/O?
How
should
i
find
opCmal
block
size?
5
Bernardo
October
13,
2010
at
12:18
pm
3
of
8 18
Apr
12
7:06
pm
4. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
Nice
examples,
I
would
like
to
share
one
of
many
hacks
to
know
the
“status”
of
dd
copy
progress.
Send
the
dd
command
to
background
i.e.
#
dd=if=/dev/sda
of=backup.img
&
[1]
26431
<——–
Process
ID
Check
the
process
ID
and
run
the
next
command:
#
kill
-‐SIGUSR1
26431
This
will
shows
the
copied
bytes
and
the
copy
rate.
6
MaCas
October
14,
2010
at
7:05
am
Hello!
It’s
a
really
useful
post,
but
I
think
it
should
be
noted
that
dd
is
used
just
to
copy
files,
and
not
to
make
backups,
because
a
backup
tool
has
a
lot
more
funcConality,
like
different
backup
levels,
automaCon
of
backups
and
some
kind
of
database
storing
related
data
(files
saved,
operator
who
run
the
backup,
etc).
Bye!
7
Paul
A.
October
20,
2010
at
2:54
pm
This
is
not
very
much
related
to
dd,
but
I
thought
you’s
like
to
know
that
your
example
5
has
a
bash-‐ism
that
I’m
not
enCrely
sure
is
a
bug
or
a
feature.
Most
other
shells
won’t
expand
the
~
to
$HOME
like
bash
does
for
that
parCcular
command.
Zsh
has
an
opCon
MAGIC_EQUAL_SUBST
to
let
you
choose
either
way.
8
iri
October
26,
2010
at
12:34
am
Regarding
example
5.
what
if
~
is
on
/dev/hda1
9
Cosmos
November
17,
2010
at
10:35
am
Another
useful
Cp:
In
this
case
for
copying
the
Master
Boot
Sector:
dd
if=/dev/hda
of=disk.mbr
count=1
bs=512
It
copies
1
chunk
of
512
bytes
which
is
the
amount
of
info
that
the
MBR
of
the
disk
takes.
and
for
restoring
the
MBR:
dd
if=disk.mbr
of=/dev/hda
It
overwrites
the
first
512
bytes
of
your
/dev/hda
drive.
Just
another
command
that
I
use
to
do
a€erwards
for
saving
the
parCCons:
sfdisk
-‐d
/dev/hda
>
disk.sf
It
dumps
the
parCCons
of
the
/dev/hda
disk
to
a
text
file,
which
you’ll
be
able
to
recover
easily.
sfdisk
/dev/hda
<
disk.sf
Bye
10
Sathish
Kumar
November
28,
2010
at
1:58
am
Thanks
a
lot…..
11
Anonymous
April
9,
2011
at
4:15
pm
mistake
with
the
device
names
here:
4
of
8 18
Apr
12
7:06
pm
5. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
In
this
dd
command
example,
the
UNIX
device
name
of
the
source
hard
disk
is
/dev/hda,
and
device
name
of
the
target
hard
disk
is
/dev/hdb.
#
dd
if=/dev/sda
of=/dev/sdb
12
Anonymous
June
23,
2011
at
12:55
am
Be
VERY
VERY
careful
about
the
source
and
desCnaCons,
if=
and
of=
If
you
make
a
mistake
and
put
the
wrong
source/desCnaCon
as
if/of,
you
WILL
lose
your
data
and
recovery
becomes
very
annoying.
Possible,
but
annoying,
such
as
losing
all
your
filenames
and
filesizes.
13
ƒeƒ
November
19,
2011
at
9:35
am
delete
MBR
dd
if=/dev/zero
of=/dev/sda
bs=512
count=1
14
Antonio
Nogueira
February
27,
2012
at
9:21
am
Despite
that
is
a
comment
about
to
use
dd
command
to
backup
(and
restore)
dual
boot
parCCons
with
Windows
and
Linux
inside
(I
didn’t
see
any
repply
about
it),
may
I
use
dd
command
to
backup
a
HD
with
one
ParCCon
only
containning
a
windows
system
64bit
and
a€er
to
create
two
parCCons,
restore
the
windows
operaConal
system
on
the
first
parCCon
of
the
HD?
Leave
a
Comment
Name
E-‐mail
Website
NoCfy
me
of
followup
comments
via
e-‐mail
Submit
Previous
post:
PostgreSQL
Trigger
Tutorial
with
EMP
Table
Examples
Next
post:
6
Expect
Script
Examples
to
Expect
the
Unexpected
(With
Hello
World)
Sign
up
for
our
free
email
newsleWer
you@address.com
Sign Up
RSS
TwiWer
Facebook
Search
5
of
8 18
Apr
12
7:06
pm
6. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
EBOOKS
POPULAR
POSTS
12
Amazing
and
EssenCal
Linux
Books
To
Enrich
Your
Brain
and
Library
50
UNIX
/
Linux
Sysadmin
Tutorials
50
Most
Frequently
Used
UNIX
/
Linux
Commands
(With
Examples)
How
To
Be
ProducCve
and
Get
Things
Done
Using
GTD
30
Things
To
Do
When
you
are
Bored
and
have
a
Computer
6
of
8 18
Apr
12
7:06
pm
7. 6
Examples
to
Backup
Linux
Using
dd
Command
(Including
Disk
... hWp://www.thegeekstuff.com/2010/10/dd-‐command-‐examples/
Linux
Directory
Structure
(File
System
Structure)
Explained
with
Examples
Linux
Crontab:
15
Awesome
Cron
Job
Examples
Get
a
Grip
on
the
Grep!
–
15
PracCcal
Grep
Command
Examples
Unix
LS
Command:
15
PracCcal
Examples
15
Examples
To
Master
Linux
Command
Line
History
Top
10
Open
Source
Bug
Tracking
System
Vi
and
Vim
Macro
Tutorial:
How
To
Record
and
Play
Mommy,
I
found
it!
-‐-‐
15
PracCcal
Linux
Find
Command
Examples
15
Awesome
Gmail
Tips
and
Tricks
15
Awesome
Google
Search
Tips
and
Tricks
RAID
0,
RAID
1,
RAID
5,
RAID
10
Explained
with
Diagrams
Can
You
Top
This?
15
PracCcal
Linux
Top
Command
Examples
Top
5
Best
System
Monitoring
Tools
Top
5
Best
Linux
OS
DistribuCons
How
To
Monitor
Remote
Linux
Host
using
Nagios
3.0
Awk
IntroducCon
Tutorial
–
7
Awk
Print
Examples
How
to
Backup
Linux?
15
rsync
Command
Examples
The
UlCmate
Wget
Download
Guide
With
15
Awesome
Examples
Top
5
Best
Linux
Text
Editors
Packet
Analyzer:
15
TCPDUMP
Command
Examples
The
UlCmate
Bash
Array
Tutorial
with
15
Examples
3
Steps
to
Perform
SSH
Login
Without
Password
Using
ssh-‐keygen
&
ssh-‐copy-‐id
Unix
Sed
Tutorial:
Advanced
Sed
SubsCtuCon
Examples
UNIX
/
Linux:
10
Netstat
Command
Examples
The
UlCmate
Guide
for
CreaCng
Strong
Passwords
6
Steps
to
Secure
Your
Home
Wireless
Network
Turbocharge
PuTTY
with
12
Powerful
Add-‐Ons
About
The
Geek
Stuff
My
name
is
Ramesh
Natarajan.
I
will
be
posCng
instrucCon
guides,
how-‐to,
troubleshooCng
Cps
and
tricks
on
Linux,
database,
hardware,
security
and
web.
My
focus
is
to
write
arCcles
that
will
either
teach
you
or
help
you
resolve
a
problem.
Read
more
about
Ramesh
Natarajan
and
the
blog.
Support
Us
Support
this
blog
by
purchasing
one
of
my
ebooks.
Bash
101
Hacks
eBook
Sed
and
Awk
101
Hacks
eBook
Vim
101
Hacks
eBook
Nagios
Core
3
eBook
Contact
Us
7
of
8 18
Apr
12
7:06
pm