Basicsof c make and git for a hello qt applicationDinesh Manajipet
This document provides an overview of using CMake and Git for a Hello World application in C, Qt, and managing source code with Git. It demonstrates how to configure CMake files to compile Hello World programs in C and Qt. It also summarizes basic Git commands like init, add, commit, branch, merge, and rebase. Useful online resources for learning more about CMake, Qt, and Git are provided.
The document provides good practices for using Git, including forking repositories, cloning, adding remote repositories, fetching from remotes, committing changes locally, rebasing, and pushing changes to remote repositories. It also discusses the differences between rebasing and pulling from a remote when integrating changes.
Short talk about Git best practices I held during a Lunch&Learn in our Milan office @Gild.
The session was interactive with lots of examples.
AGENDA:
- Using aliases for git commands
- Stats: my most used commands
- Useful list of git aliases
- Work scenarios
This document provides a summary of the key concepts and commands of the Git version control system. It begins with introductions to basic Git concepts and commands for initializing and configuring a Git repository, making commits, and viewing the commit history. It then covers more advanced topics like branches, merges, rebasing, reflogs, aliases and various Git commands.
This document discusses methods for detecting anomalies and compromised hosts using netflow data. It proposes both a top-down method that analyzes total traffic to detect deviations, as well as a bottom-up method that looks at individual host behavior compared to the general population. Two real examples are analyzed to demonstrate the process of finding unusual connections for a host, rating how unusual they are, and validating potential compromises through blacklists. The goal is to automatically detect anomalies, compromised systems, and botnet command and control servers through netflow correlation and analysis.
David Melendez - Building a drone from scratch with spare parts is a challenging business. To accomplish this journey, a Linux embedded stability control system is developed entirely from 0.This is a journey starting from the hardware choosing (a home WIFI router), to a stable and real flight. Unconventional implementations are one of the main topic, like using WiFi as communication between drone and pilot, HTML5 and COMET to show telemetry from the router web server, and implementing a entirely new protocol based on 802.11 Beacon Frames to prevent deauthentication attacks.
The document discusses Go's lightweight scheduler. It introduces Go routines and explains that Go's scheduler runs within the application rather than relying on the OS scheduler. It describes the basic structures used including M (threads), P (contexts), and G (Go routines). It then explains how the scheduler is initialized, how new Go routines are created and scheduled, and how scheduling occurs in response to system calls or other triggers. Source code locations are provided and diagrams illustrate the relationships between threads, contexts, and Go routines.
Basicsof c make and git for a hello qt applicationDinesh Manajipet
This document provides an overview of using CMake and Git for a Hello World application in C, Qt, and managing source code with Git. It demonstrates how to configure CMake files to compile Hello World programs in C and Qt. It also summarizes basic Git commands like init, add, commit, branch, merge, and rebase. Useful online resources for learning more about CMake, Qt, and Git are provided.
The document provides good practices for using Git, including forking repositories, cloning, adding remote repositories, fetching from remotes, committing changes locally, rebasing, and pushing changes to remote repositories. It also discusses the differences between rebasing and pulling from a remote when integrating changes.
Short talk about Git best practices I held during a Lunch&Learn in our Milan office @Gild.
The session was interactive with lots of examples.
AGENDA:
- Using aliases for git commands
- Stats: my most used commands
- Useful list of git aliases
- Work scenarios
This document provides a summary of the key concepts and commands of the Git version control system. It begins with introductions to basic Git concepts and commands for initializing and configuring a Git repository, making commits, and viewing the commit history. It then covers more advanced topics like branches, merges, rebasing, reflogs, aliases and various Git commands.
This document discusses methods for detecting anomalies and compromised hosts using netflow data. It proposes both a top-down method that analyzes total traffic to detect deviations, as well as a bottom-up method that looks at individual host behavior compared to the general population. Two real examples are analyzed to demonstrate the process of finding unusual connections for a host, rating how unusual they are, and validating potential compromises through blacklists. The goal is to automatically detect anomalies, compromised systems, and botnet command and control servers through netflow correlation and analysis.
David Melendez - Building a drone from scratch with spare parts is a challenging business. To accomplish this journey, a Linux embedded stability control system is developed entirely from 0.This is a journey starting from the hardware choosing (a home WIFI router), to a stable and real flight. Unconventional implementations are one of the main topic, like using WiFi as communication between drone and pilot, HTML5 and COMET to show telemetry from the router web server, and implementing a entirely new protocol based on 802.11 Beacon Frames to prevent deauthentication attacks.
The document discusses Go's lightweight scheduler. It introduces Go routines and explains that Go's scheduler runs within the application rather than relying on the OS scheduler. It describes the basic structures used including M (threads), P (contexts), and G (Go routines). It then explains how the scheduler is initialized, how new Go routines are created and scheduled, and how scheduling occurs in response to system calls or other triggers. Source code locations are provided and diagrams illustrate the relationships between threads, contexts, and Go routines.
This document describes jChaart, an open source web dashboard library for displaying transaction and system monitoring stats. It provides examples of using SQL queries and Unix commands to collect data and generate stats on transactions, server resources, and web traffic which can then be visualized on dashboards. Real-time monitoring of databases and web server traffic is also discussed.
Kernel Recipes 2017 - Modern Key Management with GPG - Werner KochAnne Nicolas
Although GnuPG 2 has been around for nearly 15 years, the old 1.4 version was still in wide use. With Debian and others making 2.1 the default, many interesting things can now be done. In this talk he will explain the advantages of modern key algorithms, like ed25519, and why gpg relaxed some of its more paranoid defaults. The new –quick commands of gpg for easily scriptable key management will be described as well as the new key discovery methods. Finally hints for integration of gpg into other programs will be given.
Werner Koch, g10code
This document provides a summary of basic Linux commands including:
- ls lists files and directories
- cp copies files and directories
- mv moves or renames files and directories
- rm removes files or directories
- touch creates empty files
- cat outputs the contents of files
- mkdir creates directories
- grep searches for patterns in files
- ps displays currently running processes
- top displays active processes and system resources
This document discusses setting up a mail server infrastructure using Amazon Web Services. It involves using Postfix on EC2 instances behind an ELB for SMTP ports 25 and 465. Route53 is used to route mail to the ELB using a CNAME record. Messages are then sent to SES using the SendRawEmail API after converting the encoding to CP932 in a Lambda function. Various tips are provided around configuration of Postfix, relaying to SES, and addressing encoding and capacity issues.
This document discusses an upcoming PHP conference with a focus on puzzles and concurrency. It includes an agenda listing a 30 minute talk on PHP puzzlers, references using PHP 7.3 features and coroutines, and provides a GitHub link to sample code. Contact information is given for two people organizing the event.
This document provides instructions on configuring Linux security features such as SSH key-based authentication, firewall rules using iptables, SELinux concepts, and the Fail2ban utility. It discusses generating SSH keys, editing SSH configuration files, setting default firewall policies and rules for input, output, and forwarding, as well as network address translation rules. It also covers SELinux file and process context types and restoring default contexts. Lastly, it explains how to install, configure, and check the status of Fail2ban to automatically ban IPs with too many failed login attempts.
Git's incredible velocity and iron-clad backwards compatibility are a paradox: how does a CLI tool introduce hundreds of new features without changing its existing behavior? With command-line options, of course! The downside is that Git now has literally thousands of options littering its man pages. The only way to master them is through the ancient art of aliasing. This talk covers the nuts and bolts of creating Git aliases and automating Git-related JIRA and Bitbucket interactions from the command line. Attendees will learn tips and tricks for speeding up their workflow, improving their CLI mastery, and they'll also learn a lot about Git in the process.
Tim Pettersen, Senior Developer Advocate, Atlassian
The document provides information on systemd service management commands. It shows examples of using systemctl to start, stop, restart, and check the status of the httpd service. It also displays the output of systemctl status httpd which shows details about the loaded unit, active state, process IDs, and log entries for the Apache HTTP Server service.
- The document discusses various Linux system log files such as /var/log/messages, /var/log/secure, and /var/log/cron and provides examples of log entries.
- It also covers log rotation tools like logrotate and logwatch that are used to manage log files.
- Networking topics like IP addressing, subnet masking, routing, ARP, and tcpdump for packet sniffing are explained along with examples.
This module contains a 3-bit up/down counter and control logic. It uses registers to store the current count value (cnt) and direction (dir). On each clock cycle, the new value of cnt is assigned based on the current count, direction, and limit values. Similarly, the new value of dir is assigned based on the direction control signals. The counter can count up from 0 to 6 and down from 6 to 0, toggling the direction each time a limit is reached.
Graduating To Go - A Jumpstart into the Go Programming LanguageKaylyn Gibilterra
This workshop jumps through a lot of what is covered in the Go Tour. The exercises are new and match more along with the class content, and some pieces (like testing and APIs) are not covered in the Go Tour.
This document is a laboratory manual for an Advanced Computer Networks course. It contains instructions and code samples for 12 programming exercises including connecting two PCs, connecting a PC to a hub, switch, and router. It also covers implementing connections with bridges and repeaters, different network topologies, protocols like ARP, SMTP, HTTP, DNS, and DHCP, and FTP file transfers. The manual was submitted by a student to their professor for the course.
This document provides an introduction and overview of Git. It discusses the key concepts of Git including snapshots, local operations, integrity, and adding rather than modifying data. It also covers the three main states of files in Git (untracked, tracked, and staged), common commands like add, commit, status and diff, branching and merging workflows. The document concludes with best practices for contributing to open source projects using Git such as forking repositories and sending pull requests.
This document provides an introduction to using Git. Some key points:
- Git is a distributed version control system that is different from CVS/SVN in that nearly every operation is local and Git stores snapshots of files rather than differences.
- The basics of using Git involve recording changes by checking status, adding files, committing changes, and working with remotes like origin.
- Additional topics covered include undoing changes, working with others through branching and merging, tagging versions, and using tools like interactive mode and stashing.
The document discusses using Git and git-svn to manage version control for Bioconductor packages. It recommends cloning specific revisions of packages from the Bioconductor Subversion repository using git-svn to get the full history while avoiding downloading the entire repository. It provides examples of common Git and git-svn commands that can be used for making changes locally and committing them back to the Subversion repository. The workflow suggested makes changes on a local Git branch tracking the remote Subversion branch, then cherry-picks the commits to other branches as needed.
This document provides an introduction and overview of Git version control system. It covers:
- Git was created by Linus Torvalds to be fast and capable of handling large projects like the Linux kernel.
- Common Git commands like init, add, commit, status, diff, log are demonstrated along with basic workflows.
- Advanced topics covered include branching, merging, tagging, collaboration using remote repositories and pushing/pulling.
- The goal is to help the reader understand the basics of Git and get started using it effectively.
This document contains 7 programs written in C++. Program 1 calculates the circumference and area of a circle given the radius. Program 2 acts as a basic calculator, performing addition, subtraction, multiplication and division. Program 3 converts temperatures between Celsius and Fahrenheit. Program 4 calculates the square of an integer. Program 5 calculates student marks, percentage, average from subject marks. Program 6 demonstrates variable increment/decrement. Program 7 prints a pattern using tabs and plus symbols.
This document discusses connecting an Arduino to the internet and controlling it remotely. It provides code examples for connecting an Arduino to WiFi, getting the time from an NTP server, making HTTP requests, and using the Blynk platform to enable remote control of an Arduino project from a mobile phone app.
This document provides instructions for analyzing logs with the ELK stack using Docker. It discusses importing log data, using filters like date and grok patterns to parse logs, deduplicating entries, enriching data with plugins like useragent and geoip, and generating graphs from the analyzed data. The Docker ELK repository on GitHub contains a docker-compose file to quickly get started with log analysis using Docker.
Jokingly casual introduction that scales quickly to the obscure powers of bash script.
Intended to call the attention of devs and ops, and bridge the perception of the complexity on each other sides with things too familiar and yet too far out for both.
A reminder of the capacity we have in our hands if we dare to use it.
It is in portuguese, but the language that counts here is bash script.
Slides from a talk at HPC Admintech 2019 about containers, a brief review on containers, how to create a container using common linux tools and how to integrate Docker with Slurm.
This document describes jChaart, an open source web dashboard library for displaying transaction and system monitoring stats. It provides examples of using SQL queries and Unix commands to collect data and generate stats on transactions, server resources, and web traffic which can then be visualized on dashboards. Real-time monitoring of databases and web server traffic is also discussed.
Kernel Recipes 2017 - Modern Key Management with GPG - Werner KochAnne Nicolas
Although GnuPG 2 has been around for nearly 15 years, the old 1.4 version was still in wide use. With Debian and others making 2.1 the default, many interesting things can now be done. In this talk he will explain the advantages of modern key algorithms, like ed25519, and why gpg relaxed some of its more paranoid defaults. The new –quick commands of gpg for easily scriptable key management will be described as well as the new key discovery methods. Finally hints for integration of gpg into other programs will be given.
Werner Koch, g10code
This document provides a summary of basic Linux commands including:
- ls lists files and directories
- cp copies files and directories
- mv moves or renames files and directories
- rm removes files or directories
- touch creates empty files
- cat outputs the contents of files
- mkdir creates directories
- grep searches for patterns in files
- ps displays currently running processes
- top displays active processes and system resources
This document discusses setting up a mail server infrastructure using Amazon Web Services. It involves using Postfix on EC2 instances behind an ELB for SMTP ports 25 and 465. Route53 is used to route mail to the ELB using a CNAME record. Messages are then sent to SES using the SendRawEmail API after converting the encoding to CP932 in a Lambda function. Various tips are provided around configuration of Postfix, relaying to SES, and addressing encoding and capacity issues.
This document discusses an upcoming PHP conference with a focus on puzzles and concurrency. It includes an agenda listing a 30 minute talk on PHP puzzlers, references using PHP 7.3 features and coroutines, and provides a GitHub link to sample code. Contact information is given for two people organizing the event.
This document provides instructions on configuring Linux security features such as SSH key-based authentication, firewall rules using iptables, SELinux concepts, and the Fail2ban utility. It discusses generating SSH keys, editing SSH configuration files, setting default firewall policies and rules for input, output, and forwarding, as well as network address translation rules. It also covers SELinux file and process context types and restoring default contexts. Lastly, it explains how to install, configure, and check the status of Fail2ban to automatically ban IPs with too many failed login attempts.
Git's incredible velocity and iron-clad backwards compatibility are a paradox: how does a CLI tool introduce hundreds of new features without changing its existing behavior? With command-line options, of course! The downside is that Git now has literally thousands of options littering its man pages. The only way to master them is through the ancient art of aliasing. This talk covers the nuts and bolts of creating Git aliases and automating Git-related JIRA and Bitbucket interactions from the command line. Attendees will learn tips and tricks for speeding up their workflow, improving their CLI mastery, and they'll also learn a lot about Git in the process.
Tim Pettersen, Senior Developer Advocate, Atlassian
The document provides information on systemd service management commands. It shows examples of using systemctl to start, stop, restart, and check the status of the httpd service. It also displays the output of systemctl status httpd which shows details about the loaded unit, active state, process IDs, and log entries for the Apache HTTP Server service.
- The document discusses various Linux system log files such as /var/log/messages, /var/log/secure, and /var/log/cron and provides examples of log entries.
- It also covers log rotation tools like logrotate and logwatch that are used to manage log files.
- Networking topics like IP addressing, subnet masking, routing, ARP, and tcpdump for packet sniffing are explained along with examples.
This module contains a 3-bit up/down counter and control logic. It uses registers to store the current count value (cnt) and direction (dir). On each clock cycle, the new value of cnt is assigned based on the current count, direction, and limit values. Similarly, the new value of dir is assigned based on the direction control signals. The counter can count up from 0 to 6 and down from 6 to 0, toggling the direction each time a limit is reached.
Graduating To Go - A Jumpstart into the Go Programming LanguageKaylyn Gibilterra
This workshop jumps through a lot of what is covered in the Go Tour. The exercises are new and match more along with the class content, and some pieces (like testing and APIs) are not covered in the Go Tour.
This document is a laboratory manual for an Advanced Computer Networks course. It contains instructions and code samples for 12 programming exercises including connecting two PCs, connecting a PC to a hub, switch, and router. It also covers implementing connections with bridges and repeaters, different network topologies, protocols like ARP, SMTP, HTTP, DNS, and DHCP, and FTP file transfers. The manual was submitted by a student to their professor for the course.
This document provides an introduction and overview of Git. It discusses the key concepts of Git including snapshots, local operations, integrity, and adding rather than modifying data. It also covers the three main states of files in Git (untracked, tracked, and staged), common commands like add, commit, status and diff, branching and merging workflows. The document concludes with best practices for contributing to open source projects using Git such as forking repositories and sending pull requests.
This document provides an introduction to using Git. Some key points:
- Git is a distributed version control system that is different from CVS/SVN in that nearly every operation is local and Git stores snapshots of files rather than differences.
- The basics of using Git involve recording changes by checking status, adding files, committing changes, and working with remotes like origin.
- Additional topics covered include undoing changes, working with others through branching and merging, tagging versions, and using tools like interactive mode and stashing.
The document discusses using Git and git-svn to manage version control for Bioconductor packages. It recommends cloning specific revisions of packages from the Bioconductor Subversion repository using git-svn to get the full history while avoiding downloading the entire repository. It provides examples of common Git and git-svn commands that can be used for making changes locally and committing them back to the Subversion repository. The workflow suggested makes changes on a local Git branch tracking the remote Subversion branch, then cherry-picks the commits to other branches as needed.
This document provides an introduction and overview of Git version control system. It covers:
- Git was created by Linus Torvalds to be fast and capable of handling large projects like the Linux kernel.
- Common Git commands like init, add, commit, status, diff, log are demonstrated along with basic workflows.
- Advanced topics covered include branching, merging, tagging, collaboration using remote repositories and pushing/pulling.
- The goal is to help the reader understand the basics of Git and get started using it effectively.
This document contains 7 programs written in C++. Program 1 calculates the circumference and area of a circle given the radius. Program 2 acts as a basic calculator, performing addition, subtraction, multiplication and division. Program 3 converts temperatures between Celsius and Fahrenheit. Program 4 calculates the square of an integer. Program 5 calculates student marks, percentage, average from subject marks. Program 6 demonstrates variable increment/decrement. Program 7 prints a pattern using tabs and plus symbols.
This document discusses connecting an Arduino to the internet and controlling it remotely. It provides code examples for connecting an Arduino to WiFi, getting the time from an NTP server, making HTTP requests, and using the Blynk platform to enable remote control of an Arduino project from a mobile phone app.
This document provides instructions for analyzing logs with the ELK stack using Docker. It discusses importing log data, using filters like date and grok patterns to parse logs, deduplicating entries, enriching data with plugins like useragent and geoip, and generating graphs from the analyzed data. The Docker ELK repository on GitHub contains a docker-compose file to quickly get started with log analysis using Docker.
Jokingly casual introduction that scales quickly to the obscure powers of bash script.
Intended to call the attention of devs and ops, and bridge the perception of the complexity on each other sides with things too familiar and yet too far out for both.
A reminder of the capacity we have in our hands if we dare to use it.
It is in portuguese, but the language that counts here is bash script.
Slides from a talk at HPC Admintech 2019 about containers, a brief review on containers, how to create a container using common linux tools and how to integrate Docker with Slurm.
Aaron Mildenstein - Using Logstash with ZabbixZabbix
Logstash is a terrific tool for capturing, filtering, parsing and enriching data from a number of sources—including logs, of course. But Logstash is also able to capture from many other sources, including social media streams, databases, and many more. Data streams like these are a potential gold mine for Zabbix trending and alerting of all kinds.
In this talk Aaron Mildensten will provide an overview of how to configure and integrate Logstash with Zabbix to:
* capture data
* parse data events into key/value pairs
* associate an event with the time-stamp provided by the data
* generate metrics from the data
* output these values to Zabbix, with the associated time-stamp
Zabbix Conference 2015
This document discusses the awk command and how it can be used to parse and extract data from text files and output. Awk allows specifying patterns to match and actions to perform on matches. Examples show using awk to extract specific fields from the /etc/passwd file and Apache log files. Pipelines combining awk with other commands like grep, sed and cut are demonstrated.
The document describes setting up Hadoop in pseudo-distributed mode on a CentOS virtual machine instance. It details steps like creating a user account, installing Java and Hadoop, formatting the namenode, starting HDFS and YARN daemons, creating HDFS directories, and running a sample Pi estimation MapReduce job.
Apresentação na Pós-Graduação em Segurança da Informação:
- Sniffer de senhas em plain text;
- Ataque de brute-force no SSH;
- Proteção: Firewall, IPS e/ou TCP Wrappers;
- Segurança básica no sshd_config;
- Chaves RSA/DSA para acesso remoto;
- SSH buscando chaves no LDAP;
- Porque previnir o acesso: Fork Bomb
Watching And Manipulating Your Network TrafficJosiah Ritchie
This is an intro presentation to using the powerful tools for provided for linux in the area of networking. These are command line only tools because in a good network firewall, you won't have the option of graphical tools.
I’ve been keeping a collection of Linux commands that are particularly useful; some are from websites I’ve visited, others from experience
I hope you find these are useful as I have. I’ll periodically add to the list, so check back occasionally.
This document discusses PostgreSQL and Solaris as a low-cost platform for medium to large scale critical scenarios. It provides an overview of PostgreSQL, highlighting features like MVCC, PITR, and ACID compliance. It describes how Solaris and PostgreSQL integrate well, with benefits like DTrace support, scalability on multicore/multiprocessor systems, and Solaris Cluster support. Examples are given for installing PostgreSQL on Solaris using different methods, configuring zones for isolation, using ZFS for storage, and monitoring performance with DTrace scripts.
This document discusses automating network configuration and operations using DevOps principles and tools like Puppet. It describes using Zero Touch Provisioning (ZTP) to automatically install and configure Puppet on new network devices. Puppet is then used to configure and manage interfaces, routing protocols, users, and other network settings through an infrastructure-as-code approach.
This document provides tips and examples for deploying applications using Capistrano and related tools. It demonstrates how to provision virtual machines with Vagrant, configure multi-machine deployments, use Git for faster deployments, set up RVM and Bundler integration, add exception tracking and logging, and schedule tasks with Whenever. It also discusses monitoring tools like New Relic RPM and best practices like log rotation, coming soon pages, and development database dumps.
This document provides a summary of basic Linux commands including:
- ls to list files and directories
- cp to copy files
- mv to move files
- rm to remove files
- touch to create empty files
- cat to output a file's contents
- mkdir to create directories
- grep to search for patterns in files
- wc to count lines, words, and characters
- whoami to print the current user
This is a slightly updated draft of a talk I was planning on giving at Hadoop Summit in 2015. However the abstract was rejected. Rather than toss it, I'm going to share it with all of you on the (almost) 1 year anniversary of the first big commit of this feature!
Keep in mind that this is (currently) locked away in trunk. If you ever want to see this see the light of day, bug your vendors....
InstructionsInstructions for numberguessernumberGuesser.html.docxdirkrplav
Instructions/Instructions for numberguesser/numberGuesser.html
Instructions/Instructions for numberguesser/Page 313.PNG
Instructions/Instructions for numberguesser/Page 314 Continued.PNG
Instructions/Instructions for numberguesser/Page 314.PNG
Instructions/Instructions for numberguesser/Page 315 Continued.PNG
Instructions/Instructions for numberguesser/Page 315.PNG
Instructions/Instructions for numberguesser/Page 316 Continued.PNG
Instructions/Instructions for numberguesser/page 316.PNG
Instructions/Instructions for shoerental/Page 316.PNG
Instructions/Instructions for shoerental/Page 317 Continued.PNG
Instructions/Instructions for shoerental/Page 317.PNG
Instructions/Instructions for shoerental/Page 318 Continued.PNG
Instructions/Instructions for shoerental/Page 318.PNG
Instructions/Instructions for shoerental/page 319 continued.PNG
Instructions/Instructions for shoerental/Page 319.PNG
Instructions/Instructions for shoerental/Page 320.PNG
Instructions/Instructions for shoerental/ShoeRentalClass.html
Instructions/lab4.docx
1. Complete the Programmers Workshop on pg 313-316 (Including Detective Work). Upload the numberGuesser.html file here.
2. Complete the Object Lesson on pg 316-320 (Including Detective Work). Upload the ShoeRentalClass.html page you create here.
Introduction to Unix - POS420
Unix Lab Exercise Week 5
Job Control :
1. How to suspend the jobs running in foreground ?
Open a file in vi and press CTRL-Z to put it into background
$ vi filename
CTRL-Z
filename[New file]
[1] + Stopped vi filename
$
where 1 is the job number, + or - make the current and previous jobs.
2. How to make it run in foreground ?
You can use fg command to make it run in foreground. If more than one job is suspended, you can use fg %n where n is the number is the sequence of the process to make that process come in foreground.
$ fg %1
Now you will see vi editor again.
3. How to make it run in background ? (Only stopped jobs)
You can use bg command to make it run in background. If more than one job is suspended, you can use bg %n where n is the number is the sequence of the process to make that process come in background.
Let us suspend this job one more time.
$ vi filename
CTRL-Z
filename[New file]
[1] + Stopped vi filename
$
Let us run in background .
$ bg %1
4. Another way to suspend a job by using kill command.
Run vi in this session.
Open another connection through telnet. Now you have two sessions.
Type ps command to see what processes are running.
$ ps
PID TT STAT TIME COMMAND
5226 q7 S 0:01 -ksh (ksh) - This is new shell
6314 q7 R 0:00 ps
5487 ub S 0:00 -ksh (ksh) - This is previous shell
6312 ub S 0:00 vi filename - vi is running in previous session.
Now send a STOP signal to the process. kill -l will give you a lo\ist of signals.
$ kill -STOP 6312
Now you will see this in the other session
[1] + Stopped (signal) vi filename
To .
This document provides instructions for installing and using Wireshark software to capture and analyze network traffic. It describes how to install Wireshark and additional plugins, configure user permissions to capture traffic, and remotely capture traffic over SSH. Example commands are given to list installed plugins, view available network interfaces, capture a session, and analyze statistics on captured packets. Formats and filters for Wireshark are also explained.
Complete squid & firewall configuration. plus easy mac bindingChanaka Lasantha
1. The document details the configuration of a transparent SQUID Linux firewall to cache and filter internet traffic for internal clients. Key steps include installing and configuring Squid, setting up IP forwarding, configuring iptables firewall rules, and binding MAC addresses to IP addresses in Squid for access control.
This document is a summary of most used commands in Linux( mostly based on ubuntu).
It is a quick reference and good source for interview questions :).
The document contains the package install, update for both fedora and ubuntu, a nice comparison between two.
Ubuntu server configuration
These are a set of rules for a Linux system with the audit package installed. These rules are compliant with the Center for Internet Security (CIS) Red Hat 6 Benchmark. These rules will give sufficient coverage to improve the security monitoring of a system
Performing quantitative software analytics studies can be an immensely rewarding activity for scientists performing empirical research. However, such studies often pose numerous engineering challenges. The researcher must hunt down appropriate data sets, devise bespoke collection and processing tools, and optimise performance to match the size of the collected data. I will discuss principles and strategies that can be used to deal with these problems, and present examples of associated tools and techniques. Some particularly effective strategies associated with data set construction involve recursion, web searching, synthesis, probing, instrumentation, and the nurturing of alliances. On the processing front approaches include the opportunistic scavenging of tool front-ends, the exploratory development of pipelines, as well as the exploitation of tool interoperability, scripting languages, and their rich libraries. The required performance can be obtained through parallelism, stream processing, the judicious use of low-level facilities, and the choice of appropriate samples. I will finish the presentation with an overview of open problems and challenges in software analytics in vertical domains, data analysis, and under-represented stakeholders.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
10. kill_spring
$ ps aux | grep spring
hawk 15572 0.0 0.2 2473876 17968 s002 S
6:36PM 0:00.31 spring server | sample-cms-app | started 13
secs ago
hawk 15339 0.0 0.2 2458516 17604 s002 S
6:35PM 0:00.41 spring server | userapp | started 50 secs ago
hawk 15701 0.0 0.0 2432804 1848 s002 R+
6:36PM 0:00.00 grep --color=auto spring
11. kill_spring
$ ps aux | grep spring | grep -v grep
hawk 15572 0.0 0.2 2473876 17968 s002 S
6:36PM 0:00.31 spring server | sample-cms-app | started
13 secs ago
hawk 15339 0.0 0.2 2458516 17604 s002 S
6:35PM 0:00.41 spring server | userapp | started 50 secs
ago
12. kill_spring
$ ps aux | grep spring | grep -v grep | awk '{print $2}'
15572
15339
13. kill_spring
$ ps aux | grep spring | grep -v grep | awk '{print $2}’ | xargs kill
# processes with PID 15572, 15339 are killed