Web programming has been on a long journey. From the early static HTML files to the very first scripting languages like PHP, Python, Cold Fusion, Java, ASP, to the modern technologies like .net, and Ruby, and finally AJAX-based single page applications like YouTube and Gmail, among others. This is all great. But have you ever thought
Do you want to test connectivity to your mail server on port 25? Do you want to make a quick port scan? Perhaps you want to open a local port on your server to listen for incoming connections. The topic of this article is about a command that can and will offer you all this
How many times have you found yourself doing a repetitive task at a specific time? Do you remember when you found that the database hosted on your server is generating a large amount of logs, which are gradually eating the free space on the disk? Back then, you talked with the DBA team and they
Whether you are responsible for uploading files regularly to a remote web server, or syncing configuration files among a number of machines, most of the time you’ll find yourself using the FTP protocol. But what about automating the process? Could you simply add a shell script to a Crontab job and let it take care
In the previous article, we had a talk on One-Liners. We have seen how a composite statement that is as short as fitting in one line can achieve very useful things that may need a five or ten-lines script to do. In this article, we are going to complete what we have started in the
Do you remember what the definition of Shell Scripts is?! I told you in our first article in this series that a Shell Script is a collection of Linux commands, stored in an ordinary text file, and executed in sequence. So, shell scripts merely consist of commands. Sometimes, a command or a combination of several
In the previous article, we have learned how to generate random passwords using two methods: 1. The mkpasswd command. 2. Calculating the Hash for a random data (or number), then cutting characters (with length matching the required password length) from the resulting hash. Now, consider the case wherein the Linux (or UNIX) distribution running on
After learning how to generate random numbers, we are going to learn how to generate random data, and random passwords. Some of the concepts in this article are dependent on what we have learned in the previous one. So please, if you have not read it yet, go back one step and read it first.
There will be cases wherein you need something to be random: a random number, a random sequence of characters, a random file name, or a random password. For this purpose, you need to know the methods that will help you generate the random thing you need. Randomization will be the subject of our talk today.
An interactive script is a one that interacts with the user and requires user input. In this type of scripts, data flow in both directions (from the user to the script, and from the script back to the user). When the user types the required input, the script first validates the input to make sure