Using Bash case statements in Linux shell scripts

In this Linux video tutorial we discuss the Bash case statement. We use an example bash script to teach the basic syntax of a case statement. The video tries to clarify how to create a pattern clause and how different termination operators work with each other. For more information on case visit https:// RESOURCES: Bash Read Command: https:// More Articles on Bash Builtins: https://

Continue reading “Using Bash case statements in Linux shell scripts”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

041 Gitlab CI Advanced Job Triggers: Branch Names, Commit Messages, and Changed Files

Today I’m showing you how to control the way Gitlab CI jobs get kicked off with three example use-cases. First I show you how to only trigger jobs for certain branch/tag naming patterns, then I show you how to trigger jobs when a commit message contains a particular pattern, and lastly I show you how to trigger jobs only when certain files are changed. Gitlab & Gitlab CI Tutorials Playlist: https:// Gitlab Documentation relevant to this video: https://docs.gitlab.com/ee/ci/variables/README.html#environment-variables-expressions https://docs.gitlab.com/ee/ci/variables/predefined_variables.html https://docs.gitlab.com/ee/ci/yaml/#onlyexcept-basic If your company is interested in a more formal approach to software and tools

Continue reading “041 Gitlab CI Advanced Job Triggers: Branch Names, Commit Messages, and Changed Files”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

RFID Controller Chip/Circuit: Need Your Support: Eye-On-Stuff

Please consider donating to my channel so I can make more videos for you: All my videos are here: https:// In this video, I show and demonstrate my RFID Controller circuit design. I use a 28pin Pic16F876-20 microcontroller. This is a single chip solution. No development board or coding required. Features Include: Ability to program up to 8 RFID tags (125Khz) into memory, Add or Delete tags from memory, Includes qty 2 Master programming credit card size tags for enabling the programming mode. Master tags also trigger outputs. The design provides 5 outputs: 2second momentary H-L, 5second momentary H-L, 5second momentary L-H, Toggle H-L, and Toggle L-H. The outputs allow you to control relays, so

Continue reading “RFID Controller Chip/Circuit: Need Your Support: Eye-On-Stuff”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Creating a Terminal Emulator PART 6 [c++ live stream]

I am creating a special-purpose terminal emulator for my video productions. Welcome to tag along! My links: Twitter: https://twitter.com/RealBisqwit Liberapay: https://liberapay.com/Bisqwit Steady: https://steadyhq.com/en/bisqwit Patreon: https://patreon.com/Bisqwit (Other options at https://bisqwit.iki.fi/donate.html) Twitch: https://twitch.tv/RealBisqwit Homepage: https://iki.fi/bisqwit/ #programming #terminal #emulator FAQ: A) Linux. A) Cinnamon. A) Debian (Testing). A) Joe. A) Because to learn a new tool (to replace another you are already fluent with) requires a sizable investment in time. It’s not practical, or at least it is very difficult to justify convincingly. A) Embedded programming. A) Be passionate and never be afraid to experiment. Try things that are challenging and h

Continue reading “Creating a Terminal Emulator PART 6 [c++ live stream]”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

How to Build an Ethereum Mining Rig

The meteoric rise of ethereum has fueled something of a gold rush for people looking to get in on the action by mining ether themselves. This requires building a custom “mining” computer from scratch, which isn’t quite as hard as it sounds. In this how-to video, Motherboard contributor Daniel Oberhaus walks you through the step-by-step instructions for building an ethereum mining rig from the ground up. By the end of the tutorial you’ll be well on your way to mining ether and contributing to the maintenance of the ethereum network with your own computing power. MATERIALS LIST: (1) MSI Z-170a Motherboard – (2) 470rx Gigabyte graphics processing units – (2) powered risers – (8) ½ in. aluminum angles, cut to

Continue reading “How to Build an Ethereum Mining Rig”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Discover & Attack Almost Any Raspberry Pi on a Network with Rpi-hunter

Scan & Attack Raspberry Pis with Default Login Credentials Full Tutorial: Subscribe to Null Byte: https://goo.gl/J6wEnH Kody’s Twitter: https://twitter.com/KodyKinzie One of the most common mistakes a person makes with a new device is failing to change any default passwords. This leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, we’ll show you a tool called rpi-hunter that can discover and attack any vulnerable Raspberry Pi on a network. While it’s meant for scanning a local network, if the Pis are connected to the internet, they’re fair game too. Raspberry Pi 3 Model B+: https:// Raspberry Pi Zero W: https://

Continue reading “Discover & Attack Almost Any Raspberry Pi on a Network with Rpi-hunter”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Creating a Terminal Emulator PART 5 [c++ live stream]

I am creating a special-purpose terminal emulator for my video productions. Welcome to tag along! My links: Twitter: https://twitter.com/RealBisqwit Liberapay: https://liberapay.com/Bisqwit Steady: https://steadyhq.com/en/bisqwit Patreon: https://patreon.com/Bisqwit (Other options at https://bisqwit.iki.fi/donate.html) Twitch: https://twitch.tv/RealBisqwit Homepage: https://iki.fi/bisqwit/ #programming #terminal #emulator FAQ: A) Linux. A) Cinnamon. A) Debian (Testing). A) Joe. A) Because to learn a new tool (to replace another you are already fluent with) requires a sizable investment in time. It’s not practical, or at least it is very difficult to justify convincingly. A) Embedded programming. A) Be passionate and never be afraid to experiment. Try things that are challenging and h

Continue reading “Creating a Terminal Emulator PART 5 [c++ live stream]”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Switching to Linux | Part 2 | 30 Day Challenge

Switching to Linux the 30 day challenge, Day 4 out of the challenge has some surprises that were actually good. Surprises 1. LibreDraw is actually really good 2. File Transfer rates are faster than windows Research found this source: https:// TLDR; Linux does transfer small files faster and more efficiently than Windows because EXT4 file system 3. SSH native to terminal / SFTP native to nautilus Things I miss -Hiri html signature doesn’t work all that well with text declarations and styles not transferring when email is sent. Example: emails/websites show up with a big blue hyperlink line and text -RDP – VNC and Teamviewer just aren’t as good. Want to support the Channel? – Patreon ➜ https:// – Am

Continue reading “Switching to Linux | Part 2 | 30 Day Challenge”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

LIVE CTF! PART 1! – CS50 on Twitch, EP. 46

Join CS50’s Nick Wong for a live demonstration of a CTF (short for “capture the flag”), a type of cryptosport in which individuals or teams seek to plant or find a virtual “flag”, typically a string, on a web server, often architected in advance. In this example, Nick and Colton explore a CTF set up by Stripe, with more to come! Tune in live on twitch.tv/cs50tv and be a part of the live chat. This is CS50 on Twitch.

Continue reading “LIVE CTF! PART 1! – CS50 on Twitch, EP. 46”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

**ADVANCED WEBSITE HACKING ** ADVANCED Whatweb USAGE FOR FOOTPRINTING AND INFORMATION GATHERING .

Whatweb is a recon tool , inbuilt in kali linux , or downloadable from github :https://github.com/urbanadventurer/WhatWeb.git WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1700 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb can be stealthy and fast, or thorough but slow. WhatWeb supports an aggression level to control the trade off between speed and reliability. When you visit a website in your browser, the transaction

Continue reading “**ADVANCED WEBSITE HACKING ** ADVANCED Whatweb USAGE FOR FOOTPRINTING AND INFORMATION GATHERING .”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page