title
Linux Full Course - 11 Hours [2024] | Linux Tutorial For Beginners | Linux Training | Edureka

description
๐Ÿ”ฅEdureka Linux Certification Training Course (Use Code "๐˜๐Ž๐”๐“๐”๐๐„๐Ÿ๐ŸŽ") : https://www.edureka.co/linux-admin This Edureka Linux Full Course video will help you understand and learn the fundamentals of Operating Systems and Linux in Particular. This Linux Tutorial is ideal for both beginners as well as professionals who want to master the fundamentals of Linux. Below are the topics covered in this Linux full course video: 00:00:00 Introduction 00:00:32 Agenda 00:02:18 Fundaentals of Linux 00:16:05 Linux's Features 00:39:00 Working with Directories 01:04:23 Working with Commands 02:15:35 Working with files and Directories 02:21:18 Working with user permission 02:44:18 Working with Tar files 02:55:41 Regular Expression 03:07:57 Processess 03:40:41 Different shells iin Linux 04:05:15 Linux Directory Commands 04:20:47 Linux File Content Commands 04:41:15 Frequently used commands 05:41:49 Shell Script Basics 05:54:54 What is Linux File system? 05:58:11 File System Architecture 06:21:06 RPM- Red Hat Package MAnager 06:31:44 RPM and YUM 06:38:17 Demo:YUM 06:42:22 Package Initial from directory 06:53:01 What is DNS? 07:06:06 Confifuring BIND DNS Server 07:49:29 Command Line Essentials 07:51:56 Shell Script Basic 07:57:40 Using Variables 08:07:29 Basics Operators 08:27:57 Use Case 08:43:01 Shell Scripting Interview Questions and Answer 09:03:57 Shell Scripting Interview question and answer intermediate level 09:39:44 Linux vs Window 09:56:20 Which OS is for you? 10:03:42 Unix Limitations 10:07:47 Linux interview Questions and Answers ๐Ÿ”ด Subscribe to our channel to get video updates. Hit the subscribe button above: https://goo.gl/6ohpTV ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐š๐ง๐ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”ต DevOps Online Training: http://bit.ly/3VkBRUT ๐ŸŒ• AWS Online Training: http://bit.ly/3ADYwDY ๐Ÿ”ต React Online Training: http://bit.ly/3Vc4yDw ๐ŸŒ• Tableau Online Training: http://bit.ly/3guTe6J ๐Ÿ”ต Power BI Online Training: http://bit.ly/3VntjMY ๐ŸŒ• Selenium Online Training: http://bit.ly/3EVDtis ๐Ÿ”ต PMP Online Training: http://bit.ly/3XugO44 ๐ŸŒ• Salesforce Online Training: http://bit.ly/3OsAXDH ๐Ÿ”ต Cybersecurity Online Training: http://bit.ly/3tXgw8t ๐ŸŒ• Java Online Training: http://bit.ly/3tRxghg ๐Ÿ”ต Big Data Online Training: http://bit.ly/3EvUqP5 ๐ŸŒ• RPA Online Training: http://bit.ly/3GFHKYB ๐Ÿ”ต Python Online Training: http://bit.ly/3Oubt8M ๐ŸŒ• Azure Online Training: http://bit.ly/3i4P85F ๐Ÿ”ต GCP Online Training: http://bit.ly/3VkCzS3 ๐ŸŒ• Microservices Online Training: http://bit.ly/3gxYqqv ๐Ÿ”ต Data Science Online Training: http://bit.ly/3V3nLrc ๐ŸŒ• CEHv12 Online Training: http://bit.ly/3Vhq8Hj ๐Ÿ”ต Angular Online Training: http://bit.ly/3EYcCTe ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐‘๐จ๐ฅ๐ž-๐๐š๐ฌ๐ž๐ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐Ÿ”ต DevOps Engineer Masters Program: http://bit.ly/3Oud9PC ๐ŸŒ• Cloud Architect Masters Program: http://bit.ly/3OvueZy ๐Ÿ”ต Data Scientist Masters Program: http://bit.ly/3tUAOiT ๐ŸŒ• Big Data Architect Masters Program: http://bit.ly/3tTWT0V ๐Ÿ”ต Machine Learning Engineer Masters Program: http://bit.ly/3AEq4c4 ๐ŸŒ• Business Intelligence Masters Program: http://bit.ly/3UZPqJz ๐Ÿ”ต Python Developer Masters Program: http://bit.ly/3EV6kDv ๐ŸŒ• RPA Developer Masters Program: http://bit.ly/3OteYfP ๐Ÿ”ต Web Development Masters Program: http://bit.ly/3U9R5va ๐ŸŒ• Computer Science Bootcamp Program : http://bit.ly/3UZxPBy ๐Ÿ”ต Cyber Security Masters Program: http://bit.ly/3U25rNR ๐ŸŒ• Full Stack Developer Masters Program : http://bit.ly/3tWCE2S ๐Ÿ”ต Automation Testing Engineer Masters Program : http://bit.ly/3AGXg2J ๐ŸŒ• Python Developer Masters Program : https://bit.ly/3EV6kDv ๐Ÿ”ต Azure Cloud Engineer Masters Program: http://bit.ly/3AEBHzH ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐”๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฌ ๐ŸŒ• Professional Certificate Program in DevOps with Purdue University: https://bit.ly/3Ov52lT ๐Ÿ”ต Advanced Certificate Program in Data Science with E&ICT Academy, IIT Guwahati: http://bit.ly/3V7ffrh ๐ŸŒ• Artificial and Machine Learning PGD with E&ICT Academy NIT Warangal: http://bit.ly/3OuZ3xs ๐Ÿ“ข๐Ÿ“ข ๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐“๐ซ๐ž๐ง๐๐ข๐ง๐  ๐“๐ž๐œ๐ก๐ง๐จ๐ฅ๐จ๐ ๐ข๐ž๐ฌ ๐ญ๐จ ๐‹๐ž๐š๐ซ๐ง ๐ข๐ง 2023 ๐’๐ž๐ซ๐ข๐ž๐ฌ ๐Ÿ“ข๐Ÿ“ข โฉ NEW Top 10 Technologies To Learn In 2023 - https://youtu.be/udD_GQVDt5g ๐Ÿ“Œ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: https://t.me/edurekaupdates ๐Ÿ“Œ๐“๐ฐ๐ข๐ญ๐ญ๐ž๐ซ: https://twitter.com/edurekain ๐Ÿ“Œ๐‹๐ข๐ง๐ค๐ž๐๐ˆ๐ง: https://www.linkedin.com/company/edureka ๐Ÿ“Œ๐ˆ๐ง๐ฌ๐ญ๐š๐ ๐ซ๐š๐ฆ: https://www.instagram.com/edureka_learning/ ๐Ÿ“Œ๐…๐š๐œ๐ž๐›๐จ๐จ๐ค: https://www.facebook.com/edurekaIN/ ๐Ÿ“Œ๐’๐ฅ๐ข๐๐ž๐’๐ก๐š๐ซ๐ž: https://www.slideshare.net/EdurekaIN ๐Ÿ“Œ๐‚๐š๐ฌ๐ญ๐›๐จ๐ฑ: https://castbox.fm/networks/505?country=IN ๐Ÿ“Œ๐Œ๐ž๐ž๐ญ๐ฎ๐ฉ: https://www.meetup.com/edureka/ ๐Ÿ“Œ๐‚๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐ญ๐ฒ: https://www.edureka.co/community/ Got a question on the topic? Please share it in the comment section below and our experts will answer it for you. Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll-free) for more information.

detail
{'title': 'Linux Full Course - 11 Hours [2024] | Linux Tutorial For Beginners | Linux Training | Edureka', 'heatmap': [{'end': 3667.255, 'start': 1220.125, 'weight': 0.861}, {'end': 6106.481, 'start': 4069.673, 'weight': 0.752}, {'end': 10177.559, 'start': 8548.162, 'weight': 0.852}, {'end': 12218.586, 'start': 10986.871, 'weight': 0.701}, {'end': 13434.095, 'start': 13026.115, 'weight': 0.746}, {'end': 16692.498, 'start': 16280.925, 'weight': 0.863}, {'end': 19134.241, 'start': 18724.076, 'weight': 0.807}, {'end': 20761.034, 'start': 20353.086, 'weight': 0.815}], 'summary': 'Covers a comprehensive overview of linux, including its dominance, advantages, commands, cli, operations, users, file systems, package management, dns fundamentals, shell scripting, comparison with windows, and essential linux concepts, providing insights into essential linux commands, file management, and system administration with practical examples and demonstrations.', 'chapters': [{'end': 448.961, 'segs': [{'end': 54.72, 'src': 'embed', 'start': 30.19, 'weight': 6, 'content': [{'end': 36.975, 'text': 'By the end of this video, you will have a thorough understanding of Linux all the way from theory to the practical applications.', 'start': 30.19, 'duration': 6.785}, {'end': 41.356, 'text': 'But before we go ahead, if you love watching videos like these,', 'start': 37.755, 'duration': 3.601}, {'end': 46.518, 'text': "then subscribe to Edureka's YouTube channel and click the bell button to never miss out any updates from us.", 'start': 41.356, 'duration': 5.162}, {'end': 54.72, 'text': "Also, if you want to learn more about Linux after watching this session and wish to obtain Edureka's Linux certification course,", 'start': 47.238, 'duration': 7.482}], 'summary': "Learn linux theory to practical applications with edureka's youtube channel.", 'duration': 24.53, 'max_score': 30.19, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo30190.jpg'}, {'end': 211.367, 'src': 'embed', 'start': 182.343, 'weight': 4, 'content': [{'end': 187.067, 'text': 'okay?. So they started contributing to the development of the C programming language and Unix operating system.', 'start': 182.343, 'duration': 4.724}, {'end': 190.61, 'text': "So in our session we'll discuss more on Unix operating system.", 'start': 187.507, 'duration': 3.103}, {'end': 192.071, 'text': "and since it's about Linux, right?", 'start': 190.61, 'duration': 1.461}, {'end': 197.035, 'text': 'So Unix is basically the mother of Linux, because Linux is based on the Unix operating system.', 'start': 192.091, 'duration': 4.944}, {'end': 202.239, 'text': "Okay, I'll tell you how that's the case in some more time, but that's why we are starting off with Unix operating system.", 'start': 197.615, 'duration': 4.624}, {'end': 205.862, 'text': "Okay, so I'm now gonna cover about C and getting back to our slides.", 'start': 202.459, 'duration': 3.403}, {'end': 211.367, 'text': 'So it says growth of Unix because of open source collaboration and there was commercial sale of Unix.', 'start': 206.483, 'duration': 4.884}], 'summary': 'Unix is the foundation of linux, with open source collaboration and commercial sales contributing to its growth.', 'duration': 29.024, 'max_score': 182.343, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo182343.jpg'}, {'end': 395.735, 'src': 'embed', 'start': 371.307, 'weight': 3, 'content': [{'end': 377.13, 'text': 'So he wanted something like back in the 70s when everyone could collaborate and work on the same one single operating system.', 'start': 371.307, 'duration': 5.823}, {'end': 383.774, 'text': 'Like that he tried to bring back that era and this free software movement of his, this idea led to the GNU project.', 'start': 377.45, 'duration': 6.324}, {'end': 391.492, 'text': 'So the GNU project was all about people being able to access an operating system for free and developing that operating system.', 'start': 384.346, 'duration': 7.146}, {'end': 393.573, 'text': "So that's what this led to.", 'start': 392.092, 'duration': 1.481}, {'end': 395.735, 'text': "And that's what we call even today.", 'start': 394.114, 'duration': 1.621}], 'summary': 'The gnu project aimed to bring back collaborative, free software movement of the 70s, leading to the development of an accessible operating system.', 'duration': 24.428, 'max_score': 371.307, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo371307.jpg'}, {'end': 461.967, 'src': 'embed', 'start': 432.594, 'weight': 0, 'content': [{'end': 436.016, 'text': "And the event that happened after this is what is the result of today's world.", 'start': 432.594, 'duration': 3.422}, {'end': 445.8, 'text': 'okay. so after that, then in the 1990s, so probably 1991 or 1992, that was when this person called in a Star Wars, who was still back in college.', 'start': 436.676, 'duration': 9.124}, {'end': 448.961, 'text': 'at that time, he put the next kernel source code online.', 'start': 445.8, 'duration': 3.161}, {'end': 456.064, 'text': "so he was trying to use the POSIX version with one hardware called 386, and he thought that it's compatible only with that hardware,", 'start': 448.961, 'duration': 7.103}, {'end': 461.967, 'text': 'and so he put the source code online for anyone to use, and later they found out that it could be used with the GNU,', 'start': 456.064, 'duration': 5.903}], 'summary': 'In 1991 or 1992, a person put the next kernel source code online, initially for 386 hardware, leading to its use with gnu.', 'duration': 29.373, 'max_score': 432.594, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo432594.jpg'}], 'start': 7.455, 'title': 'Linux dominance and evolution', 'summary': 'Discusses the enduring dominance of linux in the operating system space, its evolution from unix, and provides a comprehensive overview of the edureka linux full course video, including fundamental concepts, technical aspects, and career-related guidance.', 'chapters': [{'end': 145.695, 'start': 7.455, 'title': 'Linux dominance and comprehensive course overview', 'summary': 'Discusses the enduring dominance of linux in the operating system space, its evolution into a globally relied upon system, and provides a comprehensive overview of the topics covered in the edureka linux full course video, including fundamental concepts, technical aspects, and career-related guidance.', 'duration': 138.24, 'highlights': ['The enduring dominance of Linux in the operating system space, its evolution into a globally relied upon system, and its crucial role for developers are emphasized, setting the stage for a comprehensive course overview.', 'A comprehensive overview of the topics covered in the Edureka Linux full course video is provided, encompassing fundamental concepts, technical aspects, and career-related guidance, highlighting the practical applications and benefits of learning Linux.', 'The detailed agenda of the Linux full course video is outlined, encompassing fundamental concepts, shells in Linux, Linux installation, commands, package management, administration, DNS server configuration, shell scripting, and comparisons with Windows and Unix, offering a thorough insight into the course content and its relevance to industry jobs.']}, {'end': 448.961, 'start': 146.468, 'title': 'Evolution of unix and the birth of linux', 'summary': 'Covers the inception of c programming and unix operating system in 1969, the collaborative development of unix in the 1970s, the commercial sale of unix leading to the birth of multiple unix versions in the 1980s, and the emergence of the gnu project in the mid to late 1980s, which laid the foundation for linux as we know it today.', 'duration': 302.493, 'highlights': ['Inception of C programming and Unix operating system in 1969 Dennis Ritchie and Ken Thompson created the C programming language, which became the root of all other programming languages, and developed the Unix operating system.', 'Collaborative development of Unix in the 1970s Many scientists collaborated to write their own versions of Unix operating system, contributing to its development and leading to commercial sale of Unix by AT&T.', 'Birth of multiple Unix versions in the 1980s Companies developed their own versions of Unix, leading to unnecessary confusion due to different dialects, such as AIX by IBM, Sun operating system by Solaris, and HP UX by HP.', 'Emergence of the GNU project in the mid to late 1980s Richard Stallman initiated the GNU project, advocating for a free software movement and the development of a free operating system, which laid the foundation for Linux as an operating system.']}], 'duration': 441.506, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo7455.jpg', 'highlights': ['The enduring dominance of Linux in the operating system space, its evolution into a globally relied upon system, and its crucial role for developers are emphasized, setting the stage for a comprehensive course overview.', 'A comprehensive overview of the topics covered in the Edureka Linux full course video is provided, encompassing fundamental concepts, technical aspects, and career-related guidance, highlighting the practical applications and benefits of learning Linux.', 'The detailed agenda of the Linux full course video is outlined, encompassing fundamental concepts, shells in Linux, Linux installation, commands, package management, administration, DNS server configuration, shell scripting, and comparisons with Windows and Unix, offering a thorough insight into the course content and its relevance to industry jobs.', 'Inception of C programming and Unix operating system in 1969 Dennis Ritchie and Ken Thompson created the C programming language, which became the root of all other programming languages, and developed the Unix operating system.', 'Collaborative development of Unix in the 1970s Many scientists collaborated to write their own versions of Unix operating system, contributing to its development and leading to commercial sale of Unix by AT&T.', 'Birth of multiple Unix versions in the 1980s Companies developed their own versions of Unix, leading to unnecessary confusion due to different dialects, such as AIX by IBM, Sun operating system by Solaris, and HP UX by HP.', 'Emergence of the GNU project in the mid to late 1980s Richard Stallman initiated the GNU project, advocating for a free software movement and the development of a free operating system, which laid the foundation for Linux as an operating system.']}, {'end': 1736.932, 'segs': [{'end': 472.976, 'src': 'embed', 'start': 448.961, 'weight': 0, 'content': [{'end': 456.064, 'text': "so he was trying to use the POSIX version with one hardware called 386, and he thought that it's compatible only with that hardware,", 'start': 448.961, 'duration': 7.103}, {'end': 461.967, 'text': 'and so he put the source code online for anyone to use, and later they found out that it could be used with the GNU,', 'start': 456.064, 'duration': 5.903}, {'end': 464.488, 'text': "and that's when the whole thing gained popularity.", 'start': 461.967, 'duration': 2.521}, {'end': 469.034, 'text': "So that's when we came up with something called as the Linux plus GNU,", 'start': 465.253, 'duration': 3.781}, {'end': 472.976, 'text': 'this whole term of having a kernel plus this operating system and getting them to work together.', 'start': 469.034, 'duration': 3.942}], 'summary': 'Linux gained popularity when it was discovered to be compatible with gnu, leading to the concept of linux plus gnu.', 'duration': 24.015, 'max_score': 448.961, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo448961.jpg'}, {'end': 685.232, 'src': 'embed', 'start': 641.594, 'weight': 1, 'content': [{'end': 645.175, 'text': 'or the Debian or the other operating systems which are based on them.', 'start': 641.594, 'duration': 3.581}, {'end': 650.057, 'text': 'So the CentOS here, it is based on Red Hat Enterprise Linux.', 'start': 645.956, 'duration': 4.101}, {'end': 657.72, 'text': 'So the rel, we call them rel, so they have the free version that they provide for Enterprise users is that of CentOS.', 'start': 650.077, 'duration': 7.643}, {'end': 659.161, 'text': 'and Fedora.', 'start': 658.38, 'duration': 0.781}, {'end': 663.927, 'text': 'again, for that matter of fact, you know they have multiple distributions under them under their name,', 'start': 659.161, 'duration': 4.766}, {'end': 667.17, 'text': 'and Debian are the people who are the founders of Ubuntu.', 'start': 663.927, 'duration': 3.243}, {'end': 675.06, 'text': 'okay, so Ubuntu is a distribution that is based on Debian and since Ubuntu is so popular, there are different versions of Ubuntu itself.', 'start': 667.17, 'duration': 7.89}, {'end': 681.327, 'text': 'right, there are other distributions like Xubuntu or Edubuntu, All these things, and they are the other versions of Ubuntu.', 'start': 675.06, 'duration': 6.267}, {'end': 685.232, 'text': "So that's about the different Linux distributions.", 'start': 681.788, 'duration': 3.444}], 'summary': 'Various linux distributions include centos, fedora, debian, and ubuntu with multiple versions under them.', 'duration': 43.638, 'max_score': 641.594, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo641594.jpg'}, {'end': 1223.406, 'src': 'embed', 'start': 1193.687, 'weight': 2, 'content': [{'end': 1196.97, 'text': "Now, I'll be doing these two for showing you how SSH works.", 'start': 1193.687, 'duration': 3.283}, {'end': 1204.295, 'text': "So I told you in the agenda slide that I'll get two remote machines to access each other, right? So for that purpose, I need these two VMs.", 'start': 1197.37, 'duration': 6.925}, {'end': 1205.976, 'text': 'And of course, both are CentOS.', 'start': 1204.675, 'duration': 1.301}, {'end': 1212.661, 'text': "And yeah, as you can see, the information, it says that 32-bit CentOS system, I've called it or named it master.", 'start': 1206.517, 'duration': 6.144}, {'end': 1214.543, 'text': 'And this one is named it as slave.', 'start': 1212.881, 'duration': 1.662}, {'end': 1217.784, 'text': 'So similarly, I have the Ubuntu also.', 'start': 1215.123, 'duration': 2.661}, {'end': 1220.085, 'text': 'So the Ubuntu 64 bit is this.', 'start': 1218.284, 'duration': 1.801}, {'end': 1223.406, 'text': 'So let me just turn on the Ubuntu and show you how Ubuntu looks like.', 'start': 1220.125, 'duration': 3.281}], 'summary': 'Demonstrating ssh between two centos and one ubuntu vms.', 'duration': 29.719, 'max_score': 1193.687, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo1193687.jpg'}], 'start': 448.961, 'title': 'Linux and its advantages', 'summary': 'Covers the birth and popularity of linux, major distributions like red hat and fedora, its features including easy updates and free software licensing, flexibility of distributions, and superior malware protection with 100% antivirus-free capability. it also explains the difference between windows and linux in terms of file storage and advantages of using the command-line interface (cli).', 'chapters': [{'end': 685.232, 'start': 448.961, 'title': 'The birth and distributions of linux', 'summary': 'Describes the birth of linux, its popularity due to compatibility with gnu, and the major distributions such as red hat enterprise linux, fedora, and debian, with red hat being the most stable and popular for servers and workstations.', 'duration': 236.271, 'highlights': ['The birth of Linux was due to its compatibility with GNU, leading to the creation of Linux plus GNU, a kernel and operating system working together.', 'Red Hat Enterprise Linux is the most stable and popular distribution, preferred for servers and workstations, with CentOS being its free version.', 'Other major distributions include Fedora, funded by Red Hat, and Debian, developed by a group of developers for free and open source use.']}, {'end': 988.734, 'start': 685.732, 'title': 'Linux features and benefits', 'summary': 'Discusses the features and benefits of linux, including easy updates through command line interface, free software licensing, and access to source code, making it popular among software developers.', 'duration': 303.002, 'highlights': ["Linux offers easy software updates through the command line interface, enabling users to update software with a single command, simplifying the process. Updating software on Linux is as simple as running a single command, such as 'sudo yum Update' for Java, making it efficient and user-friendly.", 'Linux provides free software licensing, allowing companies and individuals to use it without the need for paid licenses, unlike Windows, making it cost-effective for organizations. Linux offers free software licensing, making it a cost-effective option for companies and individuals, in contrast to the paid licensing model of Windows.', 'Access to source code in Linux allows users to customize and modify the operating system, enabling collaboration and sharing of features with other developers, while this feature is not available in Windows, making Linux more flexible and adaptable. Linux provides complete access to the source code, empowering users to customize and share features, fostering collaboration and flexibility, a capability not available in Windows.']}, {'end': 1274.018, 'start': 989.315, 'title': 'Linux: distributions and security', 'summary': 'Covers the flexibility of linux distributions, highlighting the variety of options available and the seamless transition between them, and emphasizes the superior malware protection of linux compared to windows, with 100% antivirus-free capability.', 'duration': 284.703, 'highlights': ['Linux offers a wide range of distributions such as Red Hat, Debian, and Fedora, with the flexibility to switch between them based on preferences or requirements, allowing users to transition seamlessly with 90% of commands being the same. Multiple distributions, 90% command consistency', 'Linux provides 100% antivirus-free capability, ensuring better protection against malware compared to Windows, reducing the vulnerability to hacking and security threats. 100% antivirus-free, better than Windows']}, {'end': 1736.932, 'start': 1274.018, 'title': 'Difference between windows and linux', 'summary': 'Explains the difference between windows and linux in terms of file storage, highlighting the hierarchical structure of the linux file system and the advantages of using the command-line interface (cli) for faster and more efficient navigation through directories and files.', 'duration': 462.914, 'highlights': ['In Linux, the file system is based on a hierarchical structure with a root directory, allowing access to all files and folders from the root, unlike Windows which uses drives for storing files.', 'The command-line interface (CLI) in Linux provides faster and more efficient navigation through directories and files, offering the advantage of accessing specific directories with a single command.', "The 'Print Working Directory' (PWD) command in the terminal displays the current working directory, while the 'cd' command is used to change directories, enhancing navigation efficiency.", 'The clear command in the terminal clears the command-line interface, providing a clean slate for entering new commands.']}], 'duration': 1287.971, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo448961.jpg', 'highlights': ['Red Hat Enterprise Linux is the most stable and popular distribution, preferred for servers and workstations, with CentOS being its free version.', 'Linux provides 100% antivirus-free capability, ensuring better protection against malware compared to Windows, reducing the vulnerability to hacking and security threats.', 'Linux offers easy software updates through the command line interface, enabling users to update software with a single command, simplifying the process.', 'Access to source code in Linux allows users to customize and modify the operating system, enabling collaboration and sharing of features with other developers, while this feature is not available in Windows, making Linux more flexible and adaptable.', 'Linux offers a wide range of distributions such as Red Hat, Debian, and Fedora, with the flexibility to switch between them based on preferences or requirements, allowing users to transition seamlessly with 90% of commands being the same.', 'In Linux, the file system is based on a hierarchical structure with a root directory, allowing access to all files and folders from the root, unlike Windows which uses drives for storing files.', 'The command-line interface (CLI) in Linux provides faster and more efficient navigation through directories and files, offering the advantage of accessing specific directories with a single command.']}, {'end': 4882.839, 'segs': [{'end': 3826.44, 'src': 'embed', 'start': 3796.468, 'weight': 5, 'content': [{'end': 3799.33, 'text': "So that indicates that this is another folder that's present.", 'start': 3796.468, 'duration': 2.862}, {'end': 3804.753, 'text': 'So if I just put enter, then it will change my directory to this particular folder.', 'start': 3800.03, 'duration': 4.723}, {'end': 3807.135, 'text': 'So that is what the quotation mark does.', 'start': 3804.773, 'duration': 2.362}, {'end': 3809.457, 'text': "So when I do enter, then I'm inside this folder.", 'start': 3807.415, 'duration': 2.042}, {'end': 3815.555, 'text': 'When I do ls, I have the list of folders and directories inside this advanced HBs practicals folder.', 'start': 3810.333, 'duration': 5.222}, {'end': 3820.898, 'text': "Alright guys, so I'm just gonna do a cd to my home directory, and I'm here.", 'start': 3816.156, 'duration': 4.742}, {'end': 3826.44, 'text': 'And that was about the different cd commands that are available, which I wanted to show you.', 'start': 3821.738, 'duration': 4.702}], 'summary': 'Demonstration of using cd command to navigate folders and directories.', 'duration': 29.972, 'max_score': 3796.468, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo3796468.jpg'}, {'end': 3869.622, 'src': 'embed', 'start': 3844.451, 'weight': 3, 'content': [{'end': 3851.556, 'text': "okay, so let's first go to the next slide and start off with cat command.", 'start': 3844.451, 'duration': 7.105}, {'end': 3855.519, 'text': 'okay, so when would we use the cat command, guys?', 'start': 3851.556, 'duration': 3.963}, {'end': 3858.201, 'text': "so it's pretty obvious right from what it's written here.", 'start': 3855.519, 'duration': 2.682}, {'end': 3861.924, 'text': "it says when you're working with files, that time you can use the cat command.", 'start': 3858.201, 'duration': 3.723}, {'end': 3869.622, 'text': 'so the cat command It is basically used to display the content of the text files and concatenate several files into one.', 'start': 3861.924, 'duration': 7.698}], 'summary': 'Cat command displays and concatenates text files.', 'duration': 25.171, 'max_score': 3844.451, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo3844451.jpg'}, {'end': 3938.214, 'src': 'embed', 'start': 3911.778, 'weight': 4, 'content': [{'end': 3915.921, 'text': 'And if I put enter, then the content of all the three files will be displayed in my terminal.', 'start': 3911.778, 'duration': 4.143}, {'end': 3918.022, 'text': "The same thing won't happen with vi.", 'start': 3916.481, 'duration': 1.541}, {'end': 3921.844, 'text': "So if I say vi, then only that particular file's content will be displayed.", 'start': 3918.042, 'duration': 3.802}, {'end': 3928.748, 'text': 'So same thing with nano, right? So let me just go to the terminal and show you an example of the cat command.', 'start': 3921.864, 'duration': 6.884}, {'end': 3931.43, 'text': 'So right now we are in the cd directory.', 'start': 3929.189, 'duration': 2.241}, {'end': 3933.171, 'text': 'Let me just maximize this.', 'start': 3931.87, 'duration': 1.301}, {'end': 3935.112, 'text': "Okay, I'm going to clear the screen.", 'start': 3933.931, 'duration': 1.181}, {'end': 3938.214, 'text': 'Present working directory is the home slash edrega directory.', 'start': 3935.592, 'duration': 2.622}], 'summary': 'Using cat command to display file contents in terminal', 'duration': 26.436, 'max_score': 3911.778, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo3911778.jpg'}, {'end': 4137.334, 'src': 'embed', 'start': 4108.604, 'weight': 0, 'content': [{'end': 4114.368, 'text': 'so first these are the permissions that are there in the first file, and then This was what was there in the second file.', 'start': 4108.604, 'duration': 5.764}, {'end': 4114.749, 'text': 'alright, guys?', 'start': 4114.368, 'duration': 0.381}, {'end': 4119.743, 'text': 'Now this brings us to another important concept of how to append files.', 'start': 4115.362, 'duration': 4.381}, {'end': 4123.907, 'text': "So CAT basically stands for concatenate, right? So that's the most important option.", 'start': 4120.024, 'duration': 3.883}, {'end': 4131.131, 'text': "So if you want to concatenate a particular file with some kind of lines, then I'll show you how that is done by creating a new file.", 'start': 4124.367, 'duration': 6.764}, {'end': 4137.334, 'text': 'What I did was I created a new file, file2.txt and I concatenated these lines into this particular file.', 'start': 4131.77, 'duration': 5.564}], 'summary': 'Demonstrating how to append files using cat command.', 'duration': 28.73, 'max_score': 4108.604, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo4108604.jpg'}, {'end': 4185.037, 'src': 'embed', 'start': 4151.145, 'weight': 1, 'content': [{'end': 4152.305, 'text': 'We also call it direction marks.', 'start': 4151.145, 'duration': 1.16}, {'end': 4163.468, 'text': "So, if you give file1.txt and followed by this, if you give file2.txt, then what's gonna happen is, whatever contents are there in file1,", 'start': 4153.006, 'duration': 10.462}, {'end': 4168.149, 'text': 'those will get appended or concatenated to this file2.txt.', 'start': 4163.468, 'duration': 4.681}, {'end': 4172.05, 'text': 'So in my file2.txt, we have these two lines.', 'start': 4169.609, 'duration': 2.441}, {'end': 4175.529, 'text': 'Hi, my name is Vardhan, Welcome to Linux tutorial by Edureka.', 'start': 4172.37, 'duration': 3.159}, {'end': 4178.433, 'text': 'And file one has these three lines.', 'start': 4176.091, 'duration': 2.342}, {'end': 4185.037, 'text': 'So basically when I enter now, there will be a file two in which there will be extra lines.', 'start': 4179.033, 'duration': 6.004}], 'summary': "Using 'direction marks' in linux to append file contents, resulting in concatenated files.", 'duration': 33.892, 'max_score': 4151.145, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo4151145.jpg'}], 'start': 1736.932, 'title': 'Linux commands overview', 'summary': 'Covers the usage of the cat command in linux, including displaying and concatenating text file contents, with examples and practical demonstrations.', 'chapters': [{'end': 2306.15, 'start': 1736.932, 'title': 'Navigating directories with the cd command', 'summary': 'Explains how to navigate directories using the cd command, including going back to the previous directory, accessing the home directory, and using the echo command to display arguments and variables in the terminal.', 'duration': 569.218, 'highlights': ["The CD command with two period marks 'CD ..' allows navigating to the previous directory, demonstrated by returning from the LMS directory to the desktop directory, reducing the need for repetitive commands.", "The tilde symbol '~' represents the home directory, enabling quick access from any directory by simply typing 'CD' and pressing enter, showcasing a convenient feature for efficient navigation.", 'The use of the tab key for autocompletion in the terminal is demonstrated, facilitating quick and accurate navigation by automatically filling directory names after typing a few characters, enhancing user experience and productivity.']}, {'end': 2939.265, 'start': 2306.15, 'title': 'Introduction to su and sudo commands', 'summary': 'Explains the su and sudo commands, highlighting their functionalities and differences, along with practical examples, emphasizing the importance of these commands for accessing root user permissions and executing specific commands with superuser privileges and demonstrating ls command options for listing contents in the current directory, including ls path, ls -l, ls -a, and ls author.', 'duration': 633.115, 'highlights': ['The SU command is used to switch to the root user, while the pseudo command executes only a particular command with root or super user privileges. The SU command allows switching to the root user, granting super user permissions, while the pseudo command executes a specific command with root or super user privileges.', 'The root user provides ultimate privileges and permissions, enabling access to folders and executing commands that regular users cannot access. The root user grants extensive privileges, allowing access to folders and execution of commands that regular users cannot access.', 'The Sudo command executes a specific command with root or super user privileges, distinct from the SU command, which logs in as the root user and executes a set of commands with root user privileges. The Sudo command executes a specific command with root or super user privileges, while the SU command logs in as the root user and executes a set of commands with root user privileges.', 'The LS command lists all contents in the current working directory, with options such as LS path, LS -l, LS -a, and LS author for displaying contents in specific paths and with additional details like permissions and authors. The LS command lists contents in the current working directory, with options like LS path, LS -l, LS -a, and LS author for displaying contents in specific paths and additional details like permissions and authors.']}, {'end': 3329.586, 'start': 2939.806, 'title': 'Introduction to ls command flags', 'summary': 'Introduces the ls command and its flags, such as -l, -a, -s, and the redirection symbol >, showing how to use them to list directory contents, combine flags, and store command output in a file.', 'duration': 389.78, 'highlights': ['The chapter introduces the ls command and its flags, such as -l, -a, -s, and the redirection symbol >, showing how to use them to list directory contents, combine flags, and store command output in a file. The ls command and its various flags, including -l, -a, -s, and the redirection symbol >, are introduced, demonstrating how to list directory contents, combine flags, and store command output in a file.', 'The ls command with the -l flag displays all the hidden contents in the directory, while the combination of -l and -a flags shows hidden contents in extended long format. The -l flag displays all hidden contents, and combining -l and -a flags reveals hidden contents in extended long format.', 'Using the -s flag with ls command sorts the list of directories by size, displaying larger sizes first and smaller sizes last. The -s flag sorts the list of directories by size, with larger sizes appearing first and smaller sizes at the end.', 'The redirection symbol > is used to store the output of a command in a file, and specifying a path allows storing the file in a specific directory. The > symbol is used to store command output in a file, and specifying a path allows storing the file in a specific directory.']}, {'end': 3815.555, 'start': 3329.646, 'title': 'Working with cd command in linux', 'summary': 'Explains the functionality of the cd command in linux, including switching to home directory, root directory, parent directory, and directories with spaces, enabling users to navigate the file system effectively.', 'duration': 485.909, 'highlights': ["The CD command can be used to change the directory to the home directory by typing 'cd' or 'cd ~', and to the root directory by typing 'cd /'. By using the CD command with 'cd' or 'cd ~', the directory can be changed to the home directory, and by typing 'cd /', it changes to the root directory.", "Using 'cd ..' allows the user to switch to the parent directory from the current directory, facilitating effective navigation within the file system. The command 'cd ..' enables users to navigate to the parent directory from the current directory, aiding in efficient file system traversal.", 'The CD command within single or double quotation marks is beneficial for switching to directories with names containing spaces, providing a solution for addressing such naming conventions effectively. By enclosing the directory name with spaces within single or double quotation marks, the CD command allows users to navigate to directories with space-containing names, resolving naming convention challenges.']}, {'end': 4225.506, 'start': 3816.156, 'title': 'Linux commands overview', 'summary': 'Covered the usage of the cat command in linux, including displaying and concatenating text file contents, with examples and practical demonstrations.', 'duration': 409.35, 'highlights': ['The cat command is used to display the content of text files and concatenate several files into one, allowing the display of multiple file contents in the terminal. The cat command is utilized to display the content of text files and concatenate multiple files into one, enabling the display of multiple file contents in the terminal.', 'Demonstration of using the cat command to display the content of a text file and concatenate two files, showcasing practical usage and results. Practical demonstration of using the cat command to display the content of a text file and concatenate two files, demonstrating practical usage and results.', 'Explanation of appending files using the cat command, with a demonstration of concatenating lines from one file into another, resulting in an extended file with additional content. Detailed explanation of appending files using the cat command, along with a demonstration of concatenating lines from one file into another, resulting in an extended file with additional content.']}, {'end': 4882.839, 'start': 4226.006, 'title': 'Understanding cat and grep commands', 'summary': 'Discusses the functionalities of the cat and grep commands, including options such as -n, -b, -s, -e, -i, -v, and -c, along with practical examples and their impact on file manipulation and searching for specific strings in a text file.', 'duration': 656.833, 'highlights': ["The cat command can display the contents of a file and append lines to a file, with the total number of entries displayed when using the 'ls -l' command. The 'ls -l' command displays the total number of entries, with the cat command used to append lines to a file and display the total number of entries.", 'The grep command is used to search for specific strings or words in a text file, with options like -i, -n, -v, and -c providing case-insensitive search, line numbers, non-matching lines, and the count of matching lines, respectively. The grep command offers options such as -i for case-insensitive search, -n for displaying line numbers, -v for showing non-matching lines, and -c for counting matching lines.', 'The -n flag with the cat command adds line numbers to all lines, while the -b flag adds line numbers to non-blank lines only. The -n flag in the cat command adds line numbers to all lines, while the -b flag adds line numbers to non-blank lines only.']}], 'duration': 3145.907, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo1736932.jpg', 'highlights': ['The cat command is used to display the content of text files and concatenate several files into one, allowing the display of multiple file contents in the terminal.', 'Demonstration of using the cat command to display the content of a text file and concatenate two files, showcasing practical usage and results.', 'Explanation of appending files using the cat command, with a demonstration of concatenating lines from one file into another, resulting in an extended file with additional content.', "The CD command with two period marks 'CD ..' allows navigating to the previous directory, demonstrated by returning from the LMS directory to the desktop directory, reducing the need for repetitive commands.", "The tilde symbol '~' represents the home directory, enabling quick access from any directory by simply typing 'CD' and pressing enter, showcasing a convenient feature for efficient navigation.", 'The use of the tab key for autocompletion in the terminal is demonstrated, facilitating quick and accurate navigation by automatically filling directory names after typing a few characters, enhancing user experience and productivity.']}, {'end': 7029.148, 'segs': [{'end': 5192.566, 'src': 'embed', 'start': 5165.214, 'weight': 2, 'content': [{'end': 5171.499, 'text': 'So we can sort even those things, okay? Now that result can be sorted, and also we can sort anything else.', 'start': 5165.214, 'duration': 6.285}, {'end': 5176.522, 'text': 'We can sort the contents of a file, right? We can sort the contents of the file or, you know, all these things.', 'start': 5171.519, 'duration': 5.003}, {'end': 5177.483, 'text': "So that's what this means.", 'start': 5176.542, 'duration': 0.941}, {'end': 5181.624, 'text': 'So without wasting much time, let me just show you how that is done.', 'start': 5178.163, 'duration': 3.461}, {'end': 5185.225, 'text': 'You can give sort and the file that you want to search.', 'start': 5182.784, 'duration': 2.441}, {'end': 5192.566, 'text': 'Alternatively, you can also search two files at the same time by giving file1.txt and file2.txt.', 'start': 5186.165, 'duration': 6.401}], 'summary': 'The speaker discusses sorting files and shows how to sort file contents, demonstrating the process with examples.', 'duration': 27.352, 'max_score': 5165.214, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo5165214.jpg'}, {'end': 6153.643, 'src': 'embed', 'start': 6125.722, 'weight': 3, 'content': [{'end': 6128.322, 'text': 'Okay, so we have something called as a CP flag I.', 'start': 6125.722, 'duration': 2.6}, {'end': 6131.623, 'text': 'okay, so when you give the I flag, it enters the interactive mode.', 'start': 6128.322, 'duration': 3.301}, {'end': 6139.745, 'text': 'so when you say Interactive mode, it is because at times you might have files which will all be already be present in in a particular directory.', 'start': 6131.623, 'duration': 8.122}, {'end': 6144.706, 'text': 'Okay, you saw me copy automobiles or txt once from documents to desktop.', 'start': 6139.745, 'duration': 4.961}, {'end': 6147.147, 'text': 'Okay, now, if I do the same operation again,', 'start': 6144.706, 'duration': 2.441}, {'end': 6153.643, 'text': 'if I run the same command again At that time it will automatically overwrite the file right? Because the file name is the same.', 'start': 6147.147, 'duration': 6.496}], 'summary': 'Using the cp flag i enters interactive mode, preventing automatic file overwriting.', 'duration': 27.921, 'max_score': 6125.722, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo6125722.jpg'}, {'end': 6193, 'src': 'embed', 'start': 6164.71, 'weight': 4, 'content': [{'end': 6171.114, 'text': "Okay, now, in that kind of a situation, when you're copying multiple files, you might want to be notified before something happens, right?", 'start': 6164.71, 'duration': 6.404}, {'end': 6175.397, 'text': 'So if you specify something like the I flag, then you will get an interactive mode.', 'start': 6171.454, 'duration': 3.943}, {'end': 6177.338, 'text': 'So the system will not take a decision on its own.', 'start': 6175.437, 'duration': 1.901}, {'end': 6179.474, 'text': 'but instead it will not use any defaults.', 'start': 6177.833, 'duration': 1.641}, {'end': 6181.915, 'text': "That's what I mean by on its own.", 'start': 6179.814, 'duration': 2.101}, {'end': 6185.696, 'text': 'So it would ask you, it would prompt you for an answer.', 'start': 6182.555, 'duration': 3.141}, {'end': 6193, 'text': 'It will tell you that this file already exists in this directory and do you want to replace it? And then it will give you an option Y or N.', 'start': 6186.337, 'duration': 6.663}], 'summary': 'Using the i flag prompts for user input during file copying for decision-making and prevents automatic default actions.', 'duration': 28.29, 'max_score': 6164.71, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo6164710.jpg'}, {'end': 6226.561, 'src': 'embed', 'start': 6200.819, 'weight': 5, 'content': [{'end': 6206.344, 'text': 'okay, because by default it overwrites the file and if you specify the end flag, it will not overwrite the file.', 'start': 6200.819, 'duration': 5.525}, {'end': 6209.927, 'text': 'but the whole concept here is it is based on the file name.', 'start': 6206.344, 'duration': 3.583}, {'end': 6213.07, 'text': 'what if the file name is the same and the file contents are different?', 'start': 6209.927, 'duration': 3.143}, {'end': 6216.933, 'text': 'okay, at that situation you might want something like the flag you.', 'start': 6213.07, 'duration': 3.863}, {'end': 6222.598, 'text': 'okay. now, what the flag you does is it will update the destination file only when the source file is different from the destination file.', 'start': 6216.933, 'duration': 5.665}, {'end': 6226.561, 'text': 'So by using the n flag you will make sure that the file is not overwritten.', 'start': 6223.178, 'duration': 3.383}], 'summary': "Using the 'n' flag ensures file is not overwritten if source and destination files are different.", 'duration': 25.742, 'max_score': 6200.819, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo6200819.jpg'}, {'end': 6531.215, 'src': 'embed', 'start': 6503.643, 'weight': 1, 'content': [{'end': 6508.364, 'text': 'So I also showed you earlier that no duplicate was created and the existing file was overwritten.', 'start': 6503.643, 'duration': 4.721}, {'end': 6512.306, 'text': "Supposing you don't want to do that, then you can just use the n flag,", 'start': 6508.724, 'duration': 3.582}, {'end': 6518.949, 'text': 'which would automatically indicate and tell the Linux Runtime engine that not to overwrite this particular file.', 'start': 6512.306, 'duration': 6.643}, {'end': 6521.97, 'text': 'Okay, so you can have any number of files there.', 'start': 6519.469, 'duration': 2.501}, {'end': 6525.272, 'text': 'So, even if the contents are different here, okay.', 'start': 6521.97, 'duration': 3.302}, {'end': 6531.215, 'text': "so even in case the new file that's being copied has different content, Okay, but it has the same name.", 'start': 6525.272, 'duration': 5.943}], 'summary': 'Linux runtime engine can prevent overwriting by using the n flag, allowing multiple files with the same name.', 'duration': 27.572, 'max_score': 6503.643, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo6503643.jpg'}, {'end': 6621.493, 'src': 'embed', 'start': 6590.139, 'weight': 0, 'content': [{'end': 6593.82, 'text': 'In the desktop, the file with only this much of content is there.', 'start': 6590.139, 'duration': 3.681}, {'end': 6596.541, 'text': "Now I'm gonna execute the command with the n flag.", 'start': 6594.401, 'duration': 2.14}, {'end': 6602.102, 'text': "So with the n flag, it's basically indicating that you're not supposed to overwrite the file.", 'start': 6597.601, 'duration': 4.501}, {'end': 6610.786, 'text': 'So when it says that, when it finds out that automobiles.txt is present over there also, in the desktop also, It would not copy the file at all.', 'start': 6602.503, 'duration': 8.283}, {'end': 6614.668, 'text': "Okay, so when I give enter and of course, so there's nothing here.", 'start': 6611.106, 'duration': 3.562}, {'end': 6621.493, 'text': 'now, If I go to the desktop okay, if I click on automobiles or txt here, you can see that KTM is not present.', 'start': 6614.668, 'duration': 6.825}], 'summary': 'Executing command with -n flag prevents file overwrite, ktm not present in automobiles.txt', 'duration': 31.354, 'max_score': 6590.139, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo6590139.jpg'}], 'start': 4882.839, 'title': 'Linux commands for file manipulation', 'summary': 'Covers using grep for string search, sort for file sorting, cp for file and directory copying, and mv for file moving, with explanations and demonstrations of various flags like -n, -r, -i, -v, -u, -n, -i, -u, and -v.', 'chapters': [{'end': 5518.529, 'start': 4882.839, 'title': 'Using grep and sort commands', 'summary': 'Covers the usage of grep command to search for specific strings in a text file, including case-insensitive search, line numbers and counting occurrences, and the sort command to alphabetically or numerically sort file contents and display in reverse order.', 'duration': 635.69, 'highlights': ["Using grep command to search for specific strings in a text file The speaker demonstrates using grep to search for the string 'yam' in the file 'automobiles.txt', obtaining two results - 'Lamborghini' and 'Yamaha'.", "Demonstrating case-insensitive search with grep using the -i flag The speaker explains using the -i flag with grep to perform a case-insensitive search, appending the word 'amber' to the file and obtaining the additional result when searching for 'am' in a case-insensitive fashion.", "Showing the usage of the -n flag with grep to display line numbers The speaker uses the -n flag with grep to display the line numbers where the search word is found, illustrating the presence of 'Lamborghini' and 'Yamaha' on lines six and seven.", "Explaining the functionality of -v and -c flags in grep command The speaker demonstrates using the -v flag to display results except for 'Yamaha' and 'Lamborghini', and the combination of -iv flags to exclude 'amber' from the output, as well as using the -c flag to display the number of times a string was found, obtaining a count of two occurrences for 'am'.", "Demonstrating the usage of sort command to alphabetically or numerically sort file contents The speaker explains the usage of the sort command to alphabetically sort the contents of a file, demonstrating sorting of the 'automobiles.txt' file and two files 'file1.txt' and 'file2.txt'."]}, {'end': 5805.282, 'start': 5519.383, 'title': 'Using sort and pipe commands', 'summary': 'Covers using the sort command with the -n flag to sort lines numerically and the pipe command to perform two operations in a single command, exemplified by using grep to search for a string and sorting the result.', 'duration': 285.899, 'highlights': ['Using sort command with -n flag to sort lines numerically The sort command with the -n flag is used to sort lines numerically, as demonstrated by sorting lines with numerical order, resulting in the lines being displayed in numerical order.', 'Explaining the pipe command to perform two operations in a single command The pipe command is utilized to execute two operations in a single command, exemplified by using grep to search for a string and sorting the result, thereby saving time and avoiding the need to mention the file name after sort again.']}, {'end': 6091.544, 'start': 5805.342, 'title': 'Linux tutorial: copying files and directories', 'summary': 'Covers the linux tutorial section on copying files and directories, explaining the cp command, demonstrating the copying of files and directories, and highlighting the importance of using the rflag for copying directories.', 'duration': 286.202, 'highlights': ['The CP command in Linux is used to copy files and directories, and it can be executed through the terminal by specifying the source and destination, with the rflag being necessary for copying directories.', 'The rflag in the CP command stands for recursive copy, allowing the copying of directories and hidden files, providing a comprehensive method for file and directory duplication.', 'The demonstration includes copying the automobiles.txt file to the desktop and the LMS folder to the documents directory, showcasing the practical application of the CP command.', 'The need for the rflag in the CP command is emphasized, as it is essential for copying directories, and without it, the command will only copy files, omitting directories.']}, {'end': 6633.405, 'start': 6091.929, 'title': 'Linux file copying flags', 'summary': 'Explains the usage of linux cp flags, including -i for interactive mode, -v for verbose mode, -u for updating the destination file, and -n for not overwriting files, highlighting the impact of each flag with specific examples.', 'duration': 541.476, 'highlights': ['The -V flag enables verbose mode, displaying the step-by-step process of file copying, providing detailed progress information. The -V flag in the CP command displays the step-by-step process of file copying, providing detailed progress information.', 'The -I flag initiates interactive mode, prompting the user before overwriting existing files during copying operations. The -I flag in the CP command prompts the user before overwriting existing files during copying operations, enabling interactive mode.', 'The -U flag updates the destination file only when the source file is different, preventing unnecessary overwriting. The -U flag in the CP command updates the destination file only when the source file is different, preventing unnecessary overwriting.', 'The -N flag prevents overwriting files by default, ensuring that existing files are not overwritten during copying operations. The -N flag in the CP command prevents overwriting files by default, ensuring that existing files are not overwritten during copying operations.']}, {'end': 7029.148, 'start': 6633.985, 'title': 'Copy and move commands in linux', 'summary': 'Explains the usage of the cp command to copy files from a specified path to the current directory, with a demonstration of copying a file using the terminal. it then proceeds to demonstrate the mv command for moving files to a specified destination, also showcasing the usage of flags such as -i, -u, and -v.', 'duration': 395.163, 'highlights': ['Demonstration of CP Command The chapter explains the usage of the CP command to copy files from a specified path to the current directory, with a demonstration of copying a file using the terminal.', 'Demonstration of MV Command The chapter proceeds to demonstrate the MV command for moving files to a specified destination, also showcasing the usage of flags such as -i, -u, and -v.']}], 'duration': 2146.309, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo4882839.jpg', 'highlights': ['Demonstrating the usage of sort command to alphabetically or numerically sort file contents', 'Using grep command to search for specific strings in a text file', 'Explaining the pipe command to perform two operations in a single command', 'The CP command in Linux is used to copy files and directories', 'Demonstration of CP Command', 'Demonstration of MV Command']}, {'end': 9822.212, 'segs': [{'end': 7070.111, 'src': 'embed', 'start': 7029.148, 'weight': 7, 'content': [{'end': 7033.79, 'text': 'so basically, the flags that can be used here are the same as the flags that can be used with the copy command.', 'start': 7029.148, 'duration': 4.642}, {'end': 7038.411, 'text': "So, guys, that's it with the move command and we can go to the next slide.", 'start': 7034.17, 'duration': 4.241}, {'end': 7044.393, 'text': 'okay?, We can go to the next topic, but before that there is one more functionality that I wanna show you with respect to both copy and move.', 'start': 7038.411, 'duration': 5.982}, {'end': 7047.434, 'text': 'I actually forgot to show you this aspect, okay?', 'start': 7044.793, 'duration': 2.641}, {'end': 7051.275, 'text': 'Now for this, let me first show you the GUI aspect.', 'start': 7047.794, 'duration': 3.481}, {'end': 7059.269, 'text': "okay?. I go to my Edureka and if you go to my documents, you'll find all these three text files and also my LMS folder, right?", 'start': 7051.275, 'duration': 7.994}, {'end': 7063.13, 'text': 'Now, whether be it copy or whether be it move, come on.', 'start': 7060.149, 'duration': 2.981}, {'end': 7066.37, 'text': "I'll show you how to copy like one file or two files or three files, okay?", 'start': 7063.13, 'duration': 3.24}, {'end': 7069.191, 'text': 'But what if you have like 25 files, right?', 'start': 7066.77, 'duration': 2.421}, {'end': 7070.111, 'text': 'So what you have like?', 'start': 7069.231, 'duration': 0.88}], 'summary': 'The tutorial covers using flags with the move command, gui demonstration, and copying multiple files.', 'duration': 40.963, 'max_score': 7029.148, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo7029148.jpg'}, {'end': 7417.646, 'src': 'embed', 'start': 7389.278, 'weight': 8, 'content': [{'end': 7391.039, 'text': "And currently, I'm going to do an LS.", 'start': 7389.278, 'duration': 1.761}, {'end': 7393.6, 'text': 'So some of our items are present in pictures.', 'start': 7391.139, 'duration': 2.461}, {'end': 7397.781, 'text': "So what I'm going to do is I'm going to move back to music.", 'start': 7393.62, 'duration': 4.161}, {'end': 7400.202, 'text': "If I do an LS, there's nothing over here.", 'start': 7398.681, 'duration': 1.521}, {'end': 7415.007, 'text': "So what I'll do is I'll say move slash home slash Edureka slash pictures dot asterisk first dot txt.", 'start': 7400.662, 'duration': 14.345}, {'end': 7417.646, 'text': 'And I want to move it to the current directory.', 'start': 7415.905, 'duration': 1.741}], 'summary': 'Moving pictures to music directory using ls command.', 'duration': 28.368, 'max_score': 7389.278, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo7389278.jpg'}, {'end': 7663.962, 'src': 'embed', 'start': 7636.903, 'weight': 1, 'content': [{'end': 7643.668, 'text': 'And if you want to create one parent directory and multiple subdirectories inside that directory, then you can use these flower brackets.', 'start': 7636.903, 'duration': 6.765}, {'end': 7646.89, 'text': 'Okay Inside the flower brackets, you can have the different folder names.', 'start': 7643.868, 'duration': 3.022}, {'end': 7651.173, 'text': 'Okay So let me just quickly go to the terminal and show you that aspect.', 'start': 7647.15, 'duration': 4.023}, {'end': 7653.455, 'text': 'So make directory.', 'start': 7651.834, 'duration': 1.621}, {'end': 7653.975, 'text': 'These were there.', 'start': 7653.495, 'duration': 0.48}, {'end': 7656.377, 'text': "And now I'm going to give minus P.", 'start': 7654.716, 'duration': 1.661}, {'end': 7659.459, 'text': 'And when I execute this, everything would have been created.', 'start': 7656.377, 'duration': 3.082}, {'end': 7663.962, 'text': 'So let me do a CD folder 2.', 'start': 7659.759, 'duration': 4.203}], 'summary': 'Using flower brackets to create parent directory with multiple subdirectories; demonstrated in terminal.', 'duration': 27.059, 'max_score': 7636.903, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo7636903.jpg'}, {'end': 8230.237, 'src': 'embed', 'start': 8201.712, 'weight': 2, 'content': [{'end': 8207.175, 'text': 'so let me just show to you once so inside f2 we have three folders folder 2, folder 3 and folder 4.', 'start': 8201.712, 'duration': 5.463}, {'end': 8212.303, 'text': 'so With the DIR command we cannot definitely remove it.', 'start': 8207.175, 'duration': 5.128}, {'end': 8215.065, 'text': 'but with F2, we have a chance of removing it.', 'start': 8212.303, 'duration': 2.762}, {'end': 8219.029, 'text': "okay?. That's because we can make use of the R flag here, okay?", 'start': 8215.065, 'duration': 3.964}, {'end': 8221.209, 'text': 'But however, this will also.', 'start': 8219.388, 'duration': 1.821}, {'end': 8223.813, 'text': 'it will delete F2 and its subfolders, okay?', 'start': 8221.209, 'duration': 2.604}, {'end': 8230.237, 'text': 'So let me do an LS and if you can see here, Initially under folder one we had F2 and these three.', 'start': 8223.893, 'duration': 6.344}], 'summary': 'Using the r flag with f2 command can delete subfolders including f2.', 'duration': 28.525, 'max_score': 8201.712, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo8201712.jpg'}, {'end': 8381.587, 'src': 'embed', 'start': 8355.218, 'weight': 0, 'content': [{'end': 8361.253, 'text': 'I have the permissions in So for desktop, I have the promotion sets, and then I have the other components.', 'start': 8355.218, 'duration': 6.035}, {'end': 8364.875, 'text': "I'm gonna explain what this entire component, what the entire row means.", 'start': 8361.313, 'duration': 3.562}, {'end': 8368.777, 'text': "So to not let you get too complicated, first I'm gonna explain only this part.", 'start': 8365.415, 'duration': 3.362}, {'end': 8371.418, 'text': 'The first 10 characters.', 'start': 8369.597, 'duration': 1.821}, {'end': 8377.906, 'text': "if you see here The first 10 characters are these, and I will explain this part first and then I'll explain this.", 'start': 8371.418, 'duration': 6.488}, {'end': 8381.587, 'text': "set these three blocks and then I'll explain the remaining blocks, okay?", 'start': 8377.906, 'duration': 3.681}], 'summary': 'Explanation of desktop permissions and components, focusing on the first 10 characters and subsequent blocks.', 'duration': 26.369, 'max_score': 8355.218, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo8355218.jpg'}, {'end': 8437.413, 'src': 'embed', 'start': 8410.417, 'weight': 12, 'content': [{'end': 8415.28, 'text': "And if there is B over here in the spot of the first letter, then it's a binary special file.", 'start': 8410.417, 'duration': 4.863}, {'end': 8418.274, 'text': 'So basically, there can be four different letters over here.', 'start': 8415.851, 'duration': 2.423}, {'end': 8423.901, 'text': 'It can be either a hyphen or a D, B, or C, representing four different aspects.', 'start': 8418.334, 'duration': 5.567}, {'end': 8427.765, 'text': 'So that is the first information that you have about that particular file.', 'start': 8424.381, 'duration': 3.384}, {'end': 8430.729, 'text': 'And then you have three different blocks.', 'start': 8428.086, 'duration': 2.643}, {'end': 8434.293, 'text': 'So the next nine letters are going to determine the user permissions.', 'start': 8431.129, 'duration': 3.164}, {'end': 8437.413, 'text': 'and those nine are divided into three, three, three.', 'start': 8435.33, 'duration': 2.083}], 'summary': 'File type determined by first letter, with 4 possible aspects. user permissions are represented by next 9 letters.', 'duration': 26.996, 'max_score': 8410.417, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo8410417.jpg'}, {'end': 8555.023, 'src': 'embed', 'start': 8517.479, 'weight': 10, 'content': [{'end': 8522.422, 'text': 'So all the users, a part of that group, will have the read, write, and execute permissions.', 'start': 8517.479, 'duration': 4.943}, {'end': 8525.984, 'text': "Okay, but whereas the last three here, it stands for other users' permission.", 'start': 8522.922, 'duration': 3.062}, {'end': 8529.725, 'text': 'So there can be multiple users, right? The same system can have multiple users.', 'start': 8526.524, 'duration': 3.201}, {'end': 8531.546, 'text': 'One, of course, will be the root user.', 'start': 8530.486, 'duration': 1.06}, {'end': 8532.747, 'text': 'The other will be the owner.', 'start': 8531.947, 'duration': 0.8}, {'end': 8536.52, 'text': 'Or you, and besides you, they can be any number of future.', 'start': 8533.499, 'duration': 3.021}, {'end': 8539.66, 'text': 'it can be your friends, your colleagues or you know other people.', 'start': 8536.52, 'duration': 3.14}, {'end': 8544.861, 'text': 'so this others represents that, and If you have a blank in any place, okay.', 'start': 8539.66, 'duration': 5.201}, {'end': 8547.702, 'text': "so in this case there's a blank over here in place of W.", 'start': 8544.861, 'duration': 2.841}, {'end': 8548.162, 'text': "There's a blank.", 'start': 8547.702, 'duration': 0.46}, {'end': 8549.782, 'text': 'it means that this others.', 'start': 8548.162, 'duration': 1.62}, {'end': 8551.242, 'text': "They don't have the right axis.", 'start': 8549.902, 'duration': 1.34}, {'end': 8554.163, 'text': 'They only have the read axis and the execute axis.', 'start': 8551.242, 'duration': 2.921}, {'end': 8555.023, 'text': 'all right.', 'start': 8554.163, 'duration': 0.86}], 'summary': 'Users have read, write, and execute permissions; others have read and execute.', 'duration': 37.544, 'max_score': 8517.479, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo8517479.jpg'}, {'end': 9118.35, 'src': 'embed', 'start': 9083.562, 'weight': 5, 'content': [{'end': 9085.563, 'text': 'so this is the only command that you need to run.', 'start': 9083.562, 'duration': 2.001}, {'end': 9092.948, 'text': 'okay, if you just give pseudo yum install and if you give the package name, then that particular package will get updated.', 'start': 9085.563, 'duration': 7.385}, {'end': 9096.831, 'text': 'okay, the pseudo is something that you would recognize from what I told you earlier.', 'start': 9092.948, 'duration': 3.883}, {'end': 9101.534, 'text': 'the pseudo is to we give it to to execute this command as a root user.', 'start': 9096.831, 'duration': 4.703}, {'end': 9109.061, 'text': 'Okay, and if you see that there are two other lines and the only difference between these three lines is the letter, that the word we are using here,', 'start': 9102.094, 'duration': 6.967}, {'end': 9118.35, 'text': 'Okay, so in the first case, in case of any red hat on the price, our Linux system or even sent OS right, which falls under red hat, we use yum.', 'start': 9109.061, 'duration': 9.289}], 'summary': "Using 'pseudo yum install' updates a package; 'pseudo' executes as root user.", 'duration': 34.788, 'max_score': 9083.562, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo9083562.jpg'}, {'end': 9628.827, 'src': 'embed', 'start': 9600.734, 'weight': 3, 'content': [{'end': 9604.256, 'text': 'there may be times when you might want to, by default this Click on.', 'start': 9600.734, 'duration': 3.522}, {'end': 9610.179, 'text': 'yes, so what you can do at that time is you can just go back here, Soto young, you have a flag here,', 'start': 9604.256, 'duration': 5.923}, {'end': 9616.962, 'text': 'You can just put hyphen right and if you then install it, then it will not ask you to not get into this interactive mode.', 'start': 9610.179, 'duration': 6.783}, {'end': 9618.263, 'text': 'So it will take this.', 'start': 9616.962, 'duration': 1.301}, {'end': 9619.203, 'text': 'why? why flag?', 'start': 9618.263, 'duration': 0.94}, {'end': 9623.205, 'text': 'why option automatically, and it will, you know, install the Java package?', 'start': 9619.203, 'duration': 4.002}, {'end': 9625.566, 'text': 'So that is what I want to show you.', 'start': 9623.726, 'duration': 1.84}, {'end': 9626.287, 'text': "that's what I want to tell you.", 'start': 9625.566, 'duration': 0.721}, {'end': 9628.827, 'text': "so that's how you install Java.", 'start': 9626.847, 'duration': 1.98}], 'summary': 'You can install java without interactive mode by using the hyphen-right flag, ensuring automatic installation.', 'duration': 28.093, 'max_score': 9600.734, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo9600734.jpg'}], 'start': 7029.148, 'title': 'Linux command line interface', 'summary': 'Covers the usage of cp, mv, mkdir, rmdir, rm, and chmod commands, demonstrating file and directory operations, permissions, and working with linux repositories, with a focus on the linux command line interface.', 'chapters': [{'end': 7442.046, 'start': 7029.148, 'title': 'Using cp and mv commands', 'summary': 'Covers the usage of cp and mv commands, demonstrating how to copy and move files using regular expressions and providing examples of copying and moving multiple files and folders. it also shows how to use the commands to transfer files between directories, with a focus on the linux command line interface.', 'duration': 412.898, 'highlights': ['The CP and MV commands provide options for copying and moving files using regular expressions, facilitating the transfer of files of specific formats, such as .txt files, between directories.', 'The demonstration includes examples of copying and moving multiple files and folders, highlighting the functionality for transferring a large number of files efficiently.', 'The focus on the Linux command line interface emphasizes the practical application of the CP and MV commands for managing file transfers between directories.']}, {'end': 7800.984, 'start': 7442.226, 'title': 'Make directory commands', 'summary': 'Covers the usage of the mkdir command for creating new directories and subdirectories, explaining the syntax, limitations, and the use of the -p flag for creating parent directories and subdirectories.', 'duration': 358.758, 'highlights': ['MKDIR command is used to create new directories. The MKDIR command is used to create new directories or folders, and the syntax involves specifying MKDIR followed by the directory path.', 'MKDIR can create multiple subdirectories using the -P flag. The -P flag with the MKDIR command allows the creation of both a new parent directory and subdirectories, especially useful when creating multiple subdirectories under one directory.', 'MKDIR supports creating multiple directories inside a parent directory using flower brackets. Using flower brackets with the MKDIR command allows the creation of multiple directories inside a parent directory, providing a convenient way to create several subdirectories at once.']}, {'end': 8248.085, 'start': 7800.984, 'title': 'File system commands', 'summary': 'Covers the usage of rmdir and rm commands to create and remove directories, including handling of subdirectories and non-empty directories.', 'duration': 447.101, 'highlights': ['The rm command can be used to remove non-empty directories using the r flag, providing more flexibility than the rmdir command.', 'The rmdir command can remove directories and subdirectories using the -P flag, demonstrating the ability to delete parent and child directories simultaneously.', 'The process of creating, removing, and handling directories is demonstrated through practical examples and command executions in the terminal.']}, {'end': 9039.685, 'start': 8248.306, 'title': 'Linux file permissions and modifying access', 'summary': 'Covers the advantages of using the r flag in linux file management, the importance of user permissions, and the process of modifying access permissions using the chmod command, with examples and explanations.', 'duration': 791.379, 'highlights': ['The R flag in Linux file management allows printing of deletion status when used with the V flag, providing visibility into deleted items and how they were deleted. Using the R flag with the V flag provides visibility into deleted items and their deletion process.', 'Understanding user permissions is crucial for Linux administrators, involving control of access for different users through read, write, and execute permissions. Linux administrators need to understand user permissions for controlling access through read, write, and execute permissions.', 'The LS -L command displays file permissions in long format, showing user, group, and other permissions for each file and directory. The LS -L command displays file permissions in long format, including user, group, and other permissions.', 'The chmod command is used to modify access permissions for both files and directories, with options to add, remove, or replace specific permissions for users, groups, and others. The chmod command enables modification of access permissions for files and directories, including adding, removing, or replacing specific permissions.', 'The chown and chgrp commands allow changing the owner and group ownership of files, providing flexibility in managing file ownership. The chown and chgrp commands offer flexibility in changing the owner and group ownership of files.']}, {'end': 9822.212, 'start': 9039.685, 'title': 'Working with linux repositories', 'summary': "Explains how to work with linux repositories, including commands to update software and install packages like java, hadoop, docker, php, and others using 'yum' and 'apt-get' commands, as well as setting up environment variables for java.", 'duration': 782.527, 'highlights': ["Commands to update software and install packages The chapter explains using 'yum' and 'apt-get' commands to update software and install packages like Java, Hadoop, Docker, PHP, and others.", "Usage of 'yum' and 'apt-get' commands The distinction between using 'yum' for Red Hat-based systems like CentOS, and 'apt-get' for Debian-based systems like Ubuntu is explained, with specific examples for installing different packages.", 'Setting up environment variables for Java The process of setting environment variables for Java by editing the dot bashrc file and specifying the path to the Java installation is detailed, along with the command to sync the updated environment variables.']}], 'duration': 2793.064, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo7029148.jpg', 'highlights': ['The CP and MV commands provide options for copying and moving files using regular expressions, facilitating the transfer of files of specific formats, such as .txt files, between directories.', 'The demonstration includes examples of copying and moving multiple files and folders, highlighting the functionality for transferring a large number of files efficiently.', 'The focus on the Linux command line interface emphasizes the practical application of the CP and MV commands for managing file transfers between directories.', 'MKDIR can create multiple subdirectories using the -P flag. The -P flag with the MKDIR command allows the creation of both a new parent directory and subdirectories, especially useful when creating multiple subdirectories under one directory.', 'Using flower brackets with the MKDIR command allows the creation of multiple directories inside a parent directory, providing a convenient way to create several subdirectories at once.', 'The rm command can be used to remove non-empty directories using the r flag, providing more flexibility than the rmdir command.', 'The R flag in Linux file management allows printing of deletion status when used with the V flag, providing visibility into deleted items and how they were deleted. Using the R flag with the V flag provides visibility into deleted items and their deletion process.', 'The LS -L command displays file permissions in long format, showing user, group, and other permissions for each file and directory. The LS -L command displays file permissions in long format, including user, group, and other permissions.', 'The chmod command is used to modify access permissions for both files and directories, with options to add, remove, or replace specific permissions for users, groups, and others. The chmod command enables modification of access permissions for files and directories, including adding, removing, or replacing specific permissions.', 'The chown and chgrp commands allow changing the owner and group ownership of files, providing flexibility in managing file ownership.', "Commands to update software and install packages The chapter explains using 'yum' and 'apt-get' commands to update software and install packages like Java, Hadoop, Docker, PHP, and others.", "Usage of 'yum' and 'apt-get' commands The distinction between using 'yum' for Red Hat-based systems like CentOS, and 'apt-get' for Debian-based systems like Ubuntu is explained, with specific examples for installing different packages.", 'Setting up environment variables for Java The process of setting environment variables for Java by editing the dot bashrc file and specifying the path to the Java installation is detailed, along with the command to sync the updated environment variables.']}, {'end': 11786.183, 'segs': [{'end': 9878.276, 'src': 'embed', 'start': 9842.907, 'weight': 1, 'content': [{'end': 9845.029, 'text': "So they'll be in compressed form and you'll have to extract them.", 'start': 9842.907, 'duration': 2.122}, {'end': 9847.65, 'text': 'in Linux we have an equivalent format.', 'start': 9845.989, 'duration': 1.661}, {'end': 9852.231, 'text': 'so in Linux it is either the tar file or the gzip and the gzip files.', 'start': 9847.65, 'duration': 4.581}, {'end': 9854.252, 'text': 'okay, so tar is the preferred option.', 'start': 9852.231, 'duration': 2.021}, {'end': 9858.213, 'text': "so I'm going to show you how to compress and decompress a file with dot tar format.", 'start': 9854.252, 'duration': 3.961}, {'end': 9861.574, 'text': 'but, however, even gzip and gzip is something that can be used.', 'start': 9858.213, 'duration': 3.361}, {'end': 9868.537, 'text': "if you want to compress a file with the gz format, okay, then you got to use this command, but, however, if you're going to decompress it,", 'start': 9861.574, 'duration': 6.963}, {'end': 9869.797, 'text': 'then you got to give gzip.', 'start': 9868.537, 'duration': 1.26}, {'end': 9878.276, 'text': 'okay, and the syntax is here okay, but however, with tar, for both compressing and decompressing, you will use the same tar command itself.', 'start': 9869.797, 'duration': 8.479}], 'summary': 'In linux, use tar for compressing and decompressing files; gzip is an alternative option.', 'duration': 35.369, 'max_score': 9842.907, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo9842907.jpg'}, {'end': 10471.749, 'src': 'embed', 'start': 10443.826, 'weight': 2, 'content': [{'end': 10448.787, 'text': 'And similarly, there are all the directories where your shell will look for.', 'start': 10443.826, 'duration': 4.961}, {'end': 10451.088, 'text': 'They will all be specified in this part.', 'start': 10448.927, 'duration': 2.161}, {'end': 10454.529, 'text': 'So similarly, you have another command that is for home.', 'start': 10451.508, 'duration': 3.021}, {'end': 10458.49, 'text': 'This will print the home directory, and my home directory is home slash edureka.', 'start': 10454.929, 'duration': 3.561}, {'end': 10463.165, 'text': 'You can also alternatively print your host name right?', 'start': 10459.15, 'duration': 4.015}, {'end': 10466.647, 'text': 'So my host name is localhost.localadmin.', 'start': 10463.785, 'duration': 2.862}, {'end': 10468.768, 'text': 'okay?. So this is my host name right?', 'start': 10466.647, 'duration': 2.121}, {'end': 10471.749, 'text': 'So, basically, my host name is localhost.', 'start': 10469.088, 'duration': 2.661}], 'summary': 'Explanation of shell directories and commands for printing home directory and hostname.', 'duration': 27.923, 'max_score': 10443.826, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo10443826.jpg'}, {'end': 10543.598, 'src': 'embed', 'start': 10516.537, 'weight': 3, 'content': [{'end': 10520.58, 'text': 'it can be piped along with the grep command to find patterns of text in the file.', 'start': 10516.537, 'duration': 4.043}, {'end': 10529.107, 'text': "okay, now, what this means is that you'll have multiple different files, or you know, multiple, a lot of data and probably even one file.", 'start': 10520.58, 'duration': 8.527}, {'end': 10534.671, 'text': 'okay, with the help of regular expression, what you can do is you can search for patterns of that data.', 'start': 10529.107, 'duration': 5.564}, {'end': 10541.636, 'text': 'so you can use the grep to search through data and you can use the regular expressions to search through patterns of data, that kind of a pattern.', 'start': 10534.671, 'duration': 6.965}, {'end': 10543.598, 'text': 'Supposing you have a spelling mistake in the middle.', 'start': 10541.936, 'duration': 1.662}], 'summary': 'Using grep with regular expressions to find text patterns in files.', 'duration': 27.061, 'max_score': 10516.537, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo10516537.jpg'}, {'end': 11658.367, 'src': 'embed', 'start': 11633.348, 'weight': 0, 'content': [{'end': 11641.416, 'text': 'then you can see that by running this command PS Hyphen, space UX or you can do this, or you can even run PS hyphen, PID.', 'start': 11633.348, 'duration': 8.068}, {'end': 11646.459, 'text': 'So when you do that, you will only get the list of processes that are being started by you.', 'start': 11641.856, 'duration': 4.603}, {'end': 11647.58, 'text': "Okay, so you're the user.", 'start': 11646.759, 'duration': 0.821}, {'end': 11649.781, 'text': "I'm the user and my name is Ed Rekha, right?", 'start': 11647.58, 'duration': 2.201}, {'end': 11652.883, 'text': 'So all the processes which I have started right?', 'start': 11650.262, 'duration': 2.621}, {'end': 11654.584, 'text': 'So all my processes will be visible.', 'start': 11653.043, 'duration': 1.541}, {'end': 11658.367, 'text': "Of course, the other user's process will not be visible to me.", 'start': 11654.945, 'duration': 3.422}], 'summary': "Using 'ps -ux' or 'ps -pid' commands, users can view their own processes on the system.", 'duration': 25.019, 'max_score': 11633.348, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo11633348.jpg'}, {'end': 11725.4, 'src': 'embed', 'start': 11692.628, 'weight': 5, 'content': [{'end': 11695.891, 'text': "so you know that we've started a particular process.", 'start': 11692.628, 'duration': 3.263}, {'end': 11706.119, 'text': 'okay, we started the Firefox process that time and what I can do is I can find out the PID of that particular process by giving this command PID off and what is the name of the process.', 'start': 11695.891, 'duration': 10.228}, {'end': 11707.24, 'text': "so in my case it's Firefox.", 'start': 11706.119, 'duration': 1.121}, {'end': 11712.384, 'text': "so I'm just going to give PID off and Firefox that will give me the PID of that particular process.", 'start': 11707.24, 'duration': 5.144}, {'end': 11716.867, 'text': "5836. okay, I'm gonna clear screen.", 'start': 11712.384, 'duration': 4.483}, {'end': 11719.017, 'text': "okay, I'm gonna run the process again.", 'start': 11716.867, 'duration': 2.15}, {'end': 11725.4, 'text': "okay, I'm gonna start Firefox again and when I do this there is a new instance of Firefox that starts.", 'start': 11719.017, 'duration': 6.383}], 'summary': 'Started firefox process with pid 5836, launched new instance later.', 'duration': 32.772, 'max_score': 11692.628, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo11692628.jpg'}], 'start': 9822.752, 'title': 'Linux operations and management', 'summary': 'Covers working with linux repositories, tar files, environment variables, and regular expressions. it emphasizes the process of compressing and decompressing files using tar and gzip formats and the use of grep commands with regular expressions for pattern searching. it also discusses managing linux processes, including methods for viewing and manipulating processes.', 'chapters': [{'end': 9919.377, 'start': 9822.752, 'title': 'Working with linux repositories and tar files', 'summary': 'Covers working with linux repositories and tar files, highlighting the process of compressing and decompressing files using tar and gzip formats, emphasizing the preferred option of tar files in linux and the essential syntax for compressing and decompressing files.', 'duration': 96.625, 'highlights': ['The chapter emphasizes the preferred option of tar files in Linux for compressing and decompressing files, while also mentioning the usability of gzip and gzip formats.', 'It details the essential syntax for compressing and decompressing files using the tar command, specifying the flags for compression (-C) and decompression (-X) and the importance of the V for verbose and F for indicating the file to be compressed.', 'The chapter also explains the usage of gzip for compressing files with the gz format and decompressing them using the gzip command.']}, {'end': 10150.111, 'start': 9919.377, 'title': 'Compressing and extracting tar files', 'summary': 'Discusses the importance of using tar files in linux for compressing and transferring large packages, with an example of compressing a 4096 mb folder into a 100 or 200 mb tar file, and the process of extracting and transferring it, with the command for compression and decompression.', 'duration': 230.734, 'highlights': ['The process of compressing a 4096 MB folder into a 100 or 200 MB tar file is illustrated, emphasizing the benefits of using tar files for compressing and transferring large packages. The chapter demonstrates the compression of a 4096 MB folder into a 100 or 200 MB tar file, highlighting the efficiency of using tar files for compressing and transferring large packages, ultimately saving on bandwidth.', "The command 'tar-cvf' is explained for compressing a folder into a tar file, providing a practical demonstration of the compression process. The practical demonstration of using the command 'tar-cvf' to compress a folder into a tar file is provided, offering a clear explanation of the compression process.", "The command 'tar xvf' is introduced for decompressing a tar file, with a practical example of using it to extract a package. The introduction of the command 'tar xvf' for decompressing a tar file, coupled with a practical example of using it to extract a package, is presented in the chapter."]}, {'end': 10570.375, 'start': 10151.372, 'title': 'Managing environment variables in linux', 'summary': 'Introduces environment variables in linux, highlighting their role in controlling software packages behavior and specifying installation paths, emphasizing the importance of setting environment variables for java and hadoop, and demonstrating common environment variables and their functions, followed by an overview of regular expressions usage with grep command for pattern searching in data.', 'duration': 419.003, 'highlights': ['Environment variables control the behavior of software packages installed in Linux and specify installation paths. Environment variables play a crucial role in controlling the behavior of software packages installed in Linux and specifying the paths where the packages have been installed.', 'Setting environment variables for Java and Hadoop is essential for the proper functioning of Hadoop, which is based on the Java framework. It is important to set environment variables for both Java and Hadoop as Hadoop, being based on the Java framework, requires Java to function properly.', 'Demonstrating common environment variables such as printenv, echo $home, echo $path, and their functions in displaying lists of variables and directories, home directory, host name, language, and bash version. The transcript demonstrates common environment variables such as printenv, echo $home, echo $path, and their functions in displaying lists of variables and directories, home directory, host name, language, and bash version.', 'Overview of regular expressions (regex) usage with the grep command for pattern searching in data, with an example illustrating the importance of pattern searching for identifying spelling mistakes in files. The chapter provides an overview of regular expressions (regex) usage with the grep command for pattern searching in data, emphasizing its utility in identifying patterns, such as spelling mistakes, within files.']}, {'end': 10793.842, 'start': 10570.615, 'title': 'Using regular expressions with grep', 'summary': 'Covers using regular expressions with the grep command to search for patterns of text in files, explaining common regular expressions such as dot, caret, dollar, asterisk, question mark, brackets, and backslash, with examples of their usage in searching for specific patterns in files.', 'duration': 223.227, 'highlights': ['Explaining the common regular expressions such as dot, caret, dollar, asterisk, question mark, brackets, and backslash, with examples of their usage in searching for specific patterns in files.', "Using the pipe to use one operation's output as the input to another operation when working with regular expressions and grep command.", 'Demonstrating how to search for specific patterns in files using regular expressions and the grep command with examples of finding strings starting or ending with specific characters.', "Explaining the usage of the caret symbol to match the start of a string and providing an example of using 'carrot a' to display lines starting with the character 'a' in a file.", "Demonstrating the usage of the dollar symbol to match the end of a string and providing an example of searching for strings ending with 'XT' in a file.", 'Providing examples of using asterisk and question mark to match preceding characters zero or more times and exactly one or more times respectively, and explaining their functionality.', 'Introducing the usage of brackets to group multiple regular expressions for searching patterns in files and the usage of backslash to represent special characters.']}, {'end': 11098.652, 'start': 10793.842, 'title': 'Using regular expressions in linux', 'summary': 'Covers the use of grep command with regular expressions for case-insensitive searching, filtering strings starting with a particular character, and identifying patterns with specified occurrences of characters, including examples and demonstrations.', 'duration': 304.81, 'highlights': ["Using grep command with regular expressions for case-insensitive searching. The demonstration showed using grep -V for case-insensitive searching to list strings where A is not present, and using -i for case-insensitive searching to list all strings where A is present, whether it's a capital A or small a.", "Filtering strings starting with a particular character using regular expressions. The explanation included using the caret command to search for strings starting with a particular character, and removing the hyphen V to list all strings where A is present, whether it's a capital A or small a.", 'Identifying patterns with specified occurrences of characters using regular expressions. The demonstration involved using asterisk to search for zero or more occurrences of a character, and using two dot symbols to fill the characters in a sequence, thereby generating patterns with numbers and combinations of characters.']}, {'end': 11786.183, 'start': 11099.053, 'title': 'Linux processes and management', 'summary': "Delves into the importance of processes in linux administration, highlighting the definition of processes, differentiating foreground and background processes, methods to view and manage processes, and understanding process attributes such as pid, priority, memory usage, and status. it also covers commands like 'top', 'ps', and 'pid' for process management and manipulation.", 'duration': 687.13, 'highlights': ['Processes are essential in Linux administration, encompassing instances of programs, and multiple processes can run simultaneously. Processes are crucial in Linux administration, constituting instances of programs, and enabling the simultaneous execution of multiple processes.', "Differentiating between foreground and background processes is essential, and methods like 'top' command help in viewing running processes and their attributes. Understanding the distinction between foreground and background processes is fundamental, and tools like the 'top' command facilitate the observation of active processes and their characteristics.", 'Attributes of processes such as PID, priority, memory usage, and status are crucial for understanding and managing running processes. Comprehending and managing running processes necessitates an understanding of attributes like PID, priority, memory usage, and status.', "Commands like 'PS', 'PID', and 'kill' aid in viewing, identifying, and terminating specific processes, providing essential tools for process management and manipulation. Utilities such as 'PS', 'PID', and 'kill' are instrumental in observing, identifying, and terminating specific processes, offering indispensable capabilities for process management and manipulation."]}], 'duration': 1963.431, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo9822752.jpg', 'highlights': ['The chapter emphasizes the preferred option of tar files in Linux for compressing and decompressing files, while also mentioning the usability of gzip and gzip formats.', 'The process of compressing a 4096 MB folder into a 100 or 200 MB tar file is illustrated, emphasizing the benefits of using tar files for compressing and transferring large packages.', 'Environment variables play a crucial role in controlling the behavior of software packages installed in Linux and specifying the paths where the packages have been installed.', 'The chapter provides an overview of regular expressions (regex) usage with the grep command for pattern searching in data, emphasizing its utility in identifying patterns, such as spelling mistakes, within files.', 'Explaining the common regular expressions such as dot, caret, dollar, asterisk, question mark, brackets, and backslash, with examples of their usage in searching for specific patterns in files.', 'Processes are crucial in Linux administration, constituting instances of programs, and enabling the simultaneous execution of multiple processes.']}, {'end': 13239.499, 'segs': [{'end': 11842.016, 'src': 'embed', 'start': 11810.743, 'weight': 0, 'content': [{'end': 11813.083, 'text': 'and then it will prompt you to set a password for that person.', 'start': 11810.743, 'duration': 2.34}, {'end': 11820.125, 'text': 'And similarly, if you want to delete that particular user, you can say user delete, and then the name of that username, whichever you want to delete.', 'start': 11813.683, 'duration': 6.442}, {'end': 11827.102, 'text': 'Okay, but one thing is that you go to always use sudo before that because these commands cannot be executed by users like us.', 'start': 11820.956, 'duration': 6.146}, {'end': 11828.904, 'text': 'Okay, we need root access for that.', 'start': 11827.222, 'duration': 1.682}, {'end': 11832.747, 'text': 'We need only root users who have super user permissions can do this.', 'start': 11829.284, 'duration': 3.463}, {'end': 11835.23, 'text': "So that's why we use sudo and we enter the password for it.", 'start': 11832.767, 'duration': 2.463}, {'end': 11842.016, 'text': 'Okay Now one thing you need to notice that when a user is created then by default is also added to a particular group.', 'start': 11836.13, 'duration': 5.886}], 'summary': 'Instructions on user management with sudo access and group addition.', 'duration': 31.273, 'max_score': 11810.743, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo11810743.jpg'}, {'end': 12149.225, 'src': 'embed', 'start': 12116.423, 'weight': 2, 'content': [{'end': 12117.724, 'text': "It's also called the SSH.", 'start': 12116.423, 'duration': 1.301}, {'end': 12121.606, 'text': 'And this is for gaining remote access of a system.', 'start': 12118.464, 'duration': 3.142}, {'end': 12125.549, 'text': 'Okay, so you can get access to a system which is remotely located.', 'start': 12122.066, 'duration': 3.483}, {'end': 12129.852, 'text': 'so without you physically accessing that system, You can get access through this SSH server.', 'start': 12125.549, 'duration': 4.303}, {'end': 12131.914, 'text': "Okay, so that's what the SSH does.", 'start': 12130.053, 'duration': 1.861}, {'end': 12133.435, 'text': "Okay, It's called secure shell.", 'start': 12132.194, 'duration': 1.241}, {'end': 12135.637, 'text': 'The connection is called secure shell connection.', 'start': 12133.435, 'duration': 2.202}, {'end': 12142.543, 'text': "So all the other topics in this session, today's session, they were all basic stuff which any user could learn.", 'start': 12136.3, 'duration': 6.243}, {'end': 12149.225, 'text': "but this one, this SSH, is something it's a little advanced, and this is with respect to networking.", 'start': 12142.543, 'duration': 6.682}], 'summary': 'Ssh enables remote access to systems without physical access, a more advanced topic in networking.', 'duration': 32.802, 'max_score': 12116.423, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo12116423.jpg'}, {'end': 12197.985, 'src': 'embed', 'start': 12172.314, 'weight': 5, 'content': [{'end': 12177.815, 'text': "But in my case it'll be two different VMs and in general, it'll be two different systems which are remotely located,", 'start': 12172.314, 'duration': 5.501}, {'end': 12180.856, 'text': 'and you can get access to them by the help of this SSH.', 'start': 12177.815, 'duration': 3.041}, {'end': 12188.939, 'text': 'And how is that possible? By setting the IP address and all those things, right? You set the IP address in two different places.', 'start': 12181.136, 'duration': 7.803}, {'end': 12192.54, 'text': 'You set one system as the master, and you set the other system as the slave.', 'start': 12189.299, 'duration': 3.241}, {'end': 12197.985, 'text': 'You. basically what you do is you have something called as the ATC hosts, okay?', 'start': 12193.861, 'duration': 4.124}], 'summary': 'Setting up two different systems with ssh access, one as master and one as slave.', 'duration': 25.671, 'max_score': 12172.314, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo12172314.jpg'}, {'end': 12717.734, 'src': 'embed', 'start': 12691.691, 'weight': 3, 'content': [{'end': 12697.514, 'text': 'Or let me give 103, because this is the slave, right? I can give 103 here, 103 slash 24.', 'start': 12691.691, 'duration': 5.823}, {'end': 12700.357, 'text': 'When I give enter, the IP address would have been added.', 'start': 12697.514, 'duration': 2.843}, {'end': 12706.122, 'text': 'So if I do the if config, now you can see that F1 has this address, 192.168.56.103.', 'start': 12700.757, 'duration': 5.365}, {'end': 12711.107, 'text': 'This is what I added some time back, right? This is what I added here.', 'start': 12706.122, 'duration': 4.985}, {'end': 12717.734, 'text': "Now similarly, I need to go back to my master VM and I've deleted the IP address from here.", 'start': 12711.528, 'duration': 6.206}], 'summary': 'Configured ip address 192.168.56.103 for slave vm f1.', 'duration': 26.043, 'max_score': 12691.691, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo12691691.jpg'}, {'end': 12797.21, 'src': 'embed', 'start': 12770.317, 'weight': 4, 'content': [{'end': 12778.181, 'text': 'How will you access the etc slash hosts file? You need to first go to your home directory and from here, let me clear the screen, home directory.', 'start': 12770.317, 'duration': 7.864}, {'end': 12785.583, 'text': "So here, you've got to give sudo gedit slash etc slash hosts.", 'start': 12778.939, 'duration': 6.644}, {'end': 12788.084, 'text': "When you hit enter, you'll open this file.", 'start': 12786.043, 'duration': 2.041}, {'end': 12790.626, 'text': 'This file is called the hosts slash etc file.', 'start': 12788.124, 'duration': 2.502}, {'end': 12793.928, 'text': "So in here, I've already set my IP addresses.", 'start': 12790.966, 'duration': 2.962}, {'end': 12797.21, 'text': 'Now, I can just delete it for namesake.', 'start': 12795.008, 'duration': 2.202}], 'summary': "Access the etc/hosts file by using 'sudo gedit /etc/hosts' in the home directory.", 'duration': 26.893, 'max_score': 12770.317, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo12770317.jpg'}], 'start': 11786.183, 'title': 'Managing linux users, ssh, and vms', 'summary': 'Covers managing users and groups in linux using commands like useradd and groupadd, ssh for remote system access, setting up and pinging two vm machines, and establishing ssh connection and remote access between vms with specific ip addresses.', 'chapters': [{'end': 12115.563, 'start': 11786.183, 'title': 'Managing users and groups in linux', 'summary': 'Covers the process of creating, adding to groups, and deleting users and groups in linux using commands like useradd, usermod, and groupadd, requiring sudo access, with the demonstration of adding a user and a group in the terminal.', 'duration': 329.38, 'highlights': ["Creation of users using 'useradd' command, requiring sudo access, demonstrated by adding a user 'Vargan' with user ID 502. Demonstrates the process of creating a user using the 'useradd' command, showcasing the requirement of sudo access and the successful addition of the user 'Vargan' with user ID 502.", "Setting a password for a user using 'sudo password' command, with successful password update. Illustrates the process of setting a password for a user using the 'sudo password' command and confirms the successful password update for the user.", "Adding a group using 'groupadd' command, demonstrated by creating a group 'INST' in the terminal. Showcases the process of adding a group using the 'groupadd' command and demonstrates the creation of a group 'INST' in the terminal.", "Deletion of users using 'sudo userdel' command, requiring the user to be logged out, and demonstrated with the command to delete the user 'Vargan'. Explains the process of deleting a user using the 'sudo userdel' command, highlighting the requirement for the user to be logged out and demonstrating the command to delete the user 'Vargan'.", "Deletion of a group using 'groupdel' command, demonstrated by deleting the group 'INST' in the terminal. Demonstrates the process of deleting a group using the 'groupdel' command and showcases the deletion of the group 'INST' in the terminal."]}, {'end': 12294.574, 'start': 12116.423, 'title': 'Ssh for remote access', 'summary': 'Explores the secure shell (ssh) for remote system access, covering setting up ip addresses, overcoming firewall issues, and establishing secure connections, with a focus on networking and real-time demonstrations.', 'duration': 178.151, 'highlights': ['The SSH, also known as Secure Shell, enables remote access to systems, allowing users to connect to remotely located systems without physically accessing them.', 'Setting up IP addresses for master and slave systems involves editing the /etc/hosts file and using commands like ifconfig and ip addr show, providing a practical demonstration of real-time networking concepts.', 'Demonstrating the process of turning off the firewall by dropping the IP table, temporarily or permanently, to facilitate the SSH connection, offering a practical solution for beginners encountering firewall issues.']}, {'end': 12797.21, 'start': 12295.135, 'title': 'Setting up and pinging two vm machines', 'summary': "Details the process of setting up and pinging two virtual machines, with a focus on configuring ip addresses and pinging between the master and slave vms, emphasizing the importance of setting up different ip addresses and adding them to the 'etc/hosts' file.", 'duration': 502.075, 'highlights': ['Setting up different IP addresses for master and slave VMs Emphasizes the need to set different IP addresses for the master and slave VMs to ensure proper connectivity and pinging between the two machines.', "Configuring IP addresses using ifconfig and adding them to 'etc/hosts' file Details the process of configuring IP addresses using ifconfig and adding them to the 'etc/hosts' file to facilitate remote access and pinging between the master and slave VMs.", "Dropping and adding IP addresses using 'sudo ip addr delete/add' commands Demonstrates the use of 'sudo ip addr delete/add' commands to drop existing IP addresses and add new ones, ensuring proper configuration and connectivity between the master and slave VMs."]}, {'end': 13239.499, 'start': 12797.97, 'title': 'Setting up ssh connection and remote access', 'summary': 'Covers the process of setting up ssh connection and remote access between two virtual machines with specific ip addresses, demonstrating remote file access, folder navigation, and the concept of rsa key for secure shell connections.', 'duration': 441.529, 'highlights': ['Demonstrated the process of setting specific IP addresses for the master and slave virtual machines, i.e., 192.168.56.102 and 192.168.56.103, respectively. The speaker explained the process of assigning specific IP addresses to the master and slave virtual machines, 192.168.56.102 and 192.168.56.103, respectively, for SSH connection setup.', "Showed the demonstration of establishing an SSH connection from the slave VM to the master using the 'SSH' command without specifying the master's IP address. The speaker demonstrated the establishment of an SSH connection from the slave VM to the master using the 'SSH' command without specifying the master's IP address, enhancing the understanding of remote access.", 'Illustrated remote file access and navigation between the master and slave VMs, showcasing the visibility of files and folders across the connected virtual machines. The speaker illustrated remote file access and navigation between the master and slave VMs, showcasing the visibility of files and folders across the connected virtual machines, emphasizing the concept of remote access.']}], 'duration': 1453.316, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo11786183.jpg', 'highlights': ["Creation of users using 'useradd' command, requiring sudo access, demonstrated by adding a user 'Vargan' with user ID 502.", "Setting a password for a user using 'sudo password' command, with successful password update.", "Adding a group using 'groupadd' command, demonstrated by creating a group 'INST' in the terminal.", "Deletion of users using 'sudo userdel' command, requiring the user to be logged out, and demonstrated with the command to delete the user 'Vargan'.", "Deletion of a group using 'groupdel' command, demonstrated by deleting the group 'INST' in the terminal.", 'The SSH, also known as Secure Shell, enables remote access to systems, allowing users to connect to remotely located systems without physically accessing them.', 'Setting up IP addresses for master and slave systems involves editing the /etc/hosts file and using commands like ifconfig and ip addr show, providing a practical demonstration of real-time networking concepts.', 'Demonstrating the process of turning off the firewall by dropping the IP table, temporarily or permanently, to facilitate the SSH connection, offering a practical solution for beginners encountering firewall issues.', 'Setting up different IP addresses for master and slave VMs Emphasizes the need to set different IP addresses for the master and slave VMs to ensure proper connectivity and pinging between the two machines.', "Configuring IP addresses using ifconfig and adding them to 'etc/hosts' file Details the process of configuring IP addresses using ifconfig and adding them to the 'etc/hosts' file to facilitate remote access and pinging between the master and slave VMs.", "Dropping and adding IP addresses using 'sudo ip addr delete/add' commands Demonstrates the use of 'sudo ip addr delete/add' commands to drop existing IP addresses and add new ones, ensuring proper configuration and connectivity between the master and slave VMs.", 'Demonstrated the process of setting specific IP addresses for the master and slave virtual machines, i.e., 192.168.56.102 and 192.168.56.103, respectively.', "Showed the demonstration of establishing an SSH connection from the slave VM to the master using the 'SSH' command without specifying the master's IP address.", 'Illustrated remote file access and navigation between the master and slave VMs, showcasing the visibility of files and folders across the connected virtual machines.']}, {'end': 14704.492, 'segs': [{'end': 13286.642, 'src': 'embed', 'start': 13262.165, 'weight': 2, 'content': [{'end': 13269.89, 'text': 'It interacts with the hardware and most of the tasks, like memory management, task scheduling and file management.', 'start': 13262.165, 'duration': 7.725}, {'end': 13274.433, 'text': 'now users communicate with the kernel through a program called the shell.', 'start': 13269.89, 'duration': 4.543}, {'end': 13279.314, 'text': 'The shell is that utility that processes your requests.', 'start': 13275.129, 'duration': 4.185}, {'end': 13286.642, 'text': 'when you type in a command, basically at your terminal, the shell interprets the command and calls the program that you want.', 'start': 13279.314, 'duration': 7.328}], 'summary': 'The kernel interacts with hardware, manages memory and files, and processes user requests through the shell.', 'duration': 24.477, 'max_score': 13262.165, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo13262165.jpg'}, {'end': 13379.857, 'src': 'embed', 'start': 13356.308, 'weight': 1, 'content': [{'end': 13363.071, 'text': 'We are going to begin our journey with a look at the modern shell since 1977 when the Born shell was introduced.', 'start': 13356.308, 'duration': 6.763}, {'end': 13369.793, 'text': 'Now the Born shell created by Stephen Born at the AT&T Bell Labs remains useful even today.', 'start': 13363.431, 'duration': 6.362}, {'end': 13374.895, 'text': 'The author developed the Born shell after working on an ALGOL 68 compiler.', 'start': 13370.213, 'duration': 4.682}, {'end': 13379.857, 'text': "So you'll find its grammar more similar to the algorithmic language than other shells.", 'start': 13375.195, 'duration': 4.662}], 'summary': 'The born shell, introduced in 1977, remains useful with grammar similar to algol 68.', 'duration': 23.549, 'max_score': 13356.308, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo13356308.jpg'}, {'end': 13618.185, 'src': 'embed', 'start': 13593.078, 'weight': 5, 'content': [{'end': 13599.161, 'text': 'the keywords, syntax and other basic features of the language are all from the basic shell.', 'start': 13593.078, 'duration': 6.083}, {'end': 13606.324, 'text': 'The shells name is an acronym for born-again shell upon on the name of the bone shell that it replaces.', 'start': 13599.641, 'duration': 6.683}, {'end': 13611.502, 'text': 'The bash command syntax is a superset of the born shell command syntax.', 'start': 13607.58, 'duration': 3.922}, {'end': 13618.185, 'text': 'It supports brace expansion command line completion basic debugging and exception handling using trap.', 'start': 13611.822, 'duration': 6.363}], 'summary': 'Bash shell is based on basic shell, supports command line completion, debugging, and exception handling using trap.', 'duration': 25.107, 'max_score': 13593.078, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo13593078.jpg'}, {'end': 13915.476, 'src': 'embed', 'start': 13888.155, 'weight': 0, 'content': [{'end': 13891.738, 'text': "Okay, so what I'm interested in is this Eclipse directory.", 'start': 13888.155, 'duration': 3.583}, {'end': 13899.245, 'text': "So what I'm going to do is okay, this is one file Java oxygen.", 'start': 13892.099, 'duration': 7.146}, {'end': 13902.708, 'text': "Let's see if it's executable or not.", 'start': 13899.325, 'duration': 3.383}, {'end': 13908.673, 'text': 'Okay, as we see the Java oxygen file is executable.', 'start': 13904.952, 'duration': 3.721}, {'end': 13915.476, 'text': 'So when I pass Eclipse as an argument, this directory as an argument to any of my scripts,', 'start': 13909.074, 'duration': 6.402}], 'summary': 'The eclipse directory contains an executable java oxygen file.', 'duration': 27.321, 'max_score': 13888.155, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo13888155.jpg'}, {'end': 14592.653, 'src': 'embed', 'start': 14553.987, 'weight': 3, 'content': [{'end': 14558.731, 'text': "This won't have any issues to click on yes and then install.", 'start': 14553.987, 'duration': 4.744}, {'end': 14566.958, 'text': 'Now that the installation has finished.', 'start': 14565.377, 'duration': 1.581}, {'end': 14570.502, 'text': "Let's start our virtual box.", 'start': 14567.959, 'duration': 2.543}, {'end': 14576.807, 'text': 'So now that the virtual box is now open we need to create a new VM.', 'start': 14571.442, 'duration': 5.365}, {'end': 14581.369, 'text': 'So to do this, we click on this button new and we provide it a name.', 'start': 14577.187, 'duration': 4.182}, {'end': 14587.051, 'text': 'And I provide it up to 4GB of RAM.', 'start': 14583.569, 'duration': 3.482}, {'end': 14592.653, 'text': "Now, I'll create my hard disk and this will be dynamically allocated.", 'start': 14587.991, 'duration': 4.662}], 'summary': 'Install and configure a new virtual machine with up to 4gb of ram and a dynamically allocated hard disk.', 'duration': 38.666, 'max_score': 14553.987, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo14553987.jpg'}], 'start': 13245.324, 'title': 'Evolution of unix shells and shell scripting languages', 'summary': 'Covers the history and significance of modern shells like the born shell and the seashell, the evolution and features of unix shells such as c shell, born shell, corn shell, 10x shell, and bash, and a comparison of shell scripting languages including bash, corn, and seashell. it also provides insights into setting up a linux vm using virtualbox and ubuntu.', 'chapters': [{'end': 13477.711, 'start': 13245.324, 'title': 'Kernel, shell, and evolution', 'summary': "Discusses the kernel's role in coordinating system resources and the shell's function as a command line interpreter, highlighting the history and significance of modern shells like the born shell and the seashell in shaping linux systems.", 'duration': 232.387, 'highlights': ['The kernel coordinates system resources and manages tasks like memory and file management, serving as the heart of any operating system. system resources, memory management, task scheduling, file management', 'The shell acts as a command line interpreter, translating user commands into a language understood by the kernel, with standard syntax for all commands. command line interpreter, user commands, standard syntax', 'The Born shell, introduced in 1977, provided control flows, loops, and variables in scripts, offering a functional language to interact with the operating system and key features like command substitution and here documents. introduced in 1977, control flows, loops, variables, command substitution, here documents', 'The seashell, created in 1978, was a widely distributed command processor, supporting file name wildcarding, piping, and here documents. created in 1978, widely distributed, file name wildcarding, piping, here documents']}, {'end': 13993.594, 'start': 13477.711, 'title': 'Evolution of unix shells', 'summary': 'Discusses the evolution of unix shells, including the c shell, born shell, corn shell, 10x shell, and bash, emphasizing their features, backward compatibility, and popularity. it also compares the shell and bash, highlighting their differences and extensions, and provides insights into the usage and importance of different shells for scripting and system administration.', 'duration': 515.883, 'highlights': ['The bash remains one of the most popular shells, distributed widely as a default login shell for most Linux distributions and Mac OS, supporting various functionalities like file name globbing, piping, here documents, and command substitution. Bash is widely distributed as a default login shell for most Linux distributions and Mac OS, supporting functionalities like file name globbing, piping, here documents, and command substitution.', 'The chapter compares the shell and bash, emphasizing their differences and extensions, and provides insights into the usage and importance of different shells for scripting and system administration. The chapter provides insights into the differences and extensions of shell and bash, emphasizing their usage and importance for scripting and system administration.', 'The chapter discusses the evolution of Unix shells, including the C shell, Born shell, Corn shell, 10x shell, and bash, emphasizing their features, backward compatibility, and popularity. The chapter discusses the evolution of Unix shells, emphasizing the features, backward compatibility, and popularity of C shell, Born shell, Corn shell, 10x shell, and bash.']}, {'end': 14704.492, 'start': 13993.714, 'title': 'Comparison of shell scripting languages and setting up linux vm', 'summary': 'Compares shell scripting languages including bash, corn, and seashell, highlighting their similarities and differences, and provides a detailed guide on setting up a linux vm using virtualbox and ubuntu, with a recommendation for hardware and software requirements.', 'duration': 710.778, 'highlights': ['Comparison of shell scripting languages The chapter discusses the similarities and differences between popular shell scripting languages such as bash, corn, and seashell, emphasizing their structural similarities and differences in conditional expressions and iteration methods.', 'Setting up Linux VM using VirtualBox and Ubuntu The guide provides detailed steps for setting up a Linux VM using VirtualBox and Ubuntu, including downloading and installing VirtualBox, creating a new VM, loading the Ubuntu ISO image, and following the installation process, with an approximate setup time of up to two hours.', 'Hardware and software requirements The chapter recommends hardware and software requirements for setting up a Linux VM, suggesting a system with at least a 2 GHz dual-core processor, 4 GB or more system memory, and 25 GB free disk space, along with the necessity of enabling virtualization in the BIOS settings for VirtualBox to run.']}], 'duration': 1459.168, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo13245324.jpg', 'highlights': ['The bash remains one of the most popular shells, distributed widely as a default login shell for most Linux distributions and Mac OS, supporting various functionalities like file name globbing, piping, here documents, and command substitution.', 'The chapter discusses the evolution of Unix shells, emphasizing the features, backward compatibility, and popularity of C shell, Born shell, Corn shell, 10x shell, and bash.', 'The Born shell, introduced in 1977, provided control flows, loops, and variables in scripts, offering a functional language to interact with the operating system and key features like command substitution and here documents.', 'The seashell, created in 1978, was a widely distributed command processor, supporting file name wildcarding, piping, and here documents.', 'The chapter provides insights into the differences and extensions of shell and bash, emphasizing their usage and importance for scripting and system administration.', 'The guide provides detailed steps for setting up a Linux VM using VirtualBox and Ubuntu, including downloading and installing VirtualBox, creating a new VM, loading the Ubuntu ISO image, and following the installation process, with an approximate setup time of up to two hours.', 'The chapter discusses the similarities and differences between popular shell scripting languages such as bash, corn, and seashell, emphasizing their structural similarities and differences in conditional expressions and iteration methods.', 'The kernel coordinates system resources and manages tasks like memory and file management, serving as the heart of any operating system.']}, {'end': 18028.189, 'segs': [{'end': 14730.566, 'src': 'embed', 'start': 14705.412, 'weight': 1, 'content': [{'end': 14712.116, 'text': 'In this way, you can set up a number of virtual machines on your system and continue your DevOps journey.', 'start': 14705.412, 'duration': 6.704}, {'end': 14720.36, 'text': 'The first thing we talk about is the Linux directory commands.', 'start': 14717.659, 'duration': 2.701}, {'end': 14726.524, 'text': "So what we'll do here is we'll take a look at each command and what they work like in Linux.", 'start': 14720.761, 'duration': 5.763}, {'end': 14730.566, 'text': 'So the first command is the pwd command.', 'start': 14727.404, 'duration': 3.162}], 'summary': 'Set up virtual machines and learn linux directory commands.', 'duration': 25.154, 'max_score': 14705.412, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo14705412.jpg'}, {'end': 15125.896, 'src': 'embed', 'start': 15094.567, 'weight': 3, 'content': [{'end': 15096.988, 'text': 'now we move on to the linux file commands.', 'start': 15094.567, 'duration': 2.421}, {'end': 15098.948, 'text': 'so there are various linux file commands.', 'start': 15096.988, 'duration': 1.96}, {'end': 15101.729, 'text': 'the first one we talk about is the touch command.', 'start': 15098.948, 'duration': 2.781}, {'end': 15109.383, 'text': 'so basically, the touch command is used to create empty files and you can create multiple files by executing the touch command only once.', 'start': 15101.729, 'duration': 7.654}, {'end': 15118.83, 'text': 'for example, if you see here, you can create an empty file called file.txt and you can also create two files in the same command.', 'start': 15109.383, 'duration': 9.447}, {'end': 15125.896, 'text': 'so you now, as you can see, if you type in touch file 2 or file 3 or whatever the name of your file might be,', 'start': 15118.83, 'duration': 7.066}], 'summary': 'Introduction to linux file commands, including the touch command for creating empty files and multiple files at once.', 'duration': 31.329, 'max_score': 15094.567, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo15094567.jpg'}, {'end': 15296.437, 'src': 'embed', 'start': 15271.447, 'weight': 2, 'content': [{'end': 15287.052, 'text': "so let's see an example of how cat works and the syntax for cat is if you want to create files you know files with content in it you'll basically have the cat command followed with the greater than sign and the file name,", 'start': 15271.447, 'duration': 15.605}, {'end': 15294.256, 'text': "and if you want to concatenate, basically copy the content of one file to another, you'll have to write cat and file name.", 'start': 15287.052, 'duration': 7.204}, {'end': 15296.437, 'text': "so let's check it out.", 'start': 15294.256, 'duration': 2.181}], 'summary': 'Demonstrates how to use the cat command to create and concatenate files.', 'duration': 24.99, 'max_score': 15271.447, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo15271447.jpg'}, {'end': 15359.499, 'src': 'embed', 'start': 15323.638, 'weight': 0, 'content': [{'end': 15331.922, 'text': "now, if you basically check this and just write see, this is basically showing you the content of the file that's already there,", 'start': 15323.638, 'duration': 8.284}, {'end': 15339.15, 'text': 'and this command is basically letting you add content to the empty file that you created using touch.', 'start': 15332.307, 'duration': 6.843}, {'end': 15339.51, 'text': 'so up.', 'start': 15339.15, 'duration': 0.36}, {'end': 15342.271, 'text': 'next we have the next command, which is the rm command.', 'start': 15339.51, 'duration': 2.761}, {'end': 15351.255, 'text': 'rm is basically short for remove and it is a command which is used to remove the file, and the syntax for that is rm followed by file name.', 'start': 15342.271, 'duration': 8.984}, {'end': 15353.316, 'text': "so let's check it out.", 'start': 15351.255, 'duration': 2.061}, {'end': 15359.499, 'text': "so if you want to remove file, you'll have to first go to the directory where the file is present and then, once you enter the directory,", 'start': 15353.316, 'duration': 6.183}], 'summary': 'Basic commands in unix: see file content, add content using touch, and remove files using rm.', 'duration': 35.861, 'max_score': 15323.638, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo15323638.jpg'}, {'end': 16012.149, 'src': 'embed', 'start': 15987.114, 'weight': 6, 'content': [{'end': 15993.278, 'text': "So you'll just have to write su and specify the username, right, of your Linux system.", 'start': 15987.114, 'duration': 6.164}, {'end': 15994.659, 'text': "So let's check it out.", 'start': 15993.718, 'duration': 0.941}, {'end': 16000.302, 'text': 'So all you need to do here is go to terminal and type in su and then the username.', 'start': 15995.499, 'duration': 4.803}, {'end': 16002.864, 'text': 'My username is kb, as you can see.', 'start': 16000.663, 'duration': 2.201}, {'end': 16006.346, 'text': 'so now you have to specify the password.', 'start': 16003.644, 'duration': 2.702}, {'end': 16010.228, 'text': 'so this is something which allows access to somebody else.', 'start': 16006.346, 'duration': 3.882}, {'end': 16012.149, 'text': 'right, if you type in su.', 'start': 16010.228, 'duration': 1.921}], 'summary': "To switch users in linux, use 'su' followed by the username, such as 'kb', to access the system with the specified user's privileges.", 'duration': 25.035, 'max_score': 15987.114, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo15987114.jpg'}, {'end': 16692.498, 'src': 'heatmap', 'start': 16280.925, 'weight': 0.863, 'content': [{'end': 16282.805, 'text': "so let's check out the group add command.", 'start': 16280.925, 'duration': 1.88}, {'end': 16297.438, 'text': "so first of all you have to type in sudo and then group add and then group name let's say we name our group 2022 and then password for kb,", 'start': 16282.805, 'duration': 14.633}, {'end': 16300.32, 'text': "which we've just created now.", 'start': 16297.438, 'duration': 2.882}, {'end': 16304.563, 'text': 'so now this group has been added into this user.', 'start': 16300.32, 'duration': 4.243}, {'end': 16308.385, 'text': 'so that was basically how you use the group add command.', 'start': 16304.563, 'duration': 3.822}, {'end': 16311.287, 'text': 'so finally you come to the linux filter commands.', 'start': 16308.385, 'duration': 2.902}, {'end': 16314.689, 'text': 'now there are various filter commands that linux has.', 'start': 16311.287, 'duration': 3.402}, {'end': 16316.93, 'text': 'the first thing you can see is the cat command.', 'start': 16314.689, 'duration': 2.241}, {'end': 16319.892, 'text': 'now the cat command is also used as a filter.', 'start': 16316.93, 'duration': 2.962}, {'end': 16322.594, 'text': 'right now, filtering here means to filter a file.', 'start': 16319.892, 'duration': 2.702}, {'end': 16324.99, 'text': 'it is used inside pipes.', 'start': 16322.594, 'duration': 2.396}, {'end': 16327.852, 'text': 'now you basically filter out the content that is there.', 'start': 16324.99, 'duration': 2.862}, {'end': 16336.357, 'text': "now, if you want to filter using cat, you'll have to write cat and then the file name with cat or tag and then cat or tag again.", 'start': 16327.852, 'duration': 8.505}, {'end': 16343.882, 'text': "right, so you'll have pipes in between and you'll basically have the cat and tag, cat and tag commands back inside pipes.", 'start': 16336.357, 'duration': 7.525}, {'end': 16346.284, 'text': "so let's just check it out.", 'start': 16343.882, 'duration': 2.402}, {'end': 16350.987, 'text': "so if you want to use the cat command as a filter, let's check it out.", 'start': 16346.284, 'duration': 4.703}, {'end': 16361.472, 'text': "type in cat home and then we'll basically have this, which is the pipe, and then the command tag, then cat.", 'start': 16350.987, 'duration': 10.485}, {'end': 16363.973, 'text': 'finally we have tag.', 'start': 16361.472, 'duration': 2.501}, {'end': 16369.157, 'text': 'so this is basically what the cat command does as a filter.', 'start': 16363.973, 'duration': 5.184}, {'end': 16371.018, 'text': 'next up is the cut command.', 'start': 16369.157, 'duration': 1.861}, {'end': 16374.621, 'text': 'now the cut command is used to select a specific column of a file.', 'start': 16371.018, 'duration': 3.603}, {'end': 16378.307, 'text': 'So the D option is basically the delimiter option.', 'start': 16375.185, 'duration': 3.122}, {'end': 16381.67, 'text': 'And the F option is basically the column.', 'start': 16379.088, 'duration': 2.582}, {'end': 16384.052, 'text': 'So the D option is used as delimiter.', 'start': 16382.191, 'duration': 1.861}, {'end': 16387.794, 'text': 'And it can be a space or a slash or a hyphen or anything else.', 'start': 16384.232, 'duration': 3.562}, {'end': 16389.837, 'text': 'Whereas F is the column number.', 'start': 16388.015, 'duration': 1.822}, {'end': 16392.238, 'text': 'And the syntax for this is cut.', 'start': 16390.136, 'duration': 2.102}, {'end': 16393.74, 'text': 'And then you put the delimiter.', 'start': 16392.479, 'duration': 1.261}, {'end': 16395.021, 'text': 'You put the column number.', 'start': 16393.779, 'duration': 1.242}, {'end': 16396.782, 'text': 'And then you put the file name in the end.', 'start': 16395.221, 'duration': 1.561}, {'end': 16399.583, 'text': "So let's check it out as well.", 'start': 16397.503, 'duration': 2.08}, {'end': 16402.607, 'text': "So with the cut command you'll just have.", 'start': 16400.825, 'duration': 1.782}, {'end': 16404.228, 'text': 'You type in cut.', 'start': 16403.247, 'duration': 0.981}, {'end': 16414.116, 'text': 'then you have the delimiter, after which you will have the F and the file name in the end, right.', 'start': 16405.01, 'duration': 9.106}, {'end': 16417.617, 'text': 'so this is basically what the cut command does.', 'start': 16414.116, 'duration': 3.501}, {'end': 16421.5, 'text': 'it cuts out from a specific column and the specific column number.', 'start': 16417.617, 'duration': 3.883}, {'end': 16426.643, 'text': "since there's only one column here and we specified f2, there is no cutting out.", 'start': 16421.5, 'duration': 5.143}, {'end': 16434.468, 'text': "so if we do the same thing again and change f2 to f1, let's see how it's different, right.", 'start': 16426.643, 'duration': 7.825}, {'end': 16438.829, 'text': 'so this is basically what f1 f2 does.', 'start': 16435.006, 'duration': 3.823}, {'end': 16445.494, 'text': "it shows you the column name and it'll show you basically a specific part of the file that you want.", 'start': 16438.829, 'duration': 6.665}, {'end': 16452.76, 'text': "you'll cut out a part of that file and we'll show it to you, but since we have only column one, we'll show you just the column one here, right.", 'start': 16445.494, 'duration': 7.266}, {'end': 16454.603, 'text': 'so this is what cut does.', 'start': 16452.76, 'duration': 1.843}, {'end': 16455.844, 'text': 'moving on to the next command.', 'start': 16454.603, 'duration': 1.241}, {'end': 16458.645, 'text': 'So the next command is the grep command.', 'start': 16456.723, 'duration': 1.922}, {'end': 16464.226, 'text': 'So the grep command in Linux is the most powerful command and it is used to filter the Linux system right?', 'start': 16458.685, 'duration': 5.541}, {'end': 16467.829, 'text': 'grep stands for global regular expression, print right?', 'start': 16464.347, 'duration': 3.482}, {'end': 16472.35, 'text': 'So it is basically very useful for searching content from a file right?', 'start': 16468.229, 'duration': 4.121}, {'end': 16480.153, 'text': 'So, for example, you need the syntax as basically command and then grep and then you search the word right?', 'start': 16472.371, 'duration': 7.782}, {'end': 16483.095, 'text': "So let's see how grep works.", 'start': 16480.614, 'duration': 2.481}, {'end': 16485.076, 'text': "So let's check it out.", 'start': 16483.814, 'duration': 1.262}, {'end': 16489.57, 'text': "so, to basically check out how grep works, let's check this out.", 'start': 16486.488, 'duration': 3.082}, {'end': 16498.815, 'text': "let's say cat, and then you'll basically have this with grep3.", 'start': 16489.57, 'duration': 9.245}, {'end': 16505.78, 'text': 'so this is basically every content in the file which is in rega2, which has the value 3 in it.', 'start': 16498.815, 'duration': 6.965}, {'end': 16509.864, 'text': 'so these are the two values which has 3 in it, and that is what grep is showing.', 'start': 16505.78, 'duration': 4.084}, {'end': 16511.244, 'text': 'so this is how grep works.', 'start': 16509.864, 'duration': 1.38}, {'end': 16514.997, 'text': 'so moving on to the next command, is the com command.', 'start': 16512.276, 'duration': 2.721}, {'end': 16518.378, 'text': 'now the com command is used to compare two files or streams.', 'start': 16514.997, 'duration': 3.381}, {'end': 16525.481, 'text': 'right. so by default it for displays three columns the first displays the non-matching columns of the first file,', 'start': 16518.378, 'duration': 7.103}, {'end': 16530.883, 'text': 'the second for the second file and third displays the non-matching columns for the third file.', 'start': 16525.481, 'duration': 5.402}, {'end': 16532.624, 'text': 'so the syntax for this is fairly easy.', 'start': 16530.883, 'duration': 1.741}, {'end': 16535.925, 'text': "it's just com and then you specify the file names that you want.", 'start': 16532.624, 'duration': 3.301}, {'end': 16539.266, 'text': "right. so let's just check this out.", 'start': 16535.925, 'duration': 3.341}, {'end': 16542.997, 'text': "so if you want to check out how the com command works, let's see this.", 'start': 16539.266, 'duration': 3.731}, {'end': 16550.96, 'text': 'come and basically add the two folders you want and the contents of it which you want.', 'start': 16542.997, 'duration': 7.963}, {'end': 16555.26, 'text': 'so these are all the files content that is there in both the files.', 'start': 16550.96, 'duration': 4.3}, {'end': 16560.723, 'text': 'right, input is not in sorted order, but the file number one is not in sorted order,', 'start': 16555.26, 'duration': 5.463}, {'end': 16570.752, 'text': 'and so this is basically showing the content of all of the files that i have given, which is elrega2 and home, and the content which it has.', 'start': 16560.723, 'duration': 10.029}, {'end': 16574.034, 'text': 'right, it displays it in three different columns.', 'start': 16570.752, 'duration': 3.282}, {'end': 16577.015, 'text': 'so this is what com does.', 'start': 16574.034, 'duration': 2.981}, {'end': 16579.397, 'text': 'so, checking out the next command.', 'start': 16577.015, 'duration': 2.382}, {'end': 16582.338, 'text': 'so the next command is the sed command right.', 'start': 16579.397, 'duration': 2.941}, {'end': 16585.84, 'text': 'so the sed command is short for stream editor.', 'start': 16582.338, 'duration': 3.502}, {'end': 16589.741, 'text': 'now, sed is used to edit files using regular expression.', 'start': 16585.84, 'duration': 3.901}, {'end': 16592.124, 'text': 'it does not permanently edit files.', 'start': 16589.741, 'duration': 2.383}, {'end': 16599.817, 'text': "instead, what it does is the edited content remains only on display and it doesn't really affect the actual file.", 'start': 16592.124, 'duration': 7.693}, {'end': 16609.461, 'text': 'so the syntax for sed is basically the command and then sed with apostrophe s and the old word with the new word right.', 'start': 16599.817, 'duration': 9.644}, {'end': 16613.261, 'text': "so if you want to check it out, let's see.", 'start': 16609.461, 'duration': 3.8}, {'end': 16617.604, 'text': "so, basically, for having sed, you'll basically have to show this stream editor.", 'start': 16613.261, 'duration': 4.343}, {'end': 16619.345, 'text': 'so this is the command for it.', 'start': 16617.604, 'duration': 1.741}, {'end': 16621.185, 'text': 'you have to put sed.', 'start': 16619.345, 'duration': 1.84}, {'end': 16629.591, 'text': 'echo and echo is basically used in linux and you basically have this thing printed called edureka 7 right.', 'start': 16621.185, 'duration': 8.406}, {'end': 16635.275, 'text': 'so as we can see, sed is used to edit files using a regular expression right.', 'start': 16629.591, 'duration': 5.684}, {'end': 16639.999, 'text': "so it doesn't really permanently edit those files, but it's only for view.", 'start': 16635.275, 'duration': 4.724}, {'end': 16642.801, 'text': "you can't really change what's there in the content.", 'start': 16639.999, 'duration': 2.802}, {'end': 16649.426, 'text': 'so, as i showed before, if you write class echo 7 with sed and change it in class.', 'start': 16642.801, 'duration': 6.625}, {'end': 16651.267, 'text': 'so this is just for view.', 'start': 16649.426, 'duration': 1.841}, {'end': 16652.068, 'text': 'edureka 7.', 'start': 16651.267, 'duration': 0.801}, {'end': 16653.169, 'text': 'what you see is for view.', 'start': 16652.068, 'duration': 1.101}, {'end': 16655.69, 'text': "it hasn't really changed the content of it right.", 'start': 16653.169, 'duration': 2.521}, {'end': 16661.026, 'text': 'so next up we go to the next command, which is the t command right.', 'start': 16656.404, 'duration': 4.622}, {'end': 16665.367, 'text': 'so the twe command, which is the t command, is similar to the cat command.', 'start': 16661.026, 'duration': 4.341}, {'end': 16674.112, 'text': 'the only difference between both filters is that it puts standard input or standard output and can also write them into a file.', 'start': 16665.367, 'duration': 8.745}, {'end': 16675.452, 'text': "so let's check it out.", 'start': 16674.112, 'duration': 1.34}, {'end': 16684.916, 'text': 'also, the syntax for t command is the cat and then file name, then followed with t and then with new file, and then you have cat attack.', 'start': 16675.452, 'duration': 9.464}, {'end': 16685.815, 'text': "so let's check it out.", 'start': 16684.916, 'duration': 0.899}, {'end': 16692.498, 'text': 'So, as you can see here, the TEE is basically putting in standard input, standard output,', 'start': 16686.874, 'duration': 5.624}], 'summary': 'Demonstration of group add and linux filter commands like cat, cut, grep, com, sed, tee', 'duration': 411.573, 'max_score': 16280.925, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo16280925.jpg'}], 'start': 14705.412, 'title': 'Linux commands overview', 'summary': 'Covers linux directory commands, linux file commands, user commands, filter commands, and basic linux commands, detailing their functionalities and usage with a variety of examples and syntax, providing a comprehensive understanding of essential linux commands and file management.', 'chapters': [{'end': 15094.567, 'start': 14705.412, 'title': 'Linux directory commands', 'summary': 'Covers linux directory commands, including the pwd, mkdir, rmdir, ls, and cd commands, explaining their functionalities and demonstrating their usage.', 'duration': 389.155, 'highlights': ["The pwd command is used to display the location of the current working directory, such as 'home/kb'. The pwd command displays the location of the current working directory, which could be 'home/kb'.", "The mkdir command is used to create a new directory in Linux, demonstrated by creating a new directory using 'mkdir new' and verifying its creation with 'ls'. The mkdir command creates a new directory in Linux, as shown by creating a directory named 'new' and confirming its creation using 'ls'.", "The rmdir command is used to remove a directory, demonstrated by deleting the 'new dir' directory and verifying its removal. The rmdir command removes a directory, illustrated by deleting the 'new dir' directory and confirming its deletion.", "The ls command is used to display the contents of a directory, shown by using 'ls' to display the system files inside the 'computer' directory. The ls command displays the contents of a directory, exemplified by using 'ls' to show the system files within the 'computer' directory.", "The cd command is used to change the current directory, demonstrated by changing from the root directory to the 'bin' directory using 'cd bin'. The cd command changes the current directory, as depicted by changing from the root directory to the 'bin' directory using 'cd bin'."]}, {'end': 15961.835, 'start': 15094.567, 'title': 'Linux file commands overview', 'summary': 'Covers various linux file commands including touch, cat, rm, cp, mv, rename, head, tail, tac, more, and less, with examples and syntax for each command, demonstrating their functionality and usage.', 'duration': 867.268, 'highlights': ['The touch command is used to create empty files and can create multiple files with a single command, simplifying file creation process. The touch command simplifies the process of creating empty files, allowing the creation of multiple files with a single command.', 'The cat command, short for concatenate, is frequently used to create, view, concatenate files, and redirect output, providing versatile file manipulation options. The cat command is versatile, allowing file creation, content viewing, concatenation, and output redirection.', 'The rm command is used to remove files, demonstrated by removing a file and confirming its deletion, showcasing its file removal functionality. The rm command effectively removes files, as demonstrated by the deletion and confirmation of file removal.', 'The cp command is used to copy files or directories, demonstrated by copying the contents of one file into another, showcasing its file copying functionality. The cp command effectively copies the contents of one file into another, demonstrating its file copying functionality.', 'The mv command is used to move files or directories from one location to another, exemplified by moving a file to a different directory, demonstrating its file moving functionality. The mv command effectively moves files or directories from one location to another, as demonstrated by moving a file to a different directory.', 'The rename command is used to rename files, demonstrated by renaming a group of text files to PDF files, showcasing its file renaming functionality. The rename command efficiently renames files, as demonstrated by renaming a group of text files to PDF files.', "The head command displays the first 10 lines of a file, providing a method to quickly view the beginning of a file. The head command efficiently displays the first 10 lines of a file, allowing quick viewing of the file's beginning.", 'The tail command displays the last 10 lines of a file, useful for reading error messages, demonstrating its utility in viewing file endings. The tail command efficiently displays the last 10 lines of a file, particularly useful for reading error messages.', "The tac command displays file content in reverse order, providing a reverse view of the file's contents. The tac command efficiently displays file content in reverse order, offering a reverse view of the file's contents.", 'The more command is used to display file content, particularly suitable for larger file sizes, showcasing its utility for handling large files. The more command efficiently displays file content, specifically suitable for handling larger file sizes.', 'The less command, similar to the more command, automatically adjusts the terminal window size, offering added features for viewing file content. The less command, similar to the more command, automatically adjusts the terminal window size, offering added features for viewing file content.']}, {'end': 16560.723, 'start': 15961.835, 'title': 'Linux user commands and filter commands', 'summary': 'Covers the linux user commands including su, sudo, id, user add, passwd and group add, along with filter commands like cat, cut, grep and com, and demonstrates their usage and syntax.', 'duration': 598.888, 'highlights': ['Explanation of su and sudo commands The su command provides administrative access to another user, allowing access to the Linux shell, while sudo command is used to give access to files which need administrator permission, demonstrated by accessing restricted files with sudo command.', "Demonstration of id command The id command is used to display the user id and group id, which can be retrieved using the 'id' command, showcasing the user and group id for the Linux system.", 'Usage of user add and passwd commands The user add command is used to add or remove users from the Linux server and the passwd command is used to create and change the password for a user, requiring sudo permission to change user-related settings.', 'Introduction to group add command The group add command is used to create a user group, necessitating the use of sudo command and demonstrated by adding a new group to a user using sudo and group add commands.', 'Explanation of filter commands Various filter commands in Linux, including cat, cut, grep, and com, are explained and demonstrated, showcasing their functionality in filtering, selecting specific columns, searching content, and comparing files or streams.']}, {'end': 17218.281, 'start': 16560.723, 'title': 'Basic linux commands & their functions', 'summary': 'Highlights the basic linux commands such as sed, tee, tr, uniq, and wc, along with their syntax and purpose, and also covers fundamental commands like man, clear, pwd, cd, echo, su, sudo, and their functions.', 'duration': 657.558, 'highlights': ["The sed command is used to edit files using regular expressions, without permanently changing the files, as demonstrated by replacing 'echo' with 'class echo 7'. Regular expression usage, non-permanent file editing", "The tee command is used to put standard input/output into a file, demonstrated by replicating the content of 'elrega2' into a new file named '98'. Redirecting standard input/output to a file", "The tr command is used to translate file content, such as converting lowercase to uppercase, shown by transforming 'hello' to 'HELLO'. File content translation, converting lowercase to uppercase", 'The uniq command is utilized to form a sorted list where each word occurs only once, exemplified by displaying unique words from a file. Creating a sorted list of unique words', "The wc command is employed to count the words, lines, and characters in a file, as evidenced by counting 48 characters in the 'home' file. Counting words, lines, and characters in a file"]}, {'end': 18028.189, 'start': 17221.482, 'title': 'Linux file management', 'summary': 'Covers essential linux file management commands including touch, vi editor, cat, copy, move, rm, mkdir, rmdir, grep, and sort, explaining their usage and relevant flags, such as creating and managing files and directories, searching for strings in text files, and sorting file contents.', 'duration': 806.707, 'highlights': ['The VI editor is the most popular and classic text editor in the Linux family, allowing users to write and save content in files using commands like sudo vi and to save content, users can press escape colon W for write and Q to quit. The VI editor is highlighted as the most popular and classic text editor in the Linux family, allowing users to write and save content in files using commands like sudo vi and to save content, users can press escape colon W for write and Q to quit.', 'The move command (MV) moves files and directories from one location to another, deleting them from the original location, and comes with flags like MV hyphen V, which enters the verbose mode and prints the source and destination file. The move command (MV) is emphasized for its capability to move files and directories from one location to another, deleting them from the original location, and comes with flags like MV hyphen V, which enters the verbose mode and prints the source and destination file.', 'The sort command is used to sort the results of a search either alphabetically or numerically and comes with flags like sort hyphen R, which returns the results in reverse order. The sort command is mentioned for its function in sorting the results of a search either alphabetically or numerically and comes with flags like sort hyphen R, which returns the results in reverse order.', 'The touch command is used to create files on the system, demonstrated by creating a file called cba.txt, and the cat command can read, modify, or concatenate text files, used to display the contents of the file and comes with additional flags like hyphen n and hyphen s for specific functionalities. The touch command is mentioned for creating files on the system, demonstrated by creating a file called cba.txt, and the cat command is highlighted for its ability to read, modify, or concatenate text files, used to display the contents of the file and comes with additional flags like hyphen n and hyphen s for specific functionalities.', 'The RM command removes files from a directory and comes with flags like hyphen are, which removes even the non-empty directories, and RM hyphen RP, which removes non-empty directories, including the parents and subdirectories. The RM command is noted for its function in removing files from a directory and comes with flags like hyphen are, which removes even the non-empty directories, and RM hyphen RP, which removes non-empty directories, including the parents and subdirectories.']}], 'duration': 3322.777, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo14705412.jpg', 'highlights': ['The VI editor is the most popular and classic text editor in the Linux family, allowing users to write and save content in files using commands like sudo vi and to save content, users can press escape colon W for write and Q to quit.', 'The sort command is used to sort the results of a search either alphabetically or numerically and comes with flags like sort hyphen R, which returns the results in reverse order.', 'The touch command is used to create files on the system, demonstrated by creating a file called cba.txt, and the cat command can read, modify, or concatenate text files, used to display the contents of the file and comes with additional flags like hyphen n and hyphen s for specific functionalities.', 'The move command (MV) moves files and directories from one location to another, deleting them from the original location, and comes with flags like MV hyphen V, which enters the verbose mode and prints the source and destination file.', "The wc command is employed to count the words, lines, and characters in a file, as evidenced by counting 48 characters in the 'home' file.", "The tr command is used to translate file content, such as converting lowercase to uppercase, shown by transforming 'hello' to 'HELLO'. File content translation, converting lowercase to uppercase", "The sed command is used to edit files using regular expressions, without permanently changing the files, as demonstrated by replacing 'echo' with 'class echo 7'. Regular expression usage, non-permanent file editing", 'The less command, similar to the more command, automatically adjusts the terminal window size, offering added features for viewing file content.', 'The more command is used to display file content, particularly suitable for larger file sizes, showcasing its utility for handling large files.', "The tac command displays file content in reverse order, providing a reverse view of the file's contents."]}, {'end': 21218.693, 'segs': [{'end': 18147.602, 'src': 'embed', 'start': 18120.146, 'weight': 7, 'content': [{'end': 18123.468, 'text': 'The right permission allows the user to modify and delete a file.', 'start': 18120.146, 'duration': 3.322}, {'end': 18128.091, 'text': 'Also, it allows a user to modify its contents for the directories.', 'start': 18124.148, 'duration': 3.943}, {'end': 18133.474, 'text': 'So unless the execute permission is not given to directories changes do not affect them.', 'start': 18128.851, 'duration': 4.623}, {'end': 18135.855, 'text': 'The third permission is the execute permission.', 'start': 18134.014, 'duration': 1.841}, {'end': 18139.617, 'text': 'So the right permission on a file allows it to get executed.', 'start': 18136.415, 'duration': 3.202}, {'end': 18143.579, 'text': 'For example, if we have a file named PHP dot SS.', 'start': 18140.278, 'duration': 3.301}, {'end': 18147.602, 'text': "So unless we don't give it an execute permission, it won't be run.", 'start': 18144.1, 'duration': 3.502}], 'summary': 'Permission control: modify, delete and execute files and directories.', 'duration': 27.456, 'max_score': 18120.146, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo18120146.jpg'}, {'end': 18191.024, 'src': 'embed', 'start': 18164.109, 'weight': 8, 'content': [{'end': 18169.614, 'text': 'So instead of the group permissions the user permissions will apply if the owner user is in this group.', 'start': 18164.109, 'duration': 5.505}, {'end': 18172.116, 'text': 'The third permission is the other permission.', 'start': 18170.094, 'duration': 2.022}, {'end': 18176.16, 'text': 'So these type of file permission affect all the users on the systems.', 'start': 18172.597, 'duration': 3.563}, {'end': 18185.762, 'text': 'So to view this permissions, so let us just say we use a command LS hyphen L.', 'start': 18176.92, 'duration': 8.842}, {'end': 18191.024, 'text': 'So this command will list down all the files and the directories that are present here along with their permissions.', 'start': 18185.762, 'duration': 5.262}], 'summary': 'User permissions override group permissions. ls -l lists files and directories with their permissions.', 'duration': 26.915, 'max_score': 18164.109, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo18164109.jpg'}, {'end': 19134.241, 'src': 'heatmap', 'start': 18724.076, 'weight': 0.807, 'content': [{'end': 18736.856, 'text': 'So this file has these lines a 1 1 B 2 2 and C 3 3 so say for example, if you want to display only two columns like a 1 B 2 and C 3 from this file.', 'start': 18724.076, 'duration': 12.78}, {'end': 18739.236, 'text': 'So using cut command we can do it.', 'start': 18737.476, 'duration': 1.76}, {'end': 18747.14, 'text': 'So the syntax for doing that is very simple cut hyphen C 1 hyphen 2 space the file name.', 'start': 18739.757, 'duration': 7.383}, {'end': 18751.021, 'text': 'So the file name is demo 1 dot txt.', 'start': 18747.22, 'duration': 3.801}, {'end': 18755.663, 'text': 'So hyphen C here stands for the column and which columns 1 and 2 column.', 'start': 18751.621, 'duration': 4.042}, {'end': 18758.384, 'text': 'Okay So just press enter.', 'start': 18755.843, 'duration': 2.541}, {'end': 18769.197, 'text': 'Okay, as you can see here it will display these two columns So say for example, you want only one column and not the two columns.', 'start': 18759.124, 'duration': 10.073}, {'end': 18778.98, 'text': 'So just remove this 2-C 1 press enter so you can see here ABC only the first column is displayed.', 'start': 18769.437, 'duration': 9.543}, {'end': 18782.021, 'text': 'Okay So this was about the cut command.', 'start': 18779.42, 'duration': 2.601}, {'end': 18786.523, 'text': 'So the next command that we are going to talk about is the SED that is said command.', 'start': 18782.522, 'duration': 4.001}, {'end': 18791.785, 'text': 'So said is a text editor which can perform editing operations in a non-interactive way.', 'start': 18787.183, 'duration': 4.602}, {'end': 18798.046, 'text': 'So said command gets its input from a standard input or a file to perform the editing operations on a file.', 'start': 18792.521, 'duration': 5.525}, {'end': 18805.892, 'text': 'So said is a very powerful utility and you can do a lot of file manipulations using said so say for example,', 'start': 18798.666, 'duration': 7.226}, {'end': 18809.755, 'text': 'if you want to replace a text in a file by searching it in a file,', 'start': 18805.892, 'duration': 3.863}, {'end': 18816.461, 'text': 'you can use the said command with the substitute s flag smallest to search for the specific pattern and change it.', 'start': 18809.755, 'duration': 6.706}, {'end': 18820.21, 'text': 'So say for example, let me just show you an example here.', 'start': 18817.248, 'duration': 2.962}, {'end': 18822.571, 'text': "There's this file called demo.", 'start': 18820.85, 'duration': 1.721}, {'end': 18824.512, 'text': 'So said test.', 'start': 18823.312, 'duration': 1.2}, {'end': 18831.176, 'text': 'Okay, so cat let me just see the content this file set test.', 'start': 18824.612, 'duration': 6.564}, {'end': 18834.378, 'text': 'Dot txt.', 'start': 18833.177, 'duration': 1.201}, {'end': 18838.22, 'text': 'Okay, So here it says how are you baban?', 'start': 18835.699, 'duration': 2.521}, {'end': 18842.883, 'text': 'So say, for example, I have to replace this baban by any other name.', 'start': 18839.08, 'duration': 3.803}, {'end': 18845.724, 'text': 'so I can use the SED command here.', 'start': 18842.883, 'duration': 2.841}, {'end': 18849.125, 'text': 'SED space single code s.', 'start': 18845.724, 'duration': 3.401}, {'end': 18851.486, 'text': 'that is the flag that you can use with this command.', 'start': 18849.125, 'duration': 2.361}, {'end': 18857.427, 'text': 'So the word that you want to replace and the new word chagan.', 'start': 18852.106, 'duration': 5.321}, {'end': 18864.769, 'text': 'Okay, and the name of the file obviously SED test dot txt.', 'start': 18858.227, 'duration': 6.542}, {'end': 18873.691, 'text': 'As you can see here first it was how are you Bob and now it is how are you chagan? So this was the command SED.', 'start': 18866.249, 'duration': 7.442}, {'end': 18875.691, 'text': 'I hope you have understood this command.', 'start': 18874.331, 'duration': 1.36}, {'end': 18877.646, 'text': 'We just clear the terminal.', 'start': 18876.365, 'duration': 1.281}, {'end': 18882.11, 'text': 'Okay So the next command that we are going to talk about is the unique command.', 'start': 18878.327, 'duration': 3.783}, {'end': 18886.814, 'text': 'So unique command is used for filtering out the duplicate lines in a files.', 'start': 18882.831, 'duration': 3.983}, {'end': 18890.477, 'text': 'So the syntax for this command is pretty much simple.', 'start': 18887.735, 'duration': 2.742}, {'end': 18899.185, 'text': 'So say for example, you have to remove all the duplicate lines from a file so you can use this command unique and the file name.', 'start': 18890.497, 'duration': 8.688}, {'end': 18903.108, 'text': 'So this was a very easy command.', 'start': 18901.326, 'duration': 1.782}, {'end': 18906.855, 'text': 'The next command that you are going to talk about is the watch command.', 'start': 18904.113, 'duration': 2.742}, {'end': 18913.459, 'text': 'So watch command in Linux is used to execute a program periodically showing output in full screen.', 'start': 18907.495, 'duration': 5.964}, {'end': 18920.884, 'text': 'This command will run a specified command in the argument repeatedly by showing its outputs and errors.', 'start': 18914.12, 'duration': 6.764}, {'end': 18926.948, 'text': 'by default, the specified command will run every two seconds and watch will run until interrupted.', 'start': 18920.884, 'duration': 6.064}, {'end': 18930.49, 'text': 'So the syntax for this command is very simple.', 'start': 18927.708, 'duration': 2.782}, {'end': 18935.815, 'text': 'You just have to type watch the flag and the command.', 'start': 18930.791, 'duration': 5.024}, {'end': 18939.899, 'text': 'Let me just show you an example using this.', 'start': 18937.897, 'duration': 2.002}, {'end': 18944.162, 'text': 'So this is flag called hyphen D that you can use with watch.', 'start': 18940.719, 'duration': 3.443}, {'end': 18949.607, 'text': 'So this parameter hyphen D highlights the differences between the successive updates.', 'start': 18944.643, 'duration': 4.964}, {'end': 18955.316, 'text': 'The options will read the optional arguments, which changes the highlight to be permanent,', 'start': 18950.333, 'duration': 4.983}, {'end': 18960.138, 'text': 'and this allows the user to see what has changed at least once since the first iteration.', 'start': 18955.316, 'duration': 4.822}, {'end': 18968.842, 'text': 'So let me just type hyphen D watch hyphen D free hyphen M.', 'start': 18960.638, 'duration': 8.204}, {'end': 18973.685, 'text': 'Free command we have used will see what free command is in the later part of this session.', 'start': 18968.842, 'duration': 4.843}, {'end': 18977.632, 'text': 'So the next command that we are going to talk about is the evil command.', 'start': 18974.83, 'duration': 2.802}, {'end': 18983.216, 'text': 'So evil is a built-in Linux command, which is used to execute arguments as a shell command.', 'start': 18978.152, 'duration': 5.064}, {'end': 18989.42, 'text': 'So it combines arguments into a single string and uses it as an input to the shell and execute commands.', 'start': 18983.736, 'duration': 5.684}, {'end': 18995.224, 'text': 'So the syntax for this command is very simple even and the arguments.', 'start': 18990.221, 'duration': 5.003}, {'end': 18999.807, 'text': 'So let me just show you an example of evil command here.', 'start': 18996.185, 'duration': 3.622}, {'end': 19011.342, 'text': 'So say for example, you have to type even hyphen hyphen Help evil hyphen hyphen help this command shows the description of the evil command itself.', 'start': 19000.327, 'duration': 11.015}, {'end': 19015.125, 'text': 'So as you can see here, so let me just clear the terminal.', 'start': 19012.003, 'duration': 3.122}, {'end': 19023.371, 'text': 'So the next command that we are going to talk about is the history command history command is used to view the previously executed commands.', 'start': 19016.045, 'duration': 7.326}, {'end': 19026.413, 'text': 'This feature was not available in the bond sin.', 'start': 19024.231, 'duration': 2.182}, {'end': 19036.312, 'text': 'Bash and console support this feature, in which every command is executed and is treated as the event, and is associated with an event number,', 'start': 19027.208, 'duration': 9.104}, {'end': 19040.214, 'text': "using which they can be recalled and changed if there's a requirement to do so.", 'start': 19036.312, 'duration': 3.902}, {'end': 19043.375, 'text': 'So these commands are saved in a history file.', 'start': 19040.814, 'duration': 2.561}, {'end': 19047.197, 'text': 'So in bash shell history command shows the whole list of commands.', 'start': 19043.895, 'duration': 3.302}, {'end': 19052.479, 'text': 'So say for example, just type history here press enter.', 'start': 19047.877, 'duration': 4.602}, {'end': 19055.18, 'text': 'So this is the list of commands.', 'start': 19053.48, 'duration': 1.7}, {'end': 19056.461, 'text': "I've used till now.", 'start': 19055.24, 'duration': 1.221}, {'end': 19059.877, 'text': '400 500 plus commands, I guess.', 'start': 19057.915, 'duration': 1.962}, {'end': 19061.699, 'text': 'Yeah 584 commands.', 'start': 19060.398, 'duration': 1.301}, {'end': 19069.827, 'text': "I've used so say for example, if you want to see only last five comments that I've used history space 5 presenter.", 'start': 19061.739, 'duration': 8.088}, {'end': 19077.455, 'text': 'So these are the last five commands that you have used can can see here that we just clear the terminal.', 'start': 19070.688, 'duration': 6.767}, {'end': 19081.919, 'text': 'Okay So the next command that we are going to talk about is the DD command.', 'start': 19077.715, 'duration': 4.204}, {'end': 19089.751, 'text': 'So DD is a command line utility for Unix and Unix like OS, whose primary purpose is to convert and copy files.', 'start': 19082.469, 'duration': 7.282}, {'end': 19096.773, 'text': 'the command line syntax of DD differs from many other Unix programs in that it uses the syntax option.', 'start': 19089.751, 'duration': 7.022}, {'end': 19101.435, 'text': 'Equal to value.', 'start': 19099.154, 'duration': 2.281}, {'end': 19108.017, 'text': 'So this syntax option equal to value is used for its command line operations.', 'start': 19103.596, 'duration': 4.421}, {'end': 19111.448, 'text': "So I'll show you just a practical example of this command.", 'start': 19108.726, 'duration': 2.722}, {'end': 19115.09, 'text': 'So say for example, you have to backup the entire hard disk.', 'start': 19111.788, 'duration': 3.302}, {'end': 19120.473, 'text': 'So to backup an entire copy of a hard disk to another hard disk connected to the same system.', 'start': 19115.61, 'duration': 4.863}, {'end': 19123.255, 'text': 'So this command DD can be used.', 'start': 19121.053, 'duration': 2.202}, {'end': 19123.995, 'text': 'in this command.', 'start': 19123.255, 'duration': 0.74}, {'end': 19134.241, 'text': "the unit's device name of the source hard disk is, say, for example, the source hard disk name is dev HDA and the target hard disk name is dev HDB.", 'start': 19123.995, 'duration': 10.246}], 'summary': 'The transcript covers commands like cut, sed, unique, watch, exec, history, and dd for file manipulation in linux.', 'duration': 410.165, 'max_score': 18724.076, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo18724076.jpg'}, {'end': 19599.078, 'src': 'embed', 'start': 19571.789, 'weight': 1, 'content': [{'end': 19580.755, 'text': 'IP command is used to perform several tasks, like assigning an address to a network interface or configuring network interface parameters and so on.', 'start': 19571.789, 'duration': 8.966}, {'end': 19588.921, 'text': 'so it can perform several other tasks, like configuring and modifying the default and static routing, setting up a tunnel or an IP,', 'start': 19580.755, 'duration': 8.166}, {'end': 19599.078, 'text': 'listing IP addresses and property information, modifying the status of the interface, assigning, deleting and setting up IP addresses and routes.', 'start': 19589.711, 'duration': 9.367}], 'summary': 'Ip command performs various tasks like configuring, modifying routing and setting up ip addresses.', 'duration': 27.289, 'max_score': 19571.789, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo19571789.jpg'}, {'end': 20761.034, 'src': 'heatmap', 'start': 20353.086, 'weight': 0.815, 'content': [{'end': 20357.729, 'text': 'The aim is to make sure you are not over shooting the 80% threshold.', 'start': 20353.086, 'duration': 4.643}, {'end': 20363.213, 'text': 'If you exceed the threshold it is time to scale or clean up the mess because you are running out of the resources.', 'start': 20358.409, 'duration': 4.804}, {'end': 20377.234, 'text': 'So the syntax to use this command like if you want to see the disk free space in a human readable format, you can use the command DF, pseudo DF,', 'start': 20364.306, 'duration': 12.928}, {'end': 20383.378, 'text': 'hyphen H.', 'start': 20377.234, 'duration': 6.144}, {'end': 20392.644, 'text': 'Okay, so this is the disk free command that we are using and we can see here the output size, available size,', 'start': 20383.378, 'duration': 9.266}, {'end': 20398.498, 'text': 'used available memory percentages and the mounted location.', 'start': 20393.596, 'duration': 4.902}, {'end': 20412.084, 'text': 'So, but in most cases you want to check which part of your system is consuming lots of disk space for the command for doing that is sudo,', 'start': 20399.879, 'duration': 12.205}, {'end': 20415.646, 'text': 'du-h-d 1 and the.', 'start': 20412.084, 'duration': 3.562}, {'end': 20415.926, 'text': 'we are.', 'start': 20415.646, 'duration': 0.28}, {'end': 20430.86, 'text': 'So, as you can see here this location, it is consuming a lot of disk space.', 'start': 20425.638, 'duration': 5.222}, {'end': 20434.581, 'text': 'So this was about the DF and the do command.', 'start': 20432.36, 'duration': 2.221}, {'end': 20438.042, 'text': 'So now let us talk a bit about cell scripting.', 'start': 20435.761, 'duration': 2.281}, {'end': 20440.183, 'text': 'So first and foremost question.', 'start': 20438.802, 'duration': 1.381}, {'end': 20441.523, 'text': 'What is a shell?', 'start': 20440.303, 'duration': 1.22}, {'end': 20449.746, 'text': 'so an operating system is made up of many components, out of which two are very prime components, and these components are the kernel and the shell.', 'start': 20441.523, 'duration': 8.223}, {'end': 20452.799, 'text': 'So a kernel is at the nucleus of a computer.', 'start': 20450.558, 'duration': 2.241}, {'end': 20457.201, 'text': 'It makes the communication between the hardware and the software possible.', 'start': 20453.359, 'duration': 3.842}, {'end': 20463.083, 'text': 'while the kernel is the innermost part of an operating system, a shell is the outermost one.', 'start': 20457.201, 'duration': 5.882}, {'end': 20469.446, 'text': 'a shell in a Linux OS takes input from you in the form of commands, processes it and then gives an output.', 'start': 20463.083, 'duration': 6.363}, {'end': 20474.228, 'text': 'It is the interface through which a user works on the programs commands and scripts.', 'start': 20469.886, 'duration': 4.342}, {'end': 20477.405, 'text': 'A shell is accessed by a terminal which runs it.', 'start': 20474.844, 'duration': 2.561}, {'end': 20485.75, 'text': 'So whenever you run the terminal the shell issues a command prompt where you can type your input which is then executed when you hit the enter key.', 'start': 20477.926, 'duration': 7.824}, {'end': 20489.932, 'text': 'So the output or the result is thereafter displayed on the terminal.', 'start': 20486.31, 'duration': 3.622}, {'end': 20496.235, 'text': 'the shell wraps around the delicate interior of an operating system, thereby protecting it from accidental damage.', 'start': 20489.932, 'duration': 6.303}, {'end': 20497.756, 'text': 'Hence it is named as shell.', 'start': 20496.655, 'duration': 1.101}, {'end': 20502.258, 'text': 'So there are two types of shell, basically the bond shell and the seed shell.', 'start': 20498.396, 'duration': 3.862}, {'end': 20510.115, 'text': 'So the prompt for the bond shell is shown by the dollar symbol and its derivatives are posix con and bash.', 'start': 20502.91, 'duration': 7.205}, {'end': 20512.757, 'text': 'posix shell is also known as SH.', 'start': 20510.115, 'duration': 2.642}, {'end': 20520.502, 'text': 'con shell is also known as SH, and the born-again shell is now known as bash, and the bash is the most popular shell.', 'start': 20512.757, 'duration': 7.745}, {'end': 20525.986, 'text': 'The second type of shell is the seashell and the prompt for this shell is shown by the percentage sign.', 'start': 20521.083, 'duration': 4.903}, {'end': 20535.34, 'text': 'and there are two subcategories for this that is the seashell which is also known as CSH and the top seashell which is also known as PCSH.', 'start': 20526.656, 'duration': 8.684}, {'end': 20538.242, 'text': 'So now the question is what is shell scripting?', 'start': 20536.02, 'duration': 2.222}, {'end': 20543.204, 'text': 'So, shell scripting is writing a series of commands for the shell to execute.', 'start': 20538.802, 'duration': 4.402}, {'end': 20550.567, 'text': 'it can combine lengthy and repetitive sequences of commands into a single and a simple script which can be stored and executed anytime.', 'start': 20543.204, 'duration': 7.363}, {'end': 20557.418, 'text': 'So this reduces the effort required by the end user So let us understand the various steps in creating a shell script.', 'start': 20551.128, 'duration': 6.29}, {'end': 20566.406, 'text': 'So what you do is first you create a file using the VI editor or any other editor, and you name the script with an extension dot sh.', 'start': 20557.959, 'duration': 8.447}, {'end': 20572.751, 'text': "so we will also have a look at it like we will execute a shell script, but I'll just tell you a few steps of how to do it.", 'start': 20566.406, 'duration': 6.345}, {'end': 20580.118, 'text': 'Then we have to start the script with the symbol, such as hash exclamation mark and the slash bin slash.', 'start': 20573.432, 'duration': 6.686}, {'end': 20587.336, 'text': 'sh So hash exclamation is an operator called the shebang, which directs the script to the interpreter location.', 'start': 20580.118, 'duration': 7.218}, {'end': 20595.54, 'text': 'So, if we use the command hash exclamation mark slash, bin, slash, sh, the script gets directed to the bond shell.', 'start': 20587.876, 'duration': 7.664}, {'end': 20598.802, 'text': 'then, once we open this file, we have to write some code.', 'start': 20595.54, 'duration': 3.262}, {'end': 20605.226, 'text': 'we have to save it and for executing we have to just type the command bash and the file name dot sh.', 'start': 20598.802, 'duration': 6.424}, {'end': 20607.342, 'text': "I'll just show you how do you do it? Here.", 'start': 20605.226, 'duration': 2.116}, {'end': 20610.283, 'text': 'I have the git terminal or the git bash opened here.', 'start': 20607.382, 'duration': 2.901}, {'end': 20618.845, 'text': 'So we have to type say for example ABC dot sh We have to write something here.', 'start': 20610.823, 'duration': 8.022}, {'end': 20625.707, 'text': "So what we'll do is I have a simple program which calculates the sum of the digits of a number.", 'start': 20619.525, 'duration': 6.182}, {'end': 20631.568, 'text': 'it accepts a number from a user and it calculates the sum of its digits and it displays the result.', 'start': 20625.707, 'duration': 5.861}, {'end': 20633.629, 'text': 'So this is a very simple program.', 'start': 20632.248, 'duration': 1.381}, {'end': 20635.249, 'text': "I'll just write it here.", 'start': 20633.989, 'duration': 1.26}, {'end': 20638.747, 'text': "I'll just save it WQ.", 'start': 20636.886, 'duration': 1.861}, {'end': 20644.61, 'text': 'Okay, so it is saved and now we have to just run this script using the command bash.', 'start': 20639.327, 'duration': 5.283}, {'end': 20648.032, 'text': "Let me just check whether I've inserted.", 'start': 20645.651, 'duration': 2.381}, {'end': 20651.714, 'text': 'Okay, so we are missing out on a very important thing here.', 'start': 20648.052, 'duration': 3.662}, {'end': 20653.635, 'text': 'We have to type she bang operator.', 'start': 20651.734, 'duration': 1.901}, {'end': 20661.399, 'text': 'Okay, so hash exclamation slash bin slash sh we have written whatever we wanted.', 'start': 20653.795, 'duration': 7.604}, {'end': 20672.156, 'text': 'Okay, so we have saved it and now bash A B C dot sh so it says enter a number 88.', 'start': 20661.419, 'duration': 10.737}, {'end': 20675.398, 'text': 'So the sum of digits of 88 is 16.', 'start': 20672.156, 'duration': 3.242}, {'end': 20678.781, 'text': 'So this is how you write a shell script and you run a shell script.', 'start': 20675.398, 'duration': 3.383}, {'end': 20685.065, 'text': 'So this was a very simple program, but you can write any program that you want and you can run it using the bash.', 'start': 20678.841, 'duration': 6.224}, {'end': 20689.248, 'text': 'So we have come to the final part of this session.', 'start': 20685.866, 'duration': 3.382}, {'end': 20690.409, 'text': 'That is the git commands.', 'start': 20689.508, 'duration': 0.901}, {'end': 20696.669, 'text': 'and, before knowing the get commands, will quickly brush up a few things about get what is get.', 'start': 20691.307, 'duration': 5.362}, {'end': 20698.51, 'text': 'so get is a free, open source,', 'start': 20696.669, 'duration': 1.841}, {'end': 20706.053, 'text': 'distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency.', 'start': 20698.51, 'duration': 7.543}, {'end': 20713.775, 'text': 'So get has the functionality, performance, security and flexibility that most teams and individual developers need.', 'start': 20706.653, 'duration': 7.122}, {'end': 20717.877, 'text': 'it also serves as an important distributed version control tool that is used in devops.', 'start': 20713.775, 'duration': 4.102}, {'end': 20722.811, 'text': 'Tools like it enable the communication between the development and the operations team.', 'start': 20718.689, 'duration': 4.122}, {'end': 20727.133, 'text': "So whenever you're developing a large project with a huge number of collaborators,", 'start': 20723.371, 'duration': 3.762}, {'end': 20732.196, 'text': 'it is very important to have communication between the collaborators while making changes in the project.', 'start': 20727.133, 'duration': 5.063}, {'end': 20736.658, 'text': 'commit messages and get play a very important role in communicating among the team.', 'start': 20732.196, 'duration': 4.462}, {'end': 20741.08, 'text': 'the bits and pieces that we all deploy lies in the version control system like it.', 'start': 20736.658, 'duration': 4.422}, {'end': 20749.684, 'text': 'So to succeed in devops, you need to have all the communication in the version control and hence get plays a very vital role in succeeding at devops.', 'start': 20741.698, 'duration': 7.986}, {'end': 20758.331, 'text': 'So this was the definition of get and this is the diagram that you must remember, like the working directory, the staging area,', 'start': 20750.425, 'duration': 7.906}, {'end': 20761.034, 'text': 'the local repository and the remote repository.', 'start': 20758.331, 'duration': 2.703}], 'summary': 'Maintain resource threshold, shell scripting basics, and importance of git in devops', 'duration': 407.948, 'max_score': 20353.086, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20353086.jpg'}, {'end': 20550.567, 'src': 'embed', 'start': 20521.083, 'weight': 5, 'content': [{'end': 20525.986, 'text': 'The second type of shell is the seashell and the prompt for this shell is shown by the percentage sign.', 'start': 20521.083, 'duration': 4.903}, {'end': 20535.34, 'text': 'and there are two subcategories for this that is the seashell which is also known as CSH and the top seashell which is also known as PCSH.', 'start': 20526.656, 'duration': 8.684}, {'end': 20538.242, 'text': 'So now the question is what is shell scripting?', 'start': 20536.02, 'duration': 2.222}, {'end': 20543.204, 'text': 'So, shell scripting is writing a series of commands for the shell to execute.', 'start': 20538.802, 'duration': 4.402}, {'end': 20550.567, 'text': 'it can combine lengthy and repetitive sequences of commands into a single and a simple script which can be stored and executed anytime.', 'start': 20543.204, 'duration': 7.363}], 'summary': 'Shell scripting simplifies commands for execution, promoting efficiency and reusability.', 'duration': 29.484, 'max_score': 20521.083, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20521083.jpg'}, {'end': 20638.747, 'src': 'embed', 'start': 20610.823, 'weight': 6, 'content': [{'end': 20618.845, 'text': 'So we have to type say for example ABC dot sh We have to write something here.', 'start': 20610.823, 'duration': 8.022}, {'end': 20625.707, 'text': "So what we'll do is I have a simple program which calculates the sum of the digits of a number.", 'start': 20619.525, 'duration': 6.182}, {'end': 20631.568, 'text': 'it accepts a number from a user and it calculates the sum of its digits and it displays the result.', 'start': 20625.707, 'duration': 5.861}, {'end': 20633.629, 'text': 'So this is a very simple program.', 'start': 20632.248, 'duration': 1.381}, {'end': 20635.249, 'text': "I'll just write it here.", 'start': 20633.989, 'duration': 1.26}, {'end': 20638.747, 'text': "I'll just save it WQ.", 'start': 20636.886, 'duration': 1.861}], 'summary': 'Creating a program to calculate the sum of digits in a number.', 'duration': 27.924, 'max_score': 20610.823, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20610823.jpg'}, {'end': 20706.053, 'src': 'embed', 'start': 20672.156, 'weight': 4, 'content': [{'end': 20675.398, 'text': 'So the sum of digits of 88 is 16.', 'start': 20672.156, 'duration': 3.242}, {'end': 20678.781, 'text': 'So this is how you write a shell script and you run a shell script.', 'start': 20675.398, 'duration': 3.383}, {'end': 20685.065, 'text': 'So this was a very simple program, but you can write any program that you want and you can run it using the bash.', 'start': 20678.841, 'duration': 6.224}, {'end': 20689.248, 'text': 'So we have come to the final part of this session.', 'start': 20685.866, 'duration': 3.382}, {'end': 20690.409, 'text': 'That is the git commands.', 'start': 20689.508, 'duration': 0.901}, {'end': 20696.669, 'text': 'and, before knowing the get commands, will quickly brush up a few things about get what is get.', 'start': 20691.307, 'duration': 5.362}, {'end': 20698.51, 'text': 'so get is a free, open source,', 'start': 20696.669, 'duration': 1.841}, {'end': 20706.053, 'text': 'distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency.', 'start': 20698.51, 'duration': 7.543}], 'summary': 'Session covered shell scripting, git commands, and git basics like open source and distributed version control system.', 'duration': 33.897, 'max_score': 20672.156, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20672156.jpg'}, {'end': 20812.06, 'src': 'embed', 'start': 20781.637, 'weight': 3, 'content': [{'end': 20783.498, 'text': 'Now, let us go to the get bash.', 'start': 20781.637, 'duration': 1.861}, {'end': 20787.499, 'text': 'So the first command that we will see here is get config command.', 'start': 20784.158, 'duration': 3.341}, {'end': 20793.541, 'text': 'Okay, so this command sets the author name and the email address respectively to be used with your comments.', 'start': 20787.979, 'duration': 5.562}, {'end': 20809.799, 'text': 'So how do you do it? The syntax is pretty simple like get get config hyphen global user dot name and the name say for example edureka in my case.', 'start': 20794.201, 'duration': 15.598}, {'end': 20812.06, 'text': "Let's just say urban.", 'start': 20810.559, 'duration': 1.501}], 'summary': "The 'get config' command sets the author name and email address for comments.", 'duration': 30.423, 'max_score': 20781.637, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20781637.jpg'}, {'end': 20934.957, 'src': 'embed', 'start': 20881.665, 'weight': 0, 'content': [{'end': 20883.506, 'text': 'So the next command is the git clone command.', 'start': 20881.665, 'duration': 1.841}, {'end': 20887.917, 'text': 'So this command is used to obtain a repository from an existing URL.', 'start': 20884.156, 'duration': 3.761}, {'end': 20893.419, 'text': "See for example, let me just show you I'll clone a repository from my github account.", 'start': 20888.557, 'duration': 4.862}, {'end': 20900.661, 'text': 'Okay So say for example, this is the repository game of life, which is available on my github account to clone that URL.', 'start': 20894.059, 'duration': 6.602}, {'end': 20906.322, 'text': "I'll have to first go to this tab clone or download click here and then you'll get link.", 'start': 20901.021, 'duration': 5.301}, {'end': 20909.263, 'text': 'Okay, copy that link clone with HTTPS.', 'start': 20906.542, 'duration': 2.721}, {'end': 20912.684, 'text': 'Okay, copy that link and paste it here kit.', 'start': 20909.483, 'duration': 3.201}, {'end': 20918.632, 'text': 'clone and the repository paste press enter.', 'start': 20913.59, 'duration': 5.042}, {'end': 20924.374, 'text': 'Okay, so the repository is being cloned here.', 'start': 20922.213, 'duration': 2.161}, {'end': 20930.416, 'text': 'And it is still working and it is done.', 'start': 20926.734, 'duration': 3.682}, {'end': 20934.957, 'text': 'Okay So as you can see here the game of life repository has been cloned.', 'start': 20931.436, 'duration': 3.521}], 'summary': "The git clone command is used to obtain a repository from an existing url, for example, cloning the 'game of life' repository from a github account.", 'duration': 53.292, 'max_score': 20881.665, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo20881665.jpg'}], 'start': 18028.189, 'title': 'Linux commands and system administration', 'summary': "Covers key linux commands, including 'sort', 'chmod', 'tar', 'awk', and 'git', providing practical examples and syntax details. it highlights functionalities such as file management, networking, system administration, shell scripting, and basics of git, emphasizing their importance and usage in linux os.", 'chapters': [{'end': 18564.118, 'start': 18028.189, 'title': 'Linux file management', 'summary': "Explains the 'sort', 'ch own', 'chmod', 'lsof', and 'id' commands in linux. it covers sorting files numerically, changing ownership and permissions, modifying access permissions, listing open files, and obtaining user and group information.", 'duration': 535.929, 'highlights': ["The CH own command is used to change the owner and the group of the file. The CH own command allows changing the owner and group of files, demonstrated by modifying the owner of a file from 'edureka' to 'root' using the 'chown' command.", "The chmod command is used to change the access permissions of files and directories. The chmod command modifies access permissions, exemplified by changing the permissions of a file 'bac.txt' to 'read, write, execute' for the user, group, and others using the command 'chmod 777 bac.txt'.", "The LSOF command provides a list of open files and their detailed information, including the process ID, user, and file descriptor. The LSOF command lists open files and their details, including the process ID, user, file descriptor, size, and current working directory, offering insights into the files opened by specific users using 'lsof -u username'.", "The ID command is used to find user and group information, including usernames, numeric IDs, and group associations. The ID command enables obtaining user and group information like effective group IDs, all group IDs, and effective user ID, with additional options such as 'ID -G', 'ID -G', 'ID -u', 'ID -n', 'ID -r', 'ID -u', 'ID -h', and 'ID -v'.", "The sort command is used to sort files numerically. The sort command organizes files numerically with the '-n' flag, allowing the sorting of numbers in ascending order, providing a practical example of sorting files numerically using the 'sort -n' command."]}, {'end': 18968.842, 'start': 18564.878, 'title': 'Linux commands overview', 'summary': 'Provides an overview of key linux commands including id, tar, cut, sed, unique, and watch, highlighting their functionalities and syntax for executing tasks such as user and group identification, file zipping and unzipping, text manipulation, duplicate line filtering, and program execution monitoring.', 'duration': 403.964, 'highlights': ['The ID command displays UID, group ID, and associated groups for a user, such as edureka, providing a simple method for user identification and group association. UID: 1000, Group ID: 1000, User: edureka', 'The TAR command is utilized for zipping and unzipping files in dot tar format, with specific syntax for both zipping and unzipping operations, facilitating file compression and extraction in a straightforward manner. Zipping syntax: tar -CVF file name folder name, Unzipping syntax: tar -xBF tar file name', 'The CUT command enables the extraction of specific columns from a file, offering a method for selecting and displaying chosen columns, as well as the ability to display only a single column, providing efficient file content manipulation. Selected columns: A 1, B 2, C 3, Single column display: A, B, C', 'The SED command serves as a non-interactive text editor, allowing editing operations on a file using standard input or a file, providing a powerful utility for file manipulations, including text replacement using the substitute s flag. Text replacement: baban to chagan', 'The UNIQUE command is employed for filtering out duplicate lines in files, offering a simple method for removing duplicate entries from a file. N/A', 'The WATCH command in Linux executes a program periodically, displaying output in full screen, and runs a specified command repeatedly, with options for highlighting differences between successive updates, providing a tool for program execution monitoring. Default execution interval: every two seconds']}, {'end': 19265.612, 'start': 18968.842, 'title': 'Linux commands overview', 'summary': 'Introduces the free, evil, history, and dd commands, providing practical examples and syntax details. it emphasizes the usage and benefits of each command, such as viewing free space, executing shell commands, recalling previously executed commands, and converting/copying files.', 'duration': 296.77, 'highlights': ['The free command displays the total free space, used memory, swap memory, and kernel buffers, with options to display memory in bytes, kilobytes, megabytes, or gigabytes. The free command provides insights into total installed memory, used memory, unused memory, shared memory, buffer memory, cache memory, and various options to display memory in different units such as bytes, kilobytes, megabytes, or gigabytes.', 'The history command allows users to view and recall previously executed commands, with the capability to list a specific number of recent commands, providing a useful feature to track command history and make changes if needed. The history command enables users to view and recall previously executed commands, list a specific number of recent commands, and modify the command history if required, enhancing user productivity and system management.', 'The DD command is a versatile utility for Unix-like OS, primarily used to convert and copy files, with a syntax that uses option=value format for command line operations. The DD command is a versatile utility for Unix-like OS, used to convert and copy files, with a command line syntax that uses option=value format, offering a flexible and powerful tool for file manipulation and data management.', 'The evil command is a built-in Linux command used to execute arguments as a shell command, combining arguments into a single string and using it as input to the shell, emphasizing its simplicity and practical usage. The evil command is a built-in Linux command that executes arguments as a shell command, combining them into a single string and using it as input to the shell, highlighting its simple syntax and practical usage for executing shell commands.']}, {'end': 20438.042, 'start': 19265.792, 'title': 'Linux networking and system administration commands', 'summary': 'Covers essential linux networking and system administration commands such as ssh, ip, i have config, ns lookup, curl, awk, pr, env, ip tables, apt-get, df, and du, highlighting their functionalities and practical examples.', 'duration': 1172.25, 'highlights': ['SSH Command The SSH command is used for secure shell access and to operate network services securely. It allows remote command line execution and can secure any network service. It facilitates access between master and slave nodes and can generate public-private authentication key pairs.', 'IP Command The IP command in Linux is used for network administration tasks, including showing and manipulating routing devices and tunnels. It is more powerful than ifconfig and can perform tasks like configuring and modifying default and static routing, setting up tunnels, and listing IP addresses and property information.', 'NS lookup Command The NS lookup command is used to query the domain name system for obtaining domain names, IP addresses, or specific DNS records. It is also employed to troubleshoot DNS-related issues.', 'CURL Command The CURL command is utilized for transferring data to or from a server using various protocols. It is designed for automation and supports the transfer of multiple files simultaneously.', 'AWK Command The AWK command is a scripting language used for data manipulation and report generation. It requires no compiling and supports variables, numeric functions, string functions, and logical operators.', 'PR Command The PR command is a Unix utility for translating and deleting characters, supporting transformations such as uppercase to lowercase, squeezing repeated characters, deleting specific characters, and basic find and replace. It can be used with Unix pipes for complex translations.', 'ENV Command The ENV command is used to print environment variables and run a utility or command in a custom environment. It is often employed by shell scripts to launch a correct interpreter and can be used to run a command with an empty environment or to remove a variable from the environment.', 'IP tables Command The IP tables command is a command line interface for setting up and maintaining net filter firewall tables for IPv4. It matches packets with defined rules and takes specified actions on possible matches.', 'apt-get Command The apt-get command is a tool for handling packages in Linux, retrieving information and packages from authenticated sources for installation, upgrade, and removal. It is particularly useful for Ubuntu-based systems.', 'DF Command and du Command The DF command reports available disk space used by file systems, while the du command reports the size of directory trees and individual files, ensuring that disk usage does not exceed the 80% threshold and prompting scaling or cleanup if necessary.']}, {'end': 20672.156, 'start': 20438.802, 'title': 'Understanding shells and shell scripting', 'summary': 'Explains the concept of a shell, its types, and the process of shell scripting, highlighting its importance and usage in executing commands and scripts, including an example of creating and executing a shell script in a linux os.', 'duration': 233.354, 'highlights': ['A shell is the outermost component of an operating system, taking user input in the form of commands, processing it, and displaying the output, thereby facilitating user interaction with programs and scripts.', 'The shell serves as a protective interface around the core of an operating system, safeguarding it from potential damage and plays a vital role in linking user input to the execution of commands and scripts.', 'Shell scripting involves writing a series of commands that can be combined into a single script, reducing user effort and enabling the execution of repetitive sequences of commands at any time.', 'The two main types of shells are the bond shell (prompt symbol: $) and the seashell (prompt symbol: %), with derivatives such as posix shell (SH), con shell (SH), born-again shell (bash), seashell (CSH), and top seashell (PCSH), where bash is the most popular shell.', "The process of creating and executing a shell script involves steps such as creating a file with a .sh extension, starting the script with the shebang operator, writing code, saving the file, and executing it using the command 'bash filename.sh'."]}, {'end': 21218.693, 'start': 20672.156, 'title': 'Git commands and basics', 'summary': 'Covers the basics of git, including its definition, importance in devops, and essential commands like git config, git init, git clone, git add, git commit, git show, git remote, git push, git pull, git branch, git checkout, and git merge.', 'duration': 546.537, 'highlights': ['Git is a free, open source, distributed version control system tool designed for speed and efficiency, serving as an important tool in DevOps. Git is a free, open source, distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency.', 'Importance of communication and collaboration in large projects, with commit messages and Git playing a vital role; communication in the version control system is crucial for succeeding in DevOps. Commit messages and Git play a very important role in communicating among the team, and to succeed in DevOps, communication in the version control system is crucial.', 'Syntax and usage of essential Git commands like git config, git init, git clone, git add, git commit, git show, git remote, git push, git pull, git branch, git checkout, git merge. The transcript covers the syntax and usage of essential Git commands like git config, git init, git clone, git add, git commit, git show, git remote, git push, git pull, git branch, git checkout, and git merge.']}], 'duration': 3190.504, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo18028189.jpg', 'highlights': ["The CH own command allows changing the owner and group of files, demonstrated by modifying the owner of a file from 'edureka' to 'root' using the 'chown' command.", "The chmod command modifies access permissions, exemplified by changing the permissions of a file 'bac.txt' to 'read, write, execute' for the user, group, and others using the command 'chmod 777 bac.txt'.", "The sort command organizes files numerically with the '-n' flag, allowing the sorting of numbers in ascending order, providing a practical example of sorting files numerically using the 'sort -n' command.", 'The TAR command is utilized for zipping and unzipping files in dot tar format, with specific syntax for both zipping and unzipping operations, facilitating file compression and extraction in a straightforward manner.', 'The ID command displays UID, group ID, and associated groups for a user, such as edureka, providing a simple method for user identification and group association. UID: 1000, Group ID: 1000, User: edureka', 'The free command provides insights into total installed memory, used memory, unused memory, shared memory, buffer memory, cache memory, and various options to display memory in different units such as bytes, kilobytes, megabytes, or gigabytes.', 'The history command enables users to view and recall previously executed commands, list a specific number of recent commands, and modify the command history if required, enhancing user productivity and system management.', 'The SSH command is used for secure shell access and to operate network services securely. It allows remote command line execution and can secure any network service. It facilitates access between master and slave nodes and can generate public-private authentication key pairs.', 'Git is a free, open source, distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency.', 'Importance of communication and collaboration in large projects, with commit messages and Git playing a vital role; communication in the version control system is crucial for succeeding in DevOps.']}, {'end': 22446.277, 'segs': [{'end': 21408.705, 'src': 'embed', 'start': 21385.683, 'weight': 11, 'content': [{'end': 21392.748, 'text': 'So earlier RazerFS was used as a default file system for Linux SOSC but now they shifted to EXT3.', 'start': 21385.683, 'duration': 7.065}, {'end': 21401.302, 'text': 'What Razer FS does is that it dynamically supports the file extension but has certain performance drawbacks,', 'start': 21393.959, 'duration': 7.343}, {'end': 21405.683, 'text': 'which is why now people have again moved back to PXE3 from Razer FS.', 'start': 21401.302, 'duration': 4.381}, {'end': 21408.705, 'text': 'So next up we have the XFS.', 'start': 21406.124, 'duration': 2.581}], 'summary': 'Linux sosc switched from razerfs to ext3 due to performance drawbacks, now considering xfs.', 'duration': 23.022, 'max_score': 21385.683, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo21385683.jpg'}, {'end': 21479.479, 'src': 'embed', 'start': 21453.922, 'weight': 12, 'content': [{'end': 21460.166, 'text': 'So a system that never goes into hibernate is required to have swap space equal to RAM space, right?', 'start': 21453.922, 'duration': 6.244}, {'end': 21465.89, 'text': 'So swap space is always equal to RAM space for systems that never go into hibernation.', 'start': 21460.506, 'duration': 5.384}, {'end': 21468.652, 'text': 'Up next, we have the file system architecture.', 'start': 21466.23, 'duration': 2.422}, {'end': 21472.474, 'text': 'Now, when we talk about architecture, there are a lot of things we need to know.', 'start': 21468.672, 'duration': 3.802}, {'end': 21474.115, 'text': "Let's get going.", 'start': 21472.955, 'duration': 1.16}, {'end': 21479.479, 'text': 'The first thing you need to know about the file system architecture is that it is a hierarchical file structure.', 'start': 21474.235, 'duration': 5.244}], 'summary': 'For systems never hibernating, swap space equals ram space. file system is hierarchical.', 'duration': 25.557, 'max_score': 21453.922, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo21453922.jpg'}, {'end': 21623.533, 'src': 'embed', 'start': 21579.951, 'weight': 0, 'content': [{'end': 21587.434, 'text': 'we see that the advanced data that the structure stores or represents contains information about the file system stored on the drive right?', 'start': 21579.951, 'duration': 7.483}, {'end': 21595.846, 'text': 'So this information that is contained about the partitions is completely distinct and independent from other file system metadata.', 'start': 21587.864, 'duration': 7.982}, {'end': 21599.387, 'text': "Now let's look at this architecture we have.", 'start': 21596.226, 'duration': 3.161}, {'end': 21606.609, 'text': 'So the file system requires an API to access the function calls or to interact with file systems right?', 'start': 21599.807, 'duration': 6.802}, {'end': 21611.751, 'text': 'So API facilitates tasks such as creating, deleting and copying the files.', 'start': 21607.009, 'duration': 4.742}, {'end': 21615.892, 'text': 'When I talk about API, I mean application programming interface.', 'start': 21612.071, 'duration': 3.821}, {'end': 21623.533, 'text': 'So the first two parts of the given system file system together make up the Linux virtual file system,', 'start': 21616.59, 'duration': 6.943}], 'summary': 'Advanced data in the structure contains file system information, with api facilitating tasks for the linux virtual file system.', 'duration': 43.582, 'max_score': 21579.951, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo21579951.jpg'}], 'start': 21220.862, 'title': 'Linux file systems', 'summary': 'Provides an in-depth understanding of linux file systems, covering the types of file systems including ext4, jfs, razerfs, xfs, and btrfs, file system architecture, features like case sensitivity and hidden files, and the concept that everything in linux, including directories and devices, is considered a file.', 'chapters': [{'end': 21431.573, 'start': 21220.862, 'title': 'Understanding linux file systems', 'summary': 'Discusses the concept of rebasing in git, the importance of linux file system, and the different types of linux file systems including ext4, jfs, razerfs, xfs, and btrfs, with a focus on their features and applications.', 'duration': 210.711, 'highlights': ['Importance of Linux file system A good file system is essential for everyday system processes, controlling how, where, and when data is stored and retrieved, and organizing files into a structured collection, with everything in Linux being a file.', 'EXT4 as the fastest file system in Linux EXT4 is the fastest file system in Linux, capable of managing large amounts of data, with the ability to handle up to 2TB of data, making it a significant improvement over its predecessors.', 'XFS for high-speed parallel IO processing XFS is a high-speed file system specifically designed for parallel IO processing, with NASA being an example of its application, demonstrating its capability for demanding data processing tasks.', 'JFS as an alternative to EXT for limited power CPUs JFS is an alternative to the EXT file system, particularly beneficial for CPUs with limited power, showcasing its adaptability to resource-constrained environments.', 'RazerFS and its drawbacks RazerFS, while dynamically supporting file extensions, has certain performance drawbacks, leading to a shift back to EXT3 from RazerFS due to its limitations.']}, {'end': 21803.155, 'start': 21431.893, 'title': 'Linux file system overview', 'summary': 'Explains the types of file systems in linux, including swap file system and file system architecture, emphasizing the hierarchical structure, non-volatile storage, namespace, and advanced data representation. it also covers the api, linux virtual file system, and different file system directories.', 'duration': 371.262, 'highlights': ['The file system architecture in Linux is a hierarchical file structure, providing for non-volatile storage, namespace for logical structure, and storing advanced information about partitions. The file system architecture in Linux is hierarchical, manages non-volatile storage, defines namespace for logical structure, and stores advanced information about partitions.', 'Linux file system requires an API for accessing function calls and interacting with file systems, facilitating tasks like creating, deleting, and copying files. Linux file system requires an API for accessing function calls and interacting with file systems to perform tasks like creating, deleting, and copying files.', 'Different file system directories in Linux, such as bin, dev, etc., usr, home, lib, and media, serve specific functions like storing binaries, device files, system-wide configurations, user directories, and libraries. Different file system directories in Linux, like bin, dev, etc., usr, home, lib, and media, serve specific functions such as storing binaries, device files, system-wide configurations, user directories, and libraries.']}, {'end': 22035.227, 'start': 21803.316, 'title': 'Linux file system features', 'summary': 'Covers the features of linux file systems including case sensitivity, hidden files, and the organization of partitions, directories, and drives, highlighting the concept that in linux, everything including directories, applications, and devices is considered a file.', 'duration': 231.911, 'highlights': ['In Linux, everything including directories, applications, and devices is considered a file. Linux does not use drive letters to organize the drive, and everything in Linux, including directories, applications, and devices, is considered a file.', 'Linux distinguishes between standard files and hidden files, with most configuration files being hidden. Linux distinguishes between standard files and hidden files, with most configuration files being hidden and represented by a dot before their name.', 'Linux is case sensitive, allowing for files with the same name but different cases to coexist. Linux is case sensitive, allowing files with the same name but different cases to coexist without needing to be renamed.']}, {'end': 22446.277, 'start': 22035.78, 'title': 'Understanding linux file system', 'summary': 'Explores the linux file system, demonstrating how everything in linux, including commands and directories, is essentially a file, with examples of commands such as ls, cat, cp, and rm, and showcasing the process of adding a new user to the system.', 'duration': 410.497, 'highlights': ['The ls command displays all the directories in the system, including bin, library files, dev file, etc., and home. Demonstrates the function of the ls command in displaying directories in the system.', 'Commands like ls and cat are also files present in the bin directory, highlighting that everything in Linux is essentially a file. Illustrates the concept that commands in Linux are files, emphasizing the nature of the Linux file system.', "Demonstrates the use of cp command to copy the contents of a file into a new file, showcasing the command 'sudo cp ls corac' as an example. Provides a practical example of using the cp command to copy file contents and demonstrates the sudo command for accessing administrator files.", "The rm command is used to remove a file, exemplified by the command 'sudo rm ls'. Illustrates the usage of the rm command to delete a file, showcasing 'sudo rm ls' as an example.", "The process of adding a new user to the system is demonstrated using the 'sudo adduser' command, with the example of creating a new user named Rekha. Illustrates the process of adding a new user to the system using the 'sudo adduser' command and showcases creating a new user named Rekha."]}], 'duration': 1225.415, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo21220862.jpg', 'highlights': ['EXT4 is the fastest file system in Linux, capable of managing large amounts of data, with the ability to handle up to 2TB of data.', 'XFS is a high-speed file system specifically designed for parallel IO processing, with NASA being an example of its application.', 'JFS is an alternative to the EXT file system, particularly beneficial for CPUs with limited power, showcasing its adaptability to resource-constrained environments.', 'The file system architecture in Linux is hierarchical, manages non-volatile storage, defines namespace for logical structure, and stores advanced information about partitions.', 'Linux file system requires an API for accessing function calls and interacting with file systems to perform tasks like creating, deleting, and copying files.', 'Different file system directories in Linux, like bin, dev, etc., usr, home, lib, and media, serve specific functions such as storing binaries, device files, system-wide configurations, user directories, and libraries.', 'In Linux, everything including directories, applications, and devices is considered a file.', 'Linux distinguishes between standard files and hidden files, with most configuration files being hidden and represented by a dot before their name.', 'Linux is case sensitive, allowing files with the same name but different cases to coexist without needing to be renamed.', 'The ls command displays all the directories in the system, including bin, library files, dev file, etc., and home.', 'Commands like ls and cat are also files present in the bin directory, highlighting that everything in Linux is essentially a file.', "Demonstrates the use of cp command to copy the contents of a file into a new file, showcasing the command 'sudo cp ls corac' as an example.", "The rm command is used to remove a file, exemplified by the command 'sudo rm ls'.", "The process of adding a new user to the system is demonstrated using the 'sudo adduser' command, with the example of creating a new user named Rekha."]}, {'end': 24713.202, 'segs': [{'end': 22507.587, 'src': 'embed', 'start': 22481.747, 'weight': 1, 'content': [{'end': 22489.771, 'text': 'Now, if you can check there are most of the files that you see here are already there in the root bin directory right?', 'start': 22481.747, 'duration': 8.024}, {'end': 22496.053, 'text': 'So what is basically different and which directory are you using when you basically store files??', 'start': 22490.171, 'duration': 5.882}, {'end': 22497.474, 'text': 'Where is the file getting stored??', 'start': 22496.113, 'duration': 1.361}, {'end': 22504.285, 'text': 'right, so to do that, you will basically have to type in this command.', 'start': 22498.001, 'duration': 6.284}, {'end': 22507.587, 'text': "let's say, which ls are you using?", 'start': 22504.285, 'duration': 3.302}], 'summary': 'Files are stored in root bin directory using specific commands.', 'duration': 25.84, 'max_score': 22481.747, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo22481747.jpg'}, {'end': 23135.699, 'src': 'embed', 'start': 23106.045, 'weight': 0, 'content': [{'end': 23112.746, 'text': 'So to get that feel that okay a software is being updated or software is being installed use verbose also.', 'start': 23106.045, 'duration': 6.701}, {'end': 23117.448, 'text': 'And then print hash marks of the package archive as it is unpacked.', 'start': 23113.366, 'duration': 4.082}, {'end': 23118.908, 'text': 'We use "-h".', 'start': 23117.768, 'duration': 1.14}, {'end': 23121.929, 'text': 'Usually we use RPM-IVH.', 'start': 23119.488, 'duration': 2.441}, {'end': 23124.65, 'text': 'Now check the RPM signature.', 'start': 23122.47, 'duration': 2.18}, {'end': 23127.772, 'text': 'To check the signature, we have this command "-checksig".', 'start': 23125.011, 'duration': 2.761}, {'end': 23135.699, 'text': 'so it checks the pgp signature before installing any package, if its integrity and origin is okay,', 'start': 23129.033, 'duration': 6.666}], 'summary': 'Use verbose option to update/install software, print package archive hash marks, and check rpm signature for integrity and origin.', 'duration': 29.654, 'max_score': 23106.045, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo23106045.jpg'}, {'end': 23202.825, 'src': 'embed', 'start': 23175.457, 'weight': 2, 'content': [{'end': 23178.298, 'text': 'minus minus no depths and the package name.', 'start': 23175.457, 'duration': 2.841}, {'end': 23182.278, 'text': 'one can check if a particular package is already installed or not.', 'start': 23178.298, 'duration': 3.98}, {'end': 23185.239, 'text': 'to do that, just add minus l.', 'start': 23182.278, 'duration': 2.961}, {'end': 23188.419, 'text': 'so minus l is for list all the installed packages.', 'start': 23185.239, 'duration': 3.18}, {'end': 23191.16, 'text': 'so if it is installed rpm, minus ql.', 'start': 23188.419, 'duration': 2.741}, {'end': 23199.443, 'text': 'now to install all the packages which are there to view all the installed packages, use minus mod, so rpm-qa.', 'start': 23191.16, 'duration': 8.283}, {'end': 23202.825, 'text': 'so one can list all the recently installed rpm packages.', 'start': 23199.443, 'duration': 3.382}], 'summary': 'Rpm command can be used to list and install packages, e.g., rpm -qa to view all installed packages.', 'duration': 27.368, 'max_score': 23175.457, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo23175457.jpg'}, {'end': 23445.329, 'src': 'embed', 'start': 23416.595, 'weight': 3, 'content': [{'end': 23419.157, 'text': 'we have to install all those dependency by ourselves.', 'start': 23416.595, 'duration': 2.562}, {'end': 23424.299, 'text': 'but in yum it is just like apt-get it will install all those dependencies.', 'start': 23419.657, 'duration': 4.642}, {'end': 23433.964, 'text': 'So we have two things rpm and yum the same thing which rpm and yum is is almost synonym to dpkg and apt-get.', 'start': 23424.759, 'duration': 9.205}, {'end': 23445.329, 'text': 'So if you want any package to be installed manually in Ubuntu or in a Linux Debian distro what we tend to do is we use dpkg command to install it.', 'start': 23434.444, 'duration': 10.885}], 'summary': 'Yum is like apt-get for installing dependencies in linux, similar to dpkg and apt-get in ubuntu and debian.', 'duration': 28.734, 'max_score': 23416.595, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo23416595.jpg'}, {'end': 23822.46, 'src': 'embed', 'start': 23791.37, 'weight': 4, 'content': [{'end': 23797.836, 'text': 'if that update is available there, it will update it automatically and to check update for which packages are available.', 'start': 23791.37, 'duration': 6.466}, {'end': 23806.003, 'text': 'You can write command yum check update if you want to update the whole system just like Ubuntu update update and update upgrade was there.', 'start': 23798.056, 'duration': 7.947}, {'end': 23810.751, 'text': 'YUM update is there and sent to us to list all the enabled repository in YUM.', 'start': 23806.707, 'duration': 4.044}, {'end': 23812.712, 'text': 'We use command repolist.', 'start': 23811.211, 'duration': 1.501}, {'end': 23822.46, 'text': 'So to check what are the repositories which are there in my run YUM source directory, YUM repolist to view both enabled and disabled one,', 'start': 23813.093, 'duration': 9.367}], 'summary': 'Yum can automatically update and list enabled repositories using commands like yum check update and yum repolist.', 'duration': 31.09, 'max_score': 23791.37, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo23791370.jpg'}], 'start': 22446.277, 'title': 'Linux package management', 'summary': "Discusses linux directory structure, rpm, and yum package managers, covering topics such as directory organization, rpm features, package management commands, and yum's automatic handling of software dependencies, along with details on dpkg and apt package management commands.", 'chapters': [{'end': 22984.634, 'start': 22446.277, 'title': 'Linux directory structure and rpm', 'summary': 'Discusses the linux directory structure, explaining the organization of directories such as bin, temp, home, dev, proc, and network, and elaborates on the red hat package manager (rpm) and its features including cryptographic verification and patch application.', 'duration': 538.357, 'highlights': ['The chapter discusses various directories such as bin, temp, home, dev, proc, and network in the Linux directory structure. It covers the purpose and contents of each directory, providing an overview of the organization of the Linux file system.', 'The Red Hat Package Manager (RPM) is explained, including its creation in 1997, being free and GPL licensed, and its default packaging for RHEL, CentOS, Fedora, among others. It outlines the history and features of RPM, highlighting its role in maintaining packages in various Linux distributions.', 'RPM features such as cryptographic verification, md5 checksum, gpg key authentication, and patch application are detailed. It explains how RPM ensures package integrity through cryptographic verification and authentication, and simplifies the update process with patch application.']}, {'end': 23317.266, 'start': 22984.634, 'title': 'Rpm package management', 'summary': "Covers the basics of rpm package management, including installation, updating, uninstallation, querying, and authentication, with a focus on redhat's rpm packages and commands, such as checking dependencies, installing packages, verifying signatures, and listing installed packages.", 'duration': 332.632, 'highlights': ["RedHat's RPM packages can be found at redhat enterprise linux cd rooms, redhat network or redhat errata page having list of packages. RedHat's RPM packages are available at various sources like redhat enterprise linux cd rooms, network, or errata page.", 'It suggests that it has found 95 RPMs very old ones, 5.0 since 2009. 95 RPMs for MySQL were found, including very old versions since 2009.', "To install all the packages which are there to view all the installed packages, use minus mod, so rpm-qa. To view all installed packages, use 'rpm-qa' command.", "To install minus I is the option, but we probably go for V also because it is the verbose mode. Use 'rpm -ivh' for installing packages in verbose mode.", "To verify all the packages use a rather than P just remove P because P is for specific package name. To verify all packages, use 'rpm -Va' instead of specific package name."]}, {'end': 23861.049, 'start': 23317.266, 'title': 'Understanding rpm and yum package managers', 'summary': 'Explains the functionality of rpm and yum package managers, with a focus on yum as the primary choice for rpm based distros, highlighting its ability to automatically handle software dependencies and simplify package installation.', 'duration': 543.783, 'highlights': ['YUM is the primary choice for RPM based distros and was created in 2003. YUM is the official package manager of Red Hat and CentOS, providing a simplified method for package installation and management, emphasizing its role as a repository management tool for fetching packages.', 'YUM automatically handles software dependencies and installs them along with the requested package. YUM simplifies package installation by automatically managing software dependencies, streamlining the process and reducing the need for manual intervention, ensuring compatibility with the Linux distro.', "YUM features appropriate package management compatible with the Linux distro, ensuring compatibility and preventing installation of incompatible software versions. YUM's functionality includes ensuring the compatibility of installed packages with the Linux distro, preventing the installation of incompatible software versions and maintaining system stability."]}, {'end': 24136.527, 'start': 23861.589, 'title': 'Package management in linux', 'summary': 'Covers the usage of yum and dpkg commands for package management in linux, including the commands yum list, yum update, yum history, yum search, dpkg -i, dpkg -s, dpkg -l, dpkg -c, and dpkg -r, with a total of 34 yum history commands and the ability to install packages recursively using dpkg.', 'duration': 274.938, 'highlights': ['The chapter covers the usage of yum and dpkg commands for package management in Linux. The primary focus of the chapter is on the usage of yum and dpkg commands for package management in Linux.', 'Total of 34 yum history commands and the ability to install packages recursively using dpkg. There are a total of 34 yum history commands recorded, and the dpkg command allows for the installation of packages recursively.', 'Commands such as yum list, yum update, yum history, yum search, dpkg -i, dpkg -s, dpkg -l, dpkg -c, and dpkg -r are covered. The chapter includes coverage of various commands such as yum list, yum update, yum history, yum search, and dpkg commands like dpkg -i, dpkg -s, dpkg -l, dpkg -c, and dpkg -r.']}, {'end': 24713.202, 'start': 24136.527, 'title': 'Managing packages with dpkg and apt', 'summary': 'Explains the process of managing packages using dpkg and apt, highlighting the installation, updating, and removal of packages, as well as the use of apt-cache to search for, display, and check dependencies of packages.', 'duration': 576.675, 'highlights': ['apt-get is the default package management system for devian-based distros, providing automatic dependency management, careful handling of upgrades and removals, and external UI support with tools like synaptic and aptitude. apt-get is the default package management system for devian-based distros, providing automatic dependency management, careful handling of upgrades and removals, and external UI support with tools like synaptic and aptitude.', 'apt-cache is used to search for software packages, fetches data from different sources listed in sources.list file, and allows listing, searching, and showing details about packages, as well as checking package dependencies. apt-cache is used to search for software packages, fetches data from different sources listed in sources.list file, and allows listing, searching, and showing details about packages, as well as checking package dependencies.', 'apt-get update and apt-get upgrade commands are used to update the package list and upgrade the system, respectively, with apt-get upgrade indicating the packages to be upgraded. apt-get update and apt-get upgrade commands are used to update the package list and upgrade the system, respectively, with apt-get upgrade indicating the packages to be upgraded.', 'apt-get install, apt-get remove, and apt-get purge are used for installing, removing, and removing along with configuration files of packages, respectively, with options to install multiple packages and download without installing. apt-get install, apt-get remove, and apt-get purge are used for installing, removing, and removing along with configuration files of packages, respectively, with options to install multiple packages and download without installing.', 'apt-get auto remove can clean disk space by removing packages no longer required, and apt-get check and apt-get build-dep are used to check dependencies and install build dependencies, respectively. apt-get auto remove can clean disk space by removing packages no longer required, and apt-get check and apt-get build-dep are used to check dependencies and install build dependencies, respectively.']}], 'duration': 2266.925, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo22446277.jpg', 'highlights': ['The chapter discusses various directories in the Linux directory structure, providing an overview of the organization of the Linux file system.', 'RPM features such as cryptographic verification, md5 checksum, gpg key authentication, and patch application are detailed, ensuring package integrity and simplifying the update process.', 'YUM automatically handles software dependencies and installs them along with the requested package, streamlining the process and reducing the need for manual intervention.', 'The chapter covers the usage of yum and dpkg commands for package management in Linux, including various commands such as yum list, yum update, yum history, yum search, and dpkg commands like dpkg -i, dpkg -s, dpkg -l, dpkg -c, and dpkg -r.', 'apt-get is the default package management system for devian-based distros, providing automatic dependency management, careful handling of upgrades and removals, and external UI support with tools like synaptic and aptitude.']}, {'end': 25875.325, 'segs': [{'end': 24761.14, 'src': 'embed', 'start': 24713.742, 'weight': 0, 'content': [{'end': 24715.604, 'text': 'Now it has started upgrading.', 'start': 24713.742, 'duration': 1.862}, {'end': 24720.807, 'text': 'So there are commands like appget, check, appget, install python with minus minus, no upgrade.', 'start': 24715.964, 'duration': 4.843}, {'end': 24727.758, 'text': 'What is DNS??', 'start': 24726.817, 'duration': 0.941}, {'end': 24737.367, 'text': 'Well, DNS stands for Domain Name System and its main responsibility is to translate internet domain and the host names to IP addresses and vice versa.', 'start': 24728.619, 'duration': 8.748}, {'end': 24743.894, 'text': 'Well, most of you might know that every physical machine connected to the internet is identified by an IP address.', 'start': 24738.468, 'duration': 5.426}, {'end': 24750.477, 'text': 'But most of you might not know that these IPs are unique only inside that same domain, right?', 'start': 24744.775, 'duration': 5.702}, {'end': 24755.818, 'text': 'And another fact that you might not be aware of is that when you type in a URL in your web browser,', 'start': 24750.557, 'duration': 5.261}, {'end': 24761.14, 'text': 'then it automatically gets converted to the equivalent IP address of that server.', 'start': 24755.818, 'duration': 5.322}], 'summary': 'Dns translates domain names to ip addresses, enabling unique identification and url conversion.', 'duration': 47.398, 'max_score': 24713.742, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo24713742.jpg'}, {'end': 24815.967, 'src': 'embed', 'start': 24785.816, 'weight': 5, 'content': [{'end': 24786.516, 'text': 'Why do we do that??', 'start': 24785.816, 'duration': 0.7}, {'end': 24789.697, 'text': 'Why is there an internal conversion into an IP address?', 'start': 24786.596, 'duration': 3.101}, {'end': 24790.218, 'text': 'that happens?', 'start': 24789.697, 'duration': 0.521}, {'end': 24791.758, 'text': 'Can anybody guess why that happens?', 'start': 24790.278, 'duration': 1.48}, {'end': 24806.783, 'text': 'Well, that is because the URL or the fully qualified domain names like google.com, facebook.com, yahoo.com, all these dot coms, right?', 'start': 24796.62, 'duration': 10.163}, {'end': 24810.144, 'text': 'These are the addresses of any server or machine on the internet, okay?', 'start': 24806.863, 'duration': 3.281}, {'end': 24814.366, 'text': 'And they are, however, only easy to remember by the humans, only for us.', 'start': 24810.665, 'duration': 3.701}, {'end': 24815.967, 'text': 'for computers.', 'start': 24815.146, 'duration': 0.821}], 'summary': 'Urls are converted to ip addresses for computer understanding.', 'duration': 30.151, 'max_score': 24785.816, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo24785816.jpg'}, {'end': 24888.438, 'src': 'embed', 'start': 24854.296, 'weight': 6, 'content': [{'end': 24860.862, 'text': "okay, so the domain name system does that, and well, it's a big benefit and the people nowadays might not realize the thing.", 'start': 24854.296, 'duration': 6.566}, {'end': 24868.45, 'text': 'okay, any newcomers might not know, because without the invention of DNS, our lives would have been very difficult, because back in the 80s, 90s,', 'start': 24860.862, 'duration': 7.588}, {'end': 24876.888, 'text': "at that time when we didn't have the DNS, then if we had to access each and every website with the help of just by giving the host name.", 'start': 24868.45, 'duration': 8.438}, {'end': 24886.176, 'text': 'so, for example, if I want to access google.com back in the 80s or 90s, right instead of giving the IP address, if I had to say google.com,', 'start': 24876.888, 'duration': 9.288}, {'end': 24888.438, 'text': 'then I have to specify this in the hosts file.', 'start': 24886.176, 'duration': 2.262}], 'summary': 'Dns is a big benefit; without it, accessing websites in the 80s and 90s would have been difficult.', 'duration': 34.142, 'max_score': 24854.296, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo24854296.jpg'}, {'end': 25003.427, 'src': 'embed', 'start': 24971.874, 'weight': 8, 'content': [{'end': 24973.936, 'text': 'So these are the two things that are involved.', 'start': 24971.874, 'duration': 2.062}, {'end': 24980.922, 'text': "And wherever you configure the DNS server, in whichever environment or whichever machine, that's generally called a DNS server.", 'start': 24974.496, 'duration': 6.426}, {'end': 24983.224, 'text': 'It can even be a running environment.', 'start': 24981.522, 'duration': 1.702}, {'end': 24989.529, 'text': 'And similarly, every system that tries to access that particular server, they are called DNS clients.', 'start': 24983.804, 'duration': 5.725}, {'end': 24996.976, 'text': "So we don't have much of a configuration to do from the DNS client side, but of course, DNS server side, we have a lot of configuration to do.", 'start': 24990.19, 'duration': 6.786}, {'end': 24998.077, 'text': 'Excuse me, guys.', 'start': 24997.596, 'duration': 0.481}, {'end': 25003.427, 'text': "Yeah, so that's about this example.", 'start': 25001.345, 'duration': 2.082}], 'summary': 'Dns involves configuring servers and clients, with more setup needed on the server side.', 'duration': 31.553, 'max_score': 24971.874, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo24971874.jpg'}, {'end': 25034.039, 'src': 'embed', 'start': 25009.253, 'weight': 2, 'content': [{'end': 25015.34, 'text': "Now, if you see this image over here, you can see that over here I've specified lookup request and lookup response, okay?", 'start': 25009.253, 'duration': 6.087}, {'end': 25020.505, 'text': 'But over here this dns client is making a request in the form of an ip address, right,', 'start': 25015.4, 'duration': 5.105}, {'end': 25026.051, 'text': 'and then the server is giving back the dns response in the form of a fully qualified domain name.', 'start': 25020.505, 'duration': 5.546}, {'end': 25034.039, 'text': 'so in my case, dns.vardhan.com is a fully qualified domain name that i have set for my demonstration on this system of mine.', 'start': 25026.051, 'duration': 7.988}], 'summary': 'Explaining dns request and response with ip address and domain name conversion.', 'duration': 24.786, 'max_score': 25009.253, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25009253.jpg'}, {'end': 25113.716, 'src': 'embed', 'start': 25090.211, 'weight': 9, 'content': [{'end': 25097.973, 'text': 'now, the question that can arise in your mind is that where does the dns server get the ip addresses of the host name?', 'start': 25090.211, 'duration': 7.762}, {'end': 25099.413, 'text': 'right? you can ask that from where?', 'start': 25097.973, 'duration': 1.44}, {'end': 25107.634, 'text': 'how, if there are so many websites, if there are so many domain names, there are so many ip addresses for those systems inside a particular domain?', 'start': 25099.413, 'duration': 8.221}, {'end': 25113.716, 'text': 'how would our dns server access that particular ip address or that particular server?', 'start': 25107.634, 'duration': 6.082}], 'summary': 'Dns server retrieves ip addresses for domain names to connect to servers.', 'duration': 23.505, 'max_score': 25090.211, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25090211.jpg'}, {'end': 25236.563, 'src': 'embed', 'start': 25213.798, 'weight': 10, 'content': [{'end': 25222.7, 'text': 'and the thing with these root servers is that they will not tell you which exactly which ip address your host name is resolved to.', 'start': 25213.798, 'duration': 8.902}, {'end': 25228.901, 'text': "okay, if you specify, uh, button.com, it's not going to return back with the ip address of that particular domain.", 'start': 25222.7, 'duration': 6.201}, {'end': 25232.202, 'text': 'what the root server will do is it will point you to another server.', 'start': 25228.901, 'duration': 3.301}, {'end': 25236.563, 'text': 'okay, and that is called the top level domain servers, also called tld servers.', 'start': 25232.202, 'duration': 4.361}], 'summary': 'Root servers do not directly reveal ip addresses, but point to top level domain servers.', 'duration': 22.765, 'max_score': 25213.798, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25213798.jpg'}, {'end': 25866.061, 'src': 'embed', 'start': 25838.03, 'weight': 11, 'content': [{'end': 25845.134, 'text': "as you can see, it's in the form of Vardhan.com, which is like a domain name, and for the reverse lookup, of course it would be from the IP address.", 'start': 25838.03, 'duration': 7.104}, {'end': 25853.157, 'text': "so For this reverse lookup I've said it would be in the form of an IP address and I've named it as reverse.zone, okay?", 'start': 25845.134, 'duration': 8.023}, {'end': 25856.498, 'text': 'And similarly, file would be forward.zone, okay?', 'start': 25853.177, 'duration': 3.321}, {'end': 25858.899, 'text': 'Now this file, RFC file.', 'start': 25856.518, 'duration': 2.381}, {'end': 25866.061, 'text': 'this is going to be again a very long file and you will have a lot of lines there and this would be placed in there.', 'start': 25858.899, 'duration': 7.162}], 'summary': 'Vardhan.com is a domain name; reverse lookup with ip address in reverse.zone, and forward lookup in forward.zone, with rfc file containing many lines.', 'duration': 28.031, 'max_score': 25838.03, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25838030.jpg'}], 'start': 24713.742, 'title': 'Dns fundamentals', 'summary': 'Delves into the function of domain name system (dns) in translating internet domain and host names to ip addresses, its historical significance, client-server network communication architecture, dns server hierarchy with 13 root servers, and configuring a dns server including assigning a static ip address, setting a fully qualified domain name, and configuring the named.conf file and rfc 1912 zones for forward and reverse lookup.', 'chapters': [{'end': 25175.175, 'start': 24713.742, 'title': 'Understanding dns and its functionality', 'summary': 'Explains the function of domain name system (dns) in translating internet domain and host names to ip addresses, the historical significance of dns, its working principle, client-server network communication architecture, dns lookup request and response, forward and reverse lookup, and the role of resolver in dns.', 'duration': 461.433, 'highlights': ['The DNS translates internet domain and host names to IP addresses and vice versa, making it easier for computers to remember and access websites, thus playing a crucial role in the functioning of the internet.', 'The historical significance of DNS is highlighted, emphasizing how it has simplified accessing websites by eliminating the need to manually map IP addresses and host names in the hosts file, saving a significant amount of effort.', 'The working principle of DNS is explained, highlighting its resemblance to a client-server network communication architecture, where systems act as DNS clients sending requests to DNS servers for hostname-to-IP address resolution.', 'The concept of DNS lookup request and response is detailed, with the request being the act of sending a request to the DNS server specifying a hostname and the response being the IP address provided by the DNS server.', 'The distinction between forward and reverse lookup in DNS is explained, with forward lookup resolving hostnames to IP addresses and reverse lookup resolving IP addresses to host names, providing insights into different ways of accessing and looking up information in DNS.', 'The role of resolver in DNS is described, illustrating how it acts as the ISP server and holds the IP addresses of websites in its cache memory, thereby facilitating the resolution of hostnames and IP addresses.']}, {'end': 25461.299, 'start': 25175.175, 'title': 'Understanding dns server hierarchy', 'summary': 'Explains the hierarchical structure of dns servers, with 13 root servers strategically placed around the world, and the process of resolving domain names to ip addresses involving root servers, top-level domain servers, and authoritative name servers.', 'duration': 286.124, 'highlights': ['DNS hierarchy involves 13 root servers strategically placed worldwide, with 12 organizations controlling them. There are about 13 sets of root servers strategically placed around the world, and about 12 organizations control these root servers.', 'Root servers do not directly provide IP addresses for host names; they point to top-level domain servers (TLD) which store information for domains like .com, .net, or .org. Root servers do not return the IP address of a domain; instead, they direct to the top-level domain servers (TLD) which store information for domains like .com, .net, or .org.', 'Top-level domain servers store information for domains like .com or .net, and they can direct to authoritative name servers which hold the IP address of a specific domain. Top-level domain servers store information for domains like .com or .net and can direct to authoritative name servers, which hold the IP address of a specific domain.']}, {'end': 25875.325, 'start': 25461.299, 'title': 'Configuring dns server', 'summary': 'Explains the steps to configure a dns server, including assigning a static ip address, setting a fully qualified domain name, and configuring the named.conf file and rfc 1912 zones for forward and reverse lookup.', 'duration': 414.026, 'highlights': ["Assigning a static IP address prevents the IP address from changing upon server reboot, ensuring stability and consistency. By setting a static IP address, the server's IP remains constant, providing stability and preventing changes upon reboot.", 'Setting a fully qualified domain name involves configuring the hc sysconfig network file and adding the entry in the Etsy hosts file. Configuring a fully qualified domain name involves updating the hc sysconfig network file and adding the entry in the Etsy hosts file.', 'Configuring the named.conf file and RFC 1912 zones enables defining forward and reverse lookup zones for the DNS server. The named.conf file and RFC 1912 zones are configured to define forward and reverse lookup zones for the DNS server.']}], 'duration': 1161.583, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo24713742.jpg', 'highlights': ['The DNS translates internet domain and host names to IP addresses and vice versa, making it easier for computers to remember and access websites, thus playing a crucial role in the functioning of the internet.', 'The historical significance of DNS is highlighted, emphasizing how it has simplified accessing websites by eliminating the need to manually map IP addresses and host names in the hosts file, saving a significant amount of effort.', 'The working principle of DNS is explained, highlighting its resemblance to a client-server network communication architecture, where systems act as DNS clients sending requests to DNS servers for hostname-to-IP address resolution.', 'The concept of DNS lookup request and response is detailed, with the request being the act of sending a request to the DNS server specifying a hostname and the response being the IP address provided by the DNS server.', 'The distinction between forward and reverse lookup in DNS is explained, with forward lookup resolving hostnames to IP addresses and reverse lookup resolving IP addresses to host names, providing insights into different ways of accessing and looking up information in DNS.', 'The role of resolver in DNS is described, illustrating how it acts as the ISP server and holds the IP addresses of websites in its cache memory, thereby facilitating the resolution of hostnames and IP addresses.', 'DNS hierarchy involves 13 root servers strategically placed worldwide, with 12 organizations controlling them. There are about 13 sets of root servers strategically placed around the world, and about 12 organizations control these root servers.', 'Root servers do not directly provide IP addresses for host names; they point to top-level domain servers (TLD) which store information for domains like .com, .net, or .org. Root servers do not return the IP address of a domain; instead, they direct to the top-level domain servers (TLD) which store information for domains like .com, .net, or .org.', 'Top-level domain servers store information for domains like .com or .net, and they can direct to authoritative name servers which hold the IP address of a specific domain.', "Assigning a static IP address prevents the IP address from changing upon server reboot, ensuring stability and consistency. By setting a static IP address, the server's IP remains constant, providing stability and preventing changes upon reboot.", 'Setting a fully qualified domain name involves configuring the hc sysconfig network file and adding the entry in the Etsy hosts file. Configuring a fully qualified domain name involves updating the hc sysconfig network file and adding the entry in the Etsy hosts file.', 'Configuring the named.conf file and RFC 1912 zones enables defining forward and reverse lookup zones for the DNS server. The named.conf file and RFC 1912 zones are configured to define forward and reverse lookup zones for the DNS server.']}, {'end': 27152.299, 'segs': [{'end': 25963.874, 'src': 'embed', 'start': 25933.927, 'weight': 2, 'content': [{'end': 25939.111, 'text': 'when you do that, you can just restart your name be service and your service would be up and running right.', 'start': 25933.927, 'duration': 5.184}, {'end': 25942.797, 'text': 'So these are the 10 different steps which are needed.', 'start': 25940.435, 'duration': 2.362}, {'end': 25952.785, 'text': "So I can now get started with my hands-on, right? So let's see how to configure this bind DNS server in 10 simple steps through my demonstration.", 'start': 25943.377, 'duration': 9.408}, {'end': 25963.874, 'text': "And for my demonstration, what I'm gonna do is I'm gonna open my virtual machine, okay? So this is my virtual machine.", 'start': 25953.546, 'duration': 10.328}], 'summary': 'Configure bind dns server in 10 steps for service to be up and running.', 'duration': 29.947, 'max_score': 25933.927, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25933927.jpg'}, {'end': 26433.821, 'src': 'embed', 'start': 26403.987, 'weight': 8, 'content': [{'end': 26410.892, 'text': "Okay, so that's why we have written forward dot zone, Which would be the name of my file, and, uh, similarly explaining the other lines uh,", 'start': 26403.987, 'duration': 6.905}, {'end': 26416.174, 'text': 'dump file again over here is where your uh, uh cache and your logs will be dumped.', 'start': 26410.892, 'duration': 5.282}, {'end': 26420.516, 'text': "okay, and then you have a statistics file where you'll have other details, but these are not.", 'start': 26416.174, 'duration': 4.342}, {'end': 26423.917, 'text': "uh, we don't need to really worry about these details for now.", 'start': 26420.516, 'duration': 3.401}, {'end': 26427.058, 'text': 'okay, we need to verify that it includes the rfc1912..', 'start': 26423.917, 'duration': 3.141}, {'end': 26433.821, 'text': 'zones, because you are defining your forward and the reverse zones inside this location.', 'start': 26428.199, 'duration': 5.622}], 'summary': 'Explanation of file structure and contents for dns setup.', 'duration': 29.834, 'max_score': 26403.987, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo26403987.jpg'}, {'end': 26533.155, 'src': 'embed', 'start': 26488.822, 'weight': 1, 'content': [{'end': 26491.484, 'text': "we've. uh, we have the subnet in the reverse order.", 'start': 26488.822, 'duration': 2.662}, {'end': 26496.57, 'text': "okay, now, that's because, uh, that's how rules are defined, so you don't.", 'start': 26491.484, 'duration': 5.086}, {'end': 26498.051, 'text': "this is the only thing that's going to be different.", 'start': 26496.57, 'duration': 1.481}, {'end': 26503.536, 'text': 'instead of giving 192.168.56, you would have to give it the other way.', 'start': 26498.051, 'duration': 5.485}, {'end': 26506.819, 'text': 'you have to first specify the class c, then comes class b and then class a.', 'start': 26503.536, 'duration': 3.283}, {'end': 26509.842, 'text': 'okay, the subnetting order is a little different over here.', 'start': 26506.819, 'duration': 3.023}, {'end': 26517.428, 'text': 'when you specify the reverse dot zone, the reason for that is in the reverse dot zone, you specify the number of your IP address.', 'start': 26509.842, 'duration': 7.586}, {'end': 26518.649, 'text': "so in my case it's 2.", 'start': 26517.428, 'duration': 1.221}, {'end': 26523.571, 'text': "so I have specified the 2 and I've followed that up with the rules.", 'start': 26518.649, 'duration': 4.922}, {'end': 26528.733, 'text': 'so for that purpose we specified in this order okay, you would understand this better later.', 'start': 26523.571, 'duration': 5.162}, {'end': 26533.155, 'text': 'okay, so, right now you might get a little confused, so just hang around.', 'start': 26528.733, 'duration': 4.422}], 'summary': 'Subnetting order is reversed for specifying ip addresses, following class c, b, and a. rules are defined accordingly.', 'duration': 44.333, 'max_score': 26488.822, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo26488822.jpg'}, {'end': 26644.277, 'src': 'embed', 'start': 26619.413, 'weight': 4, 'content': [{'end': 26624.738, 'text': 'okay, and uh, in specific stands for internet and soa stands for state of authority.', 'start': 26619.413, 'duration': 5.325}, {'end': 26629.522, 'text': 'now, these are a couple of terms which you might not understand when you get started with dns right away.', 'start': 26624.738, 'duration': 4.784}, {'end': 26632.765, 'text': 'okay, so the state of authority we are giving complete.', 'start': 26629.522, 'duration': 3.243}, {'end': 26639.791, 'text': "when we say at the rate in soa, we are giving complete authority to this particular domain, okay, that's what's happening.", 'start': 26632.765, 'duration': 7.026}, {'end': 26644.277, 'text': 'and uh, Right after specifying SOA with the tab space.', 'start': 26639.791, 'duration': 4.486}], 'summary': 'Dns involves terms like internet and soa, which grant authority to domains.', 'duration': 24.864, 'max_score': 26619.413, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo26619413.jpg'}, {'end': 26711.066, 'src': 'embed', 'start': 26683.346, 'weight': 0, 'content': [{'end': 26687.709, 'text': "okay. and these are again set of rules which you don't need to really worry about.", 'start': 26683.346, 'duration': 4.363}, {'end': 26692.113, 'text': "these are the rules when something goes down, it it's it's about the backup.", 'start': 26687.709, 'duration': 4.404}, {'end': 26698.918, 'text': 'okay, so what you need to, uh, just edit is these two lines in your forward dot zone.', 'start': 26692.113, 'duration': 6.805}, {'end': 26705.422, 'text': "when i have said again with stands for internet, i've said that The forward dot zone over here would act as a name server.", 'start': 26698.918, 'duration': 6.504}, {'end': 26711.066, 'text': "Okay, so i'm setting up my bind as a name server, Which would basically resolve ip addresses and host names?", 'start': 26705.743, 'duration': 5.323}], 'summary': 'Setting up bind as a name server to resolve ip addresses and host names.', 'duration': 27.72, 'max_score': 26683.346, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo26683346.jpg'}], 'start': 25876.596, 'title': 'Configuring dns servers and zones', 'summary': "Explains the 10 steps to configure a bind dns server, including creating forward and reverse zones, editing zone files, changing file ownership, and restarting the name service, with a demonstration on setting up a virtual machine with a static ip address. it also covers assigning a static ip address, fqdn, configuring network scripts, hosts file, resolve.conf file, named.conf file, and rfc 1912 zones, with a focus on setting up forward and reverse zones. additionally, it includes the process of creating forward and reverse zones, specifying time to live, state of authority, and name servers, and setting up the dns server to resolve ip addresses and host names. furthermore, it covers the steps for setting up a dns server, including changing group ownership of files, restarting the named service, and verifying the server's functionality using dig, nslookup, and reverse lookup commands, as well as configuring resolve.conf file on the client side to set the name server.", 'chapters': [{'end': 26045.328, 'start': 25876.596, 'title': 'Configuring bind dns server', 'summary': 'Explains the 10 steps to configure a bind dns server, including creating forward and reverse zones, editing zone files, changing file ownership, and restarting the name service, with a demonstration on setting up a virtual machine with a static ip address.', 'duration': 168.732, 'highlights': ['The chapter explains the 10 steps to configure a Bind DNS server The chapter covers the process of configuring a Bind DNS server in 10 steps, providing a comprehensive guide for setting up the server.', 'Creating forward and reverse zones The process involves creating new files forward.zone and reverse.zone, and adding rules to these files, forming the essential steps for configuring the DNS server.', 'Demonstration on setting up a virtual machine with a static IP address The demonstration showcases the setup of a virtual machine with the domain name dns1.vardhan.com and a static IP address of 192.168.46.2, ensuring stable configuration for the DNS server.']}, {'end': 26533.155, 'start': 26045.328, 'title': 'Configuring dns server and zones', 'summary': 'Explains the process of configuring a dns server, including assigning a static ip address, fqdn, configuring network scripts, hosts file, resolve.conf file, named.conf file, and rfc 1912 zones, with a focus on setting up forward and reverse zones.', 'duration': 487.827, 'highlights': ['Configuring forward and reverse zones in RFC 1912 zones The process of setting up forward and reverse zones in the RFC 1912 zones is detailed, including specifying the forward zone as the master, defining the file name for the forward zone, setting the directory for storing zone files, and explaining the subnetting order for reverse zones.', 'Assigning static IP address and configuring network scripts The initial step involves assigning a static IP address and configuring network scripts, including editing the eth0 file to add the IP address, netmask, and gateway, and explaining the importance of these configurations for the server.', "Configuring resolve.conf file and named.conf file for DNS server The configuration of resolve.conf file involves specifying the search domain and name server, while the named.conf file is edited to specify the server's IP address, allow query settings, and directory for storing zone files."]}, {'end': 26833.92, 'start': 26533.155, 'title': 'Setting up dns server zones', 'summary': 'Covers the process of creating forward and reverse zones, including editing the configuration files, specifying time to live, state of authority, and name servers, and setting up the dns server to resolve ip addresses and host names.', 'duration': 300.765, 'highlights': ['Creating forward and reverse zones The process involves creating forward and reverse zones, essential for setting up a DNS server.', 'Editing configuration files and specifying time to live and state of authority The speaker explains the process of editing configuration files, specifying time to live and state of authority, which are crucial aspects of setting up DNS server zones.', 'Setting up DNS server to resolve IP addresses and host names The chapter explains the setup of the DNS server to resolve IP addresses and host names, a fundamental function of the DNS server.']}, {'end': 27152.299, 'start': 26834.16, 'title': 'Setting up a dns server', 'summary': "Covers the steps for setting up a dns server, including changing group ownership of files, restarting the named service, and verifying the server's functionality using dig, nslookup, and reverse lookup commands, as well as configuring resolve.conf file on the client side to set the name server.", 'duration': 318.139, 'highlights': ["Configuring resolve.conf file on the client side to set the name server is crucial for resolving domain names, demonstrated by replacing default lines with the DNS name server's IP address and verifying its functionality using nslookup command. By demonstrating the process of configuring the resolve.conf file on the client side to set the name server, the speaker emphasizes the importance of this step in ensuring the resolution of domain names. This is exemplified by replacing default lines with the DNS name server's IP address and verifying its functionality using the nslookup command.", "Verifying the server's functionality using dig, nslookup, and reverse lookup commands reinforces the successful setup of the DNS server and its ability to resolve domain names from different systems, as illustrated by the accurate resolution and reverse lookup results. The verification of the server's functionality using dig, nslookup, and reverse lookup commands serves as a crucial step in confirming the successful setup of the DNS server. The accurate resolution and reverse lookup results demonstrate the server's ability to resolve domain names from different systems.", 'Changing group ownership of files and restarting the NameD service are essential steps in setting up the DNS server, ensuring complete root access and successful service restart for proper functionality. The essential steps of changing group ownership of files and restarting the NameD service are highlighted as crucial for setting up the DNS server. These steps ensure the attainment of complete root access and successful service restart, contributing to the proper functionality of the DNS server.']}], 'duration': 1275.703, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo25876596.jpg', 'highlights': ['The chapter explains the 10 steps to configure a Bind DNS server, providing a comprehensive guide for setting up the server.', 'Demonstration on setting up a virtual machine with a static IP address showcases the setup of a virtual machine with the domain name dns1.vardhan.com and a static IP address of 192.168.46.2, ensuring stable configuration for the DNS server.', 'Configuring forward and reverse zones in RFC 1912 zones is detailed, including specifying the forward zone as the master, defining the file name for the forward zone, setting the directory for storing zone files, and explaining the subnetting order for reverse zones.', 'Assigning static IP address and configuring network scripts involves editing the eth0 file to add the IP address, netmask, and gateway, and explaining the importance of these configurations for the server.', "Configuring resolve.conf file involves specifying the search domain and name server, while the named.conf file is edited to specify the server's IP address, allow query settings, and directory for storing zone files.", 'Setting up DNS server to resolve IP addresses and host names is explained as a fundamental function of the DNS server.', "Configuring resolve.conf file on the client side to set the name server is crucial for resolving domain names, demonstrated by replacing default lines with the DNS name server's IP address and verifying its functionality using nslookup command.", "Verifying the server's functionality using dig, nslookup, and reverse lookup commands serves as a crucial step in confirming the successful setup of the DNS server. The accurate resolution and reverse lookup results demonstrate the server's ability to resolve domain names from different systems.", 'Changing group ownership of files and restarting the NameD service are highlighted as crucial for setting up the DNS server. These steps ensure the attainment of complete root access and successful service restart, contributing to the proper functionality of the DNS server.']}, {'end': 29376.109, 'segs': [{'end': 27352.248, 'src': 'embed', 'start': 27321.006, 'weight': 2, 'content': [{'end': 27327.769, 'text': 'Now we are at home then we can do a CD and back to Edureka.', 'start': 27321.006, 'duration': 6.763}, {'end': 27329.027, 'text': 'There you go.', 'start': 27328.607, 'duration': 0.42}, {'end': 27337.054, 'text': 'Then we have PWD which will show you your current working directory as you can see it shows home slash edureka.', 'start': 27329.047, 'duration': 8.007}, {'end': 27338.996, 'text': "It's the path of our current working directory.", 'start': 27337.135, 'duration': 1.861}, {'end': 27340.838, 'text': 'Then we have LS.', 'start': 27339.517, 'duration': 1.321}, {'end': 27352.248, 'text': 'It shows all these files that are there in our current working directory not just that you can also write LS and specify a path name.', 'start': 27341.919, 'duration': 10.329}], 'summary': 'Using pwd command displays current working directory, and ls command lists files in the directory.', 'duration': 31.242, 'max_score': 27321.006, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo27321006.jpg'}, {'end': 27803.782, 'src': 'embed', 'start': 27774.392, 'weight': 1, 'content': [{'end': 27781.377, 'text': 'And if I do an LS you can see you have file1.txt file2.txt and file3.txt right here.', 'start': 27774.392, 'duration': 6.985}, {'end': 27788.643, 'text': 'Next we have mkdir which basically helps you make a directory in your current working directory.', 'start': 27782.038, 'duration': 6.605}, {'end': 27793.837, 'text': "If I just type files and then I'll do this LS again.", 'start': 27789.504, 'duration': 4.333}, {'end': 27799.42, 'text': 'You see we have created a directory which it will show you in blue and we have created files.', 'start': 27794.418, 'duration': 5.002}, {'end': 27803.782, 'text': 'Then we have chmod or change mode.', 'start': 27800.18, 'duration': 3.602}], 'summary': 'Demonstrated file manipulation commands: ls, mkdir, and chmod.', 'duration': 29.39, 'max_score': 27774.392, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo27774392.jpg'}, {'end': 27904.682, 'src': 'embed', 'start': 27882.037, 'weight': 4, 'content': [{'end': 27890.673, 'text': 'So when you go ahead and type chmod and then your plus R or plus W or plus X.', 'start': 27882.037, 'duration': 8.636}, {'end': 27897.597, 'text': "It means you're basically adding to whatever permission that there is a permission to execute that particular file.", 'start': 27890.673, 'duration': 6.924}, {'end': 27904.682, 'text': "So with that plus X now, let's try running this and as you can see hello learner.", 'start': 27899.158, 'duration': 5.524}], 'summary': 'Using chmod +x allows adding execute permission to a file.', 'duration': 22.645, 'max_score': 27882.037, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo27882037.jpg'}, {'end': 27974.871, 'src': 'embed', 'start': 27954.935, 'weight': 0, 'content': [{'end': 27966.504, 'text': 'Suppose ABC and then ABC and then one more ABC and then the file name and then the date and then whatever basically there are three aspects to it.', 'start': 27954.935, 'duration': 11.569}, {'end': 27971.969, 'text': 'The first one being the user or you second one being the user group.', 'start': 27967.025, 'duration': 4.944}, {'end': 27974.871, 'text': "And finally, there's a thing for everybody else.", 'start': 27972.469, 'duration': 2.402}], 'summary': 'Three aspects: user, user group, and general audience.', 'duration': 19.936, 'max_score': 27954.935, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo27954935.jpg'}], 'start': 27152.319, 'title': 'Linux command line essentials and dns server setup', 'summary': 'Covers setting up a dns server in a 10-step process on centos 7, emphasizes the importance of command line essentials, and discusses essential linux commands, cli vs gui comparison, shell scripting basics, and unix command basics with practical demonstrations and explanations.', 'chapters': [{'end': 27194.683, 'start': 27152.319, 'title': 'Setting up dns server and command line essentials', 'summary': 'Covers setting up a dns server in a simple 10-step process and emphasizes the importance of command line essentials in saving time, demonstrated using centos 7 in a virtual machine.', 'duration': 42.364, 'highlights': ['The chapter emphasizes the importance of command line essentials in saving time.', 'Setting up a DNS server is explained in a simple 10-step process.', 'The demonstration uses CentOS 7 in a virtual machine.']}, {'end': 27453.231, 'start': 27195.043, 'title': 'Linux cli essentials', 'summary': 'Discusses essential linux commands, including cd, pwd, ls, copy, move, remove, echo, cat, less, grep, mkdir, touch, change mode, man, with practical demonstrations and explanations, providing insights into their usage and functionality.', 'duration': 258.188, 'highlights': ['The chapter covers essential Linux commands like CD, PWD, LS, copy, move, remove, echo, cat, less, grep, mkdir, touch, change mode, man, with practical demonstrations and explanations. It provides a comprehensive list of essential Linux commands along with practical demonstrations and explanations.', 'Explanation of LS command and its flags, including the long listing format (LS -L) which provides additional information about objects, such as date and time of creation, user, user group, and permissions. The LS command and its flags are explained, including the long listing format (LS -L) which provides additional information about objects, such as date and time of creation, user, user group, and permissions.', 'Practical demonstration of changing directories, displaying the current working directory using PWD, and utilizing LS command with specified path names. The practical demonstration includes changing directories, displaying the current working directory using PWD, and utilizing LS command with specified path names.']}, {'end': 27738.827, 'start': 27454.171, 'title': 'Command line essentials', 'summary': 'Covers essential command line operations including copy, move, remove, echo, cat, less, and grep, with practical demonstrations and explanations of their functionalities.', 'duration': 284.656, 'highlights': ['The chapter covers practical demonstrations and explanations of essential command line operations including copy, move, remove, echo, cat, less, and grep. It provides a comprehensive understanding of various command line operations and their functionalities, including copy, move, remove, echo, cat, less, and grep.', 'The demonstration includes using the move command to move a file from one directory to another, resulting in the removal of the file from the source directory. The move command is demonstrated by moving a file from one directory to another, illustrating the removal of the file from the source directory.', 'The explanation of the grep command includes using the hyphen V or verbose flag to explain the actions performed while moving a file. The explanation of the grep command involves using the hyphen V or verbose flag to elucidate the actions performed during the file movement, providing clarity on the process.', 'Practical demonstrations of the echo, cat, and less commands showcase their functionalities in printing, concatenating text files to the terminal, and displaying file contents in a separate window, respectively. The practical demonstrations of the echo, cat, and less commands illustrate their functionalities in printing text, concatenating text files to the terminal, and displaying file contents in a separate window.']}, {'end': 28080.678, 'start': 27739.328, 'title': 'Unix command basics', 'summary': 'Covers the basic usage of touch to create files, mkdir to make directories, and chmod to alter file permissions, with explanations and examples of the commands and their associated permissions.', 'duration': 341.35, 'highlights': ['The chapter covers the basic usage of touch to create files, mkdir to make directories, and chmod to alter file permissions It explains the basic usage of touch, mkdir, and chmod commands, providing examples and demonstrations of creating files and directories, and altering file permissions.', 'chmod command and its associated permissions It provides a detailed explanation of chmod command and the associated permissions, explaining the meaning of each number (0-7) in the permissions, and how to use chmod to alter file permissions.', "Explanation of chmod command with examples It offers examples and demonstrations of using chmod command, including adding permissions with +R, +W, +X, and using numeric representation (e.g., 777) to specify user, group, and others' permissions."]}, {'end': 28526.067, 'start': 28080.698, 'title': 'Cli vs gui and shell script basics', 'summary': 'Discusses the comparison between cli and gui, highlighting the advantages of cli such as faster os and greater control, and then delves into the basics of shell scripting, explaining the shell interpreter, shell script constructs, and a simple example of a shell script.', 'duration': 445.369, 'highlights': ['CLI provides faster OS and greater control over the file system and tasks compared to GUI CLI offers a faster operating system and more control over the file system and tasks, making it simpler for users to create scripts and automate tasks, as well as supporting scripting and automation, whereas GUI does not readily support scripting or automation.', "GUI is visually easier and faster for beginners to learn and use, while CLI is more optimal for scripting and automation GUI's visual representation makes it easier and faster for beginners to learn and use, while CLI is most optimum for scripting and automation tasks due to its greater control and capability to perform tasks at scale.", 'Shell script basics include constructs that determine the actions and sequence of commands in the shell environment Shell scripts involve constructs that define the actions and sequence of commands in the shell environment, where even complex shell scripts are essentially a list of commands executed sequentially.']}, {'end': 29376.109, 'start': 28526.067, 'title': 'Shell scripting basics', 'summary': 'Covers the basics of shell scripting including variables, special variables, command line arguments, and basic operators, showcasing practical examples and syntax rules for defining, accessing, and manipulating variables, as well as demonstrating the usage and significance of special variables, command line arguments, and basic operators with various practical scenarios.', 'duration': 850.042, 'highlights': ['The chapter covers the basics of shell scripting including variables, special variables, command line arguments, and basic operators, showcasing practical examples and syntax rules for defining, accessing, and manipulating variables, as well as demonstrating the usage and significance of special variables, command line arguments, and basic operators with various practical scenarios. Covers the basics of shell scripting, including variables, special variables, command line arguments, and basic operators, with practical examples and syntax rules.', 'Demonstrates the syntax rules for defining, accessing, and manipulating variables, including the usage of read-only and unset variables. Demonstrates the syntax rules for defining, accessing, and manipulating variables, including the usage of read-only and unset variables.', 'Explains the significance and usage of special variables, command line arguments, and showcases practical scenarios with special variables and command line arguments. Explains the significance and usage of special variables, command line arguments, and showcases practical scenarios with special variables and command line arguments.', 'Illustrates the usage and significance of basic operators, including arithmetic, relational, Boolean, string, and file test operators with examples. Illustrates the usage and significance of basic operators, including arithmetic, relational, Boolean, string, and file test operators with examples.']}], 'duration': 2223.79, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo27152319.jpg', 'highlights': ['Setting up a DNS server is explained in a simple 10-step process.', 'The chapter emphasizes the importance of command line essentials in saving time.', 'The chapter covers essential Linux commands like CD, PWD, LS, copy, move, remove, echo, cat, less, grep, mkdir, touch, change mode, man, with practical demonstrations and explanations.', 'CLI provides faster OS and greater control over the file system and tasks compared to GUI.', 'Shell script basics include constructs that determine the actions and sequence of commands in the shell environment.', 'Covers the basics of shell scripting, including variables, special variables, command line arguments, and basic operators, with practical examples and syntax rules.']}, {'end': 31621.628, 'segs': [{'end': 29646.953, 'src': 'embed', 'start': 29619.525, 'weight': 6, 'content': [{'end': 29625.887, 'text': 'Now the while loop is perfect for a situation where you need to execute a set of commands while some condition is true.', 'start': 29619.525, 'duration': 6.362}, {'end': 29634.23, 'text': 'Sometimes you need to execute a set of commands until a condition is true and that is where you use the until command.', 'start': 29626.387, 'duration': 7.843}, {'end': 29646.953, 'text': "I'm going to go back here and you'll notice that the structure of until command is pretty similar to that of your while.", 'start': 29637.651, 'duration': 9.302}], 'summary': 'While loop executes commands while condition is true. until loop executes commands until a condition is true.', 'duration': 27.428, 'max_score': 29619.525, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo29619525.jpg'}, {'end': 29986.864, 'src': 'embed', 'start': 29951.634, 'weight': 4, 'content': [{'end': 29959.785, 'text': 'Now the break statement is used to terminate the execution of an entire loop after completing the execution of all the lines of code up to the break statement.', 'start': 29951.634, 'duration': 8.151}, {'end': 29962.388, 'text': "Now let's see how that works.", 'start': 29960.265, 'duration': 2.123}, {'end': 29976.361, 'text': 'So I am going to exit this and Now this is a simple example which shows that the loop will terminate as soon as A becomes equal to 5.', 'start': 29963.109, 'duration': 13.252}, {'end': 29986.864, 'text': "So let's go ahead and you go and 1, 2, 3, 4, 5.", 'start': 29976.361, 'duration': 10.503}], 'summary': 'The break statement terminates the loop when a equals 5.', 'duration': 35.23, 'max_score': 29951.634, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo29951634.jpg'}, {'end': 30915.487, 'src': 'embed', 'start': 30887.255, 'weight': 1, 'content': [{'end': 30893.1, 'text': 'The email is my email which I had shown you previously then the for loop begins.', 'start': 30887.255, 'duration': 5.845}, {'end': 30896.703, 'text': 'Now, this is very similar to the previous code that we had just run.', 'start': 30893.56, 'duration': 3.143}, {'end': 30906.202, 'text': "This is the same part and here we have an infinite loop, which is basically what we're going to run to check if a host is up.", 'start': 30897.478, 'duration': 8.724}, {'end': 30915.487, 'text': "So we are going to ping the various arguments that we're going to pass, and if the said argument is not equal to 0,", 'start': 30906.763, 'duration': 8.724}], 'summary': 'Code checks if a host is up using an infinite loop and pinging various arguments.', 'duration': 28.232, 'max_score': 30887.255, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo30887255.jpg'}, {'end': 31002.224, 'src': 'embed', 'start': 30970.539, 'weight': 0, 'content': [{'end': 30971.3, 'text': "So let's run this.", 'start': 30970.539, 'duration': 0.761}, {'end': 30980.477, 'text': "I'm going to check for google.com and this imaginary IP address, which, as we had previously seen, is not up,", 'start': 30972.19, 'duration': 8.287}, {'end': 30989.764, 'text': "and then let's put in yahoo.com and yahoo123.com, which I'm hoping is not an actual website.", 'start': 30980.477, 'duration': 9.287}, {'end': 30990.985, 'text': "Let's put in this 2.2.2.", 'start': 30990.265, 'duration': 0.72}, {'end': 30993.367, 'text': "Now, let's run the script.", 'start': 30990.985, 'duration': 2.382}, {'end': 30999.582, 'text': 'This might take some time so kindly be patient let the script run.', 'start': 30996.46, 'duration': 3.122}, {'end': 31002.224, 'text': 'So, while it runs, let me explain this to you.', 'start': 31000.142, 'duration': 2.082}], 'summary': 'Testing script checks google.com, yahoo.com, and 2.2.2 for availability.', 'duration': 31.685, 'max_score': 30970.539, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo30970539.jpg'}, {'end': 31151.057, 'src': 'embed', 'start': 31120.086, 'weight': 9, 'content': [{'end': 31123.43, 'text': "So again, we've mentioned what are we going to back up?", 'start': 31120.086, 'duration': 3.344}, {'end': 31127.655, 'text': "This is the file that we're going to back up and this is our destination.", 'start': 31124.011, 'duration': 3.644}, {'end': 31132.361, 'text': "Now, basically we're going to create a backup and save it in the name of the day.", 'start': 31128.176, 'duration': 4.185}, {'end': 31134.964, 'text': 'So for example today is Thursday.', 'start': 31132.961, 'duration': 2.003}, {'end': 31140.09, 'text': "So if I create this backup today, then it's going to be saved in a folder called Thursday.", 'start': 31135.044, 'duration': 5.046}, {'end': 31151.057, 'text': 'Our host name is localhost and so our archive file is going to be localhost hyphen the name of the day, which is Thursday.', 'start': 31140.69, 'duration': 10.367}], 'summary': 'Creating daily backups of files, saving them in folders named after the day of the week.', 'duration': 30.971, 'max_score': 31120.086, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31120086.jpg'}, {'end': 31217.283, 'src': 'embed', 'start': 31167.515, 'weight': 3, 'content': [{'end': 31180.064, 'text': 'what CZF does here is it basically creates a zip file because we are obviously going to import files into the local system and in the end it is going to show us a message called backup finished.', 'start': 31167.515, 'duration': 12.549}, {'end': 31185.077, 'text': 'And finally we are going to unmount our shared directory.', 'start': 31180.914, 'duration': 4.163}, {'end': 31189.501, 'text': 'So first let me show you the file that I am trying to back up over here.', 'start': 31185.638, 'duration': 3.863}, {'end': 31191.763, 'text': 'So now that we know what the code looks like.', 'start': 31189.881, 'duration': 1.882}, {'end': 31194.545, 'text': "Let's give it a run so dot slash.", 'start': 31191.863, 'duration': 2.682}, {'end': 31205.154, 'text': "So as of now, it's creating a backup and remember I had told you this is how it's going to name it localhost underscore Thursday dot TGC.", 'start': 31196.587, 'duration': 8.567}, {'end': 31210.52, 'text': "localhost being our host name and Thursday being today's day,", 'start': 31206.118, 'duration': 4.402}, {'end': 31217.283, 'text': "and it's also showing us that these are the folders that are present in our backup directory.", 'start': 31210.52, 'duration': 6.763}], 'summary': "Czf creates a zip file, imports files, and displays 'backup finished' message. it also unmounts the shared directory.", 'duration': 49.768, 'max_score': 31167.515, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31167515.jpg'}, {'end': 31600.527, 'src': 'embed', 'start': 31573.573, 'weight': 2, 'content': [{'end': 31580.736, 'text': 'So if the original file is deleted then the soft link fails If you delete the soft link nothing will happen to the file.', 'start': 31573.573, 'duration': 7.163}, {'end': 31589.023, 'text': 'The reason for this is that the actual file or directories in node is different from the soft link created with the files in nodes.', 'start': 31581.057, 'duration': 7.966}, {'end': 31592.926, 'text': 'a hard link acts like a mirror copy of the original file.', 'start': 31589.023, 'duration': 3.903}, {'end': 31595.445, 'text': 'These links share the same in nodes.', 'start': 31593.345, 'duration': 2.1}, {'end': 31600.527, 'text': 'changes made to the original or the hard-linked file will reflect on another.', 'start': 31595.445, 'duration': 5.082}], 'summary': 'Soft links fail if original file is deleted, hard links act as mirror copies reflecting changes.', 'duration': 26.954, 'max_score': 31573.573, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31573573.jpg'}], 'start': 29376.79, 'title': 'Shell scripting and functions', 'summary': 'Covers shell loops, functions, and shell scripting, including while, for, and until loops, loop control, recursive functions, network scanning, email notification, host monitoring, alert script creation, network backup script creation, shell basics, shell variables, and shortcuts.', 'chapters': [{'end': 29770.916, 'start': 29376.79, 'title': 'Shell loops in linux', 'summary': 'Covers shell loops in linux, including while, for, and until loops, nested loops, and loop control, allowing execution of a set of commands repeatedly, demonstrated with examples and syntax explanation.', 'duration': 394.126, 'highlights': ['The chapter covers shell loops in Linux, including while, for, and until loops, nested loops, and loop control. This is the main topic of the chapter, covering the different types of loops and their functionalities in Linux.', 'The while loop enables execution of a set of commands repeatedly until a condition occurs. Details the functionality of the while loop, including syntax explanation and a demonstration with an example.', 'The for loop operates on lists of items, repeating a set of commands for every item in the list. Explains the functionality and syntax of the for loop, demonstrating its usage with a simple example.', 'The until loop executes a set of commands until a condition is true. Details the usage of the until loop, its syntax, and functionality, demonstrated with an example.', 'Nested loops support the concept of putting one loop inside another, allowing for unlimited nesting based on requirements. Explains the concept of nested loops, demonstrating the nesting using a while loop and its potential for unlimited nesting.']}, {'end': 30358.03, 'start': 29772.516, 'title': 'Shell loops and functions basics', 'summary': 'Covers the basics of shell loops including while loops, infinite loops, and loop control statements like break and continue. it also discusses functions in the shell, covering the creation, passing parameters, returning values, and code reuse.', 'duration': 585.514, 'highlights': ['The chapter covers the basics of shell loops including while loops, infinite loops, and loop control statements like break and continue. It explains the structure and working of while loops, demonstrates an infinite loop, and introduces the break and continue statements.', 'It also discusses functions in the shell, covering the creation, passing parameters, returning values, and code reuse. It explains the process of creating functions, passing parameters, and returning values, emphasizing the importance of code reuse.']}, {'end': 30703.41, 'start': 30358.67, 'title': 'Functions and shell scripting', 'summary': 'Discusses the concept of recursive functions, nesting of functions, and practical applications of shell scripting, including network scanning and email notification.', 'duration': 344.74, 'highlights': ['The chapter discusses the concept of recursive functions and nesting of functions, illustrating their usage through examples. Functions can call themselves and other functions, known as recursive functions. Demonstrates nesting of functions through an example with two functions.', 'Practical applications of shell scripting are demonstrated, including network scanning for attached hosts and email notification when a host is unreachable. Demonstrates practical applications of shell scripting, such as scanning the network for attached hosts and sending email notifications when a host is unreachable.', 'The script scans the network for hosts attached to an IP address and prints a message for nodes with IP addresses up, utilizing the ping command and exit status check. Describes the script that scans the network for attached hosts and prints messages for nodes with IP addresses up by utilizing the ping command and exit status check.']}, {'end': 31025.632, 'start': 30703.41, 'title': 'Host monitoring and alert script', 'summary': 'Details the creation and execution of a script to monitor the status of given hosts, send email alerts for down hosts, and create a monitoring log, demonstrating the functionality of the script with examples and the option to modify it according to specific needs.', 'duration': 322.222, 'highlights': ['The script is designed to monitor and ping various host parameters and sends an email alert if the set parameter is not equal to 0, demonstrating its functionality by checking the status of google.com, yahoo.com, and an imaginary IP address, resulting in receiving email alerts for down hosts. Email alerts received for down hosts.', 'The script features an endless loop set to execute ping checks every 60 seconds, allowing for the monitoring of host status over time and the option to modify the script according to specific needs or integrate it with a cron scheduler. Endless loop set to execute ping checks every 60 seconds.', 'The script can be modified to create a monitoring log and is adaptable for use with a cron scheduler, with the potential to remove the endless loop for cron scheduling purposes. Option to create a monitoring log and adapt the script for use with a cron scheduler.']}, {'end': 31464.229, 'start': 31025.952, 'title': 'Network backup script & shell basics', 'summary': 'Covers creating a network backup script in linux and explains the basics of shell and shell scripting, including its advantages and typical operations.', 'duration': 438.277, 'highlights': ['Explaining the network backup script The transcript provides a detailed explanation of creating a network backup script in Linux, including the code structure, file manipulation, and creating a zip file, demonstrating the practical implementation of the script.', "Definition and operations of a shell The chapter defines a shell as a command line interpreter that translates user commands into a language understood by the kernel, performs file manipulation, program execution, and text printing, highlighting the shell's utility and typical operations.", 'Introduction to shell scripting and its advantages The transcript introduces shell scripting as a computer program designed to run on a Linux or Unix shell, listing its advantages as facilitating OS development with relevant features and designing software applications according to the desired platform, emphasizing its flexibility and customization.']}, {'end': 31621.628, 'start': 31464.85, 'title': 'Linux shell variables and shortcuts', 'summary': 'Covers the types of variables in shell scripting, commonly used shells in linux, and creating shortcuts using soft and hard links, emphasizing the differences and functionalities between them.', 'duration': 156.778, 'highlights': ['The different types of variables in shell scripting include system variables, defined by the operating system or Linux, and user-defined variables, created by system users.', 'The commonly used shells in Linux are the born shell, corn shell, born again shell (bash), posix shell, seashell, 10x seashell, and Z shell.', 'Creating a shortcut in Linux involves using soft links and hard links, with soft links pointing to the original file and hard links acting as mirror copies of the original file, sharing the same inodes and reflecting changes made to the original file.']}], 'duration': 2244.838, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo29376790.jpg', 'highlights': ['The chapter covers shell loops in Linux, including while, for, and until loops, nested loops, and loop control.', 'The chapter covers the basics of shell loops including while loops, infinite loops, and loop control statements like break and continue.', 'The chapter discusses the concept of recursive functions and nesting of functions, illustrating their usage through examples.', 'Practical applications of shell scripting are demonstrated, including network scanning for attached hosts and email notification when a host is unreachable.', 'The script is designed to monitor and ping various host parameters and sends an email alert if the set parameter is not equal to 0, demonstrating its functionality by checking the status of google.com, yahoo.com, and an imaginary IP address, resulting in receiving email alerts for down hosts.', 'Explaining the network backup script The transcript provides a detailed explanation of creating a network backup script in Linux, including the code structure, file manipulation, and creating a zip file, demonstrating the practical implementation of the script.', 'Introduction to shell scripting and its advantages The transcript introduces shell scripting as a computer program designed to run on a Linux or Unix shell, listing its advantages as facilitating OS development with relevant features and designing software applications according to the desired platform, emphasizing its flexibility and customization.', 'The different types of variables in shell scripting include system variables, defined by the operating system or Linux, and user-defined variables, created by system users.', 'The commonly used shells in Linux are the born shell, corn shell, born again shell (bash), posix shell, seashell, 10x seashell, and Z shell.', 'Creating a shortcut in Linux involves using soft links and hard links, with soft links pointing to the original file and hard links acting as mirror copies of the original file, sharing the same inodes and reflecting changes made to the original file.']}, {'end': 33569.384, 'segs': [{'end': 31834.333, 'src': 'embed', 'start': 31773.175, 'weight': 3, 'content': [{'end': 31777.177, 'text': 'It simply provides information regarding the location where the engine is placed.', 'start': 31773.175, 'duration': 4.002}, {'end': 31787.223, 'text': "It is also neglected by some of the users if they want the same now with that let's move on to some questions which we can execute in our terminal.", 'start': 31777.798, 'duration': 9.425}, {'end': 31797.499, 'text': 'So how do you pass an argument to a script for this? Let me just go ahead increase the size of this so you can see better.', 'start': 31788.075, 'duration': 9.424}, {'end': 31799.2, 'text': 'I think this is okay.', 'start': 31797.519, 'duration': 1.681}, {'end': 31807.163, 'text': 'So, basically, this is how you pass an argument to a script.', 'start': 31802.241, 'duration': 4.922}, {'end': 31816.127, 'text': 'you use the cat command and the dollar one sign, which basically is used to take an argument, just going to exit from here.', 'start': 31807.163, 'duration': 8.964}, {'end': 31821.791, 'text': "We're going to change its permissions and then we are going to execute it.", 'start': 31816.287, 'duration': 5.504}, {'end': 31829.832, 'text': 'So basically this is how you take in an argument.', 'start': 31825.712, 'duration': 4.12}, {'end': 31834.333, 'text': 'This simple script is basically used to show the file name.', 'start': 31830.432, 'duration': 3.901}], 'summary': 'The transcript discusses passing arguments to a script and executing commands in the terminal.', 'duration': 61.158, 'max_score': 31773.175, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31773175.jpg'}, {'end': 32024.597, 'src': 'embed', 'start': 31990.287, 'weight': 6, 'content': [{'end': 31995.089, 'text': "There's just a fancy way of doing what I just did some time ago.", 'start': 31990.287, 'duration': 4.802}, {'end': 31995.93, 'text': 'All right.', 'start': 31995.55, 'duration': 0.38}, {'end': 31997.871, 'text': 'so number of parameters passed.', 'start': 31995.93, 'duration': 1.941}, {'end': 32005.114, 'text': "it's going to print and then it's going to take in the number of parameters that you have passed dollar hash.", 'start': 31997.871, 'duration': 7.243}, {'end': 32007.175, 'text': 'All right.', 'start': 32006.835, 'duration': 0.34}, {'end': 32011.437, 'text': "So I'm going to pass two parameters here.", 'start': 32007.195, 'duration': 4.242}, {'end': 32015.279, 'text': "I'm going to write at Eureka learner.", 'start': 32011.777, 'duration': 3.502}, {'end': 32024.597, 'text': "How's that and as you see I've gotten Okay, next is how to get the script name inside a script.", 'start': 32015.839, 'duration': 8.758}], 'summary': 'Demonstration of passing parameters and obtaining script name.', 'duration': 34.31, 'max_score': 31990.287, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31990287.jpg'}, {'end': 32283.04, 'src': 'embed', 'start': 32216.602, 'weight': 2, 'content': [{'end': 32225.025, 'text': 'what you can do is you can go ahead and type head and hyphen one and then put in your file name.', 'start': 32216.602, 'duration': 8.423}, {'end': 32233.249, 'text': "And it'll give you the first line from that particular file called test file one.", 'start': 32228.607, 'duration': 4.642}, {'end': 32235.229, 'text': "It's pretty self-explanatory.", 'start': 32233.769, 'duration': 1.46}, {'end': 32238.711, 'text': "It's a pretty simple question next question.", 'start': 32235.249, 'duration': 3.462}, {'end': 32243.091, 'text': 'how to get the third element from each line from a file.', 'start': 32239.369, 'duration': 3.722}, {'end': 32247.733, 'text': 'So this goes along the same lines of the previous two.', 'start': 32244.011, 'duration': 3.722}, {'end': 32249.374, 'text': 'So, basically,', 'start': 32248.774, 'duration': 0.6}, {'end': 32265.863, 'text': "what I'm doing here is that I'm using the AWK to print out the third column or the third element from any given file that I am taking in as argument.", 'start': 32249.374, 'duration': 16.489}, {'end': 32266.843, 'text': 'nothing too complicated.', 'start': 32265.863, 'duration': 0.98}, {'end': 32272.515, 'text': "So let's just exit this All right, so not slash.", 'start': 32267.303, 'duration': 5.212}, {'end': 32283.04, 'text': 'Okay, so it only makes more sense if I show you the file that I am using this is the text file.', 'start': 32273.715, 'duration': 9.325}], 'summary': 'Using head command to get the first line and awk to extract the third element from a file.', 'duration': 66.438, 'max_score': 32216.602, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo32216602.jpg'}, {'end': 32611.651, 'src': 'embed', 'start': 32574.973, 'weight': 1, 'content': [{'end': 32590.705, 'text': 'that is the value that has been allotted and then again we are adding 1 to a, we are incrementing a by 1 and then we are closing the loop with a done.', 'start': 32574.973, 'duration': 15.732}, {'end': 32598.488, 'text': 'So when we run it?', 'start': 32593.407, 'duration': 5.081}, {'end': 32602.549, 'text': 'so when we run it, we get the same exact thing.', 'start': 32598.488, 'duration': 4.061}, {'end': 32611.651, 'text': 'now that was three different loops for the same exact result, but see how differently those things are executed here.', 'start': 32602.549, 'duration': 9.102}], 'summary': 'Three different loops produced the same result.', 'duration': 36.678, 'max_score': 32574.973, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo32574973.jpg'}, {'end': 32897.269, 'src': 'embed', 'start': 32867.858, 'weight': 0, 'content': [{'end': 32871.86, 'text': 'This I am going to demonstrate in a little while in this very segment.', 'start': 32867.858, 'duration': 4.002}, {'end': 32877.602, 'text': 'So the question is when should shell programming or shell scripting not be used.', 'start': 32872.68, 'duration': 4.922}, {'end': 32883.564, 'text': 'So when the task is very complex, like writing an entire payroll processing system,', 'start': 32878.083, 'duration': 5.481}, {'end': 32888.845, 'text': "or there's a high degree of productivity required and it involves various different software tools.", 'start': 32883.564, 'duration': 5.281}, {'end': 32892.407, 'text': 'It is not the most ideal to use shell scripting.', 'start': 32889.266, 'duration': 3.141}, {'end': 32897.269, 'text': 'Next question is what is the lifespan of a variable inside a shell script?', 'start': 32893.148, 'duration': 4.121}], 'summary': 'Shell scripting not ideal for complex tasks like payroll processing or high productivity involving multiple software tools.', 'duration': 29.411, 'max_score': 32867.858, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo32867858.jpg'}, {'end': 33175.534, 'src': 'embed', 'start': 33152.864, 'weight': 5, 'content': [{'end': 33161.708, 'text': 'So, basically, it returns a non-zero exit code, and this is why it should not be used if there is any chance of that occurring.', 'start': 33152.864, 'duration': 8.844}, {'end': 33171.112, 'text': 'this will give you a result of 0, and that is why it should not be used if there is any chance of the latter statement to come true,', 'start': 33161.708, 'duration': 9.404}, {'end': 33175.534, 'text': 'which is the output of 1, even though this condition is true.', 'start': 33171.112, 'duration': 4.422}], 'summary': "Avoid using it if there's a chance of non-zero exit code (1) occurring.", 'duration': 22.67, 'max_score': 33152.864, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo33152864.jpg'}], 'start': 31621.728, 'title': 'Shell scripting and linux processes', 'summary': 'Covers super block, gui scripting, linux process stages, shell scripting basics, interview q&a, file system basics, logical operators, and variable assignment, providing essential information for shell scripting and linux processes.', 'chapters': [{'end': 31668.419, 'start': 31621.728, 'title': 'Super block and gui scripting', 'summary': 'Discusses the super block in shell scripting, which holds essential file system information, such as file size and block size, and also explores gui scripting in linux, which complements command-line interface scripting for controlling computer applications.', 'duration': 46.691, 'highlights': ['The super block in shell scripting contains information about the file system, including file size, block size, and the number of free data blocks and nodes.', 'GUI scripting in Linux serves as a complementary method to CLI scripting for controlling computer applications and relies on the graphical user interface.']}, {'end': 32611.651, 'start': 31668.84, 'title': 'Linux process stages and shell scripting basics', 'summary': 'Discusses the various stages of a linux process, including waiting, running, stopped, and zombie mode, and explains the differences between break and continue statements, the significance of the shebang line in shell scripting, how to pass arguments to a script, and the syntax for loops in shell scripting.', 'duration': 942.811, 'highlights': ['The chapter discusses the various stages of a Linux process, including waiting, running, stopped, and zombie mode The Linux process passes through four stages: waiting for a resource, running, stopped after successful execution, and zombie mode, where the process is stopped but still active in the process table.', "The chapter explains the differences between break and continue statements The break command escapes the entire loop, while the continue command escapes only the current iteration, useful for testing each iteration's executability.", "The chapter discusses the significance of the shebang line in shell scripting The shebang line at the top of a script determines the location of the engine to be used for execution and provides information about the engine's location.", 'The chapter explains how to pass arguments to a script Passing an argument to a script involves using the cat command and the dollar sign followed by a number to represent the argument, allowing for script execution with specific arguments.', 'The chapter provides the syntax for loops in shell scripting The syntax for loops includes for, while, and until loops, each with specific conditions and statements for execution, demonstrated with examples of printing variables and iterating through values.']}, {'end': 32914.025, 'start': 32611.911, 'title': 'Shell scripting interview q&a', 'summary': 'Covers various shell scripting interview questions including the storage location of shell programs, differences between special variables, comparison of strings, redirection of standard outputs and errors, usage of single and double quotes, limitations of shell scripting, and the lifespan of a variable in a shell script.', 'duration': 302.114, 'highlights': ['The lifespan of a variable inside a shell script only lasts until it is executed, that is, until the end of execution.', 'The test command is used to compare text strings by comparing each character in each string.', 'The shebang line points to the file where the program is stored, making it a more preferable option than the bond shell.', 'The seashell allows the aliasing of all commands, great for reusing script lengthy commands, and provides access to command history, making it a more preferable option than the bond shell.', 'The difference between the dollar and at sign treats each quoted argument as a separate argument, while the dollar sign followed by an asterisk considers the entire set of parameters as one single string when used as a command argument.']}, {'end': 33239.994, 'start': 32914.046, 'title': 'File system and scripting basics', 'summary': 'Covers file system basics including default file permissions and the significance of the shebang line in shell scripting. it also explains the shorthand and full form of logical operators in shell scripting with an example. additionally, it includes a command and asks to determine its output.', 'duration': 325.948, 'highlights': ['Default file permissions are 666, allowing users, user groups, and everybody else to read and write the file. Default file permissions are set to 666, providing read and write access for users, user groups, and all other users.', 'The shebang line specifies the absolute path to the shell interpreter and must be the first line in a script. The shebang line, such as #!/bin/sh or #!/bin/bash, denotes the absolute path to the shell interpreter and must be the first line in a script.', 'The shorthand form of logical operators in shell scripting can lead to unexpected results and should be used cautiously. The shorthand form of logical operators in shell scripting, represented by && and ||, may produce unexpected results and should be used with caution due to potential non-zero exit codes.']}, {'end': 33569.384, 'start': 33240.694, 'title': 'Shell scripting basics', 'summary': 'Covers the basics of shell scripting, including variable assignment, string manipulation, and array operations, with specific examples and commands provided for each concept.', 'duration': 328.69, 'highlights': ['Variable assignment using single and double quotes Explains the difference between single and double quotes in variable assignment, illustrating how single quotes do not call the variable value, while double quotes do. This provides a clear understanding of how to represent variable values within strings.', 'Advantages of variable assignment technique Highlights the advantage of assigning a variable to a value if another variable is empty or undefined, demonstrating the practical use case and benefits of the discussed technique.', 'Printing part of a string variable with echo command Provides a detailed example and explanation of using parameters to print specific parts of a string variable, offering insights into string manipulation and the echo command.', 'Rewriting and converting a command to print and convert variables Demonstrates the process of rewriting a command to print a sentence and convert the variable to plural, showcasing a practical application of variable manipulation within a script.', 'Printing all the arguments provided to the script Explains how to print all the arguments provided to the script using the dollar star or dollar at notation, offering a simple and effective method for handling script arguments.', "Printing the PID of a current shell Provides a clear and concise method for printing the PID of the current shell using the 'two dollar signs' notation, offering a quick and practical way to access process IDs in shell scripts.", 'Printing array elements and their respective indexes Illustrates how to print all the array elements and their respective indexes, offering a comprehensive understanding of array operations and printing techniques within shell scripting.']}], 'duration': 1947.656, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo31621728.jpg', 'highlights': ['The super block in shell scripting contains information about the file system, including file size, block size, and the number of free data blocks and nodes.', 'The chapter discusses the various stages of a Linux process, including waiting, running, stopped, and zombie mode The Linux process passes through four stages: waiting for a resource, running, stopped after successful execution, and zombie mode, where the process is stopped but still active in the process table.', "The chapter explains the differences between break and continue statements The break command escapes the entire loop, while the continue command escapes only the current iteration, useful for testing each iteration's executability.", 'The chapter provides the syntax for loops in shell scripting The syntax for loops includes for, while, and until loops, each with specific conditions and statements for execution, demonstrated with examples of printing variables and iterating through values.', 'The lifespan of a variable inside a shell script only lasts until it is executed, that is, until the end of execution.', 'Default file permissions are 666, allowing users, user groups, and everybody else to read and write the file. Default file permissions are set to 666, providing read and write access for users, user groups, and all other users.', 'The shorthand form of logical operators in shell scripting can lead to unexpected results and should be used cautiously. The shorthand form of logical operators in shell scripting, represented by && and ||, may produce unexpected results and should be used with caution due to potential non-zero exit codes.', 'Variable assignment using single and double quotes Explains the difference between single and double quotes in variable assignment, illustrating how single quotes do not call the variable value, while double quotes do. This provides a clear understanding of how to represent variable values within strings.', 'Printing part of a string variable with echo command Provides a detailed example and explanation of using parameters to print specific parts of a string variable, offering insights into string manipulation and the echo command.', 'Printing all the arguments provided to the script Explains how to print all the arguments provided to the script using the dollar star or dollar at notation, offering a simple and effective method for handling script arguments.', "Printing the PID of a current shell Provides a clear and concise method for printing the PID of the current shell using the 'two dollar signs' notation, offering a quick and practical way to access process IDs in shell scripts.", 'Printing array elements and their respective indexes Illustrates how to print all the array elements and their respective indexes, offering a comprehensive understanding of array operations and printing techniques within shell scripting.']}, {'end': 34734.102, 'segs': [{'end': 33636.35, 'src': 'embed', 'start': 33610.174, 'weight': 3, 'content': [{'end': 33614.737, 'text': 'people with three to five years of experience in shell scripting, Linux or Unix.', 'start': 33610.174, 'duration': 4.563}, {'end': 33619.98, 'text': 'this section will also have some scenario based questions, obviously in the practical form.', 'start': 33614.737, 'duration': 5.243}, {'end': 33626.884, 'text': 'So the last few questions are for professionals with three to five years of experience at least here.', 'start': 33620.8, 'duration': 6.084}, {'end': 33634.869, 'text': 'We have a few scenario based questions which may help you build on that resume that you have created with so much care.', 'start': 33626.944, 'duration': 7.925}, {'end': 33636.35, 'text': "So let's go ahead.", 'start': 33635.409, 'duration': 0.941}], 'summary': 'Interview focuses on professionals with 3-5 years of experience in shell scripting, linux or unix, with scenario-based questions.', 'duration': 26.176, 'max_score': 33610.174, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo33610174.jpg'}, {'end': 33677.127, 'src': 'embed', 'start': 33653.118, 'weight': 0, 'content': [{'end': 33661.14, 'text': 'So the schedule is called the cron tab which stands for a cron table because it uses the job scheduler cron to execute tasks.', 'start': 33653.118, 'duration': 8.022}, {'end': 33665.121, 'text': 'This is also the name of the program that is used to edit that schedule.', 'start': 33661.66, 'duration': 3.461}, {'end': 33668.903, 'text': 'This software utility is a time-based job scheduler.', 'start': 33665.661, 'duration': 3.242}, {'end': 33677.127, 'text': 'now people who set up and maintain software environments use cron to schedule these jobs, to run periodically at fixed times, dates or intervals.', 'start': 33668.903, 'duration': 8.224}], 'summary': 'Cron tab is a time-based job scheduler used to schedule and execute tasks in software environments.', 'duration': 24.009, 'max_score': 33653.118, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo33653118.jpg'}, {'end': 33940.201, 'src': 'embed', 'start': 33909.471, 'weight': 11, 'content': [{'end': 33912.732, 'text': 'This command keeps you informed of news concerning the system.', 'start': 33909.471, 'duration': 3.261}, {'end': 33917.333, 'text': 'Each news item is contained in a separate file in the news directory.', 'start': 33913.212, 'duration': 4.121}, {'end': 33919.954, 'text': 'Then you have the wall command.', 'start': 33917.913, 'duration': 2.041}, {'end': 33924.075, 'text': 'the wall, or the Linux wall, is an abbreviation of right to all.', 'start': 33919.954, 'duration': 4.121}, {'end': 33931.193, 'text': 'So, basically, this is a utility that displays the content of a computer file or the standard input to all the logged in users.', 'start': 33924.608, 'duration': 6.585}, {'end': 33940.201, 'text': 'It is typically used by root to send out shutting down message to all users just before power off and finally you have MOTD.', 'start': 33931.614, 'duration': 8.587}], 'summary': 'The system news command informs users of news in separate files, while the wall command displays content to all logged-in users, often used by root for system messages, and motd is also mentioned.', 'duration': 30.73, 'max_score': 33909.471, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo33909471.jpg'}, {'end': 34043.573, 'src': 'embed', 'start': 34013.451, 'weight': 1, 'content': [{'end': 34019.115, 'text': 'next, the difference between single equal sign and the double equal sign.', 'start': 34013.451, 'duration': 5.664}, {'end': 34026.689, 'text': 'Now. the first one is for assigning value to a variable and the second one is used for string comparison.', 'start': 34019.687, 'duration': 7.002}, {'end': 34033.351, 'text': 'the comparison operator or the double equal to sign behaves differently within a double brackets test,', 'start': 34026.689, 'duration': 6.662}, {'end': 34043.573, 'text': 'as the single equal to sign is an arithmetic operator and the double equal to sign is a string operator as well as an arithmetic operator,', 'start': 34033.351, 'duration': 10.222}], 'summary': 'Difference between = and ==: = for variable assignment, == for string comparison and arithmetic operations.', 'duration': 30.122, 'max_score': 34013.451, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo34013451.jpg'}, {'end': 34704.94, 'src': 'embed', 'start': 34628.365, 'weight': 2, 'content': [{'end': 34639.391, 'text': "So basically if the answer to this is non-zero then it's going to print your directory exists and then you close your if statement with an fi.", 'start': 34628.365, 'duration': 11.026}, {'end': 34640.972, 'text': 'All right.', 'start': 34640.652, 'duration': 0.32}, {'end': 34644.195, 'text': "Let's go ahead and try and run this.", 'start': 34641.874, 'duration': 2.321}, {'end': 34662.824, 'text': 'Put in the name of a directory, say public, and then it says directory exists.', 'start': 34654.78, 'duration': 8.044}, {'end': 34675.59, 'text': "So if I go ahead and type this is your question 58, and it says Let's see public and you know the directory exists,", 'start': 34664.125, 'duration': 11.465}, {'end': 34682.151, 'text': 'because if I open my list of directories here, you can see in blue you have public.', 'start': 34675.59, 'duration': 6.561}, {'end': 34685.072, 'text': "Okay, so let's clear this out.", 'start': 34682.972, 'duration': 2.1}, {'end': 34687.833, 'text': 'So question number 59.', 'start': 34685.992, 'duration': 1.841}, {'end': 34693.194, 'text': 'Can you write a script to portray how set hyphen X works now as we had discussed earlier.', 'start': 34687.833, 'duration': 5.361}, {'end': 34695.294, 'text': 'This is a way of debugging a script.', 'start': 34693.254, 'duration': 2.04}, {'end': 34697.595, 'text': "So let's go and see how it works.", 'start': 34695.775, 'duration': 1.82}, {'end': 34704.94, 'text': 'So here I have written a script which obviously is going to throw an error at me.', 'start': 34698.996, 'duration': 5.944}], 'summary': 'Demonstrated script to check directory existence, and debugged script using set -x.', 'duration': 76.575, 'max_score': 34628.365, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo34628365.jpg'}], 'start': 33569.404, 'title': 'Unix and linux shell scripting', 'summary': 'Covers intermediate level linux shell scripting, targeting professionals with three to five years of experience, understanding cron and shell commands for backup and disk usage, and fundamental unix shell scripting concepts with practical demonstrations and examples.', 'chapters': [{'end': 33634.869, 'start': 33569.404, 'title': 'Linux shell scripting: intermediate level', 'summary': 'Covers using the bang sign for printing indexes, targeting professionals with three to five years of experience in shell scripting, linux or unix, and includes scenario based questions.', 'duration': 65.465, 'highlights': ['The chapter covers using the bang sign for printing indexes, which is a useful technique for shell scripting in Linux. (Relevance: 5)', 'This section targets professionals with three to five years of experience in shell scripting, Linux or Unix, indicating a focus on intermediate-level skills. (Relevance: 4)', 'The section includes scenario based questions, offering practical application and skill-building opportunities for professionals. (Relevance: 3)']}, {'end': 33956.551, 'start': 33635.409, 'title': 'Understanding cron and shell commands', 'summary': 'Provides an overview of cron and its scheduling capabilities, explaining the crontab structure and commands for backup, disk usage, and communication in the shell environment.', 'duration': 321.142, 'highlights': ['The crontab file has six fields, specifying the minute, hour, day, month, day of the week, and the command to be executed. The explanation of the six fields in the crontab file structure.', 'The cron allow and cron deny files determine user permissions for the crontab command, with their respective locations in different Linux distributions. Details about the two files related to the crontab command and their roles in user permissions.', 'The tar command is used for taking backups, with options for zipping and unzipping files, and its utility for tarball files from the internet or emails. Explanation of the tar command and its usage for backup operations, including file compression and decompression.', 'The DF, DU, and DF space commands are available for checking disk usage, providing comprehensive information about disk utilization, file and directory usage, and free disk space in various formats. Description of the three commands for checking disk usage and their specific functionalities.', 'Overview of communication commands in the shell, including mail, news, wall, and MOTD, with their respective functions in sending, displaying system news, broadcasting messages to users, and sending a common message to all users. Explanation of the different communication commands available in the shell environment.']}, {'end': 34734.102, 'start': 33957.132, 'title': 'Unix shell scripting concepts', 'summary': 'Covers fundamental unix shell scripting concepts including disk space calculation, debugging methods, variable assignment, file manipulation, parameter passing, and basic arithmetic operations with practical demonstrations and examples.', 'duration': 776.97, 'highlights': ["Demonstrating disk space calculation using the 'du' command to find total disk space used by a specific user 'edureka'. The 'du' command with the path '/home/edureka' and the '-s' flag is used to find the total disk space used by each subdirectory.", "Explaining debugging methods with debug statements and 'set -x' for enabling debugging in a script. Debugging can be achieved by inserting debug statements or enabling debugging in the script using 'set -x'.", 'Clarifying the difference between single and double equal signs for variable assignment and string comparison. The single equal sign is for assigning values to variables, while the double equal sign is used for string comparison within double brackets tests.', "Demonstrating how to open a read-only file in a shell using the 'vi' command with the '-R' flag. The read-only file in the shell can be opened using the 'vi' command with the '-R' flag followed by the file name.", "Illustrating the usage of the 'tar' command to read the context of a file inside a jar without extracting in a shell script. The 'tar' command with the '-tvf' flags followed by the file name and tar extension can be used to read the contents of a file inside a jar without extracting."]}], 'duration': 1164.698, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo33569404.jpg', 'highlights': ['The chapter covers using the bang sign for printing indexes, a useful technique for shell scripting in Linux.', 'This section targets professionals with three to five years of experience in shell scripting, Linux or Unix, indicating a focus on intermediate-level skills.', 'The section includes scenario based questions, offering practical application and skill-building opportunities for professionals.', 'The crontab file has six fields, specifying the minute, hour, day, month, day of the week, and the command to be executed.', 'The cron allow and cron deny files determine user permissions for the crontab command, with their respective locations in different Linux distributions.', 'The tar command is used for taking backups, with options for zipping and unzipping files, and its utility for tarball files from the internet or emails.', 'The DF, DU, and DF space commands are available for checking disk usage, providing comprehensive information about disk utilization, file and directory usage, and free disk space in various formats.', 'Overview of communication commands in the shell, including mail, news, wall, and MOTD, with their respective functions in sending, displaying system news, broadcasting messages to users, and sending a common message to all users.', "Demonstrating disk space calculation using the 'du' command to find total disk space used by a specific user 'edureka'.", "Explaining debugging methods with debug statements and 'set -x' for enabling debugging in a script.", 'Clarifying the difference between single and double equal signs for variable assignment and string comparison.', "Demonstrating how to open a read-only file in a shell using the 'vi' command with the '-R' flag.", "Illustrating the usage of the 'tar' command to read the context of a file inside a jar without extracting in a shell script."]}, {'end': 38175.352, 'segs': [{'end': 35226.483, 'src': 'embed', 'start': 35194.168, 'weight': 13, 'content': [{'end': 35195.409, 'text': 'This is a tough one to call.', 'start': 35194.168, 'duration': 1.241}, {'end': 35200.254, 'text': 'Linux over the recent years has made huge leaps in usability.', 'start': 35195.993, 'duration': 4.261}, {'end': 35204.816, 'text': 'distributions like Linux Mint have made installation and set up pretty simple.', 'start': 35200.254, 'duration': 4.562}, {'end': 35211.978, 'text': 'even non-technical users can install and use software and do normal day-to-day activities like web browsing, answering emails,', 'start': 35204.816, 'duration': 7.162}, {'end': 35213.679, 'text': 'playing music and watching videos.', 'start': 35211.978, 'duration': 1.701}, {'end': 35221.738, 'text': 'Windows due to high market proliferation is the default OS of many devices now think of it people like you and me.', 'start': 35214.372, 'duration': 7.366}, {'end': 35226.483, 'text': 'We grew up on Windows right buy a new laptop or a PC.', 'start': 35222.059, 'duration': 4.424}], 'summary': 'Linux has made huge usability leaps, but windows dominates due to market share.', 'duration': 32.315, 'max_score': 35194.168, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo35194168.jpg'}, {'end': 35385.874, 'src': 'embed', 'start': 35362.709, 'weight': 16, 'content': [{'end': 35371.541, 'text': 'You can download and install GNU Linux without any purchase some companies offer paid support for their Linux distributions.', 'start': 35362.709, 'duration': 8.832}, {'end': 35376.532, 'text': 'but the underlying software is still free to download and install.', 'start': 35372.011, 'duration': 4.521}, {'end': 35385.874, 'text': 'a funny folklore here is that Linus Torvalds actually was an introvert and did not want companies to communicate with him through email.', 'start': 35376.532, 'duration': 9.342}], 'summary': 'Gnu linux is free to download; companies offer paid support; linus torvalds was an introvert.', 'duration': 23.165, 'max_score': 35362.709, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo35362709.jpg'}, {'end': 35435.231, 'src': 'embed', 'start': 35409.778, 'weight': 2, 'content': [{'end': 35420.743, 'text': 'Windows 10 was originally being offered as a free upgrade to current owners of Windows 7 or 8.1 if they upgraded before the 29th of July 2016,,', 'start': 35409.778, 'duration': 10.965}, {'end': 35422.764, 'text': 'but that offer is no longer available.', 'start': 35420.743, 'duration': 2.021}, {'end': 35428.568, 'text': 'Then you have reliability now Windows as we know it become sluggish day after day.', 'start': 35423.425, 'duration': 5.143}, {'end': 35435.231, 'text': 'You will want to reinstall Windows after a while when you encounter crashes or slowdowns on your system.', 'start': 35428.908, 'duration': 6.323}], 'summary': 'Windows 10 free upgrade offer ended on july 29, 2016. windows may become sluggish, requiring reinstallation.', 'duration': 25.453, 'max_score': 35409.778, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo35409778.jpg'}, {'end': 36081.345, 'src': 'embed', 'start': 36056.977, 'weight': 12, 'content': [{'end': 36066.44, 'text': 'Now the Unix has a common desktop environment and also has genome whereas Linux provides two GUIs which are the KDE and genome though.', 'start': 36056.977, 'duration': 9.463}, {'end': 36074.883, 'text': 'There are many alternatives such as mate XFSE, etc, which are just a few of the millions of alternatives that it has next.', 'start': 36066.48, 'duration': 8.403}, {'end': 36080.844, 'text': "Let's talk a little bit about the portability of each of these now Unix is not portable period.", 'start': 36074.943, 'duration': 5.901}, {'end': 36081.345, 'text': "That's it.", 'start': 36080.884, 'duration': 0.461}], 'summary': 'Unix has common desktop environment and genome, linux provides kde and genome guis, unix is not portable.', 'duration': 24.368, 'max_score': 36056.977, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo36056977.jpg'}, {'end': 36839.411, 'src': 'embed', 'start': 36810.178, 'weight': 1, 'content': [{'end': 36818.081, 'text': 'okay, so if you can see this a pictorial representation on the left pane, you see applications.', 'start': 36810.178, 'duration': 7.903}, {'end': 36825.044, 'text': 'on top of kernel you see applications, and bottom of the kernel you see the hardware devices,', 'start': 36818.081, 'duration': 6.963}, {'end': 36831.887, 'text': 'the hardware devices like CPU memory and the devices which are attached to the computer.', 'start': 36825.044, 'duration': 6.843}, {'end': 36839.411, 'text': 'so in order to interact with the kernel applications, you see, on top of operating system you have applications.', 'start': 36831.887, 'duration': 7.524}], 'summary': 'Pictorial representation shows applications on top of kernel interacting with hardware devices below, and applications on top of operating system.', 'duration': 29.233, 'max_score': 36810.178, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo36810178.jpg'}, {'end': 37819.251, 'src': 'embed', 'start': 37788.983, 'weight': 0, 'content': [{'end': 37796.15, 'text': 'in VM stat, the based on the requirement, the based on the performance and monitoring, you can execute those.', 'start': 37788.983, 'duration': 7.167}, {'end': 37802.277, 'text': 'and coming to the CPU, you have a command called SAR, the system activity report.', 'start': 37796.15, 'duration': 6.127}, {'end': 37809.283, 'text': 'okay, with SAR-U you can display the CPU usage.', 'start': 37802.938, 'duration': 6.345}, {'end': 37812.646, 'text': 'see exactly, you can see the CPU usage.', 'start': 37809.283, 'duration': 3.363}, {'end': 37819.251, 'text': 'okay, SAR-U displays the CPU usage for the current day that was collected until that point.', 'start': 37812.646, 'duration': 6.605}], 'summary': 'Vm stat and sar-u commands are used for performance monitoring and display cpu usage.', 'duration': 30.268, 'max_score': 37788.983, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo37788983.jpg'}, {'end': 37964.805, 'src': 'embed', 'start': 37944.097, 'weight': 14, 'content': [{'end': 37953.46, 'text': 'we have a flexibility of either resizing the logical volume or reducing or shrinking the size of a logical volume.', 'start': 37944.097, 'duration': 9.363}, {'end': 37958.402, 'text': "So let's see practically how you can do that in Linux operating system.", 'start': 37953.901, 'duration': 4.501}, {'end': 37964.805, 'text': "I'm talking about advanced partitioning tool called LVM which is nothing but the logical volume manager.", 'start': 37958.763, 'duration': 6.042}], 'summary': 'Learn how to resize or shrink logical volumes in linux using lvm.', 'duration': 20.708, 'max_score': 37944.097, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo37944097.jpg'}], 'start': 34734.562, 'title': 'Linux vs windows comparison', 'summary': 'Compares linux and windows on various aspects including usage, security, compatibility, and licensing, highlighting that linux is more secure, stable, and privacy-oriented, whereas windows has better compatibility and legacy support.', 'chapters': [{'end': 35409.778, 'start': 34734.562, 'title': 'Linux vs windows comparison', 'summary': 'Compares linux and windows on various aspects including usage, security, compatibility, and licensing, highlighting that linux is more secure, stable, and privacy-oriented, whereas windows has better compatibility and legacy support.', 'duration': 675.216, 'highlights': ['Linux is more secure and stable than Windows, as it is community-driven and based on Unix architecture, ensuring quick problem-solving and constant monitoring by developers. Linux is community-driven, developed through people collaboration and monitored constantly by the developers from every corner of the world, any new problem raised can be solved within just a few hours, and the necessary patch will be ready at the same time.', 'Windows excels in compatibility and legacy support, ensuring most software will work and even obscure, outdated software will continue to work, unlike Linux which may struggle with the basics and lacks support for certain technologies. Windows has good Legacy support plain and simple. I know of commercial software that still relies on technologies like silverlight, activex and Internet Explorer 11. Linux, on the other hand, can struggle with the basics that Windows users take for granted.', 'Linux is open source, allowing users to access and alter the source code, whereas Windows is commercial and does not provide access to the source code, resulting in rapid bug fixes but also potential exploitation of weaknesses by developers. Linux is open source, whereas Windows is commercial and users do not have any access to their source code. This has its own advantages in Linux, like bugs, and OS will fix at a rapid pace and disadvantages, like developers, may take advantage of any weakness in the OS if they are found in Windows.', 'Linux is entirely free and open source, while Microsoft Windows typically costs between 99 to 199 US dollars for each licensed copy. The Linux kernel and the GNU utilities and libraries which accompany it in most distributions are entirely free and open source. You can download and install GNU Linux without any purchase. On the other hand, you have Microsoft Windows, which usually costs between 99 to 199 US dollars for each licensed copy.']}, {'end': 36342.539, 'start': 35409.778, 'title': 'Linux vs windows: a comprehensive comparison', 'summary': 'Compares linux and windows, highlighting that linux offers a longer system lifespan, reliable support, and diverse distributions, while windows has more multimedia applications and better gaming compatibility. it also covers differences in usage, development, architecture, processes, file system support, shell interface, gui, portability, security, threat detection, source code availability, and licensing. the chapter concludes with limitations of both oss and a basic explanation of linux as an operating system.', 'duration': 932.761, 'highlights': ['Linux offers a longer system lifespan, as it helps the system run smoothly for a much longer period compared to Windows, which becomes sluggish over time, often requiring reinstallation. Linux provides a longer system lifespan, ensuring smooth functioning for an extended period.', 'Linux has reliable support through online forums and communities, offering detailed solutions within minutes for free, while Windows has easily accessible online forums and paid support. Linux provides reliable and free support through online forums and communities, with quick and detailed solutions.', 'The chapter discusses the complexities of Linux distributions, emphasizing the wide variety and functionality, catering to diverse user preferences and needs, such as Mac OS-style interfaces, Windows XP-like experiences, specialized versions for low-powered computers and secure options for servers. Linux distributions offer diverse functionalities, catering to specific user preferences and needs.', 'Windows has more multimedia applications, but Linux provides most multimedia applications for free, making it advantageous for users. Additionally, Linux supports almost all major programming languages and offers a superior terminal and package manager for developers. Linux offers free multimedia applications, supports major programming languages, and provides a superior terminal for developers.', 'Linux is portable and can be booted from a USB stick, while Unix is not portable. In terms of security, Unix has reported between 80 to 120 viruses, whereas Linux has had about 60 to 100 listed viruses, with faster threat detection and resolution due to its community-driven nature. Linux is portable and has faster threat detection, making it more secure compared to Unix.', "Linux being an open-source OS, its source code is available to the general public, while the source code of Unix is not accessible to anyone. Linux's open-source nature allows public access to its source code, unlike Unix.", "Unix has limitations such as an unfriendly user interface, inconsistent performance across machines, and lack of real-time response time support. On the other hand, Linux's limitations include lack of a standard edition, patchy driver support, compatibility issues for some Windows programs, and difficulty in home use. Unix has limitations in user interface and performance consistency, while Linux faces challenges in standardization and driver support."]}, {'end': 36748.07, 'start': 36343.126, 'title': 'Understanding linux and gnu project', 'summary': 'Discusses the origins and benefits of linux, including its cost-effectiveness, security, and popularity in server environments, as well as the importance of the gnu project in creating a free and open-source operating system.', 'duration': 404.944, 'highlights': ['Linux offers a free operating system, with millions of free programs and applications to choose from, and is highly secure, eliminating the need for antivirus software. Linux provides a cost-effective solution by offering a free operating system with a wide range of free programs and applications, and it is highly secure, eliminating the need for antivirus software.', "Linux is the preferred operating system for server environments due to its stability and reliability, with mega companies like Amazon, Facebook, and Google using it for their servers. Linux's stability and reliability make it the preferred choice for server environments, as evidenced by its adoption by major companies like Amazon, Facebook, and Google.", 'The GNU project was launched to create a complete operating system that is free software, with the main intention of providing an open-source and freely available operating system for all public users. The GNU project aimed to create an open-source and freely available operating system for all public users, in line with the free software movement started by Richard Stallman.']}, {'end': 37195.525, 'start': 36748.07, 'title': 'Understanding linux kernel and bash shell', 'summary': 'Explains the role of a kernel in an operating system, highlighting its function as the intermediary between applications and hardware, and the significance of the bash shell as the default shell in linux, providing features like command aliasing and history.', 'duration': 447.455, 'highlights': ['The kernel acts as the mediator between applications and hardware devices, translating user commands into machine language and vice versa. The kernel serves as the core of any operating system, facilitating the interaction between applications and hardware devices by translating user commands into machine language.', 'Bash shell is the default shell for most Linux systems, offering features like command aliasing, command completion, and command history. Bash shell, named after Stephen Born, is the default shell for Linux, providing features such as command aliasing, command completion using tab keys, and command history for improved usability.', 'Other shells like C shell, con shell, and public domain con shell do not offer the same features as the bash shell, making it the preferred choice for many Linux users. In comparison to other shells like C shell, con shell, and public domain con shell, the bash shell offers unique features like command aliasing and history, making it the preferred choice for Linux users.']}, {'end': 37616.295, 'start': 37195.525, 'title': 'Understanding daemons and linux operating system', 'summary': "Explains daemons as background services that provide functions not available in the base operating system, typically indicated by 'd' in linux and unix systems, and also delves into the linux loader (lilo) and the advantages of linux being open source, specifically focusing on its wide range of options and increased security. it then discusses the basic components of the linux operating system, covering the kernel, system libraries, and system utilities.", 'duration': 420.77, 'highlights': ["Daemons are background services that provide functions not available in the base operating system, typically indicated by 'D' in Linux and Unix systems. Daemons are described as services that provide several functions not available under the base operating system, typically indicated by 'D' in Linux and Unix systems.", 'LILO, a Linux loader, is explained as a bootloader for Linux operating systems and can be configured to boot other operating systems as well. LILO, a Linux loader, is explained as a bootloader for Linux operating systems and can be configured to boot other operating systems as well.', 'The advantages of Linux being open source are discussed, focusing on the wide range of options available to users, such as Debian, Fedora, Ubuntu, and Mint, and increased security due to contributions from white hat hackers and open access to the source code. The advantages of Linux being open source are discussed, focusing on the wide range of options available to users, such as Debian, Fedora, Ubuntu, and Mint, and increased security due to contributions from white hat hackers and open access to the source code.', 'The basic components of the Linux operating system are outlined, including the kernel, system libraries, and system utilities. The basic components of the Linux operating system are outlined, including the kernel, system libraries, and system utilities.']}, {'end': 38175.352, 'start': 37616.894, 'title': 'Linux system monitoring and lvm partition management', 'summary': 'Explains how to check memory statistics and cpu usage as a linux admin using commands like free, vmstat, and sar, and also demonstrates the process of reducing a logical volume size using lvm, emphasizing the advantages over fixed partitions.', 'duration': 558.458, 'highlights': ['Checking Memory and CPU Stats The chapter explains how to use the commands free, vmstat, and SAR to check memory statistics and CPU usage, providing examples of practical usage and quantifiable data such as memory size and CPU usage intervals.', 'Reducing Logical Volume Size using LVM It demonstrates the process of reducing a logical volume size from 5GB to 3GB, emphasizing the flexibility and advantages provided by LVM over fixed disk partitions, with specific commands like e2fsck, resize2fs, and lvreduce.']}], 'duration': 3440.79, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo34734562.jpg', 'highlights': ['Linux is more secure and stable than Windows, as it is community-driven and based on Unix architecture, ensuring quick problem-solving and constant monitoring by developers.', 'Windows excels in compatibility and legacy support, ensuring most software will work and even obscure, outdated software will continue to work, unlike Linux which may struggle with the basics and lacks support for certain technologies.', 'Linux is open source, allowing users to access and alter the source code, whereas Windows is commercial and does not provide access to the source code, resulting in rapid bug fixes but also potential exploitation of weaknesses by developers.', 'Linux is entirely free and open source, while Microsoft Windows typically costs between 99 to 199 US dollars for each licensed copy.', 'Linux offers a longer system lifespan, as it helps the system run smoothly for a much longer period compared to Windows, which becomes sluggish over time, often requiring reinstallation.', 'Linux has reliable support through online forums and communities, offering detailed solutions within minutes for free, while Windows has easily accessible online forums and paid support.', 'Linux distributions offer diverse functionalities, catering to specific user preferences and needs.', 'Linux offers free multimedia applications, supports major programming languages, and provides a superior terminal for developers.', 'Linux is portable and has faster threat detection, making it more secure compared to Unix.', "Linux's open-source nature allows public access to its source code, unlike Unix.", 'Linux provides a cost-effective solution by offering a free operating system with a wide range of free programs and applications, and it is highly secure, eliminating the need for antivirus software.', "Linux's stability and reliability make it the preferred choice for server environments, as evidenced by its adoption by major companies like Amazon, Facebook, and Google.", 'The kernel serves as the core of any operating system, facilitating the interaction between applications and hardware devices by translating user commands into machine language.', 'Bash shell, named after Stephen Born, is the default shell for Linux, providing features such as command aliasing, command completion using tab keys, and command history for improved usability.', "Daemons are described as services that provide several functions not available under the base operating system, typically indicated by 'D' in Linux and Unix systems.", 'The advantages of Linux being open source are discussed, focusing on the wide range of options available to users, such as Debian, Fedora, Ubuntu, and Mint, and increased security due to contributions from white hat hackers and open access to the source code.', 'The basic components of the Linux operating system are outlined, including the kernel, system libraries, and system utilities.', 'The chapter explains how to use the commands free, vmstat, and SAR to check memory statistics and CPU usage, providing examples of practical usage and quantifiable data such as memory size and CPU usage intervals.', 'It demonstrates the process of reducing a logical volume size from 5GB to 3GB, emphasizing the flexibility and advantages provided by LVM over fixed disk partitions, with specific commands like e2fsck, resize2fs, and lvreduce.']}, {'end': 39259.754, 'segs': [{'end': 38275.449, 'src': 'embed', 'start': 38226.005, 'weight': 0, 'content': [{'end': 38230.446, 'text': 'so there comes your question again what is CLI and what is GUI?', 'start': 38226.005, 'duration': 4.441}, {'end': 38241.849, 'text': 'okay, CLI is nothing but the command line interface is a console or text-based representation in which the user types the commands to operate the software or devices.', 'start': 38230.446, 'duration': 11.403}, {'end': 38250.691, 'text': 'the main advantage of CLI is multiple steps can be executed by specifying a single command, which is not possible in graphical mode.', 'start': 38241.849, 'duration': 8.842}, {'end': 38263.202, 'text': 'okay, so a GUI which is nothing but The graphical user interface is a graphical representation in which the users can interact with software or devices through graphical icons.', 'start': 38250.691, 'duration': 12.511}, {'end': 38265.483, 'text': 'OK, simple definition.', 'start': 38263.942, 'duration': 1.541}, {'end': 38275.449, 'text': 'What is CLI and what is GUI? So how can you find out how much memory used in Linux operating system? Again, same question here.', 'start': 38265.903, 'duration': 9.546}], 'summary': 'Cli allows for multiple step execution with a single command, while gui enables interaction through graphical icons.', 'duration': 49.444, 'max_score': 38226.005, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38226005.jpg'}, {'end': 38382.679, 'src': 'embed', 'start': 38354.173, 'weight': 5, 'content': [{'end': 38362.495, 'text': 'while swap space can help machines with a small amount of ram, it should not be considered as a replacement for more ram.', 'start': 38354.173, 'duration': 8.322}, {'end': 38367.696, 'text': 'okay, so people often get confused between main memory and swap memory.', 'start': 38362.495, 'duration': 5.201}, {'end': 38379.578, 'text': "okay, so if the cpu doesn't find free space in the physical ram, so what cpu does is it just moves all inactive processes, inactive pages,", 'start': 38367.696, 'duration': 11.882}, {'end': 38382.679, 'text': 'from the main memory to the swap space.', 'start': 38379.578, 'duration': 3.101}], 'summary': 'Swap space is not a replacement for more ram. cpu moves inactive processes to swap space when physical ram is full.', 'duration': 28.506, 'max_score': 38354.173, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38354173.jpg'}, {'end': 38474.007, 'src': 'embed', 'start': 38440.957, 'weight': 4, 'content': [{'end': 38445.398, 'text': 'what is the naming convention for devices in Linux operating system?', 'start': 38440.957, 'duration': 4.441}, {'end': 38450.659, 'text': "okay, as you can see here, I'm running the program fdisk-l and you see the first device.", 'start': 38445.398, 'duration': 5.261}, {'end': 38453.74, 'text': 'I got two drives connected to my Linux system.', 'start': 38450.659, 'duration': 3.081}, {'end': 38460.861, 'text': 'the first drivers slash dev, slash SDA and the second drivers slash dev, slash SDB.', 'start': 38453.74, 'duration': 7.121}, {'end': 38465.062, 'text': 'see the naming conventions here, the conventions used for SCSI drives.', 'start': 38460.861, 'duration': 4.201}, {'end': 38474.007, 'text': 'in case you have IDE hard drives, the first convention would be slash dev, slash hda hdb, something like that.', 'start': 38465.862, 'duration': 8.145}], 'summary': 'Linux devices use naming conventions such as /dev/sda and /dev/sdb for scsi drives, and /dev/hda and /dev/hdb for ide drives.', 'duration': 33.05, 'max_score': 38440.957, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38440957.jpg'}, {'end': 38834.149, 'src': 'embed', 'start': 38785.128, 'weight': 1, 'content': [{'end': 38786.749, 'text': 'and this is applicable for others.', 'start': 38785.128, 'duration': 1.621}, {'end': 38792.413, 'text': 'okay. and coming to the next question, what are symbolic links?', 'start': 38787.629, 'duration': 4.784}, {'end': 38794.074, 'text': 'very interesting question.', 'start': 38792.413, 'duration': 1.661}, {'end': 38796.456, 'text': 'okay, symbolic links.', 'start': 38794.074, 'duration': 2.382}, {'end': 38800.359, 'text': 'so in linux, basically we have two types of links.', 'start': 38796.456, 'duration': 3.903}, {'end': 38804.882, 'text': 'one is symbolic link, which is also called as the soft link.', 'start': 38800.359, 'duration': 4.523}, {'end': 38807.765, 'text': 'so symbolic link, you can always compare.', 'start': 38804.882, 'duration': 2.883}, {'end': 38810.327, 'text': 'if you take an example, like in windows, we have shortcuts.', 'start': 38807.765, 'duration': 2.562}, {'end': 38815.27, 'text': 'okay, we always create a desktop shortcuts.', 'start': 38811.067, 'duration': 4.203}, {'end': 38821.034, 'text': 'now, instead of going to the lengthy part or navigating into directories, into directories and directories,', 'start': 38815.27, 'duration': 5.764}, {'end': 38829.387, 'text': 'we can better create a shortcut on the desktop for easy accessing and easy way of interacting with the operating system.', 'start': 38821.704, 'duration': 7.683}, {'end': 38834.149, 'text': 'Similarly, in Linux, it is called as a symbolic links or soft links.', 'start': 38829.888, 'duration': 4.261}], 'summary': 'Symbolic links in linux are akin to windows shortcuts, providing easy access and navigation within the operating system.', 'duration': 49.021, 'max_score': 38785.128, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38785128.jpg'}, {'end': 38888.449, 'src': 'embed', 'start': 38857.329, 'weight': 2, 'content': [{'end': 38866.431, 'text': 'it just allows instant access, easy of access of application or a program, okay, without having to navigate to multiple directories here.', 'start': 38857.329, 'duration': 9.102}, {'end': 38868.952, 'text': 'Let me show you one practical example here.', 'start': 38866.851, 'duration': 2.101}, {'end': 38874.734, 'text': 'For example, I just want to see the configuration file of my LAN card, network interface card.', 'start': 38869.272, 'duration': 5.462}, {'end': 38877.435, 'text': 'The command would be cat slash, etc.', 'start': 38875.194, 'duration': 2.241}, {'end': 38888.449, 'text': 'slash sysconfig network hyphen scripts and the configuration file would be starting like this this is my configuration file for my land card, emp0s3.', 'start': 38877.435, 'duration': 11.014}], 'summary': 'The transcript demonstrates the ease of instant access to a network configuration file through a command, enhancing efficiency.', 'duration': 31.12, 'max_score': 38857.329, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38857329.jpg'}], 'start': 38175.352, 'title': 'User functionality and system administration in linux', 'summary': 'Explains root user functionality, cli and gui differences, memory usage, swap space, permissions in linux, symbolic links, virtual desktops, and file system specifics, providing essential knowledge for system administration and user management in linux.', 'chapters': [{'end': 38224.584, 'start': 38175.352, 'title': 'Root user functionality', 'summary': "Explains the functionality of a root user, the super user account with special system administration privileges, known as 'root' in unix-like systems, and 'administrator' or 'admin' in windows, with the ability to access all files and programs, change file ownerships, and bind to network ports below 1024.", 'duration': 49.232, 'highlights': ['The root user, also known as the super user, has all the rights or permissions to all the files and programs in all modes in Unix-like systems.', "In Windows, the equivalent of the root user is referred to as 'administrator' or 'admin', with similar system administration privileges.", 'The root user can perform tasks that an ordinary user cannot, such as changing the ownerships of files and binding to network ports numbered below 1024.']}, {'end': 38785.128, 'start': 38226.005, 'title': 'Understanding cli, gui, memory usage, swap space, and permissions in linux', 'summary': 'Covers the differences between cli and gui, methods to check memory usage in linux, the concept of swap space and its recommended size, accessing and naming conventions for partitions, drives, communication ports, printer ports, and permissions in linux, including the commands to change permissions and ownership.', 'duration': 559.123, 'highlights': ['The free command is the most simple and easy to use command to check memory usage on Linux operating system. The free command provides complete information about memory usage and can be used with options like -n or -g.', 'The preferred size for swap partition is twice the amount of physical memory available on the system. The recommended size for swap partition is provided as a guideline for optimal system performance.', 'The naming conventions for accessing partitions and drives in Linux differ based on the type of drive, such as SCSI drives being represented as sda and sdb. The naming conventions for IDE, SCSI, and SAS drives are explained, providing a comprehensive understanding of how to access partitions and drives in Linux.', "The basic file permissions in Linux include read, write, and execute, and these permissions can be changed using the chmod command. The chapter explains the three levels of file permissions and the command 'chmod' for changing permissions in Linux, including the symbolic and absolute modes.", "The 'chmod' command can change permissions using symbolic mode (e.g., RWX) or absolute mode (e.g., 755 or 644), and ownerships can be changed using the commands 'chown' and 'chgrp'. The distinction between symbolic and absolute modes for changing permissions, along with the commands for changing ownerships, is highlighted, providing a comprehensive understanding of permission management in Linux."]}, {'end': 39259.754, 'start': 38785.128, 'title': 'Symbolic links and virtual desktops', 'summary': 'Discusses symbolic links in linux, describing their purpose, benefits, and differences from hard links, along with the maximum file name length and path in linux file systems. it also explains the concept of hidden files and directories in linux, and defines virtual desktops, along with the benefits of desktop virtualization.', 'duration': 474.626, 'highlights': ['The chapter discusses symbolic links in Linux, describing their purpose, benefits, and differences from hard links. Symbolic links in Linux allow for instant access to files and directories, providing easy interaction with the operating system. They do not contain the data but offer a shortcut for easy access. Soft links can be created for both files and directories and can cross file systems.', 'The maximum file name length in Linux is 255 characters, and the maximum path length is 4096 characters for most file systems like ext3 and ext4. Linux file systems like ext3 and ext4 support a maximum file name length of 255 characters and a maximum path length of 4096 characters.', 'Hidden files and directories in Linux are prefixed with a dot and are often used for configuration files and important data storage. In Linux, objects prefixed with a dot are considered hidden files and directories. They are used for storing important configuration data and are not normally displayed in directory listings.', "Virtual desktops store a user's desktop environment in a remote server, providing benefits such as cost savings, efficient resource use, improved data integrity, and centralized administration. Virtual desktops store a user's desktop environment in a remote server, separating the physical machine from the software and providing isolated operating systems for users. This approach offers benefits like cost savings, efficient resource use, improved data integrity, and centralized administration."]}], 'duration': 1084.402, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo38175352.jpg', 'highlights': ['The root user, also known as the super user, has all the rights or permissions to all the files and programs in all modes in Unix-like systems.', 'The free command is the most simple and easy to use command to check memory usage on Linux operating system.', 'The preferred size for swap partition is twice the amount of physical memory available on the system.', 'The naming conventions for accessing partitions and drives in Linux differ based on the type of drive, such as SCSI drives being represented as sda and sdb.', 'The basic file permissions in Linux include read, write, and execute, and these permissions can be changed using the chmod command.', 'The chapter discusses symbolic links in Linux, describing their purpose, benefits, and differences from hard links.', 'The maximum file name length in Linux is 255 characters, and the maximum path length is 4096 characters for most file systems like ext3 and ext4.', 'Hidden files and directories in Linux are prefixed with a dot and are often used for configuration files and important data storage.', "Virtual desktops store a user's desktop environment in a remote server, providing benefits such as cost savings, efficient resource use, improved data integrity, and centralized administration."]}, {'end': 40697.639, 'segs': [{'end': 39729.071, 'src': 'embed', 'start': 39701.626, 'weight': 0, 'content': [{'end': 39706.328, 'text': 'The command is grep the word you want to search for from the file called testing.', 'start': 39701.626, 'duration': 4.702}, {'end': 39713.75, 'text': 'See grep the string or the word you want to search for from the file called testing here.', 'start': 39706.808, 'duration': 6.942}, {'end': 39721.089, 'text': 'okay?. If we want to see with the line numbers, you can pass an argument called hyphen N at line number 17..', 'start': 39713.75, 'duration': 7.339}, {'end': 39722.53, 'text': 'I have the word called SD.', 'start': 39721.089, 'duration': 1.441}, {'end': 39729.071, 'text': 'If we want to see the count of the word, you can use an argument called hyphen C.', 'start': 39722.95, 'duration': 6.121}], 'summary': "Using grep to search for 'sd' in file 'testing', with line numbers and count available.", 'duration': 27.445, 'max_score': 39701.626, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo39701626.jpg'}, {'end': 39879.817, 'src': 'embed', 'start': 39848.411, 'weight': 7, 'content': [{'end': 39851.971, 'text': 'so this is called command chaining, one after the other.', 'start': 39848.411, 'duration': 3.56}, {'end': 39855.012, 'text': 'the commands would be executed.', 'start': 39851.971, 'duration': 3.041}, {'end': 39860.334, 'text': 'the first command is to create a directory and the second command to execute a directory.', 'start': 39855.012, 'duration': 5.322}, {'end': 39865.415, 'text': 'under this directory I am creating all these files with the names called jk and l.', 'start': 39860.334, 'duration': 5.081}, {'end': 39870.683, 'text': 'okay, this is exactly called the series of commands in a single entry.', 'start': 39865.936, 'duration': 4.747}, {'end': 39874.729, 'text': 'you go to this directory, see the files has been created here.', 'start': 39870.683, 'duration': 4.046}, {'end': 39879.817, 'text': 'okay, write a command that will display all the txt files along with its permissions.', 'start': 39874.729, 'duration': 5.088}], 'summary': 'Demonstrating command chaining to create files and display permissions.', 'duration': 31.406, 'max_score': 39848.411, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo39848411.jpg'}, {'end': 39979.626, 'src': 'embed', 'start': 39953.099, 'weight': 6, 'content': [{'end': 39961.827, 'text': 'first it would find all the files which has the extension txt and then, using the advanced command called x arguments,', 'start': 39953.099, 'duration': 8.728}, {'end': 39964.79, 'text': 'i am running a command called grep hyphen.', 'start': 39961.827, 'duration': 2.963}, {'end': 39969.234, 'text': 'i am searching for the word pattern called edureka.', 'start': 39964.79, 'duration': 4.444}, {'end': 39977.143, 'text': 'okay, Find will list all the files with extension txt and grep is used to search for the string edureka.', 'start': 39969.234, 'duration': 7.909}, {'end': 39978.685, 'text': 'This is how you can do it.', 'start': 39977.704, 'duration': 0.981}, {'end': 39979.626, 'text': 'Same thing.', 'start': 39979.245, 'duration': 0.381}], 'summary': "Using find to locate txt files and grep to search for 'edureka'.", 'duration': 26.527, 'max_score': 39953.099, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo39953099.jpg'}, {'end': 40073.24, 'src': 'embed', 'start': 40038.989, 'weight': 2, 'content': [{'end': 40041.23, 'text': 'meaning here you have the greater than symbol.', 'start': 40038.989, 'duration': 2.241}, {'end': 40044.536, 'text': 'you have n, you have L there.', 'start': 40042.253, 'duration': 2.283}, {'end': 40049.544, 'text': 'a greater than symbol is nothing, but the process which is of high priority, you see here.', 'start': 40044.536, 'duration': 5.008}, {'end': 40054.393, 'text': 'okay, interruptible sleep state, which is of high priority.', 'start': 40050.231, 'duration': 4.162}, {'end': 40057.354, 'text': 'if it is n here somewhere, you see n here.', 'start': 40054.393, 'duration': 2.961}, {'end': 40059.715, 'text': 'n is nothing but the low priority.', 'start': 40057.354, 'duration': 2.361}, {'end': 40065.017, 'text': 'if it is l means the process where the pages has been logged into memory.', 'start': 40059.715, 'duration': 5.302}, {'end': 40073.24, 'text': 'okay, like this, you can find out the process states by using the command ps, hyphen, aux, the status of a process.', 'start': 40065.017, 'duration': 8.223}], 'summary': "Processes can be identified using 'ps -aux', where '>' signifies high priority, 'n' signifies low priority, and 'l' implies pages are logged into memory.", 'duration': 34.251, 'max_score': 40038.989, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo40038989.jpg'}, {'end': 40195.464, 'src': 'embed', 'start': 40166.854, 'weight': 4, 'content': [{'end': 40172.258, 'text': 'with the user edureka, i gained access to the operating system as root user.', 'start': 40166.854, 'duration': 5.404}, {'end': 40176.242, 'text': 'okay, like this you can do the command su.', 'start': 40172.978, 'duration': 3.264}, {'end': 40182.73, 'text': 'and the next question is how can you run a linux program in the background simultaneously when you start your linux server?', 'start': 40176.242, 'duration': 6.488}, {'end': 40188.858, 'text': 'this is a very, very important question and this is frequently asked in interviews, and the command would be no hub.', 'start': 40182.73, 'duration': 6.128}, {'end': 40191.401, 'text': 'okay, the command is no hub.', 'start': 40189.739, 'duration': 1.662}, {'end': 40195.464, 'text': 'by using the no hub command, the process will run in the background.', 'start': 40191.401, 'duration': 4.063}], 'summary': "Learned to run a linux program in the background using 'nohup' command.", 'duration': 28.61, 'max_score': 40166.854, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo40166854.jpg'}, {'end': 40292.103, 'src': 'embed', 'start': 40264.577, 'weight': 1, 'content': [{'end': 40270.638, 'text': 'okay. so in Linux we have many such backup programs like tar, CPIO, dump, restore.', 'start': 40264.577, 'duration': 6.061}, {'end': 40278.6, 'text': 'okay, using this you can take a backup, either complete file system backup or the selected files and folders based on the requirement.', 'start': 40270.638, 'duration': 7.962}, {'end': 40282.161, 'text': 'and next question would be inode, very, very important one.', 'start': 40278.6, 'duration': 3.561}, {'end': 40292.103, 'text': 'inode is nothing, but the contents of any file will be stored in data blocks, whereas information about that file will be stored in inode.', 'start': 40282.161, 'duration': 9.942}], 'summary': 'Linux has various backup programs like tar, cpio, dump, restore for file system or selected files backup. inode stores file info and data blocks.', 'duration': 27.526, 'max_score': 40264.577, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo40264577.jpg'}, {'end': 40578.901, 'src': 'embed', 'start': 40552.071, 'weight': 3, 'content': [{'end': 40556.335, 'text': 'okay, the passwords in the original file will then be replaced with X.', 'start': 40552.071, 'duration': 4.264}, {'end': 40561.459, 'text': 'in multi-user environments it is very important to use a shadow passwords.', 'start': 40556.335, 'duration': 5.124}, {'end': 40567.423, 'text': 'okay, if I give one small example, like in Linux, we have two such database files here.', 'start': 40561.459, 'duration': 5.964}, {'end': 40577.18, 'text': 'one database file will have information about users and other database file will have information about users, passwords, slash, etc.', 'start': 40567.423, 'duration': 9.757}, {'end': 40578.901, 'text': 'slash, shadow.', 'start': 40577.18, 'duration': 1.721}], 'summary': 'In multi-user environments, use shadow passwords to replace original passwords with x. for example, in linux, there are two database files containing user and password information.', 'duration': 26.83, 'max_score': 40552.071, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo40552071.jpg'}], 'start': 39259.754, 'title': 'Essential linux concepts', 'summary': 'Covers linux command basics, system administration basics, process status and commands, and linux interview insights. it includes creating directories and files, using system administration commands, finding process status, and essential linux concepts for system security and resource optimization.', 'chapters': [{'end': 39558.58, 'start': 39259.754, 'title': 'Linux command basics', 'summary': 'Covers the basics of creating directories and files, viewing file contents, understanding environment variables, utilizing the tab key for command completion, and the concept of redirection in linux.', 'duration': 298.826, 'highlights': ['The path where various softwares are installed will be stored as environment variables, which are used to pass information into processes spawned from the shell.', 'In Linux, redirection is used to pass the output of one operation as input to another operation in the same command.', 'The functionality of the tab key in CLI includes command completion for file and directory names, demonstrated by using few letters and then the tab key to automatically complete the name.', "To create a directory in Linux, the command 'mkdir' is used, and to create files, various programs such as vi, cat, gedit, nedit, and pico nano can be utilized.", 'Viewing the contents of a file in Linux can be achieved through various inbuilt programs like CAT, VI, VIM, GEdit, Pico, and Nano.']}, {'end': 39979.626, 'start': 39558.58, 'title': 'Linux system administration basics', 'summary': 'Covers essential linux system administration concepts including using the w command to view system information, understanding redirection, utilizing grep for pattern-based searching, terminating processes using kill command, inserting comments, chaining commands, and using commands to search for specific file types and strings.', 'duration': 421.046, 'highlights': ['Using the W command to view system information, including PC uptime, connected users, and load average. The W command provides information such as PC uptime, connected users, and load average.', 'Understanding redirection, including redirecting the output of one operation to serve as input for another operation. Redirection allows the output of one operation to be the input for another operation.', 'Utilizing grep for pattern-based searching and demonstrating options like -N for line numbers and -C for word count. Grep is used for pattern-based searching and supports options like -N for line numbers and -C for word count.', 'Terminating processes using the kill command, identifying processes by PID (process ID), and the caution against using kill zero. Processes can be terminated using the kill command, either by process name or PID, and a warning is given against using kill zero.', 'Inserting comments using the hash symbol and chaining commands using semicolon to execute multiple commands in a single entry. Comments can be inserted using the hash symbol, and command chaining allows the execution of multiple commands in a single entry.', "Using commands to search for specific file types and strings, such as displaying all txt files with permissions and searching for files with txt extension containing the string 'edureka'. Commands can be used to display specific file types and search for strings within files, like displaying txt files with permissions and searching for files with txt extension containing the string 'edureka'."]}, {'end': 40215.205, 'start': 39980.086, 'title': 'Linux process status and commands', 'summary': "Covers how to find the status of a process using 'ps-aux' command, explaining the various process states and their meanings, and also discusses commands to calculate folder size, check memory status, log in as root, and run a linux program in the background using 'nohup' command.", 'duration': 235.119, 'highlights': ["The 'ps-aux' command can be used to find the status of a process in Linux, where various process states are explained including S for interruptible sleep state, D for uninterruptible sleep state, R for running state, Z for a defunct process, and T for a stopped state. The 'ps-aux' command provides information about the status of a process in Linux, with S representing interruptible sleep state, D representing uninterruptible sleep state, R representing running state, Z representing a defunct process, and T representing a stopped state.", "The 'du' command with arguments '-sh' can be used to calculate the size of a folder, with an example showing the directory 'boot' occupying 135 MB. The 'du' command with arguments '-sh' can be used to calculate the size of a folder, as demonstrated by finding the size of the 'boot' directory, which is 135 MB.", "The command 'free -m' or 'free -g' can be used to check the memory status of the system. The 'free -m' or 'free -g' command is used to check the memory status of the system.", "To log in as root in Linux from the terminal, the command 'sudo su' or 'su' can be used, where 'su' stands for substitute user, and the prompt changes to the hash prompt for the root user. The commands 'sudo su' or 'su' can be used to log in as root in Linux from the terminal, with 'su' standing for substitute user and resulting in a change of prompt to the hash prompt for the root user.", "The 'nohup' command can be used to run a Linux program in the background, ensuring that the process continues to run even after logging out, making it a frequently asked question in interviews. The 'nohup' command allows running a Linux program in the background, ensuring that the process continues to run even after logging out, making it a frequently asked question in interviews."]}, {'end': 40697.639, 'start': 40215.866, 'title': 'Linux interview insights', 'summary': 'Covers essential linux concepts including syslogd, partial backup, inode, process priority management, and shadow passwords, emphasizing the importance of each and their practical applications in maintaining system security and resource optimization.', 'duration': 481.773, 'highlights': ['The chapter covers essential Linux concepts including syslogd, partial backup, inode, process priority management, and shadow passwords, emphasizing the importance of each and their practical applications. The transcript provides an overview of crucial Linux concepts such as syslogd, partial backup, inode, process priority management, and shadow passwords, underlining their significance in system administration.', 'Syslogd and rsyslog are the daemons used to track events on a Linux system. The primary daemons for tracking events on a Linux system are syslogd and rsyslog, essential for system monitoring and troubleshooting.', 'Partial backup selectively backs up certain files and folders rather than the complete operating system, using tools like tar, CPIO, dump, and restore for customization. Partial backup involves selectively backing up specific files and folders, offering flexibility and customization, and can be achieved through tools such as tar, CPIO, dump, and restore.', 'Inodes store file metadata and content details, including size, permissions, ownership, access and modification timestamps, and are crucial for file system management. Inodes store essential metadata and content details of files, encompassing size, permissions, ownership, access and modification timestamps, playing a vital role in file system management.', "The 'nice' and 'renice' commands are used to manage process priority, with priority values ranging from -20 to 19, impacting CPU time allocation. The 'nice' and 'renice' commands are employed to control process priority, with values ranging from -20 to 19, directly influencing the allocation of CPU time for system optimization.", 'Shadow passwords enhance system security by storing encrypted user passwords in a separate file, improving access control and mitigating security vulnerabilities. Shadow passwords bolster system security by storing encrypted user passwords in a distinct file, enhancing access control and addressing security concerns associated with traditional password storage mechanisms.']}], 'duration': 1437.885, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/bz0ZCUv5rYo/pics/bz0ZCUv5rYo39259754.jpg', 'highlights': ["The 'nohup' command allows running a Linux program in the background, ensuring that the process continues to run even after logging out, making it a frequently asked question in interviews.", "The 'nice' and 'renice' commands are used to manage process priority, with priority values ranging from -20 to 19, impacting CPU time allocation.", "The 'ps-aux' command provides information about the status of a process in Linux, with S representing interruptible sleep state, D representing uninterruptible sleep state, R representing running state, Z representing a defunct process, and T representing a stopped state.", 'Using the W command to view system information, including PC uptime, connected users, and load average.', 'The path where various softwares are installed will be stored as environment variables, which are used to pass information into processes spawned from the shell.', 'Syslogd and rsyslog are the daemons used to track events on a Linux system.', "The 'du' command with arguments '-sh' can be used to calculate the size of a folder, as demonstrated by finding the size of the 'boot' directory, which is 135 MB.", 'The chapter covers essential Linux concepts including syslogd, partial backup, inode, process priority management, and shadow passwords, emphasizing the importance of each and their practical applications.']}], 'highlights': ['Linux offers 100% antivirus-free capability, ensuring better protection against malware compared to Windows, reducing the vulnerability to hacking and security threats.', 'The enduring dominance of Linux in the operating system space, its evolution into a globally relied upon system, and its crucial role for developers are emphasized, setting the stage for a comprehensive course overview.', 'The detailed agenda of the Linux full course video is outlined, encompassing fundamental concepts, shells in Linux, Linux installation, commands, package management, administration, DNS server configuration, shell scripting, and comparisons with Windows and Unix, offering a thorough insight into the course content and its relevance to industry jobs.', 'Red Hat Enterprise Linux is the most stable and popular distribution, preferred for servers and workstations, with CentOS being its free version.', 'The cat command is used to display the content of text files and concatenate several files into one, allowing the display of multiple file contents in the terminal.', 'The CP and MV commands provide options for copying and moving files using regular expressions, facilitating the transfer of files of specific formats, such as .txt files, between directories.', 'The process of compressing a 4096 MB folder into a 100 or 200 MB tar file is illustrated, emphasizing the benefits of using tar files for compressing and transferring large packages.', "Creation of users using 'useradd' command, requiring sudo access, demonstrated by adding a user 'Vargan' with user ID 502.", 'The VI editor is the most popular and classic text editor in the Linux family, allowing users to write and save content in files using commands like sudo vi and to save content, users can press escape colon W for write and Q to quit.', "The sort command organizes files numerically with the '-n' flag, allowing the sorting of numbers in ascending order, providing a practical example of sorting files numerically using the 'sort -n' command.", 'The DNS translates internet domain and host names to IP addresses and vice versa, making it easier for computers to remember and access websites, thus playing a crucial role in the functioning of the internet.', 'The chapter covers essential Linux commands like CD, PWD, LS, copy, move, remove, echo, cat, less, grep, mkdir, touch, change mode, man, with practical demonstrations and explanations.', 'The root user, also known as the super user, has all the rights or permissions to all the files and programs in all modes in Unix-like systems.', "The 'nohup' command allows running a Linux program in the background, ensuring that the process continues to run even after logging out, making it a frequently asked question in interviews.", "The 'nice' and 'renice' commands are used to manage process priority, with priority values ranging from -20 to 19, impacting CPU time allocation.", "The 'ps-aux' command provides information about the status of a process in Linux, with S representing interruptible sleep state, D representing uninterruptible sleep state, R representing running state, Z representing a defunct process, and T representing a stopped state."]}