Join Scott Simpson for an in-depth discussion in this video Challenge: Extract information from a text file, part of Learn the Linux Command Line: The Basics.
- [Voiceover] Here's a challenge to help you practice…everything I've shown you in this chapter.…One of the common ways malicious hackers try to break…into computers is by attempting to login remotely…with randomly generated user names,…or the names commonly used by popular services.…Let's say a senior system administrator sent you…a file to explore.…This file isn't archived, and inside it is a log containing…some break-in attempts on a server.…Your task is to extract the file so you can…work with it as text.…And look for lines containing invalid…user authorization requests.…
Then, use what you've learned to create a file…containing the user names our would-be hacker…tried to use to log in.…Remember to make use of piping and output redirection.…Try to organize the output as much as possible.…This should take you about ten minutes.…
This course will establish the foundation for more advanced Linux topics. Find other Linux training courses here.
- What is the Linux command line?
- Writing Linux commands at the prompt
- Finding help for Linux commands
- Editing files and folders
- Configuring user roles and file permissions
- Using pipes to connect commands
- Peeking at files
- Searching and editing text
- Finding disk and system information
- Installing and updating software
Skill Level Beginner
Up and Running with CentOS Linuxwith Scott Simpson1h 32m Beginner
Up and Running with Bash Scriptingwith Scott Simpson1h 25m Beginner
1. Command-Line Basics
2. Files, Folders, and Permissions
3. Common Command-Line Tasks and Tools
4. A Peek at Some More Advanced Topics
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.