Join Scott Simpson for an in-depth discussion in this video Challenge: Extract information from a text file, part of Learning Linux Command Line.
- [Voiceover] Here's a challenge to help you practice…everything I've shown you in this chapter.…One of the common ways malicious hackers try to break…into computers is by attempting to login remotely…with randomly generated user names,…or the names commonly used by popular services.…Let's say a senior system administrator sent you…a file to explore.…This file isn't archived, and inside it is a log containing…some break-in attempts on a server.…Your task is to extract the file so you can…work with it as text.…And look for lines containing invalid…user authorization requests.…
Then, use what you've learned to create a file…containing the user names our would-be hacker…tried to use to log in.…Remember to make use of piping and output redirection.…Try to organize the output as much as possible.…This should take you about ten minutes.…
This course will establish the foundation for more advanced Linux topics. Find other Linux training courses here.
- What is the Linux command line?
- Writing Linux commands at the prompt
- Finding help for Linux commands
- Editing files and folders
- Configuring user roles and file permissions
- Using pipes to connect commands
- Peeking at files
- Searching and editing text
- Finding disk and system information
- Installing and updating software