This is the second part of a two-part installment describing the TCP/IP networking stack that allows our computers to talk to each other within our homes and offices, and to other computers and serve…
This is the first part of a two-part installment describing the TCP/IP networking stack that allows our computers to talk to each other within our homes and offices, and to other computers and server…
In this installment we learn how to use the results of a file search as the input to another command. This allows us to do things like set the file permissions on every file that ends in .php.
In this installment we look at how to use terminal commands and regular expressions to filter text, such as the output of terminal commands, and to search for files that contain a particular text pat…
This is the second of a two-part installment where we dive deeper into Regular Expressions. This two-part installment is laying vital foundations for the up-coming installments on searching.
This is the first of a two-part installment where we dive deeper into Regular Expressions. This two-part installment is laying vital foundations for the up-coming installments on searching.
In this installment we introduce the concept of 'regular expressions' - a means of accurately describing arbitrary patterns. Regular expressions allow us to express complex search pattens in a way th…
In this installment we continue our exploration of streams, looking at how we can use files as the source and destination for streams, and how we can combine two streams into one.
In this installment we introduce the concept of data streams, looking at the three system streams STDIN, STDOUT $ STDERR, and then look at how we can use the pipe operator connect the output of one c…
In this installment we wrap up our look at the environment by describing command line aliases, and looking at how we can customize the prompt we see when working at the command line.
Unix, Linux and OS X have a built-in manual describing how the various terminal commands work. In this installment we look at how to access this manual, and explain the special language used within.
In this installment we’ll start by biting the bullet and dive into how to alter standard Unix File permissions. This could well turn out to be the most difficult segment in this entire series, regard…
Thu 15 Oct 2015
Disclaimer: The podcast and artwork embedded on this page are the property of Allison Sheridan. This content is not affiliated with or endorsed by eachpod.com.