Wildcards Practice and Soft & Hard Links

What is cybersecurity

AirDroid app se girlfriend ka mobile control Kaise Kare (Hindi 2026) ๐Ÿ“ฑ๐Ÿ’ป

Where is Linux Used?, Flavors of Linux, Running Your First Few Commands

Using Grep,An Introduction to Shell Operators

Wildcards Practice and Soft & Hard Links

What is cybersecurity

Wildcards Practice and Soft & Hard Links

Wildcards Practice and Soft & Hard Links

Wildcards PracticeCreate test files with different extensions:

touch file1.txt file2.txt file3.log file4.log test1.txt test2.log

Use wildcard * to filter files:

ls *.txt

ls *.log

Use wildcard ? to match a single character:

ls file?.txt

Use character range [1-2]:

ls file[1-2].txt

Delete files using wildcard:

rm *.log

Take screenshots before and after deletion.


Soft & Hard Links

Create original file and check inode:

echo “Linux Practice” > original.txt

ls -li original.txt

Create hard link:

ln original.txt hardlink.txt

ls -li original.txt hardlink.txt

Create soft link:

ln -s original.txt softlink.txt

ls -li original.txt hardlink.txt softlink.txt

Delete original file and observe behavior:

rm original.txt

ls -li

Verify using cat command:

cat hardlink.txt

cat softlink.txt

Take screenshots showing inode comparison and link behavior.


Leave a Reply

Your email address will not be published. Required fields are marked *

What is cybersecurity

What is cybersecurity

What is cybersecurity all about?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting normal business processes.

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

A successful cybersecurity posture has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, a unified threat management gateway system can automate integrations across products and accelerate key security operations functions: detection, investigation, and remediation. People, processes, and technology must all complement one another to create an effective defense from cyberattacks.

People

Users must understand and comply with basic data protection and privacy security principles like choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about basic cybersecurity principles from these Top 10 Cyber Tips (PDF).

Processes

Organizations must have a framework for how they deal with both attempted and successful cyberattacks. One well-respected model, the NIST cybersecurity framework, can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.

Technology

Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyberattacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewallsDomain Name System (DNS) filteringmalware protection, antivirus software, and email security solutions.

Why is cybersecurity important?

In today’s connected world, everyone benefits from advanced  At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyberattack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools. Their work makes the internet safer for everyone.

01:24

Cisco Security: A better way of doing security

)

Types of cybersecurity threats

Cloud security

Cloud security provides rapid threat detection and remediation, enhancing visibility and intelligence to prevent malware impacts. It delivers robust protection in multicloud environments, streamlining security without affecting user productivity, and is essential for the safety of applications, data, and users in both hybrid and remote work settings. The scalable nature of cloud security allows for the defense of an expanding array of users, devices, and cloud applications, ensuring comprehensive coverage across all points of potential attack.

Cisco Cloud Protection Suite | Cisco Multicloud Defense | Cisco Cloud Application Security

Identity

Identity security and access management involve safeguarding the digital identities of individuals, devices, and organizations. This involves implementing security processes, tools, and policies that control user access to accounts and enable productivity with frictionless access to important information without risk.

The three main goals of identity security are to:

  1. Authenticate a user’s identity
  2. Authorize access to appropriate resources
  3. Monitor access activity for weak posture and suspicious activity

Discover more about Cisco Identity Intelligence | Discover more about Continuous Identity Security

Malware

Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.

Discover more about malware protection | Secure Endpoint | Secure Endpoint free trial

Phishing

Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data, such as credit card numbers and login information, and is the most common type of cyberattack. You can help protect yourself through education or a technology solution that filters malicious emails.

Secure Email solution | Secure Email free trial

Ransomware

Ransomware is a type of malicious software that is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.

Stop ransomware in its tracks

Social engineering

Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. Attackers can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats mentioned above to make you more likely to click on links, download malware, or trust a malicious source.

Read more about social engineering tactics

Threat detection

Leave a Reply

Your email address will not be published. Required fields are marked *

AirDroid app se girlfriend ka mobile control Kaise Kare (Hindi 2026) ๐Ÿ“ฑ๐Ÿ’ป

AirDroid app se girlfriend ka mobile control  Kaise Kare (Hindi 2026) ๐Ÿ“ฑ๐Ÿ’ป

 

AirDroid Parental Control

YouTube: https://youtube.com/@cyber-teck

Leave a Reply

Your email address will not be published. Required fields are marked *

Where is Linux Used?, Flavors of Linux, Running Your First Few Commands

Where is Linux Used?, Flavors of Linux, Running Your First Few Commands


Where is Linux Used?

It’s fair to say that Linux is a lot more intimidating to approach than Operating System’s (OSs) such as Windows. Both variants have their own advantages and disadvantages. For example, Linux is considerably much more lightweight and you’d be surprised to know that there’s a good chance you’ve used Linux in some form or another every day! Linux powers things such as:

Websites that you visit

Car entertainment/control panels

Point of Sale (PoS) systems such as checkout tills and registers in shops

Critical infrastructures such as traffic light controllers or industrial sensors

Flavors of Linux

The name “Linux” is actually an umbrella term for multiple OS’s that are based on UNIX (another operating system). Thanks to Linux being open-source, variants of Linux come in all shapes and sizes – suited best for what the system is being used for.

Running Your First Few Commands

For example, Ubuntu & Debian are some of the more commonplace distributions of Linux because it is so extensible. I.e. you can run Ubuntu as a server (such as websites & web applications) or as a fully-fledged desktop. For this series, we’re going to be using Ubuntu.

Running Your First Few Commands

tryhackme@linux1:~$ echo Hello

Hello

tryhackme@linux1:~$ echo “Hello Friend!”

Hello Friend!

As shown in the terminal above, if we want to “echo” a single word, we don’t need to use double quotes, for example, echo Hello. However, the string should be enclosed within double quotes if one or more spaces are present, for example, echo “Hello Friend!”.

whoami can be used to find the username we are logged in as.

Using whoami to find out the username of who we’re logged in as

tryhackme@linux1:~$ whom

So far we’ve only covered the “echo” and “whoami” commands. Not all that useful when you consider things that we need to do – including navigating the filesystem, read and write to it as well.

In this task, we’re going to be learning the commands so that we can do just that. Just like the previous task, I’ll display the commands in the table in the next heading & show examples of these commands being used.

Listing Files in Our Current Directory (ls)


Before we can do anything such as finding out the contents of any files or folders, we need to know what exists in the first place. This can be done using the “ls” command (short for listing)

Using “ls” to list the contents of the current directory

tryhackme@linux1:~$ ls

‘Important Files’ ‘My Documents’ Notes Pictures

In the screenshot above, we can see there are the following directories/folders:

Important Files

My Documents

Notes

Pictures

Great! You can probably take a guess as to what to expect a folder to contain given by its name.

Pro tip: You can list the contents of a directory without having to navigate to it by using ls and the name of the directory. I.e. ls pictures

Changing Our Current Directory (cd)

Now that we know what folders exist, we need to use the “cd” command (short for change directory) to change to that directory. Say if I wanted to open the “Pictures” directory – I’d do “cd Pictures”. Where again, we want to find out the contents of this “Pictures” directory and to do so, we’d use “ls” again:

Listing our new directory after we have used “cd”

tryhackme@linux1:~/Pictures$ ls

dog_picture1.jpg dog_picture2.jpg dog_picture3.jpg dog_picture4.jpg

In this case, it looks like there are 4 pictures of dogs!

Outputting the Contents of a File (cat)

Whilst knowing about the existence of files is great โ€” it’s not all that useful unless we’re able to view the contents of them.

We will come on to discuss some of the tools available to us that allows us to transfer files from one machine to another in a later room. But for now, we’re going to talk about simply seeing the contents of text files using a command called “cat”.

“Cat” is short for concatenating & is a fantastic way for us to output the contents of files (not just text files!).

In the screenshot below, you can see how I have combined the use of “ls” to list the files within a directory called “Documents”:

Using “ls” to list the contents of the current directory

tryhackme@linux1:~/Documents$ ls

todo.txt

tryhackme@linux1:~/Documents$ cat todo.txt

Here’s something important for me to do later!

We’ve applied some knowledge from earlier in this task to do the following:

Used “ls” to let us know what files are available in the “Documents” folder of this machine. In this case, it is called “todo.txt”.

We have then used cat todo.txt to concatenate/output the contents of this “todo.txt” file, where the contents are “Here’s something important for me to do later!”

Pro tip: You can use cat to output the contents of a file within directories without having to navigate to it by using cat and the name of the directory. I.e. cat /home/ubuntu/Documents/todo.txt

Sometimes things like usernames, passwords (yes – really…), flags or configuration settings are stored within files where “cat” can be used to retrieve these.

Finding out the full Path to our Current Working Directory (pwd)

You’ll notice as you progress through navigating your Linux machine, the name of the directory that you are currently working in will be listed in your terminal.

It’s easy to lose track of where we are on the filesystem exactly, which is why I want to introduce “pwd”. This stands for print working directory.

Using the example machine from before, we are currently in the “Documents” folder โ€” but where is this exactly on the Linux machine’s filesystem? We can find this out using this “pwd” command like within the screenshot below:

Using “pwd” to list the full path of the current directory

tryhackme@linux1:~/Documents$ pwd

/home/ubuntu/Documents

tryhackme@linux1:~/Documents$

Let’s break this down:

We already know we’re in “Documents” thanks to our terminal, but at this point in time, we have no idea where “Documents” is stored so that we can get back to it easily in the future.

I have used the “pwd” (print working directory) command to find the full file path of this “Documents” folder.

We’re helpfully told by Linux that this “Documents” directory is stored at “/home/ubuntu/Documents” on the machine โ€” great to know!

Now in the future, if we find ourselves in a different location, we can just use cd /home/ubuntu/Documents to change our working directory to this “Documents” directory.

Leave a Reply

Your email address will not be published. Required fields are marked *

Using Grep,An Introduction to Shell Operators

Using Grep,An Introduction to Shell Operators

 

Using Grep


Another great utility that is a great one to learn about is the use of grep. The grep command allows us to search the contents of files for specific values โ€‹โ€‹that we are looking for.

Take for example, the access log of a web server. In this case, the access.log of a web server has 244 entries.

Using “wc” to count the number of entries in “access.log”

tryhackme@linux1:~$ wc -l access.log

244 access.log

tryhackme@linux1:~$

Using a command like cat isn’t going to cut it too well here. Let’s say for example if we wanted to search this log file to see the things that a certain user/IP address visited? Looking through 244 entries isn’t all that efficient considering we want to find a specific value.

We can use grep to search the entire contents of this file for any entries of the value that we are searching for. Going with the example of a web server’s access log, we want to see everything that the IP address “81.143.211.90” has visited (note that this is fictional)

Using “grep” to find any entries with the IP address of “81.143.211.90” in “access.log”

tryhackme@linux1:~$ grep “81.143.211.90” access.log

81.143.211.90 – – [25/Mar/2021:11:17 + 0000] “GET / HTTP/1.1” 200 417 “-” “Mozilla/5.0 (Linux; Android 7.0; Moto G(4))”

tryhackme@linux1:~$

“Grep” has searched through this file and has shown us any entries of what we’ve provided and that is contained within this log file for the ip.

Searching Recursively with grep

Sometimes, the information we are looking for is spread across multiple files inside a directory. Instead of checking each file individually, we can tell grep to search recursively through all files and subdirectories.

To do this, we use the -R (recursive) option.

For example, to search for a variable across all files in the current directory and its subfolders, we can run:

grep -R “PRETTY_NAME” /etc/

This will:

Search every file in the current directory

Search all subdirectories

Show where the PRETTY_NAME appears

Example output:

grep -R “PRETTY_NAME” /etc/

grep: /etc/sudoers: Permission denied

/etc/os-release:PRETTY_NAME=”Ubuntu”

An Introduction to Shell Operators

Linux operators are a fantastic way to power up your knowledge of working with Linux. There are a few important operators that are worth noting. We’ll cover the basics and break them down accordingly to bite-sized chunks.

At an overview, I’m going to be showcasing the following operators:

Symbol / Operator Description

& This operator allows you to run commands in the background of your terminal.

&& This operator allows you to combine multiple commands together in one line of your terminal.

> This operator is a redirector – meaning that we can take the output from a command (such as using cat to output a file) and direct it elsewhere.

>>

This operator does the same function of the > operator but appends the output rather than replacing (meaning nothing is overwritten).

Let’s cover these in a bit more detail.

Operator “&”

This operator allows us to execute commands in the background. For example, let’s say we want to copy a large file. This will obviously take quite a long time and will leave us unable to do anything else until the file successfully copies.

The “&” shell operator allows us to execute a command and have it run in the background (such as this file copy) allowing us to do other things!

Operator “&&”

This shell operator is a bit misleading in the sense of how familiar is to its partner “&”. Unlike the “&” operator, we can use “&&” to make a list of commands to run for example command1 && command2. However, it’s worth noting that command2 will only run if command1 was successful.

Operator “>”

This operator is what’s known as an output redirector. What this essentially means is that we take the output from a command we run and send that output to somewhere else.

A great example of this is redirecting the output of the echo command that we learned in Task 4. Of course, running something such as echo howdy will return “howdy” back to our terminal โ€” that isn’t super useful. What we can do instead, is redirect “howdy” to something such as a new file!

Let’s say we wanted to create a file named “welcome” with the message “hey”. We can run echo hey > welcome where we want the file created with the contents “hey” like so:

Using the > operator

tryhackme@linux1:~$ echo hey > welcome

Using cat to output the “welcome” file

tryhackme@linux1:~$ cat welcome

hey

Note: If the file i.e. “welcome” already exists, the contents will be overwritten!

Operator “>>”

This operator is also an output redirector like in the previous operator (>) we discussed. However, what makes this operator different is that rather than overwriting any contents within a file, for example, it instead just puts the output at the end.

Following on with our previous example where we have the file “welcome” that has the contents of “hey”. If were to use echo to add “hello” to the file using the > operator, the file will now only have “hello” and not “hey”.

The >> operator allows to append the output to the bottom of the file โ€” rather than replacing the contents like so:

Using the >> operator

tryhackme@linux1:~$ echo hello >> welcome

Using cat to output the “welcome” file

tryhackme@linux1:~$ cat welcome

Leave a Reply

Your email address will not be published. Required fields are marked *

python new course, ” introduction of list-3 “, Python Basic Notes (Beginner), hindi

python new course, ” introduction of list-3 “, Python Basic Notes (Beginner), hindi

 Introducing Lists in Python | Python Tutorial for Beginners

In this lesson, we learn about Lists in Python.
list is used to store multiple values in single variable.


cars=[โ€œmarutiโ€,โ€bmwโ€,โ€nissanโ€โ€toyataโ€]

              0               1             2             3

              -4              -3            -2           -1


Example of List:

cars = ["maruti", "bmw", "nissan", "toyota"]

Index Position:

  • maruti โ†’ 0

  • bmw โ†’ 1

  • nissan โ†’ 2

  • toyota โ†’ 3

Negative Index:

  • maruti โ†’ –4

  • bmw โ†’ –3

  • nissan โ†’ –2

  • toyota โ†’ –1

Printing List:

print(cars)

Accessing List Elements:

print(cars[0])
print(cars[-1])

Using .title() Method:

print(cars[0].title())

Example Sentence with List:

print("My first car was:", cars[0].title())

Updating List Item

Agar kisi purane item ko hata kar naya item add karna ho:

cars[2] = "safari"
print(cars)

Using append()

append() method list ke end me naya item add karta hai:

cars.append("wagonr")
print(cars)

Adding Items to an Empty List

friend = []

friend.append("sajid")
friend.append("intsar")
friend.append("deepak")
friend.append("murad")

print(friend)

Using insert()

insert() se kisi bhi specific position par item add kar sakte hain:

friend = ["sajid", "intsar", "deepak", "murad"]
friend.insert(1, "bajaj")
print(friend)

Using pop()

pop() list se item remove karta hai, aur removed value ko variable me store kiya ja sakta hai.

Last item remove karna:

cars = ["maruti", "bmw", "nissan", "toyota"]
x = cars.pop()
print(x)
print(cars)

Specific index se remove karna:

cars = ["maruti", "bmw", "nissan", "toyota"]
x = cars.pop(1)
print(x)
print(cars)

Using remove()

remove() value ke naam se item ko delete karta hai:

cars = ["maruti", "bmw", "nissan", "toyota"]
x = "nissan"
cars.remove(x)
print(cars)

Using del

del statement bhi list item delete karne ke liye use hota hai:

friend = ["sajid", "intsar", "deepak", "murad"]
del friend[3]
print(friend)

Using sort()

sort() method list ko alphabetical order me arrange karta hai:

friend = ["sajid", "intsar", "deepak", "murad"]
friend.sort()
print(friend)

Using sort(reverse=True)

Reverse alphabetical order ke liye:

friend = ["sajid", "intsar", "deepak", "murad"]
friend.sort(reverse=True)
print(friend)

Using sorted()

sorted() temporary sorting karta hai, original list same rehti hai:

friend = ["sajid", "intsar", "deepak", "murad"]
x = sorted(friend)
print(x)

Topics Covered in This Video:

  • What is List in Python

  • Index and Negative Index

  • Accessing List Elements

  • Updating List Items

  • append() Method

  • insert() Method

  • pop() Method

  • remove() Method

  • del Statement

  • sort() Method

  • sorted() Function


Leave a Reply

Your email address will not be published. Required fields are marked *

python new course, ” variable-2″, Python Basic Notes (Beginner), hindi

python new course, ” variable-2″, Python Basic Notes (Beginner), hindi

 


Python Basic Notes (Beginner)

1. Data Types in Python

Integer

Whole numbers เค•เฅ‹ Integer เค•เคนเคคเฅ‡ เคนเฅˆเค‚เฅค

print(7)

Output

7


Float

Decimal numbers เค•เฅ‹ Float เค•เคนเคคเฅ‡ เคนเฅˆเค‚เฅค

print(7.5)

Output

7.5


String

Text เค•เฅ‹ String เค•เคนเคคเฅ‡ เคนเฅˆเค‚เฅค Python เคฎเฅ‡เค‚ string เค•เฅ‹ ” “ , ‘ ‘ เคฏเคพ ”’ ”’ เคฎเฅ‡เค‚ เคฒเคฟเค–เคพ เคœเคพ เคธเค•เคคเคพ เคนเฅˆเฅค

print(“hello world”)

print(‘hello world’)

print(”’hello world”’)

Output

hello world

hello world

hello world


String with Quotes

print(“‘hello world'”)

Output

‘hello world’

print(‘”hello world”‘)

Output

“hello world”


Boolean

Boolean เคฎเฅ‡เค‚ เค•เฅ‡เคตเคฒ เคฆเฅ‹ values เคนเฅ‹เคคเฅ€ เคนเฅˆเค‚เฅค

True

False


2. Variable in Python

Variable เคเค• container เคนเฅ‹เคคเคพ เคนเฅˆ เคœเคฟเคธเคฎเฅ‡เค‚ data store เค•เคฟเคฏเคพ เคœเคพเคคเคพ เคนเฅˆเฅค

Example

x = “Sajid”

y = 7

z = 7.5

print(x)

print(z)

Output

Sajid

7.5


3. Algorithm

Algorithm เค•เคฟเคธเฅ€ problem เค•เฅ‹ solve เค•เคฐเคจเฅ‡ เค•เฅ‡ เคฒเคฟเค step-by-step instructions เคนเฅ‹เคคเฅ€ เคนเฅˆเค‚เฅค

Example:

  1. Start

  2. Input values

  3. Process the values

  4. Display result

  5. End


4. Flowchart

Flowchart algorithm เค•เฅ‹ diagram เค•เฅ€ form เคฎเฅ‡เค‚ เคฆเคฟเค–เคพเคคเคพ เคนเฅˆเฅค

Example problem: Length เค”เคฐ Breadth เคธเฅ‡ Rectangle เค•เคพ Area เคจเคฟเค•เคพเคฒเคจเคพ

Steps

  1. Start

  2. Input Length

  3. Input Breadth

  4. Area = Length ร— Breadth

  5. Print Area

  6. End


5. Correct Sequence (Computer Start Steps)

เคจเฅ€เคšเฅ‡ เคฆเคฟเค เค—เค steps เค•เฅ‹ เคธเคนเฅ€ เค•เฅเคฐเคฎ เคฎเฅ‡เค‚ arrange เค•เคฐเฅ‡เค‚:

Correct order:

  1. Switch on the main power supply

  2. Press the power button of CPU

  3. Wait for the desktop screen

  4. Enter the password

  5. Open a program


6. Input Function Example

x = input(“Enter your name: “)

print(x, “- Welcome to Python Programming”)

Example Output

Enter your name: Sajid

Sajid – Welcome to Python Programming


7. Country Example

name = input(“Enter your name: “)

country = input(“Enter name of the country: “)

print(“Welcome”, name)

print(“Your country”, country, “is a beautiful country”)


8. Sum of Three Numbers

x = int(input(“Enter the first number: “))

y = int(input(“Enter the second number: “))

z = int(input(“Enter the third number: “))

print(“The sum of three numbers =”, x + y + z)


9. Calculator Program

x = float(input(“Enter the first number: “))

y = float(input(“Enter the second number: “))

print(“Addition:”, x + y)

print(“Subtraction:”, x – y)

print(“Multiplication:”, x * y)

print(“Division:”, x / y)


10. First Name and Last Name Program

first_name = input(“Enter the first name: “)

last_name = input(“Enter the last name: “)

print(“Hello”, first_name, last_name, “welcome to the Python program”)


11. If-Else Example

x = int(input(“Enter the money received: “))

if x >= 100:

   print(“Buy a cake”)

elif x >= 50:

   print(“Buy biscuits”)

elif x >= 40:

   print(“Buy chocolate”)

else:

   print(“Don’t buy anything”)


12. Even or Odd Program

x = int(input(“Enter the value: “))

if x % 2 == 0:

   print(“Even”)

else:

   print(“Odd”)


13. String Concatenation Example

first_name = “Sajid”

last_name = “Sheikh”

full_name = first_name + ” ” + last_name

print(“Hello, ” + full_name.title() + “!”)

Output

Hello, Sajid Sheikh!


14. Using Variable

first_name = “Sajid”

last_name = “Sheikh”

full_name = first_name + ” ” + last_name

message = “Hello, ” + full_name.title() + “!”

print(message)


15. Simple Concatenation

x = “sajid”

y = “sheikh”

z = x + ” ” + y

print(“Hello ” + z.title() + “!”)


16. New Line and Tab Space

Tab Space

print(“\tsajid”)

print(“\t\tsajid”)

Output

   sajid

       sajid


New Line

print(“sajid”)

print(“\nsajid”)

Output

sajid

sajid


Multiple Languages

print(“python\nc\nc++\njava”)

Output

python

c

c++

java


Tab with Languages

print(“Language:\n\tpython\n\tc\n\tc++\n\tjava”)

Output

Language:

   python

   c

   c++

   java


17. rstrip() Function

rstrip() right side เค•เฅ‡ extra spaces เค•เฅ‹ remove เค•เคฐเคคเคพ เคนเฅˆเฅค

first_lan = “python  “

sec_lan = “python”

print(first_lan == sec_lan)

Output

False

Space remove เค•เคฐเคจเฅ‡ เค•เฅ‡ เคฌเคพเคฆ

third_lan = first_lan.rstrip()

print(third_lan == sec_lan)

Output

True


18. Integer to String Conversion

age = 23

message = “Happy ” + str(age) + “rd birthday”

print(message)

Output

Happy 23rd birthday



Leave a Reply

Your email address will not be published. Required fields are marked *

Linux Basic Commands Full Guide (Hindi),chapter-1

Linux Basic Commands Full Guide (Hindi),chapter-1

 https://youtu.be/ILHsvpo1W3I?si=QV9Xqq7sHd1b2XrK

Directory Commands

  • pwd โ†’ Current (present) working directory show karta hai
  • cd โ†’ Directory change karne ke liye
    • cd .. โ†’ Ek step piche
    • cd ../.. โ†’ Do step piche
    • cd ~ โ†’ Home directory
    • cd โ†’ Direct home me le jata hai

๐Ÿ“ File Handling Commands

  • touch โ†’ Empty file banane ke liye

    touch file1 file2 file3
  • cat โ†’ File ka content dekhne ke liye

    cat file.txt
  • nano โ†’ File edit karne ke liye

    nano file.txt

    ๐Ÿ‘‰ Exit: Ctrl + X, Save: Y


๐Ÿ–จ๏ธ Output & Writing Commands

  • echo โ†’ Text print karne ke liye

    echo Hello Sajid
  • File me save karna:

    echo Sajid is a hacker > sajid.txt (overwrite)
    echo Sajid is a teacher >> sajid.txt (append)

๐Ÿ“‚ Directory Management

  • mkdir โ†’ Folder banane ke liye

    mkdir foldername
  • Multiple folder:

    mkdir -p sajid/sajid/sajid

๐Ÿ“‹ List & Screen Commands

  • ls -l โ†’ Files & folders detail me dikhata hai
  • clear โ†’ Screen clean karta hai
  • Ctrl + L โ†’ Screen upar scroll

๐Ÿ” Finding Commands

  • locate aircrack-ng
  • whereis aircrack-ng
  • find / -type f -name filename

โš™๏ธ Process Commands

  • ps aux โ†’ Running processes dekhne ke liye
  • Example:

    ps aux | grep apache2
    ps aux | head -20
    ps aux | tail -10

๐Ÿ“ฆ Copy, Move & Delete

  • cp โ†’ Copy file

    cp file1 file2
  • mv โ†’ Move ya rename

    mv oldname newname
    mv file /home/user/Desktop
  • rmdir โ†’ Empty folder delete
  • rm -r โ†’ Folder delete
  • rm -rf โ†’ Force delete โš ๏ธ (Dangerous)

๐Ÿ“Œ Important Concepts

  • Absolute Path โ†’ Full path (e.g. /home/kali/Desktop)
  • Relative Path โ†’ Current location se path

๐ŸŽฏ This video is useful for:

โœ” Beginners in Linux
โœ” Ethical hacking students
โœ” Cyber security learners
โœ” Kali Linux users

Leave a Reply

Your email address will not be published. Required fields are marked *

how to make kali linux live boot pen drive or buy

how to make kali linux live boot pen drive or buy

https://youtu.be/YnGyjnxmw6g?si=i14iYrSHw3UtRo1t

This method is perfect for beginners who want to try Kali Linux without affecting their main operating system.

๐Ÿ”ฅ What you will learn:
โ€ข What is Kali Linux Live Boot
โ€ข How to create a bootable USB
โ€ข How to run Kali Linux without installing
โ€ข Step-by-step live demo

๐Ÿ’ป Requirements:
โ€ข USB drive (8GB or more)
โ€ข Kali Linux ISO file
โ€ข Bootable tool (Rufus / Balena Etcher)

๐ŸŽฏ This video is perfect for:
โ€ข Beginners in cyber security
โ€ข Students learning ethical hacking
โ€ข Anyone who wants to try Kali Linux safely

โš ๏ธ Note:
This video is for educational purposes only.

๐Ÿ’ฌ If you like this video, donโ€™t forget to Like, Share and Subscribe!

๐Ÿ“Œ Channel: Cyber-Teck
๐Ÿš€ Learn Cyber Security in Hindi

#kalilinux #liveboot #cybersecurity #ethicalhacking #linux #kali


Kali Linux Bootable USB Flash Drive for PC โ€“ 


1. wishfulfil Kali Linux 2025 XFCE 64 Bit Live Bootable 32GB USB Pen Drive-https://amzn.to/4lXSe8w
2. Kali Linux Bootable Ethical Hacking Pendrive (Persistent) โ€“ 200+ Preinstalled Tools with Free Ethical Hacking Course-https://amzn.to/4s4tXyW

best laptop for hacher-

ASUS Vivobook 15, Intel Core i3 13th Gen 1315U, 12GB RAM, 512GB SSD, FHD 15.6″, Windows 11, Office Home 2024, Cool Silver, 1.7Kg, X1504VA-BQ331WS, Intel UHD iGPU, Thin & Light, 42Whrs Laptop- only 43990/-
https://amzn.to/4dlQ1BD

Dell 15, 13th Gen Intel Core i5-1334U (16GB DDR4, 512GB SSD) Anti-Glare FHD 15.6″/39.62cm, Windows 11, Microsoft Office Home 2024, Grey, 1.66kg, [Vostro 3530], 12 Month McAfee, Thin & Light Laptop-57,500/-
https://amzn.to/4sEpS5J

Lenovo Yoga Slim 7, Intel Core Ultra 7 155H, 16GB RAM, 512GB SSD, WUXGA-OLED, AI PC 14″/35.5cm, Windows 11, Office Home 2024, Grey, 1.39Kg, 2Wx4 Speakers, 1Yr ADP Free, 83CV009XIN, AI Powered Laptop-84990

https://amzn.to/4uRxq6x


HP Smartchoice Victus, AMD Ryzen 7 7445HS, 6GB RTX 3050, 16GB DDR5(Upgradeable) 512GB SSD, FHD, 144Hz, 300 nits, 15.6”/39.6cm, Win 11, M365* Office24, Blue, 2.29kg, fb3134AX/3120ax, Gaming Laptop only-72990/-
https://amzn.to/4lZBOfJ

Lenovo Yoga Slim 7, Intel Core Ultra 7 155H, 16GB RAM, 512GB SSD, WUXGA-OLED, AI PC 14″/35.5cm, Windows 11, Office Home 2024, Grey, 1.39Kg, 2Wx4 Speakers, 1Yr ADP Free, 83CV009XIN, AI Powered Laptop-92990/-
https://amzn.to/41yblwp

Leave a Reply

Your email address will not be published. Required fields are marked *

Kali Linux

Kali Linux

 

Leave a Reply

Your email address will not be published. Required fields are marked *