种子简介
种子名称:
Pluralsight - RHEL 8 series
文件类型:
视频
文件数目:
226个文件
文件大小:
1.76 GB
收录时间:
2022-6-20 17:51
已经下载:
3次
资源热度:
85
最近下载:
2024-11-14 00:19
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:5743b6e02059c85766948dee134922834d5e5619&dn=Pluralsight - RHEL 8 series
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - RHEL 8 series.torrent
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/6. Implementing Automated Firewall with Fail2Ban.mp419.32MB
Configuring Local Storage/1. Course Overview/1. Course Overview.mp43.83MB
Configuring Local Storage/2. Linux Block Storage/1. Tell Me About Block Devices.mp46.17MB
Configuring Local Storage/2. Linux Block Storage/2. Listing Block Devices and Drivers.mp48.61MB
Configuring Local Storage/2. Linux Block Storage/3. What are Loop Devices-.mp46.28MB
Configuring Local Storage/2. Linux Block Storage/4. Mounting ISO Files.mp410.45MB
Configuring Local Storage/2. Linux Block Storage/5. Summary and What's Next.mp44.06MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/1. Adding Disks to Systems.mp48.74MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/2. Creating Disk Files.mp44.91MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/3. Using dd and fallocate from the CLI.mp47.23MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/4. Understanding Disk Partitioning.mp46.33MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/5. Partitioning with fdisk.mp48.17MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/6. Partitioning with parted.mp42.95MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/7. Working with Filesystem UUIDs.mp415.81MB
Configuring Local Storage/3. Creating and Partitioning Block Devices/8. Summary and What's Next.mp43.58MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/1. Persisting the Lab Setup.mp45.51MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/2. Working with Systemd to Persist Loop Devices.mp413.33MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/3. Creating LVM Partitions.mp49.53MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/4. Using LVM Tools.mp46.33MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/5. Managing LVM2.mp45.43MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/6. Creating LVM2 systems from the Command Line.mp48.89MB
Configuring Local Storage/4. Creating Dynamic Disks Using LVM2/7. Summary and What's Next.mp45.07MB
Configuring Local Storage/5. Dynamically Expanding Logical Volumes/1. Dynamic Volumes.mp45.47MB
Configuring Local Storage/5. Dynamically Expanding Logical Volumes/2. Extending Volume Groups and Volumes.mp413.22MB
Configuring Local Storage/5. Dynamically Expanding Logical Volumes/3. Managing Swap Logical Volumes.mp411.01MB
Configuring Local Storage/5. Dynamically Expanding Logical Volumes/4. Summary.mp44.74MB
Creating and Configuring File Systems/1. Course Overview/1. Course Overview.mp44.04MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/1. Managing File Systems in RHEL 8.mp410.67MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/2. Managing XFS File Systems.mp413.63MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/3. Understanding EXT4 File Systems.mp46.84MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/4. Working with EXT4 File Systems.mp413.22MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/5. Securing Mount Points Correctly.mp411.62MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/6. Extending File Systems and Logical Volumes.mp49.41MB
Creating and Configuring File Systems/2. Create and Manage Local File Systems/7. Summary and What's Next.mp42.2MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/1. Managing Filesystem Collaboration.mp411.24MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/2. Working with Special Permissions and Find.mp410.97MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/3. Managing Linux Groups.mp44.57MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/4. Working with the Sticky Bit.mp49.75MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/5. Working with the SGID Bit on Directories.mp47.69MB
Creating and Configuring File Systems/3. Manage Directory Permissions for Collaboration/6. Module Summary and What's Next.mp43.4MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/1. Setting up Two Lab Systems.mp410.18MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/2. Understanding NFSv4.mp49.28MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/3. Firewalling and Exporting NFS.mp412.18MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/4. Using the NFS Client.mp45.07MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/5. The Magic of Autofs.mp414.52MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/6. SELinux and NFS.mp49.29MB
Creating and Configuring File Systems/4. Sharing Filesystems Using NFS/7. Summary and What's Next.mp43.98MB
Creating and Configuring File Systems/5. Implementing Data Optimization Using VDO/1. What Is VDO-.mp47.25MB
Creating and Configuring File Systems/5. Implementing Data Optimization Using VDO/2. Installing and Using VDO.mp47.32MB
Creating and Configuring File Systems/5. Implementing Data Optimization Using VDO/3. Mounting and Monitoring VDO Devices.mp412.96MB
Creating and Configuring File Systems/5. Implementing Data Optimization Using VDO/4. Managing Volume Size.mp410.39MB
Creating and Configuring File Systems/5. Implementing Data Optimization Using VDO/5. Summary and Whats Next.mp44.41MB
Creating and Configuring File Systems/6. Implementing Layered Storage Using Stratis/1. Welcome to Layered Storage and Stratis.mp44.65MB
Creating and Configuring File Systems/6. Implementing Layered Storage Using Stratis/2. Creating Stratis Pools.mp44.73MB
Creating and Configuring File Systems/6. Implementing Layered Storage Using Stratis/3. Creating Filesystems in Stratis.mp48.33MB
Creating and Configuring File Systems/6. Implementing Layered Storage Using Stratis/4. Snapshotting Filesystems in Stratis.mp411.72MB
Creating and Configuring File Systems/6. Implementing Layered Storage Using Stratis/5. Summary and What's Next.mp42.68MB
Creating Shell Scripts/1. Course Overview/1. Course Overview.mp43.43MB
Creating Shell Scripts/2. Automating Tasks Using Bash Scripts/1. What Are Shell Scripts-.mp411.33MB
Creating Shell Scripts/2. Automating Tasks Using Bash Scripts/2. Using Script Syntax at the CLI.mp49.16MB
Creating Shell Scripts/2. Automating Tasks Using Bash Scripts/3. Understanding Script Logic.mp43.53MB
Creating Shell Scripts/2. Automating Tasks Using Bash Scripts/4. Using Simple Logic at the CLI.mp410.56MB
Creating Shell Scripts/2. Automating Tasks Using Bash Scripts/5. Summary and What's Next.mp45.07MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/1. What Is a Shebang and Why Do I Want to Know-.mp411.06MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/2. Implementing the Shebang.mp47.3MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/3. Working with vim Abbreviations.mp45.4MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/4. Working with PATH and Execute Permissions.mp410.54MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/5. Special Variables.mp48.44MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/6. Using Special Variables in Scripts.mp47.03MB
Creating Shell Scripts/3. Creating Your Own Shell Scripts/7. Summary and What's Next.mp44.53MB
Creating Shell Scripts/4. Automating the User Creation Process/1. Testing User Input.mp48.41MB
Creating Shell Scripts/4. Automating the User Creation Process/2. Ensure User Is Not Already Present.mp47.41MB
Creating Shell Scripts/4. Automating the User Creation Process/3. Using Read During Script Execution.mp47.15MB
Creating Shell Scripts/4. Automating the User Creation Process/4. Creating User Accounts.mp45.59MB
Creating Shell Scripts/4. Automating the User Creation Process/5. Summary and What's Next.mp43.42MB
Creating Shell Scripts/5. Using Functions and Loops in Scripts/1. Creating Better Scripts.mp46.94MB
Creating Shell Scripts/5. Using Functions and Loops in Scripts/2. Comparing All Arguments.mp47.21MB
Creating Shell Scripts/5. Using Functions and Loops in Scripts/3. Using while Loops.mp411.43MB
Creating Shell Scripts/5. Using Functions and Loops in Scripts/4. Implementing Functions within Scripts.mp415.2MB
Creating Shell Scripts/5. Using Functions and Loops in Scripts/5. Summary.mp46.04MB
Deploying, Configuring and Maintaining Systems/1. Course Overview/1. Course Overview.mp43.94MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/01. Using YUM or DNF.mp411.06MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/02. Checking Your RHEL Subscription.mp44.09MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/03. Understanding the Basics of the RHEL Package Manager.mp43.75MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/04. Using the Basic Operations of the RHEL Package Manager.mp410.7MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/05. Understanding Package Repositories.mp410.79MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/06. Creating a Local Repository.mp412.28MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/07. Creating Your Own Web Based Repository.mp45.02MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/08. Working with Security Updates.mp411.18MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/09. Working with Modules.mp49.71MB
Deploying, Configuring and Maintaining Systems/2. Managing Software Packages in RHEL 8/10. Summary and What's Next.mp45.19MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/1. NTP and Chrony.mp410.55MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/2. Configuring Timezones in Linux.mp47MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/3. Managing Linux Services Including Chronyd.mp49MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/4. Editing Configurations Using sed.mp47.7MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/5. Editing the chrony.conf.mp47.38MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/6. Using Chronyc Tools.mp410.42MB
Deploying, Configuring and Maintaining Systems/3. Configuring Time Services/7. Summary and What's Next.mp43.11MB
Deploying, Configuring and Maintaining Systems/4. Working with Systemd Targets/1. Understanding Systemd Targets.mp49.42MB
Deploying, Configuring and Maintaining Systems/4. Working with Systemd Targets/2. Using Default Targets.mp47.76MB
Deploying, Configuring and Maintaining Systems/4. Working with Systemd Targets/3. Working with Kernel Arguments.mp49.98MB
Deploying, Configuring and Maintaining Systems/4. Working with Systemd Targets/4. Summary and What's Next.mp44.64MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/1. The 3 Job Schedulers in RHEL 8.mp44.95MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/2. Working with At.mp48.1MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/3. Understanding Cron.mp45.37MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/4. Working with Cron.mp412.4MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/5. Using SystemD Timer Units.mp410.57MB
Deploying, Configuring and Maintaining Systems/5. Scheduling Jobs in RHEL 8/6. Summary.mp43.38MB
Managing Networking/1. Course Overview/1. Course Overview.mp43.23MB
Managing Networking/2. Managing the TCP-IP Stack with IP/1. Working with the IP Command.mp49.64MB
Managing Networking/2. Managing the TCP-IP Stack with IP/2. Displaying and Adding Runtime IP Addresses.mp410.89MB
Managing Networking/2. Managing the TCP-IP Stack with IP/3. Working with the ARP Cache.mp413.47MB
Managing Networking/2. Managing the TCP-IP Stack with IP/4. Controlling the ARP Cache Timeout.mp412.95MB
Managing Networking/2. Managing the TCP-IP Stack with IP/5. Understanding Namespaces.mp48.31MB
Managing Networking/2. Managing the TCP-IP Stack with IP/6. Configuring Namespaces.mp414.1MB
Managing Networking/2. Managing the TCP-IP Stack with IP/7. Adding Static Routes.mp48.86MB
Managing Networking/2. Managing the TCP-IP Stack with IP/8. Summary and What's Next.mp43.07MB
Managing Networking/3. Persisting Network Configuration/1. How Do We Persist Configuration of the Network-.mp47.46MB
Managing Networking/3. Persisting Network Configuration/2. Network Configuration Files.mp48.53MB
Managing Networking/3. Persisting Network Configuration/3. Adding New Network Connections.mp411.46MB
Managing Networking/3. Persisting Network Configuration/4. Understanding DNS Priority.mp46.4MB
Managing Networking/3. Persisting Network Configuration/5. Configuring DNS Server Priority.mp410.1MB
Managing Networking/3. Persisting Network Configuration/6. Summary and What's Next.mp43.3MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/1. Firewalls and FirewallD.mp48.45MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/2. Working with firewall-cmd.mp49.36MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/3. Allowing Access to HTTP.mp49.23MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/4. Using Sources in Place of Interfaces.mp49.03MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/5. Customizing Service Files.mp49.76MB
Managing Networking/4. Configuring Firewalls and Understanding Fail2Ban/7. Summary and What's Next.mp42.95MB
Managing Networking/5. Configuring Firewalls Using Nftables/1. Welcome to the Nftables Firewall.mp47.88MB
Managing Networking/5. Configuring Firewalls Using Nftables/2. Nftable Basic Operations.mp411.02MB
Managing Networking/5. Configuring Firewalls Using Nftables/3. Understanding Rules.mp45.51MB
Managing Networking/5. Configuring Firewalls Using Nftables/4. Creating Rules in Nftables.mp413.73MB
Managing Networking/5. Configuring Firewalls Using Nftables/5. Automating Rules.mp48.94MB
Managing Networking/5. Configuring Firewalls Using Nftables/6. Summary.mp43.66MB
Managing Users and Groups/1. Course Overview/1. Course Overview.mp43.41MB
Managing Users and Groups/2. Managing Linux Users/1. Linux Users.mp47.44MB
Managing Users and Groups/2. Managing Linux Users/2. Listing Users in Linux.mp49.14MB
Managing Users and Groups/2. Managing Linux Users/3. Understanding User Creation.mp47.92MB
Managing Users and Groups/2. Managing Linux Users/4. Creating Users in Linux.mp410.17MB
Managing Users and Groups/2. Managing Linux Users/5. Modifying and Deleting Users.mp47.8MB
Managing Users and Groups/2. Managing Linux Users/6. Summary and What's Next.mp44.23MB
Managing Users and Groups/3. Managing User Passwords in Linux/1. Understanding Linux Passwords.mp411.13MB
Managing Users and Groups/3. Managing User Passwords in Linux/2. Working with Shadow Data in Linux.mp411.14MB
Managing Users and Groups/3. Managing User Passwords in Linux/3. Setting Password Defaults.mp45.88MB
Managing Users and Groups/3. Managing User Passwords in Linux/4. Understanding Password Authentication.mp48.59MB
Managing Users and Groups/3. Managing User Passwords in Linux/5. Authenticating User Passwords.mp412.16MB
Managing Users and Groups/3. Managing User Passwords in Linux/6. Managing User Passwords.mp415.72MB
Managing Users and Groups/3. Managing User Passwords in Linux/7. Summary and What's Next.mp43.86MB
Managing Users and Groups/4. Managing Groups in Linux/1. Managing Linux Groups.mp47.38MB
Managing Users and Groups/4. Managing Groups in Linux/2. Listing Primary Groups Members.mp410.55MB
Managing Users and Groups/4. Managing Groups in Linux/3. Appending to Groups.mp44.87MB
Managing Users and Groups/4. Managing Groups in Linux/4. Understanding Groups Passwords.mp44.31MB
Managing Users and Groups/4. Managing Groups in Linux/5. Working with Group Passwords and Group Administrators.mp46.97MB
Managing Users and Groups/4. Managing Groups in Linux/6. Summary and What's Next.mp45.98MB
Managing Users and Groups/5. Elevating Privileges in Linux/1. Bossing It in Linux.mp45.53MB
Managing Users and Groups/5. Elevating Privileges in Linux/2. Using su.mp47.52MB
Managing Users and Groups/5. Elevating Privileges in Linux/3. Understanding sudo.mp44.6MB
Managing Users and Groups/5. Elevating Privileges in Linux/4. Using sudo.mp412.75MB
Managing Users and Groups/5. Elevating Privileges in Linux/5. Maintaining the Editor Variable.mp46.88MB
Managing Users and Groups/5. Elevating Privileges in Linux/6. Summary.mp43.24MB
Operating Running Systems/1. Course Overview/1. Course Overview.mp43.27MB
Operating Running Systems/2. Rebooting and Shutting Down Systems/1. How Does This System Reboot-.mp411.55MB
Operating Running Systems/2. Rebooting and Shutting Down Systems/2. Working with Shutdown and Options.mp48.11MB
Operating Running Systems/2. Rebooting and Shutting Down Systems/3. Restricting User Login.mp44.4MB
Operating Running Systems/2. Rebooting and Shutting Down Systems/4. Rebooting and Poweroff.mp45.21MB
Operating Running Systems/2. Rebooting and Shutting Down Systems/5. Summary and What's Next.mp42.24MB
Operating Running Systems/3. Recovering a Root Password in RHEL 8/1. Resetting Lost Root Passwords.mp47.77MB
Operating Running Systems/3. Recovering a Root Password in RHEL 8/2. Understanding SELinux Context.mp45.62MB
Operating Running Systems/3. Recovering a Root Password in RHEL 8/3. Editing the Boot Process.mp45.32MB
Operating Running Systems/3. Recovering a Root Password in RHEL 8/4. Recovering a Lost Root Password.mp49.8MB
Operating Running Systems/3. Recovering a Root Password in RHEL 8/5. Summary and What's Next.mp43.46MB
Operating Running Systems/4. Managing System Services/1. Systemd and Systemctl.mp48.93MB
Operating Running Systems/4. Managing System Services/2. The Basics of Systemctl.mp410.77MB
Operating Running Systems/4. Managing System Services/3. Working with Socket Units.mp412.64MB
Operating Running Systems/4. Managing System Services/4. Understanding Editing and Masking of Units.mp46.39MB
Operating Running Systems/4. Managing System Services/5. Working at the CLI to List, Edit, and Mask Services.mp45.96MB
Operating Running Systems/4. Managing System Services/6. Working with Systemd Targets.mp413.14MB
Operating Running Systems/4. Managing System Services/7. Summary and What's Next.mp43.85MB
Operating Running Systems/5. Managing System Performance/1. How Uptime Shows System Load.mp45.89MB
Operating Running Systems/5. Managing System Performance/2. Working with Top and Uptime.mp48.2MB
Operating Running Systems/5. Managing System Performance/3. Understanding Process Priority.mp46.12MB
Operating Running Systems/5. Managing System Performance/4. Tuning Process Using Nice and Renice.mp49.48MB
Operating Running Systems/5. Managing System Performance/5. Understanding Process Status and Tuning Profiles.mp42.96MB
Operating Running Systems/5. Managing System Performance/6. Working with Ps and Tuned-adm.mp415.93MB
Operating Running Systems/5. Managing System Performance/7. Summary and What's Next.mp43.46MB
Operating Running Systems/6. Managing Logging and Log Files/1. Introducing System Logs.mp49.58MB
Operating Running Systems/6. Managing Logging and Log Files/2. Simple Log Actions.mp413.83MB
Operating Running Systems/6. Managing Logging and Log Files/3. Understanding Rsyslogd.mp48.98MB
Operating Running Systems/6. Managing Logging and Log Files/4. Demo- Rsyslogd.mp414.68MB
Operating Running Systems/6. Managing Logging and Log Files/5. Using Logrotate at the CLI.mp413.19MB
Operating Running Systems/6. Managing Logging and Log Files/6. Working with the Journal Log.mp415.92MB
Operating Running Systems/6. Managing Logging and Log Files/7. Secure Copy with SCP.mp48.15MB
Operating Running Systems/6. Managing Logging and Log Files/8. Summary.mp43.36MB
Using Essential Tools/1. Course Overview/1. Course Overview.mp44.12MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/1. Red Hat Enterprise Linux 8.mp49.07MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/2. Installing RHEL 8.mp413.56MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/3. Understanding Linux Commands.mp46.01MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/4. Executing Commands in Linux.mp415.36MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/5. Using Vagrant Virtual Machines.mp48.96MB
Using Essential Tools/2. Introducing Red Hat and Enterprise Linux/6. Module Summary.mp43.74MB
Using Essential Tools/3. Working with Text Files/01. Understanding Shell Redirection.mp410.45MB
Using Essential Tools/3. Working with Text Files/02. Redirection from the CLI.mp48.46MB
Using Essential Tools/3. Working with Text Files/03. Using tee for Redirection.mp45.92MB
Using Essential Tools/3. Working with Text Files/04. Understanding Text Editors.mp46.15MB
Using Essential Tools/3. Working with Text Files/05. Editing Files Using nano.mp47.08MB
Using Essential Tools/3. Working with Text Files/06. Using the vim Text Editor.mp46.13MB
Using Essential Tools/3. Working with Text Files/07. Working with Directories.mp48.11MB
Using Essential Tools/3. Working with Text Files/08. File Operations.mp49.85MB
Using Essential Tools/3. Working with Text Files/09. Reading Text Files.mp49.77MB
Using Essential Tools/3. Working with Text Files/10. Searching Files Using grep.mp45.56MB
Using Essential Tools/3. Working with Text Files/11. Summary and What's Next.mp43.42MB
Using Essential Tools/4. Securing Files in the Filesystem/1. Understanding File Metadata.mp48.51MB
Using Essential Tools/4. Securing Files in the Filesystem/2. Listing File Permissions.mp47.12MB
Using Essential Tools/4. Securing Files in the Filesystem/3. Default Permissions and the umask.mp47.16MB
Using Essential Tools/4. Securing Files in the Filesystem/4. Changing File Permissions.mp411.1MB
Using Essential Tools/4. Securing Files in the Filesystem/5. Changing File Ownership.mp43.75MB
Using Essential Tools/4. Securing Files in the Filesystem/6. Managing Links in Linux.mp410.64MB
Using Essential Tools/4. Securing Files in the Filesystem/7. Switching User and Groups IDs.mp410.19MB
Using Essential Tools/4. Securing Files in the Filesystem/8. Summary and What's Next.mp43.42MB
Using Essential Tools/5. Archiving Files in Linux/1. Understanding Special Case Permissions.mp46.14MB
Using Essential Tools/5. Archiving Files in Linux/2. Working with Special Case Permissions.mp47.84MB
Using Essential Tools/5. Archiving Files in Linux/3. Using the tar Archiver.mp49.52MB
Using Essential Tools/5. Archiving Files in Linux/4. Using star Archiver.mp46.61MB
Using Essential Tools/5. Archiving Files in Linux/5. Compressing Files.mp49.88MB
Using Essential Tools/5. Archiving Files in Linux/6. Summary.mp43.43MB