Skip to content

Edgoad.com

  • Linux
  • Microsoft
  • Networking
  • DIY

redhat

Linux Monitoring Networking redhat 

Parsing ASA logs using ELK and my central syslog archive

November 30, 2015July 28, 2019 Ed Goad 3 Comments

Previously, I had setup a centralized syslog archive and directed all of my network devices to report into it. This

Read more
Linux redhat rhce rhel 

Passed my RHCSA exam! But not the RHCE

February 1, 2011 Ed Goad 70 Comments

I am proud to announce I just received the results for my RHCSA and I passed with a score of

Read more
Linux redhat 

Programatically managing a user’s crontab

January 5, 2011 Ed Goad 0 Comments

In Linux, there is a central crontab or scheduler for the entire system. Trying to schedule things through here is

Read more
certification redhat rhce 

System Configuration and Management — Build a simple RPM that packages a single file

January 4, 2011 Ed Goad 4 Comments

This is an interesting objective – something that I have never had to do before. After looking around at various

Read more
Linux redhat rhce 

Setting runlevel at boot

December 30, 2010 Ed Goad 0 Comments

Changing runlevel on a live system is fairly simple – as root simply type init 3 (or whatever runlevel you

Read more
  • ← Previous

Recent Videos

  • Authenticating to APIs part 2

    Authenticating to APIs part 2

    Continuing our discussion of authenticating to APIs to better keep our authentication tokens safe. Using the Python ConfigParser module to store passwords and tokens in a separate file, and then accessing them programmatically.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • Authenticating to APIs part 1

    Authenticating to APIs part 1

    Introduction to using APIs that require authentication. Walking through the GitHub API documentation, creating a Personal Access Token for GitHub, and authenticating against their API.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • HaveIBeenPwned API part 2

    HaveIBeenPwned API part 2

    Continuing our use of the HaveIBeenPwned API and using this in a more dynamic Python script. This allows us to automatically look for a specific password and return its status to the user.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • HaveIBeenPwned API part 1

    HaveIBeenPwned API part 1

    Using the HaveIBeenPwned public API to test passwords for security. Validating if passwords have been found in online security breaches before.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • JSON and APIs

    JSON and APIs

    An introduction to working with JSON data returned from APIs. Specifically, creating a script to find out how many people are in space at this moment, and then parsing the JSON data to make it readable and accessible

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • Introduction to APIs

    Introduction to APIs

    A brief introduction to working with online APIs and the tools to access them

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
Load more

Copyright © 2022 Edgoad.com. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.