Total 15 Posts

## Running SQL on CSV Data: Data Conversion and Extraction

A lot of tools output data as comma-separated values (CSV). It is a simple but common tabular data format of plaintext that can easily be processed. Each line of the file represents a single record. A record consists of the same number of fields, or columns. Usually, the delimiter between

## Monitoring Data Changes Using a HIDS

In this article I'll explain how to monitor your data and how to detect changes. This kind of monitoring is mostly done using a Host-based Intrusion Detection System (HIDS) like Integrit. In this article, we describe various methods for your different use-cases.

### IDS (Overview)

In general, an Intrusion Detection System

## Handling Unix Signals in Python

UNIX/Linux systems offer special mechanisms to communicate between each individual process. One of these mechanisms are signals, and belong to the different methods of communication between processes (Inter Process Communication, abbreviated with IPC).

In short, signals are software interrupts that are sent to the program (or the process) to

## How to Permanently Set $PATH in Linux ### Understanding the$PATH Variable

In this tutorial, we will show you how to permanently set your PATH on Linux.

First off, why should you care?

The $PATH variable, or just PATH, without the$ indicating variables, specifies a list of directories that impacts your computing platform's functionality in a critical way.

## Linux: Find Files Containing Text

This topic is essential knowledge for every user of UNIX, Linux, Solaris, OS X, and BSD. Furthermore, the LPI certification contains tricky questions about this.

If you want to find files with a certain filename using the command line then use either the find or the locate commands. But if