<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Aasik</title>
    <description>The latest articles on DEV Community by Aasik (@aasik_20409e3305686b324ec).</description>
    <link>https://dev.to/aasik_20409e3305686b324ec</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3470511%2Fcb443ad0-5090-4176-913e-047ebb6fa1aa.png</url>
      <title>DEV Community: Aasik</title>
      <link>https://dev.to/aasik_20409e3305686b324ec</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aasik_20409e3305686b324ec"/>
    <language>en</language>
    <item>
      <title>What is a Cronjob and understanding syntax</title>
      <dc:creator>Aasik</dc:creator>
      <pubDate>Sat, 04 Oct 2025 04:47:41 +0000</pubDate>
      <link>https://dev.to/aasik_20409e3305686b324ec/what-is-a-cronjob-and-understanding-syntax-2p6p</link>
      <guid>https://dev.to/aasik_20409e3305686b324ec/what-is-a-cronjob-and-understanding-syntax-2p6p</guid>
      <description>&lt;p&gt;A cron job is a task automated using cron, a scheduler tool on a Unix System like Linux. Common cron jobs include running scheduled backups, updating software, clearing the cache, and monitoring the disk space, deleting files periodically which are no longer required and running system maintenance tasks etc. &lt;/p&gt;

&lt;p&gt;Creating cron jobs helps reducing human error and save time as you don't need to repeatedly perform the same tasks. &lt;/p&gt;

&lt;p&gt;Cronjob Syntax &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0k3dvv7gcjdxc9g1qbjj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0k3dvv7gcjdxc9g1qbjj.png" alt=" " width="655" height="195"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The cronjob syntax consists of five fields with the following possible values: &lt;/p&gt;

&lt;p&gt;1.Minute - minute of the hour the command will run, ranging from 0-59.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Hour - hour the command will run, ranging from 0-23 in a 24-hour notation &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Day of the month - date of the month the user wants the command to run, ranging from 1-31. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Month - month the user wants the command to run. It ranges from 1-12, representing January until December. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Day of the week - day of the week for a command to run, ranging from 1-7.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you want the cron daemon to run the root/backup.sh script every Saturday at 8.27 pm, here's what the cron command should look like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt; 27 20  6 root/backups.sh 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To specify multiple values in a fields&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;asterisk (*) -&amp;gt; Specifies all possible values for a field.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;comma (,) -&amp;gt; specifies a list of values &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;dash(-) -&amp;gt; specifies a range of values&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Seperator(/) -&amp;gt; divides a value. If you want to run a script every twelve hours, write */12 in the Hour field. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Last(L) -&amp;gt; Users can use this operator in the day-of-the month and day-of-week fields. Writing 3L in the day-of-week field means the last Wednesday of the month. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cron is commonly pre-installed by default in all Linux distributions. Otherwise, run the below command to install cron&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo apt install cron 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;There are two configuration files you need to consider regarding cronjob, system crontab and user crontab. System crontab is used to schedule system-wide essential jobs that are only editable by those with root privileges. Meanwhile, we can use user crontab to create and edit jobs that only apply at the user level.&lt;/p&gt;

&lt;p&gt;To create a crontab file&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;crontab -e&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;To display a list of active scheduled tasks&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;crontab -l&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;If the system has multiple users, you can view their crontab files by entering the command below as a superuser&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;crontab -u username -l&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;To delete scheduled tasks&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;crontab -r&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;crontab -i is similar to crontab -r, except you will get a confirmation before deleting the tasks. &lt;/p&gt;

&lt;p&gt;To run a cron job, connect to your Linux system using terminal with root permissions. Then create a crontab file and add the script using text editors like vim or Nano. &lt;/p&gt;

</description>
      <category>automation</category>
      <category>linux</category>
      <category>beginners</category>
      <category>devops</category>
    </item>
    <item>
      <title>Zero Trust Architecture: The Future of Cybersecurity</title>
      <dc:creator>Aasik</dc:creator>
      <pubDate>Sun, 31 Aug 2025 12:51:07 +0000</pubDate>
      <link>https://dev.to/aasik_20409e3305686b324ec/zero-trust-architecture-the-future-of-cybersecurity-560b</link>
      <guid>https://dev.to/aasik_20409e3305686b324ec/zero-trust-architecture-the-future-of-cybersecurity-560b</guid>
      <description>&lt;p&gt;“Never trust, always verify.” This phrase sums up the core of Zero Trust Architecture (ZTA), a modern security model designed for today’s borderless, cloud-driven world. &lt;/p&gt;

&lt;p&gt;As cyberattacks become more sophisticated and organizations move beyond traditional perimeters, the need for a security approach that assumes no user or device can be trusted by default has never been greater.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Zero Trust?&lt;/strong&gt;&lt;br&gt;
Traditional security models operate on the principle of trust but verify, granting users access based on their location within the network (e.g., inside the corporate firewall). Zero Trust flips this concept. &lt;/p&gt;

&lt;p&gt;It requires every user and device—whether inside or outside the organization—to be authenticated, authorized, and continuously validated before they can access applications or data. &lt;/p&gt;

&lt;p&gt;Zero Trust assumes there is no traditional network edge. Whether resources are on-premises, in the cloud, or across hybrid environments, the same strict security policies apply everywhere. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Zero Trust?&lt;/strong&gt;&lt;br&gt;
• Rising threats: Ransomware, phishing, and supply chain attacks are increasing. &lt;br&gt;
• Remote work &amp;amp; BYOD: Users now access corporate resources from personal devices and multiple locations. &lt;br&gt;
• Cloud adoption: Data and applications are no longer confined to a single corporate network. &lt;/p&gt;

&lt;p&gt;Zero Trust is designed to meet these challenges by removing implicit trust and replacing it with continuous verification. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Principles of Zero Trust&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Default Deny: Assume every request is untrusted until verified. &lt;/li&gt;
&lt;li&gt;Verify Every Time: Authenticate users and devices on every access attempt. &lt;/li&gt;
&lt;li&gt;Monitor Everything: Log and analyze all activity to detect anomalies. &lt;/li&gt;
&lt;li&gt;Least Privilege: Grant only the minimum access necessary for a user’s role. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;How to build a Zero Trust Architecture&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Zero Trust isn’t a single product—it’s a framework and strategy. Building it requires planning, policies, and the right tools. &lt;/p&gt;

&lt;p&gt;Here’s a simplified roadmap: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Assess Your Organization &lt;br&gt;
• Identify sensitive data, applications, and critical assets. &lt;br&gt;
• Audit all user accounts, including service and privileged accounts. &lt;br&gt;
• Review authentication policies and eliminate weak or outdated protocols. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Map Your Assets and Data Flows &lt;br&gt;
• Create an inventory of all devices, applications, and data locations. &lt;br&gt;
• Understand how users interact with these resources. &lt;br&gt;
• Segment identities and enforce strict access controls. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Apply Preventative Measures &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;• Multi-Factor Authentication (MFA): Add extra layers of security for all logins. &lt;br&gt;
• Least Privilege Access: Give users only the permissions they need. &lt;br&gt;
• Identity Segmentation: Use micro-perimeters to contain lateral movement. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Monitor and Respond &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;• Continuously inspect and log all network traffic. &lt;br&gt;
• Detect and contain suspicious activity quickly. &lt;br&gt;
• Implement automated responses to high-risk behaviors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of Zero Trust Architecture&lt;/strong&gt;&lt;br&gt;
• Improved Visibility: Know who is accessing what, and when. &lt;br&gt;
• Reduced Risk: Harder for attackers to move laterally within the network. &lt;br&gt;
• Better User Experience: Seamless access with Single Sign-On (SSO) and adaptive MFA. &lt;br&gt;
• Cloud-Ready: Works across local, cloud, and hybrid environments. &lt;br&gt;
• Supports BYOD: Security doesn’t depend on who owns the device, only on verification. &lt;/p&gt;

</description>
      <category>zta</category>
      <category>zerotrustarchitecture</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Fixing User Input Issue in VS Code (Java)</title>
      <dc:creator>Aasik</dc:creator>
      <pubDate>Sun, 31 Aug 2025 09:49:17 +0000</pubDate>
      <link>https://dev.to/aasik_20409e3305686b324ec/cannot-edit-in-read-only-editor-vs-code-23l1</link>
      <guid>https://dev.to/aasik_20409e3305686b324ec/cannot-edit-in-read-only-editor-vs-code-23l1</guid>
      <description>&lt;p&gt;Last week, during the Java practical session, some students had trouble entering user input while running their code in VS Code. This happens because Code Runner (the extension used to run code) runs programs in the Output window, which does not support interactive input by default.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5sffydvzsx4tce1xuctx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5sffydvzsx4tce1xuctx.png" alt=" " width="500" height="302"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s how to fix it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;go to file menu --&amp;gt; preferences --&amp;gt; Settings&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl199k3zt4kf0uw36o2o8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl199k3zt4kf0uw36o2o8.png" alt=" " width="800" height="729"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Search for code runner in the search bar&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgk86xf919fg8ppb2xco2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgk86xf919fg8ppb2xco2.png" alt=" " width="800" height="371"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Scroll down and tick the checkbox for “Run in Terminal”&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffe2kez7bqbryf6p3mydo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffe2kez7bqbryf6p3mydo.png" alt=" " width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That’s it! Now your Java program will run in the terminal, and you’ll be able to enter input without any issues.&lt;/p&gt;

</description>
      <category>vscode</category>
      <category>java</category>
    </item>
  </channel>
</rss>
