<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Manoj Sadanala</title>
    <description>The latest articles on DEV Community by Manoj Sadanala (@manoj1749).</description>
    <link>https://dev.to/manoj1749</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F722834%2F8d764317-b307-4cf7-83d7-46aac7f3b95c.jpeg</url>
      <title>DEV Community: Manoj Sadanala</title>
      <link>https://dev.to/manoj1749</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/manoj1749"/>
    <language>en</language>
    <item>
      <title>What's An Virtual Environment</title>
      <dc:creator>Manoj Sadanala</dc:creator>
      <pubDate>Mon, 24 Jan 2022 11:43:23 +0000</pubDate>
      <link>https://dev.to/manoj1749/whats-an-virtual-environment-2pm0</link>
      <guid>https://dev.to/manoj1749/whats-an-virtual-environment-2pm0</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;Virtual Environment&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Virtualenv will isolate your Python/Django setup on a per-project basis. This means that any changes you make to one website won't affect any others you're also developing.&lt;br&gt;
Installing packages globally can be avoided by Virtual Environment.&lt;br&gt;
&lt;em&gt;when a virtual environment is active, the packages will be installed within the environment and not in the whole system.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installing Virtual Environment&lt;/strong&gt;&lt;br&gt;
In the terminal of your mac entering the command below in working directory, which installs it in your working directory&lt;br&gt;
&lt;code&gt;&lt;br&gt;
python3 -m venv myvenv&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Here, myenv is the name of our virtual environment&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;We can keep any other names, lower case letters are suggestable.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Running Virtual Environment and Working In It&lt;/strong&gt;&lt;br&gt;
Running the below command in the directory we installed our virtual environment will activate or start the virtual environment&lt;br&gt;
&lt;code&gt;&lt;br&gt;
source myvenv/bin/activate&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Here we should replace myenv with the name of the virtual environment with the name we used for virtual environment&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;_When we start the virtual environment, we can identify that it started when you see the prompt in your terminal or console is prefixed with (myenv) like this, _&lt;br&gt;
&lt;code&gt;&lt;br&gt;
(myvenv) manoj@Manojs-MacBook-Air ~ % &lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;We had successfully understood the way to install a virtual environment in a directory and how to make it running&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>virtualenv</category>
      <category>webdev</category>
      <category>python</category>
      <category>mac</category>
    </item>
    <item>
      <title>A Walk-Through Bandit - Over the Wire Till Level 10</title>
      <dc:creator>Manoj Sadanala</dc:creator>
      <pubDate>Sat, 20 Nov 2021 15:45:36 +0000</pubDate>
      <link>https://dev.to/manoj1749/a-walk-through-bandit-over-the-wire-till-level-10-3jdj</link>
      <guid>https://dev.to/manoj1749/a-walk-through-bandit-over-the-wire-till-level-10-3jdj</guid>
      <description>&lt;p&gt;I’m a Mac User, so I used terminal for doing the task.&lt;br&gt;
***I know some basic commands of terminal and with help of google I got to know about some new commands which helped me to solve the levels&lt;/p&gt;

&lt;p&gt;LEVEL-0&lt;br&gt;
I logged into the game using the ssh with the help of the reading materials mentioned there.&lt;/p&gt;

&lt;p&gt;LEVEL-1&lt;br&gt;
I was somewhat familiar with the commands mentioned in the material.&lt;br&gt;
With command-“ls” I had listed all the folders and files in the current directory and found the file-”readme” which contains the password for the next level.&lt;br&gt;
With the command-“cat ” I opened the file-“readme” and found the password for the next level.&lt;br&gt;
The password is- “​​boJ9jbbUNNfktd78OOpsqOltutMc3MY1”&lt;br&gt;
After with command-“exit” I logged out of the ssh &lt;/p&gt;

&lt;p&gt;LEVEL-2&lt;br&gt;
Firstly I had logged into the ssh with the username-“bandit1”[as the username-“bandit0” logs into the previous ssh(I found it out after googling it)] with the password I found in the  previous level.&lt;br&gt;
As mentioned the password was in a file-“-”. I’ve used the command-“cat -” I can’t find the password. Such with the help of ‘ Google Search for “dashed filename” ’ I’ve found a reddit forum, where I found the solution such that instead of ‘ cat - ’ I’ve used “ cat ./- ” as ‘-’ was a symbol.&lt;br&gt;
And I found the password for the next level.&lt;br&gt;
The password is- “CV1DtqXWVFXTvM2F0k09SHz0YwRINYA9”&lt;/p&gt;

&lt;p&gt;LEVEL-3&lt;br&gt;
Same as every level password for the next level is there in the directory, But in this level The password for the next level is stored in a file called spaces in this filename. &lt;br&gt;
With the help of the ‘ Google Search for “spaces in filename” ’ I’ve found a way to open the file.&lt;br&gt;
The password is- “UmHadQclWmgdLOKQ3YNgjWxGoRMb5luK”&lt;/p&gt;

&lt;p&gt;LEVEL-4&lt;br&gt;
In this level the password for next level was in a hidden folder in inhere directory. Which isn’t shown when ‘ls’ command is used in inhere directory. But with ‘ls -a’ command all the files in inhere directory will be listed including hidden file which is named as “.hidden”. Which we can open and find the password for the next level.&lt;br&gt;
The password is- “pIwrPrtPN36QITSp3EQaw936yaFoFgAB”&lt;/p&gt;

&lt;p&gt;LEVEL-5&lt;br&gt;
In this level the password to next level is one of the files in inhere directory and a hint is given that the password is stored in the only human-readable file. As the name of every file was starting with a ‘-’ I’ve used the command “cat ./” to open the file. In the process of opening all the folders I’ve found password in file named-“-file07”&lt;br&gt;
The password is- “koReBOKuIDDepwhWk7jZC0RTdopnAYKh”&lt;/p&gt;

&lt;p&gt;LEVEL-6&lt;br&gt;
In this level there are many directories and in each directory there are many files which makes it not an easy task. So I googled “finding the files by size in ssh” and found an article which helped me a lot with which I found the password to the next level.&lt;br&gt;
The password is- “DXjZPULLxYr17uwoI01bNLQbtFemEgo7”&lt;/p&gt;

&lt;p&gt;LEVEL-7&lt;br&gt;
This level was somewhat easy compared to other levels. &lt;br&gt;
Same as previous level we should filter them with given properties which shows denial of permissions for most of the files. In that we can find a file with “bandit7.password” with its location. With which we can open the file and find the password&lt;br&gt;
The password is- “HKBPTKQnIay4Fw76bEy8PVxKEDQRKTzs”&lt;/p&gt;

&lt;p&gt;LEVEL-8&lt;br&gt;
When we open the “data.txt” file in the directory we will find more names next to the various passwords. It isn’t a easy task to find the word “millionth”. Here we can use the greg command and find the password next to the word “millionth”.&lt;br&gt;
The password is- “cvX2JJa4CFALtqS87jk27qwqGhBM9plV”&lt;/p&gt;

&lt;p&gt;LEVEL-9&lt;br&gt;
When we open the “data.txt” file in the directory we will find various passwords. With “sort data.txt” command we can sort them and with “uniq -c” we can find how many times each line of text from which we can find the one which only occurred only once.&lt;br&gt;
The password is- “UsvVyFSfZZWbi6wgC7dAFyFuR6jQQUhR”&lt;/p&gt;

&lt;p&gt;Level-10&lt;br&gt;
When we open the “data.txt” file in the directory we will find various passwords not only with letters but also with some binary characters,symbols etc. We can use the greg function to find the symbol- “=” among those strings.&lt;br&gt;
The password is- “truKLdjsbJ5g7yyJ2X2R0o3a5HQJFuLk”&lt;/p&gt;

</description>
      <category>bash</category>
      <category>terminal</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
