backend-cheats/README_ENG.md
2022-12-02 23:19:32 +03:00

84 KiB
Raw Blame History

Logo

This repository is a visual cheatsheet on the main topics in Backend-development. All the material is divided into topics and subtopics. The structure of the material consists of three parts:

  • Visual part - various images/tables/cheatsheets for better understanding (may not be available). All pictures and tables are made from scratch, specifically for this repository.
  • Summary - A very brief summary with a list of key terms and concepts. The terms are hyperlinked to the appropriate section on Wikipedia or a similar reference resource.
  • References to sources - resources where you may find complete information on a particular issue. If possible, the most authoritative sources are indicated, or those that provide information in as simple and comprehensible language as possible.

🛠 The repository is under active development, so it is constantly updated and supplemented

🤝 If you want to help the project, feel free to send your Pull requests

📝 Translation into English is in progress

Contents

1. Network & Internet
2. PC device
3. Linux Basics
4. General knowledge
5. Programming Language
6. Databases
7. API development
8. Software
9. Security
10. Testing
11. Optimization
12. Documentation
13. Building Architecture

Additional and similar resources

Network & Internet

Internet is a worldwide system that connects computer networks from around the world into a single network for storing/transferring information. The Internet was originally developed for the military. But soon it began to be implemented in universities, and then it could be used by private companies, which began to organize networks of providers that provide Internet access services to ordinary citizens. By early 2020, the number of Internet users exceeded 4.5 billion.

  • How the Internet works

    Internet

    Your computer has never been directly connected to the Internet. Because it can only see its local network to which other devices are connected via wired (Ethernet) or wirelessly (Wi-Fi, Bluetooth). To communicate with the Internet, you have a special minicomputer in your local network - router. It then connects you to Internet Service Provider which in turn connects to other higher-level providers. Thus, your message, transits through the network of several ISPs before reaching the destination network.

    The Internet is just a long wire to which a small number of Tier 1 providers are directly connected. The ISPs below that are just renting access.

    • Host

      Any device that is on any network.

    • Server

      A special computer on the network that serves requests from other computers.

🔗 References
  1. 📄 How does the Internet work? MDN
  2. 📺 How does the internet work? (Full Course) YouTube
  • What is a domain name

    Domain name

    Domain Names are human-readable addresses of web servers available on the Internet. They consist of parts (levels) separated from each other by a dot. Each of these parts provides specific information about the domain name. For example country, service name, localization, etc.

    • Who owns domain names

      The ICANN Corporation is the founder of the distributed domain registration system. It gives accreditations to companies that want to sell domains. In this way a competitive domain market is formed.

    • How to buy a domain name

      A domain name cannot be bought forever. It is leased for a certain period of time. It is better to buy domains from accredited registrars (you can find them in almost any country).

🔗 References
  1. 📄 What is a Domain Name? MDN
  2. 📺 A Beginners Guide to How Domain Names Work! YouTube
  • IP address

    IPv4-IPv6

    IP address is a unique numeric address that is used to recognize a particular device on the network.

    • Levels of visibility
      • External and publicly accessible IP address that belongs to your ISP and is used to access the Internet by hundreds of other users.
      • The IP address of your router in your ISP's local network, the same IP address from which you access the Internet.
      • The IP address of your computer in the local (home) network created by the router, to which you can connect your devices. Typically, it looks like 192.168.XXX.XXX.
      • The internal IP address of the computer, inaccessible from the outside and used only for communication between the running processes. It is the same for everyone - 127.0.0.1 or just localhost.
    • Port

      One device (computer) can run many applications that use the network. In order to correctly recognize where and which data coming over the network should be delivered (to which of the applications) a special numerical number - a port is used. That is, each running process on a computer which uses a network connection has its own personal port.

    • IPv4

      Version 4 of the IP protocol. It was developed in 1981 and limits the address space to about 4.3 billion (2^32) possible unique addresses.

    • IPv6

      Over time, the allocation of address space began to happen at a much faster rate, forcing the creation of a new version of the IP protocol to store more addresses. IPv6 is capable of issuing 2^128 (is huge number) unique addresses.

🔗 References
  1. 📺 IP addresses. Explained YouTube
  2. 📺 Public IP vs. Private IP and Port Forwarding (Explained by Example) YouTube
  3. 📺 What is IP address and types of IP address - IPv4 and IPv6 YouTube
  • What is DNS

    DNS

    DNS (Domain Name System) is a decentralized Internet address naming system that allows you to create human-readable alphabetic names (domain names) corresponding to the numeric IP addresses used by computers.

🔗 References
  1. 📄 What is DNS? Domain Name System explained freeCodeCamp
  2. 📺 DNS (Domain Name System) explained. Types of Domain Name Servers YouTube
  3. 📺 DNS as Fast As Possible YouTube
  • Web application design

    Modern web applications consist of two parts: Frontend and Backend. Thus implementing a client-server model.

    The tasks of the Frontend are:

    • Implementation of the user interface (appearance of the application)

      A special markup language HTML is used to create web pages.
      > CSS style language is used to style fonts, layout of content, etc.
      > JavaScript programming language is used to add dynamics and interactivity.
      As a rule, these tools are rarely used in their pure form, as so-called frameworks and preprocessors exist for more convenient and faster development.

    • Creating functionality for generating requests to the server

      These are usually different types of input forms that can be conveniently interacted with.

    • Receives data from the server and then processes it for output to the client

    Tasks of the Backend:

    • Handling client requests

      Checking for permissions and access, all sorts of validations, etc.

    • Implementing business logic

      A wide range of tasks can be implied here: working with databases, information processing, computation, etc. This is, so to speak, the heart of the Backend world. This is where all the important and interesting stuff happens.

    • Generating a response and sending it to the client
🔗 References
  1. 📄 Front-End vs. Back-End explained
  2. 📺 Everything You NEED to Know About WEB APP Architecture YouTube
  • Browsers and how they work

    Browser

    Browser is a client which can be used to send requests to a server for files which can then be used to render web pages. In simple terms, a browser can be thought of as a program for viewing HTML files, which can also search for and download them from the Internet.

🔗 References
  1. 📄 How browsers work MDN
  2. 📄 How browsers work: Behind the scenes of modern web browsers web.dev
  3. 📺 What is a web browser? YouTube
  4. 📺 Anatomy of the browser 101 (Chrome University 2019) YouTube
  • VPN and Proxy

    Proxy & VPN

    The use of VPNs and Proxy is quite common in recent years. With the help of these technologies, users can get basic anonymity when surfing the web, as well as bypass various regional blockages.

    • VPN (Virtual Private Network)

      A technology that allows you to become a member of a private network (similar to your local network), where requests from all participants go through a single public IP address. This allows you to blend in with the general mass of requests from other participants.

      • Simple procedure for connection and use.
      • Reliable traffic encryption.
      • There is no guarantee of 100% anonymity, because the owner of the network knows the IP-addresses of all participants.
      • VPNs are useless for dealing with multi-accounts and some programs because all accounts operating from the same VPN are easily detected and blocked.
      • Free VPNs tend to be heavily loaded, resulting in unstable performance and slow download speeds.
    • Proxy (proxy server)

      A proxy is a special server on the network that acts as an intermediary between you and the destination server you intend to reach. When you are connected to a proxy server all your requests will be performed on behalf of that server, that is, your IP address and location will be substituted.

      • The ability to use an individual IP address, which allows you to work with multi-accounts.
      • Stability of the connection due to the absence of high loads.
      • Connection via proxy is provided in the operating system and browser, so no additional software is required.
      • There are proxy varieties that provide a high level of anonymity.
      • The unreliability of free solutions, because the proxy server can see and control everything you do on the Internet.
🔗 References
  1. 📄 What is VPN? How It Works, Types of VPN kaspersky.com
  2. 📺 What Is a Proxy and How Does It Work? YouTube
  3. 📺 Proxy vs. Reverse Proxy (Explained by Example) YouTube
  4. 📺 VPN vs Proxy Explained Pros and Cons YouTube
  • Hosting

    Hosting

    Hosting is a special service provided by hosting providers, which allows you to rent space on a server (which is connected to the Internet around the clock), where your data and files can be stored. There are different options for hosting, where you can use not only the disk space of the server, but also the CPU power to run your network applications.

    • Virtual hosting

      One physical server that distributes its resources to multiple tenants.

    • VPS/VDS

      Virtual servers that emulate the operation of a separate physical server and are available for rent to the client with maximum privileges.

    • Dedicated server

      Renting a full physical server with full access to all resources. As a rule, this is the most expensive service.

    • Cloud hosting

      A service that uses the resources of several servers. When renting, the user pays only for the actual resources used.

    • Colocation

      A service that gives the customer the opportunity to install their equipment on the provider's premises.

🔗 References
  1. 📄 What is Web Hosting? namecheap.com
  2. 📺 What is Web Hosting and How Does It Work? YouTube
  3. 📺 Different Hosting Types Explained YouTube
  • OSI network model

    Level Used protocols
    7 Application layer HTTP, DNS, FTP, POP3
    6 Presentation layer SSL, SSH, IMAP, JPEG
    5 Session layer APIs Sockets
    4 Transport layer TCP, UDP
    3 Network layer IP, ICMP, IGMP
    2 Data link layer Ethernet, MAC, HDLC
    1 Physical layer RS-232, RJ45, DSL
    • Physical layer

      At this level, bits (ones/zeros) are encoded into physical signals (current, light, radio waves) and transmitted further by wire (Ethernet) or wirelessly (Wi-Fi).

    • Data link layer

      Physical signals from layer 1 are decoded back into ones and zeros, errors and defects are corrected, and the sender and receiver MAC addresses are extracted.

    • Network layer

      This is where traffic routing, DNS queries and IP packet generation take place.

    • Transport layer

      The layer responsible for data transfer. There are two important protocols:

      • TCP is a protocol that ensures reliable data transmission. TCP guarantees data delivery and preserves the order of the messages. This has an impact on the transmission speed. This protocol is used where data loss is unacceptable, such as when sending mail or loading web pages.
      • UDP is a simple protocol with fast data transfer. It does not use mechanisms to guarantee the delivery and ordering of data. It is used e.g. in online games where partial packet loss is not crucial, but the speed of data transfer is much more important. Also, requests to DNS servers are made through UDP protocol.
    • Session layer

      Responsible for opening and closing communications (sessions) between two devices. Ensures that the session stays open long enough to transfer all necessary data, and then closes quickly to avoid wasting resources.

    • Presentation layer

      Transmission, encryption/decryption and data compression. This is where data that comes in the form of zeros and ones are converted into desired formats (PNG, MP3, PDF, etc.)

    • Application layer

      Allows the user's applications to access network services such as database query handler, file access, email forwarding.

🔗 References
  1. 📄 Layers of OSI Model geeksForGeeks
  2. 📺 The OSI Model - Explained by Example YouTube
  3. 📺 TCP vs UDP Crash Course YouTube
  • HTTP Protocol

    HTTP (HyperText Transport Protocol) is the most important protocol on the Internet. It is used to transfer data of any format. The protocol itself works according to a simple principle: request -> response.

    HTTP

    • Headers

      Additional service information that is sent with the request/response.
      Common headers: Host, User-Agent, If-Modified-Since, Cookie, Referer, Authorization, Cache-Control, Content-Type, Content-Length, Last-Modified, Set-Cookie, Content-Encoding.

    • Request methods

      GET - data retrieval request
      POST - request with data to create a new record
      PUT - request with data to change existing record
      DELETE - deletion request
      Others: HEAD, CONNECT, OPTIONS, TRACE, PATCH.

    • Response status codes

      Each response from the server has a special numeric code that characterizes the state of the sent request. These codes are divided into 5 main classes:

      • 1хх - service information
      • 2хх - successful request
      • 3хх - redirect to another address
      • 4хх - client side error
      • 5хх - server side error
    • HTTPS

      Same HTTP, but with encryption support

    • Cookie

      Because the HTTP protocol does not allow you to save any information about the status of previous requests/responses, you need to use cookies. Cookies allow the server to store various information on the client side, which the client can then send back to the server. In particular, cookies can be used for authorization or to save various settings/configurations.

    • CORS (Cross origin resource sharing)

      A technology that allows one domain to securely receive data from another domain.

    • CSP (Content Security Policy)

      A special header that allows you to recognize and eliminate certain types of web application vulnerabilities.

    • HTTP/1.0 vs HTTP/1.1 vs HTTP/2

      The main innovation in version 1.1 is the permanent connection mode, which allows you to send several requests per connection. In version 2, the protocol became binary, with the ability to transmit data from multiple streams on the same channel.

🔗 References
  1. 📄 How HTTP Works and Why it's Important freeCodeCamp
  2. 📄 Hypertext Transfer Protocol (HTTP) MDN
  3. 📺 Hyper Text Transfer Protocol Crash Course YouTube
  4. 📄 HTTP vs HTTPS What's the Difference? freeCodeCamp
  5. 📺 HTTP Cookies Crash Course YouTube
  6. 📺 Cross Origin Resource Sharing (Explained by Example) YouTube
  7. 📺 When to use HTTP GET vs POST? YouTube
  8. 📺 How HTTP/2 Works, Performance, Pros & Cons and More YouTube
  9. 📺 HTTP/2 Critical Limitation that led to HTTP/3 & QUIC YouTube
  10. 📺 304 Not Modified HTTP Status (Explained with Code Example and Pros & Cons) YouTube
  11. 📺 What is the Largest POST Request the Server can Process? YouTube
  • TCP/IP stack

    TCP/IP

    Compared to the OSI model, the TCP/IP stack has a simpler architecture. It is widely used and was first used as the basis for the creation of a global network, and then to describe the workings of the Internet.

🔗 References
  1. 📄 What is the TCP/IP Model? Layers and Protocols Explained freeCodeCamp
  2. 📺 What is TCP/IP? YouTube
  3. 📺 How TCP really works. Three-way handshake. TCP/IP Deep Dive YouTube
  • Network problems

    Problems

    The quality of networks, much less the Internet, is far from ideal. This is due to the complex and dispersed network structure in different devices. Therefore, on the functioning of the network affects a huge number of factors. For example: the stability of the connection between the client device and its router, the quality of service of the provider, the power and performance of the server, the physical distance between the client and the server, etc.

    • Latency

      The time it takes for a data packet to travel from sender to receiver. It depends more on the physical distance.

    • Packet loss

      Not all packets traveling over the network can reach their destination. This happens most often when using wireless networks or due to network congestion.

    • Round Trip Time (RTT)

      The time it takes for the data packet to reach its destination + the time to respond that the packet was received successfully.

    • Jitter

      Delay fluctuations, unstable ping (for example, 50ms, 120ms, 35ms...).

    • Packet reordering

      The IP protocol does not guarantee that packets are delivered in the order in which they are sent.

🔗 References
  1. 📄 Understanding latency MDN
  2. 📺 What is latency? What affects latency? YouTube
  3. 📺 Basics of network bandwidth, latency, and jitter YouTube
  4. 📺 Round Trip Time (RTT) YouTube
  5. 📺 What Causes Packet Loss and How to Eliminate It In Your Network YouTube
  • Network diagnostics

    Traceroute

    • Traceroute

      A procedure that allows you to trace to which nodes, with which IP addresses, a packet you send before it reaches its destination. Tracing can be used to identify computer network related problems and to examine/analyze the network.

    • Ping scan

      The easiest way to check the server for performance.

    • Checking for packet loss

      Due to dropped connections, not all packets sent over the network reach their destination.

    • Wireshark

      A powerful program with a graphical interface for analyzing all traffic that passes through the network in real time.

🔗 References
  1. 📺 How does traceroute work? YouTube
  2. 📺 Traceroute (tracert) Explained - Network Troubleshooting YouTube
  3. 📺 Nmap - Host Discovery With Ping Sweep YouTube
  4. 📺 Internet Troubleshooting - Pathping Packet Loss YouTube
  5. 📺 Wireshark crash course (playlist) YouTube

PC device

  • Main components (hardware)

    • Motherboard

      The most important PC component to which all other elements are connected.

      • Chipset - set of electronic components that responsible for the communication of all motherboard components.
      • CPU socket - socket for mounting the processor.
      • VRM (Voltage Regulator Module) module that converts the incoming voltage (usually 12V) to a lower voltage to run the processor, integrated graphics, memory, etc.
      • Slots for RAM.
      • Expansion slots PCI-Express - designed for connection of video cards, external network/sound cards.
      • Slots М.2 / SATA - designed to connect hard disks and SSDs.
    • CPU (Central processing unit)

      The most important device that executes instructions (programme code). Processors only work with 1 and 0, so all programmes are ultimately a set of binary code.

      • Registers - the fastest memory in a PC, has an extremely small capacity, is built into the processor and is designed to temporarily store the data being processed.
      • Cache - slightly less fast memory, which is also built into the processor and is used to store a copy of data from frequently used cells in the main memory.
      • Processors can have different architectures. Currently, the most common are the x86 architecture (desktop and laptop computers) and ARM (mobile devices as well as the latest Apple computers).
    • RAM (Random-access memory)

      Fast, low capacity memory (4-16GB) designed to temporarily store program code, as well as input, output and intermediate data processed by the processor.

    • Data storage

      Large capacity memory (256GB-1TB) designed for long-term storage of files and installed programmes.

    • GPU (Graphics card)

      A separate card that translates and processes data into images for display on a monitor. This device is also called a discrete graphics card. Usually needed for those who do 3D modelling or play games.
      > Built-in graphics card is a graphics card built into the processor. It is suitable for daily work.

    • Network card

      A device that receives and transmits data from other devices connected to the local network.

    • Sound card

      A device that allows you to process sound, output it to other devices, record it with a microphone, etc.

    • Power supply unit

      A device designed to convert the AC voltage from the mains to DC voltage.

🔗 References
  1. 📄 Everything You Need to Know About Computer Hardware
  2. 📺 What does what in your computer? Computer parts Explained YouTube
  3. 📺 The Fetch-Execute Cycle: What's Your Computer Actually Doing? YouTube
  4. 📺 How a CPU Works in 100 Seconds // Apple Silicon M1 vs Intel i9 YouTube
  5. 📺 Arm vs x86 - Key Differences Explained YouTube
  • Operating system design

    OS

    Operating system (OS) is a comprehensive software system designed to manage a computer's resources. With operating systems, people do not have to deal directly with the processor, RAM or other parts of the PC.

    OS can be thought of as an abstraction layer that manages the hardware of a computer, thereby providing a simple and convenient environment for user software to run.

    • Main features
      • RAM management (space allocation for individual programms)
      • Loading programms into RAM and their execution
      • Execution of requests from user's programms (inputting and outputting data, starting and stopping other programms, freeing up memory or allocating additional memory, etc.)
      • Interaction with input and output devices (mouse, keyboard, monitor, etc.)
      • Interaction with storage media (HDDs and SSDs)
      • Providing a user's interface (console shell or graphical interface)
      • Logging of software errors (saving logs)
    • Additional functions (may not be available in all OSs)
      • Organise multitasking (simultaneous execution of several programms)
      • Delimiting access to resources for each process
      • Inter-process communication (data exchange, synchronisation)
      • Organise the protection of the operating system itself against other programms and the actions of the user
      • Provide multi-user mode and differentiate rights between different OS users (admins, guests, etc.)
    • OS kernel

      The central part of the operating system which is used most intensively. The kernel is constantly in memory, while other parts of the OS are loaded into and unloaded from memory as needed.

    • Bootloader

      The system software that prepares the environment for the OS to run (puts the hardware in the right state, prepares the memory, loads the OS kernel there and transfers control to it (the kernel).

    • Device drivers

      Special software that allows the OS to work with a particular piece of equipment.

🔗 References
  1. 📄 What is an OS? Operating System Definition for Beginners freeCodeCamp
  2. 📄 Windows vs MacOS vs Linux Operating System Handbook freeCodeCamp
  3. 📺 Operating Systems: Crash Course Computer Science YouTube
  4. 📺 Operating System Basics YouTube
  5. 📺 Operating System in deep details (playlist) YouTube
  • Processes and threads

    Process

    • Process

      A kind of container in which all the resources needed to run a program are stored. As a rule, the process consists of:

      • Executable program code
      • Input and output data
      • Call stack (order of instructions for execution)
      • Heap (a structure for storing intermediate data created during the process)
      • Segment descriptor
      • File descriptor
      • Information about the set of permissible powers
      • Processor status information
    • Thread

      An entity in which sequences of program actions (procedures) are executed. Threads are within a process and use the same address space. There can be multiple threads in a single process, allowing multiple tasks to be performed. These tasks, thanks to threads, can exchange data, use shared data or the results of other tasks.

🔗 References
  1. 📺 Difference Between Process and Thread YouTube
  2. 📺 How Do CPUs Use Multiple Cores YouTube
  3. 📺 What is Hyper Threading Technology YouTube
  • Concurrency and parallelism

    Concurrency-parallelism

    • Parallelism

      The ability to perform multiple tasks simultaneously using multiple processor cores, where each individual core performs a different task.

    • Concurrency

      The ability to perform multiple tasks, but using a single processor core. This is achieved by dividing tasks into separate blocks of commands which are executed in turn, but switching between these blocks is so fast that for users it seems as if these processes are running simultaneously.

🔗 References
  1. 📄 Concurrency, parallelism, and the many threads of Santa Claus freeCodeCamp
  2. 📺 Concurrency vs Parallelism YouTube
  3. 📺 Concurrency is not Parallelism by Rob Pike YouTube
  • Inter-process communication

    A mechanism which allows to exchange data between threads of one or different processes. Processes can be run on the same computer or on different computers connected by a network. Inter-process communication can be done in different ways.

    • File

      The easiest way to exchange data. One process writes data to a certain file, another process reads the same file and thus receives data from the first process.

    • Signal (IPC)

      Asynchronous notification of one process about an event which occurred in another process.

    • Network socket

      In particular, IP addresses and ports are used to communicate between computers using the TCP/IP protocol stack. This pair defines a socket (socket corresponding to the address and port).

    • Semaphore

      A counter over which only 2 operations can be performed: increasing and decreasing (and for 0 the decreasing operation is blocked).

    • Message passing & Message queue
    • Pipelines

      Redirecting the output of one process to the input of another (similar to a pipe).

🔗 References
  1. 📄 Interprocess Communications Microsoft
  2. 📺 Interprocess Communication YouTube
  3. 📺 Inter Process Communication YouTube

Linux Basics

Operating systems based on Linux kernel are the standard in the world of server development, since most servers run on such operating systems. Using Linux on servers is profitable because it is free.

There are a huge number of Linux distributions (preinstalled software bundles) to suit all tastes. One of the most popular is Ubuntu. This is where you can start your dive into server development.

Install Ubuntu on a separate PC or laptop. If this is not possible, you can use a special program Virtual Box where you can run other OS on top of the main OS. You can also run Docker Ubuntu image container (Docker is a separate topic that is exists in this repository).

  • Working with the terminal

    Terminal is a program that uses special text commands to control your computer. Generally, servers do not have graphical interfaces, so you will definitely need terminal skills.

    • Basic commands for navigating the file system
      ls # list directory contents
      cd <path> # go to specified directory
      cd .. # move to a higher level (to the parent directory)
      touch <file> # create a file
      cat > <file> # enter text into the file (overwrite)
      cat >> <file> # enter text at the end of the file (append)
      cat/more/less <file> # to view the file contents
      head/tail <file> # view the first/last lines of a file
      pwd # print path to current directory
      mkdir <name> # create a directory
      rmdir <name> # delete a directory
      cp <file> <path> # copy a file or directory
      mv <file> <path># moving or renaming
      rm <file> # deleting a file or directory
      find <string># file system search
      du <file># output file or directory size
      
    • Commands for help information
      man <command> # allows you to view a manual for any command
      apropos <string> # search for a command with a description that has a specified word
      man -k <string> # similar to the command above
      whatis <command> # a brief description of the command
      
    • Super user rights

      Analogue to running as administrator in Windows

      sudo <command> # executes a command with superuser privileges
      
    • Text editor

      Study any in order to read and edit files freely through the terminal. The easiest nano. The most advanced Vim.

🔗 References
  1. 📄 31 Linux Commands Every Ubuntu User Should Know
  2. 📄 The Linux Command Handbook freeCodeCamp
  3. 📺 The 50 Most Popular Linux & Terminal Commands YouTube
  4. 📺 Nano Editor Fundamentals YouTube
  5. 📺 Vim Tutorial for Beginners YouTube
  • Package manager

    The Package Manager is a utility that allows you to install/update software packages from the terminal.

    Linux distributions can be divided into several groups, depending on which package manager they use: apt (in Debian based distributions), RPM (the Red Hat package management system) and Pacman (the package manager in Arch-like distributions)

    Ubuntu is based on Debian, so it uses apt (advanced packaging tool) package manager.

    • Basic Commands
      apt install <package> # install the package
      apt remove <package> # remove the package, but keep the configuration
      apt purge <package> # remove the package along with the configuration
      apt update # update information about new versions of packages
      apt upgrade # update the packages installed in the system
      apt list --installed # list of packages installed on the system
      apt list --upgradable # list of packages that need to be updated
      apt search <package> # searching for packages by name on the network
      apt show <package> # package information
      
🔗 References
  1. 📺 Linux Crash Course - The apt Command YouTube
  2. 📺 Linux Package Management | Debian, Fedora, and Arch Linux YouTube
  3. 📄 sudo apt-get update vs upgrade What is the Difference? freeCodeCamp
  • Bash scripts

    You can use scripts to automate the sequential input of any number of commands. In Bash you can create different conditions (branching), loops, timers, etc. to perform all kinds of actions related to console input.

    • Basics of Bash Scripts

      The most basic and frequently used features such as: variables, I/O, loops, conditions, etc.

    • Practice

      Solve challenges on sites like HackerRank and Codewars. Start using Bash to automate routine activities on your computer. If you're already a programmer, create scripts to easily build your project, to install settings, and so on.

    • ShellCheck script analysis tool

      It will point out possible mistakes and teach you best practices for writing really good scripts.

    • Additional resources

      Repositories such as awesome bash and awesome shell have entire collections of useful resources and tools to help you develop even more skills with Bash and the terminal in general.

🔗 References
  1. 📄 Shell Scripting for Beginners freeCodeCamp
  2. 📺 Bash Scripting Full Course 3 Hours YouTube
  • Users and groups

    Linux-based operating systems are multi-user. This means that several people can run many different applications at the same time on the same computer. For the Linux system to be able to "recognize" a user, he must be logged in and therefore each user must have a unique name and a secret password.

    • Working with users
      useradd <name> [flags] # create a new user
      passwd <name> # set a password for the user
      usermod <name> [flags] # edit a user
      usermod -L <name> # block a user
      usermod -U <name> # unblock a user
      userdel <name> [flags] # delete a user
      
    • Working with groups
      groupadd <group> [flags] # create a group
      groupmod <group> [flags] # edit group
      groupdel <group> [flags] # delete group
      usermod -a -G <groups> <user> # add a user to groups
      gpasswd --delete <user> <groups> # remove a user from groups
      
    • System files
      /etc/passwd # a file containing basic information about users
      /etc/shadow # a file containing encrypted passwords
      /etc/group # a file containing basic information about groups
      /etc/gshadow # a file containing encrypted group passwords
      
🔗 References
  1. 📄 Managing Users, Groups and Permissions in Linux
  2. 📄 Linux User Groups Explained freeCodeCamp
  3. 📺 Linux Users and Groups YouTube
  • Permissions

    chmod

    In Linux, it is possible to share privileges between users, limit access to unwanted files or features, control available actions for services, and much more. In Linux, there are only three kinds of rights - read, write and execute - and three categories of users to which they can be applied - file owner, file group and everyone else.

    • Basic commands for working with rights
      chown <user> <file> # changes the owner and/or group for the specified files
      chmod <rights> <file> # changes access rights to files and directories
      chgrp <group> <file> # allows users to change groups
      
    • Extended rights SUID and GUID, sticky bit
    • ACL (Access control list)

      An advanced subsystem for managing access rights.

🔗 References
  1. 📄 An Introduction to Linux Permissions Digital Ocean
  2. 📺 Understanding File & Directory Permissions YouTube
  • Working with processes

    Linux processes can be described as containers in which all information about the state of a running program is stored. If a program hangs and you need to restore it, then you need the skills to manage the processes.

    • Basic Commands
      ps # display a snapshot of the processes of all users
      top # real-time task manager
      <command> & # running the process in the background, (without occupying the console)
      jobs # list of processes running in the background
      fg <PID> # return the process back to the active mode by its number
      bg <PID> # start a stopped process in the background
      kill <PID> # terminate the process by PID
      killall <programm> # terminate all processes related to one program
      
🔗 References
  1. 📄 How to Show Process Tree in Linux
  2. 📄 How To Use ps, kill, and nice to Manage Processes in Linux Digital Ocean
  3. 📺 Linux processes, init, fork/exec, ps, kill, fg, bg, jobs YouTube
  • Working with SSH

    SSH allows remote access to another computer's terminal. In the case of a personal computer, this may be needed to solve an urgent problem, and in the case of a server, it is generally the primary method of connection.

    • Basic commands
      apt install openssh-server # installing SSH (out of the box almost everywhere)
      service ssh start # start SSH
      service ssh stop # stop SSH
      ssh -p <port> user@remote_host # connecting to a remote PC via SSH
      ssh-keygen -t rsa # RSA key generation for passwordless login
      ssh-copy-id -i ~/.ssh/id_rsa user@remote_host # copying a key to a remote machine
      
🔗 References
  1. 📄 What the hell is SSH?
  2. 📺 Learn SSH In 6 Minutes - Beginners Guide to SSH Tutorial YouTube
  • Task Scheduler

    cron

    Schedulers allow you to flexibly manage the delayed running of commands and scripts. Linux has a built-in cron scheduler that can be used to easily perform necessary actions at certain intervals.

    • Main commands

      crontab -e # edit the crontab file of the current user
      crontab -l # output the contents of the current schedule file
      crontab -r # deleting the current schedule file
      
    • Config files

      /etc/crontab # base config
      /etc/cron.d/ # crontab files used to manage the entire system
      
      # config files for automatically run programs:
      /etc/cron.daily/ # every day
      /etc/cron.weekly/ # every week
      /etc/cron.monthly/ # every month
      
🔗 References
  1. 📄 How to schedule and manage tasks using crontab dev.to
  2. 📺 Cron Jobs For Beginners | Linux Task Scheduling YouTube
  • System logs

    Log files are special text files that contain all information about the operation of a computer, program, or user. They are especially useful when bugs and errors occur in the operation of a program or server. It is recommended to periodically review log files, even if nothing suspicious happens.

    • Main log files
      /var/log/syslog или /var/log/messages # information about the kernel,
      # various services detected, devices, network interfaces, etc.
      /var/log/auth.log или /var/log/secure # user authorization information
      /var/log/faillog # failed login attempts
      /var/log/dmesg # information about device drivers
      /var/log/boot.log # operating system boot information
      /var/log/cron # cron task scheduler report
      
    • lnav utility

      Designed for easy viewing of log files (highlighting, reading different formats, searching, etc.)

    • Log rotation with logrotate

      Allows you to configure automatic deletion (cleaning) of log files so as not to clog memory.

    • Demon journald

      Collects data from all available sources and stores it in binary format for convenient and dynamic control

🔗 References
  1. 📺 Linux Crash Course - Understanding Logging YouTube
  • Linux problems

    • Problems with commands in the terminal

      Occur due to erroneous actions of the user. Often associated with typos, lack of rights, incorrectly specified options, etc.

    • Driver problems

      All free Linux drivers are built right into its kernel. Therefore, everything should work "out of the box" after installing the system (problems may occur with brand new hardware which has just been released on the market). Drivers whose source code is closed are considered proprietary and are not included in the kernel but are installed manually (like Nvidia graphics drivers).

    • Problems with kernel

      Kernel panic can occur due to an error when mounting the root file system. This is best helped by the skill of reading the logs to find problems (dmesg command).

    • Segmentation fault

      Occurs when a process accesses invalid memory locations.

    • Disk and file system problems

      Can occur due to lack of space.

🔗 References

General knowledge

  • Numeral systems

    Numeral system is a set of symbols and rules for denoting numbers. In computer science, it is customary to distinguish four main number systems: binary, octal, decimal, and hexadecimal. It is connected, first of all, with their use in various branches of programming.

    • Binary number

      The most important system for computing technology. Its use is justified by the fact that the logic of the processor is based on only two states (on/off, open/closed, high/low, true/false, yes/no, high/low).

    Binary

    • Octal

      It is used e.g. in Linux systems to grant access rights.

    Octal

    • Decimal

      A system that is easy to understand for most people.

    • Hexadecimal

      The letters A, B, C, D, E, F are additionally used for recording. It is widely used in low-level programming and computer documentation because the minimum addressable memory unit is an 8-bit byte, the values of which are conveniently written in two hexadecimal digits.

    Hex

    • Translation between different number systems

      You can try online converter for a better understanding.

🔗 References
  1. 📺 Number Systems Introduction - Decimal, Binary, Octal & Hexadecimal YouTube
  2. 📄 Number System in Maths GeeksGorGeeks
  • Logical connective

    Logical connective are widely used in programming to check various conditions. The result of a logical expression is always truth or false.

    Logic

🔗 References
  1. 📺 Logical Operators Negation, Conjunction & Disjunction YouTube
  2. 📺 Logical Operators Exclusive OR YouTube
  • Data structures

    Data structures are containers in which data is stored according to certain rules. Depending on these rules, the data structure will be effective in some tasks and ineffective in others. Therefore, it is necessary to understand when and where to use this or that structure.

    • Array

      A data structure that allows you to store data of the same type, where each element is assigned a different sequence number.

    Array

    • Linked list

      A data structure where all elements, in addition to the data, contain references to the next and/or previous element. There are 3 varieties:

      • A singly linked list is a list where each element stores a link to the next element only (one direction).
      • A doubly linked list is a list where the items contain links to both the next item and the previous one (two directions).
      • A circular linked list is a kind of bilaterally linked list, where the last element of the ring list contains a pointer to the first and the first to the last.

    Linked list

    • Stack

      Structure where data storage works on the principle of last in - first out (LIFO).

    Stack

    • Queue

      Structure where data storage is based on the principle of first in - first out (FIFO).

    Queue

    • Hash table

      In other words, it is an associative array. Here, each of the elements is accessed with a corresponding key value, which is calculated using hash function according to a certain algorithm.

    Hash Table

    • Tree

      Structure with a hierarchical model, as a set of related elements, usually not ordered in any way.

    Tree

    • Heap

      Similar to the tree, but in the heap, the items with the largest key is the root node (max-heap). But it may be the other way around, then it is a min heap.

    Heap

    • Graph

      A structure that is designed to work with a large number of links.

    Graph

🔗 References
  1. 📺 CS50 2022 - Lecture about Data Structures YouTube
  2. 📺 Data Structures Easy to Advanced Course YouTube
  3. 📄 Free courses to learn data structures and algorithms in depth freeCodeCamp
  4. 📄 Data Structures: collection of topics GeeksForGeeks
  • Basic algorithms

    Algorithms refer to sets of sequential instructions (steps) that lead to the solution of a given problem. Throughout human history, a huge number of algorithms have been invented to solve certain problems in the most efficient way. Accordingly, the correct choice of algorithms in programming will allow you to create the fastest and most resource-intensive solutions.

    There is a very good book on algorithms for beginners Grokking algorithms. You can start learning a programming language in parallel with it.

    • Binary search

      Maximum efficient search algorithm for sorted lists.

    • Selection sort

      At each step of the algorithm, the minimum element is searched for and then swapped with the current iteration element.

    • Recursion

      When a function can call itself and so on to infinity. On the one hand, recursion-based solutions look very elegant, but on the other hand, this approach quickly leads to stack overflow and is recommended to be avoided.

    • Bubble sort

      At each iteration neighboring elements are sequentially compared, and if the order of the pair is wrong, the elements are swapped.

    • Quicksort

      Improved bubble sorting method.

    • Breadth-first search

      Allows to find all shortest paths from a given vertex of the graph.

    • Dijkstra's algorithm

      Finds the shortest paths between all vertices of a graph and their length.

    • Greedy algorithm

      An algorithm that at each step makes locally the best choice in the hope that the final solution will be optimal.

🔗 References
  1. 📄 Code for the book Grokking Algorithms GitHub
  2. 📺 Algorithms and Data Structures Tutorial YouTube
  3. 📄 Largest open-source algorithm library
  • Algorithm complexity

    BigO

    In the world of programming there is a special unit of measure Big O (or O-notation). It describes how the complexity of an algorithm increases with the amount of input data. Big O estimates how many actions (steps/iterations) it takes to execute the algorithm, while always showing the worst case scenario.

    • Varieties of algorithm complexity
      • Constant - O(1)
      • Linear - O(n)
      • Logarithmic - O(log n)
      • Linearimetric - O(n * log n)
      • Quadratic - O(n^2)
      • Stepwise - О(2^n)
      • Factorical - O(!n)
🔗 References
  1. 📄 Big O Algorithm Complexity cheatsheet
  2. 📺 Big O Notation - Full Course YouTube
  • Data storage formats

    Different file formats can be used to store and transfer data over the network. Text files are human-readable, so they are used for configuration files, for example. But transferring data in text formats over the network is not always rational, because they weigh more than their corresponding binary files.

🔗 References
  1. 📺 Data Formats: XML, JSON, and YAML YouTube
  2. 📺 Serialization formats: JSON and Protobuf YouTube
  3. 📺 Protocol Buffers Crash Course YouTube
  • Text encodings

    Computers work only with numbers, or more precisely, only with 0 and 1. It is already clear how to convert numbers from different number systems to binary. But you can't do that with text. That's why special tables called encodings were invented, in which text characters are assigned numeric equivalents.

    • ASCII (American standard code for information interchange)

      The simplest encoding created specifically for the American alphabet. Consists of 128 characters.

    • Unicode

      This is an international character table that, in addition to the English alphabet, contains the alphabets of almost all countries. It can hold more than a million different characters (the table is currently incomplete).

    • UTF-8

      Unicode is a variable-length encoding that can be used to represent any unicode character.

    • UTF-16

      Its main difference from UTF-8 is that its structural unit is not one but two bytes. That is, in UTF-16 any Unicode character can be encoded by either two or four bytes.

🔗 References
  1. 📺 Unicode, in friendly terms: ASCII, UTF-8 and more YouTube
  2. 📺 Unicode Encoding! UTF-32, UCS-2, UTF-16, & UTF-8! YouTube

Programming Language

  • Classification of programming languages

🔗 References
  • Language Basics

🔗 References
  • Server development

🔗 References
  • Multithreading

🔗 References
  • Advanced Topics

🔗 References
  • Code quality

🔗 References

Databases

  • Database classification

🔗 References
  • Relational database

🔗 References
  • MongoDB

🔗 References
  • Redis

🔗 References
  • ACID Requirements

🔗 References
  • Designing databases

🔗 References

API development

  • REST API

🔗 References
  • GraphQL

🔗 References
  • WebSockets

🔗 References
  • RPC and gRPC

🔗 References
  • WebRTC

🔗 References

Software

  • Git version control system

🔗 References
  • Docker

🔗 References
  • Postman/Insomnia

🔗 References
  • Web servers

🔗 References
  • Message brokers

🔗 References

Security

  • Web application vulnerabilities

🔗 References
  • Environment variables

🔗 References
  • Hashing

🔗 References
  • Authentication and authorization

🔗 References
  • SSL/TLS

🔗 References

Testing

  • Unit Tests

🔗 References
  • Integration tests

🔗 References
  • E2E tests

🔗 References
  • Load testing

🔗 References
  • Regression testing

🔗 References

Optimization

  • Profiling

🔗 References
  • Caching

🔗 References
  • Load balancing

🔗 References

Documentation

  • Markdown

🔗 References
  • Documentation inside code

🔗 References
  • API Documentation

🔗 References
  • Static generators

🔗 References

Building architecture

  • Architectural templates

🔗 References
  • Design patterns

🔗 References
  • Monolithic and microservice architecture

🔗 References
  • Horizontal and vertical scaling

🔗 References

Additional and similar resources

Made with ♥
LICENSE 2022