The text is a series of excerpts describing the process of creating data visualizations and dashboards using Power BI. It guides users on how to import, transform, and model data from sources like Excel using Power Query. The text covers topics such as cleaning data, creating relationships between tables, and using DAX functions to perform calculations. Various chart types are explored, along with techniques like drill-downs, conditional formatting, and grouping data using bins and lists. The final portion focuses on building a comprehensive dashboard from survey data, including considerations for layout and theme customization.
Power BI Mastery: A Comprehensive Study Guide
Quiz: Short Answer Questions
What is Power BI and what is its primary function? Power BI is a data visualization tool within the Microsoft ecosystem used for creating interactive dashboards and reports. Its primary function is to transform raw data into insightful visuals for better decision-making.
Where can you download Power BI Desktop and is it free? Power BI Desktop can be downloaded from the Microsoft Store, or from a direct download link. It is available for free.
Name at least three different data sources that Power BI can connect to. Power BI can connect to various data sources including Excel workbooks, SQL databases, and online services like Google Analytics.
What is Power Query and why is it important in Power BI? Power Query is a data transformation tool within Power BI. It is important because it allows users to clean, reshape, and transform data before creating visualizations.
How do you rename a column in Power Query and where can you view the steps you have taken to edit data? In Power Query, a column can be renamed by double-clicking on its header and typing in the new name. The applied steps appear in the “Applied Steps” pane on the right side of the Power Query Editor window.
How do you remove a filter that you have applied to data in Power Query? To remove a filter, locate the “Filtered Rows” step in the “Applied Steps” pane and click the “X” icon next to it.
What are the three main tabs in Power BI Desktop and what is the primary function of each? The three main tabs are: Report (for creating visualizations), Data (for viewing and managing data), and Model (for defining relationships between tables).
Give a brief overview of the importance of the “Model” tab in Power BI? The Model tab is important for defining relationships between different tables or data sources. These relationships allow you to create more complex and accurate visualizations by combining data from multiple sources.
Describe what drill down is. What are the three drill down effects that Power BI offers? Drill down lets you explore data at increasingly granular levels within a single visualization. The three drill down features are: “turn on drill down,” “go to next level in the hierarchy,” and “expand all down one level in the hierarchy.”
What is conditional formatting and what are some options for displaying conditional formatting? Conditional formatting highlights data points based on specific criteria, making it easier to identify patterns and outliers. Some options for displaying conditional formatting include background color, font color, data bars, and icons.
Quiz: Answer Key
Power BI is a data visualization tool within the Microsoft ecosystem used for creating interactive dashboards and reports. Its primary function is to transform raw data into insightful visuals for better decision-making.
Power BI Desktop can be downloaded from the Microsoft Store, or from a direct download link. It is available for free.
Power BI can connect to various data sources including Excel workbooks, SQL databases, and online services like Google Analytics.
Power Query is a data transformation tool within Power BI. It is important because it allows users to clean, reshape, and transform data before creating visualizations.
In Power Query, a column can be renamed by double-clicking on its header and typing in the new name. The applied steps appear in the “Applied Steps” pane on the right side of the Power Query Editor window.
To remove a filter, locate the “Filtered Rows” step in the “Applied Steps” pane and click the “X” icon next to it.
The three main tabs are: Report (for creating visualizations), Data (for viewing and managing data), and Model (for defining relationships between tables).
The Model tab is important for defining relationships between different tables or data sources. These relationships allow you to create more complex and accurate visualizations by combining data from multiple sources.
Drill down lets you explore data at increasingly granular levels within a single visualization. The three drill down features are: “turn on drill down,” “go to next level in the hierarchy,” and “expand all down one level in the hierarchy.”
Conditional formatting highlights data points based on specific criteria, making it easier to identify patterns and outliers. Some options for displaying conditional formatting include background color, font color, data bars, and icons.
Essay Format Questions
Discuss the importance of data transformation using Power Query in the Power BI workflow. Provide examples of common data transformation tasks and explain how they contribute to creating accurate and meaningful visualizations.
Explain the significance of the “Model” tab in Power BI, focusing on how relationships between tables are created and managed. Discuss the different types of cardinalities and cross-filter directions, and how they impact data analysis.
Compare and contrast aggregator functions and iterator functions (like SUM vs. SUMX) in DAX. Provide specific examples of when each type of function would be most appropriate and explain how they differ in their evaluation context.
Describe the various types of visualizations available in Power BI and provide examples of scenarios where each would be most effective. Consider the strengths and weaknesses of each visualization type and how they can be used to convey different types of information.
Explain the purpose and application of conditional formatting in Power BI reports. Discuss the different conditional formatting options available and provide examples of how they can be used to highlight key trends and outliers in the data.
Glossary of Key Terms
Power BI: A Microsoft business analytics service that provides interactive visualizations and business intelligence capabilities.
Data Visualization: The graphical representation of information and data.
Dashboard: A visual display of the most important information needed to achieve one or more objectives; consolidated and arranged on a single screen.
KPI (Key Performance Indicator): A measurable value that demonstrates how effectively a company is achieving key business objectives.
Power BI Desktop: A free Windows application for creating interactive dashboards and reports.
Data Source: The location where the data being used originates (e.g., Excel file, SQL database).
Power Query: A data transformation and preparation engine used within Power BI to clean, reshape, and enrich data.
Data Transformation: The process of converting data from one format or structure into another.
Applied Steps: A record of each data transformation step performed in Power Query.
Report Tab: The area in Power BI Desktop where visualizations are created and arranged.
Data Tab: The area in Power BI Desktop where the underlying data can be viewed and managed.
Model Tab: The area in Power BI Desktop where relationships between tables are defined.
Cardinality: Defines the relationship between two tables (e.g., one-to-many, one-to-one).
Cross-filter Direction: Determines how filters applied to one table affect related tables.
DAX (Data Analysis Expressions): A formula language used in Power BI for calculations and data analysis.
Measure: A calculation performed on data, typically aggregated (e.g., sum, average).
Column: A field in a table containing a specific attribute of the data.
Aggregator Function: A DAX function that calculates a single value from a column of data (e.g., SUM, AVERAGE, MIN, MAX).
Iterator Function: A DAX function that evaluates an expression for each row in a table (e.g., SUMX, AVERAGEX).
Drill Down: A feature that allows users to explore data at increasingly granular levels within a visualization.
Bin: A grouping of continuous data into discrete intervals or categories.
List: An ordered collection of values or items.
Conditional Formatting: Highlighting data points based on specific criteria, making it easier to identify patterns and outliers.
Power BI Tutorial: Data Visualization and Analysis Guide
Okay, here’s a detailed briefing document summarizing the key themes and ideas from the provided transcript of the Power BI tutorial.
Briefing Document: Power BI Tutorial Series
Overview:
This document summarizes a comprehensive Power BI tutorial series focused on data visualization and analysis. The series aims to take viewers from complete beginners to proficient Power BI users, covering essential skills from data acquisition and transformation to creating interactive dashboards. The content emphasizes practical application and encourages viewers to follow along using provided sample datasets.
Main Themes & Key Ideas:
Power BI as a Leading Data Visualization Tool: The tutorial positions Power BI as a prominent tool within the Microsoft ecosystem.
“powerbi is one of the most popular data visualization tools in the world of course it’s within the Microsoft ecosystem”
Hands-on Learning Approach: The tutorial emphasizes a practical, hands-on approach, encouraging viewers to download datasets and actively participate in the exercises.
“I’m going to leave the Excel that I’m going to be using in the description you can go and download it and walk through this with me”
Data Acquisition and Connectivity: A significant portion focuses on connecting to various data sources, highlighting the flexibility of Power BI.
“it’s going to give us a lot of different options for where we can get data from… you have a ton of options there’s databases… SQL databases… Google analytics”
Power Query for Data Transformation: The tutorial introduces Power Query as a crucial tool for cleaning, shaping, and transforming data before visualization.
“it’s going to take us to powerbi power query which is going to allow us to transform our data”
“this is the window to basically transform your data and get it ready for your visualizations”
Applied Steps in Power Query: Emphasis on the importance of the “Applied Steps” feature in Power Query for tracking and modifying data transformations.
“everything that you do every single step that you apply to transform this data is going to be right over here and if I want to … I can just click X and it is going to get rid of that”
Data Modeling and Relationships: Connecting multiple data tables and defining relationships between them is covered.
“this is especially useful when you have multiple tables or multiple excels and you need to join them to kind of connect them together”
DAX (Data Analysis Expressions): Introduction to DAX functions for creating calculated columns and measures.
“What we’re going to be using are these new measures and new columns to create create our Dax functions”
Aggregator vs. Iterator functions (SUM vs. SUMX): Explains the difference between aggregate functions (operate on an entire column) and iterator functions (operate row by row).
Conditional Formatting: Applying visual cues (colors, icons, data bars) to highlight trends and patterns in data.
Drill-Down Functionality: Creating hierarchical visualizations that allow users to explore data at different levels of detail.
Lists and Bins: Grouping data using Lists and Bins to aid in visualization and create cohorts.
Visualization Techniques: Stacked Bar Chart, 100% Stacked Column Chart, Line Chart, Clustered Column Chart, Scatter Chart, Donut Chart, Cards and tables are covered and used throughout the tutorial.
“the very first one that we’re going to start with probably the easiest one and the one that you’ll recognize the most is a stacked bar chart”
Project-Based Learning: The series culminates in a final project using real-world survey data from data professionals.
Customizing Dashboards: Demonstrates how to improve the look and feel of dashboards using themes and color schemes.
Important Ideas and Facts:
Power BI Desktop can be downloaded for free.
“we’re going to click this download free button”
Power Query Editor is used to transform data.
“this is the window to basically transform your data and get it ready for your visualizations”
Data relationships are crucial for combining data from multiple sources.
DAX functions are essential for creating calculations and performing advanced analysis.
Drill-down functionality allows for interactive exploration of data.
“what happens is is someone some stakeholder in our company is saying hey Alex we want this and we want to know we want to drill down on on this IP address”
Bins can be used to create groups of data.
Conditional formatting enhances the readability and impact of visualizations.
“it’s just better to have these simple visualizations on this table rather than just having the numbers themselves makes it a little bit more easy to read and understand stand”
The choice of visualization depends on the data and the insights you want to convey.
Quotes:
“By the end of this video you’re going to be an expert in powerbi you’re going to be creating all sorts of dashboards and kpis and reports and you’re going to be sending all of them to me so I can be really impressed.” (Illustrates the goal of the tutorial.)
“Everything that you do every single step that you apply to transform this data is going to be right over here and if I want to if I go back and I say you know I really didn’t want to rename that column I can just click X and it is going to get rid of that and take it back to its original state” (Highlights the flexibility and ease of data transformation in Power Query.)
Conclusion:
The Power BI tutorial provides a comprehensive guide for users of all levels. By focusing on practical skills, real-world examples, and hands-on exercises, the series equips viewers with the knowledge and confidence to effectively use Power BI for data analysis and visualization.
Power BI: Quick Answers and Usage Guide
Power BI FAQ
Here’s an 8-question FAQ based on the provided source material:
1. What is Power BI and why is it useful?
Power BI is a data visualization tool from Microsoft. It allows users to create interactive dashboards, KPIs (Key Performance Indicators), and reports from various data sources. Its usefulness stems from its ability to transform raw data into understandable visual formats, providing actionable insights for decision-making. If your organization uses Microsoft products there is a good chance you already have access to it.
2. How do I download Power BI Desktop?
You can download Power BI Desktop for free from the Microsoft Store. The source material recommends a download link in its description for direct access. Once on the store page, click the “Download” button to begin the installation process.
3. What types of data sources can Power BI connect to?
Power BI offers a wide array of data connection options, including Excel workbooks, SQL databases, cloud services (like Azure Blob Storage), and online platforms (like Google Analytics). Some connectors are free, while others may require an upgrade.
4. What is Power Query Editor and why is it important?
Power Query Editor is a data transformation interface within Power BI. It allows you to clean, reshape, and transform data before creating visualizations. You can rename columns, filter rows, change data types, and perform other data manipulation tasks. Every transformation step is recorded, allowing you to easily modify or undo changes.
5. How do I create a basic visualization in Power BI?
To create a visualization:
Import your data into Power BI Desktop.
Navigate to the Report tab.
Select the type of chart you want to create from the Visualizations pane.
Drag and drop the desired fields (columns) from your data into the appropriate areas of the chart (e.g., axis, values, legend).
6. What are relationships in Power BI and how do I create them?
Relationships define how tables in your data model are connected. They’re crucial when working with multiple tables, as they enable Power BI to combine data from different sources.
To create a relationship:
Go to the Model tab.
Drag a field from one table onto the corresponding field in another table. Power BI will automatically attempt to create the relationship. You can double click it to edit the relationship.
Cardinality (one-to-one, one-to-many, many-to-many) and cross-filter direction (single, both) are important properties to configure. The single filter setting in the relationship limits data transfer between tables, whereas the both setting causes both tables to act as a single table.
7. What are DAX measures and columns?
DAX (Data Analysis Expressions) is a formula language used in Power BI.
Measures: Calculations performed on the fly, typically used to aggregate data (e.g., sum, average, count). They are not stored in the data model.
Columns: New columns created in your data model that contain calculated values for each row.
Examples of DAX functions include SUM, AVERAGE, COUNT, and IF. Aggregator functions (like SUM) and iterator functions (like SUMX) behave differently, with iterator functions performing calculations on each row of a table. Date functions such as DAY can also be used in DAX expressions.
8. What is Drill Down and how can I use it in my visuals?
Drill Down allows users to explore data at different levels of detail within a visualization. To use it, add multiple fields to a hierarchy in a chart’s axis. When Drill Down is activated, clicking on a data point will “drill down” to the next level in the hierarchy, showing more granular data. Useful for presenting data with layered levels of information.
Power BI Data Transformation with Power Query
Data transformation within Power BI involves using Power Query to prepare data for visualization. Power Query Editor allows for a variety of transformations.
Key aspects of data transformation include:
Accessing the Power Query Editor Accessing the Power Query Editor to transform data can be done by selecting ‘Transform Data’.
Applied Steps Every transformation step is documented in the ‘Applied Steps’ section, enabling review or removal of changes.
Common TransformationsChanging data type Data types can be changed by clicking the icon in the column header.
Filtering rows Filter rows to remove null values or specific values.
Removing columns or rows Columns or top rows can be removed.
Renaming columns Columns can be renamed.
Using first row as headers The first row can be used as headers.
Unpivoting columns Converting columns into rows can be achieved by selecting the columns and using the unpivot columns option in the transform tab.
Salary Data Analysis and Visualization in Power BI
The sources provide information on how salary data can be analyzed and visualized in Power BI, including transforming salary data and analyzing average salaries based on various factors.
Key aspects of salary analysis discussed in the sources:
Data Transformation for Salary AnalysisSalary data often needs transformation to be usable, especially when provided as a range.
Splitting Columns: Salary ranges can be split into separate columns representing the lower and upper bounds of the range.
Data Type Conversion: Convert text data to numeric data types to enable calculations.
Calculating Average Salary: Create a new column to calculate the average salary from the range by summing the lower and upper bounds and dividing by two.
Salary Analysis and VisualizationAverage Salary by Job Title: Calculate and visualize the average salary for different job titles using a clustered bar chart.
Average Salary by Sex: Visualize the average salary for males and females using a donut chart.
Impact of Country on Salary: A tree map can be used to filter salary data by country, acknowledging that the average salary varies significantly depending on the country.
Programming Language Popularity Among Data Professionals
The sources discuss how to analyze the popularity of programming languages among data professionals using Power BI.
Key aspects include:
Identifying Favorite Programming Languages Survey data can be used to determine the preferred programming languages of data professionals.
Data Transformation The survey may include an “Other” option where respondents can enter their preferred language. This necessitates splitting the column to separate the pre-selected languages from the write-in languages.
VisualizationA clustered column chart can effectively display the count of votes for each programming language.
The visualization can be enhanced by including job titles, allowing for a breakdown of language preferences by profession. For example, it can show which languages are favored by data analysts versus data scientists.
Power BI Analysis of Survey Demographics
The sources contain information regarding the collection, transformation, and visualization of survey demographics using Power BI.
Key aspects of survey demographics discussed in the sources:
Data Collection The data was collected via a survey of data professionals. The survey collected information such as job titles, salary, industry, programming language preferences, and demographic information including age, sex, and country of residence.
Data Transformation Several transformations were performed on the raw survey data within Power BI’s Power Query Editor to prepare it for analysis. These transformations included:
Splitting columns The ‘Job Title’ and ‘Favorite Programming Language’ columns were split to separate pre-defined options from free-text entries, simplifying analysis.
Calculating average salary Salary ranges were split into lower and upper bounds, and a new column was created to calculate the average salary.
Demographic Visualizations The transformed data was used to create visualizations to analyze survey demographics:
Average Age A card visualization was used to display the average age of survey respondents.
Country of Residence A tree map was used to visualize the distribution of survey respondents by country. This allows users to filter the data and examine other variables by country.
Sex A donut chart was considered to visualize the distribution of male and female respondents and their average salaries.
Difficulty to Break into the Field A pie chart was used to visualize the distribution of how easy or difficult it was to break into the data field.
Interactivity Visualizations such as the tree map showing the “Country of Survey Takers” allows users to click on a country and see how the other visualizations change based on that selection.
Power BI: Data Visualization Techniques and Best Practices
The sources cover various aspects of data visualization using Power BI, from basic chart creation to more advanced techniques and considerations.
Data Visualization Options and Usage
Basic Chart Creation:
Stacked Bar/Column Charts: Useful for comparing different categories and their composition. These can represent customer purchase breakdowns, showing what percentage of purchases come from specific products.
Clustered Bar/Column Charts: Useful for comparing values across different categories.
Line Charts: Effective for visualizing trends over time, especially with date-related data.
Pie/Donut Charts: While sometimes discouraged due to difficulty in comparing slice sizes, they can be used to show proportions.
Cards: Display single values, like total survey takers or average age, for quick insights.
Tables: Display data in a tabular format.
Scatter Charts: Useful for identifying outliers and trends in data.
Advanced Visualization Techniques:
Combination Charts: Combine different chart types (e.g., line and clustered column) to display multiple aspects of the data in one visualization.
Conditional Formatting: Use rules, color gradients, and icons to highlight data within tables or charts.
Data bars Data bars can visually represent values within a table, making it easier to compare magnitudes.
Drill Down: Allows users to explore data at different levels of granularity within a visualization.
Gauges: Visualize survey data, showing average scores and satisfaction levels.
Tree Maps: Visualize hierarchical data, allowing users to click through different levels for more details.
Key Considerations for Effective Data Visualization:
Choosing the Right Visual: Different chart types are suited for different data types and analytical goals.
Customization: Visual elements like titles, labels, colors, and data presentation should be customized to enhance clarity and readability.
Data Transformation: Data often needs to be transformed and cleaned before visualization to ensure accurate and meaningful representations.
Interactivity: Incorporate interactive elements like drill-down to allow users to explore the data.
Color Coordination: Choosing appropriate color schemes and themes can significantly improve the visual appeal and effectiveness of a dashboard.
Clear Titles and Labels: Use clear and descriptive titles and labels to ensure the audience understands the visualization.
Summarization: Instead of “Don’t Summarize,” choosing Sum, Average, Minimum or Maximum functions to derive insights.
Conditional Formatting: Add background colors based on gradient or rules, data bars, and icons.
Drill Down: Can be enabled to present data at different levels.
Bins and Lists: Numeric and date data can be grouped using bins. Lists can group customer names.
Specific Examples and Applications
Survey Data: Visualizing survey responses, such as satisfaction levels, is facilitated through gauge charts.
Sales Data: Analyzing sales data and identifying top-performing products and customer segments.
Geographic Data: Visualizing data by country using tree maps, enabling comparisons and filtering based on location.
Salary Data: Presenting salary distributions and averages, broken down by job title, gender, and country.
Programming Language Preferences: A clustered column chart is used to display the count of votes for each programming language.
Learn Power BI in Under 3 Hours | Formatting, Visualizations, Dashboards + Full Project
The Original Text
what’s going on everybody welcome back to another video today we are going to learn powerbi in under 3 [Music] hours now powerbi is one of the most popular data visualization tools in the world of course it’s within the Microsoft ecosystem and so if your company uses any Microsoft products you most likely have access to the Microsoft Suite which includes powerbi I use powerbi for many years as a data analyst and then when I became a manager of analytics I actually switched our entire team over to powerbi and so I know how amazing powerbi can actually be so we’re going to be taking a look at several things in this long long video we’ll start with some of the basics of just creating some visualizations but we’ll dive into a ton of other things as well by the end of this video you’re going to be an expert in powerbi you’re going to be creating all sorts of dashboards and kpis and reports and you’re going to be sending all of them to me so I can be really impressed so without further Ado let’s jump onto my screen and get started all right so the first thing I’m going to do is download powerbi desktop I will leave this link in the description so you can just click on it go to it and download it we’re going to click this download free button and once we click it you can go to the Microsoft store and I already have it downloaded so when you see it uh it’ll already say downloaded but um for you you can go in here you can click download and it will download it for you I’m on Microsoft uh but it may look a little bit different for you if you’re on a different system but once that is done we are going to open up powerbi so let’s go right down here to our search let’s go to powerbi and it is going to open up for us all right so right away this is what it’s going to look like when you open it and we’re going to go right over here to get data and let’s click on that it’s going to open up this window and it’s going to give us a lot of different options for where we can get data from now some of these are free and some you need to upgrade from but you just taking a quick glance through here you have a ton of options there’s databases there’s um you know blob storages there’s postr SQL or different SQL databases um there’s Google analytics there’s a lot of places and you can go through the process to connect to that data and you can pull that data in from those data sources now for what we are doing we’re just going to be using an Excel I’m going to leave the Excel that I’m going to be using in the description you can go and download it and walk through this with me so what we’re going to do is click on Excel workbook and we’re going to click connect so we’re going to go right here in our powerbi tutorials folder and we’re going to click on apocalypse food prep so let’s click on that and it is going to connect and pull that data in now right here we have our Navigator and so if you had a lot of different sheets you can click on that and choose which ones to pull in I just clicked on it right over here and we’re able to preview the data but I can’t load or transform it yet I need to select which sheets I’m bringing in so we only have on that’s the only one we’re going to bring in so you can go ahead and load the data or you can click on transform data it’s going to take us to powerbi power query which is going to allow us to transform our data so I’m going to have an entire video on how to transform the data but I’m going to give you a really quick glance at it to kind of show you what it is so right up here it says our power query editor and this is a the window to basically transform your data and get it ready for your visualizations now you can do this in Excel if you want to and do that beforehand or you can do it here and there are lots of things that we can do in here as you can see at the top again I’ll have an entire video dedicated to just power query but let’s take a quick look at the data and see if there’s anything we want to transform quickly before we actually go and start building our visualizations so over here we have the store where we purchased it we have the product that we purchased the price that we paid and the date that we bought it now the first thing that jumps out to me is that this just says date on it um we might want to say date uncore purchased and we’re going to hit enter and if you noticed right over here on these applied steps it says renamed columns everything that you do every single step that you apply to transform this data is going to be right over here and if I want to if I go back and I say you know I really didn’t want to rename that column I can just click X and it is going to get rid of that and take it back to its original state so again I’m just going to say purchased and we’re going to enter that now this is our apocalypse food prep so this is food that we are buying for the Apocalypse um for this example and if we look at our products we have bottled water canned vegetables dried beans milk and rice and all of that stuff makes sense except for the milk U milk will not stay or last long in the apocalypse so I think what we’re going to do is we’re going to filter that out really quickly and we’re click okay and right over here again says filtered rows and so now if we scroll down there’s no milk so what we are going to do is we are going to go over here to close and apply and it is going to actually load the data into powerbi desktop so on this left hand side it immediately takes us to the report Tab and what we want to do is go right here to the data Tab and take a look at our data so again there’s our date purchased and as you can see the milk is not in there another tab that we’re going to take a look at um and again in this report tab this is where we actually build our visualizations the is where we can see the data and and change it up a little bit and change some small things about it like sorting The Columns or even creating a new column and over here we have this other Tab and is called model and this is especially useful when you have multiple tables or multiple excels and you need to join them to kind of connect them together we don’t have that but in a future video I’m going to walk through how to use this entire tab so now let’s go back to the data Tab and I want to just look at the data really quickly before we go over to the report Tab and we start building our first visualization as you can see I’ve been buying these different products in different months so this rice I’ve been purchasing in January February March and April and I’ve been buying it from three different locations because I wanted to see if I was spending less money at one location on all of the products so then I would just shop there in the future and save a lot of money or if there were specific products that were really cheap at one location but others they were cheaper at a different location so I should just buy like the dried beans at Costco but everything else I should be buying at Walmart and so that’s what we’re going to look at in just a little bit so let’s go over to the report tab right up here at the top there’s this data section so you can kind of choose if you want to add any more data now that we are here we can also write queries or transform the data like we were looking at in the power query editor window over here in the insert we can add a new visualization or a text box and then in the calculation section we can create a new measure or a quick measure and then over here we have share where you can actually publish your report or your dashboard online now over on the visualization section on this far right this is a very important area this is where a lot of the actual creating of the dashboards happen so let’s take a look really quick and we’ll get into a lot of these things as we’re actually building our dashboard so we’re not just sitting here looking and talking we’re going to be actually building and doing all right so we’re going to click right here on this drop down on sheet one it’s going to show us all of our columns now two of the things that we wanted to look at were where are we spending the least amount of money buying the exact same product that’ll help us determine where we want to shop and the second thing was should I be buying all my products at the same place or are there certain products that they’re going to be cheaper at a specific store and I should buy it there so let’s start out with the first one which we’re just going to see uh with the store and the price uh where we’re spending the least amount of money and just at a quick glance we can see we’re spending the least amount of money at Costco at $210 versus Target 219 and Walmart at 225 and that really answers our question but we want to visualize it better be able to see it in an easier way so we’re going to go right over here and we can click on a lot of these but the one that probably makes the most sense is the stocked column chart and it’s going to show Walmart Target and Costco now they’re all the same color let’s add a legend so we’re just going to drag store over here down to this Legend and let’s make this larger while we’re working on it so now we can see we’re spending the most amount of money at Walmart uh right in between at Target and then at Costco is the lowest and so right there we know that Costco is the place to go for our apocalypse food prep but is it going to be that way for every product I don’t know let’s take a look let’s put this up in this corner and let’s start a new one we’re going to need to select the product for sure and the price and probably Additionally the store as well and let’s click on let’s not do this one we need a cluster column chart that’s what we need let’s bring this over here let’s expand this quite a bit and so really at a glance this is giving us everything that we need we can see each product right here and we can see how much we’re paying per store and so for Rice we’re paying it looks like a lot more for our rice at Walmart while at Target is actually where we are paying the least now if we look at all of these it looks like for Costco the only one that we’re really paying a lot more on is on our rice but for our dried beans our bottled water we’re paying quite a bit less and really it’s pretty negligible for these canned vegetables we’re paying maybe what 60 cents 50 60 cents more per can so that’s pretty negligable but for the big ticket items um we’re really spending a lot less at Costco if we wanted to SP to save just a little bit more money we could go to Target for our rice now if I want to make this more like a dashboard and we’re only keeping these two things I’m going to kind of size them kind of like this whoops going to show you that in a little bit I’m going to size them a little bit like this so now that we have that looking good we want to change the title of both of these so what we’re going to do is go over here in our visualizations and format your visual uh and we are going to go to this General go to title and now we can name it anything we really want for this we’re going to say best store for product and while we’re in here one other thing that I wanted to do is I want to go to this visual go right down here to these data labels now we haven’t added any data labels so I’m going to click on and you’ll see exactly what it does uh it just puts the labels and the numbers above it so you don’t have to actually like hover over it and see what it is now it is actually rounding these numbers so what we’re going to do is go down here we’re going to go down to values and we’ll go down to display units and it’s on auto so it’s Auto rounding those numbers and we’re just going to say none so we can see the actual value of these numbers and we can do the exact same thing over here it probably is a good thing to do um and it just is going to visualize it a little bit differently in here but you can always change that if you want to go over here to title and we’re going to say total by store and now we you’re going to take a look and so in a matter of minutes we were able to take our data from an Excel put it into powerbi transform it a little bit then we’re able to create these visualizations that gave us concrete answers to some very important topics we now know that Costco is the place to go for basically every single product except if we’re buying rice if we want to save just a few dollars we’re going to head over to Target and that’s genuinely going to change my shopping habits for the next several years until the apocalypse happens all right all right so before we jump over to powerbi and start using power query I wanted to take a look at the data and this is the Excel from our last video called apocalypse food prep and in that video we went through and we bought some rice some beans water vegetables and milk all for the apocalypse getting prepared for that now we decided to buy some additional things like rope some flashlights duct tape and a water filter several water filters and after we purchased those uh our boss or whoever were working with there somebody decided to go and make a pivot table now in this pivot table they kind of broke it out by Costco Target and Walmart and had all the items had some subtotals as well as some Grand totals right here and then they decided to kind of copy and paste that into this and you’ll see this a lot when you’re working with uh people who use Excel they like to kind of make things like this maybe makeing them to like a table or or format a little bit differently but you’ll see stuff like this a lot so this is what we’re going to actually pull into Power query and work with now we’re going to imagine that this is all we have this is the only thing we were working with and I’ll kind of reference this pivot table a little bit but we’re going to pretend this is all we have and we want to transform it to make it a lot more usable to where we can make visualizations with it so let’s hop over to powerbi and pull this excel in so what we’re going to do is Click import data from Excel we’re going to click apocalypse food prep and click open and then it’s going to bring up this window right here now this is where we can choose what data to bring in so we can take a preview and just click on it real quick and this is the pivot table that we were looking at so it does have that pivot table so we are able to pull in just a pivot table and then we have the purchase overview where it’s kind of that formatted um thing that we were just looking at with all the colors we’re going to pull both of those in so we’re going to pull in the pivot table and the purchase overview now we could just load it or we could transform it and we’re going to click transform and that’s going to bring us to power query so let’s click on transform data so now really quick before before we actually jump into working through this and transforming it I want to show you what the power query editor looks like so if we go right over here we have our queries and these are the tables that we actually pulled in and we can click on those and kind of go back and forth between them now up top we have our ribbon and the ribbon offers a lot of functionality we have things like remove columns keep rows remove rows split columns these are all things that we’re likely to use when using this power query editor there’s also another tab called transform where there’s a lot of functionality here as well things like unpivoting a column or transposing columns and rows and using a first row as a header some of the things that we’ll be looking at today there’s also another tab called add a column and this one’s pretty self-explanatory where you can add additional columns like deleting a column creating an index column or a conditional column those are the three main ones there’s also view tools and help but we’re not going to really be looking at those today and then on the far right side we have our query settings you can do things like change the name so we call it pivot table 2022 and it’ll update right over here on our query side and we have our applied steps now our applied steps are extremely important and very very useful anytime we make any change to transform this data it’s going to be documented right here and then we can go back and look at it or we could even delete that change in the future if we want to and go back to a previous version of what we just did so when we loaded the data into to powerbi it did a few things for us it CHS The Source the navigation and it promoted the headers and then it also changed the data type so if we want to check we can actually see those things or change those things like this Source right here we can click on this little icon and it’s going to bring up the actual path where we got this file so if we wanted to change that or or it changes in the future we can come here and we can change this file path but we’re not going to do that right now so let’s click on cancel and let’s go back down to change type so I promoted these headers and obviously these headers are not correct we’re looking at this pivot table and not the purchase overview but it changed these column headers and so in the future if we wanted to we could easily change those but it did that for us and it changed the type as well so if you look right here it says abc123 all the way over here to where it just says ABC ABC means it’s only going to be text where abc123 means it could be basically anything uh text or it could be numeric so now let’s go over to purchase overview View and this is the one that we’re actually going to be working on the most but we might be looking at pivot table just a little bit to kind of reference it and see some of the differences so before we do anything let’s just take a look at how powerbi decided to take this data in so it shows this apocalypse food prep overview as kind of the First Column and that was kind of our header or the title of what we were looking at before and then all these other columns are basically column 1 2 3 4 fivs so that’s something that we’re going to want to change in just a little bit there’s also all these blank uh columns right at the top and kind of these null values as we go along and we’ll take a look at those and we kind of are going to want to get rid of some of this and just clean this up to make it more usable for our powerbi visualizations this may be perfectly fine and acceptable in an Excel but when you’re pulling it into powerbi the real reason you’re pulling it in is to create visualizations not just it to look good in an Excel so we’re going to need to clean this up quite a bit so let’s go right up top the first thing that I want to do is I want to get rid of these top r so we’re going to go to this top ribbon and we’re going to click remove rows and we’re going to select remove top rows and we’re going to select two because we have one two rows of all nulles and those are completely useless we just want to get rid of them right away so let’s cck Okay and it removed those the next thing that we want to do is these this location product and all these dates these are actually the column headers that we wanted so what we need to do now is we want to go over to transform and you want to say use first row as headers and just like that we have location products and these dates as our headers exactly how we wanted them now let’s say for whatever reason you know we made a mistake and we needed to go back we would just select remove top rows and that would be perfectly fine now you can see over here it promoted the headers but it’s also changed the data type so before if we went to before we removed the headers these were all AB 123 abc123 cuz it had a lot of different data types in there so it just kind of made a generic data type but when we promoted these headers the first thing that I decided to do was also change this data type for us giving us its best guess as to what this data type is and it decided to do this decimal so this one two is a decimal but we’re actually going to change that and all you have to do is click on This 1.2 or or the data type that it has right here for you and we’re going to click on fixed decimal number and let’s do replace current and now it’s just a little bit better so now it’s 2.70 2.5 and that’s normally how we would read uh values like this because this is money so we would normally read it to the second decimal just like that and if we have it on the second decimal for some we should probably have it on the second decimal for all of them so really quickly I’m going to go through and I’m just going to change that and it should be pretty quick so hang with me for just a second all right right that is perfect now for the purposes of what we’re about to do we don’t actually need these subtotals or this Costco total Target total and Walmart total as well as the grand total really we want to get rid of those and so what we’re going to do is we’re going to go right over here we’re going to click on this dropdown and we’re going to try to filter this data before we actually load it into Power VII so we’re going to filter and we’re going to say remove empty and let’s remove those and it’s going to take out all of those nulles if we wanted to try to filter this out by saying something like Costco total or Target total we could do that by going right here clicking this drop town on products go to text filters and saying does not contain and let’s do insert and we’re going to say does not contain and we want to say total and let’s click okay and again it filtered out all of those things so there’s a few different options that you can do if you want to filter out rows that contain either null values or specific values now the next thing that we’re going to do is actually get rid of a column this grand total column and so what we’re going to do is we’re going to click on the very top part where it says grand total we’re going to go back over here to home and we’re going to click on remove columns and it says insert that’s because we’re on this filtered rows one right here um but what we’re going to do is just insert that and it’ll insert it right there that’s totally fine we can just move it to the bottom now we got rid of this column entirely now this looks really good visually I like how this looks I I like how everything is set up the biggest thing about this is that when you’re actually wanting to use this for visualizations these columns as dates doesn’t really work too well and so what we’re going to want to do is we’re going to want to transpose this or pivot this to where these dates are actually rows so what we’re going to do is select the first date which is January 1st all the way through April 1st and we’re going to hit shift and click on that April 1 right there to select all of them at the same time and then we’re going to go over here to the transform Tab and we’re going to click unpivot columns and let’s see what this does and so now what we’ve done is we’ve basically recreated our original Excel that we had so let’s go back and take a look really quickly at that so this looks almost identical to what we have in powerbi right now and this is extremely usable and very good for visualizations and is much much better than this but again we were pretending that this is what we were given at the beginning so you have to imagine you know somebody just handing you this and you to make it much more usable for visualizations in the future which happens a lot and we actually wanted to create this we just weren’t given this now a few last things that we might want to do is we want to clean this up just a little bit we’re going to select the data type and change this to date and then we’re going to select the value and I double clicked on the value and I actually want to call this cost uh or product cost productor cost and then for the location I actually want want this to be called store so now this looks really good but I want to show you one thing really quickly on this pivot table 2022 so let’s go back here this looks very similar to how we had it when it first started one thing I wanted to show you uh really quickly and I want to click on this first one we’re going to make this our column header and then we’re going to try to Pivot or unpivot this January February March April so really quickly let’s do that so we’re going to transform use first row as headers so now we have this January February March April now if you notice these are not dates these are actually text it says January February March and April so if we go to do this and we click unpivot and here’s the columns that are created when we unpivot it it is January February March and April these are not dates so we cannot go and change this to a date because that would out because it’s actually text so it’s something that you want to look out for it’s something that you need to be aware of and you can change that in the pivot table so you want to be aware of how it actually sits and looks in the Excel or whatever data source you’re pulling from before you actually pull it into Power query to transform and now the very last thing that we need to do to finalize all of this is go over here to close and apply and once we click that everything that we’ve worked on is going to be applied to the actual data and it’s going to load into powerbi to create our visualizations so let’s go ahead and click on that and so now the data has been pulled into powerbi let’s go right down here to data and we can see the data right here if we need to transform this data again we can bring it back into the power query editor window by just clicking the transform data button and it’s going to bring us right back all right so before we jump over to powerbi and start creating our relationships and our model I want to take a look at the data in Excel we realized we were buying so many products for the apocalypse that we decided to start our own store and we have several customers and some client information down here and so I wanted to take a look at some of the columns and these tables that we’re going to be looking at first thing we have is the apocalypse store these are the things that we are selling I know it’s a very limited inventory but these are the really high sellers these are the ones that I wanted to sell so we have this product ID our product name price and production cost then we have this apocalypse sales this is how many sales we’ve actually made to our customers so we have this customer ID our customer name product ID order ID unit sold and the date it was purchased and then we have our customer information right here here are all of our clients so we have this customer ID customer address city state and zip code so now that we’ve taken a look at our data let’s go and load it into powerbi so we’re going to say import data from Excel we’re going to choose this model right here we’re going to click open and we are going to want all three of these so I’m going to click on all of them and we’re just going to load it we’re not going to transform the data at all so now the data has been loaded let’s go right over here on the left hand side to our model Tab and let’s scoot this over just a little bit and move back and we’re going to move these tables up to where it’s a little bit easier to see so right off the bat you can already see that there are these lines between these tables so there are already relationships that powerbi has automatically detected and created from my experience powerbi actually does a really good job at creating these relationships automatically but we’re going to go in and take a look at these and kind of see what everything means and then we’re going to go back and create these relationships from scratch just to make sure that we know how to do every single part so to get us started let’s double click on this line connecting the customer information table to the apocalypse sales table and it’s going to bring up this edit relationship page right here so this line right here connecting these two tables actually gives us quite a bit of information without actually having to click into to this edit relationship page what this is showing is that we have a one to many relationship and there’s only one or a single cross filter direction and you can find both of those things right down here and I’m going to walk through what those mean in just a little bit on this page you can also see the columns that powerbi decided to choose in order to tie these two tables together now for our example they decided to use the customer and customer right here from the customer information table as well as the apocalypse sales but I don’t really want want to use those specifically because on this apocalypse sales table I might remove this customer information and just keep the customer ID it may have chosen these customer columns because they have the exact same name and really the same information but I want to use this customer ID anyways so what I’m going to do is I’m going to click on that column and click on this column and then I’m going to click okay and if we go back into it by double clicking again we’re going to see that and now save that and if we did what we just did before which is kind of hover over it it’s going to show us what those two tables are joined on so opening this back up let’s go down here to this cardinality and cross filter Direction cardinality has several different options that you can choose from you have one to many one to one one to many and many to many now for this example we’re looking at apocalypse sales and we’re going apocalypse sales down to customer information now there are a lot of rows in the apocalypse sales but there’s very few in this customer information and there’s only one customer per row whereas in the ocalypse sales up here the customer can have several rows for several different orders so that’s why the cardinality is many to one now if we flip this and we say we want the customer information here and we want the apocalypse sales down here we tie that together now it’s going to flip and it’s going to say one to many now let’s look at the cross filter Direction and there’s only two options here it’s either single or both and if we choose both and we click okay this now goes from a single arrow pointing in one direction to two arrows pointing in both directions but what does this really mean so in order to demonstrate this I’m going to put this back to a single Direction and what we’re going to try to do is connect the data over here or the columns over here to the columns in this apocalypse store so let’s go over here to build a visualization and what we’re going to do is we’re going to take this customer information and let’s just say we want to look at state so I’m going to click on state right here and I’m just going to make this into a table and the customer information table is only tied right now to this sales table so we’re actually going to go over to the apocalypse store and we want to see how many product IDs are being bought in these different states so really quickly we’re going to come up here and create a new measure and all we’re going to say is this measure is the count of Apocalypse store product ID and we’re going to create that and now we’re going to select it so it’s added to that table so now what this is showing is that there are 10 product IDs which there are 10 products for each of these states but that’s not actually technically correct because not every state purchased these 10 different items if we go back to our model and we change both of these to a both Direction then we’re going to go back and see what changed in our numbers so now let’s go back to our visualization and now we can see that Minnesota actually only ordered seven different product IDs Missouri 8 New York 9 and Texas 10 this is actually much more accurate than before when you use the both option it takes these tables and treats them as if they are a single table but the single option is not going to do that and so for our example if we’re trying to connect this table to this table and one of the last things that I want to show you is this option right down here which says make this relationship active now if we don’t click list and there are other options in here that connect these things like the customer to the customer then that may be the active relationship but if I select this is the active relationship that means this is going to become the default relationship between these two tables so now let’s come out of here we’re going to click cancel we’re going to zoom in just a little bit and bring these tables a little bit closer so we can zoom in just a little bit more now we are going to go ahead and delete these so we’re going to say delete yes and delete yes so just for demonstration purposes we’re going to build these relationships from scratch so we’re going to come over to the customer information t table and we’re going to drag it all the way over here and put it on top of this cust ID or the customer ID in Apocalypse sales and it’s going to automatically create that relationship and we can open this up and as you can see it created the relationship between this customer ID and the apocalypse sales and the customer ID in the customer information it also defaulted the cardinality from many to one and the cross filter direction to single so we’re going to go ahead and change that to both and click okay and then we’re going to come over here to the product ID in Apocalypse store and drag this over the product ID in the apocalypse sales and again if we open it up it created that relationship for us it created the cardinality automatically and we’re going to change this cross filter direction to both and click okay and so on a really small scale that is how it works of course it becomes a little bit more complex the more tables that you add and the more relationships that are created but this is how you’re going to actually create the relationships in the model tab within powerbi all right so let’s take a look at our tables and data before we get started so we have two tables the apocalypse sales the apocalypse store for this apocalypse sales table we have the customer product ID order ID unit sold and the date it was purchased and then for the apocalypse store we have product ID product name price and production cost now these are joined together or they do have a relationship together via the product ID so what we’re going to be using are these new measures and new columns to create create our Dax functions so really quickly let’s go over to this report Tab and let’s drop down our Fields over here so we can see everything and so to get us started we’re going to go right up here to apocalypse sales we’re going to rightclick and click new measure and it’s going to open up this right here which is basically our bar where we can create our functions and so right here it’s automatically given us the name measure but we can change that and we’re going to say count of sales so now we can start writing our Dax function that’s just going to be the name of it and what’s going to show up right over here once we click enter so let’s go over here and we’re going to say count and as we’re typing it’s automatically giving us options it has something called intellisense if you’ve ever used other Microsoft products intellisense is their kind of autoc completion that helps you look at other options very quickly and so we’re just going to click on this count and it’s prompting us to put in a column name and so we can come down here and we can select one or or we can type it out and it’ll try to predict and help us choose which column to select so for us we’re going to use this order ID but let’s just start typing it out we’ll say order ID and then we can click on it and we’re going to close this parenthesis and click enter or you can go over here and click this check mark but we’re just going to click enter and so over on this right side it finalized that and save that and we can actually look at that by clicking on this box next to it and we want to look at this in a cable so now we can see that there are 74 sales now for this we want to see who’s buying our products we want to see what our what our client name is so we’re going to go over here we’re going to choose customer and we’re going to put customer on top of sales and we’re just going to take a look at it like this so now we can see that our number one customer is Uncle Joe’s Prep shop he has 22 orders now they have the most orders with us but it doesn’t necessarily mean that they’re spending the most money with us but we can take a look at that later the next thing that I want to take a look at is how many products we’re actually selling what are our big products that we’re selling we have 10 different items but I don’t know exactly which one is selling the best if if one is doing really poorly and getting no orders this is something that I want to look into so all we’re going to do is go right back up here to apocalypse sales again right click and select new measure and for this one we’re going to call it the sum of products sold and all we’re going to start out with is by doing sum and if this seems familiar to something like Excel you’re 100% correct it is very similar and remember these are both Microsoft products so there’s going to be similar functionality in both of them and so this Dax is going to have a lot of similarities to exactly how it has it in Excel so we’re going to do an open bracket and now what we’re going to choose is this units sold we want to sum up all of these units sold and see how many were we actually selling so we’re going to say units sold I’m going to hit tab it’s going to autocomplete that I’m going to close my parenthesis and I’m going to come over here and click this checkbox so now it’s created that measure and we’re already selected in this table so all we have to do is click the check mark and it’s going to show us that we have 3,000 total products sold and we can go through here and see what the big sellers are and probably the biggest one that I see right off the bat is this multi-tool survival night so these Dax functions that you can write can be very simple and lead to really good insights that you can use for the visualizations later on now I want to take a look at the difference between something like sum which is an aggregator function and something like sum X which is an iterator function because if you add X to some of these aggregator functions you can create them or or make them into an iterator function so you can have sum and some X or average and average X adding X onto the end of them can make them into an iterator function so let’s take a look and see how that actually works I’m going to show you the difference and then I’m going to talk through the difference at the end so really quickly let’s go back to our data and let’s go to the apocalypse store now what we have right here is we have the price and we have the production cost and we want to see how much profit we’re getting from each of these as well as we can take a look at the unit sold and see how much money we are actually making so what we’re going to do is we’re going to come back over here we’re going to go to apocalypse store we’re going to right click and create a measure and in just a little bit we’re going to be creating a new column and that’ll kind of show the difference really well so we’re going to create this new measure and we’re going to name it profit and we’re going to come over here and what we’re going to do is we’re going to take the sums we’re going to start with our sums we’re going to take the sum of the price and then we’re going to close that parenthesis and we’re going to subtract the sum of the production cost so all that does is it says if something cost $20 if we sold it for $20 and it only cost us $10 that’s $10 in profit for that item and then what we’re going to want to do is we’re going to actually want to encapsulate that really quickly because we’re about to use multiply and then we’re going to sum and now we’re going to take the units sold so how many units were actually sold at that profit that we just made so let’s see if that works and let’s click the check right here and so we have the profit so let’s click on the profit oops that’s not what I wanted to do let’s use a new one let’s create a new uh table we’re going to click profit let’s make it a table and I’m going to pull this right over here now we have our profit but I really want to know is which customer is spending the most money at my store so we’re going to come right over here we’re going to click on customer customer at the top and just at a glance we can see that Uncle Joe’s Prep shop is spending the most money at the store now what I want to show you is the difference between Su and sum X so what I’m going to do so I’m going to go back to this profit and going to copy this this entire thing and we’re going to go back here to this table now we just created a measure and we were able to break it down by each customer so let’s go back over here now let’s go up here to home and we’re going to create a new column and we’re going to call this profit underscore column and we’re going to literally paste the exact same thing into here and we’re going to hit enter and each row is the exact same thing so what it’s doing is it is going through the price and it’s adding all of it up and calculating it at the bottom it’s adding the production cost it’s going all the way down and calculating it at the bottom and then it’s going over and looking at how many units it sold and then it’s performing this calculation up here and then it gives us the total and it’s doing it for every single row but that’s not really what we wanted to show what we wanted to show is the profit for each row what we wanted to say is here’s the price for the Rope the production cost for the rope and then how many units we actually sold and then it’ll calculate that and give us the actual profit for just that row but we cannot do it by just using this sum what we need to do is use something called sum X so let’s add another column let’s go back to home say new column and now we’re going to say profit underscore oops underscore column underscore sum X and now we’re going to use sum X and hit Tab and we need to choose the table that we want to put this in so we’re going to say apocalypse sales because that’s the table that we’re looking at right here we’re going to say comma and now we need to input an expression which it says it Returns the sum of an expression evaluated for each row in a table before when you’re just using sum it’s looking at all of these combined now it’s taking it row by row so what we’re going to do is basically input the same thing as we did before I’m going to copy I’m going to paste that it’s not going to be correct I need to get rid of these sums but it’s basically the exact same equation give me just a second and let’s get rid of this sum and let’s see if this works so let’s click the check button and now this looks a lot better so what this is now showing us is at a row level this nylon rope made us 51,000 almost $52,000 the waterproof matches made us $155,000 and we can go down and look at each item and see how much that actually made us versus this profit column and so that is the biggest difference between some and sum X hopefully that made sense I know that sum and sum X and and the difference between an aggregator function and iterator function can be a little bit confusing especially if you’ve never done it before but hopefully that was a good example for you to understand that concept now let’s go back over here to apocalypse sales right here we have a date purchase now in the Dax function we have some ways that we can interact with dates and so I want to take a look at those really quickly so we’re going to go right up here and click on new column and we’re just going to leave that as column but what we’re going to say is day so there’s a few different ones we have Day dates YTD next day previous day and weekday and they all are pretty self-explanatory if you click on it let’s click on weekday day it says it’s going to return a number from 1 to 7 identifying the day of the week of a date so let’s use this really quickly and so we’re going to say date purchased and click tab hit comma and it’s going to give us a three different options basically it’s a one a two and a three um right here if you hit this button read more you can read more on it this is going to say Sunday is equal to one Saturday is equal to seven I like this one personally which is Monday equals one in my brain it just makes more sense so I’m going to click on two I’m going to close that parenthesis and we’re going to I guess I’ll say uh let’s say day of week for the column let’s click that check box and now Saturdays are equal to sixes Mondays are equal to one this allows us to see which day of the week people are buying the most products on or or which day of the week is somebody submitting their orders on and so let’s go over to our report let’s get rid of this I’m just going to move this oh jeez I hate moving stuff sometimes all right really quickly I want to show you the difference between what we just did and what we already have so we have this um date purchased and let’s make that into a bar graph and what we’re going to be taking a look at is actually the units sold so right here we have this and obviously for we don’t want 2022 we’re going to get rid of the year we only have one quarter right here we can see January February March so we can tell that January has the most sales or the most units sold in that month if we get rid of that we go down today we do have some information but we don’t know what day of the week it is it could change from month to month and it’s really hard to tell exactly what if there’s any pattern there at all that’s where what we just created comes in handy so let’s recreate this exact same thing but instead we’re going to use day of week so we’re going to select day of week in unit sold let’s drag that down move this over right here and this day of the week should be on the x-axis and it’s really easy now to see if there’s a pattern here there’s really not at least not for this fake data that we have um but just I I want these uh data labels on really quickly um it’s not easy to see if there’s any pattern again Monday has the most so maybe that that I mean it goes down a little bit and then it picks back up so maybe middle of the week is our least uh sales day our Wednesdays and Thursdays are a little bit lower than the rest and the beginning and the end of the the week tend to be the highest again not a huge pattern but you know it’s much easier to see if there is a pattern from week to week or what day of the week now that we use this weekday function and so this can be really really useful let’s go back here to our data and now we’re going to look at our last Dax function for this video let’s go up here and create a new column and we’re going to be looking at something called the if statement now if you’ve ever used Excel I’m sure you have heard of this and you can do the exact same thing here in powerbi and so we’re going to name this one order size order undor size and so all we’re going to say is if we’re going to click on this one right here we need to perform our logical test and then we want to say if it’s true what’s our value and if it’s false what is our value so what we’re going to be looking at is units sold so we’re looking at order size so we’re going to say if unit sold is greater than 25 what’s going to happen if it is true if the order is larger than 25 we want to say it’s a big order and if it’s not we want to say it’s a small order super simple we’ll close that parenthesis we’ll click okay and now really quickly we’re able to see if this is a big order or a small order and so that is all I have for you today there are a lot of other doc functions but the ones that we looked at today are ones that are very common ones that you’ll see the most and there can be a lot of of really complex and intricate Dax functions that you can create and in our project at the end of this series I will be sure to include some more complex Dax functions but hopefully this gave you a good introduction into Dax so you know how to use it a little bit better all right so before we get started I wanted to remind you that you can find the data that we’re going to be working with in this tutorial in the description you can go and download it from my GitHub now the two tables we’re going to be looking at are apocalypse sales and purchase tracker and if you’ve ever created any visualization you probably seen something like this where you’ll have the store and the price and this is the the things that we actually bought so this is the total amount of Apocalypse prepping uh equipment that we bought and we’ll put the store in this Legend right here and you’ve probably seen something like this and if you’re anything like me you’re going to be in a meeting and you’re going to be presenting this and some higher up is going to be like hey Alex Alex great but I want to you know see what things we actually bought in Target how much this cost can you create a visualization for that and you’re going to be like well I could or I could use drill down and so you could have done this in the first place uh which you should have so what we’re going to do is all we’re going to do is we’re going to say we’re going to say the product right here and these are going to be the actual things and we’re going to put it right under store now you can’t see these things right but there is a a hierarchy here so once we added this these options became available let’s take it out and all those just disappeared and then if we add it back right here they came back and so you can do right here which is click to turn on drill down you can go to the next level in the hierarchy or you can even expand all down one level in the hierarchy so let’s look at each of those really quickly so let’s click on this one it’s just going to turn on drill down mode so now if I go and I click on target it’s going to drill down into these and if we want to I can then put product under this Legend and we can see all of those things but of course if we go back up it’s going to be all broken up into this clustered column chart which is more like um this which isn’t exactly what we were going for but it works now uh let me get rid of this I actually want store in the legend now if we turn that off and we click it doesn’t do that anymore so what it does now is it just highlights Walmart it highlights Costco it highlights Target so we’re going to keep that on uh but we can also do something called going down in the next level of hierarchy so let’s click on that and so now this is going to go down to the next level down to this product level because that is the next level and now it’s going to show us each of those things but it’s going to have it broken out by the store and so it’s a completely different visualization but all within the same Realm of the data that we’re looking at and what we actually care about so let’s go back up in the hierarchy and then let’s use this one right here which is expand all down one level in the hierarchy and so this one is again extremely similar except it just visualizes it differently and now what it’s doing is Walmart rice Target dried beans Costco rice so instead of having an all uh like this one where it’s stacked on top of each other it’s breaking it down individually so this one column would become three separate columns now I’m going to minimize this right here uh I’m actually going to go back up in the hierarchy just for visual purposes now I’m going to show you one more example we’re going to use this apocalypse sales up here and this is one that I actually use all the time so the one you’ve seen you know you’ll get stuff like that as especially if you’re working with like sales and stuff but I work in operations right so I have a lot of order IDs product IDs stuff like that now this one this one genuinely I use quite often I’ll have a customer and let’s make it we’ll just go like this we have a customer and we have unit sold and let’s use the customer as the legend so let’s make this one quite a bit larger and I’ll have something like this and they’ll say okay well we want to see the order IDs that go with it cuz we want to know what orders are actually happening for each of these people obviously I’m not using this exact data but very very very similar and all you have to do is take these order IDs and slide it right under here under customer and this visualization right here is something I’ve done a thousand times because what happens is is someone some stakeholder in our company is saying hey Alex we want this and we want to know we want to drill down on on this IP address we want to drill down on this certain database we want to drill down on something and we want to see the order IDs within them so then all you do is you turn on drill mode or drill down mode you’ll click on it and you can see every single order ID that’s in there and then they can go and look those up in their system and resolve them or whatever they’re trying to do with it and it helps a ton and it’s very very useful this one is extremely applicable and that’s really all drill down is again you have these different hierarchies as well um but for different things it’s not as useful as you can see we also have this hierarchy which again is not as useful so it just depends on the data that you’re using and how you want to use this drill down effect but I promise you that drill down is used all the time especially when you’re giving presentations where people want to know more information than just the the visualization that you’re presenting all right so before we get started I wanted to let you know you can go and download the data that we’re going to be using in this tutorial in the description below is on my GitHub so we are going to be looking at bins and lists today um and for this we’re going to be going over here to this apocalypse sales uh and let’s open up our data right over here and we want to look at apocalypse sales really quickly I feel like more people would know what a bin is so we’ll kind of start with a list just go a little bit backwards than we normally would uh I’m going to use this customer or we’re going to use this customer column right here for a list really quickly and you can do that in two ways you can come up here and you can right click on on the customer and go to new group or you can come over here under this uh the Field section on the far right and go to customer right click and click new group so let’s click on that now and right now is only giving us the list type it’s not giving us bins because bins have to be numeric so we really can’t do that at the moment um so we’re going to call this just customer groups just or or we’ll actually call it list just so it’s easier to recognize when we create it and so all we’re going to do is we’re going to basically group these but it’s going to be called a list and so what we’re going to do is we’re going to select and we’re going to select and we’re going to say group and click on this group button and then it creates this Alex the analyst apocalypse Preppers and uh this prep for anything prepping store so that it kind of named it for us but if we double click on it then we can rename this and we can call this the best prepping stores and then we have these last two and we can we can click on one and then click control and click on the other one so we get both of them and then we can click group and we can call this and we’ll double click and we’ll call this the worst prepping Stores um and then that’s it and that’s all we have to do and what we’re then going to do and if you want to undo this and you want to switch it up and do whatever you can click on group but we’re not going to do that we’re going to click okay and here is the column that it created and it basically tells us what list we put it in if it’s Uncle Joe’s Prep shop that’s in the worst prepping stores list and if it’s the Alex the analyst apocalypse Preppers that is in the best prepping stores so it’s kind of like an if statement you could even create a calculated column do it on this customer create an if statement this is just a lot faster and a lot easier than doing that but it basically would do the exact same thing now you can use lists as well on things like numeric so let’s say we have order ID and we’ll go to new group and it’s going to Auto go to bin because typically that’s what you’ll use but you can do list as well and let’s say you know we want to say we want to call these like we’ll group these and call these the first um we’ll call this the first customers or the first orders because we’re looking at order IDs look at the first orders and then we will go back here we’re going on the left side we’re going to click oops we’re going to go back to the top we’re going to hit shift group all of these and we’ll say the latest orders and you absolutely can do this um again this is kind of like an if statement right so you’re saying if it falls between this range and this range then it’s called the first orders and if it’s between this range and this other range it’s the latest orders um again it’s just a much simpler version of an if statement and so you don’t have to write it all out you can just have this user interface kind of do it for you uh and and it’s really really useful so now let’s talk about bins and by far the easiest way to demonstrate this and I’ll show you one other way uh but by far the easiest way to show this is by using age and so uh for absolutely no reason whatsoever these customer IDs uh who are right here in this customer information they decided to give us some of their buyer information who are actually buying their products on their website it or in their store they just decided to give it to us as well as some uh simple demographic information I I don’t know why but what we’re going to use bins for is grouping these age brackets so you know you might be interested in say well I want to know if my core population who are buying my products are within a certain range and you don’t want to look at every single age because then it just you know in your visualizations it’s not going to look right you want to kind of group them and make it easier to visualize so what we’re going to do is going to go through here and we’re going to basically go by tens so 10 20 30 40 50 60 and see what age bracket these people fall in so we’re going to go to age we’re going to right click and we’re going to say new group and we’re going to go to bin and we’ll leave it as the default age bins um and you can do two things you can do the size of the bins which splits it uh uh which splits it by this number right here or you can go based on the number of bins so if you only want to do five different bins it’ll count calculate that for you and it’ll say okay if you only want five bins you’re going to have to do it at 12.2 if you want 10 bins it can be 6.1 but it is completely up to you on how you want to do that um you can do the size and we’ll just say every 10 which is what we’re going to do or you can go through and then you can create you know the how many bins you actually want so let’s go ahead and click okay and it’s going to create those bins for us so if somebody is 78 they’re going to be in the 70s bin if somebody’s 41 they’ll be in the 40 bin if somebody is 29 they’ll be in the 20 bin and so on and so forth so when we go to visualize this we don’t have you know 71 72 73 74 have a lot more things on our visualization it’ll just be the 70 or it’ll just be the 20 now we can also use bins on dates as well so let’s go back to apocalypse sales we have this date purchase so we can create a bin for this as well so let’s go to date purchased let’s go new group now you can also create a list and that’s totally fine if you would like to do that um and it would look kind of like this where you can go through and you can select it and you can say okay this group all these dates you can group those and say this is going to be January uh and you can do that and that’s totally okay um but for this one we’re going to do bins I think it’s a little bit easier to do bins because what we can do is go right here and we can specify what we want seconds minutes hours days months or years and so um for the data that we have it goes January February and March so we’re going to do months and we’re going to say the bin size is going to be one month so each month should have its own bin so it’ll be three bins total so we’re going to select okay and as you can see on this right side we have January of 2022 and that correlates to the January over here then it goes down to February and then it goes down to March and then when we visualize this uh we don’t have to do this the hierarchy stuff that we do in here where we filter it down down to months we can just use this right here and that will be our month’s column so now let’s go over to our visualizations and we’ll see how this looks really quickly we’re not going to look at all of them but we will take a look at few of them so the first one that we can look at is age so let’s look at the buyer ID and then we’ll do age as well and so let’s spread this out and we can see our distribution of our buyers so it looks like we have very few uh who are in the 10 range thank goodness and we can even put the age right under here under the age bins and we have this now we kind of have this drill down and so if we go right here and we drill down right there this will actually give us the breakdown so this is what it would have kind of looked like our visualization would have looked like if we had just kept it the age because now we’re drilling down into the age and so it looks like we have one 18-year-old and maybe a 20-year-old as well um um let’s go back up yeah so it looks like we only have one buyer ID yes so there’s only one 18-year-old so of legal age to start buying you know all these prepping equipment and probably uh buying online and stuff like that which makes sense right so uh this gives you kind of a quick breakdown in the bins rather than um doing it the alternative way so now let’s take a look at the customer list as well as the unit sold and it looks like the best prepping store uh is actually performing much worse surprisingly uh than the worst prepping store right so before we get started if you want to use the data that we’re using in this video you can find it in the description on my GitHub now conditional formatting is super simple and you’ve most likely used it in Excel before but you can also use it in powerbi and let me show you how to do that so the first thing we’re going to do is come over to our apocalypse store and we’re going to pull up our product name as well as the price and what we can do is come over here and we’re going to go to price and it has to be Under The Columns so you can’t come over here and do this we’re going to come right over here to price and we’re going to right click and let’s go to conditional formatting and we have background color font color icons and web URL let’s take a look at background color first this is most likely the one that we’ll look at the most so we’re going to get this pop up and I’m going to slide this over now there’s a lot of different things we can customize in here and the first thing I want to take a look at is format style we have the gradient and what it’s going to say is the lowest value will be this color highest value will be this color it’ll give us this gradient color scale and so we’ll use that in just a little bit but we can also create rules kind of like an if statement and if it is between this range and this range we’ll give it a color and if it’s between a different range and a different range we’ll give it a different color so we’ll also try that one and then we have this field value uh and this one is one that uh honestly I don’t use that much I’ve used it maybe once and what you can do is select a text field like customer and you can do some izations on the first and last and that is it so what we’re going to do is we’re going to look at gradient specifically for not the customer but we’re going to go back to the apocalypse store and we’re going to do it on the price now what I’m going to do is keep it as the count because this is what the default is and we’re going to go back and fix it later but what we want our lowest value to be is this bright green showing that it’s it’s a cheap product it’s easy to purchase the high value ones are going to be just the shade of red more expensive and we’ll do it on the count now remember the count is on each of these and we’re not doing a count of how many are sold we’re doing a count of each product so it’s just one per row so it all should be the same color let’s take a look so it is all the same color but what we really want to show is the actual price not just the count of the price so let’s go back to conditional formatting we’re going to click the background color again and this time we’re going to change the summarization now you can do sum you can do average minimum maximum it really doesn’t matter for this example the number is the same regardless of really which one we choose so we can just choose the minimum and it’s going to choose the minimum of each row which is the price so we’re just going to select minimum for this example we’ll select okay and it should correct it accordingly which means the bright green is the lowest and it goes all the way up to the highest which is the red now let’s go over here to apocalypse sales We’ll add in the units sold and let’s move that out a little bit and I’m doing that on purpose because we’re about to look at something within the conditional formatting so let’s go to unit sold and we’ll look at the conditional formatting for this one now if you noticed we now have a new one on here called datab bars now we’re able to see data bars on unit sold and not price because unit sold is something like a sum an average something that’s aggregated but let’s take a look at data bars because I want to show you how to use this and then we’ll go back to the background color so for data bars we are going to taking a look at the lowest to the highest value again we’re going to go from bright green all the way to this exact red it’s going to be from left to right and what it’s going to show you is if it is a positive number which all of these are is going to be a green bar basically representing the number that you see in here along this line so let’s click okay and we’re going to be able to see the highest numbers and let’s let’s scooch this over quite a bit so you can kind of get a better understanding and we’re going to do it from highest to lowest so we sold the most multi-tool survival knives at 477 and so this entire bar this row is entirely filled up or almost all the way filled up while as it gets lower and as we sell only 182 solar battery flashlights the bar is going to represent that and show that now I’m about to completely mess up this visualization on purpose because it’s about to get very messy to show you that you can do a little bit too much uh it is possible what we’re going to do is we’re going to go right over here to this background color unit sold and instead of gradient let’s look at rules now with the price we just did a gradient scale but we can do basically groups of these and say if a number is greater to or equal than this number then it’s going to be a certain color and then if it’s in a different range we can give it a different color so we’re going to say if it’s greater than or equal to zero and we’re going to say number not PR and if it’s less than 266 cuz we have 265 right here let’s make it a nice uh like gold a beautiful lovely mustard gold just just great now we’re going to say if it’s greater than or equal to we’ll do 266 because this is less than 266 so it should be greater than or equal to 266 number and if it is less than we’ll say 500 now we want to do this this one and we’ll give it uh let’s do like a peach and we’ll click okay and now we have another conditional formatting on top of that that can give us more information now again you should not do this it’s just too many now let’s go one step further and make it even more ridiculous and show you one more thing before I show you how you may actually want to use this uh let’s go back to unit sold we’re going to right click go to conditional formatting and you can do something called icons um font color is the exact same thing as back color except it changes the the font and so I’m not really going to look into that one icons are very simple extremely similar to Excel and how you’ve seen them and the rules that you can apply to them are basically the same as if you’re doing like a gradient and it’s these if statements that we saw before now it autog gives us this right here which basically says 0 to 33% 33 to 67 67 to 100 if it’s in the bottom 3% it gives us this red the middle is yellow and the top is green green so we can go through and change all of this but honestly this looks pretty good so let’s click on it and so the ones that are least sellers are these red ones right here and the top sellers are up here now this is just based on unit sold and this looks absolutely terrible so let’s kind of take this exact information but make it a little bit better so we’re going to create a new visualization or at least a new table so let’s click on product name and we’ll take the price unit sold and revenue and what I think makes the most sense for looking at revenue is these data bars right here but there’s only one problem I can’t do that because it’s not summarized like unit sold was but what I can do is to get that those data bars is I can come right down here instead of saying don’t summarize I can summarize it and I can just click the sum so it now is summarized it’s the exact same number but if I right click on here as sum of Revenue I go to conditional formatting I can now use those data bars and so we’re going to use those data bars and we’re going to say for the lowest value and the highest value and let’s just make it a nice maybe a darker green I don’t want it to well that’s that’s hideous let’s make it this color right here a nice dark green and there’s no negative so it doesn’t really matter we’re going to go left to right and you can show the bar only but we’re going to keep it because I want to see it and we’re going to go just like this we’re going to order and this is pretty telling um honestly I did not think the weatherproof jackets were performing so well but I mean they are by far a number one seller so you know our weatherproof jackets multi-tool survival knives and the nylon rope are perform outperforming all of our other products so those might be the ones that I focus on the most while duct tape the n95 masks and waterproof matches I mean those are those are garbage so I might be looking to replace those in the near future with some other items that might sell a little bit better so that’s how you use conditional formatting and it’s actually pretty useful there are a lot of times where I’ve done something like this in an actual visualization for work and it looks something like this it just depends on what you’re visualizing but this is very much a simple thing that you can do to just add a little bit more information and and actual visuals to this little chart or table that you’re going to create sometimes it’s just better to have these simple visualizations on this table rather than just having the numbers themselves makes it a little bit more easy to read and understand stand all right before we jump into it there is a link in the description where you can get the data that we’re going to be using for these visualizations if you want to practice them yourself before we actually get into it we do need to combine this and if you download that Excel and you see this you’ll have to do the same thing all we have to say is that this product ID is the same as this product ID purchased and now we are good to go do one to many and it’s okay if it’s one way so right over here under this visualizations tab there are lot lots of different options and it can be a little bit overwhelming you don’t really know which one to choose there are some in here that I have almost never used for my job ever so I’ll Point those out as we go through but the main focus is going to be focusing on the ones that I do use that I have used and showing you how to actually create that visualization maybe spice it up just a little bit but we have a lot of them to go through so let’s jump right into it and the very first one that we’re going to start with probably the easiest one and the one that you’ll recognize the most is a stacked bar chart and what we going to do is go ahead right over here to the product name and we want this unit sold as well so we’re going to click product name and it’s going to go straight into the Y AIS for us and then we’re going to click unit sold and that will go into the x axis automatically it just kind of intuitively knows but sometimes it will make a mistake and then you can just fix it or flip it and we do want this uh let me make this much larger we do want this to be a little bit more colorcoded that is what this Legend is down here so what we’re going to do is drag this product name down to the legend and now we have each product as its own color and in previous videos we have gone through and looked at some of these Visual and general options that you have when you’re actually creating these visualizations but we’re going to do some of them while we’re in here as well so we’re just going to go down here we’re going to choose data labels and we’re going to shrink that and if you go higher the higher you go the less you see so if you want all of them all the way down to the green we’re going to go right about there and we’re going to make it smaller so now we can go ahead and click anywhere outside of that visualization and now we can create a new one if we had just kept it like this where we were still interacting with this visualization and we clicked on a different one it would have then changed our visualization completely which we don’t want so let’s hit contrl Z click out of it and now we can create a new one let’s go right over here to this 100% stacked column chart I’m going to click on it try get get over here and make it much larger and we’re going to come right over here to this customer information and we’re going to click on customer and then we’re going to go up to unit sold and click on unit sold and we want to break these out and so basically what this is doing is it’s breaking it out by each of these shops and we can see the total of what they’re buying the units sold but we want to see exactly what products make up this percentage or this 100% so we’re going to go right over here to product name we’re going to drag that down to the legend and as you can see now we have each of these products and each of the products is up here so this backpack we can see the backpack right here backpack right here and right here and we can see which customer is buying what percentage of their purchases so for this prep for anything prepping store they have a very large percentage 40% is duct tape so they’re buying a lot of duct tape so really quickly we’re able to see what clients are purchasing or which clients are purchasing what products the most so so just like this Alex analyst apocalypse Preppers they’re buying a lot of water purifiers we like drinking clean water um you know that’s just what my audience likes and so you know we can easily get a quick glance of that again we’re going to go in here I tend to like putting these data labels on here that’s just what I preference so you know something like this it looks nice it looks clean um we can always go back and change these names which we’ll do for this one so we’re going to go over here go to title we’ll go down to to the text and we’ll do customer oops customer purchase oh jeez breakdown pretend I’m really good at spelling and we’re GNA do it just like that we’ll get out of there so now we have customer purchase breakdown and that looks really nice it’s a good uh a good visualization and we’re going to bring that right over here we’re going to have a lot on the screen so I may have to uh make them smaller or larger to fit everything all right so let’s go on to our next one another really common visualization is this one right here which is the line chart and the line chart is great especially when you’re using things like dates I have found this one to be the best and a lot of people use this as well so we’re going to go right over here and click on date purchased and then unit sold and on the x-axis you can see it’s broken up by year quarter month and day so we don’t want to do at that high level we only have three months of data in here so we’re going to get rid of the year we’re going to get rid of the quarter and then we at least have this and let’s break it out cu right now we’re looking at all of the units sold so we’re going to drag the product name right down here to the legend and now it breaks it out by the actual product and for each month in January February or March you can follow these products and see how they did in each of those months and if we wanted to we can come right over here to the filter on the product name and we could filter it by maybe the top three so let’s do multi-tool survival knife the nylon rope and the duct tape we can have it just like this and you know you can do those for any product that you want but again we just want to do it for those three just for an example and that really doesn’t give us a ton of information we could even go down to the day and you know it might give us a little bit more information and so we’ll keep it like that and we can go over here change the name as well we’re not going to do for all of them again we’re just looking at the different types of visualizations I think are really good to know but we’ll change this one as well to products purchased by date we’ll keep it just like that again nothing fancy we’re just trying to look at a bunch of different stuff so let’s put this over here down here now let’s click out of there and there are other ones in here um that are definitely useful and you absolutely can use um like this one is a stocked bar chart this one is a stacked column chart it’s basically the same thing just a different orientation we went to here it’s just a different orientation it’s the same thing um just like this clustered bar chart cluster column chart it’s just its orientation either horizontal or vertical then we have things like an area chart a stacked area chart not really things that I’ve used too much in previous positions one that I have used though is a line and clustered column chart so it kind of combines a few of these with you know you have these bar charts as well as line charts into one visualization so let’s look at this one because this is one that I have used several times in my actual job so for our x axis we’ll use the product name then we’ll look at something like the price and so let’s make this a lot larger so you can actually see it so now we have the price and now we can look at something like the production cost and that can be our line Y AIS so now we’re looking at the price of it how much someone is actually paying for it and then we’re looking at how much it’s costing us to actually produce that product and so really quickly at a glance you can kind of see that it’s around the halfway to 2/3 point on most of these you can see that the production cost is always lower than the actual price because of course we’re out here to make a profit on these products so let’s minimize this one we’re going to put this one right down here let’s make it even smaller smaller let’s click out of that and the next one that we’re going to take a look at is a scatter chart so let’s click on that and make it much larger oops there we go so let’s use the price and the production cost again and so our x axis is the price our y AIS is the production cost but now we need to fill in this values right here so let’s go over here and click on the product name and drag that into values and so now we have our values we just don’t know what they are but we can see see it so let’s drag this down to Legend as well and it breaks it out and we kind of have this scatter plot and you know for this fake data that we’re using it doesn’t really show a lot U but if you’re using real data you can definitely find outliers and Trends and patterns using this type of visualization let’s go ahead and make that one small as well iy get right down into the corner now let’s go right over here and we have the the dreaded pie charts um and donut chart now look I think it’s kind of a joke in the data analyst Community about pie charts and dut charts but at the same time people use them and they request them and so sometimes you’re going to use it whether you like it or not so let’s click on the dut chart and let’s make this one a lot larger and let’s go over here and let’s click on State and we’re also going to click on total purchased and that’s really all you have to do these ones are pretty straightforward you can change a few different things like where these labels are if you want them inside you can also do that that would look totally fine um again I’m just not a super huge fan but you will get this one requested people like this and want to see it and the reason a lot of analysts don’t like using this is because when you start glancing at these it’s really hard to tell the difference between these sizes if you look at something like this you can easily see that this is larger like if you’re looking at this one the multi-tool survival knife is obviously the longest and it gets shorter shorter shorter shorter but when you start getting in here it’s really hard to approximate the size I would not be able to tell the difference between this 5.63 5.78 two 7.72 I would not be able to tell really the difference between these or or kind of the the difference between them very easily that’s why a lot of people don’t want to use them in general so again I want to show you this one because I think it’s worth noting and worth knowing how to use but I don’t really push people towards this because I don’t think it’s the best visualization available most of the time all right the next two are super easy but are used all the time uh maybe more than some of these even but they’re just so easy to use so I’m kind of saved them for last this one is the card and all the card is is it displays one number or multiple numbers if you want to use a multi- card but we’ll just look at the card for now all we’re going to look at is the total purchased and it’s just going to display it just like this and you can make it as large or as small as you’d like and normally it goes on like the top and you’ll put card here a card here um just for example I’ll kind of show you how this might look so it look something like this right and at the top it’ll have different usually High overarching information and this is super common to see and I’m sure if you’ve looked at other people’s visualizations you’ll see something like this this is usually totals or averages or something like that in here where it’s super easy to look at so like right here this is total purchased and we can go in and look at the minimum and then we can go over here and this one can be account and so it gives us a lot of information just at a really quick glance and then we have all of our more in-depth colorful visualizations that kind of have more information than just a single piece like the card does and then the very last one that I’m going to show you is this one right here which is the table and this one is obviously extremely popular it’s like an little Excel table and we can go in here and we can get the customer wherever that is and then we’ll also get the unit sold and this is what it looks like and it’s super easy and often times you’ll have it like on the side as well uh and all the other visualizations over here and so you know if we’re going to take all these visualizations and pretend they were like a real thing you know there’s a lot in here but we’ll just kind of really quickly do this um you know we might have something like this and we’ll make this larger and make this wider and you know we have a lot of information just in here and this is not a project so don’t go put this on your portfolio I’m just threw a ton of random visualizations on you know this dashboard but you can already see a lot of these you most likely have seen in other people’s work and other people’s visualizations on LinkedIn or on YouTube these are very common very very popular and again we did not go through all of the ones over here there are maps that you can use but I haven’t used Maps ever in my job there are things like gauges and deom composition trees and waterfall charts and uh tree maps and all these different things but I really have never use those in my actual job and I don’t see them a lot in others people’s work either otherwise I would be telling you to learn these and use these what’s going on everybody welcome back to the powerbi tutorial Series today we’re going to be working on our final [Music] project now this is our final project of the powerb tutorial Series so if you have not watched all of those videos leading up to this I recommend going and watching those videos so you can make sure that you know all the things we’re going to be looking at in today’s project I am really excited to work on this project with you because I think it is a really good one and it uses real data that we collected about a month ago where I took a survey of data professionals and this is the raw data that we’re going to be looking at and so I think it’s just really interesting that we collected our own data and now we’re using it for a project we’re going to transform the data using power query and then we’re actually create the visualization and finalize the dashboards as well as create a theme and a different color scheme to kind of make it a little bit more unique without further Ado let’s jump on my screen and get started with the project all right so before we jump into it I wanted to let you know that you can get the data below it is on my GitHub you can go and download this exact file that we’re going to be looking at now in the past several projects we have been using this fake apocalypse data set you know it was fun it was you know whatever this data set is real this is a real data set it was a survey that I took from data professionals I posted on LinkedIn and Twitter and all these other places and we had about 600 700 people who responded to the questions so before we actually get into it and start cleaning the data and doing all this stuff in powerbi I just wanted to show you the data all right so this is the CSV that I downloaded from the survey website that I used and this is completely raw data I haven’t done anything to it at all but let’s go through the data really quickly and we’ll kind of see what we have and we are not going to make any changes at all in Excel we’re going to do all of our Transformations or at least a few transformations in powerbi because again this is a powerbi tutorial and project so I want you to kind of learn how to use that and not use Excel because you can go through my Excel tutorial if you want to do that so let’s just look at it in Excel and then we’ll move it over to powerbi and actually start transforming the data so we have this unique ID these are all the people that actually took it oops don’t want to do that we have an email which this is completely Anonymous I didn’t collect any data or user data on this then we have the date Taken um and let’s get into the actual good information then we have all of these questions so we have question one which title fits you best and they can choose things now uh let’s add a filter really quickly that we can look at this now you had the pre-selected ones which were like data analyst architect engineer but then there was an option where you could say other and you could specify what that was so if you look in here we’re going to have all all these different other please specify with different titles right and there were a lot of them now typically what you want to do is really clean this up and we’re not going to be doing a ton ton ton of data cleaning but we are going to do some in powerbi but none in here but typically with this amount of data and the way that it’s formatted we would do so much data cleaning um with this one I mean there is a lot of work to be done um like this current year salary this is one that I would absolutely be cleaning up because it’s arranges and it has a dash and a k and all these numbers this is something that I would be cleaning up and using but we’re not going to be cleaning this up right now so anyways let’s just get into it let’s see what questions we asked uh we have the yearly salary what industry do you work in favorite programming language then there were a lot of different options this is like one question where they picked multiple options so is how happy are you in your current position with the following you have your salary work life balance um then we have co-workers management upward Mobility learning new things um and they could rank it from zero to 10 so some people ranked upward Mobility at 10 so I’m ranked it a zero or a one um and again they can answer however they want how difficult was it to break into Data very difficult very easy um if you’re looking for a new job we have have you know what would you be looking for remote work better salary Etc we have male female which country are you from and then this is more like demographics so if you’re a male how old you are and this was in a Range so this is like a a a a sliding bar so you can slide to the exact age you had there’s some people who are apparently 92 um which if that’s true I mean good for you man or woman actually really quickly I’m going to see just just while we’re here I’m going to see if this is a male male or female that’s a female from India very cool um so we have all this information and it is a lot of information when you have something like this I mean there is so much data cleaning that can be done I mean I already see like 20 plus different things that I would need to do to make this a lot better um and we also have date Taken and the time taken as well as how long they took on it like the time spent really really just really interesting data but again this is a beginner tutorial Series this is the beginner project so we’re not going to get do anything too crazy I will be using this exact data set in a future video doing a lot more data cleaning and creating a much more advanced visualization with what we have and what we’re looking at right here but for this video we’re just going to be doing a pretty simple visualization and dashboard that you can use uh to practice with or put on your portfolio if you know that’s where you’re at right now so let’s get out of here and let’s put this into powerbi so let’s exit out and let’s come right over here to import data from Excel we’ll click on powerbi final project and open give that a second doing this all in real time we only have the one so we’ll do be we won’t be practicing any joins or anything but we’re not going to load it we’re going to transform this data so let’s put it into Power query editor and now we have all of our data in here and it should look extremely familiar now when I’m looking at this when I start looking at this information I kind of need to know beforehand what I want to get out of this do I need to clean every single column do I just need to clean a few of them do I need to get rid of columns that’s kind of where my head’s at and so right off the bat I can already tell you that there are columns that we can just delete to get out of our way so we’re going to do that at the beginning so that we don’t have to do that later on or they’re just in our way so I’m going to click on browser and then I’m going to hit shift and I’m going to go over here to refer and I’m just going to go up here to remove columns and everything that we do is going to go over here to this applied steps if you’ve been following this series um you know we can remove things add things but anything we do will show up right over here so we can track it and go back if we need to now one column that I know for sure that I’m going to be using quite a bit is this which title fits you best in your current role because I I specifically wanted to do a breakdown of diff people’s roles and how much they make and different stuff like that so I know that I want to use this but as we saw before there’s kind of the issue is is it’s not very clean right it has data analyst data architect engineer scientist databased developer and then all like a hundred different options and then a student or or none of these right um and so for the purpose of this video right here we are not going to take every single one of these options because this involves a lot more data cleaning let me give you an example this says software engineer this also says software engineer and with AI these two would typically be combined or standardized to software engineer but it’s not very easy to do that in powerbi we could do that in Excel but not really in powerbi or even SQL if we pull this from a SQL database um and you can find lots of different you know options of that we have data manager and data manager if we separated these out these would be different options when we created our visualizations and we don’t want that so what we are going to do uh and this is going to be kind of a an easy way out to just make sure that this is pretty clean and doesn’t we don’t have a thousand different options we’re going to create this to other so we’re going to simplify this a lot and then we’re going to use this so we’ll have maybe six or seven options instead of the you know let’s say 50 that we would have if we actually did the harder work which just break it out standardize it and clean it up that way so what we’re going to do is we’re going to click on this right here and we’re going to go up here to split column in this ribbon up top we’ll go to split column and we want to do it by a delimiter and if you notice let me see if I can move this over if you notice we have other and then we have this parentheses and in no other option way is there parenthesis so what we’re going to do is we’re going to use a custom and we use this open parentheses what that’s going to do is it’s going to separate it by this parentheses it’s going to leave the other it’s going to create separate columns um just one separate column for each of these and we can do that at each occurrence or we can do the leftmost and we really we only need it for the leftmost because there’s only one of these uh left-handed or left-sided uh brackets or or whatever this is called and then let’s go and click okay and it should create another column so it’s going to have 0.1 point2 and now we have if we click on this now we only have these options we have analyst architect engineer data scientist database developer other and student looking or none that is what we want it makes it so much simpler and it’s not perfect but again I’m trying to show you what we are able to do in powerbi so now we’re just going to remove that column and we’re going to go and do the exact same thing to this one as well cuz I know that we want to use this and I really wanted to use this one as well but if we look at this one also um there’s a lot so I said what is your favorite programming language and people there were pre-selected answers like JavaScript Java C++ python R things like that and then there was other option and in this other option I mean it was free text so they can fill it in as they want I mean there’s four five six different ways that people put SQL that is something I would standardize and you know that would be the way I cleaned it but that’s not how we did it in here so we’re going to do the same thing we’re going to keep that other so we’re going to split this column again we use a delimiter and for this delimiter though we’re going to use a colon so we’re going to say we’re going to do a colon right there just do the leftmost we’ll click okay and then we have our options and it’s much simpler now I really would have rather kept all these and because sql’s in there quite a bit but you know a lot of people don’t think SQL is even a programming language so uh we’re going to delete that column now one that I just skipped and I kind of wanted to go back to is this current yearly salary I really want to use this let’s see if we can use it I here’s what I want to do with it and this is not perfect um but for this video I want to try it what I want to do is break up these numbers 106 25 and then take the average of those numbers so then we’ll use some docks in there so we’ll take 106 125 create that into two separate columns then we’ll create a third column that will give us the average of those two numbers so we’ll do 106 plus 125 divided by two and then we’ll have the average of that now that is not perfect but it’s going to give us at least you know an average a kind of roundabout number because they gave us this range they said my salary is between 106 125,00 000 so if we say that their salary was 112,000 at least gives us it makes it usable it’s a numeric value instead of being this which is text which we really we could use and and I’ll show you how to do that because we’re going to keep this column I’ll create a copy of this and I’ll show you the difference between this and using the average but for but for this data cleaning portion let’s just try it let’s see what we can do and see if we can make it work so first let’s create a duplicate so we’re going to uh duplicate the column so now we have this copy at the very very end and we can use this one instead of having to use the original way way way back here so we’re going to leave that one how it is and we’re going to use this one so let’s go ahead and split this one up we’re going to click on the column header then we’re going to click on split column and we’ll do it by digit to non-digit and if you look at it right here it’s broken it out kind of um in the fact that now in this one we just have numeric values and in this one we have k-h numeric or just Dash numeric and now this can be easily cleaned whereas this one we can just completely get rid of because it’s only K so we’ll just remove that column and then in this one we’re going to rightclick we’re going to click on replace values and so if it just has we’re just do a k a we’ll replace with nothing do okay and then for the last one we’ll go to replace values and we’ll do it the dash or the minus sign and we’ll place that with nothing and so now we have our values as well oh we also have a plus let me get rid of because that’s when some people had 250 or 225,000 plus so for that one the average is just going to be 225 we’ll have to specify that in our decks I forgot but actually if somebody has 225 let me find this plus really quick uh let me filter by it because that’s a lot faster what we actually want to do for the purpose of this one is we want to put 225 here so that when we do 225 plus 225 divide by two it comes out to 225 that’s just what we’re going to put it as and there’s only two people so uh I’m actually going to replace this I’m going to do replace values I’m going to say plus with 225 and we’ll click okay on awesome we can unfilter these select all so we’re going to go right up here to add column we’re going to say custom column and we’re going to go right over here actually let’s make it uh average salary so we get average salary so we’re going to insert this we going to say parentheses and we’re going to say plus this insert and close the parenthesis divided by two and it says no syntax errors have been detected let’s click on okay and it’s giving us an error so it’s saying we cannot apply operator plus to types text and text which makes perfect sense these aren’t uh numbers so let’s make it a whole number and let’s make it a whole number and then let’s see if this will actually work now or maybe we just need to try a whole another one so let’s try transform or add column custom column let’s try this all again see if uh I can make it work insert this one plus this one and we’ll do divided by two and let’s try this one and there we go so now let’s get rid of this column columns and we can actually remove these ones as well because now we have this um average salary column which when we look at this or when we use this uh we can let me see if I can just move this way way way over all right I might cut because this taking forever so if you take the average of these two numbers you’ll get 53 if you take the average of 0o and 40 you’ll get 20 so now we have this average salary and again when we get to the actual visualization part I’ll show you why this isn’t as useful as having this average salary and just a reminder this is not perfect uh I wouldn’t typically do this especially if I had it in Excel or if I was you know creating this survey in a different way I would probably have a very specific value where they can do it on a slider but this is how it is so we’ve at least made it usable or more usable in my mind and we have a few other things that we can change like what industry do you work in where we can break this one out so I’m going to go ahead and break this one out as well as this one right here which country do you live in I’m going to breako both of those out to where it’s the country or other I’m not going to have these other values although there are a lot of them because there’s a lot of people who live in these different countries but we can’t really do that super well in here because again the same issue kept happening Argentina Argentina Argentine a Australia so we can’t normalize those values unless we spend just a copious amount of time doing do that so I’m going to go ahead and do these I’m going to fast I’m going to fast speed this so it goes a lot faster so I’m just going to go silent and let this happen really quick and then we’ll get to the end and we’ll actually start building our visualizations all right so we’ve split them up and as you can see we have all these options as well as other and I think you know there let me tell you there is so much more that we could do with this I mean just so many other things but this is like what the bare minimum of what we need for this project so let’s go ahead and close and apply this and if we need to come back at any point and actually fix anything or change anything we can so it’s not like that’s permanent um so as you can see we have everything over here we have all of our data as it is transformed in here as well and now we can start building out our visualization so let’s go back to our report and let’s start building something out all right so let’s add a title to our dashboard make this right at the top call this the data professional survey breakdown and let’s make that quite a bit larger make it bold why not and we’ll put that in the center and now let’s um let’s add some effects let’s change that background to something like it’s too dark something like this and I do not like that bold let’s take that off there we go so something like this just has a quick title to what we’re about to do what we are about to build so we’re going to start off with the most simple visualizations that we’re going to do and we’ll kind of work our way towards kind of the harder ones so the first one that we’re going to start off with is a card and the cards are obviously like just super super easy they usually just display one piece of information so we’re going to go right over here to the very bottom at the unique ID and we’re going to select it and we’re going to say a count of distinct or a count it doesn’t matter um and it says 630 count of unique ID now we’re not going to keep that as is we’re actually going to go right over here we going to say rename for this visual and it says count of unique ID but we’re going to say count of survey takers and you can say whatever you want here but in in general that is what it is we’re we’re counting how many people um you know took this survey and that’s just a kind of a total maybe I say total amount or of survey takers but you can say count of survey takers how many people took the survey so let’s click out of there let’s click on card let’s make it about the same size size we’re going to drag it up here and try to make them about the same we will in a little bit we’ll make them the same size um but for this one we’re going to look at age so we’re going to look at current age so I’m click on that and we’ll say want the average age so our average age taker is almost 30 years old so let’s go right over here we’re going to say rename for this visual we’ll say average age of survey this might be too long average age of survey taker again name it whatever you’d like so again these are meant to be high level numbers so when somebody’s looking at your dashboard they can just really quickly glance at this and know exactly what it is instead of like some of these other visualizations that we’re about to create they don’t really have to dig into it look at the x- axis the y axis the the different uh Legend colors and whatnot they can just see these high numbers and get a really quick glance of the data now let’s create our first visualization and what we’re going to do for that one is a clustered bar chart so let’s go ahead and click on the clustered bar chart and create as small or as large as we’d like and for this one we’re going to be looking at the job titles now remember we kind of change the job titles or you know uh transform those if you want to say that so we’re going to look at Job titles and then we’re going to look at their average salary and if you remember we transformed that one as well we have average salary now this one is it looks like a text right now so it may not work properly and what we’re actually going to do is go over here I want to see the average salary so let’s click on average salary and see if we can change this data type from a text to a decimal number let’s click yes I forgot to do that when we were transforming it and there we go this is perfect um so now we can go back and we can select our average salary and as you can see it has this um this function symbol so now we can click on it and it’ll look a lot better and although this says average salary as the title it’s actually doing a count or the sum so we can click average right here and what we want to do is actually break this down by the job title and so now we can see data scientists are making the most by far they’re making average of 93,000 at least from the survey takers that took it then we have our data Engineers making 65,000 data Architects are making 63 and then we the data analysts data analysts are right here making 55 so again we had 630 people take this survey and so the vast majority of them were data analyst so this one’s probably the most accurate out of all of them and I actually don’t like how this looks as the clustered bar chart let’s try the Stacked bar chart and put this as the legend that’s more more what I was going for I don’t know I didn’t want as skinny because when you’re doing this one it typically they have multiple options per um uh x axis and so I think that’s why it was that little skinny line but this one is more what I was looking for but let’s make that smaller and let’s definitely change that title because good night um this is like incredibly long let’s go over here to this format visual we’ll go to the general the title and we’re just going to say average salary by job title just like that and this looks a lot better now we’re not going to kind of format all our whole dashboard yet we’re going to create our visualizations and then we’re going to kind of organize everything and kind of play Tetris with it to make it look the best so we’re just going to minimize this and put it right up here for now um but we will go back and kind of make everything look better at the end and actually while we’re here I also want to change this as well so rename for this we’re GNA say job title Oops why did I do that job title and for this one we’re just going to say name average salary there we go looks much better much cleaner uh took away a lot of the anxiety that I was feeling about two minutes ago when we first put that up there so let’s go on to our second visualization the next one that I’m interested in is actually what programming language people were using the most so we have salary there’s a thousand different things we can look at in here but I want to know you know what is people’s favorite programming language so let’s take a look at that so we have favorite programming language let’s find that so we have our favorite programming language and we also have how many people actually took it or the unique people so right now this is columns we don’t want that let’s um let’s do a clustered column chart click on this right here and it looks like here we go that is kind of what we’re looking for and instead of count of unique ID we’ll say count of let’s do count of Voters and for favorite programming language we’ll say favorite oops programming language and get rid of that as well and then we’re going to go into here also and change the title and say favorite programming languages or favorite pro programming language just like this now let’s make this a lot bigger so you can see it but really quickly at a glance you can see python is by far the most popular are other C++ JavaScript Java now all we’re seeing is the count so it’s all the same same it’s just blue we can see how many people voted for each one but if we wanted to break it out similar to how we did with the job titles we could still do that so all we’d have to do is break it out uh bring this job title down to the legend it now breaks out like this and that’s not exactly what I was going for I was going more for something like this where we can see the still the whole count but now we can see who is actually voting for these things so I’m just not a huge fan of the colors that are pre-selected here and kind of the whole whole theme of this dashboard at the very end we’re going to completely revamp this change a bunch of colors the background and make this look a lot nicer rather than just the white background like we have it um and so for now let’s just make this a lot smaller and put it into this corner these will not be staying there but we need to we need room to create our next visualizations and just a cleaner space to do things now the next thing that I really want to include is a way to break break down where they’re from their country because especially something like salary is very dependent on your country whereas the average salary in the United States for a data analyst may be like 60,000 in another country it could be 20,000 that could bring down the average quite a bit so we need a way to be able to break that down now we can do something like a filled map and there’s no problem with that at all um but you know for what we’re building what we’re creating it’s not probably going to work out the best I mean this looks okay we could stick it in the corner or something um and you can do that and that’s perfectly fine I think what I’m going to do is something like a tree map which I don’t use a lot but I want something where they can just click on it they can look at the values distinct they can look at the values and just click on it and it’ll be right there for them so they don’t have to filter it out on their own or no geography and look at this map they can just read C other United Kingdom India United States and click on that and so for example let’s click over here on United States the numbers change quite a bit now the average salary for a data scientist is 139,000 for data analyst it’s 80 and if we look at India you know the average salary for a data scientist is 68 the average salary is 26 for a data analyst that doesn’t mean that they make less money in India that just means that the cost of living is probably lower in India therefore they don’t need the higher US dollars salary because again this was all done in US dollars so just something to think about let’s click out of that so we’ll keep that one as well so now let’s create our next visualization and this is one that I do not get to use enough in my actual job so we’re going to use it in this project um and it’s going to be this gauge right here so let’s add that one put it right over here we’re going to add two of those let’s just go ahead and add another one while we’re at it we’re going to have them kind of like right here right next to each other the first one and these ones are really good for kind of looking at these kind of surveys and I don’t get to work with surveys enough but we can see you know how happy are they in terms of work life balance so we can add that we’re going to add work life balance um and right now it’s doing a count and if we don’t have minimum or maximum values in there yet so it’s going to look kind of weird but we’re going to look at the average rate or the the average score of these then we’re going to pull this over to the minimum value and we want to put that at the minimum and pull this over and add the maximum value so now it actually has 0 to 10 and it shows that the average person is happy with which one was this their average person is happy with their work life balance uh they rate about a 5.74 overall now let’s really quickly change the title of this because this is ridiculous I want to say happy with work life balance and this is their rating uh you know change it to whatever title you want that’s what I’m going to do and we’ll also do happy with their salary let’s click on salary we’ll add that to minimum and we’ll add the maximum value as well to make sure that we know how to use that and then we’ll take the average so not many people are happy with their salary I’m just finding out I mean this is a real survey this is real data so I mean it’s uh pretty interesting let’s go to the title let’s go to happy with or maybe it’s happiness happiness with salary maybe that’s what we should make it and I’m going to change that over here as well I think it sounds better some of this I’ve already planned out some I haven’t this is not something I’ve planned out so uh so we’re going to say happiness with work life balance happiness with salary really interesting um we may go back and tweak these just a little bit in the future but the very last visualization that we’re going to do is male versus female kind of got to have that in there um I don’t typically like py charts and donut charts but you know I’m feeling I’m just feeling it so let’s try it um and we will do see let’s make this larger so we have male female and what do we want to look at like what do we want to measure so we have male versus female we can measure anything um but maybe what we’ll do is the average salary again I mean we’ve kind of only looked at salary once in this one right here um and a little bit of like how happy they are but we’ll look at the average salary between males and females and then we’ll look at not the current age Oops I meant average salary and then we’ll look at the average and it looks like the average salary is actually really close versus males versus females 55 for female versus 53 for male so actually the females are a little bit higher congratulations so they’re just a little bit higher in terms of pay so now we need to start organizing all of this cleaning it up making it look a lot better than it does right now it looks great uh you know but we can do a lot more with this so I’m gonna I’m we’re we’re going to keep these or all these kind of over on this left hand side I’m going to put this I want this up here we also need to change that title I want this up here um and again we’re GNA kind of change the theme as we go I just want to format it right we have it just like this let’s change the title of this let’s go to title and we’re going to say country of survey takers uh I’m not the the survey takers I’m not really stuck on that if you find something better you think of something better I would go with that but um you know it definitely doesn’t look bad and where did this where did my other visualization go there it goes um I think this one I want to make kind of more tall um so I might move it this this way jeez this is such a I hate I hate having a lot of visualizations on here it just really is annoying to me so what we’re going to do I think we’re gonna step this to the side put this to the side as well I want to make it to where it’s just okay I didn’t want it to cut off we’ll do that might make these make these a little bigger actually so I want it to kind of match the size like right there match this perfect this one I kind of want to bring over here and bring it down a little bit maybe something like this maybe I’m not sure I’m not I’m not sold on that um I added a few different visualizations that I didn’t have in my original so now I’m kind of having to do this on the fly so um I might fast forward some of the parts where I’m like really thinking about it or taking too much time on it but I’m going to bring this down a little bit actually because I don’t like how close that is to um the the text above it but one thing we do need to do I’m going to put this up kind of like this I think that looks fine I think I’m going to put this at the very bottom so let’s make some room for it all right just like that stretch it to the side and we’ll lower it and I think we’ll keep that as is kind of like this um okay there’s a lot going on in here and there are some things I’m just noticing as we’re walking through this that I kind of missed um like I need to change some titles and stuff like that so let me go ahead and change some of those things so we’re going to do title do average salary by gender or by sex do like that average salary by sex I also don’t like that it’s in the middle um I don’t like that it’s on the outside I want them on the inside for this so let’s go to the details let’s go to inside and see if that looks any better oh that looks terrible um let me see if I can change that maybe I don’t no I definitely want it um I guess we’ll do outside I you can’t even see the information oh the decimal is crazy long um let me go and see if I can change that decimal to just like a whole number or like 1.1 uh because that’s a problem so maybe I need to go over here to the value all right so I think I want to change this one it’s just not working out exactly how I wanted and you guys know if I make mistakes I’m going to keep it in here so you guys can see it I I hoped that this was going to turn out better but it didn’t um one that I do want to add because this is kind of a a breakdown and a nice visualization I want to add this difficulty piece so I want to add this how difficult was it for you to break into data science let’s get rid of these and I want to click on this really quickly see what it gives us um values okay so now this shows us percentages um of how easy it was again it’s neither easy nor difficult difficult easy very difficult very easy these numbers make absolutely no sense we need to kind of order them a little better so I’m going to come over here to slices we have our colors over here we want very difficult to be like the most difficult um so we’re going to make that red and then we want difficult to be maybe like an orange let’s see if we can find an orange there we have an orange this does not look red enough there we go oh no no no very difficult is red difficult is orange we have neither easy nor difficult and that’s kind of a neutral um let’s see if we have something neutral in here kind of like this yellow I don’t know let’s try it out then we have easy and very easy and these will be like our Blues so I’m going to keep that um I’m going to keep that kind of like a dark blueish and then our blue for super easy is just going to be like really blue U and that doesn’t look bad the I mean look I’m I’m not a color person I I’m not great with colors and we’re going to kind of organize this in just a little bit but this looks better to me um but we need to change up some stuff as well like the title need to do difficulty to break into Data there we go and we’re also going to change this title right here we’re just say difficulty difficulty difficulty this looks better to me um again not perfect and there’s a thousand different things you could have done but that’s just what we’re going to do I need to go through here and see what I need to change so right off the bat I can see I need to change this um to let’s see right here I’m going to rename this job title just like we did in this one right here uh count of Voters that’s fine programing language breaking into difficulty happiness happiness average count okay okay so what we have here is very close to a finished product now it’s not 100% complete I mean I I do want to make it look a little nicer rather than just the typical white so what we’re going to do we’re going to go up here we’ll go to uh what is it View and we have all these different filters and we’re just kind of play around with it see if we can find something that we like um this doesn’t look too bad it’s uh not really my style u we can do this one Frontier this is pretty neat I kind of am digging this we might come back to it I like the natural tones I don’t know why I said tones like that but I did um this one’s not bad but I don’t I don’t that’s not that’s not my I don’t like how dark that is um and so maybe it’s like you know uh we change like the background color of all of these as well as match it with um match it with something else whatever you want genuinely you customize this however you want I kind of like this one it’s kind of groovy man and um it’s not perfect by any means but what we can do and we can customize this current theme we can come in here customize this theme however we’d like I personally don’t want color five which is the data analyst color I don’t like it to I don’t want to go out go and change it because I don’t like it but I don’t really like that color per se you know I might want to choose a different color um but it has to be like this muted like it has a style to it so you can come in here and you can customize this and make it however you’d like and and really mess around with it play around with it for me uh I’m just going to keep it how it is because I don’t really want to mess with it and break it or anything like that so um let me just that up just a tiny bit so this is it this is the project I hope that it was helpful um I am not joking when I say that I’m because I’m gonna do a different project I’m gonna go really in depth in another project it’s probably GNA be like a two hour project it’s gonna be crazy long um well for a YouTube video but I can see doing a thousand different things with this data creating a really great dashboard really cleaning cleaning the data which is a large part of of actually doing this and we didn’t do much data cleaning at all there’s just so much you can do with this and so really dig into this see what you like see what you don’t like see what you want to clean what you don’t want to clean you could put it in SQL you could put it in um Excel and just and just standardize the data to make it a lot more usable do whatever you want with it I mean I I took this survey for you guys that we could use it so go out and use it and make the best dashboard that you can POS possibly do so I hope that this was helpful I hope that you enjoyed this thank you so much for watching this video If you like this thank you so much for watching if you like this video be sure to like And subscribe below and I’ll see you in the next video [Music]
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
This text comprises excerpts from an interview and lecture discussing the life and legacy of Allama Iqbal, a prominent Muslim figure in early 20th-century India. The speaker analyzes Iqbal’s impact on Indian Muslims during a tumultuous period marked by political and religious upheaval, highlighting Iqbal’s efforts to combat Western influence and foster a strong sense of Muslim identity and self-reliance. The sources also address misinterpretations of Iqbal’s views, particularly claims that he was a socialist, and emphasize his unwavering commitment to Islam. Furthermore, the text explores Iqbal’s profound spirituality and personal piety, contrasting his public image with his private life of devotion and simplicity. Finally, the speaker urges listeners to uphold Iqbal’s vision of a strong, unified Muslim community.
A Deep Dive into the Thought of Allama Iqbal: A Study Guide
Quiz
Instructions: Answer the following questions in 2-3 sentences each, based on the provided source material.
According to the text, what was the state of Muslims in India between 1924 and 1938, and what caused this state?
How did Muslims react to the failure of the Khilafat movement, according to the source?
What is meant by “Maghribiyat” in the context of the text and why did Iqbal oppose it?
What did Iqbal believe was the root cause of the Muslims’ problems?
What did Iqbal mean when he said that the nation is made by faith?
What was Iqbal’s view on the relationship between religion and politics?
According to the source, what did Iqbal advocate as a solution to the problems faced by the Muslims of his time?
Why does the text assert that Iqbal was not a socialist or believer in “Islamic socialism”?
According to the text, what was the role of Allama Iqbal and Quaid-e-Azam in the creation of Pakistan?
How did Iqbal’s understanding of Islam deepen over time, as described in the text?
Quiz Answer Key
The text describes a period of crisis for Muslims in India between 1924 and 1938. Muslims faced disappointment and defeat after the failure of the Khilafat movement. This led to a loss of faith in their leadership and a state of despair.
The failure of the Khilafat movement led to severe disappointment among Muslims who had invested everything in it. Many lost their faith in the leadership that had promoted the movement, and were also left feeling disillusioned and betrayed.
“Maghribiyat” refers to the influence of Western culture and philosophy. Iqbal opposed it because he believed it was causing Muslims to abandon their own traditions and culture.
Iqbal believed the root cause of the Muslims’ problems was their loss of self-recognition. Muslims had become ashamed of their own praise, culture, religion and morals, believing instead the West had superiority.
Iqbal emphasized that a nation is made by faith rather than by nation or language. He wanted Muslims to see themselves as a unified community with shared beliefs and culture, distinct from other communities.
Iqbal believed that politics can only be good when guided by God. He stressed that separating politics from faith would lead to barbarism and cruelty.
According to the text, Iqbal advocated for Muslims to follow the Quran and implement the principles of Islam in their lives. He believed that only through Islam could Muslims overcome their problems.
The text emphasizes that Iqbal’s emphasis was on the implementation of Islam and not a hybrid of socialism and Islam. According to the source, while he may have used the term “Islamic Socialism” he didn’t preach it, and there’s no evidence that he believed it.
The text indicates that Iqbal gave Muslims the vision for Pakistan through his emphasis on Islam and a separate identity. Quaid-e-Azam then brought the vision into reality by creating the actual state.
The text asserts that Iqbal’s understanding of Islam deepened over time and became his sole focus. In the later phases of his life, he became immersed in the Quran. He would not keep any other book in front of him, using it as the basis for all of his thoughts and actions.
Essay Questions
Instructions: Answer the following essay questions based on the provided source material. Each essay should demonstrate a comprehensive understanding of the text and be 3-4 paragraphs in length.
Analyze the complex relationship between the Khilafat movement, Hindu-Muslim relations, and the subsequent disillusionment of Muslims in India as described in the provided text. How did these events shape Allama Iqbal’s thinking?
Discuss Allama Iqbal’s critique of Western civilization and the concept of “Maghribiyat,”. How did his experiences and perspectives inform this critique, and what solutions did he propose to counteract it?
Explore Iqbal’s concept of Muslim identity and his views on nationalism and faith. How did he advocate for a distinct Muslim identity, and why was it crucial, according to the text, to preserve that identity?
Examine the text’s discussion of Iqbal’s philosophy, particularly his view on the relationship between politics and religion and what he saw as the failings of contemporary Muslim leadership.
Evaluate the text’s portrayal of Allama Iqbal’s evolution as a thinker, from his exposure to Western education to his complete immersion in the Quran. How does this journey inform our understanding of his overall message?
Glossary of Key Terms
Khilafat Movement: A movement in India (1919-1924) to support the Ottoman Caliphate which was led by Indian Muslims, as they saw the Caliphate as a symbol of pan-Islamic unity.
Maghribiyat: The influence and adoption of Western culture, philosophy, and values. Iqbal saw this as a form of cultural imperialism that Muslims should reject.
Nazm: (Often in reference to Iqbal’s writing) Poetry or verse, often used in this text to describe the type of work he produced.
Tahrir: In this context, the movement to restore the Caliphate, and liberate Muslim Holy Places from foreign control.
Mokama: (Likely a mispronunciation, perhaps of Mecca) The Holy city of Islam.
Namazi: (Also spelled ‘Namaz’) The Islamic practice of prayer.
Roza: Islamic fasting, typically during the month of Ramadan.
Shariat: Islamic law, derived from the Quran and the teachings of the Prophet Muhammad.
Maulvis: (Also spelled ‘Maulvi’) A Muslim religious scholar, particularly one who is well-versed in Islamic law.
Ulema: (Also spelled ‘Ulama’) Muslim religious scholars.
Hadith: Sayings and actions of the Prophet Muhammad, used as a source of guidance in Islamic law and theology.
Agyaats: (Likely a mispronunciation, likely ‘Agni’, which means ‘fire’ or the fire worshippers) A reference to Hindu people in a derogatory way.
Kalimi: (Also spelled ‘Kalima’ or ‘Kalime’) An Arabic term referring to Islamic declaration of faith.
Faqr: In this context, the state of being devoted to God and independent of worldly desires, in the way that a true fakir lives.
Quaid-e-Azam: An honorific title for Muhammad Ali Jinnah, the founder of Pakistan, meaning “Great Leader.”
Pakistan: In this context, meaning the creation of a separate and independent Muslim state in India, founded on the concept of distinct Muslim culture and community.
Madrasahs: Islamic religious schools.
Khatib hazrats: Islamic preachers or orators
Amrit, Naaziyat, First Year: References to specific ideologies that are criticized in the text. They represent Western/European forms of governance that the text argues are not aligned with the principles of Islam.
Mustfair: In this context, a place for residence.
Akliat: A person’s intellectual ability.
Wala Jana: Devotion and affection to the Prophet Muhammad’s family.
Iqbal: Islamic Revival and the Creation of Pakistan
Okay, here is a detailed briefing document reviewing the main themes and important ideas from the provided text:
Briefing Document: Analysis of Iqbal and His Impact
Introduction:
This document analyzes a series of excerpts focusing on the life, works, and impact of Allama Muhammad Iqbal (Rahmatullah Alaih). The sources provide insights into the socio-political context of Iqbal’s era, his intellectual contributions, and his enduring legacy, particularly in relation to the identity and destiny of Muslims in India. The excerpts cover a variety of perspectives on Iqbal, exploring his views on Islam, nationalism, Western influence, and the importance of self-awareness.
Key Themes and Ideas:
The Critical Period of Muslim History in India (1924-1938):
The period was marked by the failure of the Khilafat Movement, which left Muslims disillusioned and vulnerable. Muslims had “invested all their wealth in the Khilafat” and “left no stone unturned in uniting…with those Hindus…only on the hope that somehow we will be able to save the institution of Khilafat.”
The Congress and Hindu leaders, with whom Muslims had allied, turned against them, leading to Hindu-Muslim riots and a “double defeat” for the Muslims. They had trusted Gandhi “the most” but he “never had the opportunity to open fire on us Muslims on this issue against the Hindu castes.”
This resulted in “severe disappointment” and a loss of faith in the existing leadership, leaving the Muslim community in a state of despair and questioning their future. “Muslims lost their faith in this leadership which had raised the issue of Tahrir and had joined hands with Congress.”
The Rise of Anti-Islamic Trends:
The period saw a rise in anti-religious sentiment among Muslims, with open criticism of Islam and its teachings. There was a shift where people felt those who prayed “should be ashamed of his actions, and the one who is not doing so need not be ashamed.”
The influence of Communism and Western ideologies impacted Muslim education, promoting secular and anti-religious ideas.
Iqbal as a Force for Islamic Revival:
Amidst the turmoil, Iqbal emerged as a powerful force for Islamic revival and preservation of Islamic and religious values. He was seen as the “greatest power…for the Islamic Tariq Islamic Tehri for the call of Islamic passion” during the 14-year period from 1924-1938.
He attacked Western culture (“Maghribiyat”), including “female chauvinism”, effectively challenging its dominance over the Muslim mind, while addressing its appeal from the perspective of a man fully familiar with western culture. He “knew more about the west than them and was more aware of the philosophy of the west and the western life than them.”
He aimed to break the “mental slavery” of Muslims, encouraging them to recognize their own worth, heritage and the fact that “you are the most powerful person in the whole world.” They had become ashamed of their own traditions, religion, morals, thinking that “if there is anything worth praising in the world, then it has been presented only by the people of the Maghreb.”
He emphasized that Islam’s principles are relevant in every era and not an outdated system, stating that “Islam is ancient and the arrival of the prophet, Islam can never become old, its principles are worth implementing in every era.”
Iqbal’s Philosophy of Self-Recognition (Khudi):
Iqbal urged Muslims to recognize their own identity, culture, and religious values. He created the feeling that “you have lost yourself and have turned your reality around, understand your comic task, and implement your culture at your home for the sake of its height”.
He challenged the notion that Muslims should be ashamed of their heritage, emphasizing the uniqueness and strength of Islamic culture. He taught that “nation is made by faith and our country” not “nation and language”.
He aimed to counter the feeling that “the work of the people of the world is to just chant Allah Allah or read the Quran and Hadith in mosques and madrasas” and instead, asserted that there should be no separation of “politics from day,” because “the result of this is there can be no other explanation except barbarism and cruelty.”
Iqbal’s Critique of Nationalism and Patriotism:
He critiqued the concept of nationalism, arguing that it could lead to the dissolution of Muslim identity by saying, “the nation too is a ghost and the condition of the nation is doubtful.” He rejected that “there is no threat to your nation from your nation”.
He emphasized the importance of Islamic unity, countering communalism and the conflicts that divided Muslims.
He instilled a sense of “Islamic community” (Ummah) in Indian Muslims, laying the groundwork for the creation of Pakistan. “If this rigidity had not been done at the time…then this Pakistan would not have existed today.”
Iqbal’s Views on Politics and Religion:
He argued for the integration of religion and politics, suggesting that politics without a moral compass is destructive, “politics can be good only when God is present with it as a guide to keep it on the right path.”
He rejected the idea that Islam was a source of backwardness, stating that the problems of the era arose because of a flawed understanding and application of Islam, and that “all the oppression, tyranny, deceit, poor and humanity that is being cried for, is all the work of these Islam.”
He believed that the solution to the problems faced by Muslims lay in the implementation of Islamic principles. “If there is any solution to the problems of the Muslims, then it is only in the implementation of the Islamic principles, then it is in me.”
Iqbal’s Stance Against Socialism:
The source addresses the claim that Iqbal was a socialist. It argues that such an interpretation is a misrepresentation of his work, which was consistently focused on Islamic principles. “He was never convinced that by adopting anything with Islam or anything with Islam, we can be saved.”
It explains that his use of the term “Islamic Socialism” was incidental and not an endorsement of the political system, but rather an assertion that Islam encompasses social justice. “There is no need to go towards any socialism for shruti and justice, all this is present in Islam also, rather it would be more correct to say that it is present only in Islam.”
The source argues that Iqbal’s poetry and writings were often interpreted incorrectly, specifically citing his couplet about burning fields as a metaphor for divine justice, not a call to action for humans. “The sequence of words was that Allah Taala is ordering his angels that the oppression and cruelty that is going on in the world is inviting our punishment.”
Iqbal’s Devotion to Islam and the Quran:
The document emphasizes Iqbal’s deep devotion to Islam, particularly during the final phase of his life. It notes his shift towards a more Quran-centric approach, that “in the last phase, Iqbal had separated all the books from the Quran and he would not keep any other book in front of him.”
He saw the Quran as the ultimate source of wisdom and guidance, and he approached life and philosophy through its lens. “Whatever he thought, whatever he saw, he saw it from the point of view of the Quran.”
His devotion to the Prophet Muhammad was profound and unquestioning.
Iqbal’s Legacy and Pakistan:
Iqbal’s vision was instrumental in the creation of Pakistan, which was founded on the idea of a separate Islamic identity. It is said that “Iqbal ( may Allah have mercy on him) gave you a country on the basis of this. He gave you concern and vision.”
The document warns against deviating from the founding principles of Pakistan, emphasizing the importance of maintaining its Islamic foundation. “If the basic vision of this country or in other words the foundation of its vision or its vision is removed, then this country cannot survive.”
It calls on the Muslim community to unite and uphold the principles of Islam.
Conclusion:
These sources present a multifaceted view of Allama Iqbal, emphasizing his role as a catalyst for Islamic revival and self-awareness among Muslims in India. The text stresses that he fought Western cultural dominance, promoted the idea of a separate Muslim identity and community, and laid the intellectual foundation for the creation of Pakistan. The sources also highlight the importance of understanding Iqbal in his full complexity and not to reduce his message through simplistic interpretations. His deep love of the Quran and his devotion to Islam are emphasized, as well as his rejection of socialism as a separate doctrine from Islam. The enduring significance of his vision for Muslims globally is also emphasized.
Allama Iqbal: Life, Thought, and Legacy
Frequently Asked Questions about Allama Iqbal
What were the key challenges faced by Muslims in India between 1924 and 1938, the period during which Allama Iqbal was particularly active?
During this period, Indian Muslims experienced significant disillusionment and challenges. They had invested heavily in the Khilafat Movement, hoping to preserve the institution of the Caliphate and protect Muslim holy sites. However, their efforts were ultimately unsuccessful. Furthermore, they faced increasing hostility from Hindus and the Congress party, with whom they had previously cooperated, leading to a series of Hindu-Muslim riots. This resulted in a sense of betrayal and a loss of faith in their leadership, coupled with rising internal discord, a perceived threat of Hindu dominance, and the spread of Western and communist ideas which challenged traditional religious practices and beliefs.
How did Allama Iqbal respond to the challenges faced by the Muslims of India?
Allama Iqbal emerged as a powerful voice against the prevailing despair. He actively worked to revive Islamic fervor and self-respect among Muslims. He did this primarily through his poetry and philosophical writings, attacking Western culture and its influence on Muslims, which he saw as a form of mental slavery. He sought to reawaken a sense of Islamic identity, pride in their heritage, and the belief that Islam was a viable and relevant way of life for the modern era. He emphasized that a Muslim’s strength was in their own culture, religion, and morals, not by emulating the West. He stressed that Islam was not an outdated system, but a timeless truth relevant to any era.
What was Allama Iqbal’s view on nationalism and how did it relate to his concept of the Muslim community?
Iqbal strongly critiqued the concept of territorial nationalism, arguing that it was a “ghost” and a “doubtful condition.” He asserted that a nation is not defined by territory or language, but by faith and shared culture. He emphasized that Muslims, due to their shared beliefs and culture, formed a distinct community (or Ummah) separate from other communities, including Hindus. This viewpoint was meant to counter the idea of Muslims being absorbed into a larger Indian national identity and is often seen as a key step towards the eventual demand for a separate Muslim state.
How did Allama Iqbal view the relationship between Islam and politics?
Iqbal believed that politics divorced from religion was dangerous, leading to barbarism and cruelty. He argued that politics must be guided by God and that the contemporary problems plaguing humanity were a result of such separation of politics and faith. He rejected the notion that Muslims should confine themselves to religious practices alone, with no engagement in political matters, as he saw Islamic principles as applicable to all aspects of life, including governance. In essence, he advocated for a political order guided by Islamic principles and values.
What was Allama Iqbal’s view of western thought and philosophy and why did he criticize it?
While deeply knowledgeable about Western philosophy and culture, Iqbal strongly critiqued it. He believed that its dominance over Muslims was leading to a loss of their own cultural identity and values, in turn causing them mental and spiritual enslavement. He specifically criticized western materialism, secularism, and what he viewed as its corrupting influence on morality. He sought to expose the flaws of Western civilization and its incompatibility with Islamic values, motivating Muslims to return to their own heritage for solutions. He believed that a society based solely on secularism was doomed to fail.
How did Allama Iqbal’s view of Islam influence the idea of Pakistan?
Allama Iqbal is considered a key intellectual figure behind the idea of Pakistan. He believed that Muslims could not preserve their culture and identity within a united India where the Hindu majority was increasingly dominant. His 1930 speech, while not explicitly using the word “Pakistan,” laid out the foundation for a separate Muslim state where Islamic principles could guide society, providing Muslims with the space needed to safeguard their identity and culture.
Was Allama Iqbal a socialist, and what does the source say about this claim?
The sources strongly refute the idea that Allama Iqbal was a socialist, either of a Western or Islamic variety. While he occasionally used terms like “Islamic Socialism,” this was to make the point that the justice and social concern that they claim to address are found within Islam, but are superior as God is their basis. The sources argue that attributing socialism to him is a misrepresentation of his lifelong commitment to promoting Islam. He did not develop or preach a systematic socialist ideology but rather emphasized Islamic principles and values as the solution to the issues of his time. His criticisms of injustice should not be confused with advocating socialism.
What was the importance of the Quran in Allama Iqbal’s life and thought?
The sources depict the Quran as the absolute center of Iqbal’s life and thought, especially towards the end of his life. It’s described that he distanced himself from all other books, finding that the Quran contained all wisdom. He interpreted everything from a Quranic perspective. His actions were seen as an attempt to live a life according to its principles, and he had deep devotion and unwavering faith in the teachings of the Quran and Prophet Muhammad’s teachings, even if it went against the conventions of his era. His approach was to live and act in line with Quranic teaching and the actions of the Prophet.
Iqbal: Reviving Islamic Identity
Allama Iqbal’s life was marked by his efforts to revitalize Islamic thought and identity in the face of various challenges, particularly during the period of British colonial rule in India.
Historical Context: From 1924 to 1938, Muslims in India experienced a critical period, marked by the failure of the Khilafat movement and increasing Hindu-Muslim tensions. Muslims faced a “double defeat” with the collapse of the Khilafat and attacks from those they had allied with. This period also saw a rise in Western cultural influence and criticism of Islam, leading to a sense of despair and a loss of faith among Muslims.
Iqbal’s Response to the Crisis: In response to this, Iqbal emerged as a powerful force for the revival of Islamic spirit and values. He aimed to combat the mental slavery and feelings of shame that had gripped the Muslim community, encouraging them to recognize their own worth and the value of their culture, religion, and morals. He emphasized the timeless relevance of Islam and its principles, and challenged the notion that it was outdated or incompatible with the modern world.
Iqbal’s Critique of Western Culture: Iqbal was critical of the influence of Western culture (“Maghribiyat”), which he saw as a threat to the Muslim identity. He attacked what he perceived as the negative aspects of Western civilization, including materialism and a focus on nationalism at the expense of religious identity. He also criticized Western politics.
Iqbal’s Focus on Islamic Identity: Iqbal emphasized the importance of a distinct Muslim identity based on faith and culture. He argued that Muslims were a unique community with their own beliefs and traditions, separate from other groups in India. He stressed the concept of Islamic unity, countering communalism and divisions within the Muslim world. He worked to instill a sense of Islamic pride and purpose in Muslims, particularly the youth.
Iqbal’s Philosophy and Vision:
Iqbal’s philosophy was centered on the idea of self-realization for Muslims, urging them to understand their true selves and their potential. He believed that Muslims had lost sight of their own heritage and had become overly influenced by Western thought.
He advocated for the implementation of Islamic principles in all aspects of life. He believed that the solution to the problems faced by Muslims was in adhering to the Quran and the teachings of Islam.
He emphasized that political freedom was not the ultimate goal, but rather the protection of Islam and the ability for Muslims to live according to its principles. He was a proponent of a separate and independent Muslim state, which ultimately led to the idea of Pakistan. He believed that Muslims could not maintain their culture while living with Hindus.
Iqbal’s Later Life: In his later years, Iqbal increasingly focused on the Quran, using it as his primary source of knowledge and guidance. He rejected any form of non-Islamic viewpoints. He also emphasized the importance of following the example of the Prophet Muhammad. He was critical of those who saw Islam as a source of sorrow and instead believed it to be a source of guidance and truth.
Iqbal’s Legacy:
Iqbal’s work was instrumental in shaping the intellectual and political landscape of the Muslim community in India. He is credited with inspiring the creation of Pakistan, with the vision of the country coming before the actual formation.
His poetry and writings are known for their depth and powerful articulation of Islamic ideals. He used his art to promote Islamic values and challenge the status quo.
He is considered a key figure in the revival of Islamic thought and the development of a modern Muslim identity. He believed in the importance of action and the implementation of Islamic principles in the world.
Iqbal’s life can be seen as a struggle against cultural and political subjugation, and his lasting legacy lies in his passionate defense of Islamic values and his vision for a vibrant and self-aware Muslim community. He is seen as a figure who used his education, including his knowledge of Western thought, to advocate for the importance of Islam and Muslim identity.
Muslim Disillusionment in India (1924-1938)
The sources describe a period of significant disappointment for Muslims in India, particularly between 1924 and 1938. This disappointment stemmed from a combination of political setbacks, social challenges, and a perceived crisis of faith.
Failure of the Khilafat Movement: Muslims had invested considerable resources and effort in the Khilafat movement, aiming to protect the institution of the Caliphate and Muslim holy places. The ultimate failure of this movement was a major blow, leading to a sense of disillusionment. The Khilafat, which they had tried to save, was ruined, and the residents of the holy places became divided and engaged in conflict.
Betrayal by Allies: Muslims had allied with Hindus and the Congress party during the Khilafat movement. However, after the movement’s collapse, they faced attacks from their former allies, leading to Hindu-Muslim riots. This betrayal contributed to their disappointment, as they had trusted leaders like Gandhi, who did not stand up for the Muslims against oppression.
Double Defeat: Muslims experienced a “double defeat,” having failed to achieve their goals in the Khilafat movement and facing hostility from those with whom they had allied. This left them in a state of despair and broke their courage.
Loss of Faith in Leadership: The disappointment led to a loss of faith in the leadership that had advocated for the Khilafat and allied with Congress. Muslims felt that their leaders had failed them, contributing to a sense of being lost and without direction.
Fear for the Future: There was a widespread fear that non-Muslims were working to completely occupy India, while Muslims were ill-prepared to face the situation. This fear further intensified their sense of disappointment and helplessness.
Internal Crisis: In addition to the political and social challenges, Muslims also faced an internal crisis. There was a rise in open criticism of Islam and a decline in religious observance. People began to question the value of traditional practices like prayer and fasting, and some felt ashamed of their religious identity.
Influence of Western Culture: The rise of Western culture and communism influenced the education of Muslims, and religious texts began to be openly challenged. This further contributed to the sense of crisis and the weakening of traditional values and faith.
Political Disunity: Muslim leaders were also in disarray. Those who had previously defended Islam either became silent or became opponents of the Muslims, and some abandoned the path of inviting people to Islam for inviting them to community and religion. This lack of unified and effective leadership added to the community’s challenges.
In the midst of this widespread disappointment and despair, Allama Iqbal emerged as a powerful figure, working to revive the Islamic spirit and address the root causes of Muslim disillusionment. He challenged the mental slavery imposed on Muslims and urged them to recognize their own value and potential, aiming to restore their faith in themselves and their religion.
The Khilafat Movement: Failure and Disillusionment
The Khilafat Movement was a significant effort by Muslims in India to protect the institution of the Caliphate and Muslim holy places, but it ultimately ended in disappointment. The movement’s failure, coupled with other factors, led to a period of disillusionment and crisis for the Muslim community.
Here are the key aspects of the Khilafat Movement:
Goal: The primary goal of the Khilafat Movement was to save the institution of the Caliphate (Khilafat) and to liberate Muslim holy places from what they perceived as the clutches of the enemy. Muslims invested significant resources and efforts into this cause.
Muslim Investment: Muslims dedicated their wealth and lives to the Khilafat movement. They spared no effort in their attempt to save the Khilafat and free their holy places. They united with Hindus, despite historical differences, hoping that this alliance would help them achieve their goals.
Alliance with Hindus: Muslims, putting aside centuries of experience and feelings regarding Hindus and their relationship with Islam, united with them, on the hope of saving the Khilafat and freeing their holy places. They even trusted leaders like Gandhi and made him their leader.
Failure and Disappointment: Despite their efforts, the Khilafat Movement ultimately failed. The institution of the Khilafat, which they had fought to protect, was ruined. The residents of the holy places became divided, engaging in conflict and animosity among themselves.
Double Defeat: The failure of the Khilafat Movement was a major blow to the Muslims, leading to what is described as a “double defeat”. Not only did they fail to achieve their goals, but they also faced attacks from the Hindus and the Congress party with whom they had allied.
Betrayal and Riots: After the collapse of the Khilafat movement, the Congress and Hindus, with whom the Muslims had allied and fought, turned against them, leading to a series of Hindu-Muslim riots beginning in 1924. The leaders of the Congress did not address the oppression faced by the Muslims.
Loss of Faith: The movement’s failure led to a significant loss of faith among Muslims, both in their leadership and in the alliances they had formed. They were disappointed by the outcome of their efforts and by the betrayal of their former allies. This left them in a state of despair and broke their courage.
The Khilafat Movement’s failure was a major factor contributing to the disappointment and disillusionment experienced by Muslims in India during the 1924-1938 period. The collapse of the movement, along with the subsequent betrayal by former allies, created a crisis of faith and identity among Muslims, which Allama Iqbal sought to address through his work.
Iqbal’s Islamic Revival in India
The sources describe an Islamic revival led by Allama Iqbal in response to a period of significant disappointment and crisis for Muslims in India. This revival was marked by a renewed emphasis on Islamic identity, values, and principles, and a rejection of Western cultural and political dominance.
Key aspects of this Islamic revival include:
Context of Crisis: The revival occurred in the context of the failure of the Khilafat Movement, which left Muslims disillusioned and facing attacks from former allies. There was a widespread sense of despair, a loss of faith in leadership, and a fear for the future. Additionally, Western cultural influence and criticism of Islam led to a questioning of traditional values and practices.
Iqbal’s Role: Allama Iqbal emerged as a key figure in this revival, working to counter the mental and spiritual decline of the Muslim community. He aimed to restore their sense of self-worth, pride in their heritage, and faith in Islam. He used his knowledge of both Islamic and Western thought to address the challenges faced by Muslims.
Emphasis on Self-Realization: Iqbal’s philosophy focused on the idea of self-realization for Muslims, encouraging them to recognize their true potential and identity. He argued that Muslims had lost sight of their own heritage and had become overly influenced by Western thought and culture.
Rejection of Western Culture: Iqbal was critical of Western culture (“Maghribiyat”), which he saw as a threat to Muslim identity. He attacked the materialism and perceived negative aspects of Western civilization, including Western politics. He also spoke out against what he saw as the negative influence of Western ideas on Muslim women.
Focus on Islamic Identity: Iqbal emphasized the importance of a distinct Muslim identity based on faith and culture. He argued that Muslims were a unique community with their own beliefs and traditions, separate from other groups in India. He stressed the concept of Islamic unity, countering communalism and divisions within the Muslim world. He worked to instill a sense of Islamic pride and purpose, particularly in the youth.
Timeless Relevance of Islam: Iqbal stressed the timeless relevance of Islam and its principles, challenging the idea that it was outdated. He argued that Islam’s principles were applicable in every era. He believed that the solution to the problems faced by Muslims lay in adhering to the Quran and the teachings of Islam.
Political Vision: Iqbal also had a political vision. He believed that Muslims could not maintain their culture while living with Hindus in India. This view led to his advocacy for a separate and independent Muslim state, which ultimately contributed to the idea of Pakistan. He saw the need for a country where Muslims could live according to the principles of Islam.
Critique of Nationalism: He challenged the concept of nationalism, arguing that it was a “ghost” that could dissolve Muslims into the larger Hindu community. He emphasized that the basis of a nation should be faith, not language or territory.
Return to the Quran: In his later life, Iqbal increasingly focused on the Quran, using it as his primary source of knowledge and guidance. He is described as having separated all other books from the Quran, dedicating himself to understanding and living by its teachings.
Legacy of Revival: Iqbal’s work was instrumental in shaping the intellectual and political landscape of the Muslim community in India. He is credited with inspiring the creation of Pakistan, and his work is viewed as essential to the formation and survival of the country. His legacy is viewed as a passionate defense of Islamic values and a call for a vibrant and self-aware Muslim community.
Overall, the Islamic revival led by Iqbal was a comprehensive movement that sought to address the challenges faced by Muslims in India through a renewed focus on their faith, culture, and identity. His emphasis on self-realization, Islamic unity, and the timeless relevance of Islam had a profound impact on the Muslim community, and his ideas continue to be influential today.
Iqbal’s Philosophy: Self-Realization and Islamic Revival
Allama Iqbal’s philosophy was a comprehensive response to the challenges faced by Muslims in India during a period of significant crisis and disappointment. His philosophy aimed to revitalize the Muslim community by emphasizing self-realization, a return to Islamic principles, and a rejection of Western cultural dominance.
Here are the key components of Iqbal’s philosophy:
Self-Realization (“Khudi”): A central theme in Iqbal’s philosophy is the idea of self-realization. He believed that Muslims had lost sight of their true potential and had become ashamed of their own culture, religion, and morals. He argued that Muslims had been subjected to a form of “mental slavery” by adopting Western ideas and values, and he called on them to recognize their own inherent worth and strength. He encouraged them to take pride in their Islamic heritage and to understand their unique role in the world. He stressed that a nation is made by faith and not by language or territory.
Rejection of Western Culture (“Maghribiyat”): Iqbal was a sharp critic of Western culture, which he saw as a major threat to Muslim identity and values. He attacked the materialism and moral decay that he associated with the West. He argued that Muslims should not blindly adopt Western ways but should instead draw strength from their own traditions and principles. He believed that the dominance of Western culture was a form of slavery that prevented Muslims from recognizing their own worth.
Timeless Relevance of Islam: Iqbal emphasized the timeless nature of Islam and its principles. He argued that Islam was not an outdated or irrelevant system but a source of guidance and strength that was applicable to all eras. He believed that the solution to the problems faced by Muslims lay in adhering to the Quran and the teachings of Islam. He saw the Islamic system as providing the framework for a just and prosperous society.
Emphasis on Islamic Identity and Unity: Iqbal stressed the importance of a distinct Muslim identity based on faith and culture. He argued that Muslims were a unique community with their own beliefs and traditions, and they should not be absorbed into other communities. He called for unity among Muslims worldwide, countering divisions and communalism. He also advocated for a political structure that would allow Muslims to live according to Islamic principles.
Critique of Nationalism: Iqbal was critical of the concept of nationalism, which he saw as a threat to Muslim unity. He believed that nationalism could lead to the dissolution of the Muslim community into the larger Hindu community. He argued that faith should be the basis of a nation, not language or territory.
Political Vision: Iqbal believed that Muslims could not maintain their culture while living as a minority in India. He advocated for a separate and independent Muslim state where Muslims could live according to Islamic principles. This vision ultimately led to the idea of Pakistan.
Return to the Quran: In his later life, Iqbal increasingly focused on the Quran as his primary source of knowledge and guidance. He is described as having separated himself from all other books, dedicating himself to understanding and living by its teachings. He believed the Quran contained all the answers for the problems of his time.
Concept of “Faqr”: Iqbal used the word “Faqr” extensively, which according to him does not mean poverty and puritanism, but having faith in Allah in all circumstances, being self-respecting in front of others, and being humble only before God.
Iqbal’s philosophy was not just a theoretical framework but a call to action. He sought to inspire a sense of purpose and pride among Muslims, urging them to take control of their own destiny and to create a just and prosperous society based on Islamic principles. His work had a profound impact on the Muslim community in India, shaping both the intellectual and political landscape of the time. He is credited with inspiring the creation of Pakistan and is viewed as a key figure in the Islamic revival of the 20th century.
Iqbaaliyaat Audiobook By Maulana Maududi || اقبالیات از مولانا مودودی
Zindagi Baad A Maut book by Maulana Syed Abul-Ala Maududi – Audiobook
Touhid o Risalat by Syed Abul Aala Maududi – توحید و رسالت – Audio Book in Urdu
Deeniyat book by Maulana Syed Abul-Ala Maududi – Audiobook دینیات – سید ابو الاعلىٰ مودودی
Al Jihad Fil Islam by Abul Aala Maududi Chapter 1/7
Al-Jihad Fil Islam by Abul Aala Maududi Chapter 2/7
Al-Jihad Fil Islam by Abul Aala Maududi Chapter 3/7
Al-Jihad Fil Islam by Abul Aala Maududi Chapter 4/7
Al-Jihad fil Islam by Abul Aala Maududi Chapter 5/7
Al Jihad fil Islam by Abul Aala Maududi Chapter 6/7
Al Jihad Fil Islam by Abul Aala Maududi Last Chapter 7/7
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
This text is a passionate tribute to the Indian film actor Dilip Kumar.It recounts his life, highlighting his humble beginnings and rise to legendary status. The writing emphasizes his acting prowess, his impact on Indian cinema, and his enduring legacy as a symbol of secularism and national unity. The author expresses deep admiration and personal connection to Kumar, sharing anecdotes and reflections on his influence. Finally, the text mourns his passing and celebrates his lasting impact on generations of fans and the film industry.
Dilip Kumar: A Study Guide
Quiz
Answer each question in 2-3 sentences.
What is Dilip Kumar’s given name and date of birth according to the text?
What are some of the major awards and recognitions Dilip Kumar received, as mentioned in the text?
The text mentions Dilip Kumar’s visit to Pakistan in 1988. What did he do or say during that visit?
How does the text describe Dilip Kumar’s acting style, particularly his delivery of dialogues?
According to the text, what important message did Dilip Kumar convey through his films, beyond mere entertainment?
In what ways did Dilip Kumar serve as a unifying figure in India, as described in the text?
The text mentions Devdas as an example of a role. What makes Dilip Kumar’s portrayal of Devdas unique, according to the text?
The author says that “every movie sung is a masterpiece.” Give one example from the list of films mentioned and explain what about the film makes it a masterpiece.
How did Dilip Kumar influence other actors, according to the text?
What is the author’s view about the physical state of Dilip Kumar in his old age, and why does it pain the author?
Quiz Answer Key
Dilip Kumar’s given name is Mohammad Yusuf Khan, and he was born on December 11, 1922.
Dilip Kumar received the Dada Saheb Phalke Award from the Government of India and the Nishan-e-Pakistan Award from Pakistan.
During his 1988 visit to Pakistan, Dilip Kumar wrote an article that is now part of a magazine and this trip demonstrated his love of borders.
The text suggests Dilip Kumar’s acting style was natural and authentic, with dialogues delivered as if they were heartfelt and not rote. The text describes pearls falling from his body due to the heat of his liver.
Beyond entertainment, Dilip Kumar’s films conveyed messages of humanity and love, acting as a voice for universal principles of goodness and the fight against evil.
Dilip Kumar acted as a bridge between communities by erasing Hindu-Muslim differences and being a secular human being and championing the true role of a bridge.
The text emphasizes the unmatched quality of Dilip Kumar’s portrayal of Devdas, suggesting that the novel might as well have been written after seeing him.
Mughal-e-Azam is a masterpiece because it demonstrates how Dilip Kumar infused his roles with so much life, thus leaving a lasting impact on art enthusiasts.
Dilip Kumar influenced other actors by setting a high standard for acting and becoming a guru for many actors who moved ahead in new ways, including Shahrukh Khan and Big B.
The author is pained to see pictures of Dilip Kumar in his old age, illness, and weakness, and wished that Saira Banu would not share his suffering because he prefers to remember him as a hero.
Essay Questions
Analyze Dilip Kumar’s legacy as described in the text. How does the author portray him as not just a film star, but a cultural and historical figure?
Explore the symbolism of light and shadow in the text. How does the author use these metaphors to describe Dilip Kumar’s character and impact?
Discuss the theme of love and empathy in the text. How does the author use the story of Dilip Kumar to make a point about the importance of these qualities?
How does the text use language to convey Dilip Kumar’s profound influence on Indian culture and film? Pay particular attention to the author’s descriptions of his roles and his personal qualities.
Reflect on the author’s call for museums to be created in the actor’s honor, especially in light of the fact that he is now deceased. What would be the function of such a museum, as presented by the author?
Glossary of Key Terms
Aftab-e-Fan: Literally, “sun of art.” A metaphor used in the text to describe Dilip Kumar’s immense talent and influence, like the sun shining in the world of art.
Darvesh: Refers to a person who has chosen a life of simplicity and spirituality. In this text, it seems to be a term the author uses for himself.
Khuda Das Likeness: A reference to Dilip Kumar’s God-given appearance and personality, suggesting that he was uniquely made for his craft.
Mayusis: Refers to feelings of hopelessness or despair. The text mentions Dilip Kumar’s connection with these emotions, which he transformed into a unique strength in his acting.
Mujhaat: A unique or special situation or person, someone with unique qualities and capabilities. Used to describe how Dilip Kumar does not panic.
Nishan-e-Pakistan Award: The highest civilian award given by the government of Pakistan. Dilip Kumar received this award, symbolizing his cross-border recognition.
Raj: A term meaning rule or kingdom; the text refers to the Raj of India, meaning the rule of India.
Shariat Taaba: An event or achievement of great magnitude. Used to describe Dilip Kumar’s impact, saying he proved to be such an event.
Shivling: A symbolic representation of a Hindu deity, usually an oval-shaped, phallic icon. In this text, it signifies a powerful award.
Tahzeebom: An Arabic word referring to culture or civilization, specifically the refinement and sophistication of a society. The term is used to describe Dilip Kumar’s character, which embodies a mixture of culture, fear, and wealth.
Dilip Kumar: A Legacy of Art and Virtue
Okay, here’s a detailed briefing document summarizing the provided text about Dilip Kumar:
Briefing Document: Analysis of Text on Dilip Kumar
Date: October 26, 2023
Subject: In-depth Review of Text Detailing the Life and Impact of Dilip Kumar
Source Material: Excerpts from “Pasted Text”
Overview:
This document analyzes a passionate and somewhat unstructured tribute to the legendary Indian actor Dilip Kumar. The text, written in a highly emotive style, goes beyond a simple biographical account to celebrate Kumar as a cultural icon, a moral compass, and an embodiment of true artistry. The author uses a very personal lens, interweaving personal experiences and opinions with a reverence for Kumar’s talent and influence. The piece explores his acting prowess, his impact on society, and his lasting legacy.
Main Themes and Key Ideas:
Dilip Kumar: More Than Just an Actor:
The text consistently emphasizes that Dilip Kumar was not just a film star, but a profound figure who transcended his profession. He is described as a “hero of the race,” a “priceless masterpiece of nature”, and “the god of love.”
Quote: “The tragedy king Dilip Kumar shone like the sun, he was called the hero of generations because of his true identity.”
His dedication, hard work, and “true identity” are praised. The author sees him as an ideal and an inspiration.
He is portrayed as a “Dervish” a “lover of borders,” suggesting a spiritual and universal appeal.
A Paragon of Virtue and Truth:
Kumar is lauded as a man of truth, goodness, and integrity. He is presented as a fighter against evil and an inspiration for those fighting for their rights.
Quote: ” He is the hero of goodness and the villain of all evil. He is the hero of every youth and every person who fights for the truth and for their rights in society.”
The author highlights Kumar’s ability to deliver dialogues with such sincerity that they felt like “pearls falling from his body” suggesting deep emotional truth and authenticity in his performances.
His stories seem to be “a collaboration of truth.”
The author contrasts Dilip Kumar’s honesty with the perceived lack thereof in other actors, calling them “liars without a mother”.
He’s the “doctor of love” who “applies the balm of love to the hearts shattered by pain and sorrow.”
Artistic Mastery and Influence:
The text highlights Dilip Kumar’s exceptional acting talent. He is called a “few emperors of acting” and “the god of love” in the field of arts.
His roles are not seen as mere performances, but as embodiments of the characters, suggesting a deep level of immersion and authenticity.
The author believes Kumar influenced the way actors express emotion, with his ability to make words feel natural and heart felt rather than rote.
He’s described as bringing such depth to his roles that they remain “famous forever”.
He is described as a “tower of light” and a “lighthouse for the lost caravan”.
Personal Connection and Impact:
The author repeatedly states the personal impact Dilip Kumar’s work had on their life, providing courage and determination during times of personal hardship.
Quote: ” The push-up winds and time of life were falling on me without any gloves. At that time it gave me new courage, passion and bat. Even in the storms of the cruel world, I was determined to stay updated with it.”
The author mentions specific films, like “Devdas,” and reflects on how Kumar’s acting led him to reject the “sacrifice yourself for love” interpretation of the story.
The author was encouraged by Kumar to learn from his experiences.
The text suggests that Kumar’s influence was immense not just for the author, but also on millions of lives across the world.
Legacy and Immortality:
The text posits that Dilip Kumar is a legend whose fame will last for centuries, making him a truly immortal figure.
Quote: “a star who will keep shining for centuries, a lotus whose fan is amazing, who is immortal and will remain immortal”.
He’s compared to a “lotus” and a “bud that sprouted” to become something great.
The author believes his impact is so deep that a film academy or university would benefit from using his work as a guide.
Despite his passing, the author suggests that Kumar’s legacy lives on and his films will remain in the memories and hearts of his fans.
Dilip Kumar’s Secularism and Humanitarianism:
The text highlights that Kumar was a secular and unifying figure, bridging religious and cultural differences. He is described as a “bridge throughout his life with full knowledge, erasing the Hindu-Muslim differences.”
He was a unifying figure who “erased Hindu-Muslim differences”.
His songs and films promoted “Insaaniyat and Love.”
The text portrays him as a “truly secular human being.”
The author also notes that he had relationships with people from diverse backgrounds.
He is praised for being a voice of humanity and bringing people together.
Contrasting Interpretations of Roles:
The text compares the three actors, Sehgal, Dilip Kumar, and Shahrukh Khan, that played Devdas and concludes Dilip Kumar’s interpretation was unique and more resonant.
The author specifically mentions the character of Devdas to highlight Kumar’s impact on how people viewed love and life.
Personal Encounters and Reflections:
The author includes anecdotes of personal encounters with Dilip Kumar, such as visiting his house in 1988 and working near his residence in 1993, adding an intimate dimension to the narrative.
The text reflects on the author’s personal experiences related to Dilip Kumar, highlighting the author’s strong sense of admiration and connection.
The author expresses sadness about Dilip Kumar’s declining health in old age, and wishes he could continue to be seen as the hero he always was.
Key Quotes:
“Perhaps the biggest award of Dilip Kumar’s life is the deep love of millions of people for him which fascinates many races.”
“He is the hero of goodness and the villain of all evil. He is the hero of every youth and every person who fights for the truth and for their rights in society.”
“When he delivers dialogues, the jokes that come from his tongue do not seem to be rote. It seems that pearls are falling from his body due to the heat of his liver.”
“a star who will keep shining for centuries, a lotus whose fan is amazing, who is immortal and will remain immortal”.
” The real thing is that more than how much of a hit they were at the box office He has hit hearts, he has lit Diwali lamps in the dimagon“.
Conclusion:
The text presents a highly personal and emotional tribute to Dilip Kumar, portraying him not merely as a talented actor, but as a beacon of truth, morality, and artistic excellence. The author’s deep admiration and connection to Kumar’s work are evident, emphasizing the lasting legacy and impact he left on the Indian film industry and beyond. The unstructured and passionate tone highlights the profound emotional response Dilip Kumar’s presence and work evoked. The piece also reveals the author’s personal journey of growth and resilience inspired by the actor.
Dilip Kumar: The Tragedy King and Beyond
FAQ: Understanding the Legacy of Dilip Kumar
Who was Dilip Kumar and what made him a significant figure in Indian cinema? Dilip Kumar, born Mohammad Yusuf Khan, was a highly acclaimed and influential actor in the Indian film industry. He was known as the “Tragedy King” for his powerful portrayals of emotionally complex characters. His dedication, hard work, and unique acting style established him as a hero of generations, admired not just in India but worldwide. He was not just an actor; he was considered an “Aftab-e-Fan” (sun of art), whose influence was profound and lasting.
Beyond acting, what other aspects of Dilip Kumar’s personality were emphasized? The source emphasizes that Dilip Kumar was more than an actor. He was a “hero of goodness,” a fighter against evil, and a champion for truth and justice. His dialogues were not mere rote recitations but seemed to come from deep within him, filled with emotion and authenticity. He was described as a spiritual entity, a healer of broken hearts, and a secular figure who bridged divides between Hindu and Muslim communities. He was a Darvesh (ascetic) at heart.
How did Dilip Kumar’s work impact his audience and society? Dilip Kumar’s performances were deeply impactful, inspiring audiences with courage and passion. He taught viewers to listen to the truth, to stand up for themselves, and to strive for success through hard work. His work not only entertained but also encouraged critical thinking, urging people to distinguish between reality and illusion. He emphasized living in the real world rather than becoming lost in dreams. He made an impact by lighting ‘Diwali lamps’ in the minds of his viewers, and brought true characters to the screen with deep dedication.
What accolades did Dilip Kumar receive and how did they compare to the love he received from the public? Dilip Kumar received numerous prestigious awards, including the Dada Saheb Phalke Award from India and the Nishan-e-Pakistan Award. While these accolades were significant, the text suggests that the biggest award of his life was the immense love and admiration he received from millions of fans across different backgrounds. This deep affection was a more profound measure of his impact.
How was Dilip Kumar perceived by his fellow artists and the younger generation of actors? Dilip Kumar was revered by fellow artists, from senior actors like Sairabdhi Ji and Dada Muni Ji to younger generations of actors like Shahrukh Khan and Amitabh Bachchan. He was seen as an “emperor of the Indian film industry,” and many actors considered him their guru and friend. His influence was so profound that he set the bar for excellence, and even his biggest fans always paid him respect, for instance not offering gifts better than shawls and books.
How does the source compare Dilip Kumar’s portrayal of Devdas to other actors who have played the same role? The source compares Dilip Kumar’s Devdas with that of K.L. Saigal and Shahrukh Khan. While acknowledging the technical aspects and performances of the other actors, the author asserts that Dilip Kumar’s portrayal was unmatched. It was as if the character of Devdas was written with Dilip Kumar in mind, highlighting his unique ability to embody the depth and pathos of the character.
What does the text emphasize about Dilip Kumar’s film choices and the lasting impact of his roles? The text notes that Dilip Kumar did not appear in a large number of films, but that each film he did demonstrated his skill and dedication. Rather than focusing on his box office success, it underscores his ability to touch the hearts and minds of his audience through unforgettable and powerful roles. It is suggested that his ability to bring his characters to life with such authenticity is what has kept his art and legacy alive, and not his hits in the box office.
How did Dilip Kumar’s secularism and humanism come through in his life and work? Dilip Kumar is portrayed as a deeply secular individual who strived to bridge the gap between Hindu and Muslim communities. He was depicted as someone who maintained harmony in life and did not discriminate. His films, his public life, his dialogues, and his actions emphasized the messages of humanity and love. He carried an attitude of respect, love and grace throughout his whole life, and he used his art to bring all together.
Dilip Kumar: A Life in Cinema
Okay, here is the timeline and cast of characters based on the provided text:
Timeline of Main Events
December 11, 1922: Mohammad Yusuf Khan (later known as Dilip Kumar) is born in Oman Gali of Malik Mohalla Khuda Dad, in the Kissa Khani Bazaar area.
Early Life/Career: Dilip Kumar works his way up from humble beginnings to become a celebrated actor known as “The Tragedy King”.
1988: Dilip Kumar visits Pakistan, and an article is written about his visit which becomes part of an ADV Magazine.
1993: The narrator of the text lives near Dilip Kumar’s childhood home while attending a training course at the Peetu University.
Throughout his career: Dilip Kumar acts in over 60 films, receiving immense popularity and becoming a figure of great cultural significance.
Later Career: Dilip Kumar is regarded as the “emperor” of the Indian film industry, with younger actors and fans considering him a guru-like figure. He is known for his dedication and the emotional depth he brings to his roles.
Later Life/Illness: Dilip Kumar’s old age, illness, and weakness become a subject of concern and sadness for fans. There is discussion of his house becoming a museum.
Death: Dilip Kumar passes away due to his illness and breathlessness, leaving behind a lasting legacy. The text notes that his film roles are now like “moving fast on the screen”.
Posthumous: Dilip Kumar’s legacy is assured with his roles continuing to live on in the hearts and minds of fans. It is mentioned that there is a plan to convert his and Raj Kapoor’s homes into museums.
Cast of Characters (Principal People Mentioned)
Dilip Kumar (Mohammad Yusuf Khan): The central figure of the text. Born in 1922, he is described as an unparalleled actor, “The Tragedy King” of Indian cinema, known for his dedication, emotional depth, and impact on Indian culture. He is presented as not just an actor but also a secular, moral force.
Saira Banu: Dilip Kumar’s wife, mentioned in connection to the narrator’s wish that she would help fans continue to see him as the hero, despite his old age and illness,
Shah Rukh Khan: A younger contemporary actor who is seen as a fan of Dilip Kumar, he also played the role of Devdas and is compared to Dilip Kumar’s version.
Devka Rani: Film actress, her eyes are said to have been stuck on Dilip Kumar’s acting abilities.
Jawaharlal Nehru: Mentioned as one of those who admired Dilip Kumar’s art, illustrating his wide recognition from the common man to prominent leaders.
Raj Kapoor: A contemporary actor of Dilip Kumar’s, whose house is also being planned to be converted into a museum.
Madhubala: Another legendary actor who Dilip Kumar worked with, and the author mentions a song sung for her that now seems meaningful after the passing of Dilip Kumar.
Sehgal: Actor who, along with Shah Rukh Khan and Dilip Kumar, played Devdas, his performance is compared to the other actors.
Prithvi Rajput Ji Actor who is mentioned in the text.
Dada Muni Ji: Actor who is mentioned in the text.
Big B: Actor who is mentioned in the text.
Note:
The text is written in a highly metaphorical and passionate style, making the distinction between literal and figurative language necessary for interpretation.
The author of the text considers themself to be a life-long fan of Dilip Kumar.
There are a few names mentioned without further explanation, suggesting they are part of Dilip Kumar’s larger artistic circle but lacking specific context in this text.
Dilip Kumar: Tragedy King, Cultural Icon
Dilip Kumar, born Mohammad Yusuf Khan on December 11, 1922, was a significant figure in the Indian film industry, known as the “tragedy king” and “hero of generations” [1]. Here’s a summary of his life based on the provided sources:
Early Life and Identity: Born in Oman Gali of Malik Mohalla Khuda Dad [1], Dilip Kumar’s true identity and “Khuda Das likeness” were recognized not just in India but worldwide [1].
Film Career:
He was known for his “fanaticism, true dedication and hard work” which led to his success in the Indian film industry [1].
He did not do many films, not going beyond 60, but the ones he did were done with full dedication and were very impactful [2].
He is known as an “emperor of Indian film industry” [2].
He was known for bringing a unique depth to his roles and delivering dialogues that felt natural and authentic [3].
He made a lasting impact on the hearts of his fans and lit “Diwali lamps” in their minds [2].
Impact and Recognition:
He received the Dada Saheb Phalke award from the Indian government and Nishane Pakistan Award from Pakistan [1].
His biggest award was the “deep love of millions of people” [1].
He is considered a “god of love” and an “emperor of acting” and a “lighthouse for the lost caravan” [1].
He is seen as a “hero of goodness” and a fighter against evil, and for the truth and rights in society [3].
He inspired many with his courage and determination [3].
He taught people to listen to the truth and to persevere [2].
He is seen as a unifier, bridging Hindu-Muslim differences [4].
He was a “truly secular human being” [4].
Legacy:
Dilip Kumar’s work is seen as a “priceless masterpiece of nature” [1].
His films are so highly regarded that they could be the basis of an “academy and a university” for aspiring fans [4].
He has a special connection to the character of Devdas, and his performance is considered unmatched [4].
He is considered immortal and his characters will always be alive in the hearts and minds of his fans [5].
He maintained his dominance and was considered a guru and friend to his fans and successors [2].
Even in his old age, he continued to be a source of inspiration and admiration, though his illness caused concern among his fans [5].
His house may be turned into a museum [5].
Personal LifeHe had a close connection with his fans and made efforts to meet them [5].
He had interactions with people of all backgrounds and was a confluence of fear, wealth, and tahzeebom [5].
He was a lover of borders [1].
He kept smiling while meeting with Unnas [5].
He went to Pakistan in 1988 and wrote an article about it [1].
In summary, Dilip Kumar was more than just an actor; he was a cultural icon who embodied goodness, truth, and dedication, leaving an indelible mark on the Indian film industry and the hearts of millions [1-5].
Dilip Kumar: Emperor of Indian Cinema
Dilip Kumar had a remarkable film career that cemented his place as a legend in the Indian film industry [1]. Here’s a detailed look at his career, based on the sources:
Dedication and Impact: Dilip Kumar was known for his “fanaticism, true dedication, and hard work,” which were crucial to his success [1]. He did not act in many films, not going beyond 60, but he put his full dedication into the roles he did take [2]. He brought a unique depth to his characters and delivered dialogues with a natural, authentic feel [3]. His performances had a lasting impact on the hearts of his fans and he is said to have lit “Diwali lamps” in their minds [2].
Recognition and Titles: Kumar is known as the “emperor of Indian film industry” [2]. He was called the “tragedy king” [1]. The Government of India gave him its biggest film award, the Dada Saheb Phalke, and Pakistan gave him its biggest award, the Nishane Pakistan Award [1]. However, the “deep love of millions of people” is considered his biggest award [1].
Unique Qualities: He is considered a “god of love” and an “emperor of acting” [1]. He is also seen as a “hero of goodness” who fought against evil, and for the truth and rights in society [3].
Influence on Others: His beautiful acting not only gave passion but also ignited the ability to think and understand [3]. He was a source of inspiration, providing courage and determination to many [3]. He also taught people to listen to the truth and to persevere [2]. He maintained his dominance and was considered a guru and friend to his fans and successors [2].
Roles and Films: He is seen to have a special connection to the character of Devdas, and his performance in that role is considered unmatched [4]. Some of his notable films include Aur Bata Milan, Jugnu, Mughal-e-Azam, Deedar, Andaaz, Jogan Mela, Sandil, Daag, Naya Daur, Tarana, Madhumati, Ram and Shyam, Dil Diya Dard Liya, Laborer, Leader, Azad, Jew Koi Door, Ganga Jamuna, Traveler Gopi, Amar Das, Udaan Khatola, Dastan, Revolution, Karma, Shakti, and Vidha. His movies are considered to be masterpieces [4].
Impact on the Industry: Kumar’s films are so highly regarded that they could be the basis of an “academy and a university” for aspiring fans [4].
In summary, Dilip Kumar’s film career was marked by his dedication, unique acting style, and the profound impact he had on the hearts of his fans [2]. He was not just an actor but a cultural icon whose work is seen as a “priceless masterpiece of nature,” and he is considered immortal and his characters will always remain alive in the hearts and minds of his fans [1, 5]. His influence can be seen in the work of many actors who followed him, including Shahrukh Khan and Big B [2].
Dilip Kumar: A Legacy of Acting
Dilip Kumar’s acting legacy is profound and multifaceted, marked by his unique approach to character portrayal and his lasting influence on the Indian film industry. Here’s an overview of his acting legacy, based on the sources:
Unique Style and Depth: Dilip Kumar was known for his “fanaticism, true dedication and hard work” [1]. He brought a unique depth to his roles, delivering dialogues that felt natural and authentic [2]. His performances had a lasting impact on the hearts of his fans [3]. He is described as having the ability to make his characters seem as if they were born into the roles, connecting with their emotions and experiences [2]. His acting style was so powerful that it inspired people on “countless wakes in life” [2].
Impact and Influence: Kumar’s acting was not just about entertainment; it ignited the ability to think and understand [2]. He is considered an “emperor of acting” [1]. He is also considered a “god of love” and a “hero of goodness” who fought against evil and for truth and rights in society [1, 2]. He inspired many with his courage and determination, and taught people to listen to the truth and persevere [2, 3]. He maintained his dominance and was considered a guru and friend to his fans and successors [3].
Lasting Legacy:Immortal Characters: Dilip Kumar’s characters are considered immortal and will always remain alive in the hearts and minds of his fans [3, 4]. His work is described as a “priceless masterpiece of nature” [1].
Academy and University Potential: His films are so highly regarded that they could form the basis of an “academy and a university” for aspiring fans [5].
Unmatched Performance as Devdas: He has a special connection to the character of Devdas, and his performance in that role is considered unmatched [5]. The source suggests that the Bengali novel Devdas may have been written after seeing Kumar’s acting [5]. Other actors who have portrayed Devdas, such as Sehgal and Shahrukh Khan, are compared to his performance, highlighting the singularity of Kumar’s acting [5].
Inspiration to Future Generations: He has inspired many generations of actors including Shahrukh Khan and Big B [3]. Even the biggest fans who came after him, never accepted anything less than a shawl or a book to bow down before his greatness [3].
Continued Admiration: Even in his old age, he continued to be a source of inspiration and admiration, though his illness caused concern among his fans [4].
In summary, Dilip Kumar’s acting legacy is marked by his profound dedication, his ability to connect with his characters on a deep emotional level, his impact on the Indian film industry, and his influence on future generations of actors. His performances are not just remembered, they are celebrated as timeless masterpieces. He is considered a true legend whose work has left an indelible mark on Indian cinema [3].
Dilip Kumar: Cultural Icon of India
Dilip Kumar’s cultural impact is far-reaching and profound, extending beyond his acting career to influence society, inspire generations, and bridge cultural divides. Here’s a detailed look at his cultural impact, based on the sources:
Inspiration and Role Model:
Dilip Kumar was seen as a “hero of goodness” and a fighter against evil, and for the truth and rights in society [1]. He inspired many with his courage, determination, and his ability to stay updated even amidst the storms of a cruel world [1].
He taught people to listen to the truth, to persevere, and to not pass by crying [2].
His beautiful acting not only gave passion but also ignited the ability to think and understand [1].
He inspired people on “countless wakes in life” [1].
Secularism and Unity:
Dilip Kumar played the true role of a bridge throughout his life, erasing Hindu-Muslim differences [3]. He was a “truly secular human being” [3].
He was a confluence of fear, wealth, and tahzeebom, embracing both Urdu and Hindi cultures [4].
Influence on the Film Industry:
He is considered the “emperor of Indian film industry” [2, 5]. His acting was so profound that it has been called a “priceless masterpiece of nature” [5].
He maintained his dominance and was considered a guru and friend to his fans and successors [2].
He has inspired many generations of actors, including Shahrukh Khan and Big B [2].
His films are so highly regarded that they could form the basis of an “academy and a university” for aspiring fans [2, 3].
Emotional Connection with Fans:
Dilip Kumar had a deep emotional connection with his fans. He is said to have “hit hearts” and lit “Diwali lamps” in the minds of his audience [2].
The “deep love of millions of people” is considered his biggest award [1, 5].
He made efforts to meet his fans [4].
His fans viewed him as a “god of love” [5].
His fans would not accept anything less than a shawl or a book to bow before his greatness [2].
His old age and illness caused concern among his fans [4].
Timeless Legacy:
Dilip Kumar’s characters are considered immortal and will always remain alive in the hearts and minds of his fans [2, 4, 5].
He is a star who will “keep shining for centuries” [5]. He is described as a “lotus whose fan is amazing” and as a “bud that sprouted… which proved to be such a big Shariat Taaba” [5].
In summary, Dilip Kumar’s cultural impact is immense, encompassing his role as an inspiration and role model, his efforts to bridge cultural and religious divides, his significant influence on the Indian film industry, his deep emotional connection with fans, and his lasting legacy as an immortal figure in Indian culture. He was not just an actor, but a cultural icon whose influence extends beyond the realm of cinema to inspire unity and goodness.
Dilip Kumar: A Legacy of Humanitarian Action
Dilip Kumar’s humanitarianism is evident through his actions and the values he embodied, which significantly impacted society and his fans. Here’s an overview of his humanitarian contributions, based on the sources:
Fighting for Truth and Rights: Dilip Kumar was not just an actor; he was a “hero of goodness” who actively fought against evil and stood up for truth and the rights of people in society [1]. This commitment to justice and righteousness highlights a key aspect of his humanitarianism.
Secularism and Unity: He played the role of a bridge throughout his life, working to erase the differences between Hindus and Muslims [2]. He was a “truly secular human being,” which reflects his inclusive and humanitarian approach [2]. This effort to foster unity is a significant aspect of his impact on society.
Inspiration and Guidance: He inspired people with his courage, determination, and his ability to stay updated even amidst the storms of a cruel world [1, 3]. He taught people to listen to the truth, to persevere, and to not pass by crying [1, 3]. This guidance and inspiration served as a way of empowering people and helping them navigate their lives. His acting ignited the ability to think and understand [1].
Emotional Connection and Compassion: He was known as the “doctor of love,” who applied the balm of love to hearts shattered by pain and sorrow [4]. His words were like a rosary of love, suggesting his compassionate nature [4]. This indicates a deep emotional connection with his audience and a commitment to alleviating their suffering. The “deep love of millions of people” is considered his biggest award [4].
Beyond Entertainment: His work wasn’t limited to entertainment, but was geared toward teaching people about what is real and what is not [1]. He showed people the true form of life and explained to them how to decide for themselves what is real [1]. By using his art to instill these values, he took on a humanitarian role [1].
Reaching Out to People: He was a “lighthouse for the lost caravan In this dark city” [4]. This metaphor highlights his role as a beacon of hope and guidance for those who were lost or struggling, signifying a significant aspect of his humanitarianism.
Role Model: Even the biggest fans, who came after him, never accepted anything less than a shawl or book to bow before his greatness [3]. This shows how they looked at him not only as a role model for acting, but also for life.
In summary, Dilip Kumar’s humanitarianism is characterized by his fight for truth and rights, his promotion of secularism and unity, his role as an inspiration, and his compassionate nature. He used his position to promote good and make a positive impact on society. He is not just remembered as an actor, but as someone who embodied values of kindness, empathy, and unity, which left a lasting legacy of humanitarianism.
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
A diverse array of topics are covered within the provided sources. These include development projects in Saudi Arabia, an overview of Saudi culture, and updates from the world of soccer. The sources also touch on international relations and conflict, including a potential Israeli operation in Gaza. Additionally, there’s discussion of global economics, like the relationship between the US and China. The sources also include announcements and updates about local Saudi events and the services being offered during Ramadan. These cover both infrastructure improvements, and the distribution of aid, as well as religious observances and more.
Revitalizing Heritage: A Study Guide to Saudi Arabia’s Cultural Landscape
I. Quiz: Short Answer Questions
Answer each question in 2-3 sentences.
What are the primary goals of the Prince Mohammed bin Salman Project for the Development of Historical Mosques?
According to the article, how is the Kingdom of Saudi Arabia working to improve and update modern mosques?
What sector is seeing growth in Saudi Arabia that represents about 25% of all managed assets in the financial market?
How is the Kingdom of Saudi Arabia working to address security concerns in the country?
What is the “Good Areas 2” campaign and what goals is it seeking to achieve?
What steps are being taken to improve the operation and preparedness of the Prophet’s Mosque in Saudi Arabia?
How has the Kingdom of Saudi Arabia updated the Islamic teaching industry to align with its 2030 vision?
What challenges was the Kingdom of Saudi Arabia facing concerning trade with China and the United States of America?
How was Saudi Arabia working to improve the sustainability of residential programs for citizens in 2024?
What is the Saudi Arabia Minister of Culture doing to preserve and promote the cultural heritage of the Kingdom?
II. Answer Key
The primary goals of the Prince Mohammed bin Salman Project are to rehabilitate and restore historical mosques, revive their original character, and highlight their architectural and religious significance. The project aims to showcase the Kingdom’s cultural heritage while aligning with the Kingdom’s Vision 2030 by preserving original architectural features.
The Kingdom is focusing on modernizing the design of mosques while retaining elements of local culture. Also, the kingdom is using AI to improve the recitation of the Quran.
The real estate sector is seeing growth, representing about 25% of all managed assets in the Saudi financial market. This growth reflects the increasing role of the real estate sector in boosting the national economy and aligns with the Kingdom’s Vision 2030.
The Kingdom is committed to ongoing operations to eliminate the last terrorist, referencing actions against groups like the Kurdistan Workers’ Party (PKK). The Kingdom is actively investing in the security sector by allocating billions of dollars to modernize its military.
“Good Areas 2” is a campaign launched to promote social awareness and community participation in supporting deserving families. It aims to empower society to contribute to providing sustainable housing solutions in various regions of the Kingdom, reinforcing a culture of giving and social solidarity.
The Kingdom is expediting procedures in accordance with judicial regulations to ensure fairness and efficiency. This was done to be prepared to welcome visitors in the month of Ramadan.
The Kingdom has focused on remote teaching, allowing students to receive lessons in recitation and intonation from anywhere. Some smart applications are used to provide automated feedback for the student.
The Kingdom was facing growing tensions in trade relations between China and the US. This included additional tariffs on Chinese goods.
The Kingdom of Saudi Arabia signed an agreement to provide 5,000 sustainable housing units to eligible families in various regions of the Kingdom. This agreement aims to enhance housing empowerment efforts and support the Vision 2030 goals of increasing homeownership among citizens.
The Minister of Culture is focused on preserving and showcasing Saudi culture and heritage through various initiatives. These include supporting heritage preservation efforts, promoting cultural exchanges, and nurturing Saudi talent in diverse cultural fields.
III. Essay Questions
Analyze the Prince Mohammed bin Salman Project for the Development of Historical Mosques, addressing its goals, implementation strategies, and potential impact on Saudi cultural identity and tourism.
Examine the growth of the real estate sector in Saudi Arabia in relation to the Kingdom’s Vision 2030.
Discuss the challenges and strategies involved in the modernization of Saudi society, with a focus on cultural and social change.
Assess Saudi Arabia’s role in regional and international affairs, focusing on its efforts to combat terrorism and promote stability.
Evaluate the potential of the cultural sector in Saudi Arabia to contribute to economic diversification and job creation, in line with the Kingdom’s Vision 2030.
IV. Glossary of Key Terms
Vision 2030: Saudi Arabia’s strategic framework to reduce the country’s dependence on oil, diversify its economy, and develop public service sectors such as health, education, infrastructure, recreation, and tourism.
Historical Mosques: Mosques in Saudi Arabia that hold significant historical and cultural value, often reflecting unique architectural styles and historical events.
Real Estate Funds: Investment vehicles that pool capital to purchase, manage, and develop real estate properties, contributing to the growth of the real estate sector.
Cultural Heritage: The legacy of physical artifacts and intangible attributes of a group or society that are inherited from past generations, maintained in the present, and bestowed for the benefit of future generations.
Social Solidarity: The degree to which members of a group or society feel united, bound together, and committed to supporting one another.
Sustainability: The ability to meet the needs of the present without compromising the ability of future generations to meet their own needs. In the context of development, it refers to balancing economic growth, environmental protection, and social well-being.
Modernization: The process of social change that involves the transformation of a society from a traditional state to a more advanced and technologically sophisticated one.
Terrorism: The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
Economic Diversification: The process of shifting an economy away from a single income source toward multiple sources from a growing range of sectors and markets.
Cultural Exchange: The interchange of ideas, information, and cultural values among different societies or groups, promoting understanding and appreciation of diverse cultures.
Al Riyadh, March 3, 2025: Saudi Arabia in Brief
Okay, here’s a detailed briefing document summarizing the main themes and ideas from the provided text excerpts.
Briefing Document: Analysis of “20704.pdf”
Overview:
This document synthesizes information from excerpts of the Saudi Arabian newspaper “Al Riyadh,” issue number 20704 dated Monday, March 3, 2025. The excerpts cover a diverse range of topics, including:
Restoration and development of historical mosques in Saudi Arabia.
Economic developments, including growth in commercial registrations and the real estate sector.
International relations, focusing on tensions between China and the United States.
Regional conflicts, particularly the Israeli-Palestinian conflict and Turkish-Kurdish relations.
Cultural preservation and development within Saudi Arabia.
Sports news and events.
Key Themes and Ideas:
Preservation and Development of Historical Mosques:
Theme: A significant project is underway to restore and rehabilitate historical mosques across Saudi Arabia.
Details: The “Prince Mohammed bin Salman Project for the Development of Historical Mosques” is in its second phase, encompassing 30 mosques across 10 regions. Some of these mosques date back to the time of the Prophet’s companions, while the newest are about 60 years old.
Quote: “Some of them date back to the era of the Companions, may God be pleased with them, while the newest of them is 60 years old…”
Quote: “… ensuring their restoration, and restoring the spirit of the special architectural details of each mosque since its construction in accordance with the place and its identity.”
Significance: The project balances modern construction standards with the preservation of historical architectural elements. It aligns with Vision 2030, which emphasizes preserving the Kingdom’s cultural heritage and utilizing original architectural features in modern mosque designs.
Economic Growth and Diversification:
Theme: Saudi Arabia is experiencing growth in various economic sectors, particularly in commercial registrations and real estate.
Details: There’s a significant increase in commercial registrations, with Riyadh having the highest concentration. The real estate sector is also growing, supported by government projects under Vision 2030. Real estate funds now represent about 25% of the total assets managed in the financial market.
Quote: “The Kingdom of Saudi Arabia has become witnessing a noticeable growth in real estate funds, representing about 25% of the total assets managed in the financial market.”
Significance: The growth reflects the government’s ongoing efforts to diversify the Saudi economy and promote investment in various sectors beyond oil.
International Relations and Geopolitical Tensions:
Theme: The excerpts highlight ongoing tensions between China and the United States, as well as regional conflicts in the Middle East.
Details: The Trump administration’s announcement of additional tariffs on Chinese goods has strained trade relations. The Israeli-Palestinian conflict remains a significant issue, with reports of Israel preparing a large-scale military operation in Gaza. There’s also mention of the Turkish-Kurdish conflict, with the PKK announcing a ceasefire.
Quote: (Regarding China-US relations) “Deputy Prime Minister He Lifeng affirmed, during his hosting of the American Chamber of Commerce in China, that his country seeks to enhance cooperation with the United States despite the increasing economic differences.”
Quote: (Regarding the Israeli-Palestinian conflict) “Israeli media reported yesterday that the Israeli occupation army is preparing to bring in more than 50,000 soldiers for a joint attack in various parts of the Gaza Strip.”
Significance: These excerpts underscore the complex geopolitical landscape and the challenges facing various regions and international relations.
Cultural Development and Preservation within Saudi Arabia:
Theme: Saudi Arabia is actively working to develop and preserve its cultural heritage.
Details: The Ministry of Culture is focused on supporting cultural heritage, encouraging artistic production, and preserving Saudi traditions. There is a focus on balancing tradition with modernity.
Quote: “Saudi culture is characterized by its richness in elements of tangible and intangible heritage, human customs and traditions, and historical urban development, in line with the continuous growth of visual, musical, performing arts and literary creativity.”
Significance: This reflects a broader effort to strengthen national identity and promote Saudi Arabia’s cultural contributions on the world stage.
Philanthropic Initiatives and Community Support:
Theme: There’s a visible emphasis on social responsibility and community support through various campaigns and initiatives.
Details: The launch of “Jood Al-Manatiq 2” campaign highlights the efforts to provide sustainable housing solutions for those in need across different regions of the Kingdom. The campaign is supported by both public and private sectors.
Quote: “Princes of the regions of the Kingdom launched yesterday their participation in the ‘Jood Al-Manatiq 2’ campaign launched by the ‘Jood Housing’ platform, one of the initiatives of the ‘Sakan’ Developmental Housing Foundation.”
Significance: This reflects a growing emphasis on social welfare and creating a more inclusive society in line with Vision 2030.
Noteworthy Quotes:
Prince Mohammed bin Salman (2016): “Our ambition will swallow housing, unemployment and other problems.”
US Secretary of State Marco Rubio: (Regarding aid to Israel) “signed an order to activate emergency authorities to accelerate the delivery of weapons to Israel.”
Overall Impression:
The excerpts provide a snapshot of Saudi Arabia in early 2025, highlighting its efforts to modernize and diversify its economy, preserve its cultural heritage, and play a more prominent role on the global stage. However, they also acknowledge the challenges facing the Kingdom and the broader region, including geopolitical tensions and regional conflicts. The newspaper reflects a generally positive view of the Kingdom’s progress while addressing complex issues in a rapidly changing world.
King Salman Project: Restoring Saudi Arabia’s Historical Mosques
What is the King Salman Project for Historical Mosques?
The King Salman Project for Historical Mosques is an initiative focused on the rehabilitation and restoration of historical mosques throughout Saudi Arabia. It aims to preserve the architectural identity of these mosques while incorporating modern construction standards, ensuring sustainability and appropriate utilization of space. This project reflects the Kingdom’s vision to highlight its cultural heritage and architectural characteristics. The project includes mosques dating back as far as the era of the Companions (may Allah be pleased with them), with the most recent ones being 60 years old. Some mosques represented scientific beacons in different historical periods.
What are the key objectives of this mosque restoration project?
The project has several strategic objectives:
Revitalizing and restoring the authenticity and spiritual atmosphere of historical mosques.
Highlighting the architectural significance of these mosques.
Emphasizing the cultural and historical dimension of the Kingdom of Saudi Arabia.
Contributing to the Kingdom’s cultural presence and identity, in line with Vision 2030, by preserving original architectural features.
How many mosques are included in this project, and where are they located?
The project’s second phase includes 30 mosques across 10 regions of the Kingdom. The first phase, launched in 2018, also included the rehabilitation and restoration of 30 historical mosques in 10 regions. The distribution includes 6 mosques in the Riyadh region, 5 in the Makkah region, 4 in the Madinah region, and varied numbers in other regions like Asir, the Eastern Province, Al-Jouf, Jazan, the Northern Borders, Tabuk, Al-Baha, Hail, and Al-Qassim.
Who is involved in the implementation of the historical mosques restoration project?
The implementation relies on Saudi companies with expertise in rehabilitating historical buildings. This ensures the preservation of Saudi identity and architectural authenticity of each mosque since its establishment. The project ensures meticulous details and careful consideration of the place and its identity, in accordance with its spirit since its establishment.
How does the project balance modern needs with historical preservation?
The project seeks to strike a balance between modern and traditional building standards to incorporate sustainability while maintaining the historical and architectural integrity of the mosques. Suitable materials are used, and modern development influences are integrated into the existing structure in a way that respects its heritage. The components of the mosques are designed to blend the old with the new.
What role does Vision 2030 play in the context of this historical preservation?
The restoration of historical mosques is directly linked to the Saudi Vision 2030, which focuses on preserving the Kingdom’s heritage, benefiting from its authentic architectural features, and developing modern mosque designs that reflect local culture and identity.
Beyond the mosques restoration project, what other projects is Saudi Arabia undertaking related to the real estate and construction sectors?
Saudi Arabia’s real estate sector is experiencing significant growth, representing approximately 25% of total assets managed in the financial market. This growth supports the national economy by implementing major projects within Saudi Vision 2030, contributing to urbanization, increasing real estate projects, and developing the real estate fund sector. The government continues to implement mega-projects to boost the national economy, aligning with Vision 2030. There’s an expectation for continued urban expansion alongside an increase in real estate projects.
What does the article say about the growth of Saudi Arabia’s real estate sector?
The Saudi Arabian real estate market is witnessing notable growth, representing about 25% of the total assets managed in the financial market. This growth reflects the increasing role of the real estate sector in boosting the national economy, especially with the government continuing to implement major projects under Saudi Vision 2030. The sector is expected to continue to grow due to urban expansion and the increasing number of real estate projects. The article also highlights the important role of real estate funds in attracting local and international investments and fostering urban development, contributing to the realization of Saudi Vision 2030 goals.
Mosque Restoration Projects
Several sources discuss mosque restoration projects, with a particular focus on historical mosques:
The Prince Mohammed bin Salman Project for the Development of Historical Mosques aims to highlight the unique architectural heritage and achieve originality and integration through reconstruction.
The project was launched in 2018 to develop and restore 130 historical mosques.
A specific example is the reconstruction of the Al-Qibli Mosque in the Riyadh.
The Al-Qibli Mosque is located in the Al-Manfouha neighborhood and is one of the oldest mosques targeted in the project’s second phase.
Its history dates back more than 300 years to 1100 AH. It was rebuilt in 1364 AH by King Abdulaziz Al Saud.
The restoration of Al-Qibli Mosque uses the Najdi architectural style, which retains the natural elements of the original design.
The mosque’s ceiling is made of three natural elements: mud, Athel wood, and palm fronds.
This style is characterized by its ability to adapt to the local environment and hot, desert climate.
Another example is the restoration of the Al-Ruwaiba Mosque in Buraidah, which is part of the Prince Muhammad bin Salman project.
The restoration maintains the characteristics of its ceiling, which consists of three natural elements: mud, Athel wood, and palm fronds.
The development of modern mosque designs is also mentioned.
Saudi Arabia: Economic Diversification & Vision 2030
Several sources touch on the topic of economic diversification in Saudi Arabia, primarily in the context of achieving the goals of Saudi Vision 2030:
Saudi Vision 2030 emphasizes diversifying the Kingdom’s economy.
Development of the real estate sector and Real Estate Funds contribute to economic diversification and the realization of Vision 2030.
Privatization is seen as a strategic economic transformation to achieve a balance between financial sustainability, quality services and development. It is a means to diversify the economy, increase the efficiency of services, and promote innovation.
The Kingdom’s privatization program aims to achieve non-oil revenues of 143 billion riyals and attract investments worth 62 billion riyals by 2025.
Developing the cultural sector is considered a component of economic growth within the Kingdom’s Vision 2030.
The sources also mention the development of the tourism sector as part of economic diversification.
These sources suggest that Saudi Arabia is actively pursuing economic diversification through various initiatives, including developing specific sectors, privatization, and promoting cultural and environmental tourism.
Israeli Military Actions & Regional Tensions
The sources discuss several aspects of Israeli military actions and related issues:
Israeli-Palestinian Conflict:The Kingdom of Saudi Arabia condemned the Israeli government’s decision to halt the entry of humanitarian aid into the Gaza Strip.
Saudi Arabia views this action as a form of collective punishment and blackmail, which is a violation of international law.
The Kingdom called on the international community to ensure sustained access for aid and to activate international accountability mechanisms.
Potential Israeli intervention in Syria:The Israeli Defense Minister threatened military intervention in Syria if the Syrian regime harmed the Druze population.
This threat was made against the backdrop of clashes in Jaramana, a suburb southeast of Damascus.
Israeli military preparedness on the Gaza border:The Israeli army raised its alert level along the Gaza border, with increased readiness in the area.
Additional battalions are preparing for a potential ground operation, which could last for several weeks.
The operation would focus on countering Hamas’ infrastructure, including tunnels, explosive device locations, and booby-trapped streets.
Ramadan Initiatives: Kingdom’s Charitable, Religious, and Cultural Activities
The sources highlight various initiatives undertaken during Ramadan, spanning from charitable campaigns to religious and cultural activities, as well as facilitation for visitors to the holy sites:
“Jood Eskan” Campaign:Aims to raise awareness and encourage community participation in providing sustainable housing solutions for deserving families throughout the Kingdom during Ramadan.
The campaign is carried out in different regions of the Kingdom.
This initiative is an extension of previous successful campaigns that contributed to the stability and quality of life for beneficiary families in different regions.
The General Presidency for the Affairs of the Two Holy Mosques’ ( হারামين شريفين ) initiatives:
Focus on enriching the experience of visitors and worshipers in the Two Holy Mosques.
These initiatives are based on strategic pillars that emphasize caring for time, respecting the place, and enhancing its position.
The initiatives aim to highlight the Kingdom’s efforts in developing the Two Holy Mosques and to emphasize the religious and moderate values of Islam.
Facilitating Access and Services for Pilgrims and Visitors:
Expanded guidance services are provided in multiple languages to assist visitors.
Coordination with relevant authorities to organize crowd management and guidance in the Two Holy Mosques.
Provision of directional signage and designated routes to ensure smooth movement.
Preparation of the Two Holy Mosques to accommodate a large number of worshipers.
Health Services:
Dr. Sulaiman Al Habib Hospital and medical centers provide comprehensive diagnostic and treatment services during Ramadan.
Maintaining a state of readiness to receive emergency cases with specialized teams.
Activation of services such as “Habib Care” for remote consultation with doctors and prescription refills via an app.
Municipality Services in Mecca:
The Municipality of Mecca intensifies its field and monitoring efforts to maintain public cleanliness, control pests, and monitor commercial establishments.
Ensuring the safety of food products and water, and monitoring and maintaining municipal facilities.
Cultural and Social Traditions:
Highlighting the customs and traditions in the villages, such as community participation, preparing traditional dishes, and celebrating the first day of fasting for children.
Traffic Management:
Increased efforts by traffic police to organize traffic flow, ensure safety, and promote adherence to traffic rules.
Distribution of Iftar meals:
Distributing Iftar meals to those in need is a common practice during Ramadan.
Al-Nasr Soccer Team: Elite League Round of 16 Preview
The sources provide information about the Al-Nasr soccer team:
Al-Nasr is preparing to meet the Esteghlal team in Tehran in the first leg of the Round of 16 of the Elite League.
The team’s coach, Stefano Pioli, decided to exclude a number of players from the delegation to Tehran.
Cristiano Ronaldo, Sultan Al-Ghannam, Abdullah Al-Khaibari, and Portuguese Otavio are among the injured players.
The Al-Nasr team includes foreign players such as Brazilian goalkeeper, French Seko Fofana, Croatian Marcelo Brozovic, Brazilian Anderson Talisca, Ghislain Konan and Sadio Mane.
Al-Nasr looks forward to returning with a positive result in the second leg, which will be held at the Al-Awwal Park Stadium in Riyadh.
Al-Nasr has presented good performances during the league stage, achieving five wins, two draws, and one loss.
A source mentions the Al-Nasr team is ignoring the Esteghlal’s tactical discipline. It claims that Al-Nasr was beaten by the Al-Orouba team because of Al-Nasr’s lack of tactical discipline.
The source suggests a former player, Fuad Anwar, deserves to be honored by the Al-Nasr club.
Another source claims that Al-Hilal achieved the Asian Cup in the same season and participated in the Club World Cup in the Emirates, which had a great impact on Al-Ittihad because Al-Ittihad played its matches and stopped for forty days. It goes on to say that this is not the case when Al-Nasr achieved another league title.
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
This comprehensive guide explores essential Linux system administration tasks, focusing on security, resource management, and cloud technologies. It covers network configuration, firewall management using ufw and iptables, and secure communication via SSH and GPG. User authentication methods, including password-based and key-based authentication, are examined. Furthermore, the guide details file system security, including file permissions, Access Control Lists (ACLs), and the use of chroot jails for isolating processes. Disk usage analysis, cleanup procedures, system performance monitoring tools like top, free, and vmstat are explained. Finally, it provides an introduction to virtualization and cloud computing concepts, Docker, and container orchestration using Kubernetes and Docker Swarm.
Network Fundamentals and Security: A Comprehensive Study Guide
Study Guide Outline
I. Basic Networking Concepts * IP Addressing: IPv4 vs IPv6 * Subnets and Subnet Masks: Calculation, Network vs Host Bits * Domain Name System (DNS): Resolution Process, Hierarchy (Root Servers, TLD Servers, Authoritative Servers)
II. Linux Network Configuration * Interface Configuration: ifconfig (Legacy) vs ip (Modern) * Network Manager Command Line Interface (NMCLI): Connection Management, Wi-Fi Management
III. Network Troubleshooting * Ping: Testing Reachability, Packet Loss * Traceroute: Path Analysis, Hop Count * Netstat & SS: Monitoring Network Connections, Listening Ports
IV. Network Security Fundamentals * Firewall Management: Uncomplicated Firewall (UFW), IP Tables * AppArmor: Application Security Policies * Password Management: Best Practices, Multi-Factor Authentication (MFA)
V. Encryption and Key Management * GPG (GNU Privacy Guard): Public Key Cryptography, Encryption/Decryption, Key Management (Import/Export)
VI. System Monitoring and Logging * System Logging: Syslog, Authentication Logs, Kernel Logs * Disk Usage Analysis: DF, DU * Process Monitoring: Top, Htop * Memory Monitoring: Free, VMStat
VII. Virtualization and Cloud Computing * Virtualization Concepts: Virtual Machines (VMs), Hypervisors (Type 1 vs Type 2), KVM * Containerization: Docker, Docker Commands
What is the primary difference between IPv4 and IPv6 addresses? IPv4 uses a 32-bit numerical label while IPv6 uses a 128-bit alphanumeric label. IPv6 was developed to overcome the address limitations of IPv4.
Explain the purpose of a subnet mask. A subnet mask is used to divide an IP address into network and host portions, determining how many addresses are available within a network. It also defines which part of the IP address identifies the network and which part identifies the host.
Describe the steps in the DNS resolution process. The DNS resolution process begins with a query from a client to a DNS resolver, which may recursively query root servers, TLD servers, and authoritative servers until the IP address corresponding to the domain name is found. The resolver then returns the IP address to the client.
What are the key differences between using ifconfig and ip commands in Linux? ifconfig is a legacy tool for network interface configuration while ip is the modern replacement; ifconfig is still in use. ip is part of the IP Route 2 package and offers more comprehensive functionality and features than ifconfig.
How does the ping command help in network troubleshooting? ping tests the reachability of a host by sending ICMP packets and measuring the round trip time for those packets. This helps identify network connectivity issues and packet loss.
What information does the traceroute command provide about a network route? traceroute identifies the path a packet takes to reach a destination, including each hop (router) along the way. It also measures the time it takes to reach each hop, helping pinpoint delays or failures.
What is the role of the Uncomplicated Firewall (UFW) in Linux systems? UFW is a user-friendly interface for managing iptables firewall rules in Linux. It simplifies the process of configuring firewall rules to allow or deny network traffic based on specific criteria.
Explain the purpose of Multi-Factor Authentication (MFA). MFA enhances password-based authentication by requiring users to provide multiple verification factors such as passwords and one-time codes sent to a phone. This reduces the risk of unauthorized access even if the password is stolen.
Describe the difference between Type 1 and Type 2 hypervisors. A Type 1 hypervisor (bare metal) runs directly on the hardware, offering better performance, while a Type 2 hypervisor runs on top of an existing operating system. Type 2 hypervisors tend to be easier to install.
What is the purpose of Docker containers? Docker containers package applications and their dependencies into portable units that can run consistently across different environments. This ensures that the application behaves the same regardless of the host system.
Answer Key: Short Answer Questions
IPv4 uses a 32-bit numerical label while IPv6 uses a 128-bit alphanumeric label. IPv6 was developed to overcome the address limitations of IPv4.
A subnet mask is used to divide an IP address into network and host portions, determining how many addresses are available within a network. It also defines which part of the IP address identifies the network and which part identifies the host.
The DNS resolution process begins with a query from a client to a DNS resolver, which may recursively query root servers, TLD servers, and authoritative servers until the IP address corresponding to the domain name is found. The resolver then returns the IP address to the client.
ifconfig is a legacy tool for network interface configuration while ip is the modern replacement; ifconfig is still in use. ip is part of the IP Route 2 package and offers more comprehensive functionality and features than ifconfig.
ping tests the reachability of a host by sending ICMP packets and measuring the round trip time for those packets. This helps identify network connectivity issues and packet loss.
traceroute identifies the path a packet takes to reach a destination, including each hop (router) along the way. It also measures the time it takes to reach each hop, helping pinpoint delays or failures.
UFW is a user-friendly interface for managing iptables firewall rules in Linux. It simplifies the process of configuring firewall rules to allow or deny network traffic based on specific criteria.
MFA enhances password-based authentication by requiring users to provide multiple verification factors such as passwords and one-time codes sent to a phone. This reduces the risk of unauthorized access even if the password is stolen.
A Type 1 hypervisor (bare metal) runs directly on the hardware, offering better performance, while a Type 2 hypervisor runs on top of an existing operating system. Type 2 hypervisors tend to be easier to install.
Docker containers package applications and their dependencies into portable units that can run consistently across different environments. This ensures that the application behaves the same regardless of the host system.
Essay Format Questions
Discuss the evolution of network configuration tools in Linux, comparing and contrasting ifconfig and ip. Explain the advantages of using ip over ifconfig in modern network management.
Explain the significance of the Domain Name System (DNS) in the context of network communication. Describe the hierarchy of DNS servers and the steps involved in resolving a domain name to an IP address. What security vulnerabilities are associated with DNS?
Analyze the role of firewalls in network security and discuss the advantages and disadvantages of using UFW and IP Tables for managing firewall rules. In what scenarios might an administrator prefer one over the other?
Compare and contrast Type 1 and Type 2 hypervisors. Discuss the advantages and disadvantages of each type, providing specific examples of virtualization technologies that fall under each category. In what scenarios would you recommend each type of hypervisor?
Explain the benefits of containerization using Docker. Discuss the key Docker commands and concepts, such as Docker images, containers, and Dockerfiles. How do Docker containers improve application deployment and scalability?
Glossary of Key Terms
IP Address: A unique numerical identifier assigned to each device connected to a network, enabling communication.
Subnet Mask: A mechanism for dividing an IP address into network and host portions, defining network size.
DNS (Domain Name System): A hierarchical system that translates domain names into IP addresses.
Resolver: A DNS server that performs recursive queries to resolve domain names.
TLD (Top-Level Domain) Server: DNS servers for top-level domains like .com, .org, and .net.
Authoritative DNS Server: A DNS server that holds the definitive answer for a domain’s DNS records.
ifconfig: A legacy command-line tool for configuring network interfaces on Linux.
ip: A modern command-line tool for configuring network interfaces on Linux, part of the IP Route 2 package.
NMCLI (Network Manager Command Line Interface): A command-line tool for managing network connections in Linux.
Ping: A network utility used to test the reachability of a host.
Traceroute: A network utility used to trace the path a packet takes to a destination.
Netstat: A command-line tool for displaying network connections, routing tables, and interface statistics.
SS (Socket Statistics): A modern command-line tool that provides similar functionality to netstat.
UFW (Uncomplicated Firewall): A user-friendly interface for managing firewall rules in Linux.
IP Tables: A powerful firewall utility in Linux for configuring packet filtering rules.
AppArmor: A Linux kernel security module that allows administrators to restrict application capabilities.
MFA (Multi-Factor Authentication): A security measure that requires users to provide multiple verification factors.
GPG (GNU Privacy Guard): A tool for encrypting and decrypting data using public key cryptography.
Hypervisor: Software that creates and runs virtual machines (VMs).
Virtual Machine (VM): A software-based emulation of a physical computer.
Type 1 Hypervisor: A bare-metal hypervisor that runs directly on the hardware.
Type 2 Hypervisor: A hosted hypervisor that runs on top of an existing operating system.
KVM (Kernel-based Virtual Machine): A type 1 hypervisor integrated into the Linux kernel.
Ver: Command line tool that interacts with KVM.
VirtualBox: A popular type 2 hypervisor for running virtual machines.
Containerization: A virtualization method that isolates applications and their dependencies into portable containers.
Docker: A popular containerization platform for building, shipping, and running applications in containers.
Image (Docker): An immutable, packaged snapshot of an application and its dependencies.
Container (Docker): A running instance of a Docker image.
Libvert: A toolkit providing APIs and management tools for virtualization environments.
df: Displays disk space usage for file systems.
du: Displays disk space usage for files and directories.
Top: Displays a dynamic real-time view of running processes.
Htop: Displays a dynamic real-time view of running processes with a user-friendly, colorful interface.
Free: Displays the amount of free and used memory in the system.
Vmstat: Displays information about virtual memory, system processes, and CPU activity.
Syslog: A standard protocol for logging system events and messages.
Chroot: An operation that changes the apparent root directory for the current running process and their children.
ACL (Access Control List): A list of permissions attached to an object. It specifies which users or groups have access to the object and what operations they are allowed to perform.
Linux System Administration and Networking Fundamentals
Okay, here’s a briefing document summarizing the key concepts and ideas from the provided text, with quotes as requested.
Briefing Document: Networking and System Administration Fundamentals
This document summarizes core concepts and tools related to networking, security, and system administration within a Linux environment. The information is derived from a training series focusing on fundamental principles and practical commands.
I. Networking Fundamentals
IP Addressing: IP addresses are unique identifiers for devices on a network, enabling communication. “IP addresses are unique identifiers assigned to devices that are connected to a network. they allow you communicate with each other uh and are very important for Network management and communication.”
IPv4: The original IP addressing scheme, using 32-bit numerical labels. Limited to approximately 4.3 billion unique addresses. Each section can range “from zero and uh go all the way to 254”. The standard notation includes numbers separated by three dots, such as 192.168.1.1.
Subnet Masks: Defines the network portion and host portion of an IP address. Example: “192.168.1.1 was a subnet subnet mask of 255 2555 2555 so the first three o octets are exactly the same which means that this portion 1921 1681 this first three the numbers right here represent the network and then the last piece would be the actual host”. A subnet mask of 255.255.255.0 means the first three octets represent the network, and the last octet identifies the host.
Reserved Addresses: Two addresses within a subnet are always reserved: the network address (often .0) and the broadcast address (often .255).
DNS (Domain Name System): Translates domain names (e.g., google.com) into IP addresses. This process involves a hierarchy of DNS servers.
The user’s computer sends a DNS query to a “DNS resolver.” The resolver then contacts root DNS servers.
“The resolver will contact one of the root DNS servers and these are at the top of the DNS hierarchy so these are the actuals and the orgs and the Nets.”
Root servers direct the query to the appropriate Top-Level Domain (TLD) server (e.g., .com, .org). The TLD server then finds the IP address.
“the authoritative server is going to be at this particular location so that gets sent back to the local DNS server”.
The DNS resolver receives the IP address and provides it to the user’s computer, loading the website.
DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices on a network.
II. Network Interface Configuration
ifconfig (Interface Configuration): A command-line utility used to configure network interfaces on Unix-based systems (Linux, macOS). Allows viewing and assigning IP addresses, controlling interface states (up/down).
Despite being “deprecated supposedly,” ifconfig remains in use on some systems. The command ifconfig without arguments lists all network interfaces and their configurations.
“The simplest version of the command is to just type if config and press enter and it’ll lists all the network interfaces that are on your system along with all of the current configurations meaning the IP addresses that are assigned to them if there are any network masks or broadcast addresses and everything else that would be appropriate for that particular configuration”
ip (IP Route2): The modern replacement for ifconfig. Provides similar functionality for managing network interfaces. IP space a or IP space address displays network interfaces and details. The command ip a will produce a result very simliar to ifconfig
nmcli (NetworkManager Command-Line Interface): A command-line tool for managing network connections on Linux.
nmcli connection up <interface>/nmcli connection down <interface>: Activates or deactivates a network interface.
nmcli device status: Displays the status of network devices (connected, disconnected, unavailable).
nmcli device wifi list: Lists available Wi-Fi networks, including SSIDs, signal strength, and security type.
nmcli device wifi connect <SSID> password <password>: Connects to a Wi-Fi network.
III. Network Troubleshooting Tools
ping: Tests the reachability of a host (computer or server) by sending ICMP packets. Measures round-trip time.
“you basically ping the IP address or you ping the website and you can also measure the round trip time for the messages that are sent to that to just uh establish how strong the connection is or how quick that particular host is uh to respond to you”
The -c option specifies the number of packets to send.
The -i option sets the interval between packets.
The -f option floods the target with packets.
traceroute: Tracks the route a packet takes to reach a destination by incrementing the “time to live” (TTL) value. Helps identify delays or failures along the route.
The -m option specifies the maximum number of hops.
The -p option sets the packet size.
netstat (Network Statistics): Displays network-related information, including connections, routing tables, and interface statistics.
ss (Socket Statistics): A modern alternative to netstat, offering better performance and more detailed output. Part of the IP Route2 suite.
Options are very similar to netstat, such as displaying TCP, UDP, and listening ports
IV. Firewall Management
ufw (Uncomplicated Firewall): A user-friendly command-line interface for managing iptables firewall rules.
sudo ufw enable: Activates the firewall.
sudo ufw disable: Deactivates the firewall.
sudo ufw allow <service>: Allows traffic for a specific service (e.g., SSH).
sudo ufw deny <port>: Blocks traffic on a specific port.
sudo ufw status: Shows the current firewall status and active rules.
sudo ufw allow from <IP address> to any port <port>: Allows traffic from a specific IP address to a specific port.
sudo ufw logging on/off: Enables or disables firewall logging.
sudo ufw allow in: Allows all incoming traffic.
sudo ufw deny in: Denies all incoming traffic.
sudo ufw allow out: Allows all outgoing traffic.
sudo ufw deny out: Denies all outgoing traffic.
iptables: A more complex, low-level firewall management tool.
Uses chains (INPUT, OUTPUT, FORWARD) to define packet filtering rules.
sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE: Enables NAT masquerading, hiding internal IP addresses. “it’ll change the source IP address when it gets sent out to the world to whatever the masquerad the disguised IP address would be”.
The mangle table allows for packet alteration, such as changing the type of service.
sudo iptables -L: Lists the current rules for the filter table.
V. Security Enhancements
Chroot Jails: Creates an isolated environment for a process, limiting its access to the file system.
“effectively you’re isolating a subset of the file system and you create what’s known as the chroot jail”.
Enhances security by restricting the damage caused by untrusted programs.
Useful for testing, development, and system recovery.
Steps include creating a directory, populating it with necessary binaries and libraries, and using the chroot command.
File Permissions and Ownership: Controls access to files and directories based on user, group, and others.
chmod: Command to change file permissions. Can use symbolic notation (e.g., chmod u+rwx file.txt) or numerical notation.
chown: Command to change file ownership.
Access Control Lists (ACLs): Provides fine-grained control over file and directory permissions, allowing specific access levels for multiple users and groups.
“Access Control lists are a way to provide more more fine grained control over file and directory permissions”.
setfacl: Sets ACL entries. Options include -m (modify), -x (remove specific entry), -b (remove all entries), and -d (designate directory).
getfacl: Views ACL entries.
AppArmor: A security module that confines programs to a limited set of resources.
“AppArmor is a security module it’s actually installed natively in ubuntu it enhances the security of an application or a set of applications it works by creating these profiles that will confine the action of the application or the group of the applications you’re protecting to that profile”.
Modes: Enforce (blocks unauthorized access) and Complain (allows access but logs it).
GPG (GNU Privacy Guard): A versatile tool for securing files and communications using public and private key pairs.
“it’s a very versatile tool for securing files and Communications using public and private key pairs”.
Commands include:
gpg –gen-key: Generates a new key pair.
gpg -e -r <recipient> <filename>: Encrypts a file for a specific recipient.
gpg -d <filename.gpg>: Decrypts a file.
gpg –import <public_key_file>: Imports a public key into the key ring.
gpg –export -a <user_id> > <public_key_file>: Exports a public key to a file.
gpg –list-keys: Lists the keys in the key ring.
SCP (Secure Copy Protocol): Securely copies files between systems. Uses SSH for encryption.
“securely copies files between a local and a remote machine or between two remote machines”
scp <source> <destination>: Copies files.
VII. System Monitoring and Troubleshooting
Log Files: Crucial for system administration and troubleshooting. Located in the /var/log directory.
syslog (Debian-based): General system log.
messages (Red Hat-based): General system log.
auth.log: Authentication events.
secure (Red Hat-based): Security-related events.
dmesg: Kernel-related messages.
Use tail -f <logfile> to monitor logs in real-time.
Disk Usage Analysis and Cleanup:df: Displays information about available and used disk space. The -h option provides human-readable output.
du: Estimates and displays disk space used by files and directories. The -sh option provides a summary in human-readable format.
Process Monitoring:top: Displays a dynamic real-time view of running processes. Allows sorting by CPU usage or memory usage.
htop: An enhanced version of top with a more user-friendly interface.
Memory Management:free: Displays the amount of free and used memory in the system.
“provides human readable output which essentially gives you the measurements in what it thinks are the best measurement”.
watch -n 1 free -h: Monitors memory usage in real-time.
System Statistics:vmstat: Reports virtual memory statistics, including memory usage, CPU performance, and I/O operations.
VIII. Virtualization and Cloud Computing
Virtualization: Enables running multiple virtual machines on a single physical machine.
“Virtual machines are basically simulations of physical computers”.
Hypervisors: Software or firmware that creates and manages virtual machines.
Type 1 (Bare-Metal): Runs directly on the hardware. Examples: VMware ESXi, Microsoft Hyper-V, Xen.
Type 2 (Hosted): Runs on top of an existing operating system. Examples: VirtualBox, VMware Workstation.
KVM (Kernel-based Virtual Machine): A type 1 hypervisor integrated into the Linux kernel.
virsh: Command-line tool for managing KVM virtual machines.
virsh start <VM name>: Starts a virtual machine.
virsh list –all: Lists all virtual machines.
virsh shutdown <VM name>: Shut down a virtual machine.
VirtualBox: A popular type 2 hypervisor.
“commonly used for testing and deploying environments”.
vboxmanage: Command-line interface for managing VirtualBox VMs.
vboxmanage startvm <VM name>: Starts a virtual machine.
vboxmanage list vms: Lists all virtual machines.
vboxmanage controlvm <VM name> poweroff: Powers off a virtual machine.
Containers (Docker): Package applications and their dependencies into portable containers.
docker: Containerization tool.
docker run <image>: Runs a container.
docker ps: Lists running containers.
docker stop <container_id>: Stops a container.
docker rm <container_id>: Removes a container.
Cloud Computing: Provides on-demand access to computing resources (servers, storage, databases, etc.) over the internet. Types: IaaS, PaaS, SaaS.
“IaaS is one version of what they would provide for you which is access to the infrastructure that you would otherwise maintain if you weren’t using the cloud”.
“PaaS would be the service to develop all the platforms”.
“SaaS which is software as a service that we’re going to provide this software or an email or anything like that on demand”.
I hope this is helpful! Let me know if you’d like me to elaborate on any of these points.
Networking Fundamentals and Security: FAQ
FAQ on Networking Fundamentals and Security
1. What is an IP address, and why is it important?
An IP (Internet Protocol) address is a unique numerical identifier assigned to every device connected to a network. It enables devices to communicate with each other and is crucial for network management and communication. IPv4, the original version, uses a 32-bit numerical label format (e.g., 192.168.1.1), while IPv6 was developed to address the limitations of IPv4’s address space.
2. What is a subnet mask, and how does it relate to IP addressing?
A subnet mask is used to divide an IP address into network and host portions. For example, a subnet mask of 255.255.255.0 indicates that the first three octets of the IP address represent the network, while the last octet identifies the host within that network. Different subnet masks allow for varying numbers of hosts within a network. Two addresses are reserved in each subnet for the network address (usually the first address) and the broadcast address (usually the last address).
3. What is DNS, and how does it work to resolve domain names to IP addresses?
DNS (Domain Name System) is a hierarchical system that translates human-readable domain names (like google.com) into IP addresses that computers use to communicate. When you type a domain name into your browser, your computer sends a query to a DNS resolver, which may then contact root DNS servers, top-level domain (TLD) servers (like .com or .org), and authoritative DNS servers to find the corresponding IP address. This process, although complex, happens very quickly in the background.
4. What are ifconfig and ip, and how are they used to manage network interfaces?
ifconfig (interface configuration) is a command-line utility used to configure network interfaces on Unix-based operating systems. It allows you to view interface configurations, assign IP addresses, and control the state of interfaces. The ip command, part of the iproute2 package, is intended as a modern replacement for ifconfig, offering similar functionalities with a different command syntax. Examples of using the ip command are ip a or ip addr.
5. How can nmcli be used to manage network connections in Linux?
nmcli (NetworkManager Command Line Interface) provides a powerful command-line interface for managing network connections on Linux systems. It allows you to view and modify connections, assign static IP addresses, control connection states (up/down), and manage Wi-Fi networks. For instance, you can use nmcli device wifi list to see available Wi-Fi networks and nmcli connection up <connection_name> to activate a connection.
6. How do the ping and traceroute commands help in troubleshooting network connectivity issues?
ping tests the reachability of a host by sending ICMP packets and measuring the round-trip time. It can help determine if a host is online and how reliable the connection is.
traceroute tracks the route packets take to reach a destination, identifying the intermediate routers and delays along the path. This helps pinpoint where connectivity issues or delays occur.
7. What are firewalls, and how do tools like ufw and iptables contribute to network security?
Firewalls act as a barrier between a network and the outside world, controlling incoming and outgoing traffic based on configured rules. * ufw (Uncomplicated Firewall) is a user-friendly front-end for managing iptables rules, making it easier to set up basic firewall configurations. Examples include sudo ufw allow SSH and sudo ufw deny 80. * iptables is a more complex command-line tool that provides direct control over the Linux kernel’s packet filtering capabilities. It allows for highly customized firewall rules.
8. What is a chroot jail, and how does it enhance system security?
A chroot jail is an isolated environment created by changing the root directory for a process and its children. This limits the access of that process to a specific subset of the file system, enhancing security by preventing compromised programs from accessing or modifying files outside the jail. It’s useful for testing software in a controlled environment or repairing a system from a rescue environment.
Network Security: UFW, IP Tables, SELinux, and Best Practices
Network security is crucial, requiring firewalls to act as barriers between internal and external networks by monitoring and controlling traffic based on established rules. Important tools for network security include Uncomplicated Firewall (UFW) and IP tables.
Uncomplicated Firewall (UFW)
It is a simple but powerful firewall with an easy syntax.
To activate, use the command sudo ufw enable.
Traffic can be allowed or denied by specifying incoming or outgoing along with the port. For example, sudo ufw allow in port 22 allows incoming traffic on port 22 (SSH), while sudo ufw deny out port 80 denies outgoing HTTP traffic on port 80.
To check the status and active rules, use ufw status.
Traffic can be allowed from specific IP addresses using ufw allow from [IP address] to any port 22.
IP Tables
It is a more complex tool that allows detailed control over the network and enables creation of complex rules for packet filtering and network address translation.
To view current rules, use sudo IP tables -L. The default table is the filter table, displaying input, forward, and output chains.
To add a rule, the command is IP tables -A INPUT -p tcp -dport 22 -j ACCEPT to allow TCP traffic on destination port 22. To block traffic, use IP tables -A INPUT -p tcp -dport 80 -j DROP.
To save rules, use iptables-save > /etc/iptables/rules.v4. To restore rules, use iptables-restore < /etc/iptables/rules.v4.
SELinux (Security-Enhanced Linux) is a security module in the kernel that provides access control policies. SELinux defines rules for processes and users accessing resources, enforcing strict policies. Its modes of operation include enforcing (blocks violations), permissive (logs violations), and disabled. Common commands include SE status to view the status and setenforce 1 to enable enforcing mode, or setenforce 0 for permissive mode.
App Armor is another security mechanism that uses application-specific profiles for access control. Commands include aa-status to get the status of App Armor, and aa-enforce to enforce a profile for a specific application.
Additional points on network security:
Changing the default SSH port (Port 22) can reduce the risk of automated brute force attacks. This is done in the sshd configuration file.
Disabling root login forces attackers to log in as standard users and escalate privileges. This is configured in the sshd configuration file by setting permit root login no.
Limiting SSH users involves whitelisting specific users who can log in via SSH by using the allow users parameter. The SSH service must be restarted to apply configuration changes.
GPG (GNU Privacy Guard) is used for encrypting data. It uses asymmetric encryption with public and private key pairs.
Secure file transfer can be achieved with SCP (secure file copy) or SFTP (secure file transfer protocol). SCP securely copies files between hosts.
Analyzing authentication logs can reveal unauthorized access attempts. Key log files include auth.log and secure log.
rsync can be used to back up data, including syncing over SSH for secure transfers.
Linux File Permissions and Access Control
File permissions are essential for system security, dictating who can access and modify files and directories. Understanding and managing these permissions ensures that sensitive data remains protected and that only authorized users can make changes.
Levels of File Permissions
Categories: Permissions are assigned based on three categories: the owner (a specific user), the group, and others.
Permissions: Each category has three types of permissions: read (r), write , and execute (x). Read permission allows users to view the file’s contents, write permission allows modification, and execute permission allows running a file or entering a directory.
Numerical Values: Each permission has a numerical value: read is 4, write is 2, and execute is 1. These values are combined to represent the total permissions for each category. For example, read and execute (4+1) would be 5.
Commands to Change Permissions
chmod (Change Mode): This command is used to change the permissions of a file or directory. It can be used in two ways:
Symbolic Mode: Uses symbols like r, w, and x to add or remove permissions. For example, chmod u+rwx,g+rx,o+rx file.txt gives the owner read, write, and execute permissions, and the group and others read and execute permissions.
Numerical Mode: Uses numerical values to set permissions. For example, chmod 755 file.txt gives the owner read, write, and execute permissions (7), and the group and others read and execute permissions (5 each).
chown (Change Owner): This command changes the ownership of a file or directory. For example, chown user:group file.txt changes the owner to “user” and the group to “group”.
chgrp (Change Group): This command changes the group ownership of a file or directory. For example, chgrp group file.txt changes the group owner to “group”.
Access Control Lists (ACLs)
ACLs provide a more fine-grained control over file and directory permissions, allowing definition of permissions for multiple users and groups on a single file or directory.
Entries: Each ACL entry specifies permissions for a user or group, consisting of the type (user or group), an identifier (username or group name), and the permissions.
Types of ACLs:User ACL: Specifies permissions for a specific user.
Group ACL: Specifies permissions for a specific group.
Mask ACL: Defines the maximum effective permissions for users and groups other than the owner.
Default ACL: Specifies the default permissions inherited by new files and directories created within a directory.
Commands:setfacl (Set File ACL): Sets the ACL for a file or directory. For example, setfacl -m u:user:rwx file.txt adds read, write, and execute permissions for the user “user” on “file.txt”.
getfacl (Get File ACL): Displays the ACL entries for a specified file, showing all users and groups with their defined permissions.
Removing ACL Entries
-x option: Removes a specific user or group entry from the ACL. For example, setfacl -x u:user file.txt removes the ACL entry for the user “user”.
-b option: Removes all ACL entries from a file or directory. For directories, the -d option is used in conjunction with -b to remove default ACL entries.
By understanding and utilizing these commands, file permissions and access control lists (ACLs) can be effectively managed to maintain a secure and well-organized Linux system.
User Authentication Methods: Password, MFA, and Public Key
User authentication involves methods to verify the identity of a user trying to access a system or application. Common methods include password-based authentication, multi-factor authentication (MFA), and public key authentication.
Password-Based Authentication
This is the default method where users enter a username and password to gain access.
To improve security, password-based authentication can be enhanced with Multi-Factor Authentication (MFA).
Multi-Factor Authentication (MFA)
MFA adds an extra layer of security by requiring users to provide multiple verification factors.
This often includes sending a code to a user’s phone or email, or using biometric methods like fingerprint or face scans.
MFA reduces the risk of unauthorized access, even if an attacker obtains the user’s password.
Public Key Authentication
This method uses a key pair consisting of a private key and a public key.
The private key is kept secret by the user, while the public key is placed on the server.
Public key authentication is more secure than password-based authentication and is not subject to brute force attacks.
It allows for automated, passwordless logins, which are useful for scripts and applications.
To generate a key pair, the command SSH key gen is used.
After running SSH key gen, a file path to save the key is required, and a passphrase can be set for additional security.
Key Transfer and Authentication
To enable passwordless access, the public key must be transferred to the authorized Keys file on the server.
The user must authenticate themselves with a password at some point before transferring the key.
Without initial password authentication, the system will not trust the user to transfer the key.
System Monitoring with top, htop, free, and vmstat
System monitoring is crucial for maintaining system performance and troubleshooting issues. Key tools for this purpose include top, htop, free, and vmstat.
**top**
Provides a dynamic, real-time view of running processes and their resource usage.
Displays CPU usage, memory usage, and process IDs (PIDs).
To sort by CPU usage, press P while top is running.
To sort by memory usage, press M.
To quit, press Q.
**htop**
It is a user-friendly alternative to top with enhanced features and an intuitive interface.
Offers interactive process management and color-coded output.
Can use function keys (F1-F12) or keyboard shortcuts for navigation.
F3 key can be used to search for processes.
F9 key can be used to kill a process.
To quit, press Q or F10.
**free**
Displays information about the system’s memory usage, including physical memory and swap space.
The command free -h formats the output in a human-readable format (KB, MB, GB).
Shows the total, used, free, shared, buffer, and cached memory.
To monitor memory usage in real-time, use watch -n 1 free -h.
Detailed memory information can be obtained from the /proc/meminfo file.
**vmstat**
Virtual memory statistics (vmstat) monitors system performance, providing statistics on CPU, memory, and I/O operations.
The basic command is vmstat 1 5, where the first number is the update interval in seconds, and the second is the number of iterations.
Key fields in the output include processes (runnable and blocked), memory (swap, free, buffer, cache), swap (in and out), I/O (blocks received and sent), system (interrupts and context switches), and CPU usage (user, system, idle, wait, stolen).
The st field refers to the CPU steal time, which is the percentage of time a virtual CPU is waiting for resources because the hypervisor is allocating resources to another VM.
Running vmstat 1 updates data every second until interrupted, while vmstat provides a single snapshot.
These tools provide different perspectives and can be used together to get a comprehensive understanding of system performance.
Virtualization, Cloud Computing, and Containerization Technologies Overview
Virtualization is a technology that allows multiple virtual machines to run on a single physical machine, improving resource use and providing isolated environments. Key concepts include virtual machines and hypervisors.
Virtual Machines (VMs)
VMs are software-based simulations of physical computers, each running its own operating system and applications independently of others on the same physical host.
VMs offer isolation, so a failure in one VM does not affect others.
Hypervisors
A hypervisor is software or firmware that creates, manages, and deploys virtual machines, allocating resources to each.
There are two types of hypervisors:
Type 1 (Bare Metal): Runs directly on the physical hardware without needing a host operating system, common in enterprise environments for high performance. Examples include VMware ESXi, Microsoft Hyper-V, and Xen.
Type 2 (Hosted): Runs on top of an existing operating system. It uses the host’s resources and is suited for desktop virtualization and smaller environments. Examples include VirtualBox, VMware Workstation, and Parallels Desktop.
Advantages of Virtualization:
Resource Efficiency and Scalability: Virtualization allows efficient use of physical resources and easy scaling up or down based on needs.
Isolation and Security: Each VM operates independently, isolating it from other VMs on the network. A compromised VM does not affect the rest of the network.
Flexibility and Agility: Enables easy testing, deployment, and development in isolated environments. New virtual machines can be quickly deployed.
Disaster Recovery: Simplifies backups and recovery by storing entire virtualized environments that can be easily accessed and restored, especially with redundancies in place.
Kernel-Based Virtual Machine (KVM)
KVM is a type 1 hypervisor integrated into the Linux kernel, transforming the OS into a virtualization host.
It leverages Linux features for memory management, process scheduling, and I/O handling.
KVM supports hardware-assisted virtualization via Intel VT or AMD-V technology.
The virsh command-line tool manages KVM-based VMs. Common virsh commands include virsh start to start a VM, virsh list to list running VMs, and virsh shutdown to shut down a VM.
VirtualBox
VirtualBox is a type 2 hypervisor developed by Oracle, compatible with various operating systems like Linux, Windows, and macOS.
It offers an easy-to-use GUI and command-line interface for managing VMs.
Key features include snapshot functionality for backups and guest additions to enhance performance.
VBoxManage is the command-line interface for VirtualBox, with commands like VBoxManage startvm to start a VM, VBoxManage list vms to list VMs, and VBoxManage controlvm to control VMs.
Cloud Computing Cloud computing provides on-demand access to computing resources over the Internet, including servers, storage, databases, and software. It allows users to provision and manage these resources easily.
Cloud Service Models:
Infrastructure as a Service (IaaS): Provides virtualized hardware resources like virtual machines, storage, and networks. Users deploy and manage operating systems, applications, and development environments. Examples include AWS EC2, Microsoft Azure Virtual Machines, and Google Compute Engine.
Platform as a Service (PaaS): Offers a development and deployment environment in the cloud, including tools and services to build, test, deploy, and manage applications without managing the underlying infrastructure. Examples include AWS Elastic Beanstalk, Google App Engine, and Microsoft Azure App Service.
Software as a Service (SaaS): Delivers applications over the Internet on a subscription basis. Users access these applications via a web browser without needing to install or maintain anything. Examples include Microsoft Office 365, Google Workspace, and Salesforce.
Advantages of Cloud Computing:
Scalability: Easily scale resources up or down based on demand.
Cost Efficiency: Reduces upfront costs by eliminating the need for physical hardware.
Flexibility and Accessibility: Access services from anywhere with an internet connection.
Reliability and Availability: Redundant locations ensure high availability and reliability.
Disaster Recovery: Scheduled backups prevent data loss.
Automatic Updates: Services are automatically updated without user intervention.
Major Cloud Providers:
Amazon Web Services (AWS): Offers a wide range of services, including computing power, storage, and networking.
Microsoft Azure: Provides seamless integration with Microsoft products and a variety of cloud services.
Google Cloud: Known for capabilities in data analytics and machine learning, with a robust set of cloud services.
Containerization Containerization involves packaging applications and their dependencies into portable containers that run consistently across different environments. Docker is a popular containerization tool.
Containers vs. Virtual Machines:
Containers share the host operating system’s kernel, making them lightweight and fast to start.
They include everything needed to run the application (code, runtime, etc.) but do not include an OS.
Virtual machines, in contrast, run on a hypervisor and include a full operating system.
Docker containers run on anything supporting Docker, ensuring consistency across development, testing, and production environments.
Benefits of Containers:
Efficiency: Lightweight and use fewer resources.
Scalability: Easily scale up or down based on demand.
Portability: Can be transferred and run on various operating systems.
Isolation: Multiple applications can run on the same host without interfering with each other.
Basic Docker Commands:
docker run -it <image_name>: Runs a container image interactively.
docker ps: Lists running containers.
docker stop <container_id>: Stops a running container.
docker pull <image_name>: Downloads a Docker image from Docker Hub.
Container Orchestration Container orchestration tools automate the deployment, scaling, and management of containerized applications.
Kubernetes (K8s): An open-source platform for automating deployment, scaling, and management of containerized applications. Key features include automated deployment and scaling, load balancing, self-healing, and secure management of sensitive information.
Example commands: kubectl create deployment nginx –image=nginx to create a deployment and kubectl scale deployment nginx –replicas=3 to scale the deployment.
Docker Swarm: Docker’s native clustering and orchestration tool, simpler than Kubernetes. It offers simplified setup, scaling, load balancing, and secure communication between nodes.
Example commands: docker swarm init to initialize swarm, docker service create –name web –replicas=3 -p 80:80 nginx to create a service, and docker service ls to list services.
Virtual Machine Management (libvirt)
Libvirt is a toolkit with an API for interacting with VMs across different virtualization platforms like KVM, Xen, and VMware.
It provides a unified API for managing VMs across different hypervisors, simplifying VM management.
Key features include virsh for management and virt-install for creating new VMs.
virsh list –all: Lists all VMs managed by libvirt.
Full Linux+ (XK0-005 – 2024) Course Pt.2 | Linux+ Training
The Original Text
this training series is sponsored by hackaholic Anonymous to get the supporting materials for this series like the 900 page slideshow the 200 Page notes document and all of the pre-made shell scripts consider joining the agent tier of hackolo anonymous you’ll also get monthly python automations exclusive content and direct access to me via Discord join hack alic Anonymous today okay now it is time to talk about networking and the fundamentals of networking again this is not going to be a replacement for Network Plus or anything like that but it will be fairly comprehensive and we’re going to go through a lot of the fundamentals as well as some of the commands and tools that you will need to uh navigate the network and the network connections and the interfaces of a Linux environment so first and foremost let’s go into some basic networking Concepts IP addressing so IP addresses are unique identifiers assigned to devices that are connected to a network they allow you communicate with each other uh and are very important for Network management and communication uh so anything when you hear something like a network or anytime that you hear the word network uh think IP addresses and uh IP addresses are very much the main uh the I mean address the main identifiers that uh are assigned through various devices so your TV has an IP address your phone will have an IP address address your computer obviously will have an IP address um anything that’s connected to a network anything that’s connected to the internet will have an IP address ipv4 is the original IP address and it’s a 32bit numerical label uh what you see right here in the green right here that’s traditionally what it looks like it’s separated by three dots and it has three digits or it can have up to three digits on each portion of this thing and it can go from uh one actually Zer it can go from zero and uh go all the way to 254 I want to say um we’ll verify that in a couple of slides uh so what it does is it provides approximately 4.3 billion unique addresses but then what happened is that a lot of devices were developed so you know the average household has or the average person even has multiple uh devices that are connected to the internet and quickly uh way faster than I think people anticipated uh the ipv four addresses ran out um but what happens is that each a uh ISP each internet service provider assigns a series of private IP addresses to each individual person and uh for the most part you will not run across a a duplicate IP address although being that there’s only 4.3 billion unique variations uh it can run across so it can actually have duplicates and that’s one of the issues that resulted in them developing IPv6 so uh ipv4 is the most commonly used version of Ip but because of the fact that there were so many devices they developed a new uh IPv6 format and the IPv6 format looks very different from what we saw previously it is 128bit whereas ipv4 is 32bit so when you have a 128bit identifier it obviously looks a little bit different so in this particular case this is a s Le of an IPv6 address and instead of offering the billions this actually offers 340 unilan addresses and I don’t I I had not even heard of this word prior to looking at IPv6 IP addresses um clearly it is way more than what is available with ipv4 so it’s designed to replace ipv4 eventually but your current computer my current computer uh they have both of these so they’ll actually have the ipv4 as well as the IPv6 But ultimately at some point not exactly sure when IPv6 will replace ipv4 IP addresses to understand networking and IP addresses you also need to understand subnetting so what a subnet is and subnetting is a method that’s used to divide a larger Network into smaller chunks so that they’re easier to manage um and those small chunks are called subnet and it improves the network organization uh the efficiency of the network and the security of the network it also helps to reduce the congestion of the network meaning that there won’t be uh too many things happening at the same time it won’t be blocked off or clogged so to speak um a subnet mask is what you can see as an example in this particular case in the green right here so subnet mask determine the network and the host portions of the IP address so for ipv4 a common one is what you see here now the network portion are these first series of 255s and then the host portion would be this very last thing that is represented by a zero here so in this particular case we have three octets that represent the network portion so that’s one octet that’s another octet that’s another octet Al together you have four octets and four time octet so octet repres repr is8 bits right so when you have 4 * 8 you have a total of 32 so this is a total of 32 bits now when you have the first three octets that are represented by the network that means that these are the network itself so in uh in this particular Network these three portions are going to look exactly the same and each device is going to have a different number at the very end of it so the first three portions will be exactly the same because that’ll be that Network work that they’re connected to and then that last bit is what’s going to change that last octet is what’s going to change to assign an unique identifier for each one of those devices so for example in this particular case we have you know 1 192 16811 was a subnet subnet mask of 255 2555 2555 so the first three o octets are exactly the same which means that this portion 1921 1681 this first three the numbers right here represent the network and then the last piece would be the actual host and then if there’s three hosts that presumably it would be one 2 and three so 1 1921 16811 1 1921 16812 1 1921 16813 so on and so forth so this is the uh subnet that is represented with this mask right here we have this subnet mask now if we wanted to expand this this is what it actually looks like right here so the binary representation is we have eight ones here8 ones here 8 ones here and then we have the zeros at the end representing the portion that can change and this is the subnet mask right here uh the network bits in this case are 24 so you have 8 * 3 which would be 24 the host bits would be eight this last eight uh octet or this eight bits right here the calculation it’s a little bit complicated but not really so you have the number of the hosts per subnet which would be two to the power of the number of host bits so the number of host bits in this case would be eight so 2 to the power of 8 is what we see here minus 2 and I’ll explain what this means right here but 2 to the^ of 8 minus 2 would be 256 so 2 to ^ of 8 would be 256 minus 2 which ends up being 254 so this particular subnet can have 254 individual IP addresses okay so 254 hosts can reside on this particular subnet mask that’s how it breaks down now we look at the next sample of this where you have a subnet mask that actually has the first two octets reserved for the network and then you have the next two octets reserved for the host so you have 16 bits this portion 2 * 8 is 16 bits you have these 16 bits reserved for the network and then you have these 16 bits reserved for the host and when we actually do the calculation here it would be 2 to the^ of 16 which is 65,536 65,536 potential host except you have to subtract that two so it ends up being 65534 so very different from this 254 that is on this one octet right here if you just free up two of these octets for this particular particular subnet mask you now have 65,535 potential host IP addresses that you can assign to people inside of this particular subnet or this particular Network right so this is what it looks like now why do we subtract two this is a very important question so there are two addresses that we need to reserve for any given Network and the first one is the network address so the first address in the subnet which is reserved for the network itself which ends up being represented by just it could be the zero right for example and then the next one is the broadcast address which is the last address that’s represented in the network which would be technically the 256 for example or 255 excuse me so the zero and then the 255 for example would be the ones that are reserved so you actually can go up to 254 right so it go from 1 to 254 for as an example but for the most part and you can assign this when you’re actually assigning your gateways and you’re uh developing your network subnet and The Mask itself you will assign your network address and then you will assign your broadcast address and then that will take up two of those variations and then the remaining uh 253 of the variations will allow for the rest of the devices the rest of the hosts that can reside on that subnet so as a summary we can have have this subnet that allows for 254 potential hosts to reside on it and then you can have this subnet that can allow for 65,535 potential hosts so uh this would obviously be a company this would be probably a home or a company that has less than 254 devices and being that each employee might get let’s say I don’t know their cell phone would be one their work cell phone would be another one their computer would be one maybe an IP address or iPad or something like that a tablet that would be one their TVs that would be uh if they have any Smart TVs sprinkled around the office so on and so forth so for the most part you’re going to have maybe around 50 employees that can reside in a network that like that looks like this but anything more than that they would have a larger subnet because there’s just multiple devices per employee per person and so you just need more than 254 potential addresses and this is how subnet masks and the calculations of those hosts work when a device connects to a network it is assigned an IP address this address can either be ipv4 IPv6 depending on the Network’s configuration subnetting helps organize the network by breaking it into smaller segments making it easier to manage and enhance security by isolating different parts of the network from each other so this is the whole purpose behind it number one to make it easier to manage and enhance the security by isolating different parts of the network from each other so uh when you have multiple subnets it makes it easier for you to find out which host was uh for example uh exploited and which host was hacked into and because they reside in their own little segment they won’t affect the rest of your network and it can be contained uh within that specific segment it can be isolated within that segment the domain name system is the next level up when it comes down to addressing so it’s basically the phone book of the internet typically domain names are related to actual websites but each website actually has an IP address as well so what happens is that most people aren’t going to remember the IP address for the website so you the IP address for Google for example is whatever the series of numbers are but you’re not going to remember that but you will remember Google so you can remember example.com in this case but example.com actually is pointing to an actual IP address right so even websites have IP addresses web servers web applications all of these things actually have IP addresses if they are connected to the internet but for the most part people aren’t going to remember the IP address most people aren’t that good with numbers but they are fairly good with names everybody can remember facebook.com they won’t remember the Facebook IP address but they’ll remember the version of that IP address which would be their domain name and so the do domain name will go through the DNS uh Port as well as the domain name system protocol right and so this is how IP addresses get translated into domain names now how DNS works is that when you type something into your browser the computer needs to find the IP address that’s connected to that actual name the domain name so because they’re most uh easier for us to remember and we enter that the computer how works with the individual IP addresses so it needs to resolve that domain name to some kind of an IP address so what it does is that it’ll send out a query right so it’ll looks like this right you will put your uh input as the user you’ll enter a domain name and that’ll be example.com and you’ll put that into the browser you press enter and then the resolver of the DNS in the computer sends a query right the computer will send send the query to the DNS resolver the resolver is typically provided by the ISP the internet service provider and then the if the resolver doesn’t actually have that in its cache so if you don’t have it stored in your cache or if the ISP doesn’t have it stored in its cache then it performs an actual lookup and it finds it for you and then it stores it right so it’ll query multiple DNS servers to find the correct IP address and then once it finds that IP address address it will resolve it and it’ll connect that IP address to the domain name so that the next time that you go and enter that name it’ll just load it for you quickly if you clear your cache then it’ll perform that process all over again the next time that it goes through the search for the DNS resolver right so you enter something the computer will send that query to the DNS resolver that’s typically with the internet service provider so AT&T for example it’ll send it to AT&T’s DNS resolver and the AT&T’s DNS resolver will go through its database of all of the IP addresses that are connected to domain names and if it has it in there it’ll just send it and uh it’ll send you to the website that you’re trying to go to if it doesn’t have it it does a recursive look up and it try to find what that IP address is connected to or what that domain name is connected to and then it’ll load that IP address onto your browser all of this happens in a matter of a second or two depending on how fast your internet services so all of these things happen very very quickly um and you don’t really see them in the foreground all you see is you typed in the IP address you pressed enter a second or two later a website loads but this is what’s happening in the background the DNS server hierarchy um is connected via the uh the resolver itself so the resolver will contact one of the root DNS servers and these are at the top of the DNS hierarchy so these are the actuals and the orgs and the Nets so these servers are at the top of the DNS hierarchy and they direct the query that DNS query that you made to the appropriate top level domain server which would be any of these guys so if it’s a website it’ll go to that domain server and then from that list of domain names it’ll find the IP address if it’s a.org it’ll go to that server and from that list will pull whatever it is right so there are individual uh servers typically because the fact that there are literally probably billions of domain names at this point as well so there’s a bunch of different dos. org.net now there’s doco and. us. coffee there’s a bunch of different top level domain names now so because of the fact that there is so many different variations each one of them are going to have their own server and then when you send that query that query is going to go to the appropriate server so that it can find the domain names and this is mainly to make the process a little bit faster if they were housing doc.org domnet and every other top level domain name if they were housing all of those things on one server at AT&T it would probably take a much longer amount of time for that domain name to be pulled up and for that IP address to be found so the TLD DNS server um once they’re contacted if you’re looking for example.com it would find the cont I already explained all this so I’m just going to I’m just going to Breeze through this particular portion I got a little bit ahead of myself but again so so if you’re looking for the com it’ll go to the contact of theom TLD server and it it’ll direct the query to that specific authoritative dnf server to get you example.com the authoritative DNS server which is the final step of this whole thing is the one for this particular example for example.com these servers um host the actual domain name itself and then they have the actual DNS records that map that to the IP address and then that’s where the data gets pulled so it goes from the the top level server the TLD server it’ll find that and then from there It’ll point to the authoritative DNS server that’s actually hosting that domain name and that could be at AWS it could be at GoDaddy or a variety of different hosting providers um once it is found and once the data has been pulled it returns that to you right it sends it back to your computer and then it just uh populates it onto your browser so that you can actually look at whatever you want want to look at and watch the video or watch Netflix or all these things so all of this stuff is happening so that you can get access to the data that you want to get access to so to give you a visual representation of everything that we just talked about typically these things are a little bit easier when you look at kind of the flow of it like this right so on your computer you would look for self-repair apple.com so selfrepairing which would be uh either the cache that you have on your computer the cache and host file that you can see on the left right here or it’ll be with your ISP right so if that doesn’t exist uh if you don’t have it if you haven’t checked it then what’s going to happen is that this local DNS server is going to send that question out it’s going to send that query out and it’s going to say where is this place where is this location what’s the IP address of this place and it’ll go to the root server and in the root server says I have no idea try the authoritative server for the people right for all the dot domain names and the authoritative server is going to be at this particular location so that gets sent back to the local DNS server local DNS is like all right fine you don’t know so I’ll go to this guy and this would be the Doom top level domain authoritative DNS server so it’ll go to those guys and it’ll say hey where is this thing and they’re like I have no idea why don’t you try apple right why don’t you try the actual Apple server so that you can find out what the the self-repair apple.com location for that IP address is so that would be the TLD authoritative servers response and then that comes back and then the local DNS is like okay fine let’s go to Apple so you and every single time you see that this one this one says I don’t know why don’t you look for the dot server that’s hosted at this IP address and then this is like oh okay so let me go to that IP address and they go and then this is the top level domain authoritative server and then this thing sends a respon back I have no idea why don’t you go to this IP address which belongs to Apple and he’s like oh okay fine and it’ll come back and it’ll be like hey Apple where is this particular thing and then Apple says I don’t know why don’t you try the authoritative server for repair. apple.com so now there’s the extra piece that comes in for this and then it says that is housed over here and then finally it sends it over here and it says okay fine hey where is this thing and then this says oh no problem there is no self-re there is no self-d out repair that awful and it’ll send it back and then the website says okay there is nothing and this is where like you probably will get an error or something on the screen that doesn’t load it now if there is something like that then what will happen is that it’ll say oh this is the IP address for it and then it’ll send it to the DNS server and the DNS server will send it to your computer and it’ll load it for you right that’s the process right here this I just think that this is so funny that it send this like it send this on this wild goose chase and you go back and forth and then you’re like oh there is nothing here and it’s like oh Jesus um and so uh presumably right so if this uh particular location was not self. repair. apple.com if it was I don’t know repair. apple.com is it would stop at this portion right it would stop at this place and it would be like yeah okay here’s the IP address for repair. apple.com if we were just trying to go to apple.com and you send it Hey where’s apple.com and it’ll say I don’t know why don’t you try a doom server and you’ll come to theom TLD authoritative server and you say Hey where’s apple.com it’ll be like here’s the IP address for apple.com right so it depends on how deep we’re trying to go with this inquiry that we’re making and where we’re trying to land obviously but it goes from your local DNS server it’ll go to the root server the root server will send you to theom tldd server that place will send you to the potential authoritative server for that actual domain name for that actual website right and this is the process of literally everything that we just talked about with this whole DNS part so just to give you that explanation we have the DNS servers which are the specialized servers that are responsible for handling the process of translating a name to an IP address and there are different types of server so you have the DNS resolver that we just talked about which is the recursive resolver and it receives the original query from your computer so that was that thing in the bottom left corner it receives that thing from your computer and it handles the process of contacting everybody else to find that for you and then finally it’ll send you if it finds it it’ll send you to the page that you were looking for from that the DNS resolver from that location it’ll go to the root DNS server which was the thing in the top right and then it’ll say this is the first stop and this is what we’re looking for why don’t you go to the appropriate TLD server which might be.com or might be.org or whatever and then that will go to the actual or.org or.net whatever that top level domain server and then from there it’ll redirect you if it has the address it’ll redirect you if it doesn’t it’ll send you to the authoritative DNS server that will find help you find the other thing but typically this is where it stops so it’ll go from the TLD DNS server and then it’ll say okay go this is the Doom location for the authoritative DNS that you’re looking for and then you can go to this particular place place and these are the servers the authoritative DNS servers are the ones that actually store the records for domain names and provide the final IP address in response to what you’re looking for in that particular case we were trying to go to store.apple.com and then we were trying to go to repair. store so that went a little bit further but typically this is where it stops you’ll go from T the TLD server which is like it’s a.org website oh okay I want to go to.org website it’ll send you to that particular authoritative server and then that.org server will say oh okay this is the address for this particular website that you’re looking for it makes it a lot easier so instead of you having to remember IP addresses you just remember a name that’s it that’s kind of one of the biggest benefits of uh DNS right once you get past the user friendliness it becomes scalable so if you wanted to look at all of the freaking devices that are on the internet and the domain names that are on the internet and the IP address that are connected to these domain names on the internet and you want to expand that then you’re looking at scalability so DNS supports all of the massive number and it’s constantly growing so it supports the growing number of devices that people keep buying and they’ll add another TV to their house and all of the domain names that people keep buying so it supports that scalability right that the massive number that keeps growing and gets bigger and then when you’re considering the amount of of queries that are being made to the Internet so imagine how many billions of queries are being made right now as you’re watching this how many millions and billions of people are trying to access millions and billions of locations across the internet when you consider the massive amount of traffic that’s just going back and forth as you’re watching this right now across the internet you need to also consider well these things can’t crash right there needs to be some kind of a a redundancy means there’s a backup server for Microsoft for example so if there initial server there’s some kind of earthquake at the first server’s location and that particular building has a power outage there needs to be a backup server that kicks in immediately so that microsoft.com doesn’t crash and you can still go and access that website that was actually something that happened relatively recently where the Microsoft service um and all of the computers and all the devices that r Li on Microsoft couldn’t work and this was like a couple of months ago it was pretty recent that that actually happened and in that day Microsoft lost over I think $150 million something like this some crazy number that they lost during that one day that they had an outage so this is where redundancies come in this is where reliability comes in the DNS system and the variety of different uh TLD servers so it’s not just one TLD server that has es all of the domains it’s literally dozens of them probably in the hundreds that are across the globe in different locations so just in case one crashes you can go to the another one and you still get reliable connections if you wanted to and just expand that extrapolate that to the orgs and the Nets and all of the different countries and the different cities and so on and so forth this is where redund redundancy is a big deal this is where this structure this hierarchy of structure that’s available is a big deal and it provides that reliability that people actually really need because I mean what would you do without the internet and once you get past DNS once you understand DNS then you go into DHCP which is the dynamic host configuration protocol and this is a network management protocol that’s used to automate the process of configuring devices on IP network so this is essentially what assigns the IP addresses to any new device that’s connected to your router to your internet right so when somebody comes and connects to your Wi-Fi this is the protocol that assigns the IP address and any other configuration parameter to that device that just connected to your Wi-Fi so it’s DHCP that assigns the IP address to your Wi-Fi to your to the device that just connected to your Wi-Fi uh the way that it works is that a device like a computer whatever connects to your Wi-Fi it connects to the network when it does that it doesn’t have an IP address so it sends out a discovery broadcast message to a d DHCP server the DHCP server makes the offer and it so it receives that Discovery message and then it responds with the offer message and it says hey here’s the available IP address that we have on our Network and the network configuration information that you need like the subnet mask that’s connected to uh the default gateway that would exist and any DNS server addresses so on so and most people really don’t give a crap about this they just want Wi-Fi so most people really don’t care about this and of course the devices don’t display all of this stuff to the person who’s connecting their cell phone to the Wi-Fi that you say oh I have Wi-Fi connection but what happens is that your cell phone sends out the request and then the DHCP server actually responds with an offer and says this is the IP address that I got for you and these are all of the rules and uh configuration details for our specific Network and then the device receives that offer and responds with an actual request message that says hey I accept the offer that you’ve made thank you for this IP address and thank you for giving me connection to this network and finally the server will acknowledge that request and it’ll say all right cool this is your actual IP address from now on and every time that you connect to me this is the IP address that’s going to be assigned to your particular device and now the device can actually use the internet because it has its official address and it can communicate with the network the vast wide network of the internet the worldwide web there are a lot of benefits to this obviously right so it simplifies the network setup imagine if you had to be the one to assign an IP address to every single device that connected to your network and believe it or not at a certain point in the history of the internet this was actually the case and people had to manually assign IP addresses to the computers and to the devices that were connected to the network so uh especially when you have a massive Network where configuring each device would not be possible which is what Microsoft has or what Amazon has they have literally tens of thousands of employees so imagine if somebody had to sit there assigning IP addresses that would be like a full-time 247 type of a job so um it avoids the conflict of addresses this is the other piece that is uh very much prone to human error right so somebody might forget that oh shoot I already assigned this address to this other device and now I can’t reuse this address and now I got to go do this other thing and try to find a new address own and so forth the DHCP protocol the the uh system itself just keeps track of all these things and avoids any conflict so it assigns an actual unique address to the person or to the device that’s being connected to the network and then there’s the management of the IP address so um people want to use their IP addresses uh efficiently if there’s any kind of a security issue or a disconnection from the network the IP address can be resigned to another uh reassigned excuse me to another device um if it has to do anything with uh firewalls which we’re going to get into a little bit as well it helps with the management of IP addresses and blocking or meaning denying access to the network via the IP address or allowing access to the network so on and so forth so it’s the management of these IP addresses that comes in um and again it has to do a lot with uh networks that have a lot of temporary or what they call transient devices so if you go to a uh a coffee shop Wi-Fi hotspot right so if you go to a coffee shop and you’re connecting to that Wi-Fi that specific Wi-Fi at that coffee shop has probably seen tens of thousands of devices that just roll through and they’re there for just one day because they need Wi-Fi and then they leave you know the person came into town for a trip and then they left and they’re never going to visit that uh Wi-Fi spot again but that IP address that was temporarily assigned to that person now needs to be freed up so that it can be assigned to somebody else right so this is how these transient devices or these temporary devices get managed through the DHCP protocol and this is very important to understand especially when you just go into a large Enterprise environment these are the types of things that are very very useful so when you’re thinking about the management of IP addresses what assigns the IP address inside of the network that would be the DHCP protocol what assigns the the name to an IP address that would be the DNS protocol right what types of IP addresses are there ipv4 and IPv6 right so these are the key things that you need to remember when it comes down to the networking fundamentals when you go further along with this the DHCP lease is basically the time the the temporary amount of time that that IP address will be assigned to that given device right so in a public Wi-Fi environment to the DHCP lease time is obviously way less than your personal home internet so when the lease time is about to expire the device has to renew the lease by sending a new request to the DHCP server and then the DHCP server will send the offer um if it stays connected to the network the server typically just renews the lease which extends the time that the address is assigned so that you don’t have to get a new IP address every single time for your laptop to be connected to your home Wi-Fi right so if it’s constantly connected to it or it’s connected uh perpetually like you never take your desktop computer out of your house it stays right the laptop might be put in your backpack and it’ll leave and it’ll come back but the desktop will never get disconnected from that Wi-Fi so in that particular ular case it’ll just renew the lease and it’ll just keep granting access to that particular IP address but when your friend comes over and that you don’t see them for the next 3 months or 6 months or whatever that lease time will lapse and then they’ll need to reapply they’ll need to submit a new request to the DHCP protocol the DHCP server so that they can get assigned a new IP address when they come back to your house so as a summary DHCP streamlines Network management it assigns IP addresses to devices making sure that the IP addresses and any conflicts and everything are all handled without you even having to worry about it um it also simplifies the process of connecting devices to a network by making sure that the network efficiency is overall uh just running smoothly it it’s enhanced and again you just don’t have to worry about it all of these things happen behind the scenes you don’t even think about these things for the most part if you don’t know anything about networking you probably have never even heard of this and you are like oh wow I didn’t know all this was happening but yeah there’s something that assigns the IP address to somebody that gives them access to your Wi-Fi and that is called DHCP all right now we need to address what a network interface actually is so the interface configuration uh Legacy meaning the old school version and actually this is what’s running on my current Macbook so this is not uh Legacy in the regard that it’s no longer being used there’s still a lot of conf uh computers that use if config um but this is the interface configuration that happens with this particular tool or command so I have config uh short for the interface configuration is a command line utility that is used to configure your network interfaces on Unix based operating system so for example Linux or Mac OS um it connects it it creates those interfaces it configures the network interfaces to the actual IP address so it’s been deprecated supposedly um but it’s uh still very much in use so but when I try to run this just to test on my MacBook uh and I ran IP uh it didn’t work it said IP doesn’t exist when I ran if config if config worked so uh it’s not as deprecated as they make it sound and it’s still very much in use um when you go to Windows if config is IP config and it serves the same exact purpose the simplest version of the command is to just type if config and press enter and it’ll lists all the network interfaces that are on your system along with all of the current configurations meaning the IP addresses that are assigned to them if there are any network masks or broadcast addresses and everything else that would be appropriate for that particular configuration this is an example output right here so eth0 is the actual interface in question these are all the flags that are attached to it so it’s up and running it has the broadcast so on and so forth multicast um the inet IP address for this is this piece right here the network mask for it is this so this is the subnet mask that we were talking about and this is the broadcast IP address that’s assigned to this particular Network right so this is the this is just a sample of the output of what would happen when you ran if config now if you wanted to configure the IP address then you would do pseudo if config and then that specific interface that we were just talking about and then the IP address that you would want for it and the net mask that you would want and then you would do up to just make sure that the IP address has been assigned to it and the subnet mask is what it is and then the up keyword brings the interface up meaning it actually activates it right so if you wanted to take it down you would just type down but this is a configuration command so you say uh this specific IP address is what I want to assign to this particular interface and I want it to be on this type of a subnet mask and I want it to be up I want it to start running right so this is what uh how you actually configure something like that you don’t have to necessarily do it because typically the DHCP protocol will do it for you but in case you actually need to do it manually then this is what it would look like to configure an IP address manually for any given interface which is in this case the eth0 and this is the detailed breakdown of everything that I just said so uh maybe I I just should like click forward and see if I actually have these notes in the future slides um so pseudo would be running the command as a super user which is the administrator privilege the eth0 is the inter uh the network interface that you want to configure so it could be anything that has to do with your interface it could be eth1 it could be TP typically not Lo which is the local uh host you typically would not modify that that ends up having the same exact IP address on every single machine which is 127.0.0.1 .1 um so eth0 would be the particular interface in this case that we’re going to be configuring this is the IP address that we’re going to assign to this interface this is the network mask the subnet mask that we are going to assign to this interface and then we want to activate the interface and make sure that it’s up and just like you can bring an interface up you can shut it down or you can deactivate it essentially and so without having to configure the IP address or anything like that if you just wanted to make sure that this particular interface is active you would do ETA Z up if you want to take it down or deactivate it you would just do ea0 down they control the state of the interface itself when you bring it up you activate it when you take it down you deactivate it um bringing interface up or down the usage itself as an act uh as an example over here would just be exactly what we repeated in this particular case and so these are just some examples so if config e0 up or down in this particular case so in conclusion and summary we you know that if confi is supposedly deprecated but it is not because it is active and running on my computer right now on my MacBook right now um it remains a widely recognized tool for managing network interfaces on Unix based systems and allows you to view the interface configurations assign IP addresses control the state of interfaces and that is what I if config does IP is supposed to be the modern replacement for if config it’s part of the IP Route 2 package and it basically does everything that we just talked about with if config except the command in this particular case would be IP you would just do IP space a and press enter or you would just do IP space address so addr and then press enter and it’ll just display all the network interfaces very similar to what if config would do including the IP addresses Mac addresses and any other detail that is relevant to them and this is what the example output looks like so this is very similar to what we talked about previously um The Local Host right here is what this is at the very very top right here and the IP address as I mentioned for the local host on every single device that I have scanned and uh pen testing or anything like that this is the Local Host IP address so this one is universal across every single machine that I’ve ever messed with okay then there’s the eth0 which is the actual interface that is being assigned an IP address on your Wi-Fi on your local network and in this particular case this is the IP address for it right so this is your act actual IP address for or in this particular example this is the actual IP address for this particular machine right and so this would be the broadcast address and then where is their inet mask we see the mask or no I think the mask is not available on this particular example but you see the MAC address as well you see the so this is the MAC address that is connected physically to the ethernet and the MAC address can be spoofed that’s a whole other conversation but uh Mac addresses are not permanent neither are IP addresses you can also spoof an IP address I don’t know why I even said that anytime I think Mac address I’m like oh Mac address spoofing um but this is typically what it looks like so it’s very very similar to the if config output um and in this particular case what we’re seeing over here is the MAC address as well and honestly in a lot of cases when I run if config I also see the MAC address for my devices on if configs output so this is not just limited to the IP Command itself um you have the the assigning of IP address is very similar to what we did with if config uh which would be pseudo IP addr and then you’re going to add this particular IP address with the back uh the forward slash of 24 to the e0 interface and then there’s going to be the breakdown of this so I’m not going to try to explain all of it on this particular screen but what we’re doing is that we’re assigning this particular IP address with a subnet mask which is 24 bits so meaning the first three right here the first first three octets are assigned to the network and then the last octet is assigned to the host itself and then so you’re assigning that particular subnet mask to this particular piece actually so we can actually see this right here so instead of showing the 2555 255 2550 this is the piece right here that tells us what the subnet mask is so in this particular case it’s saying that the the network is assigned 24 uh bits which would be three octets which is what this represents right here okay so breaking it down you have the pseudo command that runs it as an administrator you have IP address add which indicates adding an IP address this is the IP address that we’re adding and we’re putting it with a subnet mask of three octets which would be 24 bits and then we’re going to add it to the interface which is this particular interface the eth0 interface which is typically for the most part also what I’ve seen is that that is the interface name that is assigned to the very first IP address that you get assigned on your particular computer and the overall concept of bringing an interface up or down basically activating or deactivating an interface is also it also applies here it’s just the command is a little bit different so it would be IP Link set eth up or IP Link set eth0 down and this is how the whole thing breaks down so up obviously activates down deactivates it but you’re talking to the interface a little bit differently and you’re saying link I want you to set this particular interface up or down I want you to activate it or deactivate it and these are the examples of what it would look like if you wanted to bring something up or deactivate it and put it down so displaying the routing information um is mostly done so that you know what the paths that the network traffic is taking to reach various destinations uh it includes the information about the default routes that it will take the specific routes that it will take and the interfaces that have been used uh this is to try to troubleshoot any kind of connectivity issues and see if there is any individual connections that are being made along that particular path that the the traffic takes to actually reach its particular destination if any of those things are glitches this is also uh information that can be used for security analysis and Pen testing as well but it’s mostly used for network connection troubleshooting so it displays the routing table which shows the paths that the Network traffic will take and so this is what it looks like this is the sample output for this piece so you’ll have this whole thing right here and I’ll actually break this down in a little bit further detail for you so you kind of understand what this going on it’s not I don’t think this is actually inside of the the scope of the Linux plus uh studies and the examination but just to give you a good idea of what you’re looking at when you’re looking at the routing information so that your networking knowledge is a Little Bit Stronger so let’s actually look at what this piece right here means and what all of these different elements represent okay so now breaking it down in particular segments here so the first portion was the default via 19216811 Dev eth0 so the default indicates the default gateway which is used when no specific route for Destination is found in the actual routing table the Via 192 yada yada yada uh specifies the next hop address so it’ll go from the default gateway to the next address which is going to be the IP address of the default gateaway router that the traffic will be sent through so it’s going from this it’s technically just doing this it’s going to go from the Gateway but it’s going to go as this IP address instead of the default gateway and then this is going to indicate the network interface that’s going to go uh through the traffic that’s going to be routed through right so the default via so this is going to say this Gateway via this IP address on this particular interface is going to start traveling right so it tells the system to send any traffic that doesn’t match a specific route in the routing table to the default gateway at this particular IP address using this particular interface now the next line is this piece right here and we’re going to just break this down so we have this portion that represents a specific route for the IP address range which goes from 1.0 to 1.25 five where the 24 is the subnet mask which would be this piece right here so you should already know this now Dev eth0 is the associated with the network interface eth0 itself protoc kernel signifies that the route was added by the kernel and we already we should know what the kernel is right so the kernel usually as a result of configuring the network interface so it’s going it was added by the kernel this particular route that we’re looking at was added by the kernel and scope link indicates that the route is valid valid only for directly connected hosts on the same link which is the local network so this particular piece what we’re seeing in this line right here is only available for people who are actually connected to the same Wi-Fi the same internet that this particular device is connected to and then this is the source IP address so this is the IP address to be used when sending packets to this particular subnet so if we looked at it from the very very top right here you have the Gateway saying that this is going to be my IP address for communicating and then it’s going to say the rest of it for this particular device that’s connecting so it’s saying that this represents a specific route for this so it’s going to go from any of these to any of these and then it’s going to say that this is my interface this is my actual device that’s going to connect to it this was done by the kernel and it’s going to be on the same exact internet that we’re connected on so the local network or Wi-Fi this is what we’re going to be loc located on and then this is the IP address of the actual device right so it’s not to be confused with this IP address cuz this IP address was for the default gateway this is the IP address that is for this particular device that is communicating with the internet so when we combine both of these lines traffic for any unspecified destination so the default route will be sent through the Gateway at that address via that interface and traffic that’s specifically destined for this particular subnet will be routed through this particular interface using the IP address that was assigned to this interface again this might be a little bit confusing it might be a little bit overwhelming we’re not talking about networking we’re not talking about Network Plus or at least not in this depth I just wanted you to have this just so you can kind of see what this particular output right here kind of represents and these are this is just a sample of what would happen when you run the IP route command so in summary even though though I have config is supposedly deprecated it remains a widely recognized tool for managing network interfaces on Unix Bas systems it allows you to view the interface so on and so forth uh very similar to what is done with IP next on our list of tools is the network manager command line interface so NM CLI uh it’s a command line tool as the name implies uh and it helps you manage the network connections on Linux systems so it’ll interact with the network manager um which is a system service for managing the interfaces and the connections to the interfaces uh it’s commonly used in desktop environments and provides a convenient way to configure and control network settings without a graphical interface because the name is implying this is a command line interface so nmcli interacts with your network manager and it helps you manage the interfaces as well as the connections and so on and so forth uh these are some of the commands so if you want to look at the Active connections on your particular Network you just type in nmcli connection show and it’ll show you all of the Active network connections on your system and then it’ll show you the uu IDs for them the connection name type of the connection device associated with each connection so on and so forth and then you have the particular output as an example here so if we do the show this is typically what it looks like you have the name so this would be the interface right so this would be the machine itself this is the Wi-Fi uh router and then you have the uu ID for both of them and then you have ethernet for this guy and then you have Wi-Fi and then the device itself and then the device uh name or the device ID in this particular case so it’s going to be eth0 and then this is WLAN for this particular set of devices the set of network connections here so if you want to configure a static IP address using nmcli you would go through this now static IP addresses are IP addresses that don’t change so this is going to be a permanent IP address right so pseudo nmcli connection modify on this particular interface it’s going to be an ipv4 address and this is going to be the IP address that’s going to be assigned and it’s a subnet mask of 255 255 255 so it has three octets right the command assigns a static IP with a subnet mask of 24 to the network connection eth0 and this is our breakdown so we have pseudo we’re running it as a administrator nmcli connection modify is indicating that we’re modifying a network connection it’s going to be for this particular interface so this is the network connection that we’re going to to configure and then we’re going to have the IP address and subnet mask that we’re going to assign to it and we’re using an ipv4 uh version of the IP address and then we’re going to add it to this particular subnet which is the 24 so the 24 represents the the number of octets right so 24 divided 8 would be 3 which means 255.255 255 I’m just repeating a bunch of things that you should buy now know so if you want to enable or disable connections uh it’s very similar to everything else we’ve done so we are using the up and down keywords in this particular case we’re going to say sudo nmcli connection up for this particular interface or connection down for this particular interface and we’re going to bring the connection for that interface either up or down activate it or deactivate it and this is what that looks like right here so nmcli connection up eth and C connection down eth yada yada yada so if you want to view the status of the devices now you would look at the nmcli device status and it’ll display the status of all of your network devices whether or not they’re connected disconnected or unavailable and this would be what the example output for that look like so the device you can see right here so this would be the internet this is the Wi-Fi this is the loop back or the local uh host and then the ethernet is connected the Wi-Fi is connected and the loop Act is not being currently managed right so if you want to available it list available all the Wi-Fi networks that you have uh for your particular connection or for your particular device and this will probably be a really big list depending on how big your building is or who’s around you and then you’ll just do nmcl device Wi-Fi list and it’ll list all the available Wi-Fi networks like their ssids and the signal strength and security type and this is what that output potentially looks like so this is the SSID which is the the name essentially of the Wi-Fi so you have my Wi-Fi another Wi-Fi and then there’ll be AT&T y y y Spectrum y y y um the mode right and then the channel that it will be on the rate the speed of it the signal so if it has a signal of 70 it has a stronger signal and a stronger connection for what you have bars would be another version of looking at the signal and then you have the security which is WPA2 or WPA2 in this particular case but uh these are the Wi-Fi uh Securities the Wi-Fi encryptions and WPA 2 is one of the more common ones that are modern and most secure compared to all the the Legacy or outdated versions of wi-fi security if you want to connect to any of those networks you would run a pseudo command with nmcli and you want to connect to the device Wi-Fi and you want to connect to it and this would be the SS ID I guess that would be the name in this particular case and then the password would be password because most often than not you actually need the password to connect to a Wi-Fi and then it’ll just connect to that Wi-Fi using the provided SSID and password that you have given to it and this is the particular uh usage here so you will replace SSID with the actual name of the Wi-Fi and then you’ll replace password so in this particular example you’re connecting to this particular interface which would be for example my Wi-Fi in this case and then from there you will provide the password that would be inside of the password quotation and that will will be the actual password for that Wi-Fi network so in summary the nmcli provides a powerful command line interface for managing network connections on the Linux systems it allows you to view and modify connections assigning static IP addresses control connection States and of course manage the Wi-Fi networks so that is the power of NM CLI now on to troubleshooting so ping is a very useful utility um it’s used to test the reach ability of a host so a computer or server so you basically ping the IP address or you ping the website and you can also measure the round trip time for the messages that are sent to that to just uh establish how strong the connection is or how quick that particular host is uh to respond to you and when you send it you literally just say ping and then you give it the IP address and then what it does is it’ll send a bunch of Internet control message protocol packets so icmp packets anytime you see icmp think ping so it’ll send Internet Protocol packets and there’s something called the icmp flood and this is actually a way that you can uh do a dods uh attack or a Dos attack which is a denial of service attack by flooding that particular host with a bunch of requests with ping and because it’s getting so many requests you may take it down and it may go out of service so this is something that you can see regularly icmp will be associated with ping so just keep that in mind if you see icmp that means they’re trying to Ping it so it’ll send the request to the specified destination which is either the host name or the IP address of that host and then the receiving response will tell you whether or not that thing is up so typically if it doesn’t uh if it’s not up it’ll respond with some kind of a you know host is down or something similar to that if it is up it’ll just say connection was a established and the amount of time that it took for that connection to get established the roundtrip time so the rtt is where the measurement of the time that it takes for the echo packet to actually go to the host and reply back to you so it’s the round trip very very simpler uh very simple to understand um packet loss is the number of packets that were sent but then they got lost somewhere in the process right so the network connection or other issues so if it sends a packet and it didn’t come back or if it sends a packet and it wasn’t received it was lost in the process in the in the transition um in the transport so to speak um if that happens it’ll also report that back to you and this will help you understand the the strength of the signal to that particular host and how reliable that signal is the basic usage looks like this so you just say ping the host name or the IP address so ping google.com that’s an example and or ping you know one 5 whatever I’m just coming up with some kind of IP address but you basically just put in ping and end either the host name or the IP address itself and it’ll ping it for you just to tell you whether or not it’s up for the most part the reason why we use ping is just to see whether or not that host is actually up and when it is up this is what the result looks like so it will just say 64 bytes from this particular location was sent and being that actual host right the host IP address there were 64 bytes that was was sent back to you and this is the the response time which was 12.3 milliseconds and the next one was 11.8 12.1 but essentially this is exactly what it looks like when a host is up when it’s not up you don’t see anything like this it will typically just say uh connection was not available or host is down something along those lines but if you see this and then if you just see this every uh second or every one or two seconds and it just keeps coming cuz uh typically what happens is that unless you stop it so you would have to do uh control C which is actually I think on the next slide so we have the the breakdown here for what we just saw so we have the 64 bytes from the IP address which was the reply that we received from that IP address which was Google in this case uh the sequence of the packet so it starts at zero and it’ll just increment by one and then we have the TTL the time to live value indicating that the maximum number of hops that the packet can take before being discarded and then you have the actual time this is the roundtrip time for that packet to be received and so if you want to stop it right you would do control C which cancels that request unless you actually say that you wanted to send out 10 packets for example or five packets just to make sure that it’s up which is I think would be done with the dash C for count and then you would do that so that it’ll run and then after 10 packets it’ll stop running but if you just do pay Google by itself it’ll keep running until you stop it and you would have to do that with contrl C additional options oh there we go this is the count right here so- C is the actual count I I just keep getting ahead of myself so specifying the number of packets that you want to send and then after five packets it’ll stop pinging and then you can also set the interval between the packets to be sent and that you would do that with the I option and it’ll be a two it’ll be the number of seconds that it’s going to wait so if you don’t want it to show up on their on their intrusion detection system that you’re pinging them and if you want the Ping to wait you know 5 seconds or 10 seconds you can do that just to make sure that you still have the connection and it’s a live connection but it won’t show up on their IDs or their Network intrusion detection system as somebody’s massively pinging us and trying to see whether or not we are up whether or not we have service um you have some additional options here so we were talking about flooding right so if you wanted to flood this particular case um what happens is that you you are trying to potentially uh do a denial of service attack so if you do an F option so if you do the dash F option it’ll flood meaning it’ll send as many packets as fast as it possibly can and that you know the milliseconds that you saw will be much much smaller so it’ll be a massive flood of packets that will be sent to google.com and in this particular case I mean I don’t think Google will even care um but this is typically done to to slow down the actual host that you trying to reach because you want you want to either test their ability to handle a flood of traffic or you want to actually do a denial of service attack and stop them from operating in summary the Ping command is a vital Network troubleshooting tool because it actually tests the connection between devices and makes sure that the device is actually up it also tests the amount of time that it takes for packet to go back and forth to see how reliable that connection is and if you have any kind of a network issue it’ll provide information to you about packets that were lost in the process the length of time that is taking for the package to be sent and come back and of course if there is a status of the connection meaning if the connection is actually up and whether or not you can send a ping to it and receive something back trace route is the type of tool that helps you uh track the route that some a piece of traffic is taking or a packet is taking to go to a particular location so when you run it it’ll send a series of packets to whatever the destination IP address is and it’ll gradually increase the time to live values and that what that does is that it determines the maximum number of hops or the number of internet routers that the packet can Traverse right so when you send something out it’ll go through multiple Wi-Fi routers or multiple uh internet routers before it actually lands at its particular location and it’s rarely ever the same number of hops so um it could be you one hop it could be 10 hops right it just depends um when you increment the TTL value uh it’ll start at one and then it’ll travel only to the first hop before it gets discarded and then with each packet that goes after the fact the TTL value is going to be incremented by one so meaning it’ll take two hops on the second run before it gets discarded and then it’ll take three hops on the third run before it gets discarded and the number of hops again will be the connection to the routers the connection to the the destinations at the the kind of the intermediary connections before it actually lands at its final destination um it’ll send icmp packets icmp messages so when it the packet is discarded due to the expiration of the TTL it’ll handle the packet sent as an IP icmp which will give you the I the time exceeded message back to you as the source so it’ll include information about the actual router that I was trying to connect to allowing trace route to identify the Hop that did not make it the Hop that was discarded along the way and then when it completes the path it’ll keep going right so the process itself will continue until it actually reaches the destination and completes its path and it’ll tell tell you what the maximum number of hops that it took to actually get there um when you get the information from each hop trace route will actually construct the route that was taken by the packets and this is for again to try to measure connectivity and to try to measure the strength of a network and the strength of your particular host trying to connect to another host the strength of the internet connection that you have and the routers that you have and how long it’ll take for something to get through if something has been discarded along the way that is something that you think about if there are too many packets that have been discarded along the way that’s something that that again is kind of like a a red flag that it’s like okay we need to troubleshoot this connection because for whatever reason we’re dropping a lot of packets a lot of packets are being discarded and if it the paths are completed then trace route will actually record that information for you and it’ll show you how many of your uh pings that were sent out how many of the packets that were sent out were actually reaching its destination um if you want to run it it’s very similar to running the Ping command so you just do traceroute google.com for uh this particular example or you could say trace route and IP address.com and it’ll start sending packets out and it’ll start tracking the number of hops that it takes and whether or not those things are going to be discarded and the connection is actually being established or whether or not those things are going to reach the Final Destination that you want it to take and then when it does it’ll show you the route that it took and how many hops that it had to take in order for it to get to that particular destination so when you run it this is the kind of output that you’re going to see right so the very first one is the very first packet that was sent so this is the TTL right and so it went and it took a millisecond and then the second attempt it took 789 milliseconds and the third attempt it took 699 and then it’ll send two and then in this particular case 1.62 milliseconds and it incremented uh it was a longer time obviously because it’s sending longer packets the third one it it sends three right and then obviously the time in response is going to be longer because more packets are being sent out right and so this is what that actually means so this is kind of the breakdown of what we just saw so the very first one that we saw the IP address that we see at the beginning that’s the IP address of the first hop router and this is the first hop that it took the response time the round trip time for these three packets that perent to that first hop were the shortest that we got because it was a single packet right the lines after the fact were the IP addresses and roundtrip times for each of the Hops that we had along that particular path and if we wanted to let that keep running cuz that ultimately it’ll just keep running so this is in this particular case it took three Hops and it stopped running this what we can kind of assume but more often than not uh you’ll see a few dozen maybe it’ll be like 20 something hops that it’ll take and then the data points for each of the routers that it was connected to be before it finally landed at the location that you wanted it to land which is in this particular case the 142 250 74 etc etc this is the the IP address that the was the first hop that it took and then it got back to this particular guy and then this guy responded back to us in this particular case there was only three hops that were taken it went from us to them and it was only three hops HS which is very short to be brutally honest with you more often than not it doesn’t take only three hops to go from where we are to where this particular location was so it just traces the route that your particular Gateway took to get to the actual IP address of Google in this particular case right if you want to try to specify the maximum number of hops that you want the uh the trace route to take it’ll be the M option for Max um and you can give it the the number of hops that you want it to take before it gets to google.com um and then you can also M uh set the number of uh packet bytes the size of the packets that you can declare which can in this particular case be done with the dash P option right here so if you want to dedicate the maximum number of hops you would do it with- m if you want to dedicate the size of the packet you would do- p in summary we have the trace route command that’s a powerful tool to diagnose network connectivity issues by identifying the path that packets take to reach a destination it helps to pinpoint where the delays or failures are along the Route by looking at the actual time stamps and which packets were actually discarded and then it makes it very valuable for you to network uh to troubleshoot your network connections because you will see where how many packets were dropped what uh was taking the longest amount of time to get to a location and the specific routers that were responsible for those network uh connection drops or the delays in the connection net stat short for the network statistics is another command line tool that’ll Display Network related information like the actual connections that you have the routing tables the interface statistics masquerade connections this a really fun word and multicast memberships it’s used very regularly for monitoring and troubleshooting network issues and the basic usage would be to run it with a variety of flags so if you want to view the active listening ports using netstat you can run it with these various flags that you have right here so T would be TCP ports and TCP connections U would be UDP ports and UTP connections L would be only the ports that are in listening mode and then n would be the numerical addresses instead of of the host name so you would get the IP addresses instead of the host names in this particular case so if you just did T it’ll only show you TCP connections if you just did U it’ll only show UDP if you did if you didn’t include L it would show if it’s listening or not listening right so this is essentially looking for all of the connections TCP or UDP that are in listening mode and then you want to see the IP addresses for those particular connections so this is what the output potential would actually look like so you have the protocol which is TCP TCP 6 UDP udp6 so whether or not it’s TCP or UDP this would be right here received and send queries the local addresses that are assigned to them as well as the ports that are assigned to them so this is Port 22 this is Port 80 which is the HTTP server this is the secure shell server these two ports I don’t know actually it’s they are UDP ports we can understand that but I haven’t memorized what they would stand for or what service they would have stands for and then these are the foreign addresses if any and the state that they are in which would be listening state so the TCP ports on these particular addresses on our local addresses are actually in listen mode these UTP ports are not in listen mode SS is the socket statistics um which is the modern uh alternative to net stat so it’ll provide essentially similar information similar functionality but supposedly it has better performance and it has a more detailed output so it’s also part of the IP Route 2 Suite uh which was very similar to what we dealt with with IP itself and it’s preferred in a lot of Linux uh distributions and you run it like this so very similar to what we just did right so you just do instead of net stat you would do SS and then you would give it the flags that you want it to run and exactly the same that we had before we have the TCP UDP listening ports as well as the numerical addresses that would be resolved for them and this is what the output looks like so similar to what you saw previously except instead of the listen or uh unconnected uh state right now that we see here that was previously at the very end right here it’s at the very beginning right here it’ll give you the send number of packets that was sent to them the addresses and the ports that are connected or uh listening and then you have the pier address and ports that would be on the other side so uh this is the example output for the SS command the uh what is it called again the socket statistics command that we use um so to get some additional options here we can look at a established connections so these would be TCP connections show active established TCP connections this would be all TCP connections listening and established which is right here so you can again you can do singular uh Flags or options you can combine the flags and options um you can also look at process information so Tu TCP UDP give me the the network the so name uh resolution deny it so I just want to see the IP address I want to be in listening and and then I want to see the P ID the process ID and program name also as well when it comes down with this so you get the process information that would be connected or running in this particular case so we got everything we just added that last uh flag to it as well so that we can get the process information in summary we have both netstat and SS which are very powerful tools for monitoring and troubleshooting our network connections and they’ll give you a lot of great details whether or not it’s been connected if it’s in listening uh with the IP addresses so on and so forth netstat is technically older it’s very well known um SS is the modern version but they both offer essentially the same information that you’re looking for um I did like the output of ss a little bit better cuz it seemed a little bit more uh friendly to the eye but for the most part they give you the same information that you would need and finally we have arrived at our network uh fundamentals conclusion here which is going to be our firewall settings so so the ufw which is the uncomplicated firewall this is the most common it’s like the uh firewall management uh that is the simplest that it possibly can be via the command line so it’s straightforward and it creates and manages IP tables firewall rules and it’s particularly popular on Ubuntu and all of the derivatives because it’s simple and it’s very easy to use so this is just an example here if you want to enable the firewall you just do pseudo ufw enable and so it activates the firewall and it it enforces any and all of the configured rules that you have for this thing so once it’s actually been en enabled it’s going to start running and it’s going to filter any of the incoming or outgoing traffic based on whatever the rules that you have that’s been set up so if you want to disable it you would do the same thing pseudo ufw disable and it will just deactivate it and any of the traffic that you previously were filtering is now not going to be filtered anymore um if you want to allow a service so in this particular case SSH represents Port 22 so you do sudo ufw allow SSH so it allows traffic for that specific service which is in this particular case SSH which would be Port 22 and SSH stands for secure shell so it allows for somebody to connect remotely to the particular device that this ufw is running on um if you want to deny it you can do it via the port number as well as the service so you could say deny 80 which would be the HTTP traffic and in this particular case it’ll block HTTP traffic on Port 80 which prevents access to web services running on this particular Port then you have the status of the firewall so if you wanted to see what the current status of it is whether or not it’s actually running and what all of the active rules are so if there are any deny rules if there are any allow rules you can see all of those things by just running a simple status command on this and I’ll just show you which one of the rules that you just try to apply for example so if you apply a deny Port 80 or deny SSH if you did those things and you run a status you can check whether or not those things are actually active and currently running um you can do a port allowance in this particular case so similar to what we did with the the service right we can do the same thing with a port that’s associ with it and then you can say allow 443 which is https so this is for like the internet um and Port 80 is HTTP but https is just a secure version meaning it has TLS or SSL uh uh traffic so that it’s actually encrypting all of the communication with your browser and it would be a TCP traffic Port right so it’ll allow all of the 443 TCP traffic that is typically for the communications with browsers UDP traffic is usually for uh viewing video so if you don’t allow UDP or if you don’t specify that you want UDP or if you actually deny 443 UDP you may deny any kind of video viewing that may happen on that web browser but in this particular case we’re allowing Port 443 which is for web browsers secure web connections we want those things to be allowed and then we’re going to allow the TCP protocol associated with them um if you wanted to deny the UDP traffic of Port 25 which is used for the simple mail transfer protocol it’s typically used for mail um it would be done by just doing a simple deny command and then doing 25- UDP and it denies all the UDP traffic on that Port which is used for simple mail transfer for emailing basically that’s what port 25 has done uh it’s the emailing Port that is typically used on on our Network and then you can delete rules right so if you had previously pseudo ufw allow SSH and now you want to delete that rule you can just say delete allow SSH it’s very simple right it’s very intuitive the syntax is actually quite easy to use and then you can delete the deny rule in a very similar way as well so if we denied Port 80 traffic then we would just say delete that particular deny 80 Rule and that way now you have deleted that rule which means that now you’re allowing the port traffic uh the port 80 traffic right and then you have logging on so if you want to enable the logging that’s being done from the firewall which highly recommended that you log everything that happens with your firewall you would just enable the logging so you would say logging turned on and it’ll log all of the firewall events that are happening um and this I mean I I can’t imagine that you would run a firewall without actually collecting firewall Lo logs so it’s very important to have the logs of the traffic that’s being uh coming through and if people are trying to access your Port uh 22 for example your secure shell Port when you’ve done a deny access to that port and then you keep getting attempts to hack into your Port 22 or maybe you have allowed Port 22 traffic to come in and somebody’s trying to log into your Port 22 but they keep using the incorrect password to log in so you feel like you are now victim of a Brute Force attack against your Port 22 which is for remote connections and remote control so uh it’s very important to turn on logging and then you can of course disable logging by just doing logging off and now there’s a version that’s kind of an all encompassing rule which would be a blanket type of a rule which would be allow all incoming so it’s it’s actually not uh allow all incoming it’s just allow incoming but what it does is that it allows all of the incoming traffic to your particular uh Network or I would say in this particular case your your uh device your computer right so you want to say hey I want you to allow all of the incoming traffic which means anybody and anybody could try to communicate with your particular computer on any port that you have open which includes your Port 22 it includes your DNS server and it includes all of the other 65,000 ports that would be available if you want to deny all of the incoming traffic you could do the same thing except just use deny instead of allow and then it’ll deny any connection that’s supposed to come to your particular device this is kind of difficult to do because then you won’t be able to connect to the internet for example via Port 80 or via Port 443 you won’t be able to get any of the the responses from Google or from YouTube if you’re denying all of the incoming traffic so just keep this in mind it sounds like it might be a good idea but you can say deny all and then go and do um allow of spe specific ports because you want to access specific Services right so you can allow you can dedicate you know the port 80 allowance and dedicate the port 443 allowance and then deny everybody else right and in the same way that you would deny all incoming or allow all incoming you can do allow all outgoing traffic so any request that you make out to the world we want to make all of those requests allowed and then same thing deny all of the outgoing requests and this is something that maybe you don’t want uh people to be able to connect to the internet for example because they shouldn’t be able to connect to the internet all they need to do is just work on their local computer schools sometimes do this because they don’t want people to be able to connect to the internet and they just want somebody to just use the computer for their schoolwork so this is the type of stuff that they would put so you’re denying all of the outgoing traffic that’s going to come from that particular computer so in summary it’s a very simplified process of managing the firewall rules for traffic and you can have very intuitive commands like we just saw which would be enable or disable or allow or deny and then you can do it based on the service name like SSH or you could do it based on the port number like Port 22 which would be the same port for SSH so you could allow Port 22 you could allow Port 443 so on and so forth IP tables is another command line firewall utility that will allow admins to configure Network packet filtering and address translation and a lot more other things so it’s a little bit more complex version of the uh the uncomplicated firewall that we just went through uh it operates with the Linux kernel to provide detailed control over how packets are routed so the core tables in IP tables can be filter so this is one of the main ones so it filters packets right so you can handle all the incoming packets by input you can handle the packets that are routed through your device by forward and then you can handle all outgoing packets by using the output chain so you have the input chain the forward chain and then you have the output chain and these are all done through the filter and then you have the network address translation which is for masting and port forwarding so it it doesn’t show your actual IP address it’ll use a different type of IP address so that the world doesn’t see your actual IP address which is actually very useful for masquerading and essentially kind of disguising your IP address and then the chains would be pre- routing so altering the packets before actually routing them out post routing altering packets after routering them out and then you have output meaning altering all of the packets that are generated by your device itself and being sent out to the world and what it does is that it essentially changes the source IP address in this regard it’ll change the source IP address when it gets sent out to the world to whatever the masquerad the disguised IP address would be so that when the the if it’s ever uh you know intercepted or your traffic is sniffed by somebody they don’t see your actual Source IP address they see some other IP address that wouldn’t be used so they can’t particularly attack you uh you have mangle which is used for specialized packet alterations like changing the type of the service that’s being request for example uh you know SS or UDP or th TCP or something like that or marking of the packet so you can again pre-out the alteration so you can alter the incoming packets before it’s been actually routed you can alter the outgoing packets by using the output chain and then forward input or post routing would be available for other types of modifications as well and that’s what mangle does so if you want to look at what the current rules are you would just do the pseudo IP tables with a capital l flag and it’ll list all of the current rules for the filter table uh it shows the rules for the input forward and the output chains and so this is what the example output would look like this is a little bit uh it’s kind of one of the more shrunken uh displays that I have on my screen so hopefully you can see what I’m doing um you can also just zoom in a little bit uh on your screen but so we have the chain input here and the policy itself is to accept it and then we have the chain forward and the policy is to accept it and the chain output and the policy for that is to accept it and then it gives us what the destinations would be if there were any and then the they accept all in this particular case from anywhere to anywhere these are the particular rules so this is the this is the current uh display of what we it would look like if we just uh listed this with the IP tables command so this doesn’t necessarily mean much CU there isn’t very much um uh data that is reflecting on these exact rules that we have over here cuz the with the exception of this one right here there really aren’t any rules that’s it’s saying from anywhere to anywhere except everything that’s basically the rule that we have over here so the basic commands that we can run would be to allow the traffic so in this particular case we have it IP tables Das a and then input and then the protocol would be TCP and then the destination Port would be 22 and then the accept would be the rule so it adds a rule to the input chain that’ll allow TCP traffic on Port 22 which is used for SSH then you can have the explanation of this mofo right here so you have the- a input which appends the rule to the input chain you have the- ptcp which specifies the protocol as being the TCP protocol Dort would be the destination Port as 22 and remember this is an input rule so this is actually all of our incoming traffic and the J accept would would jump to accept the target allowing the actual traffic okay if you wanted to block something then you would just do the drop as the rule itself so everything else exactly stays the same so in this particular case they’re doing it on Port 80 but the final rule would be to drop the traffic that’s coming so in this particular case this is again input traffic so it’s incoming and it’s on Port the TCP Port Port 80 and the very last thing is the big piece right here that is the actual rule itself which is to drop the target blocking the traffic that comes through for Port 80 as the destination Port if you want to delete something you would do the Dash D which is the deleting of the input rule from the input chain right so in this particular case it’s the TCP protocol on Port 80 which is the drop rule so previous the same exact rule that we just actually added uh we are now deleting it by instead of appending which was the- a that we were doing we’re just deleting it from the input chain and everything else stays exactly the same so the rule was to drop all the traffic from Port 80 now we want to delete that rule so we can allow the traffic on Port 80 and so if you want to save a rule you need to save it to the configuration file that is stored inside of the Etsy directory and you would do that Etsy IP table so assuming that you have IP tables installed and then there’s the rules. V4 which is actual configuration file so you will take the everything that you just did and then you will do pseudo IP tables save and then you would forward that so you should remember what we did with this operator it sends this particular output and it sends it to this specific uh path this particular file that we have which is the rules. V4 for IP tables if you want to restore a rule that was deleted um you can then go ahead and pull it from the rules. V4 file that you just did and you’re restoring so this one was saving so you’re doing IP taable save and you’re sending it to that configuration file this one whoops wrong direction this one you’re using IP tables restore and you’re restoring it from the IP tables rules configuration file if you wanted to view a specific table you would just use the T which is uh for the table um the natat table which is our Network address translator table and then it’s going to list all of the rules for our net table so you would do IP tables again and then you just want to list the table so that’s what DT stands for and we want the network address translation table and we want to list all of the rules for that particular table so it’s a powerful flexible tool so obviously it’s a little bit more complex than what we just saw with ufw um it has a lot of rules that be that work for a lowlevel environment providing extensive control over the actual Network traffic handling um you can also configure the rules for filtering packets and translating Network addresses modifying packets so on and so forth so those are the features that are expanded upon that are not available in ufw so ufw doesn’t uh you know protect your IP address by changing the IP address on its way out which is the network address translation so ufw doesn’t do that right usw ufw doesn’t do the mangling that is available on IP table so it is a little bit more complex to work with but it also has a lot more functionality than ufw does all right now on to a very important chapter which is the security and access management chapter and the very first section of this is going to be on file system security the first portion of file system security is going to be CH root and the concept of the isolated environment and something called the chroot J so first chroot stands for changing root or change root um it’s a powerful Unix command and it changes the root directory for any current running process and its children processes so we’re talking about the parent process and its children processes um when you change the root directory uh effectively you’re isolating a subset of the file system and you create what’s known as the chroot jail that I uh that subsystem that isolated version of the subsystem um ensures that any uh process that’s running within it can’t access files outside of that specific isolated environment which means that it enhances the security and the control of that specific system as well as the directory or the file system that has been isolated so essentially what you’re doing is you’re taking one specific file system or let’s say one directory and all of the contents within that directory and what you’re doing is you’re isolating it so it’s separate from the rest of the file system hierarchy and then from there um you’re going to ensure that not only is the rest of the file system it protected from what goes on within that isolated environment but everything that’s inside of that isolated environment is also protected from what’s going on outside of it inside of the rest of the file system so essentially the isolation component from it just that specific isolation component guarantees security for the isolated environment as well as everything that’s sitting outside of that isolated environment a better way to break this down is to look at the question itself so why would we use this because when you isolate something when you isolate an application in a chroot jail which is that isolated directory and everything inside of it um what happens is that it limits the damage that any potential untrusted or compromised programs can do and vice versa uh because those untrusted programs can’t see or interact with the broader system right so uh I’m going to show you a visual of this real quick okay so here’s the example that we have the visual that we have so this is the standard hierarchy right here right so this is our actual system route as well as the binaries the home the system so on and so forth right and then inside of the home we have this one particular user who has all of their contents but what has happened is that we’ve done CH rude we’ve put all of their contents inside of a CH rude jail so to speak and we’ve imprisoned them and now what’s going on is that everything inside of this red box is completely separate from the rest of the system meaning if this particular user downloaded something that they shouldn’t have if they clicked on a link they shouldn’t have whatever they did in their particular environment is protected it’s isolated right it’s isolated from the rest of this environment meaning our actual root and the binaries and everything else that’s inside of our main system is not interact is not affected by what’s going on inside of this jailed portion and that’s really the the big significance here essentially we’ve created a Sandbox type of an environment which anything that happens for this user in their isolated environment it might affect their system I mean it probably will affect their file system they probably might lose the content since inside of that or the the hacker or somebody who got into their file system may have access to everything that’s going on inside of this isolated area but they won’t be able to leave this isolated area and go inside of this root portion which is very important because this user maybe they don’t have elevated Privileges and we don’t want them to uh if they do something wrong and if they get hacked if somebody exploits this particular user we don’t want that malicious attacker that malicious actor to be able to get out of this environment and actually go inside of the main environment that has root privileges and they can do some serious damage get access to certain materials that they otherwise would not have had access to so this is the whole con this is the visual concept of what it means to create a chroot jail there are also other reasons why chroot is actually useful so apart from security um if developers want to create something and test it in a controlled environment before deploying it into the production environment or deploying it to the rest of the company so to speak uh they can do that safely inside of a jailed or imprisoned type of an environment um they can test our applications and any configurations that they want um and really really testing out the software that um has different dependencies or libraries that it needs for uh upgraded versions so on and so forth so it’s actually very very useful in the development context as well and finally the uh access and repairing of the systems uh from a rescue environment meaning if something has happened in incident response and the main system is unbootable uh administrators can use CH rout to access and repair those systems from the rescue environment because uh something may have happened and there is a crash or some kind of a uh something that they need to recover from essentially so that they can go back to what’s known as business as usual so there’s a recovery point and usually they take those images every time that they do a backup where they would have hopefully frequent backups of the most recent recovery point and then administrators can actually use CH rude to be able to access the system itself from what is known as the rescue environment which is essentially a jailed environment a chro jailed environment and then they can hopefully recover the system so the use of this command uh first requires that you actually create a directory that will serve as the CH root jail so we’ve already covered how to make a directory so you would make a directory and you would need to use pseudo because you’re going to use this particular directory in an elevated privilege environment so that other people can’t interact with it without having pseudo access so you would create the directory using pseudo and then whatever the path of the directory is this is what we’re going to use as our actual jail environment and then you’re going to populate that jailed environment um by either copying or installing the necessary binaries libraries and files into that particular environment so you would create the environment and it could be what we saw from that visual example it could be something that belongs to a user and then you would populate the contents of that directory with the libraries the files and uh binaries everything else that would be necessary for that particular environment to run and this is the basic population of it that happens right so in this particular case They’re copying bin bash to that directory uh They’re copying uh recursively everything that’s inside of the library and Library 64 and everything that’s inside of the user all of that is going to be copied to the new directory that’s been made which is the jailed directory right the imprisoned direct I like saying imprisoned for whatever reason but so all of the contents of everything that needs to be used for that specific uh jailed environment it needs to actually be copied into that environment so it’s it’s this part is very very simple um the r command is a recursive command meaning it’s taking everything inside of the library as well as all of the subdirectories and the contents of those directories all of those things are going inside of the the jailed environment as well as all these other examples as well so what you want to do is ensure that the directory structure within the CH rout jail mimics the standard Linux directory layout uh essentially meaning that you would need the the binaries as well as the the system binaries all of those other things to be able to make sure that this actually works so ENT what ever you would need in a regular environment in a standard Linux directory layout whatever you would need in that standard layout for your particular environment you need to make sure that it also exists inside of this jailed environment because it is being isolated from the rest of the system once you’ve transferred everything inside of the jailed environment then you just use the CH root command to change the root directory for the current process to the specified directory so what you would do is just run pseudo CH route the path to the actual directory we’ve created and all of the contents inside of it right and so what that does is just changes the root directory for the current session to that particular directory meaning uh for when you’re logged in into the current session inside of that Linux machine once you’ve created this uh jailed environment and you put all the binaries and everything that you would need in order for it to run uh then you change the route to that particular directory and for the remaining session that you’re logged into it’s going to act as if this directory is your actual root directory and if you want to run anything and uh test any particular development upgrades or if you wanted to open up a a file attachment for example to see whether or not it runs properly or if it’s malicious or malware or anything like that you would do it inside of this particular directory to protect the rest of the system from it or or to test whatever you need to test uh without affecting the rest of the system and this is a full workflow flow from beginning to end so you have creating and populating their directory itself so you have the make directory and then this is going to be the name of the directory and then you’re going to copy everything that you need for that particular directory into it which is going to be uh in this case these are all the various options that it can possibly be so you’re going to have my CH root and then inside of my CH root you’re going to take the bin bash put it inside of the bin the lib is going to go inside of the root and then the other pieces the 64 version of it is going to go inside of the root as well and then you’re going to change the environment that you’re in to that particular environment right so you’re going to do CH root my chroot and then you’re going to run it and that’s it and then once you’re inside of the chroot environment you just want to make sure that everything is actually running as it should so you can run something like LS and the forward slash which means that you’re you’re trying to list the contents of that root environment so when you do the forward slash you’re essentially listing the contents of the root directory and if you have done everything correctly you should only see the contents of this new root environment uh instead of everything that you would normally see when you look inside of the root directory so it should technically only just be uh these pieces right here right cuz we copied all of these things so you should only see the bin and the lib and then lib 64 those should be the only things that you see once you run this LS command to see what’s inside of the root directory some considerations and best practices to keep in mind so you want to keep the uh chroot environment the jailed environment as minimal as possible M making sure that you only have the stuff that you actually need all the necessary binaries or libraries or software anything like that to just make sure that you’ve reduced the attack surface if you copy everything that’s inside of your normal environment inside of the jailed environment it’s kind of defeating the purpose of creating this isolated environment so you only want to use the things that you actually need for that exercise because again it’s only for that session anyway ways and once you’re done with that session you I mean you can reuse it it’s not like you can’t reuse it um but for that particular session you should just only be using the things that you actually need um make sure that all the file permissions within that Jail uh are set correctly to prevent any privileged escalation uh attempts and the Escape prevention to uh to make sure that the person if in case anybody has actually uh attacked that particular jail directory uh to make sure that they can’t escape essentially uh you want to avoid running any services or granting access to tools that can allow processes to escape the CH route jail which goes back to the very first point which means only include the necessary binary so you don’t want to give access to or you don’t want to copy any binaries inside of the jail that would potentially Grant the attacker uh an Escape Route right they don’t want to have a vector to get out of the jail and then get into the rest of your system in summary CH route is a very valuable tool for creating an isolated environmental Linux essentially creating a Sandbox for yourself uh which enhances the security by restricting programs to a specific part of the file system and it’s commonly used for running potentially untrusted applications like we said um development and testing as well as system recovery so this is actually a very useful little strategy um that comes embedded within Linux and you can essentially turn any new directory that you’ve created into this little sandbox environment to protect the rest of your system from anything potentially that may go wrong or just if you wanted to test something so we don’t you don’t even necessarily need to worry about uh hacks or anything like that a lot of times you just want to test a new development uh or a new upgrade in the code or a new upgrade in the software so on and so forth and you just want to make sure it doesn’t affect the rest of the system and uh wipe something on the system or crash the system or accidentally delete data so on and so forth forth so it’s a very useful tool to create an isolated environment also known as a Sandbox type of an environment all right now we’re going to take another look at file permissions and ownership and this time we’re going to dive a little bit deeper into this particular concept so uh as you should already know there are different levels of file permissions that we can apply to something and there are different groups that can have ownership as well as access to uh any of the files or directories or anything that exist on a particular system the three different categories would be the owner which would be the user or any other user so it falls under the other category as well but there’s the particular owner which would which would technically be a user um there’s the group and then there are others and then the others would also considered to be users and they could also be considered to be the group that may have access to it so we have these three levels of ownership or access okay and then these three levels also have three levels of permissions which is the read permission the write permission and the execute permission and so if we remember the read permission has a numerical value of four the write permission has a numerical value of two and the execute permission has a numerical value of one so if you had all of these turned on you would have a value of seven right uh if you only have the read and write you only have a value of six if you have to read and execute you have a value of five so on and so forth so these are the permissions and then they can apply to any of these particular ownership categories okay so the first one that we want to think about in this case is just looking at the breakdown of what these things are again and then looking at what these particular breakdowns are again just to kind of give you an idea here the very first character which is represented by this Dash right here um if it is a dash it is a regular file if there’s a d right here instead of that Dash it means that this particular item is a directory and then an L would be a symbolic link so on and so forth so this particular uh item this very first character represents the type of the file that it actually is the next three characters represent the owner’s permission so in this particular case there’s a read write and execute permission that has been attached to this particular item and then the following three characters represent the group permission so it is read not write permissions but only execute and then this will be the other category which is read no write permission and execute so the group as well as the others category both get read no writing permissions and execute and writing represents modification or writing to the file so on and so forth so you can read the file or you can execute the file you can read the binary you can execute the binary so on and so forth but you won’t be able to write to it you won’t be able to modify it okay that’s what this particular example represents knowing this now we can look at what it uh means to change the permissions of something right how to change the permissions of something and we can do this with ch mod also known as change mode and in this particular example we’re doing it with the symbolic version so instead of using numerical values we’re actually using the symbols which is read write execute so on and so forth so in this case we’re looking at this particular example again what we’re doing is we’ve given the user read write and execute permission so you plus read write execute and then group plus read and execute and other plus read and execute and then the name of the file name usually this also requires a pseudo right in front of it so it would be pseudo chod yada y y and so we’ve given the user these permissions we’ve given the group these permissions and we’ve given the others category these permissions as well and then there’s the numerical value the numerical mode of changing permissions which happens with the actual numbers themselves and so the first number represents the user the second number represents the group and the third number represents the others category and as we already established the read write and execute permissions total seven and so in this case they only have read and execute so read would be four execute would be one which totals five and then read and execute would again total five in this particular case so this is what it looks like to change the permission numerically for that particular file name and this exactly is representing what we did in this previous case which was we were doing this whole Spiel right here so everything that you see here actually turns into 755 in this particular case now if we wanted to change the ownership of this particular file we would do it using the CH own Chone uh command and so you can see that they’ve used pseudo in this particular example and we’re doing CH own user and group and then for this file name and so what you would do is you would just replace these two Fields right here with the actual user and the actual group um that you would want to dedicate to this particular file name so it would be you know user one for the developers group and that would be uh for this particular file name so you change the ownership of the file to the specified user and group and you replace user with the username and group with the group name and then it would change the ownership of whatever this file is to those entities that we have declared and this is what that looks like so we’ve assigned it to Alice and the developers group and that would be the ownership for the example. text file in this case then we have changing of the group so you can change the group ownership and you would just do it with the chgrp change group uh command and you would first use the uh first assign the group itself that you wanted to be changed to so let’s say again developers and then you would give it the file name and again they’re using the suit pseudo command uh to allow the pseudo or administrator type of permissions to this particular command cuz you are again you’re changing the actual group of a particular file the ownership of that particular file so that should require an administrator’s privilege and this is what it looks like as the actual example right so we’re doing the example. text and we’re assigning the ownership of this particular file to the developers group using the change group command so here’s a sample workflow here so we have the file that’s been created so by using touch we created this file then we did change mode to change the permissions of it and so the owner has a permission of six which represents read and write and then everybody else has a permission of just read which is represented by the four and that’s pretty much it that’s the permission that we have over here and then if we do LSL for this particular file it should show us that it only has read write and then everybody else only has a read permission for that particular file if we wanted to change the ownership of that file we could just use the CH own command same exact file name and then it’s going to be I mean you just saw this in the CH own uh portion of the presentation anyway so this is literally a duplicate command that we just saw but we are assigning the owner uh to Alice so Alice would actually be the user and then the group ownership would belong to the developers group and it’s for the example. text and then again you just do LS and with the dasl option so you can see who the file ownership is and uh it’ll show you uh the First Column that right after the permissions it will show you the name of the owner and then the very next column would represent the name of the group and it would be Alice and developers in this particular example and in this example we’re changing the group which you’ve already seen this command already as well but we just wanted to kind of reaffirm this particular series of commands here so this this is how you change the group and then if you wanted to see who the new group was you would just do ls- L and it would show you that change so in summary understanding and managing file permissions is very important to system security because you don’t want people who should not have access control or should not have access to a specific fer directory to actually have access to that fer directory and to guarantee that to confirm that you have only assigned uh permissions for uh certain items s to certain people or certain groups you would do it with these various options so you would change the permission for everybody right according to what should be the permissions for it some people should not have any permissions right so you can remove the read write and execute permissions from every single person by doing a minus instead of a plus so in the previous example so if we go and look at just the particular example where we had the let me real quick quick skip to it in this particular example where we’re doing a the others group and we’re doing plus read and execute we could just as well do minus read and execute and it would remove the permissions for that same thing with the group we could do group minus read and execute and it would remove the permissions for that so just depending on what the instructions are and what you’ve been told to do cuz they’re going to tell you you know these groups of the company should not have access to these files or directories so need to remove permissions of anybody for this particular directory and all of its contents and when you assign when you bring in a new employee and they have access to a certain group and all of the assets that belong to that group this particular subcategory of those assets should not belong to these new employees unless they’ve hit a senior level secure uh a level of seniority excuse me and then when they hit that level of seniority then you can give them access until then they should not have access to it so you remove access to that specific category of files or folders by doing the owner or group or others and then just doing a minus command for that and then if you wanted to do it numerically then you would change these things to zeros and the zeros would represent no permission so it would be 70 meaning that the group as well as the others category have no permissions they can’t read they can’t write and they can’t execute that specific file so this is what’s important about the change owners ship and the change mode which means the permissions of it and of course the change Group which would change the group that owns that particular asset so this is a very very simple series of commands but they’re very powerful series of commands especially when it comes down to access control lists and making sure that people who should not have access to something don’t have access to those things and then whoever needs to have access to it actually can access whatever those assets are which brings us to access control lists so Access Control lists are a way to provide more more fine grained control over file and directory permissions uh other than the standard Unix file permissions that we just reviewed so with an ACL and access control list you can Define permissions for multiple users and groups in a single file or directory um or on a single fil in directory excuse me uh allowing for these specific access levels beyond the traditional group others and owner model so this is how we would go about doing it for first and foremost we need to have the entries of the access control list uh which means uh it’s basically a list type of a format and it’s uh each entry specifies the permissions for a single user or a single group um and it consists of the type which would be user or group The identifier which would be the user name or group name and then the permissions that are set for that which would be readwrite or execute so it I’m going to show you obviously examples of that um there’s going to be the user access control list the group Access Control list there’s a mask Access Control list and then there’s the default ACL so the user one specifies permissions for a specific user the group specifies permissions for a specific group a mask ACL defies the maximum effective permissions for users other than the owner and the groups so this is the maximum permissions that they have and everything beyond that they don’t have access to and a default ACL specifies the default permissions that are inherited by new files and directories created within a directory so anything that’s inside of a directory would essentially inherit the permissions of that directory uh so if the directory has a permission level of seven meaning you read write and execute essentially everything inside of that directory would inherit all of those permissions so it would also be rewrite and execute for everything that’s inside of that directory so the basic command here would be set f F ACL so set faac would set the ACL itself and in this particular case would be the mask for the user and then the read write and execute for the file name right so U represents user the user itself would be the actual name of the user and these are the permissions that are being assigned for that user um this is the actual breakdown of the command that we just saw so the M I’m sorry so the m is not mask the M actually stands for modify so my apologies for that um the explanation here is that we’re adding read write and exq permissions for these specific user on that file name and then we’re using the m to modify the ACL entries and then this is the actual uh string or the actual format of how to set permissions for that user which is in this case the user would be the the username so this could be user or this could be you this would be Alice and then these are the permissions that are being assigned to Alice now if you wanted to view the ACL for that specific file name you would do get fac so the first one was set faac this is get faac and then it displays the ACL entries for the specified file which in this case would be the file name showing all the users and groups within their uh with all of their defined permissions so whoever they are and the uh the level of permissions that they have on this particular file would be displayed by doing get fic the first one was again set fic and now we’re looking at the file name permission which would be get of ACL so this is the example workflow so we have pseudo because this does require administrator privileges and we’re setting the access control format for this particular file right here by modifying it and then it’s going to be for the user Alice and then she’s getting read write and execute permissions on this particular file so set faac modify for the user Alice readwrite and execute and of course the U is separated by a colon and then the the username and the permission levels are also separated by a colon and so pseudo F pseudo set ficm yada yada Y and this is how we add a user permission for a given file if we wanted to add a group permission it would exactly be the same entry so setf AC still going to be modified don’t only thing that we’re changing is instead of U we’re doing G for group and then we’re going to assign the name of the group which is developers and then they all will have a read and execute permission so they can’t write to the file or modify the file but they can read the file they can execute the file and that would be the example txt file again so this is how we set permissions for a group in this particular case and then we have the Set faac uh for directories right so this is the actual directory and in order to do that we need to assign the D flag or the D option in this particular case to designate that we are modifying uh the access control list for a directory so pseudo set f-d to designate that this is a directory DM to modify and then again for the same user and now we’re giving the path to the directory instead of the name of the file and then we’re going to view it so if you wanted to just view the uh the access controlers permissions for all of the groups and user users that have been assigned to this particular group you just or for this particular file excuse me you just do get faac and then the name of the file very very simple and then if you wanted to view the current example and then we can view the access control list for this particular file so we would do get fic and it gives us the access control list of the groups and the users and whatever permissions they have on this particular file and this is what the example output for that command would be so so the name of the file would be example txt the owner itself would be root the group would be root and then this particular user has this permission and then this particular user has readwrite and execute permission and then the group has this permission the group developers has read and execute the mask itself would be readwrite and execute and the other group or everybody that falls into the other category only has read permissions on this particular file right here to remove ACL entries would be done with the X option so it’s still a set FC command but now you’re doing the X option to remove uh the particular user from this particular file right so you don’t have to worry about the permissions or anything like that because you’re literally removing that entire user from the access control list on this particular file so whatever permissions they had is all being removed because we’re just removing the actual user from the particular files Access Control list to remove all of the access control entries for any given file it would be done with the dasb option and again it’s still a set f-b and then the name of the file itself if this was a directory we would do dasd to designate that it’s a directory then we would do DB to designate that we want to remove all of the entries and then we would give the name of the directory but it’s still a set fac command that is going to remove all of those directory uh entries or the a ACL entries excuse me so DX would be for a singular person for a single removal so it could be a group as well so you could technically do-x and then do G right here and then the name of the group so developers let’s say so we do G for group and then the name of the group developers and then we would give the name name of the file but we would do with a-x to just remove a singular entry if we wanted to clear the entire set of entries if we wanted to remove everybody from the access control list we would do a-b command and then we would just give the name of the file if it’s a directory you would do d d as well as DB and then you would do the path for the directory and then it removes every single entry for the access control list on that particular asset to modify the mask you would also use the set faac in this particular case and then we are using the- M to modify but what we’re doing in this case we’re modifying The Mask which is rewrite execute for this particular file and what that does is that anybody so anybody any user and group specified by this Access Control list for this particular file they all have rewrite and execute permission so even if you did user Alice and read if the mask itself is read write and execute then Alice would actually get read write execute permissions on this particular file and then if the developers group is in here and they only have read as a permission if you do readwrite and execute for the mask then it would allow it that they would be able to read write and execute for everybody that’s inside of the developers group on this particular file so in summary the access control list is an advanced method for managing file permissions in Linux allowing specific access levels for multiple users and groups the commands set fic and get fic enable you to set and view these fine grain permissions easily and then you already know the various options that we have so if you do you know dasm you’re modifying the permissions and that goes with set fic if you do-x you’re removing a singular person or singular entity from the list if you do- D you’re designating that it’s a directory and if you do dashb as in boy you’re removing every single person and every single entity from that access control list and then you would modify them you know specifically if you wanted to add a user you would have to have the U in front of the username if you want to add a group you would have the G in front of the username so on and so forth so I’m not going to repeat all of that stuff because you could just re rewind it and just go watch all of that Al together but uh set fic and get fic are the commands that we would use to uh set the access control list for any given asset and see the access control list for that asset all right now we need to talk about network security which is also very very important concept under the security umbrella and the very first portion of it would be the management of the firewall we’ve already done an intro to ufw which is the uncomplicate ated firewall as well as IP tables but we’re just going to review these things a little bit more so you should already know that firewalls are very important in network security they act as a barrier between your internal and external networks um and they monitor and control incoming and outgoing traffic and these are done with rules that we establish so uh both ufw and IP tables have sets of rules that you can use to ensure that whatever you’re trying to do uh gets done right so uh the first thing that we’re going to talk about is the ufw the uncomplicated firewall the uncomplicated firewall is a very simple firewall but it’s a very powerful firewall it doesn’t have require uh it doesn’t require like very complicated uh commands or understanding a variety of different sophisticated binaries uh to be able to run it it has easy syntax and it’s powerful it actually does what it needs to do right it gets the job done essentially um to first run it to actually activate it you need to run pseudo ufw enable and essentially everything else that we do is going to require a pseudo command to preface the rest of the commands so first you need to enable the firewall you need to actually activate the firewall the next thing you want to allow or deny traffic now to be able to allow traffic uh in this particular case what we’re doing is we’re in the First Command uh this Command right here is allowing incoming traffic on Port 22 which is SSH right this particular Comm and you have to if you want to do outgoing traffic as well if you want to allow outgoing traffic on SSH you would need to also say pseudo ufw allow outgoing excuse the capital S right here it’s a lowercase s for pseudo so anything that you want to uh set up as a rule that would be outgoing outbound traffic you need to put the keyword out in it so this particular command at the very top this first command is only dealing with incoming traffic so it’s allowing incoming Port 22 traffic same thing with this command it’s allowing or it’s denying incoming Port 80 traffic in this particular case we would be denying outgoing particular uh uh HTTP traffic on Port 80 right so uh pseudo ufw deny outport 80 traffic would be denying outgoing outbound HTTP traffic on Port 80 if you want to check the status of what’s going on with all of the rules that you have have that would be done with the ufw status command so it will show you whether or not the firewall is actually active and then what all of the active rules are that are running on the ufw firewall this is a new command that we’re going through which is uh allowing traffic from specific IP addresses right so you can say ufw allow from this IP address to any port on Port to any port 2022 I keep saying 2022 I don’t know why I keep doing that but it would allow anything from this particular IP address to any port 22 so it allows SSA traffic from this IP address on Port 22 um you can do a deny that would be on Port 22 as long as you have this allow from this IP address now you’ve whitelisted this particular IP address and even though everybody else could be denied on Port 22 this particular IP address will be allowed to come in and again this is inbound right cuz we haven’t done allow out we’re only doing allow which means that it’s inbound traffic incoming traffic and it’s coming from this particular IP address on Port 22 so this is how you allow a specific IP address IP tables would be the more complex or we can call it the sophisticated it would be the sophisticated counterpart of ufw um it allows more detailed control over the network it allows ad administrators to create complex rules for packet filtering Network address translation which essentially means that it masks your IP address so that people from the outside can’t see your actual IP address so when you send out traffic from your network it’s uh it’s masked essentially um by a different IP address and that IP address would be what the outbound or the outside world would see which is a very very powerful tool actually and then you know there’s mang and so on and so forth so it’s very very useful but it does require that you have a better understanding of networking Concepts the very first thing would be to just learn and see what your current rules are so you can just do pseudo IP tables DL with a capital l and it will show you all of the current rules for your filter table so this is the other thing right so you have a variety of tables that exist inside of Ip tables so in this particular cas case without designating what table we want to look at the default will be the filter table so it’ll show you the input forward and output chains for the filter table if we wanted to add a rule to our table uh we would do it with the a so capital A which would be either append or add however you want to remember it but it would be a capital A and we’re doing it to the input table and notice that the input uh table is also in all caps so you’re doing capital A input and then the protocol would be TCP so this is TCP traffic that we’re allowing to happen and then we’re doing on the destination Port 22 and then we want to do an accept for it so the J I believe is Jump I think that’s what it stands for um and what we’re doing is accepting the traffic on destination Port 22 and this is for input traffic which represents incoming traffic that’s coming in on our input table or input chain excuse me on the input chain on our particular table so we’re doing adding on the input chain on the protocol TCP destination Port 22 and we want it to be accepted if you want to block traffic again you’re adding it to the input chain protocol would still be TCP and the destination port in this case would be 80 and then what you want to do is you want to drop the traffic so there’s no it’s not deny if you want to block something you’re dropping the traffic so the previous one was accept this one is drop if you want to save the rule that you just created the IP tables rules uh you would do it with the iptables-save command and then you need to add it to the configuration file which is a rules. V4 config file that is inside of the Etsy IP tables directory so inside of once you have IP tables installed inside of the IP tables directory inside of the ETS directory there’s going to be a file called rules V4 and these are all of the rules that will persist right so when you restart the computer the all of the rules that you just created will also be saved so that the next time the computer reboots all those rules are still active um if you want to restore rules you would do restore and then notice the arrow right so in this particular case we have this forward slash which uh I guess is the greater than sign so we are saving the rules that we just created forward uh forward sign and then it’s going to go inside of the rules V before if you want to restore it when you use the restore command you’re using the less than symbol and then you’re going to use the same path which is going to come from the the rules. V4 file and it’s restoring the rules from a saved file uh just in case you whatever reason for whatever reason you need to restore your rules if somebody changed your rules or if you changed your rules and you want to go back to your previous rule set that You’ saved you would pull all of those rules from your rules. V4 file by doing the restore command in summary we have the simplified management with ufw uncomplicated firewall and then we have the IP tables which is Advanced control for detailed Network traffic management you have the network address translator you also you also have the mangles and all that stuff which we covered in the first description of the IP tables and the ufw but we needed to talk about firewall management because we are talking about network security under the security chapter so it was very important to re-review these files or re-review these tools um but we are going to actually use them when we get to the Practical section of this training series anyway so we’re going to run a bunch of commands and we’re going to create a bunch of rules and do a lot of things that will be relevant to your labs and uh ultimately your skill set as a Linux administrator when you want want to manage and you want to configure firewall rules for either ufw or IP tables another really important tool for security is actually SE Linux so security enhanced Linux um I’m just going to call it selinux uh selinux probably I don’t know if it’s selinux SE Linux I kind of like selinux cuz it it removes one syllable so selinux is a security module in the kernel that provides a mechanism for supporting Access Control policies includ including Mac Mac addresses um it’s commonly used in the red hat based distributions like Fedora Centos and red hat Enterprise Linux and the key concept here is that there are policies right so we have policy-based security um and the policies inside of selenex uh Define the rules for which processes and users can access which resources so these policies are strictly enforced providing an additional layer of security Beyond traditional discretionary access control which is also known as DAC so these are an additional layer of security and the they are very strict right so these are strict enforcement to set the rules for which processes and users can access which resources um the modes of operation are to enforce to permit or to disable so you have the enforcing mode you have the permissive mode and you have the disabled mode selinix policy is enforced and access violations are blocked so this is what enforcing is permissive is that the policies are not enforced but violations are logged for auditing purposes and then there’s the disabled which is it’s just turned off and it’s not working so you actually have the enforcing rules that anything that violates the policy is being blocked you have the permissive which is still logging everything but it’s not blocking the actions right so if there are malicious actions they’re not being blocked but everything is being logged so that it can be audited later on and then you have the disabled version of this so our very first basic command would be to see the status of what’s going on so the to be able to uh view the status of selenic including what mode it’s running under and all of the loaded policies or whatever the policy is that’s loaded you just do SE status so selenex status right SE status and then you would be able to see the current status as well as the policy that’s being enforced if you want to set the policy to enforcing mode in this particular case what we’re going to do is do set in force right so set in force and then one I believe represents true so zero would represent false one would represent true and in this particular case we’re saying that we want the enforce policy to actually be activated so we do set in force one and it changes the cenx mode to enforcing and this command ensures that all cink policies are strictly in forced if you do set in force zero it goes into permissive modes yeah so I I was actually uh misguided or misinformed I Mis assumed um the set Linux to permissive mode goes into set en force zero which changes it to permissive allowing violations to be logged so one represents the enforcing mode to actually be active and it is enforcing all of the rules and zero represents permissive mode so that it logs everything but uh it doesn’t block anything it doesn’t enforce anything of the rules or policies that may uh be in place and then we have checking the status as we’ve already established and then we have the Practical example or the the rule set to just kind of re remind us of how to set enforcing mode which is in this case set enforce one and then if you wanted to set the enforce to zero you would be putting it in permissive mode and this is essentially what the selenic Practical examples would be in this particular case uh we are going to go into the Practical commands when we actually get into the Practical section of this training of this training Series so that you can learn how to use this particular tool in depth another useful tool is app armor so app armor uh also known as application armor is another Mac system that provides and Mac we’re talking about Mac not Mac as in uh Apple so it’s another Mac system um that provides an additional layer of security by conf finding programs according to a set of profiles it’s commonly used in De based distributions like Ubuntu which is what C Linux runs on and so on and so forth so anything that essentially runs on davan or Ubuntu um is what app armor uses because it deals with applications specifically um the key concept is that there’s profiles in this particular case so previously we had policies which was in sellx now we have profiles inside of app armor and the profiles Define the access permissions for individual applications they specify which files and capabilities an application can actually access preventing it from performing unauthorized action so think about this as when you try to turn something on inside of your windows or inside of your um Mac OS and there’s a little popup that comes up and it says you know do you want to allow Google Chrome to access your microphone for example and this would be something that’s specific to the Google Chrome application and then it’s now giving uh your you’re giving that specific application access to the microphone or your downloads folder right so if you want to if you download something and it deals with the files inside of your file system uh once you try to run that application there’s going to be a popup that shows up from Mac OS or from Windows that says hey do you want to give this particular application access to your documents folder or your downloads folder or your pictures or so on and so forth it starts asking for permission to navigate across your computer and so this is what app armor is similar to and because of the fact that you have applications that are downloaded on an obuntu based distribution um then you are now dealing with the actual app itself and the app needs to be given permission to do a variety of tasks across your machine so we have the learning and enforcing modes in this particular case so enforce profile is uh authorized to access attempts and uh unauthorized access attempts are blocked excuse me so the app armor profile is enforced and unauthorized access attempts are blocked and then complain would be that unauthorized access attempts are allowed but they’re logged for review so this is similar to the enforce and the passive or permissive I think it was um it’s very similar to those particular profiles that were inside of sellic they’re just named differently so in this case we have enforce that it enforces the rule and any unauthorized access is blocked and then you have complain that uh allows the attempt but it just logs it for review uh the basic command to check the status would be pseudo AA standing for app armor Das status and it displays the current status of app armor including which profiles are loaded and their enforcement mode and then you have setting the app armor to enforcing mode for any given profile so in this particular case you would do AA enforce and then you give it the path to and it’s a it’s a fairly lengthy path but it is the path to uh the specific application that is going to be uh enforced for whatever the rules are so the profile for a specific application to enforcing mode ensuring that the rules are strictly applied to whatever the name of this application is going to be and then you will need to get the name of the application as it is inside of the user binaries uh and it’s very different from what you would see uh for Google Chrome for example which is a capital G Google and then there’s a space and a Capital C Chrome it’s rarely like that it’s typically all one word it’s typically all lowercase so you need to find the name of the application as it stands inside of your binaries or your optionals or wherever that application is actually installed and whatever that path would be to that application and then you would enforce the app armor rules upon it you would enforce the app armor enforcing mode for any given profile if you wanted to set the policy or the profile to complain then you just do AA complain and then you just give it the the path of the application very similar to the previous one the only thing that’s changed in this case has been aa- complain instead of aa- enforce as we saw over here and that is how we designate the complain mode for that specific application just a couple of practical examples here so again you can just do AA status to get the status of app armor you can do AA enforce to enforce a profile for a specific rule or for a specific application so in this case it’s Firefox right so Etsy apppp armour. D user. bin. Firefox and this is the specific application that is now enforced whatever the rules are they’re being enforced upon Firefox in summary we have both selinux and app armor that are robust security mechanisms for l systems through mandatory Access Control policies that’s what Mac Mac stands for so you have discretionary access control which was DAC and then you have mandatory access control which is mac and while selenex is typically used in Red Hats distributions app armor is used in deas distributions and emphasizes application specific profiles uh selenic focuses on systemwide policies across the entire system app armor is honed in on specific applications and they’re both very very useful and they do deal with mandatory Access Control policies which are also very very useful so Mac mandatory access control and that’s really what it means right so it’s like when when you go through coma cyssa plus which is uh an examination that I had the privilege of taking they give you a lot of situations they give you like a breakdown of okay this is mandatory access control and this is what it applies to and so on and so forth but you don’t really get it until you actually go through some tools that enforce those things and you’re like oh okay so when I enforce uh you know Firefox to not have access to my microphone for example that is technically a mandatory Access Control policy that mandates that that specific application cannot access my microphone and then until if I wanted to access my microphone for a zoom call or something like that or for a Microsoft teams come Zoom is actually its own application so Microsoft teams or whatever or let’s say dis uh what is it called Discord uh you can also have voice conversations on Discord so if you want Firefox to actually finally get access to your microphone when you do those voice calls then you do need to go and give it that permission inside of app armor for example if you’re running Linux right so this is very important to understand that this is actually where the rubber meets the road and these specific concepts of Mac there that’s how you enforce them by using something like app armor which it it could be as simple as a popup that shows up on your screen that says hey do you want to give this application permission to do this right it could be that or you can actually be going inside of your settings or go and inside of your terminal and use the the enforce policy or the enforce profile for app armor against the Firefox tool itself so um this is the difference between app armor and selinux all right now we’re going to switch gears a little bit and we’re going to go into user authentication and configuring secure shell which kind of actually do go hand inand so first and foremost let’s talk about user authentication methods um there’s password-based authentication which is the default mode for authenticating any given user everybody gets a password and you have to enter your password correctly to authenticate yourself to prove that you are who you say you are now the users are given a username and they’re given a password to gain access to a system to gain access to an application this is not news so if you don’t know if you don’t know this and you’re watching this tutorial you’re in trouble right so it’s like to understand that there is a username and a password for everything in this world anything and everything has a username and password YouTube that you’re watching this on most likely you have user uh profile with Google that’s connected to your YouTube account and you provided your user uh Gmail as well as your password if you’re watching Netflix you get a username and password if you want to access your phone there is a pass phrase or a PIN number that you have to enter to access your phone and then when you do your face scan or your fingerprint that is still authentication but now it’s going into Biometrics which I’m kind of getting ahead of myself but essentially you’re authenticating yourself in a variety of different ways and the very first one the most basic one is passwords so you get a password-based authentication password-based authentication uh improves the security of any type of an environment and to be able to improve the security of the password you do something like multiactor authentication which is also known as MFA and that could be something like a code that’s been sent to your phone or your uh Gmail account your email account they send you a secret code a onetime code and then you enter that and you can access the system the fingerprint scan is a version of the biometric that we were talking about that helps you multiactor authenticate yourself to be able to get access to that system and these things are done in addition to the password so if you’re accessing your bank account on a new computer or on a new browser or you’ve it’s the same exact browser or same computer but you reset the computer like right you you reformatted the computer and so all of your cachets are wiped or you just wiped your browsing history from chrome and your caches and your cookies are no longer saved when you do something like that it says oh you’re logging in from a new browser we’re going to send you a one-time code in addition to the password right so you enter your email and password you log in and it says okay we’re going to send you a onetime code and then when that happens now then they ask you do you want to save this particular browser for future references and then that’s how you develop new cookies and new cachets right so this is the whole process of multiactor authentication and it enhances the password authentication and it’s a very useful way to reduce the risk of unauthorized access because sometimes somebody may get access to your password but if you get text a code saying hey enter this in your login most likely that person won’t have access to your phone number or your email hopefully I mean it’s scary to think about but it it is possible for people to get access to your email and even your phone it’s just not as easy as somebody running a dictionary attack and finding out your password if you have a really weak password so um yeah again I’m getting I’m going off on tangents and I’m getting ahead of myself but uh we can enhance password based authentication by using something called multiactor authentication which is very simple and you just send a a code to somebody that’s one of the most useful ones and it’s very very useful the next level up would be a public key authentication and it’s more secure than password because it involves the use of a key pair so a private key and a public key the private key remains within the user or with the user while the public key is placed on the server and this goes into the realm of symetric and asymmetric uh encryption that happens typically with transactions that are done with your browser so uh a transaction is you viewing something on your browser but there is the private key and the public key that is available from that website so the private key is something that you can’t see from the certificate authority of that website that they have to authenticate themselves and there’s the public key that is given to you the viewer so that you can verify yourself and you can go back and forth interacting with the conversations or the interaction the transactions within that specific uh browser within that specific website right so you have a public key Authentication that just supersedes it it is uh it’s an amplified version of the password-based authentication um it had enhances your security so it is no longer a uh subject of Brute Force attacks because you can’t brute force a key right and the the private and the private key or private and the public key excuse me um it doesn’t require the transmission of passwords over the network because you’re just dealing with those keys it allows for automated passwordless logins which are particular particularly useful for scripts and applications and this does include at least a one-time login though because there is that initial U authentication that needs to take place with that uh password but then you just you automate the rest of that process because you now have a public and private key so to speak that uh communicates with that website or that application so that you no longer need to do a a password entry and this is how when it remembers you when a browser remembers who you are and you don’t need to provide that password anymore the next time that you log on to Facebook it just logs you in right the next time that you log on to Gmail even if you’ve closed the tab even if you’ve closed your browser the next time that you log on then it’ll actually just log you back in without asking for your password because the key is in place um if you wanted to generate a key you would do it with s SSH key gen and this is a little bit complicated of a process so we’re not going to go too deep into to this uh we will when we get it to the Practical section of this training series and we start doing these things um later on but uh you do SSH key gen and it actually generates a new key pair and you’ll be prompted to enter a file to save the key2 which is typically the SSH ID RSA and then optionally you can set a passphrase for an additional layer of security on that actual key right so if somebody wanted to access that specific key file they would need to enter the password to be able to access that key file so now you have multiple layers of security and so you create a key using SSH key gen and you can even uh designate the algorithm the hashing algorithm of the key that you want to generate so do you want to Shaw one sh1 do you want to sha 256 so on and so forth right so you can designate the hashing algorithm that you want to be used when you’re creating this SSH ID RSA by default it does a Shaw 256 key which is a very very pass uh powerful hashing algorithm this is what the output looks like so when you actually run that SSH key gen this is what the screen will look like so these are individual commands that show up right so first it says is generating it enter the file uh that you want to save the key to and then you would say such and such and then you press enter and then you say it says enter the pass phrase so if you don’t want a pass phrase you just press enter and it moves on but I do recommend you actually have a pass phrase for your key and then you verify your pass phrase again and then it’s been saved and then it’s been saved and then the key fingerprint is a shot 256 as you can see right here as well as the username uh and the host and it’s like a long series of characters that comes in after this particular portion right here and it seems like jargon and I mean for the most part it is uh it’s like you you can’t make out what it is because it it very much looks like a code like a long piece of encryption code so you you can’t make sense of it with a naked eye you need to feed it into something at the very least to try to use some other type of decryptor to be able to get access or decoder I should say you should you need to use a separate tool to try to make sense of what you just found but for the most part you can’t because it’s not designed uh to be able to be decoded or decrypted without its actual key right so whatever is generated nobody can make any sense of it unless they have the key they can’t unlock the lock unless they have that key which is why this concept is so powerful now that we’ve generated the key now we want to copy that key to the actual server so you would do SSH copy ID and then the user at whatever the server is and this copies the public key to the server placing it inside of the authorized keys of the SSH directory um for the specified user and this step allows the server to authenticate the user based on the public key copy the public key to the actual server if the SSH copy ID is not available you can manually copy the public Key by going and finding where it is so this is the actual key location right so where we when we went over here it said that it was saved inside of the home user and then this is a hidden uh directory and we’ll we’ll look at this when we go into the Practical section when you’re looking for a hidden file so if I did a regular LS command without looking at the hidden files this would not show up so this is a hidden directory and then inside of the users home folder um the hidden directory includes this ID RSA file so this is actually being saved inside of the home folder of the user and so if you can’t do it uh autom automatically using the SSH copy ID you can do it manually by going through these various series of commands right here so we can see that we’re going to concatenate this specific key and then we’re going to pipe so this is what this pipe is and we’ll talk about this again when we get into the Practical section but what we do is that we take the output of this command so cat as you should already know will display the contents of this file but when you take the output of this which is displaying the contents and you pipe it into this command which is using the SSH uh binary to log into this specific user and then make the directory of this specific directory right here and then concatenate that so you should already know what these double ends represent right so we’re combining a series of commands here so we’re going to do SSH user server we’re going to make a direct Dory for this specific directory inside of the root and then we’re going to concatenate that into the authorized keys so it’s a series of commands first we read this we take the contents of this and we pipe it into the SSH command that goes and creates a new directory and concatenates the contents of that inside of the SSH authorized keys this you don’t need to memorize you don’t need to know what all of this represents right now I’m just showing you what a manual version of this looks like so you kind of get exposed to it so that as we review it later at least it was embedded in your head at some point and then it’ll make it’ll it’ll be easier to make sense of it when we go into the later portions of this so you don’t need to memorize this you don’t need to know this off top of your head right now you should know what this is right you should know what this specific piece represents oh this is a key file for uh SSH where we’ve generated an RSA key file and it looks like that they’re adding it to the author authorized Keys uh list of authorized keys for this particular user right so you don’t need to know all the details but you do need to recognize these specific points so that you can see what is potentially going on right as long as you can make sense of it you don’t need to know the exact details of everything that’s going on that’s that’s the main point that I’m trying to show you here once the key has been copied into the authorization Keys the authorized Keys then you can actually SSH into that that server with that user and this is a very basic SSH command so you’re just secure shelling as this user into this particular server that’s all you’re doing um once you set it up and copy the public key you can log in without being prompted for password that’s the whole idea here um again this whole piece requires some kind of authentication at some point because you can’t just add a key to the authorized Keys folder without being authenticated at some point this is assuming that you’ve authenticated yourself with a password at some point in this process before you started this process and now the system trusts you therefore it’s allowing you to transfer this key to that authorized keys and once you’ve done that then you can access the server without entering your password if you have never entered your password and you’re trying to access the server as this user it is going to ask you for a password I don’t care I don’t care how uh great you’ve done the rest of the stuff that we just talked about if you never authenticated yourself none of those things are going to work therefore at this point you’re going to be asked for a password so the summary here is that you can have a password-based authentication which is the default mode of verifying who you are with any kind of a system but then you can have multiactor that enhances that password-based authentication something like sending you a onetime code or your fingerprint or your face scan something like that and then you have the public key key authentication which is a stronger security for using key paare it still requires at some point you’ve entered a password to verify who you are so that you can generate a key pair and then transfer the key pair from your where it’s currently sitting as your ID RSA inside of your authorized keys and then you’ll be able to enter whatever that server is without entering your password again right so it’s in some point for this at some point you do need to provide a password otherwise none of the other stuff is going to work so just keep that in mind okay now that we’ve talked about authentication we need to talk about secure shell and configuring secure shell so secure shell is a very powerful tool for remote access and it still is used currently um in the modern era in 2024 going into 2025 secure shell is still one of the most powerful ways to access a Linux server specifically Al um so it runs on Port 22 by default and uh for the most part the only thing that is required to access secure shell is a password unless you do other things to enhance the security which is what we’re going to be talking about when you enhance the security of something you are hardening the security okay so we are going to harden SSH configurations to mitigate any potential threats and these are some of the key steps to do it number one you want to change the default Port so by default it runs on Port 22 simply changing the port can help you reduce reduce the risk of automated Brute Force attacks that Target that default Port because everybody and their mother if you even if you’re like a brand new hacker you know that Port 22 is secure shell and it is the port for remote login so you’re going to attack Port 22 for the most part so the first thing would just be change the default SSH port and you can do that through the SSH configuration file by doing that or the way to do that would be to actually go into the sshd configuration file so you already know that sshd stands for the Damon of SSH and there’s a configuration file for it you’ll find the line that says Port 22 and it’s typically um commented out because it’s not modified so you need to uncomment it meaning just remove this hashtag at the beginning and then change it from Port 22 to 2222 for example and then you can also change that for literally anything else so there’s the top thousand ports which are usually assigned to something so you don’t want to use any of those top thousand ports you want to find anything past thousand or past 2,000 because it is not going to be a common Port anymore and at that point you can just use any of the 65,000 ports or let’s say 63,000 ports if you don’t consider the first two ,000 ports anything past 63,000 you can literally use any of those to be your Port 22 or your SSH Port excuse me it could be the replacement for Port 22 and once you’ve done that using Nano you can then just uh save the file and close it out and now you have uh reassigned your actual port for SSH the next that would be to disable root login so not allowing the root user to actually log in via SSH is a very strong move because if they are if any hacker is allowed to actually log in as a root user they get all the root permissions and I mean just figure out what the rest of the problems will be after the fact so you just disable root login and then it forces whoever the attacker is or whoever anybody is to log in as a standard user account and then they have to escalate privileges if they need to get the rest of the things that they need to get done so first logging in as a standard user is going to be a problem for them especially if you have really strong password policies that you enforce in your company once they log in as a standard user now they have to find a way to escalate Privileges and actually become an administrator or become a root user to be able to do the rest of the things that they want to do so that would be another really simple move that’s very very powerful you just disable the root login now the way to do that would again be inside of the sshd configuration file which would be with the permit root login portion so again you just find this particular line that starts with permit root login and then it says prohibit password is the default so you uncomment it you remove the hashtag and then you just say permit R login no so you remove the prohibit password portion which means that as long as uh they have the password they can get in it’s prohibited unless they have a password that’s essentially what the default is and what you want to do is you just want to change it from from this to no nobody can log in as root root login is not allowed and then you just save the file and you exit the editor the next portion would be to limit the SSH users so you just designate which users can actually log in Via SSH and nobody else can unless they’re on that white list and this is also another very powerful tool that is very very simple to do and it just goes miles as far as security is concerned so you have a handful of people that can log in via the SSH portal um and this is again done on the SSH configuration file so you find the portion uh where it says allow users uh if it’s not there you would just add it yourself and it is case sensitive so it is capital a capital u allow users and then username one username two and obviously those are the actual usernames that can log in Via SSH and I mean I would keep it to a small group of people I would not go crazy with this you don’t want a bunch of people to be able to log in Via SSH you just want uh whoever the admins are and whoever the specific uh it administrator is or the CEO or a CTO whoever those important people are you just want those people to be able to access SSH and then from there nobody else can access SSH and just close it off close it off to everybody else if they want to access their file systems remotely you give them a sep portal that is encrypted and you give them a different way that they can access a file system remotely they should not come in Via Port 22 or the SSH Port whichever Port has been designated for that specific service you do not want them to use SSH you want them to use a different login mechanism that is encrypted and runs across a VPN and a variety of different authentication methods so that they can access the file system remotely and do what they need to do they should not be coming in Via secure shell that’s the whole point here once you have done all of those things you need to restart the SSH service by just doing a system CTL restart command and it will restart the service which means that it’ll apply all the configurations that you just made to the configuration file for SSH so this part is very very important if you don’t restart it then it will not enforce all of those rules that you just added to the configuration file F in summary you want to change the default SSH Port you do this by editing the configuration file finding the portion that has the port 22 and then changing it to whatever your new port number is going to be you’re going to disable root login in the same exact file you’re going to go and find permit root login and you’re going to change it from whatever the current setting is to no simply no no root user is allowed to log in Via SSH and then you will edit the uh config file by adding the allow users parameter the allow users option so that you can uh designate which L users which limited number of users should be able to log in Via SSH and then after the whole thing is done you’ve saved the configuration file you need to restart the SSH system the SSH service so that all of the rules that we just created will now be enforced and that way you can actually conect configure your SSH for secure access and now we need to talk about encryption and the secure transferring of files which is another very very important concept so um encrypting data with gpg so gpg is a tool for communication securely right so securing Communications and data transfer essentially um it uses asymmetric encryption which involves a pair of keys a public key and a private key as we’ve already discussed with our key genen portion the public key is used to encrypt the data and the private key is used to decrypt the data so public key locks it private key unlocks it this ensures that only the intended recipient recipient who possesses the private key can read the encrypted message my accent kicks in sometimes and I’m like oh my god um so only the person who has the private key is the one that’s allowed to decrypt the message or file so that they can get access to its contents so it’s very simple simple concept but again really really powerful concept so we’re doing it with gpg so you generate a key with gpg you do gpg D- gen key it generates a new key pair you’ll be prompted to provide the name email address optional comment and you can also set a passphrase for additional security which I always recommend that you do and then once the key has been generated you select the key type the size of its that you want it usually uh the default is very useful but I do recommend if it gives you like a really massive option I do recommend getting like the largest type of key that you can find because it the bigger the key type is the more powerful it becomes and the harder it becomes to be decrypted um you set an expiration date for the key if you want to do that and then you enter a passphrase if you want to private uh protect a private key which I again I recommend that you do that so these are the steps that you would do to generate your key with gpg this is what the output looks like so you run the gpg uh command and then this is the top portion of it and it says it needs to construct a user ID to identify your key so the real name would be Alice the email address would be this person comment would be this you selected this user ID Alice y y y change email comment or is everything okay and then you just say okay and you press enter and then it continues to do what it does this piece is right here for the rest of what we’re going to be talking about so this is essentially the user ID that will be assigned to this key that’s being generated and when we get to the encryption of a file you need to actually give the uh the recipient to the command right so you’re going to do gpg encrypt the r would be the recipient themselves and in that particular case it would be this person right this is the IDE of the recipient and so when you run this command you would put the ID of the recipient and then the file name that you want to be encrypted and then it will encrypt that file name and then whatever the key is for that specific person that will be what’s used to decrypt this file name this is what that actual command would look like when you actually use somebody’s ID so same Command right so gpg yada y y and then we have Bob at example which would be the user so the recipient in this case that that’s the ID for the person which is Bob at example and then the name of the file that’s going to be encrypted and then once it is been encrypted the encrypted file will have a gpg extension at the end of it so it will stay it still says document.txt it’ll just say. gpg at the end of it implying that this has now been encrypted and then this is the file that will be sent to Bob and then Bob will be the person that has the only key that would be able to decrypt this particular file Bob would then need to run this command to decrypt the file so instead of- e it would just be A- D for decrypt and then it would be the file name with the extension of gpg and then that’s what would happen to actually decrypt the file the key would need to be added to their key log um which we’ll do in a couple of slides but essentially this is how the file would be decrypted and you run the command to decrypt a file you’ll be prompted to enter the passphrase if there was one and then that’s how it would be decrypted so very simple so this is what the actual full thing looks like right so you just do gpg uh- D document text PHP or gpg excuse me and then it’ll output the decrypted content into the actual console um instead of doing that you can output it into a text file or into any given kind of file by using the- o flag so instead of it being printed onto the console which is the default you can just run exactly the same command just do- O and A assign a name which would be for example decrypted document.txt and then you give it the gpg file and then it’ll decrypt it and it’ll output it inside of this file for later use to be able to import a key we will use the import command with gpg and we would do– import and then the public key file and it’ll import the public key from a file into your gpg key string there you go it’s called a key string or key ring sorry key ring not a key log so it’ll import the key file into your key ring and this is what it looks like right so this is Bob’s public key and it’s going to be imported into Bob’s key ring when he runs this and then he can run the decrypt Command right um if you wanted to export the public key you would run the export command uh with the a uh option right here for the user ID themselves and then you would export it into a public key file so it’ll export the public key into a file replace user ID with the user uh with the email or key ID for the person and then the public key file would be the name of the actual output file itself and this would be the file that would be imported into the key ring using the import command later on and the export of the public key would actually look like this in this particular case so you have the export of this particular user’s key that would be exported into this key file right here and then this would be the file that you would email them and then they would need to import it into their key ring or you would not email them it would probably be like a secure copy kind of a situation and then once they have that they would be able to import it into their key ring and then use it to decrypt a file if you want to list the keys that you’ve generated you would just use the list Keys command and it’ll show all the keys that are inside of the GP gpg key ring including the key IDs the user IDs associated with them and the types of keys that they are so in summary it’s a very versatile tool for securing files and Communications using public and private key pairs um with the commands for generating them encrypting and decrypting files managing them it ensures that your data remains confidential and secure and this is as you saw it’s not a complicated tool to run uh the process is fairly simple right you generate the key you encrypt the file and you encrypt it with the ID of the person that should be able to decrypt it and then you create uh you import or excuse me you export sorry you export that person’s key into a key document a key file you get them that key file they would import that key file into their key ring and then they would be able to use that to decrypt whatever the file is that they’re supposed to decrypt and typically if you’ve already added a passphrase to kind of double up the security for that file then they would also need the passphrase to be able to do that so if somebody intercepts that individual key file that you generated for them and then you emailed them or secured copied whatever if somebody intercepts that key file but they don’t have the password to access that key file then they still wouldn’t be able to decrypt the original document which provides an extra layer of security and I would recommend that you send the password to the key file in a separate type of a medium so you text them the password and you email them the actual key file for example so that there’s two different Communications that have happened through two different mediums so if somebody is intercepting their emails for example they won’t be able to get the password that you texted them or you send them through WhatsApp or a different method of communication you could call them and say this is what it is write it down so that nobody can actually there’s no digital layer of evidence for that transfer of information so there’s a lot of different ways that you can secure this but I would highly recommend that every single key file that you’ve generated and every file that’s been encrypted also has a password that’s attached to that key so that it can be decrypted using the password as well as the key and this is the perfect segue into secure file transferring and we can do this with SCP which is secure file copy or SFP which is the secure file transfer protocol um so this is essentially the way that you would transfer those key files that you just generated as well as the the document itself that was encrypted right so the file that was encrypted as well as the key that was generated you can be able to transfer them using either SCP or SFTP so SFTP is the interactive protocol for um file transfer it is the secure version of FTP which is a very very common protocol that was used for a very long time until they found out that it’s not secure because most things are clear text and they developed the encrypted version of it the SFTP version and it’s more flexible and user friendly because it’s interactive right so once somebody has the login for the FTP the file transfer protocol they can kind of navigate it very similar to the way that they would navigate um any any Linux uh file structure any Linux file system so a lot of the same commands that would run inside of a terminal for a file system actually run on the SFTP once the person is logged in so you can do SFTP user at host and you would start the SFTP session as such and then you can put the file inside of this particular server and then somebody else can log in and then access that file and download it onto their computer so it’ll initiate the SFTP session with the specified user on the remote host and then you can run the ls command for example to list the contents in the directory you can change your directory into the path of another directory because you’re inside of a file system right now you’re inside of a file transfer protocol so you’re literally inside of a file system that is just being managed remotely and you can download the file right you could just say get of this file and you can put a file inside of it so there there’s a uh for example the file that you just encrypted using uh the commands that we just ran through um we can take all of those files as well as the the key that we just generated and we can take both of those and put it inside of the FTP file transfer Portion by using put and then the person on the rece side would log in and then they would use get and they would download those files onto their local machine so that they can decrypt them and they can get access to them um you can do a get R for remote directory and you would recursively download everything that is inside of that directory onto your computer so instead of doing a individual file that you would do with get remote file you would get the entire contents of the directory and you could do the same thing with put our local directory so recursively put everything inside of this directory into the file transfer protocol and then they would be able to get it on the receiving side while logging in so this is what an example would look like so the user Alice on this particular IP address so you just do SFTP Alice at this particular IP address you would be prompted to enter the password for Alice so this is not just going to immediately let you to run LS that’s simply not how it works so once you run this command you are going to be prompted to enter a password you enter the password if you have the right password you now are inside of this particular server as Alice and then you can list the contents of that home directory so on and so forth so once you’re there let’s say you want to transfer contents to somebody else you would first do put project zip inside of this particular server and now it exists inside of that file hierarchy and then from there somebody else can log in or you can log in you know Alice for example can log in from a different computer onto to this exact server and then get that exact file onto the machine that they’re now logged into so you can download a file name example from the the file system using this you can put the file inside of the file system using the put command so it’s very simple um secure copy would be the quick and straight forwarded file transfer over SSH which uh is essentially the streamlined quick version of doing this particular command which is the SFTP command um and we’re going to run through some examples for running secure copy as well but SFTP is logging into a file system secure copy is just transferring the file from one host to another one and this is what the SCP example looks like so the command is SCP and then this is transferring from our computer to the remote host so you would do SCP and then the path to the actual file that you want to transfer and then you’re going to do the username at remote host and then the path to where it’s going to land and this essentially you kind of can designate wherever you want it to land this part is very very important and what happens as soon as you press enter you’re going to be asked for the password of this particular person at this host so this is not just going to transfer the file willy-nilly right you need to still have the password of this particular person at this host and then it’ll just transfer where this file into this particular location and it’s really as simple as that there is no logging into a file system running LS and getting and putting and all of those extra commands You’re simply just doing a secure copy very similar to a copy command that you would do locally on your computer you’re just doing it from your location to their location so this is going from your computer to their computer this version is coming from their computer to your computer so essentially you’ve just reversed the order of this particular command and then you’re doing secure copy the username and then the path to that actual file and it’s coming to the path on your current directory or in your current computer and again as soon as you press enter you’re going to be prompted to provide the password for this username at this remote host so that you can copy the location or you can copy the file from that location what’s important is that in this particular example this is actually very important right so in this example it wasn’t really that important cuz you you can just transfer this into wherever you essentially want on their computer that you just need to tell them where you put it so that they know where it is um the path of the local file is important in this version because you just need to know where it is that and what file it is that you want to transfer out in this example this path is very important because you need to know exactly where the file is that you want to transfer to your computer and then this part of it isn’t as important because you could just put it anywhere as long as you know where you just put that file so this is what secure copy is and how you can transfer a file securely and it’s again very simple command it’s one command that does the job instead of having to log into a file system and do all the rest of the stuff that we did with SFTP you’re literally just doing a secure copy from one location to another except you’re just doing it across a uh secure Port which is actually Port 22 or or whatever your Port is for secure shell so this is going across that secure shell port and is copying the file either from their location to your location or from your location to their location and that’s basically what secure copy does so very very very powerful tool to be able to transfer files you just need to know the password for the actual username on that individual host that you want to either pull the file from or send the file to and that’s basically it for secure copy okay so now it’s time to talk about troubleshooting and system maintenance and the first part of this is log files so how to analyze and interpret log files and the very first uh command that we’re going to go over for this is Journal CTL or Journal control for system logs and journal CTL is a very powerful command line utility for viewing and managing logs that are generated by the system D Journal so this is the more modern version versions of Linux that run systemd as their in it processes so it’s particularly useful for system administrators and developers to troubleshoot and maintain system Health on Linux systems that use system D so that’s what Journal CTL is now to be able to view everything on the log you just run Journal CTL and then you press enter and it displays all the logs recorded by System djournal starting from the oldest entry to the newest so chronologically going from the oldest to the newest and it clud system messages kernel logs as well as application logs um the filter by boot so if you just wanted to see logs from the current boot that’s going on um or the current boot session so to speak you would run journal c-b and this is particularly useful for diagnosing issues that occur during system startup and then we have filtering by Boot and then you have the dash one so this is logs from the previous boot uh you can adjust a number to view logs from earlier boots so uh if you go -2 it’ll go prior to that Dash uh three so on and so forth so- B would be the current boot just by itself and then -1 would go back to the previous Boot and then you can keep going back further to be able to find uh all the boots prior to that that are still inside of the log so at a certain point the log will have most likely stopped recording the boots um so from there uh you you can kind of just try to figure out how many you have in store in the log so that you can try to troubleshoot if you need to or go back go as far back as the logs will allow you to go you can filter by a service Name by using the dasu option and then you would provide the service name to it so it’ll display all the logs that are related to a specific service and then obviously replace the service name with the name of it so you would need to run the uh one of the previous commands that we went through for example top as an example to see what all of the various services are that are running and then from there you can look at the logs that would be relevant to that specific service by using journal c-u and then the name of the service and then we have the SSH as the example in this particular case so dasu SSH would display all the logs that would be relevant to the SSH service if you wanted to view real time log updates you would look at Journal c-f which would be similar to the tail – F command that would be applied to uh any log file essentially because tail would show you all of the the bottom entries at the bottom of the log which would be the most recent entries that have been appended to that particular Lo log file the entries that have been added to that log file so it’s similar to running tail-f command on that particular log in this particular case we’re doing journal c-f and it will give you realtime log updates as the entries are added to the log and as the system log or the log itself is being updated so you could combine this with any of the various log options that are available so that you can see the most recent or realtime additions that have been going to that particular log so it’s very useful for looking at live system activity or diagnosing issues as they occur then you can filter by time so you can do Journal CTL D- since and then you would provide it the the time as you see in that particular format and I think that’s called that’s the universal uh time standard I want to say I’m not exactly sure but it’s it’s in the format that you see on the screen so I don’t know what the technical term for that format is where you see the year the year the month and the day and then the hour minute and the second uh you can say since that time you know I want you to show me all of the entries that have come from that time filtering by time will look like this if you wanted to provide the actual time into it so you can see that they didn’t provide the second in this example we didn’t provide the minute in this example we just said from 8:00 on November 15th 2024 I want you to show me uh all of the entries that have come through this particular log right so that’s essentially what it will look like you don’t need to give it the the time the minute and the second unless you really are trying to narrow down on a specific incident that took place so that you can get the the results that you’re looking for to provide uh Mur uh further context for your investigation so to speak uh but usually you can just say at you know 8: a.m. on this particular day I want you to show me everything that happened since that particular time so if you wanted to filter By Priority you would just use the dash p and then the priority um and the level would be needed to be provided to it so if it’s a level zero which would be emergent meaning emergency uh to a level seven which is just a debugging kind of a priority level you can say uh what you want that priority level to look like so it’ll say if you do- P0 it’s going to show you everything from zero on up if you do uh Dash I guess it would go from seven on up so it would show you 7654321 0 uh 654321 0 so on and so forth so that’s what it would look like if you wanted to go by the priority level and uh show essentially every event that happens from that level that you’ve assigned all the way up to all the other levels um you can also do by an error type of a uh message or an error level message and higher so still priority flag so- p and then err would be all of the logs that have the error priority and higher and then it just continues on from there if you wanted to you uh filter by unit and time so we’re going by the service name as well as the time you can combine them so this is uh all of these commands are able to be combined together this is not to say that you get to use one or the other and this is the example that we got in this particular case so you can do – SSH and then since you know November 20th 2024 and on you know what I mean so you can combine filtering by services and time or a variety of other options so you can service and time and priority for example you can combine these various options to filter the log files so you can get the information that you’re looking for so this is what the example itself would actually look like right so – us SSH since November 15 2024 at 8:00 a.m. it will show you all of the log items for SSH since uh 8: a.m. on November 15 2024 so in summary you can look at Journal CTL as a tool for system administrators that are using system dbased Linux system so uh it won’t work for CIS vinet because it doesn’t exist on CIS vinet so Journal CTL will only work with system dbased Linux systems and then from there you can look at a lot of different options for viewing and filtering during logs and of course we’re going to go into all of those options and run a bunch of different formats of the journal CTL command as we go into our practical portion of this training Series so you can get a good understanding of how to use it and all the different filtering options that are available for Journal CTL until then this is this is going to serve as your little cheat sheet so you can view the entire log you can filter by the boot you can filter by the service uh filter real time log updates filter by time itself and filter By Priority or you can combine all of these to create a very specific filter to look at a very specific series of incidents that have taken place or a series of log items so you can combine all of these options to create a very specific viewing rule with Journal CTL but this is just a kind of a sample of the common commands that are run with Journal CTL for looking at system logs as we discussed in the file system hierarchy standard portion where we were looking at the main uh hierarchy of the file system in Linux we figured out that the logs are stored inside of the ver log directory so a lot of logs are in this particular uh directory and uh this is the central location for log files in Linux basically um you can get system events service activities application Behavior security incidents and everything in between uh analyzing these particular logs s admins can troubleshoot issues monitor system performance and enhance security and in a lot of cases you don’t even have to do it manually you can use a security Appliance to do it for you or you can try you know take all of the logs that are in this particular location feed it into Splunk as an instance or you can connect Linux into Splunk so that it gets live updates from your logs and then from there it can help you analyze the events that are going on in your logs uh if you don’t want to pay for something like Splunk you can always use wazu or a variety of different uh tools that we have Cabana if from elastic stack that’s another really good one that you can use that’s an open source tool that can be used to look at log files so very very useful location because it holds all of the logs that have to do with everything that goes on with your system so some of the key logs inside of the ver log directory would be the CIS log or the messages log so to speak so these are the general system log files that record a wide range of system events including kernel messages logs and service activities so it could be either the CIS log or the messages log and so there’s the distribution differences that would be uh relevant to these particular uh types of log so when you see CIS log it’s for deban based systems like Ubuntu when you see the messages that’s for Red Hat based systems like Centos or Fedora so the usage in the again would be to use uh tail f for example or just use Journal CTL for example um but in this particular case since you’re looking at an actual log you want to be using Journal CTL cuz Journal CTL has its own series of logs so in this particular case we’re going to be using tail-f to look at the last series The the bottom portion of this log file you will look at the last 10 lines for example which would be the most recent entries inside of the CIS log file same thing with this one where you would look at the most recent entries inside of the messages file another one would be the authentic a log the off log and this file contains information related to authentication and authorization so anybody who’s trying to log in any login attempts whether they were successful or unsuccessful user authentication processes or privilege escalation attempts all of these things would be uh stored inside of the Au log so anything that has to do with authentication or authorization would be stored inside of the off log and the view again would be tail F to look at the most recent uh additions that have happened to this log and it will show you everything at the bottom of that log file by using the tail command so uh this is very important for unauthorized access attempts and anything that is also security related so the authentication file or the off log I should say this is one of the key files that security analysts will constantly look at and keep an eye on especially in a large environment because you want to see if there are any uh failed login attempts or repeated failed login attempts or successful attempts that have come in during odd hours of the day uh or anything of the sorts just to uh figure out if people who should not be logging in are actually logging in or trying to log in um then we have another one which is the DMG so D message I kind of look at it like that but dmesg could be the one um it’ll records messages from the kernel ring buffer which contains information about Hardware components and the status of the hardware so the initialization of the device itself for example or the drivers that may be connected to your system for your printer or uh or anything that is a physical connection to your computer or any other hardware error that may go on with your individual machine and again it would be used as uh the tail F command to look at the most recent uh entries that have gone into this particular log file so um it’s very useful for diagnosing any kind of a hardware issue that’s going on and understanding the state of Kernel activity so if you remember the kernel is the entity that connects the user and anything that we use as the user to the actual Hardware so it’s the bridge that connects the hardware and everything inside of the actual physical computer to us the user so that we can communicate with it so if there’s any kind of a kernel issue or any kind of a kernel hard troubleshooting that you need to do you would do it with the D message log and then we have the secure log and this is specific to Red Hat based systems like Fedora or uh you know Red Hat Red Hat Enterprise Linux um this is the file that records security related events especially those related to secure shell as well as other secure services so SFTP for example or SCP that we just recently covered in the last chapter so this is where anything that has has to do with secure versions of a specific service all of those things would be uh logged in this particular file uh and this is uh for Red Hat based system so it wouldn’t apply to Ubuntu for example it would be Cent OS it would be Fedora and everything along those lines that would be considered a red hat-based system and this is the viewership so this is just a command and by now you should have memorized this so pseudo tail-f and then you would give the path of the log file and and it would give you the last 10 or 20 or however many lines that you would designate on this particular log which would be the most recent incidents that would happen inside of the secure file so for example failed login attempts and changes in user permissions which all have to do with security so anything that has to do with security and anything that we covered in our security portion of this training series most often than not is going to be inside of this particular log file for red hat-based system systems so this is our first example here so if you want to monitor a gener uh General system log you could look at the Cy log that would be on a Debian based system or and if it’s on a red hat based system you would look at the messages if you wanted to look at recent authentication events you would look at the authentication log or the off log that would be anything that has to do with authentication or authorization and again the tail would give you the last 10 Lin lines or the last number of lines that have been entered which would represent the most recent if you just wanted to look at everything inside of that file you could just open it up with Nano you would still need to do pseudo Nano but then it would open up the entire file which is a very massive file most likely so it will be very overwhelming uh you can search through it with GP right so the various tools that we’ve covered and then we’re going to do a lot of these things as well when we get into the Practical section but typically you would look at tail um or you would use tail to look at it so that you can see the most recent authentication events that have taken place um another example would be konel messages so you could do dmesg and that would give you all of the kernel messages or you could look at the most recent entries to that in real time for example which would be the tail-f which give you all the recent uh entries that have gone into the dmesg file and then you have looking at the secure file so security related events on a Red Hat system uh which could be anything that has to do with secure shell secure file transfer anything that has to do with changing permissions or ownership for example all of that stuff would be in uh inside of the secure log file itself so in summary we have the ver log thear log however you want to pronounce it we have this particular directory that is a treasure Trove of information it contains logs for everything all of the logs are inside of this and when we actually look at the uh the log file when we go into the Practical portion of this and I’ll do an LS command for you so you can see the number of log files that are inside of this thing it’s massive uh the ones that we went through are key log files that everybody should know about but there are literally dozens of log files that are inside of this particular directory and you can get a lot of different information from those log files so it all just depends on what you’re looking for and in a lot of cases individual applications that you install will also get their own log entries that will come inside of this exact directory so there might be something for MySQL there might be something for Apachi and a variety of different software services that would be installed on that machine that they get their own log files as well so um they’re just important location for you to consider right so anything that has to do with security and Security Administration or troubleshooting would all be done from these log files that are in stored in Star inside of our VAR log directory and these are some of our specific logs that you should keep in mind just as a screenshot so uh you already see you’ve already seen all of these so I’m not going to go through all of them but if you wanted to screenshot this one two 3 and ‘s up okay now we need to look at the usage of the disc itself and any cleanup that would need to be done so we’ve already looked at this particular command which is the DF command and uh DF and du kind of go hand inand and they help you look at uh everything that has to do with your disk so um dis usage analysis and cleanup is very important for maintaining system performance because a lot of times clutter tends to add up inside of the system and you just need to make sure that you are good with your storage right especially if you’re managing a bunch of different users and they have a bunch of different files and media and everything that they’re downloading and using there needs to be disk usage uh processes in place place to just make sure that uh you are good with storage this is more important for storage than really anything else in my opinion but it’s also a security issue as well so you just want to make sure that there is no uh you stay ahead of it so that there are no issues and the system doesn’t crash because it uh it doesn’t have enough storage or the ram doesn’t slow down or any of these things because there’s just too many things for the system to be taken care of so the two primary tools that we have are DF and and du so DF is the disk file system as you should already know and it’s a command line utility that displays information about the available and used disk space on our file system and this is just one of the simple commands so the dashh option with the f is human readable that’s what it stands for so it formats the output in an understandable way meaning that it’ll give you kilobyte usage and it may give you a tree breakdown or like a tree format view of it so you can kind of have a good understand of what you’re looking at on the terminal so df- will give you the dis usage as well as the memory usage and all those things in a human readable format so this is what the potential output might actually look like so you run it and then you can see that for this fire file system which is our uh primary SDA file system partition one has a size of 50 GB 30 GB has been used there’s 20 GB that’s available the percentage would be 60% % of this Total Space has been used and it’s mounted on our root directory and then the second partition has a 100 GB assigned to it 70 GB has been used 30 is available which means that there’s a 70% usage and it’s mounted on to the home directory that’s inside of the rout and the home directory specifically is for all of our users so it makes sense that there is more usage that has been done over here because most likely there’s multiple users that have file and media and everything that’s being stored inside of that directory so it’s using up a lot more space so that’s what the disk usage the DF command uh helps us find and du itself is the dis us it stands for dis usage and this is a command line utility that estimates and displays the disk space used by files and directory so it’s actually very similar to what we’re doing with our disk file system Command right so it’s it’s really not that different the intention of it is is the same um just a different command and it gives you a little bit of a different uh response here so you would do dis usage du D- sh and then you have to give it the path to the directory so- s s excuse me stands for the uh summary of the total dis usage and then the H stands for the human readable so same thing as the dis file system portion so the human readable and then give me a summary and so the example command would actually be this so dis usage dsh for the home user directory and it just gives you that there’s 5.2 GB on the home user directory that has been used so disk usage 5.2 GB on that particular directory that has been used um if you wanted to look at the full directory and then do a little bit of sorting and give you the top 10 lines for example so this is what this entire command is doing for us so we’re looking at a human readable format for this particular path and then we’re going to take this result and we’re going to pipe it into the sort command and then we’re going to take the top 10 lines from all of the output that we got so dis usage H will give you the dis usage for the specified path and human readable format sort RH will sort the output in a reverse order that’s what the r stands for and then based on human readable sizes which is what the H stands for and then the head N1 will show you the top 10 largest directories if we did 10 tail n 10 it will give you the bottom 10 uh largest directory so we’re sorting it and typically when you use sort it’s in ascending order so it’ll go in alphabetical A to Z or numerical smallest to largest so if we want to see the largest first we would do it in reverse order which is why we have the DHR and then H would be the human readable portion of it and then now it gives us the top 10 which would be the top largest files so this is potentially what the output itself would actually look like so we’re looking at the VAR directory that has all the logs and everything in it and then we’re sorting it in reverse order and we want the top 10 so it says the log directory understandably because there are so many log files and they take up so much space so the log directory would have the largest uh portion that it’s taking it takes up the most amount of gigb the biggest size right and then you have the cache which is also understandable so 1.8 GB the library has 1.2 GB and then the www that has to do with HTTP or typically it has to do with the Apachi server or any kind of a web server that is holding up 900 megabytes of data so some practical examples here we have the df- will give us the human readable disk file system command that will break it down for you by the file system and show you how much of it is being used and how much is free disk usage dsh will show you everything that’s going on on this particular uh path and it will give you the summary as well as the human readable format version of it and then this would be the the full thing if you wanted to look at everything for the home directory and then sort it in reverse order and human human ridable format and give you the top 10 results from this particular uh command so that’s how you would analyze all of those things so as a summary you have the disk file system the DF that provides an overview of the dis space usage by file system it makes it easy to see which partitions are filling up and it gives you everything on a line by line as you already saw and that’s the command D f-h and then you have the disk usage that gives you detailed insights into the actual usage by directories and files so you can identify which areas are consuming the most space this would be the summarized version for a given directory the summarized Das s and then DH for human readable on this particular directory and then you can analyze it by using the short command in reverse order and then giving you the top 10 results so those are our summaries but again we’re going to be running this as we go through our practical section so you’ll get a lot of opportunities to actually run this and use it uh and that this doesn’t mean that you can’t run these while you’re watching this so this is going to be uh this is technically the lecture format as I’ve I mean I say it literally at the end of every summary section so I just want you to keep all of that in mind so you can definitely be running these as we’re going through the lecture but uh we’re going to do like a deep dive on all of these things when we get into the Practical section so let’s talk about disk cleanup tips so this cleanup it helps maintain the system performance ensures that you have adequate storage for new data there are also essential tips and commands that we’re going to be going through to make sure that you accomplish all of those things this cleanup is a very important concept and it’s something that you should be thinking about all the time as a Linux administrator so why do we do it we want to removed any unused packages because they accumulate over time they take up a lot of space um and it kind of messes with your overall storage um they can also include dependencies that are no longer required by any installed software so you just want to make sure that you get rid of all of those things cuz they’re literally just taking up space and there’s nothing that is actually using those dependencies because they could be outdated they could be upgraded a variety of different reasons why they’re no longer relevant and you you just want to be uh be on top of this you want to do this routinely you want to do it in a scheduled manner so that it doesn’t run away from you you just want to kind of stay on top of this so to be able to remove unused packages you would use the AP um uh package manager command so we would do pseudo AP and then you just do auto remove and it removes packages that were installed as dependencies and are no longer needed by any installed packages that are currently being used so Auto remove removes anything that was installed as a dependency and is no longer actually being used by any other packages which is very very useful you don’t have to go through the list you just run pseudo AP Auto remove and it automatically removes anything that is irrelevant and then we can do it on a red hat based system so same exact thing except you’re just using dnf as your package manager so dnf instead of AP and then you would just do auto remove and then it it removes unnecessary packages and dependencies that are not being used the second reason why you want to do this is to clear all the temporary files which can also accumulate inside of the temp directory which take up disk space so uh for the most part it’s safe to delete all these things but you just got to be sure that there’s nothing that you actually need um or any applications that may be uh using any of this critical temporary files for example so uh for the most part you can delete all of these things cuz if they weren’t meant to be temporary they wouldn’t be inside of the temporary directory so that’s my approach to it if uh they were not important to be put inside of the key directories for the actual uh library for that specific application or the optional uh directory or any of the other directories that can be used if they’ve been put inside of the attemp directory for the most part they’re good to go uh the command would be remove so we’re using the r M command and then you do the RF option which is recursive so you’re doing a recursive um to delete all of the files for the temp directory now notice that there’s an asterisk at the end of this particular path which means asterisk it stands for a wild card character so it’s going to remove literally everything that is inside of the temp directory because it can be anything it could the asterisk stands for anything so TMP for/ asterisk means that anything that comes after this path it can be removed recursively and all of the files and directories uh will be removed so uh this is a very powerful command again it’ll permanently delete everything you just got to make sure that none of these things are relevant but again this is just my process My Philosophy around it if it’s inside the temp folder most likely it was going to be deleted anyways cuz it t typically does get deleted on reboots so most likely it was going to be deleted anyways or at least delete it after a certain amount of time otherwise it would not be placed inside the temp folder so for the most part I think it’s good to go then we have removing older Journal logs so this happens with a lot of uh log entries that have to do with the system for example because it’ll log everything on the system uh even if it’s just informational even if it’s uh nothing that is critical or nothing that needs to be addressed it just keeps logging everything so uh over time it’ll be a lot of log files massive massive log files that take up a lot of space so it’s important to periodically clean these or set up some kind of a script to pre periodically clean these specific log items so that uh you know they’re only maintained for let’s say 6 months or they’re maintained for a year or however long is relevant to you but after that 6-month period is over if it’s older than 6 months it should be deleted and you should move on from it or maybe if it’s older than 6 months it should be transferred out of your system and put into an external drive or something like that and that’s the way that you would manage your log files so um in a lot of environments and a lot of Enterprise environments and based on regulatory environments or compliance issues based on Regulatory Compliance you may be required to keep logs for longer than 6 months but you can transfer them from hot storage which is what’s on the computer and it’s accessible all the time time to warm storage which could be an external drive that’s easily accessible you could just plug it into the computer and get access to it or if it’s super old you can put it into Cold Storage which means it’s now sitting inside of a warehouse somewhere and then somebody would have to go retrieve it in order to be able to access that information but it’s being placed in storage uh just depends on what the compliance environment that you’re in and what they require um but typically uh usually if it’s 6 months or older especially if it’s just you on your computer if it’s like older than 3 to 6 months you can just wipe it and move on from it um in an Enterprise environment is a little bit different but for your computer for a specific personal computer you really don’t need to hold on to log files that long the way that you could do this is by using the journal CTL command and then remove the uh the stuff that is older than two weeks for example by using the vacuum time so this command removes Journal logs older than 2 weeks um and you can adjust the time frame as needed so you could do two days or one month or whatever and journal CTL will remove those items based on the time that they were in uh you can clean up packages by doing the pseudo AP clean or pseudo dnf clean all which will clear the package cache freeing up space that are used by downloaded package files that one’s pretty self-explanatory and then you can do a local Purge which would remove unnecessary localization files um in according to the local machine so uh The Purge command is kind of funny to me but uh it removes unnecessary localization files for languages that you don’t use so you got to install it first if it’s not already available and then you would run it and it would uh e Purge it would Purge all of the languages that aren’t being used from your local machine um we can do find and delete of large files so if it’s uh larger than 100 megabytes for example in this particular case you’re looking at the fine command which we’ve already kind of been introduced to and it’s looking inside of the root folder for the file type so type f would be a file that has a size of a 100 megabytes or larger and then once you find these files you can delete them if they’re no longer of use to you and then analyzing dis usage with GUI tools which are graphic user interface tools like Bob dis usage and analyzer on gnome or ker stat on KDE um and then you would have to install them obviously and then once you have them installed you can sort through your computer and browse the computer to find anything that would be larger than a certain size or anything that’s older than a certain period and remove all of those files and folders if they’re no longer applicable or at the very least transfer them to an external storage so in summary you can use a variety of different tools to clean up your disc um and just doing this regularly in a scheduled manner will help you avoid any kind of storage issues and so it could be done as easily as using the AP package manager and auto remove it could be done with using the dnf manager and doing Auto remove you can remove recursively anything that’s inside of the temp folder you can use Journal CTL with the vacuum time to 2 weeks to delete anything that’s older than 2 weeks or anything of that sort all right now we need to talk about backups and restoration strategies and one of the big pieces about this is going to be the command known as tar and tar is a command that is used to create archives the it’s an acronym for tape archive and it’s a command line utility to create and manipulate archive files um it compresses the multiple files into a singular archive file it can also work with directories as well um which makes it easier to store things and to transfer them to manage Backup so on and so forth it can uh support various methods for for example the gzip bzip and XZ which are it’s separate from the zip file uh ZIP command excuse me um which is another command that can compress uh data or compress files and directories into a singular uh ZIP file a compressed file um it is separate from that but it’s technically not considered uh creating a zip file it creates an archive file um so that’s I would say the key difference but I mean it does compress the multiple files into it so it does uh essentially the same uh activity it serves the same purpose as creating a zip file so to create an archive uh you would do it with the tar command and there’s a variety of options that we’ve attached to this so I’ll explain them in the next slide um and then you create the compressed file which would be this in this particular case and then this would be the path to the files that you want to compress so if we want to break this down the first portion of those options would be the C flag which is to create so it creates a new archive the Z flag compresses it into a gzip so a zip folder a gzip file V would be verbose meaning the files that are being processed are going to be displayed onto the screen so this is not necessarily uh it’s not necessary for the function of tar to work it’s just going to display onto the screen what’s actually being processed and how it’s going and then the F portion is specifying the output file name which in this particular case is backup. tar.gz so this is necessary for the function this is necessary for the function this is necessary for the function if you leave this out if you leave the- F portion out what it’s going to do is it’s going to create its own name and then you would have to rename it after the fact so if you just add the- F you can designate what you want the name of it to be and then the path to the file would be the actual file and directory that you want to be archived so in this particular case it’s just one path that’s been provided and then everything inside of this path is going to be archived into this backup. tar.gz uh compressed file right so you use- C to create – Z to turn it into a gzip and then- F to designate the name and then- V is just a verbos output so that it displays everything onto the screen as it’s being processed then you have the backup of these documents so for example again you’re creating another archive in this particular case but now it’s going to be a backup that is being created of the user documents so the exact pretty much the same exact command that we just ran in this particular case in this case right here except now we’ve actually given the path that we want in this particular case and it’s going to be it looks like this right so we’re creating a backup of the home user documents and it’s being placed into this particular backup file right here which is again same exact options that are being assigned to it and it’s creating a gzip file for us so if you want to extract the archive now you’re going to do uh a similar uh options here um the flags are a little bit different and the the very end right here where you actually create the the destination the path to destination also requires a flag for it as well so if we were to uh dis uh decipher that or if we were to what’s the word that I’m looking for not decipher um not split slice I’m drawing a blank but it it’ll come to me so if we were to break it down basically uh what we’re going to do is the first piece the instead of C we have X so instead of creating a file we’re now extracting a file so the first option the first flag is the X and then the Z Would to designate that we’re decompressing the archive using gzip so this would have to be a gz extension right here in order for this to work if it was a different type of an extension for this archive file you would use a different option inside of this so the Z represents gzip when meaning that we’re decompressing a gzip compressed file the V is still verbose to display everything that’s going on and then the F would specify the input file name which in this case would be the backup. tar and then we have the C for the directory meaning the destination directory for the extracted fil so everything here looks almost identical to creating an archive except in this case we’re extra in it and we’re going to use the X flag here to extract the Z is still the gzip and then the V would be verbose the file would be the name of the file that’s going to be extracted and then we’ve added this Capital C flag over here that would give us the path to the destination of where it’s going to be extracted to so um extracting the archive as an actual example here where we have the backup that we just created from the documents and then we’re going to designate the place that it’s going to be transferred into once it’s been extracted which is going to be the home user restore documents and this is essentially the same exact command that we just saw with actual content filled in the actual path has been filled in in this particular case and then the name of the backup file has also been filled in so if you want to list the contents of an archive you could use the tvf so V and F you should already be familiar with so V is going to be for verbos f is going to be to designate the file name in this case but then you’re using the T flag which stands for list so list T um so it’s going to list the contents of the archive without actually extracting the contents of the archive so we don’t have an actual breakdown of those commands um what we’re going to see in this particular case is that this is literally the closest thing to the breakdown of the command so you’re already familiar with V for verbos f is going to designate what the file is that you’re going to try to look at and then the T flag is going to list the options or list the contents of this particular archive file now if you want to exclude files from the archive then you’re going to use very similar set of commands here except there’s this last piece right here which is going to be the piece inside of this directory that you want to be excluded right so you want to Archive everything inside of this piece with with the exception so excluding this path so notice that path two files is still here so we’re still trying to uh archive this piece right here the only thing that we’re doing is that this exclude me portion is not going to be included in this archive file so you can actually create an archive and then exclude a certain portion of this directory from your overall archive that you’re creating so exclude is the uh the command here so– exclude and then you need to give it the full path of the directory or the file that you want to be excluded from this backup file that’s being created from this archive file that’s being created using tar so to append a file to an existing archive you can do this as well so you can do the r option to append now this unfortunately is not R in any way is doesn’t equal append or it does it’s not included in the word append so you kind of have to learn this one and kind of memorize this one or just save this right save this command for future use um if you don’t if you’re not going to get the the the documents or the the slideshow U from hack holic Anonymous I hope you’re creating your own file with these commands inside of it so at the very least I hope you’re doing that but again you can just come to the video at this portion and just look at the archiving function with tar so there’s a lot of different ways that you can come back and refer to this but anyway so we do have the V for verbos we have the F to designate what the file is going to be and then in this case we’re using the r flag to append something to this backup file right here to this uh archive file so it’ll append additional files to an existing archive and the r option stands for a pen so this is going to be our existing archive and then this is the path to the additional file that you want to be appended into this archive so you don’t this is actually very neat it’s very useful because um when you create a zip file you can’t append something into the zip file but you can do it using the tar command which is actually very handy cuz sometimes you want to just add things to an archive file without creating new archive files you know what I mean you just want to keep the same archive file and then just add something to that archive so for example um new versions of a log file inside of the VAR log directory instead of creating new archives you just keep adding those same log files as the time arrives you just add them to the same archive file so you could just have one archive file for the authentication log for example the off log you can have just one archive file for that and then anytime that you do a backup you just add the new archived file or the new log file that’s been created you just add it to the same authentication backup archive which is again it’s very very handy it’s very useful so this is an example that we have over here that that we’re now going to kind of go through to create a backup so it’s very similar to what you’ve already seen in this particular case we have all of the same flags as we had before and in this backup file we actually have the date that’s been attached to it to kind of give us an understanding of what this backup represents and then we have the documents folder that’s being backed up so backup of 1115 2024 and then it has all of the documents or all of the content of the user documents that’s going to be backed up inside of this file so very very handy little command and then now we have the extraction of that backup so same exact archive file except now we’re extracting it and we’re using the capital c flag over here to designate where we want it to be extracted to and the X flag right here to designate that we’re extracting instead of creating so the rest of it is exactly the same it’s a gzip file it’s verbos and then you’re designating the file name that you’re going to be working with and then it’s going to be extracted into this particular location which is going to be the new location for those restored documents and the third example that we have is to list the contents of that backup file so this should have probably been example number two where we list the contents of the backup file and then we extract the back backup file but T would represent list so you’re listing the contents of this backup file or this tar file this archive uh without extracting the contents of it and that is it so our summary here is that uh it’s obviously very versatile it’s very powerful as you just saw from the examples that we saw um by mastering just a few key commands you can efficiently back up and restore files and honestly create a lot of really good scripts because now that we know that we can append something using the r flag for example when you can append something to an existing archive file that means every time that that script runs and it could be a schedule task that you schedule with KRON tabs and cron jobs and every time that that backup file or that archive uh script runs it’s just going to append the contents of whatever it is that you’re trying to do inside of the same exact archive without creating a new archive file which is honestly I actually love that it’s very very useful it’s very handy and as I’m going through this I’m like okay well why am I not why haven’t I created a script for that so you better believe that I’m going to create a script that’s going to use the tar command to append the contents of my logs uh for my own machines inside of the same exact archive file which again is just super freaking handy so incremental backups that can happen with our sync will be our next piece so it’s a very useful versatile efficient utility for synchronizing files and directories between different locations uh it’s particularly well suited for backups because it transfers only modified files uh reducing the time and bandwidth that’s required for the operation so it essentially detects which files inside a given location have been modified and if they have been modified then it’ll back it up which is again very very useful so uh you have the key features here which are the incremental transfer so only modified portions of the files are transferred so think about what it means to sync something right so if there is one new addition or one new modification that’s been made it’s just going to get resynced it’s very similar to what happens when you have iCloud for example and your iCloud storage will detect any new additions that have been made to your phone’s contents and then it’ll back it up to your current cloud um and it won’t uh it won’t take everything that you previously had it’s only going to take the new additions that have been made into your phone and then just add those into your iCloud backup so it’s very very useful uh it only detects things that have been modified right it’s very versatile it can be used for local backups as well as remote backups over secure shell which is freaking badass uh it preserves file attributes so it maintains permissions time stamps and any other attributes that were originally created on the original file as it synchronizes to the new backup location so very very useful little tool so the basic command structure here is we have rsync with the AV flag and then this is the source location and then the destination directory so a to Archive and it enables archive mode preserves permissions Sim links everything else that’s the attribute for this Source directory and all of its contents and then verbos to provide a detailed output of the synchronization process onto your screen and then the source directory is the path to the source and then the destination would be the path to the destination so very simple command not complicated to understand at all and we’re just running our sync with the two flags right here you got to give it the source directory and then the destination directory and then it’s going to do exactly what it should um a basic sync as an example using actual directories here again same exact command with the the archive and the verbos flags attached to it now we’re just saying the home the documents from this particular user is going to go into the backup documents and that’s pretty much it syncing over SSH which is the the one that I’m most interested in um would be something that the flags the initial flags are staying the same so you still have the archive and the verbos flag but now you have this e flag for here for export I would say um that’s really the the thing that I would attribute the E2 um and it’s going to use the SSH um uh protocol to be able to transfer it and then Source directory and then you have something very similar to what we did with secure copy if you remember the instructions that we went through secure copy that you would have the user at the remote server which would probably be an IP address for example so you’d have the user at the remote IP address and then you have this colon and the path to the destination that this backup is going to take place once you run this okay you need to probably provide a password for this user unless you generated a key that has been uh uh attached to to the the key log not the key log I forget the the technical term but essentially it’s the storehouse of the local keys on your computer that would uh that would not require you to enter a password every time you did this so if you want to run this as a part of a scheduled script for example inside of your KRON jobs then you would definitely need to take the actions that we took when we generated keys so that you can have a passwordless authentication for SSH and then this would run every single time without needing the password to be entered for this particular user so that it can backup this directory inside of this destination so it’s not complicated to do the backup it’s actually quite easy you just need to designate that you’re going to use the SSH protocol and then you have to have the credentials and the location for where this is going to go and then if you have used a uh key based authentication method you you won’t be prompted to enter the password for this particular user and then from there it’ll just run like clockwork so syncing over SSH is a very very powerful tool and then this is it right here right so we have Alice at this particular IP address and then it’s going into the backup documents for uh this particular IP for the Alice user and then that’s it and this is assuming that we already have Alice’s key inside of our keyless authentication or not keyless passwordless authentication or we know Alice’s password so as we run this we would enter Alice’s password and then it would just back up everything inside of this location on Alice’s user profile inside of this particular server so very very useful little command is rsync so if you want to back up something with deletion so if you want to delete right it ensures that the destination directory mirrors The Source directory by deleting files from the destination that no longer exist in in the source this is very useful right so if for example uh you no longer need the contents that you deleted from the source so let’s say you had 100 pieces 100 files you had 100 files you have updated 50 of the files and you deleted 50 of the files okay this destination still has those original 100 because you already did one backup when you run this flag right here it’s going to sync these two destinations and all of the files that were deleted from The Source because you didn’t need them anymore are now also going to be deleted from the destination so it’s going to sync them and make sure that they match exactly and only the files that exist inside of the source are going to be the files that exist inside of the destination so it’s very very useful command and this is something that you can of course combine with these commands as well as if you want to run it with D SSH command you can combine all of those options together and just add this delete portion so that anything that would be duplicate or anything that no longer exists in this Source location will also be deleted from the destination location ensuring that you’re not holding on to old files that are no longer relevant so that’s very very useful so this is actually what it looks like using the delete command and some actual paths here so we have the home user documents and then the backup documents and of course it’s going to to synchron synchronize the contents of Home user documents with backup documents deleting any files in the destination that are not present in the source so deleting any files here that no longer exist in this particular location so here’s our example here so we have the rsync with the AV flag so we’re archiving and we’re going to have a verbos output and we’re taking the contents of this and we’re putting it inside of this Project’s backup folder we we have another example that is being done with the SSH protocol so we have to add the dash e flag here to designate that we want to export into SSH we’re taking the contents of the home user projects and we’re putting it on Alice’s profile on this particular server with the backup projects location and then we have the delete command that’s also being added to this and again this also could be added to this particular command as well right so you could have the av– delete and then- SSH so on and so forth and then that would ensure that the contents of here match this content so it would delete anything inside of this location that no longer exists in this location it deletes the stuff in the destination that are no longer in the source and that’s our destination that’s our source so very useful series of commands we have a couple of additional options in this uh location so we have the Dash progress D- progress which displays detailed progress information for each file during the transfer so it’s similar to verbose ex except I guess it’s showing you kind of like a percentage update we’ll be reviewing this as we go through our practical portion so you can actually see what this looks like but it’s going to display the progress as the transfer for each file is taking place during the overall transfer process and then we have The Preserve hard links command so this is the hard links portion right here which preserves hard links in the source directory so this location the hard links uh if you remember soft links are essentially uh shortcuts to a certain file or a command and a hard link is the duplicated version of that so if you have two files uh the hard link would be a duplicated version of the file whereas the soft link would just be a a shortcut that points to the or original file so in this case it’s preserving all of the hard links in this case which I mean uh assuming that uh you want to uh keep these things I don’t I personally don’t know why you would have to designate this maybe as a part of the sync process it sometimes might delete it but uh I would say include this in everything if you want to keep everything that is inside of the source directory and then delete whatever’s been deleted from the destination that’s all fine but just add this I would say to every single time that you run rsync to ensure that it’s keeping all of the hard links inside of the source directory that that feels like it’s an important command that should be run every single time then we have compressing of the data during transfer this is another thing that’s very very useful so the Z option compresses the file uh data during the transfer to reduce bandwidth usage and to reduce the space that is taken inside of the destination directory as you transfer for the file so this would this feels like another uh option that would happen frequently especially if you’re not going to be transferring this stuff back and you’re mostly doing this for backup so if you’re not going to do regular access of the destination directory and you’re just doing this to back up your stuff for Recovery purposes for example then you would add the Z option to compress the data so that it can take less space as well as reduce the amount of data that’s being used for the transfer so the bandwidth usage that’s being used during the transfer that would be another one of those flags that I would say should be ran every single time unless you’re going to access the contents of the destination folder while you get to the to that location or you’re going to use it from a different computer or something like that and you want to have uh uncompressed files I guess or like live type of files that haven’t been compressed so that they’re easily accessible and you don’t have to go through the extra step of decompressing them without uh with uh decompressing them and get access to them essentially so you don’t want to decompress them and you just want to access them essentially but for the most part if it’s just being for backup purposes so for you know future recovery in case anything happens and your system crashes or something I would say that you should compress all of that data so in summary uh our sync is actually very useful to do incremental backups because what it’s going to do is going to update this uh the destination location only with the changes that have been made in the source location it’s flexible it has a range of options that make it suitable for a variety of backup scenarios both locally and over the network do using something like SSH you have our basic sync command that we’ve gone through we have the SSH sync command that we’ve gone through and then we have the delete version of the command that’s also very useful that will delete anything inside the destination that no longer exists in the source very very useful tool which is rsync which brings us to system performance monitoring so monitoring the CPU memory and the processes that are running using a tool called top now top and htop both uh perform essentially the same function so what they do is they list the the processes that are currently running the services that are currently running on your computer and they show you how much CPU each one of those things is using how much memory or Ram each one of those things are using and the pids and certain details about each one of those processes and it’s a dynamic list meaning that it updates in real time and if something is taking up more memory than the next thing it’ll go up uh in the list and it’s a live list right it’s not something that is just stagnant and then you run at once and you just get this list uh with the line items saying exactly the same so it’s a live uh environment type of a monitoring so what it looks like is you just literally run top and you press enter and it provides the dynamic realtime view of what’s going on in the system so the processes that are running on the system and the amount of resources that each one of them is using uh this is included in most Unix operating systems and Linux obviously and it’s actually on Mac OS as well so if you just run top and press enter it’ll actually show you all the commands that are running on Mac OS in a live environment and how much resource each one of them is used using uh this is used all the time for system administration as well as security so if you just want to see if like a computer slows down or if a Server slows down drastically and you don’t know exactly what’s going on you would run the top command to see what is running and how much resource those things are taking and more often than not you kind of reverse engineer not based on the name of the service but based on how much resource it’s using so if it’s using a lot of the Ram or if it’s using a lot of the CPU then you can say okay well this seems kind of funky what is this particular process and then you start doing the rest of your investigation that way the command itself is literally press top and press enter and it’ll start displaying the output and it’s updated regularly it typically goes 1 second at a time but then you can change it so that the incremental uh updates are done by 5 Seconds or 10 seconds or something like that if the the 1 second update is a little bit too much which I think it has in my opinion it is too much cuz it’s it’s kind of hard to notice what the commands are so you can change it to a 5-second update and it’ll change or it’ll update itself continuously but it’ll do it every 5 Seconds instead of every second um when you navigate this so This is actually something very useful to understand so uh you can use a lot of different commands to interact with it while it’s running so when you press top or you type top and you press enter the output on the screen is just going to stay there until you exit it so what you want to do is you want to interact with the output put as it’s going around so if you press P while top is running it’s going to sort everything by CPU usage so P CPU P CPU so you press p and then it’ll sort everything by the CPU usage making it easy to identify what’s going on and what’s consuming the most CPU if you run M you would be sorting by memory so that one’s very easy to understand so another way that we can look at CPU would be p for processing so processing would be the the uh sorting mechanism when you use P so it’s going to use CPU processing power so Central Processing Unit think about it like that so the central processing unit so P would be for processing M is for memory so the ram random access memory so it’s going to sort by the RAM usage and how much RAM the the process is currently using um if you press k then you would be be ordering top to kill a process so you would press K and then it’s going to ask you uh or it’s going to give you the option to enter the P of the process that you want to kill so let’s say that using P and M you have determined that there’s one specific process that’s taking up a lot of uh resources and now you want to kill that process so you would press K and then you would provide the PID for that process so that it will be killed automatically or immediately it’ll be killed killed by your system and hopefully it will not take any more resources from you and it will just kill sometimes you may need to do Force kill which is a different command but just K by itself it will kill a process if you want to quit top you just simply press q and then it’ll exit the top interface so remember when you enter tops you type in top press enter you’re now inside an interface that is going to be interactable so you can interact with that interface once you’re done interacting with it and customizing the display and getting the information that you need killing a process doing whatever you need to do you would need to exit top and in the way that you do that is by pressing q and then it’ll exit the top interface the next one is H top which is the enhanced version of top that offers a more userfriendly colorful and interactive interface but it essentially provides the same uh processing or it provides the same service and utility that top does except it’s just a little bit more user friendly it’s colorful instead of just a bunch bunch of black and white entries on the screen you actually get color coding that happens with the entries on the screen um and it improves the user friendliness of it so uh you would run install htop if you don’t have it so it’s a pseudo command so pseudo AP install htop or pseudo dnf install htop because it does not come pre-installed so top comes pre-installed with Linux but if you wanted to include if you wanted to install htop you would need to actually install it and then you would run it according to the various commands so for example run htop press enter and then it’ll start the tool and it’s very similar to the interaction that you would have with the top tool so it provides the enhanced user experience with easy navigation if you want to view processes um or viewing the processes would be the main screen and it gives you the list of processes similar to top but with more detailed and accessible information um if you wanted to sort by columns you would do F6 and this don’t know what the the replacement for this is if you don’t have F6 on your uh computer so or on your keyboard I should say so what I’m going to do is I’m going to actually get that information for you now okay so thankfully it’s actually fairly useful so if you don’t have the F6 key on your columns or in your keyboard for example to organize the columns then what you do is just use the left and right arrow keys to move through the columns at the top of the interface and then once you’ve landed or highlighted the column that you want to sort you press enter and that’s it so uh it’s fairly simple fairly straightforward to organize the columns if you don’t have the F6 key on your keyboard which I do realize that not every keyboard has that so a lot of keyboards do my current keyboard the Bluetooth keyboard that I have does but when I’m looking at my MacBook the MacBook does not have F6 on it in uh in inherently what you can do is you can press the um FN key um which brings up the F keys right above my numerical numbers and then I can use the F keys that way but sometimes you don’t even have that option and you have to try to work a way around it so if you have the F Keys that’s amazing if you don’t have them this is how you do it you just use the left and right arrow keys and then you press enter once you’ve highlighted the column that you want and then it’ll organize that column for you so if we you want to kill a process in HTP you would select the process using the arrow keys and then press F9 in this particular case and the signal to send this whoops the uh the signal to send in this particular case would be Sig term which is the default uh which is going to terminate it’s the signal to terminate and it sends the process using the uh it kills the process excuse me using the F9 key so it allows you to interactively terminate the process now I need to find that out how to do this if you don’t have the F keys on your keyboard so let me go get that information for you if you don’t have the F9 key to terminate the process you can kill it using the K key so use the arrow keys to move up and down the list to highlight the process that you want to kill and then you press the K key the lowercase version of the K key to open the action menu which is an alternative to the shortcut to uh or this is an alternative shortcut to F9 and then you select the the the actual option or the the the process that you want to kill and after you’ve pressed that you’ll see a list of signals that you can end the process the default signal to terminate process is Sig term in this particular case which is signal number 15 for terminate and then you press enter to send sck term which will attempt to gracefully terminate the process if you can’t do that then you would force kill which would work with the Sig kill uh which is signal number nine to forcefully kill the process so Sig terminate is signal number 15 and it’s going to attempt to gracefully kill the process but if it’s not killing and if it’s not working or if it’s not dying so to speak then you can forcefully kill the process by using the Sig kill which is signal number nine and then boom you are done we have the F3 option which is the option to search for a process and this essentially allows you to enter the name or part of the name of a process that you want to search for and that way you’ll be able to find it and then if you need to kill it or you know Force kill it or get other information about it you can go ahead and do it that way so now we need to find out what the substitute the alternative for F3 is if you don’t have the F3 key then you can use the forward slash as an alternative so you press the for/ key it’s going to open the search prompt at the bottom of the interface and then you would enter the process name or part of the process name that you want to search for press enter and then you can use the N key to move to the next match if there are multiple instances of the search term and that way you can search for processes by name if you don’t have the F3 key so there we go now we have the alternative to the F3 key next would be quitting htop which in this particular case would be done with the F10 key but then I’m going to find of course the option for you in case you don’t have the F10 key and this one is a exactly the way that top worked as well so you just press q and you press q and while it’s open this will immediately exit the htop application so if you don’t have F10 you just press q and then you are good to go so in summary both top and htop are very useful tools for monitoring system performance each of them have their own unique strengths the provided strength or the strength for top is that it provides a basic yet powerful real-time view of the processes and resource usage you have command commands like P to sort by CPU commands like M to sort by memory for navigation you can quit it using Q htop is a userfriendly version of uh top and it has enhanced features for example interactive Process Management and intuitive search navigation and you can do those with either the F Keys as we saw or by using the arrow keys or the various keyboard shortcuts that you have you can use F9 to kill a process and F3 to search for processes or you can use the the various um options that we actually had to either kill or forcefully kill something and then F3 would be the forward slash to be able to search for something and then Q would be to quit it so on and so forth so uh it still uh essentially offers the same usage that top does except it’s more user friendly because it does provide color coding and the responses and the output that you get and then you can interact with the results a little bit better and you have more options to interact with the results so um that is it for top and H top and now we can move on to free free is a simple and another powerful command line utility that displays information about the systems memory usage including both physical memory and swap space um it’s vital for monitoring system performance and diagnosing memory related issues so the command itself would be free Dash and the DH option stands for human readable so it formats the output in a way that it’s easier to read using uh units like kilobytes megabytes or gigabytes so this is an example out put for example an example output for example welcome to the Department of redundancy Department um so in this case we have ran free H and then we see that we have the memory usage or the total memory that’s available in our uh RAM as well as the swap space and it says that there’s been 3 gbes that’s been that is currently being used by the RAM and then there’s 8 gabt that’s free there’s 239 megabytes that’s shared there’s the buff and cache that’s at 4 GB and then your total actual available after all of these things are considered are 11 GB and then there’s nothing that’s being used inside of the swap so that one is all good the breakdown that we just see just to kind of give you another bre we’ve actually kind of reviewed this already but we’re going to review it one more time because we are now in the troubleshooting section of the the training series but this is a repeated training cuz we did go over this uh earlier in our training Series so um you’ve probably noticed that there are repetitions of various Concepts that we’ve gone through and we’ve looked at them at least twice and this mainly because the fact that they are relevant for a uh multiple amount of things so it’s not just for one use so free can be used for troubleshooting and it can also be used for swap monitoring and memory monitoring in the context of partitioning and file systems so you can be looking you can be using the same tool to serve multiple purposes as we’ve established so the total amount of memory or swap space the used amount the free amount the shared amount of memory that’s being used by the temporary file system the buffering and the cache so the memory that’s been used by the buffer or the cache and the final available memory after all of those things are considered uh without the swap space if you want to check the memory as an example and this is just another uh usage of it but it’s essentially the same command that you’re running just different output results that we have in this case and so the total would be 8 GB 2 GB that are used free or 500 megabytes are shared there’s 1 GB dedicated to the buffer and the cache and then the total available after all of these things are considered would be 6 GB and so this is just checking the memory usage as an example if you wanted to um monitor what’s going on in real time this is a very useful command that we didn’t cover before so so what you’re going to do is you’re going to use the watch command and then the N1 represents every second so if you did N5 it would be every 5 seconds and so on and so forth so you’re going to use the watch command and then run free H every single uh second essentially so this is a separate command from free this is not something that uh is included under the free AG tool so the watch command is by itself and you can apply it to a variety of different command line tools so we have watch- N1 which would say I want you to watch this output every 1 second which would essentially Run free H every second providing a real time version of the output so it’s kind of like running top except when top updates itself now we’ve kind of cheated the system and we’re running free H every second so that we can watch the output of this command every second providing a realtime version of free H for ourselves if you wanted to look at the memory information you can concatenate use a cat command against the process mem info path and this is not part of free but it is detailed information about memory usage directly from the file system itself so from the proc file system so this technically should not fall under free but it was incl uded in the course content and so this is how we’re going to look at it so you can run the cat command and concatenate the content of this particular file which will display detailed information about memory usage that’s directly from the actual process file system which will act similar to the the results that you would get from free free- m displays memory in megabytes Das K would display memory in kilobytes and Das G would display memory in gigabytes in my opinion you should just just do free Dash because it will associate it’ll kind of determine by itself what the best measurement um would be and then it would provide you that measurement in the associated metric so if it’s less than a gigabyte it would give it to you in megabytes if it’s less than a megabyte it would give it to you in kilobytes and so on and so forth you don’t need to necessarily run either one of these things but if you wanted to you could so now you know k for kilobytes M for megabytes and G for gigabytes I was going to say gigabytes G for gigabytes if you want to display the output specifically in those measurements we have free dashb which is the option that displays memory in bytes so it doesn’t even go in kilobytes it’ll go in the number of bytes so that’s the smallest uh form of measurement that we can feed into free free- l would include statistics about low and high memory uh usage so low and high memory statistics and then as a summary we have all of these uh commands just kind of output for you it’s basically a command that’s used uh it’s a very straightforward and essential uh tool for monitoring memory and swap usage on a system if you use the- H option it provides human readable output which essentially gives you the measurements in what it thinks are the best measurement uh uh parameters in the measurement um man I’m drawn a blank again today it’s kind of it’s weird the metrics I guess I should say uh it will give you the human readable format in what it determines to be the best way to measure something so kilobyte gigabyte megabyte so on and so forth and then it’ll also give you the free the used the shared the buffer cache total memory and available memory after all things are considered uh you would run free- for that if you wanted to do realtime monitoring you would do watch N1 so that it gives you a 1 second repetition of this command so it’ll run free H every single second and You’ be able to see kind of a live update for that and then you can run the concatenate or the cat command um on the particular M info file so that you can get detailed memory information which is not necessarily a part of the free command but it kind of falls into the overall conversation that we’ve had where we’re run with top and htop and of course now free VM stat is another tool so it stands for virtual memory statistics and it’s another tool that helps you look at these system statistics like memory usage and CPU performance and input output operations as well so it helps the administrator which is you Monitor and troubleshoot system performance effectively so you would essentially run all of these commands uh to get a variety of different information or to try to see if there’s something that maybe was not caught by htop for example and you were able to find it with VM stats so uh the basic command would would be VM stat 1 and five so the first one is the data every second being populated onto the screen for five iterations so the very first one would be a live count every second and then it’s going to iterate five times so you will get five entries printed onto the screen and then you just get the snapshot of the system activity over the specified interval so this is what it would potentially look like right so you have VM stat5 and then this is the structured in several columns so on and so forth so we have the processes itself you have the memory the swap the input output and the system itself and then the CPU that’s being used used and then you have all of this data that’s associated to every single one of those things but you kind of do see that there is like an overall column that’s associated with this so under memory we have the swap memory we have the free we have the buffer and we have the cache that’s being used under the swap space right here you have swap in or swap out that’s nothing being used in there you have the input output put so basic input basic output you have two that’s being input you have 15 output uh processes that are working you have the system itself incrementally the uh the in and the Cs I have to I think we have it on the next slide that it actually breaks down and then you have the CPU usage as well that gives you the data that is being used by the CPU so this these are the key Fields as we have them here so we have the procs uh column that we saw at the very beginning right here so we have the proc column the r represents the number of processes that are waiting for the runtime so these are runnable processes the B represents the number of processes in interruptible sleep so they’ve been blocked right so that’s what procs is and that’s what R&B stand for under procs memory would be swap D so the amount of virtual memory that’s been used which is the swap space you have the free memory the free amount of idle memory you have the buffer memory the amount of uh memory that’s being used as buffers and then you have the cache which is the amount of memory that’s being used as the cach a then you have the swap column which has the SI ands so so the memory that’s swapped in from the disc in kilobytes you have the memory that is swapped out to the dis in kilobytes so swapped in from the memory so you have the random access memory that can’t handle anything more than 8 gbt for example so when it goes into 8.1 that 0.1 is going to be swapped in from the disc and if there’s anything that’s being swapped out of the memory to the dis so that it’s being used by the disk that would be essentially the reverse of what I just mentioned then you have IO which is for input output so you have bi for the blocks received from the Block device which is in so it’s coming in blocks per second so this is the input that’s coming in in blocks and then you have the blocks that are being sent to a block device which is the going in blocks per second and then you have have the system itself so you have the in and the Cs so the number of interrupts per second including the clock itself and then you have the number of context switches per second which means you’re switching from the text editor to the internet browser and you’re switching from the internet browser to a video player and so on and so forth so what you’re making switches between different applications or different processes that’s what’s happening per second and of course the number of interrupts that are going on per second and then finally we have the CPU portion which gives us the ussy wst so the US would be the time spent running non-kernel code so this is the user time running non kernel code so this is the stuff that’s being done by the user itself the SI would be the time running kernel code so this is stuff that’s being run by the system by the kernel in the background you have Idol time the time that’s been spent on Idol time spent waiting for input or output which is I I guess a little bit different than idle cuz idle would be there’s absolutely nothing going on uh wait time for input output would be the computer is up it’s not asleep it’s not an idol or hibernation or anything but it’s still waiting for something to happen and then St would be time stolen from a virtual machine so just to clarify this for you cuz it is something that was a little bit above my head as well so when you see time stolen from vmstat it refers to the CPU steel time CPU steel time is the percentage of time that a virtual CPU within a virtual machine is waiting for resources because the hypervisor is allocating those resources to another virtual machine on the same physical host so it’s the time when your vm’s vcpu is involuntarily idle because it can’t get the necessary CPU from the physical machine so you have a physical host that physical host has two VMS on it two virtual machines on it and each one of those virtual machines is requiring a certain amount of CPU a certain amount of processing power and so if the CPU is not uh if there isn’t enough CPU then you can’t allocate to both of the machines and one of the machines is taking a lot of the processing power then the second machine is getting its processing time stolen so the steel time means that the processing power the processing time has been stolen from one virtual machine because another virtual machine is overclocking and it’s taking too much so it happens because the hypervisor is managing multiple VMS and has to distribute the physical CPU resources among them if there are more VMS or higher CPU demand than the physical host can handle some VMS may experience CPU steel time so an example would be to just run VM Stat one and so we already established that the first number that we feed it would just be the amount of seconds that it waits before it refreshes the data so it’s just going to continually update the system performance data every second until it’s interrupted using the control C to stop if we were to do one and then give the second number as 10 then it would repeat this iteration 10 times and then it would just automatically stop by itself if you ran VM stat it’s just a single snapshot so it’s not going to repeat itself it’s just going to give you one snapshot of the system performance at the moment that you ran that command and then this is what we see right here so it’s going to update itself every 5 seconds for 10 increments so it’s going to or yeah for 10 increments so it’s going to update itself every 5 Seconds 10 times displaying the performance data for 10 iterations that’s what I was looking for not increments it’s going to do this 10 iterations um every 5 seconds and this is our summary for VM stat so another essential tool monitoring and analyzing system performance provides detailed statistics on CPU memory and IO operations input output operations when you understand and utilize it administrators can effectively identify and troubleshoot system performance issues so this would be used in conjunction with top htop vmstat free so on and so forth these would be on your Suite of tools it would be in Your Arsenal of tools when you’re trying to troubleshoot system resources uh for example the amount of C CPU that’s being used the amount of ram that’s being used the amount of uh processes that are running and how much each one of those processes is taking so uh as you saw you get different results from each one of these tools so it gives you a little bit of uh it gives you more context to what’s going on within any given machine so that you can figure out overall what’s going on vmstat as the name implies is going to the virtual machine virtual machine statistics free would give you all the free space that’s available uh top would give you the uh processes that are running and the amount of uh memory or Ram that they’re using so all of these things serve a different purpose and they can be used in conjunction with each other to give you a full picture a great idea of what’s going on inside of your computer’s environment or your Network’s environment all right now we need to talk about virtualization and cloud computing and this is not going to be the the Linux plus examination or at least the version that uh we mentioned at the top of this training series but they do upgrade and update their certification exams uh relatively uh frequently so uh for whenever this does get included as a part of the examination process I want you to be aware of these Concepts and even if they’re not covered in the exam it makes you a much better administrator when you understand what virtualization is and what cloud computing is and this is in no way limited to Linux but uh I think it is a very important topic to uh talk about especially when we are talking about deploying Linux and this was something that we actually did kind of go over as we uh went through the installation process um in chapter 3 and I was showing you how to boot something from a USB drive and how to install on a USB drive and how to uh reinstall a dual boot for example on your machine so that you can uh boot multiple uh versions of an operating system or different operating systems on the same machine so that all falls under virtualization and cloud computing is a little bit different but it’s kind of in the same ballpark obviously so uh just as an introduction to virtualization the first thing that we need to understand um is essentially if you if you think of your computer as a machine right or the computer that I’m recording this on or even your uh cell phone if you just consider all of these things as a machine and then we talk about the physical version of the machine or a virtual version of the machine so you could have a Windows machine be on a physical computer or you could have a Windows machine that would be a virtual computer a virtual machine and the way that we create the virtualization or the virtual version of it we would do it through virtualization and virtualization is just a technology that allows you to do it that to have multiple virtual machines running on a single physical machine and that physical machine could be something as simple as somebody’s home computer or it could be a meas sized uh server that was created at Amazon AWS or on Google cloud or Microsoft Azure cloud or any of those things right so um it’s overall the same concept it’s just different sizes of physical machines that end up hosting these uh the variety of virtual machines so uh this particular approach this concept of virtualization uh improves the use of resources uh it gives you isolated environments for a variety of different purposes so to create different applications or operating systems or test environments or anything along those lines it’s all very very powerful to use virtualization for those Concepts so uh this is essentially where virtualization is and then there are a few key Concepts that we need to to make sure that you really wrap your head around so as we as I already mentioned virtual machines are basically simulations of physical computers right so you can have a software based version of a physical computer that could live on a USB drive that could be boot booted from a USB drive it could be booted from a cloud service provider it could be booted from your actual computer that you’re watching this video on and uh that it’s basically what it is it’s just a simulation of an actual computer right the operating system of Windows or Mac OS or uh Linux or so on and so forth uh each virtual machine runs its own OS and the applications inside of that OS and they’re all independent from each other that would be on the same physical host so you can have one physical host that has a 100 VMS running on it or a thousand VMS running on it in the case of a mega server that exists at uh you know some Enterprise locations that they haven’t in their own building or they buy it from a cloud service provider right um there is isolation meaning that the failure or compromise of one VM will not affect the others or if you wanted to test something in an isolated environment you could boot up a virtual machine test it on that machine make sure everything’s all good if it crashes who cares because it’s that One Singular virtual machine and you you literally take it down as quickly and easily as you put it up and you can just keep keep testing until it’s actually ready and then you would deploy to the rest of your environment in your Enterprise or uh you just isolate each one of these things against each other for security purposes so in case something happens one machine crashing doesn’t affect the rest of your environment and your network so uh this is the overall understanding and the concept of virtual machines now there’s something that helps you deploy and create and manage virtual machines and that is the hypervisor and the hypervisor is basically a software or a firmware so to speak um depending on the type of hypervisor that you’re using but it essentially serves the same purpose right it helps you to create and manage and deploy and take down virtual machines that’s basically what it does and then with that hypervisor you allocate the amount of resources that will be uh designated to any one of these virtual machines and keep them separate from each other keep them isolated from each other that’s what the hypervisor does so it helps you boot them up deploy them and then allocate how much resources each one should take on that physical machine that they’re running on and then keep them all separate from each other the first type of hypervisor is known as the bare metal hypervisor and I’ll give you a visual so that you kind of understand the difference between the two uh so we have the type one which is known as the bare metal that runs directly on the actual physical Hardware so the CPU the motherboard the Ram uh the power source everything else right so anything that is required to build a computer physically the physical requirements of that computer the hypervisor sits on top of that and then from the hypervisor you boot a bunch of different uh virtual machines and it doesn’t require a host operating system so I’ll explain what that means when we actually get to the second type so it doesn’t require host operating system it just sits right on top of the physical hardware and uh from there you can boot all of the operating systems or applications or everything else that you would run inside of your environment and you would do that through the use of this particular hypervisor um this is more uh focused on performance so this is the higher performing version of a hypervisor because it is sitting directly on top of the physical hardware and it’s very very common in Enterprise environments or environments that have hundreds if not thousands of employees that they need to provide machines to they need to provide computers to the examples here are these are the actual hypervisors that are considered bare metal so the VMware SK or ESC I guess I I don’t know if that’s how you pronounce it um esxi whatever so the VMware version uh it’s very widely used in Enterprise environments it supports a lot of different features for managing virtual machines we have the Microsoft hyperv which is also another powerful hyper uh hypervisor that’s includes with the Windows server and it provides comprehens comprehensive virtualization capabilities and then there’s Zen which is the open source version of the bare metal hypervisor um that’s known for scalability which means it essentially you can use it in an Enterprise environment if they have limited budgets um and it’s still very secure and it’s a notable mention so it’s a good enough uh uh a hypervisor that even though it’s open source it’s still very useful in a large production environment then we have the type 2 hypervisor which is known as the hosted hypervisor and this runs on top of your actual operating system on your computer so imagine if you’re watching this on a computer or let’s say the Mac computer that I’m running this on so the computer that I’m on would act as the host and then we would install one of the hypervisor softwares on here and then with the use of that hypervisor I would deploy multiple virtual machines and it would all use the same resources that is inside of my MacBook or inside of my Mac operating system whatever it is right so if my MacBook has 8 GB of RAM all of the various virtual machines would rely on that 8 gabes of ram that’s on my actual computer right and so this is what it means to have a hosted hypervisor the computer serves as the host and then you’re using the resources of that computer and then the computer has its own operating system so it could be a Mac it could be a Windows anything else it could H it has its own operating system that computer that’s already running as an OS serves as the host and then on top of that you would have the hypervisor that helps you deploy the various virtual machines or applications so on and so forth and this is mostly used for desktop virtualization or uh smaller environment so this is not something that you would do with a thousand employees right it’s typically uh a much smaller scale version of running a uh hypervisor or a virtual type of an environment and it just depends on the resources of the main computer that host computer um the virtual box would be one of the most common ones you’ve probably heard of this because it’s an open source hypervisor that’s used a lot to deploy guest operating systems so if you have your computer being the host everything else would be the guest OS and the guest VM and it’s very very easy to deploy it using virtual box you just download it and then you start deploying as long as you have the iso image as we kind of went over inside of the installation process of chapter 3 you can essentially run uh as many virtual machines as your computer would allow based on its uh resources based on its hardware and uh the the processing power um VM workstation is the commercial hypervisor version of this and uh it basically does the same thing so it is a it’s for a hosted environment and it runs and man uh manages multiple VMS on a desktop computer um of course if it is inside of a commercial environment you would need a much faster uh host computer than something that runs on 8 or 16 GB of RAM with a you know basic CPU so it does still need to be a strong enough computer it’s going to be if it’s going to be used inside of a virtual environment or inside of a commercial environment excuse me to virtualize uh you know over a dozen VMS for example um the last one would be the Parallels Desktop which is designed for Mac OS specifically uh which allows you to run Windows and other operating systems on top of a Mac OS computer and uh of course Mac OS would need its own dedicated hypervisor so Parallels Desktop would serve as the hypervisor that can work on top of a Mac OS computer so there are a lot of advantages to do doing this uh I’m going to go over three main categories or maybe four main categories but uh depending on who you ask there’s an abundance of advantages to virtualization uh the first one would be the efficiency of the usage of the resource and how quickly you can scale up or scale down so um because you can use the same physical resources it’s efficient right you’re you’re not using a lot of money uh to buy 25 computers you can just launch 25 virtual machines from this same hardware and then from there just connect them to monitors keyboards and mouses and each one of those dummy computers we call them dummy computers or uh you can techn technically I think they’re called terminals uh you can use you know 25 terminals that don’t have any hardware they’re just connected to the main physical processor which is the massive uh or the the powerful let’s say let’s say it’s not massive but it’s like a very powerful Central Computer with all of the physical hardware and then that connects to the 25 different terminals that 25 different employees can use and then when you hire somebody or get rid of somebody you don’t have to worry about selling the computer or If you hired a new person you don’t have to buy a new computer you can just launch from that same physical resource and just have a keyboard and a mouse and a a monitor you know what I mean so it’s just much more cost effective the cost of Hardware is way less when you do virtualization instead of having to buy 25 individual computers so that’s the one piece and then the other piece is the scaling up and scaling down portion that you know you uh fire half of your people you don’t need to worry about getting rid of half of your computers you can just delete the half of the virtual machines that are currently deployed on your hypervisor and it’s as easy as selecting them and clicking delete and it’s it’s not complicated to scale up or down using virtualization the next one would be isolating and the connection of isolation to security so these two pieces actually go hand in hand so because of the fact that each virtual machine operates independently so it’s actually operating as its own computer um as long as the usernames and passwords are strong if one of them gets hacked into or fails right so if if a computer fails it doesn’t affect the rest of the network you can just reboot one and launch another one and you should be all good uh if that person gets hacked as as long as their password is strong or as long as the passwords of the rest of the people on your network are strong then whatever ransomware or virus or anything else that’s installed on that particular VM will not affect the rest of the computers because it is literally isolated as its own computer and it’s as if just that one if it’s one physical computer for example if that one physical computer gets hacked then the rest of the physical computers in the network won’t be affected and it’s literally the same thing because each one of the virtual VMS each one of these VMS is essentially a computer separate by itself so it’s isolated in its own environment and if it gets hacked if it crashes if anything happens then it won’t affect the rest of the computers that are on your network so isolation and security actually go hand in hand when you can isolate a compromised machine from the rest of your network that means you’re protecting the rest of your network then there’s the flexibility and Agility of testing and deploying and developing so because you can quickly deploy meaning if somebody new comes in literally you just go through the same uh installation process on your hypervisor using the same ISO and just deploy a new virtual machine and then you can connect that virtual machine to one of the terminals that already exist and just give that person their own username and password and you know when the other employee that was using that uh original terminal if they’re not working that day or if they’re working on separate schedules or something like that they could essentially be running uh their own VMS from that same exact terminal as long as they have their own login information their own dedicated login credentials um and then testing and developing is again another one of these easy things because it’s an isolated environment so if you wanted to test a new product launch or a new software launch and you wanted to make sure that it doesn’t affect the rest of your network then you would do it with a virtual machine test it make sure everything is all good and do any uh extra configurations or development that you need to and then from there once everything’s all good and all your eyes are crossed and or eyes are crossed all your all your te’s are crossed and your eyes are dotted once all of that’s done then you can deploy it to the rest of your environment and make sure all the other computers have it so it’s very flexible it’s very agile you can scale up or scale down as needed very quickly without having to buy new machines or sell the current machines and uh if you add 10 new employees for your night shift then they can all use the same exact terminals just get their own login credentials and that’s it it’s like it’s very very simple and easy to do and finally there’s the disaster recovery portion of it that um you know so let’s go back to the the concept of having 25 physical machines right so if you wanted to take a snapshot a backup of 25 physical machines then instead of having to plug each machine into an external hard drive and then run whatever software you would use to back up that uh computer’s contents on the the external hard drive you would just go to your hypervisor you would select all so select all of the machines and then run the backup within the hypervisor and then go to lunch and come back and all of the contents of all of those 25 virtual machines have been backed up on your external hard drive and if you can think about it so if we go back to the file system hierarchy that we reviewed at the very beginning of this training series and you you consider that you know every computer technically is just a massive file system and it has the root folder the root directory and inside of the root directory there’s a bunch of primary uh directories and then those primary directories are extended into a bunch of other directories and then those directories contain a bunch of files and folders and so on and so forth so when you think about it as a large file basically right so you have one root file and inside of that file there’s a bunch of other files folders when you think about it that way it’s basically as simple as copy pasting right so that’s what it’s like when you have a virtualized environment you click on one little line item inside of the hypervisor and that represents a computer and all of the contents of that hypervisor or all of that VM would be backed up using that hypervisor and it’s so simple to do so it’s it’s much much simpler process than having to back up 25 physical machines so this is one of the probably one of the biggest advant as far as convenience is concerned it’s one of the biggest advantages of using virtual machines and if there’s any disaster or you you lose your power or the building burns down or something like that it’s like all of these things are stored inside of this one virtualized environment that can easily be accessed especially if you’ve developed redundancies which is very important in security and disaster recovery and you have multiple locations that are connected to that same hypervisor and then if one Lo goes through an earthquake that means they’re all good that you can still launch all of those computers all of those virtual machines because you have these redundancies that are essentially connected to the same hypervisor the same virtual environment so very very powerful concept and uh as a summary really what we need to understand is that there are two types of hypervisors so if you know what a virtualization is and if you understand the concept of virtual machine you need to understand that there are two types of hypervisors we have the type one and then type two type one sits on top of the physical infrastructure type two sits on top of a already running computer which is would be the host computer and then from there you would deploy your virtual machines but I do want to show you this visual because I really believe that visuals actually help kind of uh embed Concepts into your brain and really drive the point home so uh let me just show you this real quick so this is a very simple visual representation of the types of hypervisor so we have the type 1 hypervisor on the left side here and this is the hardware so the CPU the motherboard the RAM and the graphics card and the power source and everything else that represents the hardware that is required for a computer to run and then on top of the hardware is the hypervisor so there is no operating system it’s just a hypervisor that is the type one the bare metal hypervisor and then from this hypervisor you launch all of the various uh web applications or applications or operating systems to terminal computer so on and so forth so it’s kind of simple and you can see how the this is more efficient and more uh performance driven because there is no operating system on top of the hardware it’s just the hypervisor that is deploying these various operating systems and then the type two would be my laptop for example or your computer that would be the type two where it has the hardware and then on top of the hardware is a Windows operating system that’s being used as a main computer or a Mac operating system operating as a main computer and then you have downloaded the hypervisor as a software and that hypervisor helps you launch these various operating systems or these various virtual machines and that’s basically it there’s it’s it doesn’t go any deeper than this right so the the details from here on would be okay what hypervisor are you using and how do you use it or are you going to use a cloud service provider to be acting as your hypervisor technically and then you’re borrowing or you’re renting their infrastructure from their massive uh server rooms and their data uh centers and so on and so forth and then you’re just using their interface to launch your virtual machines and then you’re going to give your employees their login and they’ll they’ll access it from their computer or is that how you’re going to do it or you know what I mean it that’s where the details kind of come in but for the overall concept that’s basically it right so if you if you are going to rent services from a cloud service provider you’re technically going to be in a hosted environment which would be this place and then you’re going to log into your web browser and that would be done from your operating system from your current computer you would log into a web browser and then you would go into Google cloud and then you would deploy 100 virtual machines using the hypervisor that is uh from Google cloud and then from there for each one of those virtual machines you would get an IP address or a login link basically and then for that login link there’s going to be a username and password that would be given to a person and then that person from their computer would get access to that particular virtual machine or web application and that’s basically it that’s really as deep as you need to kind of go into to be able to understand how Cloud environments work and how virtual machines work once we get that then we can kind of go into the nitty-gritty and be like okay this cloud service provider does this and this one does this this and so but it’s all essentially the same concept just in a little bit more nuanced of an approach so that’s it that’s the difference between a type 1 and a type 2 hypervisor if we wanted to look at different versions of type 1 hypervisors for example the KVM the kernel-based virtual machine would act as a type one hypervisor and is integrated directly into the Linux kernel it sits right on top of the physical hardware and it transforms the Linux operating system into a very powerful and efficient virtualization host capable of running multiple VMS with various guest operating systems and this is typically done in a a server type of an environment so um we can integrate the KVM with the Linux kernel um as you already know what the kernel is it connects the user to the actual physical infrastructure and makes it highly efficient and able to leverage the existing Linux infrastructure it in allows the the KVM to take advantage of the features of Linux like the memory management process scheduling input output handling robust performance and scalability all of that stuff falls under using something like the KVM or just the KVM itself um it also helps you allocate the resources very easily and efficiently so to speak um it uses the hardware assisted virtualization which is what a type 1 hypervisor is and it’s it’s supported by the processors with uh Intel virtualization or amdv technology and these are essentially the hardware uh AMD for example amdv uh you should recognize AMD just by the name because they create really awesome graphics cards and Intel also creates graphics cards and computer chips and things like that so um the KVM uses uh Hardware that is supported by processors from Intel or AMD and we’re talking about physical processors computer processors so this Hardware support allows the KVM to efficiently allocate resources like CPU memory and input output usage to Virtual machines ensuring that the performance and overhead is all matched up as it’s supposed to be and it’s all balanced out but basically kernel Bas virtual machine KVM is a type 1 hypervisor that sits on top of the physical computer and then from there you would launch a variety of different virtual machines um it has a lot of support for various operating systems meaning that you can actually launch Windows and Linux and BSD and these various types of operating systems from the KVM so it is compatible with variety of operating systems and it’s runs its own OS so uh each virtual machine would run its own OS basically and it would be configured with the hardware specifications like for example how much CPU will it use how much RAM is it going to get how much storage is it going to get so on and so forth so again the same thing that is done with a type 1 hypervisor it’s just this specific one is of notes for what we’re talking about because it works with Linux it is a Linux uh virtual machine manager Linux hypervisor but it is compatible with Windows and Linux as well as any other operating system that you would want to install for your virtual machines ver is the command line tool the command line interface that interacts with KVM so this is essentially the interace that you would use to manage the KVM based VMS KVM based VMS that’s like a kind of a tongue twister um it’s a part of the lib vert virtualization toolkit which provides the API to interact with hypervisors including KVM as well as a variety of different hypervisors so verse is the command line interface to interact with KVM to be able to deploy your virtual machines if you want to start a virtual machine via the command line using Verge this is basically it so you would run verse start and then the name of the VM or whatever the VM name that youve designated previously and it would just start that virtual machine up right and replace it as you can kind of this is like very intuitive it’s a very uh easy to understand command line so you run the command start and then you just give it the name of the VM so that it actually starts DVM uh for example this would be something that the name of the computer would be my virtual machine and you just say verse start my virtual machine and then you can list the running virtual machines using list so ver list very very simple to understand right so it would list all the currently running virtual machines uh displaying the IDS the names and the states that they are currently in and this is what an example output of that would look like so this in this particular case there’s two virtual machines there is my virtual machine and another VM and they’re both running very very simple to understand stand easy to understand if you want to shut something down then you would just use the shut down so the opposite of start you shut it down it reminds me of Kevin Hart I’m hey shut it down um so you would use verse shutdown and then give it the VM name and then it would just shut down gracefully I love this portion it gracefully shuts down that virtual machine uh making sure that everything is all good and this would be the example of it um using the my virtual machine name so verse shut down on my virtual machine um these are a couple of examples as again just to kind of reing grain this all in your head the start command would start up the virtual machine so in this case it would be the Ubuntu VM that we’re starting if we wanted to list the virtual machines you would use ver list and it displays all the currently running virtual machines on your screen and then shut down the virtual machine would be done uh to stop the virtual machine from running so verse shutdown ubun 2vm would stop the UB Bo 2vm from running so KVM is the type 1 hypervisor that’s integrated into the Linux kernel um it enables virtualization on Linux hosts um and then you can run multiple VMS uh with a variety of different operating systems and these are our basic commands so start a VM run the VM or view the the running VMS and then stop the VM to uh deploy the virtual machines using KVM is going to be out side of the scope of this particular interaction I just want you to know that the tool that is used to interact with ver would be or excuse me to interact with KVM to kernel-based virtual machine to interact with that you would be using the Verge command line and then from there the the commands are as simple as starting something that’s been deployed using that particular hypervisor which is KVM so the KVM hypervisor would be the one that would give you the name of the virtual machine for example and then from there you would uh start it stop it list what you have available so on and so forth virtual box is another really commonly used widely used type 2 hypervisor so as we reviewed our hypervisors this one is going to sit on top of a host machine uh it’s been developed by Oracle it’s very popular because it’s compatible with a different operating systems like Linux Windows Mac OS and it’s commonly used for testing and deploying environments um uh testing and development environments excuse me um it provides the easy to setup and flexible platform because it’s I mean it’s literally like running any software and you can go through the prompts and The Wizard for the installation to run multiple operating systems on a single machine uh some of the key features is that it has compatibility with a variety of platforms so you can actually run it on a variety of host operating systems uh which makes it versatile to use on different platforms you can uh run a bunch of guest operating system sys meaning Windows Linux Mac OS Solaris and others so it’s cross compatible right it’s Closs platform compatible you can run it on uh windows or Linux to launch Windows or Linux right it’s compatible across the various platforms very easy to use as I mentioned it’s as simple as doing a couple of clicks to download the install files and then actually installing it and then once you have it installed you would use the GUI the graphic user interface to to just go through the prompts and click the various buttons that you would need to uh start up a new virtual machine and there’s a lot of documentation that’s available for virtual BLX because the fact that it is one of the most commonly used tools for virtualization the one of the most commonly used hypervisors and if you really want to be nerdy about it you can actually use the command line interface for management and automation for scripting and a variety of different tasks uh if you really want to get good at virtual box and just virtualization in general which I recommend that you do uh I would recommend to go look into it um I’m not going to go deep into the virtual box uh command line and it’s use case but there’s a lot of tutorials available and maybe in a future video I will if there’s enough people that want to see it I may just create a video using virtual box because again it’s just one of the most commonly used tools to virtualize VMS um some of the key features here that we have this snapshot functionality so it allows you to take snapshots of the current state of a VM so meaning that you actually can take backups of the computer very easily as I mentioned earlier it’s as easy as clicking on one of the virtual machines in the list of VMS that you have and then just taking a snapshot of it meaning backing up its content so it’s very very useful and very easy to create uh virtual images so to speak or a snapshot of a virtual machine to have it as your backup uh you can have guest additions meaning uh there are tools that you can use um to enhance the performance and usability of the guest operating system so you can improve the graphics for example of an operating system you can have shared folders between all of your operating systems or you can have a mouse integration which is I mean that one’s kind of a gimme but uh the shared folders part is very important to be able to improve the graphics of a operating system is also very very cool to be able to do just from your virtual box from your virtualization hypervisor so that’s a very cool little feature and for the Nerds vbox manage is the command line interface for managing virtual boox VMS so uh this is basically the the platform the command line interface that you would use to virtualize machines via the command line or to create scripts for virtualizing machines which is where the the the scalability comes in in a a easy convenient type of a format when you learn how to script and you can launch you know a dozen machines with the use of a uh a script that was done it’s I mean it’s it makes it even easier to virtualize VMS so uh vbox manage is actually the CLI the command line interface to launch virtual machines so uh vbox manage start VM VM name so this is a little bit uh more of a mouthful than verse but basically the the same concept right so you would uh call on the vbox manage tool and then start VM and then give it the VM name which would be the name of the virtual machine so as an example ubun 2vm would be the name of the virtual machine so you would just say Rebox manage start VM ubun to VM uh if you wanted to list them same thing list VMS very very simple um instead of verse list this is vbuck manage list VMS so as it’s kind of as simple as just using verse and then it would just list all of the vmss that are registered with virtual box and it displays their names their uu IDs and so on and so forth if you wanted to look at the output as an example this is what it looks like so you have the Ubuntu VM and the Windows 10 VM so we have a Linux VM here as well as a Windows VM and Microsoft and these are The UU IDs that are associated with these virtual machines that we’ve launched using virtual box so if you box manage control VM VM name power off again more of a mouthful than using the Verge command but this forces the specified VM to power off so you would replace it with the name of the VM that you want to turn off vbox manage control VM VM name power off this would be the example so ubun to VM being powered off and this is what we would do to do that so A couple of examples just to kind of review these commands that we have so vbox manage start VM Deb and VM would start the DN VM list the VMS with list all of the registered VMS with their names and their uu IDs the stopping of a VM will be done with control VM give it the name of the virtual machine and then give it the power off command and in summary we have the vbox manage commands for managing VMS at the bottom right here and uh we have the reference of virtual box which is I would say probably one of the most HP popular if not the most popular type 2 hypervisor that’s super super easy to download install and then it’s very flexible because you can run multiple operating systems on a single computer and it’s used for testing development and a variety of different tasks because it’s so compatible with various hosts and guest operating system so again it has cross compa compatibility between the host operating system and the guest operating system which makes it again one of the most popular hypervisors that exists on the market doc ERS and containers are The Replacements that we have for file systems and uh partitions essentially so a doer is a popular popular containerization tool that enables us to package applications and their dependencies into uh portable containers essentially um these containers can run consistently across different environments ensuring that the application behaves the same regardless of where it’s being deployed so you have have a container a compartment so to speak that includes a variety of different applications and all of the dependencies for that application to run and then you can launch this Docker uh within a Windows computer a Linux computer or so on and so forth and this would be all done through the virtualized environment right so this is something that a virtual machine would have access to so a container versus the virtual machine itself if you have to think about the comparison between the two uh containers are the isolated environments that share the host operating systems kernel they’re lightweight fast to start and they don’t require a full operating system okay containers include everything needed to run the application like the code the runtime Etc but it’s not an actual virtual machine so the virtual machine is not the uh or excuse me the container is not the OS right so it’s an isolated environment that shares the OS and then it has the application and the dependencies that would need it to run right so the virtual machine is the OS the container is the environment that is using that OS okay so uh you can have uh and so as as the comparison here we also have the virtual machine that is running on the hypervisor and includes the OS right so the container would run on the virtual machine essentially that’s what it is so a container hosts the application it hosts the dependencies so on and so forth but it needs to run on something so it would run on the operating system that’s provided by the virtual machine or it would run on the host operating system that would be your computer for example each VM operates independently with its own OS which increases resource usage as we’ve already established containers don’t run their own OS so they’re more lightweight and they’re faster to run um when you have a Docker container right so the docker and the containers within that Docker essentially they run on anything that can actually support Docker which means that they’re consistent across development testing and production environments uh they’re isolated so you can manage the file system or process everything that goes on within that file system uh on the variety of different operating systems that they will be running on um which means that you can have multiple applications run on the same host without interfering with each other so this is really just a fancy way of saying that you can compartmentalize a group of applications or a series of applications from each other you can separate them from each other run them separate of each other but they would be running on the same host right so they’re portable meaning that they can essentially be transferred via an email or a file share and then they can be isolated they can run on themselves or by themselves excuse me without uh interfering with each other and then uh they will run on the same host they would run on the same host operating system and they’re isolated right so they’re portable and they can be isolated the benefits are many um they’re efficient so they’re lightweight as we mentioned they don’t use as many resources from the hardware or the operating system and it can start at pretty much like you’re starting up a piece of software because that’s kind of what they’re like um they’re scalable meaning that they can be easily scaled up or down based on the demand they can be shared with a variety of different uh operating systems um and they’re very uh they’re ideal for micro services or Cloud native applications and that’s really where they come into play is the cloud environment because Cloud providers uh offer these Dockers and these containers and the software that is installed within them the applications that are installed with them are provided from the cloud service provider and uh you can essentially download it and install it into your virtual machine fairly easily or download it and install it to a 100 of your virtual machines fairly easily because they’re very compatible and they can scale up or scale down um to be able to run one you would use the docker command so the docker is the tool that will run the image of one of the containers that would run one of the containers ERS so the it option allows you to interact with the container via the terminal so you say Docker run interact with this particular image name and then you would replace the image name with the image or the the name of the various container tools uh that you would want to run so as an example you run Ubuntu right so again you’re running Ubuntu as a software technically as an application you’re not running it as an operating system system and that’s why it’s faster to run and it’s using the resources of the host operating system to run it so this is not uh running Ubuntu as an operating system it’s running it as a container which is using your host operating system your computer which is why again this is very native to Cloud environments because when you’re using a cloud environment you’re technically using a type 2 hypervisor which uses your computer’s resources to launch Ubuntu for example right then you have PS to actually list the containers that you have available so it’ll list all the currently running containers displaying their IDs names statuses and more and this is something that is done inside of the cloud command line and this is what it looks like so you have the container ID the image meaning what is actually running um the command uh interface for it which is a bash interface in this case it was created 2 hours ago it was uh up for 2 hours and there are no ports for it and the name is awesome Wing that’s been assigned to it and that’s it that’s what it looks like if you wanted to stop that exact container you would just do stop container ID and then give it the container ID or the container image name in this particular case but H what we’re talking about is this ID so this would be the container ID that you need to give it to stop that container from from running to stop that image from running this is what it looks like to Docker stop and then you give it the ID and just like that it it stops that container from running if you want to pull an image and so pulling an image meaning downloading the specified Docker image from Docker to your actual computer to the local machine your host computer that you’re running it on you would use Docker pull and then give it the image name so for example pull Ubuntu or pull in Jinx in this case it pulls the latest inin image from the docker Hub onto your computer and the docker Hub is the location where everything is listed inside of the cloud service provider that you can uh either install on your virtual machines or run from the cloud service provider or just download onto your local computer right so dockerhub is the location where all of these the variety of Ubuntu and in Jinx and the all of the different images so to speak of these containers are all stored and then from there you would either run them or download them onto your computer or you can install them on your virtual machines if you want to remove something it’s as simple as using the remove command so RM removes that container or the the stopped container right so you actually have to stop the container first and then from there you would remove it from your list of containers it’s fairly simple it’s like very intuitive um you need to give it the ID so as we already mentioned this is how you stop one and when you stop one you can use the same ID to remove it and then if you wanted to remove an image of something you would just use RMI so if you use the RM command by itself you need to give it the ID of the container in this particular case if you wanted to use the image name cuz it’s much it’s a more convenient thing to use the image name instead of the ID itself unless you’re going to copy paste for example but if you just want to remove it by its image name you just do RMI and then give it the image name and then it will remove that specified duck or image and then the same thing example would be here right so Ubuntu is much easier than this ID number for example so you just do RMI Ubuntu and then it’ll remove the Ubuntu image from your local machine so in summary we have the simplification of creating deploying and running applications in isolated containers that’s what basically the docker does right so the application is stored inside a container and then you would use Docker to deploy it or to create one or to download it onto your local machine or to run it or to stop it so on and so forth so Docker is the source that you use to interact with the various containers and then inside of those containers could be a variety of different things so it could be applications it could be what you saw technically as that Ubuntu image that was running running which is technically not its own operating system cuz it’s still running on top of your host operating system which is your computer so it’s more lightwe to do it this way so it’s faster to run them uh compared to traditional virtual machines cuz when you actually start a virtual machine uh it takes up a little bit more time and it takes up more resources uh because it’s a little bit more heavy duty uh than running just a container that has that specific series of applications that you’re looking for for it to run so again not an operating system you’re not launching the Ubuntu operating system you’re launching the variety of applications that would be stored inside of that one container that resembles what it would be like to launch Ubuntu as the operating system right but again it’s not running the actual operating system cuz your host operating system on your computer acts as the OS and then the container has the ninx server in it and the the applications and dependencies that would be connected to running an engine server and then you just launch it and now you have your engine server up and this is your cheat sheet of the commands that we just talked about so if you wanted to take a screenshot of this or uh jot it down you could pause the screen or take a screenshot of the screen one two three and moving on now we’ve talked about virtualization and virtual machines and Dockers and containers and all that good stuff now we can talk about Cloud Administration because essentially this is what virtualization is you are dealing with the cloud with virtual machines and virtual computers so cloud computing it’s the technology that provides OnDemand access to Computing over the Internet so on demand access to Virtual machines or Dockers or containers so on and so forth uh it includes servers storage databases networking software and a variety of other things and you can provision them and manage them with the click of a button and cloud computing allows businesses and or individuals to leverage these powerful resources without the need for physical Hardware or extensive it infrastructure which is what makes it so freaking popular so the infrastructure as a service is the first one and infrastructure as a service is something that’s provided as it says as a service and it’s provided from a cloud service provider so infrastructure as a service is the virtualized hardware resources like uh which is virtual machines for example storage networks which allows the user to deploy and manage operating systems applications and development environments so this is infostructure as a service uh the example would be AWS ec2 and AWS has a variety of different Services under their umbrella of services ec2 is the compute capacity in the cloud and enabling users to run applications on Virtual servers that’s what their version of IAS infrastructure as a service is the next one is Microsoft Azure virtual machines which is the uh essentially the equivalent of aws’s ec2 and it provides a range of virtual machine sizes configurations which support both windows and Linux operating systems and then we have the Google compute engine which is the Google version of this whole thing which is essentially offering the same thing uh scalable flexible compute resources for running large scale workloads on Google’s infrastructure and then you have platform as a service platform as a service would be the next level up so if we looked at infrastructure as a service as the base level because they’re providing the infrastructure platform as a service is the development and deployment environment in the cloud so it provides you with the tools and services to build test deploy and manage applications without worrying about the underlying infrastructure so for example the virtual machines and the physical Hardware that’s required you’re just using their platform to develop your applications to deploy and test your applications so on and so forth so it’s the next level up from buying infrastructure or renting infrastructure uh the elastic beant stock would be the AWS version of this um which helps you develop and scale and deploy web applications and services using popular languages Google app engine is the Google version of this that helps you deploy applications on Google’s infrastructure without automatically uh with automatic scaling excuse me automatic scaling and management and then we have the Microsoft Azure version which is the Microsoft Azure app service that helps you uh develop help developers build deploy and scale uh web apps and apis quickly with the integrated support for various development languages so on and so forth so basically these three companies essentially offer the same exact thing across the board uh the platforms have different interfaces to use they uh some of them are more userfriendly than the other ones but for the most part they offer similar services for everybody then you have the software as a service so if we were to look at infrastructure as the base level platform would be the next level software would be the next level as well which would be the application over the internet on a subscription BAS so you can access these via a web browser without the need for installing or maintaining anything you’re just log into any of these companies so Microsoft Office 365 is like one of the most com uh common ones it’s access to Microsoft Office like word excel PowerPoint so on and so forth and you it’s very similar to Google uh drive right so Google Drive would be another one of those things where it’s kind of the software as a service you get access to Google Sheets and you get access to Google Docs and so on and so forth and that’s you’re using the software now right right the the software is the word editor the software is the spreadsheet Creator editor and that’s what that is and with the connection with these things to one drive and teams so teams would be the sharing portion of Office 365 and one drive is the storage portion of Office 365 which again is very similar to Google uh Google Drive excuse me um Google workspace is the software as a service that kind of combines everything together right so you have the productivity collaboration because you’re now working with your uh co-workers and everybody that’s on your team and inside of this would be Gmail Google Drive doc sheets and Google meet which would be their video uh chatting video conferencing and then Salesforce which is a really big one um it’s a customer relationship management so which is a CRM tool and it helps businesses manage their customer relationships streamline s processes so on and so forth and Salesforce again is a software and it’s actually available on most cloud service providers as well and you can buy a license to it and have it installed on everybody’s local computer so that would kind of be another version of the software as a service so cloud computing as we’ve discussed in multiple instances so far under this uh particular chapter it helps you scale up or scale down right so based on the demands of your uh company you can get a bunch of different softwares deployed to all of your users all of your employees you can have a bunch of different virtual machines launched using the infrastr infrastructure as a service you can have uh the platform launch as well for them to be able to develop code and run uh or test their uh uh Cloud resources or test their applications that they’ve developed so on and so forth and you can do this up or down meaning as your company grows or as your company shrinks and downsizes you can add things with the click of a button or you can remove things with the click of a button very easily scalable in both directions and it’s coste efficient so this is this is one of the big things that companies are like uh one of the main reasons why they go into cloud computing because literally I mean for $20 for $30 a month you can start uh launching something for whatever environment for as much power and processing as you would need instead of buying a $5,000 computer you know what I mean depending on what you’re looking for depending on what you would need the cost The Upfront cost is so much cheaper and then you know when you don’t need it anymore instead of worrying about what to do with that $5,000 computer you just stop paying for the thing and let’s say you used it for 6 months and you don’t need it anymore and now you stop paying for it and you just turn it take it down you know what I mean it’s it’s in the grand scheme of things it’s so much more efficient cost-wise to use cloud computing for a Compu uh for a company especially maybe not for a person just depending on who you are as a person and what you do and what you you need it for maybe you do need it but for the most part for comp companies it’s kind of it’s kind of a no-brainer to go into cloud computing uh to use their services um flexible obviously accessible so cloud services are accessible from anywhere with an internet connection you just need your laptop and now you can log into your cloud service providers your CSP and then from there get access to whatever it is that you were using from your home office for example um they’re reliable they’re available because they have redundant locations so AWS micro uh Amazon’s uh web services they have warehouses all over the globe that house these servers that are connected to the AWS service and if one of those things goes down it just defaults into the next available one in that region and now the whoever the person is that’s using it never has to worry about losing access to what it is that they need to use and this is very very important because the redundancy portion of this the Redundant server warehouses that exist all over the world literally all over the world these redundant warehouses are the main reason why these services are so reliable and available all the time uh Disaster Recovery as long as you have enabled some kind of a backup you will never use your lose your data and as long as obviously you’re paying your bill that’s the other part so it’s like as long as you’re paying your bill and you’ve done a scheduled backup uh you will never lose your data and you will never lose your service your server will always be on your web server your application server will always be on and running so the and these were just the three major Heavy Hitters we were talking about there are a lot of different cloud service providers that are also very legitimate and they have a lot of great resources that are available so uh these were just the three big ones the three Heavy Hitters that we were talking about and then you have of course the automatic update so you don’t need to update your computer uh you don’t need to update the service it just gets updated on your behalf and you don’t have to worry about making sure your it team is on top of it or that you if you’re the the sole proprietor the administrator and the CEO and everything you don’t have to worry about updating anything because it’ll be automatically done for you the security will be updated for you uh all of it is very very convenient process there there’s a lot of different conveniences that are available for using cloud computing but this is another really big one because with updates and uh automatic updates with automatic updates there is a lot of security that is uh enforced and a lot of convenience that is also enforced because as things get more streamlined uh then you will just get those updates as things get um hacked into so as pen testing is done and they upgrade their security infrastructure you will also inherit those benefits as well so cloud computing is a very flexible scalable cost efficient and just awesome way of going into virtualization and you have the infrastructure as a service I AAS platform as a service p p p a a oh my God and then s AAS as a service and I’ll show you what the visual of that also looks like this is kind of the best image that I was able to find all the other ones are they’re similar to spreadsheets or something like that or like a pyramid that doesn’t really give you much um so I AAS the infrastructure as a service you can see that this is basically what the web server looks like or the servers that are inside of those massive warehouses that’s what it looks like and this is what you’re renting and these things can help you deploy virtual machines and virtual computers for people to use and then those people can then use uh install their own um for example operating systems on top of them or they can install their own applications and develop new applications so on and so forth so this is the most uh base level of ser service that you would get which on top of this you can essentially do anything that you want but you would need it people you would need a team of people to be able to do this for you right and then you have platform as a service right so it they give you the servers obviously but then they also give you the operating systems so you could just launch a Windows machine or a Linux machine instead of only launching a server and then on top of the server having to use your hypervisor to install the operating systems you would just launch one you would just launch launch the operating system and then from there you can start developing your code or you can start running your business whatever it may be right so this one requires the most configuration because you do need to use a hypervisor to be able to install the virtual machines and then install the operating systems and then launch them this one you just launch the operating system with a couple of clicks and now you have access to a Linux computer or Windows computer right and then the last one is assuming that all these things are already configured for you you have to do no configuration and then you just launch the application so Google Drive for example you just launch Google Drive right and that’s the the the most convenient version of this uh Trio because there is very little configuration that’s required from your behalf you just log into the application and you start using the software and that’s basically it right so this one requires the most configuration because somebody needs to use a hypervisor and install the uh operating system install the Linux or uh ver windows or whatever it is uh launch the virtual machine all of those things this is the most configuration this is the least configuration and then this is the middle ground right here that with a couple of clicks you’re now launching a Linux machine and then now you use the Linux machine and use the applications inside of it or you launch a Windows machine so on and so forth so this is the trio that we have over here which falls under as a service this infrastructure plat platform and then software as a service it’s probably also a good idea for us to talk about some of these Cloud survivers uh providers excuse me uh these are again the big three that we got over here so Amazon AWS Microsoft as well as Google um they offer a comprehensive list of services um and they’re comparable you know they’re very comparable to each other it’s just I guess kind of defends on Personal Taste and personal preferences um where they would uh differ or where somebody would choose one over the other maybe pricing would also play into that but for the most part uh they all pretty much offer uh similar range of services so AWS is you know the most popular Believe It or Not Amazon is not just a Marketplace their biggest profit comes from their web services their AWS web services because for the most part they have the same infrastructure that’s set up and then on top of that they’re just selling uh access to their resources on a variety of different tiers and it includes computering power of course storage options networking abilities um I host my website one of my websites actually all my websites but I don’t have one specific that’s launched for this channel yet uh I did buy the hack Alix Anonymous domain through AWS so that’s a really cool one and uh that’s basically it like it it just offers uh computing power storage options and networking capabilities that makes it great for everybody individual users Enterprises government entities so on and so forth um their key services are the elastic compute Cloud so ec2 uh lamb Lambda excuse me which is serverless Computing so you don’t need an actual computer or server excuse me and you can just get access to uh computing power just using their platform and then elastic beanock which is the platform as a service and then storage would be the simple storage service which is S3 elastic Block store and then Glacier which is for long-term storage Amazon web services databases uh runs across the variety of different services or levels of services as well so you have the relational database service you have Dynamo DB which is no SQL database and then you have the red shift for warehousing data warehousing which is kind of falling into cold stor storage and then you have networking so virtual private Cloud Route 53 for DNS services cloudfront for Content delivery Network and this is their list of key services and then we have the management consoles and the management tools so uh the interface for managing AWS resources would be the Management console the AWS CLI for the command line interface to interact with their services programmatically as well as script wise and then you have the software development kits the sdks for integrating AWS Services into applications using programming languages so python sdks are very common thing to understand when you’re interacting with the API of any service you will look for a python SDK and you will import it into your uh software or not your software excuse me you will import it into your project file and then that SDK will allow you to interact with the API of that service for example in this case AWS AWS has an SDK you can import that into your python project and then now you can interact with your AWS management uh environment as long as you have your your token and your API key so on and so forth to confirm that you actually have access to their services now you can interact with those services using a variety of apis and software development kits so uh very very cool portion of it and again also all of these guys have sdks just to let let you know so Microsoft Azure is another one it’s the competitor to AWS uh seamless integration with Microsoft products Azure offers a wide range of cloud services including compute analytic storage and networking you have the compute and storage portion so aure virtual machines Azure functions which is the serverless Computing Azure kubernetes service which is a really big one a lot of people actually ask for this uh inside job descriptions you have the Azure blob storage Azure disk storage and Azure files you have the databases which is the SQL database Cosmos DB which is the nosql database asure database for post SQL and MySQL and then we have Azure virtual Network Azure load balancer and content delivery Network which is for their CDN and then you have their management tools which would be the Azure portal the command line interface and of course Powershell scripting language and then they also have an SDK that you can interact with and then we have Google cloud which is for capabilities in data analytics and machine learning uh they have a robust set of cloud services that leverage the infrastructure of Google the massive infrastructure that they have like Computing storage application development uh Google compute engine the kubernetes engine and Cloud functions are all under their Computing section you have the storage so cloud storage persistent disk file store Google Drive for example and then you have the databases cloudsql Cloud spanner which which is the regional database and of course fir store which is the nosql document database and then networking for virtual private Cloud so VPC Cloud load balancing and Cloud CDN and then this is their management tool so Cloud console the cloud CLI and the client libraries for integrating into applications using programming languages so the client libraries would be similar to the SDK the CLI as you can tell every single one of them has a CLI and every decent cloud computing provider should have a CLI and then the console which is the GU the graphic user interface for management of all of your resources and assets via Google Cloud so that’s what we got over here obviously scalable obviously cost-efficient we’ve talked about all these things flexibility security all of those things and the Advanced Services like the AI stuff machine learning stuff and the big data analytics enabling you to innovate and stay competitive uh this is becoming more and more uh required to be competitive in the modern business world to have some kind of an AI assistant or some kind of AI uh integration with your infrastructure to make things more efficient and respond faster machine learning to just be on top of your competition with the research that’s being done and to improve your data sets and your infrastructure because machines learn faster and better and more consistently than human beings do and then you have the big data analytic stuff which is uh it’s very very crazy that how much data actually exists in the world and how important it is to be able to ingest all of that data and make sense of it and these things are connected to each other so the big data analytics connected to the machine learning which is done by an AI all of those things are interconnected and they’re I feel like they’re almost mandatory at this state of the the modern technology world and how technology has been connected to business I feel like these things are absolutely mandatory and if you want to be really really good as a cyber security person as a administrator a tech person it you need to really get comfortable with the concepts of machine learning and big data and using AI Integrations so that you can just stay ahead of the curve when it comes down to your competition inside of the IT world and the cyber security and pentesting and system administration World in summary we got these major Cloud providers but they are not the only ones and uh I would challenge you to Google what the major Cloud providers are and see what you can find out there and how they rank as far as their competitiveness to these big three right here um there is a lot of tools available as we already talked about there’s infrastructure platform as well as software that is available as a service and they have a lot of great management tools including the consoles as well as the command line interfaces as well as the SDK the software development kits that integrate well with programming languages to provide further automation capabilities and these are the big three as we talked about all right so you got your VMS up you got your containers and all the things that are provided to you by your virtual EnV environment how do you manage these things that’s what we’re going to talk about so lib vert would be the first command line tool that is available for us and it’s a toolkit that is connected W via API and it’s used for interacting with VMS across a bunch of different platforms like KVM uh kemu Zen and VMware it’s consistent because it works across all of these different platforms and it’s a very popular choice we’ve already mentioned it actually hopefully you remember uh as we talked about D virtualization portion earlier we did mention lib vert already um it offers a unified API for managing the VMS across different hypervisors uh simp it simplifies the VM management as a result and makes it so that the use of a consistent scent of commands and tools would basically work everywhere depending on doesn’t matter where you are and what you’re using as your virtualization technology Tech ology um ver would be one of the key features that comes with lip vert and then vert install with the command line tool for creating and installing a new virtual machine so these are the two command line tools that come with vert and it’s compatible again as we already talked about so it works with the various virtualization Technologies it’s a versatile tool for various virtualization environments and this is kind of what a command looks like to use uh lib verts specifically to create a virtual machine so there are a few elements here that we need to go over so vert install would be the command line tool to install a new machine the name is what you’re going to give it and then this is how much memory should be allocated to it the vcpus that would be allocated to it and then the dis which is this is going to be the path that’s going to go for this particular dis and then the variation of the OS that you’re going to be installing which is essentially the OS image that you want to use to complete your installation so this is the breakdown the full breakdown of this we have the vert install which is to create and install a new virtual machine inside of lip vert then you have the name that you’re going to give it so what you want the virtual machine to be called the allocation of 248 megabytes of ram to this particular VM which is basically 2 gigs worth of ram that you’re giving to this virtual machine the process processing power that it has vcpu which is the virtual CPU that’s going to be assigned to this virtual machine which is in this case two CPUs that are going to be assigned to it and then this is the path so the dis image for the VM with a size of 20 Gigabytes and the 20 GB in this particular case is storage so we’re not talking about the processing power of Ram or the processing power of the CPU we’re just talking about storage for this particular machine and it’s going to get 20 GB and then of course the OS variant which is the operating system for this particular case which is Ubuntu 20.04 so this is how you create a new virtual machine using vert install inside of lib vert and this is the full thing if we were to actually provide some fillers in here so the name would be my Ubuntu VM same uh RAM capacity that we’re assigning to it same vcpus that we’re assigning to it and then this will be the full path that’s going to this thing and then we’re going to allocate 20 gigs of storage to it and then you have the OS variant which is Ubuntu and in the CD ROM wow look at that there’s a CD ROM image as well that’s going to be the path for this particular case it’s being pulled from a CD ROM so this OS variant is being pulled from the CD ROM partition which is the path to that particular cdrom partition and then this is how you destroy one I love that word so you destroy a virtual machine using the verse destroy so vert install is how you create one and then to it destroy it you would need to use ver and so again you just give it the virtual machine name that we got here so my Ubuntu VM would be the name that we give it and then it destroys it it forcibly stops the specified VM with the name that you want and actually destroys it so my Ubuntu VM in this particular case is being destroyed if you wanted to list your virtual machines you would do list list all and it lists everything that’s being managed by lib vert showing their IDs their names their current state whether or not their run uh running paused or shut off and then this would be an example output for that which is in this particular case you got three so the May Ubuntu VM the test virtual machine and the old virtual machine and because of the fact that this one is shut off and this one is paused their IDs are not activated so the only one that actually has this ID that’s associated to it is the one that’s currently running running and this would be the output that you would get from listing the all virtual machines with ver so this is the the flow here that we got so as an example we want to create a virtual machine in this case which is the my sentos Cent OS being one of the red hat distributions of Linux there is 4 GB of RAM assigned to this particular one there is four CPUs assigned to it the dis location the path to this virtual VM is going to be here and then there’s 40 GB of storage that’s assigned to it and then the orus variant is Centos and then it’s being pulled from the cdrom partition for Centos installation that has the iso image on it and that’s it this is how you install one with the Cent OS if you wanted to destroy that same machine you would use ver so again vert install installs this one ver is the one that we use to destroy this thing and it immediately stops it and then if you want to list everything you would do the list all command so lip vert is the toolkit for managing virtual machines across a variety of virtualization platforms it’s consistent meaning that you can use those same exact commands across a variety of different uh hypervisors and virtualization environments and all of those commands would run exactly as they are and then you would have ver for the management and vert install for the installation of the various virtual machines that you got and this is our summary of commands so 3 2 1 moving on okay so now we got to manage our Dockers okay um Dockers significantly or excuse me the containers of the docker my bad so the docker is the tool and the containers are the stuff that we manage with the docker tool so uh Docker simplifies the deployment and management of the applications which are stored inside of these containers and these are the microser Services uh and the architectures around them and the packages of applications along with all of their dependencies inside their isolated containers right so you have the docker which is the tool and the container is the container that houses the the applications the dependencies of those applications and everything else that would be used in something called a micro service so basically just running the various applications uh for example that Ubuntu example that we saw earlier that would just run uh the various applications and the dependencies that would be uh inherent that would be ingrained inside of a Ubuntu environment without actually launching an Ubuntu operating system so you would pull the image meaning downloading it from the docker Hub which would be housed on a variety of different cloud service providers or any other container registry really and then you would pull that from that location into your actual local machine your computer you would download that into your local machine so for example we’re going to pull inin in this particular case and pull that image into our local machine and then you want to run it right so you start the new container in detached mode meaning that it’s going to run in the background and then you would replace that with the name of the docker image that you want to use for example inin what we had in the previous case so run the inin and it’ll run the inin container in the background and it’ll return the container ID for you and once you have that you can do a variety of different things with that container like run it and actually use it and then when you’re done with it if you want to remove it you would need to provide the container ID so we got the container ID by running it inside of the uh background in the background and you can also run the list command as we saw uh to be able to give you the list of the containers that you have as well as their container IDs and then you can use the RM command to remove that container ID or the RMI command to remove the named uh image that you download the named container that you downloaded so remove my container in this particular case uh this would be the one that removes the container um this is my container uh that would be the name I would assume but not the the container ID itself so um we have the logs of those containers so uh the logs of the specified container which does not mean that it’s displaying the contents of those logs um you would need to access that either with Nano or some kind of a text editor or viewer or let’s say IDs or a Sim tool something like that but essentially you can view all of the logs that are associated with that individual container meaning the authentication authorization log the the logs for any errors that may have taken place or just regular interactions that were done with that particular container you can retreat retrieve all of those via the logs command so logs of my container would be retrieved by running Docker logs my container and then you have the PS which will list all of the current running containers so this is how you would get the actual container names their IDs the statuses and any other details and then this is how you would get the ID to be able to remove it for example or to be able to get the logs from it for example so this will be the example output in this particular case I know it’s a little bit small but this is where the container ID is uh listed you have the image which is in Jinx in this case the command line entry for this which is the uh Docker entry point and it it runs much longer than that uh you have the fact that it was created 2 hours ago it’s been running for 2 hours there are no ports associated with it because it’s running on the local machine and then the name is the Serene bassi that has been associated with this in Jinx server so PSA not the public service analment but PS sa a as the listing of all of the containers including all the ones that are stopped so we had the PS that was running something that is running right so it’s going to show you the stuff that’s currently running PSA will show you everything that is stopped or uh deleted or any maybe not deleted but probably the ones that are stopped uh either paused or uh deactivated and then you would see what those uh IDs are and what their names are so on and so forth and then you can stop one that’s currently running so if if you wanted to stop it Docker stop and then give it the container ID these are very very easy commands to remember but you already have this video as a cheat sheet as well so it stops Serene Bassie right so that was in the container ID this was the name that was associated with it the container ID is this piece right here so there’s a little bit of a glitch with these instructions so my bad that’s my bad on this particular case but you you get it right so if you give it the container ID you would need to give it this information right here which is the container ID not the the nickname that has been assigned to it which is Serene bassi in this particular case um if you want to remove it by its image name then you would do RMI and then you would give it the image name which is in this particular case the in Jinx which would be the image name right here so that is the the value that we would give the RMI version which is in this case we see in jinx as our example and so that’s it Docker is the tool that helps you uh deploy and manage applications uh that are stored inside of containers and containers house the applications as well as all of their dependencies to be able to run them and we already went through all of the key commands and this is just kind of the cheat sheet for you so to be able to pull it meaning download it onto your local machine you would use Docker pull to be able to run it you would do Docker run and to remove it you would do RM or RMI you can do PS to list them PSA to list all of them including the ones that are not running running and that’s basically it as far as the docker itself is concerned you also do need to learn how to orchestrate or manage your containers uh to just make sure that uh number one they’re not past their life cycle or if they’re done being used you get rid of them especially in a large scale environment because it does take up a lot of storage to be able to do something like that so kubernetes is something that is done or is used for that for the orchestration of the uh container ERS that would be in that environment Docker swarm is another one that can help you automate deployment scaling up or scaling down management of containerized applications to make sure that they’re running when they need to they’re efficient everything is all good and then when they’re done you get rid of them uh kubernetes is a very popular one uh it’s also it’s also abbreviated as k8s so kubernets uh it’s an uh open source platform for automating the deployment scaling and management of containerized applications and it’s great for really anything um especially in a large environment so automatic deployment and scaling because it actually works with um a variety of different script templates that come into play as well as rules and policies that you can assign it so you can automatically deploy something um and say that you know for this particular uh image for this in Jinx I want you to to create 100 different versions of this and deploy those 100 different versions and it’s very very good at automatically deploying something like that you can load balance and Route traffic so just based on the traffic size of your environment and the company that you’re working with you can make sure that the physical servers don’t crash because load balancing is very directly related to that so uh balancing the load of traffic that’s coming in and routing that traffic efficiently so that the containers run smoothly but the physical infrastructure is also running and it’s available without anything crashing that’s really basically what load balancing and traffic routing is uh selfhealing is an interesting one um because if anything fails to start so it’ll just be replaced or it will be automatically restarted um if anything that isn’t working repetitively will be killed I love that it kills containers that don’t respond to userdefined health checks and it doesn’t advertise them to clients until they are ready to serve right so it’ll just do everything that it needs to do and once it’s actually ready for the person who wants to use it it’ll just say this is ready to serve but until then in the background it’ll restart something it’ll heal it if it needs to be done it’ll kill it and wipe it and then go get a version of it that’s working and then bring it up and then give it to to the client or the user so that they can actually use it and then it can help you manage the storage as well to make sure that the persistent storage is actually uh deployed as needed it’s mounted as it’s needed and this is all something that kubernetes is done beautifully uh automatically so to speak um then there’s the security portion of this so if you have sensitive information which a lot of people do like passwords and API Keys it helps you manage those things securely which basically means either it won’t display them or if it does display them it’ll be done as hash values which is basically encrypted values that look like a bunch of randomized text that nobody can make sense of and they can’t be decrypted without the key that has been assigned to the administrator or to the user so there there’s no way to decrypt them or to decode them uh because it’s just a very nice algorithm that’s been used for the encryption and then there’s a key that’s attached to it that anybody without that key would not be able to decrypt those contents Docker swarm is docker’s native clustering and orchestration Tool so it essentially does uh what kubernetes does it’s just a little bit simpler um and it helps you orchestrate and manage your containers uh especially environments that actually already are using Docker so simplified setup management um it’s integrated with Docker tools seamlessly so it actually works very well if you’re already using Docker for your particular environment um there’s an ability to scale your services up or down very similar to kubernetes um by adjusting the number of replicas as I already mentioned so you can just say I want you to create 50 versions of this 100 versions of this so on and so forth load balancing same thing that it’ll help with the network traffic so that these Services don’t crash or they don’t overexert the physical infrastructure um it’s secure by default meaning that it actually has TLS encryption which is the more advanced version of SSL encryption that typically runs on top of Port 443 for uh https for web traffic um so TLS is actually very powerful encryption standard for secure communication between nodes in the Swarm cluster which is a very fancy way of saying a variety of different containers or tools that are trying to communicate with each other inside of this massive environment so it provides secure encrypted conversation between all of these various nodes or these various different uh containers that are trying to communicate with each other and it does it seamlessly and securely so to want to do all of these things with kubernetes as an example if you want to deploy a in Jinx environment you would do kubernetes so CP CTL is the command that interacts with kubernetes you do Coupe CTL create a deployment of in Jinx and then use the image inin right so it creates a deployment named inin using the official ninx image very very simple to do uh scale it is very interesting and this can a lot of these things can also be embedded inside of scripts that can be running so you just run the script and it’ll do this for you but again scale the deployment of in Jinx and multiply that by three so it scales this inin to deployment to three replicas this deployment would be done in three replicas how easy is that that’s crazy then you wanted to get the pods so list all the pods that are running in the cluster which essentially contain these three replicas or as many replicas as you would have so you would get them you would list all of those pods contained in that cluster and then the doer version of it would be to use the Swarm initialization first so you need to use Docker to actually initialize swarm first and then that cluster would be that uh stuff that has been managed and so you would interact with that swarmed cluster so you would do service creation and then give it a web so you’re using the web name in this particular case you’re going to create three replicas it’s going to be on Port 80 and it’s going to be inin so it creates a service named web with three replicas using the inin image in this particular case and Maps the port 80 on the host to Port 80 on the container meaning that’s it’s actually what’s used for web traffic so Port 80 is for HTTP traffic so it’s only appropriate that we use port 80 for our web service that has been created with the docker swarm if you want to list all of the services you would just use the ls command which is very intuitive to Linux cuz that is the command that we use to list anything inside of Linux containers or inside of Linux directories I guess and that’s it for the container or orchestration these two tools obviously go much deeper and there is a lot of documentation and a lot of uh tutorials that are available for both Docker swarm as well as kubernetes it’s just I want you to know about them so if you wanted to do more homework and self- teing you know where to go and what you’re supposed to look for and they’re very powerful tools because they both automate the deployment of multiple replicas as they said uh of anything really so it could be a Linux machine Linux virtual machine it could be an in Jinx uh web server it could be anything that can virtually be deployed uh inside of a container and it would be done times a thousand if needed and it’s as simple as saying hey create replicas equals a th000 and then all of a sudden now you have a thousand replicas of that same container so it’s a very very powerful series of tools kubernetes and Docker swarm and there’s obviously other versions of container orchestration tools as well these are just the most popular and the most relevant to the conversations that we’ve had so I do encourage you to check into uh orchestration of containers using either Docker Docker swarm kubernetes or anything that would be similar to it because it would make you much more functional as a Linux admin administrator and overall as just a system administrator this training series is sponsored by hackaholic Anonymous to get the supporting materials for this series like the 900 page slideshow the 200 Page notes document and all of the pre-made shell scripts consider joining the agent here of hack holics Anonymous you’ll also get monthly python automations exclusive content and direct access to me by a Discord join hack Alix Anonymous today this training series is sponsored by hack alic an on to get the supporting materials for this series like the 900 page slideshow the 200 Page notes document and all of the pre-made shell scripts consider joining the agent tier of hack holics Anonymous you’ll also get monthly python automations exclusive content and direct access to me via Discord join hack alic Anonymous today
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
This resource is a guide to Linux system administration, covering essential topics for the Linux+ certification. It thoroughly explains system architecture, including the file system hierarchy and key directories, as well as boot processes. The text also discusses partition management, detailing file system types, mount points, and commands for manipulating disk partitions. User and group management, file permissions, and special permissions are all explained. Finally, the document explains monitoring system performance and managing processes via command line tools.
Linux Study Guide
Quiz
Instructions: Answer each question in 2-3 sentences.
What is the role of Linus Torvalds in the Linux operating system, and what title was given to him?
Explain the difference between the Linux kernel and a Linux distribution (distro). Provide two examples of popular Linux distros.
Name three common uses for Linux operating systems, beyond desktop computing.
Describe the purpose of the /bin and /sbin directories. What is the key distinction between them regarding user access?
What is the purpose of /dev/null and /dev/zero?
Briefly explain the function of journaling in file systems like EXT4 and XFS.
What are the key differences between the FAT32 and NTFS file systems? What are the common use cases of each file system?
Explain the roles of the kernel, the shell, and the user space in the Linux system architecture.
What is the purpose of the /etc/fstab file?
Explain the difference between a hard link and a symbolic link (soft link) in Linux.
Quiz Answer Key
Linus Torvalds is the creator of the Linux kernel and maintains ultimate authority over its development. He is known as the “benevolent dictator of Planet Linux,” as his approval is needed for incorporating code into the kernel.
The Linux kernel is the core of the operating system, while a Linux distribution (distro) is a complete OS that bundles the kernel with other software, utilities, and a desktop environment. Ubuntu and Kali Linux are two examples of popular Linux distributions.
Linux operating systems are used in servers (web, database), embedded systems (IoT devices, routers), and cloud computing platforms (AWS, Google Cloud).
The /bin directory contains essential binary executables accessible to all users, while the /sbin directory holds system binaries used for administration, which typically require root privileges.
/dev/null is a “black hole” that discards any data written to it, often used to suppress output. /dev/zero produces an infinite stream of null characters, useful for initializing storage or testing memory.
Journaling is a feature that records file system changes in a journal before they are applied. This improves data integrity and recoverability in case of a system crash or power failure.
FAT32 is an older file system with limited file size support, primarily used for USB drives. NTFS is a modern file system used by Windows, offering security features, compression, and large file support, but typically only accessible by Windows.
The kernel manages system resources and communication between hardware and software. The shell is a command-line interpreter allowing users to interact with the kernel. The user space is where user-level applications execute, isolated from the kernel for stability and security.
The /etc/fstab file contains a list of file systems that should be automatically mounted at boot time, along with their mount points and options.
A hard link is a direct reference to a file’s data, creating a duplicate entry. A symbolic link (soft link) is a file that stores the path to another file acting as a shortcut.
Essay Questions
Discuss the advantages and disadvantages of using Linux in an enterprise environment compared to other operating systems. Consider factors like cost, stability, security, and the availability of support.
Explain the importance of file permissions in Linux. How do traditional file permissions (user, group, other) and special permissions (SUID, GUID, sticky bit) contribute to system security and access control?
Compare and contrast the systemd and SysVinit initialization systems. What are the key benefits of systemd over SysVinit, and why has it become the standard in modern Linux distributions?
Describe the process of partitioning a hard drive in Linux. What are the differences between primary, extended, and logical partitions, and how are they used to organize a file system?
Explain how shell scripting can be used to automate system administration tasks in Linux. Provide examples of common scripting tasks and discuss the advantages of using scripts over manual commands.
BIOS (Basic Input/Output System): Firmware used to perform hardware initialization during the booting process on older systems.
Bootloader: Software that loads the operating system kernel.
CLI (Command Line Interface): A text-based interface for interacting with the operating system.
Daemon: A background process that runs without direct user interaction.
Dev: Directory containing device files, providing a virtual interface to hardware.
Distro (Distribution): A complete Linux operating system that includes the kernel and additional software.
EXT4 (Fourth Extended Filesystem): A journaling file system commonly used in Linux.
FHS (Filesystem Hierarchy Standard): A standard that defines the directory structure and contents in Linux.
File System: A method of organizing and storing files on a storage device.
GPT (GUID Partition Table): A partitioning scheme that supports larger disk sizes and more partitions than MBR.
GNU: An open-source, Unix-like operating system.
GUI (Graphical User Interface): A visual interface for interacting with the operating system.
Kernel: The core of the Linux operating system.
Linux: An open-source operating system kernel.
Mount Point: A directory where a file system is attached to the directory tree.
MBR (Master Boot Record): A traditional partitioning scheme that limits the number of partitions on a disk.
Nas (Network Attached Storage): A server that attaches to a network and enables other users to access the same data.
NTFS (New Technology File System): The file system used by modern Windows operating systems.
Open Source: Software with source code that is freely available and can be modified and distributed.
Partition: A section of a hard drive or other storage device.
Process: An instance of a program that is running in memory.
Root: The top-level directory in the Linux file system, represented by /.
Sbin: System binaries; executables used for system administration.
Shell: A command-line interpreter that allows users to interact with the kernel.
SUID (Set User ID): A special permission that allows a program to be executed with the privileges of its owner.
Swap Space: Disk space used as virtual memory when RAM is full.
Symbolic Link (Soft Link): A file that stores the path to another file acting as a shortcut.
Systemd: A system and service manager for Linux.
UEFI (Unified Extensible Firmware Interface): A modern firmware interface used to initialize hardware during the booting process.
User Space: The environment where user-level applications execute, isolated from the kernel.
XFS: A high-performance journaling file system commonly used in enterprise environments.
Linux Fundamentals and System Administration Training
Okay, here’s a detailed briefing document summarizing the main themes and important ideas from the provided excerpts.
Briefing Document: Linux Fundamentals and Administration
Overview:
This document summarizes a comprehensive training on Linux fundamentals and system administration. The training covers a wide range of topics, from the history of Linux and its various distributions to file system management, process management, user authentication, and scripting. The primary focus is on equipping users with the knowledge and practical skills necessary to effectively navigate, manage, and secure Linux systems. The training utilizes a lecture format coupled with practical command-line exercises. Access to supplemental materials, including a detailed Google Document and an extensive slide presentation, is offered as part of a membership program.
Main Themes & Key Ideas:
Linux History and Distributions:
Linux was created as a free and open-source alternative to Minix/Unix, spearheaded by Linus Torvalds and Richard Stallman. “the goals for this were to make it free make it open source alternative to Minix uh which was based on Unix and that’s the guy lonus tals he’s still around and he’s still the the father of Linux.”
Linux Distributions (Distros) bundle the Linux kernel with other software, each tailored for specific purposes.
Popular Distros include:
Ubuntu: User-friendly, for general users and desktop environments. “Ubuntu which is the most commonly used uh it’s popular for General users beginners and people who want to use Linux in the desktop environment”
CentOS/Red Hat Enterprise Linux (RHEL): Stable, supported, for enterprise environments. “sent OS AKA Red Hat Enterprise Linux or real and these things are used in Enterprise environments so they’re mainly for stability and support”
Debian: Servers and advanced users, often command-line focused. “Debian is known for servers and advanced users mostly because the fact that you’re not going to get a graphic user interface”
Fedora: Cutting-edge, for developers. “Fedora which is great for developers and it’s more Cutting Edge and it has a lot of Innovations and utilities that are pre-installed on it”
Kali Linux: Cyber security and ethical hacking. “Cali Linux and it’s for cyber security and ethical hackers which is US everybody that comes on this channel”
Linux has Common Uses in servers, embedded systems/IoT devices, software development, cyber security, cloud and data centers. “servers embedded systems and iot devices iot devices are internet of things”
File System Hierarchy and Navigation:
The File System Hierarchy Standard (FHS) defines a consistent directory structure across Linux distributions. Key directories include / (root), /bin (binaries), /sbin (system binaries), /etc (configuration files), /home (user directories), /var (variable data), /tmp (temporary files), and /dev (device files). ” the the home of everything is the root and it’s represented by this singular forward slash”
The /bin directory contains essential binary executables, accessible to all users. “the bin or the binaries directory contains essential binary executables that are needed during the boot process or in single user mode”
The /sbin directory contains binary executables for system administration, requiring root privileges. “the sbin is known as the system binaries folder and this is the binary executables that are used for system administration it typically requires root privileges to execute this”
The /dev directory provides a virtual interface to physical devices. “the dev folder important uh device abstraction by treating devices as files Linux provides a consistent interface for interacting with various Hardware devices”
Common commands for navigation: pwd (print working directory), ls (list files), cd (change directory).
ext4: A widely used file system balancing performance and reliability. “xt4 which is balanced performance reliability and is known to be compatible with all different versions of the OS”
xfs: Designed for performance and scalability, popular in enterprise environments and large databases. “xfs the xfs file system uh it’s for performance and scalability it’s a very popular choice in Enterprise environment”
NTFS: Used in modern Windows operating systems, requires consideration for cross-platform compatibility. “NTFS the new technology file system is actually a file system that’s been used in modern Windows operating systems it’s reliable it’s secure performs well”
FAT32: Commonly used for USB flash drives and external hard drives (max 2TB), compatible with various OSes. “fat 32 for the most part is being used by one individual person for like a home computer or something like that or maybe a USB drive or an external hard drive that is maxed out at 2 terabytes”
Formatting tools: mkfs (make file system) can format partitions in different file systems, and requires backing up data as formatting wipes the data. “mkfs is used to format partitions with different file systems”
System Architecture: Kernel, Shell, User Space
Kernel: The core component, acting as the bridge between hardware and software. It manages system resources. “the kernel um it’s the core component of a Linux based operating system it’s basically the bridge between the hardware and the software layers”
Shell: A command-line interpreter that allows users to interact with the kernel. “the shell is a command line interpreter that facilitates communication with the kernel”
User Space: The environment where user-level applications execute, separated from the kernel for stability and security. “user space is the environment where the user level applications actually execute”
Boot Process:
BIOS/UEFI: Initializes hardware and passes control to the bootloader.
Bootloader (e.g., GRUB): Loads the operating system kernel.
Init System (e.g., systemd, SysVinit): Starts system services and processes. “init is actually the traditional initialization system that was used in Linux dros to start system services and processes during brute”
systemd is faster, flexible, feature rich, current version of the init system.
Package Management and Installation:
Selecting a Linux distribution is based on the task to accomplish. There are desktop versions, server versions, and security versions, etc.
The process of flashing an ISO image to a USB drive using tools like Etcher is covered.
The presenter demonstrates how to find the assigned drive to the USB device before flashing the ISO image.
Partitions and Mounting:
Understanding the concept of primary, extended, and logical partitions. The function of partitioning is creating containers to contain the files.
Mounting file systems: Attaching a file system to a directory to make it accessible. “when you mount something you’re attaching the file system to a directory so that it’s accessible within the larger directory tree”
/etc/fstab: Configuration file defining file systems to be automatically mounted at boot. “ETFs tab uh configuration file that defines all the file systems that should be automatically mounted when you start your system”
Swap Space:
Swap space acts as virtual memory when physical RAM is exhausted, preventing out-of-memory errors. “swap a buffer to prevent out of memory errors meaning that the system can’t run because the physical memory has been maxed out”
Creating swap partitions or swap files is covered.
Process and Service Management:
Processes, daemons, and services and the relationship between them.
Daemons are background processes.
Services group daemons to provide specific functionality. “service the higher level concept meaning that they group one or more Damons together and that provides a specific functionality”
Managing services using systemctl (enable, disable, start, stop, status).
User Authentication and Permissions:
/etc/passwd: Stores user account information (usernames, user IDs, etc.). “the Etsy password file stores all of the user names so the user accounts themselves there is no uh password doc uh hashes or any PL text or anything like that that’s inside of this file”
/etc/shadow: Stores password hashes (sensitive file, access must be restricted).
File permissions (read, write, execute) for owner, group, and others. The acronyms are R, W, and X. “permissions are designed they go by read write and execute and they have acronyms for them so R would be for read W would be for write and then X would be to execute”
Special permissions: SUID, SGID, sticky bit. “sticky bit on a directory only the file owner or directory owner can delete or modify the files within it regardless of the group or other right permissions or anything else”
sudo and user authentication.
Shell Scripting:
Shell scripts are text files containing a series of commands. “shell scripting is a an extension of Shell’s uh interactions and commands that essentially allows you to create a document put a bunch of commands inside of it”
“toal uh tals posted the source code for free on the web inviting other programs to improve it making Linux a collaborative project and the foundation for open- Source software and to this day it is still open source meaning you can get access to it for free and you can even make modifications to it”
“without that guy’s permission you cannot make any incorporations to the Linux kernel uh or at least not publicly shared you could probably make the modifications your yourself but you won’t be able to make it as one of the dros that are available uh to everybody else”
“every time that you request a video to be loaded from YouTube you’re requesting a packet of data to be delivered to you and that’s done through your network”
Recommendations:
Reinforce learning with practical exercises and command-line practice.
Explore different Linux distributions to understand their specific strengths and use cases.
Prioritize understanding file permissions and security concepts to maintain a secure Linux environment.
Utilize scripting to automate common tasks and improve efficiency.
This briefing document provides a comprehensive overview of the Linux training material. By focusing on the main themes and key ideas, it enables individuals to quickly grasp the essential concepts and apply them effectively in real-world scenarios.
Linux Essentials: Concepts and Architecture
1. What is Linux and who are some key figures in its development?
Linux is a free and open-source operating system kernel. Linus Torvalds created it as an alternative to Minix, drawing inspiration from Unix. Richard Stallman and the Free Software Foundation contributed the GNU utilities to the Linux kernel, creating GNU/Linux, the modern version of Linux. Torvalds remains the ultimate authority on the Linux kernel, often referred to as the “benevolent dictator” of Planet Linux.
2. What are Linux distributions (distros) and what are some popular examples?
Linux distributions, or distros, are different versions of the Linux OS that bundle the Linux kernel with other software. Popular examples include Ubuntu (user-friendly, for general users), CentOS/Red Hat Enterprise Linux (stable, for enterprise environments), Debian (for servers and advanced users), Fedora (for developers, cutting-edge), and Kali Linux (for cyber security and ethical hacking).
3. What are some common uses of Linux?
Linux is used in a variety of environments, including servers, embedded systems/IoT devices, software development, cyber security, cloud computing (AWS, Google Cloud), and data centers. Its versatility and open-source nature make it suitable for a wide range of applications.
4. What are some important directories in the Linux file system hierarchy?
Some key directories include:
/ (root): The top-level directory, the home of everything
/bin (binaries): Essential binary executables needed during the boot process or in single-user mode, accessible to all users.
/sbin (system binaries): Binary executables for system administration, requiring root privileges.
/dev (devices): Represents device files that provide an interface to hardware devices.
/home: Contains personal directories for individual users.
5. What is the /dev directory and why is it important?
The /dev directory contains device files, which provide an interface for interacting with hardware devices as if they were files. This allows for consistent interaction with various hardware through commands. When you connect a USB drive, for example, a file or folder corresponding to that device appears in /dev, allowing command-line interaction.
6. How do I determine file system type?
To determine the file system type the command lsblk -f will display file system type along with UUID and label.
7. What is shell scripting and why is it useful?
Shell scripting involves creating text files containing a series of commands that can be executed sequentially. It’s a powerful tool for automation, allowing users to automate repetitive tasks. Shell scripts start with a shebang line (#!) indicating the interpreter to use. The rest of the script contains commands, often with comments (lines starting with #) explaining the code. Control flow structures (if/else, while loops) and variables are essential components of shell scripts.
8. What are the three key components of the Linux system architecture?
The Linux system architecture consists of three main components:
Kernel: The core component that acts as the bridge between hardware and software, managing system resources.
Shell: A command-line interpreter that allows users to interact with the kernel and execute commands.
User Space: The environment where user-level applications execute, separate from the kernel for stability and security.
Linux System Administration Essentials
Linux administration involves several key aspects, including system architecture, installation, package management, file management, user and group management, process and service management, and job scheduling.
System Architecture and Boot Process
Understanding the Linux system architecture is crucial, including the kernel, shell, user space, basic input/output system (BIOS), Unified Extensible Firmware Interface (UEFI), GRand Unified Bootloader (GRUB), and init system.
The file system hierarchy standard (FHS) defines the directory structure, ensuring consistency across distributions. Key directories include root, bin, sbin, etc, home, var, and tmp.
The kernel is the core, bridging hardware and software by managing resources.
The shell is a command-line interpreter for interacting with the kernel.
The boot process involves BIOS/UEFI initializing hardware, the bootloader loading the OS, and the init system starting system services.
Installation and Package Management
Installing Linux involves choosing a distribution based on specific needs, such as Ubuntu, CentOS, Debian, Fedora, or Kali Linux.
The installation process includes downloading an ISO image, creating bootable media, and configuring partitions.
Package managers are used to update, remove, and troubleshoot software packages.
File Management
File management includes creating partitions and understanding primary, extended, and logical partitions.
File systems like ext4 and XFS are also important, as well as understanding mount points.
Commands such as mkfs (make file system) are needed for formatting partitions.
User and Group Management
User management involves creating, modifying, and deleting user accounts. Commands such as useradd, usermod, and userdel are used for these tasks.
Group management involves creating and managing groups to organize users. Commands such as groupadd and groupdel are used to manage groups.
Process and Service Management
Process management involves understanding daemons, services, and process management commands.
Important commands include ps for viewing processes and systemctl for managing services.
Job scheduling can be achieved using cron jobs for recurring tasks and the at command for one-time tasks.
Linux File System Administration: Types, FHS, and Management
File systems are a critical component of Linux administration, involving how data is stored, accessed, and managed. Key aspects include file system types, the file system hierarchy standard (FHS), mount points, and various management tools.
File System Hierarchy Standard (FHS)
The FHS defines the directory structure in Linux, ensuring consistency across different distributions.
Key directories include:
Root directory Top-level directory for the entire system. All other directories are extensions of the root.
/bin Contains essential user commands.
/sbin System binaries, typically for administration, requiring root privileges.
/etc Houses configuration files for services and applications. It is known as the control center.
/home Houses user directories.
/var Stores variable data such as system logs.
/tmp Houses temporary data, often wiped on reboot.
File System Types
ext4: The fourth extended file system, is a journaling file system and the default in many Linux distributions. It supports large files and is reliable.
XFS: A high-performance journaling file system often used in enterprise environments for its scalability and reliability. It is optimized for sequential read and write operations.
NTFS: (New Technology File System) Used in Windows, it’s included because of the need for interoperability between Linux and Windows systems.
FAT32: Known for its simplicity and broad compatibility; though older, it is still used due to its cross-platform compatibility. It has a limited file size of 4GB and a partition size limit of 2TB.
Mount Points
Mounting attaches a file system to a directory, making it accessible within the larger directory tree. The mount command is used for this purpose.
Automatic mounting is configured in the /etc/fstab file, which defines file systems to be automatically mounted at boot. Each line in /etc/fstab represents a file system and its mount options.
Unmounting a file system is done using the umount command, preventing data loss or corruption.
Partitioning
Partitions are logical divisions of a physical storage device, allowing the operating system to manage data in isolated areas.
Common primary partitions include the root partition, boot partition, home partition, and swap partition. Most Linux devices break down to a max of four primary partitions.
Extended partitions can contain multiple logical partitions.
Tools and Commands for File System Management
mkfs (make file system): Used to format a partition with a specified file system type.
lsblk: Lists block devices (disks and partitions) in a tree-like format.
fdisk: A command-line utility for creating, modifying, and deleting partitions.
fsck (file system check): A utility for checking and repairing file system consistency.
parted: A versatile command-line tool supporting both MBR and GPT partition schemes, ideal for resizing and modifying partitions.
Swap Space
Swap space is virtual memory on the hard drive, used when physical RAM is exhausted. It can be a partition or a file.
Commands like mkswap (make swap) initialize a partition for use as swap, while swapon and swapoff activate and deactivate swap spaces, respectively.
Linux Permissions Management: A Concise Guide
Permissions management in Linux is a fundamental aspect of system administration, focused on controlling access to files and directories. It ensures that only authorized users can read, write, or execute files, maintaining system security and data integrity. The key components of permissions management include permission models, commands for modifying permissions, and special permissions.
Permission Models
Levels of Access: There are three levels of access: owner, group, and others.
Owner: Typically the user who created the file or directory, possessing the highest level of control.
Group: A collection of users who are assigned specific permissions.
Others: All users who are neither the owner nor members of the group.
Types of Permissions: Permissions are categorized into read, write, and execute.
Read (r): Allows viewing the contents of a file or listing the contents of a directory.
Write : Permits modifying or deleting a file or directory.
Execute (x): Enables running a program or script, or accessing a directory.
File Permission Representation
When viewing file permissions, the output typically looks like this: -rwxr-xr–.
The first character indicates the file type: – for a regular file, d for a directory.
The next three characters represent the owner’s permissions.
The following three characters represent the group’s permissions.
The last three characters represent the permissions for others.
Example: -rwxr-xr– indicates a regular file. The owner has read, write, and execute permissions; the group has read and execute permissions; and others have only read permissions.
Commands for Modifying Permissions
chmod (change mode): Used to change the permissions of a file or directory.
Symbolic Method: Uses symbols to add or remove permissions. For example, chmod u+x file adds execute permission to the owner of the file.
Numeric (Octal) Method: Uses numeric values to set permissions. Each permission has a value: read=4, write=2, execute=1. The sum of these values represents the permissions. For example, chmod 755 file gives the owner read, write, and execute permissions (4+2+1=7), and the group and others read and execute permissions (4+1=5).
chown (change owner): Used to change the owner of a file or directory.
chgrp (change group): Used to change the group associated with a file or directory.
Special Permissions
SUID (Set User ID): When set on an executable file, it allows the file to be executed with the privileges of the owner, not the user running it. It is represented by an “s” in the owner’s execute permission slot.
SGID (Set Group ID): Similar to SUID, but it applies to the group. When set on a directory, any files created within that directory inherit the group ownership of the directory.
Sticky Bit: When set on a directory, only the file owner or directory owner can delete or modify files within it, regardless of group or other write permissions.
User Authentication
/etc/passwd: Stores user account information, including usernames, but no password hashes.
/etc/shadow: Stores encrypted password hashes and other security information. Should only be readable by the root user.
Managing Pseudo Permissions
Granting users the ability to execute commands with root privileges via sudo is a critical aspect of system administration.
This involves adding users to the sudo group and configuring the /etc/sudoers file to define command restrictions.
The visudo command is used to safely edit the /etc/sudoers file, checking for syntax errors before saving.
Within the /etc/sudoers file, you can specify which commands a user can run with sudo. For example: username ALL=(ALL:ALL) /path/to/command. This setup ensures users have the necessary permissions to perform administrative tasks while maintaining security.
Linux User Management: A System Administration Guide
User management in Linux is a critical aspect of system administration. It involves creating, modifying, and deleting user accounts to control access to the system and its resources. Effective user management ensures system security and integrity by granting appropriate permissions and privileges to different users.
Key aspects of user management include:
Creating Users: User accounts can be created using the useradd or adduser command, depending on the Linux distribution.
The basic syntax is sudo useradd username or sudo adduser username.
Additional options can be used to specify the home directory, login shell, and supplementary groups for the user.
For example, sudo useradd -m -d /data/users/alice -s /bin/bash -G developers,admins alice creates a user named “alice”, assigns the home directory to /data/users/alice, sets the login shell to /bin/bash, and adds the user to the “developers” and “admins” groups.
Setting Passwords: After creating a user, a password must be set using the passwd command.
The syntax is sudo passwd username.
It is common practice to expire the initial password, forcing the user to set a new password upon their first login. This can be done using a specific command to expire the password immediately after it’s been created.
Modifying Users: Existing user accounts can be modified using the usermod command.
This command can change the username, lock or unlock an account, and modify group memberships.
For example, sudo usermod -l newusername oldusername changes the username from “oldusername” to “newusername”.
The -L option locks an account, and the -U option unlocks it.
Deleting Users: User accounts can be deleted using the userdel command.
The syntax is sudo userdel username.
The -r option removes the user’s home directory and all its contents. For example: sudo userdel -r username.
Groups:
Groups are managed using commands such as groupadd to create groups and groupdel to delete them.
A primary group is the main group associated with a user. When a user creates a file, the group ownership of that file is set to the user’s primary group.
Supplementary groups are additional groups that a user is a member of, granting them access to resources associated with those groups.
A user can be added to a supplementary group using the usermod command with the -aG option. For example: sudo usermod -aG groupname username.
File Permissions and Ownership:
Every file and directory in Linux has associated permissions that determine who can read, write, or execute the file.
Permissions are defined for the owner, the group, and others.
The chmod command is used to modify permissions, chown to change the owner, and chgrp to change the group.
Special Permissions:
Special permissions like SUID, SGID, and the sticky bit can be set to modify how files are executed or accessed.
SUID allows a file to be executed with the privileges of the owner.
SGID, when set on a directory, causes new files and subdirectories to inherit the group ownership of the parent directory.
The sticky bit, when set on a directory, restricts file deletion and modification to the owner of the file, the directory owner, and the root user.
User Authentication Files:
The /etc/passwd file stores basic user account information, such as usernames, user IDs, group IDs, home directories, and login shells. However, it does not store password hashes.
The /etc/shadow file stores encrypted password hashes and other password-related information. It should be readable only by the root user.
Managing Sudo Permissions:
Granting users the ability to execute commands with root privileges via sudo is a critical aspect of system administration.
This involves adding users to the sudo group and configuring the /etc/sudoers file to define command restrictions.
The visudo command is used to safely edit the /etc/sudoers file, checking for syntax errors before saving.
Within the /etc/sudoers file, you can specify which commands a user can run with sudo. For example: username ALL=(ALL:ALL) /path/to/command. This setup ensures users have the necessary permissions to perform administrative tasks while maintaining security.
Linux System Boot Process: BIOS, Bootloader, and Initialization
The system boot process in Linux involves several stages, starting from the hardware initialization to the loading of the operating system. Key components and processes include BIOS/UEFI, bootloaders, and initialization systems.
BIOS/UEFI:
BIOS (Basic Input/Output System) is a firmware used in older systems to initialize hardware and pass control to the bootloader.
BIOS initializes the hardware and conducts a Power-On Self-Test (POST) to check hardware.
It issues beeps to indicate test outcomes and initializes essential hardware like the keyboard, mouse, and disk drives.
UEFI (Unified Extensible Firmware Interface) is a modern interface replacing BIOS, offering a more flexible, faster, and secure boot process.
UEFI can boot systems faster and supports a user-friendly graphical interface.
It enhances security with features like secure boot, protecting the system from malicious software attacks, and supports larger disk drives.
UEFI also allows booting from network resources, facilitating remote system deployment and management.
Both BIOS and UEFI perform POST, execute the bootloader, and initiate the operating system boot.
Bootloader (GRUB):
The bootloader acts as an intermediary between the BIOS/UEFI and the operating system.
GRUB (Grand Unified Bootloader) is commonly used in Linux distributions.
It takes control of the system after BIOS/UEFI and completes the boot process.
GRUB loads the kernel and initial RAM disk into memory and transfers control to the kernel.
It presents a boot menu, allowing users to choose an operating system in dual-boot or multi-boot systems.
GRUB supports multiple OSs, customization of the boot menu, secure boot options, and advanced features like chain loading and network booting.
Initialization Systems (SysVinit, systemd):
After the bootloader, the system uses an initialization system to start system services and processes.
SysVinit is a traditional init system using a sequence of scripts to bring up the system, but it can be complex to configure and is relatively slow due to its sequential processing.
It runs scripts located in /etc/init.d to start and stop services.
SysVinit uses run levels, each representing a specific system state.
systemd is a modern init system that is faster, more flexible, and more feature-rich than SysVinit.
It manages the lifecycle of system services, ensures services start in the correct order based on dependencies, and logs system events.
systemd starts services in parallel, reducing boot time, and manages dependencies automatically.
It provides a unified framework for managing system services and includes features like socket activation, journaling, timers, scheduling, and device management.
systemd uses boot targets, which are groups of services that should be started or stopped together, allowing efficient management of system behavior under different circumstances.
Run Levels and Boot Targets:
Run levels (used in SysVinit) represent specific states of the system, with the system transitioning through them during the boot process.
Common run levels include halt (0), single-user mode (1), multi-user mode without NFS (2), multi-user mode without GUI (3), full multi-user mode with GUI (5), and reboot (6).
Boot targets (used in systemd) replace run levels and represent groups of services to be started or stopped together.
Common targets include multi-user.target (default multi-user mode), graphical.target (graphical services), rescue.target (system recovery), and emergency.target (minimal services for system maintenance).
Service Management:
In systemd, services are managed using systemctl commands.
Common commands include sudo systemctl start service, sudo systemctl stop service, sudo systemctl enable service, sudo systemctl disable service, and systemctl status service.
In SysVinit, the service command is used with similar options but a slightly different syntax.
Full Linux+ (XK0-005 – 2024) Course Pt. 1 | Linux+ Training
The Original Text
Tesla cars the Google search engine and Gmail the astroe robots from NASA PlayStation and Xbox the trading systems at the New York Stock Exchange as well as many other popular services around the world run on Linux this means that there’s a lot of benefit to you learning Linux and the base certification for Linux is the Comas Linux plus even if you don’t plan on getting your Linux plus certification this video will help you to develop your Linux skill set and being that this channel is all about cyber security and hacking learning Linux will make you a much more capable security pro and a force to be reckoned with that being said here’s the outline of what we’ll be covering in this tutorial this training series is sponsored by hackaholic Anonymous to get the supporting materials for this series like the 900 page slideshow the 200 Page notes document and all of the pre-made shell scripts consider joining the agent tier of hack holic Anonymous you’ll also get monthly python automation exclusive content and direct access to me via Discord join hack alic Anonymous today are a couple of quick notes the format of the training series is going to be half lecture and half practical commands that we actually run inside of Linux on the command line um as you can see over here we have a bunch of content so it goes up to chapter 11 as far as the lecture portion itself is concerned and we’ll be covering essentially everything that you see inside of this notes document this uh Google doc as well as these 800 something slides that I have here for you in the Google Slides presentation so that’s going to be the part about of the lecture of this particular training series there is going to be a section on chapter 3 where we actually go through the installation of Linux and it’s something that I want to go through with you so you actually have a lab environment just in case you don’t have Linux on your computer and uh you don’t have Mac OS and Mac OS can be kind of similar to Linux but I want you to actually practice inside of a Linux environment so we’re going to go through the installation portion of it and that’ll be similar to a practical uh example that I’ll give you so that we can just go Click by click so you can see how to download an ISO file and uh go ahead and install it for yourself and essentially set yourself up to run all of the commands that we’re going to end up running when we actually do get to the Practical portion of this but for the most part it’s going to be broken down into a lecture and then at the very end of it when we get to chapter 12 we’re going to get to all of the commands that we have and then for chapter 12 there’s individual sections as well that has all of the uh the individual commands that we’re going to run that will just break down into multiple sections under chapter 12 so there’s actually 12 subsections inside of chapter 12 that goes everything from getting system information all the way to getting scripting and learning about how to create shell scripts so that’s going to be the outline that we have or the format of the outline that we have over here the second note that I want to give give you is that you can actually get this document this Google document with all of its notes and all of the commands and everything that’s for the lecture as well as this Google Slides presentation and it’s 800 something slides you can get access to both of these things by being a member of our hackaholic synonymous membership community so if you’re actually an agent tier member or above you will get access to this as a part of your membership and in my opinion it’s actually very very valuable um the video is obviously available to you for free um most likely it’s going to be broken down to two videos because when we get actually get to the Practical section I think I have to break it down into its own series of videos or at least its own separate video because uh Google Maxes us or Google YouTube Maxes us out at the uh 12-hour Mark so just in case we go over 12 hours for this training series I’m going to break it down into two uh separate videos but you will get access to those videos absolutely for free if you wanted to get the docs uh notes as well as the slides it would be part of the hack Anonymous membership and just to give you an idea of what that looks like as far as the the price comparison of what you can expect if you want to com Tia to try to get their Linux plus uh education just for the exam voucher itself it’s $369 but everything else so for example if you wanted to do the the labs and their education uh videos as well as the notes that they would give you and everything else that would be 1165 and then you have these various bundles as well so you’re looking at at least several hundred uh if you wanted to get it through Linux plus uh from CompTIA or really anything that would be comparable to this particular education uh what I’m giving you in these notes as well as the slideshow is based on the exact outline that they have in the CompTIA Linux plus education so that you can be ensured that you’re getting everything that you need for your examination but you literally get it at a fraction of the price probably less than on10th of the price so that’s really the entire plug that I have over here is that if you actually wanted to get these notes as well as the slides you can get it by being a member of the hackaholic anonymous membership community and the link to that is below in the description now that being said let’s actually jump into this outline so you know what to expect okay so first and foremost the timestamps that are going to be attached for this presentation are going to be in the description below as well as the very first comment that will be pinned to the top of the comment section and I’m going to try to give you as many time stamps as possible without making it ridiculous and being too specific so um the time Stamps will be brok broken down and then this is the the outline of this uh course so number one obviously we’re going to go into the intro to Linux and then Linux plus certification which means you’ll get the overview of the history of Linux the distributions that are available and the Linux plus certification itself what the benefits would be for you and more importantly the structure of the Linux plus examination which means the categories that are going to be covered and the format of the exam and any prerequisites that would be required to make sure that you do very well on this training series as well as if you decide to go take the certification exam so that you can do well on the examination uh the second chapter second section is going to be all of the system architecture and the brute process property so this is very similar to what happens if you got an education in comp plus but of course we’re not going to go into the nitty-gritty the super in-depth stuff it’s going to be all the things that you would need to understand Linux as well as the kernel and the shell and the user space and the basic input output system and ufv and Grub and the init system so on and so forth so you’re going to get a good understanding of what these things are and how they relate to Linux then we’re going to go into the actual installation of Linux and you’ll learn how to install Linux on a USB drive so you can have a live boot as well as a full installation if you wanted to install it on a computer to have as a secate second operating system or if you just want to start installing Linux on a variety of machines if you got hired to be a Linux administrator that’s essentially what they might ask you to do is to install Linux on actual computer so that the computer runs on Linux so you’ll learn that entire uh installation process and then we’re going to go through the partitions and the file systems so you know how you can create partitions and what primary partitions are and what extensions are so on and so forth we’ll go through the package managers and of course updating removing and troubleshooting packages then we’re going to go through the basics of the command line now this is just going to be again a part of the lecture itself all of the commands that you’re going to learn in every other section that we talk about will be covered inside of the the Practical portion of this training series and we’re going to go in depth and you’re going to try so many different versions of the commands and you’ll get a really really good training on it and a good understanding of it so I don’t want you to think that just because we’re going to skim them and you know introduce you to the commands for these various sections that we’re not going to actually go and practice them when we get to the Practical section so this is going to be the basics of the command line as well as the text editors and manipulating files and creating basic uh basic shell scripts and what the the various portions or the various elements of a shell script are then we’re going to go into user and group management how to create and manage users and groups the file permissions and ownerships and access control list and things like that special permissions and of course authentication and pseudo permissions that will come to that specific section and then we have the file management and file system so this is actually going deeper into the file systems we had the introduction to file systems when we were over here but over here we’re actually going to go in depth for the file systems and how to mount and unmount a file system how to actually create a file system using uh Fisk or the M mkfs the make file system commands and how to create partitions configuring in those things uh of course and managing the swap spaces as well because that’s actually a separate partition as well so you you’ll get all the understanding that you need for file management and the file systems and how to create file systems and partitions so on and so forth uh we’re going to go into process and service management so so this is also very important as a Linux administrator all of this stuff is actually really important as a linuxis admin so um we’re going to go into the process and service management portion uh understanding what a Damon is what services are uh Process Management commands service management commands and of course scheduling jobs and then we’re going to go into networking so this is not going to be a replacement of the network plus training that you can get but we will go into enough that you will be dangerous so you’ll learn enough about networking that you will know exactly how to navigate the network infrastructure and how to set up the IP addressing and the DNS and dynamic host configuration protocols and how to actually uh create the network manager CLI or how to use the network manager CLI and how to troubleshoot uh network issues and of course managing the firewalls with the basic firewall which is the uncomplicated firewall as well as the IP tables so we’ll go into a good amount of stuff so that you you know enough to be dangerous right but we’re not it’s this is not going to subst intitute the network plus education cuz that’s a whole other Beast by itself and then we have security and access management so this is another very important element uh this is a channel about cyber security and hacking so security is a very very big deal to me so this is going to be something that I’m very interested in sharing with you and file system security C trud file permissions Access Control lists network security user authentication methods and configuring secure shell data encryption and secure file transfer and a lot of other things that would fall under the category of security and access management and then we’re going to go through troubleshooting and system maintenance and these are all the different elements so analyzing interpreting log files dis usage analysis backup and restoration strategies and of course system performance monitoring and then there’s virtualization and Cloud Concepts now this was not listed as an actual uh category under Linux plus but I think this is very important for you to learn because most likely if you’re going to get a job as a Dev ops manager or somebody who will go into Dev Ops or somebody who’s going to become a linuxis admin you are most likely going to deal with a cloud environment because companies these days aren’t really setting up physical servers anymore they’re most likely going to go and buy a virtual server with uh let’s say aw or with Google cloud or something like that and you’re going to need to learn how to uh essentially just navigate those things it’s not really complicated to understand and the command line and everything that’s associated with this isn’t really complicated but I just want you to understand and I want you to know how these things work and you know what is a virtual machine and what is a container for example and how do you use Virtual box or Docker these various tools that are associated with Cloud Concepts and cloud computing so it’s not uh required for Linux plus but I think you will be more powerful as a Linux administrator and if in case it does show up because by the time that you watch this video they’ve added it to the most updated version of the Linux examination in case it does show up you’ll know what you’re talking about and you’ll be ready for that as well and then finally we’re actually going to get into the practice command portion which is a massive portion all by itself and of course exam preparation tips so there will be the key commands for the Linux plus exam there’s going to be exam preparation resources like practice labs in addition to everything we’re going to talk about mock exams study guides I’ll give you a bunch of mock questions that you will need to kind of review just to prepare yourself for the examination and of course uh the exam day tips and how to just prepare yourself for that day and the final wrapup that we’ll go through so this is going to be a comprehensive training course I really wanted to be very useful for you whether or not you take the examination so whether or not you decide to become certified should not matter because by the end of this thing you should be so functional and you should be so competent with Linux that even if you’re not certified you can do all of the requirements of any Linux sis admin job and then you can confidently put that on your resume and even on your portfolio and say look at all of the stuff all of these shell scripts that I created and all of the various things that I can do inside of Linux so that you can just prove that you’re competent and you’re actually proficient in Linux so I’m really excited for you I’m glad that you’re here I hope you go through the entire thing but in case you want to skip around and find individual sections that would be relevant to you the time stamps are all going to be below and that’s about it so I feel like I was talking a mile a minute minute cuz I’m trying to get through this whole thing so quickly to be able to save on time you probably don’t need to speed up this presentation cuz I’m going to try to talk really really fast to just just try to get as much content uh crammed into this video as humanly possible so uh I’m excited for you I hope you’re excited too let’s jump into the very first section okay here we go so introduction to Linux and the Linux plus certification uh overview of the history dros and of course the common uses so I was created in 19 1991 by lonus tals who developed Linux as a hobby while studying at the University of Helsinki I don’t know what you do as a hobby but this guy created an entire operating system um the goals for this were to make it free make it open source alternative to Minix uh which was based on Unix and that’s the guy lonus tals he’s still around and he’s still the the father of Linux um inspired by Unix which was created by Maurice Bach uh version 02 of Linux kernel was released in 91 and then 1.0 was released in ’94 toal uh tals posted the source code for free on the web inviting other programs to improve it making Linux a collaborative project and the foundation for open- Source software and to this day it is still open source meaning you can get access to it for free and you can even make modifications to it so long as your modifications get approved by the father of Linux uh richel stalman uh who’s an American and the the free software Foundation created the gnu which was the open source Unix like OS and then they added the gnu utilities to the Linux kernel to create the gnu Linux or the modern version of Linux that you see uh when you interact with Linux or uh when any of these companies that we mentioned at the beginning of the video when they create it or they use it uh that’s the version of Linux that they’re using so it’s the most updated version of Linux and that’s the guy Richard stalman he definitely that’s like the best picture that I found of him all of the other pictures are not flattering at all and he looks like a mountain man pretty much in every single one of these pictures and it’s interesting to see that like this is one of the guys that’s like the a tech uh nerd that was like the one of the founding uh people of Linux so it’s actually it’s really interesting to see the different types of people that you see inside of the tech world so yeah this is Richard stalman so then what happened was Linux became a complete Unix clone now it’s used everywhere as you saw uh torval Remains the ultimate Authority on what new code is incorporated into the Linux kernel and AKA he is known as the benevolent dictator of Planet Linux and the best picture that I could find to bought you know exemplify that to embody that was that picture right there so without that guy’s permission you cannot make any incorporations to the Linux kernel uh or at least not publicly shared you could probably make the modifications your yourself but you won’t be able to make it as one of the dros that are available uh to everybody else so uh that is what we got for the history of Linux now these are the popular Linux distributions and the various purposes that they hold Linux distributions AKA dros are different versions of Linux OS that bundled the Linux kernel with other software so you have the Linux kernel as the base and then you have a variety of different additions to it that create various distributions so for example we have Ubuntu which is the most commonly used uh it’s popular for General users beginners and people who want to use Linux in the desktop environment and it’s used or it’s known for user friendliness right so it actually has a GU and you get point and click and a lot of cool things that come pre-installed with it uh but Ubuntu is the most popular in my opinion and it was like the first introduction when I uh heard about Linux and I was looking at the software that was installed the OS that was installed it was Ubuntu Dro that was installed and then we have sent OS AKA Red Hat Enterprise Linux or real and these things are used in Enterprise environments so they’re mainly for stability and support so there’s actually a support team there’s a dedicated support team that the company can hit up and get their questions answered and it’s very very stable and it’s good for large environments so Enterprise environments use Cent OS and then Red Hat Enterprise Linux and then we have Debian and Debian is known for servers and advanced users mostly because the fact that you’re not going to get a graphic user interface there are some installments that do have it but for the most part it’s just a black screen with a bunch of command line comments that are on it and this is used for Server so this is a very very big one in the server environment and then we have Fedora which is great for developers and it’s more Cutting Edge and it has a lot of Innovations and utilities that are pre-installed on it and this is again for people who want to go into development and coding and software development etc etc that would be Fedora and then finally last but not least is my favorite which is Cali Linux and that logo is just absolutely amazing I love C Linux and it’s for cyber security and ethical hackers which is US everybody that comes on this channel we are all cyber security people and ethical hackers and we use C Linux and Cali Linux also has auntu installed on it but it comes pre-installed preconfigured with a bunch bunch of cyber security tools and a bunch of ethical hacking tools and Pen testing tools and it is my favorite version of Linux I’m biased obviously I love all of Linux I think it’s an amazing OS but this is definitely mine this is my favorite one and uh that is it for the the majority of the popular dros there are some other dros as well that you will see as we go into uh some of the links for being able to download these things but these are the most popular and uh you can just do a Google search to see what all different distributions are as far as the common uses of Linux we already kind of touched on them through the disos but you have you know servers embedded systems and iot devices iot devices are internet of things so it could be a smart Appliance like a microwave or something or a fridge or something it could be a router it could be cars like the Tesla cars it could be the aobi robots it could be uh so many different things that would be considered an embedded system or an iot device and then you have software development and cyber security obviously and then we have cloud and data center so AWS and Google Cloud actually use Linux uh devops and Cloud architecture all of those things are centered around Linux actually the only uh platform that I don’t think uses Linux for cloud computing is Microsoft Azure uh but they even have uh kind of like a integration with Linux that you can actually use to go into it as well so um for the most part Linux is the the primary OS uh that is used for a lot of these things it’s believe it or not it’s massive there’s so many different entities and so many different platforms and software and equipment and systems that use Linux so uh you’re in a good place by studying this you are adding a very important skill set that I think is going to be very relevant uh for many many years to come for decades to come probably uh assuming that the human race is still around so a very very good skill set to have just so you know what the benefits are by this certification for it professionals even if you don’t get the certification and you just get really good at Linux and you can put on your resume and on your portfolio that these are all the different things that you can do and uh for the the exercises that we run you’re going to get some output results so you can develop scripts and you can do a lot of different things that will demonstrate your skill set on this um but there are a lot of benefits to it so obviously there’s industry recognition obviously there is career advancement opportunities so it’s recognized Glo so Linux plus is actually a globally recognized certification and it’s very valued in it roles as a system admin as somebody in devops or cyber security and cloud computing uh it’s an entryway so it’s a Gateway it’s uh getting your foot in the door for professionals who are seeking to specialize in linux-based systems it validates your skills it has a lot of Versatility to it so system configuration troubleshooting security as we’ve just touched on employers really appreciate app people who actually have certifications or at the very least understand fundamentals and practical uses of Linux and in my opinion it’s the Practical side of everything that is the most important I know a lot of people who don’t have the degrees who don’t have the certifications but are very very capable and really good at these things that are getting hired in very big roles andc it’s mainly because of the fact that if you put on your resume that you can do something as a part of the application process they’re going to have you go through some kind of an assessment and the assessment is going to test your skills in Linux and if you actually know what you’re doing they don’t care whether or not you have the certification they just want to know that you know what you’re doing and you know how to navigate these types of environments so it’s very very important in validating those skills and of course there’s competitive advancement and salary potential so if you actually if you know what you’re doing and if you know Linux versus somebody who doesn’t know know Linux you will get paid a higher rate you can find some really nice salaries for people who know how to interact with Linux and Linux plus certification just kind of is that seal of approval to make sure that you actually know it but you know there’s this really great quote that says uh you know what do you call somebody who got a D in med school you call him doctor and so even if somebody got a Linux plus certification it doesn’t mean that they scored super high on that certification exam it just means that they got at least the bare minimum score to be able to pass it and then they got that search so you could for the most part A lot of people again could just be self-taught and without the certification but they know a lot of Linux uh interactions and environments and fundamentals and advanced scripting and so on and so forth that they actually are more knowledgeable than people who got theer so just kind of keep that in mind okay so here is the structure of the Linux plus exam the exam format uh currently the xk5 as of 20 24 so uh the time of this recording is November 2024 uh it consists of approximately 90 questions including multiple choice and performance-based questions and the candidates that uh take this exam they have 90 minutes to complete the examination and the passing score typically varies depending on the version but it’s around 720 out of 900 720 out of 900 is 80% so this is not something that you can get a c around or something like that so if you get 721 1 you pass if you get 720 you pass but it’s Approximately 80% is what you’re trying to accomplish here the main domains that are covered our system management so how to install configure and manage Linux systems security which is implementing security best practices and understanding the Linux system security requirements there’s scripting and automation for Shell scripting to automate tasks and manage resources which actually whether or not you take this it’s so powerful to be able to automate uh activities on Linux and just in general learning how to automate things is very very it’s good for you it’s good for your life um networking and storage management configuring troubleshooting the network the storage as well as share resources and performance and monitoring so monitoring the system performance and implementing logging these are going to be the main domains the main categories that are covered when you are going through uh the Linux plus certification and under this false troubleshooting under this false system administration so on and so so forth so uh these things we’re going to go through all of that stuff so that you have a very very good fundamental good foundation and then you actually get into the intermediate and advanced things as well the prerequisites are none actually there are no strict prerequisites but uh prior experience in Linux is actually very useful in this um although we will go through all of the introductory and intermediate stuff as well so all the beginner level stuff we are going to cover as well there’s actually a series of videos that I’ve done on Linux fundamentals and Linux Basics on this channel and they’re relatively short compared to what this video is going to end up being so if you want to go check those out just to kind of give you a you know a foot in the water dipping your toe in the water so to speak that would be useful if you get uh the CompTIA A Plus or network plus that’s also super useful but there are no actual strict requirements or prerequisites to get into this uh mostly because the fact that we’re going to be touching a lot of the fundamentals for all those requirements anyways but uh the better introduced you are to this the more familiar you are with this uh you’re going to have an easier time for the rest of it and you’re just going to get a lot of the information reing grained in your mind and reaffirmed and you’ll get a really strong understanding of everything that goes on all right so let’s get into the system architecture and the boot process and first in that regard is going to be understanding the directory structure and the file system hierarchy of Linux one of the common things that you’re going to to hear a lot as we go through this tutorial is going to be the FHS the file system hierarchy standard and we’re going to be referring to this frequently so the FHS defines the Linux hierarchy structure and what each folder is commonly used for and so the key directories that you see on your screen right here these are the big directories for Linux installations and for the most part these things always come pre-installed every time that you install Linux uh there’s going to be a difference between primary and extensions and log logic type of directories but these things are all falling under the key directory so you have the root the bin or also known as the binary and then you have the spin which is s uh system binary you have the ETC which is typically used for configuration files you have the home that houses all of the users you have the ver log the variable log that houses a lot of actual logs and variable Dynamic data you have the user folder that also houses user data you have the optional stuff and then you have the development uh directory that has a lot of the source uh as well as the virtual environments as well and then you have a temp folder that houses temporary data that typically gets wiped on reboot and these are our main key directories now the root directory is the top level directory the root is literally the root for the entire system so all of the other directories in FHS are inside of the root directory and they are technically all just extended ions of the root directory they’re organized hierarchically under the root subdirectories Branch out and then more under them and so on and so forth so they just keep getting more and more uh subcategorized under the root the root directory is owned by the root user who has complete control over the root directory and by extension the entire machine the structure and contents are crucial for a system stability and security meaning that you don’t want to mess with this unless like you really know what you’re doing you don’t want to mess with any of it because most likely if you do anything if you delete something accidentally if you modify something accidentally you’re going to mess the entire thing up and then you have to reinstall Linux and then there’s the software packages that are installed and their files and specific directories under the root directory CIS admins often work directly with the root directory to configure and maintain the system so this is the the mother right this is like the basic the very very main directory the the home of everything is the root and it’s represented by this singular forward slash the bin or the binaries directory contains essential binary executables that are needed during the boot process or in single user mode so it’s generally accessible to all the users and it houses all of the basic uh binaries so for example the ls command also known as the ls binary the cat command the CP the MV RM so LS is listing all the files and directories cat concatenates and displays the contents of a file onto your terminal CP copies files and directories MV moves or renames Co files and directories RM removes files and direct and these are just a few of them there’s many there are dozens of binaries that are included inside of the bin folder the binaries folder the sbin is known as the system binaries folder and this is the binary executables that are used for system administration it typically requires root privileges to execute this so it’s not accessible by everybody and since they involve system level changes it’s very very important that you know what you’re doing uh for the most part you’re probably going to be using your own version of Linux on your home computer to go through all of this so you’re not going to be in an Enterprise environment to do this so even you are going to be the root user that gets access to the system binaries you don’t want to mess with these things right so the the Fisk binary for creating partitions and the fs check for file system check um for in it initializing the system rebooting shut these are very very important binaries you don’t want to mess with these these are not things that you should even try to open or manipulate or unless you are super Advanced which if you’re watching this you aren’t so just be very very careful with the binaries just leave these alone you know uh for the most part as long as your your intrusion detection system or your antivirus or uh any of those security appliances don’t give you any kind of an error or an alert that has to do with this for the most part you’re not going to be interacting with the system binaries it’s just good to know what it houses and it is the part that uh primarily houses the system administration the binary executables that are relevant to your system and this is not accessible by anybody other than the root user that’s what you need to mainly keep in mind then we have the the variance the difference between these two right so you have the binaries folder that typically all users get access to the system binaries folder is only accessible by the root user the purpose of the binaries is essential user commands like LS and CP so on and so forth the system binaries are for system administration the execution timing so early boot process or single user mode is when binaries are actually launched and executed the system binaries are for system maintenance and administration so they actually manually are booted and uh used or activated executed and they’re not done automatically by the system so for example uh creating partitions is is going to be done manually by the root user as they try to create partitions or when you go through the primary installation and you’re assigning the various partitions that you want that’s when those things are going to be executed apart from that unless you do need any of those binaries they’re not going to be activated or executed so these are the main differences between binaries and system binaries so that you have a good understanding of what they actually are the Etsy so the configuration binary or not binary sorry folder the Etsy folder folder directory uh houses configuration files for a lot of different services and applications and these could be the things that you also install manually uh this is known as the control center and the contents of etsy can vary depending on the Linux distribution that you got and the software that’s installed so uh it again houses the stuff that comes preconfigured inside of the system as well as the stuff that you download and install into your system etsy’s containers or etsy’s directories are things like the Etsy pass password that actually houses all of the user account information but it doesn’t show you anything for password hashes so it’ll show you just an X for that the Etsy Shadow file is going to show the uh user password hashes so this is these two are very very important in the concept of cyber security and ethical hacking these are very very important files and then you have the Etsy group that has the group information the Etsy host for example the host name and the IP address mappings the host name itself which is the system host name you have the edsy res configuration file that has the DNS resolver configurations and you have the Etsy network interfaces that has the network interface configuration and you’ll see what that means when we actually run a couple of these networking commands just so you can see what those things mean and then we have the Etsy system control configuration that has the system kernel parameters and again you’re not going to be messing with this uh maybe at some point you might be messing with the DNS resolver configuration maybe you might be messing with the network interface configuration for the most part you’re not going to be messing with any of these things directly uh unless you’re doing pen testing or ethical hacking exercises where you would manually try to add a user uh to the Etsy Shadow file or the Etsy password file something like that but the interaction that you’ll have with all of these files will be through individual commands that will add or remove uh entries from some of these files and that’s how you will interact with them it’s very rare that you’ll actually open these files directly and interact with the file directly you’ll probably use one of those binaries that we talked about earlier to interact with these files the service configurations are like such so if you have an Apachi web server that’s installed that would also be inside of the Etsy folder and it’ll be Etsy Apachi and then if it’s in Jinx it’ll be Etsy in Jinx uh if you have a mySQL database installed that’s what it’s going to look like if you have the postresql installed that’s what it’s going to look like so these are the configurations for Individual Services right so uh it houses configuration files for the system Sy Services as well as anything that was installed on the the machine itself so MySQL may not necessarily come installed on your system you may install it and then when you do that configuration drive or uh directory that configuration directory as well as its individual configuration files are going to be installed inside of the Etsy directory and of course package manager so very similar to the previous uh slide that we were on apt the AP package manager resources or the Yum package manager resources these are uh dependent on the type of Linux that you’re running um so app typically comes with Ubuntu yum typically comes with uh Centos or red hat but these are the package managers that come that you can use to uh install various uh packages as well as software and applications and we’ll get deeper into that when we actually get to that slide but typically again these things are all included inside of the Etsy folder so as a final note why is the Etsy folder important well there’s system Behavior so all the configuration files directly influence your actual systems Behavior the security is very important as we talked about the Etsy password and the Etsy Shadow files specifically are really really import important so um if there’s misconfigurations that are done to any of these configuration files that poses a security risk but then there’s actual data that is inside of these configuration files that if mishandled or accessed by somebody that shouldn’t have access to is going to pose a massive security risk um there’s customization so you can customize the system by editing these particular files if you want to append to them you could use it uh doing various binaries or you could just open some some of these things up and directly uh append or uh manipulate the data that’s inside of them I wouldn’t do it against the actual system important stuff so if we go and talk about those individual softwares that were installed you can customize those by opening them inside a text editor but for the system uh related uh configuration files I would only use specific binaries unless I know exactly what I’m doing I would not open those files directly I would use the system binaries because the system binaries also give you the messages if you made an error in something or uh with the syntax of something they’ll tell you exactly what you need to do so you’ll get a lot of help with the terminal itself when you use the binaries instead of opening the document or opening the file and trying to configure it manually and of course troubleshooting so any system problems that can be resolved by modifying configuration files so at the same time vice versa of that a lot of system problems can be caused by incorrectly modifying configuration files so again just notes take notes be you know be warned I gave you the disclosure right so just be careful as you manipulate those data points and again so we have an individual slide for the caution so always back up the configuration files uh be mindful of the file permissions incorrect permissions can lead to system instability or incorrect permissions can lead to hacking that takes place um ensure that the configuration has the correct syntax to avoid any errors and of course test these things in a controlled environment before deploying them to a production system this is more relevant to somebody who’s actually working inside of some kind of a company and is hired as the system administrator so before launching it to the 500 or 5,000 employees inside of the company before deploying it to a production system that’s what that means before you actually deploy it to the entire company you need to test it on one machine in a controlled environment to make sure everything is all good and there are no glitches or errors or security vulnerabilities and once that’s been approved and everything’s taken care of then you deploy it to the rest of the company so that’s what that means you got to test it before you submit it and deploy it to the entire system to the entire production environment the home directory is where user accounts are stored and an individual user account so for example if you have user one this would be the directory for user one and then inside of that directory is going to be a bunch of information that’s just relevant to user one and typically it’s only accessible by user one or at least somebody who has user one’s password so user accounts are housed inside of the home primary location for files documents settings configuration Etc uh the key directories inside of it are going to be these and you’ve probably seen these so this also is very similar to what happens in a Microsoft uh environment where each user has their own documents folder and a downloads folder they have a music folder pictures public videos so on and so forth for the most part all of these things are only accessible to that user except the public folder the public folder is used to share files with other users and typically it’s accessible by everybody else that’s on that system as well but all of these individual folders right here are usually only accessible by that specific user uh user ownership has to do with their home directory and everything that’s inside of that home directory is owned by that user by default only that user and the root user have full access to the home directory as well as the stuff that’s for that specific user so it ensures privacy it ensures security um a user can customize their home directory to essentially do whatever they want um so long as they don’t install anything or do anything that would ruin the entire system itself they can essentially do whatever they want inside of their directory they can store whatever they want inside of their directory as long as they don’t pass their storage limits which typically if they do they just get notified and they have to remove some stuff and delete some stuff so that they open up some more storage space and by default the home directories are protected from unauthorized access um by anybody who does not have root permissions or is not on the sudo’s list or does not have the username and password for that specific user the notable notes here are that you want to back up these things regularly uh to just make sure in case anything happens with a system crash or something you can just recover all of that stuff um the file permissions are again very important so file permissions is another one of those things that is going to come up very regularly as we go through the rest of these videos and it’s Mo it falls under security so file permissions um have to do with if somebody is supposed to access this should access it if somebody’s not supposed to access it they should not be able to access it very simple it’s not it’s not a complicated process it’s just something that needs to be kept in mind and as you navigate and administer administer a Linux machine or a Linux environment this is some of the stuff that you really need to be uh be uh considered for or consider uh to just make sure that none of these things uh happen and nobody accesses these things when they’re not supposed to and we’re going to go through those individual file permission commands and how to set file permissions so on and so forth uh storage limits as we already talked there is going to be definitely storage limits and uh the users uh are supposed to maintain their own storage limits and not or not maintain them but they’re supposed to keep their storage limits in mind so that if they ever hit a storage limit they can delete data and make some more room but each user is going to get a storage limit so that the overall system and the overall environment doesn’t get maxed out and of course I mean keep it organized if you can but I know some people that have a really really freaking overwhelming like scary looking desktop because it’s just a bunch of files on the desktop there is zero organization and it’s like how do you find anything here and they’re like no no no I know where everything is at yeah I’m like all right bro if you know where it’s at then fine but if I am your manager I’m going to be like you need to learn how to organize all your stuff so that’s basically it so V or variable data I call it Devar it’s just it’s weird I don’t know the pronunciation is weird to me but whatever the VAR directory the VAR folder uh it stores variable data so this could be the system logs because system logs are constantly updated with new activity it could be temp files it could be mail spools it’s essentially Dynamic data that changes frequently or uh variable data as the name implies um these are some of the key directories inside of the VAR directory so you have the log directory that houses all of the system and application logs and it can be very very important that’s another one of those locations where we refer to regularly when we’re doing incident response in cyber security or when we want to do troubleshooting if a system crash happens or unexpectedly so it’s a very very important directory the VAR log directory is very important the our mail directory stores all the incoming mail for the users the spool directory contains various services including print jobs mail and news the lib has the state information for various services and applications and then you have the temp that is inside of the V directory which should not be confused with the actual temp directory which we’re going to cover in a few slides so it stores temporary files created by various applications that will be inside of this specific directory so inside of thear directory there is a temp directory that stores temporary files by various applications then we have the importance of this thing so as you can imagine Health monitoring by looking at the log files inside of that directory is very very important so it gives you the data that’s necessary to uh reverse engineer or backtrack what happened for system performance and any potential issues or attacks or anything that may have happened security analysis again same thing service operations so spool directories in the spool are very uh crucial to services like Printing and mail so if there’s some kind of an issue that is with your printer that isn’t the actual Hardware itself and there’s no connection with the wires or anything anything like that you may want to go over here to try to find out what is going on with uh the service itself why the operation of that printing is not working accordingly uh application States so the lib stores information needed for applications to maintain their state so whether or not they are enabled or disabled or if they have issues or glitching whatever it may be most likely it’s going to be inside of this specific directory for the application state so so the VAR lib directory is going to store information needed for applications to maintain their State uh important considerations would be regular cleanup of the temp directory to make sure that you don’t uh overload your storage uh rotate the files uh the log files regularly because log files can get massive if they are designed or if they’ve been configured to store data for a long period of time and I don’t care what the system is like uh for the most part any system can overload their log directory or the log contents very quickly if you don’t uh set it up to clean up so if you don’t set it up to wipe the log data or if you don’t back up the log Data before it’s wiped so on and so forth those log files can get very very large if the system is being used regularly log files can get really big uh permissions uh are very crucial again so right files and directories the permissions of those files and direct to protect system security somebody can get into your log directory and they can go into the authentication log and erase their tracks of being in your system that’s not good so they can actually get into your system they can do whatever they need to they put some kind of a root kit or something some kind of a Trojan or a worm something that they can connect to a C2 connection some kind of a shell something right they can get in your system house some kind of a connection where they can come in as they please and then they erase their tracks from your logs that’s not a good thing that is very very very bad and that should not happen because the permissions to those logs should be kept at a root level and uh a pseudo level so that people who are only an administrator should be able to access them and their password should be super complex so that somebody can’t just hack in their password by using a password cracking tool or something like that so permissions again as I’ve mentioned this is going to happen frequently so permissions to certain log files and just certain directories should not be accessible by anybody other than the root user and the administrators and of course backup whatever is necessary so not everything needs to be backed up but the important things should be backed up for example log files should be backed up and configuration files should be backed up that is all important stuff we have the user directory the user directory has user programs and libraries so anything that has to do with the programs of that user the libraries of data and any documentation typically stored here um they have the user bin so user binaries right the user sbin system binaries you have the user Library you have the local for locally installed software often outside of the actual package manager that we’ll be talking about the user share that has share data files like documentation icons and configuration files and of course the source code for various system utilities the binaries are accessible to all the users the system binaries are typically for system administration requiring root privileges so this same thing applies here so even the inside of the user folder the system binaries are typically only accessible by the root user the shared libraries used by programs the locally installed software often outside of the package manager these things are very similar to what you saw previously it’s just it happens to be for the individual user the root user will have their own directory so it’s not going to be something that you’ll see inside of the user directory it’s going to be forroot just by itself but the the user directory itself will have individual users other than the roots that will have all of that information stored in here so why is this important the program execution so in the binary and the system binary are essential for running programs uh shared libraries are used by multiple programs to reduce disk space and improve performance so if there’s been something that’s been installed that’s accessible to all the users it’s going to be inside of that directory so that it’s not duplicated across every single user taking up space so you have one installation but that’s now available inside of the lib the lib the library so that all of the users can get access to it instead of having multiple installations of the same thing uh software install packages install uh for the users are actually inside of the subdirectories of the user and a system documentation could be inside of the shared doc directory that contains documentation for system utilities installed software so on and so forth and what we’re talking about here is actual manuals for example how to use a specific uh software or utility the documentation for that is going to be inside of this system documentation so the user share Doc is going to house typically documentation and instruction manuals for the various utilities and so key points here there should be certain things that are readon so the user directory is mounted as a read only to prevent accidental modifications by somebody who should not be accessing it or should not have uh root privileges uh package management like AP and RPM they manage the installation and removal of software often modifying files within that user directory so instead of going and manually removing files or folders you would use one of the package managers and the the unin uninstall uh command that comes along with it that would be uh removing all of the software packages and all of the dependencies that comes with that software so uh rarely are you going to be accessing these things directly and trying to remove them directly which is why it says that there should only be readon permission so you should not have the permission to modify the contents inside of this it’s typically done by the various binaries that are inside of the system and some files in the user are accessible to all the users others may require root privileges to modify and that falls under file permissions and user access so again common themes you’re going to see this a lot so the reason why I keep saying them is because I wanted to like really embed in your brain as we go across this information so that you really really understand certain Concepts and then when you see the repeated themes you start understanding how all of these things actually connect to each other because CU it’s not complicated it’s most of this stuff is common sense you just need to know where certain things are housed and what the rules are for accessing them and giving permissions and so on and so forth so that is what we got there now we have the opt the optional software it stores additional software packages that are not part of the base system so optional software installations from third-party sources so uh let’s say OBS for example which is the software that I’m using to record this presentation that’s something that came from a thirdparty so software Third Party Source and that was installed so the contents of that the optional uh require all of that stuff is going to be inside of the opt folder for this particular software right there is a screen recording software that comes pre-installed with my machine but that’s not the one that I’m using so that uh content the content for that specific software are not going to be inside of this particular directory this is for the optional software that is coming from a thirdparty source so just keep that in mind it’s the optional configuration files or software installations or anything else that has to do with stuff that comes from a third party source and I I’m actually going to correct myself it’s not the configuration file so as we mentioned earlier configuration files would actually be inside the Etsy folder this is just the additional software packages that have been installed so it would be the packages the actual uh the use f uh packages of that particular software that are going to be in here the configuration file for that software would be inside of the Etsy directory why would you use this so it keeps the optional software separate from the base system which makes it easier to manage and remove um it prevents conflicts between different software packages that’s why we isolate them and it’s flexible so it allows for easy installation it allows for easy removal of the optional software and you can technically come in here and manually remove them but even if you have installed something uh and it ended up in here I would highly recommend just using the same package installer to remove it unless there was some kind of an install file that you downloaded from a place and then you used uh a package uh manager I mean I it I feel like it always comes down to the package manager so there especially in a Linux environment that doesn’t have a GUI a graphic user interface if it’s like a Linux server or something something you’re not going to get a install file that you would double click on and then you open the double you open the install file with the double click and then it goes through the installation Wizard and then you just click next or something it doesn’t work like that if you’re using the command line interface you’re typically using the package manager to install something which means that you would most likely use the package manager to remove something so this is uh more so for the system itself but again you just need to know uh what purpose this serves the optional software the opt has to do with thirdparty software that’s been downloaded therefore it keeps all of that stuff separate from the base system the system binaries and the base installations which makes it easier to manage and remove and it isolates everything so if there’s something wrong you can backtrack and try to find exactly where that problem came from and of course it’s flexible for easy installation and removal of that stuff the typical structure uh like looks like this so if you actually install something in the opt uh it typically creates a directory named after the software so for example MySQL so there would be a MySQL directory for the MySQL software and then it will house the software’s binaries libraries and configuration files and data and for the most part most likely there’s going to be also something that would be inside of the Etsy folder so you’ll actually have MySQL inside of the opt as well as the Etsy folder that would have to do with the configuration files of that however in this particular location it also houses the libraries it also houses the data it also houses the software binaries as well as the configuration files whereas inside of the Etsy folder it just has the configuration files so keep that in mind inside of the opt MySQL it has everything including config files inside of the Etsy MySQL it only has the config files so just keep that in mind key points here ownership and permission the ownership and permission files and directories within opt can vary depending on the software so if the user installed it versus if the root installed it that could determine the the direction of the permissions and the ownership uh package management software packages can be installed using the system package manager others may require manual installation that’s typically in some kind of a uh gu environment based on what I’ve experienced so far sometimes you use another command line tool that is not the actual package manager itself so for example it’s not a or apt it’s not that so there is some other kind of command line tool if you’re only in a command line environment um so sometimes that may be the case but for the most part I’ve actually only used the package manager to install packages and the dependencies for those uh tools and utilities um uh unless I was inside of a GU environment where there was some kind of a you know uh you double click it and you extract the files and then you click on the install file inside of that extraction and then it runs through the installation so on and so forth um then there’s a configuration for software installed in opt it’s often located within the software’s directory and then cleanup so when you remove software installed in opt it’s important to remove all the files and directories associated with that software so basically just just delete the entire directory instead of going inside of the directory and then in uh manually uninstalling things just uninstall everything that has to do with it if there’s data that you need to back up save and back up that data and then just wipe that entire directory that is the extension of opt so opt MySQL for example you would delete the entire MySQL directory to make sure that everything inside of that thing have also been deleted the dev directory houses the virtual device interface so a virtual ual file system that represents Hardware devices as files so it allows the OS to interact with Hardware devices using standard file operations so this could be like a printer for example so there would be the dev SDA or sdb that represents the hard disk drives so SD stands for standard dis and then it could be uh if you have multiple hard diss installed a would represent the first one B would represent the second one C Etc and it would just continue on from there there would be the CD ROM there is the USB drives right so it could be the external drives as well null is actually something that discards anything that’s written to it so when we run certain uh commands that we know they’re going to give us a lot of error messages we point those error messages to the dev null directory because it immediately just deletes those error messages because they’re unnecessary they do nothing to you and it’s mostly like permission denied to such and such resource when you do a find command this is actually what I use this for that that’s the only only time that I’ve used this specific directory for I’ll run a fine command and I know that from the results of the fine command there’s going to be a lot of data that’s going to pollute my screen and it’s going to hide the important data so it’s going to be like noise right and typically that data is permission denied to this permission denied to that and it’s all permission denied messages and then within a 100 permission denied messages there’s going to be two messages that have the data that I want and so I point all of that denied messages those error messages to the devn folder and then from there I can only look at the actual results so instead of seeing a 100 results I only see the two that apply to me because all the error messages go to the Devol folder um and then you have Dev zero which is a special file that produces an infinite stream of zeros and so far I have never used this thing I think it’s important from what I understand I mean it’s listed so I know that it’s important but I’ve never had a chance to actually use it so I’m very curious as to what that’s even for um but we just know that it does exist and so it’s a special file that produces an infinite stream of zeros and we can uh I mean I can I’m I’m actually going to pause the presentation real quick and I’m just going to do a Google search just to find out what the dev zero uh file is for all right so here’s what we got uh in Linux Dev zero is a special file located within the dev directory that essentially acts as a source of infinite null characters like asky value zero meaning when you read from it you will continuously receive zeros making it useful for initializing data storage with blank values which is why if it’s a blank value why do you need to store it whatever okay so key points about Dev zero the function is that it provides a stream of zeros whenever you try to read from it um the disk initial initialization would be the use case uh creating a completely blank dis by writing data from Dev zero to it okay that makes sense so if you want to initialize a dis creating a completely blank dis by writing data to it so you just pull a bunch of zeros from this thing and you write it to the disk memory allocation checking if a specific amount of memory can be allocated by attempting to read a certain number of bytes from Dev zero and then generating blank files creating a file with Zer is by redirecting output from Dev zero to a new file so it’s basically a storage of Z and then you you you pull that storage of zeros to either allocate testing or generate a blank file or initialize a dis that’s very interesting that’s like such a nerdy thing I didn’t even know that something like this existed but okay now we know very interesting so why is the dev folder important uh device abstraction by treating devices as files Linux provides a consistent interface for interacting with various Hardware devices so for example the file that is been assigned to a USB drive for example when you plug in the USB drive you now have a folder dedicated to the file system for that USB drive and then when you go inside of that folder you get to interact with the contents of the USB drive and this is more important in a command line environment because if you’re inside of a gue environment a graphic environment you just click on it and you get to see inside of the file browser that okay these are the contents of the USB drive but when you’re inside a command line environment only it turns it into a file system so that you can actually interact with the contents of it um device drivers which are software components that control Hardware devices create device files inside of Dev so the device driver which is the software components that control a hardware device so for example your printer has a driver that you need to install to be able to interact with that printer if you’ve ever insted inst a new printer it says hey you need to go download this the driver for this printer from our website and that’s how you get to interact with the the printer itself so that is housed inside of the dev folder the user interaction can access uh a user can access and control devices through these device files often using commands like dis duplicate or HD parm so on and so forth to be able to interact with the various uh extensions of the dev Direct directory and that is why this is actually important so it’s the virtual interface of a physical device typically so a USB drive a printer a hard disk on the computer so on and so forth this would be the virtual interface to interact with that physical device key points here are that the device files are often created dynamically when a device is plugged in or when the system boots so when you plug in your USB all of a sudden a little folder or file pops up that has to do with that USB uh access to device files may be restricted to rout or specific users depending on that specific device and the correct device driver might must be installed and loaded for a device to be accessible in Dev for example your printer USB drives typically don’t require device drivers but printers usually do so something that does something in the physical world typically has to have its own driver that comes installed and then that will be inside of the dev folder then we have the temp folder so the temporary file system it’s used to store temporary files created by various applications and system processes the files are typically deleted when the application or process finishes or when the system is restarted or rebooted the temp has write and execute permissions it’s a very popular Target for hackers most of the pen testing exercises that I have done have been they’ve had to do with you know creating a shell or some kind of a script that does some malicious activity creating it outside of the machine that I’m targeting and then taking that specific file and using something like w get or some kind of a python server to transfer it from my machine to the Target machine and then I put that file inside of the temp folder because the temp folder has right and execute permissions and I I can have no access to any of the other folders that we just talked about so the root folder obviously the home I can have literally no access to anything else but typically there is always access to the temp folder so if I drag and drop it or transfer my binary or the the the payload that I have inside of the temp folder then I can execute it from the temp folder so this is a very popular Target for hackers because of the fact that it has these permissions that typically come preconfigured you can obviously change this but for the most part it has right and execute permissions U mostly because the fact that it usually just deletes everything uh once the system has been rebooted so it’s not there’s nothing in here that’s permanent it’s a temporary file system so that’s why uh it has those permissions and that’s why it is such an attractive Target uh temporary storage is a convenient location for applications to store temporary files without cluttering the user’s home directory or other permanent locations and when you close the software those files get wiped from the temp folder when you restart the system those files get wiped uh system processes often use the temp folder to store temporary files during operations such as package installations or system updates and then they get wiped user applications such as web browsers and text editors also use the temp folder to store temporary files and then they get wiped so that’s why it’s like it’s probably one of the most volatile uh folders here because it’s just constantly changing based on the software that you’re using and the activity that you’re having so you don’t really uh you just none of these things are permanent It’s All Temporary some key points here there are automatic cleanup so many systems automatically clean up the temp directory on reboot or at regular intervals or when you close the software down or something like that security uh you got to be aware of potential security risk associated with the temp files because they contain sensitive information sometimes or that specific directory can be accessible fairly easily if necessary you can manually clean up the temp directory using commands like remove or remove RF meaning to reformat um however be cautious not to delete important files so again just be aware of certain things when you’re doing automatic cleanup or automatic wiping of something make sure there’s nothing in there that is important that you should have backed up before you wiped everything inside before you like digitally naal the entire thing and just wipe everything and so these are some of our other important directories the boot directory stores boot loader files Dev we’ve already talked about lid we’ve already talked about the mount directory uh houses the mount point for removable media um the proc is the virtual file system providing information about system processes and then the SRV contains data for services provided by the system and then there’s the system the CIS which is the virtual file system that has info about the systems Hardware so for example the CPU or the GPU so on and so forth so these are other important directories um however uh what we talked about is most likely going to be talked about very frequently you do need to know what is inside of these things you don’t have to know uh the nitty-gritty you don’t have to know all the finer details but you should be aware of these individual directories as well that are all a part of the file system hierarchy standard okay so now going into the file system types and mount points so these are our common file system types you have the xt4 xfs NTFS and fat 32 the xt4 is the fourth extended file system which is designed as the successor to xt3 and xt2 it’s a journaling file system for Linux and what that means is that it you it houses a journaling file system that basically it records everything that happens inside of the file system in in case the system crashes or there’s some kind of a power failure or something and it needs to pick up where it left off it maintains a journal so it supports large files um for example 16 terabytes in size which is freaking massive um it makes it suitable for storing large media files and databases it has the large file system support that can handle file systems of up to one exabyte in size accommodating massive storage needs enhances performance so improved performance especially for the large file systems and it can be extended so it’s designed to be extensible allowing for future enhancements and features and hopefully you can actually see the bottom part of this I’m not sure exactly if you can see that inside of the video but the bottom piece right here says extensibility the xt4 file system is designed to be extensible allowing for future enhancements and features so these are the key features that we have of the xt4 file system then there is the xfs file system the xfs file system also has journaling for high performance scalability and reliability it’s used for large file systems and high performance workload so this is typically for an Enterprise type of an environment uh it’s optimized for sequential read and write operations making it ideal for file servers and databases um it can handle file signs uh up to 8 exabytes in size so it’s pretty freaking massive um the xd4 very similar to the xt4 it uses journaling to ensure data in Integrity in case of crashes it can be scaled so it can handle a large number of files and directories that is really good for file servers with a lot of users so typically this is used for a central file server that a lot of remote users can access and it makes it very easy to scale up and house more files as well as give access to more users then there’s flexibility which has online file system res resizing and real time def fragmentation which makes the file system very flexible so you can actually make certain edits without removing uh permissions or without removing accessibility to it you can make certain modifications to the xfs file system so it’s typically used for large databases or data centers with many users the common use cases here are often used in high performance servers like the web server or the database server and file servers so server essentially it’s serves the data and other people can take the data from it so it can be one central location for example it would be the web server and then M multiple users can access that website it could be a database and multiple users can access that database it has the nas devices so network attached storage devices often use xfs to storage large amounts of data and then you have virtual machines like the xfs uh that can be used as the file system for virtual machine dis image images and just a quick note a network attached storage device is essentially a fancy name for a server so it it’s the physical uh server itself that uses the xfs file system to serve that data so it it stores a bunch of data that other people can access and it’s attached to a network meaning that is accessible via a network connection so that’s what an Nas device is and then it typically uses the xfs file system to be able to house that data to store that data so that other people people can get access to it the NTFS the new technology file system is actually a file system that’s been used in modern Windows operating systems it’s reliable it’s secure performs well the reason why you need to know this is that most often you’re going to need to format a drive that can interact with the NTFS system or at the very least you need to know what it is so that in the context of your interaction between Windows machines and Linux machines you need to know how to format a a file system or some kind of amount so that it can be accessed by both of these file system types right so if somebody is using a Linux machine and another person is using a Windows machine they both should be able to get access to your overall server they should be able to get access to your xfs file system for example so that they can pull whatever data they need from it so this is one of the reasons why we’re actually even talking about the NTFS the new technology file system um you know it’s secure it offers robust security features like Access Control list that allow granular control over the file and folder permissions it uses journaling very similar to everything else we’ve talked about to improve the integrity and recoverability of data uh it’s optimize for performance especially on Modern Hardware and it can can handle large file systems and large file support so it’s a very it’s a solid file system and it’s been used on the modern Windows machine so obviously this is a very very solid good file system it typically is only available so if something has been formatted for NTFS typically it can’t be accessed by a Linux machine that’s based on my experience at least so what you want is dual formatting and typically when you do something that can handle both of them it is not just NTFS just keep that in mind so NTFS is uh typically uh inherent to uh Windows right it’s uh very much so dedicated to Windows uh compression is one of the uh other features here um it can support file and folder compression to save disk space it allows you to encrypt files and folders to protect sensitive data meaning you use password protect files and folders and it has hard links and uh symbolic links it provides flexibility in file management a hard link is a direct reference to a file system essentially creating a duplicate entry for the same file data while a symbolic link link also called a soft link is a file that stores the path to another file acting like a shortcut that points to the original files location meaning with a hard link multiple file names can access the same data a symbolic link just points to the original files path on the system so for example a symbolic link could just be the desktop shortcut for example so that would be the main difference the hard link is a direct reference to a file on a system essentially creating a duplicate entry for the same data symbolic link is just a shortcut to that file right so a hard link duplicates the same exact thing puts it somewhere else a symbolic link or soft link is the shortcut that points to that file the common uses of NTFS would be the Windows operating system so it’s the default system for Windows nt2000 XP Vista 7 8 10 and 11 so the more recent versions of Windows uh many external hard drives are formatted with NTFS especially those that are designed designed for Windows system again so we’re referencing being able to use it by Windows um a lot of external hard drives are formatted as such so you want to make it uh formatted to access both types of machines so for example Mac OS as well as Windows so you need to reformat the hard drive uh USB drives can be formatted with NTFS to storage large files and folders and you can also reformat them to house both types of files so on and so forth so NTFS new technology file system some common use cases we have the fat 32 file system this is by far my favorite name for a file system so the fat 32 file allocation table 32 file system uh it was used in the early days of personal Computing it’s not as featur rich like NTFS or xt4 but it remains popular due to its Simplicity and Broad compatibility and it’s still used in a lot of environments um the key features is that it’s relatively simple which makes it easy to implement it’s compatible with a wide range of operating systems including Windows Mac OS various Linux distributions so it is cross formattable uh it has read and write access uh allowing you to create modify and delete files it does have a limited file size so it has a maximum file size that’s limited of 4 GB and a limited partition size for fat 32 meaning it’s 2 terab it’s still fairly big so 2 tbte file system or a 2 tab extension partition is not bad especially if you’re dealing with with just one person one user but most likely you’re not going to be using that inside of an Enterprise environment with a bunch of different users and a lot of different data so fat 32 for the most part is being used by one individual person for like a home computer or something like that or maybe a USB drive or an external hard drive that is maxed out at 2 terabytes the common use cases is the USB flash drive so commonly used for USB flash drives memory cards like digital cameras or other devices and external hard drives that only have a maximum of two terabytes typically use fat 32 and that’s actually what I did for uh most of my external drives cuz I don’t have external drives that go past 2 tabt so uh when I can I do go ahead and um format it for the fat 32 so that I can use it on both my Windows machine as well as my Mac OS and Linux machines all right now we can go into the system architecture which would be the kernel the shell and the user space so the kernel um it’s the core component of a Linux based operating system it’s basically the bridge between the hardware and the software layers managing system resources facilitating communication meaning that if you have you know if you put a request or we call it a call to the system if you send a call to your uh CPU to perform a certain action the kernel is that middle ground between whatever the software was that made that call and the actual CPU operating that call so it’s the middle ground it’s the bridge as it says between the hardware which is the CPU the GPU the motherboard so on and so forth and the software layers meaning your text editor for example when a text editor makes a certain call the kernel translates that call it transfers that call to the actual hardware and it’s the bridge that does that communication the key roles of the kernel are resource management and several other management types as well so you have memory management Process Management device management and file system management so allocates and deallocates memory to processes as needed and we’re talking we’re not talking about storage here we’re talking about the random access memory the processing memory you have the process management to create schedule and terminate processes it controls access to Hardware devices like the dis drives the network cards and the printers and then you have the managing of the file system and providing access to files and direct so memory management specifically it all allocates memory to processes as needed dividing physical memory into virtual memory segments page fault handling so a page fault or a page in general is just a a certain amount of data and the handling of the faults that happen with pages is typically done within the kernel so if a process tries to access a memory page that’s not currently in physical memory the kernel triggers a page fault and then loads the missing page from the disk then it swaps So Physical memory is scarce so and typically it’s in a computer that’s a little bit older or maybe it doesn’t have as much physical RAM you know let’s say 4 gbt of Ram or less so if the physical memory is scarce if there isn’t enough physical memory the kernel swaps the interactive pages to the dis to free up memory for active processes we also refer to this as the swap space and we’re going to be talking about this a lot later on but if there isn’t enough physical memory the kernel is responsible for swapping between virtual memory as well as the physical memory to make sure that the system doesn’t crash and you get access to uh the amount of processing power that you need to be able to run your active processes so this is what we mean by memory management you can allocate memory you can handle any uh data loading so if there’s any data pages that aren’t loading the kernel is responsible for retrieving that data and then it’s also responsible for managing the actual swap space managing the processing power between the physical memory and any virtual memory pages that have been designed we also known as the swap spaces so that the proc the computer doesn’t crash and you can still actually run the processes that you need to process then we have the process management so we went from memory management to process management and process creation and termination is one of the big things so the kernel creates new processes it assigns them unique identifiers uid and then terminates them when they’re no longer needed so when you close it down it terminates it and the uid goes away process scheduling so if you have anything that should run a certain amount of time on boot for example when you start up your computer or every day or every 5 minutes whatever those things are done inside of the kernel that process scheduling is done inside of the kernel and then the CPU time efficiently is allocated via the kernal uh context switching so between different processes saving their state and restoring the state state of the process to the to be executed so for example if you go from Google Chrome to your text editor you’re technically switching the context and then if you come from the text editor back to Google Chrome you should be able to pick up where you left off where you were on Google and so that is considered a context switch and the kernel switches between those processes saving whatever their state was and then restoring it when you go back to it so that you can just continue with business as usual uh interprocess communication is also facilitated by the kernel meaning that they can share information and synchronize their activities with each other and interprocess communication could be something like copy paste for example you take something from one thing and you paste it to the other one or if you have two uh processes that are integrated with each other that rely on each other those things can be done via the kernel as well so the whatever the processes are whether it’s a background process or a foreground process meaning something that you can visibly see versus something that you don’t see that’s just running in the background there are certain communication that takes place between those processes to make sure that the computer is running properly your system is all good and that’s all done through the kernel so the conversations that happen between processes the conversations that happen between physical hard drives as well as uh the physical CPU and your software on the computer all of those conversations are handled via the kernel and finally we have the device management here or I think there’s actually one more one more role here but device management is one of the other ones as well uh which would be the loading and unloading device drivers uh software components that interact with specific Hardware it loads and unloads those specific things so you can interact and communicate with the physical Hardware you can have the input output operations so when you click something on your mouse that’s considered an input your mouse is considered an input device when you type in to something on your keyboard that’s considered an input device or the input that’s being received by the computer and then the reaction from the computer would be considered the output so if I click on something it needs to open that’s an output if I type something in the keyboard and it prints onto my screen that’s the output so the kernel handles the input and output transferring data between devices and the memory which would be considered all the processing that’s being done on the computer and then the kernel also responds to interrupts generated by the hardware devices like the dis drives and network cards and if there is any kind of interruption happening within the processes of those it’s also handled by the kernel itself Hardware abstraction layer also known as Hal so this is the consistent interface for software to interact with Hardware hiding the complexities of different architectures uh this abstraction allows software to run on various Hardware platforms without requiring significant modifications so the hell the hardware extraction layer it allows it’s all done by the kernel so this is another rule that’s done by the kernel and it’s consider the interface for a software to interact with Hardware so various Hardware platforms have different functionalities so a 4 GB Ram is different than a 16 GB Ram a CPU that is one brand is different from a CPU that’s Nvidia or something like this so these are various types of Hardware or Hardware platforms and this specific H this specific abstraction allows the computer the the software that you’re using to interact with these different types of Hardware without requiring any kind of modification right so that’s what the purpose of this is for you don’t need to modify this software to interact with a 4 GB Ram although it might run a little bit slower you don’t need to modify it because the kernel will handle all of that translation for you same thing if it’s a 32 GB Ram you don’t need to modify it the kernel will handle that for you specifically how within kernel will handle that for you and then we have the system call so this is another one of those things that I’ve already kind of touched on a little bit but a user level program interacting with the kernel and requesting Services is called a system call so you make a call to the system to do something for you you make a call to your calculator to process a uh calculation for you and then the kernel translates that call it translates that request to the CPU the CPU processes that and then feeds it back to you so you put your input into the calculator the kernel translated that input or transferred that input to the CPU the CPU processed it and then the results came to the calculator as an output for you that’s called a system call system calls enable programs to perform tasks like creating files reading and writing data making network connections doing calcul ations playing a video yada yada yada all of these things are considered a system call then we have security so this is this is one of the big things for our community the cyber security and hacking community so security mechanisms to protect the system from unauthorized access and malicious attacks is done via the colonel it includes user authentication Access Control list and network security feature so user authentication meaning the colonel verifies the user identities and grants access access to some resources based on their privileges that’s all done by the colonel so when somebody logs in first of all it verifies that okay this login is actually correct and once you’re logged in the colonel processes your actual permissions and says okay based on what Hank has privileges to he can access these various resources and that’s all done by the colonel all behind the scenes so as soon as you log in the colonel says okay you have permission to it’s not going to declare it to you onto the screen but it’s just going to process that internally and it’s going to say okay okay this user has permission to access all of these things based on there are password and username and permissions that have been assigned to them their privileges that have been assigned to them then there’s access control so it enforces Access Control mechanisms to protect system files and directories so if you actually can’t if you shouldn’t have permission to access a certain file the kernel is the one that says hey user uh access denied right you don’t have access to this thing because of your privileges for your user and then there’s the network security feature like firewalls and packet filtering to protect the system from Network attacks to detect a fishing link that’s been clicked or to detect that you’re visiting a malicious website or to detect that somebody is trying to access your system and they’ve been denied access through the firewall all of this is done by the kernel the kernel processes all all of those uh commands and all of those requests aka the system calls and now we have the shell so the shell is probably the most basic vers of your interaction with the kernel so it’s a command line interpreter that allows you to interact with a computer system and it’s text based so it’s a you you you probably have seen a version of a shell when you see any kind of a movie or a show about hacking it’s that black screen that has a bunch of white text on it and it looks like gibberish but to the hacker they hopefully they know what the hell they’re doing um that person interacts with the system through the shell so when when we want to make a system call for example we want to run a program when we want to access something inside of the file system or manage the resources of the system the shell is our way to interact with the computer system and this is how you interact with the kernel you’re not you’re not technically directly interacting with the kernel but when you input something into the shell the kernel takes that input and processes it and goes and calls on the system some resources and the file system does everything else that you want it to do and this is how you directly communicate with the kernel there’s a lot of different ways to communicate with the kernel for example your calculator or your text editor but at the most basic level when you’re interacting with the a Linux server that only has a command line the shell is how you interact and how you process your commands to the system the shell works like this you provide your input right so you type in a command into the shell the command gets parsed so meaning the let’s say there are four different pieces to that command you say pseudo which is one portion of the command you say Nano which is another portion of the command and then you say the name of the file so let’s say that’s three different commands right so it gets parsed the command gets broken down into its individual sections or its individual tokens and then it gets executed so pseudo says that you have root level privileges and the shell will process that first and it’ll say okay if you have root level privileges enter enter your password so I can verify that you’re actually root and then when you do it say okay so you’re all good or it’ll say you actually don’t have access to this then once it has processed that then it’ll execute Nano and Nano is a text editor so it’ll just open up the file name which will be the third piece of that command it’ll open up that file name inside of the Nano text editor meaning that it’s executing the full command that you’ve given to it and then once you do that it opens the file and you get to see the contents of the file which is considered the output shell scripting is a an extension of Shell’s uh interactions and commands that essentially allows you to create a document put a bunch of commands inside of it and then when you run that one document when you run that one shell script then it runs all of the commands inside of that shell script without you having to manually input all of those commands so this is a very powerful Concept in automation so if you have a repetitive task like looking at a log file and doing it daily and you need to make sure that there’s nothing fishy inside of the log file you create a script that checks that log file every single day and it checks for certain strings or certain pieces of data to make sure that it’s not in there and if it’s is in there it’ll give you an alert that says hey there’s something to worry about if it’s not it just says hey everything’s all good system check everything’s fine and that’s a very very simple but powerful use of a shell script so you can create a bunch of different repetitive tasks or automate a bunch of different repetitive tasks using shell scripts and these are essentially text files like we also mentioned and they just have a sequence of commands that can be executed by the shell uh why we use the shell script is as you can imagine when you think about automating it does a lot of different things for you so number one it’s efficient so instead of you having to do it every single day you can just schedule a task via one of the tools that we already talked about and go through that task scheduling with a shell script so you say hey system run this shell script every single day at 9:00 a.m. or every single time that I start this computer run this shell script so it automates that for you okay the second part of this is that it’s very consistent so sometimes the human makes an error when they run a shell script or not even a shell script so let’s say you want to run one of the commands and you mistype something that’s considered human error or you forget a part of your series of commands that you’re supposed to run that’s a human error so instead of relying on the human you just write it once make sure that it’s written really well and there are no errors in it and now every single time that you need to perform that single task it’s done consistently exactly how it’s supposed to be every single time that’s great flexibility is that if you wanted to do the same task but you want to do it with a variety of different files or with a variety of different users you can just modify that script and then now it’ll do the same exact series of actions now I’ll just do it with this user and then the next user and so on so so it’s flexible you can modify it and then of course you can reuse it to death you can just keep running the same script over and over and over again and it’ll never complain it’ll never you know uh waver it’ll never uh water itself down it’ll run exactly the same way over and over and over again and will’ll have no problem no matter what version of Linux you’re running no matter how old it is so on and so forth is super reusable and it’s just very useful so some of the system administ ation use cases you can backup system files you can monitor system resources you can install in configure software you can automate user account management uh you can parse log files you can extract data from those files you can convert file formats uh you can deploy web application you can run tests again those applications you can compile and Minify code which is actually very useful and then there’s just general stuff so renaming the files in bulk moving and copying files scheduling tasks all of these things can be done through the creation of shell scripts so we’re going to get into the nitty-gritty of this when we actually start creating shell script so you don’t necessarily need to memorize all of this right now because you’re going to run this over and over and over again to practice these things and create them but when you open a shell file when you create a shell file that essentially could be file. sh that would be a shell file you open that the very first line needs to be the shebang line that calls to the path of your your specific shell bash or zsh or whatever it is that would be The Interpreter that you use to write the rest of the code so when you put that at top of the text document the computer then knows okay this is what I’m going to run first this is the very first thing that I’m going to run and this is going to interpret the rest of the commands in this document so then it knows that it’s supposed to run a script and then you can start usually the very next line is a comment so notice how this has a uh hashtag right here but there’s a uh exclamation at the second part of it and then you have the path to the the file The Bash file what this is is very different by having a singular uh hashtag the singular hashtag is just a comment meaning that this is not being processed it’s just something for somebody else who opens this file that wants to see what these individual lines of code represent so you have a #and then you explain what the next block of code does or at the very top of the file you’ll have one hashtag right under your shebang line that will explain okay the purpose of this script is to do X Y and Z and then for each block of code or for even sometimes even each line of code you will have a comment right above it that says this is what this line of code is going to do and then you’ll have the line of code that doesn’t have this so if there’s no comment uh hashtag in front of it that line of code is actually going to be executed which means if you don’t want the script to execute that line of code you put a comment in front of it and then all of a sudden that specific line of code has been neutralized and deactivated and this is actually something you’ll find a lot in configuration files where a lot of the commands that have already been pre-written there’s a comment uh sign in front of them there’s a hashtag in front of them which means that that specific line of code isn’t being run but if you want to configure that software to do that specific activity you just remove that #and now that line of code has been activated and then there are structures for actual flows so there would be the if else commands so if this happens do this otherwise meaning else if this happens do this else do this other thing or don’t do anything for XYZ do ABC uh while this is true then I want you to do this other thing if it’s not true then stop doing it these are types of the control flows and then you have variables so it could be you know name is equal to Hank that would be a variable and then you can use values inside of variables and variables are very very useful but essentially these are kind of like the main points of a script you can create variables within those V or you can uh call on the elements of those variables inside of an IFL statement you can have inside of the IFL statement you can have multiple variables and just recycle all of these things over and over and over again to create complex bits of code but for the most part this is the basic super super basic structure of a shell script and then we have the user space so the user space is the environment where the user level applications actually execute so it’s the separate space from the kernel obviously but it’s the the front-facing uh environment where the user actually interacts with the system so it’s an isolated environment for applications to run without directly interacting with the hardware so it goes from the user space to the kernel and then to the hardware um technically the shell is a part of the user space um this is a crucial separation for system St stability and security because the you don’t want the average user that doesn’t know what the hell they’re doing they don’t know their head from their butt for for a lack of a better word you don’t want the average user to start interacting with the kernel directly because they’ll mess up the system so you give them a user space and a user space has its own series of filters and software that interacts with the kernal and then if there’s something wrong the user space typically is the output that dis plays whatever the error message is to the user that says hey this is what you did wrong and this is what you need to fix uh the key characteristics of the user space are that the processes are isolated from each other and from the kernel preventing one process from affecting the other so for example the video uh viewer so your video player shouldn’t be interacting with a text editor right it just isolates these processes from each other and they also get isolated from the kernel itself the user space contains a wide range of applications including text editors web browsers games system utilities and then there’s limited privileges that have been applied so preventing uh the user space or from these actual uh users or these softwares from accessing Hardware or accessing Hardware directly or modifying system level settings so you can’t use a basic text editor to modify the kernel it just doesn’t allow you to do it because there there’s the limit of the authentication that takes place and the Privileges that are verified by the colonel that say Hey you can’t modify me you don’t have the Privileges to modify me and this is where a lot of these things come in from right so for each user their user space has limited privileges according to whatever the system administrator said they could or could not do the user space is separate from the kernel but they actually interact with each other right so the user space is how the user communicates with the colonel whether or not they know that they’re doing it the colonel provides system calls that allow userspace processes to request services from the kernel services that are requested by the userspace from the kernel are the file as file system access network communication process management memory allocation so uh reading and writing files right sending and receiving Network packets meaning you send uh Gmail to somebody or try to connect with gmail through your internet uh or connected with YouTube through your internet those are all considered sending and receiving Network packets it doesn’t seem very fancy when you think about it like this but every time that you request a video to be loaded from YouTube you’re requesting a packet of data to be delivered to you and that’s done through your network creating and terminating and managing processes and memory allocations so requesting and releasing memory um by using the calls to the system so system calls as we mentioned earlier the user space processes interact with the hardware devices and other resources through the kernel ensuring a secure and controlled environment so when you when you think about the kernel and then the shell and then the user space when you think about these three things you can see how they kind of layer on top of each other the kernel is the bridge between the user talking to the hardware but they need some way to talk to the kernel so they use the various tools and software and resources from the user space to talk to the kernel and then the kernel talks to the hardware and that’s basically how you interact with a system in general and now we need to know how the computer boots how does a machine boot what is the boot process so there’s something called bios and then the updated version which is UF bios is the basic input output system and it’s common onto older systems um you may have actually I don’t know how old you are but I remember bios on my very first computers when I would boot the computer it would say you know bios is initiating right so it initializes the hardware and passes control to the bootloader so it actually turns on the hard Ware the CPU the motherboard Etc and then it passes the control to the boot loader meaning it’s going to boot or load the rest of the system right to access bio setup you typically need to press this a specific key uh depending on the computer it would be delete F2 or escape again this is very old most likely your computer does not have bios and it has UF and that you do that during the boot process so as soon as you turn the computer on you start tapping F2 for example until you actually get to the BIOS menu and allows you to very uh configure the various system settings like the boot uh order the clock speed and the hardware settings and the way that looks is like this so This is actually when you get to the boot menu again I don’t know if you recognize this most likely you don’t recognize this because this is ancient um for the most part um some people I know that we have a few viewers that uh are a little bit uh there’re around my age or maybe a little bit older than me that would definitely recognize this and this is something that would be done in you know really old computers but this is basically the the BIOS menu right so this is when you actually get into BIOS and then you can do things like you know the boot priority of the hard disk quick boot first boot device second boot device third boot device checking of the password and etc etc etc uh this is not interacted with the mouse this is interacted strictly with the keyboard um I don’t know how much of this is completely relevant but this is basically what you need to know is that bios is on the older systems it’s considered the basic input output system and this is the piece of the boot process that initializes the hardware and then after the BIOS is done it passes the control of the hardware to the boot loader key functions is to power on and self test it’s called post so it cond and conducts a series of tests to check if the hardware is all good and then it issues a series of beeps to indicate the outcome of the test so this is very nostalgic for me I can I can recall those beep sounds every time I turn on my computer and if there’s an issue the beep sounds are different and once the post is done Hardware initial initialization happens so it initializes the essential Hardware like the keyboard the mouse the dis drives then it transfers the control to the boot loader which loads the operating system um which then loads the system itself so it it it loads it passes the control to the operating system bootloader and then it goes from the boot boot loader to the operating system itself so it goes from bios to post initializes The Mouse and the drive so on and so forth and then it initialize the boot loader to process the rest of the boot process and then it transfers the control of everything to the actual operating system and then you have the basic input output services so that’s the rest of these things uh for the operating system like the keyboard and mouse and display output those are the things so the keyboard and mouse would be your input display output would be the monitor and that’s your basic input output UF the unified extensible firmware interface which is just a big mouthful compared to basic input output system um the UF is the modern interface designed to replace bios it offers more flexible faster secured boating process compared to bios and this is what this looks like so you just from the get when you look at it you’re like oh this is this seems more modern right it typically does the same things though so it can actually have the same boot or tool or password or prioritization all of those things still can happen with the ufy it just happens to be quicker it happens to be a little bit more secure in this particular screenshot we see that there’s an AI tweaker wow super fancy so it allows you to have the overclock tuner the CPU the selection the filter of the pl yada yada yada these are all of the things that fall under the CompTIA A+ category to understand what all of these things actually mean and you don’t need like you really don’t need to master this for Linux it’s just that you need to understand that there was initially bios and then there was UF and then the process of the or the purpose of these things is to interact with the hardware make sure that the hardware is initialized make sure that all of the system checks are good so everything is running smoothly and then it transfers the control to the boot loader which does the rest of the loading of the boot process and then ultimately trans transfers the control to the operating system itself which means that it transfers it to Windows operating system or Linux operating system or Macos operating system they usually all have the same type of process it first calls on the hard devices the hardware and then the hardware is all good then it transfers the control to the operating system key advantages of UF over bios UF can boot systems faster um the graphic user interface so it’s actually point and click instead of just being uh keyboard navigated and it’s nicer so it’s a userfriendly graphic user interface uh secure boot so it enhance security features like secure boot which helps protect system from malicious software attacks uh large dis drives are supported through this it can support the largest dis drives or larger dis drives than bios could and then there’s Network boot that allows you to boot from a network resource making it easier to deploy and manage systems remotely so you can actually run something from a different location which was not previously available through bios um very similar to what bios was right so it still has the post the post power on self test it still has the bootloader execution and it still has the operating system boot so all of those things still happen with UF um it’s doing literally the same thing it’s just a little bit more advanced more flexible than what the standard was uh with bios and it’s faster more secure more futurer boot process that’s basically what it is it’s it does essentially the same exact thing it just does it faster it’s a little bit more flexible it allows you to do it from a remote location it’s more secure so on and so forth then you have the actual boot loader so the bootloader is the middle ground between bios UF and the actual operating system so once you uh start the BIOS or once you start UF the grand unified boot loader or grub is the bootloader that’s in Linux distributions and it takes control of the system and finishes the initial boot process then the inter so again it’s the middle ground right it’s the intermediary between the hardware and the operating system and ensures that the correct operating system is loaded and it provides a userfriendly way to choose between different boot options so for example when we go through the installation portion of this and you see as I go through the install process of Linux we’re going to be using uh the bootloader of my machine and we’re going to see oh you know what it’s actually choosing us to choose Cali or the Windows installation it’s it’s allowing us to choose the OS that we want to load and that’s where that goes right so the BIOS and UF make sure that the hardware is all good and there are no glitches and then it goes to the boot loader and the bootloader says okay which one of these os’s do you want me to load and that’s essentially the whole process between this thing and this is kind of what literally this is actually what it looks like uh just a much kind of a more modern version on the computer that I had but you see right here it actually has two different operating systems it has Linux Mint and it has Ubuntu and it has advanced options for Linux Mint and advanced options for Ubuntu so it has two different operating systems that you can choose from and then it loads it right so it’s flexible it can support multiple operating systems making it versatile for dual boot and multi- boot uh it it allows customization of the boot menu timeout settings default boot options through a configuration file so you can develop that we’re not going to talk about that um it can be configured to provide secure boot options protecting the system from malicious bootloaders and it supports Advanced features like the chain loading Network booting and kernel parameters which again are beyond the scope of this particular training but what you need to know bios UF checks the hardware passes control to the bootloader which allows you to check which operating system you want to run and then from there it transfers the control to the actual operating system so the boot menu presents a boot menu that allows you to choose which operating system you want which you already saw uh if you have dual boot which was what the example was you can choose whichever one that you want to boot whichever OS you want to boot then once you’ve selected it grub loads the actual kernel and initial Ram dis into the memory and then it transfers the control to the loaded kernel which then takes over the boot process dual boot is literally what you saw so this is just a breakdown of it when you install the operating system alongside an existing one so for example that Linux Mint could have been the primary and Ubuntu could have been the secondary the installer software modifies grubs configuration to include the newly installed OS as a boot option creating the boot menu generates a boot menu uh user selection allows you to choose the desired operating system from the menu and then loading the selected OS and then transferring the control to that OS once it loads the OS it loads the kernel for that OS and then the initial Ram the random access memory for that and then it it allows you to actually start processing or allows the computer to start processing all of those things and then the control is sent to those things so it transfers the control to that kernel and that uh RAM initial Ram dis and then those things essentially take over the control from the grub and then you’re actually in the operating system and it in initializes the operating system and that’s when you actually get into Linux right so the benefits of this is that it’s flexible you can have multiple loads uh experimentation you can test new operating systems it’s uh specifies task optimization for the specific OS that you want so if you want uh one that’s in inherent to gaming uh or one that’s intuitive or just better with gaming uh software development system administration all those things you can actually CH choose based on your goal so you can choose the OS that matches your goal and any data that’s stored on partitions that would be formatted with different file systems you can actually go access those individual ones so for example if you have data that’s only available to the NTFS which is a Windows thing you can go and recover that data because you have dual boot and then once you’ve got gotten that you can switch to Linux right so it allows you to deal with different formattings of data as well as different goals like gaming software development so on and so forth so it’s flexible it’s it’s very beneficial if you can do it then do it if you just want to run uh Linux from a USB drive and have a live boot then do that if you don’t want to mess with your overall Hardware installation or the the storage capacity of your hard disk then you can just load everything from a live USB which is good as well so dual boot is more when you install it to the actual hard drive itself to the actual physical computer you install Linux and now you have Windows and Linux on your file system then it goes from grub to CIS vinet so it’s the CIS vinet is actually the traditional initialization system that was used in Linux dros to start system services and processes during brute so uh CIS vinet or the next one the systemd that we’re going to talk about those two are the step right after grub and the bootloader so it’s basically a sequence of scripts that run in a specific order to bring up the system um the it runs those scripts so the if you are running cisv it which is again kind of like the Legacy the older version of it it runs the scripts that are located inside of the Etsy in itd uh folder and they’re responsible for starting and stopping the system Services um it has different run levels so for example run level zero is the halt state run level one is the single user mode run level five is is the default multi-user mode and it can uh choose those based on whatever the configuration was and then during the boot process it transitions through various run levels starting from a low level gradually moving to the higher level and then as it moves through those it executes the corresponding initialization scripts for each one of those run levels that are all located inside of this right the limitations here are that it’s pretty complex to configure this and difficult to understand if you don’t know coding or development language or uh syntax it can be relatively slow especially on systems that have a lot of services or they don’t they have physical limitations like the the ram is small or the CPU is old so it can be fairly slow to boot and it’s limited on parallelism meaning that it can only start the services one after the other which is sequentially uh which is inefficient right you you typically want to start everything at the same time if you just have to wait for this one to load and then move to the next one and then move to the next one it’ll take a long time especially if the system itself if the hard uh Hardware on the system is actually slow and old then this process can actually be fairly lengthy so then you want to go into system D which is the more current version of it it’s sophisticated and it essentially does what CIS vinet did but it does it better it’s faster more flexible more feature Rich and it’s the it does the same thing right so where where UF did the same thing that bios did systemd does the same thing that CIS vinet did and the way that it works is that during the boot process it takes control and starts essential Services it manages the life cycle of system services including starting staring and restarting them it ensures that the services are started in the correct order and based on their dependencies and then it logs system advents and applications to a central Journal so this was not previously provided by CIS vinet right so it goes through the boot process it runs all the services that it needs to if there’s any dependencies that are required by those Services it’ll make sure that all of those are also started and then it journals the entire process and logs them in case there’s any kind of uh troubleshooting that needs to take place that you can backtrack and find out what happened um it’s faster obviously as we’ve already talked about it runs those systems in parallel so as we talked about where it doesn’t provide parallel options in CIS vinet this can actually optimize everything by running everything at the same time and starting them at the same time time which reduces the boot time significantly as you can imagine um if there are any dependencies by those services so if a service requires something else to run it manages those dependencies automatically and just makes sure that everything is all good so that all of these things load simultaneously some things have dependencies that are required and we’ll talk about the installation of dependencies later but the you want all these things to load simultaneously you want them to load automatically without you having to worry about about it without the average user having to worry about it cuz they don’t know what they’re doing so it provides a unified framework for managing system services including starting stopping restarting and enabling disabling services that is system d uh it activates sockets uh Serv uh services that can only uh needed for further improving system performance um it can be activated through the sockets and sockets are actually also very useful for networking as well but that’s beyond the scope of what we’re talking about so system can activate Services only when they are needed further improving system performance so if you don’t need it it’s not going to be activated journaling we already talked about it in case there’s a crash or analyzing system logs timers and scheduling so precise scheduling of tasks and device management managing devices like disk network interfaces and USB devices all of this is done through systemd which is very awesome and most likely hopefully the thing that you will have to deal with when you go through your actual responsibilities as a Linux administrator um most likely you will not have to actually deal with this in the real world at all meaning you won’t have to deal with CIS vinet most likely unless you’re really dealing with like an old school system um if you do then just remember that they’re they run uh all of everything is run based on those run levels that are associated with each one of those scripts that are inside of the Etsy folder and the stuff is done not in parallel meaning it’s done one after another another it doesn’t deal with uh dependencies very well it’s fairly slow these are the key features that you need to keep in mind about CIS vinet and where CIS vinet falls short systemd takes all of those things and then some and just fills in all of those gaps and you just saw how it did all of those things and this is where we actually get to look at those run levels and boot targets so run levels would be relevant to CIS vinet right so these are the specific uh boot processes that is done through those various scripts uh each run level represents a specific state in the system and then the system transitions through these things during the boot process so you have these run levels so halt the system basically means stop the system uh one would be the single user mode two is multi-user mode without the file system the NFS um then there’s three which is the multi-user mode without the graphic user interface four is not used five would be full multi-user mode with the graphic user interface and which is this is typically the default that loads and then six would be the rebooting of the system so these are the various run levels that come in CIS vinit and these are associated with those scripts that we talked about that are inside of that Etsy init D configuration so boot processes when a system boots it starts in a low run level and it works its way up as it initializes it moves to higher run levels starting whatever service is associated with that run level for each of those run levels the scripts are inside the Etsy in the directory and these are defined they Define the actions that need to be taken when entering or exiting a particular run level and then the init process which is responsible for managing the Run levels can be instructed to switch to a different run level using the tell init command or by issuing a specific signal and this is an example of That So when you say tell in it one you’re asking it to run level one right so tell in it five would be asking it to run level five and you start the system in single user mode which is what run level one is so it causes to transition to that stopping most of the services and going only to the environment that is associated with run level one and then you have boot Targets in system D which replaces run level so cvin it had run levels system D has boot targets powerful mechanism for managing the system State they represent groups of services that should be started or stopped altogether they uh Define and control the targets and by doing that you can efficiently manage the system’s Behavior under different circumstances so the target works like this you have the dependency management the activation of the Target and a deactivation of the target so it automatically determines what dependencies between services are required and then starts them in the correct order for whatever the services are that you need to have and when a Target is activated it si the system D starts all of those Services associated with that including the dependencies for all of those services and then when you deactivate it it stops all the services that are associated with it so fairly simple the common targets would be this right so you have the multi- user. target it’s the default Target it starts multi-user mode or multi- user Target and it start Services required for multi-user environments including networking file systems basic system Services graphical Target starts graphical services like the display manager and desktop environment rescue Target that start Services necessary for system recovery like a minimal shell and network access which typically does not happen unless you’re actually troubleshooting and there’s the emergency Target which is the minimal Target starting only the most critical Services required for system maintenance which does not include network access for the most part you’re only dealing with that specific system and you’re trying to figure out exactly what’s going on so it is the like the lowest level and it only loads critical Services required for system maintenance so that’s essentially the various forms of this this is the highest level and graphical user Target or the graphical Target and the multi-user target load uh together because you want to have multiple users including networking file systems basic system but the graphical Target starts the graphical surfaces like the display manager and desktop environment if you have a version of Linux that actually supports a GUI this is the Target that would come with the boot inside of system d if you want the CIS vinet scripts if you want to manage them uh you have to know where they’re located which is the Etsy init d uh they’re typically named after whatever service they’re actually running so Apachi 2 if you’re running Apachi 2 MySQL secure shell Etc uh each script contains instructions for starting stopping and restarting the corresponding Service uh suspended executes these in a specific order ensuring that services are started in the correct sequence and the dependency are met so for example if you are running an Apachi 2 server you would need to load the Apachi 2 server before you can load any other uh software or service that requires Apachi to be running if you try to load the software service but you don’t have aachi running then that doesn’t work right so it needs to run in order so it does that in the correct sequence to make sure that whatever needs the previous thing already has that thing so that it can run it system D enables a service and this is uh very very uh similar right here so instead of doing these scripts that would be running sequentially the way that they are you can do it manually uh through enabling disabling starting stopping checking restarting and reloading and this is all very the the pattern here is very very simple the syntax is very simple so if you want to enable a service you would use enable if you want to disable it disable start it stop it uh check the status of something restart something reload something it’s very very intuitive so pseudo system CTL system control enable service name disable service name start service name stop service name and if you can probably put two and two together you would need to enable the service first before you can start the service and then you would have to stop the service before you can disable the service so that’s the the order of these things that come in once you’ve enabled it you can check the service and it says oh it’s been enabled but it’s not going to be active because you haven’t started it once you start it you check that service status and you’re like oh this is active it’s currently running so you get that uh the status of that thing and then if you need to restart it you can just do restart the service you can’t restart it if it hasn’t been enabled common sense right and if you need to reload the service configuration after you’ve done certain modifications to the config file you would just reload the configuration or reload the service and it will just reload it it has to be running obviously actually it probably doesn’t need to be running but if it is already running and you modify the configuration and you want that configuration to apply you would need to reload it you don’t necessarily need to restart it okay so let’s talk about the installation and package management portion of this whole thing um specifically the preparing and installing distributions now selecting a Linux distribution really has a lot to do with what you are trying to accomplish um so there are a variety of different versions of these dros um so we have the desktop version for Ubuntu Fedora and mint we have the server version Cent OS the Ubuntu Server Debian and then there’s actually this one that I kind of forgot to put in the title here which is the red hat Enterprise Linux and of course there’s security and Pen testing for Cali Linux so it just depending on what it is that you’re trying to do uh these are the various uh locations that you can download your ISO images so this is what’s very important to consider so if I go to the Cali uh website here this is what it would look like and so we have the the various installer images virtual machines Cloud mobile arm devices containers live boots and so on and so forth for the Intensive purposes of this particular uh portion of this uh tutorial I’m going to be using a live boot ISO image which means we want to install something that we can load from a USB drive that’s the the whole purpose here and you can have it in like one of those mini kind of USB drive drives or you can actually have a an external drive that is attached via a wire that’s what I’m going to be using and mostly because the fact that I’m also going to be using it as a storage container so typically a small USB plugin uh that is like a the size of your thumb for example a thumb drive is what they call it uh um a small USB thumb drive does not have that much memory on it so it won’t go into the terabytes at least not that I have looked for recently I’m pretty sure they have them that can go into a significant portion of storage but I’m going to be using something that has a significant portion of storage because uh for the rest of these tutorial recording I have to record the videos on that specific drive and make it so that it actually has enough uh storage for me to store video files right so uh but essentially this can be installed on any kind of USB plug-in which is called a live installation it’s a live boot or live installation so we can choose anything that we want from this particular website depending on the type of service or the type of purpose that we have for that specific installation and then same thing applies to all of these other ones as well right so you want an ISO image for the uh the specific Dr that you’ve chosen so that you can have that installed either through your computer itself a hypervisor where it’s like a cloud computing virtualization or you want to install it as a live image that to boot from a USB drive so in in either one of those cases you would get your ISO images from these links I’m going to put these links inside of the description below so you can get access to them directly and I highly recommend that you don’t get them from any kind of a torrent website just get them directly from the actual website for these individual distributions so that you can be sure that there hasn’t been any manipulation done with the iso and you’re not downloading anything that you shouldn’t be downloading or anything that has been tampered with that’s the that’s a really big important piece right here you don’t want to download something that has been modified even if the developer says oh this is going to be really really helpful or whatever learn how to make those modifications yourself don’t download something that’s been pre-modified especially from a torrent website because you just you you never know what you’re going to be downloading and if there’s some kind of a malware or ransomware or something that’s installed on it the Trojan warm whatever you you just don’t want to deal with that kind of stuff so again one last final notice download directly from the websites that you see here so that you get the actual ISO images that have been verified and uh you know that they’re they’re good to go now as far as the installation process itself is concerned I’m just going to kind of give you an overview of this but I’m going to demonstrate what this looks like when you want to use uh one of these ISO images to install a uh uh limit Linux version for yourself so in this particular case now as far as the installation process is concerned I’m just going to give you like a step-by-step breakdown and then we’ll go into an actual live installation of Cali Linux cuz I love Cali Linux and we’re going to install it on an external USB drive and then you can just see what that entire process looks like so first and foremost you want to prepare your external drive I always format it especially if it’s just a fresh drive and you’re uh making you want to make sure that it runs on all of the uh major operating system so for example a Windows Mac OS and Linux operating system system you want your drive to be able to adjust to whatever that OS is and actually run on all of them if it’s formatted in one particular format and won’t run on Mac OS or Linux then you’re going to be hindered and limited so even it’s a brand if it’s a brand new drive that you’ve gotten you can use something like the Mac OS dis utility or the equivalent version on Windows to just format the the drive so that it can run on all of the different os’s and I’ll show you what that looks like in a bit so you want to prepare the drive and then make sure that it actually has enough storage space for Cali Linux it’s not a big file so the installation and the iso image is not large but the recommended size is to have at least 4 GB on the drive just to make sure that you’re all good um then you want to download the Linux from one of the official links that I gave you and get the iso image of the drro that matches your system architecture and your needs whatever you actually want to do and then we have the creating of the bootable media so this this is where etcher which is a tool it’s a free tool so is Rufus they’re both free tools etcher is for Mac OS Rufus is for Windows and it essentially turns uh the iso image it makes it creates a live image uh on that USB drive so that that USB can now be a bootable device and once you connect it to a Windows machine or anything that allows you to do that you can go ahead and load that Cali Linux image from the the device so technically you’re just literally going to be walking around with essentially a computer on a USB drive that’s kind of what it feels like right so you want to turn the USB drive into a bootable media and we’ll be doing that live as well and then we’re going to boot from the USB drive so when you actually go through this process uh this one is kind of uh fairly simple straightforward you’re just going to be going through the wizard itself there are a few elements that once I boot from the USB drive I’m going to be uh recording so I can show you what specific options you need to choose to make sure that it loads uh most likely in every case that I’ve gone through you need to get to the BIOS or UF settings which is the the very base settings of the computer so that it allows you to choose uh a boot from either the internal memory or from an external file and what we’re going to be doing is loading from an external file and then we have the Linux installation itself so this typically this is done uh using rofus Rufus or etcher but sometimes it’s actually also done uh from your computer when you’re going through the boot process where you would you do your Linux installation now if we’re running from a USB drive you don’t necessarily do any kind of a Linux installation it just loads from that USB drive so that that’s kind of one of those uh optional portions and same thing here this can this is most likely done in etcher or roof this and sometimes maybe it’ll be done while you’re booting from the computer where you you know choose your language and the location keyboard layout etc etc um then we have the external SSD portion of this where you choose this as the installation Target and again this is done through etcher or Rufus where you choose the external SSD which is when you choose the USB drive to uh be as your installation Target and then it’ll install the live version of Linux onto that external SSD and then you just go through the the Motions you may be prompted to set up a username and password if you aren’t the basic username and password is C Cali so C would be the username Cali would be the password and then once you’re logged in you can modify those and then you just start it you you restart the computer you boot into Linux uh from the external SSD from the file inside of the SSD and then from there you actually have your boot running and your operating system will load and you’ll be inside of Kelly Linux so this is what the step-by-step looks like so what I’m going to do now is I’m going to actually go through all of those steps and just show you what that looks like okay so this is my dis utility on Mac and so what we can see here is that I have my primary 2 tbte drive and I have the Linux drive that’s right here and then there’s actually a balena etcher uh dis image as well that’s been uh activated because that’s what we’re going to be using to do our installation of the Cali Linux ISO so in this particular case I’ve already formatted this drive I just want to show you what that process would look like so that you can make it uh usable by all of the operating systems so I’ve clicked on the actual drive itself up here I’m going to go through erase and then you know the name is fine it’s Linux the format is the big piece right here so MS DOS as you can imagine is Microsoft Mac OS extended and journaled these two are going to be Mac OS specific what we want to do is we want xat xat is the uh multi-os version of this where you can just make sure that this thing will run on uh essentially any operating system that it runs on now if your options for this formatting aren’t exactly the formatting that you see right here then just a simple Google search or conversation with Gemini or GPT will allow you to find the specific formatting option that will allow you to go through uh a boot from any kind of a machine Mac OS windows so on and so forth and then Security Options this portion is I’ve specifically actually had information that was on this drive previously so I left it at fastest because it would be possible to recover the data that was on this uh drive if I leave it as fast as because it’s not the most secure meaning it’s not going to wipe it and make it unrecoverable when you take it all the way to the end right here it makes it absolutely unrecoverable you won’t be able to take any data from it and it essentially overwrites the the drive with a multiple series of zeros and ones and literally just making it unrecoverable you won’t be able to boot anything from it so uh that one’s up to you if you’re getting a brand new drive it doesn’t really matter but if you’re wiping something that you previously had you might want to keep it so that you can potentially at some point reboot it and then once that’s once you’ve selected your options you just click erase right here and then it’ll just erase the whole thing and make it a brand new drive so that you can use it for your installation process and then this is what it’ll look like it’ll just be you know 1 tbyte free and then you have 12 megabytes that are still used which I presume would be all of that data that I previously erased that’s still kind of sitting somehow in storage back there so that’s pretty much it that’s all we got and then the dis itself the USB drive will actually be ready for installation using either Rufus or etcher and now that my drive is ready what I’m going to do is I’m going to choose the version of these isos that is most applicable to me and in this particular case it’s the live boot that’s available over here so it’s literally unaltered host system meaning your main computer won’t be changed in any way you get access to the hardware of the host system so if you have a 16 GB Ram the live boot will use the 16 GB RAM and then the customized Cali kernel of course performance decrease when heavy in andout is not a uh input output is what that essentially stands for um it won’t be affected in any way because again it just is doing a live boot from this piece and you’re using the main system so very quick very easy you get a full Cali installation or Linux installation and then you can do this with all of the different versions of Linux as well this is not limited just to Cali so you can run all of the other ones from a USB drive as well so I’m going to click uh the uh live Boot and then from here I’m going to pick 64bit because my machine is actually it can handle a 64-bit so I’m going to do 64-bit and from here on out I’m going to be using a Windows machine and I just have verified on there as well that it is all good and then the piece right here that you see that it says torrent and then the sum value this is the piece that you can verify what the hash of this particular ISO image is and for security purposes if you don’t get your ISO image from the Cali website directly if you get it from some kind of a torrent website you need to run the Sha 256 sum and find whether or not that value is exactly this value if the value has been altered even by one letter then don’t do it because the official installation shop 256 hash value is this which means that this is what C has actually confirmed therefore it’s something that you can trust right that’s essentially how I’m going to go about trying to explain this as best as I can the installation itself is 4.3 GB so we’re going to just click download and it’ll start to download right here for me and once that has has been downloaded we will go through etcher and we will install it on our USB drive okay so our ISO has officially downloaded and I have etcher open and as you can see it’s very very simple it’s not it’s not a complicated uh interface so what we’re going to do in this case we’re going to flash from the file the file that we’ve downloaded the iso image uh you can also Flash from a URL or you can clone a specific Drive that you have so I’m just going to do flash from file and then from here I have to choose the iso image and in this particular case it’s literally right here in my uh Cali Linux in my downloads folder so I’m just going to click that ISO image it has the iso at the end of it we’re going to click open and then we’re going to select the target onto which we want to write this specific thing and in this case I have my Cate beup slim BK this is the one with the one terab that’s the one that I know that I want there’s the Apple SSD and all these various things I don’t want to mess with these in any way this is the one that I want which is the one TB Drive uh the CATE 2 uh portable media the 2 terb drive that’s the one that I uh don’t want to mess with now there is a way that we can just make sure which one these are cuz I’ve actually renamed these and I’m not seeing the renamed version of this so there’s a way that I can find out which Drive it is that has been assigned to dis 5 and dis 4 Etc and we’re going to do that inside of our terminal okay I have loaded my terminal very very simply um the command itself is very simple so it’s disk util for the dis utility and we’re just going to do list and you press enter and it brings up a bunch of data um including all of these partitioned drives that we have over here and these partition drives should actually have their name that we’ve assigned to them as well so in my particular case we already saw on uh the eter that we had Dev dis 4 and Dev disk 5 were the two drives that it uh noticed that it said it has a lot of information or a lot of por a lot of the size data storage data on it um the 2 tbte one is the one that is named right here which is the primary 2 terb that’s the actual name that I gave it not the name that it came pre-installed with inside of the uh when like when I bought the CATE drive that those are the names are the ones that you see like those original names is what we see uh the next one is the one that I’ve named Linux and that’s the drive that I’m most interested in and we can see that it has the 1 tab size and the availability in this particular case we have the two terab size but the availability is not that much cuz I’ve St I’ve stored so much data on it um so it’s not really that good as far as the availabilities of us concerned I definitely want this one that I named Linux and I can see that it is inside of the dev dis 5 partition right here so that’s what is most interesting to me and most useful to me so now I’ve confirmed that data I’ve confirmed that information I know that I want the drive that’s on dev disk 5 so I can continue with my installation on etcher and here it is I already had it installed cuz that’s pretty much what I figured because I knew it was the one TB drive so this is it the seate buff Slim K media etc etc I’m going to select this one as my drive and that’s it once that’s done you just click Flash and it says hey you’re about to erase an unusually large Drive do you are you sure that you don’t want uh are you sure that the selected drive is not a storage drive and I’m just going to say yes I’m sure because what I know is that I can go ahead and uh use that as a storage drive when I do launch Cali Linux uh in front of my or from my other computer you will also get notified to enter your password because it is a privileged access type of a uh thing that it needs to run so uh I haven’t pressed enter so it actually stopped but uh we’re going to retry this one more time because I just want to make sure that uh I do run it correctly so we’re going to run it all over again and I’m just going to enter my password at the very end real quick just to give it permission to do what it needs to do and then it’ll it’ll create the drive for us okay so there you go the password went through I got a permission request for eter to uh access this particular drive and I gave it the request and you can see it’s working and it works very quickly cuz it’s not a massive ISO image or anything like that so it’s going to take maybe another 30 seconds or so and then the installation of Cali Linux will be done on this external USB drive and then we can go ahead and boot it and talk about the rest of the stuff about partitions and package managers so on and so forth all right so when I reboot my computer and I just keep pressing F12 this is on a Windows machine it’ll take me to the boot menu and then when I get to the boot menu uh the option that I want is to actually get to the boot screen which is F9 for me and then I choose a live boot from a file and then I choose the Cali image that I had and then I go to EFI and then I go to boot and then I choose the uh 6 4bit version of it and then this is what we land on this is the actual menu for Cali from uh any kind of a USB drive or even a CD ROM if you actually had a CD ROM and then you see that we have all these options to boot from live from the USB itself and then we have the installation portion and what I’m going to do for this section is I’m going to boot it from the uh the USB live image and we’re going to boot it with USB persistence and as soon as you pick that image it basically brings you to the the loading screen here so uh it usually takes about maybe like 20 to 30 seconds for this to actually load and then when it loads we have the operating system running ready to go with all of the utilities installed and uh essentially that’s it so it’s that quick to just boot from a USB drive uh without going through the full installation process so you’ll see here in a couple of seconds that it’ll actually load and I have to actually record the screen with myself cell phone so that’s why the image quality is like this but when we start doing the screen capture once we’re inside of uh the Cali Linux machine it’s going to be much clearer and you’ll be able to see everything as I click around and here we have it this is literally the the operating system loaded ready to go we have of course the file system with all of the uh system binaries and everything like that you can open up a terminal and have that run very quickly and smoothly and I uh all of the utilities for the most part like 9 % of the utilities are already pre-installed and then if you wanted to go to your home as the user you would access it through the file system if you went through the menu you will get access to all of the utilities and the shortcuts that are available so it’s a fully functional operating system that’s available so what I’m going to do right now is I’m going to restart it and uh it’ll take me back to the very beginning of the uh computer’s boot process and then we’ll do F12 again so that we actually can get to the boot menu and then once we are inside of the boot menu we’re going to repeat the same process that we did before uh meaning we are going to go and actually uh do the boot menu Itself by F9 then we’re going to boot from a file we’re going to choose our Cali live image and then I’m going to go to the EFI option and go to boot again and then choose the 64-bit version again but this time around when we actually get to the menu here I’m going to actually click the install installation uh option so that we can go through a full install so you can actually see what it’s like to go through the installation process with Cali Linux Wizard and uh how to select your partitions and so on and so forth so pretty much just like every other operating system when you boot it for the first time it’ll ask you your preferences so your language and your country and uh I guess the version of English for me and then I’m going to just keep pressing next until it gets me to the port where I have to choose my partitions um and essentially it’s going to ask me how I want to split the memory storage of the computer that I’m on cuz I’m using a technically a type 2 hypervisor because this is being booted from my Windows machine so my Windows machine the operating system of the windows is going to be the primary portion of the the operating system and we’re running Cali Linux as an extra installation and so the main Hardware of the Windows machine is going to act as the basis for this and then we have the uh Windows machine itself and then this is going to be our dual boot option where we can if we uh whenever we restart this and we get to the boot menu we can actually choose to boot Cali Linux instead of booting the uh the Windows machine so actually technically I think this is a type one hypervisor because we’re booting live from the hard drive we’re not booting on top of the actual Windows operating system so I won’t go inside of the Windows operating system so you can see I’m I’m setting up my username here and I’m setting up a password for my installation all of these things are very very intuitive and very easy to follow the instructions and I do stand correct it so the once this installation would be finished this would actually be our dual boot option where we are running Cali on top of the hardware of my computer instead of running it on top of the window Windows OS so meaning you would log into Windows OS and then you would use some kind of a hypervisor to launch Cali Linux instead of doing that we’re booting it live from the windows OS and this is the portion that we get into where we do the selection for how we want to create our partitions and so um it essentially just gives the the recommended option if you don’t know what you’re doing you can just follow along with the options that it gives you and it creates the most basic uh partition split apart for your root directory your users home directories and all of the other primary and extended partitions that would be necessary to boot uh Cali Linux and I’m using the external drive that you can see right here it has about a terabyte of uh storage that would be used for my partitioning file system and then that’s what I’m going to use to create the rest of this uh the browser or not the browser the wizard and then it’s going to be a guided process and everything else would after that once you press accept and then you press enter it’s going to start creating the partitions and then it’s going to actually take you into the boot menu very similar to what we had from the live uh version you would restart the system and then you would select your Cali Linux installation uh Cali Linux operating system and then it would just load Cali Linux and it would look exactly what it looked like from the live boot that we did from the USB drive except that time around you would be running it directly on top of your Hardware so I’m restarting my computer and then we’re going to get back to the presentation all right let’s talk about managing partitions file systems and dis usage here are some important partitioning Concepts to consider and to keep in mind so the role of partitions in isolating systems or user data is mainly to uh preserve space uh on a physical storage device so if you can think of partitions as logical divisions of a physical storage device allowing the operating system to manage the data in separate isolated areas on the same device they’re key in organizing the data and helping with performance security and manageability and the the visual is really the big thing that I kind of wanted you to wrap your head around I work well with visuals and I feel like you may also get value from this as well so if we look at this left portion right here let’s say you have two physical storage devices right so you have piece one and piece two and piece two has been broken down into three separate pieces right here you can consider that to be partitioning and so this can be actual physical storage or it could be one of the primary partitions as we’ll talk about in the next slide it could be one of the primary partitions that has been broken down into multiple pieces but to really just kind of wrap your head around what partitioning is kind of like the name implies itself you’re breaking storage space down into parts so it could be the actual physical storage space so you could have one physical storage device that’s on your uh computer so whether it’s a server or it could be your laptop or uh the Cali Linux machine uh or really anything on a USB drive or something like that you could have an external storage device that you’ve plugged into your computer that could be the physical storage device and as you go through booting and setting up your your computer so let’s say you’re installing Linux on one of your storage devices or as a virtual computer or a virtual machine and you as you go through the installation it asks you for the drive to use for partitioning and then you select your external external drive to be your partitioning storage or your storage device that you will partition and then from there it’ll just go through its various uh options and it’ll guide you through it or you can manually select how you want to do it like we did in the the installation video or the installation portion of this video right so that’s essentially what partitioning itself is right so when you think about the uh advantages that comes along with partitioning uh there are three-fold and this is just kind of a general approach to it so the isolation of data right so they keep system files separate from user data reducing the risk of user data corrupting or the corruption of user data in the event of any kind of a system failure right so you keep system data as well as user data separate from each other you isolate those data types from each other so that in case anything happens one or the other won’t affect the other right and then you have the performance of it so when you separate frequently access files such as the stuff that’s inside the V VAR directory the variable directory from system critical files that can uh improve the performance of the machine right so frequently accessed files um can be logs they can be dynamic data email spools whatever it may be those things if they’re kept separate from the system critical files then it can actually help perform help the performance of your device it can make it run smoother and faster and then you have security and recovery and this is a really big one especially for our world on this channel we’re going to be we talk about security all the time and you’re probably going to be in incident response at some point and uh having backups and securing The crucial data is very very important so when you isolate system files inside of a partition separate from user files it makes it easier to manage the permissions and restrict access to those system files right here and it enables quicker recovery in the event of data corruption or system failure so these are some of the key advantages of going through partitioning now here are the examples of the common primary partitions most Linux devices break down to at Max four primary partitions one of the biggest and most important one is the root partition so this would be the main directory where everything is installed including the home partition and the VAR partition and everything else right it is an extension of the root partition and keep that word extension in mind so you have the root partition the home partition and the VAR partition these are typically the most common partitions and when you go through the installation of any Linux uh device you will see that as your options right you can say that you know use one specific location use that as the main partition or break it down into these three common partitions and then the swap space is a separate partition for managing memory overflow and we’ll talk about what that is in a little bit but these are the most common partitions and in a lot of cases these are also the primary partitions so this is what we’re going to be talking about right now so the primary partitions are the main partitions that can be directly used to boot the operating system so for example the root partition The Root Drive that forward slash that represents root that is a primary or I would say the primary partition the limitations um have to do with the traditional partitioning scheme that actually allow a maximum of four primary partitions per hard drive now it’s common to use primary partitions for the main operating system and important system data and then have your extensions and logical partitions go for other types of data so the root so if we go back to this real quick this is the main directory where everything of the OS is installed the home is the storing of the user specific file so for example the variety of different users if you have five users inside of the home directory here you will have five separate folders or five separate directories for each one of those users and typically it’s the username that’s assigned for each one of those directory and then you have the VAR partition which is isolating the frequently changing files like the logs that can grow ins size over time and then you’ll need to wipe them eventually to help preserve space on the overall storage of the computer right so if you’re computer has I don’t know let’s say one terabyte of storage then this specific thing will take up a lot of space because if you don’t have proper scheduling of the backups and the wipes so that you can transfer it from that main terabyte of storage into another uh storage device this can overflow very quickly and it can take up a bulk of your uh one tbte right so these are the the primary partition types now what happens is that you have these primary partitions so these are the actual primary partitions uh more often than not the root is uh I mean I would say 100% of the time the root is the primary uh system partition it’s the main partition where the Linux operating system is installed it contains all the system files the libraries binaries and everything else so we talked about those uh when we looked at the file system earlier we were talking about all of those extensions of the the root partition and that’s where all of these system uh files are uh considered to be installed and so the you know we talked about the library and the binaries and the system binaries and the the temp log and all of that stuff or the temp folder and all of these various other uh partitions or extensions of the root partition then you have the boot partition uh which contains the boot loader the kernel other files needed to boot the Linux system it’s usually a small partition and around 500 megabytes to 1 GB because it doesn’t require a lot of data space to run the to you know store the kernel and the bootloader and all those things but this is also a main primary partition because without this the system won’t be able to boot it won’t be able to start and then you have the home partition which is also another one of those primary partitions um and these are the three that have to do with the variety types of data that are stored uh let’s say permanently on the machine and then you have the swap partition that uh deal deals with the random access memory it deals with the the temporary uh data and the processing power of the machine that you’re using so it’s used as virtual memory when the physical RAM of the computer is maxed out and you need a place to uh store some of the virtual or uh the volatile uh data points that need to be stored temporarily until you don’t need them anymore and so the swap partition deals with the random access memory or data that’s similar to the stuff that’s on random access memory which is considered to be volatile data that just is uh is also uh considered to be dynamic data that goes in and out and you use it uh more in like a live environment and then typically when the system reboots and when it restarts uh this whole thing is reset and you don’t have to worry about this stuff anymore um we don’t consider hibernation to be a part of system Reboot system reboot is when the computer is actually restarted or the systems actually restarted hibernation is just when it goes to sleep and then you need to recover all of the data that that was inside of the ram inside of the hibernation file as well as the swap partition to pick up where you left off so these more so are permanent partitions with stored data that you can access after reboot after reboot after reboot and then this is volatile data that typically is reset and wiped every time you reboot the computer and of course hibernation does not count as a reboot when a computer goes to sleep it does not count as a reboot so these are our primary partitions and then we have the extended partitions so an extended partition is a container for additional logical partition so the extended partition is not the actual Storehouse of the data it’s a container for other logical partitions so it helps to bypass the four partition limit that’s dedicating one primary partition as an extended partition which typically is the root uh partition so The Root Drive the root partition ends up being that one primary partition that becomes the extended partition and then within the root drive you end up having all of these other logical partition so for example the forward SL TMP and the forward slash uh Dev and forward slash everything else that falls under a logical partition so the primary partition gets extended right so primary partitions can and often do act as extended partitions however there’s only one extended partition that can be created on a physical drive but it can contain numerous logical partitions so that means you can literally have essentially as many as you need uh within that one primary partition that has been extended so the extended partitions are commonly used on systems that need more than four partitions without using newer partitioning schemes like the GPT partitioning scheme so we’re talking about a lot of the traditional Linux which in in the modern world it’s still being used so uh it’s you’re going to most likely run across the primary or the the the we can call it the Legacy the original uh partitioning scheme that has the four primary and then within that one primary which is the root there’s a bunch of other logical partitions and you’re going to run across that a lot and you’re going to know need to know that uh as a job for a Linux administrator and then when you deal with a GPT partitioning scheme it’s just easier to deal with it uh simply because the fact that allows you to have more than four primary partitions and then you can uh Storehouse or compartmentalize your data easier so these are some extended examples so the SLV VAR log or the VAR folder this can actually be a primary partition when you’re doing your uh installation of Linux but you can also just have it be one of the logical partitions so it can be the extension of the root right so it’s the root is represented by this for slash D VAR right here would be the extension and then inside of this you’ll have the VAR log and then the VAR email or VAR whatever and you’ll have a bunch of other logical containers that will have a variety of different types of data so for example log files and databases email schools and any other Dynamic content that is being frequently used or updated so it helps manage large amounts of data that change frequently so this is one of the very common uh extended partitions which could also be considered a logical partition and then you have the for sltm the temporary files so this is also another extension of the root partition and it holds temporary files right um then you have the for slev which is a logical partition for development work or it can be the other um we can call them virtualized uh portions of your machine so this is another extension of the root partition that can act as a logical partition as well so essentially what you’re doing is you are extending the root drive and then Within These folders you will have a variety of other folders that will act as The Logical partitions that are stored inside of these extended partitions so hopefully that’s making sense a little bit and finally we have the logical partition so these are the subdivisions within an extended partition right so you can have the within the home directory within the home extended partition you can have a bunch of user partitions a bunch of user folders and all of those user folders end up being the logical partitions within the VAR directory you can have the slail SL log SL Etc and you can have a bunch of other uh folders or directories that act as the subdivisions of that specific directory and that ends up being the uh the uh logical extension The Logical partition of this extended partition so hopefully that makes sense so just going back to this image right here just to kind of give you another visual uh with the example of extended and primary and logical partition so if these two for example our are our primary partitions and then within this primary partition we have these extended partitions and then this one could be the VAR partition this one could be the Dev partition and this one could be the TMP partition or the home partition for example so these could act as anything right and so if you want to expand on this so if we bring this one right here and this ends up being the VAR partition now over here which ends up being our extended partition and within this VAR partition we would have the log and then the email and whatever else it would be that’s how it breaks down right so you have have the primary that gets broken down into these extensions and then these extensions can come and then one extension could be broken down into multiple logical partitions so that’s really how the whole thing ends up breaking down and you it’s essentially just a way to organize your data and to compartmentalize data so you can as uh the benefits that we talked about earlier you can just have better uh access to these things and you make sure that the it performs better on the actual system and in case there’s any security or backup issues you’ll be able to compartmentalize and uh access certain points uh much easier and if one thing crashes it doesn’t affect everything else so on and so forth so uh partitioning uh serves multiple purposes and it’s it’s fairly a simple concept once you kind of really get a chance to wrap your head around it you have four primary partitions within those primary partitions one of them we can be turned into an extended partition so from that root we can have multiple extensions and then each one of those extensions inside of it is going to have a variety of different uh partitions that will be the logical so there is four primaries one of those primaries is going to turn into a an extended where you can have multiple extensions inside of it and within each one of those extensions those extensions end up being containers for all of the other logical partitions right so you can think of partitions also as containers if it helps you and that’s essentially that’s what that’s all that partitioning is when you just want to understand the concept of partitioning and to give you a few examples uh as far as the the way that the file system looks so let’s say that you have the extended partition which is Dev sda4 right so this is the extended partition that’s on your disk and this is part itself doesn’t store any data directly but it actually has a contain it becomes a container for other logical partition So within this partition you can have multiple logical partitions that serve various purposes so for example within Dev SDA 4 we can have Dev SDA 5 which is allocated to data right so uh this is done inside of either the partitioning uh process as you’re doing your installation or it’s done inside of the uh the configuration file that is stored inside of our Etsy directory and within that configuration file we can make all of these assignments of these partitions and we’ll we’ll talk about that in a little bit so this logical partition is created within the extended of sda4 it’s assigned to the Mount point of data meaning that when you access data in your file system you’re actually accessing this specific logical partition that is housing all of the data inside of that it kind of seems a little bit confusing but uh if you can just wrap your head around it you’ll you’ll see what it means and I’ll show you what the tree structure of it actually looks like and how these things are connected so you have that visual as well but it’s typically uh used for storing user data documents media files Etc so that’s what the for slash dat uh file is or folder with the forward SL data folder that’s what it houses is the user data document so on and so forth and it gets mount right so it gets mounted onto this logical partition that is sitting inside of that extended partition so we can also have SDA 7 that is inside of the SDA uh 4 right so SDA 5 would be in there uh SDA 7 I think it was supposed to be SDA 6 or something and I accidentally clicked seven but it’s allocated to backup right so this is the third logical partition within this specific extension and it’s assigned to the Mount Point backup which is USIC specifically for storing backup files and system snapshots and it helps in organizing backup data separately from other system and user data and then we this is our tree visual of this so this would be our extended partition and then within this extended partition you have these multiple logical partitions and this one is mounted at data this one is mounted at the VAR uh folder and this one is mounted as the backup folder okay so you don’t need to go a really deep into this it’s beyond the scope of what’s covered inside Linux plus but you just need to understand the difference between primary extended and logical partitioning so that as you are asked questions or you uh are looking at uh potential examples you can differentiate between these various partition types A final note on this during installation uh the wizard will guide you through the partitioning and will ask you how you want to partition your hard disk even if you boot from a USB drive as a live boot you can still choose USB persistence and maintain your partitioning options and in this case you’ll likely have to manually edit your partitions uh you’ll create the partitions using the Fisk or the CF disk command and then from there you’ll Mount each of the new partitions inside of the Etsy FS tab configuration file and that’s essentially how it looks like um so the this portion of it uh I don’t know if this will be right before we go through the actual uh wizard for the installation of Linux or this portion of the lecture will be after we’ve gone through it but either before this you will have seen this entire concept or after this you will see the entire concept I’m not sure exactly how I’m going to end up uh putting the edit together but for sure you will see this uh this example of how this partitioning is actually done especially with the installation of the wizard in 99% of environments there’s going going to be a wizard that will guide you through the partitioning and will do all of these things for you so if you want to boot uh from a USB you’ll need to know how to uh configure the FST tab configuration file but more often than not you’re not going to need to worry about that because if you’re booting from a USB you’re only using it for its uh capabilities and not as a storage device and that is a completely different situation and it again it’s beyond the scope of of this particular uh training Series so that’s essentially uh how you can ensure that your partitions are run and configured during installation and uh you will have either definitely seen that prior to this or you will see this right after this right after a piece swap space uh is something that uh is disk space that’s designated to act as the Overflow for the system Ram so when the physical RAM on on your system is exhausted the system uses this swap space to temporarily hold inactive memory Pages allowing active processes to continue without crashing so let’s say you have a bunch of uh software open and a lot of them aren’t currently actually being used so what’s going to happen is that those memory pages are going to be stored in the swap space and your physical RAM is going to be dedicated towards anything that you’re actively using and and if that ends up being uh too much so if your swap space ends up getting overflowed as well as your physical RAM that’s when you start seeing the system you know uh slow down drastically and then sometimes you even see a system crash because you’re really overclocking the processing power of your computer and at that point uh it just can’t handle everything that you’re throwing at it but more often than not what happens when your physical RAM is maxed out uh it just sends everything that’s temporarily inactive so it could just be something that is minimized on your computer or uh a document or something that you’re just not using those end up going in the inactive memory pages but you can quickly call on them to bring them back to the Forefront and then once they come back to the Forefront they go from the swap space and they start using the physical RAM so the swap space is for inactive memory pages so just keep that in mind and uh that’s how it alternates back and forth between the physical Rams processing and what is being done in the background so to speak the inactive memory pages that are running in the background by doing that swap space uh extends your memory’s capacity so uh when the system hangs uh because memory demand exceeds what’s available on your physical RAM the swap space acts as a buffer to prevent crashes of the system um it takes a lot especially in modern computers cuz modern Computing is strong enough that you really don’t go uh into a system crash unless you’re really just you haven’t done a reboot in a like in years and your computer has a million different tabs open and a bunch of different software open you typically don’t see I haven’t seen a system crash on my computers in a very very long time because the swap space along with the the ram that I’ve chosen works very well and I I just like using computers or buying computers that have a a lot of physical RAM because I wanted to run fast and you know I do video editing and I do gaming and all these things and you just want a good computer that has a lot of physical RAM and the cpu’s uh gigahertz uh the hert power of the the CPU also contributes to the processing power of this so if you have a really strong CPU as well as a lot of gigabytes of RAM you’re not going to worry about this kind of crash or anything but in the event that you’re dealing with a computer that is mainly just for Linux and uh data processing it’s acting as a database and uh it can’t handle a lot of the workflow that’s being thrown at it for whatever reason uh then the swap space will kick in and it will help alleviate alleviate some of the pressure that’s being put on the physical RAM so that there is no crash that happens so it will extend the memory capacity of the physical computer and then it also facilitates hibernation so we already kind of touched on this a little bit but it’s also required for the syst system going to sleep right so when the system goes to sleep there’s a lot of stuff that uh is inactive at that point and a lot of those things go inside of those inactive Pages the data Pages memory pages that we refer to and those things are just stored in the background and when the computer uh wakes back up or it comes out of hibernation all of that stuff is recalled from the swap space so your computer can pick up where it left off and that’s another one of those things that’s really really powerful especially if like for example when you have a laptop and you don’t actually turn off the laptop you just close the screen like you pull the screen down that’s going into hibernation and when you lift the screen back up you literally are waking it up and it’s pulling all of its data from it swap space and this applies to both Linux and Windows and Mac OS so swap space is not something that is just uh uh inherent to Linux right so it applies to everything they may have different names for it or titling for it but this concept applies to everything so it’s it’s just an extension of the physical RAM capacity to make sure that the ram itself is actually all good and the computer runs smoothly and in case the computer goes to sleep you want to pick up where you left back up so it recalls all of the data and all of the the processes that were active and then went to sleep and now you need to reuse them again now some general commands that we need to just keep in mind these are very important uh partitioning commands to create a partition you can do it with either the Fisk command or the parted command and it will’ll talk about those in a little bit in depth um but these are all pseudo commands so it does require some kind of a root permission or at least for the user to be on the pseudo list but you do pseudo Fisk Dev SDA and it creates or modifies or deletes some kind of a partition in this particular case and then parted is another one of those things that in this part in with this specific command it’s creating primary partition with parted and it’s using the format of the ext4 and it’s giving it a 1 Megabyte to 512 megabyte capacity so uh these are just examples of part we’re going to go uh further in depth into uh Fisk and parted in a few slides but these are just uh some sample commands of what it looks like to create a partition or to be able to modify a partition with either parted or Fisk and parted also has a graphical user version of it that is outside of the command line that’s very very intuitive and you can use it with just point and click and it’s very easy so if you’re not using just a Linux uh command line type of a computer and you actually have access to a graphic user interface more often than not you’ll end up using gparted which is the graphic user uh version of this so uh these are just some sample commands of what it looks like to create a partition these are these sample commands to view your current partition so lsblk uh lists the block devices and the partitions that are associated with them and an Fisk L will list all the partitions and their details so these are some ways that you can view your current partitions and the how much storage they’re using and what they’re assigned to so on and so forth so these are things for viewing partitions and then these are some sample commands for dealing with swap space and managing your swap so MK swap swap on and swap off swap on and swap off are fairly intuitive you can kind of tell what they do from just their name but MK swap makes a swap space at this particular location so it in initialize a partition for use as a swap and then swap on activates a specific swap file all right now we need to look at file systems from the perspective of uh partitioning and this is uh another review of what we talked about earlier earlier we were just talking about file file systems in the context of file systems and where things are located how things are broken down now we’re going to be looking at it from the perspective of partitioning so the ext4 xt4 uh is the fourth extended file system so it’s the the most recent version of ex2 EX EX3 Etc and it’s the default in most Linux distributions it’s very reliable it supports large files and journaling uh the file system is one of the most widely used in Linux typically set as the default in many distributions like ubun 2 and davan and Cali Linux is technically an obuntu distribution and so it runs with the xt4 as well uh it builds upon the previous versions which is 2 and three and it has enhanced reliability speed support for large files etc etc so ext4 is most likely what is going to be run in a lot of desktop platforms if you’re going to be doing uh system advance Administration for Linux on desktops these are the key features of ext4 we’ve already talked about this so I’m not going to spend too much time on this slide but it provides for journaling which helps protect data Integrity um it records changes before they’re applied to the main file system making recovery easier um it provides large files uh or supports large files uh it has backward comp compatibility meaning that it can actually work with EXT2 and ext3 allowing users to mount and use those specific file systems without reformatting which is actually very convenient and has delayed allocation and extent so what that means is that it improves the dis input output performance by reducing the fragmentation the breaking down of data and better managing storage space so it’s as uh the the expected uh performance is it should be the better version of EXT2 and ext3 allowing for better performance the better management of storage so on and so forth so xt4 the most commonly used and it does journaling large file support backward compatibility with the other versions and delayed allocation and extension so that you can uh better manage your storage space and better manage your actual input output performance so the input of your uh requests and calls into the system and the output from the system to uh reply to your calls and Grant the requests that you’re making the typical use cases for xt4 uh is as we mentioned desktop systems personal laptops general purpose servers uh it’s because of the fact that it’s most commonly used and it’s one of the most uh versatile it’s used in a lot of common use cases and it’s a good option for people who prioritize data integrity and who may need backward compatibility with older types of file systems so this is for the personal computer uh you know desktop system general purpose server so on and so forth that’s what xt4 is great for and more often than not as a beginner Linux administrator you’re not going to be ma dealing with massive data centers and things like that so you’re going to be dealing with xt4 file systems more often than not as a beginner Linux administrator if you wanted to make an xt4 file system you just run pseudo M mkfs so make file system. xt4 to just make sure that it’s creating an xt4 file system and then you give it the mount point that you wanted to make the file system on and then check or repair that would be FS check file system check. xt4 and then give it the mount point that it was already installed on so these are some ways that you can create one and check or repair the status of that specific file system and then we have xfs the xfs file system uh it’s for performance and scalability it’s a very popular choice in Enterprise environment so this is where you actually go into Data Centers and high performance 64-bit file systems um that’s for Speed and scalability so it’s used in Enterprise environments meaning handling a lot of users most likely or scenarios where High data throughput throughput is critical um it was originally developed by silicon Graphics so it’s become a popular choice in Linux dros like Cent OS and red hat Enterprise Linux which are the Enterprise uh choices for Linux right so this is scalable this is the big the notable factor or the notable characteristics of xfs is that it’s fast and it’s scalable so that you can have a large environment with a lot of users or a lot of computers uh that use its data so high data throughput means that it use it provides data access to data it processes data very quickly compared to the xt4 right so this is designed for big environments the key features is that it has efficient metadata man management so uh handling metadata heavy workloads which is basically for uh requesting or requiring frequent file creation deletion or renaming and this doesn’t seem like a big deal but when you have a thousand users that’s kind of a big deal right so a lot of users going to be creating data renaming data points or re renaming files creating files deleting files and that process by itself just needs to be done quickly when you have a lot of users journaling a very similar concept you’re going to be hearing about this a lot it’s done a lot in uh the all of the different file systems that you’re going to be dealing with more often than not are going to have journaling just in case there’s some kind of a crash and you don’t want to lose data uh it is scalable so and lot large file systems making it suitable for system handling large data sets and high performance workloads which means if you have a lot of employees if you have a lot of lot of computers or servers it’s a really really good file system for that and of course it can resize file systems without requiring them to be unmounted providing flexibility in storage management which is again something that’s very important in data servers or in data centers so that they can uh work with the data without unmounting it and for somebody stopping the use of it you know what I mean so you need to be able to uh allow your employees and your users to still access that data so you don’t unmount the data and you can still allocate various uh uh dynamic or do Dynamic allocation which is essentially the name um that can help you just resize the file system so resize the potential allocation of that specific file system for this one computer or for this data center to make sure that yada yada yada I I feel like you get it I don’t want to kind of regurgitate and repeat myself over and over um but it’s allows for live environment allocation and changes to be made so that the users can still use the system and uh you can do what you need to do as the admin administrator the typical use cases for this are going to be of course Enterprise servers data centers um environments that have a lot of input output performance and scalability requests such as databases media servers scientific Computing etc etc so a big environment that requires a lot of processing power and high performance application so uh large files that need to be accessed and managed efficiently like video production or big data analytics these are some of the environments that re require xfs or make use of xfs and these are some of the example commands to create one so make file system make F mkfs do xfs and then you give it the mount Point pseudo xfs grow FSS grow FS excuse me pseudo xfs grfs and then the actual Mount Point itself so resizing requires the file system to be mounted and it supported only for increasing the size so just keep that in mind so you can’t decrease the size um you can increase the size of the file system by using grow FS grow the file system and then check the repair file system so xfs repair and then give it the mount point so this these are just some of the example commands for using and interacting with xfs and of course we have the swap file system so swap space uh it’s the dedicated partition or file that’s used to extend the memory as we’ve already discussed um it’s Unique compared to the everything else that we talked because it’s not a TR additional file system it’s actually uh used for live data right so it’s an extension to supplement the physical memory of which is our Ram our random access memory so it’s not storing files or storing data it’s just a live type of uh swap space or file system technically um it allows the system to avoid out of memory issues we’ve already gone through all of this so U memory overflow management is used when the system memory RAM is fully utilized we talked about this hibernation support we talked about this um the partitioning versus the swap file is kind of a concept that I guess uh should be noted here a swap partition versus a swap file so a swap was created as a separate partition so a swap partition uh it was created as a separate partition which could offer performance advantages due to the dedicated space on the dis the swap file which is inside of a lot of modern systems uh they use the file inside of a partition itself because it’s more flexible and it can be resized or removed quickly without having to deal with all of the partitioning commands so previously the swap partition was something that you have to actually have to create that specific partition using Fisk or uh you know any of these parted these various types of tools whereas if you’re dealing with a swap file you can resize the file remove the file do anything without actually having to mount unmount and deal with the the process that’s done through partitioning so uh more common systems are going to have a swap file and the kind of the older Legacy systems are going to have swap partitions the size recommendations for your swap file or your swap partition um it really has to do with the the Ram size itself so if there is not that much RAM typically available um then the system would benefit from more swap space so Twice The Ram size that that would really I don’t exactly know what is technically considered to be not that much RAM um if you have ample uh RAM so let’s say more than 8 GB if you have more than 8 GB of RAM then you don’t need that much swap space so for example you can get get away with having 2 GB of swap space and in some cases not at all if the memory is itself is actually really really powerful so if you have really really good Ram you probably don’t need a swap file or swap space um so so ju it just depends on the physical size of the ram itself now again unless it’s a really old business with very little uh RAM or like a really old computer you’re not going to run across a situation where the server doesn’t have enough RAM that’s just I I feel like uh this is a bit redundant but it is something of note so it is something that you should just keep in mind because you may deal with like a legacy computer or an old computer and they may not have that much RAM or maybe they’re expanding and the computer itself doesn’t have that much physical RAM and so you need to deal with uh some kind of a swap space or a swap file to uh to cater to the the massive size of the company or the as the company expands and continues to grow uh so that they don’t crash and until they can uh upgrade their systems and buy better Ram or you know bigger computer so on and so forth so these are some of our example commands for uh creating and activating a swap partition so uh you make the swap space first and then you turn it on so make swap that would be the swap space swap on you turn it on uh create and activate a swap file is a little bit more so the fall allocate or F allocate um one 2 gab or excuse me this would be an L it’s not a one so this would be 2 GB to the actual swap file which is would be the name of the swap file or the path to the swap file and then you need to change the permissions so to actually give it permissions and usually it’s uh the type of permissions that the system itself requires or root user requires and then you create the swap space so make the swap space and then give it the swap file path and then that then you enable it so first you have to allocate something for that swap file then give it the permissions that it needs and then make that as the swap space and and turn it on so that that specific swap file can be used and if you want to just look at the usage or see how it’s working so you can do swap on show or free- and those will give you the swap usage data points that you would need all right so now we’re going to talk about the various commands uh that will allow us to do everything that we just talked about so Fisk is one of the more common ones uh it’s a command line utility that’s used to create modify and delete partitions on a dis and it’s commonly used for managing the master boot Rec record or the MBR which is the traditional partition that allows you to have four primary partitions but it can also handle the GPT which is the guid partition table that can allow you to have more primary partitions so Fisk is the most commonly used right it’s a command line utility and you can create modify and delete partitions on a disk uh the key functions would be things like and this is in no way meant to be the full list of commands that you can run uh if you just do man MN Fisk then you’ll get the full list of what you can do with f disk so this is not something that’s supposed to be all-inclusive um but this you know these are some of the common ones so uh pseudo Fisk L would list all the available partitions and the basic disinformation about them uh interactive mode so if you run f disk as well as the name of the partition so this would be the path to the partition so you would need to replace that with the actual Target dis it opens an interactive mode where users can add delete or edit partitions inside of it so this could be a a interactive version of running f disk instead of just running individual commands to do what you want to do and after you’ve done all of your uh commands or modifications in interactive mode you would type w and press enter and that writes the all of the changes that you just made to the very the specific dis that that you are associated with so you would create a new Partition using the N option in f disk you would select that partition type or or choose a partition type that you want so for example xt4 and then assign the size that you would want and then you press W to press the changes this is this is like a overview we’re going to do this uh in detail when we actually go into the command line portion of this whole thing but you can also get a lot of different uh breakdowns of this if you just go to to uh gemini or if you go to GPT or anything like that and ask it to BL you through creating a partition and going through the various options of what would what it would be like to to mount it and delete it so on and so forth but we will go through those examples as well and then we have parted so it’s a more versatile command line tool than Fisk because it supports uh obviously supports the MBR and the GPT schemes um it’s ideal for resizing copying and modifying partitions without losing any type of data so it’s kind of a more recent version of it you will probably run across both of these and the command line structure of them is relatively similar and they have for the most part uh allow you to do uh the same things you just need to be familiar with the fact that both of them exist there is an interactive mode so very similar to f disk you would just do the same similar type of command except now you just do pseudo parted and you get into interactive mode you can create delete resar partitions with commands like like MK parts for make part RM to remove and then resize part very very like intuitive I think that’s one of the big things about it and then when you get to the GP uh GPD partitioning table um when using large drives which are mass so 2 terabytes in today’s world is actually a very large Drive part it is often preferred because it natively supports GPT uh which is used for a file system that is uh that requires more than for or primary partitions right so the the smaller file systems or the smaller storage discs use the previous one the MBR and then gpts for the file systems and the diss that are definitely going over two terabytes because they’re considered to be much larger especially when you’re not even dealing with media and you’re just dealing with text documents and uh configuration files and logs and things like that 2 terabytes is a lot of space so um parted ends up being being the Premier Choice the the first choice for that and example command to create a new Partition would be to just use parted uh this would be the disc or the physical location that you want it to be stored on you are making a partition so MK part and then you’re making a primary partition with the xt4 format and you want it to be a th000 megabytes in this particular case would ends up being a gigabyte So you you’re creating a gigabyte size primary partition with the xt4 format on the specified dis which would be at this particular location and then you can just run dis utility or a variety of different command line tools to figure out what partitions you actually have mounted onto your device and then from there you would choose that specific path for it as your creating your new partitions or extensions or logical partitions so on and so forth and then we have GP parted uh which is stands for The Gnome partition editor and it’s basically the graphical front end for parted and it’s available for a lot of Linux distributions that actually have a GU a graphical user interface if it’s just a command line uh Linux then it doesn’t exist but most of the desktop versions and anything that actually has a graphic user interface there is a g-p parted um version of parted a available for you and you can do everything that you would do with parted using an intuitive graphical interface so it’s very user friendly it provides a visual representation of partitions and unallocated space allows for easy resizing creating and deleting leading of partitions and it’s ideal for users who prefer graphic over command line management and need a quick way to modify partitions so pretty much does everything that part it does with a graphic interface since you’re not going to be using the command line you basically just need to know how to install this thing and so you would do pseudo apt install gparted and we’re going to go through apt which is a package manager and that’s for deban Ubuntu and then you can do pseudo dnf install gparted for Fedora um and then you just run it pseudo gparted to open the graphical interface uh so the launch and the installation is actually done on the command line but the rest of the stuff will be done through the graphical interface so you just need to know how to run these things um to install them and to start it and then from there you can go ahead and use the graphic interface okay so now we need to list the block devices right so we’ve created the devices and now we need to display the information about those devices including the Diss and the partitions to those Diss and you want it to be user friendly or close to user friendly so it does it in a tree format which you’ve already seen so um list lsblk will list the block devices it’s a great way to get a quick overview of storage devices on the system and the key features is that it has a higher article display so it’s the tree structure that we referred to earlier they’re showing you the relationship between the actual main device and its various partitions and it puts the information like the device name size type and mount points so the essential info you’re not going to get a lot of crazy details from this so but this is a very common tool to use to just see what all the block devices are essentially meaning what all the physical devices are and what the partitions are that are attached to them and it’s done in a nice tree format and these are some of the example commands so lsblk displays a simple tree view of all the devices uh using the dasf includes the file system information like file system type and uuid D and then- D shows only the main devices excluding any of the partitions if you have a very large environment you don’t want to see all the partitions you just want to see the main devices this will show you just those main devices using the DD flag or option and then we have DF which is disk free that basically reports what is uh being used or what is free so it gives you the the free space uh for each of the mounted file systems as well as what’s the the u space on it um but it’s one of those things that if you wanted to see just specific data about the file system dis space usage you would use disk free um it displays total and available space for each file system um dfh to display sizes in megabytes and gigabytes making the information more readable and then uh dftt will show the type of each of the file systems along with the usage stats that you have so this is for DF and then these are just some of the example commands so H again lists all the stuff H home will show show you the dis usage only for the home directory and again all of these things you can find the specific options that you can run by going through the manual page for each one of these tools we’re just going through sample commands and then when we actually get to the Practical version of this where we start using the command line and going through everything we’re going to go through a lot of this stuff in depth so this is I’m just going kind of like a quick overview of this so you can get some familiar I with it and then we’ll go into the great details later du is for disk usage and it’s used to check the space usage for specific files and directories providing a detailed view of which directories consume the most space so it’s not a file system thing uh it runs when you run du with the- SH uh on a specific directory it provides a summary of its total size when you run du by itself it shows dis usage for each directory and the subdirectory and then du and then the threshold of 100 m for megabytes displays only files directories that have over a 100 megabytes of space that they’re taking the command examples would be sh on this particular path would give you the total size of the ver log directory itself the ah home provides a detailed recursive view of the home usage and listing of the individual files and the directories which can be massive so this this you don’t want to do on a uh you don’t want to do on a super large uh directory because the the output could be massive so uh if anything you would uh take the output of this command and you would uh pipe it or export it into a separate file so that you can look at it outside of your terminal um because it really can be a a lot of data if you’re going to list all of the files and directories so it it can just be a really a big output so just keep that portion in mind most of this this specific thing you don’t want to run just on the terminal just to look at it because the termal doesn’t output everything it’s like it’s limited to how much data it can actually show you on the display even if you scroll all the way up you may not see everything all right now we can run through our package managers and the various commands that are associated with them so the intro to package managers um package managers are tools for managing software on Linux so it’s like a tool for managing other tools to help you install tools and to help you update tools so on and so forth they up uh they automat the process of installing updating removing software and it makes it relatively easy or if you know what you’re doing and if you are very familiar with the command line it makes it easier to maintain a consistent and upto-date system they handle dependencies uh meaning the the stuff that the software requires to run right so each software may require a certain number of dependencies for it to run so the the appt manager or the package manager excuse me the package manager will will handle those dependencies to make sure that any required libraries that you need and the tools are installed alongside whatever the software is that you are installing So when you say you know pseudo AP install such and such it won’t just install the tool it’ll install all of the dependencies and the libraries that that tool needs to run properly and then it saves you a lot of manual dependency resolution and potential conflict so you don’t have to go hunt down all the different dependencies cuz it can get very very tedious especially if it’s a piece of software that requires a lot of different elements and adjacent tools for it to run properly you don’t have to go hunt those things down manually you just run this one command and that one command gets all the dependencies that you need the libraries so on and so forth so very very useful um we have a which is the most common that I’ve used because I usually use ubun and Debian versions of Linux and it stands for the advanced package tool it’s very very common so if you want want to install something you do pseudo a install the name of the package if you want to update something pseudo AP update and pseudo AP upgrade you can technically run those both at the same time that’s what the double Amper Sands go into that we kind of talked about uh actually I don’t think we’ve covered operators yet I was just doing a a Linux tutorial Linux fundamentals tutorial so we haven’t gone through the operators yet but when you do two Amper signs right here that means you’re running both of these commands uh s multaneously so it’s going to run this one first and then it’s going to run that one next so it’s going to update the list of the softwares as well as the software itself and then it’ll upgrade anything that it needs to and if you want to remove something sudo ipt remove and then you give it the package name so very very intuitive and most of the package managers are actually similar to this um AP or apt is known for its ease of use the robustness and extensive repository of software packages and again it’s the most commonly used because it’s associated with Ubuntu and davan which is which are the the desktop versions of Linux and very very user friendly as you can tell the the commands themselves are super intuitive as well so very user friendly we have yum which is the yellow dog yellow dog updater modified or dnf which is the dandified version of yum um and this is for Red Hat uh so Cent Os or Fedora uh these are the distributions that would use yum but it’s it’s pretty similar to what we did with apt right so it’s like pseudo yum install name of the package or pseudo dnf install name of the package update or update it’s pretty much the same so you just use yum instead of Apt or you would use dnf instead of yum or whatever it is depending on what uh version of Linux you’re running and typically if you try to do like pseudo appt install such and such the the terminal will actually tell you oh this is not what is used on this system we use yum on this system or we use dnf on this system and it’ll give you an updated command to run so it’ll say yeah this doesn’t run here instead run pseudo yup pseudo yum install the package name so that’s it’s very also very very intuitive and very user friendly yam has been replaced by dnf in the newer dros like Fedora so dnf offers improved performance better dependency resolution and modern design um but essentially they kind of operate on the same uh distributions of Linux and then finally we have Pac-Man this is my favorite name uh it’s the package manager and it’s used for Arch Linux and Pac-Man’s uh commands are a little bit different than what we’ve seen with apt or yum so pseudo Pac-Man DS and then the package name is the installation pseudo uh Pacman Dash and this this is capital S by the way and then capital S Yu would be the software updates and then capital r package name would be the removal of the software itself so uh it’s known for the Simplicity speed and flexibility which is uh a common uh or a favorite among RS Linux users and handles binary packages and Source packages with ease so uh all the other ones do too in my opinion um or in my experience I guess I should say but this is something that is specific to the ARs linic distribution so you need to be aware of it so the name Pac-Man is not the video game it’s a package manager and it’s for Arch Linux and these are the the commands for the installation update and removal of software using Pac-Man and finally for this section we have the updating removal or troubleshooting of packages so updating packages and system upgrades um the reason why we want to do this is a few fold so the first one is security obviously so there are patches that need to be applied to certain packages as the vulnerabilities are discovered so when you’re considering the approach for ethical hacking and pentesting the reason why they do those things is because they want to try to break the package so that they can find what of the vulnerabilities are sometimes vulnerability scanners don’t do their jobs and sometimes there’s an announcement that’s made that hey we found this vulnerability you need to go patch this specific uh package that you’re using so uh this is not uncommon this happens very frequently and running an update on your package manager should be a a habitual thing that you do maybe even daily every time that you log into your Linux or every time that you’re about to install something or every time that you’re about to use a specific piece of software or specific package anytime you’re about to use that thing just run update real quick and just make sure that it’s the most recent version of that that includes all of the patches for it um then there’s also security features that are that come with those updated versions of those packages and then of course the dependency updates as well so if there’s new dependencies that are required to run the updated version that’s something that you may need and these are just some of the common things that fall under the bracket of security and then you have stability so there are bugs that are associated with these softwares or these packages so just make sure that that’s all updated I mean these are so common sense that I I feel like I don’t even need to go through this you just need to understand that updating packages and the system itself whatever you’re running needs to be a regular thing you need to check for system updates and package updates regularly to make sure that compatibility is there performance is there there are no bugs that are running there’s no security issues and the functionality is all great the user experience is great and of course if you’re in a regulated environment you need to be compliant so if there’s something that has to do with customer data and it’s not updated and then there’s a leak of the data because there was a security vulnerability you are now in grounds for a lawsuit or the company is in grounds for a lawsuit and guess what you as the Linux ad administrator are going to be fired because this is something that’s so simple that can so easily be done and it’s so powerful so it’s like just keep all of your packages up to date it keep your system up to date it’s not complicated to do runs a couple of commands and it’s very very useful and of course compliant to the regulatory environment that you may actually be in now the these are some of the update commands the upgrade commands so you do pseudo appt upgrade and it updates all of the installed packages that you have on your particular system that runs AP and then pseudo dnf upgrade runs all of the uh updates for the packages that you have installed on the NF system so if if you don’t want to upgrade the package individually as you’re about to run it you can just run this daily upgrade with a or dnf or Pacman or whatever it is and just make sure that everything on on your system in your environment is fully upgraded I would say removing and cleaning up the packages is probably just as important as running uh the updates on the packages the main reason for this is to free up space uh there’s also something called The Orphan package or unused dep dependencies that uh you just don’t use them anymore and they’re taking up storage space so this is probably something that is also as as important to run as the up updates of everything to just make sure that if there’s something orphaned meaning that it’s uh outdated and there’s a newer version of it if you run an upgrade on something you should also run the auto remove to remove whatever that’s been orphaned and a lot of times you will also get a notice from the system some kind of an alert that says hey are you sure you want to remove this this one’s associated with this and then you can either say yes or no but for the most part it’ll just take it will get rid of the things that are either orphant or legac or grandfather so on and so forth or unused so this is as important of a strategy as the upgrade and the update of all of your packages and thankfully troubleshooting the package issues is not something that you would have to do super uh in granular detail as well you just need to run a certain series of commands so if you have a locked database for example so if there’s a locked package manager in a Debian based uh system which is Ubuntu for example it means that another package management process is running or it didn’t terminate correctly so what you want to do is you want to remove that specific locked front end so pseudo RM removes the lock file and this is the location of the lock file so this is the file that’s used to lock that package database while the AP is running and then sudo RM removes that specific file this is the the full path to that file right so this is how you unlock lock a locked database for example and you’ll get that notification again your terminal will tell you that hey this can’t work because this is happening or this didn’t terminate correctly and then you can go ahead and just run the pseudo RM pseudo remove and it’ll work for you and then you have broken dependencies so if something is no longer current or it’s outdated or it’s missing a piece or uh a dependency for whatever reason wasn’t patched properly so if it’s not installed right any of those things the the version is outdated or it’s not the correct version any kind of conflict that would fall under a broken dependency you can do uh a fixed broken command so pseudo apt D- fix broken and then install so it tells app to uh fix broken dependencies by automatically installing or removing packages that are necessary and then dnf check will check for dependency issues and report them and then you can use dnf drro sync to synchronized installed packages to the versions in their repositories to make sure that all the dependency issues are resolved so again this is what’s really awesome about these package managers you don’t have to do the manual hunting of oh my God I got to go fix this I got a lot of these things are automated so you just run a command and it’ll just automatically install or remove packages that are necessary it’s like it’s so freaking useful but you just need to know that you can do this right and then you need to know what the command is so uh by the end of this whole thing you’re going to have a dictionary of commands that you can run to take care of a variety of different things which is just I think it’s super freaking useful so um there we go this the broken dependencies and then we have repository issues so repositories can be unavailable or misconfigured causing issues with the package management to resolve this you might need to reenable or update your repository resources and uh those things can be done using the various resources lists or uh the locations that are on the sources list so uh app sources list or the app sources list. D both of those are very useful on the debbas system so you can view the sources list in those regards and just see if it needs to be updated or the sources or the links or something might not be right um and then one of those one of the most powerful tools for that is just copy the contents of it and then take it to gemini or GPT and paste it and say hey does this look is something wrong with this and it’ll tell you if something’s missing or if something’s wrong um and then Red Hat systems check the repository file in the Etsy yum repos directory and that you can just make sure that all the sources for your repos are all good however if you don’t want to do all of that if you don’t want to go to GPT or whatever you can just run these commands right because they’re automated and they can just make sure everything is all good so if you run uh for AP you can run apt update for dnf you could run a make cache or dnf update date for yum you could make a cache or do a yum update info and then Pac-Man you can do this as well and essentially they’ll just make sure that the URLs and your repository files are correct and accessible and they’ll make sure that everything on your sources list is up to date and current so again you don’t need to do a lot of these things you don’t have to do manually because these amazing package managers will automate a lot of that processes for you and just make sure your sources are up to date make sure all the dependencies are up to date make sure the versions are current and if there’s any bugs or anything that’s been patched all the security vulnerabilities all of that stuff is taken care of by running regular updates and regular removals as well so make sure that the removals and the updates are being done in tandem to get rid of anything that might be orphaned or uh out of date and to make sure that everything that needs to be updated is updated to uh make sure that everything is all good you got to update the package list and basically this is literally these are the commands that would do all of that stuff for you as well but sometimes you might need to just restart the system or you might need to restart your shell um or just really just running the update command I think is actually all good um but just restarting the shell sometimes can uh do wonders if those update commands aren’t making everything run properly and then if that fails you can just restart the system um and then it just guarantees that everything is updated and current as as well as your package lists themselves all right now that you have Linux installed hopefully uh you took some time to actually install either your own version on a USB so you can Boot It live or you have it installed on your computer where you uh booted it as your operating system um or you’re using a virtual machine or you’ve used uh tryck me’s virtual machines that are all Linux based or you have a Linux computer whatever it is so hopefully now you’re in an environment where you can actually run these commands now if you have a Mac OS uh for the most part you can run most of these commands as well um if you don’t have them you may need to install them using one of the package managers and uh get access to them but uh in either case uh I would say do it in a Linux environment uh if you can download Cali Linux or a version of Ubuntu whatever it may be so that you have no problems and you can be sure you can rest assured that you can run all of the commands that are coming up um what we’re going to do is we’re going to go as an overview because we’re technically still in the lecture portion of this uh training series and I’m just going to show you what these commands are I’m going to tell you what they do and the purposes that they serve and then when we get to the second La the second portion of this whole thing where we actually get to the Practical exercises you will get plenty of chances to run all of these commands and will run all of these commands in an actual live environment while you’re you see me run the commands and we’ll look at the the output that comes from the commands and we’ll combine a variety of these different things um what we’re going to be talking about is just the basics of the command line and the basics of scripting so that you have an idea of what it all looks like and the the syntax and the general structure of all of this stuff and then we’ll go into the other chapters that we have and then when we come back at chapter 12 we’ll actually run all of the commands as well so that’s essentially where we at right now um the isial command line tools and navigation is what we’re going to look at all of these commands will yield some kind of information about the system that you’re logged into so who am I uh gets you the current logged in username by the way all of these things are case sensitive so if you do who am I with a capital W it’s not going to work who am I gets you the current logged in username uname displays all the detailed information about the Linux machine that you’re on including the hardware installation the name of the Linux uh the version of it the OS kernel version so on and so forth and then there are various options that come along with uname as well so this is just uname by itself there are other options or flags that you can attach to uname to get different results but uname is typically about the detailed information about the machine the hardware the name and the OS kernel then you have the host name which gives you the VPS name the VPS host name and other related info so depending on what flag you run with it it’ll get you different print information about that individual host so with no option it it just prints the host name uh with the if flag so Dash lowercase i it checks the server’s IP address- lowercase a prints the host name Alias uppercase a gets the system’s fully qualified domain name which is also known as the fqdn there is a difference between the who Ami and the host name so the who am I is just the user so whoever you are as the user you can be multiple users on the same host and that host would be on the same machine so the there could be multiple users logged in but they would be on the same host machine technically and then the same thing with the the hardware and the Linux machine and so on and so forth so who am I specific to the actual user that’s logged in un name is specific to the hardware of the machine the name the OS kernels stuff like that and then the host name is relevant to the actual host itself that you’re logged in on which is typically that machine um as well as the IP address the host name Alias if there is a host name Alias and the fully qualified domain name as well another way to look at the username and the host name is that the username is assigned to a specific user on a computer network while the host name is a label that’s assigned to the device on the network essentially identifying the computer itself rather than the individual user so there would be an IP address assigned to a the MAAC address and so on and so forth that would be assigned that would come under the host name data versus the username that comes under that individual person so the username is the login name while the host name is the name of the computer on the network and that’s not to be confused with the AME so the host name would be the name of the computer the username is the name of the user and then the uname just brings various data points about the computer itself for example the hardware and the the OS version so on and so forth all right on to navigation so navigating the actual computer itself so the first thing that I always run is PWD that prints the working directory meaning the directory that you’re currently logged in or the directory that you’re currently accessing it prints that path for you um CD changes the directory so if you do CD home user documents you’re changing the directory to the home user documents and you’re going to end up inside of the documents directory documents folder and then when you run PWD while you’re inside of the folder what’s going to happen is that you’re going to get this full path so it’s going to print that full path of wherever you’re logged in on onto your screen and that will say that is your printing of the working directory and then once in you’re inside of that directory you can list the contents of the directory which would be with ls and LS typically just by itself would just list whatever is visible it’s not a hidden file specifically what happens is that when you do LS L it’ll print the detailed view of all of those specific files and then when you do LSA it shows the hidden files and then you can combine these two flags and you can say LS L A so instead of doing- a or- l you could just do-la and it’ll give you the detailed view of everything as well as show you all of the hidden files as well so print working directory change the directory and list the contents of Any Given directory and then there’s the interaction with individual files and directories uh namely creating files and directories copying files and directories moving files and directories and these are what these commands are for so Touch by itself if you just create want to create any kind of a file you can do touch and then the name of the file which would be this specific thing if you want it to be inside of Any Given directory you can give it a full path but typically you would be inside the directories let’s say the documents folder and you just say touch file. text and it’ll create file. text for you and then there’s if there are any options that you want to attach to it you can attach those as well we’ll get into all of those things uh in a little bit when we actually get to the Practical section but touch is designed to create a new empty file in any given directory even the directory that you’re in or the directory that you give the full path to make dur which we would we make directory it creates one or multiple directories if you want it to and very similar it’s mkd and then any options that you wanted to give it and then the name of the directory one or directory 2 and that again could be the full path to the directory or you could be inside any given folder and then you create a new directory and basically what it does is it creates a folder that can house files whereas Touch by itself creates a file so you can’t expect the the file that’s been created by touch to be a container for any other files cuz it won’t be it’ll just be a file so make directory creates a folder that you can house a variety of other folders or you can house a variety of other files inside of it CP is copying so it can copy a file or a directory and then when it copies the directory it’ll also copy everything that is inside of that folder and so you would do CP and then you would provide the source which is the the thing that you want to copy and then you would provide the destination which could be the location of where you want it to go to and if it’s going to be inside of the same folder that you’re in you would copy the same the whatever the file is that you want to copy and then you just need to give it a name so that it won’t be the same exact name so if I want to copy file I would need to have as my destination file to be would be the second uh argument that we Supply to this command and it can still be inside of the same directory that we’re in it’ll be inside the same folder that we’re in or we can just say that I want you to take take whatever the file is inside of my current directory and I want you to copy it and move it to this whole other location and then you would give that full path to it and move would be another one of those tools that you can use but instead of uh copying it actually just takes that original file and it’ll transfer it out of wherever it’s sitting and move it to a different location you can also use it for uh renaming something so if I say move file one I would give the new location and it will transfer file one to that location or I can just say move whatever the old name is and rename it to change it to the new name and it it won’t copy anything it won’t do anything like that it will just rename the file for you so it can either move the file from wherever it’s sitting and transfer it somewhere completely different without copying it so just keep that in mind if you move it you’re not duplicating it you’re transferring the exact file itself or you can just rename the file RM would remove the file so that would be the command that you can delete an entire file or you can delete uh the directory that includes everything that’s inside of that directory so if you do rm- R it’ll actually delete the directory and everything that’s inside of it and it’s very similar to doing rmd so it removes the directory and everything that’s inside of that directory so you can do uh removal of the directory using the dasr uh flag that goes with it or you can just do remove dur and then remove everything that’s inside that directory as well as the directory itself so just keep that in mind that when you remove a directory you’re also removing everything that is housed inside of it so if you need it you need to make copies of it or you need to move whatever is inside of it to a different thing so that you can delete that directory file gets you the file type of whatever the name is that you give it so you say file either the path to the file or whatever the name of the file is inside your current folder and in that regard it’ll say okay this is a text file or it’ll say it’s a python file or it’ll be a CSV file comma separated value file so on and so forth it gives you the file type and believe it or not this is actually very useful especially when you get into scripting because there are certain interactions that you can’t have with certain file types so you need to know what type of file that you’re dealing with and if the file type is the file type that you want to interact with you would then use the series of commands that could potentially interact with that file so getting a file type is actually very important especially when you get into scripting and then zip would compress the file so it basically just creates a zip file for you from one or more files or a directory uh that you assign so you can say zip and then choose whatever option that you want and then you would take the file name and then uh that you want to create so this will be the zip file name that you want to create and then this will be the file that want to be added to it the next file that’s going to be added to it you can have a series of files but essentially you would zip this would be the name of the zip file the name of the zip folder and then these would be the files or the folders that would actually be compressed into that one zip file that one ZIP compressed folder unzip extracts the data or the the contents of that individual zip folder so very it’s a pretty simple concept to understand so again if you choose any specific uh uh options you can do that um and then you just give it the zip file name that you want it to unzip typically it would unzip in inside of whatever location that it’s already in so you just want to make sure that uh wherever you are unzipping it you want those contents of those files because uh sometimes a zipped file will have a bunch of content in it and when you do unzip it uh if you wanted to move to somewhere else you would have to move all of those things manually uh by doing the the MV command so if you want to unzip it in any given directory a specific location that you want all of that content to be first you move move the zip file to that location and then you unzip it um a tar or tar command itself it bundles multiple files and directories into an archive but it doesn’t compress them so you just run tar the tar file name wherever the location is going to be and then the files themselves they don’t get compressed typically it’s good for archiving and creating archives um so that you can interact with them without having to unzip them because when you zip something it gets compressed and then you would have to unzip it to be able to interact with it tar just bundles it multiples files into one location known as an archive and then you can interact with the contents of that without having to decompress it or uh unzip it so to speak these are some of the key operators that you need to keep in mind and this is actually very important because you need to be using this very very frequently so the first one I’m just going to call this the greater than symbol or pointing forward I guess we can call it whatever it is um the greater than or pointing forward adds the outputs of any command to an output file so for example example if I do Echo file contents just by itself it’ll just print file contents onto the screen but if I do Echo file contents and I push it into the new file then it takes this whatever is inside of this or whatever is inside of Any Given command really and it puts that inside of this file then this overwrites anything that is currently inside of the file so you need to be careful with that because if you want to append something if you want to add data to Any Given file you would use the double uh greater than symbols instead of a singular one because the singular one literally overwrites everything inside of that file and you lose whatever else was previously inside of the file so more often than not what you’re going to do is you’re going to take a given command so you’re going to run some kind of a command that will analyze something we do this a lot in security where we would run a uh let’s say a top command or we would run um TCP dump or something like this we would run some of these commands and instead of getting the contents uh displayed onto the screen because it’s going to be a lot of content we would output the content inside of this file so that we can review it later and manipulate the content of it um when you’re appending something you would add whatever those contents are to a new file and for scripting this is very very important to understand because more often than not when you write a script you don’t want that script to overwrite everything that would be inside of your folder or inside of your uh the output file you wanted to add every time that you run that script you want it to add the contents to the output file instead of overwriting everything that’s inside of that file so this one overwrites everything and creates a new file or it’ll just create a new file for you um then this one appends it it adds the output to the file and you keep everything that was previously inside of that file there is the and so ampers and uh you place this at the end of Any Given command uh especially if it’s a big command that takes a long time to process so that it backgrounds the command for you and then when it’s backgrounded you can still continue to use your uh CLI your command line um instead of having to wait for that command to finish so for example if we were to run uh something that’s big like this and then we were going to Output the results of it to a file but we had to wait for the command to finish we would just put an erson at the end of this command and then it would run it would do whatever it needs to do it’s going to create our output file for us and then we can continue to run whatever other commands that we wanted to run while that previous command was completing um this specific one right here where you have a double ERS sand it combines multiple commands and then gives you uh one overall input so you can do uh touch new file so you create a new file and Echo onto the screen that there was a new file that was created and Echo the contents of the file into the new file that we just created right here right so technically you’re running three commands you’re creating a file then you’re notifying that the file was created and then you’re adding whatever contents you want to that file so this is very useful especially if you actually know what you’re doing and you want to get a lot done and not have to do multiple commands uh and then just press enter wait for it press enter wait for it instead of doing that you can just combine a series of commands and then that way with one pressing of the enter button you run the whole thing and then if you have notifications in between each one of the steps you will get all of those notifications and you’ll be uh you’ll know exactly where you are in the process and then it’ll be done real quick so uh Ampersand by itself you put it at the end of a command and then you run that command in the background when you do this when you double up the ERS hand you can combine a variety of different commands and you can string together uh really as many commands as you want um if it gets to the point that you have to run a bunch of commands and you’re trying to combine a bunch of commands at that point you might as well create a script which we’re going to get into in a little bit so uh so far these are the key operators that we got once you’ve created files or if you have a bunch of files that you’re trying to view there are a few few different ways that you can do this when you do cat it concatenates that’s what it stands for it concatenates the the contents of that file and it just prints everything onto the terminal um if it’s a massive file there’s going to be a very large output and sometimes the terminal limit the amount of lines that’s output and you may miss uh all of the contents at the very very top of the file if it’s a really large file typically that happens usually with log files so if you have a very large log file then instead of doing cat and displaying everything on the terminal you can either do less and more to view large files Page by page so you do less and then the name of the file name and then you can uh click your uh the arrow buttons on your keyboard and then you would go onto the next page and on the next page head and tail will display either the starting or ending 10 lines and then you can also just uh display however many lines that you want so if you do tail n 10 it’ll display the last 10 lines of this file if you do tail N5 it’ll display the last five lines of this given file so this is also very useful if you’re trying to if you know that a certain amount of data like if you want all of the headers for example of the file you will look at the top 10 lines and then if you want the most recent data which is typically what’s going to be at the bottom of Any Given log file you want the last 10 lines or the last five lines whatever it is so you can look at the most recent data instead of having to scroll back and forth to try to find it and then there’s find so find itself is actually very very useful if you know kind of what you’re looking for you just don’t know where it is right so for example it would be find and then if you do the p it could be just forward slash that represents the root which means that all of the folders inside of the root you want to search basically in the entire machine so you want to search inside of the root which would be the path or you could say you know uh the documents for example so you can give the path to the documents and you say look inside of the documents and look for a let’s say if I do Dash name which means that I want you to find something by its name and and then you give it the name that you wanted to look for we’re going to do a lot of this because this is actually very useful um and locate of the file uh is essentially the same thing and it prints this location onto the screen so locate uh keyword and sometimes depending on where you’re at uh what type of machine that you’re on locate may not give you results fine may give you the results or fine won’t give you the results locate will give you the results they essentially do the same thing um so that’s kind of what it is for find usually you need to actually give it the path that you want it to search for locate just looks for it and then says this is where the path is so you can locate and then find whatever the path is uh for whatever keyword that you’re looking for find itself you would need to give it a location for it to search and then it’ll go look for whatever the the name is or if you’re looking for a file type or a permission uh so on and so forth it’ll display all of those things for you and then we have our common text editors so Nano and Vim are the most common text editors that are available on Linux uh Nano is very very user friendly Vim is also userfriendly in my opinion it’s just not as uh straightforward to deal with um so for example if you do Nano file.txt it’ll open up file.txt if you don’t have something called file.txt it’ll actually create file.txt so it’s very similar to using the touch command um but what happens is that you can now uh write inside of that file so if I do Nano file.txt there’s nothing inside of the file I can start writing inside of the file if there is something inside of the file and I do Nano I open it up and now I can interact with the content inside of that file so I can look at everything uh scroll back and forth if it’s a massive file instead of doing cat and then printing it onto my display I can just do Nano and just open it and scroll through it as I wish and then once I’m done I can if I want to save any changes that I I’ve made you do control o we’re again we’re going to go through all of this stuff so this these are just overviews you do control o to save it and then control X to exit um contrl K could be cut the line contrl W would be to locate something so it be where is something and you can look for certain text there’s a lot of options that comes with it those are just some of the common ones but Nano is the text editor and Vim is the other one that I mean it says it has a steep learning curve but in my opinion it doesn’t um it can be uh open just to read something it can be open to insert something it can be uh Visual and it can go in Fairly dep uh deep uh options that it has and uh there’s a lot of help uh manuals for all of these things as well so uh you’re not going to be left to the Wolves as so to speak just to kind of go through this stuff and uh I would be to enter insert mode so it would be vim and then I to go into insert mode um once you’re inside of vim and you’re done with everything you can do colon W to write or to save colon Q to quit colon WQ to save and quit Etc um and you can search for an any given pattern uh to delete a line you would do DD these are just common options this is not uh anything that you’re supposed to memorize right now because again we’re just going to go through the interactions but these are the text editors that you should be aware of so that once we go into it we don’t have to just do an overview of hey this is a text editor and this is what it does so on and so forth when we go to the Practical section we’re just going to start using these tools and it’ll be it’ll just kind of uh reinforce all of the data that we’re covering right now all right now we’re going to go into another level of dealing with files um and manipulating them and searching through them so grep is another one of these tools that you’re going to use very very frequently because it’s very powerful and it searches for stuff so uh it stands for Global regular expression print so you don’t have to know that you just know that grep search just for things um you can search for text within files so typically it’s like you’re searching for uh any given pattern or a word or you can even do actual regular expressions and then you give it the location that you wanted to search within so if you wanted to be case insensitive you would do- I so that it can just look for whatever without having to worry about capital letters or lowercase letters if you do R it’ll be a recursive search inside of a directory so if you do uh if instead of having a right here if you give it to something to search for inside of a directory it can actually do that and it can search for whatever that is um V would be to invert the mat so it shows uh lines that don’t match the pattern so if you want to show something let’s say that there’s a lot of noise and it all has to do with a certain event ID so if you want to show everything other than that event ID you would do V and it would show everything that doesn’t match that event ID so will show everything other than that event ID so grip is a very useful tool and typically you can also do a combination of commands where you pipe the output of another command into GP so that it’ll search for you so for example you can do cat and then concatenate something and then use grep to search through the data of that file typic that’s kind of just a very very simple example but you can do that a lot um sort will arrange the contents in a specific order so you can actually combine grip with sort so you can grip for something and if you know there’s going to be a lot of data you can then sort that data to be output onto the screen into a any given order so for example uh to sort alphabetically from A to Z you just do sort by itself if you want to reverse the order so do Z to A you could do sort dasr and then uh the file name or the contents of grep right so you can just do grep Etc and then sort d r and it’ll show everything Z to A if you do sort by itself it’ll just do uh A to Z or ascending order we can call it ascending order and then you can have descending order as well you can also sort files numerically using the N flag so that could be potentially if you’re sorting files specifically that could be potentially what you can do uh you can uh sort output numerically as well uh and then you can reverse the order of that using the- R so it’s very flexible there’s a lot of different ways that you can do uh interact with it um you can then use cut to take certain pieces of data so certain columns let’s say from that given file so you do GP it searches for the data it and you want to take instead of getting every line that comes out of that uh result you want just the First Column or the first two columns so you would do that and then you provide whatever the options are and then you cut that data from the results for yourself so there’s something called said that that is the stream editor so data streams are just another way to look at um text that is inside of a file and sometimes uh when you’re looking at certain types of text uh it may not be plain text it may be formatted in any type of uh display or format so it may not necessarily just be plain text the way that you’re seeing inside of the screen it could be Bas 64 formatting or encoding that should that’s probably the better word so it could be encoded in some way and you want to just display C certain things that you know that will might necessarily match into something um so what you can do is you can uh edit it for the output right so set stream editor uh will take the first instance of old so let’s say it finds something that is called Old for example and then it’ll replace it with new so the the first one is the actual data that it’s found and then the next one is what it’s going to be replaced with and then it’s going to do that for every line that it actually finds this specific pattern in so if it finds old inside of every whatever line it finds it’ll replace it with new for that line if you want to edit it if you want to actually transform that inside of whatever the file is you can actually do that using the if flag so it’ll take the it’ll still find the thing that you want it to find but it’ll do an in place editing it’ll actually edit the contents of it within the file for you um you may not necessarily want to do that maybe you just want to search for it and display the results so that one should be used uh cautiously but uh this is what the stream editor does for us if we want to extract data so the these are things that actually have Fields so typically like a a CSV file for example or something that has a field that has a value uh inside of it uh this is the type of data that you would use a for awk um and the usage is to take essentially the First Column so this is what this is right here so it would print the First Column right here of this file which is what I mean when I say field-based and usually CSV files are like that CSV files are separated by commas which turn into a spreadsheet for example so when you use something that has those types of fields you can extract the data of that uh and in this particular case it’s going to take the very first column and then print all of the data that’s in inside of that First Column from file.txt um if you have a condition that you want it to print for you so if the the third column is greater than 50 for example you wanted to print everything from one to three right so or not from one to three it would be columns one and three so column one for example would be the name of the field or the name of that specific line item and then column three would be the value that so associated with that col line item so if the value inside of column 3 is greater than 50 I want you to print the name of that thing and then whatever the value is and that’s what that does for you so you can actually give it conditional examples and this is almost like writing a script actually it is basically a script it’s like a conditional statement right so if the value of column 3 is greater than 50 I want you to print that data onto my screen and this is the perfect segue to get into shells scripting so setting up a simple shell script uh we’ve kind of already talked about this so I’m not going to spend too much time over here so first and foremost you want to create the script so you can do touch script.sh that would be a basic command to create your script and then add a shebang line which we’ve already talked about at the very very top so the very first line of that script.sh file is going to be uh the shebang line which is this piece right here so we just call shebang right so that’s the shebang line and you have to put that at the top of every single script in order for the script to actually run as a script otherwise it’s just going to be a file with a bunch of lines of supposed code but there is no interpreter this is what The Interpreter would be there is no interpreter so that it won’t be executed as a script now once you have that file and you have your code and everything in it you need to make it executable and that’s done through the changing of the permissions so chod which we’re going to visit later when we get into permissions stands for change mode and then when you do plus anything you’re adding that permission to it so in this case we’re adding X which is the executable permission and we’re adding it to script.sh so change mode add executable permission to the script and that’s the general outline of how that uh permission change does now if you want to remove executable permission you would do minus X and then it removes executable permission from whatever that file is and that’s that’s basically how permission adding and removal works so fairly simple now once you have it so let’s say you want to create a bunch of variables inside of your script the first variable in this particular case would be the name equals Linux GPT and then when you want to refer to this variable so that would be the the variable name it equals so this is called an assigning operator where assign assigning this value to it if you use two equal signs it’s a comparative operator and we’ll talk about that in a little bit but typically when you not typically every single time when you use a singular equal sign you’re assigning a value of something to this specific variable so in this case we’re assigning this string Linux GPT is now assigned to this variable which is name then you refer to this variable with dollar sign name so if I ever use Echo dollar sign name it’ll print Linux GPT onto the screen or inside of whatever it needs to do because we have now assigned this string to this value very simple um you can also substitute the variable by assigning an actual command to it now in order to do that you would need to do dollar sign and then put the command inside of parenthesis but the way that this works is that if I just typed date onto my terminal it’ll give me the date and time that we’re in right now but I want to store that value of this command inside of this variable so I can do date equals and then I do a dollar sign and put that command inside of the uh the parentheses and now I’ve assigned the value of this command to this specific variable you could do name equals uname for example and it’ll give us all of the data that is assigned to that machine and it stores all all of that data inside of this variable that we have over here so you can assign text or strings uh to the variable or you can assign the contents of another command to the variable it’s called assigning variables both of them are technically an assignment because you’re using a singular equal sign and then you’re just choosing the type of value that you want to assign to that variable once you have your variable you can then create your conditional statement if you want to use a conditional statement so a conditional statement is it’s very basic right so if something do something else don’t do something or do something else and then you have to add fee at the end well I consider it to be finish just like short for finish but I think it’s just a backward version of if and that’s how the scripting in Shell Works in uh in Shell the shell language um I don’t know if it’s a language actually I think it’s a language but whatever um when we’re looking at this specific uh the conditional statement right here we can see that if and then inside of our brackets we have our first condition so we say if the variable whatever that variable is equals value so now look we’re looking at a double equal sign so now it’s comparative right before when you use the singular uh single equal sign you were assigning the value but now you’re comparing so you’re saying if the value of this variable equals to the value that we’re looking for and then you do a semicolon you say then I want you to print onto the screen the condition has been met notice that there’s an indentation here typically there’s at least either two spaces or four spaces uh for user friendliness or reader friendliness I recommend you always use four spaces um so if the variable equals the value that we’re looking for then I want you to print onto the screen that the condition has has been met if it hasn’t been met that’s what else means else just prints that the condition has not been met that’s it and then finish and that’s the full basic structure if any of these things are missing so for example if the semicolon is missing this is not going to work this entire conditional statement is not going to work if this fee at the end the FI at the end is missing this is not going to work and usually you’ll get some kind of a notification that there is a error online such and such and something is missing or the syntax is wrong so on and so forth so you’ll be able to debug your code accordingly but it’s very important that you understand that everything in this piece of in this block of code has to be here if this parenthe not parenthesis if this quotation mark at the end is missing you’re going to get an error if uh this specific equal sign is missing then it’s going to say well this is also a logic error because you’re trying to assign a variable to this value when it already has been assigned something else and now you’re trying to reassign it like that doesn’t make sense so there every piece of this needs to actually work here if this dollar sign is missing it’s not going to work so a lot of these things you you got to be very specific with scripting is very specific once all the details are there it’s going to work like a charm but if the details are not there you’re going to have a lot of issues so this is just a basic structure of a conditional statement and these are some of the comparative operators the comparison operators that we’re looking at so right here we’re looking at equals to the value but right here you could say okay if it’s less than the value that we want or greater than the value that we want uh or if it’s less than or equal to so L would be less than or equal to or greater than or equal to the value that we want or equal to the value that we want or not equal to value that we want all of these operators that you’re looking at right here have to do with num numbers okay so if you’re going to use any of these things you’re using integers or you’re using numbers as the value operation or the value comparison excuse me the ones down here have to do with strings so a double equal sign is comparing the value of a string so if you can see right here we actually have a string as our value so we’re using a double equal sign so if we say if this equals I want you to do da in this case W equal equals uh equal a double equal means that you are looking for the actual uh comparison to be made so if this does equal to this uh if you do a exclamation equal means that it does not equal to that there’s too many equals that I’m talking about I’m almost I’m losing myself in this explanation but I think you get what I mean so if you have two equal signs that means it does equal to whatever the value is if you have an exclamation equal sign it means it does not equal to what whatever the value is and then this is where a lot of automation stuff comes in so this is actually really this is like it’s very basic what we’re looking at on the screen right now but this is the foundation of automating tasks so for something in a list I want you to do something right so in this case it would say for item in 1 two 3 I want you to Echo that item so what it would do in this case is it would print one two and 3 1 2 3 so per line it would say this value this value and this value and it would print that onto our screen for us right so for item and this could essentially be anything so it could be for I in one two3 do Echo dollar sign I so this name is another one of those variables that has been assigned in this particular Loop it doesn’t necessarily have to be exactly this in a lot of cases is it could just be a single letter or it could be any word really it could be for value in one two 3 Echo value right so for the whatever this is for this inside of this list and this could be a variable that has that stores a massive list in inside of it in this particular case we don’t have a massive list stored we just have the simple list you would do your semicolon because you have to separate this piece and then you say for this condition I want you to do this action right here and then when you’re done that’s it you’re done so this has to be here in order for this block of code to be complete it’s kind of similar to what we do in Python except in Python we don’t have done and we don’t say do or something like that we just say for what whatever I don’t want to I don’t want to confuse you but this is a for Loop and this can iterate over a list the list could be a completely separate variable that houses a bunch of data or it could be a variable that is reading from a separate file and then you’re going through the contents of that file there’s a lot of stuff that you can do with for Loops this is a very very simple for Loop but for Loops are the essence of Automation and this is one of the most powerful things that you will learn when we actually get into scripting and creating some Advanced scripting this is one of the most powerful things that you’re going to learn is creating complex for loops and inside of a for Loop you can have an IFL state statement inside of a for Loop you can have another for Loop and there’s a lot of different great things about it and as long as you have your indentation correctly then everything should run smoothly so keep in mind that the indentation is very important in order for a for Loop to work you have the header which is this piece right here and then you have the body which is this piece right here and the same thing applies to our IFL statement this is our header of the if statement then you have the body of the if statement then you have the else which is another header and then you have the body of the else portion and then you have the finish at the very end so the indentation is very important to keep that in mind especially as we go into the the writing of the scripting you’ll notice how those things work and then so there’s a for Loop and then there’s a while loop now a while loop runs as long as the condition itself is true so while loop has a condition that it needs to be met so for examp example we have counter equals 1 that’s our variable okay so the counter equals 1 now we’re saying while the variable counter is less than or equal to 5 then I want you to Echo counter and then counter in this particular case inside of the while loop so remember there’s this ination so inside of the while loop now we have a new counter variable but what we’re doing now is we’re assigning that previous variable + one so for every time that this iterates what it’s going to do is it’s going to print the first time that it iterates it’s going to print one onto the screen then for the next line it’s going to iterate again or actually excuse me it’s going to print one onto the screen and then it’s going to add one to this variable which would then equal two right so then it’s going to Loop through this again and it’s going to say okay it’s still less than or equal to five so I’m going to Echo that onto the screen but now the value is two so then it’s going to add one to that new value which will make it three and then it’s going to go okay yes it is still less than or equal to five and then it’s going to print that onto the screen and then it’s going to keep going until it hits five so once this condition at the top right here is now saying oh it is equal to five now so if it is equal to five then you’re done right so that’s it because that at that point the condition is no longer true the condition becomes false right because once that’s done once it’s equal to five it’s going to go over here and then it’s going to add one to it so it’ll become six and then when it goes up here and it says hey is this equal to five it’s like no no no it’s not less than or equal to five now it’s six so I’m done I don’t I I’m not going to do this anymore so this is a while loop so it’ll keep running as long as the condition itself is true and in this case our condition is if this variable is less than or equal to 5 then just print it onto the screen once you’ve done printing it then I want you to add one to that value right here and then on the second iteration and then the third and then the fourth and then after that it should be at five and that’s it that’s when it’s done because the fifth iteration it’ll actually turn into six and then it’s done it’s no longer true so the condition has been met and the condition is now false and it can’t continue so that’s what while Loops are and that’s how while loops work all right now that you know how the system works and how the file system works and how to create files manipulate files and do all of that stuff with the actual system it is now time to move on to the users and the actual human beings that are going to be using the system and this is where a lot of the roles a lot of the responsibilities for uh being a system administrator actually comes in right because you have to deal more than just dealing with the system itself which is fairly simple to do especially once you understand how to find the guides and the manuals and so on and so forth now you have to learn how to deal with the people and manage the users and the groups that they are in so first and foremost creating users depending on the distribution that you’re on uh it’ll be one of these two commands so it’ll either be user add or add user and it requires pseudo permissions so uh basically administrator permissions or uh maybe root permissions even um it just you run the command and then you have the username at the end of it and that is basically it that’s literally how you add a new user now this is very simplistic typically there’s going to be multiple options that you would run along with your user ad command just to kind of handle certain things alog together um but you can also run them after the fact so you can just do pseudo username ad or user ad and then the actual name of the person and then first you would set up a password for them and I’ll show you specifically what that is um and that also requires pseudo permissions as well um then you would need to assign a home directory to them uh the default home directory if you just do user ad-h uh M if you just have the- m flag and then you do username what it’ll do is that if the person’s name is Alice it’ll add their home directory to home Alice which is typical of uh where the home directories of all the users are based on what we’ve already learned about the file system now if you want to declare a specific directory for that username then what you would do is you would add- M and then you would do- D and then you would have to declare where you want that uh usernames home directory to be and in this case it’ll be data users Alice and that’ll be the directory of their home and then from there this would be the username itself that we’re going to add so you’re adding a user and then you’re declaring where you want their home directory to be by assigning these two flags as well as the path and then this is the name of the user that’s being added um you can specify the login shell for that user so again you’re adding a new user and then you do-s and then you say that this is their login shell which is the typical login shell location for the binaries and then that would be the username itself that’s being added and then supplementary groups and we’re going to deal with group management in a little bit as well and we’re going to do all of these things by the way when we get to the practical portion I feel like I just have to keep saying that cuz this is just more of an overview and I know I’m glossing over a lot of these things but it’s mainly because the fact that we’re going to do a lot of the Practical exercises so um pseudo user ad and then you have a capital G right here and the developers would be one group and then admins would be another group and then Alice gets added to those supplementary groups so these are just some basic commands to add user details now this is a full command that you’re looking at over here right so we’re going to do Pudo user ad and then we’re going to assign a directory for this person which is going to be this place this is their home directory we’re going to assign their uh shell which is going to be at this specific location we’re going to add them to a supplementary Group which is going to be developers and admins and then we’re going to add a comment so Dash C right here is just a basic comment for this particular user who’s going to be Alex Johnson developer and then the final piece right here is the actual username itself so M creates the home directory D sets the custom home directory – s would be their uh zh uh zsh at the login shell D capital G developers and admins adds them to developers and admins and then- C is just a comment uh at the very end just to say that this is who it is and this is mostly for the system administrator that’s going to be looking at this and then finally Alice the actual username of the person and this one long command but it does a lot of things when you’re creating that user and then if you wanted to uh add their password right so typically what you do is you assign a password once you create somebody and then you have to immediately expire the password so that the next time that they log in which would be the first time they officially log in they get notification that your password has expired and you need to set up a new password so you create the user you set up a password by doing pseudo pass WD and then the username and then there’s going to be certain prompts that are going to come in so they’re going to be like yeah what do you want their password to be and then uh confirm the password and then you do this specific piece right here to expire the password that you just assigned to that person and then from there the next time that they log in they’re going to be prompted to actually set up a new password themselves so this is the the very gist the very basic gist of creating a new user now some of our basic commands for managing user so if you want to modify an existing user details with user mod that’s typically how it would work so if you wanted to change their username for example you would do DL this would be the new username and then this is the old username that’s being changed if you wanted to lock an account or unlock an account it would be with the capital L and it would lock that account and then capital u to unlock that account and there’s a variety of user modification commands that we’ll be working with once we get to the Practical section and then there’s also the user delete portion and uh the dasr right here would be a cleanup of everything so deleting the user and you’re also removing their home directory and all of the contents of that user and their directory so uh these are just basic uh user management so to speak commands that you’re going to be implementing when we get to the Practical section and then we have creating and managing groups creating and managing groups is as simple as using the group AD command and then just specifying the group name you can also uh add a user to a group using the um AG so a stands for append and then G stands for the group itself and then you can just add them to a single group or multiple group so this would be outside of the user ad uh version of adding somebody to a group so when you do user mod you would need to do the lowercase a uppercase G to be able to add them to whatever the group is and this would be a supplementary group that you’re adding them too and then of course you can just do group Dell to delete somebody or to excuse me to delete the group that you have specified so the group name that would be what you would be deleting in this particular case um understanding difference between primary and supplementary groups is very important so a primary group is the main group that’s associated for that user um when they create a file and if they create any kind of file or folder the group ownership permission of that file is set to whatever the user’s primary group is now by default every time you create a user there’s going to be a new group that’s created by their name so if it’s Alice as the user there’s going to be a new group named Alice that’s going to be created inside of your group’s directory and that’s going to be the primary group that’s been assigned to that person so when you want to change their primary group you would use the user mod command and then you would do a lowercase G and then the name of the group itself so whatever it could be one of your existing groups it doesn’t have to be a new group that you’ve created but you’re changing the primary group of that person by doing a lowercase G flag and then assigning the group name and then the username themselves and then now you’ve changed their primary group a supplementary group is additional groups that they have access to so you know based on who they are and what permissions they have or what roles they have they could have multiple groups that they’re assigned to so they can get access to the resources that are available to all of those individual groups uh so that’s mainly the big piece that you want um and multi memberships can happen in a lot of cases in a lot of cases they do happen so for example just a a manager for example a manager will have access to the management group as well as the regular employee group for example so that they have access to all of the stuff that’s inside the manager folder as well as everything that’s inside of their own regular folder or along the other groups folder so there could be a manager they could be in marketing and they could have their own regular folder as well you know what I’m saying so they have multiple groups that they’re a part of it’s very useful for granting uh people access to different sets of files and directories owned by various groups you just have to be careful that whenever they leave that department so if they’re no longer in marketing they need to be removed from marketing unless they’ve gone up a level and they do still get access to the Marketing Group but if they’ve left Marketing in general completely and they went into Tech they shouldn’t get access to the stuff that’s inside of the marketing folder and this is mainly because that you want to protect the company from uh potential uh you know if the person Le Lees for example and there is a bunch of intellectual property that’s inside the marketing file or marketing folder and now they have access to all of the stuff inside of marketing and they can steal that IP for example that’s just an example so uh it could also protect the company from any security issues if that person gets hacked and they still had access to marketing for example and now they the hacker knows that they’re a part of that group and they go inside of the marketing folder and they see all of that IP and then they can steal that data because a system administrator didn’t remove them from that group and they should have never had access to that data to begin with so this is very important to keep in mind you can have multiple groups that somebody could be a member of you just need to be careful as you go along and as the company grows and as people’s roles change that you uh modify the groups that they’re members of because as long as they’re a member of that group they have access to everything that’s inside of that group um you can add or remove somebody from a supplementary Group by using the a G so lowercase a capital G and appending them to the specific group or groups that you want them to be added to so very similar to what we did previously uh by using user mod and then lowercase a capital G and then you start assigning the various groups that you want them to be added to and speaking of permissions and ownership and all that stuff access we are now in that particular section so file permissions overview um permissions model is a very fundamental component a very concept of managing access to files and directories uh it makes sure that only authorized users can read write or execute files or delete files or modify files so on and so forth maintaining the system security and integrity um there are permission models that are involved in three levels of access so there’s the owner of the file or folder or the asset or the whatever it may be there’s the group permission level and then there’s others so it’s basically everybody other than these people so it could be guests for example um so there is the owner of the file or folder there’s the group that they are assigned to which would be the primary group as we’ve already discussed their primary group is would be the group that it’s assigned to and then any everybody else that falls inside of others the owner is typically the user who created the file or the folder they have the highest level of control over their files and directories and they can set permissions to read write or execute the file or directory even if they are not a root user specifically so if example.txt is owned by the user Alice she can control who else can access and modify that file the group is associated with a specific group who are members of this group can be given certain permissions on the fileer directory so whatever the group permissions are the group permissions determine what groups uh what group members can do with that specific file or directory like the owner group members can have readwrite or execute permissions or whatever the permissions are that have been assigned to that specific group so if example text is associated with the group developers all the users and developers can be given permissions to read write or execute the file depending on the permissions available for that group specifically okay so keep that in mind because you can modify the permissions of the group and it may not necessarily be read write and execute all the files right and then you have others so it could be all the users who are neither owner nor members of that specific group so it could be everybody outside of Developers group or everybody who’s not the actual owner uh somebody that’s a guest for example so there’s a lot of different people that could be that could fall under the category of others so as long as they’re not the owner or they’re not inside of that primary group that’s been associated with that file then they all fall into the others category um determined uh the permissions for these people determine what any other user can do with the file it can also be set to read write or execute or it could be read or it could be uh execute or it could be none of the above right so they could have no permission to access it just depends on what the the company infrastructure is like so if example text has read permissions for others any user on the system that can actually read the file regardless of the user or group status so a very uh common file that is limited to a bunch of people that or all the people that falls into others would be the Etsy uh Shadow file the etsc shadow file has the password hashes of all of the users that is inside of that environment so even if somebody is not necessarily the root owner even if somebody is not necessarily inside of the administrator’s group and they’re in marketing for example that that means they fall in the others category and they should not be able to read that file so that’s very important to understand there are some files that even if people who are not guests and they’re actually senior Executives of the company or something there is a number of people a large number of people that should not have access to the Etsy Shadow file because it has all of the password hashes for every user that exists on that system so it’s very important to keep that in mind now the way that permissions are designed they go by read write and execute and they have acronyms for them so R would be for read W would be for write and then X would be to execute so read means you can view the contents of the file or the directory uh write means you can modify or delete the file or the directory and execute or X means that you can actually run the program or the script or access that specific directory so rwx so keep these in mind okay this is typically what it looks like and I would say that this is not typically what it looks like this is just this particular example but this is what it looks like when you look at the permissions of a given file or directory the first character which is represented by this Dash right here indicates the type of file that it is so if it’s a dash it would be a regular file if it’s a d that means it’s a directory okay so this is representing the very first character which is this Dash right here so in this case we’re looking at a file if this was a d then this would be a directory now the next three characters represent the owner’s permission so in this case RW and then we have a dash right here and if it was X that means it’s also executable right so this would be rwx representing the owner’s permission read write execute in this case the owner can read and WR write there is no execution so it’s probably not an executable file right it’s just read write and then that’s it and these are all of the permissions for the actual user that created the owner that created this particular file would be this this and this right here okay and then we have the next three characters that represent the group’s permissions in this particular case um in this example they’re saying r2x but in this case it’s just r d d so the group group can only read the contents of this particular file they can’t write to it and there’s no executable permission so there’s no execution that they can do on this particular file either and then the last three represent the others permissions which also in this case are read and then no writing or modifying and then no executing so this is what it looks like so the very very first one is either it’s a file or it’s a directory so a file or a folder so if it’s a regular hyphen a dash it means it’s a file if there was a d here that was mean that this was a directory the next three characters represent the owner’s permission the next three characters represent the group permission and then the last three characters represent every single other person and this is what the outline what the frame uh the template I should say the template of permissions are when you’re viewing the permissions of a file now let’s say you want to change the permissions of Any Given file or folder so we’ve already kind of touched on this so in this particular case we’re going to do CH mod so change mode and when you do plus X which is what we talked about in the very earlier example plus X adds executable permissions but what you’re doing in this case you’ve specified that you want a u which is the user so you want the user to have executable permissions to that file whatever the file name is right so CH mod changes the mode plus X which is a symbolic method of changing we can also talk about numeric methods which we’re going to do right now um but so we’re giving the user executable permissions to that file name which allows execute permission for that user now octal values would be a completely different thing so 755 so 7 represents the maximum permission so seven is read write and execute for the user five would be read and execute for the group as well as read and execute for everybody else so the value of these things breaks down if you had all of the permissions rewrite and execute you would have all permissions for that individual group so this is actually what the numeric value looks like to have read permissions you would be getting a value of four to have write permissions you’d get a value of two and to have execute permissions you would get a value of one so if there is read write and execute the value would be seven if you can only read the value would be four so if there was 744 that means the user could do read write and execute the group can only read and everybody else can only read right if it’s zero then that means they have no permissions okay so 740 means that the others group has no permission the user that created it the owner has rewrite an execute and then the group has uh just read permission right so that’s this is the the breakdown of what the values actually the numeric values of these things look like read equals to four write equals to two and execute equals to one and then when you have the breakdown like this over here then what that means is that the three numbers that are represented on the screen so CH mod 755 the seven is representing the owner the seven represents the owner the five represents the group and then the five right here represents everybody else so these three numbers represent uh the the modificate the uh overall owner group and others categories if it was 777 that means the owner the group and everybody else also has readwrite and execute permissions so just keep that in mind there’s the numeric value value of this the numeric method of modifying permissions and then there’s the symbolic method of modifying permissions along with changing uh permissions we can also talk about changing ownership and you can have ch own and and then CH grp which I’m sure you can imagine what these things mean so CH own stands for change ownership and chgrp CH stands for change group uh these are also pseudo commands so change ownership of the user to this particular group and then the file name as well so you’re changing the ownership of the user and the group for the file name so this is the example right here we have change group so change group of the group name to the file name that’s what we’re looking at so in the particular case that uh we have seen in the first line you’re changing the ownership of the the file name right here to this particular user and the group in this case we’re changing the group for this file name to whatever the group name is okay so just keep this in mind so these is how you change the ownership of the file name and it would be the user inside of this group and then you change the group of this file name by assigning it to this actual group grou so fair fairly simple it’s like fairly intuitive as far as the commands are concerned but you can and again just keep this in mind so once the file name has been assigned to this particular group that means now all of the permissions that are inside of this group are now applied to this file name and anybody who is inside of this group has all of those permissions on this particular file this is what’s very important to understand okay when you change the owner then you’re changing all of the permissions of this owner to this file name so if they have the permission and typically it’s everything they have all the permissions or whatever the main permissions are so you change all of the permissions of that owner to this file name if you’re changing the group of this file name everybody inside of this group has access to that file name and they have the permissions for that group over this file name so just keep this in mind it’s very important and then we have special permissions so suid sgid and the sticky bit so um when the Su ID when the set user ID when that permission is set that file will execute with the Privileges of the owner not the user that’s running it so this is very important to understand if the owner has administrator privileges and the set user ID the Su ID has been set on that file if the user so the user is not the owner right so whoever the user is when they run that file when they if it’s a script for example when they run that thing they’re running with the permissions of whoever the owner was that was created it it’s very simple and it’s it’s very uh powerful to understand okay you are setting the execution privileges of that file to be the execution privileges of the owner and not the user the user could be lower privilege the owner could be an admin and if the user is running it they are running it with the Privileges of the admin which is the owner so if you want to change an add that specific specific permission to the file you would do the change mode chod and then you add on the user level the S permission right here which is the suid and then you give the path to whatever the file or directory is so this is very much for things that are executable that everybody else should be able to uh access meaning a binary so a binary for example the password binary inside of the user bin so this is for the user binary not the the binary of the entire system so just keep that in mind so this is the users’s binary for their password allows regular users to change their password securely that’s what this specific binary allows them to do because we already established that the password binary allows somebody to change somebody’s password so if the user wants to be able to change their own password they should have the permission to be able to do that so this is what this does and this is the case that it would apply to and you just got to be you got to keep in mind that this is a security issue okay so if this is a system binary and this is again something that we’ve done a lot in pentesting we search for files by the permission that is set so if they have suid permission on that given binary or on that given folder we’re going to try to go ahead and access that folder and drop some kind of a exploit in there a payload in there so that we can run that payload Lo by the permissions of the administrator for example and so if we if that directory has admin privileges and we have a shell that we want to execute and we want to switch oursel to the admin privileges we can then run everything that’s inside that directory because it has the S permission set and then now we’re running it with the admin privilege which means we can execute as an admin and then give oursel access to that system as an administrator so this is very important to understand okay that may have been a little bit confusing that last piece may have been confusing but what you need to really understand is that suid will execute the Privileges of the owner not the user that’s running it so the user could have no permissions to do anything but the suid has been set on that file or folder and now they can run it as that owner right just keep that in mind SG ID is very similar except it applies to the group so it executes with the permissions of the files group and not necessarily the person that’s running it so for directories files that are created inside of that specific uh directory are going to run with the parent directories group so whoever the group is that owns that particular directory any file that’s dropped inside of that directory will run with the permissions of that specific group so if you want to change and add this specific feature for permission for any kind of a directory this would be it you would do G Plus s and that’s it and this is a CH mod that is done with pseudo by the way this is not something that typically would be done by everybody so a a lower level user should not be able to add the special permissions to these things uh this should only be something that’s allowed to be done by somebody who has administrator or root privileges so that we know that it’s the right person that’s making these changes so and everybody should not be able to make uh the special permission or modify the special permissions on files it should only be reserved for root administrators and domain administrators so on and so forth and then there’s something called the sticky bit so when you set a sticky bit on a directory only the file owner or directory owner can delete or modify the files within it regardless of the group or other right permissions or anything else right so only the owner of that file or directory can delete or modify it nobody else can do it this is called a sticky bit and so you do chod plus T you’re adding the sticky bit so just T you’re adding that to whatever the path of the directory or file is uh this is commonly used in shared directories like the temp folder so the the file owner or the directory owner can delete or modify the files within the temp folder regardless or of the group or other right permissions that may be assigned to that temp folder right so only the owner of the temp folder or the owner of the temp directory can delete or modify the files within that directory doesn’t matter who else is trying to do it uh doesn’t matter what other group or WR permissions exist only the owner can delete or modify the files within that directory so this is something else to keep in mind because this is also a security issue so if there’s a sticky bit that’s been assigned to something it’s also something to keep in mind and it’s typically something that you do uh to make more SEC like make the environment a little bit more secure so this is opposite of the the special permissions where it technically makes it less secure if something has the special permission attached to it any user can run it with the owner’s uh permissions or with the owner’s privileges whereas the scky bit only allows the owner of that file or directory to be able to modify meaning change or write to any of those files or delete any of the files inside of that directory which brings us finally to our user authentication and pseudo permissions portion so user authentication we’ve already touched on this particular file already so the Etsy password file stores all of the user names so the user accounts themselves there is no uh password doc uh hashes or any PL text or anything like that that’s inside of this file the name is kind of misleading and I think it’s been designed to be misleading each line in this file corresponds to a single user account and contains several Fields separated by colons and those fields all stand for something so all of the users the usern names are stored inside of the Etsy password file now this is an example of a uh a specific entry so you have Alice then there’s a colon and there’s an X and this is typically where the password hash would be and then you have colon and then an ID and another ID and then uh the name right here separated by a few commas and then another colon and then we have their home folder and then we have another colon and then we have their bash path so the username Alice would be the user’s login name so this is what their login name is the password placeholder which in this if we once we actually go into the shadow file and you’ll see this is a very large hash value that’s right here um the user ID would be this piece right here uh so unique numerical identifier for whatever their user ID is the group ID would be the primary group ID that’s associated for them which is in this case their actual personal group that was created when the user was created geckos um this is the optional user information like their full name office number Etc so this is this is the comment for example this is where the comment piece would fall which is everything that’s inside of this specific uh uh separated by these two com um what I’m having a brain fart the colons the inside of these two colons this is called the geckos which is the comments essentially so user information full name office number Etc and then we have their home directory which is the path to the users’s home directory and then we have their shell the default shell that’s been assigned for this user and this is what a typical entry inside of the Etsy password file looks like then there’s the Etsy Shadow file so the Etsy Shadow file has everything else that we just talked about except now it actually has the password hashes so the encrypted password information and other details related to the password management of that person this is more secure than Etsy password so a lot of people can actually access the Etsy password file because it doesn’t have the password hash in it the Etsy Shadow file cannot be accessed by anybody other than somebody who’s the root user or on the suit’s list so it’s very important in this particular case it’s saying it’s readable only by the root user which means that only the root user can access the Etsy Shadow file because it has the encrypted password hashes of all of the users now what we can see here is the same thing so we have Alice there’s the colon and then you see all of this data right here and all of this and you see there’s these this um this uh my gosh this ellipses that’s right here because this specific hash value was actually massive um it took multiple lines I think it took two lines so it was a very very large hash value but we can see that it’s been separated by these two colons right here so everything inside of this including the dollar sign and the six and the rounds and then including this forward slash at the very very end all of this was the hash value of Alice’s password and then there’s 18661 and then there’s 0 9999 7 and then the last three colons at the end so we have the user us name which is Alice the password hash which we already talked about uh this field contains the hash including details about the hashing algorithm and any salt that’s been used and typically the very uh beginning portion right here the dollar sign six and dollar sign this typically is the hashing algorithm and based on uh just what the breakdown is of the it could be shot 256 or whatever it is that’s typically what is determined at the very beginning right here and then the last password change so this is what 18661 looks like which the date of the last password change represented as the number of days since January 1st of 1970 so 1, 18661 uh 1,00 or excuse me 18,6 161 days gosh 18,6 61 days since January 1st of 1970 that this particular uh password was changed that’s been how many days it’s been changed so so you have to actually count forward from January 1st 1970 and come 18,6 61 days forward until you understand what date it was that the password was changed and then the minimum password age in this case is zero meaning the number of days required between password changes so this particular case there is no minimum age that’s required of this so uh it can essentially last as long as possible um and you can change this and this would be the number of days so if it’s 30 after 30 days it would have to be changed my bad excuse me so yeah the minimum password age meaning that they are not required to change their password um they can or they’re not required to wait any number of days to change their password so they could change their password immediately that’s what the minimum password age means they can change their password every day if they wanted to the 99999 this thing right here means that they have 99,999 days until they are required to change their password next time so this would most likely need to be set to let’s say 90 so that you can have the user change their password every 3 months for security purposes so this is a very important field as well so the zero is kind of understandable so you don’t want you know they can change their password any day that they want they can change their password daily if they wanted to but this piece right here is a security issue so nine 999,000 days almost 100,000 days they they are given almost 100,000 days before they’re required by the system to change their password again and that’s very very important to understand as a security issue you want to change that to make it 90 days for example or 120 days or something like that so that there is a definitive limit on how long they can go with the same password and it would be required to change their password and then there’s the password warning period so we already talked about the 99999 uh the password warning period which is represented by the seven this time is the number of days before password expires that the user is warned to change it now in this particular case it would be 99992 so it’s still too long right so they need to have uh let’s say still 90 days and then on day 83 they would be notified that hey in 7 days you need to change your password the password inactivity period in this particular case is represented by this uh colon that’s separated by these two other colons the number of days after password expires during which the account is still usable and in this case there is none so if the password is expired that means they have to change their password in order for them to use their account again and then they have the another one colon right here the date when the account so actually I was uh incorrect so the very next colon is what we’re talking about for the inactivity period the second colon is the date when the account will be disabled represented as the number of days since January 1970 which has not been assigned here either and the final colon is reserved for future uses so these last three colons especially this particular one so the password inactivity would be the number of days after a password expires during the account still usable which in this case is none so as soon as it expires they have to change their password the account expiration date there is none because as long as they’re in the system as long as they’re an employee as long as it’s your computer and you haven’t deleted your username for example that’s not going to change and then you have the reserve field that’s been reserved for future uses for a variety of other reasons and so that is the full uh explanation of a line inside of the Etsy Shadow file so as we’ve already discussed the Etsy password file it can be world uh World readable meaning that everybody essentially can read it but the password placeholder should be X meaning that it would be less sensitive so that that is potentially something that you can do if you wanted to do it like that um I still think that the password file should not be uh World readable because lower privileged users should not get access to all of the usernames inside of that system because we have gone through a variety of pen testing exercises that we found a variety of different users and then we did Brute Force exercises to be able to find the passwords for a variety of different users and then kind of did uh lateral movements and then eventually had vertical movements until we got higher privileges so this should in my opinion should not be World readable but it can be World readable um so that as long as the password hash has been uh replaced by this x then technically it should be fine the Etsy Shadow file however should only be readable by the root user because of the fact that it has the encrypted password hashes and that is a very very strict um file that only the root user or root users just in case you’re working in a company and one person is out sick or uh you want to have redundancy you have a a s just a handful of people who work in it who are the highest level of management that have root user uh permissions that can go ahead and access the data that is inside of this thing and the thing is you don’t need to give everybody root permission because not everybody needs to see these password hashes anyways because you can just reset somebody’s password very easily without having access to their password hashes so that’s the that’s the piece where it’s like okay it is understandable that they say that only the singular root user is the person that has access to the Etsy Shadow file because somebody could just be an IT administrator beyond the suit’s list and they have permission to reset somebody’s password if they’ve been locked out or expired so on and so forth so um these are the major security considerations to think about when you’re looking at these two specific files uh in particular so managing pseudo permissions uh granting the ability to users to execute commands with root privileges via pseudo is a critical aspect of system administration because you want to have redundancies with your administrators you don’t want everything to rely on one person this involves adding people to the pseudo group configuring the pseudo file and applying command restrictions for fine-tuned Access Control so when somebody’s in the pseudo file essentially they can run pseudo command and they can do really basically what any root user would be able to do they may not be the root user but they could be in the pseudo Group which means that they have those administrator privileges those higher level Privileges and the pudor file is really the highest level of privilege that somebody can get because they can modify and manipulate a lot of different things inside of the system adding users to the pseudor group is as simple as doing pseudo user mod add to group and then the group pseudo and then the username that you want to add to that group so it’s very very simple to do except this is a very very powerful command the command that you see in front of you is a very powerful command that somebody can run and now whoever this person is right here they have the key to the kingdom so to speak so um basic pseudo permission adding you just use the user mod add to the group pseudo and then give the username and this is just a breakdown of how that command works so user mod AG pseudo and then the username and you already know what all of this means and how these things break down so that’s how you add somebody to the pseudo group The pseudo group and this is an example so we’re just adding Alice to the to the pseudo group so this one’s kind of redundant but uh now you’ve seen this in multiple regards so you can see how you can add somebody to the pseudo group or really again any group right so if we just replace pseudo with whatever the group name is we’re adding Alice to that group so this is how we do the fine-tuning This Is How We Do the controlling of what people can do inside of the pseudo group so the pseudo configuration file is located as the Etsy pseudo location and it controls pseudo permissions for users and groups basically showing you what commands they can actually run with pseudo if they are inside the pseudo group so if you want to edit this you would do it with v sudo and you go Pudo vudo and the explanation is that this is the safer way to edit the sudo’s file because it checks for syntax errors before you save it so you don’t want to do this with Nano or Vim because vudo actually checks for syntax errors and then it’ll open the pseudor file and the default editor that you have it just does it while checking for syntax errors and once you’re inside of the sudos file you can Bas basically uh designate or define specific commands that people can run with pseudo when they’re inside of the pseudo group so for example um giving somebody full pseudo access would be assigning their username so this would be Alice for example and they she has all all all all so she has all of the permissions the breakdown is whoever the name of the user is the first all allows pseudo access from any terminal so all of the terminals would be this one so on all terminals she has access and then all all inside of the parenthesis right here allows her to run commands as any user and as any group and then the last one is allowing her to run any command so she can do it from any terminal as any user in any group and she can run all of the commands so she’s getting granted full pseudo access if you want to Grant pseudo access without a password which is another one of those things that like now you’re just giving this person literally everything in the Kingdom you just add that no password uh parameter or that no password argument inside of this piece and now she has access to everything so uh on all terminals as all users no password required she can run all of the commands and now she has access to the entire Kingdom um if you want to restrict access to a specific command which is most likely what you’re going to end up doing this is what it looks like so you have the username she can run on all of the terminals as whatever user no password required but she can run system control the user uh this is the full path of the system control binary and the system uh and the reboot uh binary so this is how you and then it’s separated by a comma and a space right so you have the path of whatever the command is meaning the binary path to whatever the command is so whoever the username is can run the system control and reboot commands with pseudo without a password this is what we’re seeing over here so uh this is how you specify what commands they can run by assigning the actual binary path inside of the user directory inside of our root directory so root user user binaries and then system control and this is what this specific user can run without a password requirement and just to make it legit for Alice this is our example of giving Alice that permission so Alice can run on all terminals uh as whatever user no password required the user bin system CTL binary and that’s pretty much it that’s how you uh specify what Alice can run on a computer so just to give you a couple of practical examples here so we got adding a user to the pseudo group so we got pseudo user mod add to group The pseudo uh add to the pseudo group excuse me the user Bob um we have pseudo vudo that edits the pseudor file so it opens it with vudo so that you can actually get all of your syntax checked automatically by the system to make sure your syntax is correct and then we have the managing of the pseudo permissions and our summary here so granting and configuring pseudo access involves adding people to the pseudo group editing the pseudo file with vse sudo and defining the command restrictions for fine-tuned Access Control you don’t want to do all all all all you don’t want to give them everything right so you get them access to the pseudo group get the pseudo file open with vudo so that you have your syntax correct and then you just want to give the specific path to the binary that they should have access to which means the commands that they can run and this ensures that the user has necessary permissions to perform administrative tasks while maintaining security which is very very important in this regard so security is a big deal and we’re going to go into security as its individ ual chapter and everything but we are now bringing all of these Concepts into play so you you’ve talked about file permissions so far and we’ve talked about groups that they can add to and inheriting the permissions of these various groups and now we’re talking about the ultimate Group which is the pseudo group and inheriting the permissions of that group but now you want to limit the individual command that these people can run as pseudo and that’s how we assigned that was going into the pseudo file with Etsy pseudo and then opening up the pseudo file with vudo to make sure that we can actually uh get our syntax correct as we’re doing these things and then from there we say okay these are all the different commands that you can run so that’s how you do that and as a last example over here we got the full series of commands here so you have the user uh mod so pseudo user mod adding the person into the pseudo group right here and then you open up vudo and then you go and use various options so for example the no password option or giving them all terminal access so on and so forth inside of the sudor file and then the username all equals all no password so on and so forth this means that this person whoever this guy is this username person can run this particular system control without any password requirement and that’s the only thing that they’ve been given pseudo access to without a password or even if they had a password this is the only thing that they have access to that they can run they don’t have all assigned to all of the commands that they can run because that would be silly that would be careless on our part as system administrators so this is it this is the very final cheat sheet kind of a thing that you get for permissions and uh pseudo and so on and so forth and we can now jump into the next piece right here which is file management and file systems all right so let’s get deep into the file management and file systems uh so the file system hierarchy standards and the directory structure uh is what we’re going to be talking about uh as a review these are the key directories that we have inside of our FHS our file uh file system hierarchy standard um the FHS defines the directory structure and contents in Linux helping maintain consistency across a variety of distribution so you will see this in pretty much every distribution of Linux the main directory is the root directory then you have the binaries then you have the Etsy you have home VAR temp you’ve we’ve talked about all of these things so none of this is news to you unless you actually skipped that particular uh section of this training but it was towards the very beginning where we went through the file system hierarchy so these are our key directories and since these are the key directories and I mean there’s also a lot of uh a variety of other directories as well that kind of fall under the the ne not NE primary directory so if you go back to the section that we were talking about partitioning uh it was in chapter 3 uh if you visit that or if you kind of re remind yourself of everything that we talked about we have the primary partitions and then we have the extended and The Logical partitions and uh this goes into directly into the concept of mounting and unmounting file systems or partitions within file systems so here’s what that uh is going to look like so we have the mounting of file systems so when you mount something you’re attaching the file system to a directory so that it’s accessible within the larger directory tree and you would do this with the mount command so uh you have any given file system you attach that file system and this could be the xfs file system it could be a fat 32 or a variety of other file systems you you’re essentially mounting it you’re attaching it to Any Given directory and then we’ll as you can see right here we’ll just talk about a few different ways that you can do that but when you do this you’re making that file system accessible you attach it to your directory uh hierarchy so that it can be accessible uh through the OS and through for whatever the user is that’s using it so on and so forth so uh in order to do that you would use the mount command and this is a pseudo command so you uh you have the pseudo uh pre-command I guess we can call it or the qualifier at the beginning of this so pseudo Mount and then you have the device name which is going to be mounted onto the mount point so you would find out what the device name is running Dev and again we also talked about this as we were going through the installation uh part of chapter 3 and I showed you how to find the various devices that are currently mounted or plugged in so to speak the the devices that are currently plugged in to your system and then from there you would get the path to that device and uh it usually uh is something like you know disk 4 or something like this it’s like it’s not a complicated thing so it would just be for slev and then there would just be the device name or the the name that the system has given to it and then from there you would give it the mount point which is the path that you wanted to be attached to so using an option like T would specify the type of the file system so if it’s the xt4 means that that’s the type of file system that you’re working with and then this is so this is what I mean right here so you see how it says Dev device name in this case it’s saying sdb1 so it’s the standard dis uh portion one of that so this is the second one that the second physical uh partition the physical disc that’s been attached to this particular system cuz SDA would be the first one sdb would be the second one SDC would be the third one so on and so forth and then you have the first portion of that physical device the first partition of that physical device that’s being mounted onto the mount uh directory inside of our root directory so that’s typically what it would look like and you’re just saying that I’m dealing with an xt4 or I want to be mounted as an xt4 right so there are various options and we’re going to go through all of this again I have to constantly remind you we’re going to go through all of these as we go through the Practical portion of the command but this is what essentially it looks like you use the mount command to mount any given um file system or any given specific partition a primary partition and extended partition you can mount that onto a mount Point um you can also declare automatic mounting and this is done inside of the ETFs tab uh configuration file that defines all the file systems that should be automatically mounted when you start your system so when you boot your system there would be either one or two or a handful of file systems that you want to be mounted as the system starts so you don’t have to manually mount everything this is a this is considered a manual Mount what we’re doing over here and sometimes you want to do that sometimes you want to unmount something as well but automatic mounting is typically for this the file systems and the partitions that you’re going to be using regularly so you’re going to use an automatic mounting configuration that’s inside of the fs tab file inside of the Etsy folder the ety fs tab is essentially where all of that stuff is housed so the dis partitions or any other file systems that you have that should be automatically mounted all of those configurations are going to be inside the F FS Tab and then each line in the fs tab represents a file system and the mount options that are attached to it so this is what it would potentially look like inside an example or typic the typical FS tab uh file so um you have the file system first and then you have the mount point you would have the type of the file system and then any options that you want to attach to it The Dump location and the pass location so as an example uh we have have the file system right here so just breaking this down it could be the dev sd1 which refers to the first partition on the first sat drive so you have SD for the SAT drive you have the a representing the first SATA drive and then one representing the first partition of that SATA drive so that would be the file system that would fill in right here a more robust way to specify this using the universally unique ident identifier would be this piece right here so you could do a uu ID and then fill in The UU ID instead of giving the path to the partition itself that you want to use obviously that requires that you know The UU ID which you can also find running the previous commands that we ran to find our partitions that are attached to our system uh you could have a label and the label variable equaling the value of whatever that label name would be and specifying whatever that file system is by its label typically this is like um what do I have I have like a SanDisk uh something something something I don’t know I don’t know what the name of the the the drives are but let’s say you have an external drive and it’s a SanDisk drive and it has the label name the label name is very different from its uuid obviously and label from the partition location or the partition path that’s been assigned inside of your system this is actually what it looks like when you plug it in and then you see your list of connections and then it says oh you know this is this particular one and then you can change the label name so I always change them because uh number one I don’t like spaces in the names I want the whole thing to just be one word and then I turn it into an acronym that I understand and I also put the size of it so uh primary 2 terabytes for example that would be like one of the labels that I would rename mine to so that I I know exactly which one I’m dealing with as I go through my uh my standard discs or my external hard drives so to speak speak um and then we have the server share path as well so this is a n network file system like for example the SMB or CFS file system uh those are network connections that are being accessed from a separate location from a remote location so it’s sitting on a file server somewhere and then you’ve connected to that file server and now you have the path to that file server that’s going to be inside of your file system variable so all of these fall under this very first piece right here which is referring to the file system so since now we have the location that we’re pulling the file system we now need to give it the mount point which is the location that it’s going to be mounted upon so the mount point is the directory where the file system is going to be mounted so it could be the very root directory it could be inside of the home directory it could be inside of the mount data directory um which typically is the Mount point for any addition additional data drives the user directories so all of the home directories for users are going to be mounted on to the home directory and this would be you know for every user that you have you typically would need to assign inside of the ET CFS tab entry inside of the ETFs tab directory or configuration file my mat uh so inside of this configuration file you would assign the actual home directory for the user inside of the home directory path that we have for the route so uh this would be done one time inside the fs Tab and then as soon as the system is booted and the it’s up and live and running uh it’s going to be accessible and everything is going to be mounted you don’t want to be doing that every single time especially if you have like literally dozens or hundreds or thousands of employees and in a lot of environments especially when it gets that big and you have that many people to deal with it becomes something that is done with a script because you would probably get a dozen employees per day or something per week or something like that and that’s just not something that you want to do manually because it’s so much faster to do it with a script and then you can also avoid making any errors if you use a script so uh root file system the user home directories the mount and data points for any additional data drives so we have the location that it exists we have the location that we want it to be mounted to and now we need to give the type of the file system that we are dealing with so xt4 xfs NF FS V fat which is one of the variations of the fat file system so fat 32 so on and so forth so we had uh all of these we have already talked about these various file system types but you would need to know what type of file system it is that you’re mounting so that you can give it the type in this particular variable and then the system will know how to interact with it and uh for the most part the most commonly used is going to be xt4 which is for Linux file systems in you know personal computers or in small environments xfs is the high performance file system that usually is used for a file server um and for a web server for example which would most likely be combined with some kind of a network path because if you’re accessing it remotely from a uh from a series of uh computers that are in a different city for example uh that is going to require the network path for the file system name right here instead of the the file system nickname or something like that you actually need to give it the network connection path that you have over there and the NFS would also be the type that would be used in in that regard so if it’s internal and you’re hardwired to it then you would use x xfs as the type but if you’re accessing it from the network connection then it would be NFS for the network file system and then vat is just one of the fat file systems that’s often used to USB drives or external hard drives that are being attached via a USB wire or even a fire wire or something like that it’s just something that’s being externally attached it’s an external hard drive that’s being connected to the machine and then we have our options that we need to attach to this particular path uh so it could be the mount options that control uh how the file system is actually mounted um it can be multiple options that are attached to this and the default options you can uh refer to them by just saying defaults and those are the wsid Dev exec Auto no user and async all of these happen all at the same time I’m not going to break these down right now you’re more than welcome to Google them if you want to but these are all mounted or assigned to this particular uh FS tab entry by just using the defaults uh entry or the defaults option um there is no a time which prevents the file system from updating the access times there is r o which mounts the file system as a read only there’s RW which mounts the file system as a read WR which is what’s represented right here um and then a variety of other options that you’re more than welcome to go check out and uh I’ll actually just show you what all of those options are real quick okay so we have the defaults option as we already mentioned which will include all of these options right here and the example entry would look like this so this is the partition it’s being mounted onto the root it’s an xt4 type of of a file system and we’re adding the defaults to it and the defaults would add all of these individual uh options as one entry which would be this piece right here then you have the RW by itself which is this guy right here and RW represents the read and write mode so that somebody that anybody that gets access to it has read and write capabilities you have r o which represents read only uh you have no exec which prevents the execution of any binary on the mounted file system um and that is actually not included on here because this is the exec meaning that they can execute all of the binaries on that particular file system no suid disables the set user identification or set group identifier bits that we just talked about in our previous uh sections uh making sure that you can or the the person who’s running anything from this doesn’t do it with the permissions of the owner or the creator of it then we have the no Dev which does not interpret character or block devices on the file system and really what that means uh is that the users cannot create device nodes within that specific directory structure which enhances the security by restricting access to that devices management functions on a mounted partition so the users can’t create devices on that specific file system they can’t attach uh external devices or create any virtual devices attached to that particular file system so no Dev if you can recall what we were talking about with the actual Dev partition or the dev portion of the file system and how it creates a file structure for a printer that may be added or for the driver of the printer for example or a USB drive or something like that so when you think about what that’s what Dev does then you can think about no Dev meaning that it doesn’t allow them to do that on this particular file system that’s been mounted uh no a time is the does not update the access time on files when they are read so this will improve performance potentially uh but it’s essentially the access time on files so you open a file and then there’s a little uh meta data that’s updated that says oh this file was accessed last at this particular date and time so this is the piece that you’re going to remove from there no dur a time does not update the access time on directory so very similar to the last piece uh ra a Time updates the access time only if the previous access time is older than the current modify time which obviously it would have to be uh which improves the performance while maintaining some of the a Time functionality so it will add an access time only if the previous access time is older than the current modified time which again it it would seem like how would somebody go go and access something at a date that is uh newer than the old like what that part is like if the previous access time is older meaning so the very last access time was June 1st and then I’m accessing it today on June 10th so obviously the previous access time is going to be older so that’s the that’s the thing that I’m like okay whatever that doesn’t make sense but okay um then there is the user which allows a normal user to mount the file system um meaning that somebody that is not an administrator or a pseudo user they to mount the F system and in no user only the super user can mount the file system meaning the super user being the root or the administrator or somebody that’s on the pseudo list and then you have Auto which is the mounting of the file system at boot automatically which is one of those things that was actually included I believe in our big list at the top right here yep we have the big list and then you have no user that’s also one of the ones that’s here Dev meaning that you can mount other uh file systems onto it or create device nodes onto it there is the suid which means that people can actually access and run this with the permissions of the person who was the owner and then async so let’s see if we can go and check that out specifically at the bottom right here uh no Auto preventing it from being automatically loaded we have sync which is all input and output operations are done synchron synchronously um and then you have async which all input and output operations are done asynchronously and let’s find find out what those things mean specifically okay so actually this is very uh easy to understand so all input operations being input output operations being done asynchronously means that when the computer performs the operation for example reading from a file or writing to a network it doesn’t have to wait for that operation to finish before continuing with the other tasks meaning if it is synchronously it has to wait for the previous task to finish so that it can move on to other one uh if you do asynchronously it can run those things simultaneously so the program can send the input output request and continue executing other code while the input output operation happens in the background receiving a notification only when the operation is completed which is actually very helpful so that’s probably why this is one of the defaults which is it is async right asynchronously um and then we have the ACL so it enables the access control lists for the file system system and the access control list uh whatever that is on your uh specific uh computer that’s been or on your system that’s been configured it’ll just enable that access control list for this particular partition as well so we have a few examples in this case or one at least one example in this case where the example entry would be something like this where you have the SATA uh a so the very first uh disc and then the first partition of the dis it’s being mounted Ed on the mount storage extension it is an xt4 file system it has the defaults as well as no a time and then we have zero and two and so we can really quick find out what the zero and two are as we go through the rest of our options but it gives us right here so no dump option so uh the zero represents the D dump option which is set to zero for file systems that should not be dumped which means they shouldn’t be downloaded you should not have the option to be able to dump everything from from that file system onto your current machine and then the pass option sets the order in which the file systems are checked at boot so when you’re running the boot this particular file system is going to be done second in line and that’s what those dump and uh pass options stand for and we literally just talked about it so zero would in this case represent do not dump and then one would represent dump defile system so that is something that would be the those are the only two options that are available for the dump parameter in this particular case uh which means that uh it’s a backup type of a feature right so it indicates whether or not that file system should be dumped and backed up um if it has the one that means it is going to be dumped and it is going to be backed up uh if it has a zero it’s not going to be dumped and it will not be backed up uh when you look at a a hash dump or a data dump or anything like that that means it’s being taken from where it’s currently sitting and it’s being dumped onto this particular Mount Point okay so it’s going to go from here and it’s going to be dumped onto here at boot right because this is something that we’re putting configuring for our boot options when we start the system and as it goes through all the various partitions and file systems that we have it’s going to check for this and then if it should be dumped or should not be dumped and it’ll if it is supposed to be dumped it’s going to go from this location and it’s going to be dumped onto that location and then of course pass as we already just talked about it as well so um zero would be do not check so this is the order in which to file systems are checked at boot time by the fs check utility so zero would be don’t check it one would be checked the system first usually the root file system and then two would be check the system after the first one has been checked so you have zero don’t check it one check it as the root which is typically the root file system so we’re not going to mess with it unless it is the actual root file system you’re not going to turn that into one the only thing that should be checked primarily before anything else should be the root file system and then you have the two which is basically check it after the other file system meaning after the root file system you can check this one and then you can assign two to essentially all of the other file systems that have been mounted onto this particular machine uh because they all come after the file system does the root file system they all come after the root file system does okay okay so this is an example of our FS tab file so uh we have these columns so the file system itself the mount point the type of the file system any options that would be attached to it and then we have the dump uh whether or not it should be dumped and then the pass whether or not it should be passed and so you have The UU ID in this particular case and then you have this one external uh or this uh extra partition that’s been attached because it’s the SAT disk B which would be secondary and then the first partition on that uh drive so you’re looking at the uuids here this particular file system is being mounted onto our root so this is standard this is going to be a standard entry on the fs tab because you have to mount the root every single time that you boot a computer it is an xd4 type file system and it’s going to be mounted with the default options and of course it’s going to be passed uh at one meaning it’s going to be checked primarily before anything else is checked and then you have the secondary file system which is going to be everything inside of the home location which would be all of our users so xd4 again all the defaults no dump required and it’s going to be checked second in line after the rout has been checked and then you have this particular one which is our swap space so if you remember talking about our swap partition for our uh partitioning section this is our swap partition and it is a swap type and it is a s SW option uh because it represents Swap and then there is no dump required for it because it’s going to be rebooted or wiped every single time that we reboot the system and it’s not going to be checked because for the most part at boot this is empty right so if you reboot the system the swap space gets emptied out the swap file gets emptied out so when you’re booting the system which is what this whole thing represents right so the Etsy FS tab is the configurations that are uh run when the system is booted and all of these things are being mounted on boot so when you boot the system the swap space is empty so there’s no requirement for us to check it to run FS check on it and then you have the dev sdb1 which is one of our external or secondary uh file systems that is being mounted onto this particular location and it’s going to be mounted on to our mount data partition and the sdb 1 is also an xt4 type of a file system there is no access time that is assigned to this so no defaults or anything like that it’s just a no access time that’s been uh assigned to it and then it has a dump of zero we don’t want to back it up and then it’s being checked after the root as well so if you notice all of these things are going to be checked so if this was a longer list essentially every other thing would also be checked with the exception of the swap space cuz it’s unnecessary to check it and then the options would be the only thing that would change for it um and then you would have the order in which they’re being checked which apart from the root all of them are going to have an option of two or zero which would be the swap space itself so this would be the example of the Etsy FS tab file and so this is the actual explanations of what I just gave you so if you want this you can just pause the screen real quick take a screenshot of this but it literally just explains everything that I just explained in this particular slide right here so if you want to take a screenshot or pause it or take these notes whatever it is feel free to do so right now 1 2 3 moving on okay so unmounting the file system is something else that you would need to do this typically is not going to be done with the fs uh CH or the fs uh okay so unmounting the file system will typically be done manually using the um Mount command this typically is not in the fs tab configuration file and it is just done manually using pseudo umount and then the mount Point itself or pseudo umount the device name so either one of those things so since we have the uh the mount point you could ount via the mount Point itself or you could umount uh by the device name that’s been attached to it right there so um let’s go back to this direction okay so there we go so that is the command that we’re going to have to be able to unmount something and it’s a crucial step to prevent any data loss or corruption especially uh for removable storage devices like USB drives and things like that so this is actually um in a GUI in a graphic user interface you would typically either right click on it and unmount it or there’s like an eject button that’s next to it that you would click on the eject button and it would unmount it for you but when you’re inside of a uh command line interface like a lot of Linux servers are and they don’t have a gue uh when you’re inside of that environment you would need to use the umount option so that you can unmount it and make sure that it’s saving everything it needs to save and then usually if something is open inside of that partition inside of that for example that USB drive if there’s a file that’s being accessed from the USB drive and that file hasn’t been saved usually you’re going to get some kind of a notification saying hey there’s something from this USB is being used and you need to save and close it before you unmount this and that’s always a notice that you would get if you’re running Windows or Mac OS or something that has a g when you try to unmount it or disconnect it instead of just you know obviously hopefully you’re not just pulling it out of the USB location um I sometimes do that but I only do it when I know for a fact that I have all of the files closed or I’ve saved what I need to save and I can just pull it out and just make sure that you know I can be certain that nothing is going to happen to the file that I was dealing with but if you haven’t saved something or or if it’s still in use then you’re going to get that notification and basically just save it and then close out whatever software is using it and then you can unmount it without any problems and just to kind of articulate the reasons to unmount just to make sure that you’re all good and you understand what we’re doing so um there’s something called a buffered right so os’s often use a process called buffering to improve performance instead of writing the data to the dis immediately they temporarily just store the data in your random access memory which is volatile memory which is temporary memory because it’s going to get wiped when the system reboots so when you unmount it it takes all the buffer data and actually writes it to the disk so it takes it out of the ram out of the random access memory and it actually writes it to the dis and then that way you can when you unmount you can be sure that everything that’s currently buffering and just kind of hang hanging out in limbo it’s actually being written onto the disc so you don’t lose any of your data um then there’s the flush cach a so when you uh unmount something you flush the cache and cach a is kind of another one of those temporary storages that just houses some data uh meaning anything that’s pending uh any kind of pending right operations are completed and the data is accurately transferred to the storage device and then it comes out of the cache and it actually goes into the device itself it’s written onto the device and you don’t have to worry about losing that data um another reason would be the Integrity of the file system so uh when you unmount it you cleanly close the file system and you make sure that the data inside of it and the state of it is consistent and it hasn’t been corrupted in any way um which is actually very useful it’s like a good habit to have because most likely you’re not going to ruin the Integrity of the USB especially in a lot of modern USBS most likely you’re going to be fine but if you do that repeated there could be some uh mess you know something that happens where the the corruption in this particular case corruption is like a very strong word but the Integrity of the USB may be messed up the Integrity of your file system may be messed up it may not run as quickly it may not save what it needs to save if you just keep doing it repeatedly without properly unmounting it and then of course uh the corruption of the data so if the network file is removed or disconnected connected or the USB drive USB drives typically are fine I’m not I’m still going to tell you to unmount it and just make sure that you eject it properly so that part is going to be fine but a network file system if you remove it or disconnect from that without properly unmounting within that relay of data because if it’s Network connected that means there’s definitely something hanging in The Ether in that connection that you have with it and if you don’t unmount it then the the data will potentially be lost because it’s just going to be hanging in The Ether in the medium portion of that connection it’s not going to be on the actual server that you’re pulling from and it’s not going to be on your actual machine it’s going to be somewhere in the middle and if you don’t unmount then you’re going to lose all of that data in transit and then it makes the file unreadable or the file system itself will become unusable uh most likely it’s not going to destroy the file system but it is going to lose some data in that Transit and you just don’t want to do that then you have preventing access conflicts so files may get locked so if you open a file and process might still be running or something might still be interacting with that file system unmounting it make sure that all the file handles are closed and no processes are using it so this is what I was referring to earlier when I said like something may still be using it a software may be using it so for example when I’m editing a video as an example all of my video files are stored on an external driver because I don’t want to take any space on my actual computer and if I still have Premiere Pro open and it’s still using any of those raw files or my project files and I try to unmount I’m going to get a notification saying I can’t unmount this like my computer will say this can’t be unmounted because of the fact that or you know dis can’t be ejected that’s another way that it says it because the fact that there’s a program that’s still using it in some capacity so this is the portion right here where it’s like it locks the file right it won’t disconnect I mean I can still pull it out right I can still pull it out of the USB but that process right there might lose my last save my auto save or it might affect some of my data or my video files or something like that so in that regard I’m like oh okay let me just go save Premiere let me close out Premiere and then that way I can unmount easily or eject the dis easily um there are shared resources and again this is inside of the networ connected file systems multiple users or uh systems may be accessing the same exact resources and if you unmount them it manages these resources and prevents the issues arising from unexpected disconnections right um Mak sure that everybody who is using it is notified number one that it’s being unmounted and it was unmounted or it just saves all of their work because it is a shared resource and you don’t want them to lose their stuff because it’s important stuff everybody’s working on something that’s relevant to the organization so you just want to make sure the shared resources are protected again I feel like Network file systems in my opinion are much more volatile and much more sensitive they uh than USBS right so they USBS are typically very resilient uh Network file systems are susceptible to uh loss of data because the fact that it’s being connected via an internet connection so that’s the piece that I think is kind of important to understand espec especially in a network file system you really want to make sure that you are unmounting that file system all right so some sample commands here so pseudo umount Dev stb1 pseudo umount and then the mount location itself so this would be the device name this would be the mount location um and this is the network file system this is a USB drive right so you mount and then whatever the name of it is inside of the the file system or the path of the network file system and that’s basically it it’s very very simple and so in summary for this particular section we want to flush all of our buffers you want to maintain Integrity you want to prevent any conflicts to close all the file handles and any processes um if you unmount correctly you help Safeguard the data and maintain the reliability of the file system and you always want to unmount before physically disconnecting USB drive or network shares to just make sure all the Integrity of the data is preserved and you don’t have any conflicts and now that we understand the mounting and unmounting and the importance of those two actions we want to talk about the actual management of the Diss and the various partitioning tools so Fisk the fixed dis is one of the tools that you’re going to use to create partitions and modify them or delete them so this is a command line utility that’s used to create modify or delete partitions and so uh you run it with pseudo and then you run f disk and then go into whatever the individual dis is that you want to partition so you would have to run pseudo f disk and the location of the actual physical drive and the physical file system or the physical disc that you’re going to be opening for partition and this could be done with a USB drive as well so this above Command right here it opens this particular dis for partitioning and then you can replace this with any device that you want to open for partitioning um a common command that you can run with it would be the print partitions command so it would be just the f disk and then p as the option which prints the current partition table showing all the existing partitions on the disk and we ran something very similar to this to find out what our partitions were earlier as we were installing Linux so it would be P for partition list right or print the partitions excuse me um you have n to create a new Partition so creating the partition you’ll be prompted to specify whether you want a primary or extended partition and the partition starting and ending sectors and then you have the usage for this which is going to be n right here so choose P for primary or E for extended which would be combined with the N uh command and then you can specify the partition number starting sector and ending sector or size and all of that will go into when we actually run these things practically I also think I have a couple of examples commands as we go through this as well so um deleting a partition would be done with the D command so deletes an existing partition you’ll be prompted to specify the partition number to delete and then specify the partition number to delete using the D command uh you can write changes so once you’ve made the changes you need to write them so you can enforce them so anything uh that is made all the changes to the dis uh that are made before you exit you have to write the changes otherwise they’re not going to be saved so you could be doing all the work creating partitions doing everything that you’ve done unless you actually write everything that you just did it’s not going to save when you exit so that’s the big piece that you got to keep in mind whatever edits you’re making deleting modifying adding anything that you’re making you need to use this W to make sure that it’s being written so that it saves it um you can set a partition as a bootable by using the a command with f disk which means that the partition will active uh will activate for boot purposes meaning on Startup when you start the partition or when you start the computer that you’re running that specific partition is going to be added to your list of bootable partitions meaning it’s going to go to the the fs tab uh configuration file so that’s what it means when you make something bootable so here’s our F example workflow with f dis so you open the dis using the f disk and then whatever the path is that you want to partition you partition uh or you print the partitions for help so P enter right so cuz you’ve opened it and you’re inside of the mode where you’re now interacting with Fisk you press p and then enter um you press n enter and then P for primary after you pressed n you are saying that you want to create a new Partition you would then enter either P or E so P for primary or E for an extended partition and then specify the partition number starting sector Etc and then you write the change is meaning you press W enter and then you can exit F dis safely because all of your work that you’ve done would be save lsblk so you should be familiar with ls because we already talked about LS inside of our introduction to the command line BLK would be the block devices so you’re doing lsblk to list the block devices um it’s displaying the information about all of the available block devices which are basically our partitions right the discs and the partitions in a tree like format and it’s a clear overview of what you have on that system as far as the storage configuration the device name the types the sizes the mount locations the amount points and every other piece of data uh that would be relevant to knowing about what your disk structure looks like and what your partitions look like the basic usage is you literally just press lsblk and you press enter and you see a tree format of what everything is on your computer and this is what the sample output looks like for list blocks devices so you have the name MCH Min RM size Ro O type and amount point so in this particular case we would have the first physical disc and then it has three partitions and then you have the second disc and it has one partition and then we can actually go and look at uh the various uh columns right here and what each one of them mean but for the most part you can try to understand what it is right so the very first line the type is that it’s an actual dis and then one two and three are the partitions of that disc and then you have another disc and you have a partition of that disc you have the mount point locations for each one of them uh this one right here is a swap space as you can see right here the size of them are going to all be listed here as well but just to give you a good idea of what all of these columns stand for uh we can go and look at our handy dandy AI assistant here so we have the common fields for the lsblk output so the name would just be the device name as we’ve already established the m and Min is the main major and minor device numbers in this particular case 80 or 81 uh the RM is then indicating whether it’s removable and for the most part if it is if it does have it that means it is a removable uh partition so zero would mean that it’s non- removable one means that it is removable the size would be the size of the device the r o indicating whether it’s read only so zero would be its read and write one would be its read only the type so dis part partition or ROM which is readon memory or swap as we just saw U Mount point would just be the path the path that has been mounted on the fs type would be the file system type The UU ID would be the universally unique identifier and then the label that has been attached as if it’s a backup or a data or so on and so forth so these are the individual uh fields that we have right here and we actually didn’t even have the label or anything like that so uh what we do see in this particular example is the the mag Min right here we have the removable so these ones are not removable this one because it is an external it is removable you have the sizes of this and then you have the the read only which means these are not read only um and then you have uh dis partition dis partition the mount point would be swap so on and so forth so that’s what we got that’s the output example and the breakdown of it so in the example that we saw with the AI there was the type label and uui and that would be done with the lsbl k-f so that it gives you the full I believe that’s what the f would stand for so it gives you the full display of all the block devices along with all the information like the type label and uuid and the output for that actually looks like this so it removes a few of the other pieces that we saw so the readon or the the swap location or the swap type for example those things we see that they’ve been removed from this particular location or from this particular output but now now we have in its place we have the UI uuid we have the label and the mountain point is also still there uh the fs type is still there as well and here’s a quick little screenshot just in case you want this so if you want to pause it to be able to write this down or if you want to screenshot this you have one two 3 seconds and we are moving on if you’re looking for specific data to be printed onto the screen you can actually use the dash o uh flag or argument or option to be able to list what you want this has to be all in caps lock and then you you need to know the actual name itself of the column that you want to print onto the screen so in this particular case it would print the name of it the size of it the fs type and the mountain Point location and it you can just customize your output in whatever way that you want if you do the dasd option it’ll display the information about the whole dis only excluding the partitions of the dis meaning that uh you have the dis right here so this is the disk and then these are the partitions of the disk so these will be removed if you use the DD option you will only see the diss themselves and so this is a quick little summary so lsblk provides the detail tree view of the devices with the F option it’ll include the file system information it is customizable so you can actually use uh the- o to be able to view whatever you want to actually view on the output and yeah that is the list block devices mkfs very similar to MK dur is a making of a file system so you can make file systems it’s used to format a partition with a specified file system type and you can use it with the mkfs so and very similar to what it looks like in Python structures you would use the dot to uh declare what type of file system you want to create so you would do pseudo mkfs do xt4 and then on this particular disk so you can see that uh this is the obviously the file system type that you want to create and this will be the the partition which is on the SDA dis on the first position and it’s being created as an xt4 file system uh the xfs file system is a high performance file system known for robustness da d da so you can do pseudo mefs uh xfs so pseudo mkfs do xfs and you can now create an xfs file system same thing with the fat 32 uh in this particular case you would actually need to say it’s a v fat type of a file system I love saying that the V fat type of a file system and then you do a-h capital F and then say that it’s a 32 extension of it so these are the older ones that are typically used for USB drives and things like that and they are widely uh supported meaning that you can use them on Windows as well as Mac OS and so on and so forth um but they’re typically limited to the amount of space that they can tolerate which is 2 terabytes as we discussed earlier in the training so uh this is specifically for USB drives for the most part or something that is maxed out at 2 tbytes um it is a little bit slower it’s a little bit older so that part of it you should already know about but if you want to create it instead of saying fat 32 on the dot afterwards you would say vat and then you would go- F32 and then the rest of it stays the same NTFS would be the new technology file system that is a Windows uh ingrained or intuitive to Windows and uh this is for advanced features like journaling support for large files formatting and partition with this can be useful for compatibility with Windows and you would say make FSS make fs. NTFS and then give the location that you wanted to do it so this is our example workflow so you want to First identify the partition so you would use your list block devices or Fisk list to list whatever block devices you got so for example lsblk would just be the you type it out you press enter and it gives you the list and then you choose the appropriate m mkfs m uh the make FS command based on the desired file system type so if you want to do xt4 you would say mkfs do xt4 at this particular partition and so again so keep this in mind right so what if you’ve create you’ve identified the partition that you want using the lsblk now you want to create a file system on the partition that you’ve uh found or you’ve design designated declared right from that that file system you’re going to create or from that partition excuse me from that partition you’re going to create the file system that’s going to be mounted onto it and after that’s done you can verify the file system type using the lsblk DF command and press enter and then you’ll verify what you got onto that file system so in summary the make FS the mkfs is used to format partitions with different file systems um you can uh use file system types like xt4 xfs fat 32 NTFS Etc um and then you just need to choose what you want based on the compatibility um there’s something called the dis utility and so just to compare it to uh something that would be on Mac OS for example there’s something called the Disk Utility tool that will do this for you with a gue type of an environment so you connect the USB drive and or an external drive whatever it is um and then you say that you want to reformat you go to the dis utility you select the USB drive that has just been connected to your device and then you go to format and then you choose the formatting option that you want and it would be xt4 xfs whatever is available for that specific drive and then you uh finalize it right so this is what this is doing uh it’s looking at whatever that connection is whatever that USB drive or external drive or disk is it’s going to look at that and then once you know exactly where it is what is mounted on as what its name is so on and so forth you then use pseudo Mech fs and then you reformat it right you format that drive to be one of these types of file systems and to completely be like very brutally honest and just declare like really really note you you know what I mean like disclose this for you uh this is going to wipe the file system and most in most environments in most cases it’s going to wipe everything that’s on that drive so when you format a USB drive it’s going to clean it out it’s going to delete everything that’s on there uh because it needs to reformat the thing so you need to make sure that if there’s anything on that dis that you want to be backed up you got to back it up first before you do this command because it is going to wipe the file system it’s going to wipe the current formatting of that USB drive or that disc and most likely you’re going to lose whatever is on there so just keep that in mind right if it’s not empty if it’s not a brand new USB or external drive that you’re trying to change or if it’s not a brand new disc that you’ve installed if it’s not one of those things and it’s already empty you need to back up whatever needs to be backed up before you run this because it’s going to wipe it fsck for file system check so this is what actually is ran um from that uh the fs tab file when we declared what we wanted it to run on boot and we were looking at the various partitions and discs that were going to be launched on on boot the very last option was do you want to pass or not and we were going to say yeah I do want you to pass or I don’t want you to pass which means you’re going to check and run FS check on it so it’s the file system consistency check that’s basically what it stands for and it detects and repairs any file system issues and you should pretty much use it so obviously if it’s on the the fs tab configuration file it’s going to give you the option of running it on boot so it’ll run the check of that whatever file system that’s been mounted as soon as you boot up your computer um but if you haven’t shut down the computer properly or if it crashed or something and you just want to make sure that uh nothing has been lost when you reboot it you will run FS check to just make sure that the file system is still all good uh to identify any kind of issues if there are any issues hopefully there aren’t any issues but sometimes there’s an improper shutdown you lose power or the system crashes for whatever reason so that’s all good if you manually reboot or shut down the system without properly unmounting your file system that would be another reason to run FS check on it to just make sure that it’s all good any kind of an error that happens so if there’s a boot failure for example and you start up your computer and for whatever reason it doesn’t boot that specific file system you run FS check to try to diagnose what just happened and why it didn’t Mount or why it didn’t uh boot it um same thing for mounting so if you can’t boot it or if you can’t mount it um then you run FS check to see what is going on with that particular uh partition and resolve any kind of underlying issues because you need you need to understand that you can connected right so it can be connected to the computer but it won’t be mounted and that is a very uh nuanced difference so you can have it be physically connected but it may not necessarily be mounted and so if it’s not mounted you need to find out why it’s not mounting then we have periodic maintenance so just preventative checks right so to just make sure that uh it’s all good and uh there’s nothing wrong with it you just run routine maintenance um if there’s any kind of an update or a health issue or any kind of a minor issue you can catch that before a major issue comes into play and before there’s a crash or before you lose any data and then there’s schedule check so many systems are actually configured to run this automatically at boot like we already talked about after a certain number of reboots or Mount operations um you can write scripts to do it for you every week or something or every month just to make sure your amount uh points and your file systems are all good so uh it’s better to do it regularly instead of waiting for some kind of a crash to happen or some kind of error to come up so that if there is something going on you can catch it in advance and then you can fix it so running it at boot is as simple as making sure that the pass option has been turned on with your FS tab configuration file uh manual invocation would be to just run pseudo FS check on whatever that partition is or whatever that dis is and it’s as simple as just running pseudo FS check it’s really this part is not is not that complicated to explain um you can also have unmounted partitions that you want to check uh before um running to avoid any kind of potential data corruption so you can unmount the partition first and then run FS check on it to just make sure everything is all good and that’s another strategy that you can run to run FS check um there’s interactive mode that can actually prompt you to fix anything um within the interactive mode and you can use the flags to automate the process um so for example Dy will be automatically answering yes to all of the prompts that come up so do you want to automatically repair something you just do Dy and then it’ll go ahead and uh run the entire autocorrect for you or the automatic repair for you uh without you constantly having to say yes yes yes so it can be opened in Interactive mode for the repair of any file system if it needs to be file repaired or any partition that needs to be repaired and then if you just attach that- y it’ll do everything automatically so as a summary you have any proper shutdown or file system error or any periodic maintenance that may be required that to run FS check on it and it just makes sure that the file system remains consistent uh if there’s any data loss you can be preventing it or catch it in advance if there is mainten maintenance that needs needs to be done um making sure that the system just runs smoothly all the time without uh risking the loss of any data it’s very very important um as an extra reminder just make sure that you back up the important Data before running FS check because sometimes through the uh through the repair process you may actually lose certain data because if there’s something with that file system that has been uh corrupted or if there’s malicious data or some kind of a malware or something that’s been installed on it uh you most likely are going to uh in the process of wiping that malware you’re going to lose other data that may be important to you so you want to make sure that you run backups uh or save the important files before you run FS check just in case it wipes certain things as an attempt to repair your file system which brings us to the configuration and management of the swap space so um we’ve kind have gone over this so we’ll just re-review this cuz this actually was a little bit of a concept for me to wrap my head around as well so it’s virtual memory so the swap is virtual memory on your hard drive that’s used when physical processing power is maxed out right so your RAM is technically part of the processing power of your computer so you’ll you know you’ll hear people like computer nerds you’ll hear computer nerds be like oh I got a 64 gab RAM on my computer there was literally somebody that actually commented on the channel that they were like yeah I remember my first computer had 24 megabytes of RAM and then now I have a 64 gigb of ram I’m like holy crap dude 24 megabytes like you know the system is old when you’re measuring the Ram with megabytes instead of gigabytes so you’ll have these nerds that really really compete over the size of their ram my Ram is bigger than yours kind of a thing and it’s mainly because it helps run things much much faster and usually in modern computers if they have 64 GB of RAM or 128 GB of RAM if they have that much RAM you’re most likely not going to worry about swap space but if it’s limited so if you have 4 GB of RAM or if you have 8 GB of RAM or something like that the swap space is very important because it’s going to serve as virtual memory to save uh life processes so that you don’t lose anything especially when you put the system into hibernation or it goes into sleep or something and you want to turn it back on and pick up where you left off all of that data is either inside of the ram the random access memory or it’s inside of the swap space so the swap is a buffer to prevent out of memory errors meaning that the system can’t run because the physical memory has been maxed out and so it’ll take whatever is being uh it’s kind of over the threshold of the physical RAM it’ll hold on to that um by offloading the inactive processes from the ram so if you have too many things open and you’re actively using something the ram processing power is going to be dedicated to what you’re actually using and everything else that’s in the background is going to go into your swap space if you want to create a swap partition you can create that swap partition using the Fisk command so you can create a partition uh simply by just opening up whatever it is that you’re trying to open up and then you would create a swipe uh swap type of a partition so uh a dis partitioning tool which is f disk you’re going to uh use it uh on the specific location so in this particular case it’s sdb as you can notice so it’s sdb which is going to be our external or secondary dis and it’s going to be where the swap partition is going to be created you can replace it with whatever identifier that you want to use and then you actually go through the process as you interact with Fisk to create the partition right so you would open up f disk on that location press n to create a new Partition press P to create a primary partition and the partition number for example would be two and then you accept all the default uh first sectors to accept the default last sector and then you have to change the partition type so this is the part right here where you change the partition type to swap you press t for swap I don’t know why it’s t maybe it’s temporary that’s what stands for maybe and then you press 82 which is the Linux swap number and then that’s it and you press enter and then after all of that is done you press W and press enter to write all of the changes to the disk and then exit f disk to make sure all the work that you did is going to be saved so that’s how you create it right so kind of review that cuz I’m not going to keep repeating myself I sometimes I keep forgetting that I’m doing a recording and then I am I beat something to death that’s like a bad phrase uh you know beat a dead horse or something whatever the phrase is I just keep repeating myself because I want to make sure that you get it but then I’m like oh you know what they could technically just rewind this and go replay it over and over again so my bad I’ve gotten comments from people that are like did you have to talk about that thing as long as you did and I’m like yeah well I just want to make sure that people get it so I try to say it in different ways so that it connects excuse me for trying to help you learn Jesus God I’m I’m having a conversation by myself in my room as I’m recording just just so you know okay moving on so now you need to format that partition as a swap space so now that you have that specific disc that you did everything with Fisk now you turn it into a swap Space by using the MK swap make swap command and you format it as a partition um you it’s very similar that we already have this understanding so we’re going to move on um then you turn it on right so you’ve you’ve used Fisk you’ve created that partition then you use me swap to turn it into a swap partition and then you use swap on to actually turn it on as the swap partition and very simple I’m I’m not going to keep repeating all of these things because the instructions are meant to be redundant um but here I’ll just leave this on in case you want to screenshot it 1 2 3 moving on and so verifying the swap space you just go show you use the D- show option with swap on to just make sure that it’s actually been created as a swap space and it’s actually turned on and it’s running as smoothly as it is so it’ll be the active swap spaces that are viewed when you run the swap on command with the show option so creating a swap file is similar to having a swap partition so creating a swap file to turn a swap file or to create a swap file it would be done with the F allocate and then you use the dash l so don’t confuse this with a one right so pseudo F allocate dasl and then 1 Gigabyte is going to be allocated to wherever the swap file path is right so you have a swap file instead of a swap partition um the F allocate allocates this uh space for that file the dash L 1G would be the limit right so you’re doing a 1 gigabyte uh limit for this particular file location and then you have the swap file which will be the path to whatever the swap file is and then you do chod 600 so you change the mode the permission of it uh to that swap file to set the file permission to read and write only for whoever the owner is and then that should allow it to actually read and write as necessary and then you would turn it into a swap so this part is pretty much exactly the same as what we did with the swap partition which in this particular case we’re just making swap uh the actual swap file path and then you would turn it on right so swap on for that swap file and then of course once it’s been turned on you just want to make sure that it is active and it’s running so you would do swap on– show so pseudo swap on– show and it’ll show you whether or not that specific swap file has been activated the last step with your swap partition or swap file would be to make sure that it actually loads every time you boot your computer right so you need to add it to your ety FS tab file as we’ve discussed uh so far so you need to configure the actual ET CFS tab file uh we can do it with our trusty Nano text editor by just opening up the ET CFS tab with Nano of course you would need to do it with a pseudo permission so you can actually write to it and save it um then you would uh add whatever the swap partition is uh in that particular FS tab according to the formatting that we’ve talked about so far so you would provide the name and then the location and then the type of the partition which would be Swap and then whether or not you want it to be dumped which is no you don’t want it to be dumped whether or not you want it to be passed um in the fs check when you reboot and you don’t want it to do that either because it’s going to be wiped every single time that the computer is rebooted anyways that’s the whole purpose of the swap partition it’s not going to store any memory or any kind of data on it because every time it gets rebooted it just gets deleted so that’s the whole purpose about this so you don’t need to dump it and you don’t need to check it with FS check when it gets started on but you do need to provide the name you need to provide the path and then you need to provide uh what type of partition it actually is which is going to be swap or what type of file system so this is the piece for the file system and so on and so forth so this is how it looks uh notice how all of these things are exactly the same with the exception of whether or not it’s a swap file or a swap partition and even this looks very similar right you’re just giving it the path to the partition or you’re giving it the path to the swap file that’s basically it and this is the explanation of what we just looked at right so you can screenshot this one 2 three so the first portion was the swap partition itself um it’s not going to be mounted onto anything because it is a swap partition it is the swap space and then s SW for the Swap and those are the options that you got and then so once you you have written everything into the fs tab file inside of Nano you’re going to save the changes doing crol o press enter and then controll X to exit out and then you can move on in summary creating and configuring swap space whether as a partition or a file is essential for maintaining system performance by following these steps you can ensure that your system has adequate swap space available and it’s probably a good idea to actually have this uh whether or not you have a massive amount of RAM installed on the computer um the Mac OS whether it gets uh you know 16 GB 32 GB whatever the the actual Ram is or Windows whether it has all of that massive amounts of ram it still has swap space so it’s probably a good idea if you’re going to be a Linux administrator and you’re going to use the type of interface that doesn’t have a GU or it doesn’t come preconfigured with with these types of things it’s probably a good idea for you to make sure that there is swap space that’s been configured and if it hasn’t been configured you go ahead and configure it the way that we just talked about and of course we’re going to review all of this stuff when we go into the Practical section and this is your little cheat sheet so if you want to create a swap partition you can create it using FS disk or f disk excuse me you can create f disk and then you have the creating of the partition then you format it to become a swap space and then you turn it on using swap on and then same thing F allocate L1 GB to the swap file pseudo chod the swap file and then make it a swap file and then turn it on as a swap so once you’ve created the swap space now you got to manage the swap space um the swap space usage and ensuring that the configuration persists across all of your reboots and restarts of the computer is very important for system administration these are the detailed steps that you got to do to check the usage so checking swap usage you would go swap on Das s excuse me swap on- S and it displays the summary of the swap space usage listing all of the active swap areas and this is the example output that you have over here so you would have the file name swap file and then you have the dev sdb2 which is the partition for the Swap and then these are the sizes that they have and then for the swap file 2,000 uh kilobytes has been used and it has a priority of minus two and then this has a priority of minus one and it hasn’t been used at all as you can see over here because it doesn’t need to you know for whatever the situation is this is 1 GB worth of space so it seems to be fine this is just a breakdown of the fields that we just looked at so the path to the swap file the type of file that it is or the type of partition that it is um the total size of it the used amount of it and a priority of the swap space so lower numbers mean that it’s a higher priority and the higher numbers mean that it’s a lower priority uh which is again I guess it makes sense right so number one would be a higher priority than number two um so that is the breakdown of these fields another way that you can check the usage would be using the free command so free- provides a human readable format of memory and swap usage and this is what the output would look like so you have the memory itself and then you have this swap space or swap partition swap file whatever whatever that allocation is when you’ve created your swap partitions or swap spaces um the total amount of memory and then the total amount of Swap and then the used amount of memory and the used amount of swap how much you have free whether it’s a shared portion or if it has any shared portions and then the buff cache as we talked about the buffer and the cache and then the available that’s going on with it so if you look at the the stuff that is sitting inside of the shared portion of this memory as well as the stuff that’s sitting inside of the buffer and the cash egg these are the things that we were talking about when you’re talking about unmounting to make sure that this 5 GB of data isn’t lost so you want to make sure that you properly unmount or you properly shut down whatever the system is or whatever the partition is so that you don’t lose this data because out of the 15 gigabyt losing 5 gabt of data would be catastrophic because it represents a large amount of data on this particular system so free shows you the free space the free memory as well as the free swap space that is available on your computer and these are the breakdowns of the fields so you have the total amount of memory you have the used amount of memory the free amount of memory the shared memory usage by the temp uh FS the shared memory that’s available to the temp file system you have the buff and the cache the buffering and the cach a the memory that’s used by the kernel buffers and Page cache and of course anything that’s available um after all of these things are considered right so after this is considered after the shared and the buffering and C cache is also considered after all of that is considered this is the final available amount of space that is available on that individual partition or disk and this is how we look at the permanent swap configuration so uh to make sure that it’s available after the system is rebooted you have to add it to the fs tab right so this file contains information about this partition so on and so forth um so where are we at I feel like I accidentally clicked something um so there we go so to be able to edit the fs tab file we’re going to use pseudo and Nano and then we’re going to go inside of it and just make sure that the swap partition is designed as it is so we’ve already talked about this this is just part of the permanent swap configurations as we’ve discussed and you should already know what all of these things stand for so I’m not going to explain this again uh you can do a one two three screenshot or pause it or take it down so on so forth and we’re going to move on so add the swap entry to it would be as a swap file same exact concept uh the breakdown is exactly the same so again I’m not going to say this this just redundancy so that you understand that these actions fall into different categories and so managing swap space or creating swap partitions both have a permanent feature and both of those features are inside of the fs tab configuration file that is inside of the Etsy FS tab location and then you save and exit because you’re inside of Nano so you just got to make sure that you save it and even when you try to exit without saving it’ll prompt you to whether or not you want to save it and you just press Y and press enter and I’ll save it and make sure that all of your changes have been saved to that document um activating it is exactly the same way as doing what we did before so pseudo swap on and a would be the activating all of the swap entries inside of the fs tab so you can do pseudo swap on and then give the path or the location or the the the identity of the swap space itself or you can just do- a to just make sure all of your swap configurations have been activated inside the fs Tab and then you just do das Das show to show you uh what the status of everything is and whether or not they’re actually active and correctly configured so in summary we’re going to monitor and configure swap space to make sure that the system can handle anything that’s memory intensive and remains stable under a heavy load which typically if it’s a high traffic environment if there are a lot of users that would be necessary so even if you have a massive amount of physical RAM you do want to have a good amount of swap space as well because you have a lot of data that’s being processed by a lot of different users and is your little cheat sheet so to check the swap spice using swapon you can do swap on- S that will list all the active swap areas and then you can do free- that’ll do a human readable summary of the memory and the swap usage and then if you want to make permanent edits you would do it inside of the fs tab configuration for reboots all the time so that it just loads every single time and then you can make sure that you have swap on- a so that it activates all of the swap entries that are inside of the fs tab file all right real quick let’s go into process and service management so you got to understand the difference between processes Damons and services okay a process is an instance of a program that’s running in memory uh each process has its own P ID its your own process ID and there’s a parent ID which is a PP ID so a parent process ID uh processes can be in a lot of various States or I guess three various States uh it could be running sleeping and zombie States so it’s a program it’s an instance of a program that’s running in memory and it has a p and a parent ID and it can run in various States including running sleeping and zombie States a Damon are background processes they’re running without an interactive user so the it’s basically Al what’s running behind the scenes in order for your machine to operate the way that it does um and it’s starts at boot and it continues to run while the uh the computer is on so that all of the operating system functions can actually run the way that they need to uh so for example a web server Damon like the HTTP D so the d stands for Damon um and anything that ends with with the D so you have the secure shell Damon or you have the cron Damon these are all considered the background processes that are attached to each of one of these individual processes so SSH process or the HTTP process so on and so forth okay and then you have a service uh service are the higher level concept meaning that they group one or more Damons together and that provides a specific functionality so the httpd service runs the Apachi HTTP server Damon right so the httpd service runs the Apachi HTTP okay so that’s the thing to understand so the service itself is a combination of a few Damons or at least one or more Damons that provide a specific functionality and they’re typically managed with system M D or CIS vinet as we talked about earlier these are our initialization processes and for the most part it’s probably going to be systemd on all of the modern computers in Linux cisv it is a little bit of a legacy um and it just depends on the distribution of Linux that you have and the version of Linux that you have so uh you have processes you have Damons and then you have Services okay these would be the commands that would manage the processes so if you want to view the list of processes you would just type PS and press enter that’s just by itself will actually show you the snapshot of all of the current processes if you do psox so PSA it shows all the processes that are running on the system with their details like their pids the user that is running it the CPU usage and the memory usage that it’s processing or that is taking up the the power that is taking up and then you have ps- EF which will display all the processes with the additional details like the parents process ID and the full command line the full and these are this is like where you a lot of these things are actually very much used inside of uh security analysis and incident response and the uh pen testing exercises that we run and the command line that is executed to launch that process can either be done by the system or it can be done by the parent ID the parent process that’s running that individual process or it can be done by a user so when a user clicks on something it actually processes a command in the background and that command has a command line entry so even if you double click on something to open it there’s actually a command line entry that’s running in the background and that is what’s launching that process so everything whether or not you use the command line and everything has a full command line entry associated with it and typically it would for a lot of people that can’t read this stuff it’s mostly jargon but uh in a lot of instances it’s the uh individual command that’s associated with it and the path of the binary that is attached to that process which is launching and actually running so remember all of these things have binaries or system binaries that are assoc associated with them and each of one of those system binaries is housed inside of the bin or sbin uh directories inside of our file system okay so keep all of that in mind so uh you don’t necessarily need to know much about this stuff uh you need to know the details that are presented and then as we go through the Practical portions of this training series we’ll start looking at a lot of these things in Greater detail and we’ll run a lot of the common options that come with PS and looking at the various processes so you can see see what all of that looks like when it’s displayed onto the terminal so that you can have a better understanding and just really kind of get that into your system into your uh your personal system as the person that’s watching this not your computer system okay moving on um so we have realtime process monitoring that happens with top and htop and top is typically what’s available on all Linux systems it’s actually also available on Mac Mac OS because Mac OS has a Unix like uh type of an operating system that’s running in the background um it’s a dynamic display of everything that’s going on so top actually when you press it uh or when you type it in and you press enter it shows you uh everything that’s currently running and it actually changes uh their uh their line item uh positioning right so the order of everything that’s being presented onto the screen changes in real time because something may be coming to the Forefront something may be using more processing power or CPU or memory and you can get a good I idea of what specific process is using up how much of your memory in real time and this is one of the things that you would look at to see uh if there is something that’s running that you don’t recognize and if you need to uh kill it right so uh the apart from the list of processes that are running which we saw with PS top shows you the the real time Dynamic view by usage right so it it’ll typically show you what’s currently running that list changes in real time and it’ll show it’ll show you what CPU and memory it’s using um you can press Q to quit or k to kill a process and R to renis which means to adjust the priority of the various processes htop if it’s installed it’s essentially top but it has a userfriendly interface because top is literally command line and it’s just lines of entries uh on a black screen and if you don’t know what you’re looking at it can be kind of overwhelming so htop is the userfriendly interface it’s like uh it’s a visual uh visually pleasing version of top that you can run and it’ll still show you real-time monitoring of all the processes that are running there’s colorcoded information and a better navigation interface so that you can navigate better and uh according to the color coding that’s done you can prioritize things better so top again is just a black screen with a bunch of white lines of data on on top of it htop is more user friendly it has color coding available so on and so forth once you’ve established a process that needs to be killed for example if you notice something that might be Shady or that might be taking up too much CPU or memory usage you can kill it with either kill or pkill for process kill and kill is a very simple uh command so you say kill and then you provide the P ID that you want it to kill and it sends a signal to the process ID and it just kills it um kill Das 9 PID sends the signal kill to forcefully terminate the process if it’s having uh if it’s taking too long to uh terminate or uh for whatever reason it might be slowing down something uh so it’s a forceful termination uh very similar to what happens in the task manager inside of Windows where you want to close something but it won’t close so you open up the task manager task manager and then you force quit that individual process that’s running and it just no matter what’s going on it’ll just crash and kill the process and then pill allows you to kill it by its name so kill requires the process ID pill can kill it by the process name and then at the same time you can also terminate all instances of a specified process by doing a kill all command and it requires pseo pseudo permission and then you do pseudo kill all and give it the process name so for example in this case let’s say you have you know 10 chrome windows open that’s kind of what my computer is like all the time I have uh different Google Google accounts Gmail accounts that are dedicated to different parts of my life and so for each one of those Google accounts there’s a chrome window that’s open and sometimes it can be overwhelming and sometimes you kind of you kind of you might want to close Chrome and general all together and then just start from scratch and open up a brand new Chrome window so when you do that you for me in Mac OS I can just right click on the Chrome logo at the bottom of my screen and then quit and then it’ll close all all of those instances of chrome that I have but when you’re inside of the command line and you don’t get the option of right clicking then you would just see okay there’s you know there’s 10 instances of this particular process and I want to close it because I want to free up CPU usage or I don’t know what it is I don’t recognize it it seems like it might be spamware or something like that so what I want to do is I just want to kill all instances of this process so then you’ll do pseudo kill all and then you would give it the process name and it’ll kill all of those processes and free up whatever memory or CPU usage that those things are currently using and as we manage processes we also need to learn how to manage services so managing Services happens with system CTL and we’ve actually already gone through this a little bit earlier um and system CTL is one of the big things that comes with systemd um which is the more uh modern version of the initial the init process for uh Linux and it’s a primary command for managing these services in that environment so uh starting or stopping a service is pseudo system CTL start the service or system CTL stop the service very simple enabling or disabling it is very much the same so pseudo system CTL enable or disable the service if you want to check the status of it it will be system CTL status of the service so it’ll show you whether or not it’s active and any logs that would be associated with the recent activity for it and then restarting or re reloading it would be say same restart the service or reload the service so it’s very intuitive I love the Syntax for this particular command because if you want to start something you literally just type start if you want to stop it you just type stop so it’s very very intuitive actually this is probably one of my favorite commands when it comes down to everything that we’re running cuz the syntax is just real language it’s real words that you’re using so this is kind of an easy one to remember and to deal with but uh system CTL manages Services right PS manages processes system CTL manages services so keep these things in mind these are the types of things that you need to kind of internalize for yourself as you move forward so when you want to manage a service you use system CTL now the service command is used in systems that have CIS vinet so CIS vinet is the older version of system d right so we look at this right here system D is in the modern distributions of Linux CIS vinet is in the older versions of Linux or the older distribution and it’s fairly similar to what you went through with system CTL except the syntax is a little bit different so you do pseudo service the N the name of the service and start or stop or get the status or restart it so these are the basic commands that would come with CIS vinet now what I’m going to be doing uh in the Practical portion of our exercises are not going to be using the CIS vinet commands we’re going to be using system CTL commands because we’re installing a current version of Linux or the most upto-date version of Linux because I don’t want any security vulnerabilities to be uh loaded on my computer as I’m going through all the exercises so I’m going to use the most recent version that I’m going to get from the Linux website so we’re going to end up using systemctl but these are just the series of the commands that you would get for CIS vinet and then there’s a series of commands that are also available inside of the Google document that I’ve created for the notes for this course and then if all else fails you can go to something like gemini or chat GPT and you say I’m running a system that has CIS Vin it as the service uh Management Service and what you’re going to go through is you know I need to do X Y and Z within this computer what are the commands that you would need I would need to run and then it would tell you what you got to do but the the main things to remember are that CIS vinet is for older versions or older distributions that run uh services and you would need to manage them as such and then systemd comes with the modern versions and the modern distributions of Linux and then we have job scheduling and KRON jobs are more so uh repeated tasks that you need to schedule and then the at command is used for a singular command that’s running uh for that one time so if you want to do anything that’s recurring you would do it with the Kon or the KRON jobs which uh essentially just handles all of the recurring scheduled tasks for you so if you want to edit the user’s Kon tab so KRON jobs are defined in the Chron tab files and then when you open up somebody’s Chron tab file you’ll see something that is in this kind of a format and that it has these asterisks that represent the minute hour day of the month month and day of the week so this would be the minute hour uh month itself or yeah minute hour day of the month sorry so minute hour day of the month the month and then the day of the week so in this particular case right what we have over here we have not uh it doesn’t need to run every minute but it needs to run every 5 hours or at 500 a.m. so my bad so this is the uh hour itself which is running the uh fifth hour of the day so it needs to run at 5:00 on that day and then it’s going to run every Monday because Monday is the first day of the week so 5:00 a.m. every single day uh doesn’t matter day of the month is empty doesn’t matter the month that part’s empty where you’re going to do it every Monday so it’s being run Weekly right so this is an example of this now there are a lot of great editors that are available online that if you want to modify something if you want a job to run at a specific time or day or whatever you can go to that editor and you say that this is the path to the job that I want to run and I want to run it at this time of this day or this month or whatever it is and it’ll just create this version this format of the command for you so it looks like this but I mean this isn’t really complicated to understand so I feel like you should be able to wrap your head around this so the first day of the week is represented by uh one and in this particular case it’s not Sunday Monday the first day of the week would be Monday and then the first hour would be 1:00 a.m. and then 2: a.m. 3:00 a.m. so 5 would represent 5 a.m. and the uh day of the month itself would be the first day of the month or the 2nd or the third and I think it’ll go up to 28 because we do have limitations for February so it’ll go all the way up to 28 and then you have the month itself so it would be the first month of the year which would be January the second month so on and so forth so you can look at all of that by going to Chron tab edit Chron tab e to look at whatever user that you’re logged in um to be able to modify those KRON jobs those specific schedule tasks if you want to look at all of these schedule tasks you can instead of opening the document itself you can just do KRON tab DL and you can list all of the KRON jobs the schedule tasks that are available for the user that you’re logged in on so this is recurring jobs with KRON now if you have a one-time job you can schedule that with at so for example you would say Echo the command which is it’s technically just running uh Echo and it’s going to print command onto the screen do a pipe and then do it at the time right so you the time could be a specific hour or relative time for example it could be at now plus 5 minutes or at now plus 5 hours an example of this could be Echo the path to this script right here it could be this specific thing I want you to Echo this meaning just print it print this path and then you pipe it so you take the output of this result that’s what piping does uh you take this result the output of this gets piped into this particular command meaning that at 10:00 a.m. it’s going to Echo this piece right here and that’s what at does so it will uh it’ll run something one time for you if you needed to run daily or more than once you would do it with Chron jobs if you’re just trying to run it once you can run it with the at command you can look at the scheduled jobs for at with atq and you can remove them with ATR r m and then the job number itself so you would do atq and it will bring you all of the jobs that have been scheduled with at and then you will get the job number with each job that’s been scheduled and if you need to remove anyone you just do atrm at remove and then do the job number and then just like that you can remove the scheduled task with at this training series is sponsored by hackaholic Anonymous to get the supporting materials for this series like the 900 page slideshow the 200 Page page notes document and all of the pre-made shell scripts consider joining the agent tier of hackolo anonymous you’ll also get monthly python automations exclusive content and direct access to me via Discord join hack alic Anonymous today
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
The provided excerpt appears to be from the first book in the “Seven Sisters” series. The narrative follows intertwined storylines, one set in the historical past, and the other in the present day. The historical portion involves characters navigating love and societal expectations in Mobile, Alabama, in 1850. The contemporary storyline introduces a character named Carrie Jo, who is seemingly investigating the history and mysteries surrounding the Seven Sisters. Throughout both narratives, characters explore themes of family history, love, loss, and the secrets hidden within the old antebellum home known as Seven Sisters.
Seven Sisters (Seven Sisters Series Book 1): A Study Guide
Character Review
Carrie Jo Jardine: The protagonist of the modern-day narrative, struggling with personal and professional challenges.
Mia: Carrie Jo’s best friend, and something of a “researcher” whose current interest is the history and restoration of Seven Sisters.
Ashland Stuart: Wealthy and influential, deeply interested in the history of Seven Sisters and the Cottonwood family.
Bette: Carrie Jo’s new landlady.
William: Carrie Jo’s sort-of boyfriend.
Calpurnia Cottonwood: Central figure in the 1850 narrative, grappling with love, societal expectations, and a mysterious destiny.
Captain David Garrett: A steamboat captain involved with Calpurnia.
Muncie: Overseer at Seven Sisters in the 1850s.
Mr. Jeremiah Cottonwood: Calpurnia’s father and owner of Seven Sisters in the 1850s.
Plot Summary Outline
Prologue: Set in 1850, introduces Calpurnia and her romantic entanglement with Captain Garrett. It hints at her connection to the Seven Sisters estate and a tragic destiny.
Modern Day: Carrie Jo, seeking a fresh start, moves to Mobile, Alabama, and begins working on a historical restoration project at the Seven Sisters mansion.
Mysteries Unfold: Carrie Jo becomes entangled in the mysteries surrounding Seven Sisters, including the history of the Cottonwood family and potential paranormal activity.
Investigation and Romance: Carrie Jo investigates the estate’s past with the help of Mia and Ashland, developing feelings for Ashland.
Flashbacks and Dreams: Carrie Jo experiences vivid dreams and visions related to Calpurnia’s life in 1850.
Connecting the Past and Present: The story explores how the events of the past continue to influence the present, with Carrie Jo uncovering secrets that may connect her to the Cottonwood family and Seven Sisters.
Thematic Considerations
Southern Gothic: The novel incorporates elements of Southern Gothic literature, with its focus on decaying estates, dark secrets, and the influence of the past.
Romance and Betrayal: Relationships, both past and present, are tested by love, desire, and betrayal.
Family Secrets: The story explores the complexities of family history and the impact of long-hidden secrets on future generations.
Fate vs. Free Will: The characters grapple with the idea of destiny and whether they have the power to change their fate.
Historical Preservation: The modern narrative revolves around the restoration of Seven Sisters, highlighting the importance of preserving history and memory.
Quiz: Short Answer
Describe Calpurnia’s initial feelings for Captain David Garrett.
What is Carrie Jo’s initial motivation for moving to Mobile, Alabama?
What is Mia’s role in the Seven Sisters project?
How would you describe Ashland Stuart’s personality, based on the excerpts?
What is significant about the Cottonwood family’s history in relation to Seven Sisters?
What is the mood in the Prologue?
Why does Carrie Jo refer to her new job with Bette as a “gig”?
What did the doctor want from Carrie Jo?
What are some of the historical facts that Mia knows about the Seven Sisters?
What is a significant theme in the story?
Quiz: Answer Key
Calpurnia is initially captivated by Captain Garrett, drawn to his romantic words, promise of love, and escape from her expected life, yet she questions if she will no longer want her once she has him.
Carrie Jo is seeking a fresh start, leaving behind a difficult past relationship and professional struggles in Charleston. She wants a personal triumph.
Mia is a friend and helps to solve mysteries and research history surrounding the Cottonwood family, to aid Carrie Jo in her research.
Ashland Stuart is wealthy, charming, and deeply interested in the history of Seven Sisters, he’s also very handsome and charismatic to all who meet him.
The Cottonwood family were the original owners of Seven Sisters and their history is intertwined with the estate’s legacy, including secrets and possible paranormal events.
The mood in the Prologue is romantic and mysterious, hinting at both love and impending doom, and filled with desire.
Carrie Jo is a free spirit looking to get back on her feet, she enjoys the freedom of a once-in-a-lifetime gig and doesn’t want to be weighed down by obligations, she’s not ready for something personal.
The doctor was a lawyer, Matthews, who needed Carrie Jo to sign a confidentially agreement and needed her help with the work that was going to be done on the property at Seven Sisters.
Mia knows about the history of the Seven Sisters and can tell Carrie Jo the stories, she knows of the French who settled there and abandoned it for a time.
One significant theme is the intertwining of past and present, as the events and secrets of the Cottonwood family continue to affect the lives of the modern-day characters.
Essay Questions
Analyze the ways in which the author uses setting (both the 1850s and modern-day Mobile) to create a sense of mystery and foreshadowing.
Discuss the similarities and differences between Calpurnia and Carrie Jo. Are they connected in any way beyond their association with Seven Sisters?
Explore the role of romance in the novel. How does the pursuit of love both empower and endanger the characters?
Examine the elements of Southern Gothic present in the excerpt. How do these elements contribute to the overall themes of the story?
How does the author use dreams and visions to create suspense and reveal hidden truths about the past?
Glossary of Key Terms
Seven Sisters: The name of the antebellum mansion that serves as a central location and symbol in the novel.
Antebellum: Belonging to the period before the American Civil War (1861-1865).
Southern Gothic: A subgenre of Gothic literature that focuses on the American South, characterized by decaying settings, grotesque characters, and themes of social and racial injustice.
Supernatural: Events or phenomena that cannot be explained by natural law or scientific understanding.
Historical Fiction: A genre of fiction that is set in the past and incorporates historical details and events.
Prologue: An introductory section of a novel or play that provides context or background information.
Mausoleum: A building, especially a large and stately one, housing a tomb or tombs.
Steamboat: A boat that is propelled by a steam engine, especially one operating on rivers or lakes.
Heirloom: A valuable object that has belonged to a family for several generations.
Restoration: The process of returning something to its former condition, especially a building or work of art.
Seven Sisters: Love, Secrets, and Destiny in Mobile
Okay, here is a briefing document summarizing the key themes and ideas from the provided excerpts of “Seven Sisters (Seven Sisters Series Book 1)”:
Briefing Document: “Seven Sisters (Seven Sisters Series Book 1)” – Excerpts
Overall Theme: The excerpts introduce two distinct storylines with mysterious elements, secrets and a link to the historical Seven Sisters mansion in Mobile, Alabama. The stories explore themes of betrayal, love, destiny, family secrets, and a connection to the past.
Storyline 1: 1850 Mobile, AL
Setting and Atmosphere: The prologue sets a romantic and somewhat melancholic tone in Mobile, AL, in 1850. It describes a riverboat, the “Delta Queen,” and a sense of longing and anticipation.
Key Characters Introduced:
A young woman, unnamed in this excerpt, but heavily implied to be Calpurnia Cottonwood, is desperate to be free and to find love. She appears to be seeking escape from her current situation. “Run—be free. Be what I can never be!”. She is drawn to the music on the riverboat.
Plot Points/Mysteries: The woman is escaping her old life and her wedding plans. She is running off with Captain David Garrett. “Somewhere aboard the Delta Queen was Captain David Garrett, the gentleman who had liberated her heart.” The prologue ends with her falling into the river.
Themes: The themes include forbidden love, escape, and the allure of the unknown. There is also a sense of fate or destiny at play.
Storyline 2: Contemporary Mobile, AL
Key Characters Introduced:
Carrie Jo: The primary narrator. She’s returning to Mobile and taking a job related to Seven Sisters. She is dealing with some personal turmoil.
Mia: An anthropologist who works as a museum worker. She seems to be more connected to the history of the Seven Sisters.
Ashland Stuart: Involved with the historical society and the restoration of Seven Sisters.
Plot Points/Mysteries:
Carrie Jo is returning to Mobile from Charleston after ending a relationship. She feels lost.
She’s taken a job related to the “Seven Sisters” mansion, which is being restored and will be made into a museum. The family who originally owned the mansion was the Cottonwood family. “The goal was to make Seven Sisters a sort of museum for visitors to Mobile, but the current owner had enough respect for the home’s history to want a proper catalogue of its antiques first.”
The house is described as a T-shaped Greek Revival style house that had somehow survived in Mobiles sub-tropical climate.
The house seems to harbor secrets from the past, with hints of a darker history involving enslaved people. “I wondered what one of those slaves probably killed her and buried her on the plantation.”
The narrator and others are investigating the genealogy of families involved in the “Seven Sisters” including the Cottonwoods, Beaumounts and Ashlands. The narrator learns that her father’s ancestry is tied to this history.
There are mentions of finding cross markers. “And there’s more. We found a dozen small crosses over here, but there’s nothing written on them. There’s really no telling who else is here.”
Ashland hires Carrie Jo to find a missing necklace named The Seven Sisters. “According to the local historians, Mrs. Cottonwood invented the money in diamonds and sapphires. The largest piece in the collection was a necklace called The Seven Sisters.”
Themes: The modern storyline touches upon themes of:
Returning to one’s roots.
Uncovering hidden histories and family secrets.
Restoration and preservation of the past.
Dealing with feelings of uncertainty and direction in life.
Past connections influence the present.
Potential Connections Between Storylines:
The “Seven Sisters” mansion seems to be a central connection. The prologue is set on the “Delta Queen” which led to the Seven Sisters.
The Cottonwood family links both time periods.
The tragedy at the end of the Prologue hints at an unresolved history that may be influencing the present.
A character makes a statement to the fact that he will help the protagonist find her. “As I pulled away slowly, I whispered, “Yes, I’ll help you find her.”
Key Questions Raised:
What was Calpurnia Cottonwood escaping from?
What was on the page in the book that Calpurnia read that opened her closed heart?
What is the history of the Seven Sisters mansion, and what secrets does it hold?
How are Carrie Jo’s personal struggles connected to the history of the house?
What is the significance of the missing necklace?
Who exactly is Henri Devoreaux and what role will he play in this story?
Why was a child crying in the house?
Overall Impression: The provided excerpts suggest a multi-layered story that blends historical romance with contemporary mystery. The Seven Sisters mansion and its history serve as a focal point for exploring themes of family, secrets, and the enduring power of the past. The reader is meant to question who Calpurnia Cottonwood is, and how this woman is linked to Carrie Jo.
Seven Sisters: Mysteries of the American South
FAQ: Seven Sisters (Seven Sisters Series Book 1)
What is the setting of the novel, and how does it influence the story? The novel is primarily set in Mobile, Alabama. The story moves between present day and flashbacks to the 1850s. The historical backdrop of Mobile, particularly its connection to the antebellum South, slavery, and its rich historical society, heavily influences the plot and the mysteries surrounding Seven Sisters plantation and the characters connected to it.
Who are some of the main characters, and what are their roles? Carrie Jo Jardine is a central character in the present day and the story is written from her point of view. Other key characters include:
Ashland Stuart, the Master of Seven Sisters, a local historian.
Mia, Carrie Jo’s best friend, who appears to have some lost unexplained issues.
William, Carrie Jo’s sort-of boyfriend.
Calpurnia Cottonwood, and Muncie.
What are some of the mysteries being investigated in the novel? The story revolves around several interconnected mysteries, including the history of the Seven Sisters plantation and the Cottonwood family, the existence of a possible treasure hidden by Calpurnia Cottonwood, and the strange history of Calpurnia and Muncie.
What is the significance of the “Seven Sisters” name? The “Seven Sisters” refers to an old family home/plantation in Mobile. The name may also allude to a Greek myth. There are statues representing gods in the garden.
What is Carrie Jo’s primary motivation and how does it evolve throughout the story? Initially, Carrie Jo is looking for a fresh start and a distraction from her personal life. As she becomes more involved in the restoration project at Seven Sisters, she becomes increasingly curious and determined to uncover the mysteries of the place and its inhabitants, both past and present.
What are some themes explored in the novel? The novel explores themes of family secrets, historical mysteries, the weight of the past, love, betrayal, wealth, social class, and the complex history of the American South. It also touches upon themes of personal identity and self-discovery.
What is the role of history in the novel? History plays a crucial role, serving as both a backdrop and a central element of the plot. The characters are historians researching the area. The history of Mobile, Alabama and the Seven Sisters property are intertwined with the present-day mysteries. The past shapes the present and influences the characters’ actions and relationships.
How does the author create suspense and intrigue? The author creates suspense through the gradual unveiling of secrets, the introduction of mysterious characters, and the exploration of historical mysteries. The use of foreshadowing, dream sequences, and the interweaving of past and present storylines further enhance the intrigue and keep the reader engaged.
Seven Sisters: Book One Details
The “Seven Sisters” series is a sequence of books. The first book in the series is titled “Seven Sisters”.
Here are some details from the first book of the series:
The prologue is set in Mobile, AL, in 1850.
A character named Captain David Garrett is mentioned.
The Cottonwoods owned the Seven Sisters. The main antebellum home is examined. The goal was to make Seven Sisters a museum for visitors to Mobile, but the current owner has enough respect for the home’s history to want a proper catalogue of its antiques first.
A character named Carrie Jo is referenced throughout the book. She is called an ambulance.
A character named Ashland Stuart is also referenced.
Muncie held the silver tray tightly. Muncie made Muncia feel a little better about taking his spot.
There is mention of the Leahona Meteor shower.
The largest piece in the collection was a necklace called The Seven Sisters. It had seven sapphires, with two diamonds, set in the swirling formation of the stars. The stars fell around as one closed her eyes and kissed him back.
The Seven Sisters are also referred to as the Pleiades—the Seven Sisters—in the Northern Hemisphere.
The place where drama has unraveled for nearly two centuries is located due north of the center statue of the Moonlight Garden.
One of the gardens is called the Moonlight Garden.
TD was handsome in an earthy sort of way and was excited about restoring the home.
The series has some unexplained issues. Seven Sisters was a place where life and death happened, where lost and found things were.
Mobile, Alabama: History and Lore
Here’s what the source says about Mobile, Alabama:
The prologue of “Seven Sisters” is set in Mobile, AL, in 1850.
The goal was to make Seven Sisters a museum for visitors to Mobile.
People are going to Mobile.
The Seven Sisters mansion is beautiful to put into our history here. “We get some real stories to tell. Did you know that the French settlers used to send little orphan girls over here to marry these backwoods French-Canadians? Poor little things. They used them the Pelican Girls because they landed on Dauphin Island in Pelican Bay. No wait, maybe the ship was called the Pelican”.
There was a lot of work going on at Oakleigh, the antebellum over off Government Boulevard. People had hoped that the Hunters would do the same thing with Seven Sisters, but nothing happened. Emily Stuart died sometime around 1985.
Comparable to Charleston, Mobile had its charms; at least that’s what the brochures told me.
He will return to the Delta Queen before nightfall. You can find me there; I will be in Mobile for another month; I am scheduled to pick up a load of supplies and then head up the river”.
According to TD, Seven Sisters was at first built in a T-shaped, Greek Revival style, perfect for keeping the home cool even during Mobile’s hottest subtropical summers.
I would love the History of Mobile, but there is so much we don’t know. I feel honored that I get the opportunity to help others remember it like it should be remembered.
According to the local historians, Mrs. Cottonwood invested the money in diamonds and sapphires. The largest piece in the collection was a necklace called The Seven Sisters.
Seven Sisters: Unearthing a Family’s Hidden Treasure
Here’s what the sources say about family secrets:
Someone kept pulling back the covers that hid a hidden treasure, “Calpurnia,” who was suspected.
There’s no telling what you will find on that land.
Someone thought there would be those who think it may be a clue to a lost family treasure.
It felt like collecting evidence for a case that I hoped one day to present to someone who might actually understand.
There are some unexplained issues.
Seven Sisters was a place where life and death happened, where lost and found things were.
The statues of the garden were made of white marble that reflected the moon. During a perfect full moon, the statues shone bright, like a Moonlight Garden. It’s not as mysterious as you think.
According to the local historians, Mrs. Cottonwood invested the money in diamonds and sapphires. The largest piece in the collection was a necklace called The Seven Sisters.
She kept her own money in her own hands that way: It was the only way women then could.
There are all kinds of hazards around here.
There are some family close by for the next few months while a beehive for the house and getting up the museum.
According to Hooney, the girl was putting on airs because everyone, even the house slaves, knew that she was just a poor relation of no true standing.
William had the impression that he was sending Mia some demos out of respect.
According to TD, Seven Sisters was at first built in a T-shaped, Greek Revival style, perfect for keeping the home cool even during Mobile’s hottest subtropical summers.
“I would love the History of Mobile, but there is so much we don’t know. I feel honored that I get the opportunity to help others remember it like it should be remembered”.
The handwriting was intact, with delicate letters.
The place where drama has unraveled for nearly two centuries is located due north of the center statue of the Moonlight Garden.
It was an old episode of the Lifestyles of the Rich and Famous with Robin Leach, well, okay, maybe not quite that luxurious, but it was close.
According to TD some details remain that are worth noting.
“What’s interesting is the white crosses you found around the mausoleum are arranged in the exact formation of the statues in the garden”.
The Seven Sisters necklace had seven sapphires, with two diamonds, set in the swirling formation of the stars. The stars fell around as one closed her eyes and kissed him back.
The current owner of Seven Sisters has enough respect for the home’s history to want a proper catalogue of its antiques first.
TD was handsome in an earthy sort of way and was excited about restoring the home.
There were two Rachel Kowalski and Rachel McChes, and James Fittman. All of them were excellent archeological students who earned their spots on our team.
“Thank you for sharing this with me, Ashland,” someone said.
There is mention of the Leahona Meteor shower.
“You are a real dream catcher, the real thing, and you don’t even see it?”
Someone said that William did not seem like the type at all. Her face was blank, and she said in a low voice, “He’s Ashland Stuart. He’s everyone’s type. He’s also the handsomest guy I’ve met in a certain case. In the case you haven’t noticed, I don’t have a type”.
Historical Fiction Elements in “Seven Sisters”
Aspects of historical fiction can be found in the source:
The prologue of “Seven Sisters” is set in Mobile, AL, in 1850.
References to antebellum architecture and the desire to preserve a main antebellum home for visitors to Mobile are mentioned.
There is a mention of French settlers sending orphan girls to marry French-Canadians. They were called the Pelican Girls because they landed on Dauphin Island in Pelican Bay.
The story references slavery and mentions house slaves.
It references lifestyles of the Rich and Famous.
There is mention of the Civil War.
A character recalls stories of the old days and can’t sleep without air conditioning.
There is also mention of the Leahona Meteor shower.
Mrs. Cottonwood invested her money in diamonds and sapphires and kept her own money in her own hands because it was the only way women could do that then.
There are mentions of museums and archeological students.
A character reads a leather-bound book.
There is a description of a T-shaped, Greek Revival style home.
There is reference to a Revolutionary War hero.
Romantic Elements and Reflections
There are several instances of romantic elements in the source:
A woman longed for her lover, desiring that love commanded release and would be fulfilled by her desperate soul of affection.
She imagined her lips turned up in a small smile as she imagined her saying, “Run–be free. Be what I can never be!”.
She felt an eternal romance for someone.
A woman felt herself falling, falling into the blackness of the river and into his outstretched arms.
Someone felt a stirring romance in southern evening.
There is a reference to a love of life with the dairy, new bride, and smart career woman.
A man recalled his details with surreal clarity/ Unwilling to lose even a snippet, he climbed out of the tub and wrapped himself in a cotton robe, half drying my tired body: he didn’t want to peek at my heart.
The speaker felt that a perfect world for him would be with Calpurnia at your side for your painting at your age.
There is a description of eye contact and an intimate moment of realization.
There is mention of candles burning brightly into the night.
The stars fell around as someone closed her eyes and kissed him back.
A character reflects on a past love, mentioning the end of a relationship and lingering feelings.
There are mentions of holding hands and shared glances between characters.
A character says, “You do know that for a moment, remembering how perfect the evening had been before all this. You do know that we have to fire her, right?”.
A character notes that their best friend appears to have some serious unexplained issues with me. “I’ve lost a sort-of boyfriend and found a gay I really like. I’ve met several ‘ghosts’”.
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
The text is a tutorial on using QuickBooks Online. It guides users through various aspects of the platform, starting with subscription options and initial company setup. The tutorial demonstrates how to manage customer lists, handle sales transactions, and utilize features like invoices, sales receipts, and credit memos. Finally, the tutorial covers product and service setup, purchase orders, and related reports, providing a comprehensive overview for new QuickBooks Online users.
QuickBooks Online: A Comprehensive Study Guide
Quiz
Instructions: Answer the following questions in 2-3 sentences each.
How can a user access the sample file (Craig’s Design & Landscaping Services) in QuickBooks Online without a subscription?
What are the two primary ways to create an Intuit account when signing up for QuickBooks Online?
Where can users find the sign-out option in QuickBooks Online, and what icon is associated with it?
Why is it important to understand the Chart of Accounts in QuickBooks Online?
Explain the difference between the “Company email” and “Customer facing email” settings in QuickBooks Online.
How can you give another user access to your company file and can that user change the company info or manage subscriptions?
Why should businesses set up a separate liability account for each loan they have?
Explain the difference between “owner investment” and income in QuickBooks Online.
What is the function of sub-customers in QuickBooks, and how does it differ from the desktop version?
What is the purpose of “Undeposited Funds” in QuickBooks Online?
Quiz Answer Key
Users can access the sample file by navigating to qbo.intuit.com/r/edr/testdrive. This allows them to explore the features using a pre-populated company file without needing a paid subscription.
Users can create an Intuit account by signing up with a Google account or by using an email address and creating a password. This centralizes their Intuit product logins.
The sign-out option is located in the top right-hand corner of the screen, accessible by clicking on the gear icon. This ensures secure access control.
The Chart of Accounts is the backbone of all accounting in QuickBooks. It categorizes where money is spent and received and is necessary for generating accurate financial reports.
The “Company email” is a private email address used for internal communications from Intuit, while the “Customer facing email” is the email address customers see. The latter can be redirected to the company email for ease of management.
Give another user access by going to Gear Icon > Manage Users > Add User. Administrators control user permissions, and an employee cannot change company info or manage subscriptions unless permission is granted to them by the adminstrator.
Setting up separate liability accounts for each loan allows businesses to accurately track the principal and interest payments for each debt. This helps monitor individual loan balances and payment progress.
“Owner investment” refers to personal funds the owner puts into the business, which is considered equity, not income. Income is revenue generated from business operations.
Sub-customers are used to organize jobs or projects related to a main customer, enabling detailed tracking of income and expenses for each project. In the desktop version of QuickBooks, these are often called “jobs”.
“Undeposited Funds” serves as a temporary holding account for payments received from customers before they are deposited into a bank account. This is a useful holding pattern when you collect money and plan to make a bulk deposit at the end of the day.
Essay Questions
Discuss the importance of customizing QuickBooks Online settings through the gear icon, providing specific examples of how these customizations can improve efficiency and accuracy for different types of businesses.
Explain the process of setting up a new company file in QuickBooks Online, including the steps involved in the easy step interview, and discuss the significance of accurately answering the initial setup questions.
Describe the different types of accounts in the Chart of Accounts, and explain how each type affects the accuracy of financial reports.
Analyze the benefits and drawbacks of using the sales receipt versus invoice features in QuickBooks Online, and provide scenarios in which each method would be most appropriate.
Evaluate the utility of the tagging feature in QuickBooks Online, explaining how tags can be used to track specific aspects of a business and improve reporting capabilities, and compare it to QuickBooks’ “classes” feature.
Glossary of Key Terms
Chart of Accounts: A list of all the accounts used to categorize financial transactions in QuickBooks Online.
Company File: A QuickBooks term for the data file that contains all of a company’s financial information.
Dashboard: The main screen in QuickBooks Online that provides a quick overview of a company’s financial performance.
Intuit Account: A single login that allows access to multiple Intuit products and services.
Navigation Pane: The menu on the left side of the QuickBooks Online interface that provides access to different areas of the program.
Sales Receipt: A record of a sale where the customer pays at the time of purchase.
Invoice: A bill sent to a customer requesting payment for goods or services.
Accounts Receivable: The money owed to a company by its customers.
Accounts Payable: The money owed by a company to its vendors.
Undeposited Funds: A temporary holding account in QuickBooks for payments received but not yet deposited into a bank account.
Credit Memo: A document issued to a customer that reduces the amount they owe, usually due to a return or service issue.
Refund Receipt: A record of money returned to a customer for a purchase.
Statement: A summary of a customer’s account activity, including invoices, payments, and balances.
Tags: Customizable labels used to categorize transactions for detailed reporting and tracking.
Product and Service: A sellable item or billable service provided by a business.
Purchase Order: A document sent to a vendor requesting an order of goods or services.
SKU (Stock Keeping Unit): A unique identifier for a product or service.
Inventory: Goods held for sale to customers.
Vendor: An individual or company from whom a business purchases goods or services.
Sub-customer: A customer that is a sub-division of a main customer, enabling job or project tracking.
Equity: The owner’s stake in the company.
Liability: A debt or obligation owed to others.
Asset: A resource controlled by the company as a result of past events and from which future economic benefits are expected to flow to the company.
Accrual Basis Accounting: Recognition of income when earned and expenses when incurred, regardless of cash flow.
QuickBooks Online: Setup, Navigation, Customer Management, and More
Okay, here’s a detailed briefing document summarizing the key themes and ideas from the provided text excerpts.
Briefing Document: QuickBooks Online Overview and Key Features
Executive Summary:
This document summarizes key functionalities within QuickBooks Online (QBO), focusing on initial setup, navigation, customer and vendor management, sales transactions, product/service inventory, and reporting. It highlights the use of sample files for practice, the process of creating and customizing a new company file, managing customers and vendors, handling sales transactions, managing inventory with purchase orders, and utilizing reports to understand your business.
1. Introduction and Initial Setup
Theme: Getting started with QuickBooks Online.
Key Ideas/Facts:Sample File: Users can experiment with a sample file (“Craig’s design & landscaping services”) without a subscription. Access via “QBO dot Intuit comm /r e dr forward slash test drive.”
30-Day Free Trial: A 30-day free trial is available by signing up.
Intuit Account: Creating an Intuit account (using Google or email) is required. Mobile number is recommended for account recovery.
Company File: Each QuickBooks file is a “company.” Users can have multiple companies.
EasyStep Interview: QBO uses an “easy step interview” to gather initial company information and configure settings.
Dashboard: The dashboard provides a quick overview of different company areas.
Logging In/Out: Use the gear icon in the top right to sign out. To log back in, go to QuickBooks.Intuit.com and select “Sign In.”
2. Navigation and Customization
Theme: Understanding the QBO interface and customizing company settings.
Key Ideas/Facts:Gear Icon: The gear icon provides access to customization options, tools, and company settings.
Chart of Accounts: “Everything in QuickBooks will run through the chart of accounts.” It is accessible via the gear icon.
“New” Button: The “New” button (formerly located near the gear icon) is for creating new transactions.
Account Settings: Accessible through the Gear Icon.
Company Information: Allows editing of company name, legal name, industry, email addresses (customer-facing vs. company), phone number, website, and addresses.
Billing and Subscription: Used to upgrade QBO subscriptions. Subscription levels have limits (e.g., users, chart of account items, classes/locations).
Usage: Helps to monitor limits to the subscription level.
Sales Tab: Has customisation settings that help to manage how sales are processed.
3. User Management
Theme: Adding and managing users within QBO.
Key Ideas/Facts:Multiple Users: Different QBO subscriptions allow for a different number of users.
User Permissions: Administrators can assign different levels of access. It is critical that administrators know usernames and passwords.
Invitation Process: New users receive an email invitation and set up their own username and password.
Audit Trail: Can be reviewed under Reports.
4. Chart of Accounts
Theme: The fundamental role of the chart of accounts in QBO.
Key Ideas/Facts:Core Accounting Structure: The chart of accounts is “the backbone of all accounting,” a listing of where money is spent or received.
Account Types: Important account types include:
Bank Accounts: (Checking, Savings, PayPal, Square).
Assets: (Fixed Assets like vehicles, furniture, and current assets like inventory). Group assets into “big bucket categories.”
Liabilities: (Loans – separate accounts for each loan, Credit Cards – separate for each card).
Equity: (Owner draws, Owner contributions).
Income Accounts: (Sales income).
Cost of Goods Sold
Expense Accounts:
Sub-Accounts: Can be created under main accounts (e.g., “Fuel” as a sub-account of “Car and Truck”).
Opening Balance: A starting balance creates debit and credit entries.
5. Customer Management (Accounts Receivable)
Theme: Managing customer information and sales transactions.
Key Ideas/Facts:Navigation: Access customer lists via the “Sales” tab on the navigation bar.
Customer List Overview: Includes open invoices, overdue amounts, payments in the last 30 days, unbilled activity, and estimates.
Customer List Features: Sorting, email links (if email address is present), phone number, open balance, actions (creating statements/invoices).
Search Function: Ability to search for customers.
Batch Actions: Option to email multiple customers or make them inactive.
Adding New Customers: Requires entering company name (if applicable), name, display name, email, phone number, billing address (and shipping address if different).
Sub-Customers: Used for different jobs/projects for a customer.
Editing Customer Information: You cannot delete customers. You can only make them inactive. Customer information can be edited.
Customer Details Tabs: Include notes, transaction list, projects, customer details, and late fees.
Customer Custom Fields: Options include preferred payment method, payment terms, opening balances, language, attachments, and additional info.
Inactive Customers: Hiding customers from the list.
Importing Customers: Import customer lists from Excel or CSV files.
6. Sales Transactions
Theme: Recording sales to customers.
Key Ideas/Facts:Sales Overview: A quick overview of income over time, overdue invoices and bank accounts.
Sales Transactions: Can be reviewed for each customer and each transaction
Sales Receipts: Used when customers pay immediately.
Invoices: Used when sending invoices and payment occurs at a later date.
Receiving Payments: Record how much customers paid, the date paid and when completed the invoice will show as paid.
Deposits Deposits must be made separately, particularly if multiple payments contribute to a single deposit. Money goes into the checking account.
Credit Memos Used to credit an invoice.
Refunds Used when you want to issue a refund to a customer that has purchased something and paid in full.
Statements: Gentle reminders that they owe money, shows all activity.
7. Tags
Theme: Categorizing customers.
Key Ideas/Facts:Tags: new feature that allows the user to create certain words that will appear on a drop-down when you are in different transactions in QuickBooks.
Tag Groups: Allows the user to put tags into groups.
8. Products and Services
Theme: Adding products and services
Key Ideas/Facts:Sorting: Sort products and services by type.
Non-Inventory: Physical items that you buy and sell.
Service: Service you provide.
Inventory Product: Tracking physical items.
Bundle: Combine items together.
SKU: Put in the SKU.
Income account: Account you want money to go back to.
Preferred vendor: Vendors you prefer.
Purchase Orders: Track what you have ordered.
New bills: Create a new bill
Open purchase order: Order you need to pay.
9. Reporting
Theme: Reports to analyze information
Key Ideas/Facts:List of reports: Report for vendors and customer
Open purchase order detail: Report for vendors and customer
Customization: Can change the information in the report.
Filter options: Can look at all accounts.
Accrual basis: All reports are run on the accrual basis.
Note: This briefing document is based solely on the provided text excerpts and does not represent a complete guide to all QuickBooks Online features.
QuickBooks Online: Setup, Navigation, and User Management
QuickBooks Online FAQ
How can I explore QuickBooks Online without a subscription?
You can use a sample company file, “Craig’s Design & Landscaping Services,” without needing a subscription. To access it, go to QBO.Intuit.com/r/edr/testdrive. You’ll need to verify you’re not a robot. The data in the sample file is updated daily, and you will be working with information from 2021.
How do I set up a new QuickBooks Online account?
Navigate to the QuickBooks website where the online subscriptions are displayed. Choose a subscription or sign up for the 30-day free trial. To create an Intuit account, you can sign up with a Google account or an email address. Providing a mobile number is recommended for account recovery purposes. Create a strong password with at least 8-12 characters, including uppercase and lowercase letters, and special characters. Then you will start the easy step interview that will ask you about your business, such as its name and industry, and set up the company file for you.
How do I log in to QuickBooks Online once my account is set up?
Go to the QuickBooks Online website (QuickBooks.Intuit.com) and click “Sign In.” If you are using a trial subscription, just use the “QuickBooks Online” option. Then, enter your Intuit account username and password.
What is the dashboard and how do I navigate QuickBooks Online?
The dashboard provides an overview of your company’s performance. The navigation pane on the left side of the screen is used to access different sections, such as banking, expenses, sales, workers, reports, accounting, and apps. Each option will provide another set of options related to the original choice.
How do I customize QuickBooks Online settings?
Click the gear icon in the top right corner to access the settings menu. Here, you can customize various company settings such as the chart of accounts, address, contact information, sales settings and add users.
How do I add and manage users in QuickBooks Online?
Go to the gear icon, select “Manage Users,” and then “Add User.” Choose the user type and specify access rights. Enter the new user’s first name, last name, and email address. QuickBooks will send an invitation email with instructions for setting up their account.
What is the Chart of Accounts and why is it important?
The Chart of Accounts is a comprehensive listing of all accounts used to categorize financial transactions. It’s the backbone of QuickBooks, as every transaction flows through these accounts. It defines where money is spent (expenses) and where money is received (income). To access it, click the gear icon and choose “Chart of Accounts.”
How do I manage customers in QuickBooks Online?
To access customer information, go to “Sales” and then “Customers” in the left navigation pane. Here you can view open invoices, overdue amounts, and payment history. You can add new customers by clicking “New Customer”. You can edit customer details, including contact information, billing/shipping addresses, preferred payment methods, and payment terms.
QuickBooks Online: Features, Setup, and Management Guide
QuickBooks Online is a paid subscription service that allows you to access your company file from any location with internet access. It is designed to help you manage various aspects of your business finances.
Key aspects of QuickBooks Online:
Accessibility: QuickBooks Online allows access to company files from any device with internet.
Accounts Receivable: Manages customer-related transactions, including creating invoices and recording payments.
Accounts Payable: Tracks and manages bills to monitor how much is owed.
Products and Services: Helps set up and manage physical products and services.
Payroll: Includes tools for managing payroll.
Mobile Devices: QuickBooks Online works with mobile devices, allowing users to manage their business on the go. Mobile apps are available for both Android and iPhone.
Company Files: Each file created in QuickBooks is called a company, and multiple company files can be created.
User Interface: The dashboard provides a quick overview of the company’s performance. The navigation pane on the left provides access to various features.
Customization: QuickBooks Online allows customization of various settings to fit the specific needs of a business. The gear icon provides access to customization options.
Chart of Accounts: The chart of accounts is the backbone of all accounting in QuickBooks. Every transaction in QuickBooks flows through the chart of accounts.
Sales Transactions: Manages sales transactions, including invoicing customers, receiving payments, and making deposits.
Customer Management: Manages customer lists and related transactions.
Inventory Management: Manages inventory, tracking quantities on hand and reorder points.
Vendor and Expense Management: Manages vendors and expenses, including purchase orders.
Reporting: Offers a variety of reports to provide insights into your business finances.
Subscription Options and Costs:
There are multiple subscription options available, each with different features and monthly fees.
The Simple Start subscription is the most basic and is suitable for new businesses.
The Essentials, Plus, and Advanced subscriptions offer additional features and capabilities.
The Plus subscription is the most popular.
The number of users that can access the online version depends on the subscription.
QuickBooks Online is not free; it requires a monthly subscription.
A free 30-day trial is typically available.
Setting up QuickBooks Online:
To begin using QuickBooks Online, you must sign up for one of the subscription services.
You can sign up for a 30-day free trial.
During the setup process, you’ll be asked to provide information about your business.
QuickBooks will guide you through an easy step interview to gather information and set up your company file.
You can import data from a desktop version of QuickBooks.
Mobile Apps:
QuickBooks Online offers mobile apps that sync with the online version.
These apps allow you to manage your business on the go.
You can create invoices, track expenses, and perform other tasks from your mobile device.
The apps may not have all the features available in the online version.
Sample Company File:
QuickBooks Online provides a sample company file called Craig’s Design & Landscaping Services that you can use to explore the software.
The sample file is updated every day, allowing you to practice with current data.
Customizing QuickBooks Online:
The gear icon provides access to various customization options.
You can customize your company settings, manage users, and access other tools.
It is important to understand the chart of accounts and how it works.
You can enable account numbers in the chart of accounts.
Users:
Each person using QuickBooks should have their own login.
The administrator can add, edit, or delete users.
The number of users depends on the subscription.
You can limit users’ access to certain areas of QuickBooks.
Sales Transactions:
QuickBooks Online allows you to manage sales transactions, including creating invoices, receiving payments, and making deposits.
You can create sales receipts for immediate payments or invoices for later payments.
You can record customer payments and apply them to specific invoices.
You can make deposits to record the transfer of funds to your bank account.
You can create credit memos for customers.
You can issue refunds to customers.
You can create and send statements to customers.
Products and Services:
QuickBooks Online allows you to set up and manage products and services.
You can create inventory products, non-inventory products, and services.
You can track quantities on hand, set reorder points, and manage inventory.
If the inventory feature isn’t available, consider upgrading to Plus or Advanced.
Vendors and Expenses:
You can manage vendors and expenses in QuickBooks Online.
You can create purchase orders to order products from vendors.
Reporting:
QuickBooks Online offers a variety of reports to provide insights into your business finances.
Reports can be customized to show specific data and time periods.
Common reports include open invoices, customer balance details, and sales by customer.
QuickBooks Online is constantly evolving, so the options may change or move over time. To stay updated you can log into QuickBooks.Intuit.com/blog to see recent changes.
QuickBooks Online: Subscription Options and Features
QuickBooks Online requires a paid monthly subscription, with four different subscriptions available. Here’s what you should know about them:
Pricing and Discounts: The monthly fee for each subscription can change, but discounts such as 50% off for the first three months are often available.
Free Trial: A 30-day free trial is offered for each subscription, allowing you to test the software before purchasing.
Subscription Levels and Features:
Simple Start: This is the most basic subscription, best for new businesses with few customers. It’s a good starting point and you can upgrade as needed.
Essentials: This level lacks the inventory feature and job tracking profitability, and batch invoices.
Plus: The Plus subscription is the most popular. However, it lacks options for importing and sending batch invoices as well as business analytics and insights options.
Advanced: This subscription includes all available features, such as importing and sending batch invoices and business analytics.
Upgrading and Downgrading: It’s possible to switch between subscriptions as your business needs change. For example, you may need to upgrade to allow more users to access QuickBooks, or for inventory management.
Considerations for Choosing a Subscription: Factors to consider when choosing a subscription include the number of users needing access, the need for inventory management, and whether you require advanced features like batch invoicing or business analytics. If unsure, contacting QuickBooks directly is recommended to determine the best fit for your business.
To view the current subscriptions, navigate to QuickBooks.Intuit.com. You can also upgrade your existing subscription within QuickBooks.
QuickBooks Online: Company Files and Setup Guide
Here’s what the sources say about company files in QuickBooks Online:
Any file that is created in QuickBooks is called a company file.
A user can have as many company files as they want.
Often, a small business owner might set up one company with their personal information and another company that has the business information.
Company files do not interact with each other, so there is no concern about data being mixed up between them.
When setting up QuickBooks, it will launch an easy step interview that will ask questions and, based on the answers, it will set up the options in the company file.
The setup process involves providing basic information such as the name and type of business.
After creating a company file, there is still more to do because it is initially a blank file.
After the basic setup, the user is taken to the dashboard, which provides a quick overview of the company’s performance.
A sample company file, Craig’s Design & Landscaping Services, is available to play with.
To access the sample file, navigate to QBO.Intuit.com /r e dr forward slash test drive.
It is not necessary to sign up for a subscription to access the sample file.
The sample file is updated every day, and it is set in the year 2021.
If you have been using the desktop version of QuickBooks, you can upload your company file to QuickBooks Online.
To upload a company file from the desktop version, open the company file in the desktop version, go to the company menu, and select “Export Company File to QuickBooks Online”.
If the “Export Company File to QuickBooks Online” option is not available, it means that updates are needed in the desktop version of QuickBooks.
After exporting the company file, run a profit and loss report and a balance sheet in both the desktop and online versions to compare the data.
If the data is not the same, try exporting the company file again.
When logging in, users are given the option to sign up with a particular subscription.
If still using the 30-day free trial, use the QuickBooks Online option to log in.
QuickBooks Online: Mastering the Chart of Accounts
Here’s what the sources say about the chart of accounts in QuickBooks Online:
The chart of accounts is the backbone of all accounting in QuickBooks Online. Every single transaction flows through one of the accounts listed in the chart of accounts.
The chart of accounts is a listing of different areas where money is spent or received. It is important to ensure information goes into the correct categories for accurate reports.
To access the chart of accounts, navigate to the gear icon and then select “Chart of Accounts”. Another way is to go to the left navigation bar and click on “Accounting”.
The first column is the name of the account, which can be customized. The second column shows the type. The names are alphabetical within each type. The “Detail Type” column provides more information about the type chosen. It also shows QuickBooks balance and bank balance.
Account Types:
Bank Accounts: These include checking, savings, money market accounts, PayPal, and Square.
Assets: These are things the business owns. Assets can be fixed (long-term, like vehicles or property) or liquid/current (like inventory).
Liabilities: These are debts the business owes. They can be long-term (paid over more than 12 months) or short-term/other current liabilities (paid in under a year). Set up a separate account for each loan.
Credit Cards: These are for business credit cards. Set up each credit card account separately to track them properly.
Equity: This reflects the owner’s stake in the company. Owner draws are when the owner takes money out, and owner contributions are when the owner puts money in.
Income: This is where sales income is tracked.
Cost of Goods Sold: These are the costs of the products or services a business sells.
Expenses: This is a large grouping of expense accounts.
To add a new account, click “New”. Pick the account type and then the detail type that closely matches.
Subaccounts: To add subaccounts, the type has to be the same as the main account. Design the list so that it provides the needed level of detail without being overwhelming.
Starting Balances: When adding a new account, a start date and beginning balance is needed. For a checking account, this would be the ending balance on the last bank statement. The other side of this transaction goes to “Opening Balance Equity”.
You can enable account numbers by going to the gear icon, then “Account and Settings,” then “Advanced”. Turn on “Enable account numbers”. A new column will appear at the beginning of the chart of accounts to add the numbers.
QuickBooks Online: Recording Sales Transactions, Invoices, and Payments
Here’s what the sources say about sales transactions in QuickBooks Online:
There are a couple of different ways to record a sale to a customer. One way is to create a sales receipt and the other is by invoicing customers.
Any transaction that happened with a customer will be listed under the sales tab. You will see information on invoices, payments, credit memos, time charges, sales receipts or refunds.
Under the invoices tab you will see all the information on any sales transactions.
Sales Receipts
Creating a sales receipt is almost like a point-of-sale transaction.
If a customer comes in, makes a purchase, and pays the money right then, you can put all of that on one transaction and provide them with a receipt.
To create a sales receipt, go to your customer list, find your customer, and select create a sales receipt.
Here you can enter the customer’s email, billing address, and the sales receipt date.
Then you can select the product/service that the customer is purchasing.
You will be able to edit the description, quantity, and rate.
Below this, you can enter a message that will be displayed on the sales receipt and on statements.
On the right, you can see the subtotal and the total subject to sales tax.
At the bottom, you will be able to see the amount received and the balance due.
Because it is a sales receipt, it is assumed that you have received all of the payment.
At the top, you can choose the payment method.
The next thing you’ll see is deposit to undeposited funds. In your chart of accounts there is an account called undeposited funds, this is where money sits that you’ve collected but you have not yet taken to the bank.
When you’re finished, you can save, save and send, or save and close.
Invoices
The invoice is where you will send an invoice to your customer and wait for payment at a later date.
You may email or mail these.
To create invoices, go to the navigation pane and select sales.
You can either use the invoice option or the customers option.
If you select invoices, you can choose new invoice.
If you select customers, you can select a customer, go to the action column, and create an invoice.
If you are using sub-customers, always pick the sub customer.
You can change the customer email and billing address.
If you select send later, you can create the invoice, save it, and then email it at a later time.
You can change the invoice date and due date.
Select a product or service from the list to invoice your customer.
Remember that a service is non-taxable.
You can add an attachment.
Receiving Payments
After you have sent the invoice, you will want to record the payment when it is received.
To do this, navigate to sales and then customers.
In the action column, select receive payment.
Here you can select the payment date and method.
Then you can select where to deposit the funds.
You can deposit the funds to the undeposited funds account or directly into the checking account.
Then save and close.
Making Deposits
The make deposits option is always going to be the last step in this process, no matter how you receive the payment.
You want to make sure that your deposits in QuickBooks match what actually happened at the bank.
To record the deposit, select new and then bank deposit.
Make sure you have the correct bank account chosen.
Check off all of the monies that are going in this deposit.
You can also add funds to this deposit.
Then, save and close.
Credit Memos
There are times when you will want to issue a credit memo to an invoice.
For example, if a customer is not happy with your services, you can issue a credit memo.
To do this, first, look up the original invoice.
Then, go to new and under customers, select credit memo.
Plug in the customer’s name.
Make sure you put the date you would like.
Under product/service, enter the same product or service that was on the original invoice.
Then, save and close.
Then, go to the payment and apply the credit memo to the correct invoice.
Refund Receipts
There may be times where you have to give your customer a refund.
To do this, go to new and under customers, select refund receipt.
Select the customer you need to give a refund to.
Plug in the date and the refund method.
Select the product/service to refund.
Then, select save and print.
Statements
One of the things you have the ability to do in QuickBooks is send statements to your customers.
A statement is basically a gentle reminder to your customers that they owe you some money.
Typically statements are sent at the end of each month.
To create statements, go to new and under other, select statement.
Pick a statement type, statement date, and customer balance status.
Then, apply.
Tags
Tags will allow you to create certain words that will appear on a drop-down when you’re in different transactions in QuickBooks and you can choose those.
You can also create tag groups.
You can use these tags in any transaction.
QuickBooks Online Tutorial: QuickBooks Online for Beginners – 3+ Hours!
The Original Text
hello welcome to QuickBooks Online my name is Cindy macdougan and I’m going to help walk you through this series of videos I wanted to take a few moments in this introduction video and just give you a little bit of information about what to expect as you go through the course and also let you know a little bit about myself and my background I’ve actually been a software trainer for about 20 years I teach a lot of different types of software QuickBooks being one of those I’m also a QuickBooks consultant I work with both the desktop and the online version I’m going to be able to relay some information about both as we go along but more importantly we’re talking about the online version here the online version has an advantage and that is that you’ll be able to access your company file from anywhere you happen to be that has internet access if you work out in the field for example you might have your laptop with you or need to access it through your phone and these are great reasons to sign up with a subscription for the QuickBooks online service we’re gonna actually take this from the very beginning I’m not going to assume you know anything I’m gonna actually start off showing you how to go online and pick the correct subscription we’re talk a little bit about working with QuickBooks Online and mobile devices and then we’ll take it from there and start actually setting up our company file we’re going to work with customers that side of things is called accounts receivable you’ll need to know how to create invoices what to do in the customer pays you how to actually put that money in the bank we’re also going to talk about the flip side which is your accounts payable that’s anything that has to do with the bills that come in the mail that you have to pay you’ll want to track those so that you know at any time how much you owe we’re going to be going through and talking a little bit about products and services those are physical things and sometimes you’re a service you provide but sometimes you buy products and you also sell products and we need to know how to set this up properly we’ll be looking quickly a payroll there’s a lot of other things we’ll look at but I want you to have a really good foundation for building your company file from the very beginning when you watch these videos make sure you watch them in order they won’t make very much sense if you get them out of order make sure you watch them all and make sure you watch them till the very end because a lot of times there’s a really good piece of information right at the very end of one of these videos if you have questions as we go along feel free to shoot us an email and we’ll get right back to you and answer your questions with that being said let’s go ahead and get started we’re going to flip over to section two and talk about the different subscriptions that you have available when you decide to go with QuickBooks Online thanks for coming back we are just getting started and the very first thing you’ll need to do before you start using QuickBooks is actually sign up with one of their subscription services it is not free to use the QuickBooks Online you do have to pay for it monthly and they have four different subscriptions that you can subscribe to I want to go ahead and pull up the website so that you can actually look and compare the different ones with me as we go through this alright what you’ll want to do is make sure you navigate to QuickBooks Intuit calm and you’ll see this screen right here which will give you a lot of different information on their subscription services one thing I want to point out is that they do have a try it free for 30 days for each of these that way you can see if you like it before you actually jump in and make a purchase I want to scroll down here because you’ll notice that this is where they have the different subscriptions listed and I want to compare these with you the pricing that you see here may change depending on when you watch this video you’ll notice for each of these that they have a monthly fee and right now you can say 50% off if you sign up for this three months at a time the simple start is the really basic one that you’ll want to start with if you’re a brand new business and you don’t have a lot of customers maybe not a lot going on with your business yet it’s great to start with this one and then you can always upgrade as you need more of the features let me go ahead and go through some of these features with you you’ll notice for the simple start that you can only have one user and that basically means that only one person can log in with that username and password if you need more you’ll notice that if you look at the essentials you can have up to three users the plus has up to five and then you can have up to 25 if you’re actually using the advanced let me scroll down a second because I want to show you that there are a lot of really good things about the Simple Start you’ll see for example that in addition to multiple users you can track your coming expenses they’ll all let you do that all of these will help you maximize your tax deductions they’ll all have mileage invoicing and accepting payments they’re all going to have reports as well but you’ll notice that the simple start and the one that’s to the right of it only give you the basic reports where if you need some more advanced reporting then you’ll want to go with these two over here which are the plus and the advanced and even with the basic reports you’re going to have a lot of reports quickbooks was really good about reporting you can do estimates in all of these if you think about a construction company you would want to actually estimate a job before you actually start doing the work and getting paid for it and that’s a really great feature they all have let me see scrolling down here you’ll notice that you can track sales and sales tax in all of these you can capture and organize your receipts mean you can scan them in you can also manage 1099 contractors in all of these and that’s really important because those are what you call your subcontractors and you need to know how to properly handle those you’re going to be able to actually manage the bills if you go with the essentials the plus or the advanced so notice that if you have the simple start you can’t handle the bills in QuickBooks and to me that’s really important because you want to track everything you owe because you’re going to need to really stick to your budget when you first start your business you cannot track time if you have simple start or you can’t do what they call tracking job profitability in the simple start even though like I said this is great for a new business starting out you’ll quickly want to upgrade to one of the others moving on to the essentials the essentials just doesn’t have the inventory feature the job tracking profitability you can kind of see the things here does not have you can’t send batch invoices and really if you don’t do a lot of these that may not be important to you the one that sometimes people want is the inventory feature and you would have to upgrade to the plus or the advanced to get that you’ll notice that the plus is the most popular one and it does not have the options for importing and sending batch invoices it doesn’t have the business analytics and insights options but you may not need these if you do want all of that you’ll want to go up to the advanced subscription here the other thing I want you to know is that you may go back and forth with these subscriptions because it could be that you add users like we saw earlier and you need to have maybe four people accessing your QuickBooks so as a lot of different things you need to think about and you can always call them if you’re really not sure which one would work best for your business I wanted you to be aware of that because the next thing you’ll have to do is actually start with one of these and you can actually choose to go ahead and buy now or like I showed you earlier you can go up to the top of the screen and you can actually try it free for 30 days and that’s where I want to stop right now we’re going to go through and talk about setting up your company file after you pick a subscription / module – but before we do that I want to briefly talk to you a little bit about how QuickBooks Online works with mobile devices over in section 3 I’ll see you there shortly before we go ahead and wrap up module one I wanted to briefly talk to you a little bit about some things QuickBooks does with the online version and how mobile devices actually work with QuickBooks Online the first thing I want you to know is that your online version is constantly evolving you might log in one time and be used to where a particular option happens to be and the next time you log in it may not be there at all or may be in a different location or look different when they rule out the changes they do not roll them out across the board for everyone at the same time that’s why your friend may have a version and he or she does not see the updates that you see but you’ll eventually get there the other thing I want to mention is that you have the ability to use different mobile apps for QuickBooks and they synch with QuickBooks depending on if you have an Android or an iPhone you can just go into your Play Store go into the app store in your iPhone and just look for that QuickBooks apps and you’ll notice that if you download one of them you can be able to take it out on the field with you and for example if you need to create an invoice out in the field you can do it right there on your phone and it will sync with your actual online version now the apps will not have all of the options that are available but they will have the basic most common ones that you would want to use go ahead also and look in your app store and see if there are other software apps that aren’t made by into it but would work well with QuickBooks and it might be something that you might need in your business so there’s all kind of apps that work with QuickBooks I just want to make you aware of that and if you ever wanted to just get a handle on what some of the changes are that they’re making in your version you can actually log into QuickBooks Intuit comm /blog and then you’ll be able to see all of the changes and stay on top of what’s new that’s going to wrap up module one let’s go ahead and jump into module two and start talking a little bit about working with the company files that you have to set up in QuickBooks we’re starting to work in module two now and this is where we’re going to talk a little bit about the QuickBooks company files anytime you create a file in QuickBooks it is called a company you can have as many companies as you would like often what you will see as a small business owner might set up one company with his personal information and another company that has the business information company files do not talk to each other you don’t have to worry about the data getting mixed up and like I said you can have as many as you’d like in QuickBooks you have to either create a brand new one which we’ll do in Section three you might already have the desktop version of QuickBooks and you want to upload your file to the online version we’ll look at that in Section two but real quick what I want to talk to you about here is the fact that you do have the availability of a sample file that you can go in and play with as much as you want you do not have to sign up with a subscription or anything like that to access the sample file all you have to do is head on over to QBO dot Intuit comm /r e dr forward slash test drive and the company file you’re going to be working with here is Craig’s design and landscaping services it is a service based business let’s go ahead and head on over there and we’ll check out Craig’s design & landscaping services the first thing you will have to do is just verify your real person I’m going to check the box I’m not a robot and then in this case it asked me to pick all the bicycles I’m gonna go through the list and make sure I got them all and I’ll hit verify now it knows a real person and I can access Craig’s design and landscaping services now while this is pulling up let me just mention a couple of other things about the sample file every day they update the date so you’ll see that date change you’re actually going to be working in the year 2021 in the practice exercise so just kind of know that when you go in here and this is what QuickBooks looks like when you first open it up now I do want to go through this Green and get you familiar with everything but I want to do that over in Section four before we actually go through this I want to show you how to upload your data if you wanted to bring your desktop file over or in section 3 talk about creating a new file so we’ll come back to Craig’s design & landscaping services a little bit later right now I want you to head over to section 2 and let me show you how to upload your QuickBooks desktop files to the online version okay we’ve already looked at some of the sample files that QuickBooks has we now need to talk about how do you actually go through and set up your new quickbooks online account all we’re going to do is navigate to where we looked at the different online subscriptions over a module one and then we’ll go ahead and decide which of those subscriptions we’d like to sign up with or we can sign up with a 30-day free trial let me go ahead and flip over and we will sign it for that 30-day free trial to show you how this works as you can see I’ve navigated back to QuickBooks to accom I think I’ll take advantage of the free 30-day trial I’m going to use this link right here if you see a pop-up that asks you if you’d like to sign up with the 30-day free trial you can use that option as well what I’m going to have to do here is create and intuit account and I can do this a couple of different ways I can actually sign up with Google and if I have multiple Intuit products then I can go ahead and use that one login for all of them I might also choose to use an email address and sign up that way I think I’ll go ahead and do that and use one that I just set up for this and it’s got my name here also it asks you to plug in your mobile number that’s recommended but you don’t have to and the reason that you may want to go ahead and do that is if you happen to forget your username or your login information and – it can help you recover that information by looking at your telephone number that you’ve plugged in you will want to create a password and make sure it’s something that you’re going to remember but hard enough that someone else can’t actually try to get into account remember a good password anywhere in your computer will have at least eight to twelve characters you’re gonna have a combination of capital letters small letters you might have special characters I’m gonna go ahead and choose a sign up with email once I’m done and this is going to create my intuit account I do get the option to skip the trial and go ahead and purchase my subscription but I think I’ll go ahead and continue with the trial for now what’s going to happen now is it’s going to start setting up what we call our company file each file in QuickBooks is called a company you can have as many companies as you like in QuickBooks this is going to launch us through what’s called the easy step interview where it’s going to ask us some questions and based on how we answer those questions it will set up all the options in our company file for us first we’ll see some basic information it wants to know what is the name of your business I’m gonna call mine a BC services and then the next thing it will ask us is to describe the type of business you do now if you start typing in things like plumbing electrical things like that then it’s going to start pulling from a drop-down list and looking for those first few characters there and if you see something close to what you do on the list just choose it there’s no wrong answer here just choose something close to what you do I’m gonna pick for example services and you’ll notice that there are several types of services that it thinks I may want to choose from I’ll just pick professional services in this case another thing that you have an option to do is if you’ve been using the desktop version of QuickBooks and you’d like to bring that data into your online version you have the ability to do that you can check this box and then it will take you into your computer so you can find that file we are going to talk over in section 3 about how to prepare that desktop file so that you can pull it into your quickbooks online file i’m gonna leave it unchecked for now and click Next the next thing I wants to know is what would you like to do in QuickBooks and you might want to do a lot of these different things you might want to send attract invoices organize your expenses manage your inventory if you have retail sales you’ll want to choose this if you don’t you may want to leave that alone maybe track your bills track your sales tax pay your employees and track your hours so you can see that you can choose a few of these or all of these I’m going to click Next to the bottom and now it says what is your role at the business are you an owner are you the bookkeeper maybe the employee usually the owner of the company is the one that sets up the file or it could have been that the accountant set it up for the owner whichever person set it up is actually going to be the admin or the administrator of the file meaning that you’ll actually own it I’m gonna go ahead and choose owner in this case and if I scroll down a little bit you’ll see that it says do you have an accountant or bookkeeper right now and you don’t have to say yes even if you do have one it’s just asking you this because it’s going to set up some of the options as we go down the road for the accountant if you happen to have one I’m gonna say right now then I’m just gonna do it all by myself and I’m gonna say all set at the bottom and now what you have is a basic setup for your QuickBooks company file there’s still a lot we have to do because it’s really a blank company file right now but at least we have the file set up so that we can work on it if you wanted to go through a 30 second tour to help you get down to business on QuickBooks you can do that I’m going to go ahead and close that out and then that is what it looks like when you first log in you are on what’s called the dashboard right now and the dashboard is just a quick way to see an overview of how different areas of your company happen to be doing now do you want to take time and go through this whole what we call user interface here I want to do that over in section 4 so right now let me show you how to logout and then where to go to log back in if you notice in the top right hand corner of your screen you have a gear icon and you can use the sign out option right here and that will go ahead and take you back to the screen now let me navigate away from this and then we will come back and you will see how to log back in so I’m at Google now and when you’re ready to login you want to go to QuickBooks dot Intuit comm which is where we were earlier when we first created our account and this time you want to go over here it says sign-in notice that you’ll sign up with a particular one that you actually subscribe to if you haven’t subscribed and you’re still using that 30-day free trial just use the QuickBooks online option which is the first one and then that’ll take you back in and you’ll be able to log in right over here and that’s all you need to know right now as far as setting up your company file well let’s go ahead now and talk real quick over in section 3 about how to actually go ahead and upload your QuickBooks desktop file if you wanted to bring it into your online account if you happen to have been using the QuickBooks desktop version and now you’d like to pull that data into the online version there’s a little process you need to go through and once you go through the process then you’ll want to run to reports to make sure that all your data pulled in let me go ahead and show you how this process works what you want to do is open up your company file in the desktop version and then go to your menu and click on company and down near the bottom you will see export company file to quickbooks online if you don’t see that option what it means is that you have some updates that you need to do in this version of QuickBooks before you can export this in order to do those updates just go to help and you’re gonna see it’ll say update QuickBooks right here now go through that update process and when you’re finished close the company file then open it back up and when you do you should see the option to export your company file to quickbooks online now what’s going to happen here is it’s going to ask you to log in to your online account once you click start your x4 here’s where you have to login so I’ll go ahead and put in my email address again gmail.com and I’ll go ahead and put in my password and I’m going to sign in now what’s going to happen here is if it doesn’t recognize you then it’ll want to send a code to your email to confirm your account if you had plugged in your phone number when you set up your account that it could send you a text that way I’m going to go ahead and tell it to confirm and I’m going to flip over to my email and get that six digit code and I’ll be right back I’ve got my coat now I’m going to go ahead and plug it in and then I’m going to hit continue at the bottom it’s going to ask me a couple of quick things before it can actually pull it up to the online version this particular one says do you want to bring over your inventory if you say yes you want to go ahead and select a date then you want to go ahead and pull it in from I’m gonna go ahead and say I’ll pull it in from January of 2020 and I’ll go ahead and hit continue the next thing is it wants me to choose my existing quickbooks online company file now if i have more than one you’ll see them all listed here and i just choose the one that i want and then I’m going to go ahead and hit continue at the bottom and now it’s preparing my company file which is Larry’s landscaping and garden supply here this process could take a while what will happen is you will actually get an email from Intuit once this process is complete once it is complete what we’ll want to do is go ahead and open both the desktop version and the online version and run some reports now this one finished pretty quickly I’m gonna go ahead and click on OK and now I should get an email from Intuit remember if you don’t get that email it’s not finished yet it might look like it’s frozen but it’s really not you’ll get it eventually now let me show you the reports that you want to run to compare your data in either version it doesn’t matter which one you do first you’re going to run a profit loss and a balance sheet in the desktop version you’ll get a reports company and financial profit and loss standard now when the report comes up there’s a couple things that you need to do make sure the dates are all that way you capture everything in your company file also make sure you’re running this on an accrual basis right up here you’re gonna want to run that one thing you’re gonna want to run the balance sheet you’re gonna go back to reports company and financial and run a balance sheet standard make sure that you pick all dates you’ll have to scroll up to the top for that and make sure you’re running it on the cruel basis even if in real life use the cash basis for this report we’re going on accrual so that you can make sure you’ve got everything here now I’m gonna go flip over to the online version and show you where to go in there to pull those same reports back in the online version the way you run your reports is if you notice on the left hand side over here you’ll see it says reports and then you’ll notice that both the balance sheet and the profit loss are already set under your favorites you can run either one first it doesn’t really matter I’ll just start with the profit and loss and if you get screens like this that says customize go ahead and just close that out for now and what you want to do is make sure that you choose all from the top of the list here and then make sure you hit run report and you can see there’s the data now you’ll do the same thing with that balance sheet you’ll go back to reports over here on the Left you’ll run the balance sheet make sure that you’re running this on accrual basis and also make sure you’re looking at the dates all at the top you’ll want to make sure accrual is chosen right there like I said and then run your report now print those out and compare those two if all the days it’s the same on both of those then you’ve got everything but if once different than the other then it didn’t actually export all your data and pull it up to the online version and you may want to try it again and that’s how you’re going to pull your data from your desktop version into your online version let’s go ahead now and move over into sections or and I’m gonna give you a quick overview of how the screen looks we call this your user interface okay what I’d like to do in section 4 is go ahead and give you a quick overview of what the user interface looks like basically the screen when you pull it up what is it you’re seeing and how do all those pieces and parts work let’s flip over to QuickBooks and I’ll give you a quick overview when you first log into your company file you’re going to be on what we call the dashboard right here and basically the dashboard is just a quick overview of how the different areas of your company are doing a couple things you’ll notice you have the ability to add your logo you can just click here search your computer for your logo and pull it in there are some things over here that it asked if you’d like to start doing you can click there so if you wanted to start invoicing for example you could choose that option you can also go ahead and set up some payments send your first invoice and swipe cards in person with your mobile app if you happen to have that set up now some of these things are not free they are fee based meaning that in two it will sell these to you so for example if you’d like to be able to accept credit cards then they can set you up with the merchant services account you’ll notice down here are all of your invoice options so think of this as your accounts receivable this would be the amount of invoices that you have outstanding they have not yet been paid over here your expenses those would be the bills that you’ve put in you would be able to see any of those you had not paid yet as well so think of this area as accounts receivable and this as accounts payable here where it says profit loss that is the most important report in QuickBooks because it will tell you if you’ve made money or if you’ve lost money and then over here you’ll just see all of your bank accounts and if you wanted to click on one you could let’s say for example I wanted to go to my checking account this one here is called checking if I double click and open it up that’ll take me directly to the checkbook register now imma close this message real quick we’re gonna spend some time in the register a little bit later but that’s a quick way to get into the register now if I wanted to go back to the dashboard all I have to do is come back over to my navigation pane which is what this is called and click on the dashboard and I’ll be back to where I just was this is called the navigation pane on the left if you went down to banking you would see all of your banking options I’m gonna click on banking here and what this is going to show me is how to actually set up my account so that it is connected to the bank and I can pull in my transactions now I’m going to talk about this a little bit later but you don’t always want to do this if you are actually using the invoicing feature in QuickBooks like you should and receiving payments or if you’re using the bill feature and paying the bills correctly then you don’t want to enter information twice so you can set it up but you’re not always going to want to pull in data from the bank now if you had a credit card it would work perfectly now I know that probably doesn’t make sense yet but we will talk about some of that stuff a little bit later on over/under expenses here expenses are things that you have to pay out you had to enter some bills you wrote some checks to pay those maybe use the purchase order system you can kind of see all that right down here the next thing is your sales these are the things that you actually sell to your customers you’ll notice that under sales I can look at invoices I can also look at my customer list as an example and I’ll just show you what that looks like real quick this is going to be a list of all of your customers and you can see that they’re set up alphabetical in this case by last name we’re going to spend time on customers a little bit later but that’s how you get to the customer list you also have different projects that you might work on in the desktop version they call these jobs in here they’re called projects you might have a particular customer you’re working with but you might have multiple jobs or projects going for that customer under the workers option this is where you’re going to find your payroll options there’s a ton of reports we’re going to be looking at a little bit later you’ve also got a place where you can go in and look at your sales tax and also payroll taxes if you’re doing payroll to QuickBooks you’ve got an option for mileage where you can go in and plug in which vehicle you drove which job you went to which customer you worked with those types of things accounting now this is going to be the one thing you want to remember how to get to because this is very important this chart of accounts is the backbone of all accounting when you spend money when did you spend the money for if you receive money was it a sale you made from your business you’re gonna have to tell QuickBooks where all the money connects to in what we call the chart of accounts we are going to be going through the chart of accounts over in module 3 notice also this is where you would reconcile if you wanted to reconcile your credit card accounts or your bank accounts you do that right there you’re gonna see my accountant which is the next one here if you actually have signed up with Intuit to use one of their QuickBooks bookkeeper accountant people that they have available then this is where you would go to actually find that person and invite them to be a partner with you as they call it there’s also some apps that work with QuickBooks you’ll see that right down here they’ve got a list of some of the more popular ones some of the trending ones or if you wanted to look through some of the different apps down here at the bottom and pick one that you might want to use you can do that down here where it says live bookkeeping this is actually where we were just talking about a few moments ago you could actually go to my accountant and have a an accountant partner with you they also have what they call live bookkeeping where you can actually pay into it and you get a bookkeeper that will take care of your books for you and both of you have logins to your company file so you can both get in there and do work and you can also have conversations so you’ll be able to talk to them live as well and then the last thing here is what we call a cash flow this is something new that will be coming to QuickBooks very soon is called a cash flow Center and you can see that it’s gonna let you know what else going on with your cash accounts meaning with your checking account and things like that and you get a screenshot over here if you want you can join the wait list and when the actual cash flow Center is ready to go then they will send you an email and just give you some more information about it now one thing to keep in mind I did tell you way back in the beginning that if you happen to log in tomorrow and let’s say for example this new button here is not there look for it or look for the options that were underneath it already because they’ve just moved them somewhere else and that’s just something they did recently actually is they used to have those options right over here and then they moved up here recently now just to tell you what the new is anytime you want to create something new like a new invoice or maybe add a bill those types of things you’ll see that in this list and you’ll notice that where it says money in all of these options are your accounts receivable anything having to do with customers whereas money out is your accounts payable and then where it says other these are just some other things that you can create new transactions in QuickBooks if you click on one of these particular options the other thing I want you to be aware of is what we call the gear and you’re going to see that right over here in the top right of your screen and we’re going to go through the gear options over in module 3 I just wanted to give you a quick overview of how this whole user interface looks and how it works now that you have a quick overview let’s head over into module 3 and that’s where I want to spend time talking to you about customizing your QuickBooks files we’re starting module 3 now and I want to start this module by briefly just talking to you about the gear menu there’s gonna be a lot of places in QuickBooks where you can customize things to make it work a little bit better for you but let’s go ahead and start there so that you can see what some of the options are and where you would go to make some changes to your company file the gear option is in the top right hand corner of your dashboard right here and you’re gonna see that when I click on this it’s going to give you some lists that you can look at it’s going to give you some of the tools that are in QuickBooks you’re gonna have access to some of your company options that you might want to go in and change like maybe the address things like that and also it’s got what they call a profile menu for your intuit account right over here when you’re looking in here you want to get really really really familiar with a couple of these specifically this chart of accounts right here we’re gonna spend more time on that later in this particular module specifically in section 4 we’ll get started with that but everything in QuickBooks will run through the chart of accounts that’s why it’s so important that you know where that is don’t confuse the gear icon with this new option way over here this is where you’re going to click if you want to create a new transaction maybe you need to create an invoice maybe you need to create a bill maybe you need to do something like track your mileage those are all new transactions you could create just recently they’ve moved this new button over here and renamed it it used to be right up here and everyone got confused between the gear icon and this now they’ve moved it way over here so that you don’t get confused anymore and it says new meaning new transaction that’s really all I want you to know about the gear menu right now what I want to do now is take you over into section 2 where we’re going to use the gear icon to go ahead and customize some of the options for your company file in section 1 we got familiar with the gear menu there were lots of different options there that you can use to customize how your company file works and I want to take you into the gear menu now and into some of those options and show you how to customize some of those different things so that your company file works best for you let me go ahead and flip over to QuickBooks and we will dive right in I’m going to click on the gear icon and I want to start over in the first column underneath where it says your company you’ll see an option that says account and settings these are going to be like preferences or options that you can turn on or off or edit in QuickBooks as we go down the tabs on the left and we’ll start with company if you want to change anything in these different sections just go over to the right and click on the little pencil icon and that will take you into the edit option you’ll notice here that I can add my company logo just by clicking the plus sign and that will let me navigate through my computer to find my logo I could edit the name of the company if I like also you might want to put in your EIN number or your social security number you’re gonna use your social if you’re a sole proprietor and you really don’t have payroll if you do have payroll you’re going to have to have your EIN number in here so that quickbooks can use it to help you with your payroll i’m going to hit save and that’s gonna save that little section the next little section says company type and you’ll notice the first thing is the tax form and then the industry I’m going to click over on the pencil icon here and I want you to notice that you have the ability to add whatever type of tax form that you actually file when you do your taxes at the end of the year you can add that here now let me just make a little point here you do not have to pick anything here as a matter of fact if you do not file your own taxes if you have an accountant then I would pick other or none every single time your accountant will know what type of tax form that you file if you pick any of these options what will happen is when you’re working in different places in QuickBooks there will be an extra field that says which tax line on the tax form would you like to put this on you’re not going to have a clue if you’re not an accountant and you’ll just get stuck there every single time so why see that field and get yourself stuck I’m just gonna pick not sure other or none and the other thing is you have an industry you chose when you first set up your company file I chose professional services you can change that if you want but I’m going to leave that and hit save the next little section you’ll see here has to do with your company email you’re going to have your customer facing email the difference is that the company email is the private email that you’d like different things sent to from Intuit for example the customer facing email is the one you want the customer to see and that can actually be redirected to your company email if you don’t want to have to open 15 different email accounts you can always have as many email accounts as you want and redirect them to the one you’d like to funnel everything into there’s a place of putting your company phone and your company website here again you would edit that over on the right and the company address down at the bottom same thing you can have a company address that’s seen on the back end and then one that’s called customer facing meaning that’s the one that the customer actually sees let me go down on the left here to billing and subscription this is where you’re going to be able to go in and upgrade your existing subscription if you’d like you’ll notice that you can subscribe right from here and you can see all of the options and we’ve talked a little bit about these before so I’m not going to spend much time on that the next one on the left is usage there are some limits to some of these different subscriptions for example when you’re using the QuickBooks Online Plus and you need more room you’ll want to go ahead and upgrade your subscription for example the one that I’m using only allows me one user if I want to add a user I may need to upgrade my subscription there is a number of items you can put in the chart of accounts as an example it’s 250 just a little fYI the desktop allows you to have 14,500 if I need 251 than I need to upgrade my subscription and then down here where it says classes and locations you can have up to 40 and if you need more than that’s another reason you would want to upgrade your subscription I’m going to go over to sales on the left and there’s several things in here that you may want to go ahead and work with now later on we’ll look at customizing the look and feel of your different forms for example if you have an invoice and you want to add your logo or something like that but these are some things you can turn on or off right here in your forms for example let’s say that you like to invoice your customers and you want the customers to automatically have terms of net10 for example well currently their net 30 let me go ahead and click on the pencil icon and show you some of these here’s where I could change this to one of these other preferred invoice terms if you’re not familiar with the ones that say 1% net10 like these three and there’s two percent notes in and eight basically what that means is the customer invoice will be due in 30 days but if they paid in 10 days they can take one percent off it’s a way to get your customers to pay you early if you have a preferred delivery method you can choose it right here do you like to print things now or would you like to send things later I’m referring to an invoice as an example here where it says shipping if you don’t ship anything then you can go ahead and uncheck this and this will say off if you do ship things then you had some options down here where you can have sales reps and put in purchase order numbers things like that these are custom fields you can also turn those off if you don’t need them if you want pio number not sales rep for example just uncheck the sales rep option you can have custom transaction numbers and that basically means that if you want to put in your own transaction numbers you can go ahead and set that series up you can have a service date field you can also have fields for the discount and deposits or tips or gratuity if you use that you can just go in and turn these on or off I’m gonna hit save right there the next thing you’re going to see is products and services right over here and you’ll see there are several different options related to that that you can turn on or off for example if you don’t track inventory you can actually turn off this inventory option right here I’m going to go ahead and cancel that there’s also some options for late fees there’s also some for progress invoicing and let me just mention what that is just so you’ll know if you estimate jobs construction is a prime example you’re going to want to take that estimate and turn it into an invoice at some point so that your customer can pay you you do not have to pull everything from the estimate into an invoice you can pull in 30% for example or maybe you want to pull in certain items that were on that estimate into an invoice if you do estimates you will want progress invoicing there’s a couple more options here let me scroll down there is an option for messages when you actually email a form so let’s say it’s an invoice for example or what they call a sales form you have the ability to email it directly to your customer you can set the default message and I’ll go ahead and click on that one so we can see you can say Deere or you can say to notice you can have a merge field if you want to have their full name there’s lastname firstname and you can use the standard message that you see right here below when you’re actually sending out that email you can also have a copy email to yourself every time if you’d like I’m gonna go ahead and hit save down at the bottom a couple more things I want to point out you’ll notice there is an option for reminders and I want to briefly tell you how reminders work but before we do that I think we’ll go ahead and stop the video right here let’s go over into the next section and I’m going to talk to you a little bit more about some of these other options here for account and settings hey welcome back let’s go ahead and finish up talking about customizing your company file this is actually part two of section two let’s go back down to reminders I’m going to click the pencil icon there’s a couple of options that you want to be familiar with in here you have the ability to set up invoice reminder emails for an example if your customer is late paying an invoice or you just need some reason that you want to remind your customer to pay that invoice then you can go ahead and either use the standard message or you can go ahead and edit the one that you see down here and you’ll see it just basically says this is a reminder we haven’t received your payment yet you do have the ability to insert a placeholder which basically means that anywhere in here you can put in the company name or the invoice number and that would actually be a merged transaction as what they call it it’ll pull from QuickBooks that information you can email yourself a copy and you can go ahead and save this when you’re done you also have options for online delivery down here at the bottom you’ll see these are email options for all of your sales forms your options for this will be when you actually email your sales form over to your customer do you want to have a short summary show up in the email or show the full details in the email you can also attach it as a PDF right here and some additional options you have is if it’s an online invoice you can actually set it up for HTML or if you want it to show up in plain text but you probably want to leave it online invoice and then click Save and the last one I want to mention at the bottom here are statements and I’ll go ahead and show you those options a statement goes out at the end of the month and basically it starts with the balance from the prior month it shows all of the transactions that month and then what the customer owes at that point it’s really a gentle reminder for your customer to go ahead and pay you statements are not mandatory but they certainly do help when you’re trying to collect money you’ll notice that when you print statements you have an option to list each transaction on a single line or list each one including all the details on that particular one you can also show the aging table at the bottom of the statement and what that means is it will have a field that says one to thirty days another one says 31 to 60 and another says 61 to 90 and that way your customer will know where they fall in that particular aging table I’m gonna go ahead and hit save and those are your options that happen to be under the sales let’s look at the options for expenses expenses are things you have to pay bills that come in the mail that you have to pay for example your options are to show item table on expense and purchase forms you can track expenses and items by customer make expenses and items billable and default bill payment terms make expenses in items billable let me just tell you what that means real quick if you have to purchase a product or service and you want to make sure that you invoice your customer so you can get reimbursed for it instead of just manually putting those receipts in the car or keeping them on your desk QuickBooks will remember those expenses and when you’re ready to invoice the customer you can just pull them in you also have the ability to use the purchase order system so if you don’t use purchase orders you might decide to turn this off also you have this option called messages at the bottom this is a default message that will be sent when you send purchase orders I’ll go ahead and open that one so you can see the default message you can also edit this to say anything you’d like and then make sure you save it when you’re done the next tab on the Left says payments this would be customers paying you there’s a couple things you can do one is if you want you can sign up with QuickBooks to receive payments quicker by going through this little service QuickBooks has it’s very similar to the way PayPal or zel might work you just signup forward if you wanna learn more you can click here and that way you can actually email an invoice to a customer for example they can click a button right there and pay you right then in there QuickBooks will automatically be updated once you’re paid from your customer if you already have some sort of existing account with Intuit for example they have something called go payment or merchant services you can connect it to your QuickBooks as well right here and this is where you connect and the last option says advanced there are several things here I’ll just mention briefly if you want to have the first month of your fiscal year start maybe in September you can actually go ahead and change this it’s going to default to January make it correspond with your real existing started or fiscal year you might have a different date for the beginning of your income tax year so you can go in and change those your accounting method is set for accrual when you run reports you can run them on an accrual basis or cash basis accrual basically means that as soon as you invoice it shows up as income where their customers paid you or not as soon as you enter a bill it will show up as an expense whether you’ve paid it or not if you change this to what they call cash basis you will only show the income once you receive the money from the customer or you’ll only show the expense once you actually spend that money I want to mention closing the books as well because this is an option that you’ll want to think about in real life accounting what happens is you close the books at the end of the month and you close the books at the end of the year and what that means is if you want to make a change in a closed period you can’t do it you need to make an offsetting entry in the current period your books are not closed automatically in QuickBooks it doesn’t remind you anything so if you want to close them you have to come here you’ll be able to go in and you’ll be able to tell QuickBooks that you do want to close the books and then you can set a closing date let’s say you set it for December 31 of 2019 that means that after you are working in the next year but you see a change you want to make in 2019 prior to December 31 you’re not going to be able to change it I’m gonna go ahead and cancel out at that we talked a little bit about tax forms earlier you want to make sure you keep that one also the chart of accounts I know you haven’t seen it yet but basically everything in QuickBooks will run through this chart of accounts and currently they do not have general ledger numbers they’re just a list alphabetical for each type if you want to turn on general ledger numbers you can turn them on right here also you have some options for the markup income account and we’ll address that a little bit later let me mention real quick the track classes and the track locations locations means if you have different physical locations for your business you can turn this option on and every transaction that you work in you can choose which location you want that to go to classes is very similar except it’s not really locations think about this let’s say that you happen to have two different divisions of your company you might use those for your class list and everything you do make sure you pick the correct option from the list there’s some things about forms where you can have it pre-fill automatically automatically apply payments things like that you might want to look through that at some point a project would be like a job related activity you’ll notice that you have the ability to organize all of those job related activities in one place and that is turned on you’re also viewing QuickBooks in the business view there is an option to go ahead and also see this in what they call the accountant view time tracking if you want to be able to track the time that you or your employees spend working on different projects or jobs you have the ability to do that you can also come down and change the currency there’s some date options and things like that all the way down here that means there’s a lot of options in you can go through and set you’re going to want to look through these you don’t have to get them all right away but at some point if you want to set these you just come back in and make all these changes I’m going to go ahead and close that with the X at the top right and that’s going to take me back to the dashboard let’s go ahead & Nail move over to section three and I’ll show you how to manage users one of the things that you will want to do is make sure that each person that is using QuickBooks has their own login you’ll give each person their own username and their own password only the administrator can add edit or delete users you can have up to five users in your QuickBooks file if you need additional ones you can think about upgrading your subscription or purchasing those additional ones that you might need the reason you want to have these additional users set up is because if you want to track down the errors then you’ll want to know who was logged in at the time that that particular transaction was changed you can run an audit trail to see a report on which user was logged in with the transaction used to look like and what it looks like now you also will be able to limit the users access to certain areas of QuickBooks let’s go ahead and flip over and I will show you how to manage the users keep in mind that the administrator has to be logged in in order to work with the users I’m going to go up to my gear icon in the top right-hand side of the screen and in the first column you’ll see an option that says manage users the first thing I want to point out is that normally if you’re using one of the basic subscriptions then you only have five what they call billable users in your plan and like I mentioned earlier you do have to upgrade if you want to have additional users the admin is considered one of the five users and you can see here is the admin name if you wanted to edit the admin information you can choose the Edit over on the right and then come over here to edit user settings typically when you first set up QuickBooks you’re gonna see the email address that you signed up with right here under the first name field and there won’t be anything where it says last name you could come up here and change those like I did I’m going to go ahead and hit save at the bottom if you want to add a user just come over to the right here and click on add user your user that you’re setting up can have what they call standard rights which means that you can choose to give them full rights but you can also choose to limit their access to certain areas or you can give them company admin rights which means they have access to everything these options up here count towards your five user limit we discussed these here don’t because you might have someone you want to be able to log in just to run reports or maybe just to do time tracking I’m gonna go ahead and choose standard user at the top and click Next in the bottom right hand corner of the screen the first thing it asks me is how much access do I want to give this user now if you say all notice it will include payroll and it will check that and you can see all the different things they have access to over here if I go ahead and uncheck that you’ll notice that the things they don’t have access to do or down the bottom they can’t add or edit employees in this case or delete payroll transactions it could be that I say none I don’t want them to have rights to any of these accounting features but they can still manage other things in QuickBooks like submitting their own timesheets things like that I can also give them limited access meaning if I want them to be able to do things with customers you can see the choices here or if I want them to do things with vendors or both you can see I can check both and you’ll see all the options here as well I’m gonna go ahead and click Next and now it asks me do you want this user to add edit and remove users we’re going to say no and I wouldn’t change that because you want the administrator to have rights to everyone if you start giving everyone full rights to change users and that sort of thing then what’s the point in even setting those up notice that you can also give this person permission to add the company info or if you want them to manage the subscriptions you have the ability to do that as well I’m gonna go ahead and click Next at the bottom then it says we’ll invite them to create a QuickBooks account and password for each to access the company file what you’re basically going to do here is the new user you’d like to setup you’re going to put in their first and last name here put in their email and they will actually get an email saying that the administrator would like them to become a user they would accept and then they can set up the username and password make sure that the administrator knows that information you wouldn’t want to have an employee that has their own username and login information and the administrator doesn’t know what it is and can’t have access to what they do that’s going to be very important for you I’m going to go ahead and just X out of this because at this point what would happen is once they accept it then you would see their name down here as a user and that’s really how the users will work I do want to show you the audit trail report but we’ll do that when we get over to reports a little bit later let’s go ahead and wrap up this section and let’s talk over in section 4 about the chart of accounts we’re getting ready now here in section 4 to talk about the chart of accounts the chart of accounts is probably the most important thing in QuickBooks every single thing in QuickBooks will flow through the chart of accounts somewhere the chart of accounts is basically a listing of different areas where you might actually spend money or you might receive money as well and you’ll want to make sure that your information goes into the correct categories that way when you run reports you have accurate information there is a part two to the chart of accounts make sure you watch both parts so that you have a really good understanding of how the chart of accounts works let’s go ahead and flip over to QuickBooks and we’ll get started there are a few different ways to get to the chart of accounts one way is to go through the gear icon and in the first column you will see the chart of accounts another way is just go over to the left and click on accounting and there you will see the chart of accounts as well and this is what your chart of accounts looks like remember that every single thing in QuickBooks runs through one of these that’s why it’s so important that this is set up correctly but let me quickly give you a quick overview of how the screen looks you’ll notice the first column is the name of your account when you’re setting these up you can pretty much name this accounts anything you’d like but make sure that you name them something that makes sense to you or whoever happens to be looking at your reports the second column is the type and notice that it’s currently sorted by type we’re going to be going through all the different types so that you will know which ones you need to set up to make sure that you have everything you need I want you to notice also that when you’re looking down this list and you see the type for example income notice that the names are alphabetical and that will be true of each of these types if you look at the expenses here then these are alphabetical if you want to turn on general ledger numbers you have the option to do that and let me show you what it will look like if you do you’ll actually go up to your gear icon then you’re going to go into account and settings then you’ll want to choose advanced on the left-hand side and under advanced you’re going to see an option that says enable account numbers right here currently they’re off if I choose on just by clicking there and choose enable account numbers notice that turned it on and I can show account numbers and then save and I’ll show you what this looks like now let me go ahead and close this and you’re going to see now that you’ll have a new column at the beginning here where you can actually go through and putting your own account numbers there will not be in here automatically you have to add them the way you would add them is the way you would edit any of these accounts just come over to that line that the account you want to edit is on you’ll see a down arrow and you’ll choose edit and in this window you have the opportunity to add your new account number right here I’m gonna go through this screen in a minute so I’ll just close that for now and I’m going to go back and turn those account numbers off for just a moment account in settings it’s going to be the advanced option on the left and I’m gonna go ahead and turn off enable account numbers just by clicking that word on and I’ll uncheck these and save that now let’s go back and finish going down our list here the next column that you’re going to see next to the type is going to be the detail type and that’s just telling you a little bit more information about the type that you chose there’s also the QuickBooks balance and the bank balance the QuickBooks balance would be if you had entered some transactions in QuickBooks what is that balance for that account the bank balance column will allow you if you pull in your entries from the bank that’s called downloading your transactions then you’ll see what that balance is as well and you can see that you can match those up and see if you’re in sync here and we’ll be getting into that a little bit later but right now what I want to do is start talking to you about the different types of accounts you’d want to add and then we’ll add a few so you can get a feel for how this works the first type that I want to talk about our bank accounts you’ll notice there are no bank accounts at the top of this list that means that right now you do not have a checking account you don’t have a savings account any kind of bank account you have the ability to add these you’re going to be doing this by clicking over here where it says new and the first thing you’re going to do is pick the account type in this case it will be Bank but notice all the other types we’re going to be talking about weird says detail type right here just go ahead and pick the option from the list that closely matches the account type you’ve chosen over here is the name of the account when you name your account you can name it anything you want if you want to call it your bank name you could do that if you want to call it operating account and maybe another ring called payroll account you can do that whatever you like to name it I’m gonna go ahead and leave it on checking for now description is totally optional and there’s not a sub account right now but later on I’ll talk to you about how sub accounts work the other thing you want to think about is a start date to start tracking the money in this checking account now what you want to do is if it’s the beginning of the year like it is currently then you probably want to go back to January 1 or the beginning of your fiscal year and put in all the entries if that’s the case then you can choose beginning of this year you might decide if it’s later in the year and you’re starting your QuickBooks file to go ahead and start with the beginning of that current month you can also pick other the reason you might want to pick other is what if you have a bank statement that cuts off in the middle of the month that would be an option where you can tell it a specific date to start with it really doesn’t matter what date you start with just try to make it correspond to the start date of your bank statement I’m going to go ahead and say beginning of this year and I’m gonna go ahead and put in the balance the ending balance on 12/31 of 2019 would be the exact same number as the beginning balance of 1 1 2020 you’ll want to get that number from your bank statement I’m gonna go ahead and say it was 250 dollars and 62 cents and I’ll go ahead and hit save and close at the bottom and now you’ll see at the top you have a checking account and you have a balance of two 50 and 62 cents you also have the ability to view the register I just want to show you that real quick if I come over here to view register then this is what the checkbook register actually looks like I’m gonna close this this is just some information on what a register looks like and what it’s supposed to do anytime you want to go back to the chart of accounts you’ll notice right up here it says back to chart of accounts and that’s going to take me back to the screen now I also want you to notice something that happened any time in accounting you do something like this then you will have a debit and a credit for that transaction you’ll notice that in this case the flipside the money went to an account called opening balance equity and that’s the way it should be you can’t change that just know that whenever you have a starting balance which could be a minus number if you have a loan but this is going to be an actual picture of what your books look like so don’t freak out if you see a negative number there it’s an accurate picture of your books let’s go ahead and talk about some other bank accounts you obviously would have savings money market accounts things like that but think about do you have PayPal do you accept square those are bank accounts as well so if you do accept those then you want to set this up as bank accounts what would eventually happen is you would transfer money from PayPal or square into your checking account or sometimes you go the other way but those are just bank transfers the next type I want to talk to you about are your assets and you’ll see there are a couple of these here an asset is something that your business owns that makes it more valuable you’re going to have equipment you’re going to have chairs desk lamps vehicles property assets fall into one of two types there are fixed assets which are things you plan to keep long-term like the vehicle or property then there are what we call more liquid assets or QuickBooks cause some other current inventory is a great example of that because I’m worth more right now because I have inventory in the back room but my goal is to sell it and get it out the door now what’s going to happen with assets is you’re going to set up big bucket categories and what I mean by that is instead of listing each vehicle the business owns you’re going to have a category called vehicles and they’ll all dump into that one category you don’t want to have a hundred different categories for your assets because no one wants to sit there and look at that just have big buckets maybe seven to ten good ones some of the common ones that I see are vehicles you might have one called furniture and fixtures you might have one called property if you have a lot of property you might have equipment but again they’re just big buckets this is where the accountants going to be very helpful to you because the accountants going to help you decide which categories to set up and also when you start talking about the money part then the account it’s going to help you plug in how much the vehicles were worth and depreciation and things like that QuickBooks does not do depreciation and that’s because there are multiple ways to do it if you had ten accountants they might all tell you a different way they want it done so just know you want to have the account set up so that if you go to the bank to get a loan for example the bank will know that you do have some assets we’re going to move down the list but before we do I want to go ahead and stop the video here and have you go over into part two and we will continue talking about the different types that you’ll need to set up we’re in Section four and we’ve just talked a little bit about how to start setting up some of the accounts and your chart of accounts I want to go ahead and finish telling you how to set up the rest of those accounts so let’s flip over to QuickBooks and we’ll keep going the next type that I want to talk to you about our what we call your liabilities a liability is something you owe now I’m not talking about the monthly payments you have to pay for the electric bill things like that what I’m talking about is a loan you’ve taken out the bank when you think about your liabilities there are really two types there are what we call long term which are things that you’re going to pay on for more than 12 or 13 months and then there are short term which is under a year basically and QuickBooks calls them other current liabilities when you set up your liabilities you want to set up a separate one for each loan that you have and when I say loan it could be a car loan it could be you as the owner decide to set up a loan where you put money into the business and you want to get paid back you might have borrowed from the bank those are all different liabilities you want to set up and each one should be set up separately let’s set up a car payment so you can get an idea of how you would set up these accounts I’m going to click on new and the first thing it asks me is to pick the account type here you’re going to see your other current which is a short term and your long term liabilities which what I’m gonna choose in this case another thing to notice is that where says detail type if you see notes payable that’s just an accounting term for a loan basically over where the name goes this is where you’re gonna pick the name that you want for your loan I’m gonna call mine the bank of any city but you can call this anything you want sometimes what I’ll see people do is put the last couple digits of their account number here just so that they can see which loan they’re looking at when they have it pulled up in front of them description is totally optional this is where you might say that this is my 2019 Jeep Cherokee loan or you can leave it blank and then we’re going to have to pick a start date now remember if we’re starting your company the beginning of the year what you’ll want to do is for your beginning balance here find out what the amount you owed as of in this case January 1 was so that you can plug that in it’s not the amount you started with when you purchase the vehicle two years ago it’s the amount you owed as of the start date of your company file I’m gonna put $15,000 in here and then hit save and close at the bottom and now what you’re going to see is that you have a loan right here notice it says Bank of any city and the balance is $15,000 every time you make a payment on the loan this is the account you want to put it to your car payment is not an expense to the business do not set it up as an expense account it is a loan and you want to know when you’ve paid off the loan you’ll also be able to on each individual check that you write you’re going to be able to put in how much is principal and how much is interest there the other thing I want you to notice here is look at your opening balance equity it’s a negative number and that’s because I said that when you owe something it’s a negative number and this is an accurate picture of what your books look like let’s talk about credit cards a little bit and I’m talking about credit cards that your business uses to purchase items for the business this has nothing to do with accepting customer credit cards you want to set each credit card account up separately so that you can track each one I’m gonna go ahead and set up a new one for you the type is going to be credit card I’m going to name my card I’ll just call it visa and I’m going to pick the start date of my company file the beginning of this year and the starting balance would be the starting balance from my January bank statement if you don’t have your January bank statement then you can grab your December of 2019 and plug that number in I’m gonna say was $2,500 and I’ll save and close and now what you should see is that you have a credit card and you owe $2,500 when you make a payment towards the credit card you’re going to actually put it to this account always do not try to break it up that so much as gasps and so much was meals because there is another way to do that in QuickBooks all the payments go directly to the credit card account going down the list the next type that I want to mention is where you see equity equity basically means equal if you think about it you’re the owner of the company when you take money out that’s considered an owner draw when you put money in is considered an owner contribution now they’ve got some other terminology you’ll notice owner investment is when the owner puts money into the business and owner pay and personal expenses is when the owner takes money out of the business what I don’t want you to do is make a deposit from your personal account and consider it income it is not income to the business it’s considered equity the next type that I want to talk to you about are your income accounts I’m going to scroll down just a little bit here you’re going to see that there is one called sales income and typically when you make a sale for your business this is the account that you want your sales to dump into you can have a few extra ones added if you’d like maybe you have different areas that you do business in and what I mean by that is in your company maybe you have different things that you do and you’ll want to actually set those up so you can see how much income you’re getting from each one that’s certainly okay keep that list pretty short though no one wants to read 50 different lines of income accounts but sales is normally where you’ll see most of that go into the next thing I want to mention is your cost of goods sold think about the things that you have to buy to make a product or service in your business you have to buy materials you’re going to need subcontractors sometimes maybe you have Freight that’s part of that anything that you have to buy to make a product or service in your business is considered a cost of goods sold and you want it to show up on a profit loss as being deducted from your total income the largest grouping that you’re going to see are your expense accounts and you’ll see there are a ton of these here you’ll also add a lot of these let me show you how to add some sub accounts so you’ll see how this works let’s use car and truck as an example we have the main account here but I want to add a sub account called gas and maybe another one called repairs and maintenance all you’re going to do is go back up to the new option and the top right of your screen here you are going to create a new account and it has to be the same type as the main account so that means this one has to be an expense account and in this case it is Auto and I want to name this one fuel what I’m going to do is check it’s a sub-account of and then from this list here what I’m going to end up picking is car and truck so see how that fuel is a sub-account of car and truck and when I click Save and close at the bottom I want to show you how sub accounts look see how fuel looks like it’s indented a little bit that’s a sub account and there’s going to be a lot of these you’ll want to add when you’re going down this list think about insurance you might have general liability you might have auto insurance those would be sub accounts of insurance going down under legal and professional fees often what I’ll see is accounting and the attorney will be sub-accounts of legal and professional fees and you can just come down and make this list look any way you want there’s utilities at the bottom you’ll want to have telephone underneath gas electric any of the utilities that the business pays that’s going to give you a quick overview of setting up your chart of accounts make sure you spend some time on this and get it set up the way you want it you want it to be as detailed as you need it to be to get your numbers but don’t make it so detailed that no one wants to read it you can always set up accounts later as you go along as well because you’re not going to catch them all right away well that’s going to wrap up the chart of accounts let’s go ahead now and move over into module four and we’re going to talk a little bit about working with accounts receivable and we’ll start with learning how to set up customers we are getting ready to start talking a little bit about the accounts receivable portion of QuickBooks if you’re not familiar with that term anything happened to do with customers in your business that’s called accounts receivable customers are people or businesses that buy from you you’re typically going to make a sale and that’s going to be income to your business we need to talk first of all about how the customer list is set up and then once we do that we’ll go into the second section and I’ll show you how to add some customers to this list the way you’re going to get to a list of your customers is to go over to your navigation bar on the left point to sales and then you’ll see customers in the list at the very top of your customer list here you can see the dollar amount for any of these categories you can see that for open invoices I have thirty five thousand eight hundred and ten dollars these are invoices that have been created and the customer has not paid them even if they owe a penny if you had any of this amount that was overdue you would see that over here and overdue means that if you had set specific terms on an invoice say net 30 meaning that invoice was due in 30 days and the customer has not paid you by then then some of this moves over into the overdue category you can also see how much was paid in the last 30 days in this case nothing there’s also a dollar amount for what we call unbilled activity and for estimates sometimes you will get little messages like you see here right above your actual customer list you can close those with the little X in the right-hand corner and then you can actually see the list the customer list is set up alphabetical by last name you’ll notice that when you look down this list the list is set up by last name comma first name you’ll want to do that because it’s a lot easier to find someone when you’re looking for them if it’s set up that way obviously a business like Adams candy shop would not have it last name and a first name so it just sorts the first letter which is a in this case with the A’s in the list if you see a little envelope to the right of some of your customers that means that if you click there you can actually send that customer and email if their email address was set up when you actually set up the customer then it would pull it like you see here if not you’re going to notice that there’s no envelope meaning that you have not put in a customer email address in the customer information these are what we call sub customers sometimes they’re called jobs sometimes they’re called projects in the online version the technical term is a sub customer they’re both sub customers of in this case Mike Ballack you can also see the customers phone number and the open balance meaning how much money that customer owes you there’s also a column for actions if you happen to be on this screen and you’d like to take one of these actions related to this customer you could do that for example you can go ahead and create a statement or an invoice right from here just know that you’re not always going to be on this screen when you want to do those things so there are other ways to do those actions notice you can also search for a customer right up here so if you wanted to look for Mike bellick for example you can start typing the last few characters of their name and then you’ll see that it pops up in the list over on the right-hand side you have the ability to print a list of your customers you can also export this list to excel if you’d like and there’s also some settings and I want to click on those for a moment because I want to show you that these are going to be the columns that you see up here if I’d like to see their email address I just choose that and notice now I have a column for email or if I’d like to see their address I can click on that and now I see their address as well it’s just how do you want to actually look at this list another thing I’ll mention way back over in the left where it says batch actions if you have multiple customers selected from the drop-down list you can actually email all three of these customers or you can make them inactive an inactive customer is a customer you’ve used in the past therefore you can’t delete them but if you haven’t seen them in a long time and you just want to hide them from the list you can make them inactive that’s a quick overview of the screen itself here what I’d like to do now is take you over into the second section and show you how to add a customer to the customer list now that you’ve gotten a quick overview of what the customer list looks like and how it works we need to start adding some customers to this list let’s go ahead and flip over to QuickBooks and I will show you how to add your first customer if you’re in your customer list you’ll notice in the top right hand corner there’s an option to add a new customer there’s also a down arrow to the right of that because you can also choose to import customers what if you have a list of customers already set up in Excel you can just import those so that you don’t have to set them up one at a time we are going to talk about importing customers from Excel over in section 5 of this module for now I’m going to click on new customer we’re going to put in some customer information on this screen and you’ll notice the first thing it asks for is the company name remember that a customer can be a company a customer can also be an individual that works for a company or it could just be an individual and there’s no company in that case you wouldn’t put anything in the company name field but I’m going to go ahead and put in this customers company its BRC supplies and you’ll notice that because I typed a B it starts pulling down a list of different companies that it’s failed and their addresses so if I want to just choose one of these I could but since I’m typing this inference garage I’m going to go ahead just click over to the side somewhere and then I can come back over and finish filling this out this customers name is Tom Allen and notice it now has a display name as Tom Allen you can change that display name to show as the company name or last name comma first name display name means the way you see it in the list over here remember we talked about the easiest way to find customers is to type it in last name comma first name just be consistent with however you decide to do it it’s also going to use the display name as the same way it’s going to put their name on checks it looks kind of funny if I write a check to Allen comma Tom I’m gonna uncheck the box and then I’m gonna put in Tom Allen and that way that’s how his checks will appear when we put his name in there over on the right you see I can type in an email I’ll just say Tom at Yahoo you can also put in Toms phone number Tom’s mobile fax other end website also if this is a sub customer I can check the box and choose the customer that he is a sub customer of we’re actually going to do that over in section 4 now notice I’m on the address tab and this is where I’m going to put in the billing address I’m going to go ahead and say he’s at 1 2 3 and we’re going to say this is Billings Road this is gonna be in the city of Bayshore California States California and the zip code is nine four three two six the country will just say USA now you’ll notice that the shipping address is the exact same as the billing address if you don’t ship anything you don’t have to worry about that but if you do they may want their invoices going to one address and the actual things your shipping going to a different address you can uncheck the box and change that information if you need to I’m going to go ahead and hit save and let’s see if Tom Allen is in the list he should be in here’s Allen comma Tom and he is you can see it right over here now what I mentioned a couple of things when you’re in this list if you have a customer that you accidentally put in you cannot delete that customer the online version of QuickBooks lets you make a customer in active meaning you hide them from the list but you cannot delete them now what you’re going to see is all the information you had set up about Tom Allen notice a couple of things you can add some notes if you want to this customers record I’ll just click add notes just to show you let’s just say that we can put in here this is a new customer for the year 2020 and that’s a note that’s all you have to do there and now that will show up any time you want to see that notice also there is a tab for the transaction list down here and obviously we have no transactions yet but as we start creating invoices receiving payments that sort of thing they’ll show up right down here the projects these are going to be the jobs that we actually do for these customers there aren’t any set up yet here we can also see customer details this is where we’ve got all of the information we had just set up for this customer and then also if there were any late fees you would see that listed here as well and that’s how you set up a new customer I’m going to hit this customers link here on the top left and take me back to the list of customers and notice Tom Allen has an envelope to the right because we did put in an email address for Tom Allen that’s pretty much how you put in a new customer what I want to do now is take you over into section three and I’m going to show you how to add a sub customer now that you know how to add a customer let’s talk about how to add sub customers a sub customer is basically going to be a way of adding a level underneath your main customer if you have different jobs that you work on for a particular customer you can actually separate those jobs by actually creating sub customers then you can look at reports for the entire customer but also per sub customer in the desktop version of QuickBooks they actually call these jobs sometimes they’re called projects here like I said the terminology is a sub customer let me show you how to set those up to create a sub customer we’re still going to use the new customer button because it is a new customer we’re setting up they’re just a sub of another one we already have existing when this comes up all you want to do is put in the display name you can see in their case they’re using street addresses I’m going to make up one one twenty four and this will be Scottsdale Drive and the only other thing you want to do is come over here where it says is sub customer and underneath it pick the customer that you want to apply this to you can also see it says bill with parent over on the right and you do want to keep this together you can also build this customer individually we’re gonna leave it on bill with parent and you’ll see that it actually pre-populated all of this information from Tom Allen’s setup we don’t need to change any of this unless it happens to be different we’re just going to hit save and then that’s going to be our next level we’ve created you can see it right over here and that’s all there is to creating a sub customer now a couple things you need to know if you’re using the sub customer feature you want to use it consistently throughout QuickBooks if you don’t let’s say that you’re working on some transaction and instead of picking 120 for Scottsdale I picked Tom Allen it’s still going to go to the right main customer but on reports you’ll see other and you’ll go what’s going on you want to make sure that you put it to the correct a sub customer if you’re using the sub customers option not every business will use the sub customer option but it’s really great if you need to break out different projects like I said or maybe you have different locations for our particular customer things like that that’s really all there is to working with sub customers let’s go ahead now and move over into section 4 and I will show you how to edit an existing customer once you have a few customers set up you’re going to realize that you need to edit some of the information maybe you actually set up the information wrong or it could be that the customer information has changed maybe they’ve moved they have a new address you want to add a website you can always go in and edit the information about your customers and it’s a pretty easy process so let me show you how that works if you want to edit a customer’s information make sure you click on your customer over in the customer list and then come over here and choose this edit option let’s say that Tom’s email really includes his last name I’m going to go ahead and add and let’s say that when we set this up we did not look at any of these tabs so let’s go through those real quick so that you’ll know what other types of information you might want to set up when you’re setting up your customers we’ve looked at the address tab now let’s take a peek at notes this is where you can add any notes you would like pertaining to this customer the best thing to do is just drop down after the previous note pop in the date and then pop in any notes that you might have pertaining to this particular customer the third tab over says tax info this has to do with collecting sales tax from your customer if you sell physical items and you charge sales tax you need to tell QuickBooks that this customer is taxable and what the default tax code is we’re going to talk about sales tax later on but just to give you a heads up what you’re going to have to do is where you’re setting up the items or the different things you sell they actually call them products and services in here then what’s going to happen is you’re going to set up each sales tax you need to collect and then you’ll group them together to create one big tax so that you’re charging the customer correctly and that’s where you would put that tax code let’s say that it happens to be the San Domingo we’ll choose that and now what will happen is when we invoice a customer it’ll pull that tax code automatically the next one is payment and billing a lot of this is just information for you first of all the preferred payment method does this customer you usually like to pay you with cash check barter or MasterCard you can kind of see the list there if you need to add a new way that the customer can pay maybe PayPal Square you can just hit add new right here and then you can actually type in the name of that new payment method and then hit save and now PayPal will be on the list since I just added it it does not mean that the customer pays you with PayPal every time it just means that’s their preferred way they typically like to pay you preferred delivery method how do they like to have their invoice sent to them do they like to have them print it and you can print them later or do they like to have them sent email where you can send those later or do they not have a preference terms you can have different due date two terms per customer if you have a really good customer you might have net 30 if you have a customer that’s brand-new you might say do a pom receipt now let me tell you why you have this opening balance field here as of the start date of your company file how much money did this customer owe you let’s just say it was a thousand dollars you could plug that in there and the accounting would be correct but you would not have a way to go back and see that that was actually three separate invoices you sent them that total eight thousand dollars I like to go back and put each invoice in that the customer still owed me four and not fill this in but whichever way works for you would be fine as long as the numbers come out correctly and then of course if you did put an opening balance you would put in the date that that would be as of which would really be the start date of your company file the next tab over says language this will default to English but if you’d like to sing your invoices to the customer and French Spanish Italian you can see the list there you can also have attachments for this customer what this would be is let’s say that you had some sort of file that you actually created or it could be a bill that you received something related to this customer instead of having to get out of QuickBooks and search your computer for that file you’ll be able to open it right here from QuickBooks because it will be attached if I click on attachments here it will allow me to search my computer and find that file and attach it here the last tab says additional info you might have different ways you like to categorize your customers you’ll notice they have commercial customers and residential customers but you can set up this list any way you like it and that’s going to be how those tabs work right there all you have to do when you’ve changed all the information is hit save and that information is now saved in QuickBooks now one quick thing I want to mention to you especially about sales tax if you have a customer you have set up where you charge a certain tax and later you go back and edit the information and change it it’s not going to go back to any prior invoices and change that sales tax it’s only for any new ones you create from this point forward well that’s how you’re going to edit your customers let’s go ahead now and move over into section five and I’ll talk to you a little bit about making customers inactive one of the things you can do in QuickBooks is with any list you’re working in whether it be customers chart of accounts vendors it doesn’t matter if you have an item on that list that you’d like to temporarily hide from the list you can make it inactive inactive customers actually will not show up when you’re working in other areas of QuickBooks but if you wanted to actually turn them back on you could go and activate them again let me go ahead and show you how to make a customer inactive and then you’ll know how to do it when you’re working in other lists in QuickBooks as well let’s say that I want to make Edward Blackwell inactive notice that Edward still owes me one thousand one hundred and twenty five dollars I wouldn’t want to make him inactive because I’m going to be using this customer he’s going to make a payment and I’ll need to be able to apply money typically you make it customer inactive if you haven’t seen them for a while or maybe it was someone you set up and you never used those would be reasons to make a customer inactive let me show you what happens if you try to make mr. Blackwell inactive and he still owes you money I’m gonna go ahead and click on edit and here’s where you go to make a customer inactive now this message is telling me that Edward still owes me money he has a non-zero balance if I say yes and make him inactive then QuickBooks will create an adjusting entry so that he doesn’t owe me money anymore I’m gonna click yes and notice there’s a little error message and that’s because this customer has what’s called a recurring template that’s being used anytime you have something recurring you have to actually delete the recurrence of that whatever it is before you can go in and delete the customer in this case I’m going to go ahead and hit cancel at the bottom and let’s use a different customer Tom Allen because he doesn’t owe us any money we just sent him up I’m gonna go ahead and click on Tom Allen and then click Edit on the right make inactive and now it tells me that tom has a sub customers or projects making him inactive will also make all his sub cover and projects inactive and that’s what you want I’m gonna click yes and now you’ll notice it says Tom Allen is deleted just a little fYI QuickBooks does not have a feature to delete anything from a list in this case a customer if you wanted to quote delete them you’d have to make them inactive and they’re still not really deleted because they show up in the list they’re just hidden so you can always activate them again now if you notice over here it says make active that’s how I go back and activate my customer again I’m gonna click make active and now you’ll see over here it does not say deleted but notice the sub customer does you’ll want to repeat that process with your sub customer select them from the left and make them active and that’s a quick overview of how to make your customers inactive well let’s move on we’ve got one more thing to cover in this particular module I want to talk to you in section 6 about importing an existing list of customers that you might already have into QuickBooks the last thing I want to talk to you about in module 4 is how to import your customers into QuickBooks you might already have a list of your customers in Excel for example or in a CSV file and it’d be really nice to be able just to import them into QuickBooks instead of having to enter them one at a time you will need to set them up a certain way I want to go ahead and pull up the excel file that I have so you can see how it’s set up and even if you don’t have the fields the exact same you can map them once you go through this import process but let me go ahead and pull up the excel file and show it to you and then pull up QuickBooks and we’ll go through and import those customers here I have a list of three customers I’d like to pull in from this excel spreadsheet into QuickBooks and you’ll notice that I’ve got them set up by name company name email phone you can see the list here those are the names of the fields that are in QuickBooks that you want to pull the information into if you can set it up this way that’s the best way to do it but you can also map the fields if you want once you get inside QuickBooks but I wanted you to see this so that you would know exactly how to set it up and make sure you save it somewhere that you can pull it in pretty easily when you go to look for it let me go ahead and flip over to QuickBooks and we’ll pull in John Ellen and Doris all you need to do is make sure you’re in your customer list and go up to the down arrow next to new customer and choose import customers here’s where you’re going to select your Excel or your CSV file that you currently have your customers in minds call customer list and I’ll just choose that and you can see it brought that file in now all I have to do is click Next at the bottom and here I can map my fields to the fields that are in QuickBooks you’ll notice the first column are the names of the QuickBooks fields and over here will be the names of the fields you had in your file if the names don’t match exactly like this one says name but maybe in your Excel spreadsheet this one said first name for example then you would choose it from the down arrow if there’s not a match like company for example when I look in my excel sheet I did not have one company then I’ll just say no match and it won’t be able to pull anything in the ones with the checkmark that you see are the ones that actually have a match to the QuickBooks fields that sees the exact same name that it sees over in your Excel spreadsheet in this case once you’re finished going through that list you want to go ahead and click Next at the bottom and you’ll see that there are three customers now that are ready to be imported if I had a lot of these I could go in and search for these by filtering and typing in the name of that customer it’s going to be pulling in the ones that have the check mark next to them I’m go ahead and import all three of those I’ll just choose import at the bottom and now you’ll see that it’s brought in those three customers let’s look first of all for mr. Stewart we’re gonna go down the list here and you’ll notice that here is John Stewart he was the first one on our list it has now imported all the information was in that excel spreadsheet well that’s going to wrap up module four where we’ve talked a lot about customers now that we have our customers in we can move over to module five and talk about sales transactions using these customers hey there we’re working now in module five and in this module we’re looking at all the different types of sales transactions that can occur when working with customers these are going to be things like are you invoicing customers are you receiving payments from those customers maybe making deposits credit memos things like that before we get started over in section one I want to go through very quickly with you the sales tab that’s in QuickBooks and show you an overview of how it works and what type of information you can get out of it let’s go ahead and flip over to QuickBooks and we’ll look at the sales let’s give her to our navigation bar and point to sales and then I’m going to click on overview this is just a quick overview of your income over time you can see that I’ve got two hundred and twenty dollars that it looks like I made this month and I made that the week of February 16th through 22nd notice I can actually point right up here as well and see that information if I wanted to change this and see how much I’ve made this month this quarter for example you can see last year this year you’ve got different choices here I’m going to go ahead and choose last month and it looks like last month we brought in over $7,000 and you can see the high points of when you brought in the most money in this case January 19 through 25 down here I can see how many invoices are overdue and also the ones that I’ve already sent out that are not due yet and that’s three thousand nine hundred and seventy-six dollars I might also have some money I’ve received that’s not deposited yet and you can see that here and also I can see the amount that I actually did deposit over on the right here these are some things that you can opt to set up with QuickBooks and some of these are paid subscriptions but if you want to set these up you’ve got different ways customers can pay you that would be Apple pay if you want them to be able to pay you direct deposit things like that you can set those up with Intuit you can also set up to get paid anywhere so if you have an app you’ve downloaded to your phone you can accept payment right there or you can send out an invoice to your customer that they can pay online they can actually click that invoice and then pay you right then and there like I said some of these are paid you will want to look into those before you sign up with one of those subscriptions if you’re interested in learning how the QuickBooks payments allow you to get paid online or in person you can watch this video here and then they have some shortcuts to some of the things we’re going to be talking about as we go along right down here but this is a quick overview of your accounts receivable now notice the next tab over will show all of your sales here you’ll see all the information on any sales transactions you can see all the transactions listed at the bottom so you’re going to see invoices payments credit memos if you look down the list here’s a time charge there’s a sales receipt or refund any transaction that happened with your customer is going to be on this list you’re going to see all the information about the transaction the balance the total and all the way over on the right you can take an action related to that particular transaction if you click the down arrow notice that you can either copy this you might want to delete it you might want to send a reminder you kind of see your choices there the next tab at the top that you’re going to see are your invoices these are just invoices that are not yet paid you’ll notice it shows you all the information about each of the invoices the balance the total if it’s overdue maybe not sent or if it’s partially paid you can see some of these and then of course here’s your actions again if want to take one of these actions related to one of these invoices the tab that’s next is your customer tab and we’ve spent a lot of time on that and the last tab says products and services products and services are things that you either buy or sell to your customer they can be a physical item it could even be inventory or just a service you provide and you can see for all of these that you can look at all kinds of options related to whatever is underneath that particular tab that gives you a quick overview of how to use the sales option what I want to do now is take you back and let’s go ahead and get started looking at how to actually create sales receipts for those customers that want to go ahead and buy something and pay you at the same time when you make a sale to a customer there are a couple different ways to record that sale one way is to create what’s called a sales receipt this is almost like point-of-sale if a customer comes in makes a purchase and gives you the money right then you can put all of that on one transaction and send them on their way with a receipt the other way that we’re going to talk about in section 3 is actually invoicing customers and that’s where you send out an employees and the customer pays you after the fact but right now let’s focus on sales receipts let’s flip over to QuickBooks and I’ll show you how to enter sales receipt you want to start by going to your customer list look down the list and find your customer and the sub customer that you’d like to send a sales receipt to if you’re using sub customers always pick the sub customer if you just pick the main customer what will happen is you’ll look at reports and you’ll see other and you won’t know what that refers to so just make sure you always choose the sub customer notice when I go all the way to the right here and click the down arrow I have an option to create a sales receipt the first thing you’ll notice is that it brought in the customer and the sub customer you chose if you want to change those you can actually pick those from the drop-down list the next thing you’ll see is a place to put in the email if you want to email this to more than one email address notice that you can type them both in here but just separate them with a comma and if you need to cc or BCC some additional email addresses you’ll see those here there’s also our check box that says send later that’s because you have the ability to set up the sales receipt and not actually send it right now it could be that you’re not really sure of the quantity but you want to go ahead and get this set up and saved you could do that you’ll see abroad in the billing address and it also has the sales receipt date which would be the current to date if you want to change this date you can just click the little calendar like I did and change the date now in this case they’ve customized this sales receipt to have an additional field that says crew number if you wanted to plug something in there you would just type in the number for that crew or not use it at all and we’re going to come back to the payment method in a moment let’s go down to product slash service if you click your mouse in the first area there you’ll see that there’s a drop-down list of all the products and services that you sell your customer if I go down this list you’ll see there are rocks these are garden rocks and if I choose that it will bring in a description and I can edit the description or add to this as much as I like I can cover to the quantity and put in how many of these the customers purchasing and the rate will say we sell these for $25 notice when I tab through it it’ll do the calculation three of these at 25 cost $75 and this is subject to sales tax typically physical items are but services you provide are not the little trashcan that you see at the end would allow you to delete this line now let’s say I’m going to add one more to this I’m going to go down and pick a service let’s say that we have design services and I’ll just put this over in the description and then I’ll say the quantity is 1 and we’re going to charge $100 this and notice this one is not automatically subject to sales tax I do have a third line available if I want to put something else in here if you don’t see an available line click where it says add lines and that will give you a line to type in notice you can also clear out all the lines if you wanted to do that right underneath it you have a message that will be displayed on the sales receipt it currently says thank you for your business and have a great day but you can put anything you like in there and also if you wanted to put a message and have to display those statements you could put that in here and just type it in over the right you’ll see it shows us our subtotal you can see that $75 of it is subject to sales tax and in this case they’re using a sales tax called California and it’s 8% six dollars in this case if you want to give your customer a discount you can get them a percentage discount or a value meaning a dollar amount let’s say I want to give them 10% I’ll just type in 10 with a % and notice it deducts 18 cents and if I scroll down it’ll show me the amount received and the balance due now remember because this is a sales receipt we’re going to put on this the payment amount they’re assuming we’ve received all of the payment back up here’s where I can choose the payment method if they paid me with Visa or if they pay me with a check I can pick any option I like and there’s a little place for a reference number now if you had a Visa card you wouldn’t have a reference number with a check that would be a check number the next thing you’ll see is deposit – and it says undeposited funds your other choices would be to go ahead and deposit this – maybe a checking account for example you can see the list let me explain undeposited funds for just a moment in your chart of accounts you will have an account called undeposited funds this is a place where money sits that you’ve collected but you have not yet taken to the bank a customer came in paid you with a check you want to show QuickBooks the sales is paid so you’ll choose deposit to undeposited funds but it might be that you’re gonna collect all the monies you receive today and make them all one big deposit that’s when you choose undeposited funds if you knew this was the only thing that was going to be in this deposit you could choose checking and skip the next step of making a deposit I’m gonna go ahead and leave it in undeposited funds and when you’re finished down at the bottom you’ll want to either just save this or you can choose save and send which will email it or from the down-arrow you can say save and close we’re going to close this and now that transaction has been completed you’re going to notice when we look at this that Tom Allen 124 Scottsdale does not owe us any money however if we go over to the all sales and look here we should see Tom Allen’s sales receipt right here for a hundred and eighty dollars and 82 cents and it says it’s paid here’s where we could go and actually print this I want to view or edit this you’ll see here that this is your sales receipt where you can make that change if you need to I’m gonna go ahead and get out of this I’m gonna hit the X and cancel it and that’s how you would go in and actually create a sales receipt that money is now sitting in undeposited funds I want to take you over to your chart of accounts which happens to be over here under accounting and show you that account so that you can see the money there let’s see our chart of accounts and here’s undeposited funds now you can see it has two thousand two hundred and forty-three dollars in there but if I view the register over here you’ll see the transaction that we did and also which is right here any others that were already sitting in undeposited funds so hold that and when we talk about making deposits in section five you’ll see how this all comes into play but one way to keep a check on yourself is if you know everything’s been deposited then there shouldn’t be any money in undeposited funds okay let’s go ahead now and go over into section three and talk about invoicing customers we’ve talked a little bit about sales receipts and now let’s talk a little bit about sending out invoices to your customers remember the difference in a sales receipt and an invoice is that on a sales receipt the customer is standing right there you’re going to put in the line item they purchased you’re going to put in they made a payment the invoice is where you’re going to send an invoice to your customer and wait for payment at a later date sometimes you email these sometimes you mail them it really doesn’t matter you’re going to receive the payment at a later date let me show you how to create invoices for your customers it’s very similar to the sales receipts but I want to show you where to go to get started creating invoices there are a couple of different ways to get started creating an invoice you’re going to head over to the navigation pane and point to sales you can either use the invoice option here or the customers if you choose the invoices option here you’re going to see a list of all of your invoices that you currently have and if you want to create a new one you can choose new invoice from right here if you started with the customers you would just come back to sales and go to customers this way then what would happen is if you had a customer you want to create an invoice for you could check them off head all the way to the right under the action column and then you can create an invoice this way either way would work whatever works for you you’ll notice this way because I had a customer selected it pulled in all that customers information now if I want to change that I just click the down arrow and choose the new customer from the list remember I told you that if you’re using sub customers always always always pick the sub customer you want to go with the lowest level so that when you look at reports you don’t see other on your reports I’m going to start with Freeman Sporting Goods I’ll choose 55 twin lane and now you’ll see it’s changed the customer email and the billing address if you didn’t have an email setup in your customer setup then you could physically type an email here you can also choose to be cc or CC someone just by choosing this option and putting their email addresses in here I’m going to hit cancel you can also send this later if you have this checked that means that you can create this invoice and then save it and then create another one and check the same box if you’ve done that you can email both of them at the same time that’s called sending a batch or emailing a batch if you happen to see that something’s changed at the billing address go ahead and change it here it’ll prompt you when you go to save it and ask you if you want to save this permanently in their record because we had terms of net 30 setup in the customer setup you’ll notice the invoice date is 212 but the due date is 313 which is 30 days from the invoice date if I change this to net 10 you’ll see the due date is 10 days just make sure the due date is the date that you want the invoice to actually be due to you the crew number is a field they custom setup for this particular exercise you can go ahead and plug in some numbers just to keep it consistent there and then you can pick a product or service from the list to invoice your customer I’m going to choose installation and let’s say that I’m going to charge them a quantity of one at $200 remember a service is non-taxable so you will not see a green checkmark there if you happen to see one just uncheck it and if you have a second line you’re just going to type on the second line whatever information you want to invoice the customer for here’s where you have your message that will appear in your invoice automatically you can type in there and change that to anything you like also when you’re sending out a statement to your customer then you can have a message on that statement appear as well whatever you typed in here you’ll notice that you can also put in an attachment let me scroll down just a little bit so you can see that if you happen to have some sort of file that was already saved in your computer you could attach it here an example might be if I’m installing landscape design I might have hired a subcontractor to do that and maybe the subcontractor has already sent me a bill and I want to attach that to this invoice over on the right if you’re going to give your customer a discount you can give them a percentage discount or a value discount I’ll choose value and give them $25 and you’ll see it will deduct it from my 200 so now that the balance due is 175 couple of things at the bottom you’re going to be able to do you can print or preview this right here you can also make it recurring and what recurring means is if this is something that happens on a regular basis then you can set QuickBooks up to automatically just put this in whenever you’ve told it to let’s say once a month it inserts this invoice automatically and then you can customize this a little bit if you want to do things like they added the crew number you’d be able to add fields like that at the bottom you have an option that says save you have your save and close’ and if you wanted to create a new one you could click the arrow and choose save and new I’m going to choose a save and close though and you’ll see now that our invoice has been completed if I wanted to go back and look at this I can actually come up here to invoices and then I can look down this list and find the one I’m looking for and that’s how you’re going to create an invoice for a customer let’s go ahead and move on into section 4 and I’ll show you how to record the payment once a customer actually pays you now that you’ve created your first invoice the customer is going to mail you a payment at some point now it doesn’t matter how the customer paid you you’re going to record their payment the same exact way we’re going to go in and tell QuickBooks how much the customer paid the date they paid all the pertinent information and when we’re done we’ll see that the invoice will show as being paid if they’ve paid the full amount if they haven’t it’ll show the balance or if it’s an overpayment it will show that as well let me show you how to record a customer payment before we receive our first payment I’d like to take you over to the report section QuickBooks just head over to your navigation bar click on reports and the reports from the menu and this is all the reports that are in QuickBooks we are going to take some time in a later module and look through the different reports but right now I’d like you to head down to a section that says who owes you these are your accounts receivable reports if you head over to the second column you’ll see the second one is called the open invoices report and you can just click to run that one now these are all of the invoices that you’ve sent out that have not yet been paid even if the customer owes you a penny if you remember in the previous section we actually created an invoice for Freeman Sporting Goods and we did one for 25 Twin Lake and here it is right here 175 dollars I want you to notice that in any report if you want to go to that particular transaction you can see this is a link and you can just click anywhere and actually open up that invoice I wanted to show you this first because once we receive our payment this invoice will actually disappear if it’s paid in full or you will see this invoice and the balance is owed right over here not the hundred and seventy five dollars that it originally was invoice for now that you see that let’s head back over to our customers we’ll go to sales and we’ll go down to customers now let’s go down and find our customer we’re going to receive the payment for and this is going to be Freeman Sporting Goods 55 twin Lake you’ll notice over in the action column that you can receive a payment this is the received payment window and the first thing you’ll notice is it pulled in my customer in my job I don’t need to change that unless I happen to want to pick a different customer and job I can look for an invoice by invoice number if I want to I can click there just type in the invoice number and hit find and it will search for it for me the next thing is the payment date I’m going to say this was received on February the 28th and here’s the payment method now here’s where you can pick the way that the customer actually paid you did they pay you with cash did they pay you with MasterCard Visa PayPal if you happen to take other payment methods you’d like to add like venmo or square or even Bitcoin just come up here to add new and all you have to do is type in that new payment and then just hit save and from now on that payment method will actually be on the list there now I’m just going to say in this case it was a check though and I’ll put it in the reference number that would be the check number and then just notice the money is going to go to an account called undeposited funds now hold that for a moment we’ll come back I want to finish the rest of this and explain this part to you now over here it assumed that my customer paid me the entire balance they owe for all of their invoices and we know that’s not always the case here I’m gonna put in the amount that the customer did pay me let’s say the customer paid me a hundred and seventy nine dollars now if you notice down at the bottom these are all of the invoices that are still open even if the customer owes me a penny you’ll notice what QuickBooks does is assumes the customer is paying all of the first one the rest of the money goes to the next one and then the balance of the money goes down to the next one all the way down now that’s not always how the customer has asked you to apply their payments let’s say in this case they’re not paying the first one they’re paying one hundred and seventy five dollars on this last one and they’re gonna pay the four dollars on this one and that’s why it was a hundred and seventy nine dollars always make sure that you have the correct invoices checked off and their correct amount over here that the customer is paying towards each of the invoices a couple of other things to notice when you look down at the bottom there’s going to be a hundred and seventy nine dollars worth of money that’s applied and there’s no credit memos right now but if you had one you had issued for this customer then you can apply that credit memo to one of these employees that would be open here if you want to clear the payment you could that would let you start all over filling this form out and the notice at the bottom there’s a place for a memo over on the left and there’s also a place where any attachments if you wanted to add something here and that’s all you need to do to receive payments it’s pretty easy process but I do want to go back up to this right here with sister – and talk to you about what your options are currently if you receive payments the money’s going into this account called undeposited funds I’m going to go ahead and save this real quick and then I want to show you where undeposited funds is and then we’re going to come back in a second so I can show you where your other options are now if I close the receive payment window and head back to the chart of accounts I’m gonna go down here to accounting chart of accounts you’ll notice that if I go down the list there’s this account called undeposited funds currently there’s two thousand two hundred forty one dollars and fifty two cents in that account this is where money sits that you’ve received but have not yet deposited into the bank a good way to keep a check on yourself if you know that everything’s been deposited this should be zero let’s look at this for a second and see if we can figure out what money happens to be sitting in here notice you can click to view the register over on the right and what you’re going to notice is that right now it looks like there are three payments sitting and undeposited funds one of them is being the one that we just received none of these three are in the checkbook yet because they have not yet been deposited okay so let’s head back over to our payment that we just looked at I’m going to go to sales and go back to customers and let’s go down and find our customer Freeman Sporting Goods 55 Twin Lake and I’m just going to click on that for a moment and here you will see the payment that we just received I’m gonna go ahead and click on that just to open it back up here were your other choices I could go ahead and put the money right in the checking account and this will skip the next step that we’re going to do but let me tell you why you may or may not want to do this if the hundred and seventy nine dollars is the only thing that’s going to be in that deposit then you can click checking hits save and close at the bottom and you are done with the whole process but if you think you might receive another payment possibly from another customer and this one and the new payment are going to be together in the same deposit that’s when you want to pick undeposited funds and this will make more sense once we go through and make the deposit over in the next section but I’m going to go ahead and click Save and close at the bottom here and let’s see if that invoice shows that it’s been paid when I go down the list and look at the invoice for 175 dollars it does show that it’s been paid in full if there was one penny left it would not say paid right here that’s how you receive a payment for a customer when you’ve sent out an invoice the next step in the process would be to actually take that money and make a deposit why don’t we head over into section 5 and I’ll show you how to make deposits now that we’ve made a sale for our business we’ve actually invoiced a customer in this case we got paid and now we want to take that money and put it in the bank and that’s where the make deposits option comes in it’s always going to be the last step in this process no matter how you receive the payment whether it is a Visa card cash a cheque you’re going to have to make deposits and you want to make sure that your deposits and quickbooks match what actually happened at the bank let’s go ahead and flip over to QuickBooks and talk about the make deposits option the easiest way to record that deposit is to click the new button right here and over on the right here under other you’ll see bank deposit this window here is going to be your actual deposit slip a couple things you’ll want to double check on is make sure you have the correct bank account chosen here it’s very easy to have the bank account that you last use show up in that field and then you can’t find your deposit notice that the balance in the checking account is one thousand two hundred and one dollars and this is the date of the deposit let’s say I’m going to make this deposit on March the second now down at the bottom these are the three sets of monies that we saw they were sitting in undeposited funds what you’re going to do is check off all of the ones that are going in this deposit if all three are going to be in this deposit you check them all off if maybe the first two we’re gonna be in that deposit and then maybe this last one was in a separate deposit do them separately because you want these to match what actually happened at the bank let’s say in this case though all three are going to be deposited a couple of things when you’re looking at this list here you can go and change the payment type if you didn’t do it when you were actually receiving the payment you’ve also got a place for a memo if you’d like to fill that in and then you can see there’s the reference number column and then the amount column over on the right my deposit will be two thousand two hundred forty one dollars and fifty two cents now right down here it says cashback goes to if you happen to have a business bank account you’re not going to be able to get cash back but as a sole proprietor you could if you’re going to keep some cash then you would say cashback goes to this account and you would pick whichever account this went to you would also be able to have a memo and if you were going to keep 20 bucks you could type that in and it would deduct it from this total right up here there’s also a place to add funds to this deposit if I click this little arrow it’s gonna open up this part here and I can add some additional monies now this could be something like maybe you got a rebate from Staples you could type that in if that was the situation it would say received from Staples the account would be office expenses or office supplies pick whichever account you actually use when you purchased the items for that rebate and put it back to the same account you’ve got a place for a description the method and the amount of money it could be you’re also going to put some personal money into the business if that’s the case then the account you want to choose is that owner equity if your members talking about that in an earlier module but remember that everything that goes into a deposit is not always income to the business so make sure that this goes back to the correct account if you’re adding additional funds notice if you need more than the two lines you could add additional lines and have as many lines as you’d like here you can also add a memo to this deposit if you’d like or add an attachment down at the bottom and that’s all you need to do as far as making a deposit now couples just other options you could print this deposit out down at the bottom or make it recurring it could be that you have a customer set up on automatic draft where they actually pay you $1,000 a month let’s say and this would be that deposit lots of different scenarios there I’m going to go ahead and hit save and close down at the bottom and at this point the money is actually going to be in my checking account remember it’s two thousand to forty one fifty two now that whole process of invoicing a customer receiving a payment and making that deposit has been taken care of now let’s go look in the checking account and see if we can find it it just so happens that on the overview right over here where we are the checking account is here that is one way to link to it to look at the balance another way would be going down to accounting to our chart of accounts and just opening it that way any of this would work I’m going to go ahead and view the register when I look in the register you’ll notice that there’s my deposit right there notice it says split because it split amongst multiple line items in this case we had three different transactions that went on the deposit itself I’m gonna go ahead and cancel that and that’s the process of actually making a deposit the next thing I want to do is take you over into section six and show you how to set up credit memos for customers there are times when you will want to issue a credit memo to an invoice let’s say you have a customer that just isn’t happy with your services and they refuse to pay one of your invoices you can actually leave it on the books for awhile if you’d like but eventually you might want to credit that off let me go ahead and show you how to create a credit memo the first thing that you want to do is look up the original invoice and see what it is that you charge them for to begin with I’m going to look at Red Rock diner and you’ll see there’s an invoice for $70 here I’ll just go ahead and open it up and you’re going to notice that we charged them for pest control it looks like probably two hours at $35 an hour for total of $70 now let’s say the customer just wasn’t happy with us and we’re going to just credit that invoice when we create the credit memo we need to use the exact same product or service that we charge for to begin with the way you’re going to create the credit memo is come up here and click on new underneath customers you’re going to see credit memo plug in the customers name in this case it is Red Rock diner you’ll see it populates their email their billing address and it’s going to have the current date for the credit memo date just make sure you put the date that you would like we’re going to be looking at tags over in section nine let’s just hold that for a moment and let’s go down to product or service here’s where we’re going to put in pest control remember you want to credit the same product or service that you invoice for to begin with we’re going to choose the quantity of two at 35 and that’s going to give us a total of 70 all we have to do now is go ahead and go down to save and close now that the credit memo has been created I want to show you two things that happen on your customers account notice here’s the credit memo and it says it’s closed and then there’s a payment that wasn’t there before now this payment is where you’re going to go to actually apply the 70 dollars to the correct invoice because see how the invoice is still open over here I’m going to click on the payment now if it sees an exact to match it we’ll go ahead and check it often but if it doesn’t come down and choose the correct invoice and then notice the credit memos at the bottom so you want to make sure those two are checked so they apply to each other so you’ll notice down here the amount to apply is $70 and that’s all we have to do we’re going to save and close at the bottom and because this transaction is linked to others it will ask us if we’re sure we want to modify this and the answer is yes and now when we go back and look we’ll see that the credit memo is closed the payment is closed and if the invoice is actually paid so remember this is a two-step process you have to create the credit memo they go back to the payment and actually apply that credit memo to the correct invoice now that you know how to create credit memos I want to show you over in section seven how to actually give your customers a refund there are times when you want to issue a refund to a customer and that would be if a customer has purchased something and paid in full and you want to actually give them their money back that’s the difference in a refund and a credit a credit usually sits in their account until you just credit the money off of your books whereas refunds you actually give customers than running back let me go ahead and show you how to create a refund we’re going to create a refund receipt but before we can do that we need to go ahead and look up our customer and see what it is that we’re actually going to refund them for this is Duke’s basketball camp if you notice they have an invoice here for four hundred and sixty dollars and forty cents that is paid in full I’m going to click on invoice to actually open this up and you’ll see that the second line are some garden rocks that they purchase from us they purchased six of them at twelve dollars and let’s say that they’re going to return three of them at twelve dollars because they didn’t need all six of these we’re going to go ahead and close this now and now we’re going to create our refund receipt we’re going to go over to the new option on the navigation pane we’re going to come down to refund receipt here we’re going to pick our customers name in this case it’s going to be Duke’s basketball camp you can see it pulls in their email and their billing address and we just need to make sure we have the correct refund receipt date down here which says payment method this is how the customer actually paid you they wrote us a check let’s say and we’re going to refund them from our checking account if you’re going to actually print them a check then it’s going to let you print this later or if you want to go ahead and print it from here you could leave that check number now let’s go ahead and put in the correct product or service and we decided that this was garden rocks and so we’re going to go ahead and choose that and remember they’re returning three at twelve dollars and that makes thirty six dollars if the item was subject to sales tax when the purchase was originally made then QuickBooks will automatically choose the tax option to give them their tax back as well you’ll notice this equates to thirty six dollars the total amount refunded will be thirty eight dollars and eighty-eight cents I’m going to go ahead and hit save and new at the bottom and now that refund receipt is done I’m going to click OK here what it says it was successful and now let’s go back and look at their account if I’m looking at Duke’s basketball camp you’ll see here’s the refund right here and you’ll notice that it says it is paid now if you want to actually go ahead and print a check then all you have to do is over here it says print check and you’ll notice that it automatically has Dukes basketball camp and a checked awaiting to be printed for thirty eight dollars and eighty-eight cents just double check that you have the correct checking account at the top and make sure you have the correct check number that your check is going to be now if you were giving them cash you would have chosen cash from the option back over in the refund receipt and then that would have just been done that’s really all you have to do at this point you can actually go down and you can preview and print this and then that will be the end of it there’s the preview you would hit print and it would print out and that’s how you create a refund for a customer it’s called a refund receipt let’s go ahead and take a peek now at creating statements for your customers one of the things you have the ability to do in QuickBooks is send statements to your customers a statement is basically a gentle reminder to your customers that they owe you some money typically statements are sent at the end of each month and they show the activity that happened during that month you don’t have to send out statements but it’s a nice little feature to keep your customers abreast of what’s going on with their account let’s go ahead and flip over to QuickBooks and we’ll see how statements are created when you’re ready to create statements for your customers just go to your navigation pane and choose the new option over here where you see other if you look down you’ll see statement the first thing you have to do is pick a statement type you can choose a balance for word any open items for the last gear basically and then you can also choose a transaction statement I’ll choose balance for word for the statement date you generally want to pick the end of the month that means that in this case the start date would be January 1 and the end date would be January 31 for the customer balance status you can choose all open or overdue I’m going to choose all and then apply and these are all of my customers who met the criteria they call this the recipients list if you’re looking down this list and you see one that you don’t want to send a statement to just come over here and uncheck the box now when you’re ready you can print or preview these down here in the middle I’m going to click on print or preview so that we can see what a statement looks like now I’m going to have one here for each customer you’ll see as I go down the list there you go and for each one you’re gonna be able to see all of the activity for January 1 through January 31 the first thing you’ll always see is the balance forward from the previous month notice up here tells you the total due and there’s a place where the customer can actually send you a check and if they want to type in the amount closed or write it in right there they can do that and then down at the bottom of the statement it shows you how much of this is in the currently due category how much is in each of these categories and then again the total over on the right and that’s what a statement looks like you can pick any date range you like when you’re creating statements if you just want to send one to one customer you can do that but that’s an overview of what statements look like and how they work I’m going to go ahead and close this and you really don’t need to save or save send us once you’ve printed these out you can go ahead and just X out at the top and then it’s ready and you can print them the next time well let’s go ahead now and look over in section 9 and talk a little bit about how a new feature of QuickBooks called tags is going to work there is a brand new feature in QuickBooks Online that they’re rolling out right now called tags and what tags will allow you to do is create certain words that will appear on a drop-down when you’re in different transactions in QuickBooks and you can choose those and later you can use those to search for things or to run reports based on those tags if you’re familiar with Gmail we’ve got something similar in there where we can create a list and tag different emails and then search for anything that would have that particular tag we’re looking for this is still in beta right now if you happen to not see it when you open up your QuickBooks Online and just know it’s coming they’re just rolling out in stages right now and you may not have all the options related to tags yet but just know it will be coming somewhere down the line let me give you an example of how you might use this feature currently we have a feature in QuickBooks called classes and we’ve kind of been using that in the way that tags will work but let’s say that you have an attorney’s office and you have four different attorneys in that office you might want to run reports on the company as a whole but you might also want to run reports on each attorney if you had this list of classes set up you could just pick from the drop-down list in each transaction you’re in which attorney that this should be tagged to and we’re going to use tags in the exact same way I don’t know if they’re going to get rid of classes down the road somewhere but tags are going to be a really nice feature so let me flip over and show you what’s in there now and like I said if you don’t see these options or you see something new down the road it’s because they’re rolling it out it’s still in beta the way you’re going to access your tags option is through the gear icon on the top right hand side of your Green and underneath the list right here you’ll see tags now currently we don’t have any tags set up but once we do set up our first tag you’re going to see the top of the screen change and you’ll see a section that says money in and money out let me give you an example of what we’re going to do with our tags this is a company called Craig’s design and landscape services they actually do two different things they do design work and they do pest control and as part of their design work they have three different areas they focus on they focus on fountains landscaping and sprinklers if I wanted to put my tags in a group then I can do that as well and you will see the group’s listed right here along with the tags but let’s start with just a tag I’m going to come over here and under new I’m going to choose tag and let’s say that I use fountains as my first tag if I wanted to put it in a group I could but I don’t have any groups set up yet so right now I’m just gonna hit safe at the bottom and now you’ll see my first tag called fountains and notice it’s ungrouped it’s not part of a group now here’s what I was saying a second ago about the money in and money out once I start applying these tags to different transactions I can come here and see the money in or out based on those tags I have now let me go ahead and create a group to show you how this works I’m going to create a tag group and I want to create a group called design and I’m going to create another one in a minute called pest control now you’ll notice that from this screen here if I wanted to add a tag I can do it right from here without having to go back out and hit new tag I’m gonna add two more because I have fans and I want to add landscaping and we’re also going to add sprinklers and I’ll just hit add tag there now let me go ahead and click done at the bottom and now what you’re going to see is design is a group and notice the down arrow in order to see the two tags in there I click the arrow and then I see those two now famines are still ungrouped if I wanted to add it to this design group I can come over here what says edit tag and then I can select the group I’d like it to belong to in this case design and when I save it now you’ll see design has three tags underneath now let me create one more tag group I’m going to create one called pest control and let’s say under pest control that I’m going to create two tags I’m going to create one for residential and one for commercial customers I’ll add that one then come back and add commercial and then add that and now I’m going to say done at the bottom and now you can see at the bottom I’ve got two different tags I’ve got one that’s pest control and one that’s design now the other thing is notice the color blue I can leave it like this but if you want each tag group can have a different color scheme going on if I come over here to edit the group you’ll notice that here I can change the color maybe this one can be this yellow color and I can save that and notice it also made all the tags below it that same color and that way they just stand out a little bit when I’m looking at different reports or things now let me show you where you’re going to use these tags or tag groups this will be in any transaction let’s say that I go over and I create a new invoice you’ll notice that in here you have an option that says tags you can choose from the drop-down list and you can choose more than one if you need to this might have fountains and it might also have some pest control and there’s your two tags that we’re going to be using now I will be able to look up reports based on the product or service but I can also look at the reports based on fountains or commercial now let me just go ahead and set something up here so you can see how this works I’ll pick Tom Allen we’re going to go down and pick for a product or service we’re going to go ahead and say this is and we’re gonna say one at $50 and then let’s see for the next one here we pick fountains we’ll do a rock fountain and that one was 275 now let’s say also we’re gonna do some pest control around this rock fountain so that we don’t have bugs in there and now we’ve got a couple of different products and services here now when I go ahead and click Save and close here we’re gonna go back to our tags and see if we have any money that’s in or out of these and now you’ll see that there’s three hundred and eighty two dollars money in because remember QuickBooks considers at the time you create the invoice it to be part of your income when you actually write a check use your credit card that sort of thing that will be on the money outside so if you had to actually buy some materials related to one of these and you tagged those transactions you would see the money out show up over here and that’s basically how tags are going to work it’s going to be a great new feature that’s really going to help you drill down a little bit deeper than you can now to see where your money is coming in or money is going out let’s go ahead and do one more thing in this module we’re going to look at some of the reports that have to do with your customers and sales QuickBooks has a ton of different reports related to your customers and your sales and I want to take you through and show you some of these different ones that you will want to run on a regular basis to see how your company is doing in these different areas let me go ahead and flip over to QuickBooks and I will show you a couple of these different reports I’m going to head over to the navigation pane and I’m going to click on reports there are several different categories of reports here but I want to focus right now on the one that says who owes you and then below it are your sales and customers underneath who owes you probably one of the most common reports is the open invoices right here which you’ve seen before and this is just a list of all of your customers who still owe you money even if they owe you a penny you’ll notice that it shows you all the information you need about the transaction like the date you can see the amount and if you’re on that line and you just point to any of these pieces of information you’ll see that you can click and actually go to that transaction if you actually change that transaction and then get out of it when you come back here as long as you’re safe the transaction the report will be updated another one I’m going to go back to reports that you’ll want to look at is going to be under who owes you customer balance detail this report will show you all the transactions that occurred for each customer and each job or sub customer when you first come in it might look like you’re just looking at the invoices anything open what you need to do is go up to the top right and choose customize come down to where you see filter and you’ll notice that where it says AR paid it says unpaid right now go ahead and choose all from the list and then run the report at the bottom and now you’ll see each transaction that happened for each customer sub customer end or job here I’m going to go ahead and go back to reports we’ll look at a few more here back down to who owes you there are some other ones that you might want to look at for example you might want to run a collections report this one is going to show you all of the information about the customer this time you’ll notice there’s a phone number here as well so if you needed to make some phone calls and call some of these people you’ve got that information right here on this report I’m going back to reports some other ones just to notice you do have the ability to run an accounts receivable aging detail and an aging summary anytime you see a summary and a detail the summary will show you the line item at one total whereas the aging detail will show every single option that made up that category or that line item that you would normally see you can see an invoice list here if you like you can see a terms list there’s a statement list just all kinds of things you can look at underneath who owes you now down under sales and customer here’s where you can run things like a customer contact list this is just going to give you each customer their phone number their email that sort of thing you can also go in and look at estimates by customer you might want to see if you have any income by customer you might want to see all your payment methods product lists and services your sales you can look at those by customer you can look at them by product and you can also look at them by time or activities so just know that there’s a lot of different reports under those two options right there now most of your reports can be customized if you happen to run for example a sales by customer detail you’ll notice that you can come up here and change the report period I can look at all dates and then I can hit run report and I’ll see all of the information for each customer I can group these by customer I can group them by product I’ve got all different kind of ways I can group this report and also something else to notice is that all of your reports are automatically run on the cruel basis not a cash basis and you can change it per report if you need to accrual basically means that as soon as you invoice a customer it’s going to show as income to your business in QuickBooks whether they’ve paid it or not if you had any expenses let’s say you entered a bill it would show it as an expense whether you paid that bill or not we’re gonna see how this really works when we look at a profit and loss a little bit later but let’s go ahead and just kind of wrap this up I just wanted you to see the reports that were available for customers and for your sales and most of them will be under these two headings let’s go ahead now and move over to module six and talk a little bit about products and services we’re just starting module six now and in this module I want to talk to you about how products and services work in QuickBooks a product or service is something that you either sell your customer or sometimes you purchase those products and services as well and you want to set those up and make sure you set the correctly so that you have accurate reports as far as inventory or as far as some of your profit and loss those types of things let’s go ahead and flip over to QuickBooks and start talking a little bit about how products and services work I’m going to give you a quick overview and then I’ll take you into section two and show you how to add some of those products and services to get to a list of your products and services go to the gear icon on the top right of your screen then underneath the list you’ll see products and services this is a list of all the products and services that you have set up remember that sometimes you buy these and sometimes you sell these and there are different types of products and services you can create you’ll notice currently minors sorted by type if I want to sort by any of these other columns I would click on the name and just sort by that column you’ll see there are services you provide like landscaping trimming you’ll see that there are different pest control those are all services you provide when you get past the service items you’re going to see that there are actual inventory items as well inventory means that you actually sell physical products and you count how many you have for example when I look at rock fountain you’ll notice that it looks like I have two on hand and I can buy more and add to my inventory or I can sell these and that will take it out of my inventory there are other types of items that you can have as well you can have non inventory items those are actually items that you don’t want to check them and you have in the back but they’re physical items that you either buy or sell you’ll notice when you’re looking at this list that you can see the name of the item if you’re using SKU numbers and we got those set up you’d be able to see that here the item type a description and this is the description that automatically appears when you pull that item onto an invoice or some sort of form in QuickBooks you’ve got the sales price if there’s one set up sometimes it’s different for every customer so they just don’t set up a price you just do it when you’re actually invoicing the customer or if you happen to buy this whenever you’re purchasing it if this item is subject to sales tax you would see that here if it’s inventory we saw that you can see the quantity on hand and the reorder point that basically means that when you get down to a certain number that QuickBooks will pop up and tell you you need to order some more and you can see that they did not set that up in this exercise the last column that you see is the action column here’s where you can edit to one of these items if you need to make it inactive adjust the quantity that you might have on-hand those types of things but this is where your list of products and services is going to live what I want to do now is show you how to set up some of these products and services so let’s head on over to section two so that you can see how to do that now that you’ve had a quick overview of what the products and services screen looks like I want to take you in and show you how to create your own products and services some of you may only have six or seven in your business other businesses might have thousands it just really depends on what your business does let’s go ahead and flip over and talk about how to add those new products and services the way you’re going to add a new product or service is head up to the new option in the products and services window the first thing you need to tell QuickBooks is what type of product or service is this that you’re adding is it going to be inventory inventory means that you want to keep some on hand and then have QuickBooks remind you when you get down to a low number so that you can order some more that’s called true inventory you can track how many you sold and how many purchased sometimes you don’t want to keep any in the back room and that’s what we call non inventory it might be a physical product that you buy or sell but you just run reports when you need to to see how many you bought or sold you don’t really need to keep any in the back room a service is a service you provide and then you have the OP take any of those three and put them into what’s called a bundle the example they use here is a gift basket of fruit cheese and wine you might actually add something else to that gift basket like a spoon or a cup or something like that and you can actually set those up as one of these three types and then you can create a bundle which includes those three items let’s go ahead for now and say that we’re going to set up a service the first thing we’re going to do is go ahead and give our service a name and I’m just going to call this maintenance you have the ability if you have SKU numbers for your products and services to put that number in here and also you can add a picture of that particular product or service from over here where this little pencil is this would have to be a picture that’s already in your computer and then you can go and grab and pull in you can also put your products and services in different categories there’s a few already created for the exercise but if you wanted to add a new category you could do that by hitting the add new option and creating a category like you see here they’ve got design landscaping and pest control as categories the next thing is the description when you actually put this on an invoice which means you’re selling this to your customer what is the description that appears let’s say that it says quarterly maintenance and then the next thing is going to be the sales price if you have a flat rate you charge for this then you can type that in and it will pre-populate for you but if it’s different every single time then you’ll want to just leave this blank nothing happens here it’s only when you buy or sell the product or service that numbers play into your reports but let’s just say that we have a flat rate of $250 a quarter we charge for this and then the next thing which is the most important thing on this screen is the income account that you want this money to go back to when you put this on an invoice in this case they’ve got it automatically going back to services income which is where I would probably leave it but if you wanted to put this in any other account feel free it’s just it needs to be an income account now if you don’t pick an income account QuickBooks will not say anything to you about it but you’ll look at reports and they’ll be really wrong and you can’t figure out why look at the word the word is income meaning it needs to go to an income account if this was a particular product or service that you were going to charge sales tax on then here’s where you tell QuickBooks this is a taxable product or service or non-taxable product or service typically services you provide are non-taxable and physical items you sell are taxable now if this happens to be a particular product or service that you buy from a vendor that you like you can check the box and put in the vendor information but I’m going to go ahead and uncheck that and click Save and close at the bottom and now you’ll notice that I have a new service in my list here it’s called maintenance and you can see all of the information all the way across now if I needed to edit that information I can click on edit here that will take me back to this screen and I can change whatever I need to and save and close again and then it will be updated you do have a couple of other actions you can take under this drop-down arrow here you can make this service inactive if you need to you can also run a report on this service or you can duplicate it that’s a quick way to go ahead and set up your new products and serve says now that you know how to set up a service let’s go ahead and look at setting up an inventory product that way you can see how to tell QuickBooks how many you currently have on hand and then you can see how inventory is added to or deducted from that number now that you know how to add new products and services and QuickBooks let’s talk specifically about adding inventory products true inventory means that you want to keep a count on how many of these products you have in your office you want QuickBooks to let you know when you get low so that you can order some more you’ll want to actually know how many you have on hand when you first set up your new inventory product and once you’ve done that then as you invoice customers that is how your products will get out of inventory and as you purchase them that’s how your products will get back into inventory let’s go ahead and flip over to QuickBooks and I will show you how to add an inventory product you’re going to add an inventory product the same way we added the new products and services over in section to go to the top of your products and services list and choose the new option this time we’re going to choose inventory the first thing you’re going to do is give your inventory a name I’m going to call this one sprinkler clamps and then we’re going to give it a SKU I’ll call this one 55 and then we’ll choose a category and let’s say in this case that we’re going to put it under landscaping now here’s where you put in the initial quantity on hand this means you’re going to do a count before you set up your product and if you have 10 in the back room you’re going to put that in here and that gives it a starting number you also want to have a date to start this with and let’s just say in this case that I want to go back to the beginning of February reorder point what this means is what number do you want to get down to before QuickBooks pops up and tells you that you need to order some more let’s just say in this case when we get down two three the next thing you’re going to see is inventory asset account now do not change this this is the account that the value of the inventory will actually go into in your chart of accounts remember that inventory is an asset to your business you are worth more because you have it right now but your goal is to sell it and get it out the door this is the asset account the inventory will sit in and then we’re going to put in a description now I would put in the same thing will for new sprinkler clamps and then if you have a set rate than you charge for this you’ll want to type this in if you don’t have one that’s different every single time then you can just leave a blank let’s say that we sell it for two dollars and seventy five cents you don’t want to change this either because this is the income account that this will go into when you make a sale when I put sprinkler clamps on an invoice and I sell this it will go into the sales of product income account if this is a taxable product you’ll want to make sure that this says taxable and now we have the purchasing information this was the selling information up here this is when you purchase it down here the first thing it asks for is a description when you order this from whatever company you order them from what is their description and sometimes it’ll be the same other times it might have a part number at the end there’s just all kinds of different things that this could say what is the cost and this means on average what do you buy it for it does not mean that the last time you purchase this it was a dollar seventy-five let’s just say on average though it is a dollar seventy-five and it will go to an expense account called cost of goods sold if you have a preferred vendor then you can pick them from the list here it could be that you like to get these from Hicks hardware and that’s all you need to tell it I’m going to go ahead and click Save and close at the bottom and now I should see my sprinkler clamps right here you can see the SKU number we typed in the sale price the cost there’s ten of these currently and when we get down to three it’s going to pop up and ask us if we want to order some more don’t forget you have some options over here under your action column if you wanted to go into just the quantity maybe you discovered there’s really only nine in the back room you’ll be able to do that you also have the ability to adjust the starting value and that’s really all there is to adding inventory products let’s go ahead now and move over to section four and talk a little bit about purchase orders if your company buys a lot of products you might want to create a purchase order system for your business when you do this it’s a way of actually tracking everything you have ordered and that way you can see what’s come in if there’s anything back ordered that sort of thing and this is also going to be a way to start the process of receiving your items into inventory let me go ahead and show you how to create a purchase order before we get started there’s a couple things that you need to know first of all if you’d like to use the purchase order feature in QuickBooks you have to be enrolled in the QuickBooks Online Plus edition that’s the Edition that actually handles purchase orders the other thing is you’re going to have to actually turn on the purchase order feature in the account settings let me show you where to go for that you go up to the gear icon you’re going over to accountant settings make sure you’re clicked on expenses and here’s where you see purchase orders if this is not on just come over here to this pencil and then make sure you check the box here to use purchase orders as long as that’s good then you should be fine I’m going to go ahead and close with the X and let’s go and look real quick at our products and services because I want to show you how we’re going to order some more and put it into our inventory I’m going to click on the gear icon under the list the second column I’m going to click products and services if you remember we talked about some of these being inventory and one of these that I want to talk about right here is going to be this rock fell now let’s say we have two of these but we’re getting ready to do a new job and we need to order two more to have a total of four this is what we’re going to order to create a new purchase order I’m going to go to the navigation bar and click on new I’m going to go down in the second column and click on purchase order and the first thing I need to do when creating a purchase order is to pick my vendor I’m going to go down the list here and we’re gonna pick Hicks hardware if you had Hicks hardware’s email it would be pulled in right here you can see there’s the mailing address and then let’s talk about the ship – for a second if you want to have Hicks Hardware ship these directly to your customer you can choose your customer from here if not then it’s just going to come to your office you don’t need to choose anything there here’s the date of your purchase order and in this case they’re using the crew number field so we’re going to plug something in there you can also set a ship via which would say USPS FedEx you can also set a sales rep if you had those as well now looking down the list you want to use the item details not the category details here and remember we’re getting ready to order some more rock fountains now let’s take the other ones out of the list we’re just going to go ahead and click the little trash can over on the right and I want to get two of these so that I have a total of four when I’m done again if it’s related to a particular customer you’ll want to plug that information in right here if you were ordering other things as well you can go ahead and put all of these in here you have a place to put a message to your vendor a memo and at the bottom some attachments once this is done you’re going to go ahead and send this over to your vendor I’m going to go ahead and say save and close and that’s how that works if you have the vendors email address you could have emailed this directly to them other than that maybe you called them on the phone and ordered it but you do have your Pio in here now so that whenever you go to receive these items you have something to receive it against that’s how you actually create a purchase order the next step in the process is that your products actually come in and you’re going to go in and receive those products into your inventory let’s go ahead and head over to section 5 so I can show you how that works now that you’ve created a purchase order you can actually receive the items into your inventory the logical process is that once you order the items from your vendor they’re going to come in the next week 10 days probably and you’re going to want to receive them into your inventory let’s go ahead and flip over to QuickBooks so I can show you how that process works let’s head back to our products and services for a moment I want to show you that if we go down and look at rock film we still just have two and that’s because all we’ve done at this point is order two more once we get through going through this receiving products into inventory feature then you’re going to notice that this number will go up to four all you have to do is head over to the navigation bar and click on new and we’re going to create a new bill the first thing it asks you is who is your vendor and this is where I’m going to pick Hicks Hardware and you’ll notice as soon as I do that that this little window pops up over on the right and this is letting me know that I have an open purchase order if you want to actually add the items on this purchase order to this bill just click at and if you look down here it’s added the rock fountains it’s added two of them and it’s got a rate amount and everything we talked about here because this is an actual bill from the vendor we want to make sure that their rate and the amount and all of that is correct if there happened to be a sale and that’s why we had ordered two of these we would change the rate and of course the amount would change in that case going back up to the top you’ll see that it pulled in our mailing address for Hicks hardware we’re going to want to choose the terms that are on that bill we’re going to say thirty here’s the build date – meaning the date that it was actually printed and the due date meaning the date it was actually due we’ll also want to plug in our bill number over here and that’s really all we need to do there’s a place for a memo down on the bottom left we can add attachments if we want and when we’re finished we’re going to save and close now let’s go see how many we have in inventory now and if we’re looking at rock fountain we have four of those and that’s one of the ways that things get into inventory through a purchase order now we’ll be looking at some other ways things get into inventory it could be you’ve written a check it could be that you’ve actually gone in a debit card but this is a way of creating an order and then receiving that order I want to go ahead and look at the last section in module six here I want to look at some reports related to product and services and then we’ll be done with module six the last thing I wanted to do with you in this particular module is go through some of the reports related to products and services there are a ton of reports in here I want you take some time after watching this video and just go back through some of the ones that we didn’t talk about just to see what’s available we’re going to go ahead and flip now over to QuickBooks and I will show you how to get to those product and service reports you want to head over to your navigation pane and click on reports if you had saved some of these as your favorites they would show up at the top here but let’s scroll down until you see a heading that says expenses and vendors here are your purchase order reports right here one is a list and one is the purchase order detail let’s start with the list you’ll notice these are all of the open purchase orders and they’re listed by vendor if you’ve already received your items from the purchase order it’s not considered open anymore and it won’t show up in this list you’ve got a couple of options up here right now we’re showing purchase orders for all the dates which is what you want and they’re grouped by vendor you can also come over here and customize this a little bit if you wanted to actually look at some filter options you can go down the list and show just specific vendors or if you want to see all vendors we’ll go ahead and choose all from the list and you can see these other options here as well I’m going to go ahead and run the report and I get the same one because I was looking at the open purchase orders all of them now let me go back to the reports list and show you the difference in that one and what we call the open purchase order detail this one here I’m going to change the dates because look how there’s nothing in the report because it’s only reflecting March first but if I choose all dates and then run the report now I can see the purchase orders that are in here and the details about each one and what that means is it’s going to show me every line item in that purchase order I’m grouping this currently by product or service I might group them by vendor and run that report and of course there’s only one and then also I have the same customized options that I showed you just a minute ago if you wanted to choose some filter options you could if you wanted to go down and choose some options for the header and footer which is this area up here you could edit that and then you could run the report once you’ve made your changes now let me go ahead and go back to the report list I want to just mention some other ones here that don’t have to do with purchase orders but you are going to see that if you want to look at things like the purchases by vendor you could do that you might look at your purchases by product or you might look at a transaction list by vendor vendor contact list you can kind of see those reports there there are lots of these reports and you’ll want to run them on a regular basis just so you can see what’s going on and make sure you’ve done things correctly in QuickBooks well that’s going to wrap up module six where we talked about products and services let’s head on over to module seven and change focus and talk a little bit about vendors and expenses if you’re not a subscriber click down below to subscribe so you get notified about similar videos we upload to get a free QuickBooks Online essential keyboard shortcuts infographic click over there and click over there to watch more QuickBooks videos from Simon Says it
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
This PDF excerpt details a machine learning foundations course. It covers core concepts like supervised and unsupervised learning, regression and classification models, and essential algorithms. The curriculum also explores practical skills, including Python programming with relevant libraries, natural language processing (NLP), and model evaluation metrics. Several case studies illustrate applying these techniques to various problems, such as house price prediction and customer segmentation. Finally, career advice is offered on navigating the data science job market and building a strong professional portfolio.
Data Science & Machine Learning Study Guide
Quiz
How can machine learning improve crop yields for farmers? Machine learning can analyze data to optimize crop yields by monitoring soil health and making decisions about planting, fertilizing, and other practices. This can lead to increased revenue for farmers by improving the efficiency of their operations and reducing costs.
Explain the purpose of the Central Limit Theorem in statistical analysis. The Central Limit Theorem states that the distribution of sample means will approximate a normal distribution as the sample size increases, regardless of the original population distribution. This allows for statistical inference about a population based on sample data.
What is the primary difference between supervised and unsupervised learning? In supervised learning, a model is trained using labeled data to predict outcomes. In unsupervised learning, a model is trained on unlabeled data to find patterns or clusters within the data without a specific target variable.
Name three popular supervised learning algorithms. Three popular supervised learning algorithms are K-Nearest Neighbors (KNN), Decision Trees, and Random Forest. These algorithms are used for both classification and regression tasks.
Explain the concept of “bagging” in machine learning. Bagging, short for bootstrap aggregating, involves training multiple models on different subsets of the training data, and then combining their predictions. This technique reduces variance in predictions and creates a more stable prediction model.
What are two metrics used to evaluate the performance of a regression model? Two metrics used to evaluate regression models include Residual Sum of Squares (RSS) and R-squared. The RSS measures the sum of the squared differences between predicted and actual values, while R-squared quantifies the proportion of variance explained by the model.
Define entropy as it relates to decision trees. In the context of decision trees, entropy measures the impurity or randomness of a data set. A higher entropy value indicates a more mixed class distribution, and decision trees attempt to reduce entropy by splitting data into more pure subsets.
What are dummy variables and why are they used in linear regression? Dummy variables are binary variables (0 or 1) used to represent categorical variables in a regression model. They are used to include categorical data in linear regression without misinterpreting the nature of the categorical variables.
Why is it necessary to split data into training and testing sets? Splitting data into training and testing sets allows for training the model on one subset of data and then evaluating its performance on a different, unseen subset. This prevents overfitting and helps determine how well the model generalizes to new, real-world data.
What is the role of the learning rate in gradient descent? The learning rate (or step size) determines how much the model’s parameters are adjusted during each iteration of gradient descent. A smaller learning rate means smaller steps toward the minimum. A large rate can lead to overshooting or oscillations, and is not the same thing as momentum.
Answer Key
Machine learning algorithms can analyze data related to crop health and soil conditions to make data-driven recommendations, which allows farmers to optimize their yield and revenue by using resources more effectively.
The Central Limit Theorem is important because it allows data scientists to make inferences about a population by analyzing a sample, and it allows them to understand the distribution of sample means which is a building block to statistical analysis.
Supervised learning uses labeled data with defined inputs and outputs for model training, while unsupervised learning works with unlabeled data to discover structures and patterns without predefined results.
K-Nearest Neighbors, Decision Trees, and Random Forests are some of the most popular supervised learning algorithms. Each can be used for classification or regression problems.
Bagging involves creating multiple training sets using resampling techniques, which allows multiple models to train before their outputs are averaged or voted on. This increases the stability and robustness of the final output.
Residual Sum of Squares (RSS) measures error while R-squared measures goodness of fit.
Entropy in decision trees measures the impurity or disorder of a dataset. The lower the entropy, the more pure the classification for a given subset of data and vice-versa.
Dummy variables are numerical values (0 or 1) that can represent string or categorical variables in an algorithm. This transformation is often required for regression models that are designed to read numerical inputs.
Data should be split into training and test sets to prevent overfitting, train and evaluate the model, and ensure that it can generalize well to real-world data that it has not seen.
The learning rate is the size of the step taken in each iteration of gradient descent, which determines how quickly the algorithm converges towards the local or global minimum of the error function.
Essay Questions
Discuss the importance of data preprocessing in machine learning projects. What are some common data preprocessing techniques, and why are they necessary?
Compare and contrast the strengths and weaknesses of different types of machine learning algorithms (e.g., supervised vs. unsupervised, linear vs. non-linear, etc.). Provide specific examples to illustrate your points.
Explain the concept of bias and variance in machine learning. How can these issues be addressed when building predictive models?
Describe the process of building a recommendation system, including the key challenges and techniques involved. Consider different data sources and evaluation methods.
Discuss the ethical considerations that data scientists should take into account when working on machine learning projects. How can fairness and transparency be ensured in the development of AI systems?
Glossary
Adam: An optimization algorithm that combines the benefits of AdaGrad and RMSprop, often used for training neural networks.
Bagging: A machine learning ensemble method that creates multiple models using random subsets of the training data to reduce variance.
Boosting: A machine learning ensemble method that combines weak learners into a strong learner by iteratively focusing on misclassified samples.
Central Limit Theorem: A theorem stating that the distribution of sample means approaches a normal distribution as the sample size increases.
Classification: A machine learning task that involves predicting the category or class of a given data point.
Clustering: An unsupervised learning technique that groups similar data points into clusters.
Confidence Interval: A range of values that is likely to contain the true population parameter with a certain level of confidence.
Cosine Similarity: A measure of similarity between two non-zero vectors, often used in recommendation systems.
DB Scan: A density-based clustering algorithm that identifies clusters based on data point density.
Decision Trees: A supervised learning algorithm that uses a tree-like structure to make decisions based on input features.
Dummy Variable: A binary variable (0 or 1) used to represent categorical variables in a regression model.
Entropy: A measure of disorder or randomness in a dataset, particularly used in decision trees.
Feature Engineering: The process of transforming raw data into features that can be used in machine learning models.
Gradient Descent: An optimization algorithm used to minimize the error function of a model by iteratively updating parameters.
Heteroskedasticity: A condition in which the variance of the error terms in a regression model is not constant across observations.
Homoskedasticity: A condition in which the variance of the error terms in a regression model is constant across observations.
Hypothesis Testing: A statistical method used to determine whether there is enough evidence to reject a null hypothesis.
Inferential Statistics: A branch of statistics that deals with drawing conclusions about a population based on a sample of data.
K-Means: A clustering algorithm that partitions data points into a specified number of clusters based on their distance from cluster centers.
K-Nearest Neighbors (KNN): A supervised learning algorithm that classifies or predicts data based on the majority class among its nearest neighbors.
Law of Large Numbers: A theorem stating that as the sample size increases, the sample mean will converge to the population mean.
Linear Discriminant Analysis (LDA): A dimensionality reduction and classification technique that finds linear combinations of features to separate classes.
Logarithm: The inverse operation of exponentiation, used to find the exponent required to reach a certain value.
Mini-batch Gradient Descent: An optimization method that updates parameters based on a subset of the training data in each iteration.
Momentum (in Gradient Descent): A technique used with gradient descent that adds a fraction of the previous parameter update to the current update, which reduces oscillations during the search for local or global minima.
Multi-colinearity: A condition in which independent variables in a regression model are highly correlated with each other.
Ordinary Least Squares (OLS): A method for estimating the parameters of a linear regression model by minimizing the sum of squared residuals.
Overfitting: When a model learns the training data too well and cannot generalize to unseen data.
P-value: The probability of obtaining a result as extreme as the observed result, assuming the null hypothesis is true.
Random Forest: An ensemble learning method that combines multiple decision trees to make predictions.
Regression: A machine learning task that involves predicting a continuous numerical output.
Residual: The difference between the actual value of the dependent variable and the value predicted by a regression model.
Residual Sum of Squares (RSS): A metric that calculates the sum of the squared differences between the actual and predicted values.
RMSprop: An optimization algorithm that adapts the learning rate for each parameter based on the root mean square of past gradients.
R-squared (R²): A statistical measure that indicates the proportion of variance in the dependent variable that is explained by the independent variables in a regression model.
Standard Deviation: A measure of the amount of variation or dispersion in a set of values.
Statistical Significance: A concept that determines if a given finding is likely not due to chance; statistical significance is determined through the calculation of a p-value.
Stochastic Gradient Descent (SGD): An optimization algorithm that updates parameters based on a single random sample of the training data in each iteration.
Stop Words: Common words in a language that are often removed from text during preprocessing (e.g., “the,” “is,” “a”).
Supervised Learning: A type of machine learning where a model is trained using labeled data to make predictions.
Unsupervised Learning: A type of machine learning where a model is trained using unlabeled data to discover patterns or clusters.
AI, Machine Learning, and Data Science Foundations
Okay, here is a detailed briefing document synthesizing the provided sources.
Briefing Document: AI, Machine Learning, and Data Science Foundations
Overview
This document summarizes key concepts and techniques discussed in the provided material. The sources primarily cover a range of topics, including: foundational mathematical and statistical concepts, various machine learning algorithms, deep learning and generative AI, model evaluation techniques, practical application examples in customer segmentation and sales analysis, and finally optimization methods and concepts related to building a recommendation system. The materials appear to be derived from a course or a set of educational resources aimed at individuals seeking to develop skills in AI, machine learning and data science.
Key Themes and Ideas
Foundational Mathematics and Statistics
Essential Math Concepts: A strong foundation in mathematics is crucial. The materials emphasize the importance of understanding exponents, logarithms, the mathematical constant “e,” and pi. Crucially, understanding how these concepts transform when taking derivatives is critical for many machine learning algorithms. For instance, the material mentions that “you need to know what is logarithm what is logarithm at the base of two what is logarithm at the base of e and then at the base of 10…and how does those transform when it comes to taking derivative of the logarithm taking the derivative of the exponent.”
Statistical Foundations: The course emphasizes descriptive and inferential statistics. Descriptive measures include “distance measures” and “variational measures.” Inferential statistics requires an understanding of theories such as the “Central limit theorem” and “the law of large numbers.” There is also the need to grasp “population sample,” “unbiased sample,” “hypothesis testing,” “confidence interval,” and “statistical significance.” The importance is highlighted that “you need to know those Infamous theories such as Central limit theorem the law of uh large numbers uh and how you can um relate to this idea of population sample unbias sample and also u a hypothesis testing confidence interval statistical sign ific an uh and uh how you can test different theories by using uh this idea of statistical”.
Machine Learning Algorithms:
Supervised Learning: The course covers various supervised learning algorithms, including:
“Linear discriminant analysis” (LDA): Used for classification by combining multiple features to predict outcomes, as shown in the example of predicting movie preferences by combining movie length and genre.
“K-Nearest Neighbors” (KNN)
“Decision Trees”: Used for both classification and regression tasks.
“Random Forests”: An ensemble method that combines multiple decision trees.
Boosting Algorithms (e.g. “light GBM, GBM, HG Boost”): Another approach to improve model performance by sequentially training models. The training of these algorithms incorporates “previous stump’s errors.”
Unsupervised Learning:“K-Means”: A clustering algorithm for grouping data points. Example is given in customer segmentation by their transaction history, “you can for instance use uh K means uh DB scan hierarchal clustering and then you can evaluate your uh clustering algoritms and then select the one that performs the best”.
“DBScan”: A density-based clustering algorithm, noted for its increasing popularity.
“Hierarchical Clustering”: Another approach to clustering.
Bagging: An ensemble method used to reduce variance and create more stable predictions, exemplified through a weight loss prediction based on “daily calorie intake and workout duration.”
AdaBoost: An algorithm where “each stump is made by using the previous stump’s errors”, also used for building prediction models, exemplified with a housing price prediction project.
Deep Learning and Generative AI
Optimization Algorithms: The material introduces the need for “Adam W RMS prop” optimization techniques.
Generative Models: The course touches upon more advanced topics including “variation Auto encoders” and “large language models.”
Natural Language Processing (NLP): It emphasizes the importance of understanding concepts like “n-grams,” “attention mechanisms” (both self-attention and multi-head self-attention), “encoder-decoder architecture of Transformers,” and related algorithms such as “gpts or Birch model.” The sources emphasize “if you want to move towards the NLP side of generative Ai and you want to know how the ched GPT has been invented how the gpts work or the birth mode Ro uh then you will definitely need to uh get into this topic of language model”.
Model Evaluation
Regression Metrics: The document introduces “residual sum of squares” (RSS) as a common metric for evaluating linear regression models. The formula for the RSS is explicitly provided: “the RSS or the residual sum of square or the beta is equal to sum of all the squar of y i minus y hat across all I is equal to 1 till n”.
Clustering Metrics: The course mentions entropy, and the “Silo score” which is “a measure of the similarity of the data point to its own cluster compared to the other clusters”.
Regularization: The use of L2 regularization is mentioned, where “Lambda which is always positive so is always larger than equal zero is the tuning parameter or the penalty” and “the Lambda serves to control the relative impact of the penalty on the regression coefficient estimates.”
Practical Applications and Case Studies:
Customer Segmentation: Clustering algorithms (K-means, DBScan) can be used to segment customers based on transaction history.
Sales Analysis: The material includes analysis of customer types, “consumer, corporate, and home office”, top spending customers, and sales trends over time. There is a suggestion that “a seasonal Trend” might be apparent if a longer time period is considered.
Geographic Sales Mapping: The material includes using maps to visualize sales per state, which is deemed helpful for companies looking to expand into new geographic areas.
Housing Price Prediction: A linear regression model is applied to predict house prices using features like median income, average rooms, and proximity to the ocean. An important note is made about the definition of “residual” in this context, with the reminder that “you do not confuse the error with the residual so error can never be observed error you can never calculate and you will never know but what you can do is to predict the error and you can when you predict the error then you get a residual”.
Linear Regression and OLS
Regression Model: The document explains that the linear regression model aims to estimate the relationship between independent and dependent variables. In the context, it emphasizes that “beta Z that you see here is not a variable and it’s called intercept or constant something that is unknown so we don’t have that in our data and is one of the parameters of linear regression it’s an unknown number which the linear regression model should estimate”.
Ordinary Least Squares (OLS): OLS is a core method to minimize the “sum of squared residuals”. The material states that “the OLS tries to find the line that will minimize its value”.
Assumptions: The materials mention an assumption of constant variance (homoscedasticity) for errors, and notes “you can check for this assumption by plotting the residual and see whether there is a funnel like graph”. The importance of using a correct statistical test is also highlighted when considering p values.
Dummy Variables: The need to transform categorical features into dummy variables to be used in linear regression models, with the warning that “you always need to drop at least one of the categories” due to the multicolinearity problem. The process of creating dummy variables is outlined: “we will use the uh get uncore d function in Python from pandas in order to uh go from this one variable to uh five different variable per each of this category”.
Variable Interpretation: Coefficients in a linear regression model represent the impact of an independent variable on the dependent variable. For example, the material notes, “when we look at the total number of rooms and we increase the number of rooms by uh one additional unit so one more room added to the total underscore rooms then the uh house value uh decreases by minus 2.67”.
Model Summary Output: The materials discuss interpreting model output metrics such as R-squared which “is the Matrix that show cases what is the um goodness of fit of your model”. It also mentions how to interpret p values.
Recommendation Systems
Feature Engineering: A critical step is identifying and engineering the appropriate features, with the recommendation system based on “data points you use to make decisions about what to recommend”.
Text Preprocessing: Text data must be cleaned and preprocessed, including removing “stop words” and vectorizing using TF-IDF or similar methods. An example is given “if we use no pen we use no action pack we use denture once we use movies once you 233 use Inspire once and you re use me once and the rest we don’t use it SWS which means we get the vector 0 0 1 1 1 1 0 0 zero here”.
Cosine Similarity: A technique to find similarity between text vectors. The cosine similarity is defined as “an equation of the dot product of two vectors and the multiplication of the magnitudes of the two vectors”.
Recommending: The system then recommends items with the highest cosine similarity scores, as mentioned with “we are going to provide we are going to recommend five movies of course you can recommend many or 50 movies that’s completely up to [Music] you”.
Career Advice and Perspective
The Importance of a Plan: The material emphasizes the value of creating a career plan and focusing on actionable steps. The advice is “this kind of plan actually make you focus because if you are not focusing on that thing you could just going anywhere at that lose loose loose loose lose your way”.
Learning by Doing: The speaker advocates doing smaller projects to prove your abilities, especially as a junior data scientist. As they state, “the best way is like yeah just do the work if like a smaller like as you said previously youly like it might be boring stuff it might be an assum it might be not leading anywhere but those kind of work show”.
Business Acumen: Data scientists should focus on how their work provides value to the business, and “data scientist is someone who bring the value to the business and making the decision for the battle any business”.
Personal Branding: Building a personal brand is also seen as important, with the recommendation that “having a newsletter and having a LinkedIn following” can help. Technical portfolio sites like “GitHub” are recommended.
Data Scientist Skills: The ability to show your thought process and motivation is important in data science interviews. As the speaker notes, “how’s your uh thought process going how’s your what what motivated you to do this kind of project what motivated you to do uh this kind of code what motivated you to present this kinde of result”.
Future of Data Science: The future of data science is predicted to become “invaluable to the business”, especially given the current rapid development of AI.
Business Fundamentals: The importance of thinking about the needs-based aspect of a business, that it must be something people need or “if my roof was leaking and it’s raining outside and I’m in my house you know and water is pouring on my head I have to fix that whether I’m broke or not you know”.
Entrepreneurship: The importance of planning, which was inspired by being a pilot where “pilots don’t take off unless we know where we’re going”.
Growth: The experience at GE emphasized that “growing so fast it was doubling in size every three years and that that really informed my thinking about growth”.
Mergers and Aquisitions (M&A): The business principle of using debt to buy underpriced assets that can be later sold at a higher multiple for profit.
Optimization
Gradient Descent (GD): The update of the weight is equal to the current weight parameter minus the learning rate times the gradient and so “the same we also do for our second parameter which is the bias Factor”.
Stochastic Gradient Descent (SGD): HGD is different from GD in that it “uses the gradient from a single data point which is just one observation in order to update our parameters”. This makes it “much faster and computationally much less expensive compared to the GD”.
SGD With Momentum: SGD with momentum addresses the disadvantages of the basic SGD algorithm.
Mini-Batch Gradient Descent: A trade-off between the two, and “it tries to strike a balance by selecting smaller batches and calculating the gradient over them”.
RMSprop: RMSprop is introduced as an algorithm for controlling learning rates, where “for the parameters that will have a small gradients we will be then controlling this and we will be increasing their learning rate to ensure that the gradient will not vanish”.
Conclusion
These materials provide a broad introduction to data science, machine learning, and AI. They cover mathematical and statistical foundations, various algorithms (both supervised and unsupervised), deep learning concepts, model evaluation, and provide case studies to illustrate the practical application of such techniques. The inclusion of career advice and reflections makes it a very holistic learning experience. The information is designed to build a foundational understanding and introduce more complex concepts.
Essential Concepts in Machine Learning
Frequently Asked Questions
What are some real-world applications of machine learning, as discussed in the context of this course? Machine learning has diverse applications, including optimizing crop yields by monitoring soil health, and predicting customer preferences, such as in the entertainment industry as seen with Netflix’s recommendations. It’s also useful in customer segmentation (identifying “good”, “better”, and “best” customers based on transaction history) and creating personalized recommendations (like prioritizing movies based on a user’s preferred genre). Further, machine learning can help companies decide which geographic areas are most promising for their products based on sales data and can help investors identify which features of a house are correlated with its value.
What are the core mathematical concepts that are essential for understanding machine learning and data science? A foundational understanding of several mathematical concepts is critical. This includes: the idea of using variables with different exponents (e.g., X, X², X³), understanding logarithms at different bases (base 2, base e, base 10), comprehending the meaning of ‘e’ and ‘Pi’, mastering exponents and logarithms and how they transform when taking derivatives. A fundamental understanding of descriptive (distance measures, variational measures) and inferential statistics (central limit theorem, law of large numbers, population vs. sample, hypothesis testing) is also essential.
What specific machine learning algorithms should I be familiar with, and what are their uses? The course highlights the importance of both supervised and unsupervised learning techniques. For supervised learning, you should know linear discriminant analysis (LDA), K-Nearest Neighbors (KNN), decision trees (for both classification and regression), random forests, and boosting algorithms like light GBM, GBM, and XGBoost. For unsupervised learning, understanding K-Means clustering, DBSCAN, and hierarchical clustering is crucial. These algorithms are used in various applications like classification, clustering, and regression.
How can I assess the performance of my machine learning models? Several metrics are used to evaluate model performance, depending on the task at hand. For regression models, the residual sum of squares (RSS) is crucial; it measures the difference between predicted and actual values. Metrics like entropy, also the Gini index, and the silhouette score (which measures the similarity of a data point to its own cluster vs. other clusters) are used for evaluating classification and clustering models. Additionally, concepts like the penalty term, used to control impact of model complexity, and the L2 Norm used in regression are highlighted as important for proper evaluation.
What is the significance of linear regression and what key concepts should I know? Linear regression is used to model the relationship between a dependent variable (Y) and one or more independent variables (X). A crucial aspect is estimating coefficients (betas) and intercepts which quantify these relationships. It is key to understand concepts like the residuals (differences between predicted and actual values), and how ordinary least squares (OLS) is used to minimize the sum of squared residuals. In understanding linear regression, it is also important not to confuse errors (which are never observed and can’t be calculated) with residuals (which are predictions of errors). It’s also crucial to be aware of assumptions about your errors and their variance.
What are dummy variables, and why are they used in modeling? Dummy variables are binary (0 or 1) variables used to represent categorical data in regression models. When transforming categorical variables like ocean proximity (with categories such as near bay, inland, etc.), each category becomes a separate dummy variable. The “1” indicates that a condition is met, and a “0” indicates that it is not. It is essential to drop one of these dummy variables to avoid perfect multicollinearity (where one variable is predictable from other variables) which could cause an OLS violation.
What are some of the main ideas behind recommendation systems as discussed in the course? Recommendation systems rely on data points to identify similarities between items to generate personalized results. Text data preprocessing is often done using techniques like tokenization, removing stop words, and stemming to convert data into vectors. Cosine similarity is used to measure the angle between two vector representations. This allows one to calculate how similar different data points (such as movies) are, based on common features (like genre, plot keywords). For example, a movie can be represented as a vector in a high-dimensional space that captures different properties about the movie. This approach enables recommendations based on calculated similarity scores.
What key steps and strategies are recommended for aspiring data scientists? The course emphasizes several critical steps. It’s important to start with projects to demonstrate the ability to apply data science skills. This includes going beyond basic technical knowledge and considering the “why” behind projects. A focus on building a personal brand, which can be done through online platforms like LinkedIn, GitHub, and Medium is recommended. Understanding the business value of data science is key, which includes communicating project findings effectively. Also emphasized is creating a career plan and acting responsibly for your career choices. Finally, focusing on a niche or specific sector is recommended to ensure that one’s technical skills match the business needs.
Fundamentals of Machine Learning
Machine learning (ML) is a branch of artificial intelligence (AI) that builds models based on data, learns from that data, and makes decisions [1]. ML is used across many industries, including healthcare, finance, entertainment, marketing, and transportation [2-9].
Key Concepts in Machine Learning:
Supervised Learning: Algorithms are trained using labeled data [10]. Examples include regression and classification models [11].
Regression: Predicts continuous values, such as house prices [12, 13].
Classification: Predicts categorical values, such as whether an email is spam [12, 14].
Unsupervised Learning: Algorithms are trained using unlabeled data, and the model must find patterns without guidance [11]. Examples include clustering and outlier detection techniques [12].
Semi-Supervised Learning: A combination of supervised and unsupervised learning [15].
Machine Learning Algorithms:
Linear Regression: A statistical or machine learning method used to model the impact of a change in a variable [16, 17]. It can be used for causal analysis and predictive analytics [17].
Logistic Regression: Used for classification, especially with binary outcomes [14, 15, 18].
K-Nearest Neighbors (KNN): A classification algorithm [19, 20].
Decision Trees: Can be used for both classification and regression [19, 21]. They are transparent and handle diverse data, making them useful in various industries [22-25].
Random Forest: An ensemble learning method that combines multiple decision trees, suitable for classification and regression [19, 26, 27].
Boosting Algorithms: Such as AdaBoost, light GBM, GBM, and XGBoost, build trees using information from previous trees to improve performance [19, 28, 29].
K-Means: A clustering algorithm [19, 30].
DB Scan: A clustering algorithm that is becoming increasingly popular [19].
Hierarchical Clustering: Another clustering technique [19, 30].
Important Steps in Machine Learning:
Data Preparation: This involves splitting data into training and test sets and handling missing values [31-33].
Feature Engineering: Identifying and selecting the most relevant data points (features) to be used by the model to generate the most accurate results [34, 35].
Model Training: Selecting an appropriate algorithm and training it on the training data [36].
Model Evaluation: Assessing model performance using appropriate metrics [37].
Model Evaluation Metrics:
Regression Models:
Residual Sum of Squares (RSS) [38].
Mean Squared Error (MSE) [38, 39].
Root Mean Squared Error (RMSE) [38, 39].
Mean Absolute Error (MAE) [38, 39].
Classification Models:
Accuracy: Proportion of correctly classified instances [40].
Precision: Measures the accuracy of positive predictions [40].
Recall: Measures the model’s ability to identify all positive instances [40].
F1 Score: Combines precision and recall into a single metric [39, 40].
Bias-Variance Tradeoff:
Bias: The inability of a model to capture the true relationship in the data [41]. Complex models tend to have low bias but high variance [41-43].
Variance: The sensitivity of a model to changes in the training data [41-43]. Simpler models have low variance but high bias [41-43].
Overfitting: Occurs when a model learns the training data too well, including noise [44, 45]. This results in poor performance on unseen data [44].
Underfitting: Occurs when a model is too simple to capture the underlying patterns in the data [45].
Techniques to address overfitting:
Reducing model complexity: Using simpler models to reduce the chances of overfitting [46].
Cross-validation: Using different subsets of data for training and testing to get a more realistic measure of model performance [46].
Early stopping: Monitoring the model performance and stopping the training process when it begins to decrease [47].
Regularization techniques: Such as L1 and L2 regularization, helps to prevent overfitting by adding penalty terms that reduce the complexity of the model [48-50].
Python and Machine Learning:
Python is a popular programming language for machine learning because it has a lot of libraries, including:
Pandas: For data manipulation and analysis [51].
NumPy: For numerical operations [51, 52].
Scikit-learn (sklearn): For machine learning algorithms and tools [13, 51-59].
SciPy: For scientific computing [51].
NLTK: For natural language processing [51].
TensorFlow and PyTorch: For deep learning [51, 60, 61].
Matplotlib: For data visualization [52, 62, 63].
Seaborn: For data visualization [62].
Natural Language Processing (NLP):
NLP is used to process and analyze text data [64, 65].
Key steps include: text cleaning (lowercasing, punctuation removal, tokenization, stemming, and lemmatization), and converting text to numerical data with techniques such as TF-IDF, word embeddings, subword embeddings and character embeddings [66-68].
NLP is used in applications such as chatbots, virtual assistants, and recommender systems [7, 8, 66].
Deep Learning:
Deep learning is an advanced form of machine learning that uses neural networks with multiple layers [7, 60, 68].
Examples include:
Recurrent Neural Networks (RNNs) [69, 70].
Artificial Neural Networks (ANNs) [69].
Convolutional Neural Networks (CNNs) [69, 70].
Generative Adversarial Networks (GANs) [69].
Transformers [8, 61, 71-74].
Practical Applications of Machine Learning:
Recommender Systems: Suggesting products, movies, or jobs to users [6, 9, 64, 75-77].
Predictive Analytics: Using data to forecast future outcomes, such as house prices [13, 17, 78].
Fraud Detection: Identifying fraudulent transactions in finance [4, 27, 79].
Customer Segmentation: Grouping customers based on their behavior [30, 80].
Chatbots and virtual assistants: Providing automated customer support using NLP [8, 18, 83].
Career Paths in Machine Learning:
Machine Learning Researcher: Focuses on developing and testing new machine learning algorithms [84, 85].
Machine Learning Engineer: Focuses on implementing and deploying machine learning models [85-87].
AI Researcher: Similar to machine learning researcher but focuses on more advanced models like deep learning and generative AI [70, 74, 88].
AI Engineer: Similar to machine learning engineer but works with more advanced AI models [70, 74, 88].
Data Scientist: A broad role that uses data analysis, statistics, and machine learning to solve business problems [54, 89-93].
Additional Considerations:
It’s important to develop not only technical skills, but also communication skills, business acumen, and the ability to translate business needs into data science problems [91, 94-96].
A strong data science portfolio is key for getting into the field [97].
Continuous learning is essential to keep up with the latest technology [98, 99].
Personal branding can open up many opportunities [100].
This overview should provide a strong foundation in the fundamentals of machine learning.
A Comprehensive Guide to Data Science
Data science is a field that uses data analysis, statistics, and machine learning to solve business problems [1, 2]. It is a broad field with many applications, and it is becoming increasingly important in today’s world [3]. Data science is not just about crunching numbers; it also involves communication, business acumen, and translation skills [4].
Key Aspects of Data Science:
Data Analysis: Examining data to understand patterns and insights [5, 6].
Statistics: Applying statistical methods to analyze data, test hypotheses and make inferences [7, 8].
Descriptive statistics, which includes measures like mean, median, and standard deviation, helps in summarizing data [8].
Inferential statistics, which involves concepts like the central limit theorem and hypothesis testing, help in drawing conclusions about a population based on a sample [9].
Probability distributions are also important in understanding machine learning concepts [10].
Machine Learning (ML): Using algorithms to build models based on data, learn from it, and make decisions [2, 11-13].
Supervised learning involves training algorithms on labeled data for tasks like regression and classification [13-16]. Regression is used to predict continuous values, while classification is used to predict categorical values [13, 17].
Unsupervised learning involves training algorithms on unlabeled data to identify patterns, as in clustering and outlier detection [13, 18, 19].
Programming: Using programming languages such as Python to implement data science techniques [20]. Python is popular due to its versatility and many libraries [20, 21].
Libraries such as Pandas and NumPy are used for data manipulation [22, 23].
Scikit-learn is used for implementing machine learning models [22, 24, 25].
TensorFlow and PyTorch are used for deep learning [22, 26].
Libraries such as Matplotlib and Seaborn are used for data visualization [17, 25, 27, 28].
Data Visualization: Representing data through charts, graphs, and other visual formats to communicate insights [25, 27].
Business Acumen: Understanding business needs and translating them into data science problems and solutions [4, 29].
The Data Science Process:
Data Collection: Gathering relevant data from various sources [30].
Data Preparation: Cleaning and preprocessing data, which involves:
Handling missing values by removing or imputing them [31, 32].
Identifying and removing outliers [32-35].
Data wrangling: transforming and cleaning data for analysis [6].
Data exploration: using descriptive statistics and data visualization to understand the data [36-39].
Data Splitting: Dividing data into training, validation, and test sets [14].
Feature Engineering: Identifying, selecting, and transforming variables [40, 41].
Model Training: Selecting an appropriate algorithm, training it on the training data, and optimizing it with validation data [14].
Model Evaluation: Assessing model performance using relevant metrics on the test data [14, 42].
Deployment and Communication: Communicating results and translating them into actionable insights for stakeholders [43].
Applications of Data Science:
Business and Finance: Customer segmentation, fraud detection, credit risk assessment [44-46].
Operations Management: Optimizing decision-making using data [44].
Engineering: Fault diagnosis [46-48].
Biology: Classification of species [47-49].
Customer service: Developing troubleshooting guides and chatbots [47-49].
Recommender systems are used in entertainment, marketing, and other industries to suggest products or movies to users [30, 50, 51].
Predictive Analytics are used to forecast future outcomes [24, 41, 52].
Key Skills for Data Scientists:
Technical Skills: Proficiency in programming languages such as Python and knowledge of relevant libraries. Also expertise in statistics, mathematics, and machine learning [20].
Communication Skills: Ability to communicate results to technical and non-technical audiences [4, 43].
Business Skills: Understanding business requirements and translating them into data-driven solutions [4, 29].
Problem-solving skills: Ability to define, analyze, and solve complex problems [4, 29].
Career Paths in Data Science:
Data Scientist
Machine Learning Engineer
AI Engineer
Data Science Manager
NLP Engineer
Data Analyst
Additional Considerations:
A strong portfolio demonstrating data science project is essential to showcase practical skills [53-56].
Continuous learning is necessary to keep up with the latest technology in the field [57].
Personal branding can enhance opportunities in data science [58-61].
Data scientists must be able to adapt to the evolving landscape of AI and machine learning [62, 63].
This information should give a comprehensive overview of the field of data science.
Artificial Intelligence: Applications Across Industries
Artificial intelligence (AI) has a wide range of applications across various industries [1, 2]. Machine learning, a branch of AI, is used to build models based on data and learn from this data to make decisions [1].
Here are some key applications of AI:
Healthcare: AI is used in the diagnosis of diseases, including cancer, and for identifying severe effects of illnesses [3]. It also helps with drug discovery, personalized medicine, treatment plans, and improving hospital operations [3, 4]. Additionally, AI helps in predicting the number of patients that a hospital can expect in the emergency room [4].
Finance: AI is used for fraud detection in credit card and banking operations [5]. It is also used in trading, combined with quantitative finance, to help traders make decisions about stocks, bonds, and other assets [5].
Retail: AI helps in understanding and estimating demand for products, determining the most appropriate warehouses for shipping, and building recommender systems and search engines [5, 6].
Marketing: AI is used to understand consumer behavior and target specific groups, which helps reduce marketing costs and increase conversion rates [7, 8].
Transportation: AI is used in autonomous vehicles and self-driving cars [8].
Natural Language Processing (NLP): AI is behind applications such as chatbots, virtual assistants, and large language models [8, 9]. These tools use text data to answer questions and provide information [9].
Smart Home Devices: AI powers smart home devices like Alexa [9].
Agriculture: AI is used to estimate weather conditions, predict crop production, monitor soil health, and optimize crop yields [9, 10].
Entertainment: AI is used to build recommender systems that suggest movies and other content based on user data. Netflix is a good example of a company that uses AI in this way [10, 11].
Customer service: AI powers chatbots that can categorize customer inquiries and provide appropriate responses, reducing wait times and improving support efficiency [12-15].
Game playing: AI is used to design AI opponents in games [13, 14, 16].
E-commerce: AI is used to provide personalized product recommendations [14, 16].
Human Resources: AI helps to identify factors influencing employee retention [16, 17].
Fault Diagnosis: AI helps isolate the cause of malfunctions in complex systems by analyzing sensor data [12, 18].
Biology: AI is used to categorize species based on characteristics or DNA sequences [12, 15].
Remote Sensing: AI is used to analyze satellite imagery and classify land cover types [12, 15].
In addition to these, AI is also used in many areas of data science, such as customer segmentation [19-21], fraud detection [19-22], credit risk assessment [19-21], and operations management [19, 21, 23, 24].
Overall, AI is a powerful technology with a wide range of applications that improve efficiency, decision-making, and customer experience in many areas [11].
Essential Python Libraries for Data Science
Python libraries are essential tools in data science, machine learning, and AI, providing pre-written functions and modules that streamline complex tasks [1]. Here’s an overview of the key Python libraries mentioned in the sources:
Pandas: This library is fundamental for data manipulation and analysis [2, 3]. It provides data structures like DataFrames, which are useful for data wrangling, cleaning, and preprocessing [3, 4]. Pandas is used for tasks such as reading data, handling missing values, identifying outliers, and performing data filtering [3, 5].
NumPy: NumPy is a library for numerical computing in Python [2, 3, 6]. It is used for working with arrays and matrices and performing mathematical operations [3, 7]. NumPy is essential for data visualization and other tasks in machine learning [3].
Matplotlib: This library is used for creating visualizations like plots, charts, and histograms [6-8]. Specifically, pyplot is a module within Matplotlib used for plotting [9, 10].
Seaborn: Seaborn is another data visualization library that is known for creating more appealing visualizations [8, 11].
Scikit-learn (psyit learn): This library provides a wide range of machine learning algorithms and tools for tasks like regression, classification, clustering, and model evaluation [2, 6, 10, 12]. It includes modules for model selection, ensemble learning, and metrics [13]. Scikit-learn also includes tools for data preprocessing, such as splitting the data into training and testing sets [14, 15].
Statsmodels: This library is used for statistical modeling and econometrics and has capabilities for linear regression [12, 16]. It is particularly useful for causal analysis because it provides detailed statistical summaries of model results [17, 18].
NLTK (Natural Language Toolkit): This library is used for natural language processing tasks [2]. It is helpful for text data cleaning, such as tokenization, stemming, lemmatization, and stop word removal [19, 20]. NLTK also assists in text analysis and processing [21].
TensorFlow and PyTorch: These are deep learning frameworks used for building and training neural networks and implementing deep learning models [2, 22, 23]. They are essential for advanced machine learning tasks, such as building large language models [2].
Pickle: This library is used for serializing and deserializing Python objects, which is useful for saving and loading models and data [24, 25].
Requests: This library is used for making HTTP requests, which is useful for fetching data from web APIs, like movie posters [25].
These libraries facilitate various stages of the data science workflow [26]:
Data loading and preparation: Libraries like Pandas and NumPy are used to load, clean, and transform data [2, 26].
Data visualization: Libraries like Matplotlib and Seaborn are used to create plots and charts that help to understand data and communicate insights [6-8].
Model training and evaluation: Libraries like Scikit-learn and Statsmodels are used to implement machine learning algorithms, train models, and evaluate their performance [2, 12, 26].
Deep learning: Frameworks such as TensorFlow and PyTorch are used for building complex neural networks and deep learning models [2, 22].
Natural language processing: Libraries such as NLTK are used for processing and analyzing text data [2, 27].
Mastering these Python libraries is crucial for anyone looking to work in data science, machine learning, or AI [1, 26]. They provide the necessary tools for implementing a wide array of tasks, from basic data analysis to advanced model building [1, 2, 22, 26].
Machine Learning Model Evaluation
Model evaluation is a crucial step in the machine learning process that assesses the performance and effectiveness of a trained model [1, 2]. It involves using various metrics to quantify how well the model is performing, which helps to identify whether the model is suitable for its intended purpose and how it can be improved [2-4]. The choice of evaluation metrics depends on the specific type of machine learning problem, such as regression or classification [5].
Key Concepts in Model Evaluation:
Performance Metrics: These are measures used to evaluate how well a model is performing. Different metrics are appropriate for different types of tasks [5, 6].
For regression models, common metrics include:
Residual Sum of Squares (RSS): Measures the sum of the squares of the differences between the predicted and true values [6-8].
Mean Squared Error (MSE): Calculates the average of the squared differences between predicted and true values [6, 7].
Root Mean Squared Error (RMSE): The square root of the MSE, which provides a measure of the error in the same units as the target variable [6, 7].
Mean Absolute Error (MAE): Calculates the average of the absolute differences between predicted and true values. MAE is less sensitive to outliers compared to MSE [6, 7, 9].
For classification models, common metrics include:
Accuracy: Measures the proportion of correct predictions made by the model [9, 10].
Precision: Measures the proportion of true positive predictions among all positive predictions made by the model [7, 9, 10].
Recall: Measures the proportion of true positive predictions among all actual positive instances [7, 9, 11].
F1 Score: The harmonic mean of precision and recall, providing a balanced measure of a model’s performance [7, 9].
Area Under the Curve (AUC): A metric used when plotting the Receiver Operating Characteristic (ROC) curve to assess the performance of binary classification models [12].
Cross-entropy: A loss function used to measure the difference between the predicted and true probability distributions, often used in classification problems [7, 13, 14].
Bias and Variance: These concepts are essential for understanding model performance [3, 15].
Bias refers to the error introduced by approximating a real-world problem with a simplified model, which can cause the model to underfit the data [3, 4].
Variance measures how much the model’s predictions vary for different training data sets; high variance can cause the model to overfit the data [3, 16].
Overfitting and Underfitting: These issues can affect model accuracy [17, 18].
Overfitting occurs when a model learns the training data too well, including noise, and performs poorly on new, unseen data [17-19].
Underfitting occurs when a model is too simple and cannot capture the underlying patterns in the training data [17, 18].
Training, Validation, and Test Sets: Data is typically split into three sets [2, 20]:
Training Set: Used to train the model.
Validation Set: Used to tune model hyperparameters and prevent overfitting.
Test Set: Used to evaluate the final model’s performance on unseen data [20-22].
Hyperparameter Tuning: Adjusting model parameters to minimize errors and optimize performance, often using the validation set [21, 23, 24].
Cross-Validation: A resampling technique that allows the model to be trained and tested on different subsets of the data to assess its generalization ability [7, 25].
K-fold cross-validation divides the data into k subsets or folds and iteratively trains and evaluates the model by using each fold as the test set once [7].
Leave-one-out cross-validation uses each data point as a test set, training the model on all the remaining data points [7].
Early Stopping: A technique where the model’s performance on a validation set is monitored during the training process, and training is stopped when the performance starts to decrease [25, 26].
Ensemble Methods: Techniques that combine multiple models to improve performance and reduce overfitting. Some ensemble techniques are decision trees, random forests, and boosting techniques such as Adaboost, Gradient Boosting Machines (GBM), and XGBoost [26]. Bagging is an ensemble technique that reduces variance by training multiple models and averaging the results [27-29].
Step-by-Step Process for Model Evaluation:
Data Splitting: Divide the data into training, validation, and test sets [2, 20].
Algorithm Selection: Choose an appropriate algorithm based on the problem and data characteristics [24].
Model Training: Train the selected model using the training data [24].
Hyperparameter Tuning: Adjust model parameters using the validation data to minimize errors [21].
Model Evaluation: Evaluate the model’s performance on the test data using chosen metrics [21, 22].
Analysis and Refinement: Analyze the results, make adjustments, and retrain the model if necessary [3, 17, 30].
Importance of Model Evaluation:
Ensures Model Generalization: It helps to ensure that the model performs well on new, unseen data, rather than just memorizing the training data [22].
Identifies Model Issues: It helps in detecting issues like overfitting, underfitting, and bias [17-19].
Guides Model Improvement: It provides insights into how the model can be improved through hyperparameter tuning, data collection, or algorithm selection [21, 24, 25].
Validates Model Reliability: It validates the model’s ability to provide accurate and reliable results [2, 15].
Additional Notes:
Statistical significance is an important concept in model evaluation to ensure that the results are unlikely to have occurred by random chance [31, 32].
When evaluating models, it is important to understand the trade-off between model complexity and generalizability [33, 34].
It is important to check the assumptions of the model, for example, when using linear regression, it is essential to check assumptions such as linearity, exogeneity, and homoscedasticity [35-39].
Different types of machine learning models should be evaluated using appropriate metrics. For example, classification models use metrics like accuracy, precision, recall, and F1 score, while regression models use metrics like MSE, RMSE, and MAE [6, 9].
By carefully evaluating machine learning models, one can build reliable systems that address real-world problems effectively [2, 3, 40, 41].
AI Foundations Course – Python, Machine Learning, Deep Learning, Data Science
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!
The source explores the concept of reincarnation and the soul’s journey after death from various spiritual, philosophical, and scientific perspectives. It examines the choices souls make in choosing their next life, including parents and soulmates, and how karma, attachments, and awareness influence this process. The text discusses the Tibetan Bardo states as transitional phases where the soul navigates visions shaped by its own consciousness. It highlights the importance of mindfulness, meditation, and detachment in shaping the soul’s trajectory and breaking free from the cycle of rebirth. Furthermore, the document suggests that preparing for death involves mastering the present moment and cultivating self-awareness. The material draws on traditions like Buddhism, Hinduism, Christianity, and even quantum physics to provide a comprehensive look into life, death, and the potential for spiritual evolution.
Death, Rebirth, and the Journey of the Soul: A Comprehensive Study Guide
I. Short Answer Quiz
According to Tibetan teachings, describe the process of dissolution of the physical body at death.
What is the “clear light” and its significance in the context of death and the afterlife?
How does the Quran view the transition of souls after death, and how does it differ from the Buddhist perspective on rebirth?
Explain the concept of the “Bardo of Becoming” and its role in determining a soul’s next experience.
What is Samsara and its significance in Hindu, Buddhist, and Jain traditions?
How does Karma influence the cycle of Samsara?
According to the text, what is the role of past life regression studies, like those conducted by Brian Weiss, in understanding the choice of parents by the soul?
What is reanu bandha in Hindu philosophy, and how does it relate to the concept of soulmates?
How can practices like lucid dreaming and meditation prepare individuals for death, according to the text?
Explain how attachments, desires, and fears shape our next step after death.
II. Quiz Answer Key
The dissolution process is gradual. First, earth dissolves (heaviness), then water (dryness), then fire (loss of warmth), and then air (cessation of breath), and finally space dissolves, leading to a luminous awareness.
The “clear light” is a state of pure Consciousness encountered at death, representing the soul’s purest form. If recognized, it can lead to liberation; if not, the soul drifts onward.
The Quran affirms that life continues beyond what we can perceive, while Buddhism speaks of rebirth as a natural consequence of karma. The Quran sees death as not the end while Buddhism sees it as a continuation.
The “Bardo of Becoming” is a transitional phase where the soul, now disembodied, drifts through realms encountering visions reflecting its subconscious mind. Attachment to old identities can pull it back into the cycle of samsara.
Samsara is the cycle of birth, death, and rebirth, central to Hindu, Buddhist, and Jain traditions, where the soul is caught in a loop of existence shaped by past actions and decisions.
Karma, an intricate law, ensures every action, thought, and intention leaves an imprint that determines where and how the soul moves next within Samsara, influencing the conditions of future lives.
Past life regression studies suggest individuals recall choosing their parents before birth to heal old wounds or learn new lessons, highlighting the soul’s active role in selecting its family.
Reanu bandha suggests every relationship, harmonious or difficult, results from past karmic debts. It implies we are drawn to others in future lives to heal, complete, or refine connections.
Practices like lucid dreaming and meditation help individuals become aware of illusions and attachments, training the mind to remain conscious during transitions, mirroring the Bardo experiences.
At death, unresolved attachments, desires, and fears act as forces of attraction, drawing the soul toward a new life that reflects those unresolved patterns.
III. Essay Questions
Discuss the concept of karma as it relates to reincarnation and the soul’s journey across lifetimes. How do different spiritual traditions view the influence of karma on an individual’s past, present, and future existences?
Compare and contrast the descriptions of the afterlife and transitional states (e.g., Bardos) found in at least three different spiritual or philosophical traditions. What common themes or differences emerge regarding the soul’s experience after death?
Explore the idea of soulmates and karmic relationships. According to various spiritual traditions, what factors contribute to the reunion of souls across lifetimes, and what is the purpose of these connections?
Analyze the role of awareness and detachment in preparing for death and navigating the transitional states between lives. How can practices like meditation, mindfulness, and lucid dreaming influence the soul’s journey after death?
To what extent does the conscious or subconscious influence the course of our Soul’s Journey after death? Support your answer with evidence from religious traditions or scientific thinkers.
IV. Glossary of Key Terms
Atman: In Hinduism, the individual soul or self, which is ultimately seeking reunion with Brahman.
Bardo: In Tibetan Buddhism, the transitional state between death and rebirth, characterized by various visions and experiences.
Brahman: In Hinduism, the supreme reality or ultimate principle of the universe, with which the Atman seeks to reunite.
Clear Light: In Tibetan Buddhism, the radiant, luminous state of pure Consciousness experienced at the moment of death.
Karma: The principle of cause and effect, where actions, thoughts, and intentions influence one’s future experiences and rebirth.
Liberation (Moksha/Nirvana): Freedom from the cycle of Samsara and suffering, representing the ultimate goal in Hinduism and Buddhism.
Lucid Dreaming: The state of being aware that one is dreaming, allowing for conscious control and exploration of the dream world.
Reincarnation: The belief that the soul undergoes a series of births, deaths, and rebirths, evolving over time.
Reanu bandha: A Hindu concept explaining that every relationship in our life, whether good or bad, is a result of past karmic debts.
Samsara: The cycle of birth, death, and rebirth, driven by karma and attachment, that binds the soul to repeated existence.
Soulmates: Souls that travel together across lifetimes, bound by karmic ties, and reunite in various roles to facilitate spiritual growth.
Reincarnation, Karma, and the Soul’s Journey
Briefing Document: Reincarnation, Karma, and the Journey of the Soul
This document summarizes the main themes and ideas presented in the provided text, which explores the concept of reincarnation and the soul’s journey through various spiritual and philosophical traditions. The document emphasizes the cyclical nature of existence, the role of karma, the soul’s choice in rebirth, and the importance of awareness in navigating the transitions of life and death.
I. Core Themes and Ideas:
Death as a Transition: The document challenges the common misconception of death as an absolute end. Instead, it presents death as a transition or doorway through which consciousness moves.
“Ancient wisdom tells us that death is not an end but a transition, a doorway through which Consciousness moves shaped by past choices and future possibilities.”
The Bardo States: Drawing heavily from Tibetan Buddhism, the text highlights the concept of the “bardos,” transitional states between death and rebirth, as a crucial period for the soul’s transformation.
“Perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward.”
Karma and Rebirth: The principle of karma is central, suggesting that actions, thoughts, and intentions create imprints that shape the soul’s future experiences and influence the next incarnation.
“This cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next.”
The Soul’s Choice: The text explores the idea that the soul actively chooses its next life, influenced by karmic patterns, unresolved attachments, and lessons yet to be learned.
“It is not simply assigned to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now.”
Soulmates and Karmic Relationships: The document suggests that souls travel together across lifetimes, bound by karmic ties, reuniting as lovers, family, friends, or even rivals, to facilitate spiritual growth.
“Many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again.”
“The purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn.”
The Luminous Awareness (Clear Light): A key concept is the “clear light,” a luminous state of pure consciousness encountered at the moment of death, which offers an opportunity for liberation if recognized.
“This luminous awareness is described as the clear light a state where the soul encounters its purest form.”
Importance of Present Awareness: The text emphasizes that the afterlife journey is shaped by the inner journey undertaken in life, highlighting the significance of cultivating awareness, mindfulness, and detachment in the present moment.
“If heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices.”
Breaking the Cycle of Samsara: The ultimate goal, according to many traditions, is liberation from the cycle of birth, death, and rebirth (samsara), achieved through self-awareness, understanding attachments, and cultivating wisdom.
“Many spiritual Traditions agree that the goal is not endless rebirth but liberation.”
The Subconscious Mind: The influence of the subconscious mind extends beyond our waking reality, shaping the course of the Soul’s journey after death.
“The Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it.”
Preparing for Death in Daily Life: The document advocates that practical methods exist to help prepare for the transitions of both life and death; meditation, lucid dreaming, and self-reflection as tools to shape the Soul’s Journey Beyond this life.
“If the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path.”
II. Key Supporting Details and Quotes:
Gradual Dissolution: Tibetan wisdom describes death as a gradual process involving the dissolution of the elements, leading to a luminous awareness.
“The process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself.”
Afterlife as a State of Consciousness: The text posits that heaven and hell are not fixed locations but states of consciousness, shaped by our inner world.
“These are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward”
Vision of Adamnun: Suggesting a universal pattern in how humans have perceived the afterlife, it provides a journey where a soul is guided through various Realms of purification and learning before reaching its next phase.
“An early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife.”
The Power of Subconscious Impressions: Joseph Murphy’s idea that deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death is highlighted.
“If this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death.”
Breaking Free from Karma: The life we lead today is actively creating the blueprint for our next Incarnation.
“If attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara.”
Reincarnation Goal: The goal is not endless rebirth but Liberation.
“Many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MOA freedom from samsara in Buddhism it is Nana the cessation of suffering.”
Karma: Every action every thought and every intention leaves an imprint that determines where and how the soul moves next.
” Unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next.”
Reuniting Souls: The purpose of these reunions isn’t mere companionship it is spiritual growth.
“These Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn.”
Soulmate Karma: Reanubandha suggests that every relationship is a result of past karmic debts.
“It suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection.”
Practice in Daily Life:“We must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear.”
“If the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path.”
III. Implications and Considerations:
The document encourages a shift in perspective on life and death, urging readers to consider the impact of their thoughts, actions, and emotions on their future existence.
It suggests that present-day practices like meditation, lucid dreaming, and self-reflection can serve as training for navigating the afterlife and making conscious choices about future incarnations.
The exploration of karmic relationships and soulmates prompts reflection on the purpose of connections and the importance of resolving past debts for spiritual growth.
The concept of breaking free from the cycle of samsara challenges readers to examine their attachments and cultivate detachment to achieve ultimate liberation.
Reincarnation, Karma, and the Journey of the Soul
Reincarnation & the Journey of the Soul: A Comprehensive FAQ
1. What happens to consciousness after death, according to various spiritual traditions?
Different traditions offer varied perspectives, but a common thread suggests death isn’t an end but a transition. Tibetan Buddhism describes the “bardos,” transitional states where the soul undergoes profound transformations. The dissolution of the physical body happens gradually, culminating in “luminous awareness” or “clear light,” a state of pure consciousness. Mystical traditions propose that the afterlife is a state of consciousness, a reflection of one’s inner world projected outward. Islamic teachings in the Quran affirm that life continues beyond what we can perceive, and the early medieval Irish Christian text, the “Vision of Adamnan,” mirrors themes found in Tibetan and Hindu teachings.
2. How does Karma influence the cycle of rebirth (Samsara), and how does it shape future experiences?
Karma is the law of cause and effect that governs the cycle of birth, death, and rebirth (Samsara). Every action, thought, and intention leaves an imprint that determines where and how a soul moves next. Unresolved attachments, desires, and fears act as a magnet, pulling the soul towards a new life that reflects these patterns. The Upanishads, Zoroastrianism, and the Book of Enoch all highlight that the goal is to ultimately break free from this cycle through self-awareness and ethical conduct.
3. What are the “bardos” in Tibetan Buddhism, and how do they relate to our subconscious mind and daily life?
The “bardos” are transitional states between death and rebirth, described as realms where the soul encounters visions reflecting its subconscious mind. If a soul remains attached to its old identity, it may cling to illusions and be pulled back into Samsara. Joseph Murphy argued that deep impressions in our subconscious shape both our waking reality and our soul’s journey after death, influencing our experiences in the bardos. It is suggested that there are bardos experienced in life: the waking, dream, and meditative states.
4. Is it possible to consciously influence or choose our next incarnation, or is it entirely determined by Karma?
The soul is not passively assigned to a new body, but actively chooses. This choice is influenced by karmic imprints, unresolved attachments, and lessons yet to be learned. According to Tibetan teachings, a soul is drawn towards the vibrations of certain families and individuals based on past thoughts, actions, and emotions. Brian Weiss’s past life regression studies support the idea that individuals choose their parents to heal old wounds or learn new lessons.
5. What role do soulmates and karmic relationships play in our spiritual evolution across multiple lifetimes?
Soulmates and karmic relationships are connections between souls that travel together across lifetimes, bound by karmic ties. These connections can manifest as deep friendships, family bonds, or intense rivalries. The purpose of these reunions is spiritual growth, helping souls evolve, challenge each other, and learn unaddressed lessons. Hindu philosophy’s “reanu bandha” states that all relationships, harmonious or difficult, are results of past karmic debts. Buddhism believes that souls make agreements before birth to reunite for love, support, or even as teachers.
6. How can we consciously prepare for death and navigate the transitional states (bardos) with greater awareness?
Being mindful of death is a path to liberation, and the more we understand it, the less we fear it and the more consciously we can choose our next experience. Tibetan Buddhism considers death awareness a powerful spiritual practice, and the Bardo Thodol is a guide for the living, teaching that if one can remain aware at the moment of death and recognize the clear light, one can transcend the cycle of rebirth. The more we cultivate stillness, self-inquiry, and detachment, the more we prepare ourselves for the moment when the body dissolves and the soul faces the great unknown.
7. What practical steps can we take in daily life to prepare for the transitions between life and death and to shape our soul’s path?
Practical methods include meditation, lucid dreaming, and self-reflection. Meditation trains the mind to recognize illusions, a skill needed in the bardos. Lucid dreaming mirrors the Bardo of Becoming, allowing the soul to remain conscious as it moves between realms. Cultivating stillness, self-inquiry, and detachment prepares us for the soul’s journey. Living in alignment with justice and compassion also refines our karmic path.
8. Do all souls experience the afterlife and reincarnation process in the same way, or are there cultural and individual variations?
While different traditions offer unique descriptions of the afterlife, many share common themes, suggesting a structured process in which the soul moves through various states before reaching its next incarnation. The specific experiences within these states, however, may vary depending on an individual’s cultural background, spiritual beliefs, and karmic imprints. Some cultures, like Tibetan Buddhism, provide detailed maps of the afterlife realms, while others emphasize the subjective nature of these experiences, highlighting how one’s inner state shapes their journey after death.
The Rebirth Process: Karma, Dissolution, and Incarnation
The rebirth process, also known as reincarnation or samsara, is a central concept in many spiritual traditions, including Hinduism, Buddhism, and Jainism. It posits that after death, the soul undergoes a cycle of birth, death, and rebirth, driven by karma. Here’s an overview of the process:
Initial Dissolution: Death is not an instantaneous event but a gradual process where the physical body dissolves in stages. The earth element dissolves first, leading to a feeling of heaviness, followed by water, fire, air, and finally space.
Luminous Awareness: As the body dissolves, a “luminous awareness” or “clear light” emerges, representing the soul’s purest form. Recognizing this light can lead to liberation, but if unrecognized, the soul moves forward, influenced by past experiences and karmic imprints.
Bardo States: In Tibetan Buddhism, the soul enters the “bardos,” transitional states where it encounters visions reflecting its subconscious mind. One such state is the “Bardo of becoming,” where the soul, now disembodied, drifts through realms and confronts these visions.
Karma and Attachments: Karma, the law of cause and effect, plays a crucial role in determining the soul’s next experience. Unresolved attachments, desires, and fears act as magnets, drawing the soul toward a new life that mirrors those patterns.
Choice and Incarnation: The soul is not forced into reincarnation but is drawn by its cultivated energies. It chooses its next incarnation based on karmic connections, seeking circumstances that facilitate its spiritual growth. This choice involves selecting new parents and relationships that align with its karmic blueprint.
Breaking the Cycle: The ultimate goal in many traditions is to break free from the cycle of samsara. In Hinduism, this is called moksha, while in Buddhism, it is nirvana, both representing liberation from suffering. Self-awareness, mindfulness, and detachment are key to reducing karmic imprints and making conscious choices, paving the way for liberation.
Additionally, different spiritual philosophies and traditions offer various perspectives on the afterlife journey, often describing a structured process where the soul moves through different states before reaching its next incarnation.
Karmic Patterns: Rebirth, Relationships, and Spiritual Evolution
Karmic patterns play a central role in the cycle of rebirth, influencing a soul’s journey through lifetimes. These patterns are created by actions, thoughts, and intentions, shaping future experiences and relationships.
Key aspects of karmic patterns include:
Formation: Every action, thought, and intention leaves an imprint, creating a karmic link that influences future incarnations. Moral and spiritual choices actively shape future existence.
Influence on Rebirth: Unresolved attachments, desires, and fears act as a magnet, drawing the soul towards a new life reflecting those patterns. Souls are drawn to parents and families based on karmic imprints, unresolved attachments, and lessons yet to be learned.
Relationships: Karmic patterns influence the relationships encountered across lifetimes. Past karmic debts result in souls being drawn together to heal, complete, or refine connections. These connections can manifest as deep friendships, family bonds or even intense rivalries.
Breaking Free: Breaking free from toxic cycles involves understanding and overcoming attachments. Recognizing the forces that bind the soul to repetition is essential. Mindfulness, presence, and detachment allow one to remain awake and choose the next incarnation with clarity.
Awareness and Choice: Awareness in life prepares for awareness in death, enabling a conscious choice of the next incarnation. By cultivating stillness, self-inquiry, and detachment, individuals prepare for the moment when the body dissolves and the soul faces the unknown.
Spiritual Evolution: Navigating relationships with awareness shapes spiritual evolution and future reunions. Love is seen as a force that transcends time, drawing souls together and shaping experiences in the next incarnation.
Soul Choices: Karma, Rebirth, and Conscious Evolution
The soul’s choices are a significant aspect of the reincarnation process, influencing its journey and future experiences. Instead of aimlessly drifting, the soul follows a mysterious path that leads to new relationships and experiences.
Key aspects of soul choices:
Active Selection: Many spiritual traditions suggest that a soul’s next incarnation isn’t random but is actively selected based on karmic imprints, unresolved attachments, and lessons to be learned. The soul actively selects the circumstances of its next birth.
Influences on Choice:
Karmic imprints.
Unresolved attachments.
Lessons yet to be learned.
Vibrations of certain families and individuals.
Past thoughts, actions, and emotions.
Choosing Parents and Soulmates: The soul is drawn towards parents based on karmic connections and what it needs for its next stage of growth, often to heal old wounds or learn new lessons. This extends to soulmates, with souls traveling in groups and reuniting in different roles to support and challenge each other’s spiritual evolution. Encounters with others are not accidental, but part of a deeper pattern.
Navigating the Bardos: Tibetan teachings reveal that after death, the soul enters a state where deepest fears, desires, and karmic patterns manifest. If the soul remains unaware, it’s drawn back into the cycle of birth and rebirth by unresolved attachments and past actions. However, recognizing the luminous reality of consciousness allows the soul to move beyond compulsive reincarnation and choose its next experience with clarity and wisdom.
Importance of Awareness: Awareness in life prepares individuals for awareness in death, allowing them to consciously choose their next incarnation.
Factors Influencing the Soul’s Trajectory: The final trajectory of the soul is determined by the power of recognition, seeing beyond illusion, and embracing the vast nature of existence.
Choice and Preparation: Souls may return to familiar pain due to attachments, desires, or fears. Mindful preparation for death is essential. By navigating transitions in life with awareness and purpose, individuals can prepare to navigate transitions beyond it.
Shaping the Next Life: Every moment presents an opportunity to shape the next life through choices, thoughts, love, and forgiveness.
Death Awareness: Perspectives from Ancient Wisdom and Modern Psychology
Death awareness involves recognizing and contemplating mortality, which many traditions consider a path to liberation rather than a morbid preoccupation. It suggests that understanding death helps diminish the fear of it, enabling more conscious choices about one’s experiences.
Key aspects of death awareness include:
Mindfulness and Preparation: Mindfulness of death, as taught by spiritual traditions, is a path to liberation, not depression. Preparing for death makes sense if death is a transition rather than an end.
Tibetan Buddhism: In Tibetan Buddhism, death awareness is a potent spiritual practice. The Bardo Thodol, or Tibetan Book of the Dead, serves as a guide for the living, not just the dying. Remaining aware and recognizing the clear light at the moment of death allows one to transcend the cycle of rebirth.
Ancient Chinese Perspective: The 13th-century mystical text, Aman Ababa, describes consciousness as eternal and blissful, advocating death as a merging with the greater whole rather than annihilation.
Confucianism: Confucius believed contemplating death leads to moral wisdom by understanding impermanence, fostering compassion and detachment from fleeting desires.
Modern Psychology: Modern psychology is catching up with ancient wisdom. Brené Brown argues that embracing mortality allows for more courageous living. Wayne Dyer suggests self-inquiry and introspection reduce karmic burdens, easing the transition into the afterlife.
Awareness in Life and Death: Awareness in life prepares individuals for awareness in death. Practicing mindfulness, presence, and detachment allows one to remain awake during the transition and consciously choose the next incarnation.
Shaping the Soul’s Trajectory: Every act of mindfulness, detachment, kindness, and integrity shapes the soul’s trajectory, increasing the likelihood of moving forward with clarity.
Three Bardos: The Tibetan Bardo Thodol suggests there are three primary Bardos experienced in life: the waking state, the dream state, and the meditative state.
Practical Methods: Practical methods exist to prepare for life and death transitions, including meditation and lucid dreaming.
Evolution of Consciousness: A Spiritual and Philosophical Journey
Consciousness evolution is a central theme in many spiritual and philosophical traditions, referring to the ongoing refinement and transformation of awareness, both during life and after death. It involves breaking free from limitations, cultivating self-awareness, and consciously shaping one’s spiritual path.
Key aspects and principles related to the evolution of consciousness include:
Transformation Beyond Death: Consciousness does not merely continue but evolves. The journey after death is an extension of the inner journey undertaken in life.
Spiritual Practices: Throughout history, spiritual masters, philosophers, and modern thinkers have suggested that consciousness does not end with death.
Karma’s Role: Karma influences the journey of consciousness, but awareness and choices can shape its trajectory. By understanding impermanence, one becomes more compassionate, present, and less attached to fleeting desires.
Importance of Awareness: Awareness in life prepares individuals for awareness in death, allowing them to consciously choose their next incarnation.
Breaking Free From Samsara: The key to breaking the cycle of rebirth is self-awareness.
Mindfulness, Meditation, and Detachment: Traditions emphasize mindfulness, meditation, and detachment to prepare for stepping beyond life.
Luminous State: Recognizing the luminous reality of consciousness allows souls to move beyond compulsive reincarnation and choose their next experience with clarity.
Bardo States as Training Grounds: The bardos are not just states after death but states experienced every day. The Tibetan Bardo Thodol suggests three primary bardos experienced in life: the waking state, the dream state, and the meditative state.
Moral and Spiritual Choices: Moral and spiritual choices actively shape future existence. Living in alignment with justice and compassion refines the self and the collective energy of the world.
Role of Relationships: Relationships shape our very being; encounters in life are not accidental but part of a deeper pattern.
Self-Inquiry and Introspection: Self-inquiry and introspection reduce karmic burdens, making the transition into the afterlife smoother and more conscious.
Shaping the Future: Every moment presents an opportunity to shape the next life through choices, thoughts, love, and forgiveness.
How A Soul Chooses Next Parents & Soulmate After One’s Death (Explained in detail)
The Original Text
[Music] look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the k cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophy and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our life right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can receive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the BAU of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the B some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in quantum mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Surin kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the Bardo of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giant traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unex expected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MOA freedom from samsara in Buddhism it is nirvana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born in into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the after life was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream B one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then the Bardo States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the bardos are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationship shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful F spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not not unique to Buddhism in ancient China the 13th century mystical text Aman Ababa by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self- inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an un resolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunity is to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth gr rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you real realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong craving whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasize that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bardos are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan bar o ool suggests that there are three primary bardos experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the bard of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters the new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experience the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu rein aration Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine Realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergos a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a parad or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John cimus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself self spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam none presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a sign ific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teaching this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Sur kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the BAU of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnations pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle Echo e of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahma the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but liberation in Hinduism this is called MOA freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept cept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long-lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bar with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States of consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shabag Enzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then The Bard States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the bardos are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daat an early treaties on moral and ethical teachings while while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles times as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman Ababa by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this align closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are mindess in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates us some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic Ties That pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of rananda explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the soul search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivand spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the ideaa that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasize that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life life and death with awareness the answer lies in understanding that the bardos are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary bardos experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and Harmon world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne D also emphasized the power of self-inquiry and intentional living according to him the more more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetime smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined [Music] look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new PA parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the kic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their in sites offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the Soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not eras who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls EXP experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of Karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is the this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Surin kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the Bardo of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giant traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called mocka freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are wo into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream
so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then The Bard States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the BOS are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connection we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the da an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn toward circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text amanu by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an anihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren Brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of the these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emot but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Allan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bados are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan bodol suggests that there are three primary bardos experienced in life the waking state the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imp and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of rep ition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past Deeds s and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experience experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding reming Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as The Bard of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully real realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence suren kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the BAU of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giant traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MSHA freedom from samsara in in Buddhism it is nirvana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emmanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all will be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then the Bardo States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the BOS are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are atess free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian itic ISM all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul Soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in illusion pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman ubava by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a home coming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren Brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether har harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spirit ual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsi the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in sir KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasize that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bardos are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary BOS experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study prti iCal methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choic and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from sufy mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen what determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the baros of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply a sign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spirit spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergoes a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness touched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea is isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the BAU some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text The Secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where Modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Sur kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the Bardo of becoming where the soul unable to recognize the Luminous state moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called Moka freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are wov into the fabric of our Soul’s Evolution so how does a soul decide its next incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then the Bardo States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary Incarnation if the BOS are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic Bond imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibration of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a less known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life Reg ression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West the though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spirit spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman Ababa by janesa describes Consciousness as something Eternal and blissful urg ing Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old kic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply caric playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless while others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami Vivan spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and selfawareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to bodic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices I es it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Sur and KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this
life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train our elves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bados are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary bardos experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the Bardo of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne dire also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary AR attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the trans transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos feel that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined [Music] look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the isamic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosoph opers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergoes a profound transformation before moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the BAU of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence and aware awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into The Bard some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in quantum mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Surin kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the BAU of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an expected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MOA freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus aurelus the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born in into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream bar one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpect expected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then The Bard States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the BOS are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experien and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daat an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn toward circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most power ful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman Bava by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our ever ution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of rananda explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an resolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes s in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunity ities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong craving ings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bardos are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan bar bodol suggests that there are three primary BOS experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the bard of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it ENT is a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experience es the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shap the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu re Incarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine Realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergoes a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell apparent Paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself self spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of none presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as is the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a sign scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teaching this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body C aspects of the Mind might transcend physical existence Sur kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the BAU of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnations pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and GI traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but liberation in Hinduism this is called MSHA freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you real realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the vardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States of consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then The Bard States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the bardos are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn toward circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles some sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the Psy of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman ubaba by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the soul search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kagad speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasize that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bardos are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary bardos experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and Harmon ious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne D also emphasized the power of self-inquiry and intentional living according to him the the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your Soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul will choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties while mothers seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined [Music] look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of Karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the
power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Sur kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the BAU of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called mocka freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus aelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are w woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely caric law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then the Bardo States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the bardos are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these stat is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connection ctions we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the bar of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moment of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text amanu Ava by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as emerging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemp ating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren Brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth the these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an motion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attach does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in suren KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kagad speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bados are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan B thodol suggests that there are three primary BOS experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering ing the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Cara instead it is a process shaped by awareness attachments subconscious and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of petition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far far greater than we ever imagined look up at the night sky a vast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choices and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen What determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across mult multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past de needs and the pull of future lessons it is not simply aign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death EXP experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and karmic imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness at the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of of purification and learning before reaching its next phase the text though obscure mirrors themes found in tietan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines their next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shaping what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence suren kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the Tibetan concept of the Bardo of becoming where the soul unable to recognize the Luminous State moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounded by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MSHA freedom from samsara in Buddhism it is nirvana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and Detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face May all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next Incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on on one’s awareness this is where things become interesting in the dream BAU one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shenzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then the Bardo States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the bardos are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic bonds imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibrations of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a Soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daash an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast and unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in illusion pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman Ababa by janesa describes Consciousness as something Eternal and Blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a hope homec coming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply karmic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of rananda explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless While others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami vivanda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spirit spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to Bic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to Sams Sara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Siran KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bados are not just States after death death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary BOS experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experi exp erience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to Liberation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the B of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to a in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasize the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unnecessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined look up at the night sky a fast Endless Ocean of stars stretching beyond the limits of human sight have you ever wondered what happens when a soul departs this world where does it go does it simply dissolve into nothingness or does it continue its Journey seeking new experiences new lessons new connections ancient wisdom tells us that death is not an end but a transition a doorway through which Consciousness moves shaped by past choice es and future possibilities many Traditions from Tibetan Buddhism to Hindu reincarnation Philosophy from Sufi mysticism to early Christian teachings describe a process where the soul chooses its next life it doesn’t just drift aimlessly into the void instead it follows an intricate often mysterious path one that leads to new parents new relationships and new experiences but how does this Choice happen what determines where a soul will be born next and which family it will enter is it Destiny Karma a divine plan or something Beyond human comprehension the answer lies in the Unseen dimensions of existence the bardos of Tibetan teachings the karmic cycles of Hindu philosophy and the transformative Journey described in mystical Traditions across the world this video will take you through these fascinating perspectives revealing what happens between death and rebirth we’ll explore how Souls navigate the afterlife Journey how karmic energy shapes their next Incarnation and even how some beings reunite across multiple lifetimes as soulmates throughout history spiritual Masters philosophers and even modern thinkers have sought to understand this process their insights offer a profound glimpse into the nature of Consciousness Destiny and the great Cosmic intelligence that guides all existence imagine standing at the threshold of a new life a soul hovers Between Worlds drawn by unseen forces feeling the weight of past deeds and the pull of future lessons it is not simply assign to a new body it chooses but how what influences this choice and more importantly what does this mean for us here and now we’ll explore the answers in depth bringing together wisdom from Buddhist sutras the upanishads early Christian texts Islamic teachings and even modern perspectives from quantum physics and psychology each tradition offers a piece of the puzzle helping us understand the mechanics of reincarnation the karmic journey and the profound process of spiritual evolution by the end of this journey you may look at life and death in a completely new way you may begin to see how your thoughts actions and emotions shape not just this life but the ones that follow and you may even start to sense that the people you meet the ones who feel strangely familiar may not be strangers at all let’s begin the anatomy of death and correcting common misconceptions imagine for a moment that you are at the very edge of existence your final breath has left your body and everything familiar begins to fade what happens next Many religious traditions and spiritual philosophies attempt to describe this moment some portray it as an entry into a Divine realm While others suggest a blank void but perhaps the most detailed descriptions come from Tibetan teachings on the bardos transitional states where the soul undergo a profound transformation before it moves forward a common misconception about death is that it is an instant total cessation Tibetan wisdom teaches otherwise the process is gradual and Consciousness does not simply switch off instead the dissolution of the physical body happens in stages first the Earth element dissolves leading to a sense of heaviness then water dissolves bringing dryness fire Fades and warmth leaves the body air dissipates and breath ceases finally space itself dissolves and what remains is not emptiness but something far more profound a luminous awareness Untouched by death itself this luminous awareness is described as the clear light a state where the soul encounters its purest form it is here that many near-death experiences Echo the same theme a radiant presence a deep sense of unity and a feeling of weightless expansion but this moment is fleeting if the soul does not recognize it it drifts onward pulled by its past experiences and Cal imprints many people imagine the afterlife as a place Heaven or Hell a paradise or a punishment but across mystical Traditions there is a deeper understanding these are not locations but States Of Consciousness Carl Jung the great psychologist once suggested that the unconscious mind contains Realms Beyond ordinary experience archetypal Landscapes shaped by thought emotion and personal history could it be that the afterlife is just that a reflection of our inner World projected outward this idea is echoed in a lesser known Christian mystical text from the 7th Century the ladder of divine Ascent by John climacus though written for monks its wisdom applies universally each Soul ascends or descends not based on external judgment but by the refinement of its own being if a soul clings to anger it enters a realm of suffering if it cultivates peace it enters Harmony the journey after death is in many ways an extension of the inner Journey we undertake in life so what does this mean for us if heaven and hell are not fixed places but states of mind then we are shaping our afterlife right now through our thoughts emotions and choices death does not erase who we are it reveals it this is why many Traditions emphasize awareness of the moment of passing a peaceful mindful transition allows for a clearer path into the next phase of existence the soul now stripped of its physical form prepares for the next stage choosing its next Incarnation but how does it make this choice is it random is it dictated by external forces or is there a hidden intelligence at work guiding the soul to exactly where it needs to be the answer lies Li in the interplay between Karma memory and the Deep unconscious forces that shape existence itself spiritual blueprints Soul Journeys across cultures picture a soul standing at the crossroads of existence no longer bound by a body yet not fully reborn what happens next do All Souls experience the same transition or does this journey vary across cultures and traditions throughout history different spiritual philosophies have attempted to map the terrain of the afterlife despite their differences many of them describe a structured almost intentional process one in which the soul moves through various States before reaching its next Incarnation whether in the form of judgment reflection or purification this transition is never random in the Bible the concept of transformation beyond death is evident in First Corinthians 15 where it speaks of a spiritual body that replaces the physical one this implies that Consciousness does not merely continue but evolves the Quran affirms this notion in 2154 reminding Believers that those who pass from this world are not truly dead life continues beyond what we can perceive Buddhism in contrast speaks of rebirth as a natural consequence of karma a continuation rather than a destination surprisingly this idea isn’t limited to Eastern traditions an early medieval Irish Christian text the vision of Adam nun presents a strikingly similar Journey where a soul is guided through various Realms of purification and learning before reaching its next phase the text though obscure mirrors themes found in tibetan and Hindu teachings suggesting a universal pattern in how humans have perceived the afterlife if Souls move with purpose what determines next experience the Tibetan bardos offer an answer a transitional phase known as the Bardo of becoming in this state the soul now disembodied drifts through various Realms encountering visions that reflect its subconscious mind if a soul remains attached to its old identity it may cling to illusion and be pulled back into the cycle of samsara endless rebirth this brings us to a fascinating Insight from Joseph Murphy in the power of your subconscious mind he argued that the Deep impressions in our subconscious don’t just shape our waking reality but also extend beyond it if this is true then our deeply rooted beliefs and fears could influence the course of our Soul’s Journey after death the same principle applies to the bardos those who can recognize their experiences as projections of the mind can navigate them with greater Clarity avoiding unnecessary suffering and making a more conscious choice about their next Incarnation this raises a profound question if our subconscious guides us after death then what about those we meet again and again across lifetimes do some Souls travel together could certain relationships be pre-ordained not by Fate but by shared karmic patterns if so how do we recognize them the answers lie in the hidden forces that pull Souls together forces that shape not only who we are born to to but also who we find along the way dissolution and Luminosity a scientific esoteric marriage imagine standing at the threshold between one existence and another the body is gone yet something remains a presence an awareness a Consciousness that seems Untouched by death itself what is this state and could modern science offer any insights into this ancient mystery many spiritual Traditions describe a radiant luminous state that appears at the moment of death in tibetan teachings this is called the clear light an experience of pure Consciousness before the soul moves further into the Bardo some recognize it and merge with it attaining Liberation While others unable to comprehend its nature move forward into rebirth but what exactly is this light interestingly an ancient Chinese alchemical text the secret of the Golden Flower describes something remarkably similar this lesser known toist work speaks of a radiant energy within cultivated through deep meditation which becomes fully realized after death could this be the same phenomenon described in the bardos if so this suggests that different cultures separated by geography and time may have glimpsed the same profound reality a luminous State Beyond ordinary perception this is where Modern science enters the conversation quantum physics has long puzzled over the nature of Consciousness some theories suggest that Consciousness is not just an emergent property of the brain but something more fundamental a field that interacts with reality itself the observer effect in Quantum Mechanics for instance suggests that the mere Act of observation changes physical phenomena if Consciousness has such an effect on reality could it also persist Beyond Death shap what happens next the philosophy of science reminds us that these ideas remain speculative but they challenge the conventional materialist view that Consciousness is purely biological if awareness is more than the brain then perhaps it continues even after the physical body dissolves this would explain why so many Traditions describe a continuation of the Soul’s Journey rather than an Abrupt end even ancient Western philosophers hinted at this possibility Aristotle in his metaphysics proposed that while the soul is deeply connected to the body certain aspects of the Mind might transcend physical existence Sur kard much later suggested that confronting death is not about fear but about transformation an opportunity for existential reflection and self-realization this idea is echoed in the tetan concept of the BAU of becoming where the soul unable to recognize the Luminous state moves into a transitional phase where past Karma and subconscious Impressions take over the soul is not forced into reincarnation it is drawn by the energies it has cultivated if attachments remain unresolved they act as a magnet pulling the soul toward a new life that reflects those patterns if this is true then what we experience at death is deeply shaped by how we live our attachments desires and fears become the very forces that guide our next step could it be that the life we lead today is actively creating the blueprint for our next Incarnation if so how much of this process is within our control the answer lies in the Soul’s greatest challenge Breaking Free from the pull of past Karma the wheel of samsara breaking reincarnation pull imagine waking up in a completely different life in a different body surrounding Ed by people you’ve never met yet somehow there is a familiarity in the air a subtle echo of something long forgotten what if this was not a new beginning but a continuation what if your current life is just another chapter in a story that has been unfolding across lifetimes this is the essence of samsara the cycle of birth death and rebirth that has been at the heart of Hindu Buddhist and giin traditions for thousands of years unlike the Western idea of a singular afterlife samsara suggests that the soul is caught in a loop of existence shaped by past actions and decisions this cycle is not random it follows an intricate law known as karma which ensures that every action every thought and every intention leaves an imprint that determines where and how the soul moves next in the upanishads one of the oldest spiritual texts in the world the soul Atman is said to move through countless lifetimes searching for ultimate reunion with Brahman the Supreme reality but until the soul reaches full realization it continues to return shaped by its past experiences this idea finds an unexpected parallel in Zoroastrianism where moral choices determine the Soul’s Journey after death influencing where and how it will be reborn a lesser known but powerful text The Book of Enoch part of the Ethiopian Orthodox biblical tradition offers a strikingly similar Vision it describes Souls traveling through different Realms learning from their experiences and being prepared for future incarnations though rarely discussed in mainstream Christianity this book suggests that life after death is not a static destination but an evolving process much like the Eastern concept of rebirth but if reincarnation is a cycle can it be broken many spiritual Traditions agree that the goal is not endless rebirth but Liberation in Hinduism this is called MSHA freedom from samsara in Buddhism it is Nana the cessation of suffering the key to Breaking the cycle is self-awareness recognizing the forces that keep the soul bound to repetition Emanuel Kant though not a religious philosopher spoke of the moral imperative the idea that our actions should be guided by a sense of universal ethics rather than personal gain this concept aligns with the idea of karma we are not just reacting to life but actively shaping our future existence through our moral and spiritual choices similarly Marcus Aurelius the stoic philosopher wrote that self-reflection and virtue are essential for Spiritual elevation this aligns with Buddhist thought that by cultivating mindfulness and detachment we reduce the karmic imprints that pull us back into the cycle of rebirth if this is true then the people we meet the experiences we have and even the struggles we Face may all be part of a larger interconnected karmic Journey this means that the family we are born into the soulmate we encounter and the challenges we Face are not random but are woven into the fabric of our Soul’s Evolution so how does a soul decide its next incarnation is it purely karmic law or does it actively choose where it goes next the answer May lie in something even more mysterious the moment between death and rebirth where choices are made Beyond the Veil of physical existence bardos dreams and lucidity a training ground imagine being in a dream so vivid that it feels real you walk through familiar places speak to long lost friends or even fly through the sky until suddenly something shifts you realize you are dreaming in that instant the world around you becomes fluid and you have a choice to control the dream to explore it or to wake up now what if the afterlife was something like this Tibetan Buddhism describes the Bardo States as a space between death and rebirth where the soul navigates Visions memories and illusions that are shaped by its own Consciousness some traditions say this experience lasts 49 days while others suggest that time in the bardos is subjective stretching and Contracting based on one’s awareness this is where things become interesting in the dream Bardo one of the transitional States described in tibetan teachings the experiences of the deceased mirror those of a dreamer if a person has trained their mind in life through meditation awareness and self-inquiry they are more likely to recognize Illusions and move through the bardos with Clarity but if they are trapped in fear regret or attachment they may remain lost in these Visions mistaking them for reality this concept finds an unexpected parallel in phenomenology a branch of philosophy that explores Human Experience Sam Harris a thinker in comparative religion has spoken about lucid dreaming as a rehearsal for death a way to train the mind to remain aware even in Altered States Of Consciousness if true this means that our ability to recognize Illusions in dreams could help us navigate the Afterlife with greater wisdom a lesser known Zen Buddhist text shabag Enzo by dogen takes this idea even further written in the 13th century it describes time itself as an illusion stating that past present and future are not separate realities but different aspects of the same moment if this is true then The Bard States might not just be a passage after death but something accessible in life a dimension we can Glimpse through deep meditation dreams and expanded awareness this is echoed in eart tol’s teachings on mindfulness he speaks of The Watcher the part of you that observes thoughts without becoming them if this practice is developed in life it could allow the soul to remain conscious through the transitions of death avoiding unnecessary reincarnation if the BOS are in a sense a mirror of our subconscious then mastering awareness in life might give us control over what happens next could it be that lucid dreaming meditation and self-reflection are not just spiritual practices but tools to shape the Soul’s Journey Beyond this life if so then understanding these states is not just about preparing for death it is about living with greater Clarity and purpose this brings us to one of the most mysterious aspects of reincarnation how a soul chooses its next parents if the bardos are real then could it be that the soul far from being passively assigned actively selects the circumstances of its next birth and if so what forces influence this Choice the answer May lie in the powerful unseen connections we share across lifetimes choosing parents and soulmates the karmic Bond on imagine standing at a crossroad surrounded by infinite possibilities each path leads to a different family a different body a different life you are weightless free from form yet something deep within you feels a pull a familiar energy guiding you toward a particular lineage a specific set of parents but why what determines this Choice many spiritual Traditions suggest that the Soul’s next Incarnation is not random it is drawn toward parents based on its karmic imprints unresolved attachments and lessons yet to be learned this idea is echoed in Hinduism Buddhism and even lesser known Christian mysticism all of which describe a magnetic pull between Souls shaped by past experiences and spiritual debts according to Tibetan teachings as a soul moves through the B of becoming it is not merely observing different possibilities it is actively drawn toward the vibration of certain families and individuals this attraction is not forced but arises naturally as a consequence of the Soul’s past thoughts actions and emotions if a soul has unresolved Karma with certain individuals it may choose to be reborn into their family to continue that Journey this could explain why some relationships in life feel deeply karmic as though they are part of a story that has been unfolding for lifetimes this concept is mirrored in a lesser known Christian text the daat an early treaties on moral and ethical teachings while it does not speak of reincarnation directly it emphasizes that every action creates ripples that shape future spiritual experiences this aligns with the idea that a soul having cultivated specific energies in one life is naturally drawn towards circumstances that allow it to either resolve or deepen those energies modern spiritual thinkers like Brian Weiss through past life regression Studies have recorded cases where individuals recall choosing their parents before birth often as a way to heal Old Wounds or learn new lessons his work suggests that the soul is not passively assigned to a family it chooses based on what it needs for its next stage of growth this idea extends Beyond parent child relationships what about soulmates are some Souls destined to find each other across lifetimes the answer seems to be yes many Traditions believe that Souls travel in groups reuniting over and over in different roles sometimes as lovers sometimes as family sometimes as friends or even Rivals this is echoed in Swami vivekananda’s teachings where he speaks of a circle of souls that evolve together supporting and challenging one another in their journey toward Enlightenment even in philosophy this idea of interconnected Destinies appears in surprising places Cornell West though known for his work in social justice often speaks about how our relationships shape our very being that who we encounter in life is not accidental but part of a deeper pattern if this is true then the people we meet especially those who profoundly impact us might be Souls we have known before but if the soul has the power to choose then does it always make the right choice what happens when attachments desires or fears influence this decision could it be that some Souls return to familiar pain because they are unable to break free and if so how can one consciously prepare to Choose Wisely in the next life the answer lies in how we navigate death itself Beyond fear mindful preparation for death imagine for a moment that you are at the final moments of your life you are aware that your breath is slowing your body is growing lighter and something vast is unknown is approaching what do you feel fear Peace A desperate clinging to life or a calm surrender to something greater how we experience death just like how we experience life is shaped by our state of consciousness if death is a transition rather than an end then wouldn’t it make sense to prepare for it just as we prepare for any important Journey throughout history many great spiritual Traditions have taught that being mindful of death is not morbid or depressing but a path to Liberation the more we understand it the less we fear it and the more consciously we can choose our next experience in Tibetan Buddhism death awareness is considered one of the most powerful spiritual practices the Bardo thol often translated as the Tibetan Book of the Dead is not just a text for the dying it is a guide for The Living it teaches that at the moment of death if one can remain aware and recognize the clear light one can transcend the cycle of rebirth altogether but if fear takes over the soul becomes lost in Illusions pulled back into habitual karmic patterns this emphasis on awareness at death is not unique to Buddhism in ancient China the 13th century mystical text Aman ubava by janesa describes Consciousness as something Eternal and blissful urging Seekers to view death not as an Annihilation but as a merging with the greater whole this aligns closely with Sufi teachings where death is seen as a return not a loss but a
homecoming to the Divine even in Western thought this wisdom appears in unexpected places confucious though known for his teachings on ethics and social order believed that contemplating death led to moral wisdom because understanding impermanence makes us more compassionate more Pres present and less attached to fleeting desires modern psychology is now catching up with this ancient knowledge Bren a brown a researcher on vulnerability argues that fully embracing mortality allows us to live more courageously similarly contemporary spiritual thinkers like Wayne Dyer suggest that self-inquiry and introspection reduce karmic burdens making the transition into the Afterlife smoother and more conscious so what does this mean for us it means that our awareness in life prepares us for awareness in death if we are Mindless in life if we suppress our fears avoid self-reflection and cling to Illusions we will likely remain unconscious in death simply carried Along by old karmic forces but if we practice mindfulness presence and Detachment we can remain awake even as we transition allowing us to choose our next Incarnation with Clarity rather than compulsion this brings us to one of the most mysterious aspects of reincarnation soulmates are some beings destined to find each other across lifetimes and if so why could it be that these connections are not just romantic but deeply kic playing a role in our Evolution across multiple existences if Souls travel together then what is the purpose of these reunions the answer May lie in The Invisible yet undeniable forces that pull certain soul Souls toward one another again and again soulmates and Karma why certain beings reunite have you ever met someone for the first time yet felt as if you had known them forever a deep unexplainable connection that goes beyond words Beyond time it’s as if something ancient and familiar recognizes their presence could it be that you’ve met before not in this life but in another many spiritual Traditions suggest that Souls travel together across lifetimes Bound by karmic ties that pull them toward one another again and again these connections aren’t always romantic they can manifest as deep friendships family bonds or even intense rivalries the purpose of these reunions isn’t mere companionship it is spiritual growth these Souls often called soulmates appear in our lives to help us evolve to challenge us and to remind us of the lessons we have yet to learn in Hindu philosophy the concept of reanu bandha explains this beautifully it suggests that every relationship in our life whether harmonious or difficult is a result of past karmic debts if we owe someone an unresolved lesson we are drawn to them again in the next life creating opportunities to heal complete or refine the connection this is why some relationships feel effortless while others are filled with challenges both types serve a higher purpose this idea is echoed in Buddhism where it is believed that certain Souls make agreements before birth to meet again some reunite to offer love and support While others come back into our lives as teachers sometimes in painful ways a person who betrays you may have done so in a past life as well and the unresolved Karma brings you together once more the challenge is to rise above resentment and transform suffering into wisdom a fascinating perspective on this can be found in the book of Thomas the contender a lesser known text from the nag hamadi Library it describes the Soul’s search for nosis true knowledge and suggests that repeated lifetimes offer opportunities to refine our understanding often through relationships that push us toward deeper self-awareness modern thinkers also explore this concept in profound ways Swami Viva Anda spoke of the circle of souls suggesting that we attract people into our lives based on our inner state if we are trapped in ego and illusion we will attract karmic lessons disguised as challenges but if we operate from wisdom and self-awareness we reunite with Souls that uplift and Inspire us even in Western philosophy this theme appears in surprising places Judith Butler a scholar known for her work on identity and relationships argues that who we are is deeply shaped by our connections though she speaks in a more social and political sense this aligns with the idea that our relationships across lifetimes help Define our spiritual Evolution so what does this mean for us it means that every meaningful connection in your life whether joyful or painful has a purpose it means that love is not just an emotion but a force that transcends time drawing certain Souls together again and again and it means that how we navigate our relationships today will shape who we meet and what we experience in our next Incarnation but if Soul connections are governed by karmic patterns then how do we break free from toxic Cycles how do we ensure that our next reunion is one of wisdom and growth rather than repetition and suffering the answer lies in understanding attachment the very force that binds us to the cycle of rebirth overcoming attachments the key to bodic Liberation imagine walking through a vast Hall of Mirrors each one reflecting a different version of yourself some joyful some sorrowful some burdened by regret the mirrors are endless and the more you look the more you realize that you are trapped within them unable to move beyond their grasp this is what attachment does to the soul it binds it to reflection after reflection lifetime after lifetime repeating patterns of Desire fear and longing but what if you could Step Beyond the mirrors and see clearly in Buddhist teachings attachment is considered the primary force that keeps the soul bound to samsara the cycle of birth and rebirth it is not just attachment to people or material things it is attachment to Identity emotions beliefs and even suffering the moment we cling to something we create a karmic link ensuring that we will return to resolve it if we leave this life still grasping at unfinished relationships desires or fears those very same attachments will pull us back into another Incarnation like a magnet drawing iron dust the Tibetan Bardo thol describes this vividly it states that Souls who die with strong Cravings whether for love Revenge recognition or even security are drawn back into life through those Cravings this is why breaking attachments is one of the most essential spiritual practice ices it is not about rejecting the world but about learning to live without being controlled by it this concept is beautifully mirrored in Surin KAG guard’s upbuilding discourses a lesser known but deeply profound philosophical work kard speaks about the need to detach from worldly concerns and place trust in the Eternal He suggests that suffering is not something to escape but something to understand and release much like the Buddhist notion of Liberation from samsara similarly Alan Watts a modern philosopher often spoke about the illusion of control he taught that true Freedom comes not from holding on but from letting go if we die in fear we create more fear if we die in peace we carry that peace into the next phase of our journey but attachment is not just a spiritual concern it is also deeply psychological modern psychospiritual studies suggest that unresolved traumas and emotions do not disappear when we die if anything they become part of the subconscious energy that guides us toward our next Incarnation Bob Proctor in his teachings on the subconscious mind often emphasized that our beliefs shape our reality not just in this life but beyond it so what does this mean for us it means that if we wish to Step Beyond the endless cycle of reincarnation we must begin now we must train our ourselves to observe our thoughts and emotions without being consumed by them we must learn to love without clinging to experience without grasping and to let go without fear if we Master this then when the time comes to leave this world we will do so with Clarity and peace and rather than being pulled into another life by unfulfilled desires we may find ourselves truly free perhaps for the first time but how do we practice this in daily life how do we prepare ourselves to navigate the transitions between life and death with awareness the answer lies in understanding that the bados are not just States after death they are states we experience every day and by mastering them in life we prepare ourselves for what comes next practical steps navigating transitions in daily life if the bardos are not just a phase after death but a state we experience daily then wouldn’t it make sense to train for death while we are still alive if our thoughts emotions and attachments shape our next Incarnation then every moment of awareness becomes an opportunity to consciously shape our Soul’s path the Tibetan Bardo thodol suggests that there are three primary bardos experienced in life the waking State the dream state and the meditative State each of these can be used as a training ground to practice awareness Detachment and Clarity meditation for example is often described as a mini death a temporary dissolution of the ego that allows one to experience a state Beyond attachment this concept is echoed in a lesser known esoteric text light on the path which provides poetic yet practical guidance for Spiritual Seekers it emphasizes that each step of increased awareness moves the soul closer to liberation ation the more we cultivate Stillness self-inquiry and Detachment the more we prepare ourselves for the moment when the body dissolves and the Soul faces the great unknown even in Western philosophy this principle is reflected political philosophy explores how Society influences individual Consciousness and many great thinkers like Jean jaac rouso argued that living in alignment with Justice and compassion refines not just the self but the collective energy of the world could it be that by contributing to a more ethical and harmonious world we also refine our own karmic path Beyond intellectual study practical methods exist to help prepare for the transitions of both life and death meditation for example trains the mind to recognize Illusions which is exactly what is needed in the bardos lucid dreaming where one becomes aware while dreaming mirrors the experience of the the B of becoming allowing the soul to remain conscious even as it moves between Realms even herbalism and plant medicine as practiced in many ancient cultures has been used to Aid in spiritual transitions certain sacred plants such as those used in indigenous Traditions are said to open the mind to deeper awareness helping individuals confront the fear of death and gain insight into their subconscious mind modern thinkers like Wayne Dyer also emphasized the power of self-inquiry and intentional living according to him the more one cultivates self-awareness and releases limiting beliefs the lighter their karmic load becomes making transitions between lifetimes smoother and more conscious so what does all of this mean it means that preparing for death is not about fearing the end it is about mastering the present every time you practice mindfulness every time you let go of unne necessary attachments every time you act with kindness and integrity you are shaping the trajectory of your soul you are making it more likely that when the time comes you will move forward with Clarity rather than confusion and if Souls truly choose their next Incarnation then wouldn’t it be wise to ensure that this choice is made not out of compulsion but out of conscious intention if we can learn to navigate the transitions of this life then perhaps we will be prepared to navigate the transitions Beyond it with full awareness with purpose and with peace this brings us to our final reflection if a soul chooses its next life what are the most important factors in that decision what determines the final trajectory of the Soul before it enters a new existence the answer May lie in the power of recognition of seeing Beyond illusion and embracing the vast Eternal nature of existence itself the way forward Ward as we return to the question posed at the beginning how does a soul choose its next life its parents and its soulmates we now see that the answer is far more intricate than we might have imagined it is not a simple matter of Fate nor is it entirely dictated by Karma instead it is a process shaped by awareness attachments subconscious imprints and the Soul’s ability to recognize truth Beyond illusion the Tibetan bardos reveal that after death the soul enters a state where its deepest fears desires and karmic patterns manifest before it if the soul remains unaware it is pulled back into the cycle of birth and rebirth drawn by unresolved attachments and past actions but if it recognizes the Luminous reality of Consciousness it has the potential to move Beyond compulsive reincarnation and choose its next experience with Clarity and wisdom this choice is Guided by many factors some souls are pulled toward particular families because of Unfinished karmic ties While others seek out parents who will provide the exact circumstances needed for their next phase of growth similarly soulmates are not simply people we are romantically destined to meet but beings with whom we have shared deep transformative experiences across lifetimes these reunions are not always easy sometimes they are filled with love and sometimes with conflict but they always serve a greater to purpose spiritual Evolution throughout history Mystics philosophers and modern thinkers have all pointed toward a singular truth Consciousness does not end with death whether through the lens of quantum physics ancient scriptures or personal spiritual experiences the evidence suggests that life continues in ways we may not fully understand the question is not whether the soul persists but how aware it remains in the process this is why so many Traditions emphasize the importance of mindfulness meditation and Detachment not to escape the world but to prepare for the moment when we will Step Beyond it if we leave this life with Clarity free from the illusions of ego and fear then we enter the next with a sense of purpose and intention but if we are lost in attachments and unconscious patterns we may find ourselves caught in a cycle of repetition returning to the same lessons until we are ready to move Beyond them so what does this mean for us it means that every moment of this life is an opportunity to shape the next it means that the choices we make today how we think how we love how we forgive are planting the seeds for what comes after it means that our greatest teacher is not death but the awareness we bring to life itself perhaps the most profound realization is this if we are choosing our next life then we are also shaping it now in this very moment and if that is true then what kind of existence do you wish to create what kind of energy do you want to carry forward what lessons will you choose to complete these are the questions that transcend life and death they are the questions that shape the Journey of the soul and perhaps in contemplating them we begin to awaken to a reality far greater than we ever imagined
Affiliate Disclosure: This blog may contain affiliate links, which means I may earn a small commission if you click on the link and make a purchase. This comes at no additional cost to you. I only recommend products or services that I believe will add value to my readers. Your support helps keep this blog running and allows me to continue providing you with quality content. Thank you for your support!