top of page
book of spells.webp

Start your journey towards mastering the CLI with our FREE Command Line Book of Spells.

By entering your email address you agree to receive emails from Command Line Wizardry. We'll respect your privacy and you can unsubscribe at any time.

  • Writer's pictureCybersecurity Ops with bash

Cybersecurity Ops with bash - Chapter 8 Solutions

Below are selected solutions for the Chapter 8 workshop questions from Cybersecurity Ops with bash.

Question 4

Modify to allow the user to specify the Windows log to be monitored by passing in a command-line argument.


The first line of code in identifies the Application log as the one that will be monitored.

The first line can be replace with the following:

This will use the value of the first argument passed to the script as the log to monitor. If no argument is provided it will default to Application.

386 views0 comments


bottom of page