Take a Virtual, Interactive Tour 

Technology News, Network Security

  |  
4 Min Read

What is a Text Editor?

How to Do Serious Systems Admin Work

The Word Processor is an amazing piece of technology that has enhanced the creation of documents and formatted text the world over. If you are seeking a desktop publishing tool, you will typically not find a better method for the average user than the Word Processor. However, you cannot use a Word Processor for the creation of code or the editing of configuration files. To do serious systems administration work, you need the text editor.

A text editor is a simple tool that can be used to change the contents of a file or document without writing additional characters or storing formatting cruft within the document itself. You use the text editor when dealing with plain text like configuration files, programming or scripting languages, or troff/groff/latex formats to name a few.

Some text editors, like VIM or (NeoVIM) NVIM can even be used like an IDE. You can enhance your text editor by integrating syntax highlighting, spell checking, and even code completion or code sniffing. The ever-useful text editor is valuable to anyone who works in systems administration, software development, or other delicate tasks.

The number one item to remember is that a text editor will not inject any cruft into your file, but a Word Processor will do so. Therefore, if you plan to do serious work, you will need to take the time to familiarize yourself with a text editor and build your knowledge of how to use that tool.

Coding 1

Earn a Degree In Cyber Security at UAT

UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network Engineering, Network Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

Comment

Brute Force Attacks

What does brute force mean? Brute force attacks are a method by which many login attempts are made to gain access to a system. WordPress is a free and open-source content management system that is ...
Picture of Aaron Jones Aaron Jones 4 Min Read

NFTs and UAT

Non-Fungible Tokens (or NFTs) Have Two Big Problems. The first is the name. Non-fungible sounds like fungus, which is gross. So, there’s a branding issue, which I’m sure is why people try to refer to ...

Surveillance Capitalism: The Cost of Data

Watching for a Pay Day Surveillance capitalism is the act of earning money from surveillance in the simplest terms. Large companies who have access to massive data sets can reduce uncertainty and ...
Picture of Aaron Jones Aaron Jones 4 Min Read