-
What is information security and how is it achieved?
-
What are the core principles of information security?
-
What is the CIA triangle?
-
What is non-repudiation (as it applies to IT security)?
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
echo "Local Linguist (linguist for non repos)" | |
if git status 2> /dev/null > /dev/null; then | |
echo "!!! This directory is already a git repository... please use the 'linguist' command instead" | |
echo "!!! If this command exits unclean it will leave a git repository behind" | |
echo "!!! You can remove the git repository by running 'rm -Rf .git'" | |
else | |
git init 2> /dev/null > /dev/null | |
git add --all 2> /dev/null > /dev/null | |
git commit -m "local linguist auto commit" 2> /dev/null > /dev/null | |
linguist "$@" |