Meetup, python with GenAI and Devops & Cyber security Training – 2025, Training

Python with GenAi and DevSecOps Training 2025 – Session 13

VGLUG is dedicated to empowering rural college students through technology education.
As part of this initiative, we conduct weekly training sessions on Python With GenAI and DevSecOps..

Due to the large number of participants, the training is organized into six teams:

  • Python & GenAI –  Linus Torvalds(Team 1) &  Grace Hopper(Team 2): Assigned to Engineering students
  • Python & GenAI –  Richard Stallman(Team 1) & Aron Swatz (Team 2): Assigned to Arts and Science students
  • DevSecOps –  Ada Lovelace (Arts) & Bob Thomas (Engg): Comprising both Engineering and Arts students

These sessions focus on practical knowledge of Python, GenAI, DevSecOps, free and open-source tools, and also include social awareness and community engagement activities.

Python With GenAI Training – 13’th Week Recap

Date: 24’th August 2025 (Sunday)
Time: 9:30 AM to 1:00 PM

Venue:
VGLUG Foundation
SRIMAA PRESCHOOL
Landmark: Opposite to BSNL Exchange
Villupuram 605602

Minutes of the Meeting

Python With GenAI – Richard Stallman and Aron Swatz(Arts) :

Session 1: Functions in Python – Sathish & Dilip

What is a Function in Python?:

A function in Python is a block of reusable code that performs a specific task. Instead of writing the same code multiple times, we can put it inside a function and call it whenever needed.

Why Use Functions?

  • Avoid Code Repetition – Write once, use many times.
  • Organized Code – Break large programs into smaller, manageable parts.
  • Improves Readability – Easier for others (and you) to understand.
  • Debugging is Easier – Fixing issues becomes simple.

def function_name(parameters):
# code block
return value

Types of Functions in Python

Built-in Functions

  • Predefined by Python (e.g., print(), len(), type()).

User-defined Functions

  • Created by programmers using the def keyword.

Anonymous (Lambda) Functions

  • Small, one-line functions created using the lambda keyword.

Recursive Functions

  • Functions that call themselves to solve a problem.

Functions with Arguments

  • Positional Arguments
  • Keyword Arguments
  • Default Arguments
  • Variable-length Arguments (*args, **kwargs)

Session 2: Book Reading Part 2  – Kowsalya & Dilip

We introduced this new topic and students showed great interest. They opened up, shared their own reading experiences, and connected the benefits to their daily life, making the discussion lively and inspiring.

  • Boosts knowledge & awareness
  • Improves focus & concentration
  • Enhances vocabulary & communication
  • Reduces stress & relaxes the mind
  • Sparks imagination & creativity
  • Builds critical thinking skills
  • Encourages life-long learning

Python With GenAILinux Torvalds Team & Grace Hopper Team

Session 1: Strings and Their Functions – Vijayalakshmi

Strings are one of the most fundamental data types in Python. A string is simply a sequence of characters, used to store text. You can define a string using either single or double quotes:

Example :

s1 = ‘Hello, World!’
s2 = “Python is awesome.”

More Handy Methods:

  • partition(): Splits string into a tuple of three parts at first separator.
  • rpartition(): Splits string at last separator.
  • rsplit(): Splits string from right using specified separator.
  • center(): Centers string with padding.
  • swapcase(): Swaps uppercase to lowercase and vice versa

Session 1: Problem solving – Kanimozhi

Problem solving in programming means breaking down a problem into smaller, manageable parts and designing a logical, step-by-step solution. We analyze the requirements, plan an approach, implement it using code, and test it with different scenarios. The goal is to find an efficient and correct solution that meets all constraints.

Session 2: GIMPVasanth

What is GIMP?

GIMP (GNU Image Manipulation Program) is a free, open-source image editor often compared to Adobe Photoshop. It is widely used for:

Why Use GIMP?

  • Free & Open Source – No subscription fees.
  • Cross-Platform – Runs on all major OS.
  • Supports Plugins – Extend functionality.
  • Advanced Features – Layers, masks, filters like Photoshop.

Key Features of GIMP:

Layers and Masks

  • Non-destructive editing with layers.
  • Add transparency using masks.

Selection Tools

  • Rectangle, ellipse, free select, fuzzy select.
  • Advanced selection using color range.

Color Adjustment

  • Brightness/Contrast
  • Hue-Saturation
  • Levels & Curves (like Photoshop)

Filters and Effects

  • Blur, Sharpen, Artistic, Distorts.
  • Noise reduction, oil painting effect.

Text Tool

  • Add and customize text with fonts and effects.

Export in Multiple Formats

  • PNG, JPEG, TIFF, PSD (Photoshop).

DevSecOps: Ada Lovelace Team & Bob Thomas Team

Session 1: Networking Fundamentals – Mathusoothanan

What is Networking?

Networking is the process of connecting two or more devices (computers, servers, IoT devices) to share data, resources, and services. It forms the backbone of communication in modern computing.

Why is Networking Important?

  • Enables communication between devices.
  • Facilitates resource sharing (printers, files, internet).
  • Powers web services, cloud computing, and IoT.

IP Address
A unique identifier for a device on a network.
Example: 192.168.1.1

MAC Address
A physical address assigned to the network card.

Port
Logical endpoint for communication (e.g., HTTP uses port 80).

Protocol
A set of rules for communication. Common ones:

  • HTTP/HTTPS – Web communication
  • FTP – File transfer
  • SMTP – Email transfer
  • TCP/IP – Core internet protocol suite

Types of Networks

  • LAN (Local Area Network) – Small area like office or home.
  • WAN (Wide Area Network) – Covers large geographic areas.
  • MAN (Metropolitan Area Network) – Within a city.
  • PAN (Personal Area Network) – Around one person (Bluetooth).

OSI Model (7 Layers)

  • Physical Layer – Hardware, cables.
  • Data Link Layer – MAC addresses, switches.
  • Network Layer – IP addressing, routing.
  • Transport Layer – TCP/UDP, reliability.
  • Session Layer – Session management.
  • Presentation Layer – Data translation, encryption.
  • Application Layer – End-user services (HTTP, FTP).

Session 2: Shell Scripting Part 2Vignesh

In Part 1, you learned the basics of shell scripting like creating scripts, variables, loops, and conditionals. Now, let’s dive into advanced features that make shell scripts powerful for automation.

!/bin/bash

1) Command-Line Arguments

echo “Script Name: $0”
echo “First Argument: $1”
echo “Second Argument: $2”
echo “All Arguments: $@”
echo “Arguments Count: $#”
echo “———————————–“

2) Functions

greet() { echo “Hello, $1!”; }
sum() { echo “Sum: $(($1 + $2))”; }
greet “Kowsi”
sum 10 20
echo “———————————–“

3) Exit Status & Error Handling

mkdir /root/test 2>/dev/null || {
echo “Failed to create directory” >&2
exit 1
}
echo “Success creating directory”
echo “———————————–“

4) Input with read

read -rp “Enter your name: ” name
read -rsp “Enter secret (hidden): ” secret; echo
echo “Hello, $name!”
echo “———————————–“

5) case Statement

read -rp “Enter a number: ” n
case “$n” in
1) echo “One” ;;
2) echo “Two” ;;
[3-9]) echo “Between 3 and 9” ;;
*) echo “Other number” ;;
esac
echo “———————————–“

6) File Operations

file=”test.txt”
if [ -f “$file” ]; then
echo “$file exists”
else
echo “$file not found”
fi
[ -d “logs” ] || mkdir -p logs
cp -v “$file” “logs/$file.$(date +%F)” 2>/dev/null || true
echo “———————————–“

7) Scheduling with cron

echo “To schedule this script with cron, run: crontab -e”
echo “Example: Run daily at 10 AM -> 0 10 * * * /path/to/script.sh”
echo “———————————–“

8) Real-World Backup Script

src=”/home/user/data”
dest=”/backup/data_$(date +%F_%H-%M-%S).tar.gz”
mkdir -p “$(dirname “$dest”)”
tar -czf “$dest” “$src”
echo “Backup created at: $dest”

DevSecOps: Bob Thomas Team

Session 1: User and Group Management – Loganathan

1) Add a new user

sudo adduser username

2) Set password for a user

sudo passwd username

3) Delete a user (keep home directory)

sudo deluser username

4) Delete a user (remove home directory)

sudo deluser –remove-home username

5) Add a new group

sudo addgroup groupname

6) Add user to a group

sudo usermod -aG groupname username

7) Remove user from a group

sudo deluser username groupname

8) Change user’s primary group

sudo usermod -g newgroup username

9) List all groups

cat /etc/group

10) Show groups of a user

groups username

11) Show current user info

id username

12) Switch user

su – username

13) Change user shell

sudo usermod –shell /bin/bash username

14) Lock a user account

sudo passwd -l username

15) Unlock a user account

sudo passwd -u username

Special thanks to the VGLUG volunteers —
Vasanthavel, Dilip, Loganathan, Deepak, Vignesh, Kanimozhi, Sathish, Vijayalakshmi, Mathusoothan, and Kowsalya — for their dedicated support and commitment to making these training sessions successful.

Leave a comment