-
Using the SSH Config File
If you are regularly connecting to multiple remote systems over SSH on a daily basis, you’ll find that remembering all of the remote IP addresses, different usernames, non standard ports and various command line options is difficult, if not impossible. Article Source here.
-
Tiger – The Unix Security Audit and Intrusion Detection Tool
Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs…\ \ [[ This is a content summary only. Visit my website for full links, other content,...
-
dmesg follow/wait for new kernel messages
$ dmesg -w follow/wait for new kernel messages similar to `tail -f` available since util-linux 2.22. View this command to comment, vote or add to favourites View all commands by wodny Diff your entire server config at ScriptRock.com Article Source here.