michael@slashetc:~$

  • Using the SSH Config File

    If you are regularly connecting to multiple remote systems over SSH on a daily basis, you’ll find that remembering all of the remote IP addresses, different usernames, non standard ports and various command line options is difficult, if not impossible. Article Source here.

  • Tiger – The Unix Security Audit and Intrusion Detection Tool

    Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs…\ \ [[ This is a content summary only. Visit my website for full links, other content,...

  • dmesg follow/wait for new kernel messages

    $ dmesg -w follow/wait for new kernel messages similar to `tail -f` available since util-linux 2.22. View this command to comment, vote or add to favourites View all commands by wodny Diff your entire server config at ScriptRock.com Article Source here.