There are lots of tips, tricks, and ideas around for hacking your command-line productivity to make you more efficient. However, in this post, I&rsquo;m not going to show you something that&rsquo;s super in-depth, ultra-detailed, or talk about an app that you have to install, ctrl+x+e.
Do you want to check if a file is available on a remote server before attempting to download it - in a short and effective way? If so, and you&rsquo;re not sure how you&rsquo;ll learn how in this post.
If you&rsquo;ve ever attempted to bind a process on a port on Linux, BSD, or macOS, only to find that something else is using the port, yet you don&rsquo;t know what that process is, here&rsquo;s a quick way to find the process and remove it.
The tech sector, if you know what you&rsquo;re doing, is easier than most fields to get started in. However, you do have to know what you&rsquo;re doing. In this post, I&rsquo;m going to step through a series of ways to get started, in case you&rsquo;re not sure.
One of the most common attack vectors against servers is bruteforce login attempts. This is where attackers attempt to access your server, by trying endless combinations of usernames and passwords. So how do you defend yourself against this kind of attack?
Do you write Linux shell scripts? Do your scripts work on more than one distribution? If so what does your development environment look like and what tools do you use to let you develop, debug, and maintain your scripts both quickly and relatively hassle-free?