You can create URL redirection service for your blog within five minutes using nothing but web server’s mod_redirect module. For example, when you type or share a url io9.in/t/5159 you will be automatically redirected to http://www.cyberciti.biz/tips/my-10-unix-command-line-mistakes.html. In this quick post I will explain how to create url shortener and integrate your wordpress based blog without installing any new scripts.
After reading this article, you should now be able to use the Korn shell in ways you may not have known before. Mastering the command line can simplify your work and help you better understand how to make the shell and command line work for you rather than you working harder for it.
Learn about common errors and how to overcome them, and discover exactly why these 10 UNIX command line habits are worth picking up.
How do you find out that somebody has accessed your system and changed your configuration or security settings? How do you verify file content? There is no simple answer to these questions. Personally, I use specialized tool such as tripwire and combination of perl / shell script, UNIX command line utilities.
Examine methods of storing and later checking the validity of your configuration files is one of the key task. This article provides some guideline. You will develop a script that you can use to generate information that checks the validity of a file or directory full of files. The recorded information includes the file path, a checksum of the file so that you can compare the file contents, and unique information about the file (inode, permissions, ownership information) so that you can identify differences should they occur:
The typical UNIX administrator has a key range of utilities, tricks, and systems he or she uses regularly to aid in the process of administration. There are key utilities, command-line chains, and scripts that are used to simplify different processes. Some of these tools come with the operating system, but a majority of the tricks come through years of experience and a desire to ease the system administrator’s life. The focus of this series is on getting the most from the available tools across a range of different UNIX environments, including methods of simplifying administration in a heterogeneous environment.
=> Systems Administration Toolkit: Testing system validity
This is a full-size PDF version ( poster ) from Oreilly.
Anatomy of a Linux System poster try to put most important things together. The result is indeed encyclopedic. Supporting the illustration are 19 written topics, with brief historical and educational descriptions of technologies such as Peer-to-Peer Communication, XML and HTML, Samba, Unix Command-Line Utilities, and even Java. Each topic has a list of key Web sites and useful books, including titles that don’t belong to O’Reilly–part of Tim’s insistence that the poster serve as a complete Linux resource. The poster also lists Linux magazines, conferences, major distributors, and, of course, major contributors.
=> Download Link [oreillynet.com] (163K)