That is right. I found a hardware pedal for improved text editing in Vim. This is a mind blowing hack for vim user.
VIM Clutch is a hardware pedal for improved text editing speed for users of the magnificent VIM text editor (1, 2). When the pedal is pressed down, the pedal types “i” causing VIM to go into Insert Mode. When released, it types and you are back in Normal Mode.
If you are the only sysadmin or developer, you can skip password when you run sudo command. By default, sudo asks for the password. Here is how you can run sudo without having to enter your password.
I’m a new Unix system user. How do I use sudo command without a password on a Linux or Unix-like systems? I log in as tom@my-cloud-server-ip and disabled root login for ssh. After login, I need to run some commands as root user. I am the only sysadmin using my server. How do I run or execute sudo command without a password for a user named Tom under Debian/Ubuntu/CentOS Linux cloud server?
AWK is a programming language designed for text processing and typically used for a data extraction and reporting tool. It is a standard feature of Linux, FreeBSD, OpenBSD, MacOS and most Unix-like systems.
The Awk Programming Language
This is one of my favorite books. It is a superb book if you are looking to learn about AWK. AWK is very fast when it comes to data processing. I highly recommend this classic book to all Unix fans.
OpenSSH is critical for both sysadmin and programmers. It is an implementation of the SSH protocol suite, from OpenBSD project. It provides an encrypted session to your server.
OpenSSH multiple vulnerabilities
OpenSSH has multiple vulnerabilities as of 11th January 2017 running on FreeBSD operating system. From the advisory:
The ssh-agent(1) agent supports loading a PKCS#11 module from outside a trusted whitelist. An attacker can request loading of a PKCS#11 module across forwarded agent-socket. [CVE-2016-10009]
When privilege separation is disabled, forwarded Unix domain sockets would be created by sshd(8) with the privileges of ‘root’ instead of the authenticated user. [CVE-2016-10010]
I updated my vulnerable FreeBSD box via a binary patch: # freebsd-update fetch
# freebsd-update install
# service sshd restart
# ps aux | grep -i ssh-agent
If found any ssh-agent process, kill all running ssh-agent: # killall ssh-agent
You can reuse OpenSSH connections to the same server when you want to open subsequent connections to the same server. For example, if I ran ssh firstname.lastname@example.org, the ssh client will establish a new SSH connection. It usually takes only a few seconds. However, if I run ssh email@example.com command again, connecting to a server42.cyberciti.biz multiple times result into the overhead.