From FreeBSDwiki
(Difference between revisions)
Jump to: navigation, search
(minor updates)
m (Reverted edits by DavidYoung (talk) to last revision by Jimbo)
Line 28: Line 28:
[[category: System Commands]]
[[category: System Commands]]
== The Way of the Peaceful Parent ==
The Way is only learned by walking it. Here are the steps I recommend:* Greet your child each morning with a smile, a hug, a loving Good Morning! This is how we would all like to be greeted each day.
[[ The Way of the Peaceful Parent]]
[[ - good, positive news, inspirational stories, articles]]
== Paths Are Made By Walking ==
2012s Baccalaureate speaker at the University of Pennsylvania was an unconventional choice for an Ivy League school. To address their newly-minted graduates, aspiring to dazzling careers, they picked a man who has never in his adult life, applied for a job. A man who hasnt worked for pay in nearly a decade, and whose self-stated mission is simply "to bring smiles to the world and stillness to my heart".
[[ Paths Are Made By Walking]]
[[ - good, positive news, inspirational stories, articles]]
== Not a Fairytale: Americas First Public Food Forest ==
Hungry? Just head over to the park. Seattles new food forest aims to be an edible wilderness. Seattles vision of an urban food oasis is going forward. A seven-acre plot of land in the citys Beacon Hill neighborhood will be planted with hundreds of different kinds of edibles
[[ Not a Fairytale: Americas First Public Food Forest]]
[[ - good, positive news, inspirational stories, articles]]
== 10 Keys to Happier Living ==
Action for Happiness has developed the 10 Keys to Happier Living based on a review of the latest scientific research relating to happiness. Everyones path to happiness is different, but the research suggests these Ten Keys consistently tend to have a positive impact on peoples overall happiness and well-being.
[[ 10 Keys to Happier Living]]
[[ - good, positive news, inspirational stories, articles]]
== Would Gandhi Use Social Media? ==
If Gandhi were alive today, would he use social media? He was never anti-technology, or even anti-changing with the times. Quite the opposite, actually. If Internet technologies and social networks were around, he would certainly have embraced them -- but with a conscious mindfulness of their strengths and weaknesses.
[[ Would Gandhi Use Social Media?]]
[[ - good, positive news, inspirational stories, articles]]

Latest revision as of 16:20, 25 August 2012

Found in /bin/cat, when cat is given a file as an argument, it will print out the file contents to your console, or it can be redirected to another file or process.

samizdata# cat /etc/fstab
# Device                Mountpoint      FStype  Options         Dump    Pass#
/dev/da0b               none            swap    sw              0       0
/dev/da1b               none            swap    sw              0       0
/dev/da0a               /               ufs     rw              1       1
/dev/da0d               /tmp            ufs     rw              2       2
/dev/da1e               /usr            ufs     rw              2       2
/dev/da1d               /var            ufs     rw              2       2
/dev/cd0                /cdrom          cd9660  ro,noauto       0       0

Related commands are zcat (aka gzcat) and bzcat, for use with gzipped and bzipped archives, respectively. Very useful for easily reading rotated, compressed logfiles - for example, let's say I'm tracking down some jackass that keeps trying to find a way into my server, and I want to look at one of the older sections of my auth log:

ph34r# bzcat auth.log.0.bz2 | grep Illegal
Oct 19 20:47:47 ph34r sshd[35556]: Illegal user adam from
Oct 19 20:47:49 ph34r sshd[35558]: Illegal user alan from
Oct 19 20:47:52 ph34r sshd[35560]: Illegal user frank from
Oct 19 20:47:54 ph34r sshd[35562]: Illegal user george from
Oct 19 20:47:56 ph34r sshd[35564]: Illegal user henry from
Oct 19 20:47:59 ph34r sshd[35566]: Illegal user john from
Oct 19 20:48:14 ph34r sshd[35578]: Illegal user test from

Without having to muck around with multiple steps or temporary files or any of that business, I told my server to load up the bzip archive of the last section of my auth log, decompress it, and send the results to grep so that I'd only see the entries related to "Illegal" users. And voila - I can see that the idiot at the APNIC address is trying a dictionary-style username attack on my server.

[edit] Related link

Personal tools