Hide

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again.

Delete that bloated snippets file you've been using and share your personal repository with the world. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.


If you have a new feature suggestion or find a bug, please get in touch via http://commandlinefu.uservoice.com/

Get involved!

You can sign-in using OpenID credentials, or register a traditional username and password.

First-time OpenID users will be automatically assigned a username which can be changed after signing in.

Hide

Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for:

Hide

News

2011-03-12 - Confoo 2011 presentation
Slides are available from the commandlinefu presentation at Confoo 2011: http://presentations.codeinthehole.com/confoo2011/
2011-01-04 - Moderation now required for new commands
To try and put and end to the spamming, new commands require moderation before they will appear on the site.
2010-12-27 - Apologies for not banning the trolls sooner
Have been away from the interwebs over Christmas. Will be more vigilant henceforth.
2010-09-24 - OAuth and pagination problems fixed
Apologies for the delay in getting Twitter's OAuth supported. Annoying pagination gremlin also fixed.
Hide

Tags

Hide

Functions

Quickly generate an MD5 hash for a text string using OpenSSL

Terminal - Quickly generate an MD5 hash for a text string using OpenSSL
echo -n 'text to be encrypted' | openssl md5
2009-03-18 00:11:46
User: Zenexer
Functions: echo
17
Quickly generate an MD5 hash for a text string using OpenSSL

Thanks to OpenSSL, you can quickly and easily generate MD5 hashes for your passwords.

Alternative (thanks to linuxrawkstar and atoponce):

echo -n 'text to be encrypted' | md5sum -

Note that the above method does not utlise OpenSSL.

Alternatives

There are 3 alternatives - vote for the best!

Terminal - Alternatives
md5sum<<<'text to be encrypted'
2012-02-14 19:57:52
User: waldvogel
Functions: md5sum
1

Here Strings / A variant of here documents, the format is:

(from bash manpage)

echo -n 'the_password' | md5sum -

Know a better way?

If you can do better, submit your command here.

What others think

echo -n 'text to be encrypted' | md5sum

8df639b301a1e10c36cc2f03bbdf8863 -

md5sum is all you need for md5 hashes

Comment by linuxrawkstar 283 weeks and 3 days ago

@linuxrawkstar you should include the '-' at the end for POSIX compliance, even though it works without it.

echo -n 'text to be encrypted' | md5sum -
Comment by atoponce 283 weeks and 3 days ago

True, though I prefer to use OpenSSL, as I know it will/can be present on just about all systems. Even on Windows, I always install OpenSSL. I love consistency. Granted, I could just rename some random Windows utility to md5sum.exe, but that's not fun. I'll add it as an alternative, though.

Comment by Zenexer 283 weeks and 3 days ago

On my Ubuntu system, md5sum

adds a carriage return at the end of the string, the same as using echo without -n :

echo 'text to be encrypted' | openssl md5

So, the original solution with openssl would appear to be the only reliable one.

Comment by cbrace 118 weeks and 3 days ago

Your point of view

You must be signed in to comment.

Related sites and podcasts