Just find out the daemon with $ netstat -atulpe. Then type in his name and he gets the SIGTERM.
ip address show | grep eth0 | sed '1d' | awk '{print $2}'
does the same, but shows network-prefix.
deborphan(1) must be installed.
To decrypt the files replace "ccenrypt" with "ccdecrypt. ccrypt(1) must be installed. It uses the AES (Rijndael) block cipher. To make it handier create an alias.
The colors are defined as variables. e.g. RED="\[\033[01;31m\]" BLUE="\[\033[01;34m\]" Show Sample Output
Reads in the ~/.Xdefaults lexicographically sorted with, instead of replacing, the current contents of the specified properties.
Highlights the search pattern in red.
Also works with files:
cat file
Hello world
base64 file
SGVsbG8gd29ybGQK
To decrypt use the -d option:
echo SGVsbG8gd29ybGQK | base64 -d
Hello world
Show Sample Output
But who knows to delete the rest of the lines? I want only "string".
Replace < pw-length > with the desired password-length. The password-length is not always correct, but wayne...
commandlinefu.com is the place to record those command-line gems that you return to again and again. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.
Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.
» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10
Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):
Subscribe to the feed for: