Check These Out
Stuck behind a restrictive firewall at work, but really jonesing to putty home to your linux box for some colossal cave? Goodness knows I was...but the firewall at work blocked all outbound connections except for ports 80 and 443. (Those were wide open for outbound connections.) So now I putty over port 443 and have my linux box redirect it to port 22 (the SSH port) before it routes it internally. So, my specific command would be:
$iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-ports 22
Note that I use -A to append this command to the end of the chain. You could replace that with -I to insert it at the beginning (or at a specific rulenum).
My linux box is running slackware, with a kernel from circa 2001. Hopefully the mechanics of iptables haven't changed since then. The command is untested under any other distros or less outdated kernels.
Of course, the command should be easy enough to adapt to whatever service on your linux box you're trying to reach by changing the numbers (and possibly changing tcp to udp, or whatever). Between putty and psftp, however, I'm good to go for hours of time-killing.
#4345 also works under windows
List all open files of all processes.
.
$ find /proc/*/fd
Look through the /proc file descriptors
.
$ -xtype f
list only symlinks to file
.
$ -printf "%l\n"
print the symlink target
.
$ grep -P '^/(?!dev|proc|sys)'
ignore files from /dev /proc or /sys
.
$ sort | uniq -c | sort -n
count the results
.
Many processes will create and immediately delete temporary files.
These can the filtered out by adding:
$ ... | grep -v " (deleted)$" | ...
handles file names with spaces and colons, fixes sort (numeric!), uses mplayer, same output format as other alternatives
- convert unixtime to human-readable with awk
- useful to read logfiles with unix-timestamps, f.e. squid-log:
sudo tail -f /var/log/squid3/access.log | awk '{ print strftime("%c ", $1) $0; }