Quick and dirty RSS

curl --silent "FEED ADDRESS" |sed -e 's/<\/[^>]*>/\n/g' -e 's/<[^>]*>//g
runs an rss feed through sed replacing the closing tags with newlines and the opening tags with white space making it readable.
Sample Output
% curl --silent "http://feeds.bbci.co.uk/news/rss.xml" |sed -e 's/<\/[^>]*>/\n/g' -e 's/<[^>]*>//g'

      UK retail banks 'need protecting'

      UK banks' retail operations should be "ring-fenced" from their investment banking arms, the Independent Commission on Banking recommends.

      http://www.bbc.co.uk/go/rss/int/news/-/news/business-13032403

      http://www.bbc.co.uk/news/business-13032403

      Mon, 11 Apr 2011 13:20:19 GMT






      Royal couple on pre-wedding visit

      Prince William and Kate Middleton visit Lancashire in their final public engagement before their wedding.

      http://www.bbc.co.uk/go/rss/int/news/-/news/uk-england-lancashire-13033244

      http://www.bbc.co.uk/news/uk-england-lancashire-13033244

      Mon, 11 Apr 2011 12:52:24 GMT

2
By: ljmhk
2011-04-11 14:08:50

These Might Interest You

  • This is a quick and dirty way to generate a (non-floating-point) CPU-bound task to benchmark. Adjust "20" to higher or lower values, as needed. As a benchmark this is probably a little less bogus than bogomips, and it will run anywhere 'bc' does. Show Sample Output


    2
    echo '2^2^20' | time bc > /dev/null
    mkc · 2009-02-06 02:31:55 1

  • 0
    apt-cache -n dumpavail | grep 'Package:' | awk '{print $2 }'
    txmoose · 2013-08-30 15:58:41 0
  • Blacklisted is a compiled list of all known dirty hosts (botnets, spammers, bruteforcers, etc.) which is updated on an hourly basis. This command will get the list and create the rules for you, if you want them automatically blocked, append |sh to the end of the command line. It's a more practical solution to block all and allow in specifics however, there are many who don't or can't do this which is where this script will come in handy. For those using ipfw, a quick fix would be {print "add deny ip from "$1" to any}. Posted in the sample output are the top two entries. Be advised the blacklisted file itself filters out RFC1918 addresses (10.x.x.x, 172.16-31.x.x, 192.168.x.x) however, it is advisable you check/parse the list before you implement the rules Show Sample Output


    32
    wget -qO - http://infiltrated.net/blacklisted|awk '!/#|[a-z]/&&/./{print "iptables -A INPUT -s "$1" -j DROP"}'
    sil · 2009-02-18 16:08:23 7
  • This is the quick and dirty alternative ;) The whole file will be emptied, this is equal to /dev/null > ~/.ssh/known_hosts


    -4
    > ~/.ssh/known_hosts
    cde1985 · 2010-08-04 06:54:18 1

What do you think?

Any thoughts on this command? Does it work on your machine? Can you do the same thing with only 14 characters?

You must be signed in to comment.

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.

Share Your Commands



Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for: