6 private links
shopt -s autocd
nocache <I/O-heavy-command>
lsmod | perl -e 'print "digraph \"lsmod\" {";<>;while(<>){@=split/\s+/; print "\"$[0]\" -> \"$\"\n" for split/,/,$[3]}print "}"' | dot -Tpng | display -
strace -e write=1,2 -p $PID 2>&1 | sed -un "/^ |/p" | sed -ue "s/^.{9}(.{50}).+/\1/g" -e 's/ //g' | xxd -r -p
strings /dev/mem|less
command !(regexp to remove from matching)
Note: This is a feature of bash, and it only works if you've enabled 'extglob' (Extended Pattern Matching):
shopt -s extglob
ifconfig | convert label:@- ip.png
ctrl-x e
Next time you are using your shell, try typing ctrl-x e (that is holding control key press x and then e). The shell will take what you've written on the command line thus far and paste it into the editor specified by $EDITOR. Then you can edit at leisure using all the powerful macros and commands of vi, emacs, nano, or whatever.
disown -a && exit
On January 31st 2014 a post appeared on oss-seclist [1] describing a bug in the Linux kernel implementation of the x32 recvmmsg syscall that could potentially lead to privilege escalation. It didn't take long until the first exploits appeared, in this blog post we'll walk-through the vulnerability and Samuel's Proof-of-concept exploit in detail.
You can detach a process from terminal by adding &! at the end of a command !
Thank you brieuc !
Some example , how to use pseudo terminals
This is the web site for the Third Edition of Linux Device Drivers, by Jonathan Corbet, Alessandro Rubini, and Greg Kroah-Hartman.
echo "NICK pingbot" > pingbot.input # what nick
echo "USER pingbot +iw pingbot :$0" >> pingbot.input
echo "JOIN #tdobson.net" >> pingbot.input # what channel
tail -f pingbot.input | telnet irc.freenode.net 6667