Posts by Michael
I think the typical way to do this uses wc ("word count") with the -l ("lines") option. $ wc -l /path/to/file 47 /path/to/file $ wc -l </path/to/file 47 $ cat /path/to/file | wc -l ...
There are probably myriad services for echoing your IP back over HTTP. Here are a couple: curl https://api.ipify.org curl https://ip.me curl https://icanhazip.com
If you just want the minimal set of top-level packages to install on your new system, brew leaves is less verbose than CodeFarmer's brew deps --installed. You get a nice concise list of the packag...
Over some period of time, I have used a couple tools for local TLS scans and diagnostics. One of them may include pointers for whatever situation you have. Tool Description From Current? ...
Wayland, ideally If you are on Wayland, the blessed way is to use the configuration for your desktop environment (DE) to map mouse keys and other input devices, except for a couple well-known opti...
Grove's answer is likewise good, but OpenSSH introduced ProxyJump (-J) in 2016 with v7.3, making it even easier to chain SSH hosts together: ssh -J user@interstitial.example me@destination.example...
Can I restrict myself from certain actions when I SSH in from outside a certain IP range? For instance no sudo? Maybe with ~/.ssh/authorized_keys having a from="!1.2.3.4/26" option with some kind ...
authorized_keys You can make restrictions, but it's clunky and not well-standardized. A command stanza on an authorized key works like the ForceCommand on SSHD Config. It runs the one specified co...