A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.
Grep, sort, uniq, awk, sed are all worthy tools, but part of the job is deciding when one tool, or tool-set is no longer enough to accomplish your mission. When should you turn over the job to a true sorting engine, a relational database?
I dislike gallery programs as well, why I have no idea. I think I wanted to write my own sometime in the past. I may still do that in the future… something with a nice web-form to upload images, user privileges and comment capability… sometime, when I have time and don’t have other obligations.
A few quick ways to use normal unix command-line tools to parse logs for classification of problems or identification of activity. The aim of this would be to help folks find out what is causing a problem on a particular interface, not long term analysis which should be covered somewhere else. Part of it is covered in this package available on SourceForge.Net.