Little command-line utils to find deferred/bounced/lost emails to specific providers
Items about networking
Someone asked how to set this up quickly and easily… the idea being:
1) you have a host somewhere on the interwebs that’s accessible via SSH and runs a squid/proxy for you
2) you have a macintosh
3) you don’t normally do unix-y things
4) you’d like a command-line quick and easy setup to allow you to proxy your traffic (web/chat) through your ssh host and sqiud
a quicky upgrade tutorial for the AP1220 series aironet wireless access-point.
Work had is go over all our work from the last year looking for possible patentable things, this is the result (one result I suppose).
Some simple statistics gathering for systems monitoring, graphicalized for your pleasure! Everyone likes graphics and they do help to make trends visible quickly. This short explanation should give some starting points and references on using Tobi Oetiker’s fine rrdtool to store and later display the data in question.
A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.
Grep, sort, uniq, awk, sed are all worthy tools, but part of the job is deciding when one tool, or tool-set is no longer enough to accomplish your mission. When should you turn over the job to a true sorting engine, a relational database?
A few quick ways to use normal unix command-line tools to parse logs for classification of problems or identification of activity. The aim of this would be to help folks find out what is causing a problem on a particular interface, not long term analysis which should be covered somewhere else. Part of it is covered in this package available on SourceForge.Net.