Tool tests on the fast track
Six Linux tools reviewed: FISH 2.0.0, BAD 0.0.2, BLINK, FPING 3.5, LNAV 0.5.0, TOMB 1.4
Alternatives: Bash, Dash, Z shell
Fish is a command-line interpreter with interesting additional features. At first glance, the shell looks much like Bash, but this changes when you enter the first command. Thanks to syntax highlighting, the program emphasizes incomplete commands in red, correct commands in blue, and parameters in turquoise.
Fish also tries to guess commands and parameters and makes suggestions while you are typing by drawing on the history of the current session. The developers have also implemented tab completion, pipes, and redirection.
For a surprise, try typing
help. The shell does not display a list of available commands but opens the online help in your default browser. This browser also launches when you type
fish_config. You can then click to turn features on and off and view the history. A look at the project page – and especially the tutorial – is recommended, especially for users who are interested in scripting with Fish.
Fish is an interesting alternative shell for Linux and OS X users. Besides the standard functions, the tool impresses with syntax highlighting and autocompletion suggestions as you type.
Monitoring backup directories
Alternatives: Pirysncd, Pirysncd
The backup daemon monitors a user-defined directory, creates MD5 sums for newly added data, and then copies the data to another folder. The the tool does not perform the actual data backup. You need another program to back up the target folder.
Bad takes changes in subdirectories into consideration, but only up to the first level. Bad learns from the kernel's inotify feature about changes that have happened on the filesystem. In a personal configuration file
~/.bad/config a user can define
backup_dir to specify which folder the daemon monitors and where it copies new data.
Additional settings are defined in call parameters. For example,
-d switches the program to dry-run mode for test purposes;
-l changes the log level,
-n disables hashing, and
-N enables recursive backups. The daemon does not log its actions in the default directory
/var/log; rather, it uses the users' home directories in the
Bad is still a young project, and so far it only has a few advanced features. However, the tool has potential and it's worth keeping an eye on.
Lean Blog Engine
Anyone looking for a handy blog engine should take a look at Blink. After unpacking the archive, copy the
cgi-bin directory to the documents folder on your web server and make sure the CGI files it contains are executable.
Blink manages several blogs in directories below
cgi-bin/blink. If you want one of them to record comments, you need to create an additional
.comments directory in the blog folder. If you want use CSS, you must modify the HTML code in the script; the
README.blink file explains how to do this. Blink sorts blog entries by their modification dates.
The post link lets users open a form in which to compose texts. Similarly, a click on Comment pops up an input field for comments. The text area is limited to 500 words in both cases; the engine understands HTML tags and entities. As a protection against spambots, users need to type the current month before posting. A simple search function is also included.
The slim blog engine is especially suitable for smaller networks or home computers. It lacks sophisticated access controls, so admins will want to consider carefully whether they want to operate Blink in the open on the web.
Buy this article as PDF
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives