UpFront

The UpFront Section

UpFront

Tech Tip

If you use ssh-agent and have scripts that use commands, such as ssh or scp, that need your ssh key, you may have had the experience of running your script only to discover that you never ran ssh-add to add your key to ssh-agent. So, you type the passphrase once to run the script, and then you have to run ssh-add afterward and type it again to add it to ssh-agent.

To avoid this, add a check to the top of your script to see whether your key is loaded. If not, load it, and avoid having to run ssh-add afterward:

if ! ssh-add -L | grep --silent '/\.ssh/id_.sa'; then
 ssh-add
fi

The -L option of ssh-add shows what keys are added, its output is piped to grep to check to see whether your key is loaded. If it's not, ssh-add is invoked to add your key.

Tech Tip

If you want to extract images from a PDF file, you can use the pdfimages program from the poppler package. To extract the images from an entire file, run the command:

pdfimages input.pdf image-root

If you want to extract images from a range of pages, you can use the -f and -l options to specify the first and last pages in the range. To extract the images from pages two to four, use the command:

pdfimages -f 2 -l 4 input.pdf image-root

Images are written to files named image-root-nnn.xxx, where nnn is an image number and xxx is the image type (for example, jpg).

Tech Tip

If you have scripts that need to be run as root, you can check for this at the start of the script with:

if [[ $UID -ne 0 ]]; then
  echo "Must be run as root"
  exit 1
fi

If you use sudo, you even could restart the script with sudo if it was not run as root:

if [[ $UID -ne 0 ]]; then
  sudo -p "Restarting with sudo.  Password: " sh $0 $*
  stat=$?
  exit $stat
fi

The sudo command runs the script as sh $0 $*. The sh is included in case the script does not have the execute bit set.

______________________

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix