If you use ssh-agent and have scripts that use commands, such as ssh or scp, that need your ssh key, you may have had the experience of running your script only to discover that you never ran ssh-add to add your key to ssh-agent. So, you type the passphrase once to run the script, and then you have to run ssh-add afterward and type it again to add it to ssh-agent.
To avoid this, add a check to the top of your script to see whether your key is loaded. If not, load it, and avoid having to run ssh-add afterward:
if ! ssh-add -L | grep --silent '/\.ssh/id_.sa'; then ssh-add fi
The -L option of ssh-add shows what keys are added, its output is piped to grep to check to see whether your key is loaded. If it's not, ssh-add is invoked to add your key.
If you want to extract images from a PDF file, you can use the pdfimages program from the poppler package. To extract the images from an entire file, run the command:
pdfimages input.pdf image-root
If you want to extract images from a range of pages, you can use the -f and -l options to specify the first and last pages in the range. To extract the images from pages two to four, use the command:
pdfimages -f 2 -l 4 input.pdf image-root
Images are written to files named image-root-nnn.xxx, where nnn is an image number and xxx is the image type (for example, jpg).
If you have scripts that need to be run as root, you can check for this at the start of the script with:
if [[ $UID -ne 0 ]]; then echo "Must be run as root" exit 1 fi
If you use sudo, you even could restart the script with sudo if it was not run as root:
if [[ $UID -ne 0 ]]; then sudo -p "Restarting with sudo. Password: " sh $0 $* stat=$? exit $stat fi
The sudo command runs the script as sh $0 $*. The sh is included in case the script does not have the execute bit set.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide