Hack and / - Lightning Hacks—the Command Next Door
The problem with powerful server hardware is that it always takes a little time to reboot. Often when I have to reboot a server, I want to know the moment it comes back up, because I want to log back in and finish some work. Usually when I reboot a machine, I start a ping process, so I can watch to see when it is available. The problem is that servers seem to take just long enough to come back up that I end up getting distracted in another window on my desktop and don't see the ping replies. My solution to this is to make ping audible:
$ ping -a 10.0.1.7
When you pass the -a command to ping, it generates an audible bell for every ping reply. I get to hear a few system beeps as the server goes down, and then I hear only silence. If I do become distracted and the server comes back, I immediately start hearing this annoying system beep in my ear and know the server is ready.
Kyle Rankin is a Systems Architect in the San Francisco Bay Area and the author of a number of books, including The Official Ubuntu Server Book, Knoppix Hacks and Ubuntu Hacks. He is currently the president of the North Bay Linux Users' Group.
Kyle Rankin is a director of engineering operations in the San Francisco Bay Area, the author of a number of books including DevOps Troubleshooting and The Official Ubuntu Server Book, and is a columnist for Linux Journal.
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
|Concerning Containers' Connections: on Docker Networking||Aug 26, 2015|
|My Network Go-Bag||Aug 24, 2015|
|Doing Astronomy with Python||Aug 19, 2015|
- Using tshark to Watch and Inspect Network Traffic
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- A Project to Guarantee Better Security for Open-Source Projects
- Where's That Pesky Hidden Word?
- Firefox Security Exploit Targets Linux Users and Web Developers
- My Network Go-Bag
- Doing Astronomy with Python
- Build a “Virtual SuperComputer” with Process Virtualization
- diff -u: What's New in Kernel Development