Many of the cool things in Linux Journal require the use of the command line. For us Linux users, that's generally not a big deal, because we have a terminal window readily available. Some of the time, however, it's helpful to have a shell account on an Internet host somewhere.
If your Web-hosting service provides shell access, you might be able to use it for rudimentary command-line procedures. (In fact, Dreamhost in particular allows SSH tunneling through its servers for clients.) If you want to use particular programs like screen or irssi though, it will require something a little more robust.
Some free shell services are available (like http://www.geekshells.org), but they often are very restrictive, and it can be challenging to get an account with them. Thankfully, if you don't mind spending a few dollars a month, shell accounts are fairly common and relatively inexpensive. The Eggdrop folks have compiled a great list here: http://www.egghelp.org/shells.htm.
Figure 1. Sometimes, you just need a shell.
Of course, if you want to have a full-blown server on the Internet, it's hard to beat a colocated Raspberry Pi server like the one Kyle Rankin talked about last month. However you manage it, it's hard to be a geek without access to a terminal!
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- Using tshark to Watch and Inspect Network Traffic
- September 2015 Issue of Linux Journal: HOW-TOs
- The True Internet of Things
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- Firefox Security Exploit Targets Linux Users and Web Developers
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag