Hack and / - Mutt Tweaks for System Administrators
Once I had colorized all my e-mail, it was great—I would browse through output and more critical e-mail would jump to my attention. As the number of messages started to grow though, I noticed I would spend a lot of time reading the less-important messages before I found the important ones. My solution was to use the limit feature in mutt. When you are in the index view in mutt (where mutt shows you only the From and the Subject lines), you can tell mutt to limit (the l key by default) the headers you currently can see based on a pattern.
For instance, if I wanted to see only all the headers that said Bob, I could type l and then Bob <Enter>. Then, to see all the headers again, I could type l and then all <Enter> to show all messages. You also can have mutt search within the body of messages, so I created a mutt macro that I bound to the F3 key, so that when I see the full list of headers and press F3, it limits the view only to new messages that contained error or fail in them. I could read those messages first and then change the limit back to all and tab through the rest. Here is the extra line in my .muttrc to create the macro:
macro index <F3> "l~N ~b \"([\^nN][\^oO].error|[Ff][Aa][Ii][Ll])\"<enter>"
I constantly am surprised with how far you can extend mutt. It is definitely one of those programs that gives your time back in gained productivity as you learn more about its configuration options. If you use your e-mail to remember things, or dig through a large stack of server e-mail every day (or even if you don't), mutt is an invaluable e-mail companion that always has new tricks.
Kyle Rankin is a Senior Systems Administrator in the San Francisco Bay Area and the author of a number of books, including Knoppix Hacks and Ubuntu Hacks for O'Reilly Media. He is currently the president of the North Bay Linux Users' Group.
Kyle Rankin is a VP of engineering operations at Final, Inc., the author of a number of books including DevOps Troubleshooting and The Official Ubuntu Server Book, and is a columnist for Linux Journal. Follow him @kylerankin.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide