Cherrytree is a hierarchical note taking application, featuring rich text and syntax highlighting, storing data in a single xml or sqlite file.
- rich text (foreground color, background color, bold, italic, underline, strikethrough, small, h1, h2, h3, subscript, superscript, monospace)
- syntax highlighting supporting several programming languages
- images handling: insertion in the text, edit (resize/rotate), save as png file
- embedded files handling: insertion in the text, save to disk
- multi-level lists handling (bulleted, numbered, to-do and switch between them, multiline with shift+enter)
- simple tables handling (cells with plain text), cut/copy/paste row, import/export as csv file
- codeboxes handling: boxes of plain text (optionally with syntax highlighting) into rich text, import/export as text file
- alignment of text, images, tables and codeboxes (left/center/right/fill)
hyperlinks associated to text and images (links to webpages, links to nodes/nodes + anchors, links to files, links to folders)
- spell check (using pygtkspellcheck and pyenchant)
- intra application copy/paste: supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
- cross application copy/paste (tested with libreoffice and gmail): supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
- copying a list of files from the file manager and pasting in cherrytree will create a list of links to files, images are recognized and inserted in the text
- print & save as pdf file of a selection / node / node and subnodes / the whole tree
- export to html of a selection / node / node and subnodes / the whole tree
- export to plain text of a selection / node / node and subnodes / the whole tree
- toc generation for a node / node and subnodes / the whole tree, based on headers h1, h2 and h3
- find a node, find in selected node, find in selected node and subnodes, find in all nodes
- replace in nodes names, replace in selected node, replace in selected node and subnodes, replace in all nodes
- iteration of the latest find, iteration of the latest replace, iteration of the latest applied text formatting
- import from html file, import from folder of html files
- import from plain text file, import from folder of plain text files
- import from basket, cherrytree, epim html, gnote, keepnote, keynote, knowit, mempad, notecase, rednotebook, tomboy, treepad lite, tuxcards, zim
- export to cherrytree file of a selection / node / node and subnodes / the whole tree
- password protection (using http://www.7-zip.org/) – NOTE: while a cherrytree password protected document is opened, an unprotected copy is extracted to a temporary folder of the filesystem; this copy is removed when you close cherrytree
- tree nodes drag and drop
Download and details:
HTTP Prompt is an interactive command-line HTTP client featuring autocomplete and syntax highlighting, built on HTTPie and prompt_toolkit.
With Docker, developers can build any app in any language using any toolchain. “Dockerized” apps are completely portable and can run anywhere – colleagues’ OS X and Windows laptops, QA servers running Ubuntu in the cloud, and production data center VMs running Red Hat.
Developers can get going quickly by starting with one of the 13,000+ apps available on Docker Hub. Docker manages and tracks changes and dependencies, making it easier for sysadmins to understand how the apps that developers build work. And with Docker Hub, developers can automate their build pipeline and share artifacts with collaborators through public or private repositories.
Docker helps developers build and ship higher-quality applications, faster.” — What is Docker
Useful Docker Commands:
If you are behind a firewall (today often known marketed as IPS, NGFW or UTM) which claims to protect you from malware you might want to verify these claims. HTTP Evader provides you with a way to automatically test how your firewall deals with situations where the malware hides in rare or invalid responses from the web server. Lots of highly praised firewalls fail to detect malware in this cases, which means they fail to protect you properly. Please note that this is not about bypassing web application firewalls (WAF) which protect a web server but about bypassing firewalls which should protect the client (browser). It is also not about bypassing URL filters.
The following tests try to transfer the EICAR test virus to you using differently shaped responses of the web server. This official test virus should be detected by any antivirus solution but does not do any harm.
To find out if you are vulnerable simply point your browser to the HTTP Evader test site. Before you report any problems to your firewall vendor please read the section about false positives and verify that the detected evasion is really possible.
In 2014 Google indexed 200 Terabytes of data (1 T of data is equal to 1024 GB, to give you some perspective). And, it’s estimated that Google’s 200 TB is just .004% of the entire internet. Basically the internet is a big place with unlimited information.
So in an effort to decrease searching and increase developing, Morpheus Data published this massive list of free resources for DevOps engineers and System Admins, or really anyone wanting to build something useful out of the internet.
All these resources are free, or offer some kind of free/trial tier. You can use any/all of these tools personally, as a company, or even suggest improvements (in the comments). It’s up to you.
If you find this list useful, please share it with your DevOps/SysAdmin friends on your favorite social network, or visit Morpheus Data to learn how you can 4x your application deployment.
ls-httpd utility for WebServer Logs is very handy.
ls-httpd type count|time [log_file]
- ls-httpd url 1000
will find top URLs in the last 1000 access log entries
- ls-httpd ip 1000
will find top IPs in the last 1000 access log entries
- ls-httpd agent 1000
will find top user agents in the last 1000 access log entries
- ls-httpd url 17:
will find top URLs from 17:00:00 to 17:59:59
- ls-httpd url 17:2
will find top URLs from 17:20:00 to 17:29:59
- ls-httpd url 17
will find top URLs in the last 17 access log entries 🙂
Reference and Download:
Great little weather cli utility for your bash prompts!
Get the weather from cli
Watchman watches files and directories for changes and triggers actions when specific changes are noted.
- Watchman can recursively watch one or more directory trees (we call them roots).
- Watchman does not follow symlinks. It knows they exist, but they show up the same as any other file in its reporting.
- Watchman waits for a root to settle down before it will start to trigger notifications or command execution.
- Watchman is conservative, preferring to err on the side of caution; it considers files to be freshly changed when you start to watch them or when it is unsure.
- You can query a root for file changes since you last checked, or the current state of the tree
- You can subscribe to file changes that occur in a root
Run the tar command to find oldest file in a tar archive:
tar -tvf archivefile.tar.gz | sort -k 4 -r | head