Posts Tagged command line
📅 August 28, 2017
The Desktop Management Interface (DMI) is a vendor-neutral, standardized framework for managing and gathering information about a computer system.
Which memory slots are populated?
What is the BIOS revision number?
What ports are located on the motherboard?
What is the processor version?
Using a program called dmidecode, these questions and many, many other technical details can be retrieved and displayed at the command line without having to open your computer case and reading tiny print on labels or in poorly-translated multi-lingual manuals.
As long as your hardware supports the DMI protocol, which is almost all modern hardware these days, then you can view the information using dmidecode.
Do you need to know the configured clock speed of your RAM? dmidecode will report the speed without needing to reboot into BIOS. Sure, fancy GUI programs, such as hardinfo, report identical information, but sometimes you simply want to impress your inner geek with command-line goodness.
📅 August 24, 2017
Have you opened a terminal, such as RetroPie for the Raspberry Pi, and admired the RetroPie ASCII art logo adjacent to a brief system information listing?
Wouldn’t it be fun to do the same in a desktop Linux installation?
With a program called neofetch, you can view the ASCII art logo for your current distribution complete with a synopsis of system information.
📅 April 11, 2017
Are you curious to find out what colors your terminal supports?
The program colortest-python answers this question by displaying colors in a variety of ways.
📅 April 8, 2017
Bash arrays can be tricky, so here are a few hints to aid understanding.
📅 December 20, 2016
Are you pondering important life questions, such as, “What is the temperature and current frequency of my Core i7 CPU?”
“I have no idea what C0/C1/C3/C6/C7 states are, but I sure want to know how much time my CPU spends in them.”
“What is the stepping, model, and family info of my i7 CPU? Are we related in some way?”
Well, ponder no longer because the command line program i7z (a reporting tool for Intel i7/i5/i3 processors) will answer those questions for you in real time. And if that is not enough, information can be logged to a log file for serious analysis later.
📅 December 16, 2016
Need a quick and easy way to convert between binary, ASCII, decimal, and hexadecimal values?
📅 December 14, 2016
Steganography is the practice (or art) of hiding secret messages in plain view.
Take an image file of a flower, for example. Opening the file shows a flower. Whoopie. However, there might be a hidden message encoded inside the bits and bytes of the image data that is not visible unless certain software is used to decode it.
The same can apply to text files. You could write an innocent readme.txt file that looks like any other text file of instructions when opened normally. With steganography, you could encode a secret message within readme.txt that includes game cheat codes, secret contact information, a cookie recipe, ASCII art, or whatever else you wish to convey to your accomplice who receives the file.
stegsnow is a fun command line program that encodes secret messages in ASCII text files. Use stegsnow to encode a text file with a hidden message, and then use stegsnow again to extract the message from the file. The file’s text contents are not altered, so the file reads the same as it did before encoding. Anyone unaware would open the text file and see the innocent text contents in a standard text editor, but “those who know” would run the file with stegsnow to see a completely different message.