This is an old revision of the document!
Because SSH is incredible.
# Using connect-proxy as a socks proxy (tunneling ssh over http proxy to an ssh server on port 1.2.3.4:443) Host 1.2.3.4 ProxyCommand connect-proxy -H proxy:3128 %h %p Port 443 User shaun # -W can be used for raw port-forwarding on OpenSSH 5.4 and higher Host internal.server HostName internal.server.com User shaun ProxyCommand ssh shaun@intermediary.server.com -W %h:%p # Here's the old way, with netcat Host internal.server HostName internal.server.com User shaun ProxyCommand ssh shaun@intermediary.server.com nc %h %p # New to OpenSSH 7.3 and higher is the ProxyJump commmand, which does the same, but with multiple possible intermediaries Host internal.server HostName internal.server.com ProxyJump shaun@intermediary1.server:22,shaun@intermediary2.server:22 User shaun
ssh-copy-id -i .ssh/id_rsa.pub user@server.com
dmidecode --type 17
Sample output:
# dmidecode 2.12 SMBIOS 2.7 present. Handle 0x003B, DMI type 17, 34 bytes Memory Device Array Handle: 0x002C Error Information Handle: Not Provided Total Width: 72 bits Data Width: 64 bits Size: 32 GB Form Factor: DIMM Set: None Locator: D0 Bank Locator: /SYS/MB/P0 Type: DDR3 Type Detail: Synchronous Speed: 1066 MHz Manufacturer: Samsung Serial Number: 366112E5 Asset Tag: Part Number: M393B4G70BM0-YH9 Rank: 1 Configured Clock Speed: 1066 MHz
openssl x509 -in certificate.crt -out certificate.pem -outform PEM