Rclone
Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection. It is used at the command line, in scripts, or via its API. Rclone really looks after your data. It preserves timestamps and verifies checksums at all times. Transfers over limited bandwidth; intermittent connections, or subject to quota can be restarted, from the last good file transferred. You can check the integrity of your files. Where possible, rclone employs server-side transfers to minimize local bandwidth use and transfers from one provider to another without using the local disk.
Learn more
Certbot
Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS. Use our instruction generator to find custom commands to get Certbot on your server's environment. Pick your server's software and system above. Certbot will fetch Let’s Encrypt certificates that will be standard Domain Validation certificates, so you can use them for any server that uses a domain name, like web servers. You can also use these certificates for other TLS applications such as IMAPS. A command line is a way of interacting with a computer by typing text-based commands to it and receiving text-based replies. Certbot is run from a command-line interface, usually on a Unix-like server. In order to use Certbot for most purposes, you’ll need to be able to install and run it on the command line of your web server, which is usually accessed over SSH.
Learn more
Encrypted Data Gateway Engine
Authora's Encrypted Data Gateway Engine "EDGE" is a command line designed for organizations that must securely exchange large volumes of information. EDGE protects business-critical data easily and with little impact on existing systems. EDGE can also be used to protect large volumes of information stored on servers and backup media from unauthorized access. From tape backup processes to batch FTP transfers and data distribution to partners, EDGE provides robust encryption capabilities for automated data processing applications. Adding EDGE's cryptographic functions to business applications and processes allows organizations to address risk mitigation and compliance standards. Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems.
Learn more
zdaemon
zdaemon is a Unix (Unix, Linux, Mac OS X) Python program that wraps commands to make them behave as proper daemons. zdaemon provides a script, zdaemon, that can be used to run other programs as POSIX (Unix) daemons. (Of course, it is only usable on POSIX-complient systems.) Using zdaemon requires specifying a number of options, which can be given in a configuration file, or as command-line options. It also accepts commands teling it what to do. Start a process as a daemon. Stop a running daemon process. Stop and then restart a program. Find out if the program is running. Send a signal to the daemon process. Reopen the transcript log. Commands can be given on a command line, or can be given using an interactive interpreter. We can specify a program name and command-line options in the program command. Note, however, that the command-line parsing is pretty primitive.
Learn more