Every time that you login into your local *nix machine or a remote hosting server through SSH/ FTP client to upload a file, you’re leaving behind a trail of evidence showing your online behaviour: where and when you log in, how often and how long your online sessions are, in short: your modus operandi. This tool analyzes your usage pattern via your SSH/FTP log files.
Copy, paste, done!
The data sent contains absolutely no personally identifiable information, so you won’t disclose anything remotely sensitive. Copy and paste the following command into your terminal (assuming Bash)
last -Ran 2000 $USER | cut -d ' ' -f2-
Now you’ve seen what the data looks like, it’s crunch time! add the last part and beam everything up to this site: (triple-click below to select the whole line)
last -Ran 2000 $USER | cut -d ' ' -f2- | curl --data-binary @- http://www.smallmeans.com/datavis/sessions/incoming
For performance reasons, 2,000 sessions are introduced as limit. The R flag suppresses the hostname (IP adress) of the machine used to access the server. Once you’ve run the above command, you’ll get back a link similar to this:
See what the buzz is all about.