Use the same framework for all hosts, and run per-host scripts where needed.
Shorten your ssh commands, but in a kludgy way.
This list is just a reference which hopefully saves some googling. Let's make it clear that we're talking about symmetric encryption here, that is, a password (or better, a passphrase) is supplied when the file is encrypted, and the same password can be used to decrypt it. No public/private key stuff or other preparation should […]
Port mirroring with the most popular Linux bridge implementations.
TMTOWTDI, even for password hashing.