This shows you the differences between two versions of the page.
sw:linux [d-m-Y H:i] |
sw:linux [d-m-Y H:i] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Linux ====== | ||
+ | ===== Systems ===== | ||
+ | |||
+ | ==== Debian on USB ==== | ||
+ | |||
+ | A [[BootDebianUSBCryptoTutorial|tutorial]] on how to install an bootable encrypted [[http://www.debian.org|debian]] system on a USB key. | ||
+ | |||
+ | ===== Utilities ===== | ||
+ | |||
+ | ==== Trickle ==== | ||
+ | |||
+ | Userspace bandwidth shaper, both standalone and co-operative. | ||
+ | |||
+ | <ifauth astfgl> | ||
+ | ==== PDFdecrypt ==== | ||
+ | |||
+ | {{sw:pdfdecrypt.txt}} A short perl script which does RC4 description and clears the protection bits. | ||
+ | There's several more rights-management tools and utilities [[http://www.cs.cmu.edu/~dst/Adobe/Gallery/|here]], too. | ||
+ | </ifauth> | ||
+ | |||
+ | ==== tcc ==== | ||
+ | |||
+ | Tiny C Compiler [[http://fabrice.bellard.free.fr/tcc/|homepage]]. | ||
+ | |||
+ | ==== Tesseract OCR ==== | ||
+ | |||
+ | Tesseract is picky about it's TIFF input file, and I've found that it's best to use //pnmtotiff// to generate them. | ||
+ | |||
+ | |||
+ | ===== Tips ===== | ||
+ | |||
+ | ==== Local joe Config ==== | ||
+ | |||
+ | //~/.joerc// | ||
+ | |||
+ | :include /etc/joe/joerc | ||
+ | :main | ||
+ | markb .k1 | ||
+ | markk .k2 | ||
+ | blkcpy .k3 | ||
+ | blkmove .k4 | ||
+ | blkdel .k5 | ||
+ | nmark .k6 | ||
+ | dellin ^D | ||
+ | undo ^Z | ||
+ | ffirst ^F | ||
+ | fnext ^N | ||
+ | exsave ^X | ||
+ | save ^W | ||
+ | |||
+ | ==== SSH Passwordless Login ==== | ||
+ | |||
+ | Run ssh-keygen to create the private and publc keys. | ||
+ | |||
+ | bash> ssh-keygen | ||
+ | |||
+ | Now append the contents of **//.ssh/identity.pub//** to **//.ssh/authorized_keys//** on the remote host. | ||
+ | |||
+ | ==== Large Xterm for X ==== | ||
+ | |||
+ | xterm -aw -leftbar -ls -rw -sb -sl 1500 -bg black -fg white -fn -misc-fixed-medium-r-normal--20-200-75-75-c-100-iso8859-1 | ||
+ | |||
+ | ==== X11 VNC over SSH ==== | ||
+ | |||
+ | This script requires x11vnc on the remote host, vncviewer on the client, and a ssh path between the two. | ||
+ | |||
+ | #!/bin/bash | ||
+ | | ||
+ | HOST=$1 | ||
+ | | ||
+ | if [ "x$2" == "x" ] ; then | ||
+ | USER="" | ||
+ | else | ||
+ | USER="$2@" | ||
+ | fi | ||
+ | | ||
+ | PORT=`ssh ${HOST} "x11vnc -display :0 -bg -nopw -q" | grep PORT` | ||
+ | PORT=`echo "${PORT}" | sed -e 's/PORT=//'` | ||
+ | PORT=`expr ${PORT} - 5900` | ||
+ | | ||
+ | vncviewer ${HOST}:${PORT} | ||
+ | |||
+ | ==== Self Signed Certificate ==== | ||
+ | |||
+ | The first step is to create your RSA Private Key. | ||
+ | openssl genrsa -des3 -out server.key 1024 | ||
+ | |||
+ | Once the private key is generated a Certificate Signing Request can be generated. | ||
+ | openssl req -new -key server.key -out server.csr | ||
+ | |||
+ | Remove Passphrase from Key | ||
+ | cp server.key server.key.org | ||
+ | openssl rsa -in server.key.org -out server.key | ||
+ | |||
+ | Generate a Self-Signed Certificate. | ||
+ | openssl x509 -req -days 36500 -in server.csr -signkey server.key -out server.crt | ||
+ | |||
+ | Install the Private Key and Certificate. | ||
+ | cp server.crt /usr/local/apache/conf/ssl.crt | ||
+ | cp server.key /usr/local/apache/conf/ssl.key | ||
+ | |||
+ | Configure SSL-Enabled Virtual Hosts. | ||
+ | SSLEngine on | ||
+ | SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt | ||
+ | SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key |