Userspace bandwidth shaper, both standalone and co-operative.
Tiny C Compiler homepage.
Tesseract is picky about it's TIFF input file, and I've found that it's best to use pnmtotiff to generate them.
~/.joerc
:include /etc/joe/joerc :main markb .k1 markk .k2 blkcpy .k3 blkmove .k4 blkdel .k5 nmark .k6 dellin ^D undo ^Z ffirst ^F fnext ^N exsave ^X save ^W
Run ssh-keygen to create the private and publc keys.
bash> ssh-keygen
Now append the contents of .ssh/identity.pub to .ssh/authorized_keys on the remote host.
xterm -aw -leftbar -ls -rw -sb -sl 1500 -bg black -fg white -fn -misc-fixed-medium-r-normal--20-200-75-75-c-100-iso8859-1
This script requires x11vnc on the remote host, vncviewer on the client, and a ssh path between the two.
#!/bin/bash HOST=$1 if [ "x$2" == "x" ] ; then USER="" else USER="$2@" fi PORT=`ssh ${HOST} "x11vnc -display :0 -bg -nopw -q" | grep PORT` PORT=`echo "${PORT}" | sed -e 's/PORT=//'` PORT=`expr ${PORT} - 5900` vncviewer ${HOST}:${PORT}
The first step is to create your RSA Private Key.
openssl genrsa -des3 -out server.key 1024
Once the private key is generated a Certificate Signing Request can be generated.
openssl req -new -key server.key -out server.csr
Remove Passphrase from Key
cp server.key server.key.org openssl rsa -in server.key.org -out server.key
Generate a Self-Signed Certificate.
openssl x509 -req -days 36500 -in server.csr -signkey server.key -out server.crt
Install the Private Key and Certificate.
cp server.crt /usr/local/apache/conf/ssl.crt cp server.key /usr/local/apache/conf/ssl.key
Configure SSL-Enabled Virtual Hosts.
SSLEngine on SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key