This shows you the differences between two versions of the page.
| — |
sw:linux [d-m-Y H:i] (current) |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Linux ====== | ||
| + | ===== Systems ===== | ||
| + | |||
| + | ==== Debian on USB ==== | ||
| + | |||
| + | A [[BootDebianUSBCryptoTutorial|tutorial]] on how to install an bootable encrypted [[http://www.debian.org|debian]] system on a USB key. | ||
| + | |||
| + | ===== Utilities ===== | ||
| + | |||
| + | ==== Trickle ==== | ||
| + | |||
| + | Userspace bandwidth shaper, both standalone and co-operative. | ||
| + | |||
| + | <ifauth astfgl> | ||
| + | ==== PDFdecrypt ==== | ||
| + | |||
| + | {{sw:pdfdecrypt.txt}} A short perl script which does RC4 description and clears the protection bits. | ||
| + | There's several more rights-management tools and utilities [[http://www.cs.cmu.edu/~dst/Adobe/Gallery/|here]], too. | ||
| + | </ifauth> | ||
| + | |||
| + | ==== tcc ==== | ||
| + | |||
| + | Tiny C Compiler [[http://fabrice.bellard.free.fr/tcc/|homepage]]. | ||
| + | |||
| + | ==== Tesseract OCR ==== | ||
| + | |||
| + | Tesseract is picky about it's TIFF input file, and I've found that it's best to use //pnmtotiff// to generate them. | ||
| + | |||
| + | |||
| + | ===== Tips ===== | ||
| + | |||
| + | ==== Local joe Config ==== | ||
| + | |||
| + | //~/.joerc// | ||
| + | |||
| + | :include /etc/joe/joerc | ||
| + | :main | ||
| + | markb .k1 | ||
| + | markk .k2 | ||
| + | blkcpy .k3 | ||
| + | blkmove .k4 | ||
| + | blkdel .k5 | ||
| + | nmark .k6 | ||
| + | dellin ^D | ||
| + | undo ^Z | ||
| + | ffirst ^F | ||
| + | fnext ^N | ||
| + | exsave ^X | ||
| + | save ^W | ||
| + | |||
| + | ==== SSH Passwordless Login ==== | ||
| + | |||
| + | Run ssh-keygen to create the private and publc keys. | ||
| + | |||
| + | bash> ssh-keygen | ||
| + | |||
| + | Now append the contents of **//.ssh/identity.pub//** to **//.ssh/authorized_keys//** on the remote host. | ||
| + | |||
| + | ==== Large Xterm for X ==== | ||
| + | |||
| + | xterm -aw -leftbar -ls -rw -sb -sl 1500 -bg black -fg white -fn -misc-fixed-medium-r-normal--20-200-75-75-c-100-iso8859-1 | ||
| + | |||
| + | ==== X11 VNC over SSH ==== | ||
| + | |||
| + | This script requires x11vnc on the remote host, vncviewer on the client, and a ssh path between the two. | ||
| + | |||
| + | #!/bin/bash | ||
| + | | ||
| + | HOST=$1 | ||
| + | | ||
| + | if [ "x$2" == "x" ] ; then | ||
| + | USER="" | ||
| + | else | ||
| + | USER="$2@" | ||
| + | fi | ||
| + | | ||
| + | PORT=`ssh ${HOST} "x11vnc -display :0 -bg -nopw -q" | grep PORT` | ||
| + | PORT=`echo "${PORT}" | sed -e 's/PORT=//'` | ||
| + | PORT=`expr ${PORT} - 5900` | ||
| + | | ||
| + | vncviewer ${HOST}:${PORT} | ||
| + | |||
| + | ==== Self Signed Certificate ==== | ||
| + | |||
| + | The first step is to create your RSA Private Key. | ||
| + | openssl genrsa -des3 -out server.key 1024 | ||
| + | |||
| + | Once the private key is generated a Certificate Signing Request can be generated. | ||
| + | openssl req -new -key server.key -out server.csr | ||
| + | |||
| + | Remove Passphrase from Key | ||
| + | cp server.key server.key.org | ||
| + | openssl rsa -in server.key.org -out server.key | ||
| + | |||
| + | Generate a Self-Signed Certificate. | ||
| + | openssl x509 -req -days 36500 -in server.csr -signkey server.key -out server.crt | ||
| + | |||
| + | Install the Private Key and Certificate. | ||
| + | cp server.crt /usr/local/apache/conf/ssl.crt | ||
| + | cp server.key /usr/local/apache/conf/ssl.key | ||
| + | |||
| + | Configure SSL-Enabled Virtual Hosts. | ||
| + | SSLEngine on | ||
| + | SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt | ||
| + | SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key | ||