Archivio tag: tutorial

Bookmarks for 3 dic 2014 through 7 dic 2014

These are my links for 3 dic 2014 through 7 dic 2014:

  • View net surveillance online cameras – Welcome to Insecam project. The world biggest directory of online surveillance cameras.
  • getsentry/sentry – Sentry is a realtime event logging and aggregation platform. It specializes in monitoring errors and extracting all the information needed to do a proper post-mortem without any of the hassle of the standard user feedback loop.
  • Vim Regular Expressions 101

Bookmarks for 3 dic 2014 from 13:03 to 13:41

These are my links for 3 dic 2014 from 13:03 to 13:41:

  • git-flow cheatsheet – git-flow are a set of git extensions to provide high-level repository operations for Vincent Driessen's branching model. more This cheatsheet shows the basic usage and effect of git-flow operations
  • Voluntary – […] Our goal is to create open source software that promotes freedom of expression, privacy and the decentralization of power with an eye towards usability […] (Just for OSX at the moment)
  • A Visual Git Reference – This page gives brief, visual reference for the most common commands in git. Once you know a bit about how git works, this site may solidify your understanding.
  • SSH_VPN – Community Help Wiki – This page discusses using SSH to set up SSH-based point to point connections, which can then be used to create routes that create virtual private networks. Note that using SSH in this fashion is not the "best" way to create a permanent, stable VPN. Notably, SSH uses TCP, and TCP over TCP can provide abysmal performance under pathological conditions.
  • VPN over SSH – This how-to is intended to cover the details of how to establish a VPN (Virtual Private Network) over a SSH connection. Starting with open-ssh 4.3, you can now use a ssh connection to set up a VPN. This is technically termed "layer-3 IP-in-SSH tunnelling" and is not using ssh to port forward (ssh -L ) or create a dynamic "application level" forwarding (SOCKS) (ssh -D ). Rather a VPN is established using a SSH connection to create a virtual interface, tun0. Advantages : IMO, this technique is easier to set up then openvpn, especially if you are using a single client. Works with most Linux distributions without the need to install any additional software on the clients. The server only needs openssh-server. This protocol uses udp to transmit tunneled tcp connections resulting in a more stable connection compared with port forwarding (using ssh with the -L or -D options). Disadvantages : As of yet I do not know of a windows client which will use this protocol. If you are needing to set up a VPN with numerous clients I would use openvpn. Although there are several "how-to's" on the web, most of them assume you know something about networking and routing. This page attempts to explain some of the "missing details".

Bookmarks for 30 ott 2014 from 17:30 to 21:39

These are my links for 30 ott 2014 from 17:30 to 21:39:

  • Profanity, a console based XMPP client – Home – Profanity is a console based XMPP client written in C using ncurses and libstrophe, inspired by Irssi Latest release: 0.4.4 Downloads: profanity-0.4.4.tar.gz profanity-0.4.4.zipProfanity will run on Linux, Mac OS X and Windows (using Cygwin).
  • Vim is your new IDE /* Devcharm */ – What happens when you combine Vim with the terminal multiplexer Tmux? You have the perfect coding environment. Here are some recommendations I've collected in the past years. Now I can happily fire up my working environment running Vim, some local servers and tests, in no time.
  • Vim and Tmux on your Mac – Setting up your computer for Vim and Tmux often comes with a few issues. Here's how to manage plugins for Vim and use Tmux to boost your productivity, as well as settle a few common issues.

Bookmarks for 17 ott 2014 through 20 ott 2014

These are my links for 17 ott 2014 through 20 ott 2014:

  • microHOWTO: Configure Apache to use Kerberos authentication – To configure Apache to use Kerberos authentication Kerberos is an authentication protocol that supports the concept of Single Sign-On (SSO). Having authenticated once at the start of a session, users can access network services throughout a Kerberos realm without authenticating again. For this to work it is necessary to use network protocols that are Kerberos-aware. In the case of HTTP, support for Kerberos is usually provided using the SPNEGO authentication mechanism (Simple and Protected GSS-API Negotiation). This is also known as ‘integrated authentication’ or ‘negotiate authentication’. Apache does not itself support SPNEGO, but support can be added by means of the mod_auth_kerb authentication module.
  • How to create a bootable USB stick on OS X | Ubuntu – […] Note: this procedure requires that you create an .img file from the .iso file you download. It will also change the filesystem that is on the USB stick to make it bootable, so backup all data before continuing […]
  • thomastk/kunjumon – Kunjumon is a framework that can be used to create plugins for Nagios monitoring system, without writing any new code. The plugins thus created are robust, and, can monitor complex scenarios by querying data from multiple databases. While efforts to build such plugins would require considerable scripting work, using Kunjumon framework, a a plugin that pulls input data from databases can be implemented by defining it in XML format, and, there is no need to write any code to support it. The Kunjumon framework has been tested on all the Linux platforms, and against MySQL, Postgres, Oracle and Microsoft SQL Server. However, in general, it would work with any ODBC interface configured on the Nagios host to access a data repository.