Category Archives: Linux
Boot into windows, resize (shrink) windows partition with disk management tool to create space for Apricity. Download Apricity and write to USB stick. Go into BIOS (Esc+F10 at boot). Disable trusted boot. Boot off USB Stick (F9 at boot). If … Continue reading
SSL Proxy :: Add-ons for Firefox. This allows you to configure an http proxy (eg squid using https_port) that you connect to via https. Obviously ongoing http requests from the proxy will still be in plain text.
Keep Your Browser Profiles In tmpfs (RAM) For Reduced Disk Writes And Increased Performance With Profile Sync Daemon ~ Web Upd8: Ubuntu / Linux blog
Profile Sync Daemon is a tool to move the web browser profile to RAM, using tmpfs, which has the advantage of reducing disk writes (useful for SSDs, some would say), increased speed and responsiveness. via Keep Your Browser Profiles In … Continue reading
gtar -x -f gpg.tar -v –owner=newuser
First, install doc2txt & antiword. Secondly, add application/vnd.openxmlformats-officedocument.wordprocessingml.document; cat %s|/usr/local/bin/docx2txt.pl; copiousoutput application/msword ; antiword %s ; copiousoutput to ~/.mailcap Now ‘v’ to view the word attachment should work
The purpose of beets is to get your music collection right once and for all. It catalogs your collection, automatically improving its metadata as it goes using the MusicBrainz database. It also downloads cover art for albums it imports. Then … Continue reading
has a keyboard shortcut to enable/disable the touchpad via SynapticsTouchpad – Community Ubuntu Documentation.
since is a unix utility similar to tail. Unlike tail, since only shows the lines appended since the last time. It is useful to monitor growing log files via since: Stateful Tail.
for i in *.zip; do unzip “$i”; done
Perspectives is a new approach to help clients securely identify Internet servers in order to avoid “man-in-the-middle” attacks. Perspectives is simple and cheap compared to existing approaches because it automatically builds a robust database of network identities using lightweight network … Continue reading