When I tried to access securely (with ssh) my work's server (remote) from my iBook (local1) running 10.1.2, I wasn't allowed in, whereas from the faculty's computer (local2), this was no problem at all. I worked through several ssh and sshd config files, but couldn't find any relevant differences, until I noticed that local1 had OpenSSH installed (OS X standard), while local2 and remote used the commercial SSH from SSH Communications Security.
I downloaded the source code at commerce.ssh.com, which is free for non-commercial use. It compiled right out of the box, and was installed in /usr/local, so my original OpenSSH is still intact in /usr. Now I can access remote just as easily from local1 as from local2.
I am somewhat confused, though, since I had supposed OpenSSH and SSH to be completely compatible. If for some reason you would like to run /usr/local/sbin/sshd instead of /usr/sbin/sshd, you could easily accomplish this by changing the relevant line in /System/Library/StartupItems/SSH/SSH.
I got GAIM (the GTK+ based AIM compliant Real Time Chat Client) to compile in OS X by making the following modifications to the normal installation process:
use the '--disable-perl' flag for the configure script. This is because the libraries included by the perl support unfortunately conflict with the libdl.dylib. Hopefully someone will find a way around this.
After configure has finished point your favorite editor at plugins/Makefile and change line 315 from:
@cp .libs/libtmp$@.so* $@
@cp .libs/libtmp$@.dylib* $@
This will deal with OS X's use of the dylib suffix instead of good old .so when using libtool to build plugins.
Unfortunately, the build generates lots of errors and doesn't seem to be able to log in to AIM using OSCAR (the full AIM protocol) only TOC (the somewhat neglected open AIM protocol). But it beats the floating away window in the new AIM client and has plugin support.
Now, put them together. TextExtras allows you to run the text in an entry box through a pipe and replace the text with the pipe's output. We're going to set up a pipe for Vim. The tricky part is that Vim, being an editor, can't just read text from stdin, edit it, and write it back to stdout; it uses stdout for the editing interface. So we have to help it out a bit, and this is where vimwrapper.pl comes in.
Read the rest of the article for the details on this trick...
First download Emacs on Aqua from SourceForge. I'd recommend getting the source and building (easy -> download, untar and cd into the directory and do a ./configure, make, make install. YMMV, try the prebuilt one first, and drop into the Applications folder (I had to build from source on a 10.1.2 TiBook).
Then, this is the cool part. In your shell profile, set an alias to:
Now type emacs myfilename on a command line and it will start it up like an Xemacs session :-) woohoo. Good news is that JDE also works fine with Emacs on Aqua.
- Winton (an old fashioned Unix for coding and Mac for Everything else kindofguy!)
[Editor's note: I tried building from source, and although the application compiled fine, it quit unexpectedly on launch, so I was unable to test the alias portion of the tip. I've been using Carbon Emacs which seems to work fine.]
Haven't seen this mentioned in many places but it deserves note. There is a nice streaming net jukebox on sourceforge called Netjuke. I installed it last week and am very impressed with its capabilities. Great for accessing a centralized MP3 collection on a LAN and even works over the internet from a remote location.
The setup involves and requires PHP and an SQL database - but I had no problems doing the setup with no knowledge of PHP or SQL. The developer is also very active and responsive.
When working in the terminal, I use the history a lot to repeat common commands, or to slightly edit previous commands. However, the default key bindings are not very efficient. You can scroll up and down the history using the arrow keys, but what if you want the last 'renice' command? You then have to search the history.
What I've done is made it so that the arrow keys will search the history for commands that match what you have typed so far. Read the rest of the article if you'd like to see what changes I've made...
I was somewhat bored (Sunday morning) and was reading my news sources, including Stepwise. For months, the install ssh 3.0.2p1 has been on top of the page. And suddenly I wondered which ssh and openssl version I had installed. For checking the version, I typed
% openssl -V
but this didn't give me the version (use 'openssl version' instead), but did give the list of commands as an error message. Suddenly I noticed: speed, so then I typed:
% openssl speed
Openssl performed a full benchmark on the CPU with encrypting and decrypting ... It's not science, but an indication. I think several options influence the benchmark, but on my G4/450 the outcome was:
Read the rest of the article for the results on a G4/350 and a G4/733.
[Editor's note: This speed test is relatively involved; it took a few minutes to run on my G4/733 and spit out much more output than is shown here. If you have a few minutes of free time, 'openssl speed' is an interesting way to fill it!]
This article is not intended to teach you how to hack into PHPNuke but how to secure it properly. Again this is NOT a license for you to poke around sites where you don't belong but I digress...
If you are like me and want to have a nice-looking, easy to manage dynamic website then PHPNuke is arguably the most popular out there. It installs, configures and runs very well on Mac OS X. However there a few security issues that you need to be aware of and this is all about how to secure your PHPNuke powered site.
Read the rest of this article for some ideas on how to secure PHPNuke against hackers...
I love using my own pictures in the built in screensaver, but I got sick of seeing the same order of the pictures. So, I wrote the following perl script to attach a pseudorandom number before the file names in the selected folder. The script assumes it is being run from inside a folder with all your images (no subfolders) that are named *.jpg -- it checks to see if they have a two-digit number, underscore prefix, and adds them if necessary. Otherwise it changes the number to a new value. Run as often as you like or have cron do it.