# HG changeset patch # User Oleksandr Gavenko # Date 1263119126 -7200 # Node ID be58630c4b62873af43354e1a75b2d6f8db25b71 # Parent 594c6470789d33aab7c5b08a1a34486c4266681c# Parent 1ed03ae08ad7177104c8d7901e5020cd9497f750 Automated merge with file:///srv/hg/admin-doc diff -r 1ed03ae08ad7 -r be58630c4b62 about-uri.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/about-uri.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,49 @@ +-*- outline -*- + +* about. + +See + + http://en.wikipedia.org/wiki/About:_URI_scheme + +* Firefox. + + about: + same page as "Help -> About" + about:blank + blank page, useful for setting as your home page + about:buildconfig + show your Mozilla build options + about:cache + displays cache statistics and disk cache directory location + about:config + GUI for modifying user preferences + about:crashes + crash reports + about:credits + list of contributors to the Mozilla projects + about:licence + show product licences + about:licence + show product licences + about:logo + application logo + about:memory + memory usage (since Firefox 3.6) + about:mozilla + easter eggs - "Book of Mozilla" + about:neterror + about:plugins + lists all your plugins as well as other useful information + about:rights + your rights + about:robots + easter egg (since 2008-03-08 trunk builds) + about:sessionrestore + interface for viewing about last session + about:support + same page as "Help -> Troubleshooting information" (since Firefox 3.6) + +See + + http://kb.mozillazine.org/About_protocol_links diff -r 1ed03ae08ad7 -r be58630c4b62 crack.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/crack.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,39 @@ +-*- mode: outline; coding: utf-8 -*- + +* How create crack archive? + +Use zip/rar. With rar you can use password protection. + +Along with content provide these files: + + * .nfo - crack team logo, info about content, enjoy greeting. + * .url - internet shortcut file. + * FILE_ID.DIZ - plain text file containing brief content description of the + archive in which it is included. + +** .nfo + +Old .nfo use code page 437. New .nfo file use ISO-8859-1/ISO-8859-15 or +Unicode UTF-8 characters. + + http://en.wikipedia.org/wiki/.nfo + +** .url + +Internet shortcut file. Content like this: + + [InternetShortcut] + URL=http://example.com/ + + http://www.cyanwerks.com/file-format-url.html + An Unofficial Guide to the URL File Format, 3ed + + +** FILE_ID.DIZ + +FILE_ID stands for "file identification". DIZ stands for Description In +Zipfile. + + http://www.textfiles.com/computers/fileid.txt + v1.9 spec + http://en.wikipedia.org/wiki/FILE_ID.DIZ diff -r 1ed03ae08ad7 -r be58630c4b62 emacs.rst --- a/emacs.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/emacs.rst Sun Jan 10 12:25:26 2010 +0200 @@ -8,11 +8,11 @@ (setq variable value) (defvar variable value "documentation") -or +or (replace with :) - # Local variables: - # variable: value - # End: + # Local variables + # variable value + # End * Debugging. @@ -87,3 +87,25 @@ With transient-mark-mode and delete-selection-mode enabled: select region, type M-| sort -u RET to replace selection with sorted and uniquified lines. +* Finding emacs packages. + +See + + http://anc.ed.ac.uk/~stephen/emacs/ell.html + http://www.emacswiki.org/emacs/WikifiedEmacsLispList + +* Compiling emacs. + +** Windows. + +Get MSYS for POSIX shell and utilities . Get MinGW for GCC. Get Gnuwin32 for +jpeg, ungif, tiff, xpm, png, zlib libraries. + +Read emacs/nt/INSTALL. + + $ cmd + $ cd emacs\nt + $ configure.bat --with-gcc --cflags -Ic:/opt/gnuwin32/include + $ make bootstrap + $ make info + $ make install diff -r 1ed03ae08ad7 -r be58630c4b62 english-punctuation.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/english-punctuation.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,275 @@ +-*- mode: outline; coding: utf-8 -*- + + English Punctuation Guide. + +* Punctuation symbol. + + ! exclamation mark + "" single quotation marks + '' double quotation marks + ' apostrophe + , comma + - hyphen + . full stop (period USA) + : colon + ; semi colon + ? question mark + ... ellipsis + +* General rules. + + * Put end-of-sentence punctuation inside quotation marks. + * Put commas and other sentence punctuation outside of parentheses. + * Put a comma (plus a space) before and, but, or, and nor when they join two + sentences. + * The semicolon (;) is not used widely in English and probably should be + avoided by non-native writers. + * Names of newspapers, books, movies, ships, magazines, journals, and poems + are usually italicized or underlined. + +** Capital letter. + + 1 A capital is used for the first letter of a new sentence, of quoted speech + or proper nouns. + 2 The first letter of a sentence does not need to be capitalized if it is + included in parenthesis within another sentence. + 3 A capital letter is always used for the first person singular subjective + personal pronoun I. + 4 A capital is used for the first letter of key words in headings and titles. + If such titles are hyphenated then both components are given capitalized + first letters. + 5 A capital is used for the first letter of key words in historical events. + 6 A capital is used for the first letter of religions and many other + religious words. + 7 A capital is used for the first letter of names of months and days of the + week, but not of seasons. + 8 Holidays should also be capitalized. + +Example: + + [3] My boss and I agreed that I should make up for the time I had lost. + [4] The Minister of Agriculture and Fisheries + [4] The Centers for Disease Control + [4] Vice-President Dick Cheney + [5] The Battle of Waterloo + [5] The Great Fire of London + [6] Devout Christians do daily Bible study. + [7] After a long, hot summer she married him on a sultry Saturday in September. + [8] January 1 is New Year's Day. + +** Spaces. + + * Put one space after punctuation. + * Put no spaces before punctuation, but always put a space between words. + * Put no spaces after periods inside abbreviations. + * Put no space before or after an apostrophe. + * Put no space on the "inside" of quotation marks (often called "quotes"). + * Put no space on the "inside" of parentheses. + +Some old rules: + + * Put two spaces after colons and between sentences. + + +* Exclamation mark, '!'. + + * Exclamation marks act as a full stop. + * An exclamation mark is most often used to show shock, surprise, horror or + pleasure. + * No space is needed before an exclamation mark, at least one space after one + (two spaces for purists). + +Example: + + Oh! Wow! Brilliant! + It was shocking! + +* Apostrophe, "'". + + * Apostrophes next to the letter ('s) indicate possession or belonging. + * They are also used to show missing letters in shortened words, especially in + informal writing. + * No space is needed before or after the apostrophe. + +Example: + + This is Lynne's web site. + It's a nice day today, isn't it? I've got an idea. Let's go out. + +* Comma, ','. + + 1 Separate items in long lists. + 2 Commas point out brief pauses in a complex sentence or a long prepositional + phrase. + 3 Comma is included before the conjunction 'and' which comes + before the final element of a list (for purists). + 4 Introduce a direct quote. + 5 Separate appositives (a noun, or noun phrase) or non-defining relative + clauses. + 6 Use a comma if your subject has two or more adjectives describing it. + * You do not put a space before a comma, but you do need a space after one. + ? We don't usually put a comma before the word 'and'. + +Example: + + [1] There were a lot of people in the room, teachers, students and parents. + [2] The teachers were sitting, the students were listening and the parents + were just worrying. + [2] Although he wanted to come, he wasn't able to attend the course. + [3] I like reading, listening to music, and visiting with my friends. + [4] The boy said, "My father is often away during the week on business trips." + [4] His doctor replied, "If you don't stop smoking, you run the risk of a + heart attack." + [5] Bill Gates, the richest man in the world, comes from Seattle. + [5] My only sister, who is a fantastic tennis player, is in great shape. + [6] The powerful, resonating sound caught our attention. + +* Colon, ':'. + + 1 Colons precede a list, an explanation or an example. + 2 The colon is used to separate two main clauses where the first is an + introduction to the second. + 3 To introduce a direct quote (a comma can also be used in this situation). + * You do not put a space before a colon, but you do need a space after one. + +Example: + + [1] There are two main shopping areas in Nottingham: Broadmarsh Centre and + Victoria Centre. + [2] The pilot had an awful realization: he had forgotten to turn off the gas + at breakfast time. + [3] He announced to his friends: "I'm getting married!" + +* Full stop (period), '.'. + + 1 Full stops (periods in the USA) go at the end of sentences that are + statements. + 2 They are also used to mark abbreviations. If such an abbreviation occurs at + the very end of a sentence, the final dot is not usually written twice. + * You do not put a space before a full stop, but you do need at least one + space after one (two spaces for purists). + +Example: + + [1] My name is Lynn. I am a teacher. + [2] An overhead projector is often referred to as an O.H.P. + +* Hyphen, '-'. + + * Hyphens are used to connect words or syllables, or to divide words into + parts. + * You don't use a space on either side of a hyphen. + +Example: + + There were ninety-nine red balloons. + +* Question mark, '?'. + + 1 Question marks go at the end of sentences that are questions. + 2 You need a question mark at the end of tag questions. + * For quotes within quotes, use single quotes. + * You do not put a space before a question mark, but you do need at least one + space after one (two spaces for purists). + +For example: + + [1] Is my name Lynn? Of course it is. + [2] It's a nice day, isn't it? + +* Semicolon, ';'. + + 1 Semicolons are used to separate two sentences that would otherwise be + joined with a word such as 'and', 'because', 'since', 'unless' or 'while'. + 2 To separate groups of words that are themselves separated by commas. + * You do not put a space before a semicolon, but you do need a space after one. + +Example: + + [1] I'm looking forward to our next lesson; I'm sure it will be a lot of fun. + [2] They plan to study German, for their travels; chemistry, for their work; + and literature, for their own enjoyment. + + +* Quotation mark (speech mark), '""', "''". + +Double quotes '""', single quotes "''". + + * Quotation marks (single or double) are used to show words that are directly + spoken (direct speech). + * Only the words actually being quoted are enclosed by speech marks. + * You need a space before the opening speech mark, but no space after it, and + a space after the closing one, but no space before it. + * Another general rule is to use a comma after the introduction to quoted + speech or writing. + * Sometimes when writing a spoken sentence it is split in two. The speech + marks must then be placed at the beginning and end of each part of the + sentence. Commas are used to separate the spoken part from the rest of the + sentence. + * If you need a question mark or exclamation mark the markers that punctuate + the quoted words are enclosed by the speech marks. + +Example: + + "Could everyone sit down please," said the teacher. + Jaime said, "I love you." + "I wonder," she said quietly, "whether people will ever truly understand each other." + "I don't understand," replied Nathan. "Do you understand?" asked Nathan. "I don't understand!" shouted Nathan. + Nathan replied, "I don't understand." Nathan asked, "Do you understand?" Nathan shouted, "I don't understand!" + He wrote in 1946 that, "The key word in digital computer is 'digital'." + +* Ellipsis, '...'. + + 1 Ellipsis used to show that something has been omitted, indicate missing + words in an incomplete quotation. + +Example: + + [1] Chomsky suggested that, "Language is a system that...can be described in + an algebraic notation." + +* Dash, '-', '--'. + + 1 The dash should be used when making a brief interruption within a + statement, a sudden change of thought, an additional comment, or a dramatic + qualification. + +* Parentheses '()'. + + 1 Use parentheses to clarify, to place an afterthought, or to add a personal + comment. Be sure to include the period after the closing parenthesis. + +Example: + + [1] Steve Case (AOL's former CEO) resigned from the Time-Warner board of + directors in 2005. + [1] You will need a flashlight for the camping trip (don't forget the + batteries!). + [1] Most grammarians believe that parentheses and commas are always + interchangeable (I disagree). + +* Brackets '[]'. + + 1 Use brackets to signify an editor's note in a regular piece of writing. You + can also use brackets to clarify or to revise a direct quote so that it + appeals to your own writing. + 2 The first brackets are rounded, and brackets inside brackets are squared. + +Example: + + [1] "[The blast] was absolutely devastating," said Susan Smith. + +* Slash '/'. + + 1 Use the slash to separate "and" and "or", when appropriate. + 2 The slash can replace the word "and" to join two nouns. + 3 The slash is used when quoting lyrics and poetry to denote a line break. Be + sure to add spaces between your slashes here. + +Example: + + [1] To register, you will need your driver's license and/or your birth + certificate." + [2] The student/part-time employee has very little free time. + [3] "Row, row, row your boat / gently down the stream / life is but a dream." + diff -r 1ed03ae08ad7 -r be58630c4b62 game-console.rst --- a/game-console.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/game-console.rst Sun Jan 10 12:25:26 2010 +0200 @@ -4,6 +4,8 @@ ** Emulator. +*** Mednafen. + $ sudo apt-get install mednafen See @@ -11,6 +13,19 @@ http://mednafen.sourceforge.net/ http://en.wikipedia.org/wiki/Mednafen +*** zsnes. + + $ sudo apt-get install zsnes + +*** MAME. + +See + + http://mamedev.org + home page + http://gmame.wordpress.com/feed + unofficial blog + ** ROM. http://rednintendo.blogspot.com diff -r 1ed03ae08ad7 -r be58630c4b62 game-rogue.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/game-rogue.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,23 @@ +-*- mode: outline; coding: utf-8 -*- + +* Nethack. + +NetHack is a single-player roguelike video game originally released in 1987. + + http://www.nethack.org/ + home page + http://en.wikipedia.org/wiki/NetHack + +* Angband. + +Angband is a free, single-player dungeon exploration game where you take the +role of an adventurer, exploring a deep dungeon, fighting monsters, and +acquiring the best weaponry you can, in preparation for a final battle with +Morgoth, the Lord of Darkness. + + http://www.thangorodrim.net/ + home page + http://angband.calamarain.net/ + game comic + + diff -r 1ed03ae08ad7 -r be58630c4b62 graph.rst --- a/graph.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/graph.rst Sun Jan 10 12:25:26 2010 +0200 @@ -1,5 +1,9 @@ -*- mode: outline; coding: utf-8 -*- +* General view. + + http://en.wikipedia.org/wiki/List_of_graphing_software + * RRDtool. RRDtool is the OpenSource industry standard, high performance data logging and @@ -19,3 +23,20 @@ http://www.graphviz.org/ home page + +* Gnuplot. + +Gnuplot is a portable command-line driven graphing utility for linux, OS/2, MS +Windows, OSX, VMS, and many other platforms. + +Gnuplot supports many types of plots in either 2D and 3D. It can draw using +lines, points, boxes, contours, vector fields, surfaces, and various +associated text. It also supports various specialized plot types. + +Gnuplot supports many different types of output: interactive screen terminals +(with mouse and hotkey input), direct output to pen plotters or modern +printers, and output to many file formats (eps, fig, jpeg, LaTeX, metafont, +pbm, pdf, png, postscript, svg, ...). + + http://www.gnuplot.info + home page diff -r 1ed03ae08ad7 -r be58630c4b62 ideal-devel-proj.rst --- a/ideal-devel-proj.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/ideal-devel-proj.rst Sun Jan 10 12:25:26 2010 +0200 @@ -1,18 +1,63 @@ -*- mode: outline; coding: utf-8 -*- - Ideal software project management. + Ideal software development model. + + +* Open source. + +Open source development have much freedom select any development model. * Close source. -* Open source. +Close source sortware development restrict in using models, technic or +software resources; restrict their public appear because of its proprietary +nature. + +In many case you can not directly contact with developers (only through +support). You can not access to product bug tracing system (you only can +submit bug via crash report application or technical support); publicly appear +internal bug tracing can damage product reputation. Internal +architecture/protocol description can drop leading product position (allowing +another party get same product and get company money). * Component. + * Docs. * VCS. * Bug track. * News. +** Docs. + +Documentation must provide: + +** Home page. + +Home page must provide: + + * project name + * short info about project goal + * project licence (COPYING) + * currect project status + * links to binary release + * links to source release, how to get latest source from VCS + * links to online/printed docs + * how report bug (BUGS) + * where send patch + * contact info + +Additionally: + + * help welcome, requirement to join to project + * mail/news list for users/developers, how to subscribe/unsubscribe, where + find archive, how search for keyword in archive + * project history (NEWS, ChangeLog) + * project policy (HACKING) + * how build project (README, INSTALL) + * list of contributor with contact info (MAINTAINERS, AUTHORS) + * who use project + ** VCS. TAGS: VCS, version control system, SCM, source code management, DVCS, diff -r 1ed03ae08ad7 -r be58630c4b62 java.rst --- a/java.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/java.rst Sun Jan 10 12:25:26 2010 +0200 @@ -14,3 +14,97 @@ 48 0 1.4 49 0 1.5 50 0 1.6 + +* Modifiers. + +** public. + + * Public class is visible in other packages. + * Public field is visible everywhere (class must be public too). + +** private. + + * Private variables or methods may be used only by an instance of the same + class that declares the variable or method + * A private feature may only be accessed by the class that owns the feature. + +** protected. + + * Is available to all classes in the same package and also available to all + subclasses of the class that owns the protected feature. + * This access is provided even to subclasses that reside in a different + package from the class that owns the protected feature. + +** default. + +What you get by default ie, without any access modifier. + + * It means that it is visible to all within a particular package. + +* static. + + * Static means one per class, not one for each object no matter how many + instance of a class might exist. This means that you can use them without + creating an instance of a class. + * Static methods are implicitly final, because overriding is done based on + the type of the object, and static methods are attached to a class, not an + object. + * A static method in a superclass can be shadowed by another static method in + a subclass, as long as the original method was not declared final. + * You can't override a static method with a nonstatic method. + +* final. + + * A final class can't be extended ie., final class may not be subclassed. + * A final method can't be overridden when its class is inherited. + * You can't change value of a final variable. + +* Exceptions. + +A checked exception is some subclass of Exception (or Exception itself), +excluding class RuntimeException and its subclasses. + +Unchecked exceptions are RuntimeException and any of its subclasses. Class +Error and its subclasses also are unchecked. With an unchecked exception, +however, the compiler doesn't force client programmers either to catch the +exception or declare it in a throws clause. + +* Inner classes. + +** Nested top-level classes. + +If you declare a class within a class and specify the static modifier, the +compiler treats the class just like any other top-level class. + +Any class outside the declaring class accesses the nested class with the +declaring class name acting similarly to a package. eg, outer.inner. Top-level +inner classes implicitly have access only to static variables. There can also +be inner interfaces. All of these are of the nested top-level variety. + +** Member classes. + +Member inner classes are just like other member methods and member variables +and access to the member class is restricted, just like methods and variables. +This means a public member class acts similarly to a nested top-level class. + +The primary difference between member classes and nested top-level classes is +that member classes have access to the specific instance of the enclosing +class. + +** Local classes. + +Local classes are like local variables, specific to a block of code. Their +visibility is only within the block of their declaration. In order for the +class to be useful beyond the declaration block, it would need to implement a +more publicly available interface. + +Because local classes are not members, the modifiers public, protected, +private, and static are not usable. + +** Anonymous classes. + +Anonymous inner classes extend local inner classes one level further. As +anonymous classes have no name, you cannot provide a constructor. + + + diff -r 1ed03ae08ad7 -r be58630c4b62 mail.rst --- a/mail.rst Sun Jan 10 12:25:21 2010 +0200 +++ b/mail.rst Sun Jan 10 12:25:26 2010 +0200 @@ -29,3 +29,13 @@ http://justinsboringpage.blogspot.com/2009/02/sending-email-via-gmail-in-emacs.html http://obfuscatedcode.wordpress.com/2007/04/26/configuring-emacs-for-gmails-smtp + +* Mail etiquette. + +** Bottom vs. top quoting. + +Just not use top quoting! + +** Stallman warn about Google. + + http://www.mail-archive.com/gnu-emacs-sources@gnu.org/msg00302.html \ No newline at end of file diff -r 1ed03ae08ad7 -r be58630c4b62 malware.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/malware.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,83 @@ +-*- mode: outline; coding: utf-8 -*- + +* Classification. + +Malware (malicious software) is software designed to infiltrate a computer +system without the owner's informed consent. + +** Virus. + +Program that has infected some executable software and that causes that +software, when run, to spread the virus to other executable software. + +Viruses may also contain a payload that performs other actions, often +malicious. + +** Worm. + +Worm is a program that actively transmits itself over a network to infect +other computers. + +Worms may also contain a payload that performs other actions, often malicious. + +** Trojan horses. + +Trojan horse is any program that invites the user to run it, concealing a +harmful or malicious payload. + +One of the most common ways that spyware is distributed is as a Trojan horse, +bundled with a piece of desirable software that the user downloads from the +Internet. + +** Rootkits. + +Rootkit is a program which modifying the host operating system so that the +malware is hidden from the user. + +Rootkits can prevent a malicious process from being visible. + +** Backdoors. + +A backdoor is a method of bypassing normal authentication procedures. Once a +system has been compromised, one or more backdoors may be installed in order +to allow easier access in the future. + +** Spyware. + +Spyware is a type of malware that is installed on computers and collects +information about users without their knowledge. + +The presence of spyware is typically hidden from the user. + +Sometimes, spywares such as keyloggers are installed by the owner of a shared, +corporate or public computer on purpose in order to secretly monitor other +users. + +** Adware. + +Adware or advertising-supported software is any software package which +automatically plays, displays, or downloads advertisements to a computer after +the software is installed on it or while the application is being used. + +** Botnets. + + + +** Keystroke loggers. + +Malware programs install a key logger, which intercepts the user's keystrokes +when entering a password, credit card number, or other information that may be +exploited. These are then transmitted to the malware creator. + +** Dialers. + +Electronic device that is connected to a telephone line to monitor the dialed +numbers and alter them to seamlessly provide services that otherwise require +lengthy access codes to be dialed. + +** Screen scrapers. + + + +** Phishing. + diff -r 1ed03ae08ad7 -r be58630c4b62 remote-shell.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/remote-shell.rst Sun Jan 10 12:25:26 2010 +0200 @@ -0,0 +1,95 @@ +-*- mode: outline; coding: utf-8 -*- + +* ssh. + +** ssh server on cygwin. + + * Инсталлируем стандартный набор утилит Cygwin + пакет openssh. + * Устанавливаем переменную окружения CYGWIN=binmode tty ntsec. + Это можно сделать глобально или через cygwin.bat (только для клиента). + set CYGWIN=binmode tty ntsec + * Создать пользователя (XXX как сделать чтобы этот пользователь не мог логиниться?), + например с именем user. + * Обновить /etc/passwd + $ mkpasswd -l -u user >>/etc/passwd + или + $ mkpasswd -l >/etc/passwd + для обносления всех записей. + * В приглашении bash: + $ mkdir -p /home/user + $ ssh-host-config -y + Стартуем сервер: + $ net start sshd + или + $ cygrunsrv -S sshd + * На удаленной машине логинимся: + $ ssh 192.168.1.26 -l user + * Остановить сервер + $ cygrunsrv -E sshd + +*** Запускаем SSH server на правах произвольного пользователя. + + * Создаем пользователя, например с именем user, задаем ему пароль, + права (т.е. в какие группы будет входить) и т.д., пользователя не блокируем. + * В консоле MMC добавляем оснастку "Параметры безопасности.". Модифицируем параметры: + + "Параметры безопасности."->"Локальные политики."->"Назначение прав пользователя." + ->"Вход в качестве службы."->добавить 'user'. + + "Параметры безопасности."->"Локальные политики."->"Назначение прав пользователя." + ->"Отклонить локальный вход."->удалить 'user' (если был установлен). + + XXX "Принудительное удаленнон завершение." + +** ssh client. + +*** SSH client on Windows. + +**** ssh from Cygwin. + + * Инсталируем openssh из Cygwin. + * В приглашении bash набираем + $ ssh user@192.168.1.38 + или + $ ssh -l user 192.168.1.38 + +** Reverse SSH Tunneling + +Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with +reverse SSH tunneling. This document will show you step by step how to set up reverse SSH +tunneling. The reverse SSH tunneling should work fine with Unix like systems. + +Let's assume that Destination's IP is 192.168.20.55 (Linux box that you want to access). + +You want to access from Linux client with IP 138.47.99.99. +Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) + +SH from the destination to the source (with public ip) using command below: + + $ ssh -R 19999:localhost:22 sourceuser@138.47.99.99 + +port 19999 can be any unused port. +Now you can SSH from source to destination through SSH tuneling: + + $ ssh localhost -p 19999 + +3rd party servers can also access 192.168.20.55 through Destination (138.47.99.99). +Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) <- Bob's server + +From Bob's server: + + $ ssh sourceuser@138.47.99.99 + +After the sucessful login to Source: + + $ ssh localhost -p 19999 + +The connection between destination and source must be alive at all time. Tip: you may run +a command (e.g. watch, top) on Destination to keep the connection active. + +* Ajaxterm. + +Allow remote shell access to host from web browser (require html+css+javascript). + + http://antony.lesuisse.org/software/ajaxterm + home page diff -r 1ed03ae08ad7 -r be58630c4b62 ssh.rst --- a/ssh.rst Sun Jan 10 12:25:21 2010 +0200 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,86 +0,0 @@ --*- mode: outline; coding: windows-1251 -*- - -* SSH server on cygwin. - - * Cygwin + openssh. - * CYGWIN=binmode tty ntsec. - cygwin.bat ( ). - set CYGWIN=binmode tty ntsec - * (XXX ?), - user. - * /etc/passwd - $ mkpasswd -l -u user >>/etc/passwd - - $ mkpasswd -l >/etc/passwd - . - * bash: - $ mkdir -p /home/user - $ ssh-host-config -y - : - $ net start sshd - - $ cygrunsrv -S sshd - * : - $ ssh 192.168.1.26 -l user - * - $ cygrunsrv -E sshd - -** SSH server . - - * , user, , - (.. ) .., . - * MMC " .". : - - " ."->" ."->" ." - ->" ."-> 'user'. - - " ."->" ."->" ." - ->" ."-> 'user' ( ). - - XXX " ." - -* SSH client. - -** SSH client on Windows. - -*** ssh from Cygwin. - - * openssh Cygwin. - * bash - $ ssh user@192.168.1.38 - - $ ssh -l user 192.168.1.38 - -* Reverse SSH Tunneling - -Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with -reverse SSH tunneling. This document will show you step by step how to set up reverse SSH -tunneling. The reverse SSH tunneling should work fine with Unix like systems. - -Let's assume that Destination's IP is 192.168.20.55 (Linux box that you want to access). - -You want to access from Linux client with IP 138.47.99.99. -Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) - -SH from the destination to the source (with public ip) using command below: - - $ ssh -R 19999:localhost:22 sourceuser@138.47.99.99 - -port 19999 can be any unused port. -Now you can SSH from source to destination through SSH tuneling: - - $ ssh localhost -p 19999 - -3rd party servers can also access 192.168.20.55 through Destination (138.47.99.99). -Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) <- Bob's server - -From Bob's server: - - $ ssh sourceuser@138.47.99.99 - -After the sucessful login to Source: - - $ ssh localhost -p 19999 - -The connection between destination and source must be alive at all time. Tip: you may run -a command (e.g. watch, top) on Destination to keep the connection active.