--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/about-uri.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,49 @@
+-*- outline -*-
+
+* about.
+
+See
+
+ http://en.wikipedia.org/wiki/About:_URI_scheme
+
+* Firefox.
+
+ about:
+ same page as "Help -> About"
+ about:blank
+ blank page, useful for setting as your home page
+ about:buildconfig
+ show your Mozilla build options
+ about:cache
+ displays cache statistics and disk cache directory location
+ about:config
+ GUI for modifying user preferences
+ about:crashes
+ crash reports
+ about:credits
+ list of contributors to the Mozilla projects
+ about:licence
+ show product licences
+ about:licence
+ show product licences
+ about:logo
+ application logo
+ about:memory
+ memory usage (since Firefox 3.6)
+ about:mozilla
+ easter eggs - "Book of Mozilla"
+ about:neterror
+ about:plugins
+ lists all your plugins as well as other useful information
+ about:rights
+ your rights
+ about:robots
+ easter egg (since 2008-03-08 trunk builds)
+ about:sessionrestore
+ interface for viewing about last session
+ about:support
+ same page as "Help -> Troubleshooting information" (since Firefox 3.6)
+
+See
+
+ http://kb.mozillazine.org/About_protocol_links
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/crack.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,39 @@
+-*- mode: outline; coding: utf-8 -*-
+
+* How create crack archive?
+
+Use zip/rar. With rar you can use password protection.
+
+Along with content provide these files:
+
+ * .nfo - crack team logo, info about content, enjoy greeting.
+ * .url - internet shortcut file.
+ * FILE_ID.DIZ - plain text file containing brief content description of the
+ archive in which it is included.
+
+** .nfo
+
+Old .nfo use code page 437. New .nfo file use ISO-8859-1/ISO-8859-15 or
+Unicode UTF-8 characters.
+
+ http://en.wikipedia.org/wiki/.nfo
+
+** .url
+
+Internet shortcut file. Content like this:
+
+ [InternetShortcut]
+ URL=http://example.com/
+
+ http://www.cyanwerks.com/file-format-url.html
+ An Unofficial Guide to the URL File Format, 3ed
+
+
+** FILE_ID.DIZ
+
+FILE_ID stands for "file identification". DIZ stands for Description In
+Zipfile.
+
+ http://www.textfiles.com/computers/fileid.txt
+ v1.9 spec
+ http://en.wikipedia.org/wiki/FILE_ID.DIZ
--- a/emacs.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/emacs.rst Sun Jan 10 12:25:26 2010 +0200
@@ -8,11 +8,11 @@
(setq variable value)
(defvar variable value "documentation")
-or
+or (replace <colon> with :)
- # Local variables:
- # variable: value
- # End:
+ # Local variables<colon>
+ # variable<colon> value
+ # End<colon>
* Debugging.
@@ -87,3 +87,25 @@
With transient-mark-mode and delete-selection-mode enabled: select region,
type M-| sort -u RET to replace selection with sorted and uniquified lines.
+* Finding emacs packages.
+
+See
+
+ http://anc.ed.ac.uk/~stephen/emacs/ell.html
+ http://www.emacswiki.org/emacs/WikifiedEmacsLispList
+
+* Compiling emacs.
+
+** Windows.
+
+Get MSYS for POSIX shell and utilities . Get MinGW for GCC. Get Gnuwin32 for
+jpeg, ungif, tiff, xpm, png, zlib libraries.
+
+Read emacs/nt/INSTALL.
+
+ $ cmd
+ $ cd emacs\nt
+ $ configure.bat --with-gcc --cflags -Ic:/opt/gnuwin32/include
+ $ make bootstrap
+ $ make info
+ $ make install
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/english-punctuation.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,275 @@
+-*- mode: outline; coding: utf-8 -*-
+
+ English Punctuation Guide.
+
+* Punctuation symbol.
+
+ ! exclamation mark
+ "" single quotation marks
+ '' double quotation marks
+ ' apostrophe
+ , comma
+ - hyphen
+ . full stop (period USA)
+ : colon
+ ; semi colon
+ ? question mark
+ ... ellipsis
+
+* General rules.
+
+ * Put end-of-sentence punctuation inside quotation marks.
+ * Put commas and other sentence punctuation outside of parentheses.
+ * Put a comma (plus a space) before and, but, or, and nor when they join two
+ sentences.
+ * The semicolon (;) is not used widely in English and probably should be
+ avoided by non-native writers.
+ * Names of newspapers, books, movies, ships, magazines, journals, and poems
+ are usually italicized or underlined.
+
+** Capital letter.
+
+ 1 A capital is used for the first letter of a new sentence, of quoted speech
+ or proper nouns.
+ 2 The first letter of a sentence does not need to be capitalized if it is
+ included in parenthesis within another sentence.
+ 3 A capital letter is always used for the first person singular subjective
+ personal pronoun I.
+ 4 A capital is used for the first letter of key words in headings and titles.
+ If such titles are hyphenated then both components are given capitalized
+ first letters.
+ 5 A capital is used for the first letter of key words in historical events.
+ 6 A capital is used for the first letter of religions and many other
+ religious words.
+ 7 A capital is used for the first letter of names of months and days of the
+ week, but not of seasons.
+ 8 Holidays should also be capitalized.
+
+Example:
+
+ [3] My boss and I agreed that I should make up for the time I had lost.
+ [4] The Minister of Agriculture and Fisheries
+ [4] The Centers for Disease Control
+ [4] Vice-President Dick Cheney
+ [5] The Battle of Waterloo
+ [5] The Great Fire of London
+ [6] Devout Christians do daily Bible study.
+ [7] After a long, hot summer she married him on a sultry Saturday in September.
+ [8] January 1 is New Year's Day.
+
+** Spaces.
+
+ * Put one space after punctuation.
+ * Put no spaces before punctuation, but always put a space between words.
+ * Put no spaces after periods inside abbreviations.
+ * Put no space before or after an apostrophe.
+ * Put no space on the "inside" of quotation marks (often called "quotes").
+ * Put no space on the "inside" of parentheses.
+
+Some old rules:
+
+ * Put two spaces after colons and between sentences.
+
+
+* Exclamation mark, '!'.
+
+ * Exclamation marks act as a full stop.
+ * An exclamation mark is most often used to show shock, surprise, horror or
+ pleasure.
+ * No space is needed before an exclamation mark, at least one space after one
+ (two spaces for purists).
+
+Example:
+
+ Oh! Wow! Brilliant!
+ It was shocking!
+
+* Apostrophe, "'".
+
+ * Apostrophes next to the letter ('s) indicate possession or belonging.
+ * They are also used to show missing letters in shortened words, especially in
+ informal writing.
+ * No space is needed before or after the apostrophe.
+
+Example:
+
+ This is Lynne's web site.
+ It's a nice day today, isn't it? I've got an idea. Let's go out.
+
+* Comma, ','.
+
+ 1 Separate items in long lists.
+ 2 Commas point out brief pauses in a complex sentence or a long prepositional
+ phrase.
+ 3 Comma is included before the conjunction 'and' which comes
+ before the final element of a list (for purists).
+ 4 Introduce a direct quote.
+ 5 Separate appositives (a noun, or noun phrase) or non-defining relative
+ clauses.
+ 6 Use a comma if your subject has two or more adjectives describing it.
+ * You do not put a space before a comma, but you do need a space after one.
+ ? We don't usually put a comma before the word 'and'.
+
+Example:
+
+ [1] There were a lot of people in the room, teachers, students and parents.
+ [2] The teachers were sitting, the students were listening and the parents
+ were just worrying.
+ [2] Although he wanted to come, he wasn't able to attend the course.
+ [3] I like reading, listening to music, and visiting with my friends.
+ [4] The boy said, "My father is often away during the week on business trips."
+ [4] His doctor replied, "If you don't stop smoking, you run the risk of a
+ heart attack."
+ [5] Bill Gates, the richest man in the world, comes from Seattle.
+ [5] My only sister, who is a fantastic tennis player, is in great shape.
+ [6] The powerful, resonating sound caught our attention.
+
+* Colon, ':'.
+
+ 1 Colons precede a list, an explanation or an example.
+ 2 The colon is used to separate two main clauses where the first is an
+ introduction to the second.
+ 3 To introduce a direct quote (a comma can also be used in this situation).
+ * You do not put a space before a colon, but you do need a space after one.
+
+Example:
+
+ [1] There are two main shopping areas in Nottingham: Broadmarsh Centre and
+ Victoria Centre.
+ [2] The pilot had an awful realization: he had forgotten to turn off the gas
+ at breakfast time.
+ [3] He announced to his friends: "I'm getting married!"
+
+* Full stop (period), '.'.
+
+ 1 Full stops (periods in the USA) go at the end of sentences that are
+ statements.
+ 2 They are also used to mark abbreviations. If such an abbreviation occurs at
+ the very end of a sentence, the final dot is not usually written twice.
+ * You do not put a space before a full stop, but you do need at least one
+ space after one (two spaces for purists).
+
+Example:
+
+ [1] My name is Lynn. I am a teacher.
+ [2] An overhead projector is often referred to as an O.H.P.
+
+* Hyphen, '-'.
+
+ * Hyphens are used to connect words or syllables, or to divide words into
+ parts.
+ * You don't use a space on either side of a hyphen.
+
+Example:
+
+ There were ninety-nine red balloons.
+
+* Question mark, '?'.
+
+ 1 Question marks go at the end of sentences that are questions.
+ 2 You need a question mark at the end of tag questions.
+ * For quotes within quotes, use single quotes.
+ * You do not put a space before a question mark, but you do need at least one
+ space after one (two spaces for purists).
+
+For example:
+
+ [1] Is my name Lynn? Of course it is.
+ [2] It's a nice day, isn't it?
+
+* Semicolon, ';'.
+
+ 1 Semicolons are used to separate two sentences that would otherwise be
+ joined with a word such as 'and', 'because', 'since', 'unless' or 'while'.
+ 2 To separate groups of words that are themselves separated by commas.
+ * You do not put a space before a semicolon, but you do need a space after one.
+
+Example:
+
+ [1] I'm looking forward to our next lesson; I'm sure it will be a lot of fun.
+ [2] They plan to study German, for their travels; chemistry, for their work;
+ and literature, for their own enjoyment.
+
+
+* Quotation mark (speech mark), '""', "''".
+
+Double quotes '""', single quotes "''".
+
+ * Quotation marks (single or double) are used to show words that are directly
+ spoken (direct speech).
+ * Only the words actually being quoted are enclosed by speech marks.
+ * You need a space before the opening speech mark, but no space after it, and
+ a space after the closing one, but no space before it.
+ * Another general rule is to use a comma after the introduction to quoted
+ speech or writing.
+ * Sometimes when writing a spoken sentence it is split in two. The speech
+ marks must then be placed at the beginning and end of each part of the
+ sentence. Commas are used to separate the spoken part from the rest of the
+ sentence.
+ * If you need a question mark or exclamation mark the markers that punctuate
+ the quoted words are enclosed by the speech marks.
+
+Example:
+
+ "Could everyone sit down please," said the teacher.
+ Jaime said, "I love you."
+ "I wonder," she said quietly, "whether people will ever truly understand each other."
+ "I don't understand," replied Nathan. "Do you understand?" asked Nathan. "I don't understand!" shouted Nathan.
+ Nathan replied, "I don't understand." Nathan asked, "Do you understand?" Nathan shouted, "I don't understand!"
+ He wrote in 1946 that, "The key word in digital computer is 'digital'."
+
+* Ellipsis, '...'.
+
+ 1 Ellipsis used to show that something has been omitted, indicate missing
+ words in an incomplete quotation.
+
+Example:
+
+ [1] Chomsky suggested that, "Language is a system that...can be described in
+ an algebraic notation."
+
+* Dash, '-', '--'.
+
+ 1 The dash should be used when making a brief interruption within a
+ statement, a sudden change of thought, an additional comment, or a dramatic
+ qualification.
+
+* Parentheses '()'.
+
+ 1 Use parentheses to clarify, to place an afterthought, or to add a personal
+ comment. Be sure to include the period after the closing parenthesis.
+
+Example:
+
+ [1] Steve Case (AOL's former CEO) resigned from the Time-Warner board of
+ directors in 2005.
+ [1] You will need a flashlight for the camping trip (don't forget the
+ batteries!).
+ [1] Most grammarians believe that parentheses and commas are always
+ interchangeable (I disagree).
+
+* Brackets '[]'.
+
+ 1 Use brackets to signify an editor's note in a regular piece of writing. You
+ can also use brackets to clarify or to revise a direct quote so that it
+ appeals to your own writing.
+ 2 The first brackets are rounded, and brackets inside brackets are squared.
+
+Example:
+
+ [1] "[The blast] was absolutely devastating," said Susan Smith.
+
+* Slash '/'.
+
+ 1 Use the slash to separate "and" and "or", when appropriate.
+ 2 The slash can replace the word "and" to join two nouns.
+ 3 The slash is used when quoting lyrics and poetry to denote a line break. Be
+ sure to add spaces between your slashes here.
+
+Example:
+
+ [1] To register, you will need your driver's license and/or your birth
+ certificate."
+ [2] The student/part-time employee has very little free time.
+ [3] "Row, row, row your boat / gently down the stream / life is but a dream."
+
--- a/game-console.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/game-console.rst Sun Jan 10 12:25:26 2010 +0200
@@ -4,6 +4,8 @@
** Emulator.
+*** Mednafen.
+
$ sudo apt-get install mednafen
See
@@ -11,6 +13,19 @@
http://mednafen.sourceforge.net/
http://en.wikipedia.org/wiki/Mednafen
+*** zsnes.
+
+ $ sudo apt-get install zsnes
+
+*** MAME.
+
+See
+
+ http://mamedev.org
+ home page
+ http://gmame.wordpress.com/feed
+ unofficial blog
+
** ROM.
http://rednintendo.blogspot.com
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/game-rogue.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,23 @@
+-*- mode: outline; coding: utf-8 -*-
+
+* Nethack.
+
+NetHack is a single-player roguelike video game originally released in 1987.
+
+ http://www.nethack.org/
+ home page
+ http://en.wikipedia.org/wiki/NetHack
+
+* Angband.
+
+Angband is a free, single-player dungeon exploration game where you take the
+role of an adventurer, exploring a deep dungeon, fighting monsters, and
+acquiring the best weaponry you can, in preparation for a final battle with
+Morgoth, the Lord of Darkness.
+
+ http://www.thangorodrim.net/
+ home page
+ http://angband.calamarain.net/
+ game comic
+
+
--- a/graph.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/graph.rst Sun Jan 10 12:25:26 2010 +0200
@@ -1,5 +1,9 @@
-*- mode: outline; coding: utf-8 -*-
+* General view.
+
+ http://en.wikipedia.org/wiki/List_of_graphing_software
+
* RRDtool.
RRDtool is the OpenSource industry standard, high performance data logging and
@@ -19,3 +23,20 @@
http://www.graphviz.org/
home page
+
+* Gnuplot.
+
+Gnuplot is a portable command-line driven graphing utility for linux, OS/2, MS
+Windows, OSX, VMS, and many other platforms.
+
+Gnuplot supports many types of plots in either 2D and 3D. It can draw using
+lines, points, boxes, contours, vector fields, surfaces, and various
+associated text. It also supports various specialized plot types.
+
+Gnuplot supports many different types of output: interactive screen terminals
+(with mouse and hotkey input), direct output to pen plotters or modern
+printers, and output to many file formats (eps, fig, jpeg, LaTeX, metafont,
+pbm, pdf, png, postscript, svg, ...).
+
+ http://www.gnuplot.info
+ home page
--- a/ideal-devel-proj.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/ideal-devel-proj.rst Sun Jan 10 12:25:26 2010 +0200
@@ -1,18 +1,63 @@
-*- mode: outline; coding: utf-8 -*-
- Ideal software project management.
+ Ideal software development model.
+
+
+* Open source.
+
+Open source development have much freedom select any development model.
* Close source.
-* Open source.
+Close source sortware development restrict in using models, technic or
+software resources; restrict their public appear because of its proprietary
+nature.
+
+In many case you can not directly contact with developers (only through
+support). You can not access to product bug tracing system (you only can
+submit bug via crash report application or technical support); publicly appear
+internal bug tracing can damage product reputation. Internal
+architecture/protocol description can drop leading product position (allowing
+another party get same product and get company money).
* Component.
+ * Docs.
* VCS.
* Bug track.
* News.
+** Docs.
+
+Documentation must provide:
+
+** Home page.
+
+Home page must provide:
+
+ * project name
+ * short info about project goal
+ * project licence (COPYING)
+ * currect project status
+ * links to binary release
+ * links to source release, how to get latest source from VCS
+ * links to online/printed docs
+ * how report bug (BUGS)
+ * where send patch
+ * contact info
+
+Additionally:
+
+ * help welcome, requirement to join to project
+ * mail/news list for users/developers, how to subscribe/unsubscribe, where
+ find archive, how search for keyword in archive
+ * project history (NEWS, ChangeLog)
+ * project policy (HACKING)
+ * how build project (README, INSTALL)
+ * list of contributor with contact info (MAINTAINERS, AUTHORS)
+ * who use project
+
** VCS.
TAGS: VCS, version control system, SCM, source code management, DVCS,
--- a/java.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/java.rst Sun Jan 10 12:25:26 2010 +0200
@@ -14,3 +14,97 @@
48 0 1.4
49 0 1.5
50 0 1.6
+
+* Modifiers.
+
+** public.
+
+ * Public class is visible in other packages.
+ * Public field is visible everywhere (class must be public too).
+
+** private.
+
+ * Private variables or methods may be used only by an instance of the same
+ class that declares the variable or method
+ * A private feature may only be accessed by the class that owns the feature.
+
+** protected.
+
+ * Is available to all classes in the same package and also available to all
+ subclasses of the class that owns the protected feature.
+ * This access is provided even to subclasses that reside in a different
+ package from the class that owns the protected feature.
+
+** default.
+
+What you get by default ie, without any access modifier.
+
+ * It means that it is visible to all within a particular package.
+
+* static.
+
+ * Static means one per class, not one for each object no matter how many
+ instance of a class might exist. This means that you can use them without
+ creating an instance of a class.
+ * Static methods are implicitly final, because overriding is done based on
+ the type of the object, and static methods are attached to a class, not an
+ object.
+ * A static method in a superclass can be shadowed by another static method in
+ a subclass, as long as the original method was not declared final.
+ * You can't override a static method with a nonstatic method.
+
+* final.
+
+ * A final class can't be extended ie., final class may not be subclassed.
+ * A final method can't be overridden when its class is inherited.
+ * You can't change value of a final variable.
+
+* Exceptions.
+
+A checked exception is some subclass of Exception (or Exception itself),
+excluding class RuntimeException and its subclasses.
+
+Unchecked exceptions are RuntimeException and any of its subclasses. Class
+Error and its subclasses also are unchecked. With an unchecked exception,
+however, the compiler doesn't force client programmers either to catch the
+exception or declare it in a throws clause.
+
+* Inner classes.
+
+** Nested top-level classes.
+
+If you declare a class within a class and specify the static modifier, the
+compiler treats the class just like any other top-level class.
+
+Any class outside the declaring class accesses the nested class with the
+declaring class name acting similarly to a package. eg, outer.inner. Top-level
+inner classes implicitly have access only to static variables. There can also
+be inner interfaces. All of these are of the nested top-level variety.
+
+** Member classes.
+
+Member inner classes are just like other member methods and member variables
+and access to the member class is restricted, just like methods and variables.
+This means a public member class acts similarly to a nested top-level class.
+
+The primary difference between member classes and nested top-level classes is
+that member classes have access to the specific instance of the enclosing
+class.
+
+** Local classes.
+
+Local classes are like local variables, specific to a block of code. Their
+visibility is only within the block of their declaration. In order for the
+class to be useful beyond the declaration block, it would need to implement a
+more publicly available interface.
+
+Because local classes are not members, the modifiers public, protected,
+private, and static are not usable.
+
+** Anonymous classes.
+
+Anonymous inner classes extend local inner classes one level further. As
+anonymous classes have no name, you cannot provide a constructor.
+
+
+
--- a/mail.rst Sun Jan 10 12:25:21 2010 +0200
+++ b/mail.rst Sun Jan 10 12:25:26 2010 +0200
@@ -29,3 +29,13 @@
http://justinsboringpage.blogspot.com/2009/02/sending-email-via-gmail-in-emacs.html
http://obfuscatedcode.wordpress.com/2007/04/26/configuring-emacs-for-gmails-smtp
+
+* Mail etiquette.
+
+** Bottom vs. top quoting.
+
+Just not use top quoting!
+
+** Stallman warn about Google.
+
+ http://www.mail-archive.com/gnu-emacs-sources@gnu.org/msg00302.html
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/malware.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,83 @@
+-*- mode: outline; coding: utf-8 -*-
+
+* Classification.
+
+Malware (malicious software) is software designed to infiltrate a computer
+system without the owner's informed consent.
+
+** Virus.
+
+Program that has infected some executable software and that causes that
+software, when run, to spread the virus to other executable software.
+
+Viruses may also contain a payload that performs other actions, often
+malicious.
+
+** Worm.
+
+Worm is a program that actively transmits itself over a network to infect
+other computers.
+
+Worms may also contain a payload that performs other actions, often malicious.
+
+** Trojan horses.
+
+Trojan horse is any program that invites the user to run it, concealing a
+harmful or malicious payload.
+
+One of the most common ways that spyware is distributed is as a Trojan horse,
+bundled with a piece of desirable software that the user downloads from the
+Internet.
+
+** Rootkits.
+
+Rootkit is a program which modifying the host operating system so that the
+malware is hidden from the user.
+
+Rootkits can prevent a malicious process from being visible.
+
+** Backdoors.
+
+A backdoor is a method of bypassing normal authentication procedures. Once a
+system has been compromised, one or more backdoors may be installed in order
+to allow easier access in the future.
+
+** Spyware.
+
+Spyware is a type of malware that is installed on computers and collects
+information about users without their knowledge.
+
+The presence of spyware is typically hidden from the user.
+
+Sometimes, spywares such as keyloggers are installed by the owner of a shared,
+corporate or public computer on purpose in order to secretly monitor other
+users.
+
+** Adware.
+
+Adware or advertising-supported software is any software package which
+automatically plays, displays, or downloads advertisements to a computer after
+the software is installed on it or while the application is being used.
+
+** Botnets.
+
+
+
+** Keystroke loggers.
+
+Malware programs install a key logger, which intercepts the user's keystrokes
+when entering a password, credit card number, or other information that may be
+exploited. These are then transmitted to the malware creator.
+
+** Dialers.
+
+Electronic device that is connected to a telephone line to monitor the dialed
+numbers and alter them to seamlessly provide services that otherwise require
+lengthy access codes to be dialed.
+
+** Screen scrapers.
+
+
+
+** Phishing.
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/remote-shell.rst Sun Jan 10 12:25:26 2010 +0200
@@ -0,0 +1,95 @@
+-*- mode: outline; coding: utf-8 -*-
+
+* ssh.
+
+** ssh server on cygwin.
+
+ * Инсталлируем стандартный набор утилит Cygwin + пакет openssh.
+ * Устанавливаем переменную окружения CYGWIN=binmode tty ntsec.
+ Это можно сделать глобально или через cygwin.bat (только для клиента).
+ set CYGWIN=binmode tty ntsec
+ * Создать пользователя (XXX как сделать чтобы этот пользователь не мог логиниться?),
+ например с именем user.
+ * Обновить /etc/passwd
+ $ mkpasswd -l -u user >>/etc/passwd
+ или
+ $ mkpasswd -l >/etc/passwd
+ для обносления всех записей.
+ * В приглашении bash:
+ $ mkdir -p /home/user
+ $ ssh-host-config -y
+ Стартуем сервер:
+ $ net start sshd
+ или
+ $ cygrunsrv -S sshd
+ * На удаленной машине логинимся:
+ $ ssh 192.168.1.26 -l user
+ * Остановить сервер
+ $ cygrunsrv -E sshd
+
+*** Запускаем SSH server на правах произвольного пользователя.
+
+ * Создаем пользователя, например с именем user, задаем ему пароль,
+ права (т.е. в какие группы будет входить) и т.д., пользователя не блокируем.
+ * В консоле MMC добавляем оснастку "Параметры безопасности.". Модифицируем параметры:
+
+ "Параметры безопасности."->"Локальные политики."->"Назначение прав пользователя."
+ ->"Вход в качестве службы."->добавить 'user'.
+
+ "Параметры безопасности."->"Локальные политики."->"Назначение прав пользователя."
+ ->"Отклонить локальный вход."->удалить 'user' (если был установлен).
+
+ XXX "Принудительное удаленнон завершение."
+
+** ssh client.
+
+*** SSH client on Windows.
+
+**** ssh from Cygwin.
+
+ * Инсталируем openssh из Cygwin.
+ * В приглашении bash набираем
+ $ ssh user@192.168.1.38
+ или
+ $ ssh -l user 192.168.1.38
+
+** Reverse SSH Tunneling
+
+Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with
+reverse SSH tunneling. This document will show you step by step how to set up reverse SSH
+tunneling. The reverse SSH tunneling should work fine with Unix like systems.
+
+Let's assume that Destination's IP is 192.168.20.55 (Linux box that you want to access).
+
+You want to access from Linux client with IP 138.47.99.99.
+Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99)
+
+SH from the destination to the source (with public ip) using command below:
+
+ $ ssh -R 19999:localhost:22 sourceuser@138.47.99.99
+
+port 19999 can be any unused port.
+Now you can SSH from source to destination through SSH tuneling:
+
+ $ ssh localhost -p 19999
+
+3rd party servers can also access 192.168.20.55 through Destination (138.47.99.99).
+Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) <- Bob's server
+
+From Bob's server:
+
+ $ ssh sourceuser@138.47.99.99
+
+After the sucessful login to Source:
+
+ $ ssh localhost -p 19999
+
+The connection between destination and source must be alive at all time. Tip: you may run
+a command (e.g. watch, top) on Destination to keep the connection active.
+
+* Ajaxterm.
+
+Allow remote shell access to host from web browser (require html+css+javascript).
+
+ http://antony.lesuisse.org/software/ajaxterm
+ home page
--- a/ssh.rst Sun Jan 10 12:25:21 2010 +0200
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,86 +0,0 @@
--*- mode: outline; coding: windows-1251 -*-
-
-* SSH server on cygwin.
-
- * Cygwin + openssh.
- * CYGWIN=binmode tty ntsec.
- cygwin.bat ( ).
- set CYGWIN=binmode tty ntsec
- * (XXX ?),
- user.
- * /etc/passwd
- $ mkpasswd -l -u user >>/etc/passwd
-
- $ mkpasswd -l >/etc/passwd
- .
- * bash:
- $ mkdir -p /home/user
- $ ssh-host-config -y
- :
- $ net start sshd
-
- $ cygrunsrv -S sshd
- * :
- $ ssh 192.168.1.26 -l user
- *
- $ cygrunsrv -E sshd
-
-** SSH server .
-
- * , user, ,
- (.. ) .., .
- * MMC " .". :
-
- " ."->" ."->" ."
- ->" ."-> 'user'.
-
- " ."->" ."->" ."
- ->" ."-> 'user' ( ).
-
- XXX " ."
-
-* SSH client.
-
-** SSH client on Windows.
-
-*** ssh from Cygwin.
-
- * openssh Cygwin.
- * bash
- $ ssh user@192.168.1.38
-
- $ ssh -l user 192.168.1.38
-
-* Reverse SSH Tunneling
-
-Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with
-reverse SSH tunneling. This document will show you step by step how to set up reverse SSH
-tunneling. The reverse SSH tunneling should work fine with Unix like systems.
-
-Let's assume that Destination's IP is 192.168.20.55 (Linux box that you want to access).
-
-You want to access from Linux client with IP 138.47.99.99.
-Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99)
-
-SH from the destination to the source (with public ip) using command below:
-
- $ ssh -R 19999:localhost:22 sourceuser@138.47.99.99
-
-port 19999 can be any unused port.
-Now you can SSH from source to destination through SSH tuneling:
-
- $ ssh localhost -p 19999
-
-3rd party servers can also access 192.168.20.55 through Destination (138.47.99.99).
-Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) <- Bob's server
-
-From Bob's server:
-
- $ ssh sourceuser@138.47.99.99
-
-After the sucessful login to Source:
-
- $ ssh localhost -p 19999
-
-The connection between destination and source must be alive at all time. Tip: you may run
-a command (e.g. watch, top) on Destination to keep the connection active.