Openbox est un gestionnaire de fenêtres extrêmement rapide, souple et agréable. Cette interface graphique minimale est cohérente à plus d'un titre. Très légère, elle se suffit à elle-même et permet également d'accélérer considérablement la réactivité de Gnome lorsqu'elle remplace Metacity. Elle n'a pas de tableau de bord par défaut, mais il est possible d'accéder aux fenêtres avec le raccourci alt+tab, ou en ajoutant un tableau de bord personnalisé.:-) Openbox est un outil puissant qui n‘a de limite que l‘imagination de l‘utilisateur !
Openbox 3 themes are written as an X resource database, in a file named themerc. The format is quite simple to learn, but there are an enormous number of options available to you.
Each and every option has been documented, with details such as their default values, and which values are or are not valid for them. But to try make it a little more accessible, we'll start with an example theme, which uses every possible option within it. Each of the options can be clicked to read the details about it.
sudo cp /etc/fstab /etc/fstab.$(date +%Y-%m-%d)
sudo mkdir /home/var_log
sudo chown root:root /home/var_log/
sudo chmod 755 /home/var_log/
echo "# bind /var/log to /home/var_log" | sudo tee -a /etc/fstab
echo "/home/var_log /var/log none bind 0 0" | sudo tee -a /etc/fstab
sudo mv /var/log /home/var_log
sudo shutdown -r now
Pas mal ce petit script pour déplacer le /var/log hors du SSD (bon par contre j'ai adapté le "lieu" ;) ).
Cloud service support for Kobo v0.2
Installation
Copy the KoboRoot.tgz archive in the .kobo directory of your reader (it is a hidden directory, so you might want to enable the visualization of hidden files) and restart your Kobo.
Configuration
After restarting, plug your kobo back into the computer. Navigate to the .kobo directory. A new kobocloud directory should have appeared. Inside, edit the file kobocloudrc to add the links to the cloud services (one per line).
Notice: No subdirectories are supported at the moment, so be sure that your books are all in the same directories that you are sharing.
Nextcloud (Owncloud)
To add a nextcloud (owncloud) link, open your nextcloud website in a browser and select the folder that you want to share. Click on "Share" and select "Share with link". Copy the link into the kobocloudrc file.
Please note that you need a recent Nextcloud version. Owncloud is at the moment not tested, but should also work.
Dropbox
To add a Dropbox link, open your dropbox in a browser. Select the folder that you want to share and click "Share" and "Send link". Copy the link that appears into the kobocloudrc file.
Usage
The new files will be downloaded when the kobo connects to the Internet for a sync.
Troubleshooting
KoboCloud keeps a log of each session in the .kobo/kobocloud/get.log file. If something goes wrong, useful information can be found there. Please send a copy of this file with every bug report.
Known issues
No subdirectories are supported
Support of Google Drive can be considered if there is demand
Acknowledgment
Thanks to the defunct SendToKobo service for the inspiration of the project and for the basis of the scripts.
Curl for Kobo was downloaded from here: https://www.mobileread.com/forums/showthread.php?p=3734553 . Thanks to NiLuJe for providing it!
Thanks to Christoph Burschka for the help in updating this tool to the recent versions of kobo and nextcloud.
pid = /var/run/stunnel/stunnel.pid
;change to debug = 4 after verification!
debug = 7
output = /var/log/stunnel/stunnel.log
[pop3s]
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
accept = 995
connect = 110
[sni1]
sni = pop3s:my-domain.com
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
connect = 110
[sni2]
sni = pop3s:another-domain.de
cert = /etc/httpd/keys/another-domain.de/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.de/server.key
connect = 110
[sni3]
sni = pop3s:another-domain.eu
cert = /etc/httpd/keys/another-domain.eu/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.eu/server.key
connect = 110
[imaps]
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
accept = 993
connect = 143
[sni4]
sni = imaps:my-domain.com
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
connect = 143
[sni5]
sni = imaps:another-domain.de
cert = /etc/httpd/keys/another-domain.de/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.de/server.key
connect = 143
[sni6]
sni = imaps:another-domain.eu
cert = /etc/httpd/keys/another-domain.eu/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.eu/server.key
connect = 143
[ssmtp]
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
accept = 465
connect = localhost:587
[sni7]
sni = ssmtp:my-domain.com
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
connect = localhost:587
[sni8]
sni = ssmtp:another-domain.de
cert = /etc/httpd/keys/another-domain.de/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.de/server.key
connect = localhost:587
[sni9]
sni = ssmtp:another-domain.eu
cert = /etc/httpd/keys/another-domain.eu/ssl_gnutls.crt
key = /etc/httpd/keys/another-domain.eu/server.key
connect = localhost:587
[uals]
cert = /etc/httpd/keys/my-domain.com/ssl_gnutls.crt
key = /etc/httpd/keys/my-domain.com/server.key
accept = 5767
connect = 5729
pid = /var/run/stunnel.pid
cert = /etc/stunnel/stunnel.pem
[ssh]
accept = 192.168.1.200:443
connect = 127.0.0.1:22
;Certificat/cle
cert = /usr/local/etc/stunnel/imaps.pem
;Version du protocole (all, SSLv2, SSLv3, TLSv1)
sslVersion = all
;Pour des question de securité on fait tourner stunnel dans un chroot (en prison)
chroot = /usr/local/var/lib/stunnel/
setuid = nobody
setgid = nobody
;fichier pid créé dans le chroot
pid = /stunnel.pid
;On optimise un peu les perfs
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
;on veut des logs qui parlent !
debug = 7
;sortie dans le chroot
output = stunnel_imaps.log
[imaps]
accept = 993
connect = 143
[ssmtp]
accept = 465
connect = 25
;et oui! ça fonctionne aussi pour le ssmtp, pour cela vous devrez ouvrir le port 465 dans votre firewall
What is Huginn?
Huginn is a system for building agents that perform automated tasks for you online. They can read the web, watch for events, and take actions on your behalf. Huginn's Agents create and consume events, propagating them along a directed graph. Think of it as a hackable version of IFTTT or Zapier on your own server. You always know who has your data. You do.
the origin of the name
Here are some of the things that you can do with Huginn:
Track the weather and get an email when it's going to rain (or snow) tomorrow ("Don't forget your umbrella!")
List terms that you care about and receive emails when their occurrence on Twitter changes. (For example, want to know when something interesting has happened in the world of Machine Learning? Huginn will watch the term "machine learning" on Twitter and tell you when there is a spike in discussion.)
Watch for air travel or shopping deals
Follow your project names on Twitter and get updates when people mention them
Scrape websites and receive emails when they change
Connect to Adioso, HipChat, Basecamp, Growl, FTP, IMAP, Jabber, JIRA, MQTT, nextbus, Pushbullet, Pushover, RSS, Bash, Slack, StubHub, translation APIs, Twilio, Twitter, Wunderground, and Weibo, to name a few.
Send digest emails with things that you care about at specific times during the day
Track counts of high frequency events and send an SMS within moments when they spike, such as the term "san francisco emergency"
Send and receive WebHooks
Run custom JavaScript or CoffeeScript functions
Track your location over time
Create Amazon Mechanical Turk workflows as the inputs, or outputs, of agents (the Amazon Turk Agent is called the "HumanTaskAgent"). For example: "Once a day, ask 5 people for a funny cat photo; send the results to 5 more people to be rated; send the top-rated photo to 5 people for a funny caption; send to 5 final people to rate for funniest caption; finally, post the best captioned photo on my blog."echo use-standard-socket >> ~/.gnupg/gpg-agent.conf
echo enable-ssh-support >> ~/.gnupg/gpg-agent.conf
$ echo $SSH_AUTH_SOCK
/run/user/1000/gnupg/S.gpg-agent.ssh
$ gpgconf --list-dirs agent-ssh-socket
/run/user/1000/gnupg/S.gpg-agent.ssh
$ systemctl --user show-environment | grep SSH_AUTH_SOCK
SSH_AUTH_SOCK=/run/user/1000/gnupg/S.gpg-agent.ssh
$ cat << EOF > $GNUPGHOME/gpg.conf
use-agent
personal-cipher-preferences AES256 AES192 AES CAST5
personal-digest-preferences SHA512 SHA384 SHA256 SHA224
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
cert-digest-algo SHA512
s2k-digest-algo SHA512
s2k-cipher-algo AES256
charset utf-8
fixed-list-mode
no-comments
no-emit-version
keyid-format 0xlong
list-options show-uid-validity
verify-options show-uid-validity
with-fingerprint
EOF
Pour avoir une clé gpg pas cher :) qques € pour 2 stlink sur ali