5051
Gsar can search one or several files for a string and report the occurrences. Gsar can read one file, search for a string, replace it with some other string, and create a new file containing the changes. Gsar can perform a search and replace in multiple files, overwriting the originals.
I have some nieces and nephews that live in the puckered sphincter of nowhere with no internet access. They have a hard time of it sometimes keeping up with their school-mates because they don't have the access to online research sources that their peers do.-Innuendo (July 11, 2009, 03:56 PM)
....or used or distributed to support any kind of profit generating activity.....
So...maybe they're just old?-SKesselman (July 10, 2009, 12:18 AM)
4wd, you should try turning your step by steps in this topic to a VPN tutorial. This has been the most comprehensive and helpful I have seen so far. Just open a blog post and put it in there. I am sure many people will find them helpful.-kartal (July 09, 2009, 11:11 PM)
OK, I can see being annoyed at people driving too slow, but to make a generalization that all slow drivers must be using automatic transmissions? A little presumptuous, methinks!-J-Mac (July 09, 2009, 11:10 PM)
I was using them interchangeably. But if you have no connection, how would you access Usenet?-zridling (July 09, 2009, 09:11 PM)
Undoubtedly there will be a (lot more) tools able to do the job.-Shades (July 09, 2009, 08:44 PM)
I have already tried the second method of filling a password in the command line both times actually. But I do not get a password request box or anything like that when I login-connect via Openvpn gui? How is supposed to work? Maybe there is something different in your new steps, I will retry it.-kartal (July 09, 2009, 08:01 PM)
Btw do you know easy client switcher for using inside and outside? I realized that I need to edit the client file to direct to right ip which is not a big deal. I am wondering if there is an easier way to deal with it.
Before I start this last part I just want to make sure I am on the right Pc. Am I supposed to "Run the wizard:" on the client pc? I also do not see any certificate wizard in OpenVPN setup. What build are you using?-kartal (July 09, 2009, 12:18 PM)
I am also little lost here. I have keys from previous key setup which are like client1.xxx , what am I supposed to do with those? Are they part of the deal? Do I delete them? Shall I rename them and give the same name as is in the wizard?
I know you have given very clear steps but this last part I am not sure if it is meant for a fresh key creation or follow up on the previous ones we have done.-kartal (July 09, 2009, 04:34 PM)
If online access is viewed as a right,
then it should be free to all. However, this would imply government/national control (which it does already to a large extent!) of the web. If the government bans your access to the web, then you're effectively crippled in this century with regard to information, all other sources being either under government or corporate control and serving their interests.-zridling (July 09, 2009, 12:56 PM)
For those interested in Softmaker office 2008, there is a killer Ashampoo deal (same as Softmaker):
http://r.ashampoo.co...ings/1/090410_en.htm for $4.99-elpresi (July 07, 2009, 03:16 AM)
There is an app for this and it only supports the programs that the users write configuration files for, but it worked well for a variety of programs. You could get a free licence if you submitted 3 program definitions. The only issue is that I cannot remember the name. hmm google search doesn't helpi think it was maybe russian.
-justice (July 09, 2009, 05:35 AM)
The text in the client log file mentions port 1194, which is officially designated to OpenVPN by IANA (the governing body for port numbers). So that would be the port you use in the port forwarding section of your router.-Shades (July 09, 2009, 01:49 AM)
Because of the certificates you have already put up quite a hurdle for 'drive-by attackers'. If you use strong passwords with your (Windows and/or Linux) user login then you already have quite a decent security perimeter setup.
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
I'll look at anything that seems to be out there offering better value and will wait a little while before doing anything to see if there are any adverse reports on the Dell.-Dormouse (July 08, 2009, 01:09 PM)
Big real question is about the SSD. But it is cheaper and seems likely to be sufficient since this will just be a note taker (it's not intended to work as a standard laptop) and any sound reduction will be good; should be possible to replace with HDD later if necessary, though the Dell does seem to require a lot of taking apart even to do something simple like change RAM.-Dormouse (July 08, 2009, 02:51 AM)
And began the "Resource" section, taking the urls from here with a few others. And will add some of the more significant and obvious later.-Steven Avery (July 06, 2009, 07:53 AM)
Ubuntu is, apparently, very much preferred so incompatible hardware (Samsung) won't be considered.-Dormouse (July 07, 2009, 06:38 PM)