• 21 Awesome (But Lesser-Known) Open-Source Applications for Windows

    Reposted from www.tipsfor.us

    Unless you’ve been hiding under a rock in Madagascar for the last few years, you undoubtedly already know about the All-Star open-source applications for Windows. I’m talking about applications such as Firefox, Thunderbird, GIMP, OpenOffice, and VLC.

    However, there are hundreds of lesser-known but highly-useful
    open-source applications available for Windows. A few of my favorites
    are below.

    These applications range from moderately popular to downright obscure, but all
    of them are open-source and FREE. All of them are worth the install
    time if you have never tried them. As a side bonus, many of them are
    cross-platform as well.

    Here they are, in random order:

    zscreen.jpg1. ZScreen

    ZScreen is an open-source screen capture program that quietly
    resides in your system tray until needed. It can take screenshots of a
    selected region, the active window, or the entire screen. It can even
    send screen captures via FTP and copy the URL to your clipboard, all
    with just a single keystroke. Oh yeah, it can also interface with image
    editing software, such as Photoshop or Paint.net.

    If you frequently take screenshots, ZScreen is light years faster than pressing Print Scrn and pasting into MS Paint.

    pdfcreator-logo.png2. PDFCreator

    PDFCreator allows you to create PDFs from any program that can
    print. Once it’s installed, simply “print” to the virtual printer that
    it creates, and the resulting document can be read on any computer with
    Adobe Reader (or comparable software).

    There are several similar programs, but if you dig open-source software, PDFCreator trumps many of the others.

    keepass-logo.gif3. KeePass

    KeePass is one of those applications that you don’t realize how
    badly you need until you start using it. It securely stores and manages
    the login information that you use for e-mail, websites, banks, etc.
    Unless you always use the exact same login information (a terrible
    idea!), you need KeePass. It’s even available in a portable version.

    I use KeePass to manage hundreds of usernames and passwords. I’d go crazy without it.

    handbrake_logo.jpg4. HandBrake

    HandBrake is a DVD to MPEG-4 converter that allows you to stick a
    DVD in your drive and have the video converted to a digital file for
    convenient viewing. It’s great for minimizing wear-and-tear on DVDs,
    plus it’s handy if you travel a lot and want to watch movies on your
    laptop.

    For best results, use it in conjunction with DVD43.

    notepadplus.gif5. Notepad++

    Let’s face it – Windows Notepad is a pretty wimpy text editor, and
    there are many better alternatives. Notepad++ kicks the original
    Notepad in the junk pretty hard. Best of all, it interfaces nicely with
    Filezilla. Here are the features:

    Syntax Highlighting and Syntax Folding
    User Defined Syntax Highlighting
    Auto-completion
    Multi-Document
    Multi-View
    Regular Expression Search/Replace supported
    Full Drag ‘N’ Drop supported
    Dynamic position of Views
    File Status Auto-detection
    Zoom in and zoom out
    Multi-Language environment supported
    Bookmark
    Brace and Indent guideline Highlighting
    Macro recording and playback

    peazip-logo.png6. Peazip

    PeaZip is my current compression/zip utility of choice. It can open
    almost any archive type imaginable (including ACE – be sure to grab the
    separate plug-in). Peazip can split/join files, offers 256-bit
    encryption, and integrates nicely into the right-click contextual menu. It even manages to look good in the process.

    Hey, there’s also portable version AND a Linux version available. Nice.

    bonkenc-logo.png7. BonkEnc

    BonkEnc is a fantastic CD ripper, encoder, and audio converter. It’s
    tiny, lightweight, and is my application of choice for ripping and
    encoding CDs. BonkEnc can produce MP3, MP4/M4A, Ogg Vorbis, AAC, Bonk
    and FLAC files, and also features CDDB/freedb lookup.

    Along similar lines, if you’re looking for a batch audio/video transcoder, take a look at MediaCoder.

    launchy-docu.png8. Launchy

    I admit: I’ve been spoiled by Quicksilver on Mac OS X. My favorite
    similar program for Windows is Launchy, an open-source keystroke
    launcher.

    To launch a program, press Alt + Spacebar, and then type a few letters in the program name and press Enter. Boom! You can also browse folders the same way. Once you get used to it, it’s a huge time saver.

    cabos-logo.jpg9. Cabos

    Cabos is a Gnutella file-sharing program originally based on
    Limewire and Acquisition. Unlike some other file-shaing programs,
    there’s no spyware, adware, or any other crap to junk up your computer.

    gnucash-logo.png10. GnuCash

    If you recoil in horror at the bloat of financial programs such as
    Microsoft Money and Quicken, GnuCash may suit your needs. It’s a
    slimmer version of those programs, and it has all the features I need
    for managing my meager amount of money.

    The interface is easy enough to understand. It actually looks a lot
    like a digital checkbook ledger. Don’t be fooled, though – GnuCash can
    handle the needs of much more demanding users.

    rssowl-logo.gif11. RSSOwl

    RSSOwl is a cross-platform RSS reader. It allows you to easily track
    updated content on multiple sites. I really like the tabbed interface.

    I find RSSOwl especially useful on a laptop, but on my
    always-connected desktop I prefer a web-based RSS reader, such as
    Google Reader.

    vdub_logo.PNG12. VirtualDub

    VirtualDub is a free video capture and processing utility. Wait,
    it’s more than that. VirtualDub lets you capture video and then
    manipulate it with a multitude of plug-ins and filters. It isn’t a
    full-fledged non-linear editor, but it packs a powerful punch for a
    free program.

    If you work with video on Windows a lot, you probably already know
    about VirtualDub. If you’re just getting into video editing, you should
    grab VirtualDub immediately. Heck, it doesn’t even require installation.

    eraser-logo.png13. Eraser

    If you are paranoid about someone else recovering your sensitive
    deleted data, you owe it to yourself to check out Eraser. When you
    delete a file, your operating system really just removes the reference
    to the file from the file system table. The actual data is still
    present and can be recovered with an undelete utility.

    Eraser securely shreds your sensitive data by overwriting several
    times with multiple, carefully-selected patterns. In other words: once
    you erase it, it’s gone!

    paint-net-logo.png14. Paint.NET

    Paint.NET is to MS Paint what NotePad++ is to Windows Notepad. It’s
    a dandy little photo editor that supports layers, unlimited undo, and a
    host of other features. By all rights, it should come with Windows by
    default.

    Paint.NET isn’t meant to fill the shoes of bigger applications like
    Photoshop or The GIMP, but I use it almost every day for basic photo
    manipulation.

    infrarecorder-logo.png15. InfraRecorder

    Need CD/DVD burning software for Windows? It doesn’t get much better than InfraRecorder (by the same author of TUGZip).

    InfraRecorder can burn audio/data discs. It can handle multi-session
    discs, creation and burning of disc images (ISO and BIN/CUE), and can
    even save audio/data track information to separate files. Oh yeah, it
    also has a portable version.

    autohotkey-logo.png16. AutoHotkey

    It’s hard to know where to begin with this one. What can you do with AutoHotkey? Almost anything!

    For starters, by using custom keystrokes and mouse-clicks, you can
    automate practically any repetitive task. Define any shortcut for
    Windows. Remap keys and buttons any way you please. Control your mouse
    cursor with your keyboard. By writing your own scripts, the potential
    is limitless.

    gantt-logo.png17. GanttProject

    If you need to do any project management, GanttProject will help you
    get everything organized. As the name implies, it uses Gantt charts and
    resource load charts to help break a project into a tree of tasks,
    complete with dependencies.

    GanttProject even allows you to exchange data with Microsoft Project, though you may find that you have no reason to do so.

    mp3gain-logo.gif18. MP3Gain

    MP3Gain is a simple and elegant application that serves one main
    purpose – to automatically adjust MP3 files so they all play at the
    same volume. It does it without decoding and re-encoding, so the quality remains the same. No more fiddling with the volume between different songs.

    filezilla-logo.png19. Filezilla

    Way back in the day, I used WS_FTP. Now I exclusively use Filezilla
    for my file transfer needs. It supports SFTP, allows for bandwidth
    speed limits, and easily saves server settings.

    Best of all, it seamlessly combines with text editors (such as Notepad++) for quick-and-dirty file editing on the remote server!

    wesnoth.jpg20. Battle for Wesnoth

    After all this downloading, it’s time to take a break and have some
    fun. Battle for Wesnoth is a single/multiplayer turn-based strategy
    game with a fantasy theme. You can build an army from different kinds
    of units, such as trolls, elves, dwarves, and orcs. There are a number
    of standard campaigns included, plus a growing number of user-authored
    campaigns available on the campaign server.

    The music is well done. As a composer, I appreciate games that incorporate an orchestral soundtrack.

    alien-arena.jpg21. Alien Arena

    If fantasy isn’t your thing, maybe you will like Alien Arena, a
    deathmatch-type game along the lines of Quake III and Unreal
    Tournament. The action is fast and furious, and for me mostly consists
    of running around and dying. I tend to suck at first-person deathmatch games anyway, but the game is quite engrossing.

    The 2008 version just came out earlier this year, so join the servers and start fragging.

  • Protect Your Privacy When Downloading


    Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent
    told us about the scary warning letter she received from her ISP about
    a big media company who filed a complaint. Fact is, whether you’re
    downloading copyrighted material or not, no one likes to have their
    activities online monitored. Let’s take a look at ways you can protect
    your downloading and file sharing privacy, and prevent the big media
    companies and other anti-P2P organizations from spying on your file
    sharing habits.

    NOTE: It would be irresponsible to assure you that all of the
    methods highlighted below are foolproof. However, each method can do a
    lot to increase your privacy and security when you’re downloading.

    How You Get Caught Sharing Files with BitTorrent

    bittorrent-schema.pngWhen
    you download a file using BitTorrent, you’re connecting to several
    peers who are distributing chunks of the file you’re downloading. In
    order to send data back and forth, you and your peers exchange IP
    addresses. (IP addresses are like mailing addresses for sending data
    over the vastness of the internet). When you’re downloading copyrighted
    material, sometimes disingenuous organizations will join in the
    download and log your information, like your home IP address. Once they
    have your address, they can find out who your ISP is and contact them
    to complain about copyright-infringing activity.

    There are a few methods you can employ to protect yourself from
    this sort of tracking when you’re sharing files with BitTorrent, thus
    setting up a layer of protection between you and those who might track
    you and report you. Below I’ll cover a couple: PeerGuardian2 and
    proxies—particularly a new proxy service called BTGuard.

    Keep Anti-P2P Trackers Away from Your BitTorrent Downloads with PeerGuardian2

    IP-blocking application PeerGuardian2 (PG2) uses a constantly updated blacklist of IP addresses known to track your activity. I mentioned PG2 in my intermediate guide to BitTorrent, but it bears refreshing. Here’s how it works:

    who-to-block.pngThe
    first time you run PeerGuardian2 after you install it, you’ll have to
    go through a setup wizard to tell PeerGuardian what kind of blacklists
    to download and block. By default, PG2 already has Anti-P2P
    organizations checked. For our purposes, that’s really all you need,
    but PG2 is capable of blocking more IPs if you have other privacy
    concerns beyond P2P that you want to address.

    update-schedule.pngOn
    the next window of the PG2 setup wizard, you need to set your automatic
    update preferences. Since your privacy is only as good as your
    blacklists, you want to ensure that you’ve always got the latest and
    greatest lists available, so I’d recommend choosing to check automatic
    updates every day.

    Now you’re done setting up PG2. On the last window of the setup
    wizard, you’ll notice a disclaimer similar to the disclaimer I made
    above. Remember, PG2 is not and cannot be 100% effective, but it will
    provide a good deal more protection than downloading without.

    donwloading-list.pngWhen
    you click finish on the wizard, PG2 will run its first check for
    updates, downloading the blacklist for Anti-P2P organizations. With PG2
    running, you’ll never connect to the IP addresses on the Anti-P2P
    blacklist, meaning that those organization can’t log your IP and your
    participation in a copyrighted download.

    Obscure Yourself from Anti-P2P Trackers with a Proxy

    When it comes to privacy on the internet, no solution is better than a
    good proxy—whether we’re talking about no-hassle proxy solutions like previously mentioned Vidalia (which makes setting up a proxy through the Tor project a breeze) or techier solutions, like rolling your own SSH proxy.


    If we’re talking about file sharing, a proxy protects you by routing
    all of your traffic through another server when it leaves your computer
    and before it comes back to you. That means that when you’re
    downloading data using a peer-to-peer protocol like BitTorrent, your
    peers can only see the proxy IP address, not your home IP address—so
    even if they are tracking your activity, they’re not actually tracking your address at all.

    There are a number of proxy servers out there, including the well
    known The Onion Router network (Tor). The catch is, Tor is a proxy
    project that’s already choked for servers and speed, and using Tor to
    download via BitTorrent is considered poor form. However, there are
    other proxy servers out there, including one made specifically for
    BitTorrent routing called BTGuard.

    Located in Canada, BTGuard is a subscription service (about
    $7/month) that promises anonymous BitTorrent connections, unlimited
    speeds, and that it can bypass your ISP’s bandwidth throttling (if your
    ISP throttles BitTorrent).

    The main catch when sending your BitTorrent traffic through proxies
    is that you’ll most likely see a speed drop, and sometimes it’s a very
    significant drop. According to the TorrentFreak weblog,
    though, BitTorrent transfers with BTGuard are almost equal to a direct
    connection—meaning you get all the protection of a proxy without any of
    the nasty slowdown.


    To set up a proxy in the popular BitTorrent client, uTorrent, just go
    to the uTorrent preferences, click on Connection in the sidebar, and
    then find the Proxy Server section. From there, choose your proxy
    server type (Socks4/5, HTTP or HTTPS), enter in the address and port of
    your proxy server, and include any login information if your proxy uses
    it. (If you’re using BTGuard, for example, you’ll be given a username
    and password when you sign up.) Finally, be sure to tick the checkbox
    labeled “Use proxy server for peer-to-peer connections”, which is the
    whole reason you’re setting it up to begin with.


    Anecdotes of folks who’ve been caught downloading copyrighted material
    are always a little scary. Despite the legal issues involved, don’t
    forget that BitTorrent is only a protocol, and you choose how to use
    it. BitTorrent isn’t synonymous with copyright infringement—there are
    plenty of legal uses and legal downloads going on with BitTorrent
    applications every day.

    Whether or not you’re using your BitTorrent client to download
    copyrighted materials, no one likes being spied on. If you’re really
    serious about protecting your privacy, a proxy solution is probably the
    best. There are several drawbacks to proxies, most notably speed
    issues, but also difficulty in finding reliable free proxies or the
    cost of a service like BTGuard.

    PeerGuardian2 is freeware, easy to use, and will never slow down
    your downloads. However, it’s much more susceptible to holes than
    proxies, since an IP-blocker is only as good as its blacklist, and
    those lists have to change and update regularly to keep up with the
    Anti-P2P addresses.

    If you practice safe(r) BitTorrenting using one of these methods or
    an entirely different approach, share your experience in the comments.
    Alternately, if you throw caution to the wind, downloading copyrighted
    material with impunity, we’d love to hear your thoughts as well.

    For those of you who are still new to BitTorrent, check out our beginner and intermediate guides.

    Adam Pash is a senior editor for Lifehacker who encourages safe downloading. His special feature Hack Attack appears regularly on Lifehacker. Subscribe to the Hack Attack RSS feed to get new installments in your newsreader.

  • The Best of Lifehacker in Upgrade Your Life


    The second edition of the Lifehacker book, Upgrade Your Life,
    is a compilation of the best 116 hacks and downloads from Lifehacker’s
    archives. This dead tree version of the web site transforms dozens of
    blog posts into comprehensive, edited tutorials, which will be familiar
    to longtime readers. While an official electronic version of Upgrade Your Life
    isn’t available, today I’ve pulled together links to all the past posts
    that informed each book chapter to give you a one-stop preview of
    what’s inside that cover. Consider this post the unedited web version
    of the book. After the jump, get a ginormous roundup of all the posts
    that created Upgrade Your Life by chapter. And shhhh, don’t tell my book publisher I’m giving this all away.

    Upgrade Your Life Table of Contents


    Chapter 1: Control Your Email

    Hack 1: Empty Your Inbox (and Keep It Empty)
    “When you can consistently reduce the contents of your inbox to zero
    messages, you’ve reached the ultimate level of email control.”

    Related posts:

    Hack 2: Decrease Your Email Response Time
    “Responding to your email in a timely, professional manner is one of the best things you can do for your career.”
    Related posts:

    Hack 3: Craft Effective Messages
    “The clearer your email messages are, the more likely you are to get
    the result you want in a more timely fashion-whether it’s a response, a
    completed task, or an informed recipient.”

    Hack 4: Highlight Messages Sent Directly to You
    “When faced with an inbox full of new, unread email, it’s nearly
    impossible to determine which messages need to be dealt with right
    away, and which can be put off until later.”

    Related posts:

    Hack 5: Use Disposable Email Addresses
    “If you hate the idea of giving your email address to any web site
    that asks for it, and you want to protect your email address from junk
    mail and spam, use a disposable email address instead.”

    Related posts:

    Hack 6: Master Message Search
    “In the physical world you can’t throw years worth of letters,
    cards, and memos into a drawer and then pick out the one Tom sent you
    about that fabulous rental he got in Key West back in 2003 in seconds.
    However, that is absolutely possible with an email folder containing
    thousands of messages.”

    Related posts:

    Hack 7: Future-Proof Your Email Address
    “You’ve probably got as many email addresses as you do pairs of
    socks, but you don’t want to change them as often. In fact, switching
    your primary email address can be a big inconvenience that leads to
    missed messages and lost relationships.”

    Related posts:

    Hack 8: Consolidate Multiple Email Addresses with Gmail (New in 2nd Edition!)
    “Gmail is not only an email host, it’s an email client that can
    fetch mail from any number of external services and consolidate it all
    right there in your Gmail inbox.”

    Hack 9: Script Repetitive Responses
    “To knock down repetitive email quickly, build up a set of scripted
    email responses that you can drop into emails quickly, personalize if
    necessary, and send off without spending the time composing the same
    information every time.”

    Related posts:

    Hack 10: Filter Low-Priority Messages (‘Bacn’)
    “Your spam filter shuttles junk mail out of sight, but what about
    messages from cc-happy co-workers, Aunt Eunice’s forwarded emails,
    Facebook friend notifications, Google Alerts, and mailing list messages
    that clutter your inbox with low-priority noise?”

    Related posts:


    Chapter 2: Organize Your Data

    Hack 11: Organize Your Documents Folder
    “If you frequently find yourself letting files clutter your
    computer’s desktop, or if you spend time arranging files in a deep,
    complicated hierarchy of folders, it’s time for a revamp.”

    Related posts:

    Hack 12: Instantly Retrieve Files Stored on Your Hard Drive
    “Every minute you spend on your computer, you’re collecting more and
    more data, documents, and information to do your job and get on with
    your life. Instant retrieval of the bit or byte that you need right
    this very second is an essential requirement in the digital age.”

    Related posts:

    Hack 13: Overhaul Your Filing Cabinet
    “One of the main clutter culprits in most offices is the To File
    pile. Often this heap spontaneously appears right on top of or next to
    the filing cabinet, which is pretty silly. Instead of adding stuff to
    the pile, why wouldn’t you just file it? The reason is generally an
    unworkable, messy, overflowing file cabinet.”

    Related posts:

    Hack 14: Instantly Recall Any Number of Different Passwords
    “Remembering a unique password for the dozens of logins you have may
    sound impossible, but it’s not. You don’t need to remember 100
    passwords if you have one rule set for generating them.”

    Related posts:

    Hack 15: Securely Track Your Passwords
    “Sometimes you just have to write down a password to remember it.
    Don’t do it where others can read it, like on a Post-It note or in an
    easy-to-read text file or Word document. You can keep a secure and
    searchable database of those hard-to-remember passwords using free,
    open source software.”

    Related posts:

    Hack 16: Tag Your Bookmarks
    “The web gets bigger every day, and so does your bookmark list.
    Stores your bookmarks online and associate keywords (called tags) to
    each for easy retrieval.”

    Hack 17: Organize Your Digital Photos (New in 2nd Edition!)
    “After even just a few months of taking photos, it’s easy to wind up
    with a hard drive cluttered with a bunch of folders filled with images
    named things like IMG_8394.jpg. Pictures don’t mean anything unless
    someone sees them, and no one will see the photos buried on your
    computer if you can’t find the best ones.”

    Hack 18: Create Saved Search Folders (New in 2nd Edition!)
    “As you begin to file your documents less and depend on searches
    more, it only makes sense to combine the folder paradigm and search
    capabilities with saved search folders.”

    Related posts:

    Hack 19: Create a Password-Protected Disk on Your PC
    “Everyone has some files the person would like to protect from intruders or others who have access to one’s computer.”
    Related posts:

    Hack 20: Create a Password-Protected Disk on Your Mac (New in 2nd Edition!)
    “If you have files and folders you’d like to keep private and secure
    on your Mac, you can use Mac OS X’s built-in Disk Utility to encrypt a
    disk image.”

    Related posts:

    Hack 21: Design Your Own Planner
    “There are lots of good reasons to ditch your expensive, electronic
    PDA for a paper-based planner system: cost, portability, and
    maintenance, to name a few. Paper-based planners never run out of
    battery juice or memory; they never crash or refuse to work the way you
    expect.”

    b>Related posts:


    Chapter 3: Trick Yourself into Getting Done

    Hack 22: Make Your To-Do List Doable
    “Your to-do list can be a tool that guides you through your work, or
    it can be a big fat pillar of undone time bombs taunting you and your
    unproductive inadequacy. It all depends on how you write it.”

    Related posts:

    Hack 23: Set Up a Morning Dash
    “There is one way to ensure that you’ll knock at least one thing off
    your list: Dedicate the first hour of your day to your most important
    task-before you check your email, paper inbox, or go to any meetings.”

    Related posts:

    Hack 24: Map Your Time
    “The busy person’s perennial question is, “Where did the day go?”
    It’s easy to get tossed from one thing to the next like a piece of
    driftwood caught in the tide of your crazy life.”

    Related posts:

    Hack 25: Quick-Log Your Work Day
    “When you start keeping a daily work log, you might be surprised to find out what your workday really consists of.”
    Related posts:

    Hack 26: Dash Through Tasks with a Timer
    “Trick yourself into getting going by making a commitment to work on
    the task for just a handful of minutes-minutes that will end at the
    beep of a timer in a small, quantifiable amount of time.”

    Related posts:

    Hack 27: Form New Habits with Jerry Seinfeld’s Chain (New in 2nd Edition!)
    “Once upon a time, Jerry Seinfeld gave a young comic advice.”
    Related posts:

    Hack 28: Control Your Workday
    “Getting out of the office on time is tough when there’s always
    another task, project, or drive-by boss request to knock out before you
    leave. It’s easy to lose a day checking email, going to meetings, and
    putting out fires only to find that at 5 or 6 or 7 p.m., you haven’t
    gotten started on something critical.”

    Related posts:

    Hack 29: Turn Tasks into Gameplay
    “Ever wish you could knock down the items on your to-do list with
    the same gusto you fit blocks together in Tetris or collect gold coins
    in Super Mario Bros?”

    Related posts:


    Chapter 4: Clear Your Mind

    Hack 30: Send Reminders to Your Future Self
    “Every day you’ve got a lot on your mind and a lot to do. As a
    result, it can be nearly impossible to remember mundane recurring
    tasks—like when it’s time to change the oil or go to the dentist—or
    even important yearly events, like friends’ and family birthdays.”

    Related posts:

    Hack 31: Build Your Personal Wikipedia
    “The collaboratively edited Wikipedia is a vast, searchable
    repository of information, constantly written and re-written by its
    readers. Don’t you wish you or your group could have your own editable
    encyclopedia of brain dumps and documentation like Wikipedia? You can.”

    Related posts:

    Hack 32: Develop Your (Digital) Photographic Memory
    “A ubiquitous capture device can change the way you remember (and forget) things for good. With a photo-sharing service like Flickr, you can capture and file away your digital photographic memory in the internet cloud from wherever you are.”
    Related posts:

    Hack 33: Take Great Notes
    “Taking effective notes is a critical skill that moves your
    projects, your career, and your education forward. This hack covers
    three practical note-taking methods, as well as how to make your own
    custom notepaper.”

    Related posts:

    Hack 34: Organize Your Life with Remember the Milk (New in 2nd Edition!)
    “Now it’s more important than ever to consolidate your lists into
    one, always-accessible place. There are dozens of robust, free online
    organizers out there, but one of the most stable and mature in the
    bunch is a web application called Remember the Milk.”

    Related posts:

    Hack 35: Organize Your Life in Text Files
    “No matter how many new-fangled personal organizer applications
    become available, new computer users and veterans alike still turn to
    the old standby for tracking to-do’s: a file called todo.txt.”

    Related posts:


    Chapter 5: Firewall Your Attention

    Hack 36: Limit Visits to Time-Wasting Web Sites
    “It’s too easy to scamper down the rabbit hole of the web when you’ve got pressing tasks to work on.”
    Related posts:

    Hack 37: Permanently Block Time-Wasting Web Sites
    “Is there a web site that’s utterly toxic to your mental state or
    ability to work? The preceding hack describes how to block time-wasting
    web sites during certain times of the day and week. Alternatively, you
    can block sites at all times, until you explicitly release the
    restriction.”

    Related posts:

    Hack 38: Reduce Email Interruptions
    “Unread email is just another shot of the information drug your
    hungry mind craves. It cries out to you, ‘Open me! Open me!’ However,
    when you need to focus, do yourself a favor: actively control when you
    check your email.”

    Related posts:

    Hack 39: Split Your Work Among Multiple Desktops
    “The more space you have to lay out your materials, the easier it is to get a job done.”
    Related posts:

    Hack 40: Build a No-fly Zone
    “Many modern office spaces have open layouts to ‘promote interaction
    between departments’—which means they’re set up to distract you all day
    long.”

    Related posts:

    Hack 41: Clear Your Desktop
    “It’s amazing how fast your computer’s desktop can fill up with
    shortcuts and files and turn into a virtual candy store of colorful
    icons beckoning your mouse pointer: ‘Click me! Click me!’”

    Related posts:

    Hack 42: Make Your House a Usable Home
    “Your home should be a tool that helps you get things done, a space
    that’s a pleasure to be in and a launch pad for daily tasks as well as
    your life goals.”

    Related posts:

    Hack 43: Sentence Stuff to Death Row
    “Prune your information channels down to the ones most worth your
    time to keep up a solid attention firewall. One technique for doing so
    is sentencing certain information streams to a virtual death row.”

    Related posts:

    Hack 44: Drown Out Sound with Pink Noise
    “If your co-worker’s conversation down the hall is distracting you,
    or your downstairs neighbor’s television is blaring up through your
    floor, block out the sound with a soft static noise.”

    Related posts:


    Chapter 6: Streamline Common Jobs

    Hack 45: Search the Web in Three Keystrokes
    “There are dozens of ways to do a web search from your desktop, but the most common method takes the longest.”
    Related posts:

    Hack 46: Command Your Windows PC from the Keyboard (New in 2nd Edition!)
    “The graphical user interface revolutionized personal computing
    because it made using a computer so much more visual. However, using
    the mouse is one of the most inefficient ways to drive a computer.”

    Hack 47: Command Your Mac from the Keyboard (New in 2nd Edition!)
    “Skip time-wasting point-and-click mouse movement on your Mac using free software called Quicksilver, which is a keyboard interface to an astonishing variety of computing actions.”
    Related posts:

    Hack 48: Reduce Repetitive Typing with Texter for Windows (New in 2nd Edition!)
    “Define short abbreviations for phrases you use often, or
    misspellings you’re prone to, and automatically expand those
    abbreviations to their full, intended form. This hack explains how to
    do that using the free Windows application, Texter.”

    Related posts:

    Hack 49: Reduce Repetitive Typing with TextExpander for Mac (New in 2nd Edition!)
    “In the same vein as Hack 48, Mac users can save thousands of
    keystrokes daily using the text substitution application TextExpander.”
    Related posts:

    Hack 50: Text Message Efficiently
    “To the uninitiated, texting can seem inconvenient, but text messages have numerous advantages over voice calls.”
    Related posts:

    Hack 51: Batch Resize Photos
    “Everyone likes to email digital photos, but no one likes to receive
    pictures that are so huge they take forever to download and require you
    to scroll left and right and up and down to see the entire image.”

    Related posts:

    Hack 52: Send and Receive Money on Your Cell Phone
    “Popular online payment service PayPal is a quick and easy way to
    email money to friends and co-workers — to cover your share of the
    dinner bill or to pitch in on a shared gift or to make a payment for
    work done.”

    Related posts:

    Hack 53: Bypass Free Site Registration with BugMeNot
    “An active web surfer can easily accumulate dozens of logins for
    various sites across the web. But what about when you don’t want to go
    through the whole rigmarole of registering for a web site—you simply
    want inside?”

    Related posts:

    Hack 54: Speed Up Web Pages on a Slow Internet Connection
    “When you’re surfing the Web on a slow connection, it can seem like
    grass grows faster than the download progress meter on your web browser
    turns.”

    Related posts:

    Hack 55: Securely Save Web Site Passwords
    “One of the most convenient features in Firefox is its capability to
    save the passwords you use to log on to web sites—like your web mail
    and online banking—so you don’t have to type them in every time.”

    Related posts:

    Hack 56: Become a Scheduling Black Belt with Google Calendar
    “This hack covers more advanced uses for GCal, such as adding and
    getting events from anywhere, subscribing to multiple calendars,
    sharing calendars, booking inanimate objects such as a conference room,
    and inviting multiple people to events.”

    Related posts:

    Hack 57: Scan Text to PDF with Your Camera Phone (New in 2nd Edition!)
    “You’re looking at a whiteboard full of notes or a paper document
    you want to copy quickly. Instead of manually transcribing the text,
    you can “scan” the information using a digital camera, including the
    one built in to your cell phone. Web application Qipit turns digital photos that contain text into PDF files for you automatically.”

    Related posts:

    Hack 58: Poll Groups of People with Doodle (New in 2nd Edition!)
    “Anyone who’s had to schedule a meeting or get-together for a large
    group of people knows how difficult finding a date that works for
    everyone can be. Whether it’s a family reunion or board meeting, when
    more than five people are involved, everyone’s schedule gets in the
    way.”

    Related posts:


    Chapter 7: Automate Repetitive Tasks

    Hack 59: Automatically Back Up Your Files to an External Hard Drive (PC)
    “Backing up your data could possibly be the dullest — yet most
    indispensable — thing you do on your computer. But who remembers to do
    it? You don’t have to.”

    Related posts:

    Hack 60: Automatically Back Up Your Files to an External Hard Drive (Mac) (New in 2nd Edition!)
    “Mac users who thumb through Hack 59, which details how to back up
    your PC’s files on a daily, weekly, and monthly basis, have a right to
    a smug laugh. The most recent version of Mac OS X 10.5, Leopard, ships
    with a comprehensive backup application called Time Machine that
    requires only two steps to set up.”

    Related posts:

    Hack 61: Automatically Back Up Your Files Online (New in 2nd Edition!)
    “Hurricane Katrina victims can tell you that no matter how
    diligently you back up your computer to a local hard drive—as detailed
    in Hacks 59 and 60—you will still lose your photos, documents, and
    other important files if you don’t keep a copy off-site, preferably out
    of state. “

    Related posts:

    Hack 62: Automatically Empty Your Digital Junk Drawer (PC)
    “You don’t want to clean up after yourself every time you work with
    a set of files you don’t need to keep, and you don’t have to.”

    Related posts:

    Hack 63: Automatically Clean Up Your Mac (New in 2nd Edition!)
    “Just as in the physical world, it’s easy to let digital clutter
    accumulate on your Mac. Chances are, your Downloads folder contains
    no-longer relevant files, or your Desktop is covered in documents,
    images, and songs you finished with last week.”

    Related posts:

    Hack 64: Automatically Reboot and Launch Applications
    “A PC that’s on continuously 24 hours a day—especially when it’s
    hard at work at night, running automated tasks outlined in this
    chapter—can benefit from a regular reboot to clear out memory and end
    any hanging software processes.”

    Related posts:

    Hack 65: Make Google Search Results Automatically Come to You (New in 2nd Edition!)
    “Keeping up with any news published online about a certain topic
    used to mean searching the web for it every so often, or checking
    various online news sites. But not any more. Google now offers free
    email alerts when certain search terms appear on web pages, as they are
    published.”

    Related posts:

    Hack 66: Automatically Download Music, Movies, and More
    “Your web browser does a good job of fetching web documents and
    displaying them, but there are times when you need an extra-strength
    program to get those tougher download jobs done.”

    Related posts:

    Hack 67: Automatically Email Yourself File Backups
    “When my sister-in-law asked me how she could back up her master’s
    thesis without any special equipment or software, I had to think for a
    minute. ‘Email it to yourself,’ I finally told her.”

    Related posts:

    Hack 68: Automatically Update a Spreadsheet
    “A spreadsheet is a great way to track progress on any type of
    undertaking that involves numbers—like how much weight you’ve lost, how
    many widgets you made, how many miles you ran, or how many cigarettes
    you smoked. But who remembers to update his spreadsheet by hand?”

    Related posts:


    Chapter 8: Get Your Data To Go

    Hack 69: Manage Your Documents in a Web-Based Office Suite (New in 2nd Edition!)
    “A profound shift in modern computing is afoot: a move from desktop
    software to the web. Mature web browsers, always-on broadband Internet
    connections, and an increase in mobile users has spurred a new breed of
    web sites that aren’t just static pages—they’re hosted software
    applications (web applications, or webapps) that you access from your
    browser.”

    Hack 70: Replace Your Laptop with a Portable Drive (New in 2nd Edition!)
    “You’re headed to your in-laws for the holiday week and you don’t
    want to drag your laptop with you. Instead, take along a small hard
    drive that you can plug into their PC and get your own custom Windows
    desktop, applications, and files.”

    Related posts:

    Hack 71: Carry Your Life on a Flash Drive
    “Instead of lugging around your laptop, or emailing yourself files,
    store your favorite software applications and important data on a thumb
    (flash) drive about the size of a car key.”

    Related posts:

    Hack 72: Access Web Apps and Search via Text Message
    “You’re out and about town and you need to call a local cab, find
    out movie times at theaters nearby, or check the weather forecast. You
    don’t need a laptop or even a tricked-out PDA to search the Web: you
    can do it directly from any phone that can send text messages.”

    Related posts:

    Hack 73: Create a Virtual Private Network (VPN) with Hamachi (New in 2nd Edition!)
    “You can do things between computers on your local network that you
    can’t from out on the Internet, such as listen to a shared iTunes
    library or access files in shared folders. But using the free, virtual
    private network application Hamachi, you can access your computer from anywhere on the Internet as if you were home on your local network.”

    Related posts:

    Hack 74: Run a Home Web Server
    “Web servers are usually loud, scary, headless machines in cold windowless rooms, but you can run one under your desk at home.”
    Related posts:

    Hack 75: Remotely Control Your Home Computer
    “Ever been at a friend’s house and wanted to show off a photo you
    left saved on your home computer? Want to check from the office that
    your daughter’s doing homework and not instant messaging with friends
    at home? Need to grab a file on your home hard drive when you’re miles
    away? With a relatively old protocol called VNC (Virtual Network
    Computing) and some free software, you can remotely control your home
    computer from anywhere.”

    Related posts:

    Hack 76: Give Your Home Computer a Web Address
    “Accessing your home computer from the Internet is a lot easier if a
    memorable, permanent web address such as yourname.com points to it.”

    Related posts:

    Hack 77: Optimize Your Laptop
    “More folks than ever are hitting the pavement with a notebook
    computer under one arm, but any road warrior can tell you that life
    with a lappie isn’t always easy. This hack provides some hints and tips
    for extending the life of your laptop and easing the pain of the
    never-ending outlet and hotspot hunt.”

    Related posts:

    Hack 78: Back Up Data to Your iPod
    “Your iPod isn’t just a music player—it’s a giant external hard
    drive that can store any kind of digital data in addition to music.”

    Related posts:

    Hack 79: Turn Your Cell Phone into a Modem
    “You’re stuck with the laptop in the land of no internet, but you
    have unlimited minutes or a great data plan on your cell phone. What to
    do? Plug that phone into your laptop, of course, and get surfing!”

    Related posts:

    Hack 80: Use GMail as an Internet Hard Drive
    “An easy way to make files available from any internet-connected
    computer is to simply email them to yourself (at GMail or any other
    web-based email service.) But a free software application makes keeping
    your files up in the GMail ‘cloud’ and accessible from any web browser
    even easier.”

    Related posts:


    Chapter 9: Master the Web

    Hack 81: Google Like a Pro
    “Google’s single, one-line input box conceals a host of functionality that can narrow your results to exactly what you need.”
    Related posts:

    Hack 82: Subscribe to Web Sites with RSS
    “Like a magazine subscription that automatically brings each new
    issue to your door, you can subscribe to web site feeds that push
    information to your door.”

    Related posts:

    Hack 83: Add Engines to Your Browser’s Search Box (New in 2nd Edition!)
    “In Hack 45, you learned how to search the Web in three keystrokes
    using this search box. By default, Firefox now comes with Google,
    Yahoo!, Amazon, eBay, Answers.com, and Creative Commons installed. But
    you can add several more useful engines for quick results without
    visiting individual pages first to run your search.”

    Related posts:

    Hack 84: Quick Search from the URL Bar
    “Another keyboard-driven method for searching the web is what
    Firefox calls Quick Searches—customizable, keyword-based searches from
    the Firefox address bar.”

    Related posts:

    Hack 85: Extend Your Web Browser
    “The best feature of popular open-source web browser Firefox is its
    openness: the browser was built so that anyone can write a
    feature-adding extension for it.”

    Related posts:

    Hack 86: Supercharge Your Firefox Downloads with DownThemAll! (New in 2nd Edition!)
    “When it comes to heavy-duty download jobs, Firefox’s default
    Downloads manager just doesn’t cut the mustard. If you need closer
    control of multiple, large downloads, you need the DownThemAll! Firefox
    extension.”

    Related posts:

    Hack 87: Get Ten Must-Have Bookmarklets
    “Bookmarklets can enhance web pages, add special functionality, and
    make your browsing experience a lot more efficient by offering
    one-click access to useful tools.”

    Related posts:

    Hack 88: Find Reusable Media Online (New in 2nd Edition!)
    “You’re designing a new brochure, PowerPoint presentation, web site,
    or flyer and you need the right image to use with it fast. Put your
    hands in the air and step away from the cheesy clip art, now.”

    Related posts:

    Hack 89: Get Your Data on a Map
    “This hack points you to several of the best mashups that can help
    you adjust your commute home from work for traffic, decide where to
    live, help you find a nearby used car for sale, and figure out how far
    your jog across the bridge this morning really was.”

    Related posts:

    Hack 90: Set Multiple Sites as Your Homepage
    “You can set several web pages as your homepage in tabbed browsers
    (like Firefox and Internet Explorer 7) and also bookmark and open sets
    of tabs.”

    Related posts:

    Hack 91: Access Unavailable Web Sites via Google
    “Web sites go offline. They move, occasionally suffer from temporary
    unavailability or errors, or become slow to respond because of
    technical difficulties or a period of high user demand. In those cases,
    when you need the information right away, you need a mirror of that web
    site’s content.”

    Related posts:

    Hack 92: Take Your Browser Configuration with You
    “Now that you’ve tricked out your copy of Firefox with extensions,
    bookmarklets, sets of bookmarks, and Quick Searches, the last thing you
    want to do is have to set it all up again at another computer. If you
    get a new computer, or want to transport your settings at home to the
    office, a handy utility called MozBackup can help.”

    Related posts:

    Hack 93: Find Out About a Web Site
    “When you find information on the web at a site you’ve never seen
    before, it’s difficult to assess how trustworthy that source is.
    Although ultimately the decision is yours, there are several services
    that provide information about other web sites that can help you
    decide.”

    Hack 94: Have a Say in What Google Says About You
    “Someone out there’s trying to find information about you right now,
    whether it’s a potential employer, date, or a long lost friend. What
    happens when she Googles you?”

    Related posts:

    Hack 95: Capture Web Clippings with Google Notebook
    “Collecting bookmarks just isn’t enough when you’re doing serious
    web research. Web pages disappear, or the information you need is just
    one paragraph halfway down the page, or you want to annotate a page
    with your own notes for later reference.”

    Related posts:

    Hack 96: Clear your Web Browsing Tracks
    “Your web browser saves a lot of information about where you go and what you do online while you’re surfing the web.”


    Chapter 10: Hone Your Computer Survival Skills

    Hack 97: Rescue Your PC from Malware
    “The scourge of personal computing in recent years has been malware:
    malicious software that installs itself without the user’s consent and
    undermines the computer’s operation for nefarious purposes, from
    identity theft to aggressive advertising to common vandalism.”

    Related posts:

    Hack 98: Clean Up Your Startup
    “When it comes to computer slowdowns that get worse over time, one
    of the biggest culprits is software installations that plant themselves
    in your PC’s login sequence and start up automatically with your
    computer.”

    Related posts:

    Hack 99: Undo System Configuration Changes
    “You installed unstable software or made a configuration change to
    your PC that broke things left and right. Don’t worry – all is not
    lost.”

    Related posts:

    Hack 100: Truly Delete Data from Your Hard Drive
    “The only sure way to securely and permanently delete sensitive
    files—like a customer database, secret company documents, or personal
    photos you don’t want the guy who buys your hard drive on Ebay to
    see—is to overwrite them several times with new data.”

    Related posts:

    Hack 101: Compare and Merge Files and Folders with WinMerge (New in 2nd Edition!)
    “When several people work on the same set of files — making changes
    and copies — multiple versions can blossom out of control. Figuring out
    what’s been updated on which version and merging it all back together
    can be a gargantuan task, but it doesn’t have to be.”

    Related posts:

    Hack 102: Firewall Your PC
    “A home PC connected directly to the internet—especially with an
    always-on broadband connection like cable or DSL—is a prime target for
    malicious software attacks.”

    Related posts:

    Hack 103: Firewall Your Mac (New in 2nd Edition!)
    “Surprisingly, your new Mac doesn’t ship with its firewall turned on
    by default. That’s not a problem if your Mac accesses the Internet
    through another device that has a firewall on, such as a wireless
    router. But if you connect your Mac to the Internet at public wireless
    hotspots, or plug it directly into your broadband Internet connection,
    you should enable the firewall to avoid unwanted connections from other
    computers.”

    Related posts:

    Hack 104: Speed Up Windows Vista with a Thumb Drive (New in 2nd Edition!)
    “The best way to make a computer run faster is to add more system
    memory, or RAM. But not all computers have expansion slots available
    for additional memory, and installing internal memory sticks can be an
    intimidating undertaking for those who’ve never opened their computer
    and faced its silicon innards. That’s why Microsoft introduced a new
    feature into Windows Vista called ReadyBoost, which lets you add memory
    to your PC with a regular USB flash drive.”

    Related posts:

    Hack 105: Free Up Hard Drive Space
    “Hard drive space is cheap and plentiful, but you don’t have to run
    out to buy a whole new drive the minute you start pushing your current
    disk’s space limits.”

    Related posts:

    Hack 106: Resurrect Deleted Files
    “When you delete files from your computer’s hard drive, the data is
    not actually erased. In reality, the space it occupies is marked as
    available for your operating system to overwrite with new data.”

    Related posts:

    Hack 107: Hot Image Your PC for Instant Restoration (New in 2nd Edition!)
    “Over time and with heavy usage, your PC can become slow and
    unstable, bogged down with programs you don’t use and victim of system
    changes that make it behave in ways you never intended. If you’ve ever
    encountered the “blue screen of death” — that is, had your Windows PC
    crash entirely — you may know what a tedious job rebuilding your
    computer can be. Reinstalling the operating system and applications and
    restoring your documents can take time you don’t have.”

    Related posts:

    Hack 108: Recover Files from an Unbootable PC
    “Few moments in computing are as heartbreaking as when you turn on
    your trusty PC only to receive that bone-chilling message: Boot sector
    corrupt. Config.sys missing. Disk cannot be read.”

    Related posts:


    Turns out there’s so much content in the book, our publishing system
    can’t handle it all in one post! Stay tuned for the contents of the
    all-new, Chapter 11 on managing multiple computers in a future post. Update: Here’s chapter 11.

  • Advanced SSH configuration and tunneling: We don’t need no stinking VPN software

    by Noah Gift

    In a recent Red Hat Magazine article, Paul Frields gave some examples of how SSH port forwarding can be used
    to remotely gain access to resources, or ports, from a remote location.
    This article will show a pragmatic implementation of SSH port
    forwarding by demonstrating how to use configuration files and
    conditional statements to create permanent, yet dynamic, SSH
    configurations for your home, office, and any virtual machines you may
    have on your systems.

    Introduction

    An ad-hoc forward of a specific port or two from the command line
    can be very handy, for example forwarding a work-only accessible wiki
    to your home machine, or from a local coffee shop so that you can read
    it. But there is a better way to architect a permanent solution. Many
    people don’t realize that it is completely possible to access at home
    every single resource that you have at work by simply creating SSH
    configuration files that have comprehensive tunneling instructions.
    Contrary to popular belief, this does not require VPN software. It
    requires only an open SSH port, which can be listening on port 22 or
    4010. It doesn’t matter. While this is bad news for commercial vendors
    of VPN software, it is good news for you.

    The world has changed, and now people work from home, from the road,
    and from the coffee shop. In addition, IT workers often use virtual
    machines running on their laptops to simulate production environments.
    By creating comprehensive SSH tunneling configurations, it is possible
    to make a remote machine, along with virtual machines, completely
    integrated into a production environment.

    About SSH config files

    Although reading a man page for something as big as SSH can be
    daunting, I would suggest doing a cursory skim through some of the
    options. It is always a good idea to do at least some skimming before
    engaging in heavy duty use of a command line tool in ways you have
    never used it before. There are two configuration files to be aware of
    for this article. The system-wide configuration file lives in /etc/ssh_config , and the user ssh file lives in ~/.ssh/config.

    Since this is a more advanced article on SSH, it is important to
    know the distinction between the system-wide configuration file and the
    user configuration file. If you run a system cron job and would like
    SSH forwarding to be involved, it is important to note that the /etc/ssh_config
    file needs to be edited. If you need to enable forwarding for a user
    shell, which is most typical, then you should edit the user
    configuration file. The SSH config files also have a man page (man
    ssh_config), and it would be helpful to view that man page as well.

    Creating A Basic SSH Config File

    Getting basic requirements together

    The basics of a creating a customized config file are easy. The
    general idea is to create a configuration that forwards local ports
    that bind to ports on a remote machine. While you are setting up your
    SSH configuration file, it would be a good to keep the iana.org list of ports handy. This will help you decide what port IMAP uses, for example.

    A work network behind a firewall may consist of the following
    resources that are not accessible from outside of the local area
    network.

    SMTP Server:  192.168.0.100			Port:  25	DNS Name:  smtp.pretendco.comCorporate Wiki:  192.168.0.110			Port:  8080    DNS Name:  wiki.pretendco.comIMAP Mail Server:  192.168.0.120		Port:  143	DNS Name:  imap.pretendco.comSubversion Server:  192.168.0.140		Port:  22	DNS Name:  svn.pretendco.comNFS Server:  192.168.0.150			Port:  2049	DNS Name:  nfs.pretendco.comSMB/CIFS Server:  192.168.0.160		Port:  3020	DNS Name:  smb.pretendco.comSSH Server:  192.168.0.170			Port: 22	DNS Name.  dev.pretendco.comVNC Server/Dev Machine:  192.168.0.180 	Port:  5900	DNS Name:  vnc.pretendco.com

    All that is needed to gain access to these resources from elsewhere
    is to have a publicly accessible SSH server with one open port inside
    of the LAN. Let’s suppose this server is called ssh.pretendco.com and that it has sshd (the SSH daemon) listening on port 5001. We can now build an SSH config file based on this information.

    Understanding options

    Now that we have a list of internal IP addresses, DNS names, and the
    ports with the services we would like to access, we can create a
    configuration file with a set of cascading configuration options. SSH
    has many helpful options that I would recommend perusing in the
    ssh_config man page. We are going to focus on the following options:

    The most basic of configuration
    parameters. This gives you the ability to designate sections of the
    config file by hostname and pattern. For example:

    Host *  (this means a section applies to every host)Host ssh.pretendco.com (this means it only applies to ssh.pretendco.com)

    Hostname:
    You can nest multiple host configurations to create custom setups and alias hostnames so that they appear locally like they do at work. For example, a localhost:8080 tunnel could be turned into an alias like:

    Host wiki.pretendco.com	Hostname localhost	Port 2200

    This is handy because it allows you to completely simulate working
    inside of a local area network. And if you have scripts or
    configuration files that are hard coded to work with names inside of
    your LAN, then you will very much enjoy using this configuration.

    ServerAliveInterval: This option can be configured
    to send a message every N seconds to a remote server so that a
    connection will not die. By default it is set to 0 seconds.

    Host and Hostname are really the only options you will need for most
    configurations, but knowing about other options like
    ServerAliveInterval and ServerAliveCountMax can be helpful too. Now
    that we have the basic requirements and understand how to use the
    options, let’s write a configuration file that will create our VPN to
    work.

    Writing ~/.ssh/config

    Here is a configuration file based on the things we just talked
    about. You should be able to use this as a template by plugging in the
    names and ports of the devices you would like to connect to.

    If you have a config file in ~/.ssh/config, make a backup and move the original file. You can do something like this:

    cd ~/.ssh/mv config backup_config_file

    Now you can cut and paste this into a new file you call config.

    ###SSH Port Forwarding Configuration###
    
    ####Global Configuration Options###
    
    #Host * will apply to all hostsHost *    ServerAliveCountMax 4       #Note default is 3    ServerAliveInterval 15      #Note default is 0
    
    ####Port Forwarding Directives###
    
    #Network Reference, Cheat Sheet:#Refer to http://www.iana.org/assignments/port-numbers for full list of port numbers#SMTP Server:  192.168.0.100         Port:  25   DNS Name:  smtp.pretendco.com#Corporate Wiki:  192.168.0.110          Port:  8080    DNS Name:  wiki.pretendco.com#IMAP Mail Server:  192.168.0.120        Port:  143  DNS Name:  imap.pretendco.com#Subversion Server:  192.168.0.140       Port:  22   DNS Name:  svn.pretendco.com#NFS Server:  192.168.0.150          Port:  2049 DNS Name:  nfs.pretendco.com#SMB/CIFS Server:  192.168.0.160     Port:  3020 DNS Name:  smb.pretendco.com#SSH Server:  192.168.0.170          Port: 22    DNS Name.  dev.pretendco.com#VNC Server/Dev Machine:  192.168.0.180  Port:  5900 DNS Name:  vnc.pretendco.com
    
    #(Note we just made up the name workTunnel.)#The workTunnel alias holds both the nested ssh server configuration,#and the actual port forwarding directives.#Note you can forward to either an IP Address or a hostname.
    
    Host workTunnel    #Work SSH Server To Initiate Tunneling From    Host ssh.pretendco.com    Port 5001
    
        # SMTP Server    LocalForward localhost:2525 smtp.pretendco.com:25 
    
        # Corporate Wiki    # Note I am forwarding to an IP address just to show that you can.    LocalForward localhost:8080 192.168.0.110:8080
    
        # IMAP Mail Server    LocalForward locahost:1430  imap.pretendco.com:143
    
        # Subversion Server    LocalForward locahost:2222  svn.pretendco.com:22
    
        # NFS Server    LocalForward locahost:2049  nfs.pretendco.com:2049
    
        # SMB/CIFS Server    LocalForward locahost:3020  smb.pretendco.com:3020
    
        # SSH Server    LocalForward locahost:2220  dev.pretendco.com:22
    
        # VNC Server    LocalForward locahost:5900  dev.pretendco.com:5900
    
    ###Hostname alias directives####These allow you to mimic hostnames as they appear at work.#We just take the localhost names from the above section and add alias names.#Note that you don't need to use a FQDN; you can use a short name ,such as smtp instead of smtp.pretendco.com.
    
    Host smtp.pretendco.com    HostName localhost    Port 2525
    
    Host wiki.pretendco.com    HostName localhost    Port 8080
    
    Host imap.pretendco.com    HostName localhost    Port 1430
    
    Host svn.pretendco.com    HostName localhost    Port 2222
    
    Host nfs.pretendco.com    HostName localhost    Port 2049
    
    Host smb.pretendco.com    HostName localhost    Port 3020
    
    Host dev.pretendco.com    HostName localhost    Port 2220
    
    Host vnc.pretendco.com    HostName localhost    Port 5900
    
    #End Config File

    Using the SSH Tunnel

    Once you customize the ~/.ssh/config file from the
    template shown above, you will need to open an SSH connection to the
    master alias, which holds the nested port forwarding for everyone. To
    do this, I would highly recommend connecting in SSH verbose mode first.
    SSH is extremely quiet by default, and it will be a good idea to use a
    -v option as shown below:

    ssh -v workTunnel

    If you configured things correctly, you should see output that looks like this:

    ....................debug1: Local connections to localhost:2200 forwarded to remote address svn.pretendco.com:22debug1: Local forwarding listening on ::1 port 2200.debug1: channel 0: new [port listener]debug1: Local forwarding listening on 127.0.0.1 port 2200.debug1: channel 1: new [port listener]debug1: Local connections to localhost:2222 forwarded to remote address dev.pretendco.com:22debug1: Local forwarding listening on ::1 port 2222.debug1: channel 2: new [port listener]debug1: Local forwarding listening on 127.0.0.1 port 2222.......................

    Tip:
    Something very important to note, is that if you setup a HostName alias
    properly, then you can perform an ssh directory to that resource, just
    as you would inside of work. For example, if you need to access your
    inside the firewall you can type:

    svn list svn+ssh://svn.pretendco.com/project

    If you need to access a machine with a protocol other than ssh, say
    your internal wiki running on port 8080, then you can quite simply add
    an alias to your /etc/hosts file as show below:

    # that require network functionality will fail.127.0.0.1   localhost.localdomain   localhost wiki::1 localhost6.localdomain6 localhost6

    You can always get to the forwarded wiki port by using:

    http://localhost:8080

    But, with the change to the /etc/hosts file you can also access it this way:

    http://wiki:8080

    If you are really motivated you can also do port forwarding to a
    “privilaged port”, port 80, if you have a server running on port 80
    inside of the firewire, and you would then get to the http resource
    like you would at work, be slightly changing the ssh configuration
    file. Please note you will also need to do tunneling with “sudo”
    privilages.

        # Internal Web Server running on port 80    LocalForward locahost:80  web.pretendco.com:80

    This then allows you to browse to http://web.

    Conclusion

    Now that you have a sophisticated SSH configuration set up, you can connect to resources in exactly
    the same way you connect at work because of the host alias directives
    we applied. If you have an internal wiki server at work and you applied
    your custom information to the template I have supplied, then you can
    just type in wiki:8080 (substituting your actual wiki server), and it
    will work. I hope you find this as cool as I do!

    Please note that things are not exactly perfect though. When you get
    back to work, if you try to SSH into your development box, you will
    have a problem, as your configuration file is set up to think you are
    at home. There is a simple solution, though. (Remember this only
    applies SSH connections to machines you have listed in your config
    file.)

    You can do quite a few things, and I will leave it to you to decide which to use:

    1. You could customize your Bash or Z-Shell startup script to detect
    whether you are at home or at work, and then source configuration files
    based on what IP address your local machine is assigned.
    2. You could create an alternate SSH file named remoteConfig and leave your regular config file blank. When you are at home or on the road, you can use ssh -F ~/.ssh/remoteConfig
    3. An even easier way would be to make an alias out of option 2.

    You can then create an alias in your bashrc file or your .zshenv file, that looks something like this:

    alias stunnel='ssh -v -F ~/.ssh/remoteConfig workTunnel'

    Now when you are at work, you use SSH like you normally do, but when you are on the road or at home you type in:

    stunnel

    With one command, you have access to your complete LAN in exactly
    the manner you use it at work, and you don’t need to muck around with
    writing conditional statements and sourcing bash config files to do it.

    Summary

    In this article we took ad hoc SSH tunneling and turned it into a
    full-blown VPN. I hope this took some of the mystery out of working
    from home via SSH tunneling and gave you an idea of how you can
    customize SSH tunneling to do just about anything.

    I mentioned virtual machines in the beginning of the article, but
    then only hinted at how they could be included in this setup. As an
    exercise to the reader, I will leave integrating virtual machines to
    you. As a hint, look at how we aliased the stunnel command, and that
    should give you all the head start you need.

    The information provided in this article is for
    your information only. The origin of this information may be internal
    or external to Red Hat. While Red Hat attempts to verify the validity
    of this information before it is posted, Red Hat makes no express or
    implied claims to its validity. Please review and comply with any
    relevant IT policies at your company.

    on Tuesday, November 27th, 2007 at 9:39 am and is filed under technical.
    You can follow any responses to this entry through the RSS 2.0 feed.

    You can leave a response, or trackback from your own site.

  • 12 Essential Rules to Live More Like a Zen Monk

    “We have more possibilities available in each moment than we realize.” – Thich Nhat Hanh

    I’m not a Zen monk, nor will I ever become one. However, I find
    great inspiration in the way they try to live their lives: the
    simplicity of their lives, the concentration and mindfulness of every
    activity, the calm and peace they find in their days.

    You probably don’t want to become a Zen monk either, but you can
    live your life in a more Zen-like manner by following a few simple
    rules.

    Why live more like a Zen monk? Because who among us can’t use a
    little more concentration, tranquility, and mindfulness in our lives?
    Because Zen monks for hundreds of years have devoted their lives to
    being present in everything they do, to being dedicated and to serving
    others. Because it serves as an example for our lives, and whether we
    ever really reach that ideal is not the point.

    One of my favorite Zen monks, Thich Nhat Hanh, simplified the rules in just a few words: “Smile, breathe and go slowly.” It doesn’t get any better than that.

    However, for those who would like a little more detail, I thought
    I’d share some of the things I’ve discovered to work very well in my
    experiments with Zen-like living. I am no Zen master … I am not even a
    Zen Buddhist. However, I’ve found that there are certain principles
    that can be applied to any life, no matter what your religious beliefs
    or what your standard of living.

    “Zen is not some kind of excitement, but concentration on our usual everyday routine.” – Shunryu Suzuki

    1. Do one thing at a time. This rule (and some of the
      others that follow) will be familiar to long-time Zen Habits readers.
      It’s part of my philosophy, and it’s also a part of the life of a Zen
      monk: single-task, don’t multi-task. When you’re pouring water, just
      pour water. When you’re eating, just eat. When you’re bathing, just
      bathe. Don’t try to knock off a few tasks while eating or bathing. Zen
      proverb: “When walking, walk. When eating, eat.”
    2. Do it slowly and deliberately. You can do one task
      at a time, but also rush that task. Instead, take your time, and move
      slowly. Make your actions deliberate, not rushed and random. It takes
      practice, but it helps you focus on the task.
    3. Do it completely. Put your mind completely on the
      task. Don’t move on to the next task until you’re finished. If, for
      some reason, you have no choice but to move on to something else, try
      to at least put away the unfinished task and clean up after yourself.
      If you prepare a sandwich, don’t start eating it until you’ve put away
      the stuff you used to prepare it, wiped down the counter, and washed
      the dishes used for preparation. Then you’re done with that task, and
      can focus more completely on the next task.
    4. Do less. A Zen monk doesn’t lead a lazy life: he
      wakes early and has a day filled with work. However, he doesn’t have an
      unending task list either — there are certain things he’s going to do
      today, an no more. If you do less, you can do those things more slowly,
      more completely and with more concentration. If you fill your day with
      tasks, you will be rushing from one thing to the next without stopping
      to think about what you do.
    5. Put space between things. Related to the “Do less”
      rule, but it’s a way of managing your schedule so that you always have
      time to complete each task. Don’t schedule things close together —
      instead, leave room between things on your schedule. That gives you a
      more relaxed schedule, and leaves space in case one task takes longer
      than you planned.
    6. Develop rituals. Zen monks have rituals for many
      things they do, from eating to cleaning to meditation. Ritual gives
      something a sense of importance — if it’s important enough to have a
      ritual, it’s important enough to be given your entire attention, and to
      be done slowly and correctly. You don’t have to learn the Zen monk
      rituals — you can create your own, for the preparation of food, for
      eating, for cleaning, for what you do before you start your work, for
      what you do when you wake up and before you go to bed, for what you do
      just before exercise. Anything you want, really.
    7. Designate time for certain things. There are
      certain times in the day of a Zen monk designated for certain
      activities. A time for for bathing, a time for work, a time for
      cleaning, a time for eating. This ensures that those things get done
      regularly. You can designate time for your own activities, whether that
      be work or cleaning or exercise or quiet contemplation. If it’s
      important enough to do regularly, consider designating a time for it.
    8. Devote time to sitting. In the life of a Zen monk,
      sitting meditation (zazen) is one of the most important parts of his
      day. Each day, there is time designated just for sitting. This
      meditation is really practice for learning to be present. You can
      devote time for sitting meditation, or do what I do: I use running as a
      way to practice being in the moment. You could use any activity in the
      same way, as long as you do it regularly and practice being present.
    9. Smile and serve others. Zen monks spend part of
      their day in service to others, whether that be other monks in the
      monastery or people on the outside world. It teaches them humility, and
      ensures that their lives are not just selfish, but devoted to others.
      If you’re a parent, it’s likely you already spend at least some time in
      service to others in your household, and non-parents may already do
      this too. Similarly, smiling and being kind to others can be a great
      way to improve the lives of those around you. Also consider
      volunteering for charity work.
    10. Make cleaning and cooking become meditation. Aside
      from the zazen mentioned above, cooking and cleaning are to of the most
      exalted parts of a Zen monk’s day. They are both great ways to practice
      mindfulness, and can be great rituals performed each day. If cooking
      and cleaning seem like boring chores to you, try doing them as a form
      of meditation. Put your entire mind into those tasks, concentrate, and
      do them slowly and completely. It could change your entire day (as well
      as leave you with a cleaner house).
    11. Think about what is necessary. There is little in
      a Zen monk’s life that isn’t necessary. He doesn’t have a closet full
      of shoes, or the latest in trendy clothes. He doesn’t have a
      refrigerator and cabinets full of junk food. He doesn’t have the latest
      gadgets, cars, televisions, or iPod. He has basic clothing, basic
      shelter, basic utensils, basic tools, and the most basic food (they eat
      simple, vegetarian meals consisting usually of rice, miso soup,
      vegetables, and pickled vegetables). Now, I’m not saying you should
      live exactly like a Zen monk — I certainly don’t. But it does serve as
      a reminder that there is much in our lives that aren’t necessary, and
      it can be useful to give some thought about what we really need, and
      whether it is important to have all the stuff we have that’s not
      necessary.
    12. Live simply. The corollary of Rule 11 is that if
      something isn’t necessary, you can probably live without it. And so to
      live simply is to rid your life of as many of the unnecessary and
      unessential things as you can, to make room for the essential. Now,
      what is essential will be different to each person. For me, my family,
      my writing, my running and my reading are essential. To others, yoga
      and spending time with close friends might be essential. For others it
      will be nursing and volunteering and going to church and collecting
      comic books. There is no law saying what should be essential for you —
      but you should consider what is most important to your life, and make
      room for that by eliminating the other less essential things in your
      life.

    “Before enlightenment chop wood and carry water. After enlightenment, chop wood and carry water.” – Wu Li

  • If you’re feeling frightened about what comes next, don’t be. Embrace
    the uncertainty. Allow it to lead you places. Be brave as it challenges
    you to exercise both your heart and your mind as you create your own
    path towards happiness, don’t waste time with regret. Spin wildly into
    your next action. Enjoy the present, each moment, as it comes; because
    you’ll never get another one quite like it. And if you should ever look
    up and find yourself lost, simply take a breath and start over. Retrace
    your steps and go back to the purest place in your heart… where your
    hope lives. You’ll find your way again. ~ Gilmore girls