GIT Tue Jul 23 10:17:11 2013

NB: You don't need a "GIT daemon" to set up a GIT server. All of the protocol support is handled via the SSH daemon.

You can up set GIT machines so that passwords don't need to be typed by generating an ssh key (see "Passwordless ssh w/dsa keys", below) on the client machine(s) and then importing public keys into the GIT server user's .ssh/authorized_keys file like so:

$ cat /tmp/ >> ~/.ssh/authorized_keys
$ cat /tmp/ >> ~/.ssh/authorized_keys

On the server machine, ssh'd in as the user clients will connect with GIT as:

$ cd ~/git
$ mkdir project.git
$ cd project.git
$ git --bare init

The .git extention is standard for --bare repositories.

On the client machine(s):

If the server runs ssh on an non-standard port (i.e. not on port 22, the default), create or edit ~/.ssh/config adding:

  Port 2222

Change the file mode of ~/.ssh/config to owner, read-only (you must do this):

$ chmod 600 ~/.ssh/config

Test ssh'ing to the server:

$ ssh

NB: no port given, even if non-standard. Then:

$ cd myproject
$ git init
$ git add .
$ git commit -m 'initial commit'
$ git remote add origin
$ git push origin master

Now others can get to the project on their (client) machines:

$ git clone
$ emacs -nw README
$ git commit -am 'Fix, fix.'
$ git push origin master

Right Alt key on Linux console:

Unzip and edit /etc/console/boottime.kmap.gz, changing "keycode 100 = AltGr" so that it's "keycode 100 = Alt".

Right Alt key on X:

Edit /etc/X11/xkb/keycodes/xfree86 so that "<LALT> = 64;" and "<RALT> = 113;" become "<LALT> = 113;" and "<RALT> = 64;". Add "alias <META> = 113;" under the new <LALT> mapping.

Burn cds:

cdrecord -scanbus
cdrecord -v speed=2 dev=1,0,0 -data opendarwin-6.6.2.x86.iso


mkisofs -r -o cd_image_to_burn dir_to_take_FS_from/
mount -t iso9660 -o ro,loop=/dev/loop0 cd_image_to_burn /mnt
cd /mnt
# check it out and make sure it's right
umount /mnt
# use same command as above but with cd_image_to_burn

Passwordless ssh w/dsa keys:

$ # On the "client" machine you'd like to log into the "server" machine from:
$ su - <"client"-machine-user>
$ ssh-keygen -t dsa
$ cat | ssh <"server"-machine-user>@<server> 'cat >> ~/.ssh/authorized_keys'