Using poppler-tools and psutils, you can extract a range of pages from a larger PDF file. For example, if you want to extract pages 11–14 of the PDF file afile.pdf, you could use the following command:
$ pdftops afile.pdf - | psselect -p11-14 | ps2pdf - file-p11-14.pdf
The pdftops command converts the PDF file to PostScript; the psselect command selects the relevant pages from the PostScript, and the ps2pdf command converts the selected PostScript into a new PDF file.
SOCKS is built in to OpenSSH, so it's a trivial matter to set up a local SOCKS proxy with the -D flag. For example:
$ ssh -D 12345 myuser@remote_ssh_server
will open up the port 12345 on your local machine as a SOCKS proxy so all your HTTP traffic can be specified to go through the SSH tunnel and out remote_ssh_server on the other end. Your proxy server is now set up.
Next, set up your browser to use the proxy server. Most browsers include proxy support. For Firefox 3, go to Edit→Preferences→Advanced→Network→Settings, and specify that you want to use a Manual Proxy, localhost, port 12345, and SOCKS v5 (although OpenSSH supports both versions 4 and 5).
Now your browser is using a secure tunnel to your remote SSH server.
Ever selected text from your terminal so you could paste it into an X application? Drop the mouse and use xclip instead. Using xclip, you simply can pipe the contents that you want to clip directly into xclip:
$ lspci | xclip
Then, go to your X application and paste the captured output into the application. xclip also lets you “paste” selected text into the terminal. Just use the -o switch to output the highlighted text from the active selection:
$ xclip -o
xclip can be found at sourceforge.net/projects/xclip.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide