Thursday, April 16, 2009

Acts 2: ECG a heart for the nations llandudno 2009

Martyn Atkins Bible Study

Thursdy Acts 2: 1-12 here


What kind of God would this have revealed to those who experienced the first Spirit
God who reveals his spirit God of People restoring God of Blessing God who would restore and make Jerusalem a focal point



  1. God who reveals his spirit
  2. God of People restoring
  3. God of Blessing
  4. God who would restore and make Jerusalem a focal point

Being Converted What kind of person were you What happened to you What happened afterwards

Jews believed that the Pent festival was the time that the spirit of God would come:

Jews would have made a connection
Acts 9 is a sudden surrender as much as it is a sudden converstion

Wednesday, April 15, 2009

Acts 9: ECG a heart for the nations llandudno 2009

15-4-09 Martyn Atkins Bible Study

Wednesdy Acts 9: 1-19 here

Being Converted What kind of person were you What happened to you What happened afterwards

Acts 9 is a sudden surrender as much as it is a sudden converstion

Three Q's


1. Paul, What kind of person were you?
  • WITNESS MATTERS - Paul was someone impressed by xtn witness.
  • never underestimate impact of our testimony - MA conversation (one of many). asked God to make himself real. Nightclub clipboard evangelist spoke of Christ. Mr Bell from youth group. Knew Mr Bell loved God and was a deeply xtn man. Stephen didn't know what his witness might effect and affect Paul as he 'held the coats'.
  • So, How is the witness going?? It's tuff. You probably won't know that
  • A GOOD JEW - Philippians 3: 4-6
  • xty not just for big sinners, but also for those, like paul who were good religious people
2. Paul, what happend to you?
  • JESUS APPEARED IN ME - Idea of Jesus appearing in su and to us. Wesleyan theology. He makes the first move. God acts whether we ever realise it or not
  • PAUL MET WITH JESUS. Doesn't always happen like it did with Paul, but regardless meetig with Jesus is the quinntessential xtn experience.
  • RULES OF BEING A JEW, within the rules of being a jew Paul was good, but upon meeting xt P needs to totally reacess, all this is loss because of knowing christ J my lord, all else is rubbish. (anti-semitic problem of this). A radical re-assessment is eqd when meeting xt. Meeting/following xt is like a new magnetic north direction in life. chnge north, evrything else is modified too. so we who are not the 'biggest' sinners in terms of human ranking. Point of feeling conviction is close to turning point.




Notes on this Bible passage
  • Paul is called by name - so was Peter at lakeside, Mary at Gethsemene, Saul too.
  • Saul is asked 'why are you persecuting me' - to persecute xt is to persecute his people. what you do to them you do to me.
  • the Q is in the rabbinic telling of the story of the temple Saul Saul why do you ersecute me. David saying to Saul when he is in the cave 'relieving himself'. story told in samuel, but Luke uses these words to signal to Paul thatb there is an imoportant link here with the OT. J is son of David.
  • Paul is recruited, commissioned and taken on...












What happened fterwards

Monday, April 13, 2009

change pkcs to pem for using ovpn package in ubuntu network manager

Thanks to Craig Millsap for his article on this:

To extract the CA Certificate:
openssl pkcs12 -in myvpn.p12 -cacerts -nokeys -out myvpnca.pem

To extract the Personal Certificate:
openssl pkcs12 -in myvpn.p12 -clcerts -nokeys -out myvpncert.pem

To extract the Private Key:
With a password: openssl pkcs12 -in mydccert.p12 -clcerts -nocerts -out myvpnkey.pem
Without a password: openssl pkcs12 -in mydccert.p12 -clcerts -nocerts -nodes -out myvpnkey.pem


http://www.carbm1.com/?p=184

Update May 2011.
Network Manager 0.8.1 (with Ubuntu 10.10) can now use use the PKCS12 file instead of creating separate pem files as above. simply use the ovpn config file as an import file and that's all that's needed.

icon 225 working in ibex using (gnome's) network-manager

1. Before you can use NetworkManager with these devices you need to check if the the hso module is installed by using this command:

find /lib/modules/`uname -r` -name 'hso.ko'


2. ozerocdoff is needed to stop the Icon's onboard usb virtual cd from firing up.

that requires: libusb

so:

3. sudo apt-get install libusb-dev

4.

If you are running a 64 bit system or if ozercdoff crashes run this command:

sudo make clean

Then compile ozerocdoff:

sudo make

Install the ozercdeoff and the udev scripts

sudo make install

The next time that you plug in a device with ZeroCD enabled the udev scripts will run and call ozercdoff.

5. After that (gnome) network-manager looks after the connection

use orange (contract) as broadband type in n-m



This appeared good intially in eeebuntu but after a few moments (possibly of innactivity (?)) would crash the whole PC.

The version of Pharscape's Option driver that comes with nm 0.7.0 is relatively old, poss v 1.2. So upgrade to HSO module version 1.9. Followed instructions of MartinD here to incorporate the module into the kernel using dkms, which should help if kernel gets upgraded (ie no rebuild necessary).

all goes OK til running the build then is complains that the kernel source headers can't be found by dkms.

So: in Synaptic Package maneger (NOT add/remove programs!) install build-essential and the version of eee kernel headers that dkms is looking for. (kernel: 2.6.27-8-eeepc)


installing of headers hangs after an hour. reboot causes hdd complaints says yes to all when running a manual fsck.

reboot thankfully brings back the gui. nm not working with the Option now so try a rebuild of module:

sudo dkms remove -m hso -v 1.9 --all
then
sudo dkms add -m hso -v 1.9
then
sudo dkms build -m hso -v 1.9

all seems OK has run for an hour now... :-)

Thursday, February 19, 2009

pinout for jbl esc333 surround sound infrared

This is what I've determined from the schematics that I downloaded re: my ESC333 Surround Sound amp - which I purchased without a remote control:

3.5mm jack
1. tip - VDD (power?) on IC201
2. ring - to ground
3. sleeve - to remote on IC201

Q still can't find any info about the remote sensor hardware

Thursday, February 12, 2009

Rationale of UPG (User Private Groups)

5.4. User Private Groups
Red Hat Linux uses a user private group (UPG) scheme, which makes UNIX groups easier to use.
The UPG scheme does not add or change anything in the standard UNIX way of handling groups;
it simply offers a new convention. Whenever you create a new user, by default, they have a unique
group. The scheme works as follows:
Chapter 5. Users and Groups 93
User Private Group
Every user has a primary group; the user is the only member of that group.
umask = 002
Traditionally, on UNIX systems the umask is 022, which prevents other users and other members
of a user’s primary group from modifying a user’s files. Since every user has their own private
group in the UPG scheme, this "group protection" is not needed. A umask of 002 will prevent
users from modifying other users’ private files. The umask is set in /etc/profile.
setgid bit on Directories
If you set the setgid bit on a directory (with chmod g+s directory ), files created in that direc-
tory will have their group set to the directory’s group.
Many IT organizations like to create a group for each major project and then assign people to the
group if they need to access that group’s files. Using this traditional scheme, managing files has been
difficult because when someone creates a file, it is associated with the primary group to which they
belong. When a single person works on multiple projects, it is difficult to associate the right files with
the right group. Using the UPG scheme, however, groups are automatically assigned to files created
within a directory with the setgid bit set, which makes managing group projects that share a common
directory very simple.
For example, say you have a big project called devel, with many people editing the devel files in a
devel directory. Make a group called devel, chgrp the devel directory to devel, and add all of
the devel users to the devel group.
You can add a user to a group using User Manager (see the Official Red Hat Linux Customiza-
tion Guide), or if you prefer to use the command line, use the /usr/sbin/groupadd groupname
command to create a group. The /usr/bin/gpasswd -a loginname groupname command will
add a user loginname to a group. (See the groupadd and gpasswd man pages if you need more
information on their options.) The /etc/group file contains the group information for your system.
If you created the devel group, added users to the devel group, changed the group for devel
directory to the devel group, and set the setgid bit for the devel directory, all devel users will be
able to edit the devel files and create new files in the devel directory. The files they create will always
retain their devel group status, so other devel users will always be able to edit them.
If you have multiple projects like devel and users who are working on multiple projects, these users
will never have to change their umask or group when they move from project to project. If set correctly,
the setgid bit on each project’s main directory "selects" the proper group for all files created in that
directory.
Since each user’s home directory is owned by the user and their private group, it is safe to set the
setgid bit on the home directory. However, by default, files are created with the primary group of the
user, so the setgid bit would be redundant.
5.4.1. User Private Group Rationale
Although the User Private Group (UPG) has existed in Red Hat Linux for quite some time, many
people still have questions about it, such as why UPG is necessary. To illustrate its use, consider the
following scenario.
You would like to have a group of people work on a set of files in the /usr/lib/emacs/site-
lisp/ directory. You trust a few people to modify the directory but certainly not everyone. So first
create an emacs group:
/usr/sbin/groupadd emacs
In order to associate the contents of the directory with the emacs group, type:
94
chown -R root.emacs /usr/lib/emacs/site-lisp
Now, it is possible to add the proper users to the group with gpasswd:
/usr/bin/gpasswd -a username Y
X
Chapter 5. Users and Groups
emacs
Allow the users to actually create files in the directory with the following command:
chmod 775 /usr/lib/emacs/site-lisp
When a user creates a new file, it is assigned the group of the user’s default private group. To prevent
this, perform the following command, which causes everything in the directory to be created with the
emacs group:
chmod 2775 /usr/lib/emacs/site-lisp
If the new file needs to be mode 664 for another user in the emacs group to be able to edit it, make the
default umask 002.
At this point, by making the default umask 002, you can easily set up groups that users can take
advantage of without any extra work every time users write files to the group’s common directory.
Just create the group, add the users, and do the above chown and chmod on the group’s directories.

Rationale of UPG (User Private Groups)

5.4. User Private Groups
Red Hat Linux uses a user private group (UPG) scheme, which makes UNIX groups easier to use.
The UPG scheme does not add or change anything in the standard UNIX way of handling groups;
it simply offers a new convention. Whenever you create a new user, by default, they have a unique
group. The scheme works as follows:
Chapter 5. Users and Groups 93
User Private Group
Every user has a primary group; the user is the only member of that group.
umask = 002
Traditionally, on UNIX systems the umask is 022, which prevents other users and other members
of a user’s primary group from modifying a user’s files. Since every user has their own private
group in the UPG scheme, this "group protection" is not needed. A umask of 002 will prevent
users from modifying other users’ private files. The umask is set in /etc/profile.
setgid bit on Directories
If you set the setgid bit on a directory (with chmod g+s directory ), files created in that direc-
tory will have their group set to the directory’s group.
Many IT organizations like to create a group for each major project and then assign people to the
group if they need to access that group’s files. Using this traditional scheme, managing files has been
difficult because when someone creates a file, it is associated with the primary group to which they
belong. When a single person works on multiple projects, it is difficult to associate the right files with
the right group. Using the UPG scheme, however, groups are automatically assigned to files created
within a directory with the setgid bit set, which makes managing group projects that share a common
directory very simple.
For example, say you have a big project called devel, with many people editing the devel files in a
devel directory. Make a group called devel, chgrp the devel directory to devel, and add all of
the devel users to the devel group.
You can add a user to a group using User Manager (see the Official Red Hat Linux Customiza-
tion Guide), or if you prefer to use the command line, use the /usr/sbin/groupadd groupname
command to create a group. The /usr/bin/gpasswd -a loginname groupname command will
add a user loginname to a group. (See the groupadd and gpasswd man pages if you need more
information on their options.) The /etc/group file contains the group information for your system.
If you created the devel group, added users to the devel group, changed the group for devel
directory to the devel group, and set the setgid bit for the devel directory, all devel users will be
able to edit the devel files and create new files in the devel directory. The files they create will always
retain their devel group status, so other devel users will always be able to edit them.
If you have multiple projects like devel and users who are working on multiple projects, these users
will never have to change their umask or group when they move from project to project. If set correctly,
the setgid bit on each project’s main directory "selects" the proper group for all files created in that
directory.
Since each user’s home directory is owned by the user and their private group, it is safe to set the
setgid bit on the home directory. However, by default, files are created with the primary group of the
user, so the setgid bit would be redundant.
5.4.1. User Private Group Rationale
Although the User Private Group (UPG) has existed in Red Hat Linux for quite some time, many
people still have questions about it, such as why UPG is necessary. To illustrate its use, consider the
following scenario.
You would like to have a group of people work on a set of files in the /usr/lib/emacs/site-
lisp/ directory. You trust a few people to modify the directory but certainly not everyone. So first
create an emacs group:
/usr/sbin/groupadd emacs
In order to associate the contents of the directory with the emacs group, type:
94
chown -R root.emacs /usr/lib/emacs/site-lisp
Now, it is possible to add the proper users to the group with gpasswd:
/usr/bin/gpasswd -a username Y
X
Chapter 5. Users and Groups
emacs
Allow the users to actually create files in the directory with the following command:
chmod 775 /usr/lib/emacs/site-lisp
When a user creates a new file, it is assigned the group of the user’s default private group. To prevent
this, perform the following command, which causes everything in the directory to be created with the
emacs group:
chmod 2775 /usr/lib/emacs/site-lisp
If the new file needs to be mode 664 for another user in the emacs group to be able to edit it, make the
default umask 002.
At this point, by making the default umask 002, you can easily set up groups that users can take
advantage of without any extra work every time users write files to the group’s common directory.
Just create the group, add the users, and do the above chown and chmod on the group’s directories.