Kubuntu: Replace Network Manager With Wicd and Vice Versa

WicdEarlier today, on my Kubuntu machine, I needed to replace the Network Manager, which is installed by default, with Wicd. Later I found out that Wicd has issues on its own, so I decided to switch back to the Network Manager after I initially uninstalled it. The whole switching back and forth process was a bit tricky considering I didn’t know how to remove and then install back the Network Manager, so I decided to write myself a reminder post. It’s trivial. Hopefully it will help others as well.

Replacing the Network Manager with Wicd

First, install Wicd (it’s important that you install Wicd first, because if you don’t, the next step will effectively disable your internet connection):

sudo apt-get install wicd

and now remove the Network Manager:

sudo apt-get --purge autoremove network-manager

Logout and back in and you should be set. Your Wicd GUI client should be visible in the tray icon area.

Replacing Wicd with the Network Manager

First, install the Network Manager:

sudo apt-get install network-manager

You’ll also need to install back the plasma network manager tray icon tool. Otherwise, your network will be enabled, but you won’t have a GUI tool to select from WIFI connections.

sudo apt-get install plasma-nm

Now you can uninstall Wicd:

sudo apt-get --purge autoremove wicd

Okay, you should be set. Log out and back in and your plasma network manager tool should be available in the tray area for you to manage your wireless connections.

ssh-agent forwarding to sudo (root user)

terminal

I use ssh-agent to store my ssh key so that I don’t have to enter the key passphrase every time I access one of my servers over ssh. When I run commands using my regular user (non-root), ssh-agent works as expected, stores the key and issuing commands accessing the server(s) doesn’t request the passphrase. However, when I run commands as a root user via sudo, the key forwarding is lost because itsĀ  mechanism relies on the SSH_AUTH_SOCKĀ  environment variable. However, environment variables are removed when the user is switched to root via sudo. How do we prevent the SSH_AUTH_SOCK variable from being removed when issuing sudo, thereby passing on key forwarding to the root user?

Continue reading

Copy Your Subversion Repository Using URLs With svnsync

Subversion svnsync copy repositoriesI was recently in a situation when I needed to move my Subversion repository from one server to another. One option was to use “svnadmin dump”, but that requires you to have access to the file system on the server where the repository sits as well as knowing what directory the repository is in. It turns out that a much sleeker way to do this is using the svnsync tool because all you need to know for that solution are the URLs of the source and target repositories. Here’s how:

Continue reading

Encrypt Your Data Files in Linux

Encrypt Data File

Are you one of the people who has countless accounts on various websites requiring you to remember all the user names and passwords? At some point, you either end up reusing the same password, which is quite dangerous to do, or you start writing down the passwords and user names to a file on your computer so that you can find them later on, which can be even more dangerous if not encrypted.

Luckily, there is a simple way to encrypt your text files containing sensitive data such as passwords, account numbers, credit card numbers, and so on. In this tutorial, I will show you how to do that in Linux Ubuntu (should work for any distribution).

Continue reading

Configure Subversion to Login in Using System Users

Configure Subversion to login in using the system userThere is a plethora of articles about how to install subversion in a Linux system, but absolute majority of them guides one to use the internal Subversion user authentication system. I find it annoying to have to create a system user and a separate Subversion user for each of my system users, so I decided to configure my Subversion such that it authenticates users against the system user database instead of its own user/password database. In this tutorial, I will show you how to do it in a few simple steps.

Continue reading