If you need to renew an X.509 certificate ( Used for SSL encryption/ https) and you don't want to dig into which cn, ou, or other information that was entered in the last certificate request, you can use the following openssl command. The command will read the private key (private.key) and existing certificate (oldcert.pem) and generate a new certificate request (newcsr.csr) with the same information as the old certificate contained.
$ openssl x509 -x509toreq -signkey private.key -out newcsr.csr -in oldcert.pem
Nice - get an overview of all your open tabs-plugin - like Exposé on the Mac but for tabbed browsing.
(thanks Jeremy!)
It's nice to see the APIs just ship with the products at launch these days. So I'm thinking - what do I want to do with this API? Obviously sync everything with everything. iCal export was an option if it wasn't for iCal's tremendous suckitude. It so sad everybody is happy to say "we do iCal" because the iCal spec really sucks tremendously. The data may be the right stuff, but the spec docs are almost unreadable.
In unrelated news, my desire for Google map hacking has grown tremendously now that I can get maps of my own neighborhood.
My colleague Martin Holk Rasmussen did an internal web interface for the command line tool dig that you use a lot if you're working with DNS. But the tool was cool, so it's not internal anymore, you find it here. It has many snazzy features: Nice colorized output, good configuration and everything works with GET URLs so you can set up links to your favorite dig settings.
Enscript is a tool to encrypt and run encrypted scripts on windows. You might think - So what, who wants encrypted scripts anyway? Enscript is useful for storing passwords in your scripts. This can be scripts to map network drives, run scp commands, download stuff from password protected sites, and you can probably come up with more useful cases. Enscript will also be included in the next release of the Unwind package.