Software: Difference between revisions

From Arbeitsgruppe Kuiper
Jump to navigation Jump to search
m (Reverted edits by Frederike (talk) to last revision by Lothar.brendel)
Tag: Rollback
(→‎Network & Collaboration: renamed link iOS-sync)
 
(18 intermediate revisions by 6 users not shown)
Line 1: Line 1:
== Overview ==
= Science =
* [https://git.uni-due.de/agkuiper/belt Belt] (which needs [[PETSc]]): Rolf's PLUTO version; more information is on GitLab
 
* [[Software#Two-Factor Authentification|Two-Factor Authentification (2FA)]]
== Astro stuff ==
* [[VPN]]
 
* [[SSH and SCP]]
* [https://git.uni-due.de/agkuiper/belt Belt] (which needs [[PETSc]]): Rolf's PLUTO version ([[compile-belt|manual]] for compiling)
* [https://git.uni-due.de/ University Gitlab]
** [[Restarting belt automatically]]
* [https://uni-due.zoom.us/profile University Zoom]
** [[Scaling tests]] (for belt)
* [https://nxcl.e-services.physik.uni-due.de University Nextcloud]: This is where we have the group calendar as well!
* [[Visit]] Tips and tricks
* [https://www.uni-due.de/zim/services/software/office-ma.php MS Office]. Note that [https://www.libreoffice.org/ LibreOffice] (Windows, Linux; use package manager) is an excellent and free alternative but ''caveat emptor'' about some formatting compatibilities.
* [[pyPLUTO]]: a Python module to read and analyse PLUTO output
* [[Zotero]]
 
== Online Tools ==
 
* a nice, free [https://www.geogebra.org/3d 3D-plotter] (in cases when Mathematica is somehow unavailable)


== Two-Factor Authentification ==
== Other ==
The two-factor authentification (2FA) is needed for most university services as VPN or Nextcloud.


After activating your user-ID you need to activate it in the selfcare portal (https://selfcare.uni-due.de/). The website will walk you through the installation. You'll need to have e.g. an app for the generation of the second factor. I recommend using the app OpenOTP. Please make sure that you scan the shown QR-codes, they are very hard to regain.
* avoiding O(''N''²) for long range interactions:
** [http://www.scafacos.de ScaFaCoS]
** [https://www.ks.uiuc.edu/Research/msm/details.html Multilevel Summation Method]


However, it is also possible to do it without a phone or application. For this, you only need to install forcepoint and oathtool. Then, you call:
= Network & Collaboration =
~$ sudo forcepoint-client vpn.uni-due.de
Enter your normal/central university username and password. Then, if warnings come, say yes, and it will ask you for the second factor. Copy the timestamp for the line <code>*** Please enter reply for challenge ***</code> and run—in the same terminal after having paused forcepoint (Ctrl+Z, then "bg", then <Enter>) or in a separate terminal—the following command:
~$ oathtool --totp -b <YOUR "SECRET"> --now="<TIMESTAMP GIVEN BY FORCEPOINT>"
It will return a six-digit number that you then give to forcepoint (<code>fg</code> to bring it back to the foreground, or switching to the tab). You have all the time in the world because you are giving the timestamp explicitly :). You get the "secret" from the selfcare portal when you generate a token (the QR code is just an URL and there is a "…?secret=…&" part to it; the string between "=" and "&" is the "secret").


In general, to parse a QR code: you can use <code>zbarimg</code>, e.g. from a quick screenshot:
* [[VPN]]
~$ zbarimg "/home/georgeslemaistre/Bilder/Bildschirmfoto von 2023-10-05 15-00-00.png"
* [[SSH and SCP]]
otpauth://totp/TOTP1938HK33?secret=33IHS343AMDGPH123456CO777JPIIJMJV&period=30&digits=6&issuer=uni-duisburg-essen&image=https%3A//selfcare.uni-due.de/_Resources/Static/Packages/UDE.Portal/images/logo/logo--otp.png
* [[Two-Factor Authentification]] (2FA)
(No worries, this is a fake "secret" :).)
* University [[Git#GitLab|GitLab]] (https://git.uni-due.de)
* [https://uni-due.zoom.us/profile University Zoom]
* [https://nxcl.e-services.physik.uni-due.de University Nextcloud]: This is where we have the group calendar as well, which you can [[NextCloud-calendar_in_iOS|sync to your iphone/ipad]].


'''Important''': make sure to execute the oathtool command prefixed with a space on the command line so that it not get saved to your command history file because your "secret" is in plain text there. You can call the command once without writing the "secret" (which of course will not work) just to have the command in the history (searching in the history on the command line: <code>Ctrl</code>+<code>R</code>). Typically, you need to close the terminal (exit) for the history actually to be written to the history file (~/.bash_history if you are using bash.) Saving the secret itself in plain text is not the best idea, obviously, so you need to find a solution for that part…
= Publishing =


If you forgot to use a space at the beginning of the line and the terminal is still open, go up in command history with the up arrow until you get to that command, delete the command on the line and '''do not press enter''' but first go back "down to the present" with the down arrow and '''then''' press enter. You can check that it has worked by going back up (with the up arrow) and you will see a blank line where the command was. Then you can exit. If you have already closed the terminal, open the history file in an editor and delete the line but make sure that no back-up copy of the history file (containing the command...) is made, or delete it manually afterwards.
* [https://www.uni-due.de/zim/services/software/office-ma.php MS Office] for faculty members. Note that [https://www.libreoffice.org/ LibreOffice] (Windows, Linux; use package manager) is an excellent and free alternative but ''caveat emptor'' about some formatting incompatibilities.
* [[Zotero]]
* making bibliographies compact (e.g. for proposals): https://github.com/lmytime/tex_compact_bib

Latest revision as of 11:26, 18 July 2024

Science

Astro stuff

Online Tools

  • a nice, free 3D-plotter (in cases when Mathematica is somehow unavailable)

Other

Network & Collaboration

Publishing