FlickrDown is kix azz!

I was tired of downloading pictures one at a time from someone’s flickr page and so I searched the web for a good program to do it. It will download the highest resolution pictures from someone’s photo sets. It works with a proxy server too! Sitesnagger or wget would download way too much stuff! This application is awesome!

Here’s where you can get it:

license problem…not enough licenses, but 0 of 6 are used

LMtools seems to check out the licenses according to their logs, but they check back in immediately. Interesting huh? We tried changing the file different ways – it was so weird. Finally, we had someone in support use the license checker tool that they have and they found that we mixed up the hosted licenses w/ the server based licenses – doh! … so we just separated them and created new files and it was all set.

It turns out that the website when generating licenses can generate host based licenses instead of server based licenses. You can tell the difference by seeing:


opposed to:


Omaha steaks is awesome!

(1 pkg.) Boneless Pork Chop 4/4 Oz
(1 pkg.) Stfd Sole W/scps&crb 2/4.5
(1 pkg.) Gourmet Franks 8/3
(1 pkg.) Chicken Breasts 4/4 Oz
(1 pkg.) Potatoes Stfd Baked 4/5.75 Oz
Omaha Steaks Burgers 12 It was so amazing – I couldn’t believe that they could ship UPS and it would stay frozen for so many days. (I was cheap – did ground shipping) I just cooked 2 of the Top Sirloins and man they were awesome! I didn’t even bother to thaw it – just cooked it on top of a frying pan and threw some garlic salt on it. Had one of the stuffed potatoes along with it and some frozen corn/peas (didn’t come with it). whew! what a meal! Their website is: Highly recommended if you can get a deal like mine!]]>

Apache SSL Self-Signed Certificates Without Passphrase

taken from:

Following is a quick listing of the commands you need to use when setting up an SSL key for Apache that doesn’t require a passphrase to be entered during normal operations, and includes a self-signed certificate so you needn’t bother with cert requests and CAs. The sequence of events is to create a 3DES key, remove the passphrase, and then generate a self-signed certificate.

The following commands are to be entered via the command line, with each openssl statement requiring interactive input. Performed on Red Hat Linux, these instructions ought to also work on other flavors of Unix with OpenSSL and Apache installed.

openssl genrsa -des3 -out pass.key 1024
openssl rsa -in pass.key -out server.key
openssl req -new -key server.key -x509 -out server.crt -days 999

cp server.key /etc/httpd/conf/ssl.key/
cp server.crt /etc/httpd/conf/ssl.crt/

apachectl restart

Verifying that Apache has the correct SSL directives and is using the correct key and certificate created above is left as an exercise for the webmaster.

If your system has a Makefile or symlink in the Apache conf directory, you can opt to pursue an earlier method to this madness using the below steps (provided here only for completeness):

cd /etc/httpd/conf
/usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.key
chmod go-rwx /etc/httpd/conf/ssl.key/server.key
make testcert

Optionally, if you need a server.pem file for a given application, such as courier-imapd, use the following to create the .pem file from the previously created certificate and key:

cat server.key server.crt >server.pem

Using the above method you can enjoy the encryption protection provided by SSL without having to pay a commercial vendor to sign your server keys. If you don’t like the popup presented by some applications (e.g. web browsers) about an untrusted certificate, simply follow the process provided by your application to import or install the certificate, at which point you will no longer have to deal with future dialog boxes regarding an untrusted site.