Solltet ihr mal über den Begriff eines "Reed-Solomon" Codes stolpern und mehr Informationen dazu suchen kann ich euch diesen Link empfehlen.
Alles recht nett erklärt und mit Applets schön visuell dargestellt :)

Mehr Infos hier

Termin: Freitag, den 18. Januar 2008 , ab 9 Uhr
Ort: HdM, Raum 011 (Audimax)

PROGRAMM

9:00 bis 9:15 Uhr
Begrüßung
Prof. Walter Kriha, Studiengang Medieninformatik der HdM

9:15 bis 10:00 Uhr
Linux Softwareprojekt
Softwareprojekt an der HdM: Die OpenMoko Platform für Mobile Geräte und Anwendungen
Markus Schlichting, HdM Stuttgart, Student Medieninformatik

10:15 bis 11:15 Uhr
Linux Business: Firmenvernetzung, High Availability und Virtualisierung
Adrian Reyer, LinuxHaus Stuttgart

11:30 bis 12:30 Uhr
Linux Enterprise: Suns OpenSource Weg – Motivation und Geschäftsmodelle
OpenSolaris, Java und NetBeans
Franz Haberhauer, Sun Microsystems

12:30 bis 13:30 Uhr
Mittagspause

13:30 bis 14:30 Uhr
Linux Community: Open Source – weltweite Zusammenarbeit
Community

14:45 bis 15:45 Uhr
Linux Desktop: Aktueller Stand und Entwicklungen des KDE Projekts
KDE Projekt

16:00 bis 16:45 Uhr
Linux Multimedia: Sehen, Hören, Genießen
KDE Projekt

ab 16:45 Uhr
Wrap-Up
Prof. Walter Kriha, Studiengang Medieninformatik der HdM

first: $ ssh-add private_key_openssh.txt
if the reply is something like this:

Permissions 0644 for ‘private_key_openssh_messi.txt' are too open.
this is the second part of this post :)
It is recommended that your private key files are NOT accessible by others.
This private key will be ignored.

do a chmod 0600 on the file.
ssh-add will ask you for the certificates password

second: run ssh-agent ("ssh-agent";). if it's already running, kill it (ssh-agent -k) and launch it again.

third:: simply ssh to your server :)

Just a little trick:
simply make a bookmark to this URL and replace "USERNAME"; with your username and "PASSWORD"; with your password.

https://hotspot.t-mobile.net/wlan/[email protected]&password=PASSWORD&strHinweis=Zahlungsbedingungen&strAGB=AGB

Connect to the wlan, open the hotlink and you're in :)

require 'mathn'

print "How many prime numbers do you want? "
wanted_amount = gets.to_i
print "The starting prime should be bigger than which number? "
startnum = gets.to_i
puts "______________________________________";
puts "Here are your primes:";

primenumbers = Prime.new()
current_amount=0;
primenumbers.each{|prime|
if prime >= startnum
puts prime
current_amount=current_amount+1
end
break unless current_amount < wanted_amount
}
puts "-—————————————————-";

"break unless"; … mhhh… ruby has nice control structures :)

Ok, after some minutes of heavy google digging, I finally found a way to get my gpg key to work with ssh:

1. Install "gnupg2"; (it provides the gpgkey2ssh tool)
2. Import your ascii-armored public key onto the target system by doing a "gpg —import bla.asc"; (where bla.asc is your public key. Mine looks like this)
The resulting output will look something like this:

gpg —import marcpub.asc
gpg: key 7C88836C: public key "Marc Seeger "; imported
gpg: Total number processed: 1
gpg: imported: 1

3. use "gpgkey2ssh YOURKEYID"; (in my case: gpgkey2ssh 2C18494C7C88836C) to get the correctly formated key for ssh usage.
Output:

gpgkey2ssh 7C88836C
ssh-dsa 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 COMMENT

4. Insert this into your .ssh/authorized_keys file (I put it on one single line). You can Change the "COMMENT"; part to something meaningful

Now I've gotta figure out a way to get my certificate into something putty can understand

UPDATE: and now from the client side