Smart online PDF Tools: All you wanted ever to do with PDF Files

Working with PDF files

PDF (Portable Document Format) files can vary from a basic single-page file to more complex files such as brochures, data sheets, white papers and technical manuals, some containing countless pages, making them very difficult to deal with. To access the details, you need to read, print, publish and share, which can end up being a challenge and very time-consuming. Having a PDF energy to reduce and streamline your workflow is necessary.

Why do you Have to Merge the Portable Document Format Files?

Portable Document Format is a computer application which can be added smoothly to develop a fresh new document. A person can create a single and compact file format. In this method, you can juxtapose different chunks of useful info and integrate them through a single file. A person can share these merged PDF documents with the physically distant users. During the procedure of combining the PDF documents, the original format of the file stays intact. Simply put, a person can create a fresh new file in such a way that the fonts and other content aspects remain unblemished and intact. In the modern environment, individuals are needed to produce and prepare documents on different subjects with speed and performance. The capability of the PDF file format to merge saves time to develop a single and compact file from smaller-sized PDF files.

Other Operations like splitting or converting

Also for any kind of other PDF related operation the Series of converts lead by Join PDF provides a suitable tool. Check them out yourself!

More of these handsome PDF converters will follow soon so stay tuned and happy converting and editing your PDFs.

Mysql: How to clone a table removing duplicate entries

If you have a table in MySql having duplicate entries an you want to remove these duplicate entries you can do that by cloning the table. In MySQL this can be obtained by the following one liner:

CREATE TABLE new table (  `ID` int(11) NOT NULL AUTO_INCREMENT, `col1` int(11) NOT NULL, `col2` varchar(1000) NOT NULL,`col3` varchar(255) NOT NULL,`col4` varchar(30000) NOT NULL, PRIMARY KEY (`ID`)) SELECT DISTINCT * FROM oldtable;

The column definitions are just for demonstration purpose and have to be identical with the original table. By the SELECT DISTINCT query you obtain a copy of the table without duplicate entries.

What to do if you get a bash: /usr/bin/rm: Argument list too long error.

If you have directories which you contain millions of files you might get in trouble when you want to apply an operation on a bunch of files. For example rm *.jpg will not work in that case due to memory limits.

An easy way is you to use find for the job you want to do:

If you want to move all files in a directory which have the extension jpg.gif to gif only  you can use the following command:

> find -name “*.gif.jpg”  -exec mv ‘{}’ jpg \;

Another useful application is to easily remove all files with the extension .jpg

This can be done with the following command:

> find -name “*.json”  -exec rm ‘{}’ \;

In principle you can apply find to any other job you want to perform.

Howto Dump the Structure of a Msql Table

If you need to transfer a MySQL table to another Server it may be very useful to dump a create statement and then simply execute it on the new server. Like that you can easily clone you MySQL table. One can dump the structure with a simple command.

> show create table _tabellenname_

Thats it!

Howto add a Login with Facbook/Google Plus Botton to a Website

Many sites offer Login with Facebook or Google+ features in order to make it easier for new users to connect to members-only features: To get this for your project too you just have to follow some simple steps

Howto get the Facebook Login:

Go to https://developers.facebook.com/apps and create a new application by clicking “Create New App”. Fill out any required fields such as the application name and description. Put your website domain in the Site Url field. Once you have registered, copy and past the created application credentials (App ID and Secret) into the HybridAuth config file.

Howto get the Google+ Login:

Go to https://code.google.com/apis/console/ and create a new project. Go to API Access under API Project. After that click on Create an OAuth 2.0 client ID to create a new application. A pop-up named “Create Client ID” will appear, fill out any required fields such as the application name and description. Click on Next. On the popup set Application type to Web application and switch to advanced settings by clicking on (more options). Provide this URL as the Callback URL for your application: http://mywebsite.com/path_to_hybridauth/?hauth.done=Google Once you have registered, copy and past the created application credentials (Client ID and Secret) into the HybridAuth config file.

How to read login from a Remote Server

In case you have a remote server which booted in rescue mode and you need to obtain the login history of the original server you just can use the last command after mounting the disc which is carrying the OS from the original server.

last -f changes the default location of the last log to another directory

last -f /mnt/sda1_server/var/log/wtmp

Mysql: Allow Access from an IP Address

In order to enable access from a remote client to a mysql server just perform the following steps:

$ mysql -u root -p
Enter password:

mysql> use mysql

mysql> GRANT ALL ON *.* to root@’192.168.1.4′ IDENTIFIED BY ‘root-pw';

mysql> FLUSH PRIVILEGES

use ” ‘ ” in all four cases above.

Afterwards the remote client should be allowed to communicate the MySQL server you updated the privileges. This receipt usually solves the ERROR:

“Host is not allowed to connect to this MySQL server”

Tipps and Tricks creating a SSL Certificate

In order to create a SSL Certificate one needs a CSR request for the server first. Under Linux it is very easy to create such an request:

openssl req -new -newkey rsa:2048 -nodes -keyout domain.key -out domain.csr

will do the job. Afterwards you have a csr file and a private key in the directory where you executed the command.

If your private key is protected by a password you can remove the password by:

> openssl rsa -in old.key -out new.key

During this process it is necessary to give the password once. The new key will not be protected by a password any more.

Scientillion, the Best Way to Search for Physics and Science Articles

The Internet is a beautiful place. A simple search in Google or any other search engine will yield thousands of results within seconds. Even though major search engines have powerful features, they are designed for general searches. Scientists and researchers who are looking for physics and science articles are often left on their own to find what they are searching for.

There are lots of academic search engines online, but most of them focus on a single field of expertise. There are also search engines that provide citations from multiple fields. But the downside is that some search engines are subscription based. There are only a couple of search engines that are available for free. Researchers, who can’t find what they are looking for with the use of free search engines, will use computers in a college or university that are subscribed to academic search engines of their discipline. School libraries often have a list of the academic search engines they are subscribed to in their websites.

The good news is that there is a search engine that has been designed for the needs of the scientists. And the best thing about it is that it is free to use. Scientillion makes it possible for users to make searches based on formulas or any other scientific term. This is useful for researchers who are required to do a lot of physics and science searches online. The search engine can look through thousands of e-prints of scientific papers from all fields of science that include astronomy, computer science, biology mathematics, and physics, just to name a few. In order to have a successful science project, the researcher needs to read a lot of scientific literature that are relevant to their study. And in order to find the scientific articles, they can use Scientillion.

The search engine maintains an online formula database to make it easier for users who are looking for specific formulas. While Google and other search engines allow users to search for formulas, they are not able to render the mathematical syntax properly. Scientillion utilises a technology that allows the rendering of both code and text in the search results. The scientific search engine also provides interfaces to top scientific publications, such as ArXiv.org. Scientillion also allows real time search of the text within the scientific publications.
Scientillion is a great tool for scientists and researchers. It saves them a lot of time on their research. Even in its Alpha Version, Scientillion is a powerful tool to learn about the publications that are pertinent for your study. It strives to be the go-to source for scientific queries on the Internet. It provides a great service to students, researchers, and the scientific community in general.

The site is available under the following address: Scientillion – The ArXiv and Physics Search Engine<

BOINC: How to Turn your Laptop into a Research Lab

The Berkeley Open Infrastructure for Network Computing, known for short as the BOINC project, is an open source system that focuses on volunteer and grid computing. It was originally created to support the SETI@home project, but has become a useful platform for many other projects as well.

How it works is that people from around the world will volunteer their computers to provide processing power to these projects in order to help them continue running. These projects are quite expansive, and any donation of a computer’s processor will help the project to function better. Many of these projects are based in the sciences, such as mathematics, climatology, astrophysics and environmental science. They require the collection of a lot of data and need a lot of processing power in order to make sense of this collected data.

It was developed by a team based at the Space Sciences Laboratory at the University of Berkeley when they started the SETI@home project. Since its creation, the BOINC project has amassed over one million active computers all over the world, with over 400, 00 active participants. This is because the BOINC projects are all based on open source software, so just about anyone can contribute the processing power of their computer just by downloading a program for the project of their choice. This allows users with Windows, Mac OS, Android, Linux and FreeBSD operating systems to participate.

What makes the BOINC projects even more enticing is that volunteers can earn credits for the number of work units they’ve contributed to the project of their choice. People can work separately as individuals, or they can pool together as groups in order to earn more credits. The ranking of these credits is maintained, providing a means of friendly competition between users all over the world to try and beat each other in credit numbers. Some users have even invested more of their own money to purchase more processors, just to increase their credits.

One of the pioneering BOINC projects is SETI@home, which stands for Search for Extraterrestrial Intelligence. This is a scientific experiment that collects and analyses telescope data in order to find narrow-bandwidth radio signals from space. Since they don’t naturally occur in space, any detection of them would provide evidence of alien technology.

Another project is Asteroids@home, which seeks to discover the presence of as many asteroids in space as is possible for the computer to process, as well as analysing them, since very little is known about them. A third project is ClimatePrediction.net, where climate models are run on the computers of volunteers in order to answer the questions on how climate change affects the current state of the world, as well as in the future.