Problem: one have vast raster image, which is needed to be processed and enhanced. And seeing of intermediate result and possibility of tuning the parameters are required.
Solution: the unique image processing tool for processing museum images -- nip2 -- helps us, and it incorporated in Debian GNU/Linux distribution.
Problem: using SWISH++ it is possible to search and sort PDF-files automatically
Solution: tools like pdftotext, find, scripts on Bash or Perl are required to perform quick and fast search within PDF and indexing PDF documents.
There are five passwords used to secure your Cisco routers: console, auxiliary, telnet (VTY),enable password, and enable secret. Just as you learned earlier in the chapter, the first two passwords are used to set your enable password that’s used to secure privileged mode. This will prompt a user for a password when the enable command is used. The other three are used to configure a password when user mode is accessed either through the console port, through the auxiliary port, or via Telnet.
You can set the identity of the router with the hostname command. This is only locally significant,which means that it has no bearing on how the router performs name lookups or how the router works on the internetwork.
On Cisco routers, a whole bunch of services come enabled by default.your first order of operation would be to ensure that the all unused services are disabled.
Now we will see how to disable some services on cisco router for security purpose.