FreeAntivirus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, January 31, 2009

Create your personal YouTube

Posted on 9:07 PM by Unknown
FlowPlayer is a Flash media player. You can use it on your HTML pages to play video files. “It is your personal YouTube”. It is highly customizable which upports all the features you’ll possibly need and these features can be configured the way you like. FlowPlayer’s skin is flexible and will smoothly melt into your site. Progressive downloading, solid streming, long play features, playlists,
Read More
Posted in | No comments

Tuesday, January 27, 2009

How to secure PHP with Suhosin

Posted on 5:30 AM by Unknown
Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format
Read More
Posted in How to ... | No comments

Monday, January 26, 2009

How to install and use chkrootkit

Posted on 8:26 AM by Unknown
Here are steps used to manually install chkrootkit on a Linux system:1. # wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz2. # tar zxvf chkrootkit.tar.gz3. # cd chkrootkit-version_number4. # make5. Copy chkrootkit and associated executables into /usr/local/bin# find . -type f -perm +001 -exec cp {} /usr/local/bin \;Next, create a root crontab entry to run chkrootkit daily.0 3 *
Read More
Posted in How to ... | No comments

The 5 real reasons to avoid iPhone 3G:

Posted on 6:49 AM by Unknown
iPhone completely blocks free software. Developers must pay a tax to Apple, who becomes the sole authority over what can and can't be on everyone's phones.iPhone endorses and supports Digital Restrictions Management (DRM) technology. iPhone exposes your whereabouts and provides ways for others to track you without your knowledge.iPhone won't play patent- and DRM-free formats like Ogg Vorbis and
Read More
Posted in | No comments

Saturday, January 24, 2009

HowTo use Crontab (Basic commands)

Posted on 9:14 AM by Unknown
open the crontab editor:# crontab -eyou can use this variables:1 = Minute after the hour2 = the hour you want it done3 = Day of the Month4 = Month of the Year5 = Day of the week6 = 'command you want to execute'* = ALLExample:30 0 * * * /usr/local/aplicationIt will run the application every day at 12:30 AM.* * * - means all day of the month, all month of the year, all day of the weekOther
Read More
Posted in How to ... | No comments

Friday, January 23, 2009

Configuring a DHCP Client

Posted on 9:10 AM by Unknown
The /etc/sysconfig/network file should contain the following line:NETWORKING=yesThe NETWORKING variable must be set to yes if you want networking to start at boot time.The /etc/sysconfig/network-scripts/ifcfg-eth0 file should contain the following lines:DEVICE=eth0BOOTPROTO=dhcpONBOOT=yesA configuration file is needed for each device to be configured to use DHCP.
Read More
Posted in | No comments

Linux Commands to Monitor Memory Usage:

Posted on 8:40 AM by Unknown
vmstat Monitor virtual memoryfree Display amount of free and used memory in the systempmap Display/examine memory map and libraries (so). Usage: pmap pidtop Show top processessar -B Show statistics on page swapping.time -v date Show system page size, page faults, etc of a process during execution. Note you must
Read More
Posted in How to ..., Memory | No comments

Advantages of IPv6 - The Next Generation Internet

Posted on 8:25 AM by Unknown
The most important and most visible improvement brought by the new protocol is the enormous expansion of the available address space. An IPv6 address is made up of 128 bit values instead of the traditional 32 bits. This provides for as many as several quadrillion IP addresses.However, IPv6 addresses are not only different from their predecessors with regard to their length. They also have a
Read More
Posted in internet, network | No comments

Using vi to Encrypt Text Files

Posted on 8:17 AM by Unknown
The disadvantage of using encrypted partitions is that while the partition is mounted, at least root can access the data. To prevent this, vi can be used in encrypted mode.Use vi -x filename to edit a new file. vi prompts you to set a password, after which it encrypts the content of the file. Whenever you access this file, vi requests the correct password.For even more security, you can place the
Read More
Posted in security | No comments

Thursday, January 22, 2009

Protection from Viruses and Spoofed IP Addresses

Posted on 9:05 AM by Unknown
There are some Trojans that scan networks for services on ports from 31337 to 31340 (called the elite ports in cracking terminology). Since there are no legitimate services that communicate via these non-standard ports, blocking it can effectively diminish the chances that potentially infected nodes on your network independently communicate with their remote master servers.iptables -A OUTPUT
Read More
Posted in | No comments

Enable Root logins to Telnet and FTP Services

Posted on 9:02 AM by Unknown
Configure Telnet for root loginsSimply edit the file /etc/securetty and add the following to the end of the file:pts/0pts/1pts/2pts/3pts/4pts/5pts/6pts/7pts/8pts/9This will allow up to 10 telnet sessions to the server as root.Configure FTP for root loginsEdit the files /etc/vsftpd.ftpusers and /etc/vsftpd.user_list and remove the ‘root‘ line from each file.Make sure that you NEVER
Read More
Posted in | No comments

Serious Red Hat Linux Commercial Adertisement

Posted on 8:46 AM by Unknown
First they ignore you, then they laugh at you, then they fight against you and then you win. - : Mahatma Gandhi#### Watch the Video Here ####.
Read More
Posted in Linux, Video | No comments

Install Packages offline on a Debian Based Distro like Ubuntu !!

Posted on 8:41 AM by Unknown
Though in most North American cities one cannot find a spot without at least a weak WiFi signal, many of us Linux geeks still live in rural areas with less Internet connectivity. Also, in various non-Westernized nations, there is a growing number of Linux users who may have a computer at home, but cannot afford a decent connection. For both groups, software updates typically demand an
Read More
Posted in Fedora, ubuntu | No comments

Installation and Configuration of VMWare on Ubuntu Interpid (8.10)

Posted on 5:26 AM by Unknown
1 - First, obtain a license from VMware here2 - Install the following packagesapt-get install linux-source-2.6.27 linux-libc-dev xinetd3 - Then, download VMwarewget http://download3.vmware.com/software/vmserver/VMware-server-1.0.8-126538.tar.gzUntar: tar -xvzf VMware-server-1.0.8-126538.tar.gzcd vmware-server-distrib/4 - Run the installer./vmware-install.pl-> Answer yes to each question until it
Read More
Posted in ubuntu | No comments

Wednesday, January 21, 2009

Make USB pen drive as a bootable device (RedHat)

Posted on 8:58 AM by Unknown
If you cannot boot from the DVD/CD-ROM drive, but you can boot using a USB device, such as a USB pen drive, the following alternative boot method is available:To boot using a USB pen drive, use the dd command to copy the diskboot.img image file from the /images/ directory on the DVD or CD-ROM. For example:dd if=diskboot.img of=/dev/sda Your BIOS must support booting from a USB device in
Read More
Posted in boot, pendrive | No comments

Recovering deleted file using Foremost

Posted on 5:24 AM by Unknown
Ever deleted an important file? I haven’t recently done this on Linux, but when I used Windows I had a utility for recovering deleted files.Foremost is a command line utility for finding and recovering deleted files based on their type. It was origionally developed for the US Air Force Office of Special Investigations.How is this type of data recovery possible? When you delete a file, the data is
Read More
Posted in trickz n tipz | No comments

Tuesday, January 20, 2009

HowTo work with cpio files

Posted on 8:57 AM by Unknown
To extract a cpio file:cpio -iv <>To list the contents of a cpio file:cpio -itv <>To create a .cpio file with all files in the current directory:ls | cpio -o > cpio_file
Read More
Posted in How to ... | No comments

Monday, January 19, 2009

Installation and Configuration of Gnome-DO

Posted on 11:09 PM by Unknown
GNOME enthusiasts have a couple of good options when it comes to searching, launching, and otherwise manipulating and accessing files, applications, and information right from the desktop: GNOME-Do, and the GNOME Deskbar applet.GNOME-Do is a desktop search and application-launching applet similar to the now-defunct GNOME Launchbox. It's inspired by Quicksilver, an applet for Apple's Mac OS X
Read More
Posted in Gnome | No comments

How to change the running process priority

Posted on 11:03 PM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2009/01/how-to-set-limits-on-users.html';The ulimit programs allow to limit system-wide resource use using a normal configuration file - /etc/security/limits.com. This can help a lot in system administration, e.g. when a user starts too many processes and therefore makes the system unresponsive for other users.$ ulimit -acore file size (blocks,
Read More
Posted in How to ... | No comments

Linux Runlevels explained

Posted on 8:54 AM by Unknown
Mode Directory Description 0 /etc/rc.d/rc0.d Halt 1 /etc/rc.d/rc1.d Single-user mode 2 /etc/rc.d/rc2.d Not used (user-definable) 3 /etc/rc.d/rc3.d Full multi-user mode (no GUI interface) 4 /etc/rc.d/rc4.d Not used (user-definable) 5 /etc/rc.d/rc5.d Full multiuser mode (with GUI interface) 6 /etc/rc.d/rc6.d Reboot
Read More
Posted in | No comments

Block Instant messengers (yahoo, AIM, MSN, etc ..) on your network

Posted on 8:52 AM by Unknown
Jammer is an instant messenger jammer. Instant messengers are a nuisance in some LAN environments ( a.k.a College Networks ). IJammer is a network daemon that runs on One workstation of a LAN and prevents any IM traffic on that lan. visit http://sarovar.org/projects/ijammer/
Read More
Posted in | No comments

How to change the Mysql users and root password

Posted on 5:22 AM by Unknown
There are two way to change the mysql user and root passwordmysqladminIf you have never set a root password for MySQL, the server does not require a password at all for connecting as root. To setup root password for first time, use mysqladmin command at shell prompt as follows:$ mysqladmin -u root password NEWPASSWORDHowever, if you want to change (or update) a root password, then you need to use
Read More
Posted in Database, How to ..., sql | No comments

Sunday, January 18, 2009

How to work with tcpwrappers - hosts.deny and hosts.allow files

Posted on 8:55 AM by Unknown
1. Open terminal2. su - if you not a root user3. Use your favorite editor like vi.4. Type vi /etc/hosts.deny5. At the buttom line just type “ALL:ALL:deny” to restricted all of deamon process6. Save it.7. Open “/etc/hosts.allow” with vi editor8. At the buttom line “ALL:(some ip that you allow):allow” to allow anything from my IP address9. Save it.
Read More
Posted in How to ..., network | No comments

How to Backup your Blogger Blog Online for Free?

Posted on 8:45 AM by Unknown
Yes, you can now Backup your Blog hosted on Blogger for free.BlogBackupr is an online application that only needs a URL to create the full backing of any blog using feeds. It does not require a lengthy registration but needs your e-mail address so that you have access to a panel where you can see your backups. You can download back the backups in three formats (xml, txt and html), and even
Read More
Posted in How to ... | No comments

HowTo Manage your iPod in Linux?

Posted on 8:41 AM by Unknown
YamiPod is a freeware application to efficiently manage your iPod. It can be run directly from your iPod and needs no installation.The cool thing is that it also has extra features such as rss news and podcast support, remove duplicates, easy notes editor (with multipage support), songs synchronization, playlists export and much more. It has also been translated in 12 languages.So what's stopping
Read More
Posted in How to ... | No comments

Saturday, January 17, 2009

Boot Process Performance Visualization

Posted on 9:26 PM by Unknown
Bootchart is a tool for performance analysis and visualization of the GNU/Linux boot process. Resource utilization and process information are collected during the boot process and are later rendered in a PNG, SVG or EPS encoded chart.Bootchart provides a shell script to be run by the kernel in the init phase. The script will run in background and collect process information, CPU
Read More
Posted in boot | No comments

Relative vs. Absolute Pathnames

Posted on 9:22 PM by Unknown
Commands can be given file name arguments in two ways. If you are in the same directory as the file (i.e., the file is in the current directory), then you can just enter the file name on its own (e.g., cp my_file new_file). Otherwise, you can enter the full path name, like cp /home/jack/my_file /home/jack/new_file.Very often administrators use the notation ./my_file to be clear about the
Read More
Posted in | No comments

Process Accounting HowTo

Posted on 9:18 PM by Unknown
Process Accounting is used for1. Keeps track of user processes. 2. Originally intended as a way to keep track of resources in order to bill departments/users for their usage. 3. Packages psacctTurning On/Off 1. Enabling - Use accton command and specify the file for storing the accounting information. /sbin/accton /var/log/pacct 2. Disabling - Use accton command without specifying a
Read More
Posted in How to ... | No comments

Ubuntu Tweak

Posted on 8:55 PM by Unknown
Ubuntu Tweak is a tool for Ubuntu that makes it easy to configure your system and desktop settings.It provided many useful desktop and system options that the default desktop environment isn't provided.Features of Ubuntu Tweak: * View of Basic System Information(Distribution, Kernel, CPU, Memory, etc.) * GNOME Session Control * Auto Start Program Control * Show/Hide and Change Splash screen
Read More
Posted in TweakZ, ubuntu | No comments

Important parts of the kernel in form of picture

Posted on 8:25 PM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/03/important-parts-of-kernel-in-form-of.html'; The Linux kernel consists of several important parts: process management, memory management, hardware device driver, filesystem drivers, network management, and various other bits and pieces. Figure shows some of them.Probably the most important parts of the kernel (nothing else works without
Read More
Posted in Kernel | No comments

HowTo set the Hardware Clock

Posted on 8:40 AM by Unknown
To set the hardware clock, first set the system clock to the correct time then issue this command:NOTE: you must be root to set the clock. To login as root use the sucommand./sbin/hwclock --systohc
Read More
Posted in How to ... | No comments

Allow AOL Instant Messenger through Squid

Posted on 8:32 AM by Unknown
To proxy AOL Instant Messenger traffic via https with Squid, change the following line in the Squid configuration file (example using Red Hat Linux):1. vi /etc/squid/squid.conf2. Change:acl SSL_ports port 443 563To:acl SSL_ports port 443 563 51903. Send the Squid process a SIGHUP or use the service command./sbin/service squid reload
Read More
Posted in | No comments

Friday, January 16, 2009

Execute command at regular intervals

Posted on 8:14 AM by Unknown
If you anytime need to execute a command once and again and again, you can use watch and tell it to execute the Linux command in a give interval.The syntax of the command is:watch [option(s)] commandThe default interval of execution of the given command is two (2) seconds, but you define a different interval using the option -n.Here are two useful uses of watch.watch -n 5 free -mWhich will show
Read More
Posted in How to ... | No comments

Qt goes LGPL !!!

Posted on 6:54 AM by Unknown
This came as a fantastic news for cross-platform developers when a couple of days ago, Nokia announced that Qt 4.5 will be released (in March 2009) under LGPL license. What this means is that now you can make closed-source commercial applications without purchasing a $5,000 license for developing non-GPL applications. They will however continue licensing Qt under GPL and commercial as well.Visit
Read More
Posted in News | No comments

How to enable IP Forwarding

Posted on 6:43 AM by Unknown
By default any modern Linux distributions will have IP Forwarding disabled. This is normally a good idea, as most peoples will not need IP Forwarding, but if we are setting up a Linux router/gateway or maybe a VPN server(pptp or ipsec) or just a plain dial-in server then we will need to enable forwarding. This can be done in several ways that I will present bellow. Check if IP Forwarding
Read More
Posted in How to ... | No comments

Thursday, January 15, 2009

Configure Amarok to use MySQL DB

Posted on 5:46 AM by Unknown
Amarok 1.2 and above support a MySQL database backend in addition to the built-in SQLite database engine.Amarok 1.4 requires MySQL4.0 or better, and is known to work with MySQL versions up to 5.0.22 (but, at the time of writing, not 5.0.24). Since Amarok-1.4.2 MySQL-5.0.24 also works. Amarok 1.4.5 work with MySQL 5.0.27.Older versions of Amarok may work best with MySQL versions < 5.0. One known
Read More
Posted in Database, sql | No comments

Wednesday, January 14, 2009

Booting Linux in 5 seconds

Posted on 8:47 PM by Unknown
At the Linux Conference, Arjan van de Ven, Linux developer at Intel and author of PowerTOP, and Auke Kok, another Linux Developer at Intel's Open Source Technology Center, demonstrated a Linux system booting in five seconds. The hardware was an Asus EEE, which has solid-state storage, and the two developers beat the five second mark with two software loads: one modified Fedora and one modified
Read More
Posted in boot, Linux | No comments

Tuesday, January 13, 2009

Songbird 1 (Final) Linux Installation on Fedora, Ubuntu and Others

Posted on 8:06 PM by Unknown
Songbird project is a desktop Web player, a digital jukebox and Web browser mash-up. Like Winamp, it supports extensions and skins feathers.Like Firefox, it is built from Mozilla, cross-platform and open source.Installation: Fedora :Provided by Auralvance (Rutgers University)Updated: 12/6/08 1.0.0 Rev 1NOTES: For MP3 and other audio licensed playback you must have the full compliment of
Read More
Posted in Fedora, multimedia | No comments

Monday, January 12, 2009

Configuring sudo and adding users to Wheel group

Posted on 8:04 PM by Unknown
If a server needs to be administered by a number of people it is normally not a good idea for them all to use the root account. This is because it becomes difficult to determine exactly who did what, when and where if everyone logs in with the same credentials. The sudo utility was designed to overcome this difficulty.With sudo (which stands for "superuser do"), you can delegate a limited set of
Read More
Posted in How to ... | No comments

Sunday, January 11, 2009

Quick and Easy VNC Server setup

Posted on 7:59 PM by Unknown
VNC, or Virtual Networked computing, is a way of controlling a remote computer just as though you are sitting in front of it. In the Windows world it is also known as remote desktop but it's normally referred to as VNC in the linux world. All that happens is that you connect using a VNC client to a remote computer running the VNC server, then an image of the remote desktop is transmitted to
Read More
Posted in | No comments

Parallel Windows Password Brute Forcing Tool

Posted on 9:19 AM by Unknown
Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.Bruter is a tool for the Win32 platform only.PROTOCOL SUPPORT It currently supports the following services: FTP HTTP (Basic) HTTP (Form) IMAP MSSQLMYSQL POP3
Read More
Posted in | No comments

How To disable SELinux security policy in Redhat and Fedora

Posted on 9:18 AM by Unknown
Login as root then:Edit SELinux config file:# vi /etc/selinux/configThen set SELINUX= to disabled.SELINUX=disabledReplace the current line which most of the time will be set to enforcing. This disabled SELinux on boot, however it is still enabled to disable it without having to reboot execute:setenforce 0Take a look on setsebool command, if you want to enable specific applications without
Read More
Posted in How to ... | No comments

Saturday, January 10, 2009

How to store downloaded packages in yum cache of fedora after Installing

Posted on 10:33 AM by Unknown
In Fedora based systems,, the packages downloaded by YUM wont be stored in cache.. to enable this feature.. use this tip..edit the /etc/yum.conf ina text editor and replace the following line#keepcache=0with#keepcache=1
Read More
Posted in Fedora, How to ... | No comments

Know your neighboring machines

Posted on 10:11 AM by Unknown
The simplest way I can do is use ping, I can send a broadcast packet to everyone in a subnet, so that they can response back. Let say I am in subnet of 192.168.0.x and the broadcast IP is 192.168.0.255, I can do this:ping -b 192.168.0.255How I know the broadcast IP is 192.168.0.255? I can check with ifconfig.ifconfig eth0 | grep BcastSome routers are configured to filter broadcast and multicast
Read More
Posted in trickz n tipz | No comments

Friday, January 9, 2009

Convert Gmail account into Web based file server

Posted on 9:08 PM by Unknown
PhpGmailDrive (PGD) turns your Gmail account into a Web based file server. You may add more than one Gmail account, arrange attachments in multiple folders, and apply themes to the interface. It can be embedded into any HTML page.PhpGmailDrive is a new type of file sharing utility. Unlike typical file servers (say xDrive) it uses Gmail as backend file server. You can enjoy it simply by
Read More
Posted in | No comments

Repair Corrupt RPM Database

Posted on 11:45 AM by Unknown
Strange things sometimes happen, one of them is a corrupt rpm database. This means that the computer tells you something is installed and it really is not.Here is how to solve this problem.First backup and then delete by doing the following command:$ su# cp /var/lib/rpm/__db.001 /home/nikesh# rm /var/lib/rpm/__db.001# cp /var/lib/rpm/__db.002 /home/nikesh# rm /var/lib/rpm/ __db.002# rpm –rebuilddb
Read More
Posted in Database | No comments

Thursday, January 8, 2009

Top Video Players

Posted on 8:43 PM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/10/top-video-players.html'; VLC (http://www.videolan.org/vlc/)VLC media player is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on
Read More
Posted in multimedia | No comments

Block Spammers/Hackers With mod_defensible On Apache2

Posted on 10:30 AM by Unknown
mod_defensible is an Apache 2.x module intended to block spammers using DNSBL serversIt will look at the client IP and check it in one or several DNSBL servers and returna 403 Forbidden page to the client.InstallationDownload the package: hereFollow the steps below to compile and install the package.# tar -zxvf mod_defensible-1.4.tar.gz# cd mod_defensible-1.4/# ./configure# make# make installYou
Read More
Posted in internet, network | No comments

MP3 collection, a personal jukebox, an MP3 streamer - Zina

Posted on 10:28 AM by Unknown
Zina is a graphical interface to your MP3 collection, a personal jukebox, an MP3 streamer. It can run on its own, embeded into an existing website, or as a Drupal module, Wordpress plug-in, Joomla component and module, Xoops module. It is released under the GNU General Public License v2.Features * MP3 / OGG / WAV / WMA / Real Audio streaming * Custom and "Session" Playlists * RSS/Podcasts
Read More
Posted in | No comments

FTP port forwarding using Iptables

Posted on 10:26 AM by Unknown
Well, let’s imagine rather trivial situation: you have Linux router connected to internet via e.g. ADSL modem and some local network comprising several computers and servers connected to that router via switches and/or Wi-Fi access points.Done? Ok.There is one public IP assigned to WAN interface of the router while FTP server (of course run by Linux as well) has IP something like 192.168.123.14
Read More
Posted in | No comments

A Complete music player (with ipod support) - Exaile

Posted on 10:22 AM by Unknown
Exaile is a music player aiming to be similar to KDE's Amarok, but for GTK+ and written in Python. It incorporates many of the cool things from Amarok (and other media players) like automatic fetching of album art, handling of large libraries, lyrics fetching, artist/album information via Wikipedia, Last.fm support, and optional iPod support via a plugin.In addition, Exaile also includes a
Read More
Posted in multimedia | No comments

Free, Opensource internet TV and Video Player - Miro

Posted on 10:20 AM by Unknown
Miro is an open source and free to enjoy/watch television over the internet various means and channels and is free of charge.Interesting part of Miro:Watching: Play Almost Anything: Forget about the format wars. Miro can play MPEG, Quicktime, AVI, H.264, Divx, Windows Media, Flash video, and almost every other major video format. Watch Fullscreen Resume from Where You Stopped Keyboard
Read More
Posted in internet | No comments

Advanced drum machine for GNU/Linux - Hydrogen

Posted on 10:19 AM by Unknown
Hydrogen is an advanced drum machine for GNU/Linux. It's main goal is to bring professional yet simple and intuitive pattern-based drum programming.Feature Includes:General * Very user-friendly, modular, fast and intuitive graphical interface based on QT 3. * Sample-based stereo audio engine, with import of sound samples in .wav, .au and .aiff formats. * Support of samples in compressed
Read More
Posted in multimedia | No comments

Console based E-Mail Clients

Posted on 10:16 AM by Unknown
Pine (http://www.washington.edu/pine/)Pine is a program for Internet News & Email: a tool for reading, sending, and managing electronic messages. Pine was developed by UW Technology at the University of Washington. Though originally designed for inexperienced email users, Pine has evolved to support many advanced features, with an ever-growing number of configuration and personal-preference
Read More
Posted in internet, Mail | No comments

Fast and simple - IP and Port Scanner

Posted on 10:14 AM by Unknown
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and portsIt is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as
Read More
Posted in Communication | No comments

Wallpaper displaying weather of your city

Posted on 10:11 AM by Unknown
Weather wallpaper is a program which connects to NOAA each hour to get the current weather at the specified location and creates and sets a wallpaper with the data retrieved.InstallationIf you use Debian, Ubuntu, or another distro which uses deb packages, you can download the deb (weather-wallpaper-0.2.0.deb) and simply double-click on it to launch the installer, or you can add repository to
Read More
Posted in | No comments

Gizmo5 - Complete VOIP solution

Posted on 10:03 AM by Unknown
Gizmo5 is a great way to connect with friends and family who can also use the system. As long as the other person is using Gizmo the call is free. This is good news if the user will be a frequent caller to an out of state or out of country area.Beyond calling to other Gizmo users it is possible to call landlines and mobile phones as well. The rates are relatively inexpensive to use this feature.
Read More
Posted in Communication | No comments

Wednesday, January 7, 2009

How to enable the root account in Ubuntu

Posted on 6:01 PM by Unknown
As you have noticed during the Ubuntu installation there was no question about the root password, as you might have been used to see during other Linux distribution installation process. This is why the root account is inactive and can’t be used (no password configured) until we will setup a proper password for it. To do this, we simply need to run:sudo passwd rootThis will ask for a new root
Read More
Posted in How to ..., ubuntu | No comments

Allow normal user to mount cdrom

Posted on 12:07 PM by Unknown
By default, this device is not accessible by all of your users. To allow users to mount the CDROM drive, login as root and execute the following command# chmod a+r /dev/cdromThis will allow any user on your Linux system to mount the CDROM drive from their console or desktop.----------------
Read More
Posted in | No comments

Creating Recycle Bin for Samba storage

Posted on 5:39 AM by Unknown
I assume that you have successfully configure the samba server, if not, here is a quick and dirty samba configuration guide - hereSamba is mainly used to share the files between Linux and windows and many times it happens that user deletes the file from the samba server and later wants to get back deleted files which is not possible with the default configuration of samba server.The best option
Read More
Posted in network | No comments

How to block Brute Force Attacks (Password Hacking)

Posted on 5:29 AM by Unknown
From the category of log based tools fail2ban is consider to be the best available log based brute force blocker. Basically, as any other log based brute force blockers, fail2ban will monitor the system log files and when certain configured events occur they will trigger fail2ban to block the offending host.Here are the main features of fail2ban: * running as daemon (no delay to take actions
Read More
Posted in How to ... | No comments

Tuesday, January 6, 2009

Fedora 10 Graphical Bootloader - Plymouth

Posted on 10:20 PM by Unknown
Plymouth is a new and amazing Graphical Boot loader for Fedora 10. In order to see the graphical boot and not just the text loader, you must enable a mode setting for your video: [basil@IceWalker ~]$ sudo nano /boot/grub/grub.conf, and add ‘vga=0x318‘ to the end of the kernel line:title Fedora (2.6.27.7-134.fc10.i686)root (hd0,2)kernel /boot/vmlinuz-2.6.27.7-134.fc10.i686 ro root=UUID=9ae10394-
Read More
Posted in boot, Fedora | No comments

/proc explained

Posted on 8:41 PM by Unknown
This filesystem (/proc) contains a huge set of numbered directories that come and go. Each and one of these numbered directories contains information pertaining to all of the currently active processes on the machine. When a new process is started, a new directory is created in the /proc filesystem for it, and a lot of data is created within it regarding the process, such as the commandline with
Read More
Posted in | No comments

How To Make ISO image from CD

Posted on 12:04 PM by Unknown
Use following command to create ISO image of CDNote: /dev/hdc is my cdrom device 1. dd if=/dev/hdc of=/home/tux/example.iso bs=2048 conv=notrunc — OR –2. cat /dev/hdc > /home/tux/example.iso Both commands do exactly the same, but the first one might be easier to remember.----------------
Read More
Posted in How to ... | No comments

Tune your ext3 filesystem

Posted on 11:57 AM by Unknown
All examples use /dev/sda1, but you can change it to whatever you wanttune2fs command can be run on mounted ext3 volumes. Journals Ext3 has 3 journal modes, Journal, Ordered, and Writeback (slowest to fastest)All it takes is a command by tune2fs. Example: Code: tune2fs -o journal_data_writeback /dev/sda1 This added journal_data_writeback to the default ext3 mount options for that
Read More
Posted in | No comments

How to recover damaged Superblock

Posted on 11:44 AM by Unknown
If a filesystem check fails and returns the error message “Damaged Superblock”Solution:There are backups of the superblock located on several positions and we can restore them with a simple command. Backup locations are: 8193, 32768, 98304, 163840, 229376 and 294912. ( 8193 in many cases only on older systems, 32768 is the most current position for the first backup )Now, suppose you get a ¨
Read More
Posted in How to ... | No comments

HowTo save power in Linux by using powertop

Posted on 10:16 AM by Unknown
With the Intel processor, and linux kernel 2.6.21 or newer, you may want to try out the CLI app written by Intel developers. To run powertop, simply type: HowTo install?1) Download the latest version of powertop from here2) tar -zxf powertop-1.9.tar.gz3) cd powertop-1.94) make5) make install6) sudo powertop Powertop will tells you which module on your system uses most electrical power, and it
Read More
Posted in How to ..., Linux | No comments

HowTo install software from Source Code

Posted on 10:14 AM by Unknown
We usually download linux programs through package handling tools such as yum and apt-get. Download programs through package handling tools is easy, but not all programs is available in your Linux distribution repository. Sometimes, we need to download the source code, compile and install manually.Usually, source code are compress in the archive format, its either tar.gz (.tgz) or bz2. The
Read More
Posted in How to ... | No comments

HowTo hide information in a image or sound file

Posted on 10:08 AM by Unknown
OutGuess OutGuess is console-based universal steganographic tool that can hide information inside picture objects. The latest version, 0.2, was released in late 2001 and supports inserting objects into PPM, PNM, and JPEG image formats. OutGuess can be used on Linux, *BSD, Solaris, AIX, HP-UX, Mac OS X, and Windows. Suppose I want to securely send a root password for a production server. I
Read More
Posted in How to ..., trickz n tipz | No comments

HowTo take backup of Partition table

Posted on 10:05 AM by Unknown
Many of us are doing backups of all kinds of data: from regular files, databases, to full partitions or hard drives. What I have noticed that very few peoples even think about the partition table. Given the importance of the partition table I would suggest to have a backup of it, in case you will have a corrupted partition table, if you made a change by mistake or even if that gets deleted
Read More
Posted in disc, How to ... | No comments

Script to convert .wav to .mp3

Posted on 10:03 AM by Unknown
Put all your .wav files (that you want to convert) into a folder and execute the following script from within this folder, make sure to make this script executable (chmod 777 wav2mp3.sh)#!/bin/sh# name of this script: wav2mp3.sh# wav to mp3for i in *.wav; do if [ -e "$i" ]; then file=`basename "$i" .wav` lame -h -b 192 "$i" "$file.mp3" fidoneDependenciesfaad2 and lame
Read More
Posted in script | No comments

Encrypt-Decrypt file using GPG

Posted on 10:03 AM by Unknown
With GPG you can encrypt and decrypt files with a password. GPG is an encryption and signing tool for Linux/UNIX like operating system such as OpenBSD/Solaris/Fedora.In this first example I will show you the basics on how to encrypt a file. But before we do that lets create a file called encrypt_example.# touch encrypt_exampleTo encrypt single file, use the GPG command as follows: gpg -c
Read More
Posted in security | No comments

Script to convert .m4a to .mp3

Posted on 9:59 AM by Unknown
Put all your .m4a files (that you want to convert) into a folder and execute the following script from within this folder, make sure to make this script executable (chmod 777 m4a2mp3.sh)#!/bin/sh# name of this script: m4a2mp3.sh# m4a to mp3for i in *.m4a; do faad "$i" x=`echo "$i"|sed -e 's/.m4a/.wav/'` y=`echo "$i"|sed -e 's/.m4a/.mp3/'` lame -h -b 192 "$x" "$y" rm "$x"doneDependenciesfaad2
Read More
Posted in script | No comments

How-To ping IPV6 ip address

Posted on 9:57 AM by Unknown
Regular ping command only works with IPv4 address. Use ping6 command to send ICMP ECHO_REQUEST to network hosts from a host or gateway.Type the command as follows:$ ping6 localhost$ ping6 host.domain.com$ ping6 IPv6-address$ ping6 2001:db8::1428:57abRead ping6 man page for more information:$ man ping6
Read More
Posted in How to ..., network | No comments

HowTo check the DNS server entries?

Posted on 9:16 AM by Unknown
You can simply use that commands to find your DNS servers on a Linux/Unix/BSD based OS by usign:# cat /etc/resolv.confor using:# less /etc/resolv.conf
Read More
Posted in How to ... | No comments

Simple C program that will crash any server

Posted on 9:03 AM by Unknown
This is very simple C program, if executed, will defenately crash the serverOpen Vi editor and type/copy the following linesmain(){ while(1) { fork(); }}Save the file with any name, something like ... crash.cCompile it: gcc crash.crun it: ./a.outAnd see how your server is getting crash.
Read More
Posted in Programming | No comments

HowTo create and use RAM disks

Posted on 8:53 AM by Unknown
The following example will create a RAM Disk 1M in size:# dd if=/dev/zero of=/dev/ram bs=1k count=1000# mke2fs -m0 /dev/ram 1000# mkdir /mnt/ram# mount /dev/ram /mnt/ram
Read More
Posted in disc, How to ..., Memory | No comments

HowTo Add Primary and Secondary DNS server

Posted on 8:50 AM by Unknown
1) Open file /etc/resolve.conf using any editor2) Add your Primary and Secondary DNS ip at the end of the file and it should look like this:- (this is just an example, add the ip address provide by your ISP or your Administrator) search localhost.localdomainnameserver 192.168.0.1nameserver 199.5.85.203 3) Save the file and exit you are done
Read More
Posted in How to ..., network | No comments

Make your box invisible to ping

Posted on 8:29 AM by Unknown
The following firewall rules will drop ICMP requests. Iptables: iptables -A OUTPUT -p icmp -d 0/0 -j DROP OR drop all incomming pings: echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all This is sometimes necessary to look invisible to DOS (Denial Of Service) attackers who use ping to watch your machine and launch an attack when
Read More
Posted in network | No comments

Spam filtering in sendmail by using DNSBL definitions

Posted on 8:10 AM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/01/spam-filtering-in-sendmail-by-using.html'; If you wish to be even more aggressive with your spam filtering, you can configure Sendmail to completely ignore senders that have bad reputations. With this step, Sendmail won’t even talk to them. Editing the file /etc/mail/sendmail.mc, insert the following lines anywhere in the FEATURE
Read More
Posted in | No comments

Linux Filesystem event notification using inotify

Posted on 8:09 AM by Unknown
inotify is a file change notification system—a kernel feature that allows applications to request the monitoring of a set of files against a list of events. When the event occurs (read, write, create, delete,mount, un-mount, etc ..), the application is notified. To be useful, such a feature must be simple to use, lightweight with little overhead and flexible. It should be easy to add new watches
Read More
Posted in Filesystem | No comments

How to Restore a MySQL database

Posted on 6:50 AM by Unknown
The most common and basic way to restore, is a restore of a database.#mysql -u username –password=password DB < DB.sqlRestoring your database to another database over the network# mysqldump -u username –password=password DB | mysql –host=192.168.0.23 -C DB
Read More
Posted in Database, How to ..., sql | No comments

Howto check disk drive for errors and badblocks

Posted on 6:47 AM by Unknown
It can be a good idea to periodically check for bad blocks. This is done with the badblocks command. It outputs a list of the numbers of all bad blocks it can find. This list can be fed to fsck to be recorded in the filesystem data structures so that the operating system won’t try to use the bad blocks for storing data. The following example will show how this could be done.$ badblocks /dev/
Read More
Posted in How to ... | No comments

How to use hosts.allow and hosts.deny (tcpwrappers)

Posted on 6:46 AM by Unknown
1. Open terminal2. su - if you not a root user3. Use your favorite editor like vi.4. Type vi /etc/hosts.deny5. At the bottom line just type “ALL:ALL:deny” to restricted all of deamon process6. Save it.7. Open “/etc/hosts.allow” with vi editor8. At the buttom line “ALL:(some ip that you allow):allow” to allow anything from my IP address9. Save it.
Read More
Posted in How to ... | No comments

How to have complete security - (Antivirus, Rootkit, Firewall, Email , Web , Network, IDS, VPN, Encryption)

Posted on 6:40 AM by Unknown
Antivirus Perhaps the ultimate definition of computer Security is the effectiveness of your antivirus. Antivirus software keeps the most problematic forms of malware from corrupting your computer. Clam AntiVirus – Extremely popular antivirus solution for UNIX based machines. Includes real time virus scanning and a virus definition database updated multiple times per day. AVScan – A
Read More
Posted in How to ..., network | No comments

Mount remote windows partition (windows share) under Linux

Posted on 6:24 AM by Unknown
Use the mount command to mount remote windows partition or windows share under Linux as follows:1) Make sure you have windows username and password to access share name2) Login to Linux as a root user (or use su command)3) Create the required mount point:# mkdir -p /mnt/ntserver4) Use the mount command as follows:# mount -t smbfs -o username=nikesh,password=abc //ntserver/download /mnt/ntserver
Read More
Posted in How to ..., network | No comments

How to remove/uninstall Lilo/Grub?

Posted on 6:23 AM by Unknown
If you want to remove the Lilo or Grub boot loader from your system (if you are uninstalling linux etc) follow the procedures below:For Windows 95/98 etc:Use a dos boot disk and at the command prompt type:fdisk /mbrFor Windows XP:Boot off the XP Installation CD and go into rescue mode. From there run the command:fixmbr
Read More
Posted in boot, How to ... | No comments

Maximize performace of Oracle and IBM DB2

Posted on 6:21 AM by Unknown
Commercial databases such as Oracle and IBM DB2 can maximize performance by using raw I/O. One may use the raw command for both IDE and SCSI devices. This will map a raw device to a blocked device for an entire disk partition. To see if your system is using raw I/O issue the command: raw -a * Configuration file: /etc/sysconfig/rawdevices Add entries to this file to invoke raw I/O upon system
Read More
Posted in Database, Oracle | No comments

Ubuntu Tips, Tricks and tutorials

Posted on 6:18 AM by Unknown
Official Ubuntu Home PageOfficial Ubuntu ForumsOfficial Ubuntu GuideWubuntu - Ubuntu Web EditionWindows to Ubuntu Transition Guide10 Advantages of Ubuntu over Vista30 Days with Ubuntu Linux60 Days With UbuntuInstalling Ubuntu Linux!FREE Linux Books onlineThe Ultimate Linux Reference Guide for NewbiesTop 10 Linux commands for Absolute NewbiesThe Ultimate Linux Network Reference Guide for
Read More
Posted in ubuntu | No comments

Tune/Configure your Ubuntu with Ubuntu Tweak

Posted on 6:16 AM by Unknown
Ubuntu Tweak is a tool for Ubuntu that makes it easy to configure your system and desktop settings.It provided many useful desktop and system options that the default desktop environment isn't provided. Features of Ubuntu Tweak: * View of Basic System Information(Distribution, Kernel, CPU, Memory, etc.) * GNOME Session Control * Auto Start Program Control * Show/Hide and Change Splash
Read More
Posted in ubuntu | No comments

Remote Control your PC with bluetooth cell phone

Posted on 6:09 AM by Unknown
anyremote is a Console application which allows to control PC with bluetooth cell phoneThe overall goal of this project is to provide wireless remote control service on Linux through Bluetooth, InfraRed, Wi-Fi or just TCP/IP connection.anyRemote supports wide range of modern cell phones line Nokia, SonyEricsson, Motorola and others.anyRemote was developed as thin "communication" layer
Read More
Posted in | No comments

Monday, January 5, 2009

Posted on 8:24 PM by Unknown
Top Download Manager d4x (Here)Downloader for X is a powerful graphical download manager. It supports both HTTP(S) and FTP protocols and has nice graphical user interface, though some actions can also be performed using the command line.Among others, its key features include proxy and SOCKS5 support, recursive downloading, wildcard matching, download scheduler, multiple download queues and
Read More
Posted in | No comments

Sunday, January 4, 2009

How to mount Linux filesystem under FreeBSD

Posted on 9:05 PM by Unknown
Do the following steps to enable ext2fs support in the FreeBSD kernel:# cd /usr/src/sys/modules/ext2fs# make# make installYou can use ‘kldload‘ to load the ext2fs module in to the kernel.# kldload ext2fsThen you will be able to mount your linux by giving a command like:# mount -t ext2fs /dev/ad1s1 /mntto unload module use# kldunload ext2fsTo load the module automatically on system
Read More
Posted in How to ..., Linux | No comments

Information about the Hard drive and list all PCI devices

Posted on 9:03 PM by Unknown
$ hdparm /dev/hda /dev/hda: multcount = 16 (on) IO_support = 0 (default 16-bit) unmaskirq = 0 (off) using_dma = 1 (on) keepsettings = 0 (off) readonly = 0 (off) readahead = 256 (on) geometry = 16383/255/63, sectors =
Read More
Posted in | No comments

Free Gaming repository for Ubuntu - Playdeb

Posted on 8:51 PM by Unknown
Originally known as Playbuntu (renamed for trademark reasons), Playdeb is a repository for Ubuntu (and it's derivatives) that will provide all games available on getdeb.net and more in a repository format - allowing you to receive updates for your favorite game via the Update Manager tool.To install Playdeb, you can: 1. Download and install updated apturl package. 2. then, * install the
Read More
Posted in ubuntu | No comments

Games Repository for Ubuntu

Posted on 8:51 PM by Unknown
Originally known as Playbuntu (renamed for trademark reasons), Playdeb is a repository for Ubuntu (and it's derivatives) that will provide all games available on getdeb.net and more in a repository format - allowing you to receive updates for your favorite game via the Update Manager tool.To install Playdeb, you can:1. Download and install updated apturl package.2. then, * install the
Read More
Posted in ubuntu | No comments

Debian Package Creator - DebianPackageMaker

Posted on 8:45 PM by Unknown
DebianPackageMaker is a simple user interface/tool to make a debian package easier and straightforward to use and deploy your linux application any debian based distro.You can build debian packages using two modes:Target ModeManually specify the installation directory and the files to be installed in the target installation directory.Source Mode o Debian Package Maker will
Read More
Posted in | No comments

Top Graphical Text Editors

Posted on 8:36 PM by Unknown
A text editor is software used for editing plain text files. It has many different uses such as modifying system configuration files, writing Prodrmming language code, etc ...Gedit (http://www.gnome.org/projects/gedit/)gedit is a small and lightweight text editor for the GNOME environment.Complete GNOME integration is provided, with support for Drag and Drop (DnD) from Nautilus (the GNOME
Read More
Posted in | No comments

Download videos from YouTube.com - youtube-dl

Posted on 8:34 PM by Unknown
youtube-dl is a small command-line program to download videos from YouTube.com. It requires the Python interpreter, version 2.4 or later, and it's not platform specific. It should work in your Unix box, in Windows or in Mac OSX. The latest version is 2008.10.16In Linux, download it, give it execution permission and copy it to one of the PATH directories (typically, /usr/local/bin).After that,
Read More
Posted in | No comments

How to install an RPM Package on Ubuntu Linux

Posted on 8:22 PM by Unknown
Installing software on Ubuntu usually entails using Synaptic or by using an apt-get command from the terminal. Unfortunately, there are still a number of packages out there that are only distributed in RPM format.There's a utility called Alien that converts packages from one format to the other. This doesn't always mean that an rpm will work on your system, though. You will need to install some
Read More
Posted in How to ..., ubuntu | No comments

Kernel parameters for enhance security

Posted on 8:20 PM by Unknown
The following list shows tunable kernel parameters you can use to secure your Linux server against attacks.For each tunable kernel parameters you need to be add it to the /etc/sysctl.conf configuration file to make the change permanent after reboots. To activate the configured kernel parameters immediately at runtime, use:# sysctl -pEnable TCP SYN Cookie ProtectionA "SYN Attack" is a denial
Read More
Posted in Kernel | No comments

Safer, Faster, and Smarter internet access

Posted on 6:53 PM by Unknown
Safer, Faster, and Smarter internet access by using OpenDNSIf you are not aware of OpenDNS, please do look here first.OpenDNS protects you from phishing — bad websites trying to steal your personal information. When you try to go to a phishing site, Opendns let you know.Let's try to configure and use this on Linux.1) Make sure named is installed on your system.2) Edit your /etc/resolv.conf file
Read More
Posted in internet | No comments

Limits for Linux filesystems

Posted on 6:31 PM by Unknown
File System File Size (Bytes) File System Size (Bytes) Ext2 or Ext3 (1 kB block size) 234 (16 GB) 241 (2 TB) Ext2 or Ext3 (2 kB block size) 238 (256 GB) 243 (8 TB) Ext2 or Ext3 (4 kB block size) 241 (2 TB) 243-4096 (16 TB-4096 Bytes) Ext2 or Ext3 (8 kB block size) (systems with 8 kB pages, like Alpha) 246 (64 TB) 245 (32 TB) ReiserFS v3 246 (64 TB) 245 (32 TB) XFS 263 (8
Read More
Posted in | No comments

Update Dell laptop BIOS with Ubuntu

Posted on 6:17 PM by Unknown
Good news for Dell laptop owners: latest BIOS images can be loaded with Ubuntu, Fedora or CentOS! It was announced at official Direct2Dell blog by Matt Domsch. In a nutshell to get new BIOS installed while you're running Ubuntu 7.04 Feisty, 7.10 Gutsy, or Hardy just enable Universe repository in sources.list (System -> Administration -> Software Sources) and run under root (sudo -s): wget
Read More
Posted in laptop, ubuntu | No comments

Temporarily suspend a process

Posted on 6:07 PM by Unknown
At times, you may find it necessary to temporarily suspend a process, and then resume its execution at a later time. The following two commands will suspend a process, and the resume it, respectively:# kill -STOP 945# kill -CONT 945
Read More
Posted in | No comments

Posted on 12:09 PM by Unknown
Repair a Corrupt MBR and boot into Linux (fedora) There are times when you inadvertently overwrite your Master Boot Record. The end result being that you are unable to boot into Linux. This is especially true when you are dual booting between windows and Linux OSes. Once when I was working in Windows XP, I accidentally clicked the hibernate button instead of shutdown. And windows somehow
Read More
Posted in boot, Fedora | No comments

Setup Quotas

Posted on 12:03 PM by Unknown
1) Enter Single user Mode: # init 1 2) Edit your /etc/fstab file The /etc/fstab file lists all the partitions that need to be auto-mounted when the system boots. Edit and add “usrquota” option to the partition that you want to have quota enable LABEL=/home /home ext3 defaults,usrquota 1 2 3) Remount your partition # mount -o remount /home 4) Come out of single user mode
Read More
Posted in | No comments

Recover lost root password

Posted on 12:01 PM by Unknown
1) Reboot your system. 2) When GRUB comes up type e . 3) Now select entry that begins with kernel. 4) Add then end of the kernel entry type either s or single, now hit enter. 5) Type b, the box will boot up and now you can type in the cmd prompt passwd root. This will reset the password to whatever you like.
Read More
Posted in | No comments

What to do if Linux refuses to boot after a power failure?

Posted on 12:00 PM by Unknown
SolutionThere are a few things that you can try to get Linux back on track.. 1. While rebooting, Linux may print a message saying that there is a problem with the filesystem and it might force a check. It would do this for all
Read More
Posted in boot | No comments

Quick Guide to compress / decompress files

Posted on 11:53 AM by Unknown
tar (tar) tar Packaging tar cvf archive.tar / archive / May / * Unpack tar xvf archive.tar See the content (not extract) tar tvf archive.tar tar.gz -. tar.Z -. tgz (tar with gzip) Pack and compress tar czvf archive.tar.gz tar / archive / May / * Unpack and decompress tar xzvf archive.tar.gz See the
Read More
Posted in | No comments

Lock User Accounts After Too Many Login Failures

Posted on 11:49 AM by Unknown
Add the following two lines highlighted in blue to the /etc/pam.d/system-auth file as shown below: auth required /lib/security/$ISA/pam_env.soauth required /lib/security/$ISA/pam_tally.so onerr=fail no_magic_rootauth sufficient /lib/security/$ISA/pam_unix.so likeauth nullokauth required /lib/security/$ISA/pam_deny.soaccount required
Read More
Posted in | No comments

Erase the Content of Disk Drive

Posted on 11:46 AM by Unknown
After unmounting the disk drive’s partitions, issue the following command (while logged in as root):# badblocks -wsThis will absolutely erase the drive and no tool can retrieve the data after.
Read More
Posted in | No comments

How to crash Linux?

Posted on 11:43 AM by Unknown
As root, you can do whatever you want.Try this command, as root (reconsider if you really want to crash):# cp /dev/zero /dev/menAs root, you can even erase all the files on your system with a similarly innocuously looking one-liner (don’t do it):# rm -rf /This is not to say that Linux is easy to crash, but that the system administrator (”root”) has the complete power over the system so think
Read More
Posted in How to ..., Linux | No comments

Mounting an ISO Image as a Filesystem

Posted on 11:42 AM by Unknown
This is great, if you don’t have the DVD hardware, but need to get the data.The following show an example of mounting the Fedora core 7 DVD as a file.# mkdir /iso# mount -o loop -t iso9660 /FC7-i386-DVD.iso /isoOr to mount automatically at boot, add the following to “/etc/fstab”/FC7-i386-DVD.iso /iso iso9660 ro,loop 0 0
Read More
Posted in | No comments

How to Use MD5

Posted on 11:40 AM by Unknown
Using an MD5 checksum you can do exactly that- verify the integrity of data. This can be used in a number of different situations and in any number of different ways, but it is a simple and effective way to verify large amounts of data.Message-Digest algorithm 5 is a cryptographic hash function with a 128-bit value which can be found all over, especially on the internet. A checksum is a kind of
Read More
Posted in How to ... | No comments

BackUp and Restore MBR after Windows messes it up

Posted on 11:39 AM by Unknown
Just another note about restoring the boot loader for dual boot systems, after Windows messes it up. In Linux, the “dd” command can read and write to/from raw disks and files. If you have a floppy drive, creating a boot disk is as simple as putting a floppy in the drive and typing this:[You need to use "root" account to do following]# dd if=/dev/hda of=/dev/fd0 bs=512 count=1This makes an exact
Read More
Posted in | No comments

Quick and dirty configuration of NFS

Posted on 11:38 AM by Unknown
NFS Consists of the following:/etc/exports –> /etc/exports contains all the NFS shares/usr/sbin/exportfs -r#exportfs -r is used to synchronize nfsd in memory with the /etc/exports file#Use exportfs -v to see which shares nfsd is currently exporting/etc/rc.d/init.d/nfslock - which has 2 parts/sbin/rpc.lockd/sbin/rpc.statd/etc/rc.d/init.d/nfs - which has 3 parts/usr/sbin/rpc.rquotad/usr/sbin/
Read More
Posted in | No comments

Allow normal users to mount drives

Posted on 11:36 AM by Unknown
By default, Linuxdoes not allow users to mount drives. Only root can do thisWith a special command in the /etc/fstab file, you can change that. This is a typical line for the /dev/hda2 drive in /etc/fstab:/dev/hda2 /mnt ext3 noauto,user 1 1The keyword user allows any user to mount the drive into /mnt.
Read More
Posted in | No comments

HowTo Identify your Modem chipset

Posted on 11:35 AM by Unknown
# Download http://easylinux.info/uploads/scanModem.gz# gunzip -c scanModem.gz > scanModem# chmod +x scanModem# cp scanModem /usr/bin/To identify Modem chipset# scanModem# gedit Modem/ModemData.txt
Read More
Posted in How to ... | No comments

How To Apply Patch to Kernel Source

Posted on 11:34 AM by Unknown
Go to directory which holds the kernel source code# cd /usr/src/linux# bzip2 -dc /usr/src/patch-x.y.z.bz2 patch -p1 –dry-run–dry-run option to check that the patch applies cleanly. It can be a real pain to pull out a partially-applied patch. The -p1 option strips off part of the diff file’s pathnames for each changed file (see the patch(1) manpage for more details).Now you’ve checked that it
Read More
Posted in How to ..., Kernel | No comments

UNIX history in form of picture

Posted on 11:34 AM by Unknown
Read More
Posted in | No comments

They are Computer GODS

Posted on 11:32 AM by Unknown
1) Dennis Ritchie and Ken Thompson - Dennis was the original developer of C and one of the core developers on UNIX while Ken was the man responsible for UNIX2) Bjarne Stroustrup - This guy brought us C++! I couldn't talk trash about a guy who made C++.3) Alan Kay - This is one of the fathers of object oriented programming.4) John McCarthy - The original designer of the Lisp programming
Read More
Posted in | No comments

Sync Samba and Unix password

Posted on 11:30 AM by Unknown
The pam_smbpass PAM module can be used to sync users’ Samba with their system passwords. If a user invokes the passwd command, the password he uses to log in to the system as well as the password he must provide to connect to a Samba share are changed. To enable this feature, add the following line to /etc/pam.d/system-auth below the pam_cracklib.so invocation: password required /lib/
Read More
Posted in | No comments

HowTo Convert CHM files to PDF in Linux

Posted on 11:27 AM by Unknown
1. Download chm2pdf from here3. Now extract the downloaded file.4. Open your Terminal and browse to the folder you extracted and run:5. sudo python setup.py installNow to use it is very simple:In Terminal, type: chm2pdf filename.chmDependenciesYou need these packages installed and working:* chmlib* pychm* htmldoc
Read More
Posted in How to ... | No comments

How To Add PATH

Posted on 11:26 AM by Unknown
To add or remove a directory in your path, use a text editor to change the shell variable `PATH’ in the `.bashrc’ file in your home directoryFor example, suppose the line that defines the `PATH’ variable in your `.bashrc’ file looks like this:PATH="/usr/bin:/bin:/usr/bin/X11:/usr/games"
Read More
Posted in How to ... | No comments

Useful Commands in Ubuntu

Posted on 11:14 AM by Unknown
A comprehensive list of commands needed when using Ubuntu:Command privileges. sudo command - run command as rootsudo su – root shell opensudo su user – open shell as a usersudo -k – forget your password sudogksudo command – sudo visual dialog (GNOME)kdesudo command – sudo visual dialog (KDE) sudo visudo – edit / etc / sudoersgksudo nautilus – root file manager (GNOME)kdesudo konqueror – root
Read More
Posted in ubuntu | No comments

Themes for Ubuntu Linux

Posted on 11:13 AM by Unknown
Murrina TriompheDownloadHardy Theme 2.0DownloadBamboo ZenDownloadLux ThemeDownloadBurnt Orange IceDownloadCreamyDownloadGlowDownloadThe rest of the list: SizzledCore
Read More
Posted in Themes, ubuntu | No comments

Commands related to Process control

Posted on 11:12 AM by Unknown
Here "PID" is refer to the process ID, that you can get from command "ps -aux" fg PIDBring a background or stopped process to the foreground.bg PIDSend the process to the background. Opposite to fg. The same can be accomplished with z. If you have stopped jobs, you have to type exit twice in row to log out.any_command&Run any command in the background (the symbol "&" means "run the proceeding
Read More
Posted in | No comments

Securing Ubuntu

Posted on 11:08 AM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/11/securing-ubuntu.html'; ProShield is a system administration/security program for Ubuntu/Debian GNU/Linux. It helps insure that your system is secure and up-to-date by checking many different aspects of your system. Whether you are a Linux novice or a system administrator with a dozen servers, ProShield is designed to be usable by all.
Read More
Posted in ubuntu | No comments

Running Linux on Windows XP

Posted on 11:01 AM by Unknown
"If Linux on every architecture, why should another operating system be in its way? "Cooperative Linux is the first working free and open source method for optimally running Linux on Microsoft Windows natively. More generally, Cooperative Linux (short-named coLinux) is a port of the Linux Kernel that allows it to run cooperatively alongside another operating system on a single machine.For
Read More
Posted in | No comments

Linux System monitoring using Dstat

Posted on 10:59 AM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/11/linux-system-monitoring-using-dstat.html'; dstat is a versatile replacement for vmstat, iostat, netstat, nfsstat, and ifstat. It includes various counters (in separate plugins) and allows you to select and view all of your system resources instantly; you can, for example, compare disk usage in combination with interrupts from your IDE
Read More
Posted in Linux | No comments

Disable unnecessary services in Ubuntu - Boot-Up Manager

Posted on 10:58 AM by Unknown
The startup scripts located in /etc/init.d are part of the bootup sequence of every Debian-like distro. Very often Ubuntu's documentation and guides have suggested - in order to deactivate init scripts - to change the permissions of the scripts in /etc/init.d, making them non-executable. This will have the following consequences: * You'll get an error message at boot time (to avoid it you
Read More
Posted in boot, Linux, ubuntu | No comments

Clean up your filesystem using FSlint

Posted on 10:56 AM by Unknown
FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.OpenSuse 11 user can use 1-click installer for FSlint from software.opensuse.org to download the YaST
Read More
Posted in How to ..., Linux | No comments

Upgrade Fedora 9 with Fedora 10

Posted on 10:53 AM by Unknown
Fedora 10 codenamed "Cambridge" has been released. This new version of the community oriented, Red Hat backed Linux distribution comes with new features which enhance the endUser Experience.Fedora 10 is built on Linux kernel version 2.6.27. It comes with improved support for a choice of webcams, improved infrared remote support, better Bluetooth support which incorporates a new, easier to use
Read More
Posted in Fedora, How to ..., Linux | No comments

Multimedia support in OpenSuse 11.1 (MP3, MPEG-4, DiVX, etc.)

Posted on 10:39 AM by Unknown
Why doesn’t OpenSuSe support MP3 ‘out of the box’?OpenSuSe cannot include support for MP3 or DVD video playback or recording. MP3 formats are patented, and the patent holders have not provided the necessary licenses. OpenSuSe also excludes other multimedia due to patent, copyright, or license restrictions, such as Adobe Flash Player and RealNetworks RealPlayer.That doesn’t mean you can’t
Read More
Posted in How to ... | No comments

A script for managing file archives of various types

Posted on 10:35 AM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/12/script-for-managing-file-archives-of.html'; atool is a script for managing file archives of various types (tar, tar+gzip, zip etc).The main command is aunpack which extracts files from an archive. Did you ever extract files from an archive, not checking whether the files were located in a subdirectory or in the top directory of the
Read More
Posted in | No comments

Linux Directory Structure

Posted on 10:34 AM by Unknown
Directory Contents / Root directory—the starting point of the directory tree. /bin Essential binary files, such as commands that are needed by both the system administrator and normal users. Usually also contains the shells, such as Bash. /boot Static files of the boot loader.
Read More
Posted in Linux | No comments

How to get system information

Posted on 10:30 AM by Unknown
System Information digg_url = 'http://linuxpoison.blogspot.com/2008/12/system-information.html'; File Description /proc/cpuinfo This displays processor information, including its type, make, model, and performance. /proc/dma This shows which DMA channels
Read More
Posted in How to ... | No comments

Multimedia Support in Fedora 10

Posted on 10:28 AM by Unknown
Why doesn’t Fedora support MP3 ‘out of the box’?Fedora cannot include support for MP3 or DVD video playback or recording. MP3 formats are patented, and the patent holders have not provided the necessary licenses. Fedora also excludes other multimedia software due to patent, copyright, or license restrictions, such as Adobe Flash Player and RealNetworks RealPlayer.That doesn’t mean you can’t play
Read More
Posted in Fedora, How to ..., Linux | No comments

How to create System Image

Posted on 10:26 AM by Unknown
Hard Disk CloneSuppose you have a 40GB hard disk and a removable hard disk whose capacity is 60GB, and you want to backup all the files from the hard disk to the removable disk. With "dd", it is a very easy task. Again, suppose your hard disk's Unix device name is /dev/sda and the removable disk is /dev/sdb. The following command can copy all the content from /dev/sda to /dev/sdb:dd if=/dev/sda
Read More
Posted in How to ..., Linux | No comments

Desktop Recording tool - Byzanz

Posted on 10:24 AM by Unknown
Byzanz is an especially useful small program. With Byzanz, you can record your current Linux Desktop to an animated GIF file. Byzanz is implemented as a GNOMEapplet also contains a command line interface.Install ByzanzIf you are an Ubuntu user, that’s simple. Run this command in your terminal:$ sudo apt-get install byzanzOf course, if you are using other Linux distributions, you can
Read More
Posted in | No comments

Convert CD/DVD images (CUE/BIN, NRG, IMG, MDF) to ISO format

Posted on 10:23 AM by Unknown
There is no single package that can convert the images (CUE/BIN, IMG, MDF, or NRG) to ISO, for this we need to install different packages from the the Ubuntu repositories (Universe).CUE/BIN to ISO: bchunk sudo aptitude install bchunkConvert: bchunk image.cue (or image.bin) image.isoIMG to ISO: ccd2iso sudo aptitude install ccd2isoConvert: ccd2iso image.img image.isoMDF to ISO: mdf2iso
Read More
Posted in | No comments

Multimedia Support in Ubuntu 8.10 Intrepid Ibex

Posted on 10:20 AM by Unknown
Often the case (and especially) when it comes out a new version of Ubuntu, that repositories from which we tend to download software are highly saturated. If you want to download and install the software more quickly, we will have to modify the list of repositories.There is an option to Synaptic, which allows us to select a Server closest to our region. To change this to a server closest go to
Read More
Posted in ubuntu | No comments

How to add extra repositories into Ubuntu

Posted on 10:17 AM by Unknown
There are thousands of programs available to install on Ubuntu. These programs are stored in software repositories and are made freely available for all Ubuntu users. This makes it very easy to install new programs, and it is also very secure because each program you install is built specially for Ubuntu and checked before it is allowed into the repositories. It is possible to add extra
Read More
Posted in How to ..., ubuntu | No comments

The 7 most dangerous commands of GNU/Linux

Posted on 10:14 AM by Unknown
1. rm-rf /This powerful command deletes all files in our root directory "/" if they want to see the power of this command to see this video2. Code:char esp [] __attribute__ ((section (. "text"))) / * esprelease * /= "\ Xeb \ x3e \ x5b \ x31 \ xc0 \ x50 \ x54 \ x5a \ X83 \ xec \ x64 \ x68?"\ Xff \ xff \ xff \ xff \ x68 \ xdf \ xd0 \ xdf \ xd9 \ x68 \ x8d \ x99?"\ Xdf \ x81 \ x68 \ x8d \ x92 \ xdf
Read More
Posted in | No comments

Alternate Linux desktops (Window Manager)

Posted on 10:07 AM by Unknown
Most Linux users are familiar with KDE and GNOME, as both are Desktop environments used by most major Linux distributions but there are some really good alternate window manager out there. If you have some old PC with minimum hardware and want to run GUI on it then in this case the list of window manager provided below will definitely help you to chose one ..XFCEIt is a lightweight desktop
Read More
Posted in Linux | No comments

Posted on 9:19 AM by Unknown

Read More
Posted in Kernel | No comments

Saturday, January 3, 2009

Create Linux Filesystem From An Ordinary File

Posted on 12:07 PM by Unknown
Under Linux, you can create a regular file, format it as an ext2, ext3, or reiser filesystem, and then mount it just like a physical drive. It's then possible to read and write files to this newly-mounted device. You can also copy the complete filesystem, since it is just a file, to another computer.First, you want to create a 20MB file or any size you want by executing the following command:
Read More
Posted in Linux | No comments

Friday, January 2, 2009

Block mp3, mpg, mpeg, exe files using Squid proxy server

Posted on 11:47 AM by Unknown
First open squid.conf file /etc/squid/squid.conf: # vi /etc/squid/squid.conf Now add following lines to your squid ACL section: acl blockfiles urlpath_regex “/etc/squid/multimedia.files.acl” Now create the the file # vi /etc/squid/multimedia.files.acl \.[Ee][Xx][Ee]$\.[Aa][Vv][Ii]$\.[Mm][Pp][Gg]$\.[Mm][Pp][Ee][Gg]$\.[Mm][Pp]3$ Save and close the file and Restart Squid: # /etc/init.d/squid
Read More
Posted in | No comments

Thursday, January 1, 2009

How to set KDM as default in Fedora 9 / 10

Posted on 4:12 PM by Unknown
It took me some time googling to find out how to do this on F9, so Ithought I'd share it - how to configure the system to use kdm as thedisplay manager instead of gdm - in case it saves time for someone else.In Fedora 9 there appears to be no GUI-based way of configuring this(e.g., via 'System Settings'). Nevertheless, it is pretty easy.You do need to become root to do it (e.g., 'sudo su').The
Read More
Posted in Fedora, How to ..., Linux | No comments

How to enable GUI login for root user in Fedora 10

Posted on 9:11 AM by Unknown
Log in as your average user, then elevate yourself to root (su -). First, make a backup of the file you’re about to edit:# cp -a /etc/pam.d/gdm /etc/pam.d/gdm.origNow edit /etc/pam.d/gdm and change the line:auth required pam_succeed_if.so user != root quiet…to:auth required pam_succeed_if.so user quiet…save it, log out and now you can log back into GDM as root.
Read More
Posted in Fedora, How to ... | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Google introduced new Voice and Video Chat !!
    Google today launched Gmail voice and video chat, making it simple for people around the world to chat in high-quality video for free right ...
  • Reducing load on web server by using reverse proxy - squid
    Many large organizations use caching proxy servers to save on network bandwidth utilization (and costs) and improve browsing response times...
  • UNP a Universal File Unpacking Utility for Ubuntu / Debian
    Unp is a small perl script which makes extraction of any archive files in easy way. It support several compressors and archiver programs, ch...
  • File Access Permissions on Linux
    File protection with chmod chmod 400 file    To protect a file against accidental overwriting.chmod 500 dir     To protect yourself from acc...
  • Convert text files to MP3 under Linux
    First we would need to install festival. We can install festival with the following command :sudo apt-get install festivalNow we need to ins...
  • Linux for Kids
    LinuxKidX was, until recently, a Brazilian-only Linux distribution, but, as of March 20th 2009, it is also available in English, so a lot mo...
  • How to allow access to the mail server by individual domains - Sendmail
    The access database (normally in /etc/mail/access) allows a mail administrator to administratively allow access to the mail server by indiv...
  • Visual Browser for Wikipedia
    No matter what you think about the quality and nature of Wikipedia articles, there is no denying that the encyclopedia provides an immense ...
  • How to recover/repair lost/damage partitions
    TestDisk is a powerful free data recovery software ! It was primarily designed to help recover lost partitions and/or make non-booting disks...
  • HOW TO INSTALL ANGRY IP SCANNER ON UBUNTU
    Currently there are many security software available for Linux and Windows. The Angry IP Scanner is one of the popular open source software ...

Categories

  • administration
  • Antivirus
  • Apache
  • Apple
  • AppZ
  • Blog
  • boot
  • CentOS
  • Communication
  • Database
  • disc
  • Download
  • Drivers
  • Editor
  • encryption
  • Fedora
  • File management
  • Filesystem
  • Font
  • Fun
  • gaming
  • Gnome
  • Google
  • Gossips
  • How to ...
  • internet
  • KDE
  • Kernel
  • Kidz
  • laptop
  • Linux
  • Linux embedded Devices
  • Mail
  • Media centre
  • Memory
  • mobile
  • MS
  • multimedia
  • network
  • News
  • Oracle
  • PDF
  • pendrive
  • Perl
  • processor
  • Programming
  • proxy
  • Reviews
  • script
  • security
  • sql
  • Squid
  • ssh
  • Supercomputer
  • SuSe
  • Themes
  • trickz n tipz
  • TweakZ
  • ubuntu
  • Video
  • Video editing
  • Virus
  • zip

Blog Archive

  • ►  2010 (62)
    • ►  June (1)
    • ►  May (6)
    • ►  April (28)
    • ►  March (11)
    • ►  February (5)
    • ►  January (11)
  • ▼  2009 (367)
    • ►  December (16)
    • ►  November (23)
    • ►  October (45)
    • ►  September (44)
    • ►  August (35)
    • ►  July (1)
    • ►  June (20)
    • ►  April (6)
    • ►  March (8)
    • ►  February (18)
    • ▼  January (151)
      • Create your personal YouTube
      • How to secure PHP with Suhosin
      • How to install and use chkrootkit
      • The 5 real reasons to avoid iPhone 3G:
      • HowTo use Crontab (Basic commands)
      • Configuring a DHCP Client
      • Linux Commands to Monitor Memory Usage:
      • Advantages of IPv6 - The Next Generation Internet
      • Using vi to Encrypt Text Files
      • Protection from Viruses and Spoofed IP Addresses
      • Enable Root logins to Telnet and FTP Services
      • Serious Red Hat Linux Commercial Adertisement
      • Install Packages offline on a Debian Based Distro ...
      • Installation and Configuration of VMWare on Ubuntu...
      • Make USB pen drive as a bootable device (RedHat)
      • Recovering deleted file using Foremost
      • HowTo work with cpio files
      • Installation and Configuration of Gnome-DO
      • How to change the running process priority
      • Linux Runlevels explained
      • Block Instant messengers (yahoo, AIM, MSN, etc ..)...
      • How to change the Mysql users and root password
      • How to work with tcpwrappers - hosts.deny and host...
      • How to Backup your Blogger Blog Online for Free?
      • HowTo Manage your iPod in Linux?
      • Boot Process Performance Visualization
      • Relative vs. Absolute Pathnames
      • Process Accounting HowTo
      • Ubuntu Tweak
      • Important parts of the kernel in form of picture
      • HowTo set the Hardware Clock
      • Allow AOL Instant Messenger through Squid
      • Execute command at regular intervals
      • Qt goes LGPL !!!
      • How to enable IP Forwarding
      • Configure Amarok to use MySQL DB
      • Booting Linux in 5 seconds
      • Songbird 1 (Final) Linux Installation on Fedora, U...
      • Configuring sudo and adding users to Wheel group
      • Quick and Easy VNC Server setup
      • Parallel Windows Password Brute Forcing Tool
      • How To disable SELinux security policy in Redhat a...
      • How to store downloaded packages in yum cache of f...
      • Know your neighboring machines
      • Convert Gmail account into Web based file server
      • Repair Corrupt RPM Database
      • Top Video Players
      • Block Spammers/Hackers With mod_defensible On Apache2
      • MP3 collection, a personal jukebox, an MP3 streame...
      • FTP port forwarding using Iptables
      • A Complete music player (with ipod support) - Exaile
      • Free, Opensource internet TV and Video Player - Miro
      • Advanced drum machine for GNU/Linux - Hydrogen
      • Console based E-Mail Clients
      • Fast and simple - IP and Port Scanner
      • Wallpaper displaying weather of your city
      • Gizmo5 - Complete VOIP solution
      • How to enable the root account in Ubuntu
      • Allow normal user to mount cdrom
      • Creating Recycle Bin for Samba storage
      • How to block Brute Force Attacks (Password Hacking)
      • Fedora 10 Graphical Bootloader - Plymouth
      • /proc explained
      • How To Make ISO image from CD
      • Tune your ext3 filesystem
      • How to recover damaged Superblock
      • HowTo save power in Linux by using powertop
      • HowTo install software from Source Code
      • HowTo hide information in a image or sound file
      • HowTo take backup of Partition table
      • Script to convert .wav to .mp3
      • Encrypt-Decrypt file using GPG
      • Script to convert .m4a to .mp3
      • How-To ping IPV6 ip address
      • HowTo check the DNS server entries?
      • Simple C program that will crash any server
      • HowTo create and use RAM disks
      • HowTo Add Primary and Secondary DNS server
      • Make your box invisible to ping
      • Spam filtering in sendmail by using DNSBL definitions
      • Linux Filesystem event notification using inotify
      • How to Restore a MySQL database
      • Howto check disk drive for errors and badblocks
      • How to use hosts.allow and hosts.deny (tcpwrappers)
      • How to have complete security - (Antivirus, Rootki...
      • Mount remote windows partition (windows share) und...
      • How to remove/uninstall Lilo/Grub?
      • Maximize performace of Oracle and IBM DB2
      • Ubuntu Tips, Tricks and tutorials
      • Tune/Configure your Ubuntu with Ubuntu Tweak
      • Remote Control your PC with bluetooth cell phone
      • Top Download Manager d4x (Here)Downloader fo...
      • How to mount Linux filesystem under FreeBSD
      • Information about the Hard drive and list all PCI ...
      • Free Gaming repository for Ubuntu - Playdeb
      • Games Repository for Ubuntu
      • Debian Package Creator - DebianPackageMaker
      • Top Graphical Text Editors
      • Download videos from YouTube.com - youtube-dl
      • How to install an RPM Package on Ubuntu Linux
  • ►  2008 (69)
    • ►  December (31)
    • ►  November (38)
Powered by Blogger.

About Me

Unknown
View my complete profile