Need to Keep Secrets? Encrypt it. To Encrypt: $ openssl des3 -salt -in file.txt -out file.des3 The above will prompt for a password, or you can put it in with a -k option, assuming you're on a trusted server. To Decrypt $ openssl des3 -d -salt -in file.des3 -out file.txt -k mypassword Need to encrypt what you type? Enter the following, then start typing and ^
Tuesday, February 17, 2009
Alternative Boot Loaders
Posted on 9:04 PM by Unknown
If you do not wish to use a boot loader, you have several alternatives: LOADLIN You can load Linux from MS-DOS. Unfortunately, this requires a copy of the Linux kernel (and an initial RAM disk, if you have a SCSI adapter) to be available on an MS-DOS partition. The only way to accomplish this is to boot your
Small History of "Ubuntu"
Posted on 9:01 PM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/03/what-does-word-ubuntu-mean.html'; The word "Ubuntu" is an ancient Zulu and Xhosa word which means "humanity to others". Ubuntu also means "I am what I am because of who we all are". It was chosen because these sentiments precisely describe the spirit of the Ubuntu Linux distribution.Ubuntu is one of a number of Linux distributions. The
The most dangerous Rootkit
Posted on 8:58 PM by Unknown
Dubbed "Mebroot," the rootkit infects the master boot record (MBR), the first sector of a PC's hard drive that the computer looks to before loading the operating system. Since it loads before anything else, Mebroot is nearly invisible to security software. "You can't execute any earlier than that," F-Secure's chief research officer, Mikko Hypponen, said.Once a machine is infected, the hacker
ctime, atime, and mtime
Posted on 8:17 PM by Unknown
It is important to distinguish between a file or directory's change time (ctime), access time (atime), and modify time (mtime).ctime -- In UNIX, it is not possible to tell the actual creation time of a file. The ctime--change time--is the time when changes were made to the file or directory's inode (owner, permissions, etc.). It is needed by the dump command to determine if the file needs to be
Monday, February 16, 2009
Write your own kernel module and insert it into running kernel
Posted on 8:16 AM by Unknown
So, you want to write a kernel module. You know C, you've written a few normal programs to run as processes, and now you want to get to where the real action is, to where a single wild pointer can wipe out your file system and a core dump means a reboot.kernel Modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel
Sunday, February 15, 2009
Website downloader for Linux - HTTrack
Posted on 8:20 AM by Unknown
HTTrack is a free (GPL, free / Free software) and easy-to-use offline browser utility.It allows you to download a World Wide Web site from the Internet a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your
Saturday, February 14, 2009
HowTo boot the system into Resuce/Single-User or Emergency Mode
Posted on 9:23 PM by Unknown
Booting into Rescue ModeRescue mode provides the ability to boot a small Linux environment entirely from CD-ROM, or some other boot method, instead of the system's hard drive.As the name implies, rescue mode is provided to rescue you from something. During normal operation, your Linux system uses files located on your system's hard drive to do everything — run programs, store your files, and
Thursday, February 12, 2009
Configure Gmail account on Linux
Posted on 9:31 PM by Unknown
The first step is to configure your GMail account to enable POP access. Start a browser, log into your GMail account and click on the Settings link at the top of the page. On the settings page, click on Forwarding and POP. On the GMail forwarding and POP screen, make sure the POP download is enabled. Make selections to control whether email is also left on the GMail server and whether all
Tuesday, February 10, 2009
HowTo get the firstboot screen again in Fedora/RedHat
Posted on 9:15 PM by Unknown
The first time the system boots, the /sbin/init program calls the /etc/rc.d/init.d/firstboot script, which in turn launches the Setup Agent. This application allows the user to install the latest updates as well as additional applications.The /etc/sysconfig/firstboot file tells the Setup Agent application not to run on subsequent reboots. To run it the next time the system boots, remove /etc/
Saturday, February 7, 2009
Firewall for Ubuntu - Gufw
Posted on 5:32 AM by Unknown
iptables is already a very powerful tool by itself, but it's syntax can get awkward at times and hard to figure out, so Ubuntu developersdecided to make ufw ("The reason ufw was developed is that we wanted to create a server-level firewalling utility that was a little bit more for `human beings`."), which was to be simpler. Now, on the graphical side of things, Firestarer already existed. But why
Friday, February 6, 2009
HowTo install Fedora 10 on old intel machines
Posted on 9:11 PM by Unknown
You have tried to install Fedora 10 on your PC which worked just fine with Fedora 8 and Fedora 9, but with Fedora 10 when you finished the initial text mode part of the installation the graphical part of the installation started and the computer hung. The only thing you could do was power off the computer.Your PC has an Intel graphics chip.The new F10 driver uses the new EXA acceleration method.
January 27, 2009. The KDE Community announced the immediate availability of "The Answer", (a.k.a KDE 4.2.0), readying the Free Desktop for end users. KDE 4.2 builds on the technology introduced with KDE 4.0 in January 2008. After the release of KDE 4.1, which was aimed at casual users, the KDE Community is now confident we have a compelling offering for the majority of end users.Debian KDE 4.2.0
Hard disk drive health inspection tool - GSmartControl
Posted on 12:39 AM by Unknown
To check whether smartmontools and smartctl has been installed properly , issue the following command in the terminal window (root):# smartctl -i /dev/sda2Note : Replace sda2 with your hard disk device fileThis should show detailed information about your hard disk, for example in my case I got the following output:Once everthing is working fine, we can go-ahead and install the GUI for smartctl -
Tuesday, February 3, 2009
HowTo Password Protect the GRUB
Posted on 9:14 PM by Unknown
The main reason to password protect the GRUB boot loder is to Prevent Access to Single User Mode — If attackers can boot the system into single user mode, they are logged in automatically as root without being prompted for the root password.To do this, open a shell prompt, log in as root, and type: /sbin/grub-md5-crypt When prompted, type the GRUB password and press Enter. This returns an
Monday, February 2, 2009
Is Linus is the real author of LINUX?
Posted on 9:12 PM by Unknown
“A couple of years ago this guy called Ken Brown wrote a book saying that Linus stole Linux from me… It later came out that Microsoft had paid him to do this…”–Andrew S Tanenbaum, father on MINIX The Alexis de Tocqueville Institution released a report based on a forthcoming book by Ken Brown, "Samizdat: And Other Issues Regarding the 'Source' Of Open Source Code", which challenges the claim that
Network Configuration Files in RedHat and Fedora
Posted on 9:09 PM by Unknown
The primary network configuration files are as follows:/etc/hostsIt can also be used to resolve hostnames on small networks with no DNS server. For more information, refer to the hosts man page./etc/resolv.confThis file specifies the IP addresses of DNS servers and the search domain. For more information about this file, refer to the resolv.conf man page./etc/sysconfig/networkThis file specifies
Sunday, February 1, 2009
How to change DMA settings on Ubuntu
Posted on 8:17 AM by Unknown
One really common solution to slow, and unreliable playback of DVD is the settings related to DMA which is turn "off" by default.DMA stands for: Direct Memory Access. DMA allows a piece of hardware to talk directly with the RAM, reading and/or writing independent of the CPU (Central Processing Unit). In other words the hardware can use the system memory, bypassing the CPU, allowing the device to
Subscribe to:
Comments (Atom)