FreeAntivirus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, February 17, 2009

Encrypting files with OpenSSL

Posted on 9:06 PM by Unknown
Need to Keep Secrets? Encrypt it. To Encrypt: $ openssl des3 -salt -in file.txt -out file.des3 The above will prompt for a password, or you can put it in with a -k option, assuming you're on a trusted server. To Decrypt $ openssl des3 -d -salt -in file.des3 -out file.txt -k mypassword Need to encrypt what you type? Enter the following, then start typing and ^
Read More
Posted in | No comments

Alternative Boot Loaders

Posted on 9:04 PM by Unknown
If you do not wish to use a boot loader, you have several alternatives: LOADLIN You can load Linux from MS-DOS. Unfortunately, this requires a copy of the Linux kernel (and an initial RAM disk, if you have a SCSI adapter) to be available on an MS-DOS partition. The only way to accomplish this is to boot your
Read More
Posted in boot | No comments

Small History of "Ubuntu"

Posted on 9:01 PM by Unknown
digg_url = 'http://linuxpoison.blogspot.com/2008/03/what-does-word-ubuntu-mean.html'; The word "Ubuntu" is an ancient Zulu and Xhosa word which means "humanity to others". Ubuntu also means "I am what I am because of who we all are". It was chosen because these sentiments precisely describe the spirit of the Ubuntu Linux distribution.Ubuntu is one of a number of Linux distributions. The
Read More
Posted in ubuntu | No comments

The most dangerous Rootkit

Posted on 8:58 PM by Unknown
Dubbed "Mebroot," the rootkit infects the master boot record (MBR), the first sector of a PC's hard drive that the computer looks to before loading the operating system. Since it loads before anything else, Mebroot is nearly invisible to security software. "You can't execute any earlier than that," F-Secure's chief research officer, Mikko Hypponen, said.Once a machine is infected, the hacker
Read More
Posted in | No comments

ctime, atime, and mtime

Posted on 8:17 PM by Unknown
It is important to distinguish between a file or directory's change time (ctime), access time (atime), and modify time (mtime).ctime -- In UNIX, it is not possible to tell the actual creation time of a file. The ctime--change time--is the time when changes were made to the file or directory's inode (owner, permissions, etc.). It is needed by the dump command to determine if the file needs to be
Read More
Posted in | No comments

Monday, February 16, 2009

Write your own kernel module and insert it into running kernel

Posted on 8:16 AM by Unknown
So, you want to write a kernel module. You know C, you've written a few normal programs to run as processes, and now you want to get to where the real action is, to where a single wild pointer can wipe out your file system and a core dump means a reboot.kernel Modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel
Read More
Posted in Kernel | No comments

Sunday, February 15, 2009

Website downloader for Linux - HTTrack

Posted on 8:20 AM by Unknown
HTTrack is a free (GPL, free / Free software) and easy-to-use offline browser utility.It allows you to download a World Wide Web site from the Internet a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your
Read More
Posted in | No comments

Saturday, February 14, 2009

HowTo boot the system into Resuce/Single-User or Emergency Mode

Posted on 9:23 PM by Unknown
Booting into Rescue ModeRescue mode provides the ability to boot a small Linux environment entirely from CD-ROM, or some other boot method, instead of the system's hard drive.As the name implies, rescue mode is provided to rescue you from something. During normal operation, your Linux system uses files located on your system's hard drive to do everything — run programs, store your files, and
Read More
Posted in boot, How to ... | No comments

Thursday, February 12, 2009

Configure Gmail account on Linux

Posted on 9:31 PM by Unknown
The first step is to configure your GMail account to enable POP access. Start a browser, log into your GMail account and click on the Settings link at the top of the page. On the settings page, click on Forwarding and POP. On the GMail forwarding and POP screen, make sure the POP download is enabled. Make selections to control whether email is also left on the GMail server and whether all
Read More
Posted in How to ..., Linux, Mail | No comments

Tuesday, February 10, 2009

HowTo get the firstboot screen again in Fedora/RedHat

Posted on 9:15 PM by Unknown
The first time the system boots, the /sbin/init program calls the /etc/rc.d/init.d/firstboot script, which in turn launches the Setup Agent. This application allows the user to install the latest updates as well as additional applications.The /etc/sysconfig/firstboot file tells the Setup Agent application not to run on subsequent reboots. To run it the next time the system boots, remove /etc/
Read More
Posted in boot, Fedora, How to ... | No comments

Saturday, February 7, 2009

Firewall for Ubuntu - Gufw

Posted on 5:32 AM by Unknown
iptables is already a very powerful tool by itself, but it's syntax can get awkward at times and hard to figure out, so Ubuntu developersdecided to make ufw ("The reason ufw was developed is that we wanted to create a server-level firewalling utility that was a little bit more for `human beings`."), which was to be simpler. Now, on the graphical side of things, Firestarer already existed. But why
Read More
Posted in security, ubuntu | No comments

Friday, February 6, 2009

HowTo install Fedora 10 on old intel machines

Posted on 9:11 PM by Unknown
You have tried to install Fedora 10 on your PC which worked just fine with Fedora 8 and Fedora 9, but with Fedora 10 when you finished the initial text mode part of the installation the graphical part of the installation started and the computer hung. The only thing you could do was power off the computer.Your PC has an Intel graphics chip.The new F10 driver uses the new EXA acceleration method.
Read More
Posted in Fedora, How to ... | No comments

Posted on 12:42 AM by Unknown
January 27, 2009. The KDE Community announced the immediate availability of "The Answer", (a.k.a KDE 4.2.0), readying the Free Desktop for end users. KDE 4.2 builds on the technology introduced with KDE 4.0 in January 2008. After the release of KDE 4.1, which was aimed at casual users, the KDE Community is now confident we have a compelling offering for the majority of end users.Debian KDE 4.2.0
Read More
Posted in KDE | No comments

Hard disk drive health inspection tool - GSmartControl

Posted on 12:39 AM by Unknown
To check whether smartmontools and smartctl has been installed properly , issue the following command in the terminal window (root):# smartctl -i /dev/sda2Note : Replace sda2 with your hard disk device fileThis should show detailed information about your hard disk, for example in my case I got the following output:Once everthing is working fine, we can go-ahead and install the GUI for smartctl -
Read More
Posted in disc | No comments

Tuesday, February 3, 2009

HowTo Password Protect the GRUB

Posted on 9:14 PM by Unknown
The main reason to password protect the GRUB boot loder is to Prevent Access to Single User Mode — If attackers can boot the system into single user mode, they are logged in automatically as root without being prompted for the root password.To do this, open a shell prompt, log in as root, and type: /sbin/grub-md5-crypt When prompted, type the GRUB password and press Enter. This returns an
Read More
Posted in How to ... | No comments

Monday, February 2, 2009

Is Linus is the real author of LINUX?

Posted on 9:12 PM by Unknown
“A couple of years ago this guy called Ken Brown wrote a book saying that Linus stole Linux from me… It later came out that Microsoft had paid him to do this…”–Andrew S Tanenbaum, father on MINIX The Alexis de Tocqueville Institution released a report based on a forthcoming book by Ken Brown, "Samizdat: And Other Issues Regarding the 'Source' Of Open Source Code", which challenges the claim that
Read More
Posted in Linux | No comments

Network Configuration Files in RedHat and Fedora

Posted on 9:09 PM by Unknown
The primary network configuration files are as follows:/etc/hostsIt can also be used to resolve hostnames on small networks with no DNS server. For more information, refer to the hosts man page./etc/resolv.confThis file specifies the IP addresses of DNS servers and the search domain. For more information about this file, refer to the resolv.conf man page./etc/sysconfig/networkThis file specifies
Read More
Posted in Fedora | No comments

Sunday, February 1, 2009

How to change DMA settings on Ubuntu

Posted on 8:17 AM by Unknown
One really common solution to slow, and unreliable playback of DVD is the settings related to DMA which is turn "off" by default.DMA stands for: Direct Memory Access. DMA allows a piece of hardware to talk directly with the RAM, reading and/or writing independent of the CPU (Central Processing Unit). In other words the hardware can use the system memory, bypassing the CPU, allowing the device to
Read More
Posted in How to ..., ubuntu | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Google introduced new Voice and Video Chat !!
    Google today launched Gmail voice and video chat, making it simple for people around the world to chat in high-quality video for free right ...
  • Reducing load on web server by using reverse proxy - squid
    Many large organizations use caching proxy servers to save on network bandwidth utilization (and costs) and improve browsing response times...
  • UNP a Universal File Unpacking Utility for Ubuntu / Debian
    Unp is a small perl script which makes extraction of any archive files in easy way. It support several compressors and archiver programs, ch...
  • File Access Permissions on Linux
    File protection with chmod chmod 400 file    To protect a file against accidental overwriting.chmod 500 dir     To protect yourself from acc...
  • Convert text files to MP3 under Linux
    First we would need to install festival. We can install festival with the following command :sudo apt-get install festivalNow we need to ins...
  • Linux for Kids
    LinuxKidX was, until recently, a Brazilian-only Linux distribution, but, as of March 20th 2009, it is also available in English, so a lot mo...
  • How to allow access to the mail server by individual domains - Sendmail
    The access database (normally in /etc/mail/access) allows a mail administrator to administratively allow access to the mail server by indiv...
  • Visual Browser for Wikipedia
    No matter what you think about the quality and nature of Wikipedia articles, there is no denying that the encyclopedia provides an immense ...
  • How to recover/repair lost/damage partitions
    TestDisk is a powerful free data recovery software ! It was primarily designed to help recover lost partitions and/or make non-booting disks...
  • HOW TO INSTALL ANGRY IP SCANNER ON UBUNTU
    Currently there are many security software available for Linux and Windows. The Angry IP Scanner is one of the popular open source software ...

Categories

  • administration
  • Antivirus
  • Apache
  • Apple
  • AppZ
  • Blog
  • boot
  • CentOS
  • Communication
  • Database
  • disc
  • Download
  • Drivers
  • Editor
  • encryption
  • Fedora
  • File management
  • Filesystem
  • Font
  • Fun
  • gaming
  • Gnome
  • Google
  • Gossips
  • How to ...
  • internet
  • KDE
  • Kernel
  • Kidz
  • laptop
  • Linux
  • Linux embedded Devices
  • Mail
  • Media centre
  • Memory
  • mobile
  • MS
  • multimedia
  • network
  • News
  • Oracle
  • PDF
  • pendrive
  • Perl
  • processor
  • Programming
  • proxy
  • Reviews
  • script
  • security
  • sql
  • Squid
  • ssh
  • Supercomputer
  • SuSe
  • Themes
  • trickz n tipz
  • TweakZ
  • ubuntu
  • Video
  • Video editing
  • Virus
  • zip

Blog Archive

  • ►  2010 (62)
    • ►  June (1)
    • ►  May (6)
    • ►  April (28)
    • ►  March (11)
    • ►  February (5)
    • ►  January (11)
  • ▼  2009 (367)
    • ►  December (16)
    • ►  November (23)
    • ►  October (45)
    • ►  September (44)
    • ►  August (35)
    • ►  July (1)
    • ►  June (20)
    • ►  April (6)
    • ►  March (8)
    • ▼  February (18)
      • Encrypting files with OpenSSL
      • Alternative Boot Loaders
      • Small History of "Ubuntu"
      • The most dangerous Rootkit
      • ctime, atime, and mtime
      • Write your own kernel module and insert it into ru...
      • Website downloader for Linux - HTTrack
      • HowTo boot the system into Resuce/Single-User or E...
      • Configure Gmail account on Linux
      • HowTo get the firstboot screen again in Fedora/RedHat
      • Firewall for Ubuntu - Gufw
      • HowTo install Fedora 10 on old intel machines
      • January 27, 2009. The KDE Community announced the...
      • Hard disk drive health inspection tool - GSmartCon...
      • HowTo Password Protect the GRUB
      • Is Linus is the real author of LINUX?
      • Network Configuration Files in RedHat and Fedora
      • How to change DMA settings on Ubuntu
    • ►  January (151)
  • ►  2008 (69)
    • ►  December (31)
    • ►  November (38)
Powered by Blogger.

About Me

Unknown
View my complete profile