Kiwix is an offline reader for Web content. It's especially thought to make Wikipedia available offline. This is done by reading the content of the project stored in a file format ZIM, The ZIM file format, an open, standardized file format to store Wiki content efficiently for offline usage
Read more
0
Read more
UI application to access Google Picasa from Ubuntu - Picapy
Posted by
DevOps
Picapy is an easy to use UI application to manage Picasa album directly from your desktop. using Picapy you can easily perform the following operations ...
* Bulk upload of image files
* Delete individual Image
* Create or delete albums
* Download images
* Get the direct URL to the image
* Bulk upload of image files
* Delete individual Image
* Create or delete albums
* Download images
* Get the direct URL to the image
1
Split Single MP3 file OR Join multiple MP3 into one MP3 file - Mp3Splt & Mp3Wrap
Posted by
Nikesh Jauhari
Mp3Wrap is a free independent alternative to AlbumWrap. It's a command-line utility that wraps quickly two or more mp3 files in one single large playable mp3, without losing filenames and ID3 informations (and without need of decoding/encoding) It's useful to make large files easy to download on internet and then easy to split again in few seconds. You can split original files using mp3splt: http://mp3splt.sourceforge.net
Read more
0
A Complete Guide to Securing a Website - White Paper
Posted by
DevOps
To secure a website or a web application, one has to first understand the target application, how it works and the scope behind it. Ideally, the penetration tester should have some basic knowledge of programming and scripting languages, and also web security.
A website security audit usually consists of two steps. Most of the time, the first step usually is to launch an automated scan. Afterwards, depending on the results and the website’s complexity, a manual penetration test follows. To properly complete both the automated and manual audits, a number of tools are available, to simplify the process and make it efficient from the business point of view. Automated tools help the user making sure the whole website is properly crawled, and that no input or parameter is left unchecked. Automated web vulnerability scanners also help in finding a high percentage of the technical vulnerabilities, and give you a very good overview of the website’s structure, and security status. Thanks to automated scanners, you can have a better overview and understanding of the target website, which eases the manual penetration process.
Read more
A website security audit usually consists of two steps. Most of the time, the first step usually is to launch an automated scan. Afterwards, depending on the results and the website’s complexity, a manual penetration test follows. To properly complete both the automated and manual audits, a number of tools are available, to simplify the process and make it efficient from the business point of view. Automated tools help the user making sure the whole website is properly crawled, and that no input or parameter is left unchecked. Automated web vulnerability scanners also help in finding a high percentage of the technical vulnerabilities, and give you a very good overview of the website’s structure, and security status. Thanks to automated scanners, you can have a better overview and understanding of the target website, which eases the manual penetration process.
8
Read more
Remote Control your Ubuntu Linux using Android - Gmote
Posted by
Nikesh Jauhari
Gmote turns your Android phone into a remote control for your computer, allowing you to start and control movies and music at a distance. It supports all of the standard remote control features such as play, pause, rewind, volume controls etc. It also has a built-in file browser that lets you view the files that are on your computer and select what you want to play. It's great if you want to sit back while watching a DVD, or control the flow of songs in your favorite playlist.
Gmote can also be used as a wireless Touchpad and keyboard, allowing you to control your computer at distance. Another great feature available in Gmote is the ability to stream music from your computer to your phone!
0
UI Application to Convert Real Media formats (rm, ra, ram) to mp3 / wav formats - Rmconverter
Posted by
DevOps
Real Media Converter (Rmconverter) is a multi threaded GUI that takes advantage from the mencoder and lame packages to generate wav and mp3 formats from real media files (ra, rm, and ram) and wav files.
Rmconverter Features:
* Converts Real Media formats (rm, ra, ram) to mp3/wav formats.
* A simple Media player.
* A user friendly interface.
* Enhanced options panel, and the possibility of saving your configuration.
* Translations.
* Built in themes.
Read more
Rmconverter Features:
* Converts Real Media formats (rm, ra, ram) to mp3/wav formats.
* A simple Media player.
* A user friendly interface.
* Enhanced options panel, and the possibility of saving your configuration.
* Translations.
* Built in themes.
0
Top like Utility to monitor Network Connections usage - pktstat
Posted by
Nikesh Jauhari
pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what.
It partially decodes HTTP and FTP protocols to show what filename is being transferred, as well as X11 application names. Entries hang around on the screen for a few seconds so you can see what just happened, in short a very useful tool to figure out network connection in real time.
Read more
It partially decodes HTTP and FTP protocols to show what filename is being transferred, as well as X11 application names. Entries hang around on the screen for a few seconds so you can see what just happened, in short a very useful tool to figure out network connection in real time.
0
Extract individual file(s) from rpm package using rpm2cpio
Posted by
DevOps
As the name implies, rpm2cpio takes an RPM package file and converts it to a cpio archive. Because it's written to be used primarily as a filter, there's not much to be specified. rpm2cpio takes only only one argument.
The optional argument is the name of the package file to be converted. If there is no file-name specified on the command line, rpm2cpio will simply read from standard input and convert that to a cpio archive.
Read more
The optional argument is the name of the package file to be converted. If there is no file-name specified on the command line, rpm2cpio will simply read from standard input and convert that to a cpio archive.
3
How to Disable Direct Root Login to SSH on Ubuntu
Posted by
DevOps
One security tweak you need to consider is with Open-SSH server. By default, direct log on for root is enabled, which means your just asking for trouble with hackers attempting to break into your Computer. Instead, you can easily disable root access from logging into your SSH server,
Read more
1
Basic MySQL performance tuning using Query Cache
Posted by
DevOps
The query cache stores the text of a SELECT statement together with the corresponding result that was sent to the client. If an identical statement is received later, the server retrieves the results from the query cache rather than parsing and executing the statement again. The query cache is shared among sessions, so a result set generated by one client can be sent in response to the same query issued by another client.
The query cache can be useful in an environment where you have tables that do not change very often and for which the server receives many identical queries. This is a typical situation for many Web servers that generate many dynamic pages based on database content.
Read more
The query cache can be useful in an environment where you have tables that do not change very often and for which the server receives many identical queries. This is a typical situation for many Web servers that generate many dynamic pages based on database content.
0
Configure Squid Proxy with ClamAV Antivirus using HAVP (HTTP Anti Virus Proxy)
Posted by
DevOps
HAVP (HTTP Anti Virus Proxy) is a non caching proxy which scans for viruses with ClamAV anti-virus scanner at the same time. The main aims are continuous, non-blocking downloads and smooth scanning of dynamic and password protected HTTP traffic. It can be used with squid or standalone, and it also supports transparent proxy mode.
Read more
0
Automatic Web Browser Proxy Configuration using PAC file
Posted by
Nikesh Jauhari
The Web Proxy Auto-Discovery Protocol (WPAD) is a method used by clients to locate a URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete it can be executed to determine the proxy for a specified URL. The WPAD protocol only outlines the mechanism for discovering the location of this file, but the most commonly deployed configuration file format is the Proxy auto-config (PAC) format originally designed by Netscape.
A PAC file is a specialized JavaScript function definition that a browser calls to determine how requests are handled. Clients must specify (in their browser settings) the URL from which the PAC file is loaded. You can store a PAC file on web Server (or on any server in your network) and then provide the URL for this file to your clients.
Read more
A PAC file is a specialized JavaScript function definition that a browser calls to determine how requests are handled. Clients must specify (in their browser settings) the URL from which the PAC file is loaded. You can store a PAC file on web Server (or on any server in your network) and then provide the URL for this file to your clients.
0
Search Files / Application on Ubuntu using - Synapse
Posted by
Nikesh Jauhari
If you ever used Gnome Do / Quicksilver / Gnome Launch Box, you'll feel right at home with Synapse, if not, the only thing you need to do is run Synapse (or press Ctrl+Space to summon it), type what you're looking for, and Synapse will present you a list of items that match your query. Once you found the item you were looking for, you can perform an action on it (and these are defined by the plugins you're using). If you don't like the default action, just press Tab and search appropriate action.
Read more
1
Web based Internet Bandwidth and Data Transfer Monitor - BitMeter OS
Posted by
DevOps
BitMeter OS is a free, open-source, bandwidth monitor that works on Windows, Linux and Mac OSX. BitMeter OS keeps track of how much you use your Internet/network connection, and allows you to view this information in a variety of ways
Once BitMeter OS is installed on your computer you can monitor your connection usage either via a web browser, or by using the command line tools. The Web Interface displays various graphs and charts that show how your Internet / network connection has been used over time:
Read more
Once BitMeter OS is installed on your computer you can monitor your connection usage either via a web browser, or by using the command line tools. The Web Interface displays various graphs and charts that show how your Internet / network connection has been used over time:
0
UI Application to hide Messages into Picture or Sounds files (Steganography) - SilentEye
Posted by
Nikesh Jauhari
SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system.
SilentEye plug-in:
Cryptography plug-ins:
* Allow application to encrypt data before hiding them, for example using AES 128.
Format Plug-in:
* Image format plug-ins: By default a BMP plug-in is provided, which allow you to save encoded images into .bmp files. (JPEG plug-in is on its way...)
* Audio format plug-ins: WAVE plug-in provided for .wav files
Read more
SilentEye plug-in:
Cryptography plug-ins:
* Allow application to encrypt data before hiding them, for example using AES 128.
Format Plug-in:
* Image format plug-ins: By default a BMP plug-in is provided, which allow you to save encoded images into .bmp files. (JPEG plug-in is on its way...)
* Audio format plug-ins: WAVE plug-in provided for .wav files
0
UI Application for converting Video and Audio using ffmpeg - WinFF
Posted by
DevOps
FFmpeg is a complete, cross-platform solution to record, convert and stream audio and video. ffmpeg includes libavcodec - the leading audio/video codec library.
FFmpeg is a wonderful library for creating video applications or even general purpose utilities. ffmpeg takes care of all the hard work of video processing by doing all the decoding, encoding, muxing and demuxing for you. This can make media applications much simpler to write. It's simple, written in C, fast, and can decode almost any codec you'll find in use today, as well as encode several other formats.
Read more
FFmpeg is a wonderful library for creating video applications or even general purpose utilities. ffmpeg takes care of all the hard work of video processing by doing all the decoding, encoding, muxing and demuxing for you. This can make media applications much simpler to write. It's simple, written in C, fast, and can decode almost any codec you'll find in use today, as well as encode several other formats.
1
How to Change MySQL Storage Engines
Posted by
Nikesh Jauhari
MySQL 5.0 and higher offers nine storage engines and more are likely to be added in the future. The most commonly used are MyISAM, InnoDB, and Berkeley DB (BDB). Each storage engine offers special features and advantages. You can even use different formats for each table in your database, though it may be harder to manage a mixed format database. Better is to keep all tables in a database using the same storage engine, but use different engines for different databases.
To determine which storage engines your server supports, run following SHOW ENGINES; statement. The value in the Support column indicates whether an engine can be used. A value of YES, NO, or DEFAULT indicates that an engine is available, not available, or available and currently set as the default storage engine.
Read more
To determine which storage engines your server supports, run following SHOW ENGINES; statement. The value in the Support column indicates whether an engine can be used. A value of YES, NO, or DEFAULT indicates that an engine is available, not available, or available and currently set as the default storage engine.
0
Monitor Network traffic or speed / progress of a file transfer in Linux - speedometer
Posted by
DevOps
Speedometer Monitor network traffic or speed/progress of a file transfer. The program can be used for cases like:
* how long it will take for 100 mb transfer to finish
* how quickly is another transfer going
* how fast is the upstream on this ADSL line
* how fast is data written to a file system.
Speedometer measures network traffic and the speed or progress of a certain file transfer. Let's say you want to see how fast someone can download a file from your server and how the download is going in real time. Enter speedometer filename, and the program will draw a progress bar that shows the speed of the transfer.
Read more
* how long it will take for 100 mb transfer to finish
* how quickly is another transfer going
* how fast is the upstream on this ADSL line
* how fast is data written to a file system.
Speedometer measures network traffic and the speed or progress of a certain file transfer. Let's say you want to see how fast someone can download a file from your server and how the download is going in real time. Enter speedometer filename, and the program will draw a progress bar that shows the speed of the transfer.
1
Password Cracker for zip Archives - fcrackzip
Posted by
Nikesh Jauhari
The ZIP file format is a popular and convenient tool for combing multiple files into a single compressed archive suitable for sharing with others or simply archiving old files for safekeeping. ZIP files can be encrypted with a password for privacy and security, but it means that the files inside the archive are inaccessible if the password is ever lost or forgotten. Fortunately, there are ways to recover the password and FCrackZip is a free open source password recovery tool for Linux that is fast and capable of performing both dictionary and brute-force attacks against password-protected ZIP files.
Read more
0
Website links, Errors and Structure Checker - Webcheck
Posted by
Nikesh Jauhari
Webcheck is a website checking tool for web masters. It crawls a given website and generates a number of reports in the form of html pages. It is easy to use and generates simple, clear and readable reports.
Features of webcheck include:
* support for http, https, ftp and file schemes
* view the structure of a site
* track down broken links
* find potentially outdated and new pages
* list links pointing to external sites
* can run without user intervention
Read more
Features of webcheck include:
* support for http, https, ftp and file schemes
* view the structure of a site
* track down broken links
* find potentially outdated and new pages
* list links pointing to external sites
* can run without user intervention
3
Cross platform file encryption utility using blowfish - Bcrypt
Posted by
Nikesh Jauhari
Bcrypt is a cross platform file encryption utility. Encrypted files are portable across all supported operating systems and processors. Pass-phrases must be between 8 and 56 characters and are hashed internally to a 448 bit key.
In addition to encrypting your data, bcrypt will by default overwrite the original input file with random garbage three times before deleting it in order to thwart data recovery attempts by persons who may gain access to your computer.
Bcrypt uses the blowfish encryption algorithm published by Bruce Schneier in 1993. More information on the algorithm can be found at Counterpane. Specifically, bcrypt uses Paul Kocher's implementation of the algorithm.
Read more
In addition to encrypting your data, bcrypt will by default overwrite the original input file with random garbage three times before deleting it in order to thwart data recovery attempts by persons who may gain access to your computer.
Bcrypt uses the blowfish encryption algorithm published by Bruce Schneier in 1993. More information on the algorithm can be found at Counterpane. Specifically, bcrypt uses Paul Kocher's implementation of the algorithm.
3
Linux Kernel Compilation made easy for Ubuntu users - KernelCheck
Posted by
Nikesh Jauhari
KernelCheck is a graphical user interface program designed to make the kernel-compiling process as easy as the click of a button. A kernel is the base of any operating system – in our case, the Linux operating system. KernelCheck will fetch the latest information from http://www.kernel.org, which hosts the source packages for the Linux kernel, and ask the user which one they would like to compile into a .deb package (with the option of installing the kernel after the compilation). This automated process is a fork of AutoKernel by Robert Wolterman (xtacocorex), Timothy Janssen (mentok), and Kristof Verbeken (PingunZ). KernelCheck is currently licensed under the GNU Public License version 3.
Read more
0
Tool for load testing of web applications - OpenLoad
Posted by
Nikesh Jauhari
OpenLoad is a tool for load testing web applications. It aims to be easy to use and providing near real-time performance measurements of the application under test. This is particularly useful when you are doing optimisation as you can see the impact of your changes almost immediately.
Read more
3
How to install packages "on demand" in Ubuntu - auto-apt
Posted by
Nikesh Jauhari
You're compiling a program and, all of a sudden, boom! There's an error because it needs a .h file and you don't have. The program auto-apt can save you from such scenarios. It asks you to install packages if they're needed, stopping the relevant process and continuing once the package is installed.
auto-apt checks the file access of programs running within its environments, and if a program tries to access a file known to belong in an uninstalled package, auto-apt will install that package using apt-get. This feature requires apt and sudo to work.
It also provides simple database to search which package contains a requested file.
Read more
auto-apt checks the file access of programs running within its environments, and if a program tries to access a file known to belong in an uninstalled package, auto-apt will install that package using apt-get. This feature requires apt and sudo to work.
It also provides simple database to search which package contains a requested file.
0
Debian Package Viewer for files and contents - deb-gview
Posted by
Nikesh Jauhari
deb-gview Displays Debian control information, devscript details and details of the files that would be installed (names, sizes and locations). Files within the package can be viewed within the package or externally.
deb-gview has been extended via GnomeVFS to view the contents of any .deb in the archive without having to install the package and without having to separately download the .deb itself. Either copy the link address and load the .deb on the command line or configure your browser to use deb-gview as a helper for .deb files (right click a .deb and select open with... or similar). Then just double click on any text file within the .deb to view it. Also works with manpages and images inside the .deb, other filetypes can be supported via a config file. Supports viewing a .deb for any architecture, not just your own (useful to see if the autobuilders have really done what you expected with generated files).
Read more
deb-gview has been extended via GnomeVFS to view the contents of any .deb in the archive without having to install the package and without having to separately download the .deb itself. Either copy the link address and load the .deb on the command line or configure your browser to use deb-gview as a helper for .deb files (right click a .deb and select open with... or similar). Then just double click on any text file within the .deb to view it. Also works with manpages and images inside the .deb, other filetypes can be supported via a config file. Supports viewing a .deb for any architecture, not just your own (useful to see if the autobuilders have really done what you expected with generated files).
Subscribe to:
Posts (Atom)