linux poison RSS
linux poison Email

Ubuntu installer for Windows users

Ubuntu installer for Windows usersWubi is an officially supported Ubuntu installer for Windows users that can bring you to the Linux world with a single click. Wubi allows you to install and uninstall Ubuntu as any other Windows application, in a simple and safe way. Are you curious about Linux and Ubuntu? Trying them out has never been easier!

Wubi is Simple
No need to burn a CD. Just run the installer, enter a password for the new account, and click "Install", go grab a coffee, and when you are back, Ubuntu will be ready for you.

Wubi is Safe
You keep Windows as it is, Wubi only adds an extra option to boot into Ubuntu. Wubi does not require you to modify the partitions of your PC, or to use a different bootloader, and does not install special drivers. It works just like any other application. Wubi is spyware and malware free, and being open source, anyone can verify that.

Wubi is Discrete
Wubi keeps most of the files in one folder, and if you do not like it, you can simply uninstall it as any other application.

Wubi is Free
Wubi and Ubuntu cost absolutely nothing (free as in beer), but yet provide a state of the art, fully functional, operating system that does not require any activation and does not impose any restriction on its use (free as in freedom).

Download wubi exe: here

Read more

20 Awesome Devices That Run Linux (But Weren’t Designed To)

A common attitude among people who believe in free software is to stick it to “the man.” For some people, that translates into spending a ton of free time porting Linux to devices that were never designed for it.
This is one of the things that always amazes me when I read about the latest high-tech devices that been modified to run Linux. Some of these implementations may be incomplete, and I’m not sure why someone would take a brand new device and risk bricking it…
Here’s a short list of devices that make unlikely with Linux. Enjoy!
  1. AppleTV:
  2. Browser:
  3. Gmail:
  4. GameCube:
  5. Dreamcast:
  6. HTC Smartphones:
  7. iPod:
  8. Mainframes:
  9. Palm PDAs:
  10. PS2:
  11. Edit: MSN TV2
  12. PSP:,1697,1906893,00.asp
  13. Edit: JuiceBox:
  14. Edit: Mac Classic:
  15. Wii:
  16. Windows:
  17. Wireless Routers:
  18. Xbox:
  19. Xbox360:
Last but not least, a toaster:
I showed you mine, now you get to show me yours! What would you like to see running Linux?
Edit… PS3, VirtualPC and USB drives were removed.
Here’s another for you all… Your Mom Can Run Linux:

Read more

Installation and Configuration of MySQL in Ubuntu

To install MySQL, run the following command from a terminal prompt:
sudo apt-get install mysql-server

During the installation process you will be prompted to enter a password for the MySQL root user.

Once the installation is complete, restart the MySQL server: sudo /etc/init.d/mysql restart
Check if MySQL is running: sudo netstat -tap | grep mysql
you should see the following line or something similar:

tcp 0 0 localhost.localdomain:mysql *:* LISTEN -


You can edit the /etc/mysql/my.cnf file to configure the basic settings -- log file, port number, etc. For example, to configure MySQL to listen for connections from network hosts, change the bind_address directive to the server's IP address:

bind-address =

[Note] Replace with the appropriate address.

After making a change to /etc/mysql/my.cnf the mysql daemon will need to be restarted:

sudo /etc/init.d/mysql restart
Read more

Password protected GRUB in Ubuntu

Ubuntu installs GNU GRUB as its default boot loader, which allows for great flexibility and recovery options. For example, when you install additional kernel images, these are automatically added as available boot options in the grub menu. Also, by default, alternate boot options are available for each kernel entry that may be used for system recovery.

To add a password for use with grub, first you must generate an md5 password hash using the grub-md5-crypt utility: grub-md5-crypt

The command will ask you to enter a password and offer a resulting hash value as shown below:

Password: (enter new password)
Retype password: (repeat password)

Add the resulting hash value to the file /etc/grub/menu.lst in the following format:

password --md5 $1$s3YiK$M3lxAbqA6JLm2FbDWnClQ0

To require use of the password for entering single user mode, change the value of the lockalternative variable in the file /boot/grub/menu.lst to true, as shown in the following example.

# lockalternative=true

Read more

ufw (Uncomplicated Firewall) setup and configuration in Ubuntu

The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall.

The following are some examples of how to use ufw:

First, ufw needs to be enabled. From a terminal prompt enter: sudo ufw enable
To open a port (ssh in this example): sudo ufw allow 22
Similarly, to close an opened port: sudo ufw deny 22
To remove a rule, use delete followed by the rule: sudo ufw delete deny 22
ufw can be disabled by: sudo ufw disable

It is also possible to allow access from specific hosts or networks to a port. The following example allows ssh access from host to any ip address on this host:

sudo ufw allow proto tcp from to any port 22
Read more

DHCP server Configuration in Ubuntu


At a terminal prompt, enter the following command to install dhcpd:

sudo apt-get install dhcp3-server

You will probably need to change the default configuration by editing /etc/dhcp3/dhcpd.conf to suit your needs and particular configuration.

You also need to edit /etc/default/dhcp3-server to specify the interfaces dhcpd should listen to. By default it listens to eth0.

Most commonly, what you want to do is assign an IP address randomly. This can be done with settings as follows:

# Sample /etc/dhcpd.conf
# (add your comments here)
default-lease-time 600;
max-lease-time 7200;
option subnet-mask;
option broadcast-address;
option routers;
option domain-name-servers,;
option domain-name "mydomain.example";

subnet netmask {

This will result in the DHCP server giving a client an IP address from the range or It will lease an IP address for 600 seconds if the client doesn't ask for a specific time frame. Otherwise the maximum (allowed) lease will be 7200 seconds. The server will also "advise" the client that it should use as its subnet mask, as its broadcast address, as the router/gateway and and as its DNS servers.
Read more

Linux Home Server - Amahi

Linux Home Server - AmahiThe Amahi server is a Linux Home Server distribution targeted for home and home office environments.

The focus of the Amahi server is to create a home server with usability, cross-platform compatibility and ease of use in mind.More simply, the Amahi server is about making your home networking simple!

Amahi provides all the things you would want in a home server:

* Calendaring, Wiki
* Shared network storage, Network Backups
* Printer server, Remote access, ... and a few other features!

The Amahi server is Linux-based, which means it's reliable and virus-free. The project aims to be 100% compatible with PCs and Macs. The goal is to make it a joy to install, run, and more so, a joy to use!

For installs:
* Live CD installs, or
* CD-ROM install, or
* Install on an existing Fedora machine

Hardware Requirements
* The machine should be at least Pentium 3 running at 800MHz
* Recommended RAM is 256 or greater, but it can be done with a little as 128MB
* Some disk space (some users like it large, to store their media)
* One network device

Read more

Banshee now with Video Playback support

Banshee now with Video Playback supportBanshee is adding video support to its list of features. According to the v1.0 Alpha 2 release notes, his release brings a much sought after feature for Banshee - Video management and integrated playback! Your Video Library supports searching, playlists, smart playlists, queuing, and even bookmarks, just like your Music Library.

The Music and Video libraries are separated in the interface to provide a clean separation of content, so video will never be mixed in with music - when browsing or searching.

If you are running openSUSE 10.3 there is a 1-Click Install available:
Read more

Mythbuntu - MythTV based PVR system

Mythbuntu - MythTV based PVR system
MythTV is a GPL licensed suite of programs that allow you to build the mythical home media convergence box on your own using Open Source software and operating systems. MythTV is known to work on Linux and Mac OS X (PowerPC and Intel). It does not run on Windows.

After long hours and endless work the Mythbuntu team is excited about the release of Mythbuntu 8.04. This release is built on the LTS base of Ubuntu 8.04 Hardy Heron. We would like to thank everyone that contributed in getting to this second release.

* Frontend can be run from the live CD
* Complete installations(Backend, Frontend, Backend/Frontend, etc)
* Xfce4 Linux Desktop Environment
* Easily upgrade from Ubuntu Hardy to Mythbuntu
* Custom Mythbuntu MythTV theme
* GUI setup of LIRC
* Setup MythTV optimizations through MCC
* Diskless Server setup through MCC

Recommended System Requirements:
* 2.0 Ghz x86 or x86_64 Processor*
* 1024 MB of system memory (RAM)
* 10 GB disk space (Frontend Role)
* 80 GB+ disk space (Backend Role)**
* nVidia 128MB Graphics Card w/ TV-Out or equivalent***
* Supported TV Tuner Card (Backend Role)

Download Mythbuntu: here

Read more

What is the difference between Ubuntu, Kubuntu, Xubuntu, or Edubuntu?

Ubuntu uses a user interface (or desktop environment) called Gnome. Gnome is focused on simplicity and usability. Ubuntu includes a bunch of Gnome-native applications such as Rhythmbox (music player), Sound Juicer (CD player and ripper), Evolution (email client and calendar), and Gedit (text editor). You can find the full list of software packages in ubuntu-desktop here.

Kubuntu uses the K Desktop Environment (also known as KDE). KDE is focused on including a lot of point-and-click configuration options immediately available to end users. Kubuntu includes a bunch of KDE-native applications such as AmaroK (music player), K3B (CD burning), Konqueror (web browser and file manager), and Kopete (instant messenger). You can find the full list of software packages in kubuntu-desktop here.

Xubuntu uses the Xfce desktop environment, which is a lighter one than Gnome or KDE. In terms of its design principles, it has a bit of a balance—presenting in some ways more point-and-click configuration options than Gnome but also retaining some of the simplicity of Gnome. Its main appeal is its speed, though, and it's ideal for systems with 128 to 256 MB of RAM. Both Ubuntu and Kubuntu can run on 256 MB of RAM, but they're more ideal for 512 MB of RAM or more. Xfce includes Thunar (file manager), Thunderbird (email client), and Mousepad (text editor). You can find a full list of software packages in xubuntu-desktop here.

Edubuntu uses the Gnome desktop environment but has a different set of default applications from Ubuntu. Its focus is on educational tools. It includes GPaint (an easy to use paint program), Atomix (a puzzle game for building molecules out of isolated atoms), and Xaos (a real-time interactive fractal zoomer). You can find a full list of software packages in edubuntu-desktop here.

Gobuntu is a GNU/Linux operating system, derived from Ubuntu, that endeavors to adhere to the Free Software Foundation's four freedoms and intends to provide a base for other free software platforms to build upon with minimal modification required. It does this by only including open-source non-restricted software. This means there will be no firmware, drivers, applications, or content included in Gobuntu that does not include the full source or whose license does not provide the right to use, study, modify, and redistribute the body of work.

Gobuntu shares the same system requirements as Ubuntu. At present, this means Gobuntu is available for 32-bit and 64-Bit PC architectures and the install requires at least 4 GB of disk space. you can get Gobuntu here

Read more

Open source graphics card open for orders

Open source graphics card open for orders
The Open Graphics Project's long-awaited open source graphics card is ready for order by developers. Designed by Traversal Technology, the OGD1 boasts an open source hardware design based on a Xilinx Spartan-3 XC3S4000 FPGA, and is intended as an FPGA development platform, says the OGP.

The Open Graphics Project announced its plan back in 2005 to develop a basic graphics card with an open source hardware design. A central goal of the OGP is to streamline driver development, since binary drivers from graphics manufacturers are typically difficult to work with. The group hopes eventually to release a commercial version suitable for consumers.


The OGD1 is available for order now for $1,500 (or $1,400 for the first 100 orders). Manufacturing will begin once 100 orders have been received, says the group. More information may be found here.

Rest of story: Here

Read more

Google Anti-Malware Diagnostic Pages

Google Anti-Malware Diagnostic Pages
ZDNet's security blog points to an update to Google's malware warnings. Like McAfee SiteAdvisor, now each web site has a special diagnostic page that lists answers to four questions:

1. What is the current listing status?
2. What happened when Google visited this site?
3. Has this site acted as an intermediary resulting in further distribution of malware?
4. Has this site hosted malware?

Here's, for example, the diagnostic page for, which lists some interesting facts.

"Of the 274621 pages we tested on the site over the past 90 days, 4 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 05/22/2008, and the last time suspicious content was found on this site was on 03/13/2008. Malicious software includes 4 scripting exploit(s), 4 trojan(s). Successful infection resulted in an average of 10 new processes on the target machine. Malicious software is hosted on 4 domain(s), including,, 5 domain(s) appear to be functioning as intermediaries for distributing malware to visitors of this site, including,,"

Despite all of these findings, is not listed as suspicious, probably because the domain is whitelisted or the suspicious content is not very significant. It's likely that the domains listed above are from Google's search results, so that means the anti-malware system doesn't respect robots.txt.

Read more

HowTo Split the files

Below is an example on how to use the split command: Using split on a 600MB image.iso file:

split -b 200mb image.iso

It will generate 3 files with the following file sizes:

200MB xaa
200MB xab
200MB xac

after split use: cat for combine a file

cat xa* > new-image.iso
Read more

Rootkit detectors for Linux

chkrootkit is a tool to locally check for signs of a rootkit.

It tests the following applications: aliens, asp, bindshell, lkm, rexedcs, sniffer, w55808, wted, scalper, slapper, z2, chkutmp, amd, basename, biff, chfn, chsh, cron, crontab, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, init, killall, ldsopreload, login, ls, lsof, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, tcpdump, top, telnetd, timed, traceroute, vdir, w, and write.

* chkrootkit: shell script that checks system binaries for rootkit modification.
* ifpromisc.c: checks if the interface is in promiscuous mode.
* chklastlog.c: checks for lastlog deletions.
* chkwtmp.c: checks for wtmp deletions.
* check_wtmpx.c: checks for wtmpx deletions. (Solaris only)
* chkproc.c: checks for signs of LKM trojans.
* chkdirs.c: checks for signs of LKM trojans.
* strings.c: quick and dirty strings replacement.
* chkutmp.c: checks for utmp deletions.

Rootkit Hunter
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits.

Specifically, rkhunter is a shell script which carries out various checks on the local system to try and detect known rootkits and malware. It also performs checks to see if commands have been modified, if the system startup files have been modified, and various checks on the network interfaces, including checks for listening applications.

rkhunter has been written to be as generic as possible, and so should run on most Linux and UNIX systems. It is provided with some support scripts should certain commands be missing from the system, and some of these are Perl scripts.

Features include:
* Compares MD5 hashes of important files with known good ones in online database
* Searches for:
o Default directories of rootkits
o Wrong permissions
o Hidden files
o Suspicious strings in kernel modules, and
o Special tests

OSSEC is an Open Source Host-based Intrusion Detection System.

It performs log analysis, integrity checking, monitoring, rootkit detection, real-time alerting and active response. In addition to being deployed as an HIDS, it is commonly used strictly as a log analysis tool, monitoring and analyzing firewalls, IDSs, web servers and authentication logs.

Features include:
* Unix-only:
o Unix PAM
o sshd (OpenSSH)
o Solaris telnetd
o Samba
o Su
o Sudo
* FTP servers:
o ProFTPd
o Pure-FTPd
o vsftpd
o Microsoft FTP Server
o Solaris ftpd
* Mail servers:
o Imapd and pop3d
o Postfix
o Sendmail
o vpopmail
o Microsoft Exchange Server
* Databases:
o PostgreSQL
* Web servers:
o Apache HTTP Server (access log and error log)
o IIS web server (NSCA and W3C extended)
o Zeus Web Server errors log
* Web applications:
o Horde IMP
o Modsecurity
* Firewalls:
o Iptables firewall
o Solaris IPFilter firewall
o AIX ipsec/firewall
o Netscreen firewall
o Windows Firewall
o Cisco PIX
o Cisco FWSM
o Cisco ASA
o Cisco IOS IDS/IPS module
o Snort IDS (snort full, snort fast and snort syslog)
* Security tools:
o Symantec AntiVirus
o Nmap
o Arpwatch
o Cisco VPN Concentrator
* Others:
o Named (BIND)
o Squid proxy
o Zeus eXtensible Traffic Manager
* Generic unix authentication (adduser, logins, etc)

Nixory is an innovative, new, fast and powerful Anti Spyware program,with an User-Friendly Graphical Interface. It protects Mozilla Firefox from dangerous spywares, and harmful cookies.

Features include:
* Mozilla Firefox fast and accurate anti-spyware scan
* Ice Eye heuristic system
* Update stats for number of scans, removed objects and more
* Customizable options
* Remove Tool for found data miner
* Enable to ignore selected data miner groups
* Enable to write a Scan Log with accurate details
* Multi-Language support (English, Italian, Dutch, Spanish, Spanish(AR), Catalan)
* Multi-profiles of Firefox support
* Flexible management of memory

Read more

Best Antivirus for Linux

Best Antivirus for LinuxClamAV
Clam AntiVirus is an anti-virus toolkit, designed especially for e-mail scanning on mail gateways.
It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates.

The core of the package is an anti-virus engine available in a form of shared library.

Features include:
* Command-line scanner
* Fast, multi-threaded daemon with support for on-access scanning
* Milter interface for sendmail
* Advanced database updater with support for scripted updates and digital signatures
* Virus scanner C library
* On-access scanning
* Virus database updated multiple times per day (see home page for total number of signatures)
* Built-in support for various archive formats.
* Built-in support for almost all mail file formats
* Built-in support for ELF executables and Portable Executable files compressed and others
* Built-in support for popular document formats including MS Office and MacOffice files, HTML, RTF and PDF

AVG Free
AVG Free for Linux is a commercial-grade antivirus product. It can be used on a single computer and is intended for private, non-commercial use only.

AVG Free can be run entirely from the command prompt but there is also a graphical front end available. Using the command line offers some extras such as creating a report file, while updates are easy to apply and can be scheduled.

The graphical user interface is both efficient and simple, and it can be used even by inexperienced Linux system users.

Features include:
* Advanced virus detection methods (heuristic analysis, generic detection, scanning)
* Scheduled and on-demand scanning of folders, files, and common archive types
* Rapid virus database updates for the lifetime of the product
* Small update files that do not drain system resources
* Automatic update functionality
* AVG On-Demand Scanner, which allows users to perform scheduled and manual tests
* High quality manual

P3Scan is a fully transparent proxy-server for POP3, SMTP, and limited POP3S Clients.

It can be used to provide email scanning from the internet, to any internal network and is ideal for helping to protect your "Other OS" LAN from harm, especially when used in conjunction with a firewall and other Internet Proxy servers.

It provides scanning of incoming/outgoing email messages for Viruses, Worms, Trojans, Spam, and harmful attachments. Because viewing HTML mail can enable a "Spammer" to validate an email address (via web bugs), it can also provide HTML tag stripping.

P3Scan is a derived work of POP3VScan.

Features include:
* Works with
o Kaspersky Anti-Virus for Linux (AVPD)
o Trophie Anti-Virus Daemon
o FRISK F-Prot Antivirus
o Clam AntiVirus
o F-Secure Anti-Virus
o Any other virus scanner that can output its report to the console (stdout)

Avast! Antivirus is an anti-virus program developed by ALWIL Software based in Prague.
This software is freeware for home users and non-commercial use only.

It is a multi-award winning solution to virus protection, with anti-spyware and anti-rootkit software built in for added security.

Features include:
* Antivirus kernel
o Almost 100% detection
o Reasonable memory requirements
o ICSA certified
o The following archives can be scanned: ARJ, ZIP, MIME (+ all associated formats), DBX (Outlook Express archives), RAR, TAR, GZIP, BZIP2, ZOO, ARC, LHA/LHX, TNEF (winmail.dat), CPIO, RPM, ISO, and SIS
o Supports a number of executable packers (such as PKLite, Diet, UPX, ASPack, FSG, MEW, etc./0
* Command line scanner - scan files in specified directories and both on local and remote volume
* User interface
o Intuitive Simple User Interface
o Independent on installed graphic libraries
o Testing of whole disks or just selected folders
o Defining and running of antivirus tests
o Working with the scan results
o Actions with infected files
o Storing the scan results (history)
o Virus encyclopedia
o Command-line scanner with STDIN/STDOUT mode
* Virus Chest - a chest directory where suspicious files are stored
* Automatic updates
o Non-incremental updates
o Updates can be completely automatic
o Standard updates are provided 2 times a week
* Alerts via SMTP
* Works on all modern distributions
* Shell scripts for common tasks
* Internationalization - English, Czech, Portuguese (Brazil), Bulgarian, Finnish, French

F-Prot Antivirus
For home users using the Linux open-source operating system, company offer F-Prot Antivirus for Linux Workstations. F-PROT Antivirus for Linux Workstations utilizes the renowned F-PROT Antivirus scanning engine for primary scan but has in addition to that a system of internal heuristics devised to search for unknown viruses

F-PROT Antivirus for Linux was especially developed to effectively eradicate viruses threatening workstations running Linux. It provides full protection against macro viruses and other forms of malicious software - including Trojans.

Features include:
* Scans for over 546460 known viruses and their variants
* Ability to perform scheduled scans when used with the cron utility
* Scans hard drives, CD-ROMS, diskettes, network drives, directories and specific files
* Scans for images of boot sector viruses, macro viruses and Trojan Horses

F-Secure Linux Security scans and removes viruses from networked or stand-alone workstations, database servers and application servers. It enables system administrators to scan files on Linux servers that handle for example web sites, ftp sites or file sharing.

The firewall component protects the computers against unauthorized connection attempts. The integrity checking feature protects critical system files against unauthorized modification attempts. F-Secure Linux Security introduces one installation package for Workstation and Server environments.

F-Secure Linux Security is centrally managed with F-Secure Policy Manager. F-Secure Policy Manager provides a tightly integrated infrastructure for defining and distributing security policies and monitoring the security of different applications from one central location.

Features include:
* Easy-to-use web-based user interface accessible also remotely
* Real-time antivirus protection
* Host firewall management
* Protects systems from rootkits
* System integrity checking and verification
* Centralized management, reporting and alerting with Policy Manager
* Automatic virus definition updates
* Risk and Spyware protection for Linux
* Interface for third party e-mail gateways
* Linux Samba file server support
* Open anti-virus scanning interface (API) for custom application integration
* Option of using Command-line only Anti-Virus Scanner
* Option to disable firewall, web user interface and real-time scanning components

Read more

Linux System Information Gathering Tool (LINUXexplo)

Linux Explorer ( LINUXexplo ) is a script that collects information about a linux server for support purposes, similar to the Solaris explorer ( SUNWexplo ) , Redhat's "sysreport" and SuSE's "siga" script.

The script is designed to help collect as much information as possible to help support linux and have a common set of scripts for collecting information about linux no matter what distro users are using.

The information is stored in seperated directories, once all the information has been collected it then tar's up those directories into a single gzip tar file which can then be attached to an email for your support organization or copied to a remote server for safe keeping.

Download the script: here

Read more

video capture application - ucview

video capture application - ucviewucview is a video image capture application.

This is a video image capture application using the unicap toolkit. It provides a simple way to parametrise the video device, can capture still images from the video stream or record the stream as an .MPEG file. By using unicap, it can access many different video capture devices like webcams, video grabber boards, IEEE-1394 ( FireWire ) cameras and others.

This application requires GTK+ version 2.6.x. Other dependencies include:
libtheora, gconf2, libglade-2, unicap

Read more

phonetooth - Send text messages (SMS) with your phone

phonetooth - Send text messages (SMS) with your phone
PhoneTooth is an application written in python that allows you to send text message using your mobile phone through a bluetooth connection. It also allows you to send files to your phone.

This application requires GTK+ version 2.10.x. Other dependencies include:
pybluez obexftp pyserial python-gammu (optional)

Key Features:
Download : here

Read more

eLearning (swf), similar to Adobe Captivate

Salasaga is an Integrated Development Environment for producing eLearning (swf), similar to Adobe Captivate. Licensed under the LGPL.

Imagine a free, easy to use GUI authoring environment that helps you create visually impressive and actually useful learning material. The short term goal for this project is to provide such an environment, and we're well on the way to a first release for doing that.

Initially similar to Adobe Captivate, but will eventually incorporate an AJAX (browser based) playback capability for advanced content. Flash has at least one serious design limitation (from my POV) making it nearly useless for comprehensive eLearning, and this appears to be addressed by the existing capabilities of AJAX in browsers these days.

This application requires GTK+ version 2.10.x. Other dependencies include:
* Pango - version 1.16 or higher is known to work
* libxml2 - version 2.6.30 or higher is known to work
* Ming - version 0.3.0 or higher is known to work

Read more

Open Source Speech Recognition Engines

The Sphinx Group at Carnegie Mellon University is committed to releasing the long-time, DARPA-funded Sphinx projects widely, in order to stimulate the creation of speech-using tools and applications, and to advance the state of the art both directly in speech recognition, as well as in related areas including dialog systems and speech synthesis.

The CMU Sphinx project released a set of reasonably mature, world-class speech components that provide a basic level of technology to anyone interested in creating speech-using applications without the once-prohibitive initial investment cost in research and development; the same components are open to peer review by all researchers in the field, and are used for linguistic research as well.

Check it out : here

Read more

HowTo keep your Ubuntu up-to-date

It is important to have the system updated, so that we have all the latest patches, security fixes and packages upgrades from the repositories.

First, navigate to: System --> Administration --> Software Sources

and check that all repositories are enabled.

Then, open the terminal: Applications --> Accessories --> Terminal
and type: (you need to provide the password here)
sudo apt-get update

sudo apt-get upgrade
sudo apt-get dist-upgrade

With this you are done with the system update.
Read more

Change the splash screen color in Ubuntu

Originally a brownish color to match the Ubuntu theme, it does not quite fit with other themes and might want to be changed. Enter the gdm.conf file (sudo gedit /etc/gdm/gdm.conf). search the below lines in the file:


Change it to what you like. For all black, use:

Read more

How to enable Compiz Fusion in Ubuntu

In Ubuntu Hardy Heron, Compiz Fusion is already installed and is automatically enabled after you have installed your graphics' card drivers.

The only thing you have to do is to install the Compiz Configuration Settings Manager.

Open a terminal and type: sudo apt-get install compizconfig-settings-manager
After that navigate to: System --> Preferences --> Advanced Desktop Effects Settings

and there you may enable/disable any plugin you want.
Read more

iftop - Network Usage by Connection

iftop displays network usage by connection. The default display shows the connection endpoints (port numbers may be toggled using the p key), with data transfer volumes displayed in numeric format and as a horizontal bargraph using reverse video. Various keys provide control over the display; pressing ? displays a help page listing these keys. iftop also provide command-line options for traffic filtering and interface selection.

The information displayed by iftop is detailed and easily understood. When an application is hogging your network bandwidth, iftop can be an invaluable tool -- though you may need to also use netstat -p to determine which process is behind a particular connection.

Installing from the command line: yum install iftop
Command: /usr/sbin/iftop
Upstream website:

Read more

Distributed memory object caching system

What is memcached?

memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load.

Danga Interactive developed memcached to enhance the speed of, a site which was already doing 20 million+ dynamic page views per day for 1 million users with a bunch of webservers and a bunch of database servers. memcached dropped the database load to almost nothing, yielding faster page load times for users, better resource utilization, and faster access to the databases on a memcache miss.

How it Works

First, you start up the memcached daemon on as many spare machines as you have. The daemon has no configuration file, just a few command line options, only 3 or 4 of which you'll likely use:

# ./memcached -d -m 2048 -l -p 11211

This starts memcached up as a daemon, using 2GB of memory, and listening on IP, port 11211. Because a 32-bit process can only address 4GB of virtual memory (usually significantly less, depending on your operating system), if you have a 32-bit server with 4-64GB of memory using PAE you can just run multiple processes on the machine, each using 2 or 3GB of memory.

read More ...

Read more

Video Players for Linux

Video Players for Linux

Mplayer for linux is a great movie player. MPlayer is well known for its wide format support and is known to support more multimedia formats than any other player. MPlayer easily plays MPEG/VOB, AVI, Ogg/OGM, VIVO, ASF/WMA/WMV, QT/MOV/MP4,RealMedia, Matroska, NUT, NuppelVideo, FLI, YUV4MPEG, FILM, RoQ, PVA files, supported by many native, XAnim, and Win32 DLLcodecs. With Mplayer, You can watch VideoCD, SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies

Download Mplayer here

Video Players for LinuxXine:

xine is a free multimedia player. It plays back CDs, DVDs, and VCDs. It also decodes multimedia files like AVI, MOV, WMV, and MP3 from local disk drives, and displays multimedia streamed over the Internet. It interprets many of the most common multimedia formats available - and some of the most uncommon formats, too.

Download xine here


Kaffeine is another cool media player for KDE. Kaffeine supports multiple player engines while its default engine is Xine. Kaffeine can easily keep track of multiple play lists simultaneously and give you the ability to auto load subtitles files when playing a certain video giving Kaffeine a wide variety of supported media types and letting Kaffeine access CDs, DVDs, and network streams easily. With the latest updates, Kaffeine is able to play nearly every known audio and video format, however some may only be played with proprietary codecs. Kaffeine features include streaming, DVB, DVD, Video CD and CD audio.

Download Kaffeine here

Video Players for LinuxVLC for Linux:

VLC media player is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols.
It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
It doesn't need any external codec or program to work.

Download VLC here

Video Players for LinuxRealPlayer 11 for Linux:

Realplayer 11 for Linux is also something which a lot of people use to play more video, popular windows media files, real media filesand much more. With Realplayer you can create your personal playlists, control live streams and enjoy 5.1 surround sound (If you have good sound system)

Download Realplayer here

Read more

HowTo use scp and sftp commands

The scp command can be used to transfer files between machines over a secure, encrypted connection. It is similar to rcp. The general syntax to transfer a local file to a remote system is as follows:
scp username@hostname:/home/nikesh/log /tmp/log

The sftp utility can be used to open a secure, interactive FTP session. It is similar to ftp except that it uses a secure, encrypted connection. The general syntax is sftp Once authenticated, you can use a set of commands similar to those used by FTP
Read more

Installing and Using John the Ripper - Password cracker

Installing and Using John the Ripper - Password crackerCompile a source fileDownload a source code from
Extract source files: tar xvzf john-

1) cd john-
2) Then we need to rum make command which will return a list of available systems that John the Ripper password cracker can be compiled on.
3) Choose your appropriate architecture, and compile: make linux-x86-any
4) Go and run the john the ripper binary:
cd ../run/

Using John the ripper:
For testing purposes you should create a testing user "johnripper" with password "password".

poison:~ # useradd johnripper
poison:~ # passwd johnripper
Changing password for johnripper.

New Password:
Reenter New Password:

Password changed.
poison:~ #

Time to Crack password:
John the Ripper's password cracker needs to access a shadow file in order to be able crack a password. You need to run "john" as superuser "root". Be sure that John Binary is in your path, or you are in directory where john Binary resides. Try and see how long it will take to crack your super secure password of: "password"

./john -users=johnripper /etc/shadow

Read more

Linux Filesystem Hierarchy

Here is a very cool and beautiful representation of the hierarchy which I found site. The diagram below represents (part of) a Linux file system.

Read more

Convert man pages to text

At the command line, run: man touch | col -b > filename.txt

Here’s what it means:

man = display the man pages for a stated command
| = pipe the output of the man pages somewhere else
col -b = format the output
> = send the output to a file
filename.txt = name of the file you wish to create and populate with output
Read more

Block messengers through Iptables

msn messenger user port 1863
yahoo messenger uses 5000,5010 and 5050

To block AOL IM and ICQ:

# iptables -A FORWARD –dport 5190 -j DROP
# iptables -A FORWARD -d -j DROP

To block MSN messenger:

# iptables -A FORWARD -p TCP –dport 1863 -j DROP
# iptables -A FORWARD -d -j DROP

To block Yahoo messenger:

# iptables -A FORWARD -p TCP –dport 5000:5010 -j REJECT
# iptables -A FORWARD -d -j REJECT
# iptables -A FORWARD -b -j REJECT

Note that this will only block clients on the computer itself. If you are using the computer as a router with NAT, you will want to use “-t nat -A PREROUTING” instead.
Read more

Head and Tail example

1. Suppose I need to read last 10 lines of a file
# tail -n 20 /var/log/boot.log

2. Suppose I need to read forst 10 lines of a file
# head -n 30 /etc/sensors.conf

Now imagine you want to follow what is been written “live” to the /var/log/messages file

# tail -f /var/log/messages
Read more

Journaled File Systems options

Journaled file systems write critical information about file system operations to a journal before actually modifying files. In the event of an unclean shutdown, the file system can be recovered more quickly by reading the journal instead of performing fsck. Journaling Options available in ext3

data=ordered - This is the default mode. Only meta data is journaled.
data=journaled - Meta data and data are journaled.
data=writeback - Not as good as “data=ordered”, but allows for a quicker fsck than standard ext2.

Converting from ext2 to ext3
Because of their close relation, it is fairly simple to upgrade from ext2 to ext3:
Modify file system type in /etc/fstab

Create the journal: tune2fs -j /dev/hda1

Make sure you fire mkinitrd command and create new initrd file for ext3 FS
Read more

What is TCP reset attacks

The primary idea behind a TCP reset attack is to falsely terminate an established TCP connection. Lets imagine an established TCP connection from host A to host B. Now, a third host, C, spoofs a packet that matches the source port and IP address of host A, the destination port and IP address of host B, and the current sequence number of the active TCP connection between host A and host B. Host C sets the RST bit on the spoofed packet, so when received by host B, host B immediately terminates the connection. This results in a denial of service, until the connection can be reestablished. However, the severity of such an attack is different from application to application.
Read more

What are Sticky Bit, SUID (Set User ID) Bit and SGID (Set Group ID) Bit

Sticky Bit

Setting the sticky bit tells Unix that once the concerned application is executed, it should remain in memory. Remember that Unix is a multi-user OS and was mainly designed so that multiple users can work simultaneously. Thus the logic used is that a program that exists in memory requires lesser time to start when a new user requests for the same program. Thus when one user has just used a program and then a new user wants to use the same program, the second user doesn't have to face a time delay for the program to initialize itself. It would be readily available to him. The concept of the sticky bit was a very useful one, long back when fast disk access and other memory access technologies weren't around. But in today's age the concept of sticky bit is obsolete, since modern day technology is advanced enough to reduce the time delay while loading applications into the memory. Thus currently the sticky bit is of very little significance. Sticky bit is only associated with executables.

SUID (Set User ID) Bit

Sometime you may faced an error while trying to run any application stating that the application must be 'SUID root' . You might have been confused that time, but now once you read this article you would no longer find it confusing.

SUID stands for Set User ID. This means that if the SUID bit is set for any application then your user ID would be set as that of the owner of application/file rather than the current user, while running that application. That means in case I have an application whose owner is ' root ' and it has its SUID bit set, then when I run this application as a normal user, that application would still run as root. Since the SUID bit tells Linux that the the User ID root is set for this application and whenever this application executes it must execute as if root was executing it (since root owns this file).

In case you have really understood the above you may be wondering - isnt this a major security risk? If users are able to run applications as root, then it must be definitely posing as a threat to the security of the system. Actually the SUID is used to increase the security in a way. Let me explain this with my own example I use on my machine.

SGID (Set Group ID) bit

Just like SUID, setting the SGID bit for a file sets your group ID to the file's group while the file is executing. IT is really useful in case you have a real multi-user setup where users access each others files. As a single homeuser I haven't really found a lot of use for SGID. But the basic concept is the same as the SUID, the files whose SGID bit are set would be used as if they belong to that group rather than to that user alone.

Read more

Restricting scheduling (cron, at) to normal user

If you run a system that hosts multiple users, you might want to discourage them from using cron or at for whatever reasons. This can be done.

To restrict people from using cron, create a file called /etc/cron.deny and put the name of the user you want to restrict in there.

To restrict people from using at, create a file called /etc/at.deny, and put the name of the user you want to restrict in there. Be careful about restricting default system users like nobody. These accounts sometimes run their own jobs at specific times.

Read more

Posfix security - How to change mailbanner

By default the installation of Postfix is already security-minded. An out-of-the-box install could be enough for most users but still, some tweaking could not hurt.

Replace your mailbanner (the text one sees when telnetting to your port 25) with something meaningless.
This is what you see when you do telnet to port 25.

nikesh@poison:~> telnet localhost 25
Connected to localhost.
Escape character is '^]'.
220 ESMTP Postfix

Now to remove this banner incformation, you need to change a variable setting in your file, something like ...

smtpd_banner = $myhostname ESMTP Sorry, No banner

After doing the change, restart your postfix server and try doing telnet again to port 25

nikesh@poison:~> telnet localhost 25
Connected to localhost.
Escape character is '^]'.
220 ESMTP Sorry, No banner
Read more

Moonlight (silverlight for linux) relesead

Moonlight (silverlight for linux) relesead
Moonlight is an open source implementation of Microsoft Silverlight for Unix systems.

Mono provides the necessary software to develop and run .NET client and server applications on Linux, Solaris, Mac OS X, Windows, and Unix. Sponsored by Novell (, the Mono open source project has an active and enthusiastic contributing community and is positioned to become the leading choice for development of Linux applications.

First Moonlight Source Code Release

To encourage users to try out Moonlight, we are doing a source-code only release of Moonlight for developers to try out Moonlight.

To try out Moonlight, you have two options:

* Media codecs: you must do your own build from source code.
* No-media codecs: we provide one-click addins for Firefox that will install with no effort.

Firefox addins are available from

Source code for Moonlight is available from here. To compile Moonlight from source code follow these instructions.

Read more

Install multimedia Support in Ubuntu Hardy Heron

The below commands downloads all the required codecs from the Medibuntu repositories and enble the full multimedia support for your Ubuntu box, now with this you can play the encrypted DVD playback, Adobe Flash and non-native media files (Windows media, Apple QuickTime, Real, MP3).

Open the terminal and type following command:
sudo wget -O /etc/apt/sources.list.d/medibuntu.list
sudo apt-get update
sudo apt-get install medibuntu-keyring
sudo apt-get update
sudo apt-get install libdvdcss2 w32codecs

Read more

Install multimedia Support in Fedora 9

Follow these instructions to get mp3 and other multimedia support on your Fedora Core 9.

Open a terminal and become root, then run this command:

# wget
# rpm -ivh livna-release-9-1.noarch.rpm

Install all other multimedia plug ins..

# yum -y install gstreamer-plugins-bad gstreamer-plugins-ugly xine-lib-extras-nonfree
Read more

Kernel oops count

If you want to know what is kernel oops:
An oops is a deviation from correct behavior of the Linux kernel which produces a certain error log. The better-known kernel panic condition results from many oops, but others may allow continued operation with compromised reliability.

When the kernel detects a problem, it prints an oops message and kills any offending process. The message is used by Linux kernel engineers to debug the condition which created the oops and fix the programming error which caused it.

Once a system has experienced an oops, some internal resources may no longer be in service. Even if the system appears to work correctly, undesirable side effects may have resulted from the active task being killed. A kernel oops often leads on to a kernel panic once the system attempts to use resources which have been lost.

There is an website which counts this oops : is a website that tries to help the developers of the Linux kernel by collecting so-called oopses, which are the crash signatures of the Linux kernel. The collected oopses are processed statistically to present information for the kernel developers, such as

* Which crash signatures occur the most? (and thus need to be fixed most urgently)
* When did a certain crash signature show up first?
* Which API functions are the most error prone?

Fedora 9 have a process to send this oops to this site.

Read more

GUI tools to build Iptables/Firewall rules

GUI tools to build Iptables/Firewall rulesfwbuilder

Firewall Builder is a GUI firewall configuration and management tool that supports iptables (netfilter), ipfilter, pf, ipfw, Cisco PIX (FWSM, ASA) and Cisco routers extended access lists. Firewall Builder uses object-oriented approach, it helps administrator maintain a database of network objects and allows policy editing using simple drag-and-drop operations.

It is run on a separate host system, where you create the policy files, and then copy them over and run them on the target system. It is able to handle everything from very simple rulesets to large and rather complicated ones. It has extensive abilities to handle different versions and installations of iptables, by configuration of which targets/matches are available on each host system, etcetera. The end result may be saved in an parsable configuration file (e.g., the real firewall scripts).

fwbuilder can be found at

GUI tools to build Iptables/Firewall rulesTurtle Firewall Project

Turtle Firewall is a software which allows you to realize a Linux firewall in a simply and fast way.
It's based on Kernel 2.4.x/2.6.x and Iptables. Its way of working is easy to understand: you can define the different firewall elements (zones, hosts, networks) and then set the services you want to enable among the different elements or groups of elements.
You can do this simply editing a XML file or using the comfortable web interface Webmin.

You can find the Turtle Firewall Project and more information over here

GUI tools to build Iptables/Firewall rulesEasy Firewall Generator for IPTables

Easy Firewall Generator is another interesting development when it comes to iptables and netfilter. Basically, Easy Firewall Generator is a PHP webpage where you specify options and specifics of your firewall, and once all of the configurations are done, you click a button, and the webpage spits out an iptables ruleset that you can utilize.

The script contains all the basic rules, and more specific ones to contain strange patterns in packets. It also contains specific IP sysctl changes that may be needed, loads necessary modules, et cetera. The whole ruleset is also written in a redhat init.d format.

Read more

What is is the standard IP address used for a loopback network connection.

This means that if you try to connect to, you are immediately looped back to your own machine. If you telnet, ftp, etc... to, you are connected to your own machine.

In other words, is you.

For example, if your system was named "hostname", and you attempted to telnet to, you would see:

# telnet
Connected to hostname
Escape character is '^]'.

Another name for is localhost.

Although is the most commonly utilized address for localhost, any IP address in the 127.*.*.* range should also function in the same manner.
Read more

ICMP Error codes

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet protocol suite. It is chiefly used by networked computers' operating systems to send error messages—indicating, for instance, that a requested service is not available or that a host or router could not be reached, the below are the 16 error codes for ICMP.

0 - Network unreachable - Tells you if a specific network is currently unreachable.

1 - Host unreachable - Tells you if a specific host is currently unreachable.

2 - Protocol unreachable - This code tells you if a specific protocol (tcp, udp, etc) can not be reached at the moment.

3 - Port unreachable - If a port (ssh, http, ftp-data, etc) is not reachable, you will get this message.

4 - Fragmentation needed and DF set - If a packet needs to be fragmented to be delivered, but the Do not fragment bit is set in the packet, the gateway will return this message.

5 - Source route failed - If a source route failed for some reason, this message is returned.

6 - Destination network unknown - If there is no route to a specific network, this message is returned.

7 - Destination host unknown - If there is no route to a specific host, this message is returned.

8 - Source host isolated (obsolete) - If a host is isolated, this message should be returned. This code is obsoleted today.

9 - Destination network administratively prohibited - If a network was blocked at a gateway and your packet was unable to reach it because of this, you should get this ICMP code back.

10 - Destination host administratively prohibited - If you where unable to reach a host because it was administratively prohibited (e.g., routing administration), you will get this message back.

11 - Network unreachable for TOS - If a network was unreachable because of a bad TOS setting in your packet, this code will be generated as a return packet.

12 - Host unreachable for TOS - If your packet was unable to reach a host because of the TOS of the packet, this is the message you get back.

13 - Communication administratively prohibited by filtering - If the packet was prohibited by some kind of filtering (e.g., firewalling), we get a code 13 back.

14 - Host precedence violation - This is sent by the first hop router to notify a connected host, to notify the host that the used precedence is not permitted for a specific destination/source combination.

15 - Precedence cutoff in effect - The first hop router may send this message to a host if the datagram it received had a too low precedence level set in it.
Read more

Time bases iptables rules

Time bases iptables rules
Question: How can I restrict/allow access to certain service on timely basis with iptables? For example restrict access to SSH between 7:00 pm - 8:00 am on weekdays?

Answer: You are welcome to use iptables patch-o-matic extension (pom or p-o-m) that allows you to match a packet based on its arrival or departure (for locally generated packets) timestamp. The syntax is the following:

iptables RULE -m time --timestart TIME --timestop TIME --days DAYS -j ACTION


--timestart TIME: Time start value (format is 00:00-23:59)
--timestop TIME: Time stop value (the same format)
--days DAYS: a list of days to apply, from (format: Mon, Tue, Wed, Thu, Fri, Sat, Sun).

To add the rule stated in the question use the following command:

iptables -A INPUT -p tcp -d --dport 22 -m time --timestart 19:00 --timestop 8:00 -days Mon,Tue,Wed,Thu,Fri -j DROP

Hope it helps!

Read more

Howto open port using iptables

If you want your machine to respond to requests initiated from elsewhere on the internet, in effect to be a server, you need to open the required ports. To do this properly, you need to know:

1. What service you want to open up?
2. Whether it is a tcp or udp service?
3. What port number(s) it uses?

You may also wish to think about restricting access to certain machines; e.g. if you only want people in the X dept to access the machine.

For example, to enable ssh access to your box from anywhere on campus, you could use something like

iptables -A allowed -p tcp --dport 22 -s -j ACCEPT
iptables -A allowed -p udp --dport 22 -s -j ACCEPT

iptables -A allowed -p tcp --dport 22 -s -j ACCEPT
iptables -A allowed -p udp --dport 22 -s -j ACCEPT

This allows both udp and tcp traffic from either of the two class B networks to access port 22 on your machine. Of course, you need to have an sshd daemon running as well for this to work; the code above merely punches the required holes in the firewall.
Read more

Howto create a MySQL user

Here is a quick tip how to create from mysql new database and a new mysql user that has full privileges on this newly created database:

mysql -uroot -p

GRANT ALL PRIVILEGES ON .* TO 'my_user'@'localhost' IDENTIFIED BY 'my_password' WITH GRANT OPTION;
Read more

Howto change the MySQL root password

Here is a quick tip that will show several methods to change the mysql root password (that is normally empty at mysql initial install).

Method 1: using the SET PASSWORD command:
mysql -u root
mysql> SET PASSWORD FOR 'root'@'localhost' = PASSWORD('newpass');

Method 2: using mysqladmin
mysqladmin -u root password "newpass"
Read more

Turn OFF password expiration / aging

etc/shadow stores actual password in encrypted format for user’s account with additional properties related to user password.

The password expiration information for a user is contained in the last 6 fields. Password expiration for a select user can be disabled by editing the /etc/shadow file

You can also use chage command. The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password.

To list current aging type chage command as follows:
# chage -l nikesh

Last password change : May 12, 2008
Password expires : never
Password inactive : never
Account expires : never
Minimum number of days between password change : 0
Maximum number of days between password change : 99999
Number of days of warning before password expires : 7

To disable password aging / expiration for user foo, type command as follows and set:
Minimum Password Age to 0
Maximum Password Age to 99999
Password Inactive to -1
Account Expiration Date to -1

Interactive mode command:
# chage username
# chage -I -1 -m 0 -M 99999 -E -1 username
Read more

OpenSUSE Hard Disk Configuration Survey

In order to optimize the YaST partitioner module for openSUSE users the user experience team decided to conduct a small survey to figure out how you deal with hard disk configuration. The survey contains some basic questions and its results will directly influence the redesign for the partitioner module.

The survey will be online until 28th May 2008 and the results will be published on as soon as possible.

Answering the questions will take less than five minutes.

Click here to take the survey
Read more

Install Google Earth on Linux

Install Google Earth 4.3 by opening a terminal and issuing following commands

# wget
# chmod +x GoogleEarthLinux.bin
# sudo ./GoogleEarthLinux.bin

The above command will install googleEarth to /opt/google-earth and create a desktop icon for all users. Click on icon to start up the Google Earth
Read more

Remote Desktop to Windows through Linux

Gnome-RDP: Remote Desktop Client for the GNOME Desktop. Supported protocols: RDP, VNC, SSH. Configured sessions can be saved to the built in list. Additional programs required: rdesktop, tightvnc, ssh, gnome-terminal. Application can be run with Mono runtime.

Installation on Ubuntu:

sudo apt-get install gnome-rdp

Now that Gnome-RDP is installed lets fire it up:
Goto Applications->Internet->Gnome-RDP

Read more

Howto Install Wine in Ubuntu

Add the winehq repository : Open up a terminal Applications->Accessories->Terminal
Add the gpg apt key: wget -q -O- | sudo apt-key add -

Add the Repository via wget:
sudo wget -O /etc/apt/sources.list.d/winehq.list

Update the apt sources and install the latest wine!

sudo apt-get update ; sudo apt-get install wine

Done, now you have the latest wine package installed!
Read more

Network Scanner - Abyss

Abyss is a diverse network tool designed for unix/linux with both active, and passive capabilities. It performs various types of portscans, with remote OS detection, and uses a multi-threaded model for fast simultaneous network

Abyss also has sniffing capabilities based on complex BPF filters that display packet information, decode the payload, and perform passive OS detection.

AbysS Compiles on Linux, and FreeBSD. It is POSIX compliant, and should work on other unix varients running on x86.

1. Download from here
2. Unpack the tar ball - tar zxvf abyss-0.9.15-pre-release.tgz
3. Compile - type make

The README-NOW file is very descriptive, and should give full instructions
on using AbysS

Scan all the live hosts on a 30 node LAN

./abyss -p -o iplist
./abyss -f iplist

Passive OS Detection, while also sniffing payload and packets from all tcp traffic

./abyss -O eth0 -b tcp -h -o logfile

Sniff ftp usernames, and passwords

./abyss -O eth0 -b tcp and dst port 21 -h -o logfile

Read more

Search And Replace Text in files Recursively

Search And Replace Text in files Recursively
regexxer is a nifty GUI search/replace tool featuring Perl-style regular expressions. If you need project-wide substitution and you’re tired of hacking sed command lines together, then you should definitely give it a try.
Read more

A Password Recovery Tool for PDF-files

A Password Recovery Tool for PDF-files
PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL).


* Supports the standard security handler (revision 2 and 3) on all known PDF-versions
* Supports cracking both owner and userpasswords
* Both wordlists and bruteforcing the password is supported
* Simple permutations (currently only trying first character as Upper Case)
* Save/Load a running job
* Simple benchmarking
* Optimised search for owner-password when user-password is known

Install pdfcrack in Ubuntu

sudo aptitude install pdfcrack

pdfcrack Syntax

pdfcrack -f filename [options]

pdfcrack Example

pdfcrack suck.pdf

Read more
Related Posts with Thumbnails