linux poison RSS
linux poison Email
1

Remote Control your PC with bluetooth cell phone

Remote Control your PC with bluetooth cell phone
anyremote is a Console application which allows to control PC with bluetooth cell phone

The overall goal of this project is to provide wireless remote control service on Linux through Bluetooth, InfraRed, Wi-Fi or just TCP/IP connection.

anyRemote supports wide range of modern cell phones line Nokia, SonyEricsson, Motorola and others.

anyRemote was developed as thin "communication" layer between Buetooth (IR, Wi-Fi)-capabled phone
and Linux, and in principle could be configured to manage almost any software.

anyRemote could be used with:
* bluetooth connection with java client if cell phone is JSR82 compatible
* Wi-Fi connection with java client if phone supports Wi-Fi
* IR connection with java client if java realization in phone supports access to IR port
* ordinary TCP/IP connection with java client, if PC is connectable from internet
* bluetooth, infrared or cable connection using AT "modem" commands
* web interface
* it supports some of IR remotes supplied with TV tuner cards (like LIRC)
* it has limited support for Bemused clients

Download anyRemote : Here


Read more
0

Ubuntu Tips, Tricks and tutorials

  1. Official Ubuntu Home Page
  2. Official Ubuntu Forums
  3. Official Ubuntu Guide
  4. Wubuntu - Ubuntu Web Edition
  5. Windows to Ubuntu Transition Guide
  6. 10 Advantages of Ubuntu over Vista
  7. 30 Days with Ubuntu Linux
  8. 60 Days With Ubuntu
  9. Installing Ubuntu Linux!
  10. FREE Linux Books online
  11. The Ultimate Linux Reference Guide for Newbies
  12. Top 10 Linux commands for Absolute Newbies
  13. The Ultimate Linux Network Reference Guide for Newbies
  14. Install and run Ubuntu without disturbing Windows
  15. Basics to Linux Explained
  16. Windows Desktop Software and The Linux Alternatives
  17. The best reason yet to use Ubuntu
  18. How to install Anything in Ubuntu!
  19. How to Build Triple Boot (XP, Vista, Ubuntu) with single Boot Screen
  20. Windows Based Ubuntu Installer - Screenshots and demo
  21. Instlux: Install Linux while still in Windows!
  22. Ubuntu Linux Vs. Windows Vista: The Battle For Your Desktop — Ubuntu Linux
  23. Ten tips for new Ubuntu users
  24. 13 Must Do things on new Ubuntu 7.04 Feisty Fawn installation
  25. Hack Attack: Top 10 Ubuntu apps and tweaks
  26. How To Set Up A Ubuntu/Debian LAMP Server
  27. The Perfect Desktop - Ubuntu 7.04 Feisty Fawn
  28. The Perfect Desktop - Ubuntu Studio 7.04
  29. The Perfect Setup - Ubuntu Feisty Fawn (Ubuntu 7.04)
  30. How To Install Internet Explorer On Ubuntu
  31. Change the menu bar and main menu logos in Ubuntu
  32. How To Compile A Kernel - The Ubuntu Way
  33. How to Configure an $80 File Server in 45 Minutes
  34. Installing Popular Applications On Your Ubuntu Desktop With Automatix2
  35. Bandwidth Monitoring Tools for Ubuntu Users
  36. Running Internet Explorer in Ubuntu Linux
  37. How To Use NTFS Drives/Partitions Under Ubuntu
  38. Installing The Native Linux Flash Player 9 On Ubuntu
  39. Mount a Remote Folder using SSH on Ubuntu
  40. Clone Your Ubuntu installation
  41. Speed Up Firefox web browser
  42. Install Popular Applications in Ubuntu Feisty Fawn Using Automatix2
  43. How to Install Java Runtime Environment (JRE) in Ubuntu
  44. How to Install Beryl with latest nvidia drivers in Ubuntu Feisty Fawn
  45. How To Install VMware Server On Ubuntu 7.04
  46. DNS server Setup using bind in Ubuntu
  47. NFS Server and Client Configuration in Ubuntu
  48. Dual Monitors with NVidia in Ubuntu
  49. Howto Set Flickr images as Ubuntu desktop wallpaper
  50. Sharing Internet Connection in Ubuntu
  51. 10 must have programs for a new Ubuntu user
  52. 10 minutes to run every Windows app on your Ubuntu desktop
  53. How-To: Ubuntu Media Server
  54. How-to: Cheap Ubuntu Media Server Part 2
  55. HOWTO Encrypt CD/DVDs in Ubuntu
  56. How-to: Installing Ubuntu Linux on a usb pendrive
  57. Install KDE Desktop in Ubuntu
  58. Set Windows as Default OS when Dual Booting Ubuntu
  59. Official Ubuntu Linux Desktop Guide
  60. 100+ Ubuntu Tutorials and Growing Fast!
  61. Ubuntu and wireless - now better than Windows!
  62. LifeHacker Top 10 Ubuntu applications
  63. Running OSX and Windows XP/Vista on Ubuntu
  64. Awesome Ubuntu Apps you might not know about
  65. Completely mod Ubuntu to look like OS X
  66. Cracking WEP with Ubuntu
  67. 6 Best Ubuntu Tweaks out there
  68. 100 Useful Ubuntu Links - Everything you could ever need!
  69. Ultimate Ubuntu performance tweaking guide
  70. Transform Your Ubuntu’s Look
  71. Ubuntu tricks - how to mount your WinXP partition, make it read/writabable
  72. HOWTO: Ubuntu Customization Guide Part I
  73. Cleaning up a Ubuntu GNU/Linux system
  74. Super Fast Internet for Ubuntu
  75. Speed up the Internet in Ubuntu
  76. How-to: Theming your Ubuntu desktop
  77. 11 Things You Haven’t Seen Yet in Ubuntu Feisty Fawn
  78. 300+ Easily Installed Free Fonts for Ubuntu
  79. Ubuntu Performance Guides
  80. Ubuntu Tutorials
  81. 10 most popular Ubuntu sites on the net
  82. Ubuntu Feisty Fawn Performance Guide
  83. Set-up a Ubuntu webcam security system
  84. Instructions to install NTFS-3G in Ubuntu Dapper
  85. How to achieve native NTFS write support under Linux
  86. Hacking Ubuntu to Improve Performance
  87. Ubuntu and Your iPod…
  88. How to Access Your Ubuntu Remotely
  89. How to make OpenOffice run faster in Ubuntu
  90. Dual Monitors HOWTO
  91. DvdShrink For Linux - How To Install On Ubuntu
  92. 13 Applications to Install on Ubuntu/Linux running on Slow Computer
  93. How to Setup Your ubuntu Computer to be a Router
  94. Improve performance in Ubuntu
  95. How to gracefully reboot your Ubuntu/Debian system if all else fails
  96. Good Ubuntu Networking Tutorial for Beginners and advanced users
  97. Top 10 Ubuntu Tips
  98. Scheduling for Absolute Beginners
  99. Building a Linux home media center
  100. Ubuntu Customization Kit
  101. Remote Desktop for Linux

Read more
0

Tune/Configure your Ubuntu with Ubuntu Tweak

Tune/Configure your Ubuntu with Ubuntu Tweak
Ubuntu Tweak is a tool for Ubuntu that makes it easy to configure your system and desktop settings.

It provided many useful desktop and system options that the default desktop environment isn't provided.

Features of Ubuntu Tweak:

* View of Basic System Information(Distribution, Kernel, CPU, Memory, etc.)
* GNOME Session Control
* Auto Start Program Control
* Show/Hide and Change Splash screen
* Show/Hide desktop icons or Mounted Volumes
* Show/Hide/Rename Computer, Home, Trash icon or Network icon
* Tweak Metacity Window Manager’s Style and Behavior
* Compiz Fusion settings, Screen Edge Settings, Window Effects Settings, Menu Effect Settins
* GNOME Panel Settings
* Nautilus Settings
* Advanced Power Management Settings
* System Security Settings

Installation:
Open your terminal, type the command to run gedit(or other editor in your opinion) to modify the sources.list:
sudo gedit /etc/apt/sources.list
And put the two line into it:
deb http://ppa.launchpad.net/tualatrix/ubuntu hardy main
deb-src http://ppa.launchpad.net/tualatrix/ubuntu hardy main

Then update the source and install or upgrade Ubuntu Tweak:
sudo apt-get update
sudo apt-get install ubuntu-tweak

if you have installed, just type:
sudo apt-get dist-upgrade

Download: Here
Read more
2

Reiser FS is dead (RIP)

Reiser FS is dead (RIP)
Yesterday, the Open Source community took an emotional hit when veteran Linux programmer Hans Reiser was convicted of first degree murder in the suspicious disappearing of his wife, Nina. While I won’t go into the details of the case, as this has been covered extensively in the press, I would like to talk a little bit about how this verdict will impact the technology in play for file system dominance in our favorite Open Source operating system, Linux.

Suse and Debian use ReiserFS version 3, a stable and proven version of the code that has been sitting mostly fallow for some time, and is maintained with bug and security fixes on a best effort basis.

From the SuSE and Debian perspective, this is an obviously unacceptable state of affairs. The OpenSuSE project has already moved its distribution to use the ext3 file system

Reiser found guilty of first degree murder


Read more
0

Monitor Web page changes

Specto is a OpenSource WebPage update/monitoring program - it saves you time and keeps you updated by automatically checking web pages (static or dynamic)to see if they have changed also helps to check it at time when someone is trying to change your page.

You can configure Specto to monitor changes to wiki pages, blog posts, forum threads, your email inbox, and even files and folders on your own system. An unobtrusive pop-up from its system tray icon informs you of all changes, so you don't have to hop around looking for updates.

You can install it from the compressed tarball if you want the most recent release. First explode the tarball with the tar zxvf specto-0.2.2.tar.gz command. Next, browse into the specto-0.2.2/ directory. You don't have to install Specto to begin using it; the command ./launch.sh launches Specto. But Fedora and Ubuntu users can respectively use the su -c "python setup.py install" or sudo python setup.py install command to install Specto.


Read more
0

Open Source collaboration suite - Spicebird

Spicebird is a free and open source collaboration suite. It features include email, calendaring and instant messaging. This post shows how you can install Spicebird on Ubuntu 7.10 Gutsy Gibbon.

To install Spicebird on Ubuntu, you can execute the following steps:

1. Download Spicebird beta 0.4 for Linux from here. Save it to ~/Desktop folder.

2. Open terminal window, go to ~/Desktop folder:

cd ~/Desktop

3. Extract to /opt:

sudo tar jxvf spicebird-beta-0.4.en-US.linux-i686.tar.bz2 -C /opt

4. Create GNOME menu.

sudo gedit /usr/share/applications/spicebird.desktop

Then add:

[Desktop Entry]
Encoding=UTF-8
Name=Spicebird
Comment=Collaboration suite
Exec=/opt/spicebird-beta/spicebird
Icon=/opt/spicebird-beta/icons/mozicon50.xpm
Terminal=false
Type=Application
Categories=Application;Network;
StartupNotify=true

5. Now you can run Spicebird by clicking Applications → Internet → Spicebird.

Read more
0

Take a break - Workaholic

Workaholic is a program which shows a window to remind you to take a break after a period of time by showing a transparent window with a progress bar. You can skip rests, or postpone these for 5 or 10 minutes.

To install Workaholic on Ubuntu, you can execute the following steps:

1. Open your /etc/apt/sources.list file with gedit text editor:
sudo gedit /etc/apt/sources.list

2. Add this line:
deb http://mundogeek.net/repo ubuntu all

3. Update the list of packages:
sudo apt-get update

4. Workaholic requires python-imaging package, you can install it with this command:
sudo apt-get install python-imaging

5. Install Workaholic:
sudo apt-get install workaholic

Read more
0

Powerful and Speedy remote control for your Desktop - GNOME Do


The typical computer user interacts with a number of different resources and programs on her computer, all of which are accessed by disparate means, including menus, location bars, icons, shortcut keys, etc. We plan to consolidate these interfaces by creating an application that indexes items in the user's desktop environment (documents, contacts, bookmarks, applications, multimedia, etc.) and lets the user search through these items and manipulate these items with commonly performed actions (open, run, email, chat, etc.).

GNOME Do allows you to quickly search for many items present in your GNOME desktop environment (applications, Evolution contacts, Firefox bookmarks, files, artists and albums in Rhythmbox, Pidgin buddies, etc.) and perform commonly used actions on those items (Run, Open, Email, Chat, Play, etc.). GNOME Do is inspired by Quicksilver and GNOME Launch Box.

GNOME Do is not a search tool. If you know what you're looking for and what you want to do with it, Do will help you do it quickly.

GNOME Do is not only for GNOME. Although it was created by a GNOME lover, Do runs on KDE and other common environments.


Read more
0

SystemRescueCD

SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your system and recovering your data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It contains a lot of system utilities (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It is very easy to use: just boot the CDROM. The kernel supports most of the important file systems (ext2/ext3, reiserfs, reiser4, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs).

If this is the first time you use SystemRescueCd, please read the Quick start guide (english)
Read more
0

Bluetooth -- Leave it - it's locked, come back - it's back too...


BlueProximity is software helps you add a little more security to your desktop. It does so by detecting one of your bluetooth devices, most likely your mobile phone, and keeping track of its distance. If you move away from your computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks your desktop (or starts any other shell command you want).

Once away your computer awaits its master back - if you are nearer than a given level for a set time your computer unlocks magically without any interaction (or starts any other shell command you want).
Read more
1

A simple KDE network monitor - KNetStats

A simple KDE network monitor - KNetStats
A simple KDE network monitor that show rx/tx LEDs or numeric information about the transfer rate of any network interface in a system tray icon. KNetStats is now part of kde-extragear package so the source code can be found at the KDE subversion repository. Stable releases packages are avaliable to download also at SourceForge download servers. The current version is v1.6.1.

Features:

* See network activity, transfer rate, speed chart, IP address, MAC address, etc of any network interface (including localloopback).
* Support multiple network interfaces.
* See simple statistics (packets and bytes received and transmitted).
* Configurable Update Interval, View mode, Icon themes, etc.
* GPL'ed, you can use and modify for free (Following GPL conditions)
* Carrier on/off detection.


Read more
0

How To Upgrade Your Desktop From Ubuntu 7.10 (Gutsy Gibbon) To 8.04 LTS (Hardy Heron)

This guide shows how you can upgrade your desktop from Ubuntu 7.10 (Gutsy Gibbon) to Ubuntu 8.04 LTS (Hardy Heron).

Want read full content here the link at HowToForge.com


Read more
0

How to run a crontab entry as "nobody"

Here's a quick example of how to run a program on a Linux system through a crontab entry, with the program being executed as the user nobody.

Just put this entry in a crontab file (by issuing the "crontab -e" command, for example), and the program named myProgram.sh will be run at 1:30 a.m. using the Bourne shell, and will be run as the user nobody.

30 1 * * * su -c '/path/to/program/myProgram.sh' -s /bin/sh nobody

Of course testing is always recommended, but this has worked for me.
Read more
0

How to run a Unix/Linux job in the background when you log off (nohup)

So you want to log off and go home for the night, but you need to run a job that's going to take a couple of hours? Fear not, the nohup command will help you out.

As a simple example, assume that you have a command named RunningJob.sh that you want to run, but you know if will take over three hours to run. Just submit the job using the nohup ("no hang up") command as shown below, and you should be good to go:

nohup myLongRunningJob.sh &

Of course make sure you test your program to know that it is really set up properly, otherwise you'll be in for a disappointment in the morning. Other than that, if your command is set up properly, the nohup command should do the trick for you. You can safely log out, and find your results waiting for you in the morning.


Read more
0

Disable Root SSH Login on Linux

One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.

It's much better to have a separate account that you regularly use and simply sudo to root when necessary. Before we begin, you should make sure that you have a regular user account and that you can su or sudo to root from it.

To fix this problem, we'll need to edit the sshd_config file, which is the main configuration file for the sshd service. The location will sometimes be different, but it's usually in /etc/ssh/. Open the file up while logged on as root.

vi /etc/ssh/sshd_config

Find this section in the file, containing the line with "PermitRootLogin" in it.

#LoginGraceTime 2m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6

Make the line look like this to disable logging in through ssh as root.

PermitRootLogin no

Now you'll need to restart the sshd service:

/etc/init.d/sshd restart

Now nobody can brute force your root login, at least.
Read more
0

Brute Force Detection

BFD is a modular shell script for parsing applicable logs and checking for authentication failures. There is not much complexity or detail to BFD yet and likewise it is very straight-forward in its installation, configuration and usage. The reason behind BFD is very simple; the fact there is little to no authentication and brute force auditing programs in the Linux community that work in conjunction with a firewall or real time facility to place bans. To use BFD you must have APF Firewall installed first.

How To:
Download BFD: wget http://www.r-fx.ca/downloads/bfd-current.tar.gz
[Check here if you want to know how to install the software from source]
After the installation is complete you will receive a message saying it has been installed.
Next we will have to configure the firewall: vi /usr/local/bfd/conf.bfd
Find the following lines and replace them with your details:
# Enable/disable user alerts [0 = off; 1 = on]
ALERT_USR="1"
#
# User alert email address
EMAIL_USR="your@mail.com"
#
# User alert email; subject
SUBJ_USR="Brute Force Warning for $HOSTNAME"
#
Now you should put your ip address to allow hosts so you will not accidentally lock yourself out.
vi /usr/local/bfd/ignore.hosts and put your ip address.
Now we are ready to start the BFD system: /usr/local/sbin/bfd –s
For more configuration options you are suggested to read the README.


Read more
0

How to hide PHP version Information

You should hide php banner information from being displayed so the attackers are not aware of what version of PHP version you are running and thus making it more difficult for them to exploit any system holes and thus making vulnerability scanners work harder and in some cases impossible without knowing banner information.

How To:
Modify php.ini
Change the expose_php line to: expose_php=Off
Notice: You may need to restart Apache.
Read more
0

How To hide Apache version Information

You should hide apache banner information from being displayed so the attackers are not aware of what version of Apache version you are running and thus making it more difficult for them to exploit any system holes and thus making vulnerability scanners work harder and in some cases impossible without knowing banner information.

How To:
Modify /etc/httpd/conf/httpd.conf
Change the ServerSignature line to: ServerSignature Off
Change the ServerTokens line to: ServerTokens Prod
Restart Apache: /sbin/service httpd restart
Read more
0

How To do SHA-1 checksum

SHA-1 is the successor of MD5 ( Read about MD5 here ) is a tool to check the integrity of your downloads.
The SHA-1 algorithm is the brainchild of the US-based National Security Agency (NSA)

Basically it works the same as the MD5, a SHA-1 file is available on the download server where you downloaded your ISOs and when opening it you will see a string of numbers that you compare to the output of the command:

CODE: $ sha1sum /home/Nikesh/downloaded.iso

The string you get from this command typically looks like:

QUOTE
f560f26a32820143e8286afb188f7c36d905a735

You compare it to the string you find in the SHA-1 file on the download server. If both of them are identical you can be sure your downloaded ISO is okay and you can burn it to a CD.


Read more
1

How to change the login banner/message

The login banner is essential to legal actions taken against people who misuse and illegally hack into your box. There have been cases where the hackers got off because the server they hacked into actually “Welcomed” them into the system!

To change the login banner/welcome message, simply edit the /etc/issue file and put whatever you want into this file, best option is to keep it empty.

#vi /etc/issue
Read more
0

sync users' Samba passwords with their system passwords

The pam_smbpass PAM module can be used to sync users' Samba passwords with their system passwords when the passwd command is used. If a user invokes the passwd command, the password the uses to log in to the system as well as the password he must provide to connect to a Samba share are changed.

To enable this feature, add the following line to /etc/pam.d/system-auth below the pam_cracklib.so invocation:

password required /lib/security/pam_smbpass.so nullok use_authtok try_first_pass
Read more
0

Transfer Linux user to Samba users

To configure Samba on your Red Hat Linux system to use encrypted passwords, follow these steps:

1. Create a separate password file for Samba. To create one based on your existing /etc/passwd file, at a shell prompt, type the following command:

# cat /etc/passwd | mksmbpasswd.sh > /etc/samba/smbpasswd

If the system uses NIS, type the following command:

# ypcat passwd | mksmbpasswd.sh > /etc/samba/smbpasswd

The mksmbpasswd.sh script is installed in your /usr/bin directory with the samba package.

2. Change the permissions of the Samba password file so that only root has read and write permissions:

# chmod 600 /etc/samba/smbpasswd

3. The script does not copy user passwords to the new file, and a Samba user account is not active until a password is set for it. For higher security, it is recommended that the user's Samba password be different from the user's Red Hat Linux password. To set each Samba user's password, use the following command (replace username with each user's username):

# smbpasswd username

4. Encrypted passwords must be enabled in the Samba configuration file. In the file smb.conf, verify that the following lines are not commented out:

encrypt passwords = yes
smb passwd file = /etc/samba/smbpasswd

5. Make sure the smb service is started by typing the command service smb restart at a shell prompt.
Read more
0

How To add another disk to running Linux system

In this example we will fdisk the disk attached to our 2nd array controller.

1. fdisk the new drive
* fdisk /dev/sda
* Make a new partition using fdisk (/dev/sda1)

2. format the new partition using mkfs
* mkfs -t ext3 /dev/sda1
* Note, if you will be storing lots of small files, you may need to increase the inode count. You do this when you format the drive. The default count of inodes will be good for most people.

3. Make a new directory to mount your new space to
* mkdir /newspace
* Note: If moving a current filesystem over to this new space, you will need to first mount the new space to a temporary mount point, move all the contents to it, then unmount that temporary mount point, and finally add an entry in /etc/fstab so it will mount automatically on bootup.

4. Have the new drive mount automatically
* vi /etc/fstab
* make a copy of an existing line
* change this new line to match your partition number

5. Test that your partition mounts ok according to the changes you made in /etc/fstab
* mount /dev/sda1 /newspace


Read more
0

Underground hacking/cracking Magazine - Phrack


You can read the latest release of the underground magazine Phrack from their website. For those among us who are not very familiar with phrack or underground magazine scene. Phrack has been around since 1985, well over 20 years, and has been the leading underground hacking/cracking ezine out there. Some notable facts about phrack (taken from wikipedia):

The Mentor’s Hacker Manifesto, which has been an inspiration to young hackers since the 1980s, was published in the 7th issue of Phrack.

Aleph One’s Smashing The Stack For Fun And Profit, published in issue 49, is the “classic paper” on stack buffer overflows, partly responsible for popularizing the vulnerability.

* Several regular columns are present in most issues of Phrack, such as:
* Prophile - the presentation of a very influential character from the hacking underground.
* Loopback - answers to the most original (or stupid) emails received by the phrack staff.
* Phrack World News - a compilation of reports on the latest counter-culture events.
* International Scene - a compilation of testimonies from hackers all around the world focusing on national and international activities.

You can read more about phrack history here and here.


Read more
0

Discovering and Hacking Bluetooth

Discovering Bluetooth Devices
BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.

BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.

BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.

Hacking Bluetooth Devices
BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.

CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.

Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.

Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.

Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.

Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.

BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.

BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.


Read more
0

Forward Squid traffic to secure tunnel (SSH)

When Squid is installed and running, it uses port 3128 by default. You should test it manually by setting your HTTP proxy to the server that runs Squid. For instance, in Firefox to go Tools -> Options -> Advanced -> Network -> Settings and enter the IP address or host of the Squid proxy (e.g. 192.168.0.100) and 3128 for the port. Try to load any web page. If you see an access denied error, check out the http_access configuration in the squid configuration file.

Once Squid is all set and ready to go, you need to forward your connection to it over SSH. To set the tunnel up on your Windows laptop, download Plink, a command-line version of Putty SSH client, and run this command:

plink.exe -batch -N -l UserName -pw Password -L 3128:localhost:3128 SSH_Server

On Unix-based systems, simply run this command:

ssh -L 3128:localhost:3128 SSH_Server -f -N

Finally, tell your browser to use the SSH tunnel as a proxy. Basically you need to change the host to localhost and the port number to 3128 (See below).




Read more
0

SQL Injection Tool - sqlninja

Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

Features:
The full documentation can be found in the tarball and also here, but here's a list of what the Ninja does:
*  Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
*  Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental)
*  Privilege escalation to sysadmin group if 'sa' password has been found
*  Creation of a custom xp_cmdshell if the original one has been removed
*  Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)
*  TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
*  Direct and reverse bindshell, both TCP and UDP
*  DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works) 
*  Evasion techniques to confuse a few IDS/IPS/WAF

Prerequisites
In order to use sqlninja, the following Perl modules need to be present:
*  NetPacket
*  Net-Pcap
*  Net-DNS
*  Net-RawIP
*  IO-Socket-SSL

download Sqlninja here


Read more
0

Call For Open Source Awards 2008 Nominations

For the 4th year running, Google and O’Reilly will present a set of Open Source Awards at OSCON 2008. The awards recognize individual contributors who have demonstrated exceptional leadership, creativity, and collaboration in the development of Open Source Software. Past recipients for 2005-2007 include Doc Searls, Jeff Waugh, Gerv Markham, Julian Seward, David Heinemeier Hansson, Karl Fogel, David Recordon, and Paul Vixie.

The nomination process is open to the entire open source community, closing May 15th, 2008. Send your nominations to osawards AT oreilly DOT com. Nominations should include the name of the recipient, any associated project/org, suggested title for the award (”Best Hacker”, “Best Community Builder”, etc.), and a description of why you are nominating the individual. Google and O’Reilly employees cannot be nominated.
Read more
0

Antivirus scanning for Nautilus by using Nautilus-clamscan

Nautilus-clamscan adds the ability to Nautilus to scan files for viruses from a right-click.

The progress and results of the antivirus scan are shown in a progress dialog.

Requirements
This application requires GTK+ version 2.10.x. Other dependencies include:
clamav, python, python-clamav, python-gtk2, python-nautilus


Download Nautilus-clamscan - Here
Read more
0

OpenSuse 11.0 Countdown - Get your counter

You can help spread the word for openSUSE 11.0 before it’s released! The openSUSE project now has countdown banners that display the number of days before the next openSUSE release.



You can display the banner on your site, and the rendering is done via the openSUSE server. You can find the code and the right language for your site on http://en.opensuse.org/Countdown. You can link the banner to http://en.opensuse.org/OpenSUSE_11.0 which has information about the 11.0 release and information on testing prior to the final 11.0 release.
The banners were inspired by a post by Pavol Rusnak, and we received fantastic code and graphics contributions from several members of the openSUSE community, including Pascal Bleser, Jakub ‘jimmac’ Steiner, Pavol Rusnak, Marek Stopka, Kevin Dupuy, and Billy Juliani. Thanks to everyone who contributed!
So, grab a banner and show your openSUSE pride.
Read more
0

Tools for network auditing and penetration testing


dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.

Download dsniff : here
Read more
0

How to prevent too many filesystem checks

If you often switch your Linux computer on and off (for example because it is a laptop), it will check the filesystems at boot more often than necessary. Having to wait at unexpected times is annoying, and when this happens every few days and always just when you needed access to your data quickly, even more so.

Having a fixed time interval between these checks (so you know when they will happen) instead of checks happening when a counter reaches some number is much better. Configuring this is quite easy. First, look in /etc/fstab . In my case, the relevant lines are:

/dev/sda1 /boot ext2 defaults 0 1
/dev/sda3 / ext3 noatime 0 1
/dev/sda4 /home ext3 noatime 0 1

Now we know which device contains which always-mounted filesystem. To set the checks to be monthly, I run these commands:

tune2fs -c 0 -i 1m /dev/sda1
tune2fs -c 0 -i 1m /dev/sda3
tune2fs -c 0 -i 1m /dev/sda4

-c 0 means no mount counter will be used. If you would want a check at every 100th boot, you would use -c 100.

-i 1m means the filesystem will be checked every 1 month. Other examples of what could be used in combination with -i are 2d (2 days) or 3w (3 weeks).
Read more
0

Open Source Census Launches

The Open Source Census, an effort to pin down hard statistics regarding the implementation of open-source software around the world, gets underway on Wednesday.

Companies and individuals can use the tool to scan their computers for open-source software and then anonymously upload the data to the effort's site. The information will be available in two forms. Those who contribute can get reports summarizing their own use, as well as comparative data based on similar companies' results. Aggregated data untraceable to any company will be available publicly on the site.

More Information : Here
Read more
0

Tune SYSLOGD for high Performance

LINUX syslogd uses synchronous writes by default, which is very expensive. For services such as mail it is recommended that you disable synchronous logfile writes by editing /etc/syslog.conf and by prepending a ”-” to the logfile name.

mail.* -/var/log/mail.log

Restart your syslod to make the changes effective

Read more
0

Faster internet access with Firefox


Web designer use Flash animation to attract visitor attention, too much flash animation will make people feel annoying. There is this firefox extension Flashblock which able to block flash animation from loading. I’m using this Flash block to block all flash animation. One hand it help to block all annoying flash animation, at other hand it help to speed up page loading.
Get Flashblock from here

Ever been annoyed by all those ads and banners on the internet that often take longer to download than everything else on the page? Install Adblock Plus now and get rid of them and also help you to access the contents faster.

Get Adblock from here and you also need Adblock Filterset.G Updater, This is a companion extension to Adblock or Adblock Plus and should be used in conjunction with it. This extension automatically downloads the latest version of Filterset.G every 4-7 days. Filterset.G is an excellent set of filters maintained by G for Adblock that blocks most ads on the internet.
Get Adblock Filterset.G Updater from here


Read more
1

Linux related Online Books and Tutorials

Here is a website, Opensourceproject.org.cn, that offers 222 freely available online books and tutorial articles covering open source technologies. Most of these are written in English, some are in Chinese. The numbers below refer to the number of English books. These will help you learn how to program in open source languages and frameworks, such as Eclipse, Perl, Ruby, PHP, and Python. These will also help you gain knowledge and increase your skills with Ubuntu Linux, Red Hat Linux, Fedora, Suse Linux, the Linux Kernel, and Embedded Linux.


Read more
0

Open Source eBooks -- Free

Deprecated
Read more
2

Free LPI Linux Certification Courses

The Linux Professional Institute (LPI) certifies Linux system administrators at two levels: junior level (also called "certification level 1") and intermediate level (also called "certification level 2"). To attain certification level 1, you must pass exams 101 and 102; to attain certification level 2, you must pass exams 201 and 202.

LPI Exam 101:
These 5 LPI 101 tutorials will assist you in getting ready for taking and passing these topics in the LPI exam 101. Students taking Linux exams in online education classes can also benefit from these tutorials. Exam 101 is the first of two junior-level system administrator exams. Both exam 101 and exam 102 are required for LPIC-1 certification, which is the junior level.

LPI exam 101 prep, Topic 101: Hardware and architecture
In this tutorial (the first in a series of five tutorials), Ian Shields introduces you to configuring your system hardware with Linux, and in doing so, begins preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how Linux configures the hardware found on a modern PC and where to look if you have problems.

LPI exam 101 prep, Topic 102: Linux installation and package management
In this tutorial (the second in a series of five tutorials), Ian Shields introduces you to Linux installation and package management, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how Linux uses disk partitions, how Linux boots, and how to install and manage software packages.

LPI exam 101 prep, Topic 103: GNU and UNIX commands
In this tutorial (the third in a series of five tutorials), Ian Shields introduces you to the Linux command line and several GNU and UNIX commands, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. This tutorial helps you learn to use commands on a Linux system.

LPI exam 101 prep, Topic 104: Devices, Linux filesystems, and the Filesystem Hierarchy Standard
In this tutorial (the fourth in a series of five tutorials), Ian Shields introduces you to Linux devices, filesystems, and the Filesystem Hierarchy Standard, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. This tutorial shows you how to create and format partitions with different Linux filesystems and how to manage and maintain those systems.

LPI exam 101 prep, Topic 110: The X Window System
In this tutorial (the last in a series of five tutorials), Ian Shields introduces you to the X Window System on Linux, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how to install and maintain the X Window System. This tutorial covers both major packages for X on Linux: XFree86 and X.Org.


LPI Exam 102:
These 6 LPI 102 tutorials will assist you in in getting ready to pass these topics in the LPI exam 102. Exam 102 is the second of two LPI junior-level system administrator exams. Both exam 101 and exam 102 are required for LPIC-1 certification, which is the junior level. Three missing topics for this exam will be added in the future.

LPI exam 102 prep, Topic 105: Kernel
By the end of this tutorial, you will know how to build, install, and query a Linux kernel and its kernel modules. The tutorial is organized according to the specific objectives of the LPI exam for this topic. If you're studying for certification -- or simply building a solid foundation in Linux systems administration -- you will be ready to proceed to the next tutorial in the exam 102 series.

LPI exam 102 prep, Topic 106: Boot, initialization, shutdown, and runlevels
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this second in a series of nine tutorials, Ian introduces you to startup and shutdown on Linux. By the end of this tutorial, you will know guide a system through booting, set kernel parameters, and shut down or reboot a system.

LPI exam 102 prep, Topic 107: Printing
In this tutorial, the third of a series of nine tutorials on LPI exam 102 topics, Ian Shields introduces you to printing in Linux. By the end of this tutorial, you will know how to manage printers, print queues, and user print jobs on a Linux system.

LPI exam 102 prep, Topic 108: Linux documentation
In this tutorial, the fourth of a series of nine tutorials on LPI exam 102 topics, Ian Shields introduces you to Linux documentation. By the end of this tutorial, you will know how to use and manage local documentation, find documentation on the Internet, and use automated logon messages to notify users of system events.

LPI exam 102 prep, Topic 109: Shells, scripting, programming, and compiling
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this fifth in a series of nine tutorials, Ian introduces you to the Bash shell, and scripts and programming in the Bash shell. By the end of this tutorial, you will know how to customize your shell environment, use shell programming structures to create functions and scripts, set and unset environment variables, and use the various login scripts.

LPI exam 102 prep, Topic 111: Administrative tasks
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this sixth in a series of nine tutorials, Ian introduces you to administrative tasks. By the end of this tutorial, you will know how to manage users and groups, set user profiles and environments, use log files, schedule jobs, back up your data, and maintain the system time.


LPI Exam 201:
These 8 LPI 201 tutorials will assist you in in getting ready to pass the LPI exam 201. Exam 201 is the first of two LPI intermediate-level system administrator exams. Both exam 201 and exam 202 are required for LPIC-2 certification, which is the intermediate level.

LPI exam 201 prep, Topic 201: Linux kernel
In this tutorial, David Mertz begins preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this first of a series of eight tutorials, you will learn to understand, compile, and customize a Linux kernel.

LPI exam 201 prep, Topic 202: System startup
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this second of a series of eight tutorials, you will learn the steps a Linux system goes through during system initialization, and how to modify and customize those behaviors for your specific needs.

LPI exam 201 prep, Topic 203: Filesystem
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this third of eight tutorials, you will learn how to control the mounting and unmounting of filesystems, examine existing filesystems, create filesystems, and perform remedial actions on damaged filesystems.

LPI exam 201 prep, Topic 204: Hardware
In this tutorial, David Mertz and Brad Huntting continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this fourth of eight tutorials, you learn how to add and configure hardware to a Linux system, including RAID arrays, PCMCIA cards, other storage devices, displays, video controllers, and other components.

LPI exam 201 prep, Topic 209: File and service sharing
In this tutorial, Brad Huntting and David Mertz continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this fifth of eight tutorials, you learn how to use a Linux system as a networked file server using any of several protocols supported by Linux.

LPI exam 201 prep, Topic 211: System maintenance
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this sixth of eight tutorials, you learn basic concepts of system logging, software packaging, and backup strategies.

LPI exam 201 prep, Topic 213: System customization and automation
In this tutorial, David Mertz and Brad Huntting continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this seventh of eight tutorials, you learn basic approaches to scripting and automating system events, including report and status generation, clean up, and general maintenance.

LPI exam 201 prep, Topic 214: Troubleshooting
In this tutorial, Brad Huntting and David Mertz continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. The last of eight tutorials, this tutorial focuses on what you can do when things go wrong. It builds on material already covered in more detail in earlier tutorials.


LPI Exam 202:
These 7 LPI 202 tutorials will assist you in in getting ready to pass the LPI exam 202. Exam 202 is the second of two LPI intermediate-level system administrator exams. Both exam 201 and exam 202 are required for intermediate-level certification, or LPIC-2.

LPI exam 202 prep, Topic 205: Networking configuration
In this tutorial, David Mertz begins preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this first of a series of seven tutorials on network administration on Linux, you learn to configure a basic TCP/IP network, from the hardware layer (usually Ethernet, modem, ISDN, or 802.11) through the routing of network addresses.

LPI exam 202 prep, Topic 206: Mail and news
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this second of a series of seven tutorials on network administration on Linux, you learn how to use Linux as a mail server and as a news server. This tutorial covers mail transport, local mail filtering, and mailing list maintenance software. It also briefly discusses server software for the NNTP protocol.

LPI exam 202 prep, Topic 207: Domain Name System (DNS)
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this third of a series of seven tutorials on network administration on Linux, you get an introduction to DNS and learn how to use Linux as a DNS server, chiefly using BIND 9. You learn how to set up and configure the service, how to create forward and reverse lookup zones, and how to ensure that the server is secure from attacks.

LPI exam 202 prep, Topic 208: Web services
In this tutorial, the fourth in a series of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 208. Here, David Mertz discusses how to configure and run the Apache HTTP server and the Squid proxy server.

LPI exam 202 prep, Topic 210: Network client management
In this tutorial, the fifth in a series of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 210. Here, David Mertz examine several protocols' centralized configuration of network settings on clients within a network. This tutorial also discusses PAM, which is a flexible, networked, user authentication system.

LPI exam 202 prep, Topic 212: System security
In this tutorial, the sixth of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. By necessity, this tutorial touches briefly on a wide array of Linux-related topics from a security-conscious network server perspective, including general issues of routing, firewalls, and NAT translation and the relevant tools. It addresses setting security policies for FTP and SSH; reviews general access control with tcpd, hosts.allow, and friends; and presents some basic security monitoring tools and shows where to find security resources.

LPI exam 202 prep, Topic 214: Network troubleshooting
In this tutorial, the last of a series of seven tutorials covering intermediate network administration on Linux, David Mertz finishes preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. This tutorial revisits earlier tutorials in the series, focusing on how to use the basic tools you've already covered to fix networking problems. The tool review is divided into two categories: configuration tools and diagnostic tools.


LPI Exam 301:
LPI exam 301 prep, Topic 302: Installation and development
In this tutorial, Sean Walberg helps you prepare to take the Linux Professional Institute Senior Level Linux Professional (LPIC-3) exam. In this second in a series of six tutorials, Sean walks you through installing and configuring a Lightweight Directory Access Protocol (LDAP) server, and writing some Perl scripts to access the data. By the end of this tutorial, you'll know about LDAP server installation, configuration, and programming.

Read more
Related Posts with Thumbnails