Send securely encrypted emails and files with PGP Desktop
This video shows you how to use PGP Desktop public key encryption technology. This program allows you to send securely encrypted emails and files.
Send securely encrypted emails and files with PGP Desktop Video:
8:39 AM | Tags: email, Encryption, security, windows | 0 Comments
HOWTO Secure Data with PGP
HOWTO Secure Data with PGP
Securing your data with PGP
PGP - Pretty Good Privacy
GPG - GNU Privacy Guard
Common Encryption Methods are WPA WEP SSL, these videos will show you how to secure your data with PGP
Secure Your Data with PGP - Video Part 1
Secure Your Data with PGP - Video Part 2
8:36 AM | Tags: Encryption, linux, security | 0 Comments
How to setup CSS server in Ubuntu Linux
This video tutorial will show how to use a bash script to install your own Counter Strike Server in Ubuntu Linux.
Setup CSS server in Ubuntu Linux Video:
7:53 PM | Tags: howtos, ubuntu, videos | 0 Comments
How to trace an IP to their starting location
This video will show you How to trace an IP or URL address to their starting location using Windows command functions.
How to trace an IP to their starting location video:
7:48 PM | Tags: howtos, security, videos | 0 Comments
How to make a webserver using XAMPP
How to make a webserver using XAMPP Video
XAMPP is a easy to install program that you can use to turn your computer (running windows) into a web server (apache based). This video also shows to you a step to step installation guide for XAMPP
7:43 PM | Tags: howtos, videos, windows | 0 Comments
How to use FunFx Framework
How to use FunFx (Ruby-based testing framework for Flex) video tutorial will show you how to use FunFX, a free, open-source, and Ruby-based automated testing framework for Adobe Flex applications. You can also learn with this video how to drive a Flex application through a web browser (video by rubyforge.org)
7:34 PM | Tags: howtos, videos | 0 Comments
How to fix slow internet Ubuntu 7.1
How to fix slow internet internet connection on Ubuntu 7.1
Open console
Run the next commands:
# sudo gedit /etc/modprobe.d/aliases
Comment the next line:
"alias net-pf-10 ipv6"
Save and exit
7:29 PM | Tags: howtos, ubuntu | 0 Comments
Tips - atp-get on debian
This is a small video from "The Screen Savers" showing some tips using atp-get commands on debian.
Linux Tips - Click here for more amazing videos
7:12 PM | Tags: debian, howtos, tips, videos | 0 Comments
How to - Run Linux Under Windows
This video will show you how to run an operating system (Linux for example, dos, windows etc.) under Windows. You can of course run Windows Vista under your current system instead of Linux. Virtual system makes it good to test diffirent operating systems safely and easily.
How to - Run Linux Under Windows Video:
Run Linux Under WIndows Tutorial - Watch a funny movie here
6:59 PM | Tags: howtos, linux, videos, windows | 0 Comments
How to - Linux Hidden Directories
This videos teachs a simple way to protect important files within their linux server, you can hidden directories.
Linux Hidden Directories Video:
Prevent Hackers Using Linux Hidden Directories - The top video clips of the week are here
6:52 PM | Tags: howtos, linux, security, videos | 0 Comments
How to create new linux partition
How to create new linux partition video
12:14 PM | Tags: linux | 0 Comments
HP-UX installation on Hewlett-Packard zx2000 Intel Itanium
HP-UX installation on Hewlett-Packard zx2000 Intel Itanium video.
12:07 PM | Tags: HP-UX, videos | 0 Comments
How to run android under Windows Mobile (Beta)
How to run Android under windows mobile (Beta).
This video show you how to run android under windows mobile. Please note that this is a beta version so it can crash. This is a initial experimentation :)
12:02 PM | Tags: android, howtos, windows mobile | 0 Comments
Using Ubuntu (Linux) on a MacBook
In this video Cousin Rich runs Ubuntu on his MacBook with 1 gig of RAM.
11:55 AM | Tags: ubuntu, videos | 0 Comments
Fix NFS Performance Problem
Your NFS server is crashing? You have no problems when is reading but it cant write?
NFS was optimized and the only thing was updated Red Hat kernel v5.2 and CentOS 5.2 64 bit edition.
To fix this problem you should updated kernel packages. It will fix various security problems and bugs.
a 50-75% drop in NFS server rewrite performance, compared to Red Hat Enterprise Linux 4.6, has been resolved.Read more at: Important: kernel security and bug fix update
Dont forget to run the next command:
# yum update
11:29 AM | Tags: centos, linux, nfs | 0 Comments
IBM - Build an embedded Linux distro from scratch tutorial
Build an embedded Linux distro from scratch tutorial
In this tutorial, you learn about cross-compiling, the boot loader, file systems, the root file system, disk images, and the boot process, all with respect to the decisions you make as you're building the system and creating the distribution.
Build an embedded Linux distro from scratch tutorial:
- Discussion of cross-compilation issues
- Review of the components of a Linux system and how they are put together
- Detailed steps for building, installing, and configuring the target system
Build an embedded Linux distro from scratch tutorial Objectives:
This tutorial shows you how to install Linux on a target system. Not a prebuilt Linux distribution, but your own, built from scratch. While the details of the procedure necessarily vary from one target to another, the same general principles apply. The result of this tutorial (if you have a suitable target) is a functional Linux system you can get a shell prompt on.
This tutorial assumes that your shell is a Bourne shell derivative; if you use a C shell derivative, the prompt will probably look different, and you will need to use different commands to set environment variables.
->Register now or sign in using your IBM ID and password.
(source: http://www.ibm.com/developerworks/linux/edu/l-dw-linux-embedded-distro-i.html)
11:44 AM | Tags: howtos, linux, news | 0 Comments
Postfix MTA update - fix security vulnerabilities
Postfix MTA updated to fix security vulnerabilities.
- Incorrectly checks of the ownership of a mailbox is now fixed. It will increase some security. If you run postfix on your server, you should upgrade to these updated packages.
Patch Postfix under Debian / Ubuntu Linux:
1 - Update the internal database:
# apt-get update
2 - Install corrected Postfix package
# apt-get upgrade
Patch Postfix under RHEL / CentOS Linux:
For RHEL and CentOS 5:
# yum update
Under RHL5:
# up2date -u
11:34 AM | Tags: mail, postfix, security | 0 Comments
How to Fix rpmdb: unable to join the environment
This post will probably help you to fix an error occurring when you try to upgrade some package like this:
rpmdb: unable to join the environment
error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages index using db3 - Resource temporarily unavailable (11)
error: cannot open Packages database in /var/lib/rpm
warning: /root/webmin-1.360-1.noarch.rpm: V3 DSA signature: NOKEY, key ID 11f63c51
rpmdb: unable to join the environment
error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages database in /var/lib/rpm
rpmdb: unable to join the environment
error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages database in /var/lib/rpm
How To Fix:
Remove Old Lock Files running this command:
# rm -f /var/lib/rpm/__db*
Now you have to rebuild RPM database:
# rpm -vv --rebuilddb
It should be fine now, if you want you can read more information at: http://www.rpm.org/hintskinks/repairdb/
6:36 AM | Tags: howtos, linux, rpm | 0 Comments
What is Google Android
Android is a software stack for mobile devices that includes an operating system, middleware and key applications. This early look at the Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language.
Android Features:
- Application framework enabling reuse and replacement of components
- Dalvik virtual machine optimized for mobile devices
- Integrated browser based on the open source WebKit engine
- Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional)
- SQLite for structured data storage
- Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
- GSM Telephony (hardware dependent)
- Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
- Camera, GPS, compass, and accelerometer (hardware dependent)
- Rich development environment including a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE
Source: http://code.google.com/android/what-is-android.html
Android Presentation Video #1
Android Presentation Video #2
Google Android Explained
"Google's open platform could benefit the wireless industry, but the 3G issue may slow adoption. Also, while more than 30 industry heavyweights are partnering with Google, Apple will not be participating." ( http://www.youtube.com/watch?v=lWJ9xW4Wm-k )
6:19 AM | Tags: google, news | 0 Comments
Worms Backdoors Virus Free Removal Tool
Download Free Removal Tool for the next Worms / Backdoors / Virus:
- Free Removal Tool For: Backdoor.Win32.Afcore.l-ad
- Free Removal Tool For: Backdoor.Win32.Agent.ac
- Free Removal Tool For: Backdoor.Win32.Allaple.a
- Free Removal Tool For: Backdoor.Win32.Small.d
- Free Removal Tool For: Email-Worm.Win32.Avron.a-e
- Free Removal Tool For: Email-Worm.Win32.Bagle.a-j,n-r,z
- Free Removal Tool For: Email-Worm.Win32.Bagle.at,au
- Free Removal Tool For: Email-Worm.Win32.Bagle.cx-dw
- Free Removal Tool For: Email-Worm.Win32.Blebla.b
- Free Removal Tool For: Email-Worm.Win32.Bridex.a
- Free Removal Tool For: Email-Worm.Win32.Brontok.n
- Free Removal Tool For: Email-Worm.Win32.Dumaru.a-m
- Free Removal Tool For: Email-Worm.Win32.Fizzer
- Free Removal Tool For: Email-Worm.Win32.Goner
- Free Removal Tool For: Email-Worm.Win32.Klez.a,e,f,g,h
- Free Removal Tool For: Email-Worm.Win32.Lentin.a-p
- Free Removal Tool For: Email-Worm.Win32.LovGate.a-l
- Free Removal Tool For: Email-Worm.Win32.Magold.a-e
- Free Removal Tool For: Email-Worm.Win32.Mydoom.a-b,e
- Free Removal Tool For: Email-Worm.Win32.Navidad.a
- Free Removal Tool For: Email-Worm.Win32.NetSky.b-d
- Free Removal Tool For: Email-Worm.Win32.Nimda.a
- Free Removal Tool For: Email-Worm.Win32.Sircam.a
- Free Removal Tool For: Email-Worm.Win32.Sober.a,c
- Free Removal Tool For: Email-Worm.Win32.Sobig.f
- Free Removal Tool For: Email-Worm.Win32.Swen
- Free Removal Tool For: Email-Worm.Win32.Tanatos.a,b
- Free Removal Tool For: Email-Worm.Win32.Torvil.d
- Free Removal Tool For: Email-Worm.Win32.Winevar
- Free Removal Tool For: Email-Worm.Win32.Zafi.b
- Free Removal Tool For: IM-Worm.Win32.Sohanad.as
- Free Removal Tool For: Net-Worm.Win32.Lovesan
- Free Removal Tool For: Net-Worm.Win32.Opasoft.a-h
- Free Removal Tool For: Net-Worm.Win32.Opasoft.a-p
- Free Removal Tool For: Net-Worm.Win32.Rovud.a-c
- Free Removal Tool For: Net-Worm.Win32.Sasser.a-d,f
- Free Removal Tool For: Net-Worm.Win32.Welchia
- Free Removal Tool For: P2P-Worm.Win32.Malas.b
- Free Removal Tool For: Trojan-Downloader.Win32.Agent.a-j
- Free Removal Tool For: Trojan-Downloader.Win32.Losabel.ap
- Free Removal Tool For: Trojan-Downloader.Win32.Todon.an
- Free Removal Tool For: Trojan.Win32.Agent.aec
- Free Removal Tool For: Trojan.Win32.KillAV.nj
- Free Removal Tool For: Trojan.Win32.Krotten
- Free Removal Tool For: Trojan.Win32.SilentLog.a-b
- Free Removal Tool For: Trojan.Win32.StartPage.fw
- Free Removal Tool For: Virus.Win32.AutoRun.acw
- Free Removal Tool For: Virus.Win32.FunLove
- Free Removal Tool For: Virus.Win32.Implinker.a
- Free Removal Tool For: Virus.Win32.VB.he
- Free Removal Tool For: Virus.Win32.Win32.Elkern.c
- Free Removal Tool For: Worm.Win32.AutoRun.cby
- Free Removal Tool For: Worm.Win32.AutoRun.czz
- Free Removal Tool For: Worm.Win32.AutoRun.daa
- Free Removal Tool For: Worm.Win32.AutoRun.dfx
- Free Removal Tool For: Worm.Win32.AutoRun.dhq
- Free Removal Tool For: Worm.Win32.AutoRun.hr
- Free Removal Tool For: Worm.Win32.VB.jn
- Free Removal Tool For: not-a-virus:AdWare.Win32.Visiter
- Free Removal Tool For: not-a-virus:RiskTool.Win32.XCP.a-b
5:58 AM | Tags: antivirus, security | 0 Comments
Win32/Zafi.B / W32.Erkez.B virus information and removal tool
Download Win32/Zafi.B / W32.Erkez.B Removal Tool
Win32/Zafi.B / W32.Erkez.B Critical Worm Information
Win32/Zafi.B is a worm spreading via e-mail and P2P networks. The worm is attached in the attachment of the e-mail message. Upon activation Win32/Zafi.B copies itself into the %system% directory with a random name and the extension .exe. In the same directory it creates the new file with a random name and extension .dll. The worm uses this file as a store for collected e-mail addresses used for further spreading.
The worm changes the following system Registries to ensure starting on the following system start up:
HKEY_LOCAL_MACHINE\SOFTWARE\MicrosoftWindows\CurrentVersion\Run
It creates a new key named _Hazafibb.
The worm also creates the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\_Hazafibb
Win32/Zafi.B / W32.Erkez.B searches the hard disk for folders named "share" and "upload" and copies itself into them using one of the following names:
Total Commander 7.0 full_install.exe
winamp 7.0 full_install.exe
It also terminates all the process that containing "firewall" and "virus" in the name and blocks starting of the following utilities: Regedit, Msconfig and Task
5:46 AM | Tags: antivirus, security | 0 Comments
How to configure a Transparent Proxy using Squid and ebtables
Related to the post "Download ebtalbes filtering tool" you can also read this excellent tutorial "Configuring a Transparent Proxy/Webcache in a Bridge using Squid and ebtables".
Read the full article
5:16 AM | Tags: firewall, linux, security | 0 Comments
Download ebtalbes filtering tool
Download ebtables
From ebtalbes, website:
The ebtables program is a filtering tool for a bridging firewall. The filtering is focussed on the Link Layer Ethernet frame fields. Apart from filtering, it also gives the ability to alter the Ethernet MAC addresses and implement a brouter.
This website is also a reference for the Linux bridge-nf code, which gives Linux the functionality of a bridging IP/IPv6/ARP firewall, by letting iptables/ip6tables/arptables 'see' the bridged IPv4/IPv6/ARP packets. Both ebtables and bridge-nf are a part of the standard 2.6 kernel. A patch for the 2.4 stable kernel is maintained here, because enough people keep bugging me when Marcelo releases yet another 2.4 kernel.
What is ebtables
The ebtables utility enables basic Ethernet frame filtering on a Linux bridge, logging, MAC NAT and brouting. It only provides basic IP filtering, the full-fledged IP filtering on a Linux bridge is done with iptables. The so-called bridge-nf code makes iptables see the bridged IP packets and enables transparent IP NAT. The firewalling tools iptables and ebtables can be used together and are complementary. ebtables tries to provide the bridge firewalling that iptables cannot provide, namely the filtering of non-IP traffic.
Ebtables features:
Usage analogous to iptables.
Ethernet filtering.
MAC NAT: ability to alter the MAC Ethernet source and destination address. This can be useful in some very strange setups (a real-life example is available).
Brouting: decide which traffic to bridge between two interfaces and which traffic to route between the same two interfaces. The two interfaces belong to a logical bridge device but have their own IP address and can belong to a different subnet.
Pass packets to userspace programs, using netlink sockets (the ulog watcher).
What ebtables do?
- Ethernet protocol filtering.
- MAC address filtering.
- Simple IP header filtering.
- ARP header filtering.
- 802.1Q VLAN filtering.
- In/Out interface filtering (logical and physical device).
- MAC address nat.
- Logging.
- Frame counters.
- Ability to add, delete and insert rules; flush chains; zero counters.
- Brouter facility.
- Ability to atomically load a complete table, containing the rules you made, into the kernel. See the man page and the examples section.
- Support for user defined chains.
- Support for marking frames and matching marked frames.
- {Ip,Ip6,Arp}tables can filter bridged IPv4/IPv6/ARP packets, even when encapsulated in an 802.1Q VLAN header.
- All filtering, logging and NAT features of the 3 tools can therefore be used on bridged frames.
- Combined with ebtables, the bridge-nf code therefore makes Linux a very powerful transparent firewall.
- This enables, f.e., the creation of a transparent masquerading machine (i.e. all local hosts think they are directly connected to the Internet).
- Letting {ip,ip6,arp}tables see bridged traffic can be disabled using the appropriate proc entries, located in /proc/sys/net/bridge/. Also, letting the aforementioned firewall tools see 802.1Q VLAN encapsulated packets can be disabled with such a proc entry.
Basic ebtables filtering configuration
4:55 AM | Tags: firewall, security | 0 Comments
Break the GRUB start-up password
First, boot the system with the first Linux CD, when you see boot prompt, type linux rescue to switch to rescue mode. Here, you will be asked if similar steps should be followed, which need to be followed in the installation.
At the prompt, type the next command:
# chmod /mnt/sysImage
# locate grub.conf
# nano /path/to/grub.conf (Edit the grub.conf file and remove the passwd line from the file)
5:00 AM | Tags: GRUB, linux, security | 0 Comments
Recovering the root password from the boot loader (GRUB)
When GRUB loads up, select the Red Hat Linux entry on the GRUB menu and then press "e" to edit the boot configuration.
Locate a line like this:
kernel /boot/vmlinuz-x.x.xx-x.xxx root=LABEL=/hdc
- type the number '1' at the end.
Doing so boots the computer into run level 1- single user mode you will automatically be logged in as root.
Type 'passwd' at the prompt, now you can enter a new password here.
4:55 AM | Tags: GRUB, kernel, linux, security | 0 Comments
How to reset grub root password on redhat
HOW TO RESET ROOT PASSWORD
- While Booting (on Redhat ) press "e" in GRUB and you will find 3 lines of code.
- On 2nd line press "e"again and type "1" in the end (then "ENTER")
- Then press "b" and it will boot you into shell.
- Type "passwd" and change your root password.
4:50 AM | Tags: GRUB, linux, security | 0 Comments
Single cPanel Account Backup Restore using SSH
You can backup a single cPanel account trough ssh using pkgacct cPanel script located at /scripts folder on your server. This tip is helpful for WebHosting companies that uses cPanel as Hosting control Panel
- Login to your cPanel server as root.
To backup a sigle account use the next commands:
# cd /scripts
# ./pkgacct username
These commands will crate a file named "cpmove-username.tar.gz" on /home directory. And this is the file you need to restore on this server latter or on other server.
How to restore cPanel sigle account on other server
You just need to upload "cpmove-username.tar.gz" to the server you want to restore it or you can do it in the first server if you want. To upload you can use ftp, rsync or scp.
Restoring cpmove-username.tar.gz:
- "cpmove-username.tar.gz" should be on /home directory
Run the next command:
# /scripts/restorepkg username
It will restore homedir, dbs, mail, all the old cPanel account.
3:55 PM | Tags: backup, cpanel | 0 Comments
How to assign an IP address to a site in Plesk
Assigning an ip address to a site in Plesk is simple and easy
Log in to your server as root (http://IP:8443), then follow the next steps:
- First you should assign the ip address to a client account.
"Server" -> "Ip Addresses"
- Then you need to assign the ip address to a site.
- "Hosting" -> "Setup"
-Finaly and only if you want it you can make the site default domain for the ip.
"Sever" -> "IP Addresses"
9:20 AM | Tags: howtos, plesk | 0 Comments
Strange pop ups in my website
You see popups in your website and don't know how they start to appear. If you have a hosting account you should investigate your code and .htaccess file. Some type of black hackers own hosting accounts and put code on .htaccess file to get money from the traffic.
If you have a code on .htaccess file like this:
RewriteEngine On
RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*aol.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*msn.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*altavista.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*ask.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*yahoo.*$ [NC]
RewriteRule .* http://xxx.xxx.xxx.xx/in.html?s=hg [R,L]
Errordocument 404 http://xx.xxx.xxx.xx/in.html?s=hg_err
Your account should be hacked and you need to change access password, scan the computers where do you access from and contact yous hosting provider sysadmin.
Hope this post help you if you get in trouble.
9:10 AM | Tags: security | 0 Comments
cPanel - Reseller Center Security Tip
As you know, if you manage a dedicated server you only should provide ssh access to people you trust, so is recomended to disable shell access on all cPanel accounts. The problem is that when you create a resseller acount the owner of this account can give shell access. How to stop it?
Go to Feature Limits for resellers in Resellers
=> Reseller Center,
=> Under "Privileges" always disable "Allow Creation of Packages with Shell Access"
=> Enable "Never allow creation of accounts with shell access"
=> Under Root Access disable "All Features".
It will increase your server security level.
After it, goto "Account Functions" => "Manage Shell Access"
=> "Disable Shell Access for all users" (except you login)
9:00 AM | Tags: cpanel, security | 0 Comments
What is SysVinit?
SysVinit is a package that contains a group of processes that control the very basic functions of your system. It includes the init program, the first program started by the Linux kernel when the system boots. Init then controls the startup, running and shutdown of all other programs.
5:46 PM | Tags: linux | 0 Comments