Send securely encrypted emails and files with PGP Desktop

This video shows you how to use PGP Desktop public key encryption technology. This program allows you to send securely encrypted emails and files.

Send securely encrypted emails and files with PGP Desktop Video:

HOWTO Secure Data with PGP

HOWTO Secure Data with PGP

Securing your data with PGP

PGP - Pretty Good Privacy
GPG - GNU Privacy Guard

Common Encryption Methods are WPA WEP SSL, these videos will show you how to secure your data with PGP

Secure Your Data with PGP - Video Part 1

Secure Your Data with PGP - Video Part 2

How to setup CSS server in Ubuntu Linux

This video tutorial will show how to use a bash script to install your own Counter Strike Server in Ubuntu Linux.

Setup CSS server in Ubuntu Linux Video:

How to trace an IP to their starting location

This video will show you How to trace an IP or URL address to their starting location using Windows command functions.

How to trace an IP to their starting location video:

How to make a webserver using XAMPP

How to make a webserver using XAMPP Video
XAMPP is a easy to install program that you can use to turn your computer (running windows) into a web server (apache based). This video also shows to you a step to step installation guide for XAMPP

How to use FunFx Framework

How to use FunFx (Ruby-based testing framework for Flex) video tutorial will show you how to use FunFX, a free, open-source, and Ruby-based automated testing framework for Adobe Flex applications. You can also learn with this video how to drive a Flex application through a web browser (video by

How to fix slow internet Ubuntu 7.1

How to fix slow internet internet connection on Ubuntu 7.1

Open console

Run the next commands:

# sudo gedit /etc/modprobe.d/aliases

Comment the next line:
"alias net-pf-10 ipv6"

Save and exit

Tips - atp-get on debian

This is a small video from "The Screen Savers" showing some tips using atp-get commands on debian.

Linux Tips - Click here for more amazing videos

How to - Run Linux Under Windows

This video will show you how to run an operating system (Linux for example, dos, windows etc.) under Windows. You can of course run Windows Vista under your current system instead of Linux. Virtual system makes it good to test diffirent operating systems safely and easily.

How to - Run Linux Under Windows Video:

Run Linux Under WIndows Tutorial - Watch a funny movie here

How to - Linux Hidden Directories

This videos teachs a simple way to protect important files within their linux server, you can hidden directories.

Linux Hidden Directories Video:

Prevent Hackers Using Linux Hidden Directories - The top video clips of the week are here

How to create new linux partition

How to create new linux partition video

HP-UX installation on Hewlett-Packard zx2000 Intel Itanium

HP-UX installation on Hewlett-Packard zx2000 Intel Itanium video.

How to run android under Windows Mobile (Beta)

How to run Android under windows mobile (Beta).

This video show you how to run android under windows mobile. Please note that this is a beta version so it can crash. This is a initial experimentation :)

Linux Ubuntu Synaptic Videos

Using Ubuntu (Linux) on a MacBook

In this video Cousin Rich runs Ubuntu on his MacBook with 1 gig of RAM.

Fix NFS Performance Problem

Your NFS server is crashing? You have no problems when is reading but it cant write?

NFS was optimized and the only thing was updated Red Hat kernel v5.2 and CentOS 5.2 64 bit edition.

To fix this problem you should updated kernel packages. It will fix various security problems and bugs.

a 50-75% drop in NFS server rewrite performance, compared to Red Hat Enterprise Linux 4.6, has been resolved.
Read more at: Important: kernel security and bug fix update

Dont forget to run the next command:
# yum update

IBM - Build an embedded Linux distro from scratch tutorial

Build an embedded Linux distro from scratch tutorial

In this tutorial, you learn about cross-compiling, the boot loader, file systems, the root file system, disk images, and the boot process, all with respect to the decisions you make as you're building the system and creating the distribution.

Build an embedded Linux distro from scratch tutorial:
- Discussion of cross-compilation issues
- Review of the components of a Linux system and how they are put together
- Detailed steps for building, installing, and configuring the target system

Build an embedded Linux distro from scratch tutorial Objectives:
This tutorial shows you how to install Linux on a target system. Not a prebuilt Linux distribution, but your own, built from scratch. While the details of the procedure necessarily vary from one target to another, the same general principles apply. The result of this tutorial (if you have a suitable target) is a functional Linux system you can get a shell prompt on.

This tutorial assumes that your shell is a Bourne shell derivative; if you use a C shell derivative, the prompt will probably look different, and you will need to use different commands to set environment variables.

->Register now or sign in using your IBM ID and password.


Postfix MTA update - fix security vulnerabilities

Postfix MTA updated to fix security vulnerabilities.

- Incorrectly checks of the ownership of a mailbox is now fixed. It will increase some security. If you run postfix on your server, you should upgrade to these updated packages.

Patch Postfix under Debian / Ubuntu Linux:
1 - Update the internal database:
# apt-get update
2 - Install corrected Postfix package
# apt-get upgrade

Patch Postfix under RHEL / CentOS Linux:
For RHEL and CentOS 5:
# yum update

Under RHL5:
# up2date -u

How to Fix rpmdb: unable to join the environment

This post will probably help you to fix an error occurring when you try to upgrade some package like this:

rpmdb: unable to join the environment

error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages index using db3 - Resource temporarily unavailable (11)
error: cannot open Packages database in /var/lib/rpm
warning: /root/webmin-1.360-1.noarch.rpm: V3 DSA signature: NOKEY, key ID 11f63c51
rpmdb: unable to join the environment
error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages database in /var/lib/rpm
rpmdb: unable to join the environment
error: db4 error(11) from dbenv->open: Resource temporarily unavailable
error: cannot open Packages database in /var/lib/rpm

How To Fix:

Remove Old Lock Files running this command:
# rm -f /var/lib/rpm/__db*

Now you have to rebuild RPM database:
# rpm -vv --rebuilddb

It should be fine now, if you want you can read more information at:

What is Google Android

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. This early look at the Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language.

Android Features:
- Application framework enabling reuse and replacement of components
- Dalvik virtual machine optimized for mobile devices
- Integrated browser based on the open source WebKit engine
- Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional)
- SQLite for structured data storage
- Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
- GSM Telephony (hardware dependent)
- Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
- Camera, GPS, compass, and accelerometer (hardware dependent)
- Rich development environment including a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE


Android Presentation Video #1

Android Presentation Video #2

Google Android Explained

"Google's open platform could benefit the wireless industry, but the 3G issue may slow adoption. Also, while more than 30 industry heavyweights are partnering with Google, Apple will not be participating." ( )

Worms Backdoors Virus Free Removal Tool

Download Free Removal Tool for the next Worms / Backdoors / Virus:
- Free Removal Tool For: Backdoor.Win32.Afcore.l-ad
- Free Removal Tool For:
- Free Removal Tool For: Backdoor.Win32.Allaple.a
- Free Removal Tool For: Backdoor.Win32.Small.d
- Free Removal Tool For: Email-Worm.Win32.Avron.a-e
- Free Removal Tool For: Email-Worm.Win32.Bagle.a-j,n-r,z
- Free Removal Tool For:,au
- Free Removal Tool For:
- Free Removal Tool For: Email-Worm.Win32.Blebla.b
- Free Removal Tool For: Email-Worm.Win32.Bridex.a
- Free Removal Tool For: Email-Worm.Win32.Brontok.n
- Free Removal Tool For: Email-Worm.Win32.Dumaru.a-m
- Free Removal Tool For: Email-Worm.Win32.Fizzer
- Free Removal Tool For: Email-Worm.Win32.Goner
- Free Removal Tool For: Email-Worm.Win32.Klez.a,e,f,g,h
- Free Removal Tool For: Email-Worm.Win32.Lentin.a-p
- Free Removal Tool For: Email-Worm.Win32.LovGate.a-l
- Free Removal Tool For: Email-Worm.Win32.Magold.a-e
- Free Removal Tool For: Email-Worm.Win32.Mydoom.a-b,e
- Free Removal Tool For: Email-Worm.Win32.Navidad.a
- Free Removal Tool For: Email-Worm.Win32.NetSky.b-d
- Free Removal Tool For: Email-Worm.Win32.Nimda.a
- Free Removal Tool For: Email-Worm.Win32.Sircam.a
- Free Removal Tool For: Email-Worm.Win32.Sober.a,c
- Free Removal Tool For: Email-Worm.Win32.Sobig.f
- Free Removal Tool For: Email-Worm.Win32.Swen
- Free Removal Tool For: Email-Worm.Win32.Tanatos.a,b
- Free Removal Tool For: Email-Worm.Win32.Torvil.d
- Free Removal Tool For: Email-Worm.Win32.Winevar
- Free Removal Tool For: Email-Worm.Win32.Zafi.b
- Free Removal Tool For:
- Free Removal Tool For: Net-Worm.Win32.Lovesan
- Free Removal Tool For: Net-Worm.Win32.Opasoft.a-h
- Free Removal Tool For: Net-Worm.Win32.Opasoft.a-p
- Free Removal Tool For: Net-Worm.Win32.Rovud.a-c
- Free Removal Tool For: Net-Worm.Win32.Sasser.a-d,f
- Free Removal Tool For: Net-Worm.Win32.Welchia
- Free Removal Tool For: P2P-Worm.Win32.Malas.b
- Free Removal Tool For: Trojan-Downloader.Win32.Agent.a-j
- Free Removal Tool For: Trojan-Downloader.Win32.Losabel.ap
- Free Removal Tool For:
- Free Removal Tool For: Trojan.Win32.Agent.aec
- Free Removal Tool For: Trojan.Win32.KillAV.nj
- Free Removal Tool For: Trojan.Win32.Krotten
- Free Removal Tool For: Trojan.Win32.SilentLog.a-b
- Free Removal Tool For: Trojan.Win32.StartPage.fw
- Free Removal Tool For: Virus.Win32.AutoRun.acw
- Free Removal Tool For: Virus.Win32.FunLove
- Free Removal Tool For: Virus.Win32.Implinker.a
- Free Removal Tool For: Virus.Win32.VB.he
- Free Removal Tool For: Virus.Win32.Win32.Elkern.c
- Free Removal Tool For: Worm.Win32.AutoRun.cby
- Free Removal Tool For: Worm.Win32.AutoRun.czz
- Free Removal Tool For: Worm.Win32.AutoRun.daa
- Free Removal Tool For: Worm.Win32.AutoRun.dfx
- Free Removal Tool For: Worm.Win32.AutoRun.dhq
- Free Removal Tool For:
- Free Removal Tool For: Worm.Win32.VB.jn
- Free Removal Tool For: not-a-virus:AdWare.Win32.Visiter
- Free Removal Tool For: not-a-virus:RiskTool.Win32.XCP.a-b

Win32/Zafi.B / W32.Erkez.B virus information and removal tool

Download Win32/Zafi.B / W32.Erkez.B Removal Tool

Win32/Zafi.B / W32.Erkez.B Critical Worm Information

Win32/Zafi.B is a worm spreading via e-mail and P2P networks. The worm is attached in the attachment of the e-mail message. Upon activation Win32/Zafi.B copies itself into the %system% directory with a random name and the extension .exe. In the same directory it creates the new file with a random name and extension .dll. The worm uses this file as a store for collected e-mail addresses used for further spreading.

The worm changes the following system Registries to ensure starting on the following system start up:

It creates a new key named _Hazafibb.

The worm also creates the following registry key:

Win32/Zafi.B / W32.Erkez.B searches the hard disk for folders named "share" and "upload" and copies itself into them using one of the following names:
Total Commander 7.0 full_install.exe
winamp 7.0 full_install.exe

It also terminates all the process that containing "firewall" and "virus" in the name and blocks starting of the following utilities: Regedit, Msconfig and Task

How to configure a Transparent Proxy using Squid and ebtables

Related to the post "Download ebtalbes filtering tool" you can also read this excellent tutorial "Configuring a Transparent Proxy/Webcache in a Bridge using Squid and ebtables".

Read the full article

Download ebtalbes filtering tool

Download ebtables

From ebtalbes, website:

The ebtables program is a filtering tool for a bridging firewall. The filtering is focussed on the Link Layer Ethernet frame fields. Apart from filtering, it also gives the ability to alter the Ethernet MAC addresses and implement a brouter.
This website is also a reference for the Linux bridge-nf code, which gives Linux the functionality of a bridging IP/IPv6/ARP firewall, by letting iptables/ip6tables/arptables 'see' the bridged IPv4/IPv6/ARP packets. Both ebtables and bridge-nf are a part of the standard 2.6 kernel. A patch for the 2.4 stable kernel is maintained here, because enough people keep bugging me when Marcelo releases yet another 2.4 kernel.

What is ebtables
The ebtables utility enables basic Ethernet frame filtering on a Linux bridge, logging, MAC NAT and brouting. It only provides basic IP filtering, the full-fledged IP filtering on a Linux bridge is done with iptables. The so-called bridge-nf code makes iptables see the bridged IP packets and enables transparent IP NAT. The firewalling tools iptables and ebtables can be used together and are complementary. ebtables tries to provide the bridge firewalling that iptables cannot provide, namely the filtering of non-IP traffic.

Ebtables features:

Usage analogous to iptables.
Ethernet filtering.
MAC NAT: ability to alter the MAC Ethernet source and destination address. This can be useful in some very strange setups (a real-life example is available).
Brouting: decide which traffic to bridge between two interfaces and which traffic to route between the same two interfaces. The two interfaces belong to a logical bridge device but have their own IP address and can belong to a different subnet.
Pass packets to userspace programs, using netlink sockets (the ulog watcher).

What ebtables do?
- Ethernet protocol filtering.
- MAC address filtering.
- Simple IP header filtering.
- ARP header filtering.
- 802.1Q VLAN filtering.
- In/Out interface filtering (logical and physical device).
- MAC address nat.
- Logging.
- Frame counters.
- Ability to add, delete and insert rules; flush chains; zero counters.
- Brouter facility.
- Ability to atomically load a complete table, containing the rules you made, into the kernel. See the man page and the examples section.
- Support for user defined chains.
- Support for marking frames and matching marked frames.
- {Ip,Ip6,Arp}tables can filter bridged IPv4/IPv6/ARP packets, even when encapsulated in an 802.1Q VLAN header.
- All filtering, logging and NAT features of the 3 tools can therefore be used on bridged frames.
- Combined with ebtables, the bridge-nf code therefore makes Linux a very powerful transparent firewall.
- This enables, f.e., the creation of a transparent masquerading machine (i.e. all local hosts think they are directly connected to the Internet).
- Letting {ip,ip6,arp}tables see bridged traffic can be disabled using the appropriate proc entries, located in /proc/sys/net/bridge/. Also, letting the aforementioned firewall tools see 802.1Q VLAN encapsulated packets can be disabled with such a proc entry.

Basic ebtables filtering configuration

Break the GRUB start-up password

First, boot the system with the first Linux CD, when you see boot prompt, type linux rescue to switch to rescue mode. Here, you will be asked if similar steps should be followed, which need to be followed in the installation.

At the prompt, type the next command:
# chmod /mnt/sysImage
# locate grub.conf
# nano /path/to/grub.conf (Edit the grub.conf file and remove the passwd line from the file)

Recovering the root password from the boot loader (GRUB)

When GRUB loads up, select the Red Hat Linux entry on the GRUB menu and then press "e" to edit the boot configuration.

Locate a line like this:

kernel /boot/ root=LABEL=/hdc

- type the number '1' at the end.

Doing so boots the computer into run level 1- single user mode you will automatically be logged in as root.

Type 'passwd' at the prompt, now you can enter a new password here.

How to reset grub root password on redhat


- While Booting (on Redhat ) press "e" in GRUB and you will find 3 lines of code.
- On 2nd line press "e"again and type "1" in the end (then "ENTER")
- Then press "b" and it will boot you into shell.
- Type "passwd" and change your root password.

Single cPanel Account Backup Restore using SSH

You can backup a single cPanel account trough ssh using pkgacct cPanel script located at /scripts folder on your server. This tip is helpful for WebHosting companies that uses cPanel as Hosting control Panel

- Login to your cPanel server as root.

To backup a sigle account use the next commands:
# cd /scripts
# ./pkgacct username
These commands will crate a file named "cpmove-username.tar.gz" on /home directory. And this is the file you need to restore on this server latter or on other server.

How to restore cPanel sigle account on other server

You just need to upload "cpmove-username.tar.gz" to the server you want to restore it or you can do it in the first server if you want. To upload you can use ftp, rsync or scp.

Restoring cpmove-username.tar.gz:

- "cpmove-username.tar.gz" should be on /home directory

Run the next command:
# /scripts/restorepkg username

It will restore homedir, dbs, mail, all the old cPanel account.

How to assign an IP address to a site in Plesk

Assigning an ip address to a site in Plesk is simple and easy

Log in to your server as root (http://IP:8443), then follow the next steps:

- First you should assign the ip address to a client account.
"Server" -> "Ip Addresses"

- Then you need to assign the ip address to a site.
- "Hosting" -> "Setup"

-Finaly and only if you want it you can make the site default domain for the ip.
"Sever" -> "IP Addresses"

Strange pop ups in my website

You see popups in your website and don't know how they start to appear. If you have a hosting account you should investigate your code and .htaccess file. Some type of black hackers own hosting accounts and put code on .htaccess file to get money from the traffic.

If you have a code on .htaccess file like this:

RewriteEngine On
RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*aol.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*msn.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*altavista.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*ask.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*yahoo.*$ [NC]
RewriteRule .* [R,L]
Errordocument 404

Your account should be hacked and you need to change access password, scan the computers where do you access from and contact yous hosting provider sysadmin.

Hope this post help you if you get in trouble.

cPanel - Reseller Center Security Tip

As you know, if you manage a dedicated server you only should provide ssh access to people you trust, so is recomended to disable shell access on all cPanel accounts. The problem is that when you create a resseller acount the owner of this account can give shell access. How to stop it?

Go to Feature Limits for resellers in Resellers
=> Reseller Center,
=> Under "Privileges" always disable "Allow Creation of Packages with Shell Access"
=> Enable "Never allow creation of accounts with shell access"
=> Under Root Access disable "All Features".

It will increase your server security level.

After it, goto "Account Functions" => "Manage Shell Access"
=> "Disable Shell Access for all users" (except you login)

What is SysVinit?

SysVinit is a package that contains a group of processes that control the very basic functions of your system. It includes the init program, the first program started by the Linux kernel when the system boots. Init then controls the startup, running and shutdown of all other programs.