SOURCE:
http://forums.remote-exploit.org/showthread.php?t=14486
------------------------------------------------------------
Before I start, I would like to thank Pureh@te for his video tutorial that covers this. GREAT JOB
When I could not find a written Tutorial that included the persistent changes, and was done from start to finish on a Linux box, I decided to write my own so here it is.
On a side note, this is the first Tutorial I have ever written, so any feedback would be appreciated
For this Tutorial I will be installing BT3 on a 2 GB Flash Drive. Feel free to use a drive with more capacity, I recommend that you have at least 2 GB's.
Now lets get started.
Download the BT3B USB version.
Open a terminal and wget it.
Code:
wget http://www.remote-exploit.org/cgi-bin/fileget?version=bt3b-usb
I can't post links so you'll have to correct it
Once you have downloaded the file. place it in a directory of your likings and forget about it for the time being.
We will need to split our 2GB drive into 2 separate partitions. One partition will be 1.10 GB's on a FAT32 file system, and the second will be the remainder of the free space as an Ext 3 filesystem.
I will be using "fdisk, mkfs, & fsck" to setup the partitions.
Insert your drive into the nearest USB port and lets-
Create the Partitions
Open a terminal and type the following command:
Code:
fdisk /dev/sdb
You will need ROOT Privs. for most of the commands I use
This is the fdisk prompt:
Code:
Command (m for help):
To list the existing partitions type "p" and enter
Code:
Command (m for help): p
Disk /dev/sdb: 1998 MB, 1998585344 bytes
255 heads, 63 sectors/track, 242 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xa62da6ab
Device Boot Start End Blocks Id System
/dev/sdb1 * 1 132 1060258+ b W95 FAT32
/dev/sdb2 133 242 883575 83 Linux
We need to delete these partitions so type "d" and enter
You will then be asked for the partition number that you want to delete.
Code:
Command (m for help): d
Partition number (1-4):
Type the number "1" and hit enter, now repeat the process for the remaining partitions.
Once there are no partitions, the output of "p" will be:
Code:
Command (m for help): p
Disk /dev/sdb: 1998 MB, 1998585344 bytes
255 heads, 63 sectors/track, 242 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xa62da6ab
Device Boot Start End Blocks Id System
To create a new partition type "n" and enter. This will prompt us for some details:
Code:
Command (m for help): n
Command action
e extended
p primary partition (1-4)
p
Partition number (1-4): 1
First cylinder (1-242, default 1):
Using default value 1
Last cylinder or +size or +sizeM or +sizeK (1-242, default 242): +1080M
Lets create the second partition
I know the first partition should be FAT32 and is clearly Linux, don't worry we are getting to that
Again type "n" and answer the questions.
Code:
Command (m for help): n
Command action
e extended
p primary partition (1-4)
p
Partition number (1-4): 2
First cylinder (133-242, default 133):
Using default value 133
Last cylinder or +size or +sizeM or +sizeK (133-242, default 242):
Using default value 242
Lets look at our partition layout now. Type "p" and enter.
Code:
Command (m for help): p
Disk /dev/sdb: 1998 MB, 1998585344 bytes
255 heads, 63 sectors/track, 242 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xa62da6ab
Device Boot Start End Blocks Id System
/dev/sdb1 1 132 1060258+ 83 Linux
/dev/sdb2 133 242 883575 83 Linux
Its time to change the ID of partition 1 to correspond with the Fat 32 Filesystem type that we will be using.
Type "t" and enter, then answer the questions:
Code:
Command (m for help): t
Partition number (1-4): 1
Hex code (type L to list codes): b
Changed system type of partition 1 to b (W95 FAT32)
We only need to change partition 1 because 2 is already set for Ext 3.
Now we will make the first partition bootable.
Type "a" and enter the partition number that you want bootable. in this instance it will be 1.
Code:
Command (m for help): a
Partition number (1-4): 1
One last look at our partitions before we move on, so type "p" and enter:
Code:
Command (m for help): p
Disk /dev/sdb: 1998 MB, 1998585344 bytes
255 heads, 63 sectors/track, 242 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xa62da6ab
Device Boot Start End Blocks Id System
/dev/sdb1 * 1 132 1060258+ b W95 FAT32
/dev/sdb2 133 242 883575 83 Linux
Everything looks good so lets write these changes to the drive.
Type "w" and enter
Writing the Filesystems
For this task we will be using "mkfs"
At the terminal type:
Code:
user@laptop:~$ mkfs -t vfat /dev/sdb1
Should output
Code:
mkfs.vfat 2.11 (12 Mar 2005)
Then for the second partition type:
Code:
mkfs -t ext2 /dev/sdb2
Should output
Code:
mke2fs 1.40.8 (13-Mar-2008)
Filesystem label=
OS type: Linux
Block size=4096 (log=2)
Fragment size=4096 (log=2)
56896 inodes, 226918 blocks
11345 blocks (5.00%) reserved for the super user
First data block=0
Maximum filesystem blocks=234881024
7 block groups
32768 blocks per group, 32768 fragments per group
8128 inodes per group
Superblock backups stored on blocks:
32768, 98304, 163840
Writing inode tables: done
Creating journal (4096 blocks): done
Writing superblocks and filesystem accounting information: done
This filesystem will be automatically checked every 27 mounts or
180 days, whichever comes first. Use tune2fs -c or -i to override.
Its time to use "fsck" to -
Check The Filesystems
At the Terminal type:
Code:
fsck -y /dev/sdb1
Should Output:
Code:
fsck 1.40.8 (13-Mar-2008)
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
/dev/sdb1: 0 files, 1/264543 clusters
Then:
Code:
fsck -y /dev/sdb2
Should Output:
Code:
fsck 1.40.8 (13-Mar-2008)
e2fsck 1.40.8 (13-Mar-2008)
/dev/sdb2: clean, 11/55328 files, 6071/220893 blocks
Thats it, the partitions are created, filesystems written, and then checked. We are ready to start installing!!!
"cd" to the directory where you have the downloaded BT3 rar file, and run unrar.
Code:
unrar x bt3b141207.rar
If you experience issues on your Distro unpacking the .rar, be sure you have unrar installed.
Once the unpacking is completed OK we need to start copying files to our drive. "cd" into the unpacked directory and copy "boot" and "BT3" directories to the first partition of your flash drive.
So type:
Code:
cp -r boot /media/disk
Then:
Code:
cp -r BT3 /media/disk
I'm using ubuntu and the flash drive is mounted in /media you will need to change this to where your drive is mounted
We need to "cd" to the first partition of the flash drive.
So type:
Code:
cd /media/disk
"cd" into the boot directory and then into the syslinux directory.
Code:
cd boot/syslinux
Here we need to change a few permissions.
In the terminal type:
Code:
chmod 777 lilo
then:
Code:
chmod 777 syslinux
Using your favorite text editor we need to modify the syslinux.cfg file. Here I will use nano.
Code:
nano syslinux.cfg
Change this line:
Code:
LABEL pchanges
MENU LABEL BT3 Graphics mode with Persistent Changes
KERNEL /boot/vmlinuz
APPEND vga=0x317 initrd=/boot/initrd.gz ramdisk_size=6666 root=/dev/ram0 rw changes=/slax/slaxsave.dat autoexec=xconf;kdm
To:
Code:
LABEL pchanges
MENU LABEL BT3 Graphics mode with Persistent Changes
KERNEL /boot/vmlinuz
APPEND vga=0x317 initrd=/boot/initrd.gz ramdisk_size=6666 root=/dev/ram0 rw changes=/dev/sdb2 autoexec=xconf;kdm
You can add this line to any of the boot choices, as it is you will need to boot to "BT3 Graphics mode with Persistent Changes" for the changes to be saved
We need to go back up one directory to run the bootinst.sh script
So:
Code:
cd ..
An "ls" should show:
Code:
bootinst.bat bootlilo.sh dos isolinux mt86p vesamenu.c32
bootinst.sh chain.c32 initrd.gz modules syslinux vmlinuz
Run the bootinst.sh script:
Code:
./bootinst.sh
This begins the Slax boot installer:
Code:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Welcome to Slax boot installer
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
This installer will setup disk /dev/sdb1 to boot only Slax.
Warning! Master boot record (MBR) of /dev/sdb will be overwritten.
If you use /dev/sdb to boot any existing operating system, it will not work
anymore. Only Slax will boot from this device. Be careful!
Press any key to continue, or Ctrl+C to abort...
Hit any key and:
Code:
Flushing filesystem buffers, this may take a while...
Setting up MBR on /dev/sdb...
The Master Boot Record of /dev/sdb has been updated.
Activating partition /dev/sdb1...
No partition table modifications are needed.
Updating MBR on /dev/sdb...
Setting up boot record for /dev/sdb1...
Disk /dev/sdb1 should be bootable now. Installation finished.
Read the information above and then press any key to exit...
The install worked perfectly!!!!
Reboot your machine and test out the stick
If anyone has any questions or are not clear on any part of this Tutorial I will answer any of your questions to the best of my ablility.
Friday, 12 December 2008
Ubuntu Dark Arts: Hacking Networks With Ettercap To Gain Usernames And Passwords
SOURCE:http://www.zimbio.com/Runescape+Hacks/articles/3164/Ubuntu+Dark+Arts+Hacking+Networks+Ettercap
-----------------------------------
Ettercap is a program that can accomplish many things, most notably gaining usernames and passwords from networked computers. For example, let's say you think your husband or wife is carrying on an online relationship with somebody and you want to gain access to their email or social site accounts. With ettercap, you can do just that.
First, you need to install ettercap. From the command line type in this:
sudo apt-get install ettercap-common ettercap-gtk
Before running ettercap you will need to modify the config file to allow for SSL access. Some other guides state to edit the file located at /usr/local/etc/etter.conf but my config file was not located there. I found mine at /etc/etter.conf. You have to uncomment the two iptables lines about iptables in the .conf file to allow for SSL access. So locate these two lines:
#redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
#redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
Remove the "#" before each line and save the edited file. Then go to Applications –> System Tools –> ettercap and follow this mini-guide to "sniff" your local network for usernames and passwords.
ettercap start screen
Go to Sniff –> Unified sniffing
ettercap unified sniffing
Choose your network interface (eth0, wlan0, etc.)
ettercap choose interface
Press CTRL+s to scan the network for hosts
ettercap scan network
Go to Mitm –> Arp poisoning
ettercap arp poisoning
After selecting arp poisoning, then check the box "Sniff remote connections"
ettercap sniff remote connections
Finally, select Start –> Start sniffing to start the sniffing for usernames and passwords
ettercap start sniffing
This works out quite nicely if you have everything set up right. I have tried this out and can confirm that it does indeed sniff out usernames and passwords. When someone on your local network goes to a website where they need to log in to gain entry, such as Yahoo Mail, then immediately after they log in to the site, the website url, username and password will be listed in the ettercap terminal. Pretty cool, huh?
Just to be on the safe side I will just say that this guide is for informational purposes only; it is not my intention to have anyone read this and head off to a local coffee shop and try to hack everyone's accounts!
-----------------------------------
Ettercap is a program that can accomplish many things, most notably gaining usernames and passwords from networked computers. For example, let's say you think your husband or wife is carrying on an online relationship with somebody and you want to gain access to their email or social site accounts. With ettercap, you can do just that.
First, you need to install ettercap. From the command line type in this:
sudo apt-get install ettercap-common ettercap-gtk
Before running ettercap you will need to modify the config file to allow for SSL access. Some other guides state to edit the file located at /usr/local/etc/etter.conf but my config file was not located there. I found mine at /etc/etter.conf. You have to uncomment the two iptables lines about iptables in the .conf file to allow for SSL access. So locate these two lines:
#redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
#redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
Remove the "#" before each line and save the edited file. Then go to Applications –> System Tools –> ettercap and follow this mini-guide to "sniff" your local network for usernames and passwords.
ettercap start screen
Go to Sniff –> Unified sniffing
ettercap unified sniffing
Choose your network interface (eth0, wlan0, etc.)
ettercap choose interface
Press CTRL+s to scan the network for hosts
ettercap scan network
Go to Mitm –> Arp poisoning
ettercap arp poisoning
After selecting arp poisoning, then check the box "Sniff remote connections"
ettercap sniff remote connections
Finally, select Start –> Start sniffing to start the sniffing for usernames and passwords
ettercap start sniffing
This works out quite nicely if you have everything set up right. I have tried this out and can confirm that it does indeed sniff out usernames and passwords. When someone on your local network goes to a website where they need to log in to gain entry, such as Yahoo Mail, then immediately after they log in to the site, the website url, username and password will be listed in the ettercap terminal. Pretty cool, huh?
Just to be on the safe side I will just say that this guide is for informational purposes only; it is not my intention to have anyone read this and head off to a local coffee shop and try to hack everyone's accounts!
Thursday, 11 December 2008
Monday, 8 December 2008
Fix no sound on Ubuntu 8.10
SOURCE: http://onlyubuntu.blogspot.com/2008/11/fix-for-no-sound-issue-in-ubuntu-810.html
--------------------------------------------
sudo killall pulseaudio
sudo alsa force-reload
and then go to System>Preferences>Sound and change everything to ALSA
--------------------------------------------
sudo killall pulseaudio
sudo alsa force-reload
and then go to System>Preferences>Sound and change everything to ALSA
Wednesday, 3 December 2008
How to get Vmware server to access USB stick?
SOURCE: https://lists.ubuntu.com/archives/ubuntu-users/2008-March/139099.html
exec the following command "mount -t usbfs usbfs /proc/bus/usb/" before starting
VMWare does the job.
exec the following command "mount -t usbfs usbfs /proc/bus/usb/" before starting
VMWare does the job.
Monday, 1 December 2008
How can I view those Microsoft Office 2003 Scanned documents in Unix?
SOURCE: http://nomoa.com/index.php?module=articles&func=display&aid=1864&theme=print
-------------
Ubuntu - the straw that broke the camels back
Posted by: Samiuela LV Taufa onWed, 30 May 2007 14:57:24
Otherwise known as: How can I view those Microsoft Office 2003 Scanned documents in Unix?
[Update 2007.06.14 to include gnome2/nautilus-script and hopefully clarified some text]
The desktop replacement Ubuntu box I've been putting together for my father-in-law's office has ground to a halt because of a very simple problem:
I can't get a graphics viewer for Microsoft Office 2003's TIFF format created by the MS Office 2003 tool for managing scanners, Microsoft Office Document Imaging.
Technically, Ubuntu/Linux can view the multiple images embedded in the TIFF file, but it is a song and dance affair at the moment that is doable for a techno-dweeb, but not yet accessible to mere humans.
Scanning: YES we can scan documents under Ubuntu by using XSane Image Scanner, but I'm interested in viewing TIFF documents created by business partners.
Background
Microsoft Office Document Imaging (MDI) is part of Microsoft Office 2003 suite and provides a generic scanning tool for scanning images into your machine (most notably for attaching printed documents to email.) This tool is a way way easier to use than the driver based tool provided by the scanner manufacturer, as well as allowing a single application on which the user is trained for scanning documents/pictures.
We currently use it for scanning contracts, forms and sent faxes to forward between business partners. Likewise, our major business partner uses it extensively when sending us printed forms and faxes.
MDI's scanning tool saves multi-page scanned documents as a single TIFF file. Within this TIFF file are:
1. JPEG images of the scanned pages
2. JPEG thumbnails of the scanned pages
3. OCR'd versions of the above pages (OCR - Optical Character Recognition - an attempt to recognise the text in your document)
The TIFF/TIF file format has been extensively documented and in Microsoft's own promotional blurb about Microsoft Office - Document Imaging.
TIFF is a commonly used format for various imaging applications, including those that scan and fax. Microsoft Office Document Imaging uses the TIFF format, utilizing the format's capability to contain text recognized by optical character recognition (OCR) (OCR: Translates images of text, such as scanned documents, into actual text characters. Also known as text recognition.) When you scan new documents, they are saved in TIFF format (with a .tif extension), and any OCR text is stored in the TIFF file along with the image.
You can open and edit TIFF files created with Office Document Imaging by using many other graphics applications. When you do so, any OCR text that the file contains is lost. You will have to rerun OCR if you want to access the text in the TIFF file again in Office Document Imaging.
It seems that Microsoft are using legitimate extensions to TIFF 6.0 and it's extensions, but not near enough programmers out there have access to the documentation on these extensions or can cut the code for it.
Some further notes on the TIFF format in the below Unix section but there are problems even within Microsoft Windows to view these scanned multi-page documents.
Visit bTonga
Viewing:
On an MS Windows XP desktop, you can view these multiple pages using:
* Microsoft's MDI application's viewer, or
* the free application IrfanView, or
* the free application XnView (my preferred tool at the moment)
On Unix, Linux there's a convoluted way to get at the files and shown later in this post.
Viewing Limited:
Microsoft's Office Picture Manager (12.0.4518) can view the 1st Image in the TIFF file, but I can't see anyway of seeing the rest of the images in the file and there are no notable indications that there are multiple images in the file (leading you to a conclusion that the single image you see is the only relevant image.)
OT: Weird limitation considering the product is shipped by the same team, only further highlighting how big Office development/programming has become.
Viewing NOT:
You cannot, however, view the images using Microsoft's own current tools and other popular tools.
* Windows Picture and Fax Viewer, or
* Imagic Magic 6.2.3 Q16 IMDisplay 1.0, or
* Paint.NET v3.07
Unfortunately I don't have a copy of Adobe Photoshop on my machine to give people more information.
Similarly, I have tried to view multipage TIFFs on Linux with the following applications also failing with errors complaining about the TIFF format
* F-Spot Photo Manager 0.3.5 (crashes on import, and fails to display image/s)
* GIMP Image Editor 2.2.13 (multiple "unknown field tag" error message on loading file)
* GNU Paint gpaint-2 0.3.0-pre5 (error: cannot open file)
* gThumb Image Viewer 2.10.2 (no errors, but no image view)
* Gwenview 1.4.1 (multiple "unknown field tag" errors and "Invalid YCBCr subsampling")
* xloadimage 4.1 (same error message as tiffinfo shown below)
Viewing GNU Linux:
Thanks to a post by Michael R. Head, there is a way to view the multipage TIFF files, but there is some command-line magic you have to walk through.
Let's first take a look at an indicator that we have a TIFF file created by Microsoft's MDI by using LibTIFF's tiffinfo tool. We first transport 2 multipage TIFF files (multipage.tif and multipage2.tif) from our Windows box to Ubuntu Linux.
$ ls
multipage2.tif multipage.tif
$ file multipage.tif multipage2.tif
multipage.tif: TIFF image data, little-endian
multipage2.tif: TIFF image data, little-endian
The unix file utility is telling us that the two images we're using in this example is a file with the format "TIFF image data, little-endian"
$ tiffinfo multipage.tif
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 513 (0x201) encountered.
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 514 (0x202) encountered.
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 37680 (0x9330) encountered.
multipage.tif: Invalid YCbCr subsampling.
TIFFReadDirectory: multipage.tif: cannot handle zero strip size.
Using tiffinfo we now know that for both the multipage.tif and multipage2.tif file that we do not recognise portions of the file that seem to be equivalent areas in both files.
$ tiffinfo multipage2.tif
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 513 (0x201) encountered.
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 514 (0x202) encountered.
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 37680 (0x9330) encountered.
multipage2.tif: Invalid YCbCr subsampling.
TIFFReadDirectory: multipage2.tif: cannot handle zero strip size.
Seeing the error messages displayed by tiffinfo helps us to understand some of the error messages displayed by the above image viewers. The errors are implying these viewers use of the libtiff library and it's limitations. It should be pointed out here that libtiff.org documents:
TIFF 6.0 Specification Coverage
The library is capable of dealing with images that are written to follow the 5.0 or 6.0 TIFF spec. There is also considerable support for some of the more esoteric portions of the 6.0 TIFF spec.
...
Note that there is no support for the JPEG-related tags defined in the 6.0 specification; the JPEG support is based on the post-6.0 proposal given in TIFF Technical Note #2.
...
The JPEG-related tag is specified in TIFF Technical Note #2 which defines a revised JPEG-in-TIFF scheme (revised over that appendix that was part of the TIFF 6.0 specification).
I am not so sure how relevant the above is to the Microsoft MDI problem, but suffice it to say I don't know enough to blame anyone for why so many open source software lack support for viewing MDI multi-page TIFF files.
Unix: Extracting the Images
We now know that the TIFF file could be a legitimate TIFF file, but we can't view the images without resorting to a Windows box. Thanks again to Michael R. Head's article the solution is through a forensics tool Foremost.
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery.
Foremost seems to understand the TIFF data structure presented by Microsoft's MDI, so it can extract the separate streams/images and store them to the disk for 'later processing. Using foremost is rather simple as shown below on our two multipage files.
$ ls
multipage2.tif multipage.tif
$ foremost -i multipage.tif -o multipage
Processing: multipage.tif
|*|
$ foremost -i multipage2.tif -o multipage2
Processing: multipage2.tif
|*|
foremost creates subdirectories (-o) jpg and ole where jpg contains the images (both full image and thumbnail image), and ole contains ocr'd versions of the pages.
$ ls -R
.:
multipage multipage2 multipage2.tif multipage.tif
./multipage:
audit.txt jpg ole
./multipage/jpg:
00000000.jpg 00000545.jpg 00000937.jpg 00001543.jpg 00002127.jpg
00000538.jpg 00000931.jpg 00001535.jpg 00002120.jpg 00002682.jpg
./multipage/ole:
00002692.ole
./multipage2:
audit.txt jpg ole
./multipage2/jpg:
00000000.jpg 00002941.jpg 00006432.jpg 00009274.jpg 00011870.jpg 00014243.jpg 00016827.jpg
00001609.jpg 00004364.jpg 00006444.jpg 00009284.jpg 00011879.jpg 00014252.jpg 00016836.jpg
00001622.jpg 00004375.jpg 00007880.jpg 00010598.jpg 00012939.jpg 00015470.jpg 00018163.jpg
00002931.jpg 00004954.jpg 00007891.jpg 00010608.jpg 00012948.jpg 00015481.jpg
./multipage2/ole:
00018172.ole
The jpg files, being thumbnail and full image should have distinctive sizes such as the above listing shown below
$ ls -lR
./multipage:
total 12
-rw-r--r-- 1 samt samt 1178 2007-05-30 14:47 audit.txt
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 jpg
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 ole
./multipage/jpg:
total 1380
-rw-r--r-- 1 samt samt 275019 2007-05-30 14:47 00000000.jpg
-rw-r--r-- 1 samt samt 3709 2007-05-30 14:47 00000538.jpg
-rw-r--r-- 1 samt samt 197089 2007-05-30 14:47 00000545.jpg
-rw-r--r-- 1 samt samt 3011 2007-05-30 14:47 00000931.jpg
-rw-r--r-- 1 samt samt 305575 2007-05-30 14:47 00000937.jpg
-rw-r--r-- 1 samt samt 4002 2007-05-30 14:47 00001535.jpg
-rw-r--r-- 1 samt samt 294723 2007-05-30 14:47 00001543.jpg
-rw-r--r-- 1 samt samt 3442 2007-05-30 14:47 00002120.jpg
-rw-r--r-- 1 samt samt 284052 2007-05-30 14:47 00002127.jpg
-rw-r--r-- 1 samt samt 4793 2007-05-30 14:47 00002682.jpg
./multipage/ole:
total 8
-rw-r--r-- 1 samt samt 5632 2007-05-30 14:47 00002692.ole
./multipage2:
total 12
-rw-r--r-- 1 samt samt 1998 2007-05-30 14:47 audit.txt
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 jpg
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 ole
./multipage2/jpg:
total 9200
-rw-r--r-- 1 samt samt 823649 2007-05-30 14:47 00000000.jpg
-rw-r--r-- 1 samt samt 6345 2007-05-30 14:47 00001609.jpg
-rw-r--r-- 1 samt samt 669597 2007-05-30 14:47 00001622.jpg
-rw-r--r-- 1 samt samt 5344 2007-05-30 14:47 00002931.jpg
-rw-r--r-- 1 samt samt 728014 2007-05-30 14:47 00002941.jpg
-rw-r--r-- 1 samt samt 5365 2007-05-30 14:47 00004364.jpg
-rw-r--r-- 1 samt samt 296251 2007-05-30 14:47 00004375.jpg
-rw-r--r-- 1 samt samt 756384 2007-05-30 14:47 00004954.jpg
-rw-r--r-- 1 samt samt 6134 2007-05-30 14:47 00006432.jpg
-rw-r--r-- 1 samt samt 734716 2007-05-30 14:47 00006444.jpg
-rw-r--r-- 1 samt samt 5064 2007-05-30 14:47 00007880.jpg
-rw-r--r-- 1 samt samt 707892 2007-05-30 14:47 00007891.jpg
-rw-r--r-- 1 samt samt 4973 2007-05-30 14:47 00009274.jpg
-rw-r--r-- 1 samt samt 672318 2007-05-30 14:47 00009284.jpg
-rw-r--r-- 1 samt samt 4854 2007-05-30 14:47 00010598.jpg
-rw-r--r-- 1 samt samt 645537 2007-05-30 14:47 00010608.jpg
-rw-r--r-- 1 samt samt 4784 2007-05-30 14:47 00011870.jpg
-rw-r--r-- 1 samt samt 542300 2007-05-30 14:47 00011879.jpg
-rw-r--r-- 1 samt samt 4081 2007-05-30 14:47 00012939.jpg
-rw-r--r-- 1 samt samt 662687 2007-05-30 14:47 00012948.jpg
-rw-r--r-- 1 samt samt 4416 2007-05-30 14:47 00014243.jpg
-rw-r--r-- 1 samt samt 623235 2007-05-30 14:47 00014252.jpg
-rw-r--r-- 1 samt samt 5299 2007-05-30 14:47 00015470.jpg
-rw-r--r-- 1 samt samt 688888 2007-05-30 14:47 00015481.jpg
-rw-r--r-- 1 samt samt 4436 2007-05-30 14:47 00016827.jpg
-rw-r--r-- 1 samt samt 678824 2007-05-30 14:47 00016836.jpg
-rw-r--r-- 1 samt samt 4619 2007-05-30 14:47 00018163.jpg
./multipage2/ole:
total 8
-rw-r--r-- 1 samt samt 5632 2007-05-30 14:47 00018172.ole
I don't know what the sequencing issues are with the file names, but it seems obvious that the larger files will be the full image, with one of the smaller files being a thumbnail of the same (presumably the nearest higher order number.)
Unix: Automating extraction and viewability
In a comment to Michael R. Head's article, typhoncore writes a nice bash script that uses ImageMagick's 'convert' utility and pdftk to create a multipage PDF file from the larger images. It is listed here with a few minor modifications I have inserted (for better or worse.)
#!/bin/bash
DOC_COUNT=0
arg1=$1
arg_out=$arg1.out
echo "Extracting Images from $arg1 using foremost to $arg_out"
foremost -i $arg1 -o $arg_out
echo "Done"
cd $arg_out/jpg
echo "Converting Single Images to PDF"
for i in $(ls *.jpg); do
ODDEVEN=$(echo "scale=0; $DOC_COUNT % 2" | bc)
if [ "$ODDEVEN" = "0" ] ; then
echo -n " > $i to $i.pdf"
convert $i $i.pdf
echo " - done"
fi
DOC_COUNT=$(echo "scale=0; $DOC_COUNT + 1" | bc)
done
echo -n "Merging separate single page PDF's to a multipage PDF"
pdftk *.pdf cat output merged.pdf
mv merged.pdf ../../$arg1.pdf
echo " - done"
cd ../..
echo -n "Removing temporary directory $arg_out"
rm -Rf $arg_out
echo " - done"
The bastardisation of typhoncore's script is to add console progress indicators (and as additional documentation within the script) for us noobs.
Output of the script will look something like the below.
$ sh TIFFtoPDF.sh multipage.tif
Extracting Images from multipage.tif using foremost to multipage.tif.out
Processing: multipage.tif
|*|
Done
Converting Single Images to PDF
> 00000000.jpg to 00000000.jpg.pdf - done
> 00000545.jpg to 00000545.jpg.pdf - done
> 00000937.jpg to 00000937.jpg.pdf - done
> 00001543.jpg to 00001543.jpg.pdf - done
> 00002127.jpg to 00002127.jpg.pdf - done
Merging separate single page PDF's to a multipage PDF - done
Removing temporary directory multipage.tif.out - done
$
Unix: GNOME GUIfying extraction and viewability
I was thinking what could be a registry hack (Windows Hat on) or other means to let the File Explorer in X Windows (later discovering it is called GNOME Nautilus) send TIFF files to the above script when I came across a solution for separate but related problem Mount and UnMount ISO images without burning them.
That lead me to a rehacked whack of the above TIFFtoPDF.sh that can be placed in your ~/username/.gnome2/nautilus-scripts/ folder.
Read Nautilus File Manager Scripts : Questions and Answers for more details on how to get the below script working properly with Nautilus.
#!/bin/bash
# mount
BASENAME=`basename $NAUTILUS_SCRIPT_SELECTED_FILE_PATHS`
DOC_COUNT=0
INFILE=$BASENAME
OUTPUT=$INFILE.odir
if ! zenity --question --title "Convert MS TIFF file to Multipage PDF"
--text "Do you wish to Convert the MS TIFF $BASENAME to a Multipage PDF?"
then
exit 0
fi
foremost -i $INFILE -o $OUTPUT
cd $OUTPUT/jpg
for i in $(ls *.jpg); do
ODDEVEN=$(echo "scale=0; $DOC_COUNT % 2" | bc)
if [ "$ODDEVEN" = "0" ] ; then
convert $i $i.pdf
fi
DOC_COUNT=$(echo "scale=0; $DOC_COUNT + 1" | bc)
done
pdftk *.pdf cat output merged.pdf
mv merged.pdf ../../$INFILE.pdf
cd ../..
rm -Rf $OUTPUT
The bare essentials for getting the above script working in GNOME Nautilus is:
1. Put the script in ~/username/.gnome2/nautilus-scripts/
2. Make the script executable
3. Visit the directory using GNOME Nautilus
Conclusion
There is no going to Ubuntu/Linux or any other variant of Unix/BSD until this image viewing problem can find a simpler solution for these guys.
Funny how for the big ticket items we were eventually able to find good alternate solutions, but things fell over with this simple yet insurmountable problem.
Microsoft Outlook 2003 --> now using Thunderbird 2.0.x
Microsoft Word 2003 --> we have been testing Open Office 2.2 Write
Microsoft Excel 2003 --> we have been testing Open Office 2.2 Calc
Microsoft Access 2003 --> not currently using, no need for an alternative
Microsoft Publisher 2003 --> infrequent use, although testing scribus
Printing --> CUPS with Vendor Linux Drivers
Scanning --> XSane with Vendor Linux Drivers
Accounting Software --> Not currently using one, but looking around
For my own desktop needs, I'm still an XP man and will probably go to Vista with my next machine, as that will definitely be a TabletPC, but there's plenty of cheap Pentium IV's on www.ebay.com.au so I'm getting an X Windows (Gnome/KDE) up for some of the kid's fun and gaming (defining anything they enjoy as play.)
The sledge-hammer solution would be to run a mail server that would parse incoming emails for TIFF files and automatically detect/convert multipage files from TIFF to PDF. If this was a do or die situation I would probably work on it, as it is, it will have to wait for another day/solution.
References
Michael R. Head's Handling Microsoft Office Document Scanning TNEF and TIFFs in Linux
typhonecore Multipage TIFF to Multipage PDF script
DRAFT TIFF Technical Note #2
Adobe Photoshop TIFF Technical Notes (PDF)
-------------
Ubuntu - the straw that broke the camels back
Posted by: Samiuela LV Taufa onWed, 30 May 2007 14:57:24
Otherwise known as: How can I view those Microsoft Office 2003 Scanned documents in Unix?
[Update 2007.06.14 to include gnome2/nautilus-script and hopefully clarified some text]
The desktop replacement Ubuntu box I've been putting together for my father-in-law's office has ground to a halt because of a very simple problem:
I can't get a graphics viewer for Microsoft Office 2003's TIFF format created by the MS Office 2003 tool for managing scanners, Microsoft Office Document Imaging.
Technically, Ubuntu/Linux can view the multiple images embedded in the TIFF file, but it is a song and dance affair at the moment that is doable for a techno-dweeb, but not yet accessible to mere humans.
Scanning: YES we can scan documents under Ubuntu by using XSane Image Scanner, but I'm interested in viewing TIFF documents created by business partners.
Background
Microsoft Office Document Imaging (MDI) is part of Microsoft Office 2003 suite and provides a generic scanning tool for scanning images into your machine (most notably for attaching printed documents to email.) This tool is a way way easier to use than the driver based tool provided by the scanner manufacturer, as well as allowing a single application on which the user is trained for scanning documents/pictures.
We currently use it for scanning contracts, forms and sent faxes to forward between business partners. Likewise, our major business partner uses it extensively when sending us printed forms and faxes.
MDI's scanning tool saves multi-page scanned documents as a single TIFF file. Within this TIFF file are:
1. JPEG images of the scanned pages
2. JPEG thumbnails of the scanned pages
3. OCR'd versions of the above pages (OCR - Optical Character Recognition - an attempt to recognise the text in your document)
The TIFF/TIF file format has been extensively documented and in Microsoft's own promotional blurb about Microsoft Office - Document Imaging.
TIFF is a commonly used format for various imaging applications, including those that scan and fax. Microsoft Office Document Imaging uses the TIFF format, utilizing the format's capability to contain text recognized by optical character recognition (OCR) (OCR: Translates images of text, such as scanned documents, into actual text characters. Also known as text recognition.) When you scan new documents, they are saved in TIFF format (with a .tif extension), and any OCR text is stored in the TIFF file along with the image.
You can open and edit TIFF files created with Office Document Imaging by using many other graphics applications. When you do so, any OCR text that the file contains is lost. You will have to rerun OCR if you want to access the text in the TIFF file again in Office Document Imaging.
It seems that Microsoft are using legitimate extensions to TIFF 6.0 and it's extensions, but not near enough programmers out there have access to the documentation on these extensions or can cut the code for it.
Some further notes on the TIFF format in the below Unix section but there are problems even within Microsoft Windows to view these scanned multi-page documents.
Visit bTonga
Viewing:
On an MS Windows XP desktop, you can view these multiple pages using:
* Microsoft's MDI application's viewer, or
* the free application IrfanView, or
* the free application XnView (my preferred tool at the moment)
On Unix, Linux there's a convoluted way to get at the files and shown later in this post.
Viewing Limited:
Microsoft's Office Picture Manager (12.0.4518) can view the 1st Image in the TIFF file, but I can't see anyway of seeing the rest of the images in the file and there are no notable indications that there are multiple images in the file (leading you to a conclusion that the single image you see is the only relevant image.)
OT: Weird limitation considering the product is shipped by the same team, only further highlighting how big Office development/programming has become.
Viewing NOT:
You cannot, however, view the images using Microsoft's own current tools and other popular tools.
* Windows Picture and Fax Viewer, or
* Imagic Magic 6.2.3 Q16 IMDisplay 1.0, or
* Paint.NET v3.07
Unfortunately I don't have a copy of Adobe Photoshop on my machine to give people more information.
Similarly, I have tried to view multipage TIFFs on Linux with the following applications also failing with errors complaining about the TIFF format
* F-Spot Photo Manager 0.3.5 (crashes on import, and fails to display image/s)
* GIMP Image Editor 2.2.13 (multiple "unknown field tag" error message on loading file)
* GNU Paint gpaint-2 0.3.0-pre5 (error: cannot open file)
* gThumb Image Viewer 2.10.2 (no errors, but no image view)
* Gwenview 1.4.1 (multiple "unknown field tag" errors and "Invalid YCBCr subsampling")
* xloadimage 4.1 (same error message as tiffinfo shown below)
Viewing GNU Linux:
Thanks to a post by Michael R. Head, there is a way to view the multipage TIFF files, but there is some command-line magic you have to walk through.
Let's first take a look at an indicator that we have a TIFF file created by Microsoft's MDI by using LibTIFF's tiffinfo tool. We first transport 2 multipage TIFF files (multipage.tif and multipage2.tif) from our Windows box to Ubuntu Linux.
$ ls
multipage2.tif multipage.tif
$ file multipage.tif multipage2.tif
multipage.tif: TIFF image data, little-endian
multipage2.tif: TIFF image data, little-endian
The unix file utility is telling us that the two images we're using in this example is a file with the format "TIFF image data, little-endian"
$ tiffinfo multipage.tif
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 513 (0x201) encountered.
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 514 (0x202) encountered.
TIFFReadDirectory: Warning, multipage.tif: unknown field with tag 37680 (0x9330) encountered.
multipage.tif: Invalid YCbCr subsampling.
TIFFReadDirectory: multipage.tif: cannot handle zero strip size.
Using tiffinfo we now know that for both the multipage.tif and multipage2.tif file that we do not recognise portions of the file that seem to be equivalent areas in both files.
$ tiffinfo multipage2.tif
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 513 (0x201) encountered.
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 514 (0x202) encountered.
TIFFReadDirectory: Warning, multipage2.tif: unknown field with tag 37680 (0x9330) encountered.
multipage2.tif: Invalid YCbCr subsampling.
TIFFReadDirectory: multipage2.tif: cannot handle zero strip size.
Seeing the error messages displayed by tiffinfo helps us to understand some of the error messages displayed by the above image viewers. The errors are implying these viewers use of the libtiff library and it's limitations. It should be pointed out here that libtiff.org documents:
TIFF 6.0 Specification Coverage
The library is capable of dealing with images that are written to follow the 5.0 or 6.0 TIFF spec. There is also considerable support for some of the more esoteric portions of the 6.0 TIFF spec.
...
Note that there is no support for the JPEG-related tags defined in the 6.0 specification; the JPEG support is based on the post-6.0 proposal given in TIFF Technical Note #2.
...
The JPEG-related tag is specified in TIFF Technical Note #2 which defines a revised JPEG-in-TIFF scheme (revised over that appendix that was part of the TIFF 6.0 specification).
I am not so sure how relevant the above is to the Microsoft MDI problem, but suffice it to say I don't know enough to blame anyone for why so many open source software lack support for viewing MDI multi-page TIFF files.
Unix: Extracting the Images
We now know that the TIFF file could be a legitimate TIFF file, but we can't view the images without resorting to a Windows box. Thanks again to Michael R. Head's article the solution is through a forensics tool Foremost.
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery.
Foremost seems to understand the TIFF data structure presented by Microsoft's MDI, so it can extract the separate streams/images and store them to the disk for 'later processing. Using foremost is rather simple as shown below on our two multipage files.
$ ls
multipage2.tif multipage.tif
$ foremost -i multipage.tif -o multipage
Processing: multipage.tif
|*|
$ foremost -i multipage2.tif -o multipage2
Processing: multipage2.tif
|*|
foremost creates subdirectories (-o) jpg and ole where jpg contains the images (both full image and thumbnail image), and ole contains ocr'd versions of the pages.
$ ls -R
.:
multipage multipage2 multipage2.tif multipage.tif
./multipage:
audit.txt jpg ole
./multipage/jpg:
00000000.jpg 00000545.jpg 00000937.jpg 00001543.jpg 00002127.jpg
00000538.jpg 00000931.jpg 00001535.jpg 00002120.jpg 00002682.jpg
./multipage/ole:
00002692.ole
./multipage2:
audit.txt jpg ole
./multipage2/jpg:
00000000.jpg 00002941.jpg 00006432.jpg 00009274.jpg 00011870.jpg 00014243.jpg 00016827.jpg
00001609.jpg 00004364.jpg 00006444.jpg 00009284.jpg 00011879.jpg 00014252.jpg 00016836.jpg
00001622.jpg 00004375.jpg 00007880.jpg 00010598.jpg 00012939.jpg 00015470.jpg 00018163.jpg
00002931.jpg 00004954.jpg 00007891.jpg 00010608.jpg 00012948.jpg 00015481.jpg
./multipage2/ole:
00018172.ole
The jpg files, being thumbnail and full image should have distinctive sizes such as the above listing shown below
$ ls -lR
./multipage:
total 12
-rw-r--r-- 1 samt samt 1178 2007-05-30 14:47 audit.txt
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 jpg
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 ole
./multipage/jpg:
total 1380
-rw-r--r-- 1 samt samt 275019 2007-05-30 14:47 00000000.jpg
-rw-r--r-- 1 samt samt 3709 2007-05-30 14:47 00000538.jpg
-rw-r--r-- 1 samt samt 197089 2007-05-30 14:47 00000545.jpg
-rw-r--r-- 1 samt samt 3011 2007-05-30 14:47 00000931.jpg
-rw-r--r-- 1 samt samt 305575 2007-05-30 14:47 00000937.jpg
-rw-r--r-- 1 samt samt 4002 2007-05-30 14:47 00001535.jpg
-rw-r--r-- 1 samt samt 294723 2007-05-30 14:47 00001543.jpg
-rw-r--r-- 1 samt samt 3442 2007-05-30 14:47 00002120.jpg
-rw-r--r-- 1 samt samt 284052 2007-05-30 14:47 00002127.jpg
-rw-r--r-- 1 samt samt 4793 2007-05-30 14:47 00002682.jpg
./multipage/ole:
total 8
-rw-r--r-- 1 samt samt 5632 2007-05-30 14:47 00002692.ole
./multipage2:
total 12
-rw-r--r-- 1 samt samt 1998 2007-05-30 14:47 audit.txt
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 jpg
drwxr-xr-- 2 samt samt 4096 2007-05-30 14:47 ole
./multipage2/jpg:
total 9200
-rw-r--r-- 1 samt samt 823649 2007-05-30 14:47 00000000.jpg
-rw-r--r-- 1 samt samt 6345 2007-05-30 14:47 00001609.jpg
-rw-r--r-- 1 samt samt 669597 2007-05-30 14:47 00001622.jpg
-rw-r--r-- 1 samt samt 5344 2007-05-30 14:47 00002931.jpg
-rw-r--r-- 1 samt samt 728014 2007-05-30 14:47 00002941.jpg
-rw-r--r-- 1 samt samt 5365 2007-05-30 14:47 00004364.jpg
-rw-r--r-- 1 samt samt 296251 2007-05-30 14:47 00004375.jpg
-rw-r--r-- 1 samt samt 756384 2007-05-30 14:47 00004954.jpg
-rw-r--r-- 1 samt samt 6134 2007-05-30 14:47 00006432.jpg
-rw-r--r-- 1 samt samt 734716 2007-05-30 14:47 00006444.jpg
-rw-r--r-- 1 samt samt 5064 2007-05-30 14:47 00007880.jpg
-rw-r--r-- 1 samt samt 707892 2007-05-30 14:47 00007891.jpg
-rw-r--r-- 1 samt samt 4973 2007-05-30 14:47 00009274.jpg
-rw-r--r-- 1 samt samt 672318 2007-05-30 14:47 00009284.jpg
-rw-r--r-- 1 samt samt 4854 2007-05-30 14:47 00010598.jpg
-rw-r--r-- 1 samt samt 645537 2007-05-30 14:47 00010608.jpg
-rw-r--r-- 1 samt samt 4784 2007-05-30 14:47 00011870.jpg
-rw-r--r-- 1 samt samt 542300 2007-05-30 14:47 00011879.jpg
-rw-r--r-- 1 samt samt 4081 2007-05-30 14:47 00012939.jpg
-rw-r--r-- 1 samt samt 662687 2007-05-30 14:47 00012948.jpg
-rw-r--r-- 1 samt samt 4416 2007-05-30 14:47 00014243.jpg
-rw-r--r-- 1 samt samt 623235 2007-05-30 14:47 00014252.jpg
-rw-r--r-- 1 samt samt 5299 2007-05-30 14:47 00015470.jpg
-rw-r--r-- 1 samt samt 688888 2007-05-30 14:47 00015481.jpg
-rw-r--r-- 1 samt samt 4436 2007-05-30 14:47 00016827.jpg
-rw-r--r-- 1 samt samt 678824 2007-05-30 14:47 00016836.jpg
-rw-r--r-- 1 samt samt 4619 2007-05-30 14:47 00018163.jpg
./multipage2/ole:
total 8
-rw-r--r-- 1 samt samt 5632 2007-05-30 14:47 00018172.ole
I don't know what the sequencing issues are with the file names, but it seems obvious that the larger files will be the full image, with one of the smaller files being a thumbnail of the same (presumably the nearest higher order number.)
Unix: Automating extraction and viewability
In a comment to Michael R. Head's article, typhoncore writes a nice bash script that uses ImageMagick's 'convert' utility and pdftk to create a multipage PDF file from the larger images. It is listed here with a few minor modifications I have inserted (for better or worse.)
#!/bin/bash
DOC_COUNT=0
arg1=$1
arg_out=$arg1.out
echo "Extracting Images from $arg1 using foremost to $arg_out"
foremost -i $arg1 -o $arg_out
echo "Done"
cd $arg_out/jpg
echo "Converting Single Images to PDF"
for i in $(ls *.jpg); do
ODDEVEN=$(echo "scale=0; $DOC_COUNT % 2" | bc)
if [ "$ODDEVEN" = "0" ] ; then
echo -n " > $i to $i.pdf"
convert $i $i.pdf
echo " - done"
fi
DOC_COUNT=$(echo "scale=0; $DOC_COUNT + 1" | bc)
done
echo -n "Merging separate single page PDF's to a multipage PDF"
pdftk *.pdf cat output merged.pdf
mv merged.pdf ../../$arg1.pdf
echo " - done"
cd ../..
echo -n "Removing temporary directory $arg_out"
rm -Rf $arg_out
echo " - done"
The bastardisation of typhoncore's script is to add console progress indicators (and as additional documentation within the script) for us noobs.
Output of the script will look something like the below.
$ sh TIFFtoPDF.sh multipage.tif
Extracting Images from multipage.tif using foremost to multipage.tif.out
Processing: multipage.tif
|*|
Done
Converting Single Images to PDF
> 00000000.jpg to 00000000.jpg.pdf - done
> 00000545.jpg to 00000545.jpg.pdf - done
> 00000937.jpg to 00000937.jpg.pdf - done
> 00001543.jpg to 00001543.jpg.pdf - done
> 00002127.jpg to 00002127.jpg.pdf - done
Merging separate single page PDF's to a multipage PDF - done
Removing temporary directory multipage.tif.out - done
$
Unix: GNOME GUIfying extraction and viewability
I was thinking what could be a registry hack (Windows Hat on) or other means to let the File Explorer in X Windows (later discovering it is called GNOME Nautilus) send TIFF files to the above script when I came across a solution for separate but related problem Mount and UnMount ISO images without burning them.
That lead me to a rehacked whack of the above TIFFtoPDF.sh that can be placed in your ~/username/.gnome2/nautilus-scripts/ folder.
Read Nautilus File Manager Scripts : Questions and Answers for more details on how to get the below script working properly with Nautilus.
#!/bin/bash
# mount
BASENAME=`basename $NAUTILUS_SCRIPT_SELECTED_FILE_PATHS`
DOC_COUNT=0
INFILE=$BASENAME
OUTPUT=$INFILE.odir
if ! zenity --question --title "Convert MS TIFF file to Multipage PDF"
--text "Do you wish to Convert the MS TIFF $BASENAME to a Multipage PDF?"
then
exit 0
fi
foremost -i $INFILE -o $OUTPUT
cd $OUTPUT/jpg
for i in $(ls *.jpg); do
ODDEVEN=$(echo "scale=0; $DOC_COUNT % 2" | bc)
if [ "$ODDEVEN" = "0" ] ; then
convert $i $i.pdf
fi
DOC_COUNT=$(echo "scale=0; $DOC_COUNT + 1" | bc)
done
pdftk *.pdf cat output merged.pdf
mv merged.pdf ../../$INFILE.pdf
cd ../..
rm -Rf $OUTPUT
The bare essentials for getting the above script working in GNOME Nautilus is:
1. Put the script in ~/username/.gnome2/nautilus-scripts/
2. Make the script executable
3. Visit the directory using GNOME Nautilus
Conclusion
There is no going to Ubuntu/Linux or any other variant of Unix/BSD until this image viewing problem can find a simpler solution for these guys.
Funny how for the big ticket items we were eventually able to find good alternate solutions, but things fell over with this simple yet insurmountable problem.
Microsoft Outlook 2003 --> now using Thunderbird 2.0.x
Microsoft Word 2003 --> we have been testing Open Office 2.2 Write
Microsoft Excel 2003 --> we have been testing Open Office 2.2 Calc
Microsoft Access 2003 --> not currently using, no need for an alternative
Microsoft Publisher 2003 --> infrequent use, although testing scribus
Printing --> CUPS with Vendor Linux Drivers
Scanning --> XSane with Vendor Linux Drivers
Accounting Software --> Not currently using one, but looking around
For my own desktop needs, I'm still an XP man and will probably go to Vista with my next machine, as that will definitely be a TabletPC, but there's plenty of cheap Pentium IV's on www.ebay.com.au so I'm getting an X Windows (Gnome/KDE) up for some of the kid's fun and gaming (defining anything they enjoy as play.)
The sledge-hammer solution would be to run a mail server that would parse incoming emails for TIFF files and automatically detect/convert multipage files from TIFF to PDF. If this was a do or die situation I would probably work on it, as it is, it will have to wait for another day/solution.
References
Michael R. Head's Handling Microsoft Office Document Scanning TNEF and TIFFs in Linux
typhonecore Multipage TIFF to Multipage PDF script
DRAFT TIFF Technical Note #2
Adobe Photoshop TIFF Technical Notes (PDF)
Monday, 24 November 2008
Wednesday, 19 November 2008
Online photo edit
photoshop.com/express
FotoFlexer.com
Picnik.com
lunapic.com
aviary.com
picture2life.com
Pixenate.com
snipshot.com
FotoFlexer.com
Picnik.com
lunapic.com
aviary.com
picture2life.com
Pixenate.com
snipshot.com
Tuesday, 28 October 2008
How to fix black windows during video playback
How to fix black windows during video playback
* There is a workaround to this bug by changing the video output device on your video player to x11/xshm. (Note that this will decrease the quality of the video output and requires a lot more CPU.)
* For gstreamer-dependent players (Totem, etc.):
gstreamer-properties
Video-->Default Video Plugin: X Window System (No Xv)
Click Test to verify that video playback is working (you should be able to see the standard TV testing colour stripes).
* For VLC player(if installed):
VLC-->Settings-->Preferences
Video-->Output modules-->Advanced: X11
* For MPlayer (if installed):
Mplayer-->Right-click on the screen-->Preferences
Video-->Available Drivers: X11 (XImage/Shm)
Some users report that MPlayer may not be able to show videos in full screen.
* For Xine player (if installed):
Xine-->File-->Configure-->Preferences
experience_level: Master Of The Known Universe
Video-->Driver: xshm
* For RealPlayer (if installed):
RealPlayer-->Tools-->Preferences
Hardware-->Deselect: Use XVideo
* There is a workaround to this bug by changing the video output device on your video player to x11/xshm. (Note that this will decrease the quality of the video output and requires a lot more CPU.)
* For gstreamer-dependent players (Totem, etc.):
gstreamer-properties
Video-->Default Video Plugin: X Window System (No Xv)
Click Test to verify that video playback is working (you should be able to see the standard TV testing colour stripes).
* For VLC player(if installed):
VLC-->Settings-->Preferences
Video-->Output modules-->Advanced: X11
* For MPlayer (if installed):
Mplayer-->Right-click on the screen-->Preferences
Video-->Available Drivers: X11 (XImage/Shm)
Some users report that MPlayer may not be able to show videos in full screen.
* For Xine player (if installed):
Xine-->File-->Configure-->Preferences
experience_level: Master Of The Known Universe
Video-->Driver: xshm
* For RealPlayer (if installed):
RealPlayer-->Tools-->Preferences
Hardware-->Deselect: Use XVideo
Monday, 27 October 2008
Increase vmware harddisk size
vmware-vdiskmanager -x 10GB myDisk.vmdk
10GB: change to your new size
myDisk.vmdk: change to your harddisk file
Then use partitioning tools to resize your partition.
10GB: change to your new size
myDisk.vmdk: change to your harddisk file
Then use partitioning tools to resize your partition.
Friday, 17 October 2008
Enable bluetooth on Hp nx6320 with Ubuntu Hardy
-Remove bluez-utils & gnome-bluetooth packages
-Edit source.list to add the repository : deb http://archive.ubuntu.com/ubuntu gutsy main
-Disable all other repositories
-Install bluez-utils. You may need to remove bluez-audio if conflict occurs
-Enable other repos and disable the one on step 2.
-Edit source.list to add the repository : deb http://archive.ubuntu.com/ubuntu gutsy main
-Disable all other repositories
-Install bluez-utils. You may need to remove bluez-audio if conflict occurs
-Enable other repos and disable the one on step 2.
Thursday, 16 October 2008
Installing Metasploit on Ubuntu/Kubuntu/Debian Linux
SOURCE:
http://www.metasploit.com/dev/trac/wiki/Metasploit3/InstallUbuntu
At this time, no package exists for Metasploit 3. In order to use the Metasploit Framework on Ubuntu or Debian distributions of Linux, the following packages need to be installed:
# apt-get install ruby libruby rdoc libyaml-ruby libzlib-ruby libopenssl-ruby libdl-ruby libreadline-ruby libiconv-ruby rubygems
*The RubyGems package may need to be manually downloaded and installed.
If you would like to use the experimental GUI, you will need to install the following packages:
# apt-get install libgtk2-ruby libglade2-ruby
If you would like to use the online update feature, you will need to install the "subversion" package as well. Once the pre-requisites have been installed, download the Unix tarball from Framework Website and extract it to the directory of your choice. If everything was installed correctly, execute the interface of your choice to get started (msfconsole, msfweb, etc).
http://www.metasploit.com/dev/trac/wiki/Metasploit3/InstallUbuntu
At this time, no package exists for Metasploit 3. In order to use the Metasploit Framework on Ubuntu or Debian distributions of Linux, the following packages need to be installed:
# apt-get install ruby libruby rdoc libyaml-ruby libzlib-ruby libopenssl-ruby libdl-ruby libreadline-ruby libiconv-ruby rubygems
*The RubyGems package may need to be manually downloaded and installed.
If you would like to use the experimental GUI, you will need to install the following packages:
# apt-get install libgtk2-ruby libglade2-ruby
If you would like to use the online update feature, you will need to install the "subversion" package as well. Once the pre-requisites have been installed, download the Unix tarball from Framework Website and extract it to the directory of your choice. If everything was installed correctly, execute the interface of your choice to get started (msfconsole, msfweb, etc).
Wednesday, 15 October 2008
Dell Optiplex 330 won't reboot or shutdown
Solution: add the kernel option "reboot=b" in the menu.lst
Sunday, 28 September 2008
Problem with HAL
source:http://www.teknopipo.nl/telco/files/tag-ubuntu.html
=================================
HAL bug in Ubuntu
18/05/08 18:50 Filed in: network configuration
This weekend I finally pulled myself together and upgraded my home server to Ubuntu 8.04, also known as Hardy Hudson. After a seemingly painless upgrade process, I rebooted and logged in, and the system presented me with the following error message:
Internal error: HAL Failed to initialize
Annoying as this message may be, the biggest problem was that Hardy would no longer mount any of my external drives. After nosing around on the web, I've seen several suggested solutions, varying from tweaking etc/init.d scripts, reconfiguring HAL to completely reinstalling Ubuntu. The problem also occurs on earlier kernels. If I had to guess, I'd say the error is somehow related to the problems I've been having with an external USB drive from Freecom (400GB). Basicly I've been repartitioning and reformatting that thing in every format imaginable, but I can't seem to get it to behave properly... HAL means Hardware Abstraction Layer, and most people I've seen reporting the above error have some kind of issue with a faulty DVD drive that fails to mount, for example.
Of course the first thing I tried was to remove the external USB drive and reboot to see if that solved anything, and it didn't. Maybe my buggy drive messed up some configuration file or something, so I then tried the suggested solution to reinstall HAL which seemed to solve the problem to some extent. I no longer got the error, but my desktop failed to initialize properly, I was just getting a blank screen and a task bar. And after a reboot the error was back again, so not much luck there.
Another suggested solution was to sudo mkdir /var/run/PolicyKit, whatever the hell that means. I checked to see if that dir was there, and it was, so no need to run the mkdir.... but what I did notice, was that its ownership was set to polkituser:polkituser. After typing groups in a terminal, I noticed that my userid was not in the polkituser group, so I figured that was the problem. And it was. After I typed...
sudo usermod -a -G polkituser [myuserid]
...I relogged in and everything was working flawlessly. Don't forget the -a option or you'll fuck up your system. Out.
===================
https://bugs.launchpad.net/ubuntu/+source/linux-ubuntu-modules-2.6.24/+bug/212271
http://www.uluga.ubuntuforums.org/showthread.php?t=365442&page=3
===============
SOURCE:
http://www.danielhardy.com/blog/making-friends-with-hal/
As of late I have been having some trouble with HAL(Hardware Abstraction Layer). I
finally found the solution and decided I would post it here in case anyone else my need it. The symptoms of this problem are simple. When Gnome boots up you get an error stating “failed to initialize HAL”. There are many problems that can cause this error but the one that I keep running into was tricky to find but extremely easy to resolve.
It boils down to a boot order issue where dbus and HAL are scheduled to boot at the same time. The problem with this is that often HAL requires dbus to be up and running. To figure out if this is the specific cause you can take a look at the /etc/rc2.d/ folder. You simply want to make sure HAL’s three digit prefix comes after dbus’s. For example “S12dbus” followed by “S13hal”. If it doesn’t simply execute something like the following command in the terminal. Make sure you change it to match your system.
sudo mv /etc/rc2.d/S12hal /etc/rc2.d/S13hal
If you have ran into this problem I hope this will help you get it fixed.
=================================
HAL bug in Ubuntu
18/05/08 18:50 Filed in: network configuration
This weekend I finally pulled myself together and upgraded my home server to Ubuntu 8.04, also known as Hardy Hudson. After a seemingly painless upgrade process, I rebooted and logged in, and the system presented me with the following error message:
Internal error: HAL Failed to initialize
Annoying as this message may be, the biggest problem was that Hardy would no longer mount any of my external drives. After nosing around on the web, I've seen several suggested solutions, varying from tweaking etc/init.d scripts, reconfiguring HAL to completely reinstalling Ubuntu. The problem also occurs on earlier kernels. If I had to guess, I'd say the error is somehow related to the problems I've been having with an external USB drive from Freecom (400GB). Basicly I've been repartitioning and reformatting that thing in every format imaginable, but I can't seem to get it to behave properly... HAL means Hardware Abstraction Layer, and most people I've seen reporting the above error have some kind of issue with a faulty DVD drive that fails to mount, for example.
Of course the first thing I tried was to remove the external USB drive and reboot to see if that solved anything, and it didn't. Maybe my buggy drive messed up some configuration file or something, so I then tried the suggested solution to reinstall HAL which seemed to solve the problem to some extent. I no longer got the error, but my desktop failed to initialize properly, I was just getting a blank screen and a task bar. And after a reboot the error was back again, so not much luck there.
Another suggested solution was to sudo mkdir /var/run/PolicyKit, whatever the hell that means. I checked to see if that dir was there, and it was, so no need to run the mkdir.... but what I did notice, was that its ownership was set to polkituser:polkituser. After typing groups in a terminal, I noticed that my userid was not in the polkituser group, so I figured that was the problem. And it was. After I typed...
sudo usermod -a -G polkituser [myuserid]
...I relogged in and everything was working flawlessly. Don't forget the -a option or you'll fuck up your system. Out.
===================
https://bugs.launchpad.net/ubuntu/+source/linux-ubuntu-modules-2.6.24/+bug/212271
http://www.uluga.ubuntuforums.org/showthread.php?t=365442&page=3
===============
SOURCE:
http://www.danielhardy.com/blog/making-friends-with-hal/
As of late I have been having some trouble with HAL(Hardware Abstraction Layer). I
finally found the solution and decided I would post it here in case anyone else my need it. The symptoms of this problem are simple. When Gnome boots up you get an error stating “failed to initialize HAL”. There are many problems that can cause this error but the one that I keep running into was tricky to find but extremely easy to resolve.
It boils down to a boot order issue where dbus and HAL are scheduled to boot at the same time. The problem with this is that often HAL requires dbus to be up and running. To figure out if this is the specific cause you can take a look at the /etc/rc2.d/ folder. You simply want to make sure HAL’s three digit prefix comes after dbus’s. For example “S12dbus” followed by “S13hal”. If it doesn’t simply execute something like the following command in the terminal. Make sure you change it to match your system.
sudo mv /etc/rc2.d/S12hal /etc/rc2.d/S13hal
If you have ran into this problem I hope this will help you get it fixed.
Thursday, 25 September 2008
How to join Ubuntu/Samba to a Windows 2003 Active Directory domain
SOURCE: http://www.onnoot.com/wiki/how_to_join_ubuntu_samba_to_a_windows_2003_active_directory_domain
==================
How to join Ubuntu/Samba to a Windows 2003 Active Directory domain
Ingredients:
*
A Windows network with an Active Directory server (like Windows Server 2003)
*
Ubuntu Linux 5.10 installed
*
TCP/IP setup properly (the Linux machine taking its address by DHCP from the Windows server)
*
No firewall yet on the Linux machine! First get it working, then secure it.
More info:
*
http://us1.samba.org/samba/docs/man/Samba-HOWTO-Collection/domain-member.html
*
http://justlinux.com/forum/archive/index.php/t-118512.html
1. Installing
We assume that Ubuntu Linux has been installed.
Install the following packages with the Synaptic Package Manager. You may need to specify “universe” as an extra source for packages.
*
Samba (version 3):
o
samba
o
samba-common (installed by default)
o
smbclient (installed by default)
o
winbind
*
Kerberos:
o
krb5-config
o
krb5-user
*
... and any packages that might be needed to meet dependencies.
2. Edit configuration files
Edit the following configuration files. We assume the following:
*
The local DNS domain is mycompany.local
*
The Windows 2003 server is obelix.mycompany.local
/etc/samba/smb.conf
[global]
security = ADS
realm = MYCOMPANY.LOCAL
workgroup = mycompany
password server = obelix.mycompany.local
wins support = no
wins server = 10.0.20.202
invalid users = root
# Winbind settings
idmap uid = 10000-20000
idmap gid = 10000-20000
# For testing
debuglevel = 2
# A shared folder for testing purposes
[SharedFolder]
path = /home/onno2/Shared_Folder
available = yes
public = yes
writable = yes
force create mode = 0666
force directory mode = 0777
Make sure the path (/home/onno2/Shared_Folder or whatever you choose) exists and that the rights are set properly (chmod 777 or something similar)
/etc/krb5.conf
[libdefaults]
default_realm = MYCOMPANY.LOCAL
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
# The following libdefaults parameters are only for Heimdal Kerberos.
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
something = something-else
}
}
[realms]
MYCOMPANY.LOCAL = {
kdc = obelix.mycompany.local
admin_server = obelix.mycompany.local
}
[domain_realm]
.mycompany.local = OBELIX.MYCOMPANY.LOCAL
mycompany.local = OBELIX.MYCOMPANY.LOCAL
[login]
krb4_convert = true
krb4_get_tickets = true
/etc/nsswitch
The only change here was adding winbind twice.
# /etc/nsswitch.conf
#
# Example configuration of GNU Name Service Switch functionality.
# If you have the `glibc-doc' and `info' packages installed, try:
# `info libc "Name Service Switch"' for information about this file.
passwd: compat winbind
group: compat winbind
shadow: compat
hosts: files dns
networks: files
protocols: db files
services: db files
ethers: db files
rpc: db files
netgroup: nis
3. Start or restart services
/etc/init.d/samba restart
/etc/init.d/winbind restart
4. Join domain
net ads join -U administrator If this doesn’t work, check the logs in Linux (/var/log/samba/*) and Windows.
5. Test your setup
testparm to check if your smb.conf has a correct syntax.
kinit onno@MYCOMPANY.LOCAL test if kerberos works properly.
wbinfo -u should give a list of users.
wbinfo -g should give a list of groups.
getent passwd should give a list of users in the passwd style.
getent group should give a list of groups.
ls -ltr /var/log/samba gives a list of log files, sorted by time of last change.
smbclient -L -U onno should give you a list of available shares.
If this all works properly, try to access the share (/home/onno2/Shared_Folder) from any Windows machine in the domain by using network neighbourhood
==================
How to join Ubuntu/Samba to a Windows 2003 Active Directory domain
Ingredients:
*
A Windows network with an Active Directory server (like Windows Server 2003)
*
Ubuntu Linux 5.10 installed
*
TCP/IP setup properly (the Linux machine taking its address by DHCP from the Windows server)
*
No firewall yet on the Linux machine! First get it working, then secure it.
More info:
*
http://us1.samba.org/samba/docs/man/Samba-HOWTO-Collection/domain-member.html
*
http://justlinux.com/forum/archive/index.php/t-118512.html
1. Installing
We assume that Ubuntu Linux has been installed.
Install the following packages with the Synaptic Package Manager. You may need to specify “universe” as an extra source for packages.
*
Samba (version 3):
o
samba
o
samba-common (installed by default)
o
smbclient (installed by default)
o
winbind
*
Kerberos:
o
krb5-config
o
krb5-user
*
... and any packages that might be needed to meet dependencies.
2. Edit configuration files
Edit the following configuration files. We assume the following:
*
The local DNS domain is mycompany.local
*
The Windows 2003 server is obelix.mycompany.local
/etc/samba/smb.conf
[global]
security = ADS
realm = MYCOMPANY.LOCAL
workgroup = mycompany
password server = obelix.mycompany.local
wins support = no
wins server = 10.0.20.202
invalid users = root
# Winbind settings
idmap uid = 10000-20000
idmap gid = 10000-20000
# For testing
debuglevel = 2
# A shared folder for testing purposes
[SharedFolder]
path = /home/onno2/Shared_Folder
available = yes
public = yes
writable = yes
force create mode = 0666
force directory mode = 0777
Make sure the path (/home/onno2/Shared_Folder or whatever you choose) exists and that the rights are set properly (chmod 777
/etc/krb5.conf
[libdefaults]
default_realm = MYCOMPANY.LOCAL
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
# The following libdefaults parameters are only for Heimdal Kerberos.
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
something = something-else
}
}
[realms]
MYCOMPANY.LOCAL = {
kdc = obelix.mycompany.local
admin_server = obelix.mycompany.local
}
[domain_realm]
.mycompany.local = OBELIX.MYCOMPANY.LOCAL
mycompany.local = OBELIX.MYCOMPANY.LOCAL
[login]
krb4_convert = true
krb4_get_tickets = true
/etc/nsswitch
The only change here was adding winbind twice.
# /etc/nsswitch.conf
#
# Example configuration of GNU Name Service Switch functionality.
# If you have the `glibc-doc' and `info' packages installed, try:
# `info libc "Name Service Switch"' for information about this file.
passwd: compat winbind
group: compat winbind
shadow: compat
hosts: files dns
networks: files
protocols: db files
services: db files
ethers: db files
rpc: db files
netgroup: nis
3. Start or restart services
/etc/init.d/samba restart
/etc/init.d/winbind restart
4. Join domain
net ads join -U administrator If this doesn’t work, check the logs in Linux (/var/log/samba/*) and Windows.
5. Test your setup
testparm to check if your smb.conf has a correct syntax.
kinit onno@MYCOMPANY.LOCAL test if kerberos works properly.
wbinfo -u should give a list of users.
wbinfo -g should give a list of groups.
getent passwd should give a list of users in the passwd style.
getent group should give a list of groups.
ls -ltr /var/log/samba gives a list of log files, sorted by time of last change.
smbclient -L
If this all works properly, try to access the share (/home/onno2/Shared_Folder) from any Windows machine in the domain by using network neighbourhood
Tuesday, 23 September 2008
Enabling USB support for VMware Server in Hardy Heron
SOURCE: http://maketecheasier.com/enabling-usb-support-for-vmware-server-in-hardy-heron/2008/05/05
===============================================
After installing VMware Server on Hardy heron, if you find that your virtual machine cannot detect any USB devices on the host, that is because Ubuntu has removed the support for /proc/bus/usb/*.
The following is the way to solve this issue:
Open up a terminal and type
gksu gedit /etc/init.d/mountdevsubfs.sh
In the window that pop up, scroll to line 40 and look for the following code:
#mkdir -p /dev/bus/usb/.usbfs
#domount usbfs "" /dev/bus/usb/.usbfs -obusmode=0700,devmode=0600,listmode=0644
#ln -s .usbfs/devices /dev/bus/usb/devices
#mount --rbind /dev/bus/usb /proc/bus/usb
Uncomment them by removing the ‘#’ infront of each line of the code.
Save and exit.
Restart the module
/etc/init.d/mountdevsubfs.sh start
Done. Your virtual machine should be able to detect USB device now.
---------
===============================================
After installing VMware Server on Hardy heron, if you find that your virtual machine cannot detect any USB devices on the host, that is because Ubuntu has removed the support for /proc/bus/usb/*.
The following is the way to solve this issue:
Open up a terminal and type
gksu gedit /etc/init.d/mountdevsubfs.sh
In the window that pop up, scroll to line 40 and look for the following code:
#mkdir -p /dev/bus/usb/.usbfs
#domount usbfs "" /dev/bus/usb/.usbfs -obusmode=0700,devmode=0600,listmode=0644
#ln -s .usbfs/devices /dev/bus/usb/devices
#mount --rbind /dev/bus/usb /proc/bus/usb
Uncomment them by removing the ‘#’ infront of each line of the code.
Save and exit.
Restart the module
/etc/init.d/mountdevsubfs.sh start
Done. Your virtual machine should be able to detect USB device now.
---------
Monday, 22 September 2008
WEB cracking with Intel 3945abg
-Download and install aircrack-ng rc1 (http://download.aircrack-ng.org/aircrack-ng-1.0-rc1.tar.gz)
-Download & install iw (http://www.aircrack-ng.org/doku.php?id=mac80211)
-Download compat wireless driver here (http://linuxwireless.org/download/compat-wireless-2.6/compat-wireless-old.tar.bz2)
-Test if your wireless card support injection ("aireplay-ng --test")
-Download & install iw (http://www.aircrack-ng.org/doku.php?id=mac80211)
-Download compat wireless driver here (http://linuxwireless.org/download/compat-wireless-2.6/compat-wireless-old.tar.bz2)
-Test if your wireless card support injection ("aireplay-ng --test
Friday, 19 September 2008
Wireless driver for Intel 3945abg on wireless cracking
http://wireless.kernel.org/download/compat-wireless-2.6/compat-wireless-old.tar.bz2
Note: it is working on the hp nx6320.
Note: it is working on the hp nx6320.
Thursday, 18 September 2008
Cannot power on Vmware machine
when the guest system is on an ntfs Hd partition, it can't be powered on.
Solution:
Set "mainMem.useNamedFile=FALSE" in the .vmx file
Solution:
Set "mainMem.useNamedFile=FALSE" in the .vmx file
Monday, 15 September 2008
Error when executing lvcreate: "/proc/misc: No entry for device-mapper found"
hen I opened the error, and at the top it said
/proc/misc: No entry for device-mapper found
Is device-mapper driver missing from kernel?
Failure to communicate with kernel device-mapper driver.
/proc/misc: No entry for device-mapper found
Is device-mapper driver missing from kernel?
Failure to communicate with kernel device-mapper driver.
Remember to load the modules into the kernel.
$ sudo modprobe dm_snapshot
$ sudo modprobe dm_mirror
$ sudo modprobe dm_crypt
/proc/misc: No entry for device-mapper found
Is device-mapper driver missing from kernel?
Failure to communicate with kernel device-mapper driver.
/proc/misc: No entry for device-mapper found
Is device-mapper driver missing from kernel?
Failure to communicate with kernel device-mapper driver.
Remember to load the modules into the kernel.
$ sudo modprobe dm_snapshot
$ sudo modprobe dm_mirror
$ sudo modprobe dm_crypt
Backup partition table
Copying Partition Tables with sfdisk
To backup or replicate a disk’s partition table, use sfdisk:
$ sudo sfdisk –d /dev/sda > sda-table Back up partition table to file
$ sudo sfdisk /dev/sda < sda-table Restore partition table from file
$ sudo sfdisk –d /dev/sda | sfdisk /dev/sdb Copy partition table from disk to disk
To backup or replicate a disk’s partition table, use sfdisk:
$ sudo sfdisk –d /dev/sda > sda-table Back up partition table to file
$ sudo sfdisk /dev/sda < sda-table Restore partition table from file
$ sudo sfdisk –d /dev/sda | sfdisk /dev/sdb Copy partition table from disk to disk
Friday, 12 September 2008
Thursday, 11 September 2008
Install Logitech Quickcam Pro for Notebook
For Hardy (Ubuntu-8.04) and Gutsy (Ubuntu-7.10)
Code:
sudo apt-get install subversion build-essential linux-headers-$(uname -r) &&
svn checkout svn://svn.berlios.de/linux-uvc/linux-uvc/trunk &&
cd trunk &&
make &&
sudo cp -av /lib/modules/$(uname -r)/ubuntu/media/usbvideo/uvcvideo.ko /lib/modules &&
sudo install -v -m644 uvcvideo.ko /lib/modules/$(uname -r)/ubuntu/media/usbvideo/uvcvideo.ko &&
sudo depmod -ae $(uname -r)
REBOOT
--------------
SOURCE: http://ubuntuforums.org/showthread.php?t=593231
Code:
sudo apt-get install subversion build-essential linux-headers-$(uname -r) &&
svn checkout svn://svn.berlios.de/linux-uvc/linux-uvc/trunk &&
cd trunk &&
make &&
sudo cp -av /lib/modules/$(uname -r)/ubuntu/media/usbvideo/uvcvideo.ko /lib/modules &&
sudo install -v -m644 uvcvideo.ko /lib/modules/$(uname -r)/ubuntu/media/usbvideo/uvcvideo.ko &&
sudo depmod -ae $(uname -r)
REBOOT
--------------
SOURCE: http://ubuntuforums.org/showthread.php?t=593231
Tuesday, 9 September 2008
Installing Metasploit
Installing Metasploit
Before installing metasploit we need to install the following packages:
$ sudo apt-get install ruby libruby rdoc
$ sudo apt-get install libyaml-ruby
$ sudo apt-get install libzlib-ruby
$ sudo apt-get install libopenssl-ruby
$ sudo apt-get install libdl-ruby
$ sudo apt-get install libreadline-ruby
$ sudo apt-get install libiconv-ruby
$ sudo apt-get install rubygems
Once the dependencies have been installed, we are ready to install metasploit.
We now need to download the metasploit 3.0. Use the following link for download:
http://framework.metasploit.com/msf/downloader/?id=framework-3.0.tar.gz
Accept the license.
The location (for download) is not important. After the download is complete we need to untar it:
$ tar -xvzf framework-3.0.tar.gz
Updating Metasploit
Before we run metasploit, its a good idea to update its database. Change to metasploit folder:
$ cd metasploit-3.0
Update:
$ svn update
Note: in case you don't have subversion installed use the following command:
$ sudo apt-get install subversion
Running Metasploit
To run metasploit use the following command:
$ ./msfconsole
Before installing metasploit we need to install the following packages:
$ sudo apt-get install ruby libruby rdoc
$ sudo apt-get install libyaml-ruby
$ sudo apt-get install libzlib-ruby
$ sudo apt-get install libopenssl-ruby
$ sudo apt-get install libdl-ruby
$ sudo apt-get install libreadline-ruby
$ sudo apt-get install libiconv-ruby
$ sudo apt-get install rubygems
Once the dependencies have been installed, we are ready to install metasploit.
We now need to download the metasploit 3.0. Use the following link for download:
http://framework.metasploit.com/msf/downloader/?id=framework-3.0.tar.gz
Accept the license.
The location (for download) is not important. After the download is complete we need to untar it:
$ tar -xvzf framework-3.0.tar.gz
Updating Metasploit
Before we run metasploit, its a good idea to update its database. Change to metasploit folder:
$ cd metasploit-3.0
Update:
$ svn update
Note: in case you don't have subversion installed use the following command:
$ sudo apt-get install subversion
Running Metasploit
To run metasploit use the following command:
$ ./msfconsole
Friday, 5 September 2008
How to VMWare Server 1.0.6 and 2.0 RC1 in Ubuntu 8.04
http://ubuntuforums.org/showthread.php?t=779934
http://www.salatti.net/how-to-vmware-server-106-on-ubuntu-hardy-step-by-step/
http://www.salatti.net/how-to-vmware-server-106-on-ubuntu-hardy-step-by-step/
Thursday, 4 September 2008
Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)
Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)
September 27, 2006 at 20:22 · Tags: Crack, d-link, hack, linksys, Linux, OSX, security, Vista, WEP, Windows, wireless networking, xp
Aircrack-ng logo
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping. Wikipedia
It’s fairly easy to crack a WEP encrypted wireless network. Infact the WEP encryption has some serious flaws in its design, flaws that make it easy and fast to crack or hack.
Install aircrack-ng - on Debian Etch by:
sudo apt-get install aircrack-ng
Then start aircrack-ng to look for wireless networks:
sudo airodump-ng eth1
Then notice the channel number of the wireless network you want to crack.
Quit aircrack-ng and start it again with med specific channel number to collect packages faster:
sudo airodump-ng -c 4 -w dump eth1
Then wait and let it collect about 500K IVS and the try the do the actual crack:
sudo aircrack-ng -b 0a:0b:0c:0d:0e:0f dump-01.cap
The MAC after the -b option is the BSSID of the target and dump-01.cap the file containing the captured packets.
September 27, 2006 at 20:22 · Tags: Crack, d-link, hack, linksys, Linux, OSX, security, Vista, WEP, Windows, wireless networking, xp
Aircrack-ng logo
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping. Wikipedia
It’s fairly easy to crack a WEP encrypted wireless network. Infact the WEP encryption has some serious flaws in its design, flaws that make it easy and fast to crack or hack.
Install aircrack-ng - on Debian Etch by:
sudo apt-get install aircrack-ng
Then start aircrack-ng to look for wireless networks:
sudo airodump-ng eth1
Then notice the channel number of the wireless network you want to crack.
Quit aircrack-ng and start it again with med specific channel number to collect packages faster:
sudo airodump-ng -c 4 -w dump eth1
Then wait and let it collect about 500K IVS and the try the do the actual crack:
sudo aircrack-ng -b 0a:0b:0c:0d:0e:0f dump-01.cap
The MAC after the -b option is the BSSID of the target and dump-01.cap the file containing the captured packets.
HACKING COMMUNITIES:
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
1 of 19 08/22/2008 06:05 PM
http://www.tgs-security.com
http://www.anomalous-security.org
http://www.governmentsecurity.org
http://www.brain-hack .org
http://www.hack erscenter.com/
http://www.houseofmaveric.com
http://www.cheatforums.tk
http://www.warindustries.com
http://www.humptyhump.com/index.php
TROJANING COMMUNITIES:
http://www.cruel-intentionz.com
http://www.evileyesoftware.com
http://www.nak edcrew.net
http://newbielair.baselair.com
http://www.plexusataxia.net/bbs/
http://evileyesoftware.com/forums/
http://nak edcrew.net/mboard//index.php
http://mosuck er.net
http://www.opensc.ws/
http://chasenet.org/community/
http://illmob.org
http://j3n7il.net/forum/index.php
http://lithiumrat.org/forums/
http://www.lommage.co.uk
http://www.elitec0ders.net/forum/
http://www.immortal-hack ers.com
http://www.critical-zone.com/
http://www.nuclearwinter.us/
http://nuclearwinter.mirrorz.com/
http://www.iamaphex.org/forums/
http://ilusion-free.com/
http://www.elitest.info/forums
http://www.cruel-intentionz.info/
http://ucc.elfnet.org/forum.php
http://gateofgod.com/forums
http://sinred.com/forums
http://digerati.sinred.com/forums/
http://euyulio.org/forums
http://www.censorednet.org/ipb/
NEED COMPUTER HELP? GO HERE: (One of my favorite sites)
http://forums.techguy.org
Just look at the statistics for the site:
Code: Select all
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
2 of 19 08/22/2008 06:05 PM
Threads: 321,134, Posts: 2,444,064, Members: 176,961
It's huge, your questions get answered within minutes.
http://www.securibox.net/phpBB2/portal.php
PROXIES:
http://www.proxysk y.com
http://www.samair.ru/xwww/proxy.htm
http://www.quickproxy.tk
http://www.onlinecheck er.freeproxy.ru/f ... _lists.php (small list, but updated every
hour, usually good proxies)
HACKING:
http://www.insecure.org (home of Nmap)
http://www.luck y-web.net
http://www.net-security.org
http://nouse.sytes.net/webdeface.html
http://nouse.sytes.net/computerhack ing.html
http://www.infosyssec.org/infosyssec/hackhow1.htm
http://whitehats.com/library/internic/index.html
http://www.sir.com/academics/gibbs/stud ... /guhl.html
LINUX:
http://www.userfriendly.org
http://www.linuxjournal.com/
http://www.linuxiso.org
http://www.distrowatch.com
http://www.linux.org
http://www.linuxquestions.org
http://www.madpenguin.org
http://www.happypenguin.org (great site for Linux games, many include source code!)
http://www.tlm-project.org (shameless plug, sorry
http://www.linmodems.org
http://www.linuxant.com (connexant windmodem drivers for linux)
http://www.linuxpack ages.net
http://www.linuxsecurity.com
EXPLOITS:
http://www.hoobie.net/security/exploits
http://www.dmoz.org/Computers/Hack ing/Exploits
http://www.exploits.org
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
3 of 19 08/22/2008 06:05 PM
http://www.k -otik .com/exploits
TELNET:
http://www.elhalf.com/forge.txt
http://www.tip.net.au/tip/help/htelnet.htm
http://www.walthowe.com/navnet/faq/telnet.html
http://www.icsd.k12.ny.us/infotech/faq/telnet.html
http://www.hack erthreads.org/phpbb/viewtopic.php?t=724
http://chiark .greenend.org.uk /~sgtatham/putty/
ASSEMBLY:
http://www.xs4all.nl/~smit/asm01001.htm
http://www.geocities.com/SiliconValley/ ... les01.html
http://brain-hack .org/forum/viewtopic.php?t=92
http://www.hack erthreads.org/phpbb/viewtopic.php?t=790
ASSEMBLERS:
http://eurosport.ifrance.com/joss/asmz.htm
NETWORKING:
http://www.homenethelp.com/web/howto/HomeNet-start.asp
http://punch.engr.wisc.edu/~orchard/net-tutorial/
http://www.winncom.com/html/wireless.shtml
http://www.lantronix.com/learning/tutorials/
http://docs.rinet.ru/TCP-IP/
C++:
http://www.cplusplus.com/doc/tutorial/
http://www.ecst.csuchico.edu/~beej/guide/net/html/
http://www.hotscripts.com/Detailed/11707.html
http://www.mysteries-megasite.com/linux/tutorials.html
http://cprogramming.com
http://cboard.cprogramming.com
http://www.bloodshed.net/devcpp.html
http://www.carbonize.co.uk /Tutorials/Cpp/lesson_1.php
MISC PROGRAMMING LINKS:
http://tutorials.beginners.co.uk /integr ... /187/vs_p/
http://stommel.tamu.edu/~baum/programming.html
http://www.programmingtutorials.com/main.asp
http://www.freeprogrammingresources.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
4 of 19 08/22/2008 06:05 PM
http://www.vbtutor.net/vbtutor.html
http://plugin.laxmaniac/index.html
http://www.php.net
http://www.python.org
http://www.w3schools.com
http://www.osdir.com
http://www.angrycoder.com/
http://www.dotnetspider.com/
http://www.davesite.com/webstation/html/
http://devshed.com
http://forums.devshed.com
http://www.rohitab.com
SOFTWARE CRACKING/REVERSE ENGINEERING:
http://www.hnc3k .com/tutorialz.htm
http://www.hack erthreads.org/phpbb/viewtopic.php?t=757
http://www.t-gr.com/fotis/
BUFFER OVERFLOWS:
http://www.wbglink s.net/pages/reads/bofs/
http://www.elhalf.com/win32buffer.txt
NUMERAL RADIXES:
http://www.cplusplus.com/doc/papers/hex.html
HOW TO ASK QUESTIONS:
http://www.catb.org/~esr/faqs/smart-questions.html
http://nouse.united.net.kg/idiotguide.html
CUSTOM PCs, CASE MODS, OVERCLOCKING:
http://www.gruntville.com
http://www.infomaniak .it
http://www.CrazyPC.com
http://www.pctechtalk .com
http://www.extrememhz.com/
http://www.extrememhz.com/
http://www.extreme-modder.com/
http://www.maxitmag.co.uk /
http://www.kusanagiweb.com/
http://www.voidedwarranty.com/
http://www.comp-shop.com/
http://www.overclock ersworld.com/
http://www.twistedhardware.tk
http://www.xtremepccentral.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
5 of 19 08/22/2008 06:05 PM
http://www.pcsynapse.com/
http://www.subzerotech.com/index/
http://www.modsynergy.com/
http://www.casemodworld.com/
http://www.oc-zone.com/
http://www.techtastic.ca/
http://www.xcsystems.com/
http://www.mypcmadness.com/
http://www.cybercpu.net/
LINKS WITH MORE LINKS:
http://www.project-hack .org/tutorials.html
http://fux0r.phathookups.com/textfiles/ (A SHIT LOAD of text files, some really
interesting ones in there, covering a mass of subjects, check it)
http://www.beginningtoseethelight.org/
Actually it contains few topics but with adetailed discussion
"newbies will panic seeing this "
For Network ing , ccna , ccnp and windows network ing :
http://www.net130.com
its chineese , though you will find it so easy to deal with it contains various educational
media concerning ccna,ccnp,.....oracle for example i found this inside it :
http://www.net130.com/ccnp-labs/index.htm
http://iws.ccccd.edu/sbutler/
cisco educational ppt slides " ccna,ccnp,....." , its great .
http://www.petri.co.il/
Anothe amazing site talk ing about windows operating system, security and various
other topics .
http://www.windowsnetwork ing.com/
learn every thing about windows network ing many articles and amazing information .
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
6 of 19 08/22/2008 06:05 PM
For Hack ing and Security :
http://whoppix.hack ingdefined.com/index.php/Demos
Awonderfull movies explaining hack ing ,web crack ing and even sniffing remote traffic
.
I guess the whole site is simple and rather fine .
http://www.americasleastwanted.com
some good tutorials in electronics and phreak ing .
http://www.theargon.com
An amazing archive containing encryption tutorials , tools , source codes you will love
it .
For emails
http://www.mailnation.net/
1000 GBs email with various advantages for free .
http://www.yousendit.com/
send up to 1gb file to any email .
For guys who are fond of mak ing their live windows distribution and editing their own
distributions .
http://www.reatogo.de/Reatogo_Downloads.htm
http://www.nu2.nu/pebuilder/
http://www.xppe.com/
http://pcfreak s.big-clan.net/bartpe/pebuilder.shtml
For programmers
http://www.exhedra.com/exhedra/planetsourcecode/cd.aspx
http://www.planet-source-code.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
7 of 19 08/22/2008 06:05 PM
just choose alanguage and get many source codes for many projects this site is many
awards winning .
Who can live without book s ?!!!
http://www.blueportal.org
book s ............. many book s " needs registeration "
http://www.flashdance.cx/book s/
Hack ing Videos
===========
http://www.milw0rm.com/video/
http://www.forcehack er.com/videos.html
http://www.irongeek .com/i.php?page=secu ... llustrated
http://livesploit.com/resources.html
http://www.blackhat.com/html/bh-multime ... index.html
http://video.google.com/videosearch?hl= ... a=N&tab=wv
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
1 of 19 08/22/2008 06:05 PM
http://www.tgs-security.com
http://www.anomalous-security.org
http://www.governmentsecurity.org
http://www.brain-hack .org
http://www.hack erscenter.com/
http://www.houseofmaveric.com
http://www.cheatforums.tk
http://www.warindustries.com
http://www.humptyhump.com/index.php
TROJANING COMMUNITIES:
http://www.cruel-intentionz.com
http://www.evileyesoftware.com
http://www.nak edcrew.net
http://newbielair.baselair.com
http://www.plexusataxia.net/bbs/
http://evileyesoftware.com/forums/
http://nak edcrew.net/mboard//index.php
http://mosuck er.net
http://www.opensc.ws/
http://chasenet.org/community/
http://illmob.org
http://j3n7il.net/forum/index.php
http://lithiumrat.org/forums/
http://www.lommage.co.uk
http://www.elitec0ders.net/forum/
http://www.immortal-hack ers.com
http://www.critical-zone.com/
http://www.nuclearwinter.us/
http://nuclearwinter.mirrorz.com/
http://www.iamaphex.org/forums/
http://ilusion-free.com/
http://www.elitest.info/forums
http://www.cruel-intentionz.info/
http://ucc.elfnet.org/forum.php
http://gateofgod.com/forums
http://sinred.com/forums
http://digerati.sinred.com/forums/
http://euyulio.org/forums
http://www.censorednet.org/ipb/
NEED COMPUTER HELP? GO HERE: (One of my favorite sites)
http://forums.techguy.org
Just look at the statistics for the site:
Code: Select all
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
2 of 19 08/22/2008 06:05 PM
Threads: 321,134, Posts: 2,444,064, Members: 176,961
It's huge, your questions get answered within minutes.
http://www.securibox.net/phpBB2/portal.php
PROXIES:
http://www.proxysk y.com
http://www.samair.ru/xwww/proxy.htm
http://www.quickproxy.tk
http://www.onlinecheck er.freeproxy.ru/f ... _lists.php (small list, but updated every
hour, usually good proxies)
HACKING:
http://www.insecure.org (home of Nmap)
http://www.luck y-web.net
http://www.net-security.org
http://nouse.sytes.net/webdeface.html
http://nouse.sytes.net/computerhack ing.html
http://www.infosyssec.org/infosyssec/hackhow1.htm
http://whitehats.com/library/internic/index.html
http://www.sir.com/academics/gibbs/stud ... /guhl.html
LINUX:
http://www.userfriendly.org
http://www.linuxjournal.com/
http://www.linuxiso.org
http://www.distrowatch.com
http://www.linux.org
http://www.linuxquestions.org
http://www.madpenguin.org
http://www.happypenguin.org (great site for Linux games, many include source code!)
http://www.tlm-project.org (shameless plug, sorry
http://www.linmodems.org
http://www.linuxant.com (connexant windmodem drivers for linux)
http://www.linuxpack ages.net
http://www.linuxsecurity.com
EXPLOITS:
http://www.hoobie.net/security/exploits
http://www.dmoz.org/Computers/Hack ing/Exploits
http://www.exploits.org
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
3 of 19 08/22/2008 06:05 PM
http://www.k -otik .com/exploits
TELNET:
http://www.elhalf.com/forge.txt
http://www.tip.net.au/tip/help/htelnet.htm
http://www.walthowe.com/navnet/faq/telnet.html
http://www.icsd.k12.ny.us/infotech/faq/telnet.html
http://www.hack erthreads.org/phpbb/viewtopic.php?t=724
http://chiark .greenend.org.uk /~sgtatham/putty/
ASSEMBLY:
http://www.xs4all.nl/~smit/asm01001.htm
http://www.geocities.com/SiliconValley/ ... les01.html
http://brain-hack .org/forum/viewtopic.php?t=92
http://www.hack erthreads.org/phpbb/viewtopic.php?t=790
ASSEMBLERS:
http://eurosport.ifrance.com/joss/asmz.htm
NETWORKING:
http://www.homenethelp.com/web/howto/HomeNet-start.asp
http://punch.engr.wisc.edu/~orchard/net-tutorial/
http://www.winncom.com/html/wireless.shtml
http://www.lantronix.com/learning/tutorials/
http://docs.rinet.ru/TCP-IP/
C++:
http://www.cplusplus.com/doc/tutorial/
http://www.ecst.csuchico.edu/~beej/guide/net/html/
http://www.hotscripts.com/Detailed/11707.html
http://www.mysteries-megasite.com/linux/tutorials.html
http://cprogramming.com
http://cboard.cprogramming.com
http://www.bloodshed.net/devcpp.html
http://www.carbonize.co.uk /Tutorials/Cpp/lesson_1.php
MISC PROGRAMMING LINKS:
http://tutorials.beginners.co.uk /integr ... /187/vs_p/
http://stommel.tamu.edu/~baum/programming.html
http://www.programmingtutorials.com/main.asp
http://www.freeprogrammingresources.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
4 of 19 08/22/2008 06:05 PM
http://www.vbtutor.net/vbtutor.html
http://plugin.laxmaniac/index.html
http://www.php.net
http://www.python.org
http://www.w3schools.com
http://www.osdir.com
http://www.angrycoder.com/
http://www.dotnetspider.com/
http://www.davesite.com/webstation/html/
http://devshed.com
http://forums.devshed.com
http://www.rohitab.com
SOFTWARE CRACKING/REVERSE ENGINEERING:
http://www.hnc3k .com/tutorialz.htm
http://www.hack erthreads.org/phpbb/viewtopic.php?t=757
http://www.t-gr.com/fotis/
BUFFER OVERFLOWS:
http://www.wbglink s.net/pages/reads/bofs/
http://www.elhalf.com/win32buffer.txt
NUMERAL RADIXES:
http://www.cplusplus.com/doc/papers/hex.html
HOW TO ASK QUESTIONS:
http://www.catb.org/~esr/faqs/smart-questions.html
http://nouse.united.net.kg/idiotguide.html
CUSTOM PCs, CASE MODS, OVERCLOCKING:
http://www.gruntville.com
http://www.infomaniak .it
http://www.CrazyPC.com
http://www.pctechtalk .com
http://www.extrememhz.com/
http://www.extrememhz.com/
http://www.extreme-modder.com/
http://www.maxitmag.co.uk /
http://www.kusanagiweb.com/
http://www.voidedwarranty.com/
http://www.comp-shop.com/
http://www.overclock ersworld.com/
http://www.twistedhardware.tk
http://www.xtremepccentral.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
5 of 19 08/22/2008 06:05 PM
http://www.pcsynapse.com/
http://www.subzerotech.com/index/
http://www.modsynergy.com/
http://www.casemodworld.com/
http://www.oc-zone.com/
http://www.techtastic.ca/
http://www.xcsystems.com/
http://www.mypcmadness.com/
http://www.cybercpu.net/
LINKS WITH MORE LINKS:
http://www.project-hack .org/tutorials.html
http://fux0r.phathookups.com/textfiles/ (A SHIT LOAD of text files, some really
interesting ones in there, covering a mass of subjects, check it)
http://www.beginningtoseethelight.org/
Actually it contains few topics but with adetailed discussion
"newbies will panic seeing this "
For Network ing , ccna , ccnp and windows network ing :
http://www.net130.com
its chineese , though you will find it so easy to deal with it contains various educational
media concerning ccna,ccnp,.....oracle for example i found this inside it :
http://www.net130.com/ccnp-labs/index.htm
http://iws.ccccd.edu/sbutler/
cisco educational ppt slides " ccna,ccnp,....." , its great .
http://www.petri.co.il/
Anothe amazing site talk ing about windows operating system, security and various
other topics .
http://www.windowsnetwork ing.com/
learn every thing about windows network ing many articles and amazing information .
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
6 of 19 08/22/2008 06:05 PM
For Hack ing and Security :
http://whoppix.hack ingdefined.com/index.php/Demos
Awonderfull movies explaining hack ing ,web crack ing and even sniffing remote traffic
.
I guess the whole site is simple and rather fine .
http://www.americasleastwanted.com
some good tutorials in electronics and phreak ing .
http://www.theargon.com
An amazing archive containing encryption tutorials , tools , source codes you will love
it .
For emails
http://www.mailnation.net/
1000 GBs email with various advantages for free .
http://www.yousendit.com/
send up to 1gb file to any email .
For guys who are fond of mak ing their live windows distribution and editing their own
distributions .
http://www.reatogo.de/Reatogo_Downloads.htm
http://www.nu2.nu/pebuilder/
http://www.xppe.com/
http://pcfreak s.big-clan.net/bartpe/pebuilder.shtml
For programmers
http://www.exhedra.com/exhedra/planetsourcecode/cd.aspx
http://www.planet-source-code.com/
hackerthreads.org security • View topic - HELPFU... http://www.hackerthreads.org/viewtopic.php?f=1...
7 of 19 08/22/2008 06:05 PM
just choose alanguage and get many source codes for many projects this site is many
awards winning .
Who can live without book s ?!!!
http://www.blueportal.org
book s ............. many book s " needs registeration "
http://www.flashdance.cx/book s/
Hack ing Videos
===========
http://www.milw0rm.com/video/
http://www.forcehack er.com/videos.html
http://www.irongeek .com/i.php?page=secu ... llustrated
http://livesploit.com/resources.html
http://www.blackhat.com/html/bh-multime ... index.html
http://video.google.com/videosearch?hl= ... a=N&tab=wv
Wednesday, 27 August 2008
Install xvnkb
Hướng dẫn - Gõ tiếng Việt cho người mới sử dụng bằng XVNKB
Phần mềm quan trọng nhất nhì với người Việt Nam ta ấy chính là bộ gõ tiếng Việt. Không có bộ gõ tiếng Việt trên máy thì quả thật làm việc gì rồi cũng thấy… bế tắc. Gõ tiếng Việt trên Linux cũng có nhiều cách nhưng cách thông dụng và thân thuộc nhất là dùng xvnkb, một bộ gõ tiếng Việt mã nguồn mở khá có tiếng trong thế giới Chim cánh cụt. Nó hoạt động như Vietkey hay Unikey trên Windows vậy. Mình cũng đang gõ bài post này bằng xvnkb :-D .
Bộ gõ XVNKB hiện nay đã có thể thay thế bằng SCIM với những tính năng tốt hơn cài đặt dễ dàng và giao diện dễ sử dụng hơn.
1. Cài đặt trình biên dịch
Chúng ta sẽ biên dịch từ mã nguồn (đảm bảo nhất) nên sẽ cần tải xuống trình biên dịch. Cái này cũng cần cho những đồng chí lập trình viên nào nuôi ước mơ lập trình trên Linux.
Chọn menu Application > Accessories > Terminal để mở cửa sổ dòng lệnh. Sau đó gõ lệnh sau:
sudo apt-get install build-essential
Chờ cho trình cài đặt tải xuống và giải nén tất cả các gói xong là được. Tuy nhiên xvnkb khi biên dịch cũng yêu cầu phải có thêm gói xorg-dev nữa. Các bạn gõ thêm lệnh sudo apt-get install xorg-dev để cài đặt gói này.
Vậy là xong bước 1.
2. Tải xuống mã nguồn và cài đặt
Trong cửa sổ dòng lệnh gõ wget http://xvnkb.sourceforge.net/xvnkb-0.2.9a.tar.bz2 để tải xuống mã nguồn chương trình. Sau đó giải nén bằng lệnh:
tar -xvf xvnkb-0.2.9a.tar.bz2
Chuyển vào thư mục vừa giải nén và biên dịch, bạn thực hiện tuần tự những lệnh sau:
cd xvnkb-0.2.9a/
./autogen.sh
./configure --use-extstroke
Đến đây phải chỉnh file config.h một chút. Bạn gõ gedit config.h và chỉnh nội dung file thành:
#define __VK_CONFIG_H
#define VK_CHECK_SPELLING
#define VK_USE_EXTSTROKE
#define VK_NEED_UCHAR
(bỏ đi một vài dòng bị lỗi)
Sau đó gõ tiếp các lệnh sau:
make
sudo make install
Chúc mừng, bạn đã cài đặt thành công xvnkb. Bây giờ để khởi động chương trình bạn gõ xvnkb từ cửa sổ dòng lệnh là xong. Nhắp phải chuột lên hộp chương trình của xvnkb để xem menu tuỳ chọn. Nhắp trái chuột để bật tắt tuỳ chọn gõ tiếng Việt.
Nếu muốn xvnkb tự động chạy lúc khởi động, bạn vào menu System > Preferences > Sessions, chọn New và nhập vào ô Command như sau: xvnkb --method=telex --charset=utf8 (trong đó method là telex, vni hoặc viqr; charset là utf8, tcvn, viscii, vps hoặc viqr). Bây giờ xvnkb sẽ khởi động mặc định với kiểu gõ (method) và bảng mã (charset) mà bạn đã chọn.
P/s (afterlastangel):
Bạn nào thích xài XVNKB compile sẵn thì vào đây http://202.78.227.17/Public/ubuntu/pool/extras/x/xvnkb/xvnkb_0.2.9-ubuntu704_i386.deb
Nhưng XVNB vẫn còn xung đột với ổ đĩa CD của bạn vì vậy mình khuyên sử dụng SCIM để tránh xung đột.
------------
SOURCE: http://saylinux.wordpress.com/2007/04/27/cai_dat_bo_go_tieng_viet_xvnkb_cho_ubuntu/
Phần mềm quan trọng nhất nhì với người Việt Nam ta ấy chính là bộ gõ tiếng Việt. Không có bộ gõ tiếng Việt trên máy thì quả thật làm việc gì rồi cũng thấy… bế tắc. Gõ tiếng Việt trên Linux cũng có nhiều cách nhưng cách thông dụng và thân thuộc nhất là dùng xvnkb, một bộ gõ tiếng Việt mã nguồn mở khá có tiếng trong thế giới Chim cánh cụt. Nó hoạt động như Vietkey hay Unikey trên Windows vậy. Mình cũng đang gõ bài post này bằng xvnkb :-D .
Bộ gõ XVNKB hiện nay đã có thể thay thế bằng SCIM với những tính năng tốt hơn cài đặt dễ dàng và giao diện dễ sử dụng hơn.
1. Cài đặt trình biên dịch
Chúng ta sẽ biên dịch từ mã nguồn (đảm bảo nhất) nên sẽ cần tải xuống trình biên dịch. Cái này cũng cần cho những đồng chí lập trình viên nào nuôi ước mơ lập trình trên Linux.
Chọn menu Application > Accessories > Terminal để mở cửa sổ dòng lệnh. Sau đó gõ lệnh sau:
sudo apt-get install build-essential
Chờ cho trình cài đặt tải xuống và giải nén tất cả các gói xong là được. Tuy nhiên xvnkb khi biên dịch cũng yêu cầu phải có thêm gói xorg-dev nữa. Các bạn gõ thêm lệnh sudo apt-get install xorg-dev để cài đặt gói này.
Vậy là xong bước 1.
2. Tải xuống mã nguồn và cài đặt
Trong cửa sổ dòng lệnh gõ wget http://xvnkb.sourceforge.net/xvnkb-0.2.9a.tar.bz2 để tải xuống mã nguồn chương trình. Sau đó giải nén bằng lệnh:
tar -xvf xvnkb-0.2.9a.tar.bz2
Chuyển vào thư mục vừa giải nén và biên dịch, bạn thực hiện tuần tự những lệnh sau:
cd xvnkb-0.2.9a/
./autogen.sh
./configure --use-extstroke
Đến đây phải chỉnh file config.h một chút. Bạn gõ gedit config.h và chỉnh nội dung file thành:
#define __VK_CONFIG_H
#define VK_CHECK_SPELLING
#define VK_USE_EXTSTROKE
#define VK_NEED_UCHAR
(bỏ đi một vài dòng bị lỗi)
Sau đó gõ tiếp các lệnh sau:
make
sudo make install
Chúc mừng, bạn đã cài đặt thành công xvnkb. Bây giờ để khởi động chương trình bạn gõ xvnkb từ cửa sổ dòng lệnh là xong. Nhắp phải chuột lên hộp chương trình của xvnkb để xem menu tuỳ chọn. Nhắp trái chuột để bật tắt tuỳ chọn gõ tiếng Việt.
Nếu muốn xvnkb tự động chạy lúc khởi động, bạn vào menu System > Preferences > Sessions, chọn New và nhập vào ô Command như sau: xvnkb --method=telex --charset=utf8 (trong đó method là telex, vni hoặc viqr; charset là utf8, tcvn, viscii, vps hoặc viqr). Bây giờ xvnkb sẽ khởi động mặc định với kiểu gõ (method) và bảng mã (charset) mà bạn đã chọn.
P/s (afterlastangel):
Bạn nào thích xài XVNKB compile sẵn thì vào đây http://202.78.227.17/Public/ubuntu/pool/extras/x/xvnkb/xvnkb_0.2.9-ubuntu704_i386.deb
Nhưng XVNB vẫn còn xung đột với ổ đĩa CD của bạn vì vậy mình khuyên sử dụng SCIM để tránh xung đột.
------------
SOURCE: http://saylinux.wordpress.com/2007/04/27/cai_dat_bo_go_tieng_viet_xvnkb_cho_ubuntu/
Tuesday, 26 August 2008
How to create custom iso file
It’s rather trivial task to make some changes into already burned installation or live CD. It may be performed to add some files to this CD or edit files on it. In any case it’s impossible to loop mount .iso file and then save it as iso9660 filesystem is read-only.
So, just mount your CD or iso image to some directory by commands:
sudo mkdir /mnt/image
sudo mount /dev/cdrom /mnt/image
or
sudo mount /path/to/your.iso /mnt/image -o loop
then copy it’s contents to some directory:
mkdir /tmp/newiso
cp -r /mnt/image /tmp/newiso
After this you can modify any files in /tmp/newiso, add files, delete them. After modifications are done, create new ISO image to be burned onto CD (or kept somewhere for a rainy day):
cd /tmp/newiso
and
sudo mkisofs -o /tmp/new.iso -b isolinux/isolinux.bin -c isolinux/boot.cat -no-emul-boot -boot-load-size 4 -boot-info-table -J -R -V "new iso name" .
After mkisofs is finished new ISO file will be created at /tmp directory.
-----
Source: http://www.linuxscrew.com/2007/07/31/how-to-create-custom-linux-iso-image/
So, just mount your CD or iso image to some directory by commands:
sudo mkdir /mnt/image
sudo mount /dev/cdrom /mnt/image
or
sudo mount /path/to/your.iso /mnt/image -o loop
then copy it’s contents to some directory:
mkdir /tmp/newiso
cp -r /mnt/image /tmp/newiso
After this you can modify any files in /tmp/newiso, add files, delete them. After modifications are done, create new ISO image to be burned onto CD (or kept somewhere for a rainy day):
cd /tmp/newiso
and
sudo mkisofs -o /tmp/new.iso -b isolinux/isolinux.bin -c isolinux/boot.cat -no-emul-boot -boot-load-size 4 -boot-info-table -J -R -V "new iso name" .
After mkisofs is finished new ISO file will be created at /tmp directory.
-----
Source: http://www.linuxscrew.com/2007/07/31/how-to-create-custom-linux-iso-image/
Eject and close cd tray on ubuntu
eject -T /dev/cdrom
This will eject the disk tray if it is closed, and will close the tray if it's already been ejected
This will eject the disk tray if it is closed, and will close the tray if it's already been ejected
Friday, 22 August 2008
Installing software from source in Linux - 1.2
< Installing software from source in Linux - 1.2 >
So you've downloaded a software package with tar.gz or tar.bz2 extension and have no idea what to do with it. Or perhaps you already know that it's most likely the source code of the program you want to install and you have to compile it, but don't know how. Don't worry, compiling and installing software from source in Linux isn't as hard as it may sound!
Author: Nana Långstedt < nana.langstedt at gmail.com >
tuXfile created: 13 July 2002
Last modified: 22 September 2005
contents
* The procedure
* Step 1. Unpacking
* Step 2. Configuring
* Step 3. Building
* Step 4. Installing
* Cleaning up the mess
* Uninstalling
back to
* Linux software
* Linux help
* tuXfiles home
< The procedure >
The installation procedure for software that comes in tar.gz and tar.bz2 packages isn't always the same, but usually it's like this:
# tar xvzf package.tar.gz (or tar xvjf package.tar.bz2)
# cd package
# ./configure
# make
# make install
If you're lucky, by issuing these simple commands you unpack, configure, compile, and install the software package and you don't even have to know what you're doing. However, it's healthy to take a closer look at the installation procedure and see what these steps mean.
< Step 1. Unpacking >
Maybe you've already noticed that the package containing the source code of the program has a tar.gz or a tar.bz2 extension. This means that the package is a compressed tar archive, also known as a tarball. When making the package, the source code and the other needed files were piled together in a single tar archive, hence the tar extension. After piling them all together in the tar archive, the archive was compressed with gzip, hence the gz extension.
Some people want to compress the tar archive with bzip2 instead of gzip. In these cases the package has a tar.bz2 extension. You install these packages exactly the same way as tar.gz packages, but you use a bit different command when unpacking.
It doesn't matter where you put the tarballs you download from the internet but I suggest creating a special directory for downloaded tarballs. In this tutorial I assume you keep tarballs in a directory called dls that you've created under your home directory. However, the dls directory is just an example. You can put your downloaded tar.gz or tar.bz2 software packages into any directory you want. In this example I assume your username is me and you've downloaded a package called pkg.tar.gz into the dls directory you've created (/home/me/dls).
Ok, finally on to unpacking the tarball. After downloading the package, you unpack it with this command:
me@puter: ~/dls$ tar xvzf pkg.tar.gz
As you can see, you use the tar command with the appropriate options (xvzf) for unpacking the tarball. If you have a package with tar.bz2 extension instead, you must tell tar that this isn't a gzipped tar archive. You do so by using the j option instead of z, like this:
me@puter: ~/dls$ tar xvjf pkg.tar.bz2
What happens after unpacking, depends on the package, but in most cases a directory with the package's name is created. The newly created directory goes under the directory where you are right now. To be sure, you can give the ls command:
me@puter: ~/dls$ ls
pkg pkg.tar.gz
me@puter: ~/dls$
In our example unpacking our package pkg.tar.gz did what expected and created a directory with the package's name. Now you must cd into that newly created directory:
me@puter: ~/dls$ cd pkg
me@puter: ~/dls/pkg$
Read any documentation you find in this directory, like README or INSTALL files, before continuing!
< Step 2. Configuring >
Now, after we've changed into the package's directory (and done a little RTFM'ing), it's time to configure the package. Usually, but not always (that's why you need to check out the README and INSTALL files) it's done by running the configure script.
You run the script with this command:
me@puter: ~/dls/pkg$ ./configure
When you run the configure script, you don't actually compile anything yet. configure just checks your system and assigns values for system-dependent variables. These values are used for generating a Makefile. The Makefile in turn is used for generating the actual binary.
When you run the configure script, you'll see a bunch of weird messages scrolling on your screen. This is normal and you shouldn't worry about it. If configure finds an error, it complains about it and exits. However, if everything works like it should, configure doesn't complain about anything, exits, and shuts up.
If configure exited without errors, it's time to move on to the next step.
< Step 3. Building >
It's finally time to actually build the binary, the executable program, from the source code. This is done by running the make command:
me@puter: ~/dls/pkg$ make
Note that make needs the Makefile for building the program. Otherwise it doesn't know what to do. This is why it's so important to run the configure script successfully, or generate the Makefile some other way.
When you run make, you'll see again a bunch of strange messages filling your screen. This is also perfectly normal and nothing you should worry about. This step may take some time, depending on how big the program is and how fast your computer is. If you're doing this on an old dementic rig with a snail processor, go grab yourself some coffee. At this point I usually lose my patience completely.
If all goes as it should, your executable is finished and ready to run after make has done its job. Now, the final step is to install the program.
< Step 4. Installing >
Now it's finally time to install the program. When doing this you must be root. If you've done things as a normal user, you can become root with the su command. It'll ask you the root password and then you're ready for the final step!
me@puter: ~/dls/pkg$ su
Password:
root@puter: /home/me/dls/pkg#
Now when you're root, you can install the program with the make install command:
root@puter: /home/me/dls/pkg# make install
Again, you'll get some weird messages scrolling on the screen. After it's stopped, congrats: you've installed the software and you're ready to run it!
Because in this example we didn't change the behavior of the configure script, the program was installed in the default place. In many cases it's /usr/local/bin. If /usr/local/bin (or whatever place your program was installed in) is already in your PATH, you can just run the program by typing its name.
And one more thing: if you became root with su, you'd better get back your normal user privileges before you do something stupid. Type exit to become a normal user again:
root@puter: /home/me/dls/pkg# exit
exit
me@puter: ~/dls/pkg$
< Cleaning up the mess >
I bet you want to save some disk space. If this is the case, you'll want to get rid of some files you don't need. When you ran make it created all sorts of files that were needed during the build process but are useless now and are just taking up disk space. This is why you'll want to make clean:
me@puter: ~/dls/pkg$ make clean
However, make sure you keep your Makefile. It's needed if you later decide to uninstall the program and want to do it as painlessly as possible!
< Uninstalling >
So, you decided you didn't like the program after all? Uninstalling the programs you've compiled yourself isn't as easy as uninstalling programs you've installed with a package manager, like rpm.
If you want to uninstall the software you've compiled yourself, do the obvious: do some old-fashioned RTFM'ig. Read the documentation that came with your software package and see if it says anything about uninstalling. If it doesn't, you can start pulling your hair out.
If you didn't delete your Makefile, you may be able to remove the program by doing a make uninstall:
root@puter: /home/me/dls/pkg# make uninstall
If you see weird text scrolling on your screen (but at this point you've probably got used to weird text filling the screen? :-) that's a good sign. If make starts complaining at you, that's a bad sign. Then you'll have to remove the program files manually.
If you know where the program was installed, you'll have to manually delete the installed files or the directory where your program is. If you have no idea where all the files are, you'll have to read the Makefile and see where all the files got installed, and then delete them.
So you've downloaded a software package with tar.gz or tar.bz2 extension and have no idea what to do with it. Or perhaps you already know that it's most likely the source code of the program you want to install and you have to compile it, but don't know how. Don't worry, compiling and installing software from source in Linux isn't as hard as it may sound!
Author: Nana Långstedt < nana.langstedt at gmail.com >
tuXfile created: 13 July 2002
Last modified: 22 September 2005
contents
* The procedure
* Step 1. Unpacking
* Step 2. Configuring
* Step 3. Building
* Step 4. Installing
* Cleaning up the mess
* Uninstalling
back to
* Linux software
* Linux help
* tuXfiles home
< The procedure >
The installation procedure for software that comes in tar.gz and tar.bz2 packages isn't always the same, but usually it's like this:
# tar xvzf package.tar.gz (or tar xvjf package.tar.bz2)
# cd package
# ./configure
# make
# make install
If you're lucky, by issuing these simple commands you unpack, configure, compile, and install the software package and you don't even have to know what you're doing. However, it's healthy to take a closer look at the installation procedure and see what these steps mean.
< Step 1. Unpacking >
Maybe you've already noticed that the package containing the source code of the program has a tar.gz or a tar.bz2 extension. This means that the package is a compressed tar archive, also known as a tarball. When making the package, the source code and the other needed files were piled together in a single tar archive, hence the tar extension. After piling them all together in the tar archive, the archive was compressed with gzip, hence the gz extension.
Some people want to compress the tar archive with bzip2 instead of gzip. In these cases the package has a tar.bz2 extension. You install these packages exactly the same way as tar.gz packages, but you use a bit different command when unpacking.
It doesn't matter where you put the tarballs you download from the internet but I suggest creating a special directory for downloaded tarballs. In this tutorial I assume you keep tarballs in a directory called dls that you've created under your home directory. However, the dls directory is just an example. You can put your downloaded tar.gz or tar.bz2 software packages into any directory you want. In this example I assume your username is me and you've downloaded a package called pkg.tar.gz into the dls directory you've created (/home/me/dls).
Ok, finally on to unpacking the tarball. After downloading the package, you unpack it with this command:
me@puter: ~/dls$ tar xvzf pkg.tar.gz
As you can see, you use the tar command with the appropriate options (xvzf) for unpacking the tarball. If you have a package with tar.bz2 extension instead, you must tell tar that this isn't a gzipped tar archive. You do so by using the j option instead of z, like this:
me@puter: ~/dls$ tar xvjf pkg.tar.bz2
What happens after unpacking, depends on the package, but in most cases a directory with the package's name is created. The newly created directory goes under the directory where you are right now. To be sure, you can give the ls command:
me@puter: ~/dls$ ls
pkg pkg.tar.gz
me@puter: ~/dls$
In our example unpacking our package pkg.tar.gz did what expected and created a directory with the package's name. Now you must cd into that newly created directory:
me@puter: ~/dls$ cd pkg
me@puter: ~/dls/pkg$
Read any documentation you find in this directory, like README or INSTALL files, before continuing!
< Step 2. Configuring >
Now, after we've changed into the package's directory (and done a little RTFM'ing), it's time to configure the package. Usually, but not always (that's why you need to check out the README and INSTALL files) it's done by running the configure script.
You run the script with this command:
me@puter: ~/dls/pkg$ ./configure
When you run the configure script, you don't actually compile anything yet. configure just checks your system and assigns values for system-dependent variables. These values are used for generating a Makefile. The Makefile in turn is used for generating the actual binary.
When you run the configure script, you'll see a bunch of weird messages scrolling on your screen. This is normal and you shouldn't worry about it. If configure finds an error, it complains about it and exits. However, if everything works like it should, configure doesn't complain about anything, exits, and shuts up.
If configure exited without errors, it's time to move on to the next step.
< Step 3. Building >
It's finally time to actually build the binary, the executable program, from the source code. This is done by running the make command:
me@puter: ~/dls/pkg$ make
Note that make needs the Makefile for building the program. Otherwise it doesn't know what to do. This is why it's so important to run the configure script successfully, or generate the Makefile some other way.
When you run make, you'll see again a bunch of strange messages filling your screen. This is also perfectly normal and nothing you should worry about. This step may take some time, depending on how big the program is and how fast your computer is. If you're doing this on an old dementic rig with a snail processor, go grab yourself some coffee. At this point I usually lose my patience completely.
If all goes as it should, your executable is finished and ready to run after make has done its job. Now, the final step is to install the program.
< Step 4. Installing >
Now it's finally time to install the program. When doing this you must be root. If you've done things as a normal user, you can become root with the su command. It'll ask you the root password and then you're ready for the final step!
me@puter: ~/dls/pkg$ su
Password:
root@puter: /home/me/dls/pkg#
Now when you're root, you can install the program with the make install command:
root@puter: /home/me/dls/pkg# make install
Again, you'll get some weird messages scrolling on the screen. After it's stopped, congrats: you've installed the software and you're ready to run it!
Because in this example we didn't change the behavior of the configure script, the program was installed in the default place. In many cases it's /usr/local/bin. If /usr/local/bin (or whatever place your program was installed in) is already in your PATH, you can just run the program by typing its name.
And one more thing: if you became root with su, you'd better get back your normal user privileges before you do something stupid. Type exit to become a normal user again:
root@puter: /home/me/dls/pkg# exit
exit
me@puter: ~/dls/pkg$
< Cleaning up the mess >
I bet you want to save some disk space. If this is the case, you'll want to get rid of some files you don't need. When you ran make it created all sorts of files that were needed during the build process but are useless now and are just taking up disk space. This is why you'll want to make clean:
me@puter: ~/dls/pkg$ make clean
However, make sure you keep your Makefile. It's needed if you later decide to uninstall the program and want to do it as painlessly as possible!
< Uninstalling >
So, you decided you didn't like the program after all? Uninstalling the programs you've compiled yourself isn't as easy as uninstalling programs you've installed with a package manager, like rpm.
If you want to uninstall the software you've compiled yourself, do the obvious: do some old-fashioned RTFM'ig. Read the documentation that came with your software package and see if it says anything about uninstalling. If it doesn't, you can start pulling your hair out.
If you didn't delete your Makefile, you may be able to remove the program by doing a make uninstall:
root@puter: /home/me/dls/pkg# make uninstall
If you see weird text scrolling on your screen (but at this point you've probably got used to weird text filling the screen? :-) that's a good sign. If make starts complaining at you, that's a bad sign. Then you'll have to remove the program files manually.
If you know where the program was installed, you'll have to manually delete the installed files or the directory where your program is. If you have no idea where all the files are, you'll have to read the Makefile and see where all the files got installed, and then delete them.
Useful links for ubuntu beginners and solutions to common problems
Common Specific Tasks
Graphic Card Drivers
List of ATI supported cards: https://wiki.ubuntu.com/HardwareSupportComponentsVideoCardsAti
ATI Drivers: http://wiki.cchtml.com/index.php/Ubuntu
Nvidia Drivers: http://doc.gwos.org/index.php/Latest_Nvidia_Edgy
Screen Resolution Problems https://help.ubuntu.com/community/FixVideoResolutionHowto
Getting Support for Restricted/Proprietary Formats (mp3, playing DVDs, windows media, quicktime, etc): https://help.ubuntu.com/community/RestrictedFormats
mp3 support in amaroK: http://strabes.wordpress.com/2007/04/01/get-mp3-support-for-amarok-in-kubuntu-linux/
NTFS with read/write support: http://ubuntuforums.org/showthread.php?t=217009
Restoring GRUB after a Windows install:
https://help.ubuntu.com/community/RecoveringUbuntuAfterInstallingWindows
http://supergrub.forjamari.linex.org/
Resizing Partitions: http://gparted.sourceforge.net/livecd.php
Beginner Questions
Installing Software:
http://cutlersoftware.com/ubuntuinstall/
http://monkeyblog.org/ubuntu/installing/
http://www.psychocats.net/ubuntu/installingsoftware
What is a Repository?: https://help.ubuntu.com/community/Repositories
Managing Repositories: https://help.ubuntu.com/community/Repositories/Ubuntu
File Permissions and Editing Files that Belong to Root: http://www.psychocats.net/ubuntu/permissions
Introduction to the Command Line http://doc.gwos.org/index.php/CommandLineBeginners
What is “sudo” ? https://help.ubuntu.com/community/RootSudo
Basic Commands: https://help.ubuntu.com/community/BasicCommands
http://www.linuxcommand.org/
Great Information Resources
Great for beginners with tons of howtos: http://www.ubuntuguide.org/
Ubuntu Community Documentation: https://help.ubuntu.com/community/
How to Help Yourself: http://www.ubuntuforums.org/showthread.php?p=812448
Graphic Card Drivers
List of ATI supported cards: https://wiki.ubuntu.com/HardwareSupportComponentsVideoCardsAti
ATI Drivers: http://wiki.cchtml.com/index.php/Ubuntu
Nvidia Drivers: http://doc.gwos.org/index.php/Latest_Nvidia_Edgy
Screen Resolution Problems https://help.ubuntu.com/community/FixVideoResolutionHowto
Getting Support for Restricted/Proprietary Formats (mp3, playing DVDs, windows media, quicktime, etc): https://help.ubuntu.com/community/RestrictedFormats
mp3 support in amaroK: http://strabes.wordpress.com/2007/04/01/get-mp3-support-for-amarok-in-kubuntu-linux/
NTFS with read/write support: http://ubuntuforums.org/showthread.php?t=217009
Restoring GRUB after a Windows install:
https://help.ubuntu.com/community/RecoveringUbuntuAfterInstallingWindows
http://supergrub.forjamari.linex.org/
Resizing Partitions: http://gparted.sourceforge.net/livecd.php
Beginner Questions
Installing Software:
http://cutlersoftware.com/ubuntuinstall/
http://monkeyblog.org/ubuntu/installing/
http://www.psychocats.net/ubuntu/installingsoftware
What is a Repository?: https://help.ubuntu.com/community/Repositories
Managing Repositories: https://help.ubuntu.com/community/Repositories/Ubuntu
File Permissions and Editing Files that Belong to Root: http://www.psychocats.net/ubuntu/permissions
Introduction to the Command Line http://doc.gwos.org/index.php/CommandLineBeginners
What is “sudo” ? https://help.ubuntu.com/community/RootSudo
Basic Commands: https://help.ubuntu.com/community/BasicCommands
http://www.linuxcommand.org/
Great Information Resources
Great for beginners with tons of howtos: http://www.ubuntuguide.org/
Ubuntu Community Documentation: https://help.ubuntu.com/community/
How to Help Yourself: http://www.ubuntuforums.org/showthread.php?p=812448
Thursday, 21 August 2008
Enable and disable root account on Ubuntu
Enable root:
sudo passwd root
Disable root:
sudo passwd -l root
sudo passwd root
Disable root:
sudo passwd -l root
Ubuntu: Change the default Terminal window size
The default size of the Terminal window is around 80 columns wide and 24 columns high. To alter this, edit the file /usr/share/vte/termcap/xterm. You can use the following command:
sudo gedit /usr/share/vte/termcap/xterm
Just a few lines from the top will be the line reading:
:co#80:it#8:li#24:\
Change the number right after co# to change the width. Change the number right after li# to change the height.
sudo gedit /usr/share/vte/termcap/xterm
Just a few lines from the top will be the line reading:
:co#80:it#8:li#24:\
Change the number right after co# to change the width. Change the number right after li# to change the height.
Access Ubuntu shares from Windows pc
1. Install samba on the ubuntu machine
sudo apt-get install samba
2. Right click on the folder to share and choose Share Options. Fill in necessary info.
3. Add samba user account to Ubuntu machine
sudo smbpasswd -a
Note: should exist on the Ubuntu machine
Enter password two times
4. On the Windows pc, type in Run: \\\ and type in username and password.
sudo apt-get install samba
2. Right click on the folder to share and choose Share Options. Fill in necessary info.
3. Add samba user account to Ubuntu machine
sudo smbpasswd -a
Note:
Enter password two times
4. On the Windows pc, type in Run: \\
Fyodor Answers Your Network Security Questions
Fyodor Answers Your Network Security Questions
Posted by Roblimo on Fri May 30, 2003 11:40 AM
from the eating-script-kiddies-for-breakfast dept.
4) Stepping into a network security career
by Anonymous Coward
I'll be graduating this month with a shiny new BS in Computer Science. I've done plenty of Unix sysadmin work throughout college and even deployed some high-interaction honeynets. I'm very interested in network security and systems programming. Do you have any advice for people in my situation who want to head into a career in network security?
Fyodor
Congratulations on your graduation! Unfortunately (for newcomers), the security field is one that often expects substantial experience and references. This is partly because these jobs require extraordinary trust, and also because of an aversion to mistakes. Everyone makes mistakes, but they can be extraordinarily costly in security and neophytes tend to make more of them. But don't lose hope! Talented security minds are still in very high demand, just be aware that you will have to work even harder to prove yourself.
Here are my suggestions for anyone starting out in network security, whether for fun or profit:
Step 1: Learn everything you can
1. You may wish to start with reading a general overview of security, such as Practical Unix and Internet Security 3rd Edition.
2. Reading alone won't teach you much. Hands-on experience is critical, so I would set up at least a basic test network. At the very minimum you should have a Unix box or two and a Windows machine (because these are very common in the real world). You can use very cheap machines, or even emulate a large network with virtualization software such as VMWare.
3. Next you should learn more about how attacks are performed. Take a look at the excellent and free Open Source Security Testing Methodology Manual (OSSTMM). This document aims to provide a comprehensive framework for security testing. But it mostly lists tasks to perform, without specifying how to do so. You will gain a lot from this manual if you research the tasks you don't know how to complete, and if you actually try performing the tasks on your test network. If this manual is too curt or hard to follow, you could try a more verbose book on vulnerability assessment, such as Hacking Exposed 4th Edition.
4. Now that you understand many of the general security ideas, it is time to get current. This is one area that has actually become easier in the last decade. The thinking used to be that vulnerability information should only be distributed to well-known and trusted administrators and security researchers through private digests such as Zardoz. This was a disaster for many reasons, and the full disclosure movement was born. In the last couple of years things have started to shift toward more limited ("responsible") disclosure and there is also a disturbing pay-money-for-early-disclosure trend. But information is still much more available than it used to be. Most of the news is carried on mailing lists, and I archive the ones I consider the best at Lists.Insecure.Org. You must subscribe to Bugtraq, and I would also highly recommend pen-test, vuln-dev, and security-basics. Read at least the last 6-12 months of archives. Choose other lists that correspond to your interests. SecurityFocus also offers a security-jobs list which is an excellent resource for finding jobs or just understanding what employers desire.
There are two major reasons for reading Bugtraq. One is that you must react quickly to new vulnerabilities by patching your servers, notifying your clients, etc. You can get this by simply scanning the subject lines or advisory summaries for bugs that directly apply to you. But then you will miss out on another crucial purpose of Bugtraq. Actually understanding a vulnerability helps you defend against it, exploit it, and identify/prevent similar bugs in the future. When you are lucky, the advisory itself will provide full details on the bug. Check out this excellent recent advisory by Core Security Technologies. Note how they describe exactly how the Snort TCP Stream Reassembly vulnerability works in detail and even include a proof-of-concept demonstration. Unfortunately, not all advisories are so forthcoming. For bugs in Open Source software, you can understand the problem by reading the diff. The next step is to actually write and test an exploit. I would recommend writing at least one for each general class of bug (buffer overflow, format string, SQL injection, etc.) or whenever a bug is particularly interesting.
Be sure to read the latest issues of Phrack and the research papers posted to the mailing lists. Send your comments and questions to the authors and you may start interesting discussions. Read well-regarded books on the security topics that interest you most.
I can't emphasize enough that you should intersperse hands-on work with all of this reading. Install unpatched RedHat 8 (or whatever) and run Nmap and Nessus against it. Then compromise it remotely, maybe via the latest Samba hole. Start out with a prewritten exploit from Bugtraq, which isn't quite as easy as it sounds. You may have to modify the 'sploit to compile, brute force the proper offset, etc. Then break in again using a different technique, and your own exploit. Install Ethereal and/or tcpdump and ensure you understand the traffic on your network during both your exploitation and normal network activity. Install Snort on an Internet-facing machine and watch the attacks and probes you'll experience. Wander around your neighborhood with Kismet, Netstumbler, or Wellenreiter on your Laptop or PDA to look for open WAPs. Install DSniff and execute an active MITM attack on an SSH or SSL connection between two of your computers. Take a look at my Top 75 Tools List and ensure you understand what each does and when it would be useful. Try out as many as you can.
5. Take a vacation, or at least a weekend camping! You deserve it! The steps above would probably take at least 3-12 months full-time, depending on your motivation level and the depth and breadth of your research.
Step 2: Now apply your newfound knowledge
Now you have learned enough to be dangerous. At this point, you would have little trouble obtaining most certifications, after studying the specifics of each topic. If your main goal is to find a job quickly, perhaps adding these extra feathers to your cap might be worthwhile. But I think your best bet is to prove your knowledge by joining and contributing to the security community. While this does indeed help others, it isn't an entirely selfless act. It improves your skills, leads to important contacts, and demonstrates your knowledge and ability in a constructive way. The latter is important if securing a career is one of your goals. These steps should also be fun! If not, perhaps you should keep looking at other fields. Here are some ideas:
Start participating with insightful comment and answers on the mailing lists. This is very easy and serves as a great learning experience, way to meet people, and garners some name recognition. If a security manager with a stack of 60 resumes recognizes your name, that is a huge win!
When a new worm or a big new vulnerability comes out, everyone wants to know the details. If you stay up all night disassembling the worm/patch and write the first comprehensive analysis, many folks will find that valuable. And you will learn a lot. Let your first priority be quality - if someone beats you to it, just compare your results with theirs to see if you (or they) missed (or misinterpreted) anything. You can also post your own exploits, although that is more of a political hot potato.
Attending security conferences is a great way to learn, party with fellow hackers, and network (in every sense of the word). Much better is to speak at these conferences. This field changes rapidly so there are always new topics and technologies to discuss. You don't have to be a well-known expert with a long history - just learn your topic well and put in the effort for a quality presentation. You could present at Defcon, at one of the more commercial events, or at a smaller regional con like ToorCon, CodeCon, Hivercon, etc. Among other advantages (often free admission/travel/hotel), this is a great way to meet people with similar interests. I spoke at the latest CanSecWest and have submitted a proposal for the next Defcon.
Now that you've seen and understand a wide variety of software vulnerabilities from your Bugtraq research, start finding your own. You can start by downloading any PHP app from Sourceforge. Most of those are hopelessly vulnerable to Cross-Site-Scripting, SQL injection, and/or remote code execution by "remote include" directives. Many (if not most) Windows shareware daemons are also vulnerable to simple buffer overflows and format-string bugs. Notify the authors and then write an advisory. After a few of these "easy targets", try breaking some more widely deployed programs.
Write a security tool! I could list some suggestions, but by this point you will have many of your own ideas as to what is needed. Scratch an itch.
I hope this helps. If you want more suggestions, Ask Slashdot. From that story, I found this post particularly insightful, especially the emphasis on "people skills". I don't claim to have any, but understand the value :).
Posted by Roblimo on Fri May 30, 2003 11:40 AM
from the eating-script-kiddies-for-breakfast dept.
4) Stepping into a network security career
by Anonymous Coward
I'll be graduating this month with a shiny new BS in Computer Science. I've done plenty of Unix sysadmin work throughout college and even deployed some high-interaction honeynets. I'm very interested in network security and systems programming. Do you have any advice for people in my situation who want to head into a career in network security?
Fyodor
Congratulations on your graduation! Unfortunately (for newcomers), the security field is one that often expects substantial experience and references. This is partly because these jobs require extraordinary trust, and also because of an aversion to mistakes. Everyone makes mistakes, but they can be extraordinarily costly in security and neophytes tend to make more of them. But don't lose hope! Talented security minds are still in very high demand, just be aware that you will have to work even harder to prove yourself.
Here are my suggestions for anyone starting out in network security, whether for fun or profit:
Step 1: Learn everything you can
1. You may wish to start with reading a general overview of security, such as Practical Unix and Internet Security 3rd Edition.
2. Reading alone won't teach you much. Hands-on experience is critical, so I would set up at least a basic test network. At the very minimum you should have a Unix box or two and a Windows machine (because these are very common in the real world). You can use very cheap machines, or even emulate a large network with virtualization software such as VMWare.
3. Next you should learn more about how attacks are performed. Take a look at the excellent and free Open Source Security Testing Methodology Manual (OSSTMM). This document aims to provide a comprehensive framework for security testing. But it mostly lists tasks to perform, without specifying how to do so. You will gain a lot from this manual if you research the tasks you don't know how to complete, and if you actually try performing the tasks on your test network. If this manual is too curt or hard to follow, you could try a more verbose book on vulnerability assessment, such as Hacking Exposed 4th Edition.
4. Now that you understand many of the general security ideas, it is time to get current. This is one area that has actually become easier in the last decade. The thinking used to be that vulnerability information should only be distributed to well-known and trusted administrators and security researchers through private digests such as Zardoz. This was a disaster for many reasons, and the full disclosure movement was born. In the last couple of years things have started to shift toward more limited ("responsible") disclosure and there is also a disturbing pay-money-for-early-disclosure trend. But information is still much more available than it used to be. Most of the news is carried on mailing lists, and I archive the ones I consider the best at Lists.Insecure.Org. You must subscribe to Bugtraq, and I would also highly recommend pen-test, vuln-dev, and security-basics. Read at least the last 6-12 months of archives. Choose other lists that correspond to your interests. SecurityFocus also offers a security-jobs list which is an excellent resource for finding jobs or just understanding what employers desire.
There are two major reasons for reading Bugtraq. One is that you must react quickly to new vulnerabilities by patching your servers, notifying your clients, etc. You can get this by simply scanning the subject lines or advisory summaries for bugs that directly apply to you. But then you will miss out on another crucial purpose of Bugtraq. Actually understanding a vulnerability helps you defend against it, exploit it, and identify/prevent similar bugs in the future. When you are lucky, the advisory itself will provide full details on the bug. Check out this excellent recent advisory by Core Security Technologies. Note how they describe exactly how the Snort TCP Stream Reassembly vulnerability works in detail and even include a proof-of-concept demonstration. Unfortunately, not all advisories are so forthcoming. For bugs in Open Source software, you can understand the problem by reading the diff. The next step is to actually write and test an exploit. I would recommend writing at least one for each general class of bug (buffer overflow, format string, SQL injection, etc.) or whenever a bug is particularly interesting.
Be sure to read the latest issues of Phrack and the research papers posted to the mailing lists. Send your comments and questions to the authors and you may start interesting discussions. Read well-regarded books on the security topics that interest you most.
I can't emphasize enough that you should intersperse hands-on work with all of this reading. Install unpatched RedHat 8 (or whatever) and run Nmap and Nessus against it. Then compromise it remotely, maybe via the latest Samba hole. Start out with a prewritten exploit from Bugtraq, which isn't quite as easy as it sounds. You may have to modify the 'sploit to compile, brute force the proper offset, etc. Then break in again using a different technique, and your own exploit. Install Ethereal and/or tcpdump and ensure you understand the traffic on your network during both your exploitation and normal network activity. Install Snort on an Internet-facing machine and watch the attacks and probes you'll experience. Wander around your neighborhood with Kismet, Netstumbler, or Wellenreiter on your Laptop or PDA to look for open WAPs. Install DSniff and execute an active MITM attack on an SSH or SSL connection between two of your computers. Take a look at my Top 75 Tools List and ensure you understand what each does and when it would be useful. Try out as many as you can.
5. Take a vacation, or at least a weekend camping! You deserve it! The steps above would probably take at least 3-12 months full-time, depending on your motivation level and the depth and breadth of your research.
Step 2: Now apply your newfound knowledge
Now you have learned enough to be dangerous. At this point, you would have little trouble obtaining most certifications, after studying the specifics of each topic. If your main goal is to find a job quickly, perhaps adding these extra feathers to your cap might be worthwhile. But I think your best bet is to prove your knowledge by joining and contributing to the security community. While this does indeed help others, it isn't an entirely selfless act. It improves your skills, leads to important contacts, and demonstrates your knowledge and ability in a constructive way. The latter is important if securing a career is one of your goals. These steps should also be fun! If not, perhaps you should keep looking at other fields. Here are some ideas:
Start participating with insightful comment and answers on the mailing lists. This is very easy and serves as a great learning experience, way to meet people, and garners some name recognition. If a security manager with a stack of 60 resumes recognizes your name, that is a huge win!
When a new worm or a big new vulnerability comes out, everyone wants to know the details. If you stay up all night disassembling the worm/patch and write the first comprehensive analysis, many folks will find that valuable. And you will learn a lot. Let your first priority be quality - if someone beats you to it, just compare your results with theirs to see if you (or they) missed (or misinterpreted) anything. You can also post your own exploits, although that is more of a political hot potato.
Attending security conferences is a great way to learn, party with fellow hackers, and network (in every sense of the word). Much better is to speak at these conferences. This field changes rapidly so there are always new topics and technologies to discuss. You don't have to be a well-known expert with a long history - just learn your topic well and put in the effort for a quality presentation. You could present at Defcon, at one of the more commercial events, or at a smaller regional con like ToorCon, CodeCon, Hivercon, etc. Among other advantages (often free admission/travel/hotel), this is a great way to meet people with similar interests. I spoke at the latest CanSecWest and have submitted a proposal for the next Defcon.
Now that you've seen and understand a wide variety of software vulnerabilities from your Bugtraq research, start finding your own. You can start by downloading any PHP app from Sourceforge. Most of those are hopelessly vulnerable to Cross-Site-Scripting, SQL injection, and/or remote code execution by "remote include" directives. Many (if not most) Windows shareware daemons are also vulnerable to simple buffer overflows and format-string bugs. Notify the authors and then write an advisory. After a few of these "easy targets", try breaking some more widely deployed programs.
Write a security tool! I could list some suggestions, but by this point you will have many of your own ideas as to what is needed. Scratch an itch.
I hope this helps. If you want more suggestions, Ask Slashdot. From that story, I found this post particularly insightful, especially the emphasis on "people skills". I don't claim to have any, but understand the value :).
Install scanner on Ubuntu
Sử dụng máy scan trên Ubuntu 8.04 LTS Desktop
17:00' 19/08/2008 (GMT+7)
- Mách bạn các bước sử dụng scanner khi cài đặt và sử dụng chúng trên Ubuntu, cùng cách xử lý các scanner chưa được Ubuntu hỗ trợ.
Kiểm tra scanner
Muốn xác định scanner có được Ubuntu hỗ trợ hay chưa, bạn thực hiện theo một trong ba cách:
Cách 1. Cắm dây cáp nối thiết bị vào máy tính, thường là cổng USB. Sau đó, chạy chương trình scan trên Ubuntu có tên XSane.
Nếu màn hình chính của XSane xuất hiện mà không có thông báo lỗi, máy scan của bạn đã được Ubuntu hỗ trợ. Khi đó, bạn đến ngay phần 2 để bắt đầu sử dụng máy scan.
Ngược lại, nếu có thông báo lỗi, thường là “No devices available” thì bạn cần đến phần 3 để tiến hành các bước cài đặt driver.
Cách 2. Một cách khác, rõ ràng hơn, bạn truy cập vào địa chỉ https://wiki.ubuntu.com/HardwareSupportComponentsScanners, chọn nhà sản xuất thiết bị tương ứng như Canon, Dell, HP..., sau đó kích vào liên kết tương ứng để tìm xem thiết bị scanner của mình có thuộc vào danh sách được Ubuntu hỗ trợ sẵn hay không. Nếu có, bạn đến ngay phần 2 để bắt đầu với máy scan của mình.
Cách 3. Nếu máy scan của bạn không có trong danh sách được Ubuntu hỗ trợ, bạn truy cập vào địa chỉ www.sane-project.org/sane-backends.html để xem danh sách các máy scan được SANE (Scanner Access Now Easy) hỗ trợ. SANE là một dự án cung cấp hầu hết các driver cho thiết bị scanner trên Ubuntu.
Nếu thiết bị của bạn thuộc danh sách này, bạn cần cài đặt driver như sau:
+ Cập nhật danh sách phần mềm hệ thống: root@hdhhac-desktop:~# apt-get update
+ Cài đặt thư viện libsane-extras bằng cách sử dụng chương trình Synaptic, hoặc gõ lệnh sau:
root@hdhhac-desktop:~# apt-get install libsane-extras
Lệnh này sẽ cài đặt các driver dành cho máy scan được dự án SANE hỗ trợ.
+ Mở file /etc/sane.d/dll.conf để xem thiết bị scanner của mình đã có trong danh sách liệt kê hay chưa: root@hdhhac-desktop:~# vim /etc/sane.d/dll.conf
Nếu ngay trước dòng tương ứng với tên máy scan của mình có dấu chú thích (#), bạn cần xóa dấu này đi để kích hoạt driver tương ứng với thiết bị của mình.
+ Đến đây, bạn mở chương trình XSane và bắt đầu sử dụng máy scan với driver vừa được cài đặt.
Sử dụng máy scan
Bạn cần sử dụng phần mềm tương tác với máy scan để có được các hình ảnh như mong muốn. Trên Ubuntu, mọi người thường sử dụng XSane để phục vụ cho mục đích này. Phần mềm này sử dụng SANE-library để giao tiếp với các máy scan. Tuy có hỗ trợ camera và các thiết bị video với những tác vụ cơ bản, nhưng XSane được thiết kế với mục đích chính là dành cho máy scan.
Với XSane, bạn có thể dễ dàng sao chép các trang văn bản, sau đó lưu trữ dưới dạng hình ảnh và thực hiện các thao tác fax hoặc chuyển qua email. Bạn có thể sử dụng XSane để lưu trữ hình ảnh thu được ở dạng multi-page documents chứ không chỉ là những hình ảnh riêng biệt. Cần đến với website http://XSane.org để tham khảo đầy đủ thông tin về chương trình hỗ trợ scan hữu ích này.
Để scan một trang tài liệu, bạn tiến hành các bước như sau:
1. Đặt trang tài liệu vào trong máy scan.
2. Khởi chạy XSane bằng cách vào menu Applications -> Graphics -> XSane Image Scanner. Bạn cũng có thể bấm vào nút Scan ngay trên máy scan để thực hiện thao tác này.
3. Trên cửa sổ chính của XSane, bạn bấm nút Scan để thực hiện thao tác quét trang tài liệu của mình. Khi tiến trình scan kết thúc, bạn sẽ nhận được kết quả ngay trên cửa sổ Viewer của XSane. Tại đây, bạn lưu ảnh từ menu File -> Save image dưới một trong các định dạng như JPEG, PDF, PNG, PNM...; hoặc thực hiện một vài thao tác xử lý như thay đổi kích thước của ảnh, thay đổi chiều hiển thị của ảnh...
17:00' 19/08/2008 (GMT+7)
- Mách bạn các bước sử dụng scanner khi cài đặt và sử dụng chúng trên Ubuntu, cùng cách xử lý các scanner chưa được Ubuntu hỗ trợ.
Kiểm tra scanner
Muốn xác định scanner có được Ubuntu hỗ trợ hay chưa, bạn thực hiện theo một trong ba cách:
Cách 1. Cắm dây cáp nối thiết bị vào máy tính, thường là cổng USB. Sau đó, chạy chương trình scan trên Ubuntu có tên XSane.
Nếu màn hình chính của XSane xuất hiện mà không có thông báo lỗi, máy scan của bạn đã được Ubuntu hỗ trợ. Khi đó, bạn đến ngay phần 2 để bắt đầu sử dụng máy scan.
Ngược lại, nếu có thông báo lỗi, thường là “No devices available” thì bạn cần đến phần 3 để tiến hành các bước cài đặt driver.
Cách 2. Một cách khác, rõ ràng hơn, bạn truy cập vào địa chỉ https://wiki.ubuntu.com/HardwareSupportComponentsScanners, chọn nhà sản xuất thiết bị tương ứng như Canon, Dell, HP..., sau đó kích vào liên kết tương ứng để tìm xem thiết bị scanner của mình có thuộc vào danh sách được Ubuntu hỗ trợ sẵn hay không. Nếu có, bạn đến ngay phần 2 để bắt đầu với máy scan của mình.
Cách 3. Nếu máy scan của bạn không có trong danh sách được Ubuntu hỗ trợ, bạn truy cập vào địa chỉ www.sane-project.org/sane-backends.html để xem danh sách các máy scan được SANE (Scanner Access Now Easy) hỗ trợ. SANE là một dự án cung cấp hầu hết các driver cho thiết bị scanner trên Ubuntu.
Nếu thiết bị của bạn thuộc danh sách này, bạn cần cài đặt driver như sau:
+ Cập nhật danh sách phần mềm hệ thống: root@hdhhac-desktop:~# apt-get update
+ Cài đặt thư viện libsane-extras bằng cách sử dụng chương trình Synaptic, hoặc gõ lệnh sau:
root@hdhhac-desktop:~# apt-get install libsane-extras
Lệnh này sẽ cài đặt các driver dành cho máy scan được dự án SANE hỗ trợ.
+ Mở file /etc/sane.d/dll.conf để xem thiết bị scanner của mình đã có trong danh sách liệt kê hay chưa: root@hdhhac-desktop:~# vim /etc/sane.d/dll.conf
Nếu ngay trước dòng tương ứng với tên máy scan của mình có dấu chú thích (#), bạn cần xóa dấu này đi để kích hoạt driver tương ứng với thiết bị của mình.
+ Đến đây, bạn mở chương trình XSane và bắt đầu sử dụng máy scan với driver vừa được cài đặt.
Sử dụng máy scan
Bạn cần sử dụng phần mềm tương tác với máy scan để có được các hình ảnh như mong muốn. Trên Ubuntu, mọi người thường sử dụng XSane để phục vụ cho mục đích này. Phần mềm này sử dụng SANE-library để giao tiếp với các máy scan. Tuy có hỗ trợ camera và các thiết bị video với những tác vụ cơ bản, nhưng XSane được thiết kế với mục đích chính là dành cho máy scan.
Với XSane, bạn có thể dễ dàng sao chép các trang văn bản, sau đó lưu trữ dưới dạng hình ảnh và thực hiện các thao tác fax hoặc chuyển qua email. Bạn có thể sử dụng XSane để lưu trữ hình ảnh thu được ở dạng multi-page documents chứ không chỉ là những hình ảnh riêng biệt. Cần đến với website http://XSane.org để tham khảo đầy đủ thông tin về chương trình hỗ trợ scan hữu ích này.
Để scan một trang tài liệu, bạn tiến hành các bước như sau:
1. Đặt trang tài liệu vào trong máy scan.
2. Khởi chạy XSane bằng cách vào menu Applications -> Graphics -> XSane Image Scanner. Bạn cũng có thể bấm vào nút Scan ngay trên máy scan để thực hiện thao tác này.
3. Trên cửa sổ chính của XSane, bạn bấm nút Scan để thực hiện thao tác quét trang tài liệu của mình. Khi tiến trình scan kết thúc, bạn sẽ nhận được kết quả ngay trên cửa sổ Viewer của XSane. Tại đây, bạn lưu ảnh từ menu File -> Save image dưới một trong các định dạng như JPEG, PDF, PNG, PNM...; hoặc thực hiện một vài thao tác xử lý như thay đổi kích thước của ảnh, thay đổi chiều hiển thị của ảnh...
Wednesday, 20 August 2008
INSTALLING TRUETYPE FONTS:
INSTALLING TRUETYPE FONTS:
In Short: The simple copy and paste method of installing your fonts.
Copy the code below:
gksu nautilus /usr/share/fonts/truetype
Open the terminal:
Applications > Accessories > Terminal
Paste the code into the Terminal: Edit > Paste.
Push the Enter Key on your keyboard and then enter your password and then click OK.
Nautilus should open to the truetype folder.
Make a new folder (of the name of your choice).
How? Right click with the mouse in the truetype folder we just opened and choose Create Folder and give the folder a name.
Double click the folder to open it.
Add your fonts to the directory you made by copying them and then just pasting them into the folder…
Alert Ubuntu that you added the fonts.
Copy the code below:
sudo fc-cache -f -v
Open the terminal:
Applications > Accessories > Terminal
Paste the code into the Terminal: Edit > Paste.
Push the Enter Key on your keyboard (and then enter your password if needed).
The command above adds them into the system so they become available.
In Short: The simple copy and paste method of installing your fonts.
Copy the code below:
gksu nautilus /usr/share/fonts/truetype
Open the terminal:
Applications > Accessories > Terminal
Paste the code into the Terminal: Edit > Paste.
Push the Enter Key on your keyboard and then enter your password and then click OK.
Nautilus should open to the truetype folder.
Make a new folder (of the name of your choice).
How? Right click with the mouse in the truetype folder we just opened and choose Create Folder and give the folder a name.
Double click the folder to open it.
Add your fonts to the directory you made by copying them and then just pasting them into the folder…
Alert Ubuntu that you added the fonts.
Copy the code below:
sudo fc-cache -f -v
Open the terminal:
Applications > Accessories > Terminal
Paste the code into the Terminal: Edit > Paste.
Push the Enter Key on your keyboard (and then enter your password if needed).
The command above adds them into the system so they become available.
Ubuntu Global Shortcut Keys
Global shortcut keys enable you to use the keyboard to perform tasks related to your desktop, rather than tasks on the currently selected window or application. The following table lists some global shortcut keys:
Shortcut Key
Function
Alt+F1
Open the Applications Menu.
Alt+F2
Display the Run Application dialog. See the section called “Running Applications” for more information.
Print Screen
Take a screenshot of the entire desktop. See the section called “Taking Screenshots” for more information.
Alt+Print Screen
Take a screenshot of the currently focused window.
Ctrl+Alt+Arrow keys
Switch to the workspace to the specified direction of the current workspace. See the section called “Workspaces” for more information on working with multiple workspaces.
Ctrl+Alt+D
Minimize all windows and give focus to the desktop.
Alt+Tab
Switch between windows. A list of windows that you can select is displayed. Release the keys to select a window. You can press the Shift key to cycle through the windows in reverse order.
Ctrl+Alt+Tab
Switch the focus between the panels and the desktop. A list of items that you can select is displayed. Release the keys to select an item. You can press the Shift key to cycle through the items in reverse order.
Window Shortcut Keys
Window shortcut keys allow you to use the keyboard to perform tasks on the currently focused window. The following table lists some window shortcut keys:
Shortcut Key
Function
Alt+Tab
Switch between windows. A list of windows that you can select is displayed. Release the keys to select a window. You can press the Shift key to cycle through the windows in reverse order.
Alt+F4
Close the currently focused window.
Alt+F5
Unmaximize the current window, if it is maximized.
Alt+F7
Move the currently focused window. After pressing this shortcut, you can move the window using either the mouse or the arrow keys. To finish the move, click the mouse or press any key on the keyboard.
Alt+F8
Resize the currently focused window. After pressing this shortcut, you can resize the window using either the mouse or the arrow keys. To finish the resize, click the mouse or press any key on the keyboard.
Alt+F9
Minimize the current window.
Alt+F10
Maximize the current window.
Alt+spacebar
Open the window menu for the currently selected window. The window menu allows you to perform actions on the window, such as minimizing, moving between workspaces, and closing.
Shift+Ctrl+Alt+Arrow keys
Move the current window to another workspace in the specified direction. See the section called “Workspaces” for more information on working with multiple workspaces.
Application Keys
Application shortcut keys enable you to perform application tasks. You can use shortcut keys to perform application tasks more quickly than if you use a mouse. The following table lists some common application shortcut keys:
Shortcut Key
Action
Ctrl+N
Create a new document or window.
Ctrl+X
Cut the selected text or region and place it on the clipboard.
Ctrl+C
Copy the selected text or region onto the clipboard.
Ctrl+V
Paste the contents of the clipboard.
Ctrl+Z
Undo the last action.
Ctrl+S
Save the current document to disk.
F1
Load the online help document for the application.
In addition to these shortcut keys, all applications support a set of keys to navigate and work with the user interface. These keys allow you to perform operations that you might normally perform with a mouse. The following table describes some interface control keys:
Keys
Action
Arrow keys or Tab
Move between controls in the interface or items in a list.
Enter or spacebar
Activate or choose the selected item.
F10
Activate the left-most menu of the application window.
Shift+F10
Activate the context menu for the selected item.
Esc
Close a menu without selecting a menu item, or cancel a drag operation.
Shortcut Key
Function
Alt+F1
Open the Applications Menu.
Alt+F2
Display the Run Application dialog. See the section called “Running Applications” for more information.
Print Screen
Take a screenshot of the entire desktop. See the section called “Taking Screenshots” for more information.
Alt+Print Screen
Take a screenshot of the currently focused window.
Ctrl+Alt+Arrow keys
Switch to the workspace to the specified direction of the current workspace. See the section called “Workspaces” for more information on working with multiple workspaces.
Ctrl+Alt+D
Minimize all windows and give focus to the desktop.
Alt+Tab
Switch between windows. A list of windows that you can select is displayed. Release the keys to select a window. You can press the Shift key to cycle through the windows in reverse order.
Ctrl+Alt+Tab
Switch the focus between the panels and the desktop. A list of items that you can select is displayed. Release the keys to select an item. You can press the Shift key to cycle through the items in reverse order.
Window Shortcut Keys
Window shortcut keys allow you to use the keyboard to perform tasks on the currently focused window. The following table lists some window shortcut keys:
Shortcut Key
Function
Alt+Tab
Switch between windows. A list of windows that you can select is displayed. Release the keys to select a window. You can press the Shift key to cycle through the windows in reverse order.
Alt+F4
Close the currently focused window.
Alt+F5
Unmaximize the current window, if it is maximized.
Alt+F7
Move the currently focused window. After pressing this shortcut, you can move the window using either the mouse or the arrow keys. To finish the move, click the mouse or press any key on the keyboard.
Alt+F8
Resize the currently focused window. After pressing this shortcut, you can resize the window using either the mouse or the arrow keys. To finish the resize, click the mouse or press any key on the keyboard.
Alt+F9
Minimize the current window.
Alt+F10
Maximize the current window.
Alt+spacebar
Open the window menu for the currently selected window. The window menu allows you to perform actions on the window, such as minimizing, moving between workspaces, and closing.
Shift+Ctrl+Alt+Arrow keys
Move the current window to another workspace in the specified direction. See the section called “Workspaces” for more information on working with multiple workspaces.
Application Keys
Application shortcut keys enable you to perform application tasks. You can use shortcut keys to perform application tasks more quickly than if you use a mouse. The following table lists some common application shortcut keys:
Shortcut Key
Action
Ctrl+N
Create a new document or window.
Ctrl+X
Cut the selected text or region and place it on the clipboard.
Ctrl+C
Copy the selected text or region onto the clipboard.
Ctrl+V
Paste the contents of the clipboard.
Ctrl+Z
Undo the last action.
Ctrl+S
Save the current document to disk.
F1
Load the online help document for the application.
In addition to these shortcut keys, all applications support a set of keys to navigate and work with the user interface. These keys allow you to perform operations that you might normally perform with a mouse. The following table describes some interface control keys:
Keys
Action
Arrow keys or Tab
Move between controls in the interface or items in a list.
Enter or spacebar
Activate or choose the selected item.
F10
Activate the left-most menu of the application window.
Shift+F10
Activate the context menu for the selected item.
Esc
Close a menu without selecting a menu item, or cancel a drag operation.
Gnome or KDE is screwey; how do I reset my Gnome or KDE configuration?
The Gnome and KDE desktop environments can get into such a state that they either won't start or start more-or-less uselessly. Or you may just have configured a miserable combination of fonts, colours and desktop images and want to start afresh. In either case, it's simply a matter of logging out, renaming the configuration folder(s) and starting the desktop again.
Note that when you reset your configuration, you will lose all customizations made under those environments. For example: resetting your KDE configuration will reset your Konqueror bookmarks and cache, your Kmail settings, and your desktop wallpaper; resetting Gnome will result in your losing your theme settings, your Epiphany bookmarks, and your Nautilus settings. You can restore some of these settings by copying in specific files and folders from the backups made with the commands below.
KDE
All KDE settings are in a single folder in your home directory: .kde. Simply rename the folder:
1. logout
2. press Alt-Ctrl-F1 to switch to a console login
3. login
4. rename the .kde folder to .kde.date_and_time:
cd ~
mv .kde .kde.`date +%Y%m%d.%H%M`
exit
5. press Alt-Ctrl-F7 and login
You will now have no .kde folder so KDE will start afresh when you next login; your old settings are in .kde.date_and_time.
Gnome
1. logout
2. press Alt-Ctrl-F1 to switch to a console login
3. login
4. rename the Gnome folders to folder_name.date_and_time:
cd ~
tcsh
foreach d (.gnome .gnome2 .gconf .gconf2 .gnome-private .gnome2-private)
set dt=`date +%Y%m%d.%H%M`
mv $d $d.$dt
end
exit
5. press Alt-Ctrl-F7 and login
You will now have no Gnome folders so Gnome will start afresh when you next login; your old settings are scattered in the various .g* folders; frankly, I'm note sure which are where. But you may well find that you can save some of your settings by doing the following:
1. do steps 1 to 5 above
2. logout
3. press Alt-Ctrl-F1 to switch to a console login
4. login
5. replace the new .gconf folder with your original one:
cd ~
mv .gconf .gconf.fresh
\cp -pr .gconf.date_and_time to .gconf
exit
6. press Alt-Ctrl-F7 and login
Note that when you reset your configuration, you will lose all customizations made under those environments. For example: resetting your KDE configuration will reset your Konqueror bookmarks and cache, your Kmail settings, and your desktop wallpaper; resetting Gnome will result in your losing your theme settings, your Epiphany bookmarks, and your Nautilus settings. You can restore some of these settings by copying in specific files and folders from the backups made with the commands below.
KDE
All KDE settings are in a single folder in your home directory: .kde. Simply rename the folder:
1. logout
2. press Alt-Ctrl-F1 to switch to a console login
3. login
4. rename the .kde folder to .kde.date_and_time:
cd ~
mv .kde .kde.`date +%Y%m%d.%H%M`
exit
5. press Alt-Ctrl-F7 and login
You will now have no .kde folder so KDE will start afresh when you next login; your old settings are in .kde.date_and_time.
Gnome
1. logout
2. press Alt-Ctrl-F1 to switch to a console login
3. login
4. rename the Gnome folders to folder_name.date_and_time:
cd ~
tcsh
foreach d (.gnome .gnome2 .gconf .gconf2 .gnome-private .gnome2-private)
set dt=`date +%Y%m%d.%H%M`
mv $d $d.$dt
end
exit
5. press Alt-Ctrl-F7 and login
You will now have no Gnome folders so Gnome will start afresh when you next login; your old settings are scattered in the various .g* folders; frankly, I'm note sure which are where. But you may well find that you can save some of your settings by doing the following:
1. do steps 1 to 5 above
2. logout
3. press Alt-Ctrl-F1 to switch to a console login
4. login
5. replace the new .gconf folder with your original one:
cd ~
mv .gconf .gconf.fresh
\cp -pr .gconf.date_and_time to .gconf
exit
6. press Alt-Ctrl-F7 and login
Subscribe to:
Posts (Atom)