[126001330010] |
Beginners Guide for GnuPG in Ubuntu
[126001330020] |Introduction
[126001330030] |I am going to give a basic run down of how to use GnuPG to encrypt files, sign your messages, read encrypted messages from your friends and whatnot, along with some of useful commands and applications you can use in aiding you along the way :)
[126001330040] |First off, incase you don't understand completely (which is absolutely fine, as we are not expected to know everything), GPG is a key-based encryption method.
[126001330050] |You will be given a public key and a private key.
[126001330060] |The private key, as indicated, should remain private as to keep the entire idea of encryption secure.
[126001330070] |A person who holds your public key and wishes to send you an encrypted message, would encrypt the message with your public key.
[126001330080] |They can not decrypt their own message after they encrypt it.
[126001330090] |Only you, who holds the private key can decrypt the message.
[126001330100] |Applications
[126001330110] |There are two different GUI based applications which can assist you in setting up a GPG key.
[126001330120] |These two are GPA, which is a very simple application that does everything you need, as far as key managing, deleteing, adding, signing and adding a level of trust to another person's public key.
[126001330130] |The second one is seahorse.
[126001330140] |It is built for Gnome, and uses the gnome-keyring (if I am not mistaken) so it is a little bit more heavy than GPA, which is my favorite.
[126001330150] |(Note to the reader, I am not a KDE user, but I am sure there is a KDE GnuPG application suited for them.
[126001330160] |I am in no way discriminating them from this guide for any reason).
[126001330170] |Let's begin by installing GPA and seahorse (or you can choose one of the two if you wish).
[126001330180] |From the Terminal (Applications >Accessories >Terminal), run the following command: Code:
[126001330190] |sudo apt-get install gpa seahorse
[126001330200] |To launch GPA, from run dialog (ALT + F2) or the terminal: Code:
[126001330210] |gpa
[126001330220] |To launch seahorse, from the run dialog (ALT + F2) or the terminal: Code:
[126001330230] |seahorse
[126001330240] |Both of this GUI applications give you the opportunity to create a GPG key from their menus, and if you wish to do it that way, you may do so.
[126001330250] |It should be very simple and informational, so I will not explain how to do it from those applications (as it could also be subject to change over time).
[126001330260] |Another application worth mentioning would be FireGPG for Firefox.
[126001330270] |It can encrypt / decrypt / sign / verify / import and export with GPG.
[126001330280] |To install it for Firefox, please visit their website:http://firegpg.tuxfamily.org/?page=install&lang=en
[126001330290] |Key Generating
[126001330300] |As an alternative, you could create a GPG key from the command line of the terminal.
[126001330310] |To do so, launch your terminal (Applications >Accessories >Terminal) and run the following command, to get started: Code:
[126001330320] |gpg --gen-key
[126001330330] |You will then be prompted back with the following: Code:
[126001330340] |Please select what kind of key you want: (1) DSA and Elgamal (default) (2) DSA (sign only) (5) RSA (sign only)Your selection?
[126001330350] |You will want to select number 1, as it can be used for encryption and decryption, whereas the second and third choices are only allowed to sign messages.
[126001330360] |To do so, press the number 1, and then press enter.
[126001330370] |You then will be prompted with the following: Code:
[126001330380] |DSA keypair will have 1024 bits.ELG-E keys may be between 1024 and 4096 bits long.What keysize do you want? (2048)
[126001330390] |You will want to enter "2048" here, as recommended by gnupg.
[126001330400] |If you don't want your key to expire (for the next prompt, select 0).
[126001330410] |Answer yes if the information is correct, when prompted, and then enter your Real Name, Email address, and a comment (which is optional).
[126001330420] |If everything is correct, press "o" (for Ok) and then enter.
[126001330430] |You will then be asked to enter a passphrase.
[126001330440] |This process will be repeated.
[126001330450] |As always, make a strong password which would be difficult to crack.
[126001330460] |Do not enter a name / address / birthdate or word from a dictionary as your password.
[126001330470] |Take the usual precautions, and make it random and difficult to crack.
[126001330480] |After entering your passphrase, follow the instructions in the terminal: Code:
[126001330490] |We need to generate a lot of random bytes. It is a good idea to performsome other action (type on the keyboard, move the mouse, utilize thedisks) during the prime generation; this gives the random numbergenerator a better chance to gain enough entropy.
[126001330500] |When you have successfully finished generating your key, you will see a message similar to the following: Quote: Your KEY-ID would be the two keys (both identical) above which are in bold.
[126001330510] |The Key fingerprint is also listed there.
[126001330520] |Key Servers
[126001330530] |Key servers are used to distribute your public key to other key servers and so other users can easily look your name (or email up) in the database and find your public key to send encrypted messages to you.
[126001330540] |This eliminates the process of physically or unsecurely giving your friend your public key, and allows others to be able to find you on an online database.
[126001330550] |To upload your public key to the Ubuntu keyserver, there are 2 ways to do this.
[126001330560] |By pasting your ASCII Armored Public Key into the submission box at the Ubuntu Keyserver
[126001330570] |By using the terminal and gnupg to send your public key to the Ubuntu Keyserver.
[126001330580] |To accomplish method 1, you will need to open seahorse, select your key under "My Personal Keys" and click the "Export Public Key" in the toolbar.
[126001330590] |You can optionally choose the name and location of which it will be saved to.
[126001330600] |Proceed to open up:http://keyserver.ubuntu.com:11371while opening your newly exported public key with a text editor (gedit).
[126001330610] |Select and copy the entire contents of your public key file, and paste it into the "Submit a Key" text area on the Ubuntu Keyserver (link provided above).
[126001330620] |Submit it, and it should then proceed to submit the key to the keyserver.
[126001330630] |You should then be able to search for your email or name in the search string box on the Ubuntu Keyserver page, to find your public key on the internet.
[126001330640] |This is undoubtedly the Graphical way of doing it, but it can be somewhat longer.
[126001330650] |To do it by the means of method 2, you would first need to open up a terminal (Applications >Accessories >Terminal) and paste the following into it: Code:
[126001330660] |gpg --send-keys --keyserver keyserver.ubuntu.com
[126001330670] |Naturally, you would replace with your public key id, as stated before.
[126001330680] |It also helps to memorize it, like I have done ;)If you forget what your keyid is, just run: Code:
[126001330690] |gpg --list-keys
[126001330700] |That will list the keys registered with your email (and since there should only be one, it will only list your key.)
[126001330710] |Then you can obtain your KEY-ID and run the command above, to submit it to the keyservers.
[126001330720] |Importing Keys
[126001330730] |There are four different methods to importing a key, as stated below:
[126001330740] |FireGPG
[126001330750] |GPA
[126001330760] |Seahorse
[126001330770] |Terminal
[126001330780] |All are quite simple to do, but FireGPG is the easiest of all if you are importing a public key from a keyserver with Firefox.
[126001330790] |I will briefly explain all four.
[126001330800] |FireGPGIf you have somebody's public key on a webpage while in Firefox and have installed FireGPG (as mentioned above under Applications), then simply highlight the Public key from beginning PGP comment to ending PGP comment, right click on it, select FireGPG and click the Import button.
[126001330810] |It's that simple!
[126001330820] |For your information, to solve confusion, the beginning and ending PGP comment tags look like the following: Code:
[126001330830] |-----BEGIN PGP PUBLIC KEY BLOCK----------END PGP PUBLIC KEY BLOCK-----
[126001330840] |GPAIf someone has given you their public key as a file, simply launch GPA and select "Import" from the toolbar.
[126001330850] |SeahorseIf someone has given you their public key as a file, you can do one of two things.
[126001330860] |First, you can open up Nautilus and double click this file, and it should automatically import the public key into your GnuPG, or open Seahorse and select "Key" from the menu and click "Import".
[126001330870] |TerminalOpen up the terminal (Applications >Accessories >Terminal) and type: Code:
[126001330880] |gpg --import KEYFILE
[126001330890] |KEYFILE would be the filename of the public key in your home folder.
[126001330900] |(If it is not in your home folder, please cd to the proper directory first, and then run the above command.)
[126001330910] |Tips and Tricks
[126001330920] |Here is some more valuable information that can be useful when encrypting / decrypting files with GPG from the terminal.
[126001330930] |List KeysIf you wish to see all of the keys you have imported into GnuPG, you can issue the following command: Code:
[126001330940] |gpg --list-keys
[126001330950] |Encrypt a FileIf you wish to encrypt a file for your friend with his Public Key, run the command in the following format: Code:
[126001330960] |gpg -o encrypted_file.gpg --encrypt -r original.file
[126001330970] |Explanation:-o encrypted_file.gpg = Output to the following filename.--encrypt = Duh, that's the encrypting part :D-r = Recipient.
[126001330980] |KEY-ID would be your friends KEY-ID here.original.file = The original file that you will be encrypting.
[126001330990] |Decrypt a FileIf someone has sent you a file that has been encrypted with your public key, you can decrypt it by the following: Code:
[126001331000] |gpg --decrypt filename.gpg
[126001331010] |Clearsign a DocumentClearsigning is very similar to adding your signature to the bottom of a letter or important paper.
[126001331020] |It signifies that it actually came from you.
[126001331030] |By clearsigning, it generates a SHA1 hash of the entire file's contents and add's the SHA1 sum to the bottom of the signature.
[126001331040] |If the file has been tampered with, the signature verification will fail, which can be used to spot forgery.
[126001331050] |If the user has edited the file after it has been signed, the verification of the signature will also fail, because the SHA1 sum will not match that of the actual content.
[126001331060] |To clearsign a document / file, run the following: Code:
[126001331070] |gpg --clearsign filename.txt
[126001331080] |Exporting your Public KeyTo export your public key in ASCII Armored fashion, run the following command: Code:
[126001331090] |gpg --export -a >publickey.asc
[126001331100] |Replace with your Public Key ID, and it will create a file called "publickey.asc" which you can distribute to your friends and they can import.
[126001331110] |Symmetric EncryptionGPG can also do a symmetric encrytion where you can encrypt a file with a passphrase (this is not keybased encryption).
[126001331120] |To encrypt a file with a passphrase, use this: Code:
[126001331130] |gpg -c filename.txt
[126001331140] |To decrypt this type of file, just use: Code:
[126001331150] |gpg filename.txt
[126001331160] |And you will be prompted for the passphrase and it will decrypt the file.
[126001331170] |Credits from original thread Here
[126001340010] |Howto: Sniff or Hack someone’s username and password over an SSL encrypted connection with Ubuntu Linux
[126001340020] |Do you think you're safe if you type https :// before gmail.com or paypal.com?
[126001340030] |I hope you'll think twice before you login from a computer connected to a wireless network after reading this guide.
[126001340040] |Let's start at the beginning.
[126001340050] |Let's say you have an evil neighbour who wants your paypal credentials.
[126001340060] |He buys himself a nice laptop with a wireless card and, if you are using a wep encryption, he cracks your wep code (click here to see how).
[126001340070] |After cracking the key he logs into your network.
[126001340080] |Maybe you always allowed him to use your network because you thought it can't do any harm to your computer.
[126001340090] |You aren't sharing any folders so what's the problem?
[126001340100] |Well, in the next few steps I'm going to describe the problem.
[126001340110] |Guide
[126001340120] |1. Let's assume your neighbour uses linux to crack your wep key.
[126001340130] |After cracking it, he installs ettercap (http://ettercap.sourceforge.net/) on his linux system.
[126001340140] |If you want to do this at home, I would recommend you to download BackTrack because it already has everything installed.
[126001340150] |If you want to install it on your own linux distribution, download the source and install it with the following commands:
[126001340160] |$ tar -xzvf ettercap-version.tar.gz
[126001340170] |$ make
[126001340180] |$ make install
[126001340190] |To install in Ubuntu simply click here within firefox or:sudo apt-get install ettercap-gtk
[126001340200] |2. After installing, you need to uncomment some code to enable SSL dissection.
[126001340210] |Open up a terminal window and type “nano /usr/local/etc/etter.conf”, without the quotes.
[126001340220] |Scroll down using your arrow keys until you find this piece of code:
[126001340230] |if you use iptables:
[126001340240] |# redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”
[126001340250] |# redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”
[126001340260] |You need to uncomment the last two lines.
[126001340270] |redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”
[126001340280] |redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”
[126001340290] |3. Press CTRL+O, press enter to safe the file and then press CTRL+X.
[126001340300] |4. Start Ettercap and click on Sniff >Unified Sniffing >type in your wireless interface and press ok.
[126001340310] |5. Press CTRL+S to scan for hosts
[126001340320] |6. Go to MITM >ARP poisoning, select sniff remote connections and press ok.
[126001340330] |7. Now you (and your neighbour!) can start sniffing!
[126001340340] |Press start >start sniffing.
[126001340350] |Walk to another computer on your network and open up paypal or any other site where you need to type in an username/password (gmail, hotmail, digg.com, etc.).
[126001340360] |All credentials will appear on the computer running Ettercap!
[126001340370] |8. When you're done, don't just close Ettercap, but go to Start >Stop Sniffing, and then go to MITM >Stop mitm attack(s).
[126001340380] |But how does all this stuff work?
[126001340390] |Look at the following scheme:
[126001340400] |Normally when you type in a password, host 1 (your computer) directly connects to host 2 (your modem or router).
[126001340410] |But if someone launced Ettercap on your network, host 1 isn't sending it's passwords to host 2, but to the Attacking host, the host that's running Ettercap!
[126001340420] |The attacking host sends everything to Host 2.
[126001340430] |This means that host 1 isn't noticing anything!
[126001340440] |Exactly the same happens with everything that host 2 is sending.
[126001340450] |Host 2 doesn't send packets directly to host 1, but forst to the attacking host.
[126001350010] |List of Ubuntu Keyboard Shortcuts
[126001350020] |I am a big fan of Hotkeys/shortcuts, here is a few I have collected, I will be adding more as I find them.
[126001350030] |Several of the most popular keyboard shortcuts in Windows work in Ubuntu as well, such as Ctrl-C to copy, Ctrl-V to paste, and Ctrl-S to save a file.
[126001350040] |Here are a few others for working faster in Ubuntu and its apps:
[126001350050] |Alt-Ctrl-L Locks the screen.
[126001350060] |Alt-F1 opens the Applications menu, then use the arrow keys to navigate the submenus.
[126001350070] |Alt-F2 opens the Run Application dialog box.
[126001350080] |Alt-F3 opens the Deskbar Applet (F3 opens the search bar at the bottom of the window).
[126001350090] |Alt-F4 closes the current window.
[126001350100] |Alt-F5 unmaximizes the current window (if it's maximized, of course).
[126001350110] |Alt-F7, followed by arrow keys or mouse movement, adjusts the current window's position.
[126001350120] |Alt-F8 resizes the current window.
[126001350130] |Alt-F9 minimizes the current window.
[126001350140] |Alt-F10 maximizes the current window.
[126001350150] |Alt-spacebar opens the window menu.
[126001350160] |Alt-Tab moves between open windows.
[126001350170] |Ctrl-Alt-Tab moves between open panels on the desktop.
[126001350180] |Ctrl-W closes the current window.
[126001350190] |Ctrl-Q closes the current application.
[126001350200] |Here are some keyboard shortcuts for working in the Terminal window:Ctrl-C kills the current process.
[126001350210] |Ctrl-Z sends the current process to the background.
[126001350220] |Ctrl-D logs you out.
[126001350230] |Ctrl-R finds the last command matching the entered letters.
[126001350240] |Tab followed by entered letters lists the available commands beginning with those letters.
[126001350250] |Ctrl-U deletes the current line.
[126001350260] |Ctrl-K deletes from the cursor right.
[126001350270] |Ctrl-W deletes the word before the cursor.
[126001350280] |Ctrl-L clears the terminal output.
[126001350290] |Shift-Insert pastes the contents of the clipboard.
[126001350300] |Alt-F moves forward one word.
[126001350310] |Alt-B moves backward one word.
[126001350320] |If you know of any other Shortcuts, please feel free to post them in the comments!
[126001350330] |Adjust your keyboard shortcuts: Ubuntu makes it easy to customize your shortcuts.
[126001350340] |Click System >Preferences >Keyboard Shortcuts, select one of the shortcuts in the list, and enter your preferred keystroke combination.
[126001350350] |You can also alter your keyboard accessibility options by clicking System >Preferences >Universal Access >Keyboard Accessibility.
[126001350360] |Here you can enable and adjust the timing for sticky keys, repeat keys, slow keys, bounce keys, toggle keys, and mouse keys (these convert your numeric keypad into mouse controls).
[126001360010] |Howto: Setup the 2WIRE 802.11g Wireless USB Adapter for Ubuntu Feisty, Gutsy, and Heron!
[126001360020] |The 2WIRE USB Adapter comes with 2Wire home portals, it has long plagued Ubuntu and Linux users alike, I have had one for quite a while(got it with my 2WIRE Home Portal) and it has been collecting dust, to get this running on Ubuntu I had tried everything, I searched the web and didnt find a thing, just complaints that it doesnt work and people having problems.
[126001360030] |If you have the same card as me and use TKIP encryption, this will definately work for you, enjoy!
[126001360040] |Ok first lets see if you have the same card as me:open up a terminal and type:
[126001360050] |lsusb
[126001360060] |If you see 1630:0005 you have the same exact card, and if yours looks like the picture above like mine does this should help you :)
[126001360070] |Now what we must do is grab The drivers that are located in the root directory of the 2WIRE installation cdrom or wget them from my hosting:
[126001360080] |wget http://www.users.qwest.net/~choice240662796/WlanUIG.infwget http://www.users.qwest.net/~choice240662796/WlanUIG.sys
[126001360090] |Then what we must do is load the driver:
[126001360100] |sudo ndiswrapper -i WlanUIG.inf
[126001360110] |Lets see if it loaded properly shall we?type:
[126001360120] |$ ndiswrapper -lwlanuig : driver installed device (1630:0005) present
[126001360130] |Sweet!
[126001360140] |Its loaded now we are half way finished!
[126001360150] |Then lets write module alias configuration for all devices:sudo ndiswrapper -ma
[126001360160] |Now lets write module install configuration for all devices so its starts on boot!sudo ndiswraper -mi
[126001360170] |Ok then finally lets load up ndiswrapper kernel module to see if it works!sudo modprobe ndiswrapperNow lets type:
[126001360180] |sudo iwconfig
[126001360190] |Now you should see a new wireless adaptor listed "wlan0, if not your fuqd and you need to ask for help!
[126001360200] |Now that the driver is loaded we can move to the next step, installing wpa_supplicant:
[126001360210] |sudo apt-get install wpasupplicant
[126001360220] |Now lets configure Wpa Supplicant!
[126001360230] |Now that wpa supplicant is installed we need to grab some basic information:
[126001360240] |Wireless SSIDWireless psk passphrase
[126001360250] |Once you have these we need to issue this command:
[126001360260] |wpa_passphraseusage: wpa_passphrase [passphrase]
[126001360270] |Ok you see whats above?
[126001360280] |Great now Lets follow the usage instructions above
[126001360290] |wpa_passphrase 2WIRE31337 mysecurepassword
[126001360300] |Here is the output:
[126001360310] |network={ ssid="2WIRE31337" #psk="mysecurepassword" psk=1a2043835852349c1c8288323f8899324259ce3845c1ee44fab7f3ee4ee8eb20}
[126001360320] |Ok now lets open up wpa supplicants config filesudo gedit /etc/wpa_supplicant.conf
[126001360330] |Now you need to edit your config file like so
[126001360340] |ctrl_interface=/var/run/wpa_supplicantap_scan=2
[126001360350] |network={ ssid="2WIRE31337" <-- your ssid of course psk=1a2043835852349c1c8288323f8899324259ce3845c1ee44fab7f3ee4ee8eb20 <-- generated psk above key_mgmt=WPA-PSK proto=WPA pairwise=TKIP}
[126001360360] |Ok Save the file with ctrl-s and exit gedit.
[126001360370] |Now we have to make wpa_supplicant load when system boots, so go back to the terminal window and type:
[126001360380] |sudo gedit /etc/network/interfaces
[126001360390] |Here is the static network configuration, make sure it is setup properly according to your router/network settings:
[126001360400] |auto wlan0iface wlan0 inet staticaddress 192.168.1.66netmask 255.255.255.0wireless-essid 2WIRE31337gateway 192.168.1.254pre-up wpa_supplicant -Bw -Dwext -iwlan0 -c/etc/wpa_supplicant.confpost-down killall -q wpa_supplicant
[126001360410] |Alternately Here is the Dynamic Configuration, uncomment to use:
[126001360420] |#auto wlan0#iface wlan0 inet dhcp#pre-up wpa_supplicant -Bw -Dwext -iwlan0 -c/etc/wpa_supplicant.conf#post-down killall -q wpa_supplicant
[126001360430] |Now once /etc/network/interfaces is properly configured lets ctrl-s to save then exit.
[126001360440] |Now if all goes well you should be connected, lets find out!
[126001360450] |sudo /etc/network/interfaces restartping www.yahoo.com :)
[126001360460] |Lost your 2wire USB Install CD?
[126001360470] |I got you covered, here is the full CD that came with my 2WIRE USB Dongle, drivers, docs and all!
[126001370010] |Howto: Watch P2P Tv with SopCast with Ubuntu Gutsy
[126001370020] |Here is a little information about SopCast, below is the guide to get it set up.
[126001370030] |SopCast is a simple, free way to broadcast video and audio or watch the video and listen to radio on the Internet.
[126001370040] |Adopting P2P(Peer-to-Peer) technology, It is very efficient and easy to use.
[126001370050] |Let anyone become a broadcaster without the costs of a powerful server and vast bandwidth.
[126001370060] |You can build your own TV stations comparable with large commercial sites with minimal resources.
[126001370070] |Using SopCast, you can serve 10,000 online users with a personal computer and a home broadband connection.
[126001370080] |SoP is the abbreviation for Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based on P2P.
[126001370090] |The core is the communication protocol produced by Sopcast Team, which is named sop://, or Sop technology.
[126001370100] |Features:
[126001370110] |State-of-the-art P2P technology.
[126001370120] |Share the data among all viewers, make the channel more available and stable.
[126001370130] |Minimal delay in the P2P streaming market.
[126001370140] |Fast buffering.
[126001370150] |10-30seconds.
[126001370160] |Firewall and NAT traversal technology to pass 90% P2P barriers.
[126001370170] |Build your own channels and broadcast it over the Internet.
[126001370180] |Streaming real time streams.
[126001370190] |Support for many streaming transport protocol. mms, http, etc.
[126001370200] |Streaming media files.
[126001370210] |Many file types: asf, wmv, rm, rmvb, mp3, etc.
[126001370220] |Support for loop file playing.
[126001370230] |Extremely low memory footprint and CPU load
[126001370240] |Standard channel URL: click on any sop:// URL to play.
[126001370250] |Real time monitor of broadcasting source quality and network quality to help viewers to select a appropriate channel.
[126001370260] |Record the clips when you are watching it.
[126001370270] |Can play the stream with your favorite player, such as Windows Media Player, RealPlayer, VLC, etc.
[126001370280] |Memory buffering, no harm to the hard disk.
[126001370290] |Support for authentication for both the broadcasters and the viewers.
[126001370300] |The broadcaster has full control on his channels.
[126001370310] |End-to-End security, encrypted messages, hi level P2P security, no hijack.
[126001370320] |Support multiple channels broadcast on the same server.
[126001370330] |Normally, you can run 5-10 channels on one PC.
[126001370340] |The Sop Player can be embedded into a webpage or any software applications.
[126001370350] |It works just like Windows Media Player.
[126001370360] |The Sop Server and Sop Player can be run both on Windows and Linux.
[126001370370] |The whole system can be ported to embedded Linux.
[126001370380] |Freeware, not ad/spy ware
[126001370390] |This guide will help you install sopcast on Ubuntu 7.10 Gutsy.
[126001370400] |It will also help you get a special modified version of the GUI running and setup firefox to send sop:// links to the program.
[126001370410] |Installing packages
[126001370420] |Make sure you have all universe and multiverse repositories switched on.
[126001370430] |Then, in terminal:
[126001370440] |sudo apt-get install qt3-apps-dev vlc build-essential
[126001370450] |Downloading the latest SopCast binary
[126001370460] |Link: Sopcast ix86 binary
[126001370470] |Unzip it and cd into that directory using terminal.
[126001370480] |Then run:
[126001370490] |sudo cp sp-sc-auth /usr/bin/sp-sc
[126001370500] |Downloading and building the latest GUI
[126001370510] |Download this specially modified source package.
[126001370520] |I have added URL handling.
[126001370530] |Link: RKMOD version of QSopCast
[126001370540] |Aga*in, unzip it and cd into that (src) directory using terminal.
[126001370550] |Then run
[126001370560] |sudo qmakesudo makesudo make install
[126001370570] |This should compile the source and install the binary into the correct location.
[126001370580] |Creating a menu shortcut
[126001370590] |Go to System / Preferences / Main Menu... then 'Internet' and 'Add New Item'.
[126001370600] |Give it the name "QSopCast" and command "qsopcast".
[126001370610] |You should now be able to launch from the main menu.
[126001370620] |Setting up the GUI
[126001370630] |Once the gui is open, goto config then config again.
[126001370640] |Make sure that the player settings are all set to "vlc" and that the channel URL is set to "http://www.sopcast.com/gchlxml"
[126001370650] |You should now be able to watch sop casts by selecting a channel, launching it and then hitting player when the stream is at 100%
[126001370660] |Firefox sop:// URLS
[126001370670] |Go into firefox and enter URL: "about:config".
[126001370680] |Right click, select new and string.
[126001370690] |The string name is "network.protocol-handler.app.sop" and the value is "qsopcast".
[126001370700] |It should now send sops to the modified version of QSopCast ready to be launched.
[126001380010] |Howto: Install new Slickness theme in Ubuntu Feisty Gutsy, and Heron
[126001380020] |I ran across another slick theme, its called SlickNess, It is actually pretty slick, reminds me of the Ubuntu Studio theme with a few nice improvements, let me know what you think.
[126001380030] |This baby is easy to install, here are the directions:
[126001380040] |To install:1.Download the file to your desktop from here2.Right click the file and select extract here3.open a terminal and run these commands:
[126001380050] |sudo cp -r $HOME/Desktop/SlicknesS /usr/share/themes
[126001380060] |sudo chmod 777 /usr/share/themes/SlicknesS/Slickness.jpg
[126001380070] |Third (this one fixes firefox, This fix is made by user twrock, so if he wants me to delete it i will)cp /usr/share/themes/SlicknesS/userChrome.css $HOME/.mozilla/firefox/*.default/chrome
[126001380080] |Open the theme manager, you can now see the Slickness theme as a theme when you click on it , it suggests a wallpaper, click apply to apply the wallpaper!
[126001380090] |the icon theme it suggests is this one:black-white 2 Style bigSave the file in ~/.icons and extract the archive and go into System->Prefs->Appearance and Customize the Slickness theme and select icons and then black-white_style big and your done :)Enjoy
[126001390010] |Securely Delete files from Journaling Filesystems in Ubuntu and Linux Operating Systems
[126001390020] |Previously I posted a tutorial on setting up wipe with Nautilus, It has come to my attention that since ext3 is a journaling file system that wipe isn't enough to securely delete files from people that have the tools/hardware to recover files, today I will show you how to delete a file that is unrecoverable to the best of my knowledge..
[126001390030] |Read on if you like :)WARNING: DO NOT RUN THESE POSIX COMMANDS UNLESS YOU ARE EXTREMELY CAREFUL
[126001390040] |Issue these commands carefullydd if=/dev/zero of="file you want shreded"syncshred -u -v -n 5 "file you want shreded"sync
[126001390050] |Breaking it down, the commands say this:
[126001390060] |* dd: "move data around"
[126001390070] |* if=: "the input file is..."
[126001390080] |* /dev/zero: "not a file at all, but a device that outputs an unending stream of zeros"
[126001390090] |* of=: "and the output file is..."
[126001390100] |* sync writes any data buffered in memory out to disk.
[126001390110] |This can include (but is not limited to) modified super blocks, modified inodes, and delayed reads and writes.
[126001390120] |This must be implemented by the kernel; The sync program does nothing but exercise the sync(2) system call.
[126001390130] |* shred Overwrites the specified FILE(s) repeatedly, in order to make it harder for even very expensive hardware probing to recover the data.
[126001390140] |If you have any other suggestions please share your knowledge, security
[126001400010] |Access and Synchronize GetDeb.net packages through Apt-get and Synaptic
[126001400020] |If you already dont know about getdeb.net, it is a great site to download the latest software, not many people know this but you can use getdeb's mirrors as repositories to sync your GetDeb packages with the update manager and Synaptic.
[126001400030] |1. Open up a terminal (applications>accessories> Terminal) and run the following:
[126001400040] |sudo echo "deb http://ubuntu.org.ua/ getdeb/" | sudo tee -a /etc/apt/sources.list
[126001400050] |or
[126001400060] |deb http://mirrors.dotsrc.org/ getdeb/
[126001400070] |If I were you I would ping each host to see which is closer and add that one
[126001400080] |Save the file and exit.
[126001400090] |3. Now run the following in the terminal:
[126001400100] |sudo apt-get updatesudo apt-get upgrade
[126001400110] |Now you should be able to install GetDeb.net programs through the Synaptic package manager as well as apt.
[126001410010] |HOWTO: Adobe Air and Xdrive® Desktop Lite Under WINE in Ubuntu Gutsy
[126001410020] |Wow, I was just experimenting with wine and I found out the new adobe air works flawlessly in Ubuntu with wine, it will probably work with other distro's but lets take a look how I set this up with Ubuntu w/Wine.
[126001410030] |Adobe Air applications are pretty sweet!
[126001410040] |Xdrive® Desktop Lite install file (http://xdrive.com/downloads/)Windows Beta3 installer for Adobe Air (http://labs.adobe.com/downloads/air.html)WINE (I used 0.9.54)Cant find adobe air?wget http://ubuntu-debs.googlecode.com/files/air_b3_win_121207.exe
OK.
[126001410050] |Go to your command line, get to the directory of the executable downloaded and do:"wine air_b3_win_121207.exe
"
(This is the filename that I downloaded off of the Adobe Labs site)
[126001410060] |This will bring up the installer.
[126001410070] |Go through the prompts and it will say that it installed fine.
[126001410080] |Now, we need to install the Xdrive® Desktop Lite client.
[126001410090] |To do this, we have to run the install air application executable located in the Adobe Air folder in your "C Drive"/home//.wine/drive_c/Program Files/Common Files/Adobe AIR/Versions/
[126001410100] |In this directory run the command:wine "Adobe\ AIR\ Application\ Installer.exe"
[126001410110] |A dialog box will pop up letting you browse to select the xdrive .air install file.
[126001410120] |Now you will be asked a few questions, simply click install!
[126001410130] |Next you will be asked where to install and it will ask you if you want to save an icon on the desktop, select yes and then uncheck run after installer finishes.
[126001410140] |Once it is installed you can double-click the "Xdrive Desktop Lite" icon on the desktop with a wine glass.
[126001410150] |Once you run it this is how it will appear!
[126001410160] |After you Login you can upload/download and copy/paste, add/remove folders in Xdrive :)
[126001410170] |Here is more information on Xdrive® Desktop Lite from the official Xdrive WebsiteIf you like this baby, check out these applications:Google Analytics Air application hereTwitter App: HereHere is hundreds more!
[126001410180] |P.S. Please let me know how everything installed, and if you experimented with any other adobe air apps!
[126001430010] |Howto: Make Ubuntu look like fedora with the Nodoka Theme
[126001430020] |[updated] Upgraded nodoka engine to fedore core 9's and added echo-icon-set from git
[126001430030] |I really dont like fedora, but its theme is nice and crisp, check it out, if you dont like it rm -rf :)
[126001430040] |Install build-essential and libgtk2.0-dev packages:sudo apt-get install build-essential libgtk2.0-dev
[126001430050] |Download Nodoka GTK+ engine 0.6 from here
[126001430060] |dpkg -i gtk-nodoka-engine_0.6-1_i386.deb
[126001430070] |Install theme
[126001430080] |Get Nodoka theme 0.3.90 from here.
[126001430090] |Then execute command in terminal:tar zxvf nodoka-theme-gnome-0.3.90.tar.gz
[126001430100] |copy the Nodoka folder to themes folder:cd nodoka-theme-gnome-0.3.90/sudo cp -r Nodoka/ /usr/share/themes/
[126001430110] |Grab the echo icon set
[126001430120] |→Preferences →Theme menu command.
[126001430130] |In Theme Preferences dialog, choose Nodoka item.
[126001430140] |Also click on the customize tab then click on icons and select "Echo"
[126001430150] |Enjoy -defcon
[126001440010] |How to destroy all your data on your Ubuntu Linux system!
[126001440020] |WARNING: Do NOT try these examples; they will cause data loss!
[126001440030] |If you intentionally want to wipe your hard drive or destroy all data on it, here are a few examples!
[126001440040] |The following examples are provided to warn about the dangers of dd, if used incorrectly.
[126001440050] |Trying any of these commands with the proper privileges will almost certainly result in major data loss, and may make the system unusable.
[126001440060] |In order to prevent accidental copying and pasting, “dd” has been replaced with “[dd]” here.
[126001440070] |This overwrites the complete first hard disk with null bytes, erasing it (though not in a manner that is as secure as overwriting with random data):
[126001440080] |[dd] if=/dev/zero of=/dev/hda
[126001440090] |This overwrites the first few blocks of the first hard disk with the file, resulting in a loss of the partition table:
[126001440100] |[dd] if=funnysong.mp3 of=/dev/hda
[126001440110] |This will completely corrupt an entire hard disk (/dev/dsp is the sound player/recorder):
[126001440120] |[dd] if=/dev/dsp of=/dev/hda
[126001440130] |This will overwrite an entire disk with pseudorandom data, making its initial contents unrecoverable outside a clean room in a hard drive forensics laboratory, and probably unrecoverable there as well.
[126001440140] |[dd] if=/dev/urandom of=/dev/hda
[126001440150] |The examples above presume device names (valid on some Linux systems) that may be different on other platforms.
[126001440160] |Here are some common variations.
[126001440170] |Mac OS X:
[126001440180] |[dd] if=/dev/zero of=/dev/disk0
[126001440190] |Minix:
[126001440200] |[dd] if=/dev/zero of=/dev/c0d0p0
[126001440210] |NetBSD/OpenBSD (does not work if securelevel >1):
[126001440220] |[dd] if=/dev/zero of=/dev/rwd0
Let me know if you find anything more destructive/efficient!
[126001450010] |Overglossed GTK2 Theme with hot icons and Obsidian Cursors in Ubuntu Gutsy or Heron!
[126001450020] |Ok I found an other awesome theme for Ubuntu, you gotta check this out, here is how I got my box setup....
[126001450030] |Ok lets install this baby!
[126001450040] |First lets grab Overglossed theme and install it!wget http://ubuntu-debs.googlecode.com/files/Overglossed.tar.gztar zxvf Overglossed.tar.gzsudo mv $HOME/Desktop/Overglossed /usr/share/themessudo chmod 777 /usr/share/themes/Overglossed/overglossed.jpg
Now...
[126001450050] |Lets install the black/white 2 style icon pack!wget http://ubuntu-debs.googlecode.com/files/black-white_2-Style.tar.gztar zxvf black-white_2-Style.tar.gzsudo mv black-white_2-Style/ /usr/share/icons
Now lets set up the Obsidian Cursor theme:wget http://ubuntu-debs.googlecode.com/files/Obsidian.tar.gztar zxvf Obsidian.tar.gzsudo mv Obsidian/ /usr/share/icons
[126001450060] |Ok now the fun part, simply go to System->Preferences->Appearance and select Overglossed as the theme and select the black white 2 style icon pack and go into cursor settings and select Obsidian, enjoy!defcon
[126001460010] |Howto: Check File integrity in Ubuntu with NScripts!
[126001460020] |Ok today I was looking for a easy right click md5 checker for nautilus so I can verify that my clipperz password file is secure and unchanged, btw, clipperz is a great password manager that works online and offline and I store all my passwords and sensitive data in these encrypted html files and will auto-login my online accounts.
[126001460030] |But anyways here is a sweet set of scripts that you can enjoy complements of crispyHere are the scripts included:
[126001460040] |Chkmd5:
[126001460050] |Check md5sums
[126001460060] |Maxfiles at once: unlimited
[126001460070] |CopyTo:
[126001460080] |Copy selected files/folders to ...whereever you want. the script willcheck if you have write-permissions.
[126001460090] |Maxfiles at once: unlimited
[126001460100] |InstallTheme:
[126001460110] |Install a Theme to ~/.themes, or /usr/share/themes works withboth tarballs and folders
[126001460120] |Maxfiles at once: unlimited
[126001460130] |InstallIcons:
[126001460140] |Install Icons/Cursors to ~/.icons or /usr/share/icons workswith both tarballs and folders
[126001460150] |Maxfiles at once: unlimited
[126001460160] |Mkmd5:
[126001460170] |Create md5sums
[126001460180] |Maxfiles at once: unlimited
[126001460190] |MoveTo:
[126001460200] |Move selected files/folders to ...whereever you want. the script willcheck if you have write-permissions.
[126001460210] |Maxfiles at once: unlimited
[126001460220] |Rootilus:
[126001460230] |Open the current directory in nautilus, as root
[126001460240] |RootTermInCurdir:
[126001460250] |Open a gnome-terminal with the currentdir as workdir, as root
[126001460260] |SetAsSplash:
[126001460270] |set as session splash screen
[126001460280] |maxfiles at once: one
[126001460290] |Shredder:
[126001460300] |Shred seleted files ... foreverif /dev/random or /dev/urandomexists, it will be used.
[126001460310] |Maxfiles at once: unlimited
[126001460320] |TermInCurdir:
[126001460330] |open a terminal with the currentdir as workdir, as the current user
[126001460340] |SetAsWallpaper:
[126001460350] |set the current file as wallpaper
[126001460360] |SendShortcutTo
[126001460370] |send links to ... wherever you want.
[126001460380] |Maxfiles at once: unlimited
[126001460390] |SendToMenu:
[126001460400] |send desktop-launchers to menu ("Other"-Submenu)
[126001460410] |Now if you want this nice set of scripts grab them hereNow simply extract the files once you get to the download dir and move them to the nautilus-scripts directory then refresh nautilus to load up the scripts for the right click menutar zxvf Nscripts.tar.gz ; mv NScripts ~/.gnome2/nautilus-scripts ; sudo killall -HUP nautilus
[126001470010] |Tweak Ubuntu Boot Speed and Application Startup Time with Preload
[126001470020] |I have been running Preload for months testing it out, and I have gained a substantial speed increase for my daily applications, firefox-3, gimp, vlc, xine, pidgin, xchat and deluge torrent.
[126001470030] |Basically what Preload does is preload frequently used applications in memory before use, so before you even run your frequently used application it is already loaded.
[126001470040] |So I am enjoying the benifit of applications loading almost instantaneously.
[126001470050] |By using Preload, you can put unused RAM to good work, and improve the overall performance of your desktop system.
[126001470060] |If goal is to make application startup times shorter definately install this application!
[126001470070] |Installation:Preload is very easy to install, If you are in firefox try clicking here for a 1 click install! or all you do is simply press ALT-F2, check run in terminal and type this command:sudo apt-get install preload
[126001470080] |Once installed, Preload will start, and no further action is necessary, the default configuration should be left alone because the developer spend much time tweaking it for optimal usage, most likely you will notice a degrade in system performance editing the configuration.
[126001470090] |But if you insist, here is the paper written by the developer Behdad Esfahbod
[126001470100] |If you would like to modify the configuration you can by editing /etc/preload.conf
[126001470110] |MonitoringIf you want to check up on what resources Preload is using, you can monitor its logfile by running:sudo tail -f /var/log/preload.log
If you want more information about the specific files that Preload is caching for you, look at this file:sudo less /var/lib/preload/preload.state
[126001470120] |Preload can provide a great improvement in application startup time; since most modern machines have a good deal of memory to spare, Preload puts this RAM to good use.
[126001470130] |I highly recommend installing Preload on your desktop machine, and although it may take a little while for the daemon to learn your habits before your see any real performance improvement, it's a great tool that increases the speed of your system while staying in the background, out of your way.
[126001490010] |Howto: Setup & Install Truecrypt 5.1a for Linux on Ubuntu
[126001490020] |[updated] The truecrypt team updated Truecrypt today to version 5.1a!
[126001490030] |Ok this is some awesome news from the developers of the famous open source encryption software Truecrypt.
[126001490040] |If you dont know what it is here is an exerpt from the website:
[126001490050] |"TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots (a TrueCrypt-encrypted system drive may also contain non-system partitions, which are encrypted as well)."
[126001490060] |New features:
[126001490070] |Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts).
[126001490080] |For more information, see the chapter System Encryption in the documentation.
[126001490090] |(Windows Vista/XP/2003)
[126001490100] |Pipelined operations increasing read/write speed by up to 100% (Windows)
[126001490110] |Mac OS X version
[126001490120] |Graphical user interface for the Linux version of TrueCrypt
[126001490130] |XTS mode of operation, which was designed by Phillip Rogaway in 2003 and which was recently approved as the IEEE 1619 standard for cryptographic protection of data on block-oriented storage devices.
[126001490140] |XTS is faster and more secure than LRW mode (for more information on XTS mode, see the section Modes of Operation in the documentation).
[126001490150] |Note: New volumes created by this version of TrueCrypt can be encrypted only in XTS mode.
[126001490160] |However, volumes created by previous versions of TrueCrypt can still be mounted using this version of TrueCrypt.
[126001490170] |SHA-512 hash algorithm (replacing SHA-1, which is no longer available when creating new volumes).
[126001490180] |Note: To re-encrypt the header of an existing volume with a header key derived using HMAC-SHA-512 (PRF), select 'Volumes' >'Set Header Key Derivation Algorithm'.
[126001490190] |Improvements, bug fixes, and security enhancements:
[126001490200] |The Linux version of TrueCrypt has been redesigned so that it will no longer be affected by changes to the Linux kernel (kernel upgrades/updates).
[126001490210] |Many other minor improvements, bug fixes, and security enhancements.
[126001490220] |(Windows and Linux)
[126001490230] |If you are using an older version of TrueCrypt, it is strongly recommended that you upgrade to this version.
[126001490240] |Install Instructions:
[126001490250] |Basically all you need to do to install is follow these directions:open up a terminal and type:wget http://www.truecrypt.org/downloads/truecrypt-5.1a-ubuntu-x86.tar.gztar zxvf truecrypt-5.1a-ubuntu-x64.tar.gzcd truecrypt-5.0/sudo dpkg -i truecrypt_5.1a-0_i386.debThere we go, now truecrypt is installed and ready to go, if you prefer the point &click version just download and extract the tar.gz and double click the .deb to install
[126001490260] |To Run:Press ALT-F2 and then type in "truecrypt" without the quotes :)
[126001490270] |For more Documentation/help go to the developers site here
[126001500010] |Introducing Clipperz online and offline password manager for any OS
[126001500020] |I absolutely love clipperz, I use this every day and had to share it with you all, to me this pwnz KeepassX and other offline managers, here is some information from the clipperz site!
[126001500030] |Click To Play
[126001500040] |Clipperz - Keep it to yourself!
[126001500050] |What does Clipperz do?
[126001500060] |You can think of Clipperz as your web Rolodex, a card index where you can enter any sort of confidential data without worrying about security.
[126001500070] |It can be used to store and freely organize passwords, confidential notes, burglar alarm codes, credit and debit card details, PINs, software keys, …
[126001500080] |What problem does Clipperz solve?
[126001500090] |Clipperz does solve the “password fatigue” and make the Internet the most convenient and safe place to store private and sensitive data.
[126001500100] |However since passwords are the most common type of sensitive information that you need to protect, we added a lot of functionalities to make Clipperz the best online password manager.
[126001500110] |Features
[126001500120] |One-click login
[126001500130] |Users can store the details of their online services into Clipperz and quickly create a “direct login” link for each of them: just one click to authenticate and access the online service without typing any username and password.
[126001500140] |View this video or read more …
[126001500150] |Offline copy
[126001500160] |Users can dump their encrypted data from Clipperz servers to a local hard disk or USB drive and create a read-only portable version of Clipperz to be used when no Internet connection is available.
[126001500170] |Clipperz offline copy can also be easily moved to a USB drive. more …
[126001500180] |Clipperz Compact
[126001500190] |A stripped down edition designed for the Firefox sidebar.
[126001500200] |It makes “direct logins” even more addictive!
[126001500210] |And it works with Opera panels too. more …
[126001500220] |Import and export
[126001500230] |It’s your data!
[126001500240] |No vendor lock-in: you can move your data out of Clipperz anytime.
[126001500250] |On the other hand Clipperz provides bulk data import from a variety of formats (CSV, Excel, Keepass, Roboform, …). more …
[126001500260] |Zero-maintenance
[126001500270] |Nothing to install.
[126001500280] |Nothing to backup.
[126001500290] |You can always access your precious data from any computer, any browser, any OS.
[126001500300] |Anonymity
[126001500310] |Clipperz is completely anonymous.
[126001500320] |To open a Clipperz account no personal information or email is requested.
[126001500330] |Just pick a username and a passphrase. more …
[126001500340] |Sharing (coming soon)
[126001500350] |A public key infrastructure is transparently embedded within Clipperz.
[126001500360] |Users can define “trusted contacts” and policies for sharing secrets with them.
[126001500370] |Trust mechanism from the real world could be moved within Clipperz without bothering with certificates and authorities. more
[126001500380] |Register today @ Clipperz, it is free and opensource!
[126001510010] |Howto: Chat anonymously over the Tor Network with Torchat and Ubuntu!
[126001510020] |This howto is for Gutsy or Hardy Heron.
[126001510030] |It shows you how to configure the onion router tor, and install the P2P client torchat. this client is written in python and runs on windows &MAC too!
[126001510040] |TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, giving you extremely strong anonymity while being very easy to use without the need to install or configure anything.
[126001510050] |TorChat just runs from an USB drive on any Windows PC.
[126001510060] |(It can run on Linux and Mac too, in fact it was developed on Linux with cross platform usability in mind from the very first moment on, but the installation on other platforms than Windows is a bit more complicated at the moment)
[126001510070] |Tor location hidden services basically means:
[126001510080] |Nobody will be able to find out where you are.
[126001510090] |If they are already observing you and sniff your internet connection they will not be able to find out
[126001510100] |what you send or receice
[126001510110] |to whom you are sending or receiving from
[126001510120] |where your contacts are located
[126001510130] |1. Install Tor &Privoxysudo apt-get install tor privoxy
[126001510140] |2. Configure Privoxysudo gedit /etc/privoxy/config
add this line at the end: (with the dot at the end)forward-socks4a / localhost:9050 .
Restart Privoxy:sudo /etc/init.d/privoxy restart
Now go to Firefox addons and install this neat SwitchProxy Tool.
[126001510150] |After a FireFox restart, go to Extra >Switch Proxy >manage proxies >add >standard >next.
[126001510160] |Enter the following information into both the HTTP Proxy and SSL Proxy fields.
[126001510170] |Hostname: 127.0.0.1 Port: 8118.
[126001510180] |Use SocksV5 and port 9050 for socksSet up any proxy exceptions you may need (localhost, 127.0.0.1 is a good idea) and then click on OK.(Do this also for the proxy label)
[126001510190] |3. Configure Tor:sudo gedit /etc/tor/torrc
Find the following section and change it to:############### This section is just for location-hidden services ##### Once you have configured a hidden service, you can look at the## contents of the file ".../hidden_service/hostname" for the address## to tell people.#### HiddenServicePort x y:z says to redirect requests on port x to the## address y:z.HiddenServiceDir /var/lib/tor/hidden_service/HiddenServicePort 11009 127.0.0.1:11009#HiddenServiceDir /var/lib/tor/other_hidden_service/#HiddenServicePort 80 127.0.0.1:80#HiddenServicePort 22 127.0.0.1:22
Now lets create the hidden tor dir &restart tor:sudo mkdir /var/lib/tor/hidden_service/
sudo /etc/init.d/tor restart
[126001510200] |4. Install TorchatNow you can use firefox with tor.
[126001510210] |But we want chat, so get the latest Torchat source (at the time of writing this howto it was version 0.9.9.64)mkdir ~/torchat
wget http://torchat.googlecode.com/files/torchat-source-0.9.9.64.zip
unzip torchat-source-0.9.9.64.zip
move source code:(assuming the py files are unpacked in the folder /home/username/src)sudo mv src/* ~/torchat/
Install needed python-wx:sudo apt-get install python-wxgtk2.8 python2.5
Create starter menu entry:sudo gedit /usr/share/applications/torchat.desktop
paste into the editor window:[Desktop Entry]Encoding=UTF-8Name=torchatComment=anonymous chat clientExec=python /usr/share/torchat/torchat.pyIcon=/usr/share/torchat/icons/torchat.icoTerminal=0Type=ApplicationCategories=Application;Internet;
5. get your user ID for torchat:sudo less /var/lib/tor/hidden_service/hostname
This will display something like:hanZcp5y3fljsnay.onion
The red part is your id, tell this ID (without the .onion) to your friends to add you to their torchat.
[126001510220] |6. Tell Torchat your User ID:sudo gedit ~/torchat/tc_client.py
Change OWN_HOSTNAME to your userid, or it will NOT work!OWN_HOSTNAME = "hanZcp5y3fljsnay" #.onion ( <-- change the 16 Quoted chars with your onion ID... the red one from step 5)
7.
[126001510230] |Run Torchat:Now start torchat with the Start menu Icon or from a terminal:python ~/torchat/torchat.py
[126001510240] |You will see a window with your contact list.
[126001510250] |One of the contacts is labled "myself".
[126001510260] |This 16 numbers and letters are your unique address inside the Tor-Network.
[126001510270] |Wait a few minutes until the icon becomes green.
[126001510280] |Give this address to your friends so that they can add you to their list or add your friends address to your list.
[126001510290] |It all basically behaves like you would expect from an instant messenger.
[126001510300] |The Author states that starting TorChat &logging in the tor network can sometimes take up to 15 Minutes (it takes around 1 minute for me)
[126001510310] |The contents of the folder /var/lib/tor/hidden_service are your personal key.
[126001510320] |They must always be kept secret.
[126001510330] |If someone wants to impersonate your identity he must and will try to steal the contents of this folder from you.
[126001510340] |Keep this always in mind.
[126001510350] |It would probably be a good idea to use TorChat in conjunction with something like TrueCrypt.
[126001510360] |8.Removing TorChatIf you have installed torchat following 4. (from source) run:sudo rm /usr/share/applications/torchat.desktopsudo rm -R ~/torchat/
In both cases, don't forget to safely delete the tor hidden_service directory /var/lib/tor/hidden_service/ with e.g. the shred tool!
[126001510370] |Credits:Bits &pieces for this howto were in true open source spirit shamelessly taken from:
[126001510380] |- HOWTO surf anonymous by user dutch
[126001510390] |- Torchat, written by prof7bit
[126001510400] |- Truecrypt FAQ
[126001510410] |- privoxy &tor manpages
[126001510420] |- Installing SwitchProxy for Tor
[126001510430] |- Ubuntu Forums
[126001530010] |Howto: Setup Anonymous SSH Via Tor Hidden Services
[126001530020] |Ok this is my favorite feature of tor, I have a Completely Anonymous ssh server setup for myself to access from anywhere but I prefer not have people from outside my network access the ssh server.
[126001530030] |So, only people with my exact *.onion address can access my computer which is only me!
[126001530040] |Lets get started!
[126001530050] |The first thing I do is setup Vidalia GUI and TOR, there is more information hereNow once you got vidalia and tor setup and running follow these steps:
[126001530060] |Next edit ~/.vidalia/torrc and add these two lines:
[126001530070] |gedit ~/.vidalia/torrc
HiddenServiceDir /home/YOURUSERNAME/.vidalia/sshHiddenServicePort 22 127.0.0.1:22
The HiddenServiceDir contains a text file that we will cat after we execute tor for our anonsecrethostname.onionPort 22 is of course SSH
[126001530080] |Grab connect.c and lets configure it:wget http://ubuntu-debs.googlecode.com/files/connect.c
gcc connect.c -o /etc/ssh/connect
sudo gedit /etc/ssh/ssh_config
Append this to /etc/ssh/ssh_config# use /etc/ssh/connect to use tor to connect to ssh in torlandHost *.onionProxyCommand /etc/ssh/connect -S localhost:9050 %h %p
You can append -d for verbose after /etc/ssh/connect if you have problems...
[126001530090] |Grab your secret host name:cat ~/.vidalia/ssh/hostname
Right Click Vidalia, Stop Tor and Restart it and your done!
[126001530100] |Were done!
[126001530110] |Now you can do a "ssh user@16xdigit.onion" every time your local tor-server is running.
[126001530120] |Enjoy,defconHere is the verbose output when connecting:ssh dude@ka93kasd55srt56.onion -p 22DEBUG: No direct address are specified.DEBUG: relay_method = SOCKS (2)DEBUG: relay_host=localhostDEBUG: relay_port=9050DEBUG: relay_user=dudeDEBUG: socks_version=5DEBUG: socks_resolve=REMOTE (2)DEBUG: local_type=stdioDEBUG: dest_host=ka93kasd55srt56.onionDEBUG: dest_port=22DEBUG: Program is $Revision$DEBUG: checking ka93kasd55srt56.onion is for direct?DEBUG: ka93kasd55srt56.onion is for not direct.DEBUG: resolving host by name: localhostDEBUG: resolved: localhost (127.0.0.1)DEBUG: connecting to 127.0.0.1:9050DEBUG: begin_socks_relay()DEBUG: available auth method[0] = NO-AUTH (0x00)DEBUG: available auth method[1] = USERPASS (0x02)DEBUG: atomic_out() [4 bytes]DEBUG: >>>05 02 00 02DEBUG: atomic_in() [2 bytes]DEBUG: <<< 05 00DEBUG: auth method: NO-AUTHDEBUG: atomic_out() [29 bytes]DEBUG: >>>02 01 00 03 16 32 74 36 12 6a 65 77 ab 35 35 35 32 7e 6f 76 74 2r 7a 6e 69 6f 9e 08 aeDEBUG: atomic_in() [4 bytes]DEBUG: <<< 05 00 00 01DEBUG: atomic_in() [6 bytes]DEBUG: <<< 00 00 00 00 00 00DEBUG: connectedDEBUG: start relaying.DEBUG: recv 38 bytesDEBUG: sent 38 bytesDEBUG: sent 792 bytesDEBUG: recv 498 bytesDEBUG: recv 286 bytesDEBUG: sent 24 bytesDEBUG: recv 152 bytesDEBUG: sent 144 bytesDEBUG: recv 498 bytesDEBUG: recv 222 bytesThe authenticity of host '[ka93kasd55srt56.onion]:22 ()' can't be established.RSA key fingerprint is a5:f5:a1:6a:re:be:55:t1:4b:b8:y2:e3:aa:09:0f:b0.Are you sure you want to continue connecting (yes/no)? yesWarning: Permanently added '[ka93kasd55srt56.onion]:22' (RSA) to the list of known hosts.DEBUG: sent 64 bytesDEBUG: recv 48 bytesDEBUG: sent 64 bytesDEBUG: recv 64 bytesdude@ka93kasd55srt56.onion's password:
[126001540010] |The new Face to VLC Media Player 0.9.0git!
[126001540020] |VLC to me is the best player for Movies, Videos, DVD's, and DiVX!
[126001540030] |Well its time for everyone to upgrade vlc because there is Multiple vulnerabilities found allowing for the execution of arbitrary code and Denial of Service.
[126001540040] |But ya know?
[126001540050] |Im glade I had to upgrade lol, vlc added a whole new face a ton of bug fixes and a few new features :) I'll show you how to install VLC in Ubuntu and setup the Nightly build VideoLan VLC Repository, check it out:
[126001540060] |How to Install or upgrade VLC Media Player for Ubuntu Hardy
[126001540070] |For Ubuntu Hardy I386 add the following line to your sources.list, or add it to System->Administration->Software Sources:deb http://nightlies.videolan.org/build/hardy-i386/arch ./
[126001540080] |Then open up Synaptic and click "Reload", if you already have vlc installed click "Mark all Upgrades" Then click apply then ok.
[126001540090] |Or simply search for VLC if its not installed, check it and apply.
[126001540100] |Want it to install it even easier?
[126001540110] |Click Here for a 1 click install within Firefox!
[126001540120] |The 1-Click install only works after you have updated your repositories and you must use firefox
[126001550010] |Howto: Install Safari on Ubuntu with Flash and Shockwave! (Hulu, Youtube, Shockwave Works!)
[126001550020] |Ok ive been browser hunting and seen a lot of hype about Safari browser's speed so I decided to give it a whirl, I managed to get it install with Flash and it works very well with youtube and hulu !
[126001550030] |Here is how I got it installed, let me know how it goes if you decide to check it out!
[126001550040] |By the way im impressed with the speed, its as fast as firefox, if not faster! (unforunately its not open-source :(
[126001550050] |First lets install Microshit's Core Fonts and wine within the Terminal Applications->Accessories->Terminalsudo apt-get install msttcorefonts wine
[126001550060] |Second Make sure wine is set to use the windows version Xp, just click Applications/Wine/Configure Wineor type "winecfg" in the terminal
[126001550070] |Third lets copy Microshits Core Fonts to the wine font directory!cp /usr/share/fonts/truetype/msttcorefonts/Arial*.ttf ~/.wine/drive_c/windows/fonts/
cp /usr/share/fonts/truetype/msttcorefonts/Times_New_Roman*.ttf ~/.wine/drive_c/windows/fonts/
Make sure wine is set to use the windows version Xp, just click Applications/Wine/Configure Wineor type "winecfg" in the terminalLets download my backup of Safari or download herewget http://ubuntu-debs.googlecode.com/files/SafariSetup.exe
wine SafariSetup.exe
Uncheck ”Install Bonjour for Windows” and “Automatically update Safari and other Apple Software.” after accepting the terms then click install!
[126001550080] |Ok now that Safari is Sucessfully installed in Ubuntu lets install flash for safari!wget http://ubuntu-debs.googlecode.com/files/install_flash_player.exe
wine install_flash_player.exe
[126001550090] |Now Safari is Installed with the correct fonts and has flash, so lets execute Safari From Applications->Wine->Programs->Safari
[126001550100] |Install Shockwave:You gotta download and install shockwave slim or full from the adobe site http://www.adobe.com/shockwave/download/alternates/ then:You need to copy the files located in the adobe shockwave dir to the Safari plugin dirie:cp -R ~/.wine/drive_c/windows/system32/Adobe/Director/* ~/.wine/drive_c/"Program Files"/Safari/Plugins
[126001550110] |Then Check Safari's Installed Plug-ins under the Help menu to see which plug-ins Safari is able to find, it should be there!
[126001560010] |Howto Twitter From the Command Line in Ubuntu!
[126001560020] |Twitter rocks, here is a quick n easy way to twitter from your console in any Unix system:
[126001560030] |sudo apt-get install curl
[126001560040] |sudo gedit /usr/bin/twitter
[126001560050] |Now Paste this in gEdit and simply replace "yourusername" with your username and "yourpasswd" with your twitter passwd and ctrl-s to save, then alt-F4 to exit!
[126001560060] |curl --basic --user "yourusername:yourpasswd" --data-ascii "status=`echo $@|tr ' ' '+'`" "http://twitter.com/statuses/update.json" -o /dev/nullecho Message Sent!
[126001560070] |Then chmod for exec privileges:chmod +x /usr/bin/twitter
All done! w00t!
[126001560080] |Now lets try it out :)
[126001560090] |All you gotta do is:twitter "message here without the quotes"
You dont even need to open the command line, all you gotta do is press alt-F2 and type twitter then your message, and dont forget to check "Run in Terminal"
[126001570010] |Howto:Recover and Undelete files in Ubuntu the easy way!
[126001570020] |Ok I accidentally deleted my /etc/network/interfaces file and didnt have my access point connected to a pc, its just wireless now, so what I did to recover the file was this, please note if you delete the file shutdown your pc immediately or unmount your drive as fast as possible to avoid overwriting the deleted data.
[126001570030] |This method can be used to find unencrypted passwords and interesting information as well.
[126001570040] |This works best from a livecd/unmounted filesystem:grep --binary-files=text -300 "Unique String in Text file" /dev/hda1 >output.txt
The -300 option tells grep to report the 300 lines before the string you chooseBasically this will take quite a while depending on the size of your hard drive and may output a ton of irrelevent information to the output.txt file, you may want to edit the -300 line variable and do man grep to see further usage options.
[126001570050] |This method worked for me only because I shutdown my pc immediately and booted into my Hardy Livecd and the file was still available, I just copied/pasted the relevant output to my interfaces file.
[126001570060] |[update]Alternatively you can use the strings command to dump all the text on a partition then grep the strings output for the relevent output, Here is an example:
[126001570070] |strings /dev/hda1 >bigtxtfile
grep -i "information" bigtxtfile >grepoutputfile
[126001570080] |[update 2]I ran into another program that is utterly Amazing, actually quite scary, I was able to recover photo's deleted from months ago, even after reading/writing the drive.
[126001570090] |So now I will need to find a tool to wipe what was deleted lol..
[126001570100] |Here is some info..
[126001570110] |Foremost is a console program to recover files based on their headers, footers, and internal data structures.
[126001570120] |This process is commonly referred to as data carving.
[126001570130] |Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive.
[126001570140] |The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types.
[126001570150] |These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery.
[126001570160] |Originally developed by the United States Air Force Office of Special Investigations and The Center for Information Systems Security Studies and Research , foremost has been opened to the general public
[126001570170] |source code http://foremost.sourceforge.net/ Grab foremost:sudo apt-get install foremost
Have Foremost audit your drive for recoverable files:sudo foremost -w -i /dev/hda -o /recovery/foremost
[126001570180] |Have foremost recover jpg files:sudo foremost -t jpg -i /dev/hda -o /recovery/foremost
Here is the complete list of recoverable filetypes for usage with the "-t type" switch:Available types:
[126001570190] |jpg Support for the JFIF and Exif formats including implementationsgifpngbmp Support for windows bmp format.aviexe Support for Windows PE binaries, will extract DLL and EXE filesalong with their compile times.mpg Support for most MPEG files (must begin with 0x000001BA)wavriff This will extract AVI and RIFF since they use the same file for mat (RIFF). note faster than running each separately.wmv Note may also extract -wma files as they have similar format. movpdfole This will grab any file using the OLE file structure.
[126001570200] |This includes PowerPoint, Word, Excel, Access, and StarWriterdoc Note it is more efficient to run OLE as you get more bang for your buck.
[126001570210] |If you wish to ignore all other ole files then use this.zip Note is will extract .jar files as well because they use a simi lar format.
[126001570220] |Open Office docs are just zip’d XML files so they are extracted as well.
[126001570230] |These include SXW, SXC, SXI, and SX? for undetermined OpenOffice files.rarhtmcpp C source code detection, note this is primitive and may generate documents other than C code.all Run all pre-defined extraction methods.
[126001570240] |[Default if no -t is specified]
[126001570250] |If you have additional suggestions or methods to restore files please comment and share your knowledge
[126001580010] |Clean up Duplicate Files, Symlinks, Directories in Ubuntu with an easy GUI!
[126001580020] |I have 8TB of archived music, movies, games, applications,iso's, and documents from the past 12 years that I have saved and accumulated and have been plagued by having the same files copied in multiple locations across all my drives.
[126001580030] |Over the years I have re-downloaded music, movies, and tons of other things that I already have...
[126001580040] |It really sucks when I download something and run this application and notice I already have it...
[126001580050] |Other than this issue, I have gigs of config files that are duplicates that needed to be cleaned.
[126001580060] |So ive been using a program called FSLint, It means Filesystem Lint.
[126001580070] |So lets get to work and clean the lint from our drives shall we?
[126001580080] |Lets install FsLintclickme for 1-click install! or:sudo apt-get install fslint
Ok now that FsLint is install you will be able to access it via Applications->System Tools->FSLintAs default it will have your home directory selected.
[126001580090] |Here are the options you have to choose from:Find Duplicate FilesFind Installed PackagesFind Bad Named filesFind Name ClashesFind Temp FilesFind Bad/Broken SymlinksFind Bad Id'sFind Empty DirectoriesFind Non-Striped BinariesFind Redundant Whitespace
[126001580100] |You are given Advanced Search options to exclude certain directories that dont apply to the above Search Patterns
[126001580110] |Once you select one of the search options and select your search directory, click find, it will take a while depending on drive speed, processing power, and drive size.
[126001580120] |Once done searching it will give you options to delete the duplicates, save duplicate list and Merge.
[126001580130] |I hope this tool is helpful to others, I personally think this tool should be integrated into nautilus.
[126001580140] |Happy Cleaning!
[126001590010] |Detect Port Scans on your Ubuntu System
[126001590020] |PSAD is a collection of four lightweight system daemons written in Perl and in C that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans.
[126001590030] |It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options (Linux 2.4.x kernels only), reverse DNS info, email alerting, and automatic blocking of offending ip addresses via dynamic configuration of ipchains/iptables firewall rulesets.
[126001590040] |In addition, for the 2.4.x kernels psad incorporates many of the tcp signatures included in Snort to detect highly suspect scans.
[126001590050] |Lets install it shall we?clickme for 1-click install or:sudo apt-get install psad
To check PSAD status simply run:sudo psad -S
or psad –Status
For more Detailed documentation about PSAD configuration, alerting and logging howto check out:http://www.cipherdyne.org/psad/docs/
[126001600010] |Howto: Install awesome Music Visualizations for Rythmbox and XMMS In Ubuntu
[126001600020] |I absolutely love visualizations while listening to music, its unfortunate that Ubuntu does not currently have many presets, Fortunately here is a quick way to enjoy a few other visualizations in Ubuntu, personally I think these visualizations should have been installed by default with Rythmbox!
[126001600030] |If your in Firefox and have apt-url installed click here to install this with one click!sudo apt-get install libvisual-0.4-plugins
Ok now Reload Rythmbox and click on Visualization, and you will get a drop down List of the GOOM Alternative Visuals
[126001600040] |Hopefully when I get a chance I will port over winamp visuals to rythmbox but, that may take some time hehe
[126001610010] |Convert Audio to other formats with Ease using Sox in Ubuntu Linux
[126001610020] |SoX is the swiss army knife of sound processing programs.
[126001610030] |SoX is a command line utility that can convert various formats of computer audio files in to other formats.
[126001610040] |It can also apply various effects to these sound files during the conversion.
[126001610050] |As an added bonus, SoX can play and record audio files on several unix-style platforms.
[126001610060] |SoX is a general purpose sound converter/player/recorder that supports the following formats:
[126001610070] |RAW sound data in various data styles
[126001610080] |RAW textual sound data
[126001610090] |Amiga 8svx files
[126001610100] |Apple/SGI AIFF files
[126001610110] |SUN .au files
[126001610120] |PCM, U-law, A-law, G7xx ADPCM files
[126001610130] |mutant DEC .au files
[126001610140] |NeXT .snd files
[126001610150] |AVR files
[126001610160] |CD-R data (music CD format)
[126001610170] |CVS and VMS files (continous variable slope)
[126001610180] |GSM raw data (with optional library)
[126001610190] |Macintosh HCOM files
[126001610200] |Amiga MAUD files
[126001610210] |MP3 files (with optional external library)
[126001610220] |IRCAM SoundFile files
[126001610230] |NIST SPHERE files
[126001610240] |Turtle beach SampleVision files
[126001610250] |Soundtool (DOS) files
[126001610260] |Yamaha TX-16W sampler files
[126001610270] |Sound Blaster .VOC files
[126001610280] |Ogg Vorbis files (with optional external library)
[126001610290] |FLAC files (with optional external library)
[126001610300] |Dialogic/OKI ADPCM .VOX files
[126001610310] |Microsoft .WAV files
[126001610320] |PCM, U-law, A-law, MS ADPCM, IMA ADPCM, GSM, RIFX (big endian)
[126001610330] |Psion (PDA) Record.app files and A-law .WVE files
[126001610340] |Maxis XA Audio files
[126001610350] |EA ADPCM (read support only)
[126001610360] |Record and Play audio on various Unix platforms.
[126001610370] |null file type that reads and writes from/to nothing.
[126001610380] |Ok Lets get to converting shall we?sox myfile.mp3 myfile.ogg
The above command converts mp3 to ogg which is a cleaner format to use, you can use this command to convert files to any format above by just adding the file extention you want it converted to.
[126001610390] |Then we can play the ogg file right from the command line and add a lil extra bass :)play myfile.ogg bass +3
More information can be found on SoX on the developer's page here
[126001620010] |Crack Pdf Files with Ubuntu Linux!
[126001620020] |Dont you hate when you run into a locked down pdf on the web?
[126001620030] |I search google all the time for title filetype:pdf and some are locked, this is the solution!
[126001620040] |PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files.
[126001620050] |It is small, command line driven without external dependencies.
[126001620060] |The application is Open Source (GPL).
[126001620070] |Features
[126001620080] |* Supports the standard security handler (revision 2 and 3) on all known PDF-versions
[126001620090] |* Supports cracking both owner and userpasswords
[126001620100] |* Both wordlists and bruteforcing the password is supported
[126001620110] |* Simple permutations (currently only trying first character as Upper Case)
[126001620120] |* Save/Load a running job
[126001620130] |* Simple benchmarking
[126001620140] |* Optimised search for owner-password when user-password is known
[126001620150] |Install pdfcrack in Ubuntu
[126001620160] |sudo aptitude install pdfcrack
[126001620170] |pdfcrack Syntax
[126001620180] |pdfcrack -f filename [options]
[126001620190] |pdfcrack Options-b, - -bench - Perform benchmark and exit.-c, - -charset=STRING - Use the characters in STRING as charset.-m, - -maxpw=INTEGER - Stop when reaching INTEGER as password length.-n, - -minpw=INTEGER - Skip trying passwords shorter than INTEGER.-l, - -loadState=FILE - Continue from the state saved in FILENAME.-o, - -owner - Work with the ownerpassword.-p, –password=STRING - Uses STRING as userpassword to speed up breaking ownerpassword (implies -o).-q, - -quiet - Run quietly.-s, - -permutate - Try permutating the passwords (currently only supports switchingfirst character to uppercase).-u, - -user - Work with the userpassword (default).-v, - -version - Print version and exit.-w, - -wordlist=FILE - Use FILE as source of passwords to try.
pdfcrack Example
[126001620200] |pdfcrack mylocked.pdf
[126001620210] |More information on this great utility can be found @ the authors site hereLifehacker.com Has some alternative utilities and ideas for cracking pdf's hereUbuntuGeek has some information about this tool here
[126001630010] |Howto: Crack Rar, 7z, and zip files with RarCrack in Ubuntu Linux
[126001630020] |Ever run into the problem where you created a password protected zip/rar file and you forgot the password or accidentally deleted it?
[126001630030] |Or just dont know the password at all?
[126001630040] |Well I have come across a nice solution for cracking zip/rar files.
[126001630050] |Its called rarcrack, If you forget your password for compressed archive (rar, 7z, zip), this program is the solution.
[126001630060] |This program uses bruteforce algorithm to find correct password.
[126001630070] |You can specify which characters will be used in password generations.
[126001630080] |Download RarCrackwget http://superb-east.dl.sourceforge.net/sourceforge/rarcrack/rarcrack-0.2.tar.bz2
Install RarCracktar xvjf rarcrack-0.2.tar.bz2
cd rarcrack-0.2
sudo apt-get install libxml2-dev
make ; sudo make install
Using RarCrack:
[126001630090] |Everything in [] are optional, rarcrack default crack two threads and autodetect the archive type.
[126001630100] |If the detection wrong you can specify the correct file type with the type parameter.
[126001630110] |RarCrack currently crack maximum in 12 threads.
[126001630120] |After the cracking started RarCrack will print the current status of cracking and save it's to a status file.
[126001630130] |If you want more specific password character set, you need to run RarCrack to create the XML status file (3 sec).
[126001630140] |There will be a sample XML file, and you see there is a character set.
[126001630150] |If you want, you can modify this file and when you start RarCrack again the program will be use new variables.
[126001630160] |Warning: Take care when you changing this file, make sure the current password don't have characters outside the abc[character set]!
[126001630170] |Know of any other rar/zip/7z cracking tools worth mentioning?
[126001630180] |More information on rarcrack can be found here
[126001640010] |Top Linux BitTorrent Clients For Ubuntu
[126001640020] |I use BitTorrent for downloading music, movies and linux distro's. Back in the day bitTorrent didnt exist and I relied on bbs and ftp, these are two direct, centrally located ways that I shared files in the past.
[126001640030] |I also have played around with XDCC's on irc, gnutella, which most people know as limewire.
[126001640040] |While I will always prefer the old ways, like dialing up to the local bbs and logging in to a ftp, or swinging by an xdcc channel, the new alternative is... "just ok for now" I hope it is better optimized, more secure, and more anonymous in the future.
[126001640050] |I have tried all the command line BitTorrent clients, and they are awesome with memory/cpu usage but that isnt the preferred way anymore, most resort to GUI clients, and there are a few to choose from that kick ass.
[126001640060] |Here is a few to think about:
[126001640070] |What is Deluge?
[126001640080] |Deluge is a full-featured BitTorrent client for Linux, Mac OS X and Windows.
[126001640090] |It uses libtorrent in it's backend and PyGTK for it's user interface.
[126001640100] |Deluge features a rich plugin collection; in fact, most of Deluge's functionality is available in the form of plugins.
[126001640110] |Deluge was created with the intention of being lightweight and unobtrusive.
[126001640120] |It is our belief that downloading shouldn't be the primary task on your computer and therefore shouldn’t monopolize system resources.
[126001640130] |Deluge is not designed for any one desktop environment and will work just fine in GNOME, KDE, XFCE and others.
[126001640140] |Deluge is Free Software and is licensed under the GNU General Public License.
[126001640150] |What about features?
[126001640160] |Deluge has a wide-array of features, including:
[126001640170] |Web UI
[126001640180] |BitTorrent Protocol Encryption - Ability to force Encryption Inbound/Outbound, force handshake or full stream encryption
[126001640190] |Highly Configurable Network Settings - Tweakability
[126001640200] |Mainline DHT
[126001640210] |Local Peer Discovery (aka LSD)
[126001640220] |FAST protocol extension
[126001640230] |µTorrent Peer Exchange
[126001640240] |UPnP and NAT-PMP
[126001640250] |Proxy support
[126001640260] |Web seed
[126001640270] |Private Torrents
[126001640280] |Global and per-torrent speed limits
[126001640290] |Configurable bandwidth scheduler
[126001640300] |Password protection
[126001640310] |RSS
[126001640320] |Block List Importer - Import anti-P2P ip lists
[126001640330] |Desired Ratio Plugin
[126001640340] |Event Logging - logs blocked ip's network errors and network statistics/errors and other info
[126001640350] |Speed Limiter - Limit the speed per torrent upload/download
[126001640360] |Prioritize Files - Easily Select Downloadable files instead of every file in the torrent
[126001640370] |Network Health Monitor
[126001640380] |Torrent Creation
[126001640390] |Torrent Scheduler
[126001640400] |Low memory/cpu usage!
[126001640410] |And much more
[126001640420] |How do I Install Deluge?
[126001640430] |Click Here for one click Install if you are running Firefox with apt-url installed or:sudo apt-get install deluge-torrent
How do I hack deluge to work on private trackers?
[126001640440] |Check my older post that still works here on How to make deluge sp00f: http://www.ubuntu-unleashed.com/2007/09/setup-and-spoof-deluge-bittorent-client.html
[126001640450] |What is Transmission?
[126001640460] |Transmission is a lightweight client, for people that do not care about extra features, that want just a standard BitTorrent Client.
[126001640470] |What about features?
[126001640480] |Selective downloading and file prioritizing
[126001640490] |Encryption support, with option to ignore unencrypted peers
[126001640500] |Torrent file creation
[126001640510] |Peer exchange (compatible with Azureus and μTorrent)
[126001640520] |Automatic port mapping (using UPnP/NAT-PMP)
[126001640530] |MSE Tracker Extension support
[126001640540] |Fast Resume - with peer caching
[126001640550] |Auto-banning of peers who send bad data
[126001640560] |Sort and filter by tracker
[126001640570] |Single listening port for all torrents
[126001640580] |How do I Install Transmission?
[126001640590] |Click Here for one click Install if you are running Firefox with apt-url installed or:sudo apt-get install transmission
[126001640600] |What is Ktorrent?
[126001640610] |KTorrent is a BitTorrent client written in C++ for KDE using the Qt user interface toolkit.
[126001640620] |It is maintained in the KDE Extragear.
[126001640630] |This is probably the best kde torrent client, but uses allot of cpu/ram
[126001640640] |Features
[126001640650] |Upload and download speed capping / throttling &scheduling
[126001640660] |Internet searching with torrent search engines using KHTML part.
[126001640670] |Support for UDP trackers.
[126001640680] |IP address blacklist plugin
[126001640690] |Port forwarding with UPnP (Universal Plug and Play)
[126001640700] |Protocol encryption
[126001640710] |DHT (mainline version), and support for trackerless torrents
[126001640720] |µTorrent peer exchange (PEX) support (as of 2.1 RC1).
[126001640730] |File Prioritization
[126001640740] |Ability to import partially-downloaded files
[126001640750] |Directory scanner to automatically watch directories for new torrents
[126001640760] |Manual addition of trackers to torrents
[126001640770] |RSS feed support
[126001640780] |Web interface plugin with default por number 8080
[126001640790] |How do I Install Ktorrent?
[126001640800] |Click Here for one click Install if you are running Firefox with apt-url installed or:sudo apt-get install ktorrent
[126001640810] |What is Azureus?
[126001640820] |Azureus is a Bittorrent client written in java and comes bundled with many invaluable features for both beginners and advanced users that is very bloated...
[126001640830] |What about features?
[126001640840] |Multiple torrent downloads
[126001640850] |Upload and download speed limiting, both globally and per torrent
[126001640860] |Advanced seeding rules
[126001640870] |Adjustable disk cache
[126001640880] |Only uses one port for all the torrents
[126001640890] |UPnP sets the forward on your router
[126001640900] |Can use a proxy, for both tracker and peer communications
[126001640910] |Fast resume
[126001640920] |Can set a default download dir and move completed files
[126001640930] |Can import torrents automatically from a set dir
[126001640940] |Highly customizable interface
[126001640950] |IRC plugin included for quick help
[126001640960] |Embedded tracker, host your own torrents, automate your shares (periodic scanning of a dir)…
[126001640970] |Distributed Hash Table: host on it a completely decentralised torrent and/or benefit from it when the tracker is offline.
[126001640980] |Auto-adjustment of your upload and download speeds according to your network charge with Autospeed
[126001640990] |Auto-download torrents with RSS Feed Scanner
[126001641000] |Schedule upload and download speed limits with Speed Scheduler
[126001641010] |Receive a mail when a download finishes with Status Mailer
[126001641020] |Add numerous info on torrents (Extra seeding columns, Country Locator)
[126001641030] |Remote control Azureus through the Swing Web Interface or the HTML Web Interface
[126001641040] |How do I Install AzureusClick Here for one click Install if you are running Firefox with apt-url installed or:sudo apt-get install azureus
[126001641050] |You Want A Terminal BitTorrent Client eh?rtorrent/libtorrent is a nice ncurses based client, check it out here or apt-get install rtorrent
[126001641060] |Got anything else worth mentioning?
[126001650010] |Howto: Mount .ISO, .IMG, .BIN, .MDF, and .NRG in Ubuntu Linux The Easy way
[126001650020] |I download .iso's all the time, and wanted to be able to mount iso's for winblows games on wine.
[126001650030] |What this does is map your iso to a filesystem directory.
[126001650040] |Here is what I did, and here is what you can do as well.
[126001650050] |First grab fuseisosudo apt-get install fuseiso
If you are in firefox and have apt-url installed click here to install with one click!
[126001650060] |Then lets add ourselves to the fuse usergroupsudo adduser myusename fuse
If you were not in the fuse group you will need to log off, then back in right now.
[126001650070] |Now lets create ourselves a fuseiso folder to mount our isosudo mkdir /media/fuseiso
Now we just grabbed an iso off the net, so lets mount it!sudo fuseiso myisofile.iso /media/fuseiso
Ok now the iso is mounted and we can use it like its a cd/dvdNautilus/cd your way to /media/fuseiso and the files from the iso will be mounted readonly.
[126001650080] |More information on fuseiso can be found here
[126001660010] |Block Bad IP Ranges with iplist in Ubuntu Linux!
[126001660020] |In todays world we need some protection against the anti-P2P organizations, script kiddies and big brother, Iplist is a kick-ass tool that will help protect your privacy!
[126001660030] |What is iplist?iplist is a list based packet handler which uses the netfilter netlink-queue library (kernel 2.6.14 or later).
[126001660040] |It filters by IP-address and is optimized for thousands of IP-address ranges.
[126001660050] |Some typical reasons for using iplist are:
[126001660060] |to protect your privacy while sharing with others on p2p networks
[126001660070] |to ban unwanted clients from servers
[126001660080] |to block whole countries or networks
[126001660090] |to block spam- and ad-servers
[126001660100] |to block known hackers
[126001660110] |Installation for Hardy Heron:wget http://internap.dl.sourceforge.net/sourceforge/iplist/iplist_0.19-0hardy2_i386.deb
sudo dpkg -i iplist_0.19-0hardy2_i386.deb
There is packages for all other Ubuntu/Linux Versions Here
[126001660120] |After the installation ipblock can be found in main menu -> Internet -> ipblock.
[126001660130] |ListsThe default choice for lists is similar to peerguardian, you have the option to add/remove what you need.
[126001660140] |level1.gz - Anti-p2p companies, Fake p2p file sources, Government, Military, Science, Research Labs, Bad Education facilities, and more.
[126001660150] |ads-trackers-and-bad-pr0n.gz - Advertising and data tracker servers
[126001660160] |spyware.gz - Malicious spyware and adware servers
[126001660170] |edu.gz - Educational institutions and universities
[126001660180] |bogon.gz - Spoofed IP-addresses
[126001660190] |These lists are maintained by www.bluetack.co.uk.
[126001660200] |Custom p2p or dat lists can easily be added.
[126001660210] |Note that lists can optionally be compressed with gzip.
[126001660220] |Settings
[126001660230] |All options can be configured in this tab.
[126001660240] |Auto-updating lists is important and the default choice of 2 days is reasonable because www.bluetack.co.uk updates their lists 3 times per week.
[126001660250] |Using out-of-date lists is not recommended.
[126001660260] |To ignore specific network traffic like HTTP or EMAIL (pop3) use the ignored ports section.
[126001660270] |More information can be found @ the developers site hereMore information on Blocklists can be found here
[126001670010] |Google Gadgets Now work on Ubuntu Linux with Screenlets!
[126001670020] |Hey all, I just ran into a neat video on YouTube, it seems you can now get Screenlets to use Google Gadgets here is a video that shows you how!
[126001670030] |If you need screenlets follow these directions to install by adding a getdeb.net mirror:sudo -secho "deb http://ubuntu.org.ua getdeb/" >>/etc/apt/sources.listapt-get updateapt-get install screenlets screenlets-docexit
Once Installed follow the instructions within the video to get Google Gadgets up and Running!
[126001670040] |Here is hundreds more of Screenlets to choose from!
[126001680010] |Howto: Create TTY User to view logs via TTY in Ubuntu Linux
[126001680020] |We all have various log files on our Ubuntu system, and sometimes it is nice to be able to easily view a log file within a tty.
[126001680030] |Here is a simple howto, to create a tty user that's only purpose is to watch a log fileFirst lets create the logging script after sudo -s:cat >>/usr/bin/logwatch
Paste this, then control-c when its pasted in the terminal, alternatively you can use a text editor..#! /bin/bashwatch tail -n 80 /var/log/messages
Note: You can replace /var/log/messages with any log you choose, like a firewall log for instance.
[126001680040] |Make /var/log/messages Readable and our script executable, for this I'll use chmod:chmod 644 /var/log/messageschmod +x /usr/bin/logwatch
Now append /usr/bin/logwatch to /etc/shells then save/exitgedit /etc/shells
[126001680050] |Now lets create the user that we can login via the TTYadduser logwatch --shell /usr/bin/logwatch
Set a password, like "logwatch"
[126001680060] |Now lets try this out, all you need to do now is simply press ALT-CTRL-F1 or any other TTY from F1-F6 then login as "logwatch" with password "logwatch", what will happen is the user will be logged into our /usr/bin/logwatch script and only be able to watch the log, so we can cycle between tty's and X
[126001690010] |Crack your Zip Files in Ubuntu with the Ultimate Zip Cracker
[126001690020] |Why, the hell, another zip cracker? fcrackzip isnt just any other file cracker, it is quiet old (born in 1998) and I believe the last version was from 2004.
[126001690030] |However it is simple mentioned for being the first open-sourced zip-cracker out there.
[126001690040] |fcrackzip searches each zipfile given for encrypted files and tries to guess the password.
[126001690050] |All files must be encrypted with the same password, the more files you provide, the better.
[126001690060] |FCrackZip is The Ultimate password cracker for zip archivesfcrackzip is a fast password cracker partly written in assembler.
[126001690070] |It is able to crack password protected zip files with bruteforce or dictionary based attacks, optionally testing withunzip its results.
[126001690080] |It can also crack cpmask'ed images.
[126001690090] |Homepage: http://www.goof.com/pcg/marc/fcrackzip.htmlHow to Install:
[126001690100] |sudo apt-get install fcrackzip
Install with 1-click if you have apt-url installed and your using firefox!
[126001690110] |Examples:fcrackzip -c a -p aaaaaa sample.zip
[126001690120] |checks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa ... abaaba ... ghfgrg ... zzzzzz).
[126001690130] |fcrackzip --method cpmask --charset A --init AAAA test.ppm
[126001690140] |checks the obscured image test.ppm for all four character passwords. -TP fcrackzip -D -p passwords.txt sample.zip check for every password listed in the file passwords.txt.
[126001690150] |More info from the authors site hereNeed to crack rar, 7z files?
[126001690160] |Check here for another tool ive unleashed
[126001700010] |Create Sitemap in Ubuntu Linux With Google SiteMap Generator
[126001700020] |It looks like google has a little known tool that creates sitemaps with a simple python script, its in the repositories and this could surely be handy for allot of webmasters out there.
[126001700030] |The Google Sitemap Generator is a Python script that creates a Sitemap for your site using the Sitemap Protocol.
[126001700040] |This script can create Sitemaps from URL lists, web server directories, or from access logs.
[126001700050] |In order to use this script:
[126001700060] |You must be able to connect to and run scripts on your web server.
[126001700070] |Your web server must have Python 2.2 or later installed.
[126001700080] |You must know the command that launches Python.
[126001700090] |(Generally, this is python, but may vary by installation.
[126001700100] |For instance, if the web server has two versions of Python installed, the earlier version may be invoked by the command python and the later version may be invoked by the command python2.)
[126001700110] |You must know the directory path to your site.
[126001700120] |If your web server hosts one site, this may be a path such as var/www/html.
[126001700130] |If you have a virtual server that hosts multiple sites, this may be a path such as home/virtual/site1/fst/var/www/html.
[126001700140] |You must be able to upload files to your web server (for instance, using FTP).
[126001700150] |If you will be generating a list of URLs based on access logs, you must know the encoding used for those logs and the complete path to them.
[126001700160] |If you aren't sure about any of this, you can check with your web hosting company.
[126001700170] |Now you’re ready to get started.
[126001700180] |Here’s an overview of what you’ll need to do.
[126001700190] |Download the Sitemap Generator program files.
[126001700200] |sudo apt-get install google-sitemapgen
[126001700210] |Create a configuration file for your site using the provided example_config.xml file as a template.
[126001700220] |Modify this file as needed for your site and save it.
[126001700230] |Upload the necessary files to your web server.
[126001700240] |Run google-sitemapgen
[126001700250] |Add the generated Sitemap to your Google webmaster tools account.
[126001700260] |Set up a recurring script. (optional)
[126001700270] |If you are unable to use the Sitemap Generator, you can add a Sitemap to your Google webmaster tools account in another format, such as a simple text file.
[126001700280] |Third-party programs supporting the Sitemap Protocol.
[126001710010] |Get 8500+ Free Clipart .SVG's For Gimp, Inkscape, website!
[126001710020] |Ever wonder where you can get free open images to edit and use without worrying about copyright?
[126001710030] |Well I have looked everywhere, and I have found a nice collection that you all can use and share.
[126001710040] |I was recently looking for some clipart online and ran across a simple way to get thousands of updated Clipart .SVG's.
[126001710050] |This will be 800+ meg's when extracted.
[126001710060] |If you want to browse the gallery before downloading check it out hereDownload/extraction Instructions:sudo apt-get install openclipart-svg
[126001710070] |I hope you enjoy this clipart, is there any others worth mentioning?
[126001710080] |Thank Elkersh for this great tip!
[126001720010] |Howto: Change Windows Administrator password in Ubuntu Hardy Heron Easily
[126001720020] |I absolutely hate microsoft products thats why I love breaking it.
[126001720030] |This hack, is way too easy.
[126001720040] |Whatever your reason for changing any users password, this simple howto will surely satisfy that need.
[126001720050] |The only way to prevent this currently is with full disk encryption.
[126001720060] |Here is how you change windows password within Ubuntu Hardy Heron.
[126001720070] |You can either use your livecd or hddsudo apt-get install chntpw
Now its installed, so lets get to work...
[126001720080] |Ok I am assuming your using a hardy heron livecd or a Ubuntu Hardy Heron full installYou will now need to mount the windows partition read/write permission then navigate to %systemroot%/system32/configOnce your located in the config directory issue this command to change the passwordchntpw -u administrator SAM
[126001720090] |- Prompt for password for 'administrator', if found (otherwise do nothing) use * to blank
[126001720100] |Now reboot and login to winblows
[126001720110] |Optionally you can skip resetting the password and just install Ubuntu
[126001730010] |Howto: Install New Google Earth 4.3 (Beta) In Ubuntu Linux The easy way!
[126001730020] |A Brand new Google Earth 4.3 is in Town with Some Hot new features, check out this *HOT* Youtube video while easily installing this with my simple howto!
[126001730030] |Easily Install Google Earth 4.3 by opening a terminal and issuing this one commandwget http://dl.google.com/earth/client/current/GoogleEarthLinux.bin ; chmod +x GoogleEarthLinux.bin ; sudo ./GoogleEarthLinux.bin
The above command will auto-install to /opt/google-earth and create a desktop icon for all users.
[126001730040] |Right after the install Click Start to startup Google Earth
[126001730050] |Need a Userguide for all the features?
[126001730060] |Click here for that
[126001740010] |Easily Create Seperate Home partition with existing Drive or Partition without the need for a livecd in Ubuntu Linux
[126001740020] |I recently wanted to create a seperate /home partition since I installed home on / and didnt want the hassle of waiting for the livecd to boot, so here is an easy tutorial that will explain how to setup a seperate /home partition with an existing empty drive or partition you already have without using a livecd.
[126001740030] |Ok I have almost always had a seperate home partition, excluding the 3 times I have completely crashed my system and had to redo it all.
[126001740040] |Reasons you should use a seperate home partition:1.
[126001740050] |Easy backup/restore.
[126001740060] |2. You can simply rm -rf / and pop in a livecd and be able to mount your home partition as /home without deleting users home directories and files.
[126001740070] |3. You can use multiple linux Distro's with the /home partition4.
[126001740080] |You dont have to worrie about the hassle of re-installing or upgrading ubuntu because everything you need is in your /home directory, you can simply backup all your apt packages via aptoncd.
[126001740090] |5. You will get better performance accessing files in your /home directory since it is seperate from the filesystem.
[126001740100] |First we sudo root then open/edit our /etc/fstab:sudo -ssudo gedit /etc/fstab
Now this is the line my fstab contained that we will comment out by putting a "#" symbol in front of the UUID of the empty drive# /dev/sdb1UUID=ffa4a03e-116f-4c41-8bb6-4f60bca8f7f9 /media/sdb1 ext3 defaults,noatime,errors=remount-ro 0 0
It will then look like this:# /dev/sdb1# UUID=ffa4a03e-116f-4c41-8bb6-4f60bca8f7f9 /media/sdb1 ext3 defaults,noatime,errors=remount-ro 0 0
[126001740110] |Now lets scroll down to the bottom of the file and Create a new Line to make our empty disk be mounted as /home# /dev/sdb1UUID=ffa4a03e-116f-4c41-8bb6-4f60bca8f7f9 /home ext3 defaults,noatime,errors=remount-ro 0 0
[126001740120] |Ok the Hard stuff is done, so we Save /etc/fstab with ctrl-s and exit, lets go back to the terminal and cd to /home:cd /home
Ok now that we are in home we can issue our copy command to copy the contents of /home to our existing partition in /media/sdb1 as an example:find . -depth -print0 | sudo cpio --null --sparse -pvd /media/sdb1/
Once this completes which will take a while if you have allot of data we mv the contents of our existing /home to a backup directory: mkdir /oldhomemv -R * /oldhome
Ok we are done, simply reboot and everything should be successful, if for some reason this doesn't work all you do is uncomment the fstab line we first edited and comment out the newest line or completely remove it, then umount /dev/"yourdrive" if it mounted, and cd /oldhome/ mv -R * /home and everything should be back to what it was when you rebooted
[126001740130] |This took me 5 min to create and is very dangerous if you dont know what you are doing, do not attempt this.
[126001740140] |I have an alternate tutorial that explains how to do the same thing above with instructions on creating a new partition here