public marks

PUBLIC MARKS from alamat with tags tech & tips

2010

How Do I Scan My Linux System For Rootkits, Worms, Trojans, Etc.?

(via)
Either install the package that comes with your distribution (on Debian you would run apt-get install chkrootkit

Where do the IP addresses come from?

(via)
You used to have to set up ip addresses, netmasks, gateways, and name resolvers all manually. Refer to any basic networking text to learn more about this aspect.

2006

Adding disk on Linux

Linux hard disk device names follow a specific standard. SCSI disks all start with sd and IDE disks with hd. After this comes a letter that identifies the unit number of the disk, so for example, the first disk would be a, the second would be b, the third would be c, and so on.

Hacking tools

To better understand—and, consequently, to better ensure—network security, it always pays to understand the tools of the attackers. Darknet lists 15 essential hacking tools:

Protecting content with .htaccess files

.htaccess files are very versatile, and can easily become very complex. This document contains enough information to set simple access restrictions/limits on a directory in your web space. Remember to upload .htaccess files, and .htpasswd files using ASCII mode. This is an option is available in most FTP clients.

Adding Additional Hard drive on your Linux Machine

Normally one would ask? how do i add additional harddrive to my linux box.. well we could make use of utilities like fdisk, cfdisk or QtParted but it is fdisk that is im going to discuss below.

Some Unix Tips

These are some unix tips that might be helpful someday down the road. Feel free to contribute more unix tips by commenting on this article.

Virtual Hosting With Proftpd And MySQL (Incl. Quota)

This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota with this setup.

Writing Linux firewall rules w/ IPTables

The Linux kernel, since version 2.0, has included the capabilities to act as a firewall. In those days, the kernel module was called ipfwadm and was very simple. With the 2.2 kernel, the firewall module became called ipchains and had greater capabilities than its predecessor. Today, we have IPTables, the firewall module in the kernel since the 2.4 days. IPTables was built to take over ipchains, and includes improvements that now allow it to compete against some of the best commercial products available in the market. This guide will give you some background on IPTables and how to use it to secure your network.

Take control of your bash_history

I spend most of my time working in front of a black and white terminal of remote SSH connections to various servers. This means that I use bash (as my preferred shell) most of the day. And bash history is a very important feature of bash that saves me much time by recalling previous commands I have typed. Here are some tricks on how you can optimize with some simple configurations settings the usage your bash history.

Bash Shell Shortcuts

Bash, which is the default shell in Linux contains a whole lot of key bindings which makes it really easy to use . The most commonly used shortcuts are listed below :

Make your Windows look like OS X

With all the excitement of Boot Camp, and the ability to now run Windows on a Mac, what about the rest of us? Those of us that use Windows out of necessity, and lust after a Mac yet can't afford or justify the purchase of one. What to do? Well, you can make your Windows XP PC look as much like a Mac as possible.

Secure Copy with SCP

Some of you may be familiar with ftp (File Transfer Protocol). It is not a good idea to use ftp over the Internet because it is a relatively insecure method of transfering files between computers. As most of you know, this protocol sends the user's password and data in the clear over the network, which leaves the user information and data susceptible to password sniffing and other network traffic interception. To transfer files between machines, you need to use scp. scp works very similarly to cp, except that the files you are copying reside on different machines.

Top 8 OS X Safety Tips

There was a little speculation recently that McAfee had unnecessarily worried people into buying its products with the news that, from 2003 to 2005, the amount of vulnerabilities discovered on the OS X platform had increased by 228%, whereas Windows vulnerabilities discovered in the same time period had increased by only 73%. To the blind-sighted or Mac newcomers out there, this is a worrying fact, but rest assured the truth is being bent—quite a bit.

IRIX: CHECK FOR NEW CONFIGS

SGI loves to try and simplify your life with chkconfig switches to toggle various services on and off. After each upgrade, DOUBLE check the chkconfig switches. If something doesn't work all of the sudden check here.

Technology Cult: The Programmer's Nemesis

Greg writes on the perennial problem at the workplace named "interruptions." According to our friendly usability expert, it is a programmer's nemesis: one millisecond of interruption could disturb one's "flow," or nudge one out of his "zone."

FAQ's on 3GP for Mobile phones

3G stands for third generation, a generic wireless industry term for high-speed mobile data delivery over cellular networks. 3G networks allow users to send and receive bandwidth-intensive information such as video, video conferencing, high quality audio and web data on-demand, virtually anytime and anyplace.

Fight spammers - Sign up at Blue Frog

by 1 other
Blue Security’s Blue Frog has an interesting defense against spammers. If you constantly receive spam from a specific merchant, Blue Frog will bombard that spammer with email asking him to desist.

More MacBook News

ThinkSecret has been able to confirm the release of the Apple MacBook for this Tuesday, May 9th. It also looks like they will be thinner than current iBooks and come in White and Black.

REBOOTING BECAUSE OF FORK BOMBS

There is nothing more frustrating for an Administrator who has to reboot system due to fork bomb

alamat's TAGS related to tag tech

apache +   apple +   billgates +   blog +   computer +   database +   devices +   distro +   download +   explorer +   firewall +   from +   game +   games +   google +   hacking +   hardware +   help +   ip +   ipod +   itunes +   java +   laptop +   linux +   mac +   microsoft +   mobile +   movies +   mysql +   networking +   news +   passwords +   programming +   quicktime +   religion +   rootkit +   security +   shell +   shop +   software +   spam +   spammers +   spyware +   sun +   system +   techy +   tip +   tips +   travel +   tricks +   trojan +   tutorial +   tv +   unix +   update +   windows +   world +   worm +   yahoo +