- How to Remove old and un-used Kernel from System and Grub Menu - Ubuntu Linux

The kernel is a piece of software that, roughly speaking, provides a layer between the hardware and the application programs running on a computer. In a strict, computer-science sense, the term 'Linux' refers only to the kernel - the software that Linus Torvalds wrote in the early 90s.

All the other pieces you find in a Linux distribution - the Bash shell, the KDE window manager, web browsers, the X server, Tux Racer and everything else - are just applications that happen to run on Linux and are emphatically not part of the operating system itself.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677516124.html

- Install Flash 8 or Flash CS3 on Ubuntu Linux - Wine

Wine is an Open Source implementation of the Windows API on top of X and Unix. Wine provides both a development toolkit for porting Windows sources to Unix and a program loader, allowing many unmodified Windows binaries to run on x86-based Unixes.

Install the latest version of wine:
Ubuntu and Ubuntu derivatives (such as Kubuntu) obtain software from packages which are stored in repositories. Ubuntu's default repository includes Wine, however if you want to stay up to date with the latest Wine package you can use WineHQ's by following these instructions, open up the terminal (Applications > Accessories > Terminal) and type following command to install latest version of wine
sudo add-apt-repository ppa:ubuntu-wine/ppa
sudo apt-get update
sudo apt-get install wine
Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/13578167757286.html

- Transparent Caching ftp proxy server - frox

Frox is a transparent FTP proxy that runs under Linux and *BSD. It should also work on other UNIX OSes that use ipfilter.

Frox Features:
 * active - passive mode conversion for data connections.
 * It supports caching of FTP downloads, either through a local cache, or by redirecting connections through another proxy such as squid.
 * Downloads may be transparently scanned for viruses (through an external scanner).
 * Optional non-transparent proxy support by logging in with user@host:port.
 * Options to bind to a specific interface, chroot, and drop priveleges for security.
 * Written with security in mind, default setup runs as a non-root user in a chroot jail.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677510379.html

- Penetration Testing data management and reporting tool - MagicTree

MagicTree is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. In case you wonder, "Tree" is because all the data is stored in a tree structure, and "Magic" is because it is designed to magically do the most cumbersome and boring part of penetration testing - data management and reporting.

MagicTree stores data in a tree structure. This is a natural way for representing the information that is gathered during a network test: a host has ports, which have services, applications, vulnerabilities, etc. The tree like structure is also flexible in terms of adding new information without disturbing the existing data structure: if you at some point decide that you need the MAC address of the host, you just add another child node to the host node.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677516643.html

- Tool to Detect SQL Injection - SQLInject-Finder

SQL injection is yet another common vulnerability that is the result of lax input validation. Unlike cross-site scripting vulnerabilities that are ultimately directed at your site’s visitors, SQL injection is an attack on the site itself—in particular its database. The goal of SQL injection is to insert arbitrary data, most often a database query, into a string that’s eventually executed by the database. The insidious query may attempt any number of actions, from retrieving alternate data, to modifying or removing information from the database.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677513842.html

- Introduction to Linux Based and Reseller Web Hosting

A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center.

Most people that have any affinity with Internet and Internet websites will have heard of Linux and UNIX Hosting. The true question that you might have is of course, what is it and how can it benefit me?

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/03/13578167758607.html

- How to read the content from the RAM (Random Access Memory)

RAM Stands for "Random Access Memory,". RAM is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer.

RAM (random access memory) is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the other kinds of storage in a computer, the hard disk, floppy disk, and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When you turn the computer off, RAM loses its data. When you turn your computer on again, your operating system and other files are once again loaded into RAM, usually from your hard disk.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/13578167753881.html

- Graphical Desktop Wiki - Zim

Zim is a graphical text editor used to maintain a collection of wiki pages. Each page can contain links to other pages, simple formatting and images. Pages are stored in a folder structure, like in an outliner, and can have attachments. Creating a new page is as easy as linking to a nonexistent page. All data is stored in plain text files with wiki formatting. Various plugins provide additional functionality, like a task list manager, an equation editor, a tray icon, and support for version control.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/13578167753154.html

- Free and Open Source network access control (NAC) system - PacketFence

If your network is a breeding ground for worms, PacketFence is for you. If you have no idea who connects to your network and who owns a particular computer, PacketFence is for you. If you have no way of mapping a network policy violation to a user, PacketFence is for you.

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with the Snort IDS and the Nessus vulnerability scanner; PacketFence can be used to effectively secure networks - from small to very large heterogeneous networks.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/13578167759332.html

- Create jigsaw puzzle from pictures with Picpuz

Picpuz is an on-screen "jigsaw puzzle". You can take almost any image file and break it into many pieces which you can then reassemble using the mouse.

You can control the size of the puzzle and the number of pieces (tens to thousands). You can save an unfinished puzzle and resume it later.

You can take almost any image (jpeg, tiff, png ...) and scramble it into many pieces (tens to hundreds). You can then reassemble the picture using the mouse to move the pieces around.
Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/135781677515045.html

- UI Application for checking websites and HTML documents for broken links - linkchecker

It's easy to do a manual check for broken link for a small sites but it's not possible for carrying out the same manual tasks when you sites contains 1000's web pages and these pages keep's on getting added or deleted at the same time, for this you need some sort of automation tool which can do the same job for you in very effective and smart way, With LinkChecker, you can check HTML documents and Web sites for broken links.Linkchecker also provides a graphical interface "linkchecker-gui" to check links of websites and HTML documents.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/13578167752766.html

- Test your hacking skills - WackoPicko

WackoPicko is a website that contains known vulnerabilities. It was first used for the paper Why Johnny Can't Pentest: An Analysis of back-box Web Vulnerability Scanners found:
http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf

WackoPicko Install Instructions:
Import the WackoPicko database into MySQL using a command like the following:
mysql -u <user> -p < current.sql
This will create the MySQL user wackopicko with the password webvuln!@# as well as create the wackopicko table. The wackopicko table contains all of the data that was present while testing the scanners in Why Johnny Can't Pentest.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/135781677511550.html

- Checks existence of open proxy - proxycheck

Open proxies of various kinds are used nowadays for various evil things like sending mass spam, hacking into your machine, making denial of service attacks (DoS) and the like. Every such machine should be either secured properly or turned off permanently, but that's not an option, since in most cases there is either no administrator of such machines exists at all, or he has no clue about what's on that machine, or it's irrelevant for him. So the only way to stop massive abuse made via such machines is to block them. Also, network administrators (of an ISP for example) are able to warn their clients whenever they are running an insecure proxy services - periodical scanning of client's network may also be a good idea.

This command-line tool, proxycheck, may be used for such purpose. Currently, it understands 3 types of proxy servers: HTTP proxies that allows you to CONNECT to any host:port, SOCKS v4 and v5 proxies, wingate "telnet" proxy servers of various kinds (incl. e.g. CCProxy variants and others), and FTP proxies that are able to create transparent connections.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/135781677518222.html

- UI Application for Image Batch Processing - Phatch

Phatch is a simple to use cross-platform GUI Image Batch Processor which handles all popular image formats and can duplicate (sub) folder hierarchies. Phatch can batch resize, rotate, apply perspective, shadows, rounded corners, ... and more in minutes instead of hours or days if you do it manually. Phatch allows you to use EXIF and IPTC tags for renaming and data stamping. Phatch also supports a console version to batch photos on webservers.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/04/13578167754725.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik