- Dynamic Managing the swap file creation & deletion - Swapd

Swap or virtual memory is a technique used to write some memory content, not used at the moment, to the hard disk to make room for a process which needs more memory now. swap is said to be 1000 times slower than having "real", physical memory.

By using swap space, programs can be started even when the memory is used to its maximum without having to shut down processes first. This also make a good buffer for when peaks of memory usage occur. Linux can add swap space in two ways, either as a swap file within the file system or as a separate partition.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/13578167755134.html

- Linux Small Business Server (SMBs) - Zentyal

About 99% of companies in the world are small and medium businesses (SMBs) and generate more than half of the global GPD. But in times of crisis, this is the most vulnerable segment of the economy and therefore, the one that most urgently needs to reduce costs and increase productivity.

One of the best ways to reduce costs and to increase productivity in the SMBs is by introducing information and communication technologies (ICT). And the statistics of recent years, that show over 50% annual growth in the adoption of ICT solutions depending on the segment, support this fact.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/135781677519484.html

- Real-time user logins monitoring tool - whowatch

Whowatch is an interactive ncurses who-like utility that displays information about the users currently logged on to the machine, in real-time. Besides standard informations (login name, tty, host, user's process), the type of the connection (ie. telnet or ssh) is shown. Display of users command line can be switch to tty idle time. Certain user can be selected and his processes tree may be viewed as well as tree of all system processes. Tree may be displayed with additional column that shows owner of each process. In the process tree mode SIGINT and SIGKILL signals can be sent to the selected process. Killing processes is just as simple and fun as deleting lines on the screen.

Whowatch has no command line options or configuration file.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/13578167753363.html

- Text Watermarking and Watermark Recovery - Snowdrop

The traditional watermarking relies on embedding some information in a binary file (such a proprietary format document - Adobe PDF, MS Word or multimedia files) to identify the origin of a particular copy. Watermarking can be combined with steganography to hide this data from a casual viewer.

Snowdrop is intended to bring (relatively) invisible and modification-proof watermarking to a new realm of "source material" - written word and computer source codes. The information is not being embedded in the least significant portions of some binary output, as it would be with a traditional low-level steganography, but into the source itself.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/13578167752777.html

- How to test DNS server for host Resolution

The Domain Name System (DNS) is a standard technology for managing the names of Web sites and other Internet domains. DNS is an Internet service that translates domain names into IP addresses. Because domain names (example - google.com) are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.google.com.com might translate to 209.85.153.104.

The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/135781677516817.html

- Linux Remote Support Software - Bomgar

Do you use both windows and Linux? Wish you could remote into Windows from Linux and to other Linux distributions? Well, you can. Just like when using a Remote Desktop Connection between Microsoft platforms (or remoting between Linux machines), you can bring up the desktop of the other platform. You can click around the desktop and run applications just as if you were sitting in front of the computer.

Linux has a strong foothold in the server market and an increasing number of companies and government institutions standardizing on it. If your enterprise is strong on support, then you owe it to yourself to try something more standard and secure solutions.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/135781677516254.html

- How to add CD-ROM to the sources.list file in Ubuntu / Debian Linux

If you'd rather use your CD-ROM for installing packages or updating your system automatically with APT, you can put it in your sources.list.
Open up your terminal and type following command to add CD-ROM to your sources.list file
sudo apt-cdrom add

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/01/13578167751510.html

- Ubuntu based Penetration Testing Distribution - Blackbuntu

Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security.

Blackbuntu is Ubuntu base distro for Penetration Testing with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677517496.html

- Detail Memory Reporting Tool for Linux System - smem

smem is a tool that can give numerous reports on memory usage on Linux systems. Unlike existing tools, smem can report proportional set size (PSS), which is a more meaningful representation of the amount of memory used by libraries and applications in a virtual memory system.

Because large portions of physical memory are typically shared among multiple applications, the standard measure of memory usage known as resident set size (RSS) will significantly overestimate memory usage. PSS instead measures each application's "fair share" of each shared area to give a realistic measure.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677512835.html

- Framework to Find and Exploit web Application Vulnerabilities - w3af

You may use this tool at your own risk!

w3af is a Web Application Attack and Audit Framework which aims to identify and exploit all web application vulnerabilities.

The framework has been called the "metasploit for the web", but it's actually much more than that, because it also discovers the web application vulnerabilities using black-box scanning techniques!

The w3af core and it's plugins are fully written in Python. The project has more than 130 plugins, which identify and exploit SQL injection, cross site scripting (XSS), remote file inclusion and more.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/1357816775954.html

- Protect MySQL Database from SQL injection attacks - GreenSQL

GreenSQL is an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy and has built in support for MySQL and PostgreSQL. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db administrative commands (DROP, CREATE, etc).

GreenSQL works as a reverse proxy for MySQL connections. This means, that instead of connecting TO THE MySQL server, your applications will connect to the GreenSQL server. GreenSQL will analyze SQL queries and then, if they're safe, will forward them to the back-end MySQL server.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/13578167752957.html

- Web Application Security Scanner by Google - Skipfish

Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.

Keep in mind that all types of security testing can be disruptive. Although the skipfish scanner is designed not to carry out malicious attacks, it may accidentally interfere with the operations of the site. You must accept the risk, and plan accordingly. Run the scanner against test instances where feasible, and be prepared to deal with the consequences if things go wrong.

Use skipfish only against services you own, or have a permission to test.
Use skipfish at your own risk.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/135781677510556.html

- Get Security Information about your PHP environment - PhpSecInfo

PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers suggestions for improvement. It is not a replacement for secure development techniques, and does not do any kind of code or app auditing, but can be a useful tool in a multilayered security approach.

 * It is not a replacement for secure coding practices
 * It does not audit PHP code
 * It is not comprehensive test for either your hosting environment or your web application
 * It is not the "final word."  PHPSecInfo identifies *potential* problems and offers suggestions for improvement.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/13578167753814.html

- UI Application to take System Backup and Snapshot - TimeVault

Backing up data can be difficult, especially when you only want to copy files that changed since the last backup. It can be even more troublesome when you have to remember to start the process manually,or you have to delete old backups to make room for new ones. Because of these difficulties, some people decide not to back up data at all, and feel the pain when they accidentally delete the wrong file or their system crashes. TimeVault is a backup utility for Ubuntu that addresses these problems.

TimeVault is an UI application that performs a function similar to Apple's TimeMachine. It makes automated snapshots of (selected parts of) the file system. You can roll back to a previous version of a file or directory, or just view it the way it was when the snapshot was taken. Snapshots are protected from accidental deletion or modification since they are read-only by default. The super-user can delete intermediate snapshots to save space, but files and directories that existed before or after the deletion will still be accessible

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/02/13578167756708.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik