- UI Application for converting Video and Audio using ffmpeg - WinFF

FFmpeg is a complete, cross-platform solution to record, convert and stream audio and video. ffmpeg includes libavcodec - the leading audio/video codec library.

FFmpeg is a wonderful library for creating video applications or even general purpose utilities. ffmpeg takes care of all the hard work of video processing by doing all the decoding, encoding, muxing and demuxing for you. This can make media applications much simpler to write. It's simple, written in C, fast, and can decode almost any codec you'll find in use today, as well as encode several other formats.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/13578167751625.html

- How to Change MySQL Storage Engines

MySQL 5.0 and higher offers nine storage engines and more are likely to be added in the future. The most commonly used are MyISAM, InnoDB, and Berkeley DB (BDB). Each storage engine offers special features and advantages. You can even use different formats for each table in your database, though it may be harder to manage a mixed format database. Better is to keep all tables in a database using the same storage engine, but use different engines for different databases.

To determine which storage engines your server supports, run following SHOW ENGINES; statement. The value in the Support column indicates whether an engine can be used. A value of YES, NO, or DEFAULT indicates that an engine is available, not available, or available and currently set as the default storage engine.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677512266.html

- Web based Internet Bandwidth and Data Transfer Monitor - BitMeter OS

BitMeter OS is a free, open-source, bandwidth monitor that works on Windows, Linux and Mac OSX. BitMeter OS keeps track of how much you use your Internet/network connection, and allows you to view this information in a variety of ways

Once BitMeter OS is installed on your computer you can monitor your connection usage either via a web browser, or by using the command line tools. The Web Interface displays various graphs and charts that show how your Internet / network connection has been used over time:

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677518023.html

- UI Application to hide Messages into Picture or Sounds files (Steganography) - SilentEye

SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system.

SilentEye plug-in:
Cryptography plug-ins:
  * Allow application to encrypt data before hiding them, for example using AES 128.

Format Plug-in:
  * Image format plug-ins: By default a BMP plug-in is provided, which allow you to save encoded images into .bmp files. (JPEG plug-in is on its way...)
  * Audio format plug-ins: WAVE plug-in provided for .wav files

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/13578167758991.html

- Automatic Web Browser Proxy Configuration using PAC file

The Web Proxy Auto-Discovery Protocol (WPAD) is a method used by clients to locate a URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete it can be executed to determine the proxy for a specified URL. The WPAD protocol only outlines the mechanism for discovering the location of this file, but the most commonly deployed configuration file format is the Proxy auto-config (PAC) format originally designed by Netscape.

A PAC file is a specialized JavaScript function definition that a browser calls to determine how requests are handled. Clients must specify (in their browser settings) the URL from which the PAC file is loaded. You can store a PAC file on web Server (or on any server in your network) and then provide the URL for this file to your clients.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677510388.html

- Search Files / Application on Ubuntu using - Synapse

If you ever used Gnome Do / Quicksilver / Gnome Launch Box, you'll feel right at home with Synapse, if not, the only thing you need to do is run Synapse (or press Ctrl+Space to summon it), type what you're looking for, and Synapse will present you a list of items that match your query. Once you found the item you were looking for, you can perform an action on it (and these are defined by the plugins you're using). If you don't like the default action, just press Tab and search appropriate action.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677511096.html

- Basic MySQL performance tuning using Query Cache

The query cache stores the text of a SELECT statement together with the corresponding result that was sent to the client. If an identical statement is received later, the server retrieves the results from the query cache rather than parsing and executing the statement again. The query cache is shared among sessions, so a result set generated by one client can be sent in response to the same query issued by another client.

The query cache can be useful in an environment where you have tables that do not change very often and for which the server receives many identical queries. This is a typical situation for many Web servers that generate many dynamic pages based on database content.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/13578167755047.html

- Configure Squid Proxy with ClamAV Antivirus using HAVP (HTTP Anti Virus Proxy)

HAVP (HTTP Anti Virus Proxy) is a non caching proxy which scans for viruses with ClamAV anti-virus scanner at the same time. The main aims are continuous, non-blocking downloads and smooth scanning of dynamic and password protected HTTP traffic. It can be used with squid or standalone, and it also supports transparent proxy mode.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/13578167758348.html

- How to Disable Direct Root Login to SSH on Ubuntu

One security tweak you need to consider is with Open-SSH server. By default, direct log on for root is enabled, which means your just asking for trouble with hackers attempting to break into your Computer. Instead, you can easily disable root access from logging into your SSH server,

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677519888.html

- Extract individual file(s) from rpm package using rpm2cpio

As the name implies, rpm2cpio takes an RPM package file and converts it to a cpio archive. Because it's written to be used primarily as a filter, there's not much to be specified. rpm2cpio takes only only one argument.

The optional argument is the name of the package file to be converted. If there is no file-name specified on the command line, rpm2cpio will simply read from standard input and convert that to a cpio archive.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677515205.html

- UI Application to Convert Real Media formats (rm, ra, ram) to mp3 / wav formats - Rmconverter

Real Media Converter (Rmconverter) is a multi threaded GUI that takes advantage from the mencoder and lame packages to generate wav and mp3 formats from real media files (ra, rm, and ram) and wav files.

Rmconverter Features:
  * Converts Real Media formats (rm, ra, ram) to mp3/wav formats.
  * A simple Media player.
  * A user friendly interface.
  * Enhanced options panel, and the possibility of saving your configuration.
  * Translations.
  * Built in themes.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/13578167755938.html

- Top like Utility to monitor Network Connections usage - pktstat

pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what.

It partially decodes HTTP and FTP protocols to show what filename is being transferred, as well as X11 application names. Entries hang around on the screen for a few seconds so you can see what just happened, in short a very useful tool to figure out network connection in real time.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677519230.html

- Remote Control your Ubuntu Linux using Android - Gmote

Gmote turns your Android phone into a remote control for your computer, allowing you to start and control movies and music at a distance. It supports all of the standard remote control features such as play, pause, rewind, volume controls etc.  It also has a built-in file browser that lets you view the files that are on your computer and select what you want to play. It's great if you want to sit back while watching a DVD, or control the flow of songs in your favorite playlist. 

Gmote can also be used as a wireless Touchpad and keyboard, allowing you to control your computer at distance. Another great feature available in Gmote is the ability to stream music from your computer to your phone!

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677519265.html

- A Complete Guide to Securing a Website - White Paper

To secure a website or a web application, one has to first understand the target application, how it works and the scope behind it.  Ideally, the penetration tester should have some basic knowledge of programming and scripting languages, and also web security.

A website security audit usually consists of two steps.  Most of the time, the first step usually is to launch an automated scan.  Afterwards, depending on the results and the website’s complexity, a manual penetration test follows.  To properly complete both the automated and manual audits, a number of tools are available, to simplify the process and make it efficient from the business point of view.  Automated tools help the user making sure the whole website is properly crawled, and that no input or parameter is left unchecked.  Automated web vulnerability scanners also help in finding a high percentage of the technical vulnerabilities, and give you a very good overview of the website’s structure, and security status.  Thanks to automated scanners, you can have a better overview and understanding of the target website, which eases the manual penetration process.

Continue Reading...


source:http://linuxpoison.blogspot.com/2010/12/135781677519201.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik