- Enable Surround Sound system (5:1) in Ubuntu

To enable 5:1 surround sound system for your Ubuntu, go to terminal and open the file (/etc/pulse/daemon.conf) using your editor and change the line:

$ sudo gedit /etc/pulse/daemon.conf
; default-sample-channels = 2

to say

default-sample-channels = 6

After you reboot, test your sound using: speaker-test -Dplug:surround51 -c6 -l1 -twav



source:http://linuxpoison.blogspot.com/2010/08/135781677516757.html

- How to block flash videos using Squid proxy Server

A popular request is to block certain content types from being served to clients. Squid currently can not do "content inspection" to decide on the file type based on the contents, but it is able to block HTTP replies based on the servers' content MIME Type reply.

The MIME Type reply is generally set correctly so browsers are able to pass the reply to the correct module (image, text, html, flash, music, mpeg, etc.)

One popular example is to block flash video, used by sites such as Youtube.
The MIME type for such content is "video/x-flv". Creating an ACL to block this is easy.

First, create an ACL which matches the MIME type in question:
acl deny_rep_mime_flashvideo rep_mime_type video/x-flv
Then create a HTTP Reply ACL which denies any replies with that MIME type:
http_reply_access deny deny_rep_mime_flashvideo
This has been verified to block Youtube flash video content.

If the content is blocked the following similar line will be seen in access.log:

1282485682.146    903 127.0.0.1 TCP_DENIED_REPLY/403 3143 GET http://tc.v15.cache3.c.youtube.com/videoplayback? - DIRECT/208.117.252.163 text/html

And on browser, you can see ...




source:http://linuxpoison.blogspot.com/2010/08/13578167758556.html

- Graphical tool to Download and Convert YouTube Videos - CaC

CaC (Catch and Converter) is a simple graphical program that converts videos from Videosites like Youtube, Google Videos, etc .. It's pretty simple to use, just copy the link of the video to download, choose the place for download and the output format.

For most profiles to work, it is necessary to have the unstripped version of the libavcodec in the multiverse repository, which can be obtained by installing ubuntu-restricted-extras or kubuntu-restricted-extras or xubuntu-restricted-extras as suggested by this package.

Download and Install CaC: 
Ubuntu user can download CaC from here and can install it using your package manager.
Once installed, you can find it in Applications> Sound & Video> CaC - Catch and Convert.



source:http://linuxpoison.blogspot.com/2010/09/135781677510382.html

- Monitor bandwidth consumption per process - NetHogs

NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.

NetHogs Installation:
Fedora user can install NetHogs using command: yum install nethogs
Ubuntu user can install NetHogs using command: sudo apt-get install nethogs

Using NetHogs:
The default device to monitor is eth0. If you wish to use other device, simply type the argument after nethog, open the terminal and run the following command: nethogs eth0

When nethogs is running, press:
 q: quit
 m: switch between total and kb/s mode


usage: nethogs [-V] [-b] [-d seconds] [-t] [-p] [device [device [device ...]]]
-V : prints version.
-d : delay for update refresh rate in seconds. default is 1.
-t : tracemode.
-b : bughunt mode - implies tracemode.
-p : sniff in promiscious mode (not recommended).





source:http://linuxpoison.blogspot.com/2010/09/1357816775545.html

- What does Ubuntu means?

Ubuntu is a South African ethical ideology focusing on people's allegiances and relations with each other. The word comes from the Zulu and Xhosa languages. Ubuntu is seen as a traditional African concept, is regarded as one of the founding principles of the new republic of South Africa and is connected to the idea of an African Renaissance.

A rough translation of the principle of Ubuntu is "humanity towards others". Another translation could be: "The belief in a universal bond of sharing that connects all humanity".
"A person with ubuntu is open and available to others, affirming of others, does not feel threatened that others are able and good, for he or she has a proper self-assurance that comes from knowing that he or she belongs in a greater whole and is diminished when others are humiliated or diminished, when others are tortured or oppressed."
 -- Archbishop Desmond Tutu

As a platform based on Free software, the Ubuntu operating system brings the spirit of ubuntu to the software world.

The Ubuntu project is entirely committed to the principles of free software development; people are encouraged to use free software, improve it,and pass it on.

"Free software" doesn't mean that you shouldn't have to pay for it (although Ubuntu is committed to being free of charge as well). It means that you should be able to use the software in any way you wish: the code that makes up free software is available for anyone to download, change, fix, and use in any way. Alongside ideological benefits, this freedom also has technical advantages: when programs are developed, the hard work of others can be used and built upon. With non-free software, this cannot happen and when programs are developed, they have to start from scratch. For this reason the development of free software is fast, efficient and exciting!

You can find out more about free software and the ideological and technical philosophy behind it at the GNU website.



source:http://linuxpoison.blogspot.com/2010/09/135781677510910.html

- What is VPS Web Hosting & Who Will Benefit From It?

Virtual Private Server (VPS) web hosting is a form of hosting where a single server is divided in such that each partition is able to work like a dedicated server.  It's fundamentally a combination of        shared and dedicated hosting.  This makes it a great alternative to the two extremes in which you get an abundant amount of independent resources that shared hosting cannot provide, but at a fraction of the cost of having a fully dedicated server.

With the technology of virtual software enabling the creation of virtual private servers, each VPS can independently have its own operating system, and resources like RAM and disk space; with few shared aspects as CPU.  This makes a VPS ideal for website owners who need the extra, more reliable resources that can handle things such as site expansion, high traffic to their blog, e-commerce and so on, without having to make constant upgrades.  Moreover, VPS hosting would be very ideal for business owners who want complete control over their site with the provided independent operating system that gives extensive administrative rights to the user.

Even more benefits of VPS web hosting include:

Email Server
You have your access to your own email server that handles only email from your domain, which gives you more control, increased performance and provides additional security.  In addition, since the email will be coming from your own unique IP address, it also helps ensure proper delivery.

Root/SSH Access
With a VPS you get “server-level customization,” which was previously only available with dedicated hosting due to security reasons.  In addition, you can utilize the command line access and have the option of operating as the root user if you've got the experience to do so.

Burstable Memory for Unpredictable Usage Spikes
If your goal is to gain more traffic to your website, then you should definitely be prepared for it.  Let's say that the popularity of your blog is on the rise.  In addition, links to your website are added to larger ones like Digg or Slashdot.  On a shared server, this can become a major disaster that can quickly cripple your website.  But on a VPS, this wouldn't be much of a problem with the availability of “burstable memory,” which is a  pool of reserved memory that's available when needed, such as in times of very high traffic.

Security
With a VPS from a good hosting company, you should have full control over the firewall and can customize it to fit your needs. You dictate what services are accessible by what IP addresses. For example, you can restrict access to sensitive areas (such as the control panel) to specific IP addresses, so that only someone in your office can get access to these areas.

Conclusion
VPS hosting offers many advantages such as greater control, a higher level of security, and superior performance for high traffic and resource-intensive websites. It's a great option for small and medium-sized businesses or popular bloggers, and provides excellent value on a modest budget.


source:http://linuxpoison.blogspot.com/2010/09/135781677512367.html

- How to block Messenger (Yahoo, Trillian, Skype , MSN , ICQ, Gizmo, AOL) using squid

AOL Instant Messenger (AIM)
Note: AOL are known to change their Server IPs. The list below cannot be confirmed.
# AOL
acl aol dst 64.12.200.89/32 64.12.161.153/32 64.12.161.185/32
acl aol dst 205.188.153.121/32 205.188.179.233/32
http_access deny aol
Gizmo Project:
Gizmo Project include software to connect to a wide range of messaging protocols and VoIP services.
# Gizmo Project
acl gizmo dstdomain .gizmoproject.com
# Gizmo VoIP
acl gizmo dstdomain .talqer.com .gizmocall.com .fring.com
# Gizmo Chat
acl gizmo dstdomain .pidgin.im
http_access deny gizmo
ICQ ("I Seek You")
# ICQ
acl icq dstdomain .icq.com
http_access deny icq
MSN Messenger and Windows Live Messenger
# MSN Messenger
acl msn urlpath_regex -i gateway.dll
acl msnd dstdomain messenger.msn.com gateway.messenger.hotmail.com
acl msn1 req_mime_type application/x-msn-messenger

http_access deny msnd
http_access deny msn
http_access deny msn1
Skype
# Skype
acl numeric_IPs dstdom_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[([0-9af]+)?:([0-9af:]+)?:([0-9af]+)?\])):443
acl Skype_UA browser ^skype^

http_access deny numeric_IPS
http_access deny Skype_UA
Note: Recent releases of Skype have been evading the above restriction by not sending their User-Agent headers and using domain names. The following can be used to catch those installs, but be aware it will likely also catch other agents.
acl validUserAgent browser \S+
http_access deny !validUserAgent
Trillian
# Trillian
acl trillian dst 66.216.70.167/32
http_access deny trillian
Yahoo! Messenger
# Yahoo! Messenger
acl ym dstdomain .messenger.yahoo.com .psq.yahoo.com
acl ym dstdomain .us.il.yimg.com .msg.yahoo.com .pager.yahoo.com
acl ym dstdomain .rareedge.com .ytunnelpro.com .chat.yahoo.com
acl ym dstdomain .voice.yahoo.com

acl ymregex url_regex yupdater.yim ymsgr myspaceim

# Other protocols Yahoo!Messenger uses ??
acl ym dstdomain .skype.com .imvu.com

http_access deny ym
http_access deny ymregex


source:http://linuxpoison.blogspot.com/2010/09/13578167757171.html

- Various Linux Distro Stickers

Contains powered by stickers for following Linux distro ..

 - Arch Linux
 - Ubuntu
 - Debian
 - openSuSe
 - Linux Mint
 - CentOS
 - Mandriva
 - Kubuntu
 - Fedora
 - Gentoo
 - Puppy Linux
 - XUbuntu

Download stickers here


source:http://linuxpoison.blogspot.com/2010/09/135781677515664.html

- Detecting Rootkits in Ubuntu system using Chkrootkit and Rkhunter

A rootkit is a program or set of programs used by an intruder to both hide their presence on a computer system and allow future access to that same system. A rootkit will usually either manipulate the data set the operating system relies on, or alter the execution flow of the operating system.

It is important you realize that rootkits are designed to be very stealth, meaning they are difficult to find or detect by normal means. Many rootkits have been so well written that their presence can go undetected for years. They are written by experienced individuals with an advanced level of programming knowledge far above that of the average virus or malware writer. A rootkit is not an exploit. It is what an attacker uses after an initial exploit to allow future undetected access to a compromised computer.

Chkrootkit:
chkrootkit is a tool to locally check for signs of a rootkit. It contains a chkrootkit: shell script that checks system binaries for rootkit modification.

Installation:
Open up the terminal and type the following command to install chkrootkit:
$ sudo apt-get install chkrootkit

Using chkrootkit:
Open up the terminal and type the command: $ sudo chkrootkit
This will perform all tests

Other Configurations:
If you want an automatic daily run of chkrootkit:
Open /etc/chkrootkit.conf and Replace RUN_DAILY="false" by RUN_DAILY="true"

If you also want a daily mailed report :
Open /etc/cron.daily/chkrootkit and replace '$CHKROOTKIT $RUN_DAILY_OPTS' by
'$CHKROOTKIT $RUN_DAILY_OPTS | mail -s '"\"Daily chkrootkit run from $HOSTNAME \"$YOUR_EMAIL_ADDRESS"'

Rkhunter:
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, sniffers, and malware. The application consists of the main shell script, a few text-based databases, and optional Perl scripts. It can recognise and run external applications like 'skdet' and 'unhide'. It should run on almost every Unix clone.

Installation:
Open up the terminal and type the following command to install Rkhunter:
$ sudo apt-get install Rkhunter

Using Rkhunter:
Open up the terminal and type the command: $ sudo rkhunter --check
This will perform all tests

By default, the log file '/var/log/rkhunter.log' will be created. It will contain the results of the checks made by Rkhunter

The following command option causes rkhunter to check and download the later version of any of its text data files: $ sudo rkhunter --update

To see what other options can be used with rkhunter, enter: $ sudo rkhunter --help


source:http://linuxpoison.blogspot.com/2010/09/135781677514868.html

- How to perform sha256sum check on Ubuntu Linux

The program sha256sum is designed to verify data integrity using the SHA-256 (SHA-2 family with a digest length of 256 bits). SHA-256 hashes used properly can confirm both file integrity and authenticity.

Comparing hashes makes it possible to detect changes in files that would cause errors. The possibility of changes (errors) is proportional to the size of the file; the possibility of errors increase as the file becomes larger. It is a very good idea to run an SHA-256 hash comparison check when you have a file like an operating system install CD that has to be 100% correct.

Most Linux distributions come with the sha256sum utility (on Ubuntu it is part of the coreutils package). We are going to use the OpenSuSe 11.3 ISO file for the following example:

Check the iso file
First open a terminal and go to the correct directory to check a downloaded iso file:
Then run the following command from within the download directory.

sha256sum Linux.iso
sha256sum should then print out a single line after calculating the hash:

35ad366043bd80bbf5dcab5089f46a3efd142fd132b4423343f716ae0177fd86  Linux.iso

Compare the hash (the alphanumeric string on left) that your machine calculated with the corresponding hash in the SHA256SUMS file.

When both hashes match exactly then the downloaded file is almost certainly intact. If the hashes do not match, then there was a problem with either the download or a problem with the server. You should download the file again from either the same mirror, or from a different mirror if you suspect a server error.

Check here to know how to perform md5 checksum.


source:http://linuxpoison.blogspot.com/2010/09/13578167751578.html

- Utility to recover deleted files from an ext3 or ext4 Linux partition - Extundelete

Extundelete is a utility that can recover deleted files from an ext3 or ext4 partition. The ext3 file system is the most common file system when using Linux, and ext4 is its successor. extundelete uses the information stored in the partition's journal to attempt to recover a file that has been deleted from the partition. There is no guarantee that any particular file will be able to be undeleted, so always try to have a good backup system in place, or at least put one in place after recovering your files!

Download and Install Extundelete:
Download the latest version of Extundelete - here

To compile and install Extundelete, you should first install the binary and development packages for e2fsprogs and e2fslibs.  You must also have a C++ compiler and a make utility to compile extundelete.
Go to terminal and type following command to install Extundelete:

tar -xjf extundelete-0.2.0.tar.bz2
cd extundelete-0.2.0
./configure
make

The extundelete program may be run as-is from the build directory, or you may wish to install it to a directory that is shared with other executable programs, which you may do by running the following command: make install

Using 
extundelete:
Assume you have deleted a file called /home/user/an/important/file. Also assume the output of the 'mount' command shows this line (among others):

/dev/sda3 on /home type ext3 (rw)

This line shows that the /home directory is on the partition named /dev/sda3, so then run: 
umount /dev/sda3 and check that it is now unmounted by running the mount command again and seeing it is not listed.Now, with this information, run extundelete:
# extundelete /dev/sda3 --restore-file user/an/important/file

If you have deleted the directory 'important', you can run: 
# extundelete /dev/sda3 --restore-directory user/an/important

Or if you have deleted everything, you can run: 
# extundelete /dev/sda3 --restore-all



source:http://linuxpoison.blogspot.com/2010/09/135781677516452.html

- Converts many CD-ROM image (BIN, MDF, PDI, CDI, NRG, and B5I) formats to ISO9660 - Iat

Iat (Iso9660 Analyzer Tool) is a tool for detecting the structure of many types of CD-ROM image file formats, such as BIN, MDF, PDI, CDI, NRG, and B5I, and  converting them into ISO-9660.

Installation:
It’s included in the Debian repositories, so install it using apt-get install iat, or install it using the synaptic software management tool and use it like in the following

Other can compile and install the iat package, open up the terminal and type following command:

wget http://www.ohloh.net/p/iat/download?filename=iat-0.1.7.tar.bz2
bunzip2 iat-0.1.7.tar.bz2
cd iat
./configure && make && sudo make install

Using iat:
Convert MDF-image to ISO9660: iat my_image.mdf my_new_image.iso
Convert NGR to ISO9660: iat cd_image.nrg cd_image.iso
Convert BIN-image to ISO9660: iat my_image.bin > my_new_image.iso

Write CD directly from MDF-format: iat my_image.mdf | cdrecord


source:http://linuxpoison.blogspot.com/2010/09/1357816775120.html

- Text Encryption utility using the Advanced Encryption Standard (AES) - Furius Cipher

Furius Cipher is a simple text encryption utility using the Advanced Encryption Standard (AES).

Here are some key features of "Furius Cipher":
 * US Government standard text encryption.
 * Supports UTF8 character encoding.
 * Text can be loaded from and saved to files.

Installation:
Ubuntu Users can download the deb file from here, double click the download .deb file to install.

Create a launcher for Gnome user:
 * Right-click on the gnome panel (the taskbar at the top of the screen) and choose “Add to Panel
 * Select “Custom Application Launcher” and fill in these values:

Type: Application
Name: Furius Cipher
Command: furiuscipher

 * You can also select an icon to use with the launcher.
 * Click “OK” to save the changes

Click the new launcher to start.


Other Users can Compile from the source file furiuscipher-1.0.0.tar.gz
 * wget http://www.marcus-furius.com/files/FuriusCipher/furiuscipher-1.0.0.tar.gz
 * tar xzvf furiuscipher-1.0.0.tar.gz
 * cd furiuscipher-1.0.0
 * ./configure
 * make
 * su -c "make install"


source:http://linuxpoison.blogspot.com/2010/09/135781677511755.html

- Utility for creating installers. DEB - Ubucompilator

Ubucompilator is a very simply tool to compile a software by the source code and make a .deb package. Ubucompilator is designed for debian's distro derivates. Ubucompilator is the substitute in the compilation process of software of the terminal. After the software's compilation, you can create a .deb package for install the software just compiled in your ubuntu's (linux mint, debian and relative derivates). Ubucompilator is a free software released undere GNU GPL v3.

Ubucompilator Features:
 * Compile  software
 * Create .deb packages
 * Unpack the source code by the unziptool

Ubucompilator Installation:
Download the Ubucompilator deb file.
Install Ubucompilator with a double click on the icon or install ubucompilator using command:
sudo dpkg -i ubucompilator_0.1.2-1_all.deb
After successful installation you can find the Ubucompilator under Application > Others



How to compile and install the software from source code using command line - check here


source:http://linuxpoison.blogspot.com/2010/09/135781677516434.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik