- Convert Flv to Mp3 in Linux - FlvToMp3

FlvToMp3 is a Flash FLV MP3 Converter is a free tool to convert FLV to MP3 audio files.

It allows you to extract audio file from flash FLV and convert FLV files to MP3 format. It features a built-in MP3 splitter to extract/convert only part of FLV file to MP3 audio file. 
The user interface is pretty simple and easy to use as well.

Installation:
Download FlvToMp3 - here
Untar the package using command: tar -zxvf FlvToMp3_1.2.1_kubuntu.tar.gz
Go inside this directory using command: cd FlvToMp3
Type following command to start the application: ./FlvToMp3




source:http://linuxpoison.blogspot.com/2010/07/1357816775681.html

- Penetration Testing Tool box - PenTBox

PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems.
Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works. It is free, licensed under GNU/GPLv3.

USE THIS TOOL FOR LEGAL PURPOSES ONLY!

Below are the list of tools PenTBox contains:
Cryptography tools
  Base64 Encoder & Decoder
  Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512)
  Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512)
  Secure Password Generator
  Files en/decryptor Rijndael (AES) 256 bits – GOST – ARC4

Network tools
  TCP Flood DoSer
  TCP Flood AutoDoSer
  Spoofed SYN Flood DoSer [nmap - hping3]
  Port scanner
  Honeypot
  PenTBox Secure Instant Messaging

Extra
  L33t Sp3@k Converter
  Fuzzer

You can download PenTBox v1.3.2 here:
Windows version (Ruby included) – pentbox_1.3.2_win.zip
Linux version – pentbox_1.3.2.tar

Using PenTBox on Linux:
Untar the package using command: tar -xvf pentbox_1.3.2.tar
Go inside the extracted directory using command:  cd pentbox_1.3.2
Type following command to start the PenTBox suite: ruby pentbox.rb



source:http://linuxpoison.blogspot.com/2010/07/13578167759719.html

- How To Extract data from .deb file in Linux

A Debian "package", or a Debian archive file, contains the executable files, libraries, and documentation associated with a particular suite of program or set of related programs.

.deb package are just the tar archives but with a proper structural format of  files. You can see and extract any deb package with archive manager tool. From the dpkg-deb man page: “dpkg-deb packs, unpacks and provides information about Debian archives. .deb files can also be manipulated with ar and tar alone if necessary

Use following command to get the list of files within .deb package (Use the ‘x’ option to extract the files)


# ar tv python2.4-setuptools_0.6a1-2_all.deb
rw-r--r-- 0/0      4 Aug 24 22:10 2005 debian-binary
rw-r--r-- 0/0   2024 Aug 24 22:10 2005 control.tar.gz
rw-r--r-- 0/0 168407 Aug 24 22:10 2005 data.tar.gz

The ‘data.tar.gz’ file contains all the files that will be installed with their destination paths:



source:http://linuxpoison.blogspot.com/2010/07/13578167753636.html

- How to Compress / Uncompress files using bzip2 in Linux?

bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.

bzip2 and bunzip2 are file compression and decompression utilities. The bzip2 and bunzip2 utilities are newer than gzip and gunzip and are not as common yet, but they are rapidly gaining popularity. The bzip2 utility is capable of greater compression ratios than gzip. Therefore, a bzip2 file can be 10-20% smaller than a gzip version of the same file. Usually, files that have been compressed by bzip2 will have a .bz2 extension.

Uncompressing a bzip2 File Using bunzip2
To uncompress a bzip2 file, execute the following command:
bunzip2 filename.txt.bz2     (where filename.txt.bz2 is the name of the file you wish to uncompress)
The result of this operation is a file called filename.txt. By default, bunzip2 will delete the filename.txt.bz2 file.

Compressing a File Using bzip2
To compress a file using bzip2, execute the following command:
bzip2 filename.txt     (where filename.txt is the name of the file you wish to compress)
The result of this operation is a file called filename.txt.bz2. By default, bzip2 will delete the filename.txt file.



source:http://linuxpoison.blogspot.com/2010/07/135781677517035.html

- Get all the required Process Information and Statistics - Psinfo

Psinfo shows process information and statistics using the kernel /proc interface.
This information includes:
 Process state, environment, arguments and flags
 CPU usage
 Scheduling
 I/O usage
 Virtual memory status
 Pagefaults
 Capabilities
 Signals

psinfo is useful for providing a detailed view of the current state of an application when diagnosing issues or performance problems.

INSTALLATION
psinfo requires Linux kernel 2.6.0 or greater.
Download psinfo from here and compile and install it using following command:

# make
# make install

psinfo can be run as an orindary user but certain features (environment, executable, current working directory and root directory) require root rights and are marked n/a in output otherwise.



source:http://linuxpoison.blogspot.com/2010/08/13578167752739.html

- High Speed Network Authentication Cracking Tool - Ncrack

Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.

Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.

Ncrack was started as a "Google Summer of Code" Project in 2009. While it is already useful for some purposes, it is still unfinished, alpha quality software. It is released as a standalone tool and can be downloaded from the section below. Be sure to read the Ncrack man page to fully understand Ncrack usage.
USE THIS TOOL FOR LEGAL PURPOSES ONLY!
Installation:
Download Ncrack - here
Compile and install Ncrack using following command
tar -xzf ncrack-0.2ALPHA.tar.gz
cd ncrack-0.2ALPHA
./configure
make
su root
make install
Using Ncrack:
The only Ncrack arguments used in this example are the two target IP addresses along with the the corresponding ports for each of them. The two example ports 21 and 22 are automatically resolved to the default services listening on them: ftp and ssh.
$ ncrack 10.0.0.130:21 192.168.1.2:22


Discovered credentials for ftp on 10.0.0.130 21/tcp:
10.0.0.130 21/tcp ftp: admin hello1
Discovered credentials for ssh on 192.168.1.2 22/tcp:
192.168.1.2 22/tcp ssh: guest 12345
192.168.1.2 22/tcp ssh: admin money$


Ncrack done: 2 services scanned in 156.03 seconds.
Ncrack finished.
Ncrack can also be extensively fine-tuned for special cases, though the default parameters are generic enough to cover almost every situation. It is built on a modular architecture that allows for easy extension to support additional protocols. check man pages for more options.



source:http://linuxpoison.blogspot.com/2010/07/13578167753613.html

- Gentoo lost and Fedora is losing to OpenSuSe

If Linux distributions were stocks and you an investor you wish you’d have invested in OpenSuSe at least according to Google Insights.



source:http://linuxpoison.blogspot.com/2010/08/135781677516432.html

- Disk Information Utility - di

di is a disk information utility, displaying everything that df does and more. It features the ability to display your disk usage in whatever format you desire/prefer/are used to. It is designed to be highly portable across many platforms.

di Displays usage information on mounted filesystems.  Block values are reported in a human readable format.  If the user or group has a disk quota, the values reported are adjusted according the quotas that apply to the user.
If file is specified, the usage information for the partition on  which file is located is printed.

Installation:
Debian / Ubuntu Linux: http://packages.debian.org/unstable/utils/di
OpenSUSE: http://packman.links2linux.org/package/di/



source:http://linuxpoison.blogspot.com/2010/08/13578167754605.html

- Top like utility to monitor Network - sntop

Simple network top (sntop) is a curses-based console utility in the spirit of top that polls network hosts at a regular interval to determine their connectivity and displays the results in a pretty format. Advanced features are supported, such as automatic HTML generation of results, secure terminal mode, execution of an external file on connectivity changes, a daemon mode, and user/system configure files.

sntop uses fping (ping is supported, too) to determine connectivity of hosts, specified in a config file, on a regular interval. the results are displayed in a top-like format.

Installation and Configuration:
Download sntop from here and type the following command to install sntop

# tar xvzf sntop-x.y.z.tar.gz
# cd sntop-x.y.z
# ./configure
# make
# make install

you should now edit the system conf file (or remove it), which is by default in /etc:
$ vi /etc/sntoprc

Each user can use their own config file, look at the man pages to figure out how to add servers to the configuration file.
$ cp /etc/sntoprc ~/.sntoprc
$ vi ~/.sntoprc

sntop is placed in /usr/local/bin by default



source:http://linuxpoison.blogspot.com/2010/08/13578167753688.html

- Linux Announcement from Linus Torvalds .... 1991

This is always fun to read, even it it’s old news, Here’s the very first Linux announcement:

From: torvalds@klaava.Helsinki.FI (Linus Benedict Torvalds)
Newsgroups: comp.os.minix
Subject: What would you like to see most in minix?
Summary: small poll for my new operating system
Message-ID: <1991Aug25.205708.9541@klaava.Helsinki.FI>
Date: 25 Aug 91 20:57:08 GMT
Organization: University of Helsinki

Hello everybody out there using minix -

I’m doing a (free) operating system (just a hobby, won’t be big and
professional like gnu) for 386(486) AT clones. This has been brewing
since april, and is starting to get ready. I’d like any feedback on
things people like/dislike in minix, as my OS resembles it somewhat
(same physical layout of the file-system (due to practical reasons)
among other things).

I’ve currently ported bash(1.08) and gcc(1.40), and things seem to work.
This implies that I’ll get something practical within a few months, and
I’d like to know what features most people would want. Any suggestions
are welcome, but I won’t promise I’ll implement them :-)

Linus (torvalds@kruuna.helsinki.fi)

PS. Yes – it’s free of any minix code, and it has a multi-threaded fs.
It is NOT protable (uses 386 task switching etc), and it probably never
will support anything other than AT-harddisks, as that’s all I have :-(.


source:http://linuxpoison.blogspot.com/2010/08/135781677510881.html

- Linux Filesystem Benchmark using Blogbench

Blogbench is a portable filesystem benchmark that tries to reproduce the load of a real-world busy file server. It stresses the filesystem with multiple threads performing random reads, writes, and rewrites in order to get a realistic idea of the scalability and the concurrency a system can handle.

It stresses the filesystem with multiple threads performing random reads, writes and rewrites in order to get a realistic idea of the scalability and the concurrency a system can handle.

Installation:
Download blogbench from here and type the following command to compile and install blogbench

# tar xvzf blogbench-1.1.tar.gz
# cd blogbench-1.1
# ./configure
# make
# make install

Using Blogbench:
The minimal way to run the test is to just give the path to an *empty* and writable directory:
# blogbench -d /path/to/the/directory
Blogbench will start the required threads and the test will run during 5 minutes. A final "score" will then be given as an indication of read and write performance.



source:http://linuxpoison.blogspot.com/2010/08/13578167756727.html

- Sending Mail through command line on Linux

Read mail or send mail to other users. The mail utility allows you to compose, send, receive, forward, and reply to mail. mail has two main modes: compose mode, in which you create a message, and command mode, in which you manage your mail.

While mail is a powerful utility, it can be tricky for a novice user. It is most commonly seen nowadays in scripts. Most Linux distributions include several utilities that are richer in features and much easier to use: mailers built into browsers such as Mozilla and Firefox, graphical mail programs distributed with GNOME (Evolution) and KDE (Kmail), and the terminal-based, full-screen utilities pine and elm. The GNU Emacs editor can also send and receive mail.

Below is the mail command through with you can send mail to any given user ...

mail -s "System Log" nikesh@domain.com

This command sends a message to the user nikesh, with a subject line of "System Log" and the text of the message read from the system logfile /var/log/messages.

Below are few other command line option that you can use with the mail command ...

-s    Specify subject on command line.
-c    Send carbon copies to list of users.
-b    Send blind carbon copies to list. List should be a comma-separated list of names.
-f    Read in the contents of your mbox for processing; when you quit, mail writes undeleted messages back to this file.
-i    Ignore tty interrupt signals. This is particularly useful when using mail on noisy phone lines.


source:http://linuxpoison.blogspot.com/2010/08/135781677516317.html

- How to enable Autologin to Linux console using mingetty

The mingetty program is a lightweight, minimalist getty program foruse only on virtual consoles. Mingetty is not suitable for serial lines (you should use the mgetty program instead for that purpose)

If you got the mingetty program, your /etc/inittab file will look like ....
1:2345:respawn:/sbin/mingetty --noclear tty1
2:2345:respawn:/sbin/mingetty tty2
3:2345:respawn:/sbin/mingetty tty3
4:2345:respawn:/sbin/mingetty tty4
5:2345:respawn:/sbin/mingetty tty5
6:2345:respawn:/sbin/mingetty tty6
The first field says that this is the line for /dev/tty1. The second field says that it applies to run levels 2, 3, 4, and 5. The third field means that the command should be run again, after it exits (so that one can log in, log out, and then log in again). The last field is the command that runs mingetty on the first virtual terminal.

The above series of lines also use the "respawn" option to keep six mingetty processes running on the system. If someone tries to kill one of these processes as root, the process will simply be respawned. Only critical processes are set up in this way to keep them safe from anything else happening on the system.

If you're curious about these processes, check them out on the running system using command

$ ps -ef | grep getty

Now to enable the auto loging for a particular user, edit the /etc/inittab file and identify the terminal on which you want user to have auto login ...
1:12345:respawn:/sbin/mingetty --noclear --autologin username tty1
Reboot the system after making above changes and insure that init has spawned the new version of mingetty, and if all is well, will automatically log you on to the console.


source:http://linuxpoison.blogspot.com/2010/08/13578167755693.html

- Lightweight Monitoring Tool for Servers and Embedded System - Monitorix

Monitorix is a free, open source, lightweight system monitoring tool designed to monitorize as many services as possible. At this time it monitors from the CPU load and temperatures to the users using the system. Network devices activity, network services demand and even the devices' interrupt activity are also monitored, and more.

The current status of any corporate server with Monitorix installed can be accessed via a web browser.
Monitorix has been designed to be used under production UNIX/Linux servers, but due its simplicity and small size you may also use it to monitor embedded devices.

Installation:
Monitorix is under GPLv2 licensing and available for download on the project homepage as source code and in numerous packages. Rpm based system (RedHat / Fedora / Centos / Opensuse) can install Monitorix using command:
rpm -ivh monitorix-1.4.2-1.noarch.rpm
Configuration of Monitorix:
Before starting the monitorix daemon, be sure to adjust the /etc/monitorix.conf to your liking. For a complete list of options and features, see the man page for monitor.conf.

our $TITLE = "Linux Poison";                                 # your company name
our $HOSTNAME = "poison.hell.com"; # hostname of this server
our $OSTYPE = "Linux-SuSE";                 # choose your OS type (see below)
our $SAMBAVER = "3";                         # Samba version (2 or 3)
our $MULTIHOST = "N";                 # Enable multihost feature
our $MULTIHOST_FOOTER = "Y";         # (multihost) display URL in image
our $MULTIHOST_IMGPERLINE = "2";         # (multihost) # of images per line
our $REPORT_LANG = "en";                         # Report language
our $THEME_COLOR = "black";                 # Default is "black", none is "white"
our $REFRESH_RATE = "150";                 # Web stats' refresh rate in seconds
our $ENABLE_CROND_MAIL = "Y";         # Error messages are sent by crond

Common settings to tweak here include company name, hostname, and theme color.
Finally you'll be able to start Monitorix with: # service monitorix start

To view your system stats, make sure your webserver is running and browse to [http://localhost/monitorix] to see the data.



source:http://linuxpoison.blogspot.com/2010/08/135781677513110.html

- Modify Images in Linux - Mogrify

The  Mogrify program is a member of the ImageMagick suite of tool, use the mogrify program to re-size an image, blur, crop, despeckle, dither, draw on, flip, join, re-sample, and much more. This tool is similiar to convert except that the original image file is overwritten (unless you change the file suffix with the -format option) with any changes you request.

Imagemagick Mogrify is an easy to use, ligte, command prompt tool and capable of editting most of the image types.

Using Mogrify:
If you want to transform all the .tiff images in a directory to .jpg, you can do it with a single command:
mogrify -format jpeg *.tiff

Create thumbnails using this command:
mogrify -geometry 120x120 *.jpg

To reduce the size of any given image, use this command:
mogrify -resize 50% *.jpg

You can resize all your JPEG images in a folder to a maximum dimension of 256x256 with this command:
mogrify -resize 256x256 *.jpg

Convert PNG images to the JPEG format:
mogrify -format jpg *.png

Rotate an Image using this command
mogrify -rotate "-90" test.jpg

Reduce Colours of any given image using this command
mogrify -colors 2 test.jpg

Monochrome the given image using this command
mogrify -monochrome test.jpg

Add Borders to given image using this command
mogrify -border 2x4 test.jpg

Add Annotate to Image using this command
mogrify -comment 'My holiday highlight' test.jpg

Add some more Decorative Border using this command
mogrify -frame 20x20 test.jpeg

For more information about the ImageMagick project, visit http://www.imagemagick.org.
Run ‘mogrify -help’ to get a summary of the mogrify command options.


source:http://linuxpoison.blogspot.com/2010/08/135781677513546.html

- How to Securely Wipe a Hard Drive - Darik's Boot and Nuke ("DBAN")

Darik's Boot and Nuke ("DBAN") is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis.

DBAN is a free software product that can be used at home or in a business at zero cost.

DBAN has all available drivers for SCSI disks and drivers for IDE, PATA, and SATA disks.
DBAN supports all Microsoft platforms and securely destroys FAT, VFAT, and NTFS filesytems and  all unix platforms and securely destroys ReiserFS, EXT2, EXT3, EXT4, and UFS filesystems.

Installation:
DBAN 2.2.6 Beta for CD-R and DVD-R media.
(Burn this file to a blank disc and boot the computer with it. Do not unzip this file.)
Burn this downloaded ISO file to a CD and boot off that CD (you need to configure your BISO settings to boot from the CD first). Follow the prompts and select your appropriate configuration options.

DBAN is easy to use and very secure, using multiple methods including the Gutmann method and the Mersenne twister.

The autonuke option from the first screen will automatically run through all detected disks, securely wiping them, so be careful with it.



source:http://linuxpoison.blogspot.com/2010/08/13578167756895.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik