domingo, 29 de abril de 2007

The Perfect Desktop - Debian Etch (Debian 4.0)

With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. In this tutorial I will show people who are willing to switch to Linux how they can set up a Linux desktop (Debian Etch in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that runs also on older hardware, and the best thing is: all software comes free of charge.

SUM, configura Grub de forma grafica

sábado, 28 de abril de 2007

Free Software vs. Open Source

Tanto Open Source como Free Software son movimientos sociales, preocupados sobre lo que puedes o debes poder hacer (derechos) con los programas (software). Tienen diferencias filosóficas pero pocas diferencias practicas.


Siete razones por las cuales Microsoft ama al Software Libre

Durante la Microsoft MIX William Hurley quién dirigió el grupo “Open Source, the Web, Interoperability, and Microsoft” publicó una lista con las siete razones por las cuales Microsoft ama el software libre...

viernes, 27 de abril de 2007

Ubuntu Linux Vs. Windows Vista: The Battle For Your Desktop

Is Linux finally ready to take on Windows as a desktop OS? We tried out both Vista and Ubuntu on individual PCs to see which works better. Here's who won.

jueves, 26 de abril de 2007

Five Basic Mistakes Not to Make in DNS

Here are five things you can do to make sure your DNS is in good shape and not causing problems for the rest of the Internet, which, by the way, also includes you.


FreeBSD Security Advisory FreeBSD-SA-07:03.ipv6

There is no mechanism for preventing IPv6 routing headers from being used to route packets over the same link(s) many times.


Linux Kernel 2.6.21 Published

Linus Torvalds has released Linux 2.6.21 after months of development. This release improves the virtualization with VMI, a paravirtualization interface that will be used by Vmware...

Sharing files between Feisty and Windows XP or VISTA

This guide to install samba server on Ubuntu Feisty Fawn, will help you share files from your Ubuntu Feisty with the windows machines on your network.

Nero Linux 3 Beta (Linux)

Burn and copy CDs and DVDs, including Blu-ray and HD DVD discs, with Nero Linux 3.


Wikipedia Releases Offline CD

WikipediaOnDVD, with cooperation with the Wikipedia community, has released its first offline test version. The articles were selected by Wikipedians and reviewed for accuracy, vandalism, and importance.


Google Releases Improved MySQL Code

Google on Tuesday released new programming code under the GPL license to enhance MySQL databases.

Google uses the MySQL open source relational database internally for some applications that aren't search related. And its engineers are keen to improve the code by making their improvements publicly available.


miércoles, 25 de abril de 2007

FreeBSD UFS2 Problems: Bounty sponsored and formalized by is pleased to announce Code Bounties for 2007:

Two of the five bounties are for FreeBSD related projects. Please take note of the "FreeBSD UFS2 problem resolution and standardized UFS2 stress testing" bounty - we encourage you to contribute.


Vmware 5.5 on FreeBSD: Bounty sponsored and formalized by is pleased to announce Code Bounties for 2007:

Two of the five bounties are for FreeBSD related projects. Please take note of the "Vmware 5.5 on FreeBSD" bounty - we encourage you to contribute.


martes, 24 de abril de 2007

Stop Denial of Service attacks

You probably heard before of the term Denial of Service. What does this mean? How can you stop DOS?

How to: Encrypt Your VoIP

As VoIP becomes ever more popular, the security of these systems becomes more of a concern. VoIP can be vulnerable to a number of attacks due to the nature of VoIP calls. In short, VoIP traffic flows across the Internet in unencrypted packets, which means anyone that has access to the network between sender and recipient can intercept these packets — essentially allowing them to create a recording of your conversation. How can you help secure yourself against these types of attacks?


Next-generation, high-performance processor unveiled

The prototype for a revolutionary new general-purpose computer processor, which has the potential of reaching trillions of calculations per second, has been designed and built by a team of computer scientists at The University of Texas at Austin.

The new processor, known as TRIPS (Tera-op, Reliable, Intelligently adaptive Processing System), could be used to accelerate industrial, consumer and scientific computing.

Professors Stephen Keckler, Doug Burger and Kathryn McKinley have been working on underlying technology that culminated in the TRIPS prototype for the past seven years. Their research team designed and built the hardware prototype chips and the software that runs on the chips.


Put your OpenSSH server in SSHjail

Jailing is a mechanism to virtually change a system's root directory. By employing this method, administrators can isolate services so that they cannot access the real filesystem structure. You should run unsecured and sensitive network services in a chroot jail, because if a hacker can break into a vulnerable service he could exploit your whole system. If a service is jailed, the intruder will be able to see only what you want him to see -- that is, nothing useful. Some of the most frequent targets of attack, which therefore should be jailed, are BIND, Apache, FTP, and SSH. SSHjail is a patch for the OpenSSH daemon. It modifies two OpenSSH files (session.c and version.h) and allows you to jail your SSH service without any need for SSH reconfiguration.


Control multiple computers with a single keyboard and mouse

You don't need a hardware switch to share one keyboard and mouse amongst several different computers. All you need is the free, cross-platform application, Synergy.


How To Install VMware Server On Debian 4.0 (Etch)

This tutorial provides step-by-step instructions about how to install the free VMware Server (version 1.0.2) on a Debian Etch system.

With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free). In this article we use Debian Etch (4.0) as the host operating system.

Review: BackTrack 2 security live CD

BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros -- Whax and Auditor Security Collection -- BackTrack bundles more than 300 security tools.


Subnetting in 11 Steps

here are a few things that you will need to know first. I personally use 11 rules that I learned from Mike Vana. Below you will find the 11 rules as well as some examples.

Discover the Linux Kernel Virtual Machine

Linux® and flexibility go hand in hand, and the options for virtualization are no different. But recently, a change in the Linux virtualization landscape has appeared with the introduction of the Kernel virtual Machine, or KVM. KVM is the first virtualization solution to be part of the mainline Linux kernel (V2.6.20). KVM supports the virtualization of Linux guest operating systems -- even Windows® with hardware that is virtualization-aware. Learn about the architecture of the Linux KVM as well as why its tight integration with the kernel may change the way you use Linux.


Removing files from your /tmp directory in Ubuntu when you shut down.

Your /tmp directory in Linux is a handy place for your OS to stick files that it may need at the moment but won’t need down the road.


Errors, Vulnerabilities & Exploits explained

In this paper I will try to provide you with a basic understanding of errors, possible vulnerabilities because of those errors and their exploits. t is in no way meant to be a full and complete guide to exploits /vulnerabilities but hopefully it will help you learn to recognize possible vulnerabilities and how to deal with them.

Video vigilancia en linux

Este howto expone como implementar un sistema de video vigilancia sobre linux.

What's new with PF in 4.1?

Each release since 3.0 has included exciting updates to PF. OpenBSD 4.1 is no different. From enabling keep state and flags S/SA by default, to further synchronizing pfctl command line options with what can be done inside pf.conf, to greater logging flexability and improved anchor support, the PF development team continues to expand PF's usability and functionality.


DRM Rippers

DRM is an acronym for Digital Rights Management, a broad term used to describe a number of techniques for restricting the free use and transfer of digital content. DRM is used in a number of media, but is most commonly found in video and music files. There are many who argue that DRM is a misnomer, since it deals with use issues rather than the rights of the consumer. They therefore reinterpret DRM to stand for Digital Restrictions Management.

The following is a list of applications that can be used to rip DRM encrypted assets such as music and videos.

Introduction to NIPS - Network Intrusion Prevention System

Going beyond detecting intrusions and blocking services based on IPs and Ports we have NIPS. Network Intrusion Protection Systems (NIPS) actively protects based on signature matches. Unlike firewalls, it inspects traffic at a deeper level and is able to control the traffic by blocking it in a variety of ways including sending Resets. Additionally, most NIPS products can handle and effectively control high volume attacks that are meant to distrupt network services. Even though NIPS products have been out for a few years, most large companies haven’t deployed them en masse due to the fact that it must be deployed in line. And this means the administrator must carefully deploy them and avoid configuring the NIPS to cause disruptions.


Free Computer System Recovery Tools

Your data's trapped on a dead computer. You lost your login password. You never wrote down the product key on a non-working Windows installation. Your Mac won't start.

Don't pay the extortionists at the computer repair shop 800 bucks to get your data back or start up your dead computer. Plenty of free tools can help you and are available for download right now.


lunes, 23 de abril de 2007

Mount a USB key under Solaris

Exhaustive Data Compressor Comparison

his is easily the best article I've seen comparing data compression software. The author tests 11 compressors: 7-zip, ARJ32, bzip2, gzip, SBC Archiver, Squeez, StuffIt, WinAce, WinRAR, WinRK, and WinZip. All are tested using 8 filesets: audio (WAV and MP3), documents, e-books, movies (DivX and MPEG), and pictures (PSD and JPEG).


Fill out PDFs online with PDF Filler

ust upload your PDF, then click and enter text anywhere on the form you need. PDF Filler is a great tool for filling out any PDF when you don't have access to the right desktop tools to accomplish the same thing.


Boost your blogging with ScribeFire

The Web is littered with blogs that are updated infrequently, at best, or completely abandoned. If you want to show your blog a little love, install ScribeFire for Firefox and get busy posting. ScribeFire puts your blog right at your fingertips in Firefox, and makes it much easier to go from thought to post.


IBM Reveals New Virtual Linux Environment

IBM has just announced the new open beta version of their virtual Linux environment that allows users to run x86 Linux programs on POWER processor-based IBM System p servers.


Burning CDs with Gnome

The GNOME desktop environment comes with a simple and single-minded CD burner application built into the Nautilus file manager (not dissimilar to what Microsoft bundles with Windows XP’s Windows Explorer and Vista’s Explorer) that can handle a lot of your file burning needs. But what do you do if you need more complex tasks done, like burning or ripping an ISO file, or creating an audio CD?

Wondering what you can do for FreeBSD/ZFS?

You'll find the answer here.

sábado, 21 de abril de 2007

Installing backtrack on harddisk

recently i wanted to install backtrack on one of the laptops which i have.after searching on net i found a good how to on installing backtrack on the harddisk.

Securing Your Wireless Network

I’ve been on a bit of a security kick lately…more than usual anyway. I’ve always been a bit of a security fanatic but lately I’ve been learning a whole lot more. Working as an IT auditor by day and just naturally being attracted to technology, security is of great interest to me.


Unix solaris 10 training resources

Backing Up the MBR

Just another note about restoring the boot loader for dual boot systems, after Windows messes it up.


viernes, 20 de abril de 2007

pkgsrc-2007Q1 Branched

The pkgsrc developers are very proud to announce the new pkgsrc-2007Q1 branch, which has support for more packages than previous branches.
As well as updated versions of many packages, the infrastructure of pkgsrc itself has been improved for better platform and compiler support, and also for enhanced security.

At the same time, the pkgsrc-2006Q4 branch has been deprecated, and continuing engineering starts on the pkgsrc-2007Q1 branch.


Send Later (Thunderbird)

The Send Later Thunderbird extension lets you schedule the delivery of emails composed in Thunderbird.


Top 10 Home networking tricks

Amazing things happen when you connect a few computers together with cable or wireless signal. By now you've probably got several connected computers at home, sharing an internet connection, maybe a printer and files between them. But are you getting the most out of your home network?

The Perfect Setup - Ubuntu Feisty Fawn (Ubuntu 7.04)

This tutorial shows how to set up a Ubuntu Feisty Fawn (Ubuntu 7.04) based server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Courier POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 32-bit version of Ubuntu Feisty Fawn, but should apply to the 64-bit version with very little modifications as well.

OpenBSM 1.0 alpha 14 imported into FreeBSD 7-CURRENT

Robert Watson has announced the import of TrustedBSD OpenBSM 1.0 alpha 14 into FreeBSD 7-CURRENT. OpenBSM is the library and tool set for managing security event auditing log data, including detailed security logs of system calls, logins, and other security events.


Seven Post-Install Tips for Ubuntu 7.04

Fixes, extras, and eye candy: Here are seven steps to take just after installing Feisty Fawn.


jueves, 19 de abril de 2007

¿Al reinstalar Windows se borró el boot manager de FreeBSD?

Existen 3 formas de recuperarlo.

NetBSD Announces Google Summer of Code Projects

The NetBSD Project is glad to participate in the Google ``Summer of Code'' for the third time in a row as a mentoring organization and is pleased to announce the list of projects that have been accepted for this summer. The Google ``Summer of Code'' is designed to introduce students to the world of open source software development, to create new Open Source programs and to help currently established projects.


Mozilla Releases Thunderbird 2.0.0

The Mozilla Corporation has released Thunderbird 2.0.0.

Ubuntu Feisty Fawn Released

Lots of readers told us about the official release of Ubuntu 7.04 Feisty Fawn (screenshots here for Ubuntu and Kubuntu).


miércoles, 18 de abril de 2007

Speaking UNIX, Part 9: Regular expressions

Virtually all non-trivial problems require you to filter good data from bad. Discover the many UNIX® command line utilities that use regular expressions to discern the relevant from the irrelevant.


PC-BSD Announces Redistribution Agreement with Adobe Systems

iXsystems announced an agreement with Adobe Systems that will allow the next version of PC-BSD to have a Flash-enabled browser available on a default installation. The Linux version of Adobe's popular Flash player will run on PC-BSD using FreeBSD's Linux compatibility layer.

Having Flash player available by default on PC-BSD will allow users to view Flash content on popular sites such as YouTube, Yahoo Video, and Grouper.


martes, 17 de abril de 2007

Delete Cookies, Inflate Net Traffic Estimates

n my browser, I regularly go to the tools menu and clear my private data. This includes my cookies. As a result, people like me who destroy cookies by the thousands may be inflating estimates of Web traffic by up to 150 percent.


Automatix2 para Debian 4.0 "Etch"

Automatix2, la una herramienta originalmente para Ubuntu que automatiza la instalación de aplicaciones, códecs, fuentes y bibliotecas no incluidas directamente en esa distribución por razones legales o filosóficas, está ahora disponible también para el reciente Debian 4.0 "Etch".


BSD Jobs Open for Business

If you are an employer wanting to post a job listing for one of the various BSDs then this should be your first stop. Conversely if you are in the market for a new job then you should probably pop in for a look as well. Of course since the site is relatively new there isn't much to see right now. I imagine since it is free that it will be only a matter of time before the listings start filing in.


lunes, 16 de abril de 2007

No Ping Wait Wordpress Plugin

You may have noticed that when you actually “publish” a post there can be a delay as long as a minute or more. This plugin solves that problem by moving generic pings to execute-pings.php.


ZFS debutará en FreeBSD 7.0-RELEASE

Casi un año después de que comenzara a portarse a FreeBSD y a pesar de que ya había un parche no oficial, ahora finalmente el sistema de archivos ZFS, desarrollado por Sun para Solaris, es también parte del sistema operativo FreeBSD. El anuncio dice que el soporte está disponible en la rama HEAD y que debutará en FreeBSD 7.0-RELEASE como una característica experimental, tal como se esperaba.


Accelerating commands with alias

For all you command line conquerors out there that use the bash shell and are tired of continuously typing long commands again and again there is a built in shortcut. That is the alias command.

What the alias command does is assign your specified command to another word of your choosing. Your distribution most probably already uses alias commands for commonly used commands like ls, mv and cp but you haven't realised it.


Adobe to take Flash videos to desktop

Not content with having a dominant position in Web video, Adobe Systems on Monday is expected to launch Adobe Media Player for playing Flash videos offline.


.bash_profile vs. .bashrc

One of the things I always have trouble remembering when working with linux is what is the correct ".profile" to edit when I want to automatically set environmental variables and such for my shell.

Included in Debian Woody are both .bash_profile, and .bashrc. I can never remember the difference between these two.


Shape your traffic with trickle

Trickle is a lightweight userspace bandwidth shaper for users with low-speed Internet connections that lets you limit the bandwidth that a specific protocol is using so that you can maintain multiple simultaneous connections and not end up in a traffic jam.


Transfer files to your Gmail account with Gspace

One thing that's made Google's free Gmail online messaging service popular is its multiple gigabytes of storage space. There are several tools that let you use the more than 2GB of space as a virtual Internet drive, the most popular being GmailFS. If you'd prefer to use software that's independent of your base operating system, try Gspace instead. It's a Firefox extension that's easy to install and use.


Better Gmail (Firefox extension)

Gmail's good, but it could be better. We've featured several Greasemonkey scripts that enhance Gmail in lots of different ways - like adding saved searches, attachment icons, label colors, keyboard macros, a filter assistant and right-click conversation previews. But not everyone wants to install Greasemonkey and hunt down all those scripts.

To save you the time, I've compiled the best Greasemonkey scripts for Gmail into one handy Firefox extension, called Better Gmail. After the jump, put your Gmail on steroids with Better Gmail.

SSH port cloaking

Okay very one keeps asking me how I can have port 22 open, yet closed to port scans. Well It’s quite simple. Using iptables & the recent module I’m able to have my firewall respond differently to each ssh attempt based on IP & timing.

Setup Apache2 with OpenLDAP Authentication

This is a how-to to allow only users that have authenticated against an openLDAP server to gain access to certain areas of your apache server.

Desktop FreeBSD Part 3: Adding Software

FreeBSD is very much a source-based system. The operating assumption of the architects of FreeBSD is that you will compile most things from the source code. The system is designed to work that way, and does it exceptionally well. The famous "Ports Collection" is rather unique in making a large number of packages available ready to build and seldom requires anything but a few commands in a terminal window. Having tried to build specialized applications on several different versions of Open Source operating systems, I can assure you that compiling on FreeBSD is about as easy as it gets.


Lanzamiento de Libro Libre de UBUNTU (Verde)

La Fundación Código libre Dominicano se enorgullece en anunciar que la Serie de GNU Fácil y GNU Certificación, serán puesta a disposición de descarga para toda la comunidad del Software Libre.


domingo, 15 de abril de 2007

This is How We Catch You Downloading

All over Europe thousands of people are being threatened with court action for allegedly sharing games like Dream Pinball 3D on P2P networks. Now, documents obtained by TorrentFreak show details of the anti-piracy company’s techniques for identifying alleged file-sharers on the internet and the gathering of claimed ‘forensic quality’ evidence for use in court cases.

sábado, 14 de abril de 2007

The Open Source Security Motherload: 105 Tools, Applications and Resources

In this article we have compiled 105 open source tools, applications, and resources to expose you to the diversity of open source options available, as well as to help you better assess the costs and benefits of open source security integration into your system.

jueves, 12 de abril de 2007

Linux Scheduling for Absolute Beginners, Part 2

In my first article, I provided some basic understanding of how scheduling on Linux operating system works and also gave some examples of how to schedule jobs using cron at different date and times. If you haven’t read it, please read Scheduling for Absolute Beginner first.

This article will provide some additional detail that I may have missed and it will mostly give examples of many different neat tricks you can do in a crontab file. For example, you can write single line cron entries to gather system statistics and email you details without even writing a script in a separate file.

Asus C90 Will Be First User Upgradeable Lappie

Because of the way laptops are built, most people don't upgrade their notebooks like they do their desktop. Well, Asus is trying to change that with their new C90 gaming laptop. Everything from the lappie's CPU to its high-def optical drive will be user upgradeable. Asus says you'll even be able to pop out the system's graphics card and install a new one all within minutes...

Getting started with GnuPG

In this article I'll help you get started with GnuPG, the GNU Privacy Guard. Instead of writing another GnuPG manual, I'll teach you how to generate your first keypair, sign/verify files and encrypt/decrypt files.

dwarfURL shortens links and offers click stats

New link shortening service dwarfURL transforms a wrappy web link into a tiny, clickable email-friendly URL - and can tell you how many times it was clicked, too.


Installing and configuring spamd

Yesterday we looked at spamd, a service designed to reduce the flow of spam to your email inbox. Now that we know some of its advantages, let's put it to work.

Qespisqa Kawsay (Cultura Libre)

Ya se encuentra disponible el primer numero de la revista electronica "Qespisqa Kawsay (Cultura Libre)", que es un proyecto iniciado por AQPGLUG y que cuenta con la importante colaboración de personas con muchos animos de apoyar y aportar de una u otra manera a esta inmensa comunidad del Software Libre.


Encrypted Mobile Phone Conversations

If you’ve got a big budget, or suffer from a little paranoia, then the GSM Crypt-a-Cell mobile phone conversation encryption device just might be your thing. The Crypt-a-Cell device is designed to encrypt incoming and outgoing voice communications in realtime to another mobile phone with a matching encryption/decryption device.


miércoles, 11 de abril de 2007

Monitoring a Linux System with X11/Console/Web-Based Tools

As we have seen, Linux systems contain a great variety of tools: tools to help manipulate files, transfer data, compile code and so on, but they also contain tools that let you track and analyze the performance of your PC, by evaluating the way your PC uses hardware and system services, including RAM, CPU and hard drivers. With the information provided by these tools, you can uncover potential problems, locate and fix performance bottlenecks and make sure your computer is running in tip-top shape.


Squid in 5 minutes

There are many great tools that Squid has to offer, but when I need to redirect http traffic to a caching server for performance increases or security, squid’s my pick. Squid has built in proxy and caching tools that are simple, yet effective.


Debian Etch Installation Screenshots

This is the first part of the Debian Installation tutorial I am planning to write, in this part, is the installation itself based on screenshots.


Scribd is a free online library where anyone can upload. Use our embeddable PDF player to publish and view documents right in your web browser. Try it out!

Beginner's Guide to Debian Etch

Debian is one of the most common distributions in the world. With a possible total of twenty one CDs, it is also one of the biggest. As you may have gathered from the fact that this guide exists, Debian is not the easiest distribution. However, anybody that is relatively competent with computers should be able to use Debian (after all, I am!). This is not a guide to every detail of Debian Etch - instead, it aims to get you going, so you can start tinkering away!

Starting out with Lighttpd

While a large proportion of the world's webservers are currently using Apache, a competitor has been steadily gaining popularity on many high-usage sites. Lighttpd, pronounced "lighty", is a small-footprint, high-speed webserver, and is notably used by sites such as Sourceforge, YouTube and MiniNova. Netcraft state that Lighttpd is currently being used on 1.38 million sites, and is steadily gaining on Sun's share of the market.


Gráficas con Javascript, CSS, PHP...

Vamos a ver cómo podemos pintar diferentes tipos de estadísticas utilizando diferentes tecnologías web...

Reducing spam with OpenBSD and spamd

We all know about the rampant spam email problem. Nearly all of the potential solutions offered for it are based on the idea of the mail server receiving messages, classifying them as either spam or legitimate, and then processing further (deleting or forwarding messages) as appropriate. The problem with this strategy is that you end up using extra resources on the mail server. Here's a way to get the same result while minimizing resource usage by preventing the spam from reaching the mail server.

How to encrypt a diskdrive in (X)ubuntu Feisty with dm-crypt and LUKS

Today security is one of the key aspects in our daily life - sometimes conscious, sometimes unconscious. Security has many aspects and one of them is computer security or security of your or your business' computer data.

In this tutorial I will show how to encrypt a whole disk drive using (X)Ubuntu Feisty, dm-crypt, and LUKS.

Opera 9.2 Released

Version 9.2 of the Opera web browser has been released.

martes, 10 de abril de 2007

Remotely view and control another users X11 session

As a system administrator it is often desirable to remotely connect to the users computer to see exactly what they are doing and possibly show them how to click on that funny penguin picture thingamabob so they can play Frozen Bubble. A single one line command in K/Ubuntu linux will connect to a remote computer and enable the display of the desired users X11 session.


FreeBSD Quarterly Status Report, First Quarter of 2007

This report covers FreeBSD related projects between January and March 2007. This quarter ended with a big bang as a port of Sun's critically acclaimed ZFS was added to the tree and thus will be available in the upcoming FreeBSD 7.0 release. Earlier this year exciting benchmark results showed the fruits of our SMP work. Read more on the details in the "SMP Scalability" report.

Xorg-conf: base de datos de configuraciones de X Window

Esta es una muy buena idea que podría haber sido útil desde hace mucho antes: básicamente, el sitio Xorg-conf intenta recopilar los archivos de configuración xorg.conf, comprobados y verificados, de una variedad de combinaciones de placas de video, monitores y dispositivos de entrada (mouse/teclado)...

The Perfect Setup - Debian Etch (Debian 4.0)

This tutorial shows how to set up a Debian Etch (Debian 4.0) based server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Courier POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 32-bit version of Debian Etch, but should apply to the 64-bit version with very little modifications as well.

14 Steps to Secure Your Wireless Network

Many have installed wireless network in their homes. The freedom from tangled cables is sweet but comes with a price. A wireless network can broadcast far outside your building. With a powerful antenna and some widely available hacking software, anyone sitting near your installation—or even driving by—can passively scan all the data flowing in your network. Keeping your wireless network secure is no small task, but there are precautions you can take to secure your network as much as possible.

ZFS - quick start

Ok, ZFS is now in the tree, what's now? Below you'll find some instructions how to quickly make it up and running.

lunes, 9 de abril de 2007

Desarrolladores de driver wifi acusan a OpenBSD de no respetar la GPL

Los desarolladores de OpenBSD han relicenciado un driver GPL a BSD sin avisar a los autores. Los mismos desarrolladores del driver se han encargado de hacer notar este hecho. Como consecuencia, se ha retirado el driver del proyecto OpenBSD. Parece ser que se ha abierto una especie de flame muy marujón entre los desarrolladores de los drivers y Theo...

Debian GNU/Linux 4.0 Lanzado!

El proyecto Debian se complace en anunciar la publicación oficial de la versión 4.0 de Debian GNU/Linux, nombre en clave etch, tras 21 meses de desarrollo constante. Debian GNU/Linux es un sistema operativo libre que soporta un total de once arquitecturas de procesador e incluye los entornos KDE, GNOME y Xfce. También incluye programas criptográficos, es compatible con la versión 2.3 del FHS y con aquellos programas desarrollados para la versión 3.1 de la LSB.


viernes, 6 de abril de 2007

High Availability with Open Source

When I build a network or a system, I try my best to make sure that everything is as redundant as possible: redundant power supplies, RAID for the drives in case of a hard drive failure, backup routes in OSPF in case someone trips over the network cable... you get the idea. But what happens if the CPU overheats in one of the web servers and causes it to crash? Or what if someone yanks the network cable from your LDAP server? Or if someone flips the switch and accidentally turns off the accounting database server? If you incorporate High Availability (HA) into your system design, the answer is "nothing". Your web site will still be running, your network users can still login, and the accounting department won't notice any glitch. You don't even have to leave your desk.

Open Source makes HA easy to implement, with offerings like heartbeat, keepalived, and CARP.


Varias vulnerabilidades en servidor X.Org

iDefense ha publicado varias vulnerabilidades en el servidor X.Org, que utilizan muchos sistemas operativos de código libre.

Alguna de ellas permiten una escalada de privilegios a usuarios locales, pero hay otra que incluso podría ser explotada de forma remota para ejecutar código arbitrario...

jueves, 5 de abril de 2007

Formatting and Mounting on Ubuntu

Creating hackergotchis using the GIMP

A hackergotchi is a picture of a person's head that's used as an avatar for identification on a blog. Any region below the neck is cut out, as are any portions of the picture that don't include the head. You can create a hackergotchi easily with a digital camera and the GIMP.


MySQL mejora con 8 núcleos en FreeBSD

Continúa el trabajo para mejorar la performance de MySQL en FreeBSD, bastante cuestionada anteriormente. Esta vez, la gente del proyecto ya está reportando que recientemente se hicieron "progresos significativos" en optimizar MySQL en un sistema AMD64 de 8 núcleos bajo FreeBSD 7.0.


ZFS committed to the FreeBSD base

I'm happy to inform that the ZFS file system is now part of the FreeBSD
operating system. ZFS is available in the HEAD branch and will be available in FreeBSD 7.0-RELEASE as an experimental feature.

Thanks you Pawel.

Backing up an entire hard drive under UNIX

This article walks you through the process needed to create an identical copy of an entire disk under UNIX. It is useful to create a system image for installation or backup purposes. You will need a second hard drive of the same or larger size as a destination for the backup.


Application and Host IDS Tools

Recently I learned about two IDS tools that are a little bit different from a typical IDS. One runs inside an application, and the other is a host IDS that runs on servers or workstations.

The first tool is called Firekeeper. It's an extension for Firefox that works similarly to Snort in that it uses a configurable set of rules to detect suspicious activity. Firekeeper is a relatively new tool and doesn't have the huge set of rules available that Snort does. Nevertheless, the base set of rules is a good starting point, and you can write your own rules with relative ease, especially if you're familiar with Snort.

The second tool I learned about is OSSEC Host IDS (HIDS). OSSEC HIDS has two basic parts: the central server and the host monitors. The main server collects information from the host monitors, and the host monitors perform a variety of tasks. They can detect known rootkits and maintain file system integrity by keeping tabs on important system files.


Howto install & use Flash, Java, Real Player 32 bit plugins under 64 bit Firefox

Recently I found nspluginwrapper which allows to use 32bit plugins on a 64bit Firefox browser using nspluginwrapper.


martes, 3 de abril de 2007

UNIX processes

On UNIX® systems, each system and end-user task is contained within a process. The system creates new processes all the time and processes die when a task finishes or something unexpected happens. Here, learn how to control processes and use a number of commands to peer into your system.

FireGPG: criptografía desde Firefox

Dos linuxeros franceses, Achraf Cherti y Maximilien Cuony, han desarrollado durante el pasado mes de marzo FireGPG, una extensión para Firefox que facilita el uso de GnuPG desde el propio navegador, tanto en Windows como en Linux.

FireGPG no proporciona por sí mismo la capacidad de cifrar, firmar y verificar, sino que se requiere una instalación previa de GnuPG, siendo también conveniente disponer de algún interfaz gráfico desde el que poder gestionar claves y demás...

Qmail with smtp-auth and DomainKeys on FreeBSD

I tried to set up qmail with tls and smtp auth on freebsd. I have configured my server with SMTP-AUTH so that I can use it to relay messages for me and other authenticated users. I would like qmail to sign the messages that the authenticated users send through my server.


Asterisk + TellMe Studio = VoIP PBX with Voice Recognition IVR

WEP Broken Even Worse

Erik Tews and others there have demonstrated how to recover a 104-bit WEP key in under a minute, requiring the capture of fewer than 10% the number of packets the previous best method called for.


How to Search Logs Using grep, Part 1

Here is something that I could write a book about.. or a few good chapters on. grep is one of the key tools in the traditional Unix arsenal for tearing through text files and finding exactly what you want very, very quickly. It doesn't take long to master if you have the right tools.


Use Google Groups to back up your Gmail account

Google Tutor has devised a fairly ingenious way to back up your Gmail account using Google Groups.


MidnightBSD Gets ProPolice

MidnightBSD has integrated ProPolice into its system.


domingo, 1 de abril de 2007

Using a VPN for Hotspot Security

Over the past few years I've written thousands of words regarding hotspot security. In fact, within the pages of Over-the-Road Wireless For Dummies I've devoted three full chapters to the subject. Wi-Fi hotspot security is a serious subject and because your security is threatened on so many fronts, especially when you're using a hotspot, I don't want to minimize the importance of implementing multiple security measures. There is one security tool, however, that I believe to be the most powerful of them all: the Virtual Private Network (VPN).


Encrypt your web browsing session (with an SSH SOCKS proxy)

You're at an open wireless hotspot, but you don't want to send your web browsing data over it in plain text. Or you want to visit a non-work-approved web page from the office computer without the IT team finding out.

Using a simple SSH command, you can encrypt all your web browsing traffic and redirect it through a trusted computer when you're on someone else's network. Today we'll set up a local proxy server that encrypts your online activity from your Mac, PC or Linux desktop. Here's how.

Thank you Superhacker, you saved my computer

Many people leave their Wi-Fi link unsecured, leaving them open to fraud. But a new breed of ‘ethical hackers’ is helping...

Usando Firekeeper para detectar exploits ANI

Firekeeper es una prometedora extensión para Firefox (Linux y Windows) que intenta detectar ataques lanzados desde sitios web maliciosos. Se basa en una serie de reglas (tipo Snort) y muestra avisos al usuario cuando entiende que se está tratando de ejecutar un exploit (incluso en el caso de que el propio navegador no sea vulnerable, a fin de identificar sitios peligrosos, que mañana pudieran lanzar otro ataque para el que no hubiera parche). Tras instalar Firekeeper (actualmente disponible en versión 0.2.9 alfa) el usuario puede probar su eficacia contra una batería de tests...

Does Your Wi-Fi Hotspot Have an Evil Twin?

You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information.


Presentado el primer automóvil Open Source

c,mm,n (pronunciado "common"), un proyecto de la Sociedad de la Naturaleza y el Medio Ambiente de los Países Bajos, fué presentado en la feria AutoRAI de Amsterdam. Se trata del primer automóvil Open Source del mundo. ¿Y qué significa ésto? Pues que todas sus especificaciones, dibujos técnicos, etc. están disponibles libremente a quienes que quieran descargárselos. La idea hacer posible que todos puedan modificarlo según sus necesidades particulares y luego devuelvan esas modificaciones de regreso al resto de la comunidad.


Confirmada vulnerabilidad en algunos dispositivos inalámbricos Linksys

Tal y como habíamos adelantado hace unos días, algunos dispositivos inalámbricos de Linksys revelan información confidencial (incluyendo la contraseña de acceso al interfaz web de administración y la frase contraseña de WPA) cuando se les envía un paquete UDP al puerto 916.


How To Harden PHP5 With Suhosin (Debian Etch/Ubuntu)

This tutorial shows how to harden PHP5 with Suhosin on Debian Etch and Ubuntu servers.

Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections.

Sistemas de ficheros cifrados con Debian GNU/Linux

Una funcionalidad muy útil para asegurar la confidencialidad de nuestros datos es poder cifrar un sistema de ficheros completo.

En este breve artículo describo cómo hacerlo en Linux (Debian Etch, para ser más exactos). El procedimiento es similar para otras distribuciones...

IOBSD - A Storage Focused BSD

The IOBSD project has released their first public beta of IOBSD. This storage-focused fork of OpenBSD was created to address the storage shortcomings of the security-focused OpenBSD community. Founders Marco Peereboom, Darren Reed and Thorsten Glaser have been working in parallel on this project for a few months now.