background preloader

Linux

Facebook Twitter

Free Operating Systems That Aren't Linux - Software - Open Source. We look beyond the traditional open source OS of choice to other free options such BSD, OpenSolaris, HaikuOS, ReactOS, and PureDarwin. The words free and open source operating system usually bring one stock answer to mind: Linux. But Linux isn't the only FOSS OS out there, and in fact hasn't been for some time now -- it's just the one that's most immediately associated with the label.

Here's a survey of other operating systems that have also been built as open source products, are free to use, and generally come with little to no restrictions over their use. Many of them have taken strong cues from the way Linux has developed, typically in the collections of userland tools that are available. Some owe very little to Linux, apart from the general development philosophy, and are not architecturally related to Linux in any significant way. So how useful are these operating systems? First, there was UNIX -- and then, not long after that, BSD. 1 of 5 More Insights. List of Free Operating Systems: Download Now! There are an increasing number of equipment manufacturers and technology groups that provide operating systems (OS) for free personal and commercial use without any cost or fee. You are sometimes even free to use them, change their source code and redistribute them as well. Like Anything that comes for free, do not expect fancy printed manuals and CD-ROMs and technical support.

Yet you can count on the community that uses these OS to provide you support through chat rooms and forums and mailing lists. You will also note that the size of these OS range from 1 to 10 GB so if you don’t have decent broadband connection, paying for a DVD/CD-ROM might seem reasonable. Also if you are not that techie, some of these companies offer helpdesk and support contracts, which can be bought at a reasonable price. FreeDOS These days, there are three main uses for FreeDOS: FreeDOS should run on any standard PC, but if you are new to DOS, we recommend you use a PC emulator to install and boot FreeDOS.

RxDOS. Www.centos.org - The Community ENTerprise Operating System. Free and Open Source Operating Systems. The Linux Command Line by William E. Shotts, Jr. NTP Server. DHCP Server. To configure a DHCP server, you must create the dhcpd.conf configuration file in the /etc/ directory. A sample file can be found at /usr/share/doc/dhcp-<version>/dhcpd.conf.sample. DHCP also uses the file /var/lib/dhcpd/dhcpd.leases to store the client lease database. Refer to Section 20.2.2, “Lease Database” for more information. 20.2.1. Configuration File The first step in configuring a DHCP server is to create the configuration file that stores the network information for the clients.Use this file to declare options and global options for client systems.

The configuration file can contain extra tabs or blank lines for easier formatting. Two DNS update schemes are currently implemented — the ad-hoc DNS update mode and the interim DHCP-DNS interaction draft update mode. Ddns-update-style ad-hoc; To use the recommended mode, add the following line to the top of the configuration file: ddns-update-style interim; Refer to the dhcpd.conf man page for details about the different modes. Important. OpenLDAP. This section provides a quick overview for installing and configuring an OpenLDAP directory. For more details, refer to the following URLs: 24.6.1. Editing /etc/openldap/slapd.conf To use the slapd LDAP server, modify its configuration file, /etc/openldap/slapd.conf, to specify the correct domain and server.

The suffix line names the domain for which the LDAP server provides information and should be changed from: suffix "dc=your-domain,dc=com" Edit it accordingly so that it reflects a fully qualified domain name. Suffix "dc=example,dc=com" The rootdn entry is the Distinguished Name (DN) for a user who is unrestricted by access controls or administrative limit parameters set for operations on the LDAP directory. Rootdn "cn=root,dc=example,dc=com" When populating an LDAP directory over a network, change the rootpw line — replacing the default value with an encrypted password string.

Slappasswd When prompted, type and then re-type a password. Rootpw {SSHA}vv2y+i6V6esazrIv70xSSnNAJE18bb2u Warning. LinuxCommand.org: Learn the Linux command line. Write shell scripts. Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution. Kali Linux - Penetration Testing Distribution - Documentation. Top 15 Open Source/Free Security/Hacking Tools. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3.

Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13. BackBox Linux. BlackArch Linux. ActiveTcl is Tcl for Windows, Mac, Linux, AIX, HP-UX & Solaris. ActiveTcl Business and Enterprise Editions include our precompiled, supported, quality-assured Tcl distribution used by millions of developers around the world for easy Tcl installation and quality-assured code. When you're using Tcl on production servers or mission-critical applications, ActiveTcl Business Edition and Enterprise Editions offer significant time savings over open source Tcl for installing, removing, upgrading, and managing common Tcl modules.

Not sure which edition is right for you? Check out our Compare Editions chart. Tested, Timely and Compatible Save time in your development cycles by starting with a precompiled Tcl distribution for out-of-the-box installation and standardization across the operating systems you rely on, including Windows, Linux, Mac OS X, Solaris, AIX, and HP-UX. ActiveTcl Business and Enterprise Editions includes: Business Edition licensing is for each production or external-facing server, including virtual servers. Support Options Free Email support** Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux - Vimperator. Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure.

The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer. The Portspoof program primary goal is to enhance OS security through a set of techniques that will slow down and keep your attackers out from staying low profile during their reconnaissance against your system(s).

Art of Active (Offensive) Defense Features 1. Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples - Vimperator. Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. In this first part, I have made my best to explain the basic scanning techniques, Host discovery options, port scanning options, techniques used in detecting Operating system & services running on the system. i also give Nmap as already installed on your system. Let’s start with one of the most basic and default scan, the one without using any parameters. This is a basic scan of the local IP address 192.168.1.34, we use sudo to gain administrator privileges, and then we give the target to Nmap.

Discovery Port scanning options Performing Fast scan: