background preloader

Build-a-killer-customized-arch-linux-installation-and-learn-all-about-linux-i...

Build-a-killer-customized-arch-linux-installation-and-learn-all-about-linux-i...

20 Linux Server Hardening Security Tips Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication All data transmitted over a network is open to monitoring. Use scp, ssh, rsync, or sftp for file transfer. #1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. #2: Minimize Software to Minimize Vulnerability Do you really need all sort of web services installed? #3: One Network Service Per System or VM Instance

Return Infinity - BareMetal OS BareMetal is a 64-bit OS for x86-64 based computers. The OS is written entirely in Assembly, while applications can be written in Assembly or C/C++. Development of the Operating System is guided by its 3 target segments: High Performance Computing - Act as the base OS for a HPC cluster node. Current version is 0.6.1 - released August 19, 2013. BareMetal boots via Pure64 and has a command line interface with the ability to load programs/data from a hard drive. BareMetal OS Group @ Google Groups: Visit this group. Return Infinity goes back to the roots of computer programming with pure Assembly code. The source code for BareMetal is freely available under the 3-clause BSD license. Ethernet networking is supported with the Realtek 8169 and Intel 8254x Gigabit chipsets.

10 Technical Papers Every Programmer Should Read (At Least Twice) 10 Technical Papers Every Programmer Should Read (At Least Twice) this is the second entry in a series on programmer enrichment Inspired by a fabulous post by Michael Feathers along a similar vein, I’ve composed this post as a sequel to the original. All papers are freely available online (i.e. not pay-walled)They are technical (at times highly so)They cover a wide-range of topicsThe form the basis of knowledge that every great programmer should know, and may already Because of these constraints I will have missed some great papers, but for the most part I think this list is solid. A Visionary Flood of Alcohol Fundamental Concepts in Programming Languages (link to paper) by Christopher Strachey Quite possibly the most influential set of lecture notes in the history of computer science. Why Functional Programming Matters (link to paper) by John Hughes An Axiomatic Basis for Computer Programming (link to paper) by C. Taken to mean: by Leslie Lamport (1978) by Luca Cardelli and Peter Wegner

Linux Mint vs. Ubuntu: the Best Option? For the last few years, there has been something of a popularity contest between two well-known Linux distros: Linux Mint and Ubuntu. Both of these distributions share the same code base, as Ubuntu is based on Debian and Linux Mint is based on Ubuntu. In both instances, the distributions took the foundation that Debian built, then added their own flavor to make it more user friendly. The similarities between the two distributions go even further, in that Ubuntu packages work flawlessly on Linux Mint, just as Ubuntu PPAs work well on Linux Mint. When Linux Mint was first being developed, the degree of separation from Ubuntu was very minimal. For this article, I’ll tap into my own experiences with both distributions over the years. Easy isn't a dirty word All too often, I hear the word "easy" being tossed around as if it's a bad word when describing Linux distributions. In recent years, I've actually found the two distributions shift further apart than ever before.

10 amazingly alternative operating systems and what they could mean for the future This post is about the desktop operating systems that fly under the radar of most people. We are definitely not talking about Windows, Mac OS X or Linux, or even BSD or Solaris. There are much less mainstream options out there for the OS-curious. These alternative operating systems are usually developed either by enthusiasts or small companies (or both), and there are more of them than you might expect. There are even more than we have included in this article, though we think this is a good selection of the more interesting ones and we have focused specifically on desktop operating systems. As you will see, many of them are very different from what you may be used to. Enough introduction, let’s get started! AmigaOS 4.1 This month (September 2008) AmigaOS 4.1 was released. AmigaOS only runs on specific PowerPC-based hardware platforms. Source model: Closed source License: Proprietary Platform: PowerPC State: Final Read a review of AmigaOS 4.1 at Arstechnica. Haiku License: MIT License ReactOS

Crack/Keygen Sites That Are Safe To Use Blindly searching the web for cracks & keygens is about as smart as using Limewire to search for antivirus software - something not well-advised. Undoubtedly and unfortunately, the number of crack sites with overtones of a malicious agenda heavily outweigh sites that just want to serve up the honest goods. Having said that, there actually are quite a few creditable ‘crack’ sites that won’t try to bombard you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. We’ve done the hard work for you, and present a list of “clean” crack sites for all the latest warez. Be aware that the site reviews herein only include information about each site, not the contents of the ‘cracks’ themselves. Our Recommendation: Due to security flaws and exploits, avoid using Internet Explorer when browsing potentially harmful websites (such as any of these on the list) - use Firefox instead. Recommended (Clean) Crack Sites Malware / Spyware ? www.serialkey.net

Valve: Linux More Viable Than Windows 8 for Gaming In a presentation at Ubuntu Developer Summit currently going on in Denmark, Drew Bliss from Valve said that Linux is becoming more viable platform as an alternative to Windows 8. Windows 8 ships with its own app store and it is moving away from an open platform model. Some other points from the talk: Steam client is running nicely on Ubuntu and many developers have approached them with good game products.Cooperation with Canonical has been good.Ubuntu is preferred platform as it has a large user base and good community support with a strong company like Canonical behind it. Linux has everything they need: good OpenGL, pulseaudio, OpenAL and input support.New Source engine games will be available for Linux.No firm time frame for Steam Linux release, but soon.Copy protection is up to the game publishers. Drew announced that anyone with a Launchpad account attending UDS will be given Steam access through a beta key.

Pinguy OS - Because using a computer is meant to be easy! The Tao Of Programming Translated by Geoffrey James Transcribed by Duke Hillard Transmitted by Anupam Trivedi, Sajitha Tampi, and Meghshyam Jagannath Re-html-ized and edited by Kragen Sittler Last modified 1996-04-10 or earlier Table of Contents Book 1 - The Silent Void Thus spake the master programmer: ``When you have learned to snatch the error code from the trap frame, it will be time for you to leave.'' Something mysterious is formed, born in the silent void. If the Tao is great, then the operating system is great. The Tao of Programming flows far away and returns on the wind of morning. The Tao gave birth to machine language. The assembler gave birth to the compiler. Each language has its purpose, however humble. But do not program in COBOL if you can avoid it. In the beginning was the Tao. Programmers that do not comprehend the Tao are always running out of time and space for their programs. How could it be otherwise? The wise programmer is told about Tao and follows it. The highest sounds are hardest to hear.

20 Logiciels pour creér une clé USB bootable sous [Windows, Linux] Alors, toujours envie de créer une clé USB bootable avec votre Windows, Linux favori ou tout autre disque ISO bootable? Eh bien, voici une grande liste de 20 logiciels qui peuvent créer facilement une clé USB bootable pour vous. Cela USB peut contenir un disque d'installation de Windows, un CD Linux (pourrait être une version live aussi), Ultimate Boot CD, Hiren’s Boot CD, Bootable Antivirus Rescue CD, Recovery software live CD, logiciel de partition de disque dur et bien d'autres. Créer une clé USB de boot pour windows.1 - WinToFlash : Comme vous pouvez le voir sur la capture d'écran ci-dessus, c'est le meilleur logiciel que vous pouvez utiliser pour créer Créer son propre Windows bootable. Il peut créer une version bootable de Windows XP/2003, WinPE XP/2003, Windows vista/2008/7/8 configuration d'une clé USB, et quelques autres .... . 2 - A Bootable USB : A Bootable USB est un petit soft fait pour vous permettre d'installer windows Vista/2008/7 partir d'un lecteur USB. 5 - OStoGO :

vi tips and tricks: Ten cool commands sure to impress your friends When coming to grips with the vi editor—either for the first time or as a regular user—most people tend to have a grasp of the core command set that allows them to perform those functions they use most regularly: navigating or saving a file; inserting, updating, deleting, or searching for data; or quitting without saving changes. However, the vi editor is extremely powerful and rich in features and functionality. Even after many years of use, you can still uncover new commands that you didn't realize existed. The commands covered in this article are amongst those less well known, but they can help you to work smarter by short-cutting existing methods you may use or allowing you to do something that you never realized you could do with vi. Before we start just a recap on the two modes of vi: command and insert. Turn line numbering on and off The vi editor has a number of options that determine the look and feel of an editing session. Listing 1. Listing 2. Back to top Auto-indentation #! #! #!

Sound Types FindSounds Search the Web for Sounds What types of sounds can be found on the Web using FindSounds? Below is a partial list. Animal Sounds alligator, baboon, bat, bear, bobcat, buffalo, bullfrog, camel, cat, cheetah, chimpanzee, chinchilla, chipmunk, cougar, cow, coyote, crocodile, deer, dinosaur, dog, dolphin, donkey, elephant, elk, ferret, fox, frog, gibbon, goat, gorilla, grizzly bear, guinea pig, hippo, horse, hyena, jaguar, kitten, lamb, lemur, leopard, lion, llama, marmot, monkey, moose, mouse, orca, panda, panther, pig, polar bear, prairie dog, puppy, rabbit, raccoon, rat, rattlesnake, rhinoceros, rodent, sea lion, seal, sheep, snake, squirrel, sugar glider, tiger, toad, whale, wolf, zebra Sounds of the Holidays Christmas sleigh bells; Halloween creak, creature, evil laugh, ghost, howl, monster, scream, witch; Independence firecrackers, fireworks; New Year's balloon, party horn, pop cork; Thanksgiving turkey Insect Sounds bee, cicada, cricket, insects, katydid, mosquito, wasp

Google's Android Reborn as Network-Hacking Kit The Pwn Pad Photo: Pwnie Express The folks at security tools company Pwnie Express have built a tablet that can bash the heck out of corporate networks. Called the Pwn Pad, it’s a full-fledged hacking toolkit built atop Google’s Android operating system. Pwnie Express will be selling the cool-looking hack machines — based on Google’s Nexus 7 tablets — for $795. They’ll be introduced at the RSA security conference in San Francisco next week, but Pwnie Express is also releasing the Pwn Pad source code, meaning that hackers can download the software and get it up and running on other types of Android phones and tablets. Some important hacking tools have already been ported to Android, but Pwnie Express says that they’ve added some new ones. “Every pen tester we know has a phone and a tablet and a laptop, but none of them has been able to do pen-testing from the tablet,” says Dave Porcello, Pwnie Express’s CEO. A year ago, we introduced you to the Pwn Plug, another Pwnie Express product.

Category:Programming Tasks Programming tasks are problems that may be solved through programming. When such a task is defined, Rosetta Code users are encouraged to solve them using as many different languages as they know. The end goal is to demonstrate how the same task is accomplished in different languages. These are the Programming Tasks that have been defined and solved. Feel free to add solutions in languages not already included. The Category:Simple is a small subset with only "really simple" tasks, like "Hello World", and demonstrations of basic language-features. The Category:Draft Programming Tasks is a list of tasks, some of which are just awaiting more implementations before they can be promoted to tasks. Read the guidelines on creating new tasks. The following 871 pages are in this category, out of 871 total.

Related: