O'reilly Knoppix Hacks (2Nd Edition).Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Linux on a Stick Everyone Knows You Can Boot Linux from a Live CD, but Have You Thought About Putting Linux on a Compact and Highly Portable USB
KNOW HOW Memory Stick Linux Booting Linux from a USB Memory Stick Linux on a Stick Everyone knows you can boot Linux from a live CD, but have you thought about putting Linux on a compact and highly portable USB memory stick? BY FABRIZIO CIACCHI bootable “live” CD like Knoppix much more common. Part of our pur- ent from DSL, but it includes more [1] or Kanotix [2] gives the user a pose is to create an inexpensive system, software (about 14 MB plus), and it Afully portable operating environ- so I will base this discussion on the stan- has already been refined and tested for ment. You can carry your system with dard and very common 128 MB size. USB devices. you and boot it from anywhere. However, the procedure I describe in this • Flonix [8]: Flonix is also based on Your tools, your files, and your work- article can also be used to put a larger DSL, but it uses some different pro- space will follow you wherever you go – Knoppix-based distribution on a larger grams (for instance, IceWM instead even to another PC with a different USB memory stick. of Fluxbox). The Flonix project also operating system. Live CDs are also used Assuming you want room to work and introduced a useful web install by system administrators for trouble- store documents, it is a good idea to only process. Ultimately, Flonix was so shooting computers that won’t boot use half of the available space (64 MB) successful that it become a commer- normally. for the Linux system and related tools. -
Linux on the Road
Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes. -
Free Dmin Password Download Windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP
free dmin password download windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP. Password is a very important security feature that lets you protect your important files from unauthorized users. If you have multiple accounts on your computer, then your administrator account will be the main account. To stop unauthorized users from gaining access to your important files, you would have likely set up a password to your administrator account. But what happens when you forget your administrator account password. You get a computer in which you can't go to the desktop or access your files. When you want to crack administrator password , then you will need the tricks to crack your administrator account password so that you can get access to your computer. Part 1. How to Crack Administrator Password Using CMD Part 2. Crack Administrator Password on Windows with Software Part 3. How to Crack Administrator Password Without Software. Part 1. How to Crack Administrator Password Using CMD. CMD or command prompt is an administrative tool in the Windows operating system. The command prompt is a command line tool that looks like MS-DOS and thus can be difficult to use for beginners. You can use various commands and utilities in command prompt to fix various system errors and issues. So it is no wonder that it can help crack administrator password. What you need for operating CMD is a little bit of skill and knowledge of the right commands. Command prompt not really shows you the old password, instead lets you reset the password. -
Linux 与windows 互操作综述
2012 年 第 21 卷 第 4 期 http://www.c-s-a.org.cn 计 算 机 系 统 应 用 Linux 与 Windows 互操作综述① 王亚军 (中国人民武装警察部队学院,廊坊 065000) 摘 要:针对 Linux 与 Windows 在桌面领域、网络领域和嵌入式领域的互操作问题,做了综合阐述。在桌面领 域,两者可以互运行对方程序、互处理数据文件、互访问文件系统;在网络领域,两者可以采用共同的网络协议 来支持对方系统中的资源与服务在网络环境下的共享操作;在嵌入式领域,两者可以采用虚拟化和代码重构等 技术来支持对方应用软件在本系统中的交叉开发和向本系统的移植等。 关键词:操作系统;互操作性;兼容内核;虚拟化;文件系统;网络协议;嵌入式系统 Overview of the Interoperability of Linux and Windows WANG Ya-Jun (Chinese People’s Armed Police Forces Academy, Langfang 065000, China) Abstract: Aiming at the problems of interoperability between Linux and Windows in desktop domain, network domain and embedded domain, solutions are systematically illustrated in this paper. In desktop domain, the two operating systems can mutually run programs, can mutually deal with data files, and can mutually access file systems. In network domain, the two systems can support the shared operations of resources and services between them under the network environment by adopting the same network protocols. In embedded domain, by adopting the technologies such as virtualization and code refactoring, the two systems can mutually support the cross development of application softwares in local system, mutually support the transplanting of application softwares to local system. Key words: operating system; interoperability; unified kernel; virtualization; file system; network protocol; embedded system 众所周知,Windows 是迄今为止在商业上最成功 境之间架起桥梁,即实现两者的互操作。 的操作系统,而 Linux 则是目前成长最快的操作系统。 在全球范围内,两者在桌面领域、网络领域和嵌入式 1 操作系统互操作技术 领域展开了激烈的竞争。在桌面领域,各种新版本的 操作系统互操作技术是通过约定的接口或协议实 Linux 系统相继推出,在很大程度上改善了用户体验, -
HTTP-FUSE Xenoppix
HTTP-FUSE Xenoppix Kuniyasu Suzaki† Toshiki Yagi† Kengo Iijima† Kenji Kitagawa†† Shuichi Tashiro††† National Institute of Advanced Industrial Science and Technology† Alpha Systems Inc.†† Information-Technology Promotion Agency, Japan††† {k.suzaki,yagi-toshiki,k-iijima}@aist.go.jp [email protected], [email protected] Abstract a CD-ROM. Furthermore it requires remaking the entire CD-ROM when a bit of data is up- dated. The other solution is a Virtual Machine We developed “HTTP-FUSE Xenoppix” which which enables us to install many OSes and ap- boots Linux, Plan9, and NetBSD on Virtual plications easily. However, that requires in- Machine Monitor “Xen” with a small bootable stalling virtual machine software. (6.5MB) CD-ROM. The bootable CD-ROM in- cludes boot loader, kernel, and miniroot only We have developed “Xenoppix” [1], which and most part of files are obtained via Internet is a combination of CD/DVD bootable Linux with network loopback device HTTP-FUSE “KNOPPIX” [2] and Virtual Machine Monitor CLOOP. It is made from cloop (Compressed “Xen” [3, 4]. Xenoppix boots Linux (KNOP- Loopback block device) and FUSE (Filesys- PIX) as Host OS and NetBSD or Plan9 as Guest tem USErspace). HTTP-FUSE CLOOP can re- OS with a bootable DVD only. KNOPPIX construct a block device from many small block is advanced in automatic device detection and files of HTTP servers. In this paper we describe driver integration. It prepares the Xen environ- the detail of the implementation and its perfor- ment and Guest OSes don’t need to worry about mance. lack of device drivers. -
Getestete Versionen Wine Debian Und Dessen Derivate (Ubuntu/Kubuntu/Xubuntu, Knoppix, Etc) Redhat, Fedora, Centos Opensuse Mandr
Wie kann die MSR-Software unter Linux verwendet FAQ werden ? MSR Electronics GmbH Getestete Versionen Gentoo Linux 2.6.34 64-Bit Wine 1.3.3 MSR PC-Software V5.10.18 → VERSION Wine Für den Betrieb der MSR PC-Software unter Linux ist die Software Wine1 erforderlich. Diese muss zuerst installiert werden. Für die verschiedenen Linux Distributionen wird dies mittels ver schiedener Kommandos getan. Debian und dessen Derivate (Ubuntu/Kubuntu/Xubuntu, Knoppix, etc) Entweder die offiziellen Pakete der Distribution verwenden (oft veraltet): $ sudo apt-get install wine Oder die neusten Pakete der Wine Maintainer verwenden (empfohlen): $ sudo add-apt-repository ppa:ubuntu-wine/ppa $ sudo apt-get updates $ sudo apt-get install wine1.3 RedHat, Fedora, CentOS Wine sollte sich in den offiziellen Quellen befinden. $ sudo yum install wine die Option --enablerepo=updates-testing erzwingt die neuste Version aus dem testing Repository: openSUSE Mittels YaST2 oder yum (siehe RedHat). Eventuell lohnt es sich auch, die neuste Version vom openSUSE Build Server herunterzuladen respektive diesen einzubinden, siehe dazu auch die entsprechende Webseite2. Mandriva Offizielle Version: $ su $ urpmi wine oder neuste Version von der Sourceforge Seite3. Gentoo $ emerge wine 1 Wine Is Not an Emulator: ist eine Windows-kompatible Laufzeitumgebung für POSIX-kompatible Betriebssyste me. Mit Wine ist es möglich, viele Programme, die für die Microsoft-Windows-Betriebssysteme kompiliert wur den, auch unter Unix mit dem X Window System laufen zu lassen. 2 http://download.opensuse.org/repositories/Emulators:/Wine/ 3 http://sourceforge.net/projects/wine/files/Mandriva Packages/ Version 0.9 Draft 1/5 Wie kann die MSR-Software unter Linux verwendet FAQ werden ? MSR Electronics GmbH Eventuell funktionieren oben genannte Kommandos nicht unter allen Versionen der entspre chenden Distributionen. -
Is -Open Source- a Keyword for a Successful Gis Development ?
IS -OPEN SOURCE- A KEYWORD FOR A SUCCESSFUL GIS DEVELOPMENT ? Umit Isikdag(MSc,BSc) University of Salford,UK School of Construction & Property Management [email protected] 1.What is a Geographical Information System ? A GIS can be defined as an information system capable of assembling, storing, manipulating, and displaying geographically referenced information. GIS is also regarded as “a computer system for capturing, storing, checking, integrating, manipulating, analysing and displaying data related to positions on the Earth's surface. Typically, a Geographical Information System (or Spatial Information System) is used for handling maps of one kind or another. These might be represented as several different layers where each layer holds data about a particular kind of feature. Each feature is linked to a position on the graphical image of a map.”12 Figure 1.1-Typical Components of a GIS 1.1 The basic functions of a GIS The basic functions of a GIS are defined as13 capturing the data,integrating the data,projection and registration,sturucturing and modelling the data.The USGS web site(http://www.usgs.gov) defines these functions in detail as: Data Capture:Maps can be digitized, or hand-traced with at computer mouse, to collect the coordinates of features. Data capture - putting the information into the system - is the time-consuming component of GIS work. Identities of the objects on the map must be specified, as well as their spatial relationships. Editing of information that is automatically captured can also be difficult. Electronic scanners record blemishes on a map just as faithfully as they record the map features. -
How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise
How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise Abstract This paper will document a process to create a custom Live CD for secure remote incident handling on Windows and Linux systems. The process will include how to configure SSH for remote access to the Live CD even when running behind a NAT device. The combination of customization and secure remote access will make this process valuable to incident handlers working in enterprise environments with limited remote IT support. Bert Hayes, [email protected] How to Create a Custom Live CD for Remote Incident Handling 2 Table of Contents Abstract ...........................................................................................................................................1 1. Introduction ............................................................................................................................5 2. Making Your Own Customized Debian GNU/Linux Based System........................................7 2.1. The Development Environment ......................................................................................7 2.2. Making Your Dream Incident Handling System...............................................................9 2.3. Hardening the Base Install.............................................................................................11 2.3.1. Managing Root Access with Sudo..........................................................................11 2.4. Randomizing the Handler Password at Boot Time ........................................................12 -
Experience with a Livecd in an Education Process
EXPERIENCE WITH A LIVECD IN AN EDUCATION PROCESS Experience with a LiveCD in an education process Jan R˚uˇziˇcka, FrantiˇsekKl´ımek Institute of Geoinformatics Faculty of Mining and Geology, VSB-TUO E-mail: [email protected] Key words: LiveCD, GIS´akLiveCD, Distance Learning, E-learning Abstract The paper describes how can be LiveCD (Bootable CD) used for geoinformatics distance learn- ing. We have prepared one LiveCD with basic software for learning geoinformatics and we have some feedback from users and teachers. The paper should evaluate this feedback. LiveCD is a CD-ROM, that can be used as a bootable device. After booting from the CD, the user can access all resources compiled to the CD. There are operating system (usually based on GNU/Linux) and (user, desktop) software installed and configured to be used directly after boot. Our CD named GIS´akLiveCD contains basic GIS software such as UMN MapServer, GRASS, Quantum GIS, Thuban, JUMP, GPS Drive, Blender and we work on other soft- ware packages such as MapLab for UMN MapServer, PostGIS, GeoNetwork Open Source, CatMDEdit, gvSIG, uDIG. GIS´akLiveCD contains set of spatial data from the Czech Re- public. Main part of the CD are tutorials for GIS software. CD is open for other e-learning materials. Now we have about 20 students using our LiveCD and few other users that are not curently our students. The paper should show Pros & Cons of the LiveCD usage for a distance learning. LiveCD Live CD is bootable CD-ROM with operating system and installed and configured programs. It is ready to use as full installed system directly after boot from CD-ROM drive. -
Cyber Security Manual V1.0.Pdf
St. Angelo‘s Professional Education Lab Manual v1.0 Contributing Authors: Rajesh Vishwakarma Vinod Singh Satish Jha Lalit Jha 1 St. Angelo‘s Professional Education Lab Manual v1.0 Table of Contents Program Overview ............................................................................................................................ 5 What is penetration testing? ........................................................................................................ 5 Objectives ..................................................................................................................................... 5 Pre-requisites ............................................................................................................................... 5 Course Contents ........................................................................................................................... 6 Module One: Art of Hacking ..................................................................................................... 6 Module Two: Scenario of Enterprise security .......................................................................... 6 Module Three: Planning and gathering Information................................................................ 6 Module Four: Social Engineering .............................................................................................. 6 Module Five: Taking on the system .......................................................................................... 7 Module Six: Attacking passwords -
Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3 -
Debian Edu / Skolelinux Wheezy 7.1+Edu0 Manual
Debian Edu / Skolelinux Wheezy 7.1+edu0 Manual May 28, 2016 i CONTENTS CONTENTS Contents 1 Manual for Debian Edu 7.1+edu0 Codename Wheezy1 2 About Debian Edu and Skolelinux1 2.1 Some history and why two names . .1 3 Architecture 2 3.1 Network . .2 3.1.1 The default network setup . .3 3.1.2 Main server (tjener) . .3 3.1.3 Services running on the main server . .3 3.1.4 LTSP server(s) (Thin client server(s)) . .5 3.1.5 Thin clients . .5 3.1.6 Diskless workstations . .5 3.1.7 Networked clients . .5 3.2 Administration . .5 3.2.1 Installation . .5 3.2.2 File system access configuration . .6 4 Requirements 6 4.1 Hardware requirements . .6 4.2 Hardware known to work . .7 5 Requirements for network setup7 5.1 Default Setup . .7 5.2 Internet router . .7 6 Installation and download options8 6.1 Where to find additional information . .8 6.2 Download the installation media for Debian Edu 7.1+edu0 Codename "Wheezy" . .8 6.2.1 netinstall CD image for i386, amd64 . .8 6.2.2 USB flash drive / Blue-ray disc ISO image for i386 and amd64 . .8 6.2.3 Source image . .8 6.3 Request a CD / DVD by mail . .8 6.4 Installing Debian Edu . .9 6.4.1 Select type of installation . .9 6.4.1.1 Additional boot parameters for installations . 12 6.4.2 The installation process . 12 6.4.3 Notes on some characteristics . 14 6.4.3.1 A note on notebooks .