Installing Slackware Slackware Is Freely Available from Several Different Sources

Total Page:16

File Type:pdf, Size:1020Kb

Installing Slackware Slackware Is Freely Available from Several Different Sources 30190c14.qxd:Layout 1 12/18/07 12:39 AM Page 409 Running Slackware Linux 14 If you become interested in building and submitting packages for Slackware, there are some good descriptions of how to do so at the Linux Packages site (www.linuxpackages.net). Look for links to building and submitting packages on the site’s home page in the Information box. Installing Slackware Slackware is freely available from several different sources. It installs and runs well on low-end computers. Some Linux or UNIX expertise would be useful, especially if something goes wrong. Getting Slackware Slackware 12.0 comes on a single DVD (about 3.7GB) or six CDs: three installation CDs and three source code CDs. The first Slackware CD can be used for a good, basic install. That CD is included on the DVD that comes with this book. I recommend installing from that CD for a computer that has limited disk space and an older processor. The full Slackware distribution set is also available from a few dozen mirror sites on the Web (see www.slackware.com/getslack). Because of disk space issues and to maximize bandwidth, the Slackware project recommends you get the DVD or CD images (ISOs) using BitTorrent. For a list of available torrents, see www.slackware.com/getslack/torrents.php. For many years, Slackware was available on one install CD, but adding KDE to the distri- NOTE bution made additional CDs necessary. To help support the project, you can purchase the boxed set of Slackware from http://store .slackware.com. At the store, you also can get a subscription to Slackware so that the Slackware Store sends you a new version each time one is released (every six to eight months). The store will just ship it when it’s available and charge your credit card. People who like Slackware often pay the subscription fee just to show their support. New Features in Slackware 12.0 With Slackware 12.0, the distribution consists of three installation CDs (plus three source code CDs) and/or a DVD version that holds everything. While still offering a stable foundation (the 2.6.21.5 kernel is used by default), Slackware includes bleeding-edge components for the desktop (KDE 3.5.7 or XFCE 4.4.1) and applications (the latest Firefox browser and Thunderbird e-mail client). Here are a couple of applications that were added to Slackware recently that might interest you: X11 7.2.0 — The X.Org Foundation’s modular X Window System. This offers improve- ments with performance and hardware support. SeaMonkey 1.1.2 — Contains a combination Web browser, e-mail client, IRC chat client, newsgroup client, and HTML client. In Slackware, SeaMonkey replaces the Mozilla suite as the all-in-one Internet suite. 409 30190c14.qxd:Layout 1 12/18/07 12:39 AM Page 410 Part III Choosing and Installing a Linux Distribution Along with these applications, Slackware has added recent popular updates to many of its existing applications and facilities (Firefox, Thunderbird, XFCE, and many others). To work with software packages in Slackware 12.0, the distribution now includes the Slackware Package Browser. This Web application enables you to search a Slackware packages database, making it much easier than it was in the past to find the Slackware software you want. Hardware Requirements While some older versions of Slackware will run on a 386, the Slackware site recommends 486 as a minimum processor. Without a graphical interface (X Window System), the minimum amount of RAM required is 16MB. With the GUI, at least 128MB of RAM is recommended. If you intend to use the KDE desktop environments, you can't have too much RAM (KDE in Slackware runs effec- tively with 256MB RAM or more, depending on your applications). The ZipSlack distribution is a small Slackware distribution that you can install from a Zip drive or floppy disks. ZipSlack can install on a hard disk with as little as 100MB space. You can find ZipSlack on any Slackware mirror site. If you are installing Slackware 12.0, 500MB is the minimum amount of disk space you should have available on your Linux partition. The recommended amount of hard disk space is at least 3.5GB for a full desktop install. Slackware supports all IDE and SCSI controllers supported by the Linux kernel itself. Starting Installation Although the Slackware installer has evolved over the years, its basic look-and-feel hasn’t changed much. There are some things you still need to do manually, such as setting up RAID or doing partitioning. The following steps describe how to install Slackware from the first installation CD. For the purposes of this book, this procedure demonstrates a minimal installation from the first Slackware CD. If you want to install Linux on low-end hardware (slow CPU and minimal RAM), this procedure is a great way to end up with a workable, minimal desktop system. If you want to do a more complete installation of Slackware, you should obtain the Slackware 12.0 DVD or three-CD installation set. For more detailed information (or if something goes wrong dur- ing the installation that isn’t covered here), refer to the Slackware-HOWTO, which is on the first Slackware CD. 1. Obtain a Slackware installation disc. (As mentioned earlier, you can boot the CD image from the DVD that comes with this book as described in Appendix A, or download it from a Slackware mirror site and burn it to CD.) 2. Insert the DVD that comes with this book into the drive and reboot your computer. 410 30190c14.qxd:Layout 1 12/18/07 12:39 AM Page 411 Running Slackware Linux 14 3. From the boot prompt, type slack and press Enter to start the default boot process. If you are using a Slackware CD instead of this book's DVD, simply press Enter. If the Slackware installation boots properly, you are prompted to enter a keyboard map. If your Slackware medium won’t boot, refer to the BOOTING.TXT file on the Slackware NOTE CD for information on things you can try to get around the problem. (If you can’t access the CD at all, you can get this file from any Slackware mirror site.) 4. If you are using a U.S. keyboard map, press Enter; to use a keyboard map for a different language/country, type 1, press Enter, and then select the language/country you want. The Slackware login prompt appears. 5. Type root and press Enter. A shell prompt appears. 6. Partition your hard disk. Chapter 7 explains how to partition your hard disk. Slackware doesn’t have a graphical partitioning tool, such as Disk Druid, so you have to use the fdisk or cfdisk command to partition your hard disk (again, refer to Chapter 7 or see the Slackware-HOWTO for details). To install Slackware, you should have at least one swap partition (up to twice the size of your RAM, with a maximum of about 500MB) and one Linux partition (such as ext3). You should have at least 500MB of hard disk space, with a recommended 3GB of disk space available for a full install of Slackware 12.0. 7. Enter setup mode. Type the following command to enter setup mode: # setup The Slackware Linux Setup screen appears, with the following options: HELP Read the Slackware Setup Help file KEYMAP Remap your keyboard if you’re not using a US one ADDSWAP Set up your swap partition(s) TARGET Set up your target partitions SOURCE Select source media SELECT Select categories of software to install INSTALL Install selected software CONFIGURE Reconfigure your Linux system EXIT Exit Slackware Linux Setup Type the first letter in the option name (or use the arrow keys) to highlight the option you want, and then press Enter. The following steps describe options you need to configure Slackware. 8. Select ADDSWAP. The Swap Space Detected menu appears, listing the swap partitions you have available. Select the one you want (there will usually be just one) and select Yes to install it as your swap partition. (If you don’t have a swap partition, exit the setup screen and run fdisk to create one.) 411 30190c14.qxd:Layout 1 12/18/07 12:39 AM Page 412 Part III Choosing and Installing a Linux Distribution The swap partition will be checked for bad blocks, formatted, and activated. Select OK to continue. The Select Linux Installation Partition menu appears. 9. Select a root partition. From the Linux partition that is displayed, highlight the one that you want to use as your root (/) partition and choose Select. The / partition is where Linux and all your data will go by default. (Other partitions can be added later.) Choose to do a quick format (Format) or a slow format that includes bad block checking (Check). Or you can select No to not format the partition. Typically you would overwrite your / partition, although you might keep data from NOTE another partition. I often maintain a separate data partition that I will attach to the file system in a location such as /mnt/data. With that technique, I can keep my data and still install a whole new operating system. Choose the file system type for the root file system. These days, most people select either the ext3 or reiserfs file system as their Linux root partition. Both of those file system types do journaling, so they can recover quickly if the system is shut down improperly (such as when someone kicks out the power cord).
Recommended publications
  • De-Anonymizing Live Cds Through Physical Memory Analysis
    De-Anonymizing Live CDs through Physical Memory Analysis Andrew Case [email protected] Digital Forensics Solutions Abstract Traditional digital forensics encompasses the examination of data from an offline or “dead” source such as a disk image. Since the filesystem is intact on these images, a number of forensics techniques are available for analysis such as file and metadata examination, timelining, deleted file recovery, indexing, and searching. Live CDs present a serious problem for this investigative model, however, since the OS and applications execute in a RAM-only environment and do not save data on non-volatile storage devices such as the local disk. In order to solve this problem, we present a number of techniques that support complete recovery of a live CD’s in-memory filesystem and partial recovery of its deleted contents. We also present memory analysis of the popular Tor application, since it is used by a number of live CDs in an attempt to keep network communications encrypted and anonymous. 1 Introduction Traditional digital forensics encompasses the examination of data from an offline or “dead” source such as a disk image. Under normal circumstances, evidence is obtained by first creating an exact, bit-for-bit copy of the target disk, followed by hashing of both the target disk and the new copy. If these hashes match then it is known that an exact copy has been made, and the hash is recorded to later prove that evidence was not modified during the investigation. Besides satisfying legal requirements, obtaining a bit-for-bit copy of data provides investigators with a wealth of information to examine and makes available a number of forensics techniques.
    [Show full text]
  • Testingtesting SSLSSL
    TestingTesting SSLSSL DirkDirk WetterWetter (d0rk)(d0rk) @drwetter Licence: http://creativecommons.org/licenses/by-nc-sa/4.0/ BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide BSidesHH2015 28.12.2015 Dirk see© Wetter, 1st slide ● ● Independent security consultant consultant security Independent Community involvements Community – – – – GUUG OWASP historical strong background unix-/networking pentests / defense+hardening /concepts /training /PM • programming: ...) past (well, 0. whoami 0. https://drwetter.eu/ 1. Intro ● HowTo do that? – Different tools available ● Based on Python (sslyze), PHP+Python (ssl-decoder), Perl (o-saft), scripted (cipherscan), SSLlabs (Go), ... ● Coverage: Nmap+LUA, Java (TestSSLServer), Windows EXE (SSLAudit) – Some Open Source, some not – Privacy – Platform availability BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide 1. Intro ● testssl.sh: what is that? – Blunt: ● Check's any server's SSL/TLS encryption – Cool thing: ● Plain /bin/bash + openssl as helper ● + standard Unix tools, no perl/python etc. – compatible: ● Linux ● Mac OS X ● (Free)BSD ● Windows: MSYS2, Cygwin BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide 1. Intro ● testssl.sh – customized runs, see --help BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide 1. Intro ● Batch processing BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide 1. Intro ● testssl.sh – 2005: inhouse testing tool (pentests) – Open sourced: ~ 2010 ● 2/2014: domain testssl.sh ● 4/2014: bitbucket ● 10/2014: github ● 3 releases in 2015 – ~ 5500 LoC BSidesHH2015 28.12.2015 © Dirk Wetter, see 1st slide Flag: https://upload.wikimedia.org/wikipedia/commons/0/00/Flag_of_Saint_Helena.svg from „Patricia Fidi“.
    [Show full text]
  • Backtrack 4 – the Definitive Guide
    BackTrack 4 – The Definitive Guide Introduction ..............................................................................................................................2 Behind the curtains.................................................................................................................2 BackTrack Base................................................................................................................................. 2 BackTrack Kernel............................................................................................................................. 2 Packages and Repositories............................................................................................................ 3 Meta packages.................................................................................................................................... 4 Meta Meta Packages......................................................................................................................... 4 Up and running with BackTrack.................................................................................................. 4 Installing BackTrack to Disk................................................................................................5 Updating Backtrack ................................................................................................................5 Customizing BackTrack.........................................................................................................6 Creating your own
    [Show full text]
  • Linux Distributions (Distros) and Competitors
    Linux Distributions (Distros) and Competitors Pick your poison By Lineage • Redhat Tree: RHEL, Fedora, Centos, Mandrake (Mandriva) • Debian tree: Debian, Ubuntu and it’s variants, LinuxMint, Knoppix • Gentoo • (Open)Suse: Novell and Europe • Slackware • Open/FreeBSD: USL based • (Open) Solaris: USL based By Package Management Package Red Hat Debian Manager Package file .rpm .deb suffix Per-package rpm dpkg tool Dependency yum apt-get tool Other software management options • “make” and “tarballs” • “txz packages (Slackware) • “tbz” BSD based • Pre-packaged source (Gentoo) • Specialized USL – Solaris, HP-UX, AIX RedHat Family • Most widely used software distro. • Most distros use .rpm binaries even if not actually based on Redhat • RedHat Enterprise LINUX (RHEL): - Premier, most widely used commercial LINUX server distro - Expensive, but good support. Lots of Internet support - Software administration sometimes problematic • Mandrake (Mandriva): - Excellent desktop variant - User group and support is scattered • Fedora (formerly a separate organization): - Server oriented RedHat Beta(s), usually 2x per year - Free, but flaky. Bleeding edge. - Download distribution media of variable quality. - Newer features and utilities lack stability. • Centos: - Server oriented RHEL variant usually 6-12 months behind current release - Free, stable, not current in features. - Widely used in commercial network devices Debian Family • Second most widely used distro • Distros use .deb binaries • Debian - Oldest distro outside of Slackware - Plenty of packages and support - Server oriented - 100+ variants - Announced two code base options: LINUX and OpenBSD!!!!!!! • Ubuntu: - Desktop oriented but server is coming on. • LINUX MINT: - Ubuntu variant, mainly desktop with improved usability features • Knoppix: - “Live CD” only. - Used for system backup/recovery. Others • (Open)Suse: - Novell Netware LINUX from Europe.
    [Show full text]
  • GNU/Linux Distro Timeline LEAF Version 10.9 Skolelinux Lindows Linspire Authors: A
    1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Libranet Omoikane (Arma) Gibraltar GNU/Linux distro timeline LEAF Version 10.9 Skolelinux Lindows Linspire Authors: A. Lundqvist, D. Rodic - futurist.se/gldt Freespire Published under the GNU Free Documentation License MEPIS SimplyMEPIS Impi Guadalinex Clonezilla Live Edubuntu Xubuntu gNewSense Geubuntu OpenGEU Fluxbuntu Eeebuntu Aurora OS Zebuntu ZevenOS Maryan Qimo wattOS Element Jolicloud Ubuntu Netrunner Ylmf Lubuntu eBox Zentyal Ubuntu eee Easy Peasy CrunchBang gOS Kiwi Ubuntulite U-lite Linux Mint nUbuntu Kubuntu Ulteo MoLinux BlankOn Elive OS2005 Maemo Epidemic sidux PelicanHPC Inquisitor Canaima Debian Metamorphose Estrella Roja BOSS PureOS NepaLinux Tuquito Trisquel Resulinux BeatriX grml DeadCD Olive Bluewall ASLinux gnuLiNex DeMuDi Progeny Quantian DSL-N Damn Small Linux Hikarunix Damn Vulnerable Linux Danix Parsix Kanotix Auditor Security Linux Backtrack Bioknoppix Whoppix WHAX Symphony OS Knoppix Musix ParallelKnoppix Kaella Shabdix Feather KnoppMyth Aquamorph Dreamlinux Morphix ZoneCD Hiwix Hiweed Deepin Kalango Kurumin Poseidon Dizinha NeoDizinha Patinho Faminto Finnix Storm Corel Xandros Moblin MeeGo Bogus Trans-Ameritech Android Mini Monkey Tinfoil Hat Tiny Core Yggdrasil Linux Universe Midori Quirky TAMU DILINUX DOSLINUX Mamona Craftworks BluePoint Yoper MCC Interim Pardus Xdenu EnGarde Puppy Macpup SmoothWall GPL SmoothWall Express IPCop IPFire Beehive Paldo Source Mage Sorcerer Lunar eIT easyLinux GoboLinux GeeXboX Dragora
    [Show full text]
  • INTERNATIONAL JOURNAL of ENGINEERING SCIENCES & RESEARCH TECHNOLOGY a Media Player Based on ARM by Porting of Linux Archan Agrawal*, Mrs
    [Agrawal, 3(12): December, 2014] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Media Player Based On ARM by Porting of Linux Archan Agrawal*, Mrs. Monika S. Joshi Department of Electronics & Comm. Engg., Marathwada Institute of Technology, Aurangabad, India Abstract This paper describes the porting of embedded linux on ARM 9 platform for designing and implementing of embedded media player on S3Cmini2440 development board. A novel transplating method for linux kernel is presented here, Linux kernel as well as its cut,compile,and porting process under ARM platform are introduced. Optimized linux operating system in the processor has been installed and transplanted the SDL_FFMPEG library into S3Cmini2440 after the cross compilation. Ofthis whole system come together in playing the audio/video & picture formats files smoothly & effectively. Keywords: Embedded Linux, ARM9,Porting, S3Cmini2440, Compilation,.Embedded Media Player. Introduction compatible to any of the hardware with the With the wide application of embedded systems in architecture specific changes into it, Linux has consumer electronics, industrial control, aerospace, become popular making the embedded system market automotive electronics, health care, network more competitive. communications and other fields ,embedded system include executable programs and scripts. An has been familiar to people all walks of life, operating system provides applications with a embedded systems have been into people's lives, it is platform where they can run, managing their access changing people's production and lifestyles in a to the CPU and system memory. The user's operation variety of forms.
    [Show full text]
  • Backtrack System: Security Against Hacking
    International Journal of Scientific and Research Publications, Volume 5, Issue 2, February 2015 1 ISSN 2250-3153 BackTrack System: Security against Hacking Munir A. Ghanem Information Technology Department, Northern Border University Abstract- Hacking became one of the world's most famous Lastly, our research presentation in front of the discussion information technology problem. It's the work of whom doesn't committee, will be followed by a practical application to show has a work, a work to gain more money, a work to harm others, the security tools of BackTrack. and a work for many other purposes. Almost every week, if it is not every day, we hear about hacking attacks that hits many significant sites in the country, such as: Ministries, Banks, II. PROBLEM DEFINITION Uniform sites and many other important persons accounts on the Problem that imposes to write this research can be social network sites. Fortunately, not all the hackers are summarized as follows: professional in hacking, but they trained them self on one or 1. Clear increase of hacking attacks without any deterrent more of such programs for one of the previous purposes. On the or knowing how to stop it. other side, the secret of success in such hacking attacks is that the 2. Unawareness of many individuals on how to secure intended attacked targets did not take the proper precautionary their computers. measures to protect themselves from such attacks. 3. Raise people knowledge on e-piracy culture, and In this research, I am focusing on "BackTrack System" and consequently raising knowledge of information security.
    [Show full text]
  • Kali Linux Revealed
    Kali Linux Revealed Mastering the Penetration Testing Distribution Kali Linux Revealed Mastering the Penetration Testing Distribution by Raphaël Hertzog, Jim O’Gorman, and Mati Aharoni Kali Linux Revealed Copyright © 2017 Raphaël Hertzog, Jim O’Gorman, and Mati Aharoni This book is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. è http://creativecommons.org/licenses/by-sa/3.0/ Some sections of this book borrow content from the “Debian Administrator’s Handbook, Debian Jessie from Discovery to Mastery” written by Raphaël Hertzog and Roland Mas, which is available here: è https://debian-handbook.info/browse/stable/ For the purpose of the CC-BY-SA license, Kali Linux Revealed is an Adaptation of the Debian Administrator’s Handbook. “Kali Linux” is a trademark of Offensive Security. Any use or distribution of this book, modified or not, must comply with the trademark policy defined here: è https://www.kali.org/trademark-policy/ All Rights Not Explicitly Granted Above Are Reserved. ISBN: 978-0-9976156-0-9 (paperback) Offsec Press 19701 Bethel Church Road, #103-253 Cornelius NC 28031 USA www.offensive-security.com Library of Congress Control Number: 2017905895 The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the authors nor Offsec Press shall have any liabil- ity to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. Because of the dynamic nature of the Internet, any Web addresses or links contained in this book may have changed since publication and may no longer be valid.
    [Show full text]
  • Sudo Passwd Root Sudo Sh -C 'Echo "Greeter-Show-Manual-Login=True
    sudo passwd root sudo sh -c 'echo "greeter-show-manual-login=true" >> /etc/lightdm/lightdm.conf' sudo apt-get install gnome-session-fallback sudo apt-get install gdebi && sudo apt-get install synaptic ******************************************************************************** * Kali Linux sudo gedit /etc/apt/sources.list BackBox deb http://ppa.launchpad.net/backbox/three/ubuntu precise main deb-src http://ppa.launchpad.net/backbox/three/ubuntu precise main Ubuntu Trusty Tahr 14.04 deb http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr/ubuntu trusty main deb-src http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr/ubuntu tr usty main deb http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr2/ubuntu trust y main deb-src http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr2/ubuntu t rusty main Ubuntu 13.04 deb http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu raring main deb-src http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu raring main deb http://ppa.launchpad.net/wagungs/kali-linux/ubuntu raring main deb-src http://ppa.launchpad.net/wagungs/kali-linux/ubuntu raring main Ubuntu 12.04 deb http://ppa.launchpad.net/wagungs/kali-linux/ubuntu precise main deb-src http://ppa.launchpad.net/wagungs/kali-linux/ubuntu precise main deb http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu precise main deb-src http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu precise main nano pgp-key -----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.4 Comment: Hostname: keyserver.ubuntu.com mI0ET324YwEEANbSlISrOlAGjxgFRxiN6jk0JIl/vxQ8lapRdxZ4DHDAQdXbX4AuigMBkP5e
    [Show full text]
  • Michael Altfield
    Michael Altfield https://www.michaelaltfield.net Summary of Qualifications Linux enthusiast with over 13 years of work experience. Broad range of technical skills with proficiency in several languages. Dedicated, hard worker with outstanding problem solving skills and a passion for security. EDUCATION University of Central Florida Orlando, FL Bachelors of Computer Science Graduated: April 2013 Minor: Secure Computing and Networking TECHNICAL EXPERIENCE Operating Systems • Extensive experience: Red Hat/Cent OS, Debian/Ubuntu, Qubes, Gentoo, Windows, OS X, Knoppix, Arch, IPCop, SmoothWall • Moderate experience: Backtrack/Kali, TAILS, Whonix, (Open) Solaris, BSD, Fedora, DSL, Puppy, Windows Server 2003 Programming/Design • Extensive experience: Python, PHP, C, MySQL, PostgreSQL, Perl, Java, BASH, JS, XHTML, CSS, XML, Xpath • Moderate experience: C++, Ruby, Awk, Sed, Tcl/Expect, ASP, MSSQL, Oz, VB Enterprise Software Administration • Extensive experience: Chef, Terraform, Packer, Puppet, Ansible, Splunk, Right Scale, Xen, Wordpress • Moderate experience: Apache, Nginx, Lighttpd, Varnish, Membase (Couchbase), Open Stack, F5 LBs, LXC, VMware ESX, Foglight, Sitescope, Active Directory, Snort, Nagios, Mediawiki, Big Brother/Hobbit Cloud • AWS ec2, s3, Cloud Formation, IAM, ELB/ALB, EBS, EFS, Lambda, DynamoDB, CloudWatch, Spot Fleets Security • GPG, SSL/TLS, OSCP, HPKP, HSTS, Let’s Encrypt, SSH, TOR, FIM, (H)IDS, IPS, Nessus, nmap, iptables, PCAP (tcpdump/wireshark), OSSEC/Wazuh, auditd, SELinux Other Familiar Technologies • Android, Bitcoin,
    [Show full text]
  • Debian GNU/Linux Since 1995
    Michael Meskes The Best Linux Distribution credativ 2017 www.credativ.com Michael • Free Software since 1993 • Linux since 1994 Meskes • Debian GNU/Linux since 1995 • PostgreSQL since 1998 credativ 2017 www.credativ.com Michael Meskes credativ 2017 www.credativ.com Michael • 1992 – 1996 Ph.D. • 1996 – 1998 Project Manager Meskes • 1998 – 2000 Branch Manager • Since 2000 President credativ 2017 www.credativ.com • Over 60 employees on staff FOSS • Europe, North America, Asia Specialists • Open Source Software Support and Services • Support: break/fix, advanced administration, Complete monitoring Stack • Consulting: selection, migration, implementation, Supported integration, upgrade, performance, high availability, virtualization All Major • Development: enhancement, bug-fix, integration, Open Source backport, packaging Projects ● Operating, Hosting, Training credativ 2017 www.credativ.com The Beginning © Venusianer@German Wikipedia credativ 2017 www.credativ.com The Beginning 2nd Try ©Gisle Hannemyr ©linuxmag.com credativ 2017 www.credativ.com Nothing is stronger than an idea whose Going time has come. Back On résiste à l'invasion des armées; on ne résiste pas à l'invasion des idées. In One withstands the invasion of armies; one does not withstand the invasion of ideas. Victor Hugo Time credativ 2017 www.credativ.com The Beginning ©Ilya Schurov Fellow Linuxers, This is just to announce the imminent completion of a brand-new Linux release, which I’m calling the Debian 3rd Try Linux Release. [. ] Ian A Murdock, 16/08/1993 comp.os.linux.development credativ 2017 www.credativ.com 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Libranet Omoikane (Arma) Quantian GNU/Linux Distribution Timeline DSL-N Version 12.10-w/Android Damn Small Linux Hikarunix Damn Vulnerable Linux A.
    [Show full text]
  • Analysis of Security and Penetration Tests for Wireless Networks with Backtrack Linux
    Analysis of Security and Penetration Tests for Wireless Networks with Backtrack Linux Renata Lopes Rosa∗, Demóstenes Zegarra Rodríguezy, Gabriel Pívaroz, Jackson Sousax ∗Faculdade de Arquitetura e Urbanismo da USP, São Paulo, Brazil Email: [email protected]∗ yInstituto Nokia de Tecnologia (INdT) Manaus, Brazil Email: [email protected], [email protected], [email protected] Abstract—The prices decreasing of wireless devices create [7], but all these tool can be found together in a Linux a tendency to increase the use of wireless routers anywhere. distribution called Backtrack [8], that is focused on security So, it is important to have a basic security level of encryption testing and penetration testing (pen tests), much appreciated protocols. This paper focuses in doing penetration tests with an attack that compares the encrypted password of a wireless by hackers and security analysts, and can be started directly router with a file that contains an alphanumeric dictionary from CD (without install disk), removable media (pen drive), with the use of a Linux distribution, BackTrack, that has a virtual machines or directly on the hard disk. collection of security and forensics tools. This paper shows Some papers [9, 10, 11, 12] have already studied a lot penetration practical tests in WEP and WPA/WPA2 protocols, of security aspects, but not show in details of experimental how these protocols are broken with simple attacks and it is implemented a code script that classifies the most vulnerable practices the operating behind a tool for wireless discovery. access point protocol to help the networks administrators to This paper differs from others in the kind of approach protect their networks.
    [Show full text]