Kali-Linux-Revealed-2021-Edition.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Kali-Linux-Revealed-2021-Edition.Pdf Kali Linux Revealed Mastering the Penetration Testing Distribution (2021) Kali Linux Revealed Mastering the Penetration Testing Distribution (2021) by Raphaël Hertzog, Jim O’Gorman, Mati Aharoni, and Joe O’Gorman Kali Linux Revealed Copyright © 2021 Raphaël Hertzog, Jim O’Gorman, Mati Aharoni, and Joe O’Gorman This book is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. è https://creativecommons.org/licenses/by-sa/3.0/ Some sections of this book borrow content from the ”Debian Administrator’s Handbook, Debian Jessie from Discovery to Mastery” written by Raphaël Hertzog and Roland Mas, which is available here: è https://debian-handbook.info/browse/stable/ For the purpose of the CC-BY-SA license, Kali Linux Revealed is an Adaptation of the Debian Administrator’s Handbook. ”Kali Linux” is a trademark of Offensive Security. Any use or distribution of this book, modified or not, must comply with the trademark policy defined here: è https://www.kali.org/trademark-policy/ All Rights Not Explicitly Granted Above Are Reserved. ISBN: 978-0-9976156-0-9 (paperback) OffSec Press 230 Park Ave, 3rd Fl West New York NY 10169 USA www.offensive-security.com Library of Congress Control Number: 2017905895 The information in this book is distributed on an ”As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the authors nor OffSec Press shall have any liabil- ity to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. Because of the dynamic nature of the Internet, any Web addresses or links contained in this book may have changed since publication and may no longer be valid. Printed in the United States of America. Table of Contents 1. About Kali Linux 1 1.1 A Bit of History ................................................. 2 1.2 Relationship with Debian ........................................... 4 1.2.1 The Flow of Packages ........................................... 4 1.2.2 Managing the Difference with Debian ................................... 5 1.3 Purpose and Use Cases ............................................ 5 1.4 Main Kali Linux Features ........................................... 8 1.4.1 A Live System ............................................... 8 1.4.2 Forensics Mode .............................................. 8 1.4.3 A Custom Linux Kernel ........................................... 9 1.4.4 Completely Customizable ......................................... 9 1.4.5 A Trustable Operating System ....................................... 9 1.4.6 Usable on a Wide Range of ARM Devices .................................. 10 1.5 Kali Linux Policies ............................................... 10 1.5.1 Network Services Disabled by Default ................................... 10 1.5.2 A Curated Collection of Applications .................................... 10 1.6 Summary .................................................... 11 2. Getting Started with Kali Linux 13 2.1 Downloading a Kali ISO Image ....................................... 14 2.1.1 Where to Download ............................................ 14 2.1.2 What to Download ............................................. 14 2.1.3 Verifying Integrity and Authenticity .................................... 17 Relying on the TLS-Protected Website .................................. 17 Relying on PGP’s Web of Trust ...................................... 17 2.1.4 Copying the Image on a DVD-ROM or USB Key .............................. 19 Creating a Bootable Kali USB Drive on Windows ............................. 19 Creating a Bootable Kali USB Drive on Linux ............................... 21 Creating a Bootable Kali USB Drive on OS X/macOS ............................ 23 2.2 Booting a Kali ISO Image in Live Mode .................................. 24 2.2.1 On a Real Computer ............................................ 24 2.2.2 In a Virtual Machine ............................................ 24 Preliminary Remarks .......................................... 25 VirtualBox ............................................... 25 VMware Workstation .......................................... 37 2.3 Summary .................................................... 44 3. Linux Fundamentals 47 3.1 What Is Linux and What Is It Doing? ................................... 48 3.1.1 Driving Hardware ............................................. 48 3.1.2 Unifying File Systems ........................................... 49 3.1.3 Managing Processes ............................................ 50 3.1.4 Rights Management ............................................ 51 3.2 The Command Line .............................................. 51 3.2.1 How To Get a Command Line ....................................... 51 3.2.2 Command Line Basics: Browsing the Directory Tree and Managing Files .................. 52 3.3 The File System ................................................. 54 3.3.1 The Filesystem Hierarchy Standard ..................................... 54 3.3.2 The User’s Home Directory ......................................... 55 3.4 Useful Commands ............................................... 56 3.4.1 Displaying and Modifying Text Files .................................... 56 3.4.2 Searching for Files and within Files ..................................... 56 3.4.3 Managing Processes ............................................ 57 3.4.4 Managing Rights .............................................. 57 3.4.5 Getting System Information and Logs .................................... 60 3.4.6 Discovering the Hardware ......................................... 61 3.5 Summary .................................................... 62 4. Installing Kali Linux 65 4.1 Minimal Installation Requirements ..................................... 66 4.2 Step by Step Installation on a Hard Drive ................................. 66 4.2.1 Plain Installation .............................................. 66 Booting and Starting the Installer .................................... 66 Selecting the Language ......................................... 67 Selecting the Country .......................................... 68 Selecting the Keyboard Layout ...................................... 69 Detecting Hardware .......................................... 70 Loading Components .......................................... 70 Detecting Network Hardware ...................................... 71 Configuring the Network ........................................ 71 User Creation ............................................. 72 Configuring the Clock ......................................... 74 Detecting Disks and Other Devices .................................... 74 Partitioning .............................................. 75 Copying the Live Image ......................................... 83 IV Kali Linux Revealed Configuring the Package Manager (apt) ................................. 84 Installing Metapackages ......................................... 85 Installing the GRUB Boot Loader ..................................... 85 Finishing the Installation and Rebooting ................................. 88 4.2.2 Installation on a Fully Encrypted File System ................................ 88 Introduction to LVM .......................................... 89 Introduction to LUKS .......................................... 89 Setting Up Encrypted Partitions ..................................... 90 End of the Guided Partitioning with Encrypted LVM ............................ 93 4.3 Unattended Installations ........................................... 95 4.3.1 Preseeding Answers ............................................ 96 With Boot Parameters ......................................... 96 With a Preseed File in the Initrd ..................................... 96 With a Preseed File in the Boot Media .................................. 96 With a Preseed File Loaded from the Network ............................... 97 4.3.2 Creating a Preseed File ........................................... 97 4.4 ARM Installations ............................................... 98 4.5 Troubleshooting Installations ........................................ 99 4.6 Summary .................................................... 104 5. Configuring Kali Linux 107 5.1 Configuring the Network ........................................... 108 5.1.1 On the Desktop with NetworkManager .................................. 108 5.1.2 On the Command Line with Ifupdown ................................... 109 5.1.3 On the Command Line with systemd-networkd .............................. 110 5.2 Managing Unix Users and Unix Groups .................................. 112 5.2.1 Creating User Accounts .......................................... 112 5.2.2 Modifying an Existing Account or Password ................................ 113 5.2.3 Disabling an Account ............................................ 113 5.2.4 Managing Unix Groups ........................................... 113 5.3 Configuring Services ............................................. 114 5.3.1 Configuring a Specific Program ....................................... 114 5.3.2 Configuring SSH for Remote Logins .................................... 115 5.3.3 Configuring PostgreSQL Databases ..................................... 115 Connection Type and Client Authentication ................................ 116 Creating Users and Databases .....................................
Recommended publications
  • Debian Developer's Reference Version 12.0, Released on 2021-09-01
    Debian Developer’s Reference Release 12.0 Developer’s Reference Team 2021-09-01 CONTENTS 1 Scope of This Document 3 2 Applying to Become a Member5 2.1 Getting started..............................................5 2.2 Debian mentors and sponsors......................................6 2.3 Registering as a Debian member.....................................6 3 Debian Developer's Duties 9 3.1 Package Maintainer's Duties.......................................9 3.1.1 Work towards the next stable release............................9 3.1.2 Maintain packages in stable .................................9 3.1.3 Manage release-critical bugs.................................. 10 3.1.4 Coordination with upstream developers............................ 10 3.2 Administrative Duties.......................................... 10 3.2.1 Maintaining your Debian information............................. 11 3.2.2 Maintaining your public key.................................. 11 3.2.3 Voting.............................................. 11 3.2.4 Going on vacation gracefully.................................. 12 3.2.5 Retiring............................................. 12 3.2.6 Returning after retirement................................... 13 4 Resources for Debian Members 15 4.1 Mailing lists............................................... 15 4.1.1 Basic rules for use....................................... 15 4.1.2 Core development mailing lists................................. 15 4.1.3 Special lists........................................... 16 4.1.4 Requesting new
    [Show full text]
  • Backbox Penetration Testing Never Looked So Lovely
    DISTROHOPPER DISTROHOPPER Our pick of the latest releases will whet your appetite for new Linux distributions. Picaros Diego Linux for children. here are a few distributions aimed at children: Doudou springs to mind, Tand there’s also Sugar on a Stick. Both of these are based on the idea that you need to protect children from the complexities of the computer (and protect the computer from the children). Picaros Diego is different. There’s nothing stripped- down or shielded from view. Instead, it’s a normal Linux distro with a brighter, more kid-friendly interface. The desktop wallpaper perhaps best We were too busy playing Secret Mario on Picaros Diego to write a witty or interesting caption. exemplifies this. On one hand, it’s a colourful cartoon image designed to interest young file manager. In the programming category, little young for a system like this, but the it children. Some of the images on the we were slightly disappointed to discover it may well work for children on the upper end landscape are icons for games, and this only had Gambas (a Visual Basic-like of that age range. should encourage children to investigate the language), and not more popular teaching Overall, we like the philosophy of wrapping system rather than just relying on menus. languages like Scratch or a Python IDE. Linux is a child-friendly package, but not On the other hand, it still displays technical However, it’s based on Debian, so you do dumbing it down. Picaros Diego won’t work details such as the CPU usage and the RAM have the full range of software available for every child, but if you have a budding and Swap availability.
    [Show full text]
  • Read PDF Linux-Distribusjoner: Ubuntu, Fedora
    [PDF] Linux-distribusjoner: Ubuntu, Fedora, Slackware, Mandriva Linux, Splashtop, Kubuntu, Debian, Mark Shuttleworth, Linux Mint, Gobuntu Linux-distribusjoner: Ubuntu, Fedora, Slackware, Mandriva Linux, Splashtop, Kubuntu, Debian, Mark Shuttleworth, Linux Mint, Gobuntu Book Review Absolutely one of the best pdf We have ever read. I really could comprehended every little thing using this written e book. I am easily could get a satisfaction of reading a written publication. (Dr. Od ie Ham ill) LINUX-DISTRIBUSJONER: UBUNTU, FEDORA , SLA CKWA RE, MA NDRIVA LINUX, SPLA SHTOP, KUBUNTU, DEBIA N, MA RK SHUTTLEW ORTH, LINUX MINT, GOBUNTU - To read Linux - distribusjoner: Ubuntu, Fedora, Slackware, Mandriva Linux , Splashtop, Kubuntu, Debian, Mark Shuttleworth, Linux Mint, Gobuntu PDF, you should follow the hyperlink beneath and save the ebook or gain access to other information which are highly relevant to Linux-distribusjoner: Ubuntu, Fedora, Slackware, Mandriva Linux, Splashtop, Kubuntu, Debian, Mark Shuttleworth, Linux Mint, Gobuntu book. » Download Linux -distribusjoner: Ubuntu, Fedora, Slackware, Mandriva Linux , Splashtop, Kubuntu, Debian, Mark Shuttleworth, Linux Mint, Gobuntu PDF « Our solutions was launched using a want to serve as a total on the internet electronic digital catalogue which offers usage of multitude of PDF document collection. You may find many different types of e-book along with other literatures from the paperwork database. Particular popular issues that distributed on our catalog are famous books, answer key, exam test questions and answer, guide example, practice guideline, quiz trial, customer manual, user guide, service instruction, maintenance manual, and so forth. All e-book all privileges remain together with the writers, and downloads come as is.
    [Show full text]
  • Tuto Documentation Release 0.1.0
    Tuto Documentation Release 0.1.0 DevOps people 2020-05-09 09H16 CONTENTS 1 Documentation news 3 1.1 Documentation news 2020........................................3 1.1.1 New features of sphinx.ext.autodoc (typing) in sphinx 2.4.0 (2020-02-09)..........3 1.1.2 Hypermodern Python Chapter 5: Documentation (2020-01-29) by https://twitter.com/cjolowicz/..................................3 1.2 Documentation news 2018........................................4 1.2.1 Pratical sphinx (2018-05-12, pycon2018)...........................4 1.2.2 Markdown Descriptions on PyPI (2018-03-16)........................4 1.2.3 Bringing interactive examples to MDN.............................5 1.3 Documentation news 2017........................................5 1.3.1 Autodoc-style extraction into Sphinx for your JS project...................5 1.4 Documentation news 2016........................................5 1.4.1 La documentation linux utilise sphinx.............................5 2 Documentation Advices 7 2.1 You are what you document (Monday, May 5, 2014)..........................8 2.2 Rédaction technique...........................................8 2.2.1 Libérez vos informations de leurs silos.............................8 2.2.2 Intégrer la documentation aux processus de développement..................8 2.3 13 Things People Hate about Your Open Source Docs.........................9 2.4 Beautiful docs.............................................. 10 2.5 Designing Great API Docs (11 Jan 2012)................................ 10 2.6 Docness.................................................
    [Show full text]
  • Leitfaden Für Debian-Betreuer
    Leitfaden für Debian­Betreuer Osamu Aoki, Helge Kreutzmann, and Mechtilde Stehmann August 27, 2021 Leitfaden für Debian­Betreuer by Osamu Aoki, Helge Kreutzmann, and Mechtilde Stehmann Copyright © 2014­2020 Osamu Aoki Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the ”Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED ”AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IM­ PLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Diese Anleitung wurde mit den nachfolgenden Dokumenten als Referenz erstellt: • »Making a Debian Package (AKA the Debmake Manual)«, Copyright © 1997 Jaldhar Vyas. • »The New­Maintainer’s Debian Packaging Howto«, Copyright © 1997 Will Lowe. • »Debian­Leitfaden für Neue Paketbetreuer«, Copyright © 1998­2002 Josip Rodin, 2005­2017 Osamu Aoki, 2010 Craig Small und 2010 Raphaël Hertzog. Die neuste Version dieser Anleitung sollte • im Paket debmake­doc und • auf der Debian­Dokumentations­Website verfügbar sein.
    [Show full text]
  • Paper Code: Dttm C205 Tourism in West Bengal Semester
    HAND OUT FOR UGC NSQF SPONSORED ONE YEAR DILPOMA IN TRAVEL & TORUISM MANAGEMENT PAPER CODE: DTTM C205 TOURISM IN WEST BENGAL SEMESTER: SECOND PREPARED BY MD ABU BARKAT ALI UNIT-I: 1.TOURISM IN WEST BENGAL: AN OVERVIEW Evolution of Tourism Department The Department of Tourism was set up in 1959. The attention to the development of tourist facilities was given from the 3 Plan Period onwards, Early in 1950 the executive part of tourism organization came into being with the appointment of a Tourist Development Officer. He was assisted by some of the existing staff of Home (Transport) Department. In 1960-61 the Assistant Secretary of the Home (Transport) Department was made Director of Tourism ex-officio and a few posts of assistants were created. Subsequently, the Secretary of Home (Transport) Department became the ex-officio Director of Tourism. Two Regional Tourist Offices - one for the five North Bengal districts i.e., Darjeeling, Jalpaiguri, Cooch Behar, West Dinajpur and Maida with headquarters at Darjeeling and the other for the remaining districts of the State with headquarters at Kolkata were also set up. The Regional Office at KolKata started functioning on 2nd September, 1961. The Regional Office in Darjeeling was started on 1st May, 1962 by taking over the existing Tourist Bureau of the Govt. of India at Darjeeling. The tourism wing of the Home (Transport) Department was transferred to the Development Department on 1st September, 1962. Development. Commissioner then became the ex-officio Director of Tourism. Subsequently, in view of the increasing activities of tourism organization it was transformed into a full-fledged Tourism Department, though the Secretary of the Forest Department functioned as the Secretary, Tourism Department.
    [Show full text]
  • Excerpts of Chapters From
    Excerpts of Chapters from A Practical Guide to Ubuntu Linux® FOURTH EDITION Mark G. Sobell ISBN-13: 978-0-13-392731-3 CopyrightExcerpt © 2015 Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Blank Excerpt 3 Step-by-Step Installation 3Chapter3 In This Chapter Objectives Booting Ubuntu and Running a After reading this chapter you should be able to: Live Session. 56 Run a live session and use gnome-disks to view and Automatic Boot Sequence . 56 change disk partitioning Running a Live Session. 59 Install Ubuntu from a live session Installing from a Live Session . 60 Install Ubuntu using the Server Image Installing from the Desktop Modify system behavior using boot parameters Boot Menu . 61Excerpt Modify partitions during installation The ubiquity Graphical Installer. 61 The ubiquity Advanced Partitioning List the requirement and considerations for a dual- Screen. 67 boot configuration Advanced Installation. 71 Modifying Boot Parameters (Options) . 75 debian-installer: The Ubuntu Textual Installer . 78 gnome-disks: The GNOME Disk Utility . 88 Setting Up a Dual-Boot System . 91 5555 56 Chapter 3 Step-by-Step Installation Chapter 2 covered planning the installation of Ubuntu: determining the requirements; planning the layout of the hard disk; obtaining the files you need for the installation, including how to download and burn or write Desktop and Server Images to installa- tion media; and collecting information about the system. This chapter focuses on installing Ubuntu. Frequently the installation is quite simple, especially if you have done a good job of planning.
    [Show full text]
  • De-Anonymizing Live Cds Through Physical Memory Analysis
    De-Anonymizing Live CDs through Physical Memory Analysis Andrew Case [email protected] Digital Forensics Solutions Abstract Traditional digital forensics encompasses the examination of data from an offline or “dead” source such as a disk image. Since the filesystem is intact on these images, a number of forensics techniques are available for analysis such as file and metadata examination, timelining, deleted file recovery, indexing, and searching. Live CDs present a serious problem for this investigative model, however, since the OS and applications execute in a RAM-only environment and do not save data on non-volatile storage devices such as the local disk. In order to solve this problem, we present a number of techniques that support complete recovery of a live CD’s in-memory filesystem and partial recovery of its deleted contents. We also present memory analysis of the popular Tor application, since it is used by a number of live CDs in an attempt to keep network communications encrypted and anonymous. 1 Introduction Traditional digital forensics encompasses the examination of data from an offline or “dead” source such as a disk image. Under normal circumstances, evidence is obtained by first creating an exact, bit-for-bit copy of the target disk, followed by hashing of both the target disk and the new copy. If these hashes match then it is known that an exact copy has been made, and the hash is recorded to later prove that evidence was not modified during the investigation. Besides satisfying legal requirements, obtaining a bit-for-bit copy of data provides investigators with a wealth of information to examine and makes available a number of forensics techniques.
    [Show full text]
  • There Are Two Dedicated Dspace IRC (Internet Relay Chat) Channels (I.E
    IRC Code of Conduct All DSpace support channels, mailing lists and meetings follow the LYRASIS Code of Conduct. We ask you to remain respectful in all discussions. We also encourage you to report any violations of the code of conduct to LYRASIS (see the Code of Conduct for more details). DSpace chat has moved to Slack Our old IRC channels are essentially unmonitored these days. Instead, we recommend joining our DSpace.org Slack for any chat-based support. You are also welcome to email your question to the dspace-tech Mailing List as an alternative, or choose one of the other DSpace Sup port options. There are two dedicated DSpace IRC (internet relay chat) channels (i.e. "rooms") on the irc.freenode.net server: #dspace (irc://irc.freenode.net/dspace) - all DSpace discussions and live Q & A. This channel is unlogged. #duraspace (irc://irc.freenode.net/duraspace) - Old duraspace community channel (no longer used). As of July 2018, this channel is unlogged. Pri or years logs are still available/archived. If you do not have access to an IRC client, or are new to IRC, the following web interfaces are very easy way to get started: Login to #dspace IRC at: http://webchat.freenode.net?channels=dspace Enter in a nickname of your choice (e.g. firstName_lastName) & click "Connect" Login to #duraspace IRC at: http://webchat.freenode.net?channels=duraspace Enter in a nickname of your choice (e.g. firstName_lastName) & click "Connect" Or you can login to both IRC channels at the same time: http://webchat.freenode.net?channels=duraspace,dspace For a list of IRC client software, see: http://en.wikipedia.org/wiki/Comparison_of_Internet_Relay_Chat_clients Many current Instant Messaging (IM) clients also support IRC.
    [Show full text]
  • Application of Ultimate Debian Database in Debian Pure Blends Harvesting Information About Packages for Specific Work fields
    Application of Ultimate Debian Database in Debian Pure Blends Harvesting information about packages for specific work fields Andreas Tille Debian Conference 9 Cáceres, July 26, 2009 Overview 1 Debian Pure Blends Short introduction Blends features Web tools 2 Ultimate Debian Database Short introduction Advantages of using UDD for Blends 3 Future Planned features for Blends TODO 2 / 22 Rename: CDD § Debian Pure Blends Term Custom Debian Distributions was always misunderstood Main misunderstanding: CDD was regarded as “something else than Debian” even if people were told that it is a concept inside Debian explicitly Dropped the misleading name in favour of a name where you just have to read the docs § Debian Pure Blend (in short Blend): a subset of Debian that is configured to support a particular target group out-of-the-box. 3 / 22 Reminder: Basic goal of Blends Debian > 22.000 packages Users interested in subset Groups of specialised users Easy installation and configuration While Debian stays general support specialists as well No derivative from Debian Basic idea: Do not make a separate distribution but make Debian fit for special purpose instead 4 / 22 Upstream - Debian Developer - User Tie a solid network of Debian developers, upstream developers (“developing experts”) and users Rationale: Experts in this field need help in build system / packaging Upstream anticipates enhancements of build system and security audit Finally support upstream developers to become Debian maintainers Penetrating specific work fields with Linux makes it even more
    [Show full text]
  • Lord Shiva in Varanasi Visual Processes and the Representation
    OWE WIKSTRÖM Darsan (to See) Lord Shiva in Varanasi Visual Processes and the Representation of God by Seven Ricksha-Drivers Introduction In spite of its effort to be transculturally relevant, the psychology of relig- ion is quite ethno- or rather Western-centric. This becomes very clear when one tries to "translate" Indian folk religiosity into concepts taken from mainline theories; i.e. social, cognitive or psychoanalytical psychology of religion. Not only do the norms and values differ, but the very ontological assumptions underlying the categories in which the researcher understand differs fundamentally from the internal Hindu anthropological and epis- temiological apriori. For example, their words of the psyche include contex- tuality, from time to space, to ethics to groups. The subtle interrelatedness of the divine, spiritual and the mundane is obvious (Geertz 1973). It in- cludes the flows and exchanges of substances within and between persons with minimal outer bondaries. The psychological makeup of persons in societies so civilizationally dif- ferent as India is embedded in fundamentally distinct principles of these cultures and the social patterns and child rearing that these principles shape (Marsella et al 1985). Therefore it is clear that a western scholar and an Indian devotee are quite different, not only simply that they see things differently, coming from varied cultures, but that the very inner emotional- cognitive makeup is culturally constructed in different ways (Roland 1989). Of course this will "disturb" the interaction between interviewer and in- terviewee, the scholar and the pious man. In order to understand the psy- chological dynamics in folk religiosity, I think that the researcher has to re- examine and be aware of the way he uses the theoretical models in cross- cultural psychological hermeneutics.
    [Show full text]
  • Debian's Perl Team from an End-User Perspective
    Getting Perl modules into Debian Debian's Perl team from an end-user perspective Tim Retout 11th September 2010 HantsLUG @ IBM Hursley Tim Retout pkg-perl for users What is the Debian Perl team? Maintain about 2000 Perl packages within Debian Both official Debian Developers and sponsees Around 70-80 committers,1 but most activity from a small core team Also indirectly contributes most of the Perl packages in Debian's derivatives (e.g. Ubuntu). 1http://www.ohloh.net/p/pkg-perl Tim Retout pkg-perl for users Using Perl on Debian How do you install Perl modules? apt-get install libfoo-perl Backports for older releases CPAN for unpackaged modules CPAN (the tool) is configured to play nicely with Debian packages, but does not install packages when satisfying dependencies. Tim Retout pkg-perl for users When a module isn't packaged If the Perl module you need is not available, you have several options: 1 Install it with CPAN, and handle future upgrades yourself. 2 File an RFP (Request for package) bug in Debian.2 3 Build yourself a private Debian package with dh-make-perl, and handle future upgrades yourself. 4 Get involved and contribute it back to Debian! Getting involved is easier than you think. 2http://pkg-perl.alioth.debian.org/howto/RFP.html Tim Retout pkg-perl for users Getting involved - tools The Perl team uses tools to speed up packaging. alioth.debian.org for team management git for most packages http://bugs.debian.org/ Package Entropy Tracker (PET) IRC (#debian-perl on OFTC) Two mailing lists - one for discussion, one to receive automated messages http://pkg-perl.alioth.debian.org/ links to all of these.
    [Show full text]