<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3528109868797498320</id><updated>2024-11-06T08:24:48.130+05:30</updated><category term="RHCE"/><category term="Tips n Tricks"/><category term="Useful Linux commands"/><category term="System administration"/><category term="OS basics/internals"/><category term="More on Linux"/><category term="Kernel"/><category term="Servers configuration"/><category term="Grub"/><category term="Interview questions"/><category term="Shell scripting"/><category term="Virtulization"/><category term="permissions"/><category term="E-books"/><category term="Linux on windows"/><category term="Iptables"/><category term="Nagios"/><category term="ZFS"/><title type='text'>Things You Should Know About Linux !!!</title><subtitle type='html'>Basic Linux tips,Basic Linux tricks,Basic Linux configurations and Basic Linux troubleshooting.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://basicslinux.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>184</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-4765669089134660130</id><published>2010-06-29T11:45:00.000+05:30</published><updated>2010-06-29T11:45:00.433+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS basics/internals"/><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>Encrypting the Backup...</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;By now many of you might have come to know about the importance of backing up the data.To make the backed up data much more secure we have to encrypt the data so that,those who know the password can only check the data.    &lt;br /&gt;If you have ssl installed on your system, you can use it to encrypt your backup. &lt;/p&gt;  &lt;p&gt;&lt;em&gt;echo &amp;quot;your_key&amp;quot; &amp;gt; /tmp/.key&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;to save your data =&amp;gt; &lt;/p&gt;  &lt;p&gt;&lt;em&gt;tar cvf - files_to_save | openssl enc -des3 -salt -pass file:/tmp/.key &amp;gt;/dev/rmt0 &lt;/em&gt;&lt;/p&gt;  &lt;p&gt;&lt;em&gt;to restore your data =&amp;gt; &lt;/em&gt;&lt;/p&gt;  &lt;p&gt;&lt;em&gt;openssl enc -d -des3 -pass file:/tmp/.key &amp;lt;/dev/rmt0 | tar xvf - &lt;/em&gt;&lt;/p&gt;  &lt;p&gt;NOTE:DON&#39;T FORGET THE /tmp/.key file WHEN YOU ARE DONE WITH IT.!!!! &lt;/p&gt;  &lt;p&gt;Where,   &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; * /dev/rmt0 : Tape device name.    &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; * openssl : The OpenSSL toolkit command line utility.    &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; * tar : The tar archiving utility.    &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; * des3 : Triple-DES Cipher (Triple DES is the common name for the Triple Data Encryption Algorithm).    &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; * -salt : The -salt option should ALWAYS be used if the key is being derived from a password unless you want compatibility with previous versions of OpenSSL and SSLeay. Without the -salt option it is possible to perform efficient dictionary attacks on the password and to attack stream cipher encrypted data. The reason for this is that without the salt the same password always generates the same encryption key. When the salt is being used the first eight bytes of the encrypted data are reserved for the salt: it is generated at random when encrypting a file and read from the encrypted file when it is decrypted. (source enc man page) &lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4765669089134660130'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4765669089134660130'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/encrypting-backup.html' title='Encrypting the Backup...'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-6355952386452855910</id><published>2010-06-26T11:38:00.000+05:30</published><updated>2010-06-26T11:38:00.257+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>Changing Wordpress admin link to whatever you like.</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Every one might have heard about wordpress and those who have hosted their site using wordpress t will know that the default admin login link is given as wp-admin. So once the intruder gets the login page then he can try any tricks to crack into your hosted site.So for security purposes its better to hide ur admin login link so that it will be difficult for anyone to get find it…&lt;/p&gt;  &lt;p&gt;This is how it is done…..&lt;/p&gt;  &lt;p&gt;Locate your .htaccess file and edit it in the following way:&lt;/p&gt;  &lt;p&gt;Edit your .htaccess file and add the following lines: &lt;/p&gt;  &lt;p&gt;######################   &lt;br /&gt;RewriteEngine On    &lt;br /&gt;RewriteBase /    &lt;br /&gt;##### ABOVE THIS POINT IS ALREADY INSERTED BY WORD PRESS    &lt;br /&gt;##### Michi’s code is BELOW #####    &lt;br /&gt;RewriteCond %{REQUEST_URI} wp-admin/    &lt;br /&gt;RewriteCond %{QUERY_STRING} !YOURSECRETWORDHERE    &lt;br /&gt;RewriteRule .*\.php [F,L]    &lt;br /&gt;RewriteCond %{QUERY_STRING} !YOURSECRETWORDHERE    &lt;br /&gt;RewriteRule ^ADMINFOLDER/(.*) wp-admin/$1?%{QUERY_STRING}&amp;amp;YOURSECRETWORDHERE [L]    &lt;br /&gt;##### Dejavu’s code is ABOVE #####    &lt;br /&gt;##### BELOW THIS POINT IS ALREADY INSERTED BY WORD PRESS    &lt;br /&gt;RewriteCond %{REQUEST_FILENAME} !-f    &lt;br /&gt;RewriteCond %{REQUEST_FILENAME} !-d    &lt;br /&gt;RewriteRule . /index.php [L]    &lt;br /&gt;##################### &lt;/p&gt;  &lt;p&gt;Additional info:   &lt;br /&gt;* Change YOURSECRETWORDHERE to something else. It can be any word you want. Just make sure it’s unique and somewhat long. Make it, like, your pets name or something random. Read this post to understand why this matters.    &lt;br /&gt;* Change ADMINFOLDER to the new folder name you want. Letters, numbers, underscores, and dashes only. That ^ in front of it is on purpose. Don’t delete that. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Now your blog is a bit more secure than before….ENjoy..!!!!!!!!!!!&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/6355952386452855910'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/6355952386452855910'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/changing-wordpress-admin-link-to.html' title='Changing Wordpress admin link to whatever you like.'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-1314571123315994657</id><published>2010-06-24T10:53:00.000+05:30</published><updated>2010-06-24T10:53:00.688+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtulization"/><title type='text'>Virtual Box –folders sharing-Permission problem.</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;While sharing folders between host and a virtual machine using Virtual box, Sometimes you may face the problem that after a folder is shared to the virtual machine from host machine you don&#39;t find execute permissions on the files shared and if you try to set the execute permissions with chmod command that don&#39;t work. &lt;/p&gt;  &lt;p&gt;Here is an ugly way to make that work, if you are good at coding then you can&amp;#160; edit the vboxvfs kernel module (the joys of open source!).&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;font color=&quot;#ff0000&quot;&gt;NOTE: Do the steps at ur own risk..!!!&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;How to:    &lt;br /&gt;1. mount the VBoxGuestAdditions.iso (e.g. /media/cdrom0)     &lt;br /&gt;2. mkdir vbox &amp;amp;&amp;amp; cd vbox &amp;amp;&amp;amp; /media/cdrom0/VBoxLinuxAdditions.run --tar -xf     &lt;br /&gt;3. edit module/vboxvfs/utils.c, change line 96 &amp;quot;mode |= mode_set (IXUSR);&amp;quot; to &amp;quot;mode |= S_IXUSR;&amp;quot; (note addition of &amp;quot;S_&amp;quot; prefix... basically, always set executable flag)     &lt;br /&gt;4. sudo ./install.sh vfs-module     &lt;br /&gt;5. cd .. &amp;amp;&amp;amp; rm -rf vbox &lt;/p&gt;  &lt;p&gt;This sets the executable flag in the guest only (mode 700) for all shared files — the host still always gets mode 500 for newly created files. Hopefully a dev can make a proper fix. (slight improvement: set executable on new file creation, and keep file permissions in sync otherwise so non-executables in the host don&#39;t show up as executable in the guest) &lt;/p&gt;  &lt;p&gt;But at least this lets you to do some development within a shared directory...&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/1314571123315994657'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/1314571123315994657'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/virtual-box-folders-sharing-permission.html' title='Virtual Box –folders sharing-Permission problem.'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-6945586737417459707</id><published>2010-06-22T11:02:00.000+05:30</published><updated>2010-06-22T11:02:00.587+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtulization"/><title type='text'>Sharing files between Guest and Host machines in Virtual Box.</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;If you are using VMware as your virtualization software you will be able to copy files directly from the host to the guest OS, and vice versa. But unfortunately this feature does not exist in Virtual Box. Not yet at least. &lt;/p&gt;  &lt;p&gt;However, there is a very easy way you can share files between the host and guest when using Virtual Box – using Shared Folders. &lt;/p&gt;  &lt;p&gt;First you have to create folder in your Windows host. For example, create a folder on your desktop called “myshared“. &lt;/p&gt;  &lt;p&gt;Then start your Ubuntu VM. After you get to the desktop, press the right-Ctrl button so that your mouse pointer can move outside the Ubuntu desktop. From the menubar, go to Devices-&amp;gt; Shared Folders. After that click the Add New Shared Folder button and then browse to the folder you created earlier (myshared). Make sure you tick the “Make Permanent” checkbox. &lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcy1lyiGHD0snWlWDJp_D2QFfhkgMzzzV4gjm52zyv8h8xwNnPgj3A4rBvKXRK5XXSmfcsU7zIuXnrsLx8HEDM6LnBu237gdrmXBH65ma7zoZSOwh8gdX9Wi-Oj_vdkWjU2Jqmqq7gmtQ7/s1600-h/shared%20folder%5B6%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;shared folder&quot; border=&quot;0&quot; alt=&quot;shared folder&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLGb1g0P9FulGcL7CvnM2EQhGpucd5sUHQAzHXYx2EJoCdg90Fc6K52tVC5hrF9RBGhyphenhyphen4mNtHnJqGU-CNGjP1Jfi0C7_wfWqKTWpiargm9jGmbzLlNdpsBqcwZ50SItSF1ubZ-wTcgDZxq/?imgmax=800&quot; width=&quot;510&quot; height=&quot;366&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;After you have added the folder, click OK and return back to your Ubuntu desktop. Then create a folder in Ubuntu which will be used as the shared folder on the guest OS. For example, create a folder called “SharedItems” on your desktop. &lt;/p&gt;  &lt;p&gt;Then open a new Terminal window (Applications -&amp;gt; Accessories -&amp;gt; Terminal) and execute the following command: &lt;/p&gt;  &lt;p&gt;&lt;em&gt;&lt;strong&gt;sudo mount -t vboxsf &lt;font color=&quot;#ff0000&quot;&gt;myshared &lt;/font&gt;&lt;font color=&quot;#0080ff&quot;&gt;Desktop/SharedItems&lt;/font&gt;&lt;/strong&gt;&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;The text in red is the name of the shared folder in the Windows host and the text in blue is the directory path of the shared folder on the Ubuntu guest. &lt;/p&gt;  &lt;p&gt;Once you’ve done that, you can now share files between the two OSs by simply placing files in the folders.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;EnJoy..!!!!!!!!!!!!!!!!&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/6945586737417459707'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/6945586737417459707'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/sharing-files-between-guest-and-host.html' title='Sharing files between Guest and Host machines in Virtual Box.'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLGb1g0P9FulGcL7CvnM2EQhGpucd5sUHQAzHXYx2EJoCdg90Fc6K52tVC5hrF9RBGhyphenhyphen4mNtHnJqGU-CNGjP1Jfi0C7_wfWqKTWpiargm9jGmbzLlNdpsBqcwZ50SItSF1ubZ-wTcgDZxq/s72-c?imgmax=800" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-4691760123348707385</id><published>2010-06-20T11:02:00.001+05:30</published><updated>2010-06-20T11:47:38.858+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtulization"/><title type='text'>The way to Multibooting: VMware &amp;amp; VirtualBox &amp;amp; MS Virtual PC</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;This is all for those who try many operating systems at the same time... and those who want to test a dose of the newly released operating system...with out making any changes to your Master Boot Record or to your current system... &lt;/p&gt;  &lt;p&gt;1) You don&#39;t need to worry about partitioning if you are not aware of it. Here you can specify any of your harddisk drives for the purpose of storage for the other operating systems... The guest operating systems will use the free space available in the windows without harming anything to your files... &lt;/p&gt;  &lt;p&gt;2) You don&#39;t specifically need the installation cd/dvd of the operating system... an image file in .iso format will also do the same... &lt;/p&gt;  &lt;p&gt;3) You can create the files in the guest and can restrict the amount of HDD occupied by them... &lt;/p&gt;  &lt;p&gt;4) You can allocate no: of processors for the guest operating system out your dual/quad core processor... &lt;/p&gt;  &lt;p&gt;4) You can specify the amount of RAM for the guest since this ... &lt;/p&gt;  &lt;p&gt;so a lot of freedom and customization... no risks of careless partitioning.... &lt;/p&gt;  &lt;p&gt;For more details you can refer through these websites:&lt;/p&gt;  &lt;p&gt;&lt;a title=&quot;http://www.vmware.com/products/workstation/&quot; href=&quot;http://www.vmware.com/products/workstation/&quot;&gt;http://www.vmware.com/products/workstation/&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a title=&quot;http://www.virtualbox.org/&quot; href=&quot;http://www.virtualbox.org/&quot;&gt;http://www.virtualbox.org/&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/windows/virtual-pc/default.aspx&quot;&gt;http://www.microsoft.com/windows/virtual-pc/default.aspx&lt;/a&gt;&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4691760123348707385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4691760123348707385'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/way-to-multibooting-vmware-virtualbox.html' title='The way to Multibooting: VMware &amp;amp; VirtualBox &amp;amp; MS Virtual PC'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-7299911077518229351</id><published>2010-06-11T23:45:00.000+05:30</published><updated>2010-06-11T23:45:00.624+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>Softwares to Break BIOS Password:</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Softwares to Break BIOS Password: &lt;/p&gt;  &lt;p&gt;If your system boots but the BIOS password is still in place, there are several programs you can load that are designed to crack the passwords or clear them altogether. The encryption on BIOS passwords is not very complex. Following are links to a few of these free programs: &lt;/p&gt;  &lt;p&gt;1. CmosPwd 4.8   &lt;br /&gt;&lt;a href=&quot;http://www.softpedia.com/get/Security/Decrypting-Decoding/CmosPwd.shtml&quot;&gt;http://www.softpedia.com/get/Security/Decrypting-Decoding/CmosPwd.shtml&lt;/a&gt;    &lt;br /&gt;Article source: faq.programmerworld.net&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7299911077518229351'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7299911077518229351'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/softwares-to-break-bios-password.html' title='Softwares to Break BIOS Password:'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2225953634290632387</id><published>2010-06-09T23:44:00.000+05:30</published><updated>2010-06-09T23:44:00.207+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>Break BIOS Password for Laptop :</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Remember that laptops can be trickier, especially if it&#39;s a newer model. If it has a security chip on the motherboard forget about it. You either have to physically remove the chip or contact the mfg for the &amp;quot;master&amp;quot; password. If you can boot up off of a cd or floppy try any of these methods: &lt;/p&gt;  &lt;p&gt;1. Create a Win98SE bootable media &amp;quot;or anything that lets you boot into MS-DOS&amp;quot; and boot off of it.   &lt;br /&gt;2. When the A:\&amp;gt; prompt appears type debug and press enter.    &lt;br /&gt;3. You will then only see a &amp;quot;-&amp;quot;.    &lt;br /&gt;4. Type o 70 2E &amp;quot;include the spaces&amp;quot; and press Enter.    &lt;br /&gt;5. Type o 71 ff &amp;quot;include the spaces&amp;quot; and press Enter.    &lt;br /&gt;6. Type q and press Enter.    &lt;br /&gt;7. Here are a list of common mfg backdoor passwords    &lt;br /&gt;* AWARD BIOS    &lt;br /&gt;AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC,    &lt;br /&gt;* AMI BIOS    &lt;br /&gt;AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2225953634290632387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2225953634290632387'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/break-bios-password-for-laptop.html' title='Break BIOS Password for Laptop :'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2683889183397348691</id><published>2010-06-07T23:43:00.000+05:30</published><updated>2010-06-07T23:43:00.307+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>How to Break a BIOS Password?</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Methods of breaking password for Desktop PC and for laptop is quite different. We would explain each. &lt;/p&gt;  &lt;p&gt;Break BIOS Password for Desktop :   &lt;br /&gt;If it&#39;s a desktop PC, erasing the cmos memory will usually clear it. &lt;/p&gt;  &lt;p&gt;Steps: &lt;/p&gt;  &lt;p&gt;1. Power off the computer and make sure that it is unplugged.   &lt;br /&gt;2. Open up your computer case. You need physical access to the motherboard to complete this procedure.    &lt;br /&gt;3. Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery.    &lt;br /&gt;4. CAREFULLY remove the CMOS battery and leave it out for about 120- 180 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings)    &lt;br /&gt;5. Set the battery back into place and power on the computer.    &lt;br /&gt;6. The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should be fine.    &lt;br /&gt;7. You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password. &lt;/p&gt;  &lt;p&gt;Alternate Method: (More Difficult) &lt;/p&gt;  &lt;p&gt;Remove a jumper: There&#39;s a jumper on your motherboard that you&#39;ll need to identify and remove. Most motherboards make your job easier by actually labeling the correct jumper as &amp;quot;BIOS config&amp;quot; or something similar. (it looks like a small plastic thingy on 2 pins with 1 pin beside it, within a 1&amp;quot; of the battery). If you&#39;re having trouble looking for it, look in the motherboard manual.After you have found it, carefully pull straight up on it, and place it on the 2-3 pins(it was on the 1-2 pins). With the battery removed and the jumper moved, turn the computer on, and check to see if you can get into the bios. If you are able to, turn the computer off, put the jumper back on pins 1-2, and put the battery back in. Lastly put the case together and you are done. &lt;/p&gt;  &lt;p&gt;Note: Don&#39;t forget to configure the BIOS (if you know how) after this process. If you you don&#39;t know how, just hold the &amp;quot;delete&amp;quot; button when starting your PC and when the blue screen appears, find the load safe defaults settings and press: &lt;/p&gt;  &lt;p&gt;* ENTER button   &lt;br /&gt;* Y button    &lt;br /&gt;* F10 button&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2683889183397348691'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2683889183397348691'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/how-to-break-bios-password.html' title='How to Break a BIOS Password?'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-4860590987056519901</id><published>2010-06-03T23:35:00.000+05:30</published><updated>2010-06-03T23:35:00.480+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>Adding SWAP space to your machine.</title><content type='html'>&lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;&lt;em&gt;Procedure to add a swap file :&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;CHECK How much swap space u r having on ur machine... using &amp;quot;free&amp;quot; command and if u find ur swap is low then add a swap file to ur machine... &lt;/p&gt;  &lt;p&gt;You need to use dd command to create swap file. Next you need to use mkswap command to set up a Linux swap area on a device or in a file. &lt;/p&gt;  &lt;p&gt;1) Login as the root user &lt;/p&gt;  &lt;p&gt;2) Type following command to create 512MB swap file (1024 * 512MB = 524288 block size):   &lt;br /&gt;&lt;em&gt;# dd if=/dev/zero of=/swapfile1 bs=1024 count=524288&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;3) Set up a Linux swap area:   &lt;br /&gt;#&lt;em&gt; mkswap /swapfile1&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;4) Activate /swapfile1 swap space immediately:   &lt;br /&gt;&lt;em&gt;# swapon /swapfile1 &lt;/em&gt;&lt;/p&gt;  &lt;p&gt;5) To activate /swapfile1 after Linux system reboot, add entry to /etc/fstab file. Open this file using text editor such as vi:   &lt;br /&gt;&lt;em&gt;# vi /etc/fstab&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;Append following line:   &lt;br /&gt;&lt;em&gt;/swapfile1 swap swap defaults 0 0&lt;/em&gt; &lt;/p&gt;  &lt;p&gt;So next time Linux comes up after reboot, it enables the new swap file for you automatically. &lt;/p&gt;  &lt;p&gt;6) How do I verify swap is activated or not?   &lt;br /&gt;Simply use free command:    &lt;br /&gt;&lt;em&gt;$ free -m&lt;/em&gt;&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4860590987056519901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4860590987056519901'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/06/adding-swap-space-to-your-machine.html' title='Adding SWAP space to your machine.'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2741208939698410542</id><published>2010-05-31T23:24:00.000+05:30</published><updated>2010-05-31T23:24:00.679+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS basics/internals"/><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>How to change the dns server…</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;1. Take terminal from Applications -&amp;gt; accessories -&amp;gt; terminal &lt;/p&gt;  &lt;p&gt;2. Backup the resolv.conf file in the etc folder of the filesystem &lt;/p&gt;  &lt;p&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; $ sudo cp /etc/reasolv.conf&amp;#160;&amp;#160; /etc/resolv.conf.bak &lt;/p&gt;  &lt;p&gt;3. Edit the back up file to change the dns address    &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; $ sudo gedit /etc/resolv.conf.bak &lt;/p&gt;  &lt;p&gt;4. Replace the current domain address specified there with the dns&amp;#160; server address that gave you the minimum average time. &lt;/p&gt;  &lt;p&gt;Enter the other address below that in the same format if you wish..(Network manager opt for secondary address if the connection fails) &lt;/p&gt;  &lt;p&gt;5. That’s all about making the changes… The data that u have written in the back up file will long till u delete that file manually. &lt;/p&gt;  &lt;p&gt;6. Copy back the content of the backup file (resol.conf.bak) to the original &lt;/p&gt;  &lt;p&gt;resolv.conf after you connected to the internet whenever you want to change &lt;/p&gt;  &lt;p&gt;the address (before starting&amp;#160; browsing)&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2741208939698410542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2741208939698410542'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/05/how-to-change-dns-server.html' title='How to change the dns server…'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2888998284623574798</id><published>2010-05-30T23:18:00.001+05:30</published><updated>2010-05-30T23:49:57.129+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS basics/internals"/><category scheme="http://www.blogger.com/atom/ns#" term="Servers configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>How to find out the best dns server for your system?</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;In my previous post I have mentioned about some public DNS servers, that you can use instead of the servers mentioned by ur ISP.   &lt;br /&gt;Now you might be in a confusion that Which servers are best for you.    &lt;br /&gt;This checking simply consists of pinging from your system to all the nameservers one after another and to see the one that is having minimum average time to do this, take your terminal and type in as follows &lt;/p&gt;  &lt;p&gt;1: $ ping -c 5 8.8.8.8   &lt;br /&gt;2: Checkout the average time needed for the process.    &lt;br /&gt;Its shown in&amp;#160;&amp;#160; the terminal. Replace the address    &lt;br /&gt;8.8.8.8 with all other&amp;#160; dns addresses and repeat steps 1 and 2.&lt;/p&gt;  &lt;p&gt;Which ever DNS has the least average time is the one you are searching for.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2888998284623574798'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2888998284623574798'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/05/how-to-find-out-best-dns-server-for.html' title='How to find out the best dns server for your system?'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-4117178797171318628</id><published>2010-05-23T20:32:00.001+05:30</published><updated>2010-05-30T23:49:57.131+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><title type='text'>Something You want to know about Domain Name Servers :</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Domain Name servers are responsible for resolving the web address that you type in on the address bar of your web browser into&amp;#160; machine understandable IP addresses to locate the servers.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv57fkDxH7CA4csmtXJg3LX1yKAkyHYAXGmq7CgwqgmhwZgpocTqYToWpgXcbz3tYtWSTc3aA2wODM6yuGcEwE3WpgmCCLi9EwrtjxdeVD220Weof4uKQe1OCeiN880yfIApBVTDJpkvSh/s1600-h/DNS%5B4%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;DNS&quot; border=&quot;0&quot; alt=&quot;DNS&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj01w2_RnUamgAPiAltL3t_phZTAmiNi1kaLnc6PMlXzHHR6WjQnvdfZpXhNucl2Igsmv9Tbn80JzqUtV2SvpVjjeeJ5CwWqliazXGICeHtZ0GsTO_Dh-GEW8lGIodE6ZzYtAsig8wrInFa/?imgmax=800&quot; width=&quot;514&quot; height=&quot;357&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Almost all the internet service providers have their own dns servers for&amp;#160; this purpose… It is not strict rule that you have to use this dns servers for address resolution always.. some other public and free dns servers are available today.    &lt;br /&gt;Some of these kind of dns servers provides security against vulnerabilities in the internet, some are very much faster than the dns servers of your ISP..     &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;The ip of&amp;#160; best public dns servers available are&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;google public dns&lt;/em&gt;&lt;/strong&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; &lt;br /&gt;8.8.8.8     &lt;br /&gt;8.8.4.4     &lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;opendns&lt;/em&gt;&lt;/strong&gt;     &lt;br /&gt;208.67.220.220     &lt;br /&gt;208.67.222.222 &lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;dns advantage        &lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;156.154.70.1     &lt;br /&gt;156.154.71.1 &lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;others &lt;/em&gt;&lt;/strong&gt;    &lt;br /&gt;209.244.0.3     &lt;br /&gt;209.244.0.4&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;In Linux place the DNS IP’s in /etc/resolve.conf file.&lt;/p&gt;  &lt;p&gt;In windows place the DNS IP’s where you place your general DNS IP:&lt;/p&gt;  &lt;p&gt;(like as shown in the figure);&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyqSG8B2avfaePvEqMLEfv98ZY-2QSUHqW2X9HDG7PPTSmUnSODF9jC-8IXi9ghx2KQXPZfL6JxpRWC0LvGoYjeew6VqfEQmN_PBcDMkaIQc3AqsAD9sTgbOUO8eo98W5Md6_qkqgJajv9/s1600-h/google-public-dns-servers%5B10%5D.jpg&quot;&gt;&lt;img style=&quot;border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px&quot; title=&quot;google-public-dns-servers&quot; border=&quot;0&quot; alt=&quot;google-public-dns-servers&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXMvbY_T6bV8F5cC-tDO-80ogdEJjOtBcYk463-FRwz-8G26-3Q6PmjMAh40yXBzOo5J3pq-hfWpLQk2Qp4NznfxjCZekBH3sfAHrpnctfhC1FYjOHnkaB51DRtfaWO4Rt46NDne-iOnOs/?imgmax=800&quot; width=&quot;338&quot; height=&quot;291&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4117178797171318628'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4117178797171318628'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/05/something-you-want-to-know-about-domain.html' title='Something You want to know about Domain Name Servers :'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj01w2_RnUamgAPiAltL3t_phZTAmiNi1kaLnc6PMlXzHHR6WjQnvdfZpXhNucl2Igsmv9Tbn80JzqUtV2SvpVjjeeJ5CwWqliazXGICeHtZ0GsTO_Dh-GEW8lGIodE6ZzYtAsig8wrInFa/s72-c?imgmax=800" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-713999099700998319</id><published>2010-04-28T12:07:00.000+05:30</published><updated>2010-05-30T23:49:57.133+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>All You Should Know About: lsof</title><content type='html'>&lt;p&gt;Lsof follows Unix philosophy closely. It does just one task and it does it perfectly -- it lists information about files opened by processes. An open file may be a regular file, a directory, a NFS file, a block special file, a character special file, a shared library, a regular pipe, a named pipe, a symbolic link, a socket stream, an Internet socket, a UNIX domain socket, and many others. Since almost everything in Unix is a file, you can imagine how incredibly useful lsof is! &lt;/p&gt;  &lt;p&gt;How to use lsof? &lt;/p&gt;  &lt;p&gt;In this article I will try to present lsof based on as many use cases as I can think of. Let&#39;s start with the simplest (that you probably already know) and proceed to more complicated ones. &lt;/p&gt;  &lt;p&gt;List all open files. &lt;/p&gt;  &lt;p&gt;# lsof    &lt;br /&gt;Running lsof without any arguments lists all open files by all processes. &lt;/p&gt;  &lt;p&gt;Find who&#39;s using a file. &lt;/p&gt;  &lt;p&gt;# lsof /path/to/file    &lt;br /&gt;With an argument of a path to a file, lsof lists all the processes, which are using the file in some way. &lt;/p&gt;  &lt;p&gt;You may also specify several files, which lists all the processes, which are using all the files: &lt;/p&gt;  &lt;p&gt;# lsof /path/to/file1 /path/to/file2    &lt;br /&gt;Find all open files in a directory recursively. &lt;/p&gt;  &lt;p&gt;# lsof +D /usr/lib    &lt;br /&gt;With the +D argument lsof finds all files in the specified directory and all the subdirectories. &lt;/p&gt;  &lt;p&gt;Note that it&#39;s slower than the usual version with grep: &lt;/p&gt;  &lt;p&gt;# lsof | grep &#39;/usr/lib&#39;    &lt;br /&gt;It&#39;s slower because +D first finds all the files and only then does the output. &lt;/p&gt;  &lt;p&gt;List all open files by a user. &lt;/p&gt;  &lt;p&gt;# lsof -u Dejavu    &lt;br /&gt;The -u option (think user) limits output of files opened only by user Dejavu. &lt;/p&gt;  &lt;p&gt;You can use comma separated list of values to list files open by several users: &lt;/p&gt;  &lt;p&gt;# lsof -u rms,root    &lt;br /&gt;This will list all the files that are open by users rms and root. &lt;/p&gt;  &lt;p&gt;Another way to do the same is by using the -u option twice: &lt;/p&gt;  &lt;p&gt;# lsof -u rms -u root    &lt;br /&gt;Find all open files by program&#39;s name. &lt;/p&gt;  &lt;p&gt;# lsof -c apache    &lt;br /&gt;The -c option selects the listing of files for processes whose name begins with apache. &lt;/p&gt;  &lt;p&gt;So instead of writing: &lt;/p&gt;  &lt;p&gt;# lsof | grep foo    &lt;br /&gt;You can now write the shorter version: &lt;/p&gt;  &lt;p&gt;# lsof -c foo    &lt;br /&gt;In fact, you can specify just the beginning part of the process name you&#39;re looking for: &lt;/p&gt;  &lt;p&gt;# lsof -c apa    &lt;br /&gt;This will list all the open files by a processes whose starts with apa. &lt;/p&gt;  &lt;p&gt;You can also specify several -c options to output open files by several processes: &lt;/p&gt;  &lt;p&gt;# lsof -c apache -c python    &lt;br /&gt;This will list all open files by apache and python. &lt;/p&gt;  &lt;p&gt;List all open files by a user OR process. &lt;/p&gt;  &lt;p&gt;# lsof -u Dejavu -c apache    &lt;br /&gt;Lsof options can be combined. The default is to OR between options. It means it will combine outputs of -u Dejavu and -c apache producing a listing of all open files by Dejavu and all open files by apache. &lt;/p&gt;  &lt;p&gt;List all open files by a user AND process. &lt;/p&gt;  &lt;p&gt;# lsof -a -u Dejavu -c bash    &lt;br /&gt;Notice the -a option. It combines the options with AND. The output listing is files opened by bash, which is run under Dejavu user. &lt;/p&gt;  &lt;p&gt;List all open files by all users EXCEPT root. &lt;/p&gt;  &lt;p&gt;# lsof -u ^root    &lt;br /&gt;Notice the ^ character before root username. It negates the match and causes lsof print all open files by all users who are not root. &lt;/p&gt;  &lt;p&gt;List all open files by the process with PID. &lt;/p&gt;  &lt;p&gt;# lsof -p 1    &lt;br /&gt;The -p option (think PID) filters out open files by program&#39;s id. &lt;/p&gt;  &lt;p&gt;Remember that you can select multiple PIDs by either comma separating the list or using multiple -p arguments: &lt;/p&gt;  &lt;p&gt;# lsof -p 450,980,333    &lt;br /&gt;This selects processes with PIDs 450, 980 and 333. &lt;/p&gt;  &lt;p&gt;List all open files by all the processes EXCEPT process with PID. &lt;/p&gt;  &lt;p&gt;# lsof -p ^1    &lt;br /&gt;Here the negation operator ^ is used again. It inverts the list and does not include process with PID 1. &lt;/p&gt;  &lt;p&gt;List all network connections. &lt;/p&gt;  &lt;p&gt;# lsof -i    &lt;br /&gt;Lsof with -i option lists all processes with open Internet sockets (TCP and UDP). &lt;/p&gt;  &lt;p&gt;List all TCP network connections. &lt;/p&gt;  &lt;p&gt;# lsof -i tcp    &lt;br /&gt;The -i argument can take several options, one of them is tcp. The tcp option forces lsof to list only processes with TCP sockets. &lt;/p&gt;  &lt;p&gt;List all UDP network connections. &lt;/p&gt;  &lt;p&gt;# lsof -i udp    &lt;br /&gt;The udp option causes lsof to list processes with UDP sockets. &lt;/p&gt;  &lt;p&gt;Find who&#39;s using a port. &lt;/p&gt;  &lt;p&gt;# lsof -i :25    &lt;br /&gt;The :25 option to -i makes lsof find processes using TCP or UDP port 25. &lt;/p&gt;  &lt;p&gt;You may also use service port name (found in /etc/services) rather than port number: &lt;/p&gt;  &lt;p&gt;# lsof -i :smtp    &lt;br /&gt;Find who&#39;s using a specific UDP port. &lt;/p&gt;  &lt;p&gt;# lsof -i udp:53    &lt;br /&gt;Similarly, to find who&#39;s using a TCP port, use: &lt;/p&gt;  &lt;p&gt;# lsof -i tcp:80    &lt;br /&gt;Find all network activity by user. &lt;/p&gt;  &lt;p&gt;# lsof -a -u hacker -i    &lt;br /&gt;Here the -a option combines -u and -i to produce listing of network file usage by user hacker. &lt;/p&gt;  &lt;p&gt;List all NFS (Network File System) files. &lt;/p&gt;  &lt;p&gt;# lsof -N    &lt;br /&gt;This option is easy to remember because -N is NFS. &lt;/p&gt;  &lt;p&gt;List all Unix domain socket files. &lt;/p&gt;  &lt;p&gt;# lsof -U    &lt;br /&gt;This option is also easy to remember because -U is Unix. &lt;/p&gt;  &lt;p&gt;List all files for processes with a specific group id. &lt;/p&gt;  &lt;p&gt;# lsof -g 1234    &lt;br /&gt;Process groups are used to logically group processes. This example finds all files opened by processes with PGID 1234. &lt;/p&gt;  &lt;p&gt;List all files associated with specific file descriptors. &lt;/p&gt;  &lt;p&gt;# lsof -d 2    &lt;br /&gt;This lists all files that have been opened as file descriptor 2. &lt;/p&gt;  &lt;p&gt;You may also specify ranges of file descriptors: &lt;/p&gt;  &lt;p&gt;# lsof -d 0-2    &lt;br /&gt;This would list all files with file descriptors 0, 1 and 2. &lt;/p&gt;  &lt;p&gt;There are also many special values, such as mem, that lists memory-mapped files: &lt;/p&gt;  &lt;p&gt;# lsof -d mem    &lt;br /&gt;Or txt for programs loaded in memory and executing: &lt;/p&gt;  &lt;p&gt;# lsof -d txt    &lt;br /&gt;Output PIDs of processes using some resource. &lt;/p&gt;  &lt;p&gt;# lsof -t -i    &lt;br /&gt;The -t option outputs only PIDs of processes. Used together with -i it outputs PIDs of all processes with network connections. It&#39;s easy to kill all processes that use network: &lt;/p&gt;  &lt;p&gt;# kill -9 `lsof -t -i`    &lt;br /&gt;Repeat listing files. &lt;/p&gt;  &lt;p&gt;# lsof -r 1    &lt;br /&gt;The -r option makes lsof repeatedly list files until interrupted. Argument 1 means repeat the listing every 1 second. This option is best combined with a narrower query such as monitoring user network file activity: &lt;/p&gt;  &lt;p&gt;# lsof -r 1 -u john -i -a    &lt;br /&gt;How to install lsof? &lt;/p&gt;  &lt;p&gt;Lsof comes preinstalled on many Unix systems. If your system doesn&#39;t have it, try to install it from the source. &lt;/p&gt;  &lt;p&gt;BSD supplies its own utility that does similar things, it&#39;s called fstat. &lt;/p&gt;  &lt;p&gt;For the full documentation of lsof see the man lsof page or type lsof -h for a small cheat sheet. &lt;/p&gt;  &lt;p&gt;Have fun with lsof!&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/713999099700998319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/713999099700998319'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/04/all-you-should-know-about-lsof.html' title='All You Should Know About: lsof'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-7522205196205833788</id><published>2010-04-25T11:49:00.001+05:30</published><updated>2010-04-25T11:49:05.347+05:30</updated><title type='text'>Fixing Windows XP Master Boot Record (MBR)</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2BoGtEgwbLk6S-MX5ZgvPhAX5gYIwb50i533y1fV6xjNn2CxGA5LTc7PT3PQU-Lfyse9ampuYI6g4I9x0fYW3HmKmMAHLrZobkZFEtUaVv4B4TERoT7KIG082Zn9zRvs7pgcsEXSrNypB/s1600-h/fixmbr%5B4%5D.jpg&quot;&gt;&lt;img style=&quot;border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px&quot; title=&quot;fixmbr&quot; border=&quot;0&quot; alt=&quot;fixmbr&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5Sw9i7v76eOuXJ36uGo6RISOoa4tza5viJpYC95THwjNpPvrEmpY-l-iFAieds6tkRBOzKVljy78PhN_Df3Of5lKB-0__5EX6DVmTJbZx7VtaFxbVfAXxZ1KGCtUPaUWGRT3jnBOKpdCj/?imgmax=800&quot; width=&quot;504&quot; height=&quot;314&quot; /&gt;&lt;/a&gt;&amp;#160; &lt;/p&gt;  &lt;p&gt;After installing a Linux distro on a Windows XP machine, the GRUB boot loader, or other Linux boot loader, will appear when the PC boots. It gives you the option of which operating system to start. GRUB usually makes Linux the default OS, so it will start automatically when the PC is turned on. &lt;/p&gt;  &lt;p&gt;If you ever delete the Linux distro and don’t have Windows set as the OS that will boot when the PC is powered on, Windows might not start and will give an error message. &lt;/p&gt;  &lt;p&gt;An easy way to fix the Windows XP master boot record is to use the Windows Install CD. &lt;/p&gt;  &lt;p&gt;1) Insert the Windows XP Install CD and reboot the computer.    &lt;br /&gt;2) When “Press any key to boot from CD” appears, press any key.     &lt;br /&gt;3)When the “Welcome to Setup” screen appears, press R to enter the Recovery&amp;#160; Console.     &lt;br /&gt;4)When asked which Windows installation to log onto, enter the number for the correct Windows install, then press Enter.     &lt;br /&gt;5)Type the Administrator password or just press Enter if there isn’t one.     &lt;br /&gt;6)Type FIXMBR and press Enter.     &lt;br /&gt;7) It will ask if you are sure you want to write a new MBR. Type y and press Enter.     &lt;br /&gt;It should say “The new master boot record has been successfully written”. Type exit and press Enter to reboot the computer.     &lt;br /&gt;8) Remove the Installation CD as soon as the computer powers up so it won’t boot from the CD again. &lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPokaAIrQOIgZ-TOhkfpzIPX3pSOR-4jbR725vj4kz6jut2Zvh3PqWoV6qKvooCdjkerkfs6QmarVbNcbcuGl_pbxOPF0PzoEOcWbJpAzyYvb4VxG7eTjTFlvY1f1PH_u6ETSUMk_1u7hQ/s1600-h/fix_mbr%5B5%5D.gif&quot;&gt;&lt;img style=&quot;border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px&quot; title=&quot;fix_mbr&quot; border=&quot;0&quot; alt=&quot;fix_mbr&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpDVQDl6j92wORvNcLT21jS9aa-cdszctUDDPK_uMATrsu0FVJ_u0JJipKTTmeSx9HDIYbgDWGQCcIWRG5QxZShMt17FXZh4cvskTqSdXih8s061Gr-b3aabzb9naOcPis83ltyMiYW6Kh/?imgmax=800&quot; width=&quot;503&quot; height=&quot;389&quot; /&gt;&lt;/a&gt;     &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;The computer should now boot into Windows.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7522205196205833788'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7522205196205833788'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/04/fixing-windows-xp-master-boot-record.html' title='Fixing Windows XP Master Boot Record (MBR)'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5Sw9i7v76eOuXJ36uGo6RISOoa4tza5viJpYC95THwjNpPvrEmpY-l-iFAieds6tkRBOzKVljy78PhN_Df3Of5lKB-0__5EX6DVmTJbZx7VtaFxbVfAXxZ1KGCtUPaUWGRT3jnBOKpdCj/s72-c?imgmax=800" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-7073195774862849086</id><published>2010-04-01T00:22:00.000+05:30</published><updated>2010-04-01T00:22:00.201+05:30</updated><title type='text'>Birth of The Linux Kernel :</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;In the early days of Unix, universities used Unix as a vehicle for teaching computer science students about operating systems. When AT&amp;amp;T asserted its proprietary claim to Unix, universities needed a replacement. Andrew Tannenbaum created a Unix-like operating system called &lt;i&gt;MINIX&lt;/i&gt;, which became popular as a teaching tool. However, unlike Unix, MINIX was designed primarily as a pedagogical tool and performed relatively poorly. In 1990, Finnish computer science student Linus Torvalds began work on a memory manager for Intel-architecture PCs. At some point he realized that his work could be extended to operate as a Unix &lt;i&gt;kernel&lt;/i&gt;. In August 1991, he posted his work-in-progress to the Internet newsgroup &lt;b&gt;&lt;i&gt;comp.os.minix&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;, &lt;/i&gt;&lt;/b&gt;inviting others to request features to be considered for implementation:&lt;/p&gt;  &lt;p&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX_r7GeX3BdL5GNV3QZD3PqeT7xn9YuCVisi8gA2FCS7B3IV4n41EBotuH6hgmwQSOT_9FP7-wgYJoetXUD6yutzwS8EEfZvzZpAsQpgxAkzCqu6eJLYgFaiJmPVnyKsNbVG66O7znmxSg/s1600-h/tuxbday%5B7%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;tuxbday&quot; border=&quot;0&quot; alt=&quot;tuxbday&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyIHlBURpP7lHuW7qDQbUzC_pZJ3OPFn6mWoaHr7ULKD8UdQn5lrnz-Fe4wpqMPVJvdj-oiV9dZ030redp8sG9eYlh1LnFjJdz0O_YDE70T7fA6prIeUK-ycDY1tbgcfbtvxP7ifjiCjZ_/?imgmax=800&quot; width=&quot;388&quot; height=&quot;308&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;From: torvalds@klaava.Helsinki.FI (Linus Benedict Torvalds)&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Newsgroups: comp.os.minix&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Subject: What would you like to see most in minix?&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Summary: small poll for my new operating system&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Message-ID: &amp;lt;1991Aug25.205708.9541@klaava.Helsinki.FI&amp;gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Date: 25 Aug 91 20:57:08 GMT&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Organization: University of Helsinki&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Hello everybody out there using minix -I&#39;m doing a (free) operating system (just a hobby, won&#39;t be big and professional like gnu) for 386(486) AT clones. This has been brewing since april, and is starting to get ready. I&#39;d like any feedback on things people like/dislike in minix, as my OS resembles it somewhat(same physical layout of the file-system (due &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;to practical reasons)among other things). &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;I&#39;ve currently ported bash(1.08) and gcc(1.40), and things seem to work. This implies that I&#39;ll get something practical within a few months, and I&#39;d like to know what features most people would want. &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;Any suggestions are welcome, but I won&#39;t promise I&#39;ll implement them :-) &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Linus (torvalds@kruuna.helsinki.fi)&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;PS. Yes - it&#39;s free of any minix code, and it has a multi-threaded fs.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;It is NOT protable [sic](uses 386 task switching etc), and it&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;probably never will support anything other than AT-harddisks, as that&#39;s all I have :-(.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Torvalds called his operating system kernel Linux, for Linus’s Minix. Unix programmers eagerly offered help in developing Linux. Because Stallman’s GNU project had completed almost all of the components needed for its Unix like operating system except the kernel, Linux and GNU were a natural marriage.In 1994, about three years after Torvalds’s posting, Linux 1.0 was released under the terms of the GPL. Already, Linux had about 100,000 users.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;AT PRESENT THE LINUX DEVELOPMENT PROCESS IS GOING LIKE THIS :&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgosqKEoLWioF0DoYK_i3ph45ttuQKC8OgETxHrsTn9afl2_OR2jixfhgP0-hhkxK0kvflT2OB9fAU51QzAOCTKyyOqbwGtjr9IKzCE5Z9phvXBtnoMbhD5EvcavLWDvMhaR1Vi7IS9vVrC/s1600-h/linux_dev_process_final%5B7%5D.png&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;linux_dev_process_final&quot; border=&quot;0&quot; alt=&quot;linux_dev_process_final&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqlENtiXf0COyW30OyXNgf-ZPJU-DfQXczSciTJW39PGvZ9_-ML_DTYxsEgfrNbjGlKunZddmmMzul_uQwT_KJWFc8Sh8eEwLx28UcnYvt3VpAaaPN1OB-vC_BLvWyWNus8tjj18q3z7dK/?imgmax=800&quot; width=&quot;510&quot; height=&quot;382&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7073195774862849086'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/7073195774862849086'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/04/birth-of-linux-kernel.html' title='Birth of The Linux Kernel :'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyIHlBURpP7lHuW7qDQbUzC_pZJ3OPFn6mWoaHr7ULKD8UdQn5lrnz-Fe4wpqMPVJvdj-oiV9dZ030redp8sG9eYlh1LnFjJdz0O_YDE70T7fA6prIeUK-ycDY1tbgcfbtvxP7ifjiCjZ_/s72-c?imgmax=800" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-391322837923649530</id><published>2010-03-26T09:58:00.000+05:30</published><updated>2010-03-28T09:42:32.863+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Kernel"/><category scheme="http://www.blogger.com/atom/ns#" term="OS basics/internals"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>Linux kernel Versions:</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiysz2JOUlGYWPnMm1Loe86D7UBqQPNvbRctcAKVWE_VqhXA6FjP0HE8q0tTZsTxerHNxdCSGuvn_dIX0mFXDlZnbm3TDlVXAwh2UpTy9tGws6HYaR4vlGzGCl8oi_ziC885fmererRcxvN/s1600-h/Linux_kernel_diagram%5B5%5D.png&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;Linux_kernel_diagram&quot; border=&quot;0&quot; alt=&quot;Linux_kernel_diagram&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_zUTD4JUjGLBbleARCAnYxdpt00XzPvDYxRX8IISpvU4EH7RcONy7QhB2A-ib8Zs9gyiuSK1O_y3N347do0Xoilbfp6axfIZCSXG-bnXuRP9WWogtVRVHSIK14wodCDBtHZlKcTYbX0H9/?imgmax=800&quot; width=&quot;512&quot; height=&quot;379&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Linux kernels are numbered using an even/odd system. An even-numbered&lt;/p&gt;  &lt;p&gt;kernel—for example, Linux 2.2—is called a called stable kernel.&lt;/p&gt;  &lt;p&gt;Changes are generally made to a stable kernel only to fix bugs and problems.&lt;/p&gt;  &lt;p&gt;An odd-numbered kernel—for example, Linux 2.3—is called a development&lt;/p&gt;  &lt;p&gt;kernel. Development kernels are works-in-progress and sometimes contain&lt;/p&gt;  &lt;p&gt;bugs, some of which are serious. Most Linux users work with stable kernels,&lt;/p&gt;  &lt;p&gt;reserving spare computers for testing development kernels. &lt;/p&gt;  &lt;p&gt;At the time I’m writing this post , Linux 2.6.33.1 is the latest stable kernel.&lt;/p&gt;  &lt;p&gt;You can download it from &lt;a href=&quot;http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.33.1.tar.bz2&quot; target=&quot;_blank&quot;&gt;HERE&lt;/a&gt; .&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/391322837923649530'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/391322837923649530'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/linux-kernel-versions.html' title='Linux kernel Versions:'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_zUTD4JUjGLBbleARCAnYxdpt00XzPvDYxRX8IISpvU4EH7RcONy7QhB2A-ib8Zs9gyiuSK1O_y3N347do0Xoilbfp6axfIZCSXG-bnXuRP9WWogtVRVHSIK14wodCDBtHZlKcTYbX0H9/s72-c?imgmax=800" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2955461348812473842</id><published>2010-03-26T01:35:00.000+05:30</published><updated>2010-03-28T09:43:30.916+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>How to set multiple IP addresses using Linux command line ?</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Go to &lt;i&gt;/etc/sysconfig/network-scripts&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Make multiple copies of &lt;i&gt;ifcfg-eth0 &lt;/i&gt;and name them as &lt;i&gt;ifcfg-eth0:0, ifcfg-eth0:1&lt;/i&gt; etc.&lt;/p&gt;  &lt;p&gt;Open each of them and at least change the IPADDR to your chosen IP address and the NETMASK to the subnet mask for that IP address.&lt;/p&gt;  &lt;p&gt;A sample entry would look like this:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;DEVICE=eth0:0&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;BOOTPROTO=static&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;IPADDR=34.123.111.21&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;NETMASK=255.255.255.0&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;ONBOOT=yes&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Restart the network:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;/sbin/service network restart&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;You are done!&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2955461348812473842'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2955461348812473842'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/how-to-set-multiple-ip-addresses-using.html' title='How to set multiple IP addresses using Linux command line ?'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-4471115137528591843</id><published>2010-03-24T01:34:00.000+05:30</published><updated>2010-03-28T09:43:30.917+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>SSH Without Password Authentication</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Often you need to remotely run utilities on other machines through unattended batch process or cron job. ssh allows you to execute code on remote machine. However in normal usage it prompts you for password which makes it hard to use in unattended processes. Here is a simple way to eliminate the need for specifying password every time when connecting through ssh.&lt;/p&gt;  &lt;p&gt;Let&#39;s assume your want to connect to remote machine named remote as user named user.&lt;/p&gt;  &lt;p&gt;You need to first, and only once, generate a private-public keypair using ssh-keygen as follows:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;ssh-keygen -t dsa&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;This will create a private and public keypair which is stored in ~/.ssh directory.&lt;/p&gt;  &lt;p&gt;Next run the following command once for every machine you want to remotely login without specifying password:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;scp ~/.ssh/id_dsa.pub user@remote:~user/.ssh/authorized_keys&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Now you can login to the machine using ssh without requiring to specify any password. Your public key, which you copied to the remote machine, is checked (not directly) against your private key to verify your authenticity.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4471115137528591843'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/4471115137528591843'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/ssh-without-password-authentication.html' title='SSH Without Password Authentication'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-241068954118297514</id><published>2010-03-21T01:33:00.000+05:30</published><updated>2010-03-28T09:43:30.918+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>One Linux Formatting Tip I Bet You Didn’t Know:</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;You probably know how you can format a Linux partition:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;mkfs.ext3 /dev/hda&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;This formats the partition with ext3 file system. However did you know how to extract maximum space out of this partition, especially if it a large partition?&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;How to maximize available space in a partition?&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Enter the magical &lt;i&gt;-m&lt;/i&gt; option. If the file system becomes filled and there is no more space to write, it is basically unusable because the operating system is constantly writing to disk. By default, five percent of the partition is reserved for use by the root user. This allows root to conduct administrative activities on the partition and perhaps move some data off. Firstly, this is most critical when the partition contains / or home directories. For pure data partitions, this is just lost space. Five percent of a 250Gb partition is 12.5 Gb. Especially in the case of large partitions, it is safe to set the reserved space to the minimum, which is one percent.&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;mkfs.ext3 -m 1 /dev/hdb1&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;creates a file system with only 1% of its space reserved for the root user.&lt;/p&gt;  &lt;p&gt;Note: You can use &lt;i&gt;tune2fs -m&lt;/i&gt; later to adjust the reserved blocks after data is loaded on the partition.&lt;/p&gt;  &lt;p&gt;Bonus tip: How to label a partition&lt;/p&gt;  &lt;p&gt;Use&lt;i&gt; -L&lt;/i&gt; with &lt;i&gt;mkfs.ext3&lt;/i&gt; to add a label to the partition. You can later refer to this label instead of the device name when mounting. This provides the same functionality as e2label which can be used to label a partition later.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/241068954118297514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/241068954118297514'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/one-linux-formatting-tip-i-bet-you.html' title='One Linux Formatting Tip I Bet You Didn’t Know:'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-1168782001254942123</id><published>2010-03-20T01:33:00.000+05:30</published><updated>2010-03-28T09:43:30.919+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>Tracing system cals in linux</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;There are certain programs in Linux for which the source is not readily available. There is an useful diagnostic, instructional, and debugging tool for Linux to solve it. The system intercepts and records the system calls that are called by process and the signals which are received by a process. It also gives students and hackers a great chance to learn about system and system calls by tracing even ordinary programs. Let&#39;s a pick at the useful tool.&lt;/p&gt;  &lt;p&gt;Here&#39;s the simple tool to trace calls and signals&lt;/p&gt;  &lt;p&gt;&lt;i&gt;strace&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;This will output a great amount of data on to the screen. If it is hard to keep track of the scrolling mass of data, then there is an option to write the output of strace to a file instead which is done using the -o option.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/1168782001254942123'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/1168782001254942123'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/tracing-system-cals-in-linux.html' title='Tracing system cals in linux'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-2113097041804291727</id><published>2010-03-19T01:32:00.000+05:30</published><updated>2010-03-28T09:43:30.920+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>Block IP Addresses On Linux Server</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;I hope by now all of you have heard about firewalls. In linux we generally use IPtables for controlling the traffic as per our requirement.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;From Wikipedia&lt;/i&gt;&lt;/b&gt;:&lt;i&gt; IPtables is a user space application program that allows a system administrator to configure the tables provided by the Linux kernel firewall &lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;(implemented as different Netfilter modules) and the chains and rules it stores.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;Iptables requires elevated privileges to operate and must be executed by user root, otherwise it fails to function. &lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Now let us go to our scenario:&lt;/p&gt;  &lt;p&gt;Take a look at your log file (/var/log/secure for REDHAT/Fedora ) and you will discover numerous automated ssh hacking attempts using dictionary attack. So now you have identified the offending addresses. How do you stop them?&lt;/p&gt;  &lt;p&gt;Here comes the magic mantra which uses iptables (packet) firewall:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;iptables -A INPUT -s a.b.c.d -j DROP&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Replace a.b.c.d with the offending IP address. Repeat this for each of the offending IP addresses.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2113097041804291727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/2113097041804291727'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/block-ip-addresses-on-linux-server.html' title='Block IP Addresses On Linux Server'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-5865931474304177761</id><published>2010-03-18T01:32:00.000+05:30</published><updated>2010-03-28T09:43:45.412+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Servers configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="System administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Useful Linux commands"/><title type='text'>Install of Apache, SSL, PHP, MySQL in linux</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;The following steps will show you how to install the Apache web server on GNU/Linux. This install also includes installing mod_ssl, MySQL and PHP4.You may encounter problems compiling any one of these tarballs. It is up to you to fix the problems. This install assumes that you have everything you need to do all of the compiles. The x&#39;s in each file name stands for what ever the version number is at the time you download it.&lt;/p&gt;  &lt;p&gt;Download and extract all the source tarballs.&lt;/p&gt;  &lt;p&gt;The following are links to the sites you will need to download the source files. Go to each sites download section and download the latest version of each piece of software. After you have downloaded them all to the same directory we are going to unzip and untar them.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Apache http://www.apache.org/dyn/closer.cgi&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Openssl http://openssl.org/&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;ModSSL http://www.modssl.org/&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;Php.net&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;MySQL.com (Download the Linux binary version)&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;tar -xvzf apache_1.3.xx.tar.gz&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;tar -xvzf openssl-0.9.Xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;tar -xvzf mod_ssl-2.X.xx-1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;tar -xvzf php-4.X.x.tar.gz&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Install MySQL (binary version)&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;groupadd mysql&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;useradd -g mysql mysql&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd /usr/local&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;gunzip &amp;lt; /path/to/mysql-VERSION-OS.tar.gz | tar xvf -&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;ln -s full-path-to-mysql-VERSION-OS mysql&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd mysql&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;scripts/mysql_install_db&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;chown -R root .&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;chown -R mysql data&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;chgrp -R mysql .&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;bin/safe_mysqld --user=mysql &amp;amp;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;or&lt;/p&gt;  &lt;p&gt;&lt;i&gt;bin/mysqld_safe --user=mysql &amp;amp;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;## if you are running MySQL 4.x&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Build OpenSSL&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd openssl-0.9.Xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./config&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make test&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make install&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Patch Apache with mod_ssl&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd mod_ssl-2.X.xx-1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./configure --with-apache=../apache_1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Preconfigure Apache for PHP&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd apache_1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./configure --prefix=/usr/local/apache&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Configure PHP and compile it for Apache&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd php-4.x.x&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;CFLAGS=&#39;-O2 -I../openssl-0.9.Xx&#39;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./configure --with-apache=../apache_1.3.xx --with-mysql&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make install&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;or&lt;/p&gt;  &lt;p&gt;You can configure and compile a ton of other things into PHP.Make sure if you compile these other things in that you scan back thru the configure output to make sure all of the things you tried to compile in were found. If you install the libjpeg,freetype,libpng,and zlib on RedHat you just need to put /usr in for the directory. Other paths refer to the areas the library&#39;s were installed and compiled. Type: ./configure --help to see all of the things you can configure PHP with. My config line looks like this:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./configure \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-gd=/usr \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-mysql \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-png-dir=/usr \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-zlib-dir=/usr \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-ttf=/tmp/freetype-2.0.5/ \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-freetype-dir=/tmp/freetype-2.0.x \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-jpeg-dir=/usr \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-mcrypt=/tmp/libmcrypt \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--with-apache=../apache_1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make install&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Build Apache with mod_ssl and PHP&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd apache_1.3.xx&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;SSL_BASE=../openssl-0.9.Xx \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;./configure \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--prefix=/usr/local/apache \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--enable-module=ssl \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--activate-module=src/modules/php4/libphp4.a \&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;--enable-module=php4&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make certificate &amp;lt;--Optional step.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;make install&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;cd ..&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Configure Apache&#39;s Preferences File&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;vi /usr/local/apache/conf/httpd.conf&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;See the Apache documentation on how to configure your Apache httpd.conf.&lt;/p&gt;  &lt;p&gt;Start your Apache server&lt;/p&gt;  &lt;p&gt;&lt;i&gt;Service httpd start&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;That&#39;s it, enjoy!&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/5865931474304177761'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/5865931474304177761'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/install-of-apache-ssl-php-mysql-in.html' title='Install of Apache, SSL, PHP, MySQL in linux'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-9059993809398266763</id><published>2010-03-15T01:31:00.000+05:30</published><updated>2010-03-28T09:40:44.946+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS basics/internals"/><title type='text'>Difference between Hardlink and Soft link…</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;A hard link cannot span file systems.&lt;/p&gt;  &lt;p&gt;A soft link can point to files anywhere on the network.&lt;/p&gt;  &lt;p&gt;All hard links share the same inode number.&lt;/p&gt;  &lt;p&gt;Each soft link has a unique inode number.&lt;/p&gt;  &lt;p&gt;If you delete the source hard link file you can still access the other one. However, with a soft link, if you delete the source link, you cannot access the other one.&lt;/p&gt;  &lt;p&gt;With a soft link, you can create a symbolic link to a file that does not exist yet. You cannot create a hard link unless the source file already exists.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/9059993809398266763'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/9059993809398266763'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/difference-between-hardlink-and-soft.html' title='Difference between Hardlink and Soft link…'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-3601121793768064402</id><published>2010-03-14T01:30:00.000+05:30</published><updated>2010-03-28T09:40:53.102+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Grub"/><title type='text'>What’s new in GRUB2 ?</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;GRUB2 has recently released its version 1.98 with many added functionalities. The last version of GRUB, GRUB 1.97 which was later renamed to GRUB2 brought major changes to GRUB. This made common software based on the initial version of GRUB, namely SUM, useless. It also caused a reduced functionality. Putting windows as the preferred OS also required more than just moving the codes up and down. It required us to read the script and understand how it works before attempting any hack and mod.&lt;/p&gt;  &lt;p&gt;Following the success of the modular GRUB2, there has been an update in GRUB2. The latest version comes with many changes like,&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Support for multiple terminals.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* New GRUB reboot.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Storing passwords in an encrypted format.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Unit testing framework.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Support for GNU/HURD.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;These are only some changes made over the new features of GRUB2. The features of GRUB2 include,&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Cygwin compatibility.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Password protection.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* EXT4 File system support.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;* Ability to load new kernels.&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;This makes GRUB2 an instant hit with many security features. The only thing that I miss with GRUB2, is the level of customization. It would really help if a fully functional version of SUM is ported over to run with GRUB2.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/3601121793768064402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/3601121793768064402'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/whats-new-in-grub2.html' title='What’s new in GRUB2 ?'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-3528109868797498320.post-3601763646721549737</id><published>2010-03-13T01:29:00.000+05:30</published><updated>2010-03-13T01:29:00.247+05:30</updated><title type='text'>How to Hack Windows Administrator Password Through Linux</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;With all the good intentions you can think of, name it a tutorial purpose or something to learn purely for the fun and never to harm anyone, I will now show you a simple way to hack a Windows administrator password using Linux. You will only need a Live CD, and for this example, we will utilize Ubuntu.&lt;/p&gt;  &lt;p&gt;Boot into the system Which you want to reset by using the LIVE CD:&lt;/p&gt;  &lt;p&gt;1. Install a program called &lt;i&gt;chntpw&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;$ sudo apt-get install chntpw&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;2. After successfully installing chntpw, you have to access the Windows NTFS partition by mounting it and allowing read/write support. A good tutorial on how to do this can be found &lt;a href=&quot;http://basicslinux.blogspot.com/2010/03/accessing-ntfs-partitions-in-linux.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;3. After that, use your command line skills by navigating to &lt;i&gt;WINDOWS/system32/config&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;4. Once inside the config directory, issue this command:&lt;/p&gt;  &lt;p&gt;&lt;i&gt;$ sudo chntpw SAM&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;5. A long display of information will follow. Just ignore them.&lt;/p&gt;  &lt;p&gt;6. Once you are prompted to reset the password, it is recommended to leave the password blank with an asterisk (*).&lt;/p&gt;  &lt;p&gt;7. Reboot, and you can now login to Windows with full administrative access.&lt;/p&gt;  </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/3601763646721549737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3528109868797498320/posts/default/3601763646721549737'/><link rel='alternate' type='text/html' href='http://basicslinux.blogspot.com/2010/03/how-to-hack-windows-administrator_13.html' title='How to Hack Windows Administrator Password Through Linux'/><author><name>Deja vu</name><uri>http://www.blogger.com/profile/16142504451615890111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRqkQwOJaybJKljVumk00J_zAz3r4l0Hfhg72_rSSR8qsPo1PWJ1doPxb-EbCgoXicy0WAyJ9XIChBXJsJT9XLxTiQvK5-xIjM3qUIAlWQwcPb1QDFzz6dcFowXsvFrA8/s220/images.jpg'/></author></entry></feed>