Sunday, 13 September 2009

USB BackTrack

BackTrack is a Live Linux distribution based on SLAX that is focused purely on penetration testing. Distributed by, BackTrack is the successor to Auditor. It comes prepackaged with security tools including network analyzers, password crackers, wireless tools and fuzzers. Although originally designed to Boot from a CD or DVD, BackTrack contains USB installation scripts that make portable installation to a USB device a snap. In the following tutorial, we cover the process of installing BackTrack to a USB flash drive from within a working Windows environment.

How to install BackTrack to a USB device:

Note: USB installation of BacktTack performs like the Live CD. Currently a persistence BackTrack feature is outside the scope of this tutorial.

1. Download the (Portable Backtrack) USB BackTrack (Extended) version
2. Extract the Boot and BT3 folders to the root of your USB device
3. Navigate to the Boot folder on your "USB device" and click bootinst.bat (click continue if the following error appears)

4. Follow the onscreen instructions to make the device bootable
5. Once the USB install script has finished, reboot your computer and set your BIOS or Boot Menu to boot from the USB device

Reference :

Sunday, 10 May 2009

Internet Connection Sharing using "Firestarter " in LINUX

Firestarter is a GPL-licensed graphical firewall configuration program for iptables, the powerful firewall included
in Linux kernels 2.4 and 2.6. Firestarter supports network address translation for sharing an Internet connection
among multiple computers, and port forwarding for redirecting traffic to an internal workstation. Firestarter's
clean and easy to use graphical user interface takes the time out of setting up a custom firewall.

Firestarter has the ability to share the firew all host's Internet connection among all the computers on your
local netw ork. This is done through a technique called Netw ork Address Translation, or NAT. To the outside
w orld the cluster of machines w ill look like a single machine w ith a single IP address.

Step by Step How to Install "FIRESTARTER"

1. Synaptic Package Manager

Click on Firestarter --->MarkInstall--->APPLY

2. Running Firestarter as below

3. Choose Type Internet Connection base on your Network Method

Choose TOP one if your method such as ADHOC
Choose DHCP as below Method Setting

The physical setup and network device settings
The procedure for setting up a netw ork using
connection sharing is essentially the same
w hether you have only tw o computers or a more
complex netw ork w ith hubs or sw itches
connecting multiple computers. For this example
w e w ill be assuming that the Internet connected
device on the firew all is an Ethernet card, but a
modem or ISDN w ill w ork too.
The Firew all/gatew ay machine connected to the
Internet w ill need tw o netw ork cards and the
clients need one each.
The first netw ork card in the firew all, the external interface, w ill be the one physically connected to the
Internet. This card is usually automatically configured w ith DHCP. The second netw ork card in the firew all,
the internal interface, w ill be connected to the client machines via either a crossover cable if the connection
goes directly to another computer, or regular cable if you have a hub or sw itch.
The internal interface of the firew all needs to be
statically configured. There are many w ays to
configure a netw ork interface depending on the
distribution you use. Fedora and Red Hat Linux ship
w ith a simple command line tool called netconfig and a
more sophisticated graphical tool called system-config-network. system-config-network w orks better w ith
multiple netw ork cards in the same machine, so w e recommend you try it. Other distributions include their
ow n configuration tools, for example in SuSE you w ould use the Yast program.
No matter how you decide to configure the netw ork cards, these are settings you should enter:

For the external device (usually eth0):

Enable dynamic IP configuration (DHCP)
That's it. You're done, don't touch this card further.
The internal device (usually eth1):
Disable dynamic IP configuration
IP address:
Default gatew ay (IP):
Any changes you make w ill take effect after a reboot, or more elegantly after a restart of the netw ork
services (run "/etc/init.d/network restart" as root in most distributions).

Configuring the clients

There are tw o w ays to configure the clients. The more elegant and in the long run easier w ay is to run a
DHCP service on the firew all. A DHCP server distributes the netw ork settings such the IP address, the
default gatew ay, nameservers, etc. at run time to the each client. The alternative to using a DHCP server is
to configure every client manually.
Using the DHCP service is as easy as simply enabling it in Firestarter. For more information about the service
and how to configure it, refer to the section on configuring the DHCP server.
When using DHCP, the clients need only be configured to use dynamic IP configuration. No other settings
need to be changed.
Configuring the clients manually
If you do not w ish to use the DHCP service, configure the netw ork devices of the clients to use the follow ing
Disable dynamic IP configuration
IP address: to, w ith each client using an unique IP
Default gatew ay (IP):
Primary nameserver: Set this to the same nameserver as used on the firew all. You can see the correct
setting in the /etc/resolv.conf file on the firew all.
Restart the network service and you're done.

Sunday, 19 April 2009

Setup Modem CDMA VENUS VT-12 in LINUX

Finally After Go to Anywhere and some Test
I Found some setting in wvdial.conf for CDMA VENUS

Step by Step
1. Provide Modem CDMA
2. CHIP CDMA such as STARONE, FLEXI, FREN etc ( Now I use STARONE)
3. Setting wvdial.conf as below

[Dialer starone]
Init3 =at+csq?
Init4 =ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
Modem Type=USB Modem
New PPD = yes
Dial Command=ATDT
Auto DNS=1
Stupid Mode=1
Auto Reconnect=on

4. Running wvdial as below

angelyca@angelyca-laptop ~ $ sudo wvdial starone
--> WvDial: Internet dialer version 1.60
--> Cannot get information for serial port.
--> Initializing modem.
--> Sending: ATZ
--> Sending: ATQ0
--> Sending: at+csq?
+CSQ: 31, 99
--> Sending: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
--> Modem initialized.
--> Sending: ATDT#777
--> Waiting for carrier.
CONNECT 230400
--> Carrier detected. Starting PPP immediately.
--> Starting pppd at Sat Apr 18 12:41:38 2009
--> Pid of pppd: 7657
--> Using interface ppp0
--> pppd: [08]?[06][08]??[06][08]
--> pppd: [08]?[06][08]??[06][08]
--> pppd: [08]?[06][08]??[06][08]
--> pppd: [08]?[06][08]??[06][08]
--> pppd: [08]?[06][08]??[06][08]
--> pppd: [08]?[06][08]??[06][08]
--> local IP address
--> pppd: [08]?[06][08]??[06][08]
--> remote IP address
--> pppd: [08]?[06][08]??[06][08]
--> primary DNS address
--> pppd: [08]?[06][08]??[06][08]
--> secondary DNS address
--> pppd: [08]?[06][08]??[06][08]

5. If IP DNS can Reply ,,meaning "OK" and go to Browser as below

enjoy it...............

Tuesday, 24 February 2009


Calling the SQL COUNT Function in PL/SQL


job_count NUMBER;

emp_count NUMBER;



INTO job_count

FROM employees;

SELECT Count(* )

INTO emp_count

FROM employees;



Substituting PL/SQL Variables

CREATE TABLE employees_temp
SELECT first_name,
FROM employees;


x VARCHAR2(20) := 'my_first_name';

y VARCHAR2(25) := 'my_last_name';


INSERT INTO employees_temp



UPDATE employees_temp

SET last_name = x

WHERE first_name = y;

DELETE FROM employees_temp

WHERE first_name = x;





CREATE TABLE employees_temp
FROM employees;


UPDATE employees_temp

SET salary = salary * 1.05

WHERE salary < 5000;

dbms_output.Put_line('Updated '


||' salaries.');



Output :-

Updated 49 salaries.

PL/SQL procedure successfully completed.

Data Manipulation With PL/SQL

CREATE TABLE employees_temp
SELECT employee_id,
FROM employees;


emp_id employees_temp.employee_id%TYPE;

emp_first_name employees_temp.first_name%TYPE;

emp_last_name employees_temp.last_name%TYPE;


INSERT INTO employees_temp

VALUES (299,



UPDATE employees_temp

SET first_name = 'Robert'

WHERE employee_id = 299;

DELETE FROM employees_temp

WHERE employee_id = 299

RETURNING first_name,last_name INTO emp_first_name,emp_last_name;



||' '




Output :-

Robert Henry

PL/SQL procedure successfully completed.

You can use the BULK COLLECT clause with a SELECT INTO or FETCH statement to retrieve a set of rows into a collection of records.


TYPE employeeset IS TABLE OF employees%ROWTYPE;

underpaid EMPLOYEESET; -- Holds set of rows from EMPLOYEES table.


SELECT first_name,


FROM employees;


some_names NAMESET; -- Holds set of partial rows from EMPLOYEES table.


-- With one query, we bring all the relevant data into the collection of records.



FROM employees

WHERE salary < 5000


-- Now we can process the data by examining the collection, or passing it to

-- a separate procedure, instead of writing a loop to FETCH each row.


||' people make less than 5000.');

FOR i IN underpaid.FIRST.. underpaid.LAST LOOP


||' makes '



-- We can also bring in just some of the table columns.

-- Here we get the first and last names of 10 arbitrary employees.

SELECT first_name,



FROM employees


FOR i IN some_names.FIRST.. some_names.LAST LOOP

dbms_output.Put_line('Employee = '


||' '





Tuesday, 3 February 2009

How to Find duplicate copies of files Using fdupes

FDupes uses md5sums and then a byte by byte comparison to find
duplicate files within a set of directories. It has several useful options
including recursion.
Install fdupes in ubuntu
sudo aptitude install fdupes

This will install all the required packages for fdupes
Using fdupes

Fdupes syntax
-r --recurse - include files residing in subdirectories
-s --symlinks - follow symlinked directories
-H --hardlinks - normally, when two or more files point to the same disk area they are treated as nonn-duplicates; this
option will change this behavior
-n --noempty - exclude zero-length files from consideration
-f --omitfirst - omit the first file in each set of matches
-1 --sameline - list each set of matches on a single line

-S --size - show size of duplicate files
-q --quiet - hide progress indicator
-d --delete - prompt user for files to preserve, deleting all others
-v --version - display fdupes version
-h --help - displays help
Fdupes Examples
1) fdupes -r ./stuff > dupes.txt
Then, deleting the duplicates was as easy as checking dupes.txt and deleting the offending directories. fdupes also can prompt
you to delete the duplicates as you go along.
2) fdupes -r /home/user > /home/user/duplicate.txt
Output of the command goes in duplicate.txt
fdupes will compare the size and M D5 hash of the files to find duplicates


Tuesday, 27 January 2009

Install VLC Media player in Ubuntu

You need to make sure that you have a “universe” mirror in your /etc/apt/sources.list

sudo apt-get update

sudo apt-get install vlc vlc-plugin-esd

sudo apt-get install mplayer-skin vlcreading package lists

This will complete the installation

If you want to open VLC You need to go to Applications—>Sound&Video—>VLC Media Player

Now Please Insert DVD or VCD Movie and see the result

Wednesday, 21 January 2009

7 reasons why Windows will not wreck Ubuntu

One of our competitors has a review of the Windows 7 beta which claims that desktop Linux is doomed — doomed!

Not exactly. Not even approximately.

First let’s understand what 7’s target is. It’s not so much desktop Linux as a particular Linux distro — Ubuntu — that targets the desktop.

Some of these reasons are technological, others social. But the biggest reason is a business reason:

1. Ubuntu has an entrepreneur at the helm. Microsoft beat IBM because it had Bill Gates up against a bunch of suits. Now Microsoft is a bunch of suits and Ubuntu has Mark Shuttleworth.
2. Ubuntu has more server compatibility. Linux continues to beat Windows on the server, and servers (in the form of clouds) are becoming dominant over clients.
3. Ubuntu’s friends will not desert it. HP and Dell have gotten a taste of freedom from Microsoft tyranny. They won’t give that up easily. They will continue seeking product line niches where Ubuntu can succeed.
4. The Netbook will continue to evolve. The “no moving parts” PC is still at Version 1.0. There is a niche for a cheap, profitable “online machine” that can be used in Airports, hotel rooms and sandy deserts.
5. Applications will come. It’s true there are more Windows apps than Linux, by a logarithmic factor. But many are being ported, and the developed world will create many more.
6. Windows is losing the mobility wars. Linux is playing well, Apple is winning big, RIM is hanging in. Where’s Windows? PCs are servers to mobile clients. The clients will tire of waiting.
7. The open source model. Software development has become like the old Steve Jackson game Ogre, and Microsoft’s the Ogre. Ubuntu and other open source pieces are small, but there are a lot of them, and they can work together. Or as Kermit said in The Muppet Movie “who are your friends, Doc?”

This does not mean that Microsoft will cease to be a desktop player, that Ubuntu is going to take over. Far from it. Ubuntu will retain enough interest to stay in the game, that’s all it needs to do.

Ubuntu is doing fine with its present market share. How much more can it get over the next year? Perhaps just a little. I suspect this will be a year when desktop Linux consolidates around Ubuntu, so some gain is nearly assured.

Microsoft will also not disappear under the open source onslaught, just as IBM did not disappear under the weight of Microsoft. But it will change.

It will be fun to watch how it changes, and when. It has yet to see the need, but when Ubuntu fails to fall under the weight of Windows 7 perhaps it will.

Reference :

Sunday, 18 January 2009

Guide To Hacking The Linux Kernel

I found real nice guide that helps you hacking the linux kernellinks. It teaches you everything you should know. You'll get all of your source codes at this site. The only cons were it is a bit long and it isnt at all step by step, but overall its good. It will give you everything you need from start to finish. Written by Paul Russell.

You go to the website by clicking here

reference :

Sunday, 4 January 2009

CompBenchmarks (Ubuntu Tweak)

CompBenchmarks is a benchmarking environment for compilers.

Step by Step Install CompBenchmarks (Ubuntu Tweak)
1. Install compbenchmarks_0.5.0-1_i386-etch.deb the link in here

2. Click----> Administration---> Ubuntu Tweak

3. Display " UBUNTU TWEAK "

Now We Arrange Our System Linux More Easy