Tuesday, December 8, 2009

Fix / Restore Fedora 15 GRUB Boot Loader

Unfortunately, maintaining a multi-boot configuration like this can be a pain, especially if you later install an operating system which overwrites the GRUB boot loader you had in place (such as a version of Windows). If your boot loader is overwritten, you could be left with no choice but to boot the most recently installed OS.

In this tutorial, I will show you how to restore an overwritten copy of the GRUB boot loader by using a Linux live CD. In this example, my master GRUB installation is on a Fedora 15 installation, and I’m using a Fedora 15 Live CD to boot the system.

Start the Live CD up as normal. Don’t choose to install the OS if prompted, you want to come to a full live desktop to run the specific commands we need.

1. Identify your Partitions


Open a Terminal program and use the following command:

[alexm@localhost ~]$ su
[root@localhost /]# fdisk -l

Disk /dev/sda: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders, total 976773168 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x4b474b47

Device Boot Start End Blocks Id System
/dev/sda1 * 2048 206847 102400 7 HPFS/NTFS/exFAT
/dev/sda2 206848 91394047 45593600 7 HPFS/NTFS/exFAT
/dev/sda3 91394048 402077695 155341824 83 Linux
/dev/sda4 402077696 976771071 287346688 f W95 Ext'd (LBA)
/dev/sda5 402079744 976771071 287345664 7 HPFS/NTFS/exFAT
[root@localhost /]#

If you can work out where your Linux is from this, note down the information under ‘Device’.
In this tutorial, Fedora 15 is installed in /dev/sda3

2. Run grub-install

[root@localhost ]# sudo -i

[root@localhost ~]# mount /dev/sda3 /mnt

[root@localhost ~]# grub-install --root-directory=/mnt/ /dev/sda
Installation finished. No error reported.
This is the contents of the device map /mnt//boot/grub/device.map.
Check if this is correct or not. If any of the lines is incorrect,
fix it and re-run the script `grub-install'.

# this device map was generated by anaconda
(hd0) /dev/sda
[root@localhost mnt]#

Monday, July 6, 2009

Installed PC Linux 2009.2

Today, I deleted the whole Fedora partitions and install PC Linux 2009. Works fine and can install the USB wifi

How to check kernel if 32 or 64 bit

[alex@localhost ~]$ uname -m
i686
[alex@localhost ~]$ file /usr/bin/file
/usr/bin/file: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.9, stripped
[alex@localhost ~]$

Wednesday, June 10, 2009

How to Bulk Download YouTube Videos on Linux and Convert to MPG and MP3


This tutorial shows how to bulk download YouTube videos on Linux and then convert the FLV files to MPG video and MP3 audio files.
Required Software

I am using Ubuntu Linux, but the concept should be the same for other distros. Make sure you already have all of the multimedia codecs including ffmpeg and mplayer. You will also need to install youtube-dl:

sudo apt-get install youtube-dl
Downloading YouTube Videos on Linux

To download YouTube videos on Linux, use youtube-dl in the terminal like this:

youtube-dl [options] video_url

To see available options type man youtube-dl in a terminal.
Converting YouTube Videos to MPG on Linux

To convert YouTube movies from FLV to MPG on Linux use ffmpeg like this in the terminal:

ffmpeg -i old-file.flv new-file.mpg
Ripping MP3s from YouTube Videos on Linux

It is easy to extract MP3 audio from a YouTube movie on Linux with mplayer.

The method to rip MP3 audio from FLV files with ffmpeg from this site doesn't work on my computer so I use mplayer to do it:

mplayer -dumpaudio old-file.flv -dumpfile new-file.mp3
Automating the Process with a Shell Script

If you want to download a set of YouTube movies and convert them to MP3 audio, or save them as MPG movies on your hard drive, you can automate the process with a shell script.

This is just a quick script showing how it might be done. Use the following code at your own risk, and make sure you understand what it does before doing it. It will delete all the FLV files in the current directory after it processes them.

#!/bin/sh

# This script downloads YouTube videos and converts them
# You will end up with an MPG video and MP3 audio of each YouTube movie
# You need to install the following three programs:
# youtube_dl, ffmpeg, and mplayer

# Use this script at your own risk!
# Make sure that you understand how it works before you use it!

# USAGE:
# Make a file called videos.txt with the URL of 1 YouTube video on each line.
# Don't leave any blank lines in the file
# Put the videos.txt file in an empty folder along with this script
# run this script with the following commands:
# $ ./youtube_downloader.sh
# It will take a long time to run, depending on
# how many videos you have in your videos.txt file.

while read inputline
do
youtube_url="$(echo $inputline)"
youtube-dl $youtube_url
done < videos.txt

# Convert the flv files to mpg and mp3 files
for i in *.flv
do
ffmpeg -i $i $i.mpg
# comment out the next line if you don't want MP3's extracted
mplayer -dumpaudio $i -dumpfile $i.mp3
# The next line deletes all FLV files in the current directory to cleanup
rm $i
done

See also pytube...

Thinking out of the BoX !! Download YouTube Videos : The Linux Way !


In this article I will outline a few methods to download YouTube Videos to your system and getting them to play in your favorite player. We will go in a step-wise way :

A. Getting the Video

1. Online Tools

There are some sites like KeepVid.com which allow users to input a YouTube link and they would give you the download link. So get the download link from this site and download the flv file.
2. Firefox Plugin
There is a firefox extension which allows you to download YouTube videos as you watch them. I haven’t tried this.
3. Command Line Tools
This is the safest and best way (for CLI junkies :-D ). Download the script YouTube-dl (thanks to Ricardo Garcia Gonzalez for this nice script). Just put that script in your ~/bin or /usr/bin directories or somewhere in the application path.
To download the flv video do this :
youtube-dl
e.g : youtube-dl http://www.youtube.com/watch?v=D1R-jKKp3NA

B. Playing the video

1. Use VLC Player or MPlayer or Kaffeine to play the flash video.
2. If the above method doesn’t work out (It din’t in my case)..Then go the difficult way :
* Get ffmpeg for your system. SuSE users can get it here.
* Convert the flv video to avi (or any other format) using ffmpeg :
ffmpeg -i my_flash_video.flv the_avi_file.avi
* Now drag and drop the avi file into your favorite video player n watch the video :-)

Still unsatisfied ?! “Dude I’m a *nix user. I can’t sit and do all these steps to get a simple video playing !!” No probs. We will write a shell script to do all this work for you.

Note : I found the downloader in youtube-dl quite slow. So I tweaked it a bit(I don’t know python :-D ) to use an external downloader (axel rocks!). Open the file youtube-dl in your favorite editor and change the following lines :

282 # Abort here if in simulate mode
283 if cmdl_opts.simulate:
284 sys.exit()

to the following :

282 # Abort here if in simulate mode
283 if cmdl_opts.simulate:
284 cond_print(video_data.geturl())
285 sys.exit()

That will make the script output the downloadable video link to the standard output (when run in simulate mode). Now write the shell script :
#!/bin/bash
if [ $# -ne 2 ]
then
echo "Usage : $0 "
echo "e.g : $0 http://www.youtube.com/watch?v=D1R-jKKp3NA steve_jobs"
else
outputfile=".avi"
todnload=`youtube-dl -s $1 | tail -n 1 -`
echo "Got the file.."$todnload
axel -n 100 $todnload -o $2".flv" # wget -c $todnload -O $2".flv" .if you don't use axel
echo "Download Completed..."
ffmpeg -i $2".flv" $2$outputfile # get the avi file
fi

Done. Now paste that code into a file utube in your path. Then run utube as :
utube http://www.youtube.com/watch?v=D1R-jKKp3NA steve_jobs

This will give 2 files steve_jobs.flv and steve_jobs.avi ;)
Just drag the *.avi to kaffeine and enjoy the speech by Steve Jobs !

Monday, June 8, 2009

Arrow keys not working in VMware Server 64bits, host=Fedora 11 64bits, Guest = XP pro 32bits


Ok, I got the solution:

Edit your "/etc/vmware/config" file, so type:
sudo gedit /etc/vmware/config


And add this to it:
xkeymap.nokeycodeMap = true
xkeymap.keycode.108 = 0x138 # Alt_R
xkeymap.keycode.106 = 0x135 # KP_Divide
xkeymap.keycode.104 = 0x11c # KP_Enter
xkeymap.keycode.111 = 0x148 # Up
xkeymap.keycode.116 = 0x150 # Down
xkeymap.keycode.113 = 0x14b # Left
xkeymap.keycode.114 = 0x14d # Right
xkeymap.keycode.105 = 0x11d # Control_R
xkeymap.keycode.118 = 0x152 # Insert
xkeymap.keycode.119 = 0x153 # Delete
xkeymap.keycode.110 = 0x147 # Home
xkeymap.keycode.115 = 0x14f # End
xkeymap.keycode.112 = 0x149 # Prior
xkeymap.keycode.117 = 0x151 # Next
xkeymap.keycode.78 = 0x46 # Scroll_Lock
xkeymap.keycode.127 = 0x100 # Pause
xkeymap.keycode.133 = 0x15b # Meta_L
xkeymap.keycode.134 = 0x15c # Meta_R
xkeymap.keycode.135 = 0x15d # Menu

Save it and be happy!

Thursday, June 4, 2009

The FAT16, FAT32 and NTFS file size limitation


The file size limitation appears to be the problem,
but the maximum size depends on the operating system.
What is the size of the file you're copying and where does it reside?

The maximum file size on a FAT32 formatted partition is
4 GB or 4,294,967,296 bytes minus 2 bytes ...

The maximum file size on a FAT16 partition
under Windows 9.x and ME is 2 GB minus 1 byte ...

But the size limit using the FAT16 file system
under Windows NT or 2K is 4 GB ...

And the NTFS file system has a (theoretical) maximum file size of
16 exabytes or 18,446,744,073,709,551,616 bytes (2^64 sectors) ...

Thursday, May 28, 2009

Setup Samba - Filesharing with Windows


Setup Samba - Filesharing with Windows
If you have other Windows computers on your LAN and want to share files from Linux with them, you must setup Samba.
To setup Samba you must (1) install samba, (2) add you 'shares', (3) add users, (4) start Samba service and (5) manage security options (Firewall and SELinux).

1. Install Samba
It is best to have Samba installed in the installation process. If not < users can install using the command line:

[alex@localhost ~]$ sudo yum install samba samba-client

2. Add Shares
You must edit /etc/samba/smb.conf as root: (use nano instead of gedit if you do not have a GUI)

[alex@localhost ~]$ sudo gedit /etc/samba/smb.conf
Set your Windows Workgroup name in [global] section.
Added shares at the end of the file. Example:

workgroup = WORKGROUP
server string = Samba Server Version %v

# A publicly accessible directory, but read only, except for people in
# the "staff" group
[public]
comment = Public Stuff
path = /home/samba
public = yes
writable = yes
printable = no
write list = +staff

[Share]
comment = Samba shares
path = /home/commons
read only = no
valid users = alex
create mask = 0775
directory mask = 0775
#
# New additional samba shares
#
[mnt_local]
comment = Local shares
path = /mnt/local
public = yes
writable = yes
browseable = yes

[mnt_resume]
comment = Resume partition
path = /mnt/resume
public = yes
writable = yes
browseable = yes

[mnt_account]
comment = Accounts partition
path = /mnt/account
public = yes
writable = yes
browseable = yes




If 'writable' the location must be writable in Linux first. Additionally permissions must match (for example: drw-rw-rw-).
If home data (all personal files under /home/username) is to be accessible, then set 'browseable = yes' under [homes] (~line 250). This configuration file is very descriptive, read through it to get more ideas or information.

3. Add Users
To access shares, you must be a valid user. Add valid users AND passwords using the smbpasswd command.
This login name WILL be the login name and password you use from Windows to access your Linux computer. The password does NOT need to match your Linux password.

[alex@localhost ~]$ sudo smbpasswd -a alex
New SMB password:
Retype new SMB password:
account_policy_get: (warnings ignored)
Added user username.
(Note: 'alex' MUST be a valid account on the Fedora machine)

4. Start Samba Service
Run samba and check for any errors:

[alex@localhost ~]$ sudo /etc/init.d/smb start
Starting SMB services: [ OK ]
Use chkconfig or serviceconf to enable samba (smb) in both runlevels 3 and 5. This will make sure to run Samba each time Fedora boots.

[alex@localhost ~]$ /sbin/chkconfig --list smb
smb 0:off 1:off 2:off 3:off 4:off 5:off 6:off
[alex@localhost ~]$ sudo /sbin/chkconfig --level 35 smb on
[alex@localhost ~]$ /sbin/chkconfig --list smb
smb 0:off 1:off 2:off 3:on 4:off 5:on 6:off
Restart Samba for every change to users/passwords or 'smb.conf'
[alex@localhost ~]$ sudo /etc/init.d/smb restart
Shutting down SMB services: [ OK ]
Starting SMB services: [ OK ]

5. Managing Security for Samba
Firewall
The Firewall will by default block Samba, to allow access run:

[alex@localhost ~]$ system-config-firewall

To allow Samba access to work through the firewall you must set 'Samba' as a 'Trusted Service' and hit 'Apply'. Alternatively if you are only using the shell and do not have access to a graphical X-server, you can run:

[alex@localhost ~]$ sudo system-config-firewall-tui

To allow Samba access to work through the firewall, use to go to Customize. In the Trusted Services: scroll down to Samba, hit and use again to go to Close, then finally to OK.
SELinux
SELinux has significant control over restricting different parts of Samba. Run system-config-selinux. Please read lines #23 - #51 in /etc/samba/smb.conf for a better explanation. Alternatively, you can run:

[alex@localhost ~]$ system-config-selinux
Go to Boolean and type 'samba' in the Filter (without quotes).
The following is NOT complete and is NOT recommended but is a quick enable to allow Samba to work permissively through SELinux.
[alex@localhost ~]# sudo /usr/sbin/setsebool -P samba_export_all_rw on
Alternatively, you can ignore SELinux at this point and try to access your shares in Windows and SELinux TroubleShooter should give an automatic pop-up in GNOME explaining what is wrong. If you follow those recommendations you most likely will be more secure.
For any changes made above to the SELinux settings or smb.conf, it is recommended to restart Samba.
Top Resources

More Information
Fedora 10 - Services and Daemons in Fedora 10
Fedora 10 Blog Entries
Fedora Nvidia Driver Install Guide
Fedora 9 - Personal Installation Guide
Fedora 9 Update and Nvidia Update
Update to RPMFusion
Fedora Core 5 on Dell D810 Latitude Laptop
Managing Services in Fedora
Fedora Help Forum Posts and Threads
Top Resources

5. Managing Security for Samba

Firewall

The Firewall will by default block Samba, to allow access run:

[mirandam@charon ~]$ system-config-firewall

To allow Samba access to work through the firewall you must set 'Samba' as a 'Trusted Service' and hit 'Apply'. Alternatively if you are only using the shell and do not have access to a graphical X-server, you can run:

[mirandam@charon ~]$ sudo system-config-firewall-tui

To allow Samba access to work through the firewall, use to go to Customize. In the Trusted Services: scroll down to Samba, hit and use again to go to Close, then finally to


OK.



Thursday, May 7, 2009

UNIX network analysis


Finding open ports on your workstation
[root@localhost alex]# nmap -T Aggressive -O 192.168.0.106

Starting Nmap 4.76 ( http://nmap.org ) at 2009-05-07 11:38 EDT
Interesting ports on 192.168.0.106:
Not shown: 991 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
902/tcp open iss-realsecure
1521/tcp open oracle
3306/tcp open mysql
6000/tcp open X11
8009/tcp open ajp13
8222/tcp open unknown
8333/tcp open unknown
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.15 - 2.6.25
Network Distance: 0 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2.49 seconds

Finding other services on your network
[root@localhost alex]# nmap -sT 192.168.0.106/22

Starting Nmap 4.76 ( http://nmap.org ) at 2009-05-07 11:47 EDT
Stats: 0:00:08 elapsed; 104 hosts completed (2 up), 2 undergoing Connect Scan
Connect Scan Timing: About 84.28% done; ETC: 11:48 (0:00:00 remaining)
Interesting ports on 192.168.0.1:
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
5678/tcp open unknown
MAC Address: 00:1C:F0:54:4C:67 (D-Link)

Interesting ports on 192.168.0.100:
Not shown: 999 filtered ports
PORT STATE SERVICE
10000/tcp open snet-sensor-mgmt
MAC Address: 00:11:A0:04:59:EA (Vtech Engineering Canada)

Interesting ports on 192.168.0.106:
Not shown: 991 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
902/tcp open iss-realsecure
1521/tcp open oracle
3306/tcp open mysql
6000/tcp open X11
8009/tcp open ajp13
8222/tcp open unknown
8333/tcp open unknown

Nmap done: 1024 IP addresses (3 hosts up) scanned in 98.37 seconds
[root@localhost alex]#

Discovering hosts on your network
[root@localhost alex]# arp
Address HWtype HWaddress Flags Mask Iface
192.168.0.1 ether 00:1c:f0:54:4c:67 C wlan0


Finding other hosts on your network
[root@localhost alex]# nmap -sP 192.168.0.106/22

Starting Nmap 4.76 ( http://nmap.org ) at 2009-05-07 11:41 EDT
Host 192.168.0.1 appears to be up.
MAC Address: 00:1C:F0:54:4C:67 (D-Link)
Host 192.168.0.100 appears to be up.
MAC Address: 00:11:A0:04:59:EA (Vtech Engineering Canada)
Host 192.168.0.106 appears to be up.

Nmap done: 1024 IP addresses (3 hosts up) scanned in 81.99 seconds
[root@localhost alex]#

Windows How do I tell if a TCP network port is open or not?

So how do I tell if a TCP or UDP network port is open or not under UNIX or Linux oses?
Sure iptables can be used to block or open port or to apply packet filtering.
However any program can open a network port. For example if use has access to gcc / cc compiler she can open a port.

So it is necessary to list open TCP or UDP ports.

List open TCP port with netstat

Use netstat command to list open tcp port
Code:

[root]# netstat -tulpn

Output:
Code:

tcp        0      0 0.0.0.0:22               0.0.0.0:*                   LISTEN      11960/sshd
tcp        0      0 127.0.0.1:3306           0.0.0.0:*                   LISTEN      3992/mysqld
tcp        0      0 64.19.12.xx:80           0.0.0.0:*                   LISTEN      9474/lighttpd
tcp        0      0 64.19.12.xx:80           0.0.0.0:*                   LISTEN      9474/lighttpd
tcp        0      0 127.0.0.1:25             0.0.0.0:*                   LISTEN      1859/master
tcp        0      0 64.19.12.xx:443          0.0.0.0:*                   LISTEN      9474/lighttpd
netstat also works under Windows XP or 2000 server

Using telnet 
You can also use telnet to find out if port is open or not
Code:

telnet server-ip port-no
telnet localhost 80
telnet 192.168.1.111 25

telnet also works under Windows XP or 2000 server/UNIX oses

Using nmap
Nmap is a free security scanner which is used to evaluate the security of computers, and to discover services or open/close port numbers
Code:

nmap server-ip

Code:

[root]# nmap localhost

Sample output from my computer:
Code:

Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-10-10 03:52 MST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1656 ports scanned but not shown below are in state: closed)
PORT    STATE SERVICE
21/tcp  open  ftp
22/tcp  open  ssh
53/tcp  open  domain
80/tcp  open  http
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds
902/tcp open  iss-realsecure-sensor

Nmap finished: 1 IP address (1 host up) scanned in 0.449 seconds

Nmap works under Windows and UNIX oses
Checking to see if a port is open, blocked, dropped, or filtered at the iptables or windows firewall is not simple. But with above three tools you can get list of open port quickly for both Windows and UNIX servers.

Have fun 

Wednesday, May 6, 2009

Howto create Loop Device on REDHAT, CENTOS or FEDORA


Type : System
Operating System : Redhat,Fedora,Centos
Write by : Fabien FAYE

This mini howto explain how to create more loop device on your operating system.

You need to create more loop device in some case like encrypted file system or HVM xen virtualization.

By default there are 7 devices available, named /dev/loop0 through to /dev/loop7 .

* INFORMATION
* HOT CREATION
* STANDARD CREATION
* MODULE LIMITATION
* TIPS & COMMAND

INFORMATION
-----------
You can find the loop device like that :

# ls -al /dev/loop*
brw-r----- 1 root disk 7, 0 Mar 19 09:34 /dev/loop0
brw-r----- 1 root disk 7, 1 Mar 19 09:34 /dev/loop1
brw-r----- 1 root disk 7, 2 Mar 19 09:34 /dev/loop2
brw-r----- 1 root disk 7, 3 Mar 19 09:34 /dev/loop3
brw-r----- 1 root disk 7, 4 Mar 19 09:34 /dev/loop4
brw-r----- 1 root disk 7, 5 Mar 19 09:34 /dev/loop5
brw-r----- 1 root disk 7, 6 Mar 19 09:34 /dev/loop6
brw-r----- 1 root disk 7, 7 Mar 19 09:34 /dev/loop7

The creation of the loop device is very simple but you have 2 options for this creation one is without reboot and the other one is with a reboot.

HOT CREATION
------------
Creation of loop8, loop9, loop10 :

[root]# mknod -m640 /dev/loop8 b 7 8
[root]# mknod -m640 /dev/loop9 b 7 9
[root]# mknod -m640 /dev/loop10 b 7 10

a.) -m640 define the permission of the device
b.) /dev/loop8 define the name of the device
c.) b for the creation of the special block device
d.) 7 8 the number 7 AND 8 define the MAJOR AND the MINOR

Note: If you made a mistake, just delete the note using:
[root]# rm /dev/loop8

Check if the loop is created
----------------------------
[root]# ls -l /dev/loop8
brw-r----- 1 root root 7, 8 Oct 3 14:54 /dev/loop8

[root]# ls -l /dev/loop9
brw-r----- 1 root root 7, 9 Oct 3 14:54 /dev/loop9

[root]# ls -l /dev/loop10
brw-r----- 1 root root 7, 10 Oct 3 14:54 /dev/loop10


Now you have the applied the proper owner on these devices
----------------------------------------------------------
[root]# chown root:disk /dev/loop8
[root]# chown root:disk /dev/loop9
[root]# chown root:disk /dev/loop10

Now you have to change the module limitation and reboot your system.

STANDARD CREATION
-----------------
You have to modify this file /etc/udev/makedev.d/50-udev.nodes

[root] # vi /etc/udev/makedev.d/50-udev.nodes
loop0
loop1
loop2
loop3
loop4
loop5
loop6
loop7
loop8
loop9
loop10
parport0
parport1
parport2
parport3
net/tun
ppp
console
null
zero

Now you have to change the module limitation and reboot your system.

MODULE LIMITATION
-----------------
In the kernel, you have to allow more creation of loop device.

There is an absolute maximum of 256 devices limited in the kernel. The default limit is set to 8.

# modinfo loop
filename: /lib/modules/2.6.18-53.1.14.el5.centos.plusxen/kernel/drivers/block/loop.ko
alias: block-major-7-*
license: GPL
srcversion: 82DB6DB3DABF3B945D6394D
depends:
vermagic: 2.6.18-53.1.14.el5.centos.plusxen SMP mod_unload gcc-4.1
parm: max_loop:Maximum number of loop devices (1-256) (int)
module_sig: 883f35047d15787f0a982eee333b2d8112f51f09f68f09b79223a34983b3aef66820c08cc6e8cd3709f6d7c56171e5a579ee1ca2ca56349c56b983a7c46

Now you have to change this value with the modprobe.conf file.

#vi /etc/modprobe.conf
...
options loop max_loop=64
...

TIPS & COMMAND

The command line losetup is used for set up and control loop device.

# losetup
usage:
losetup loop_device # give info
losetup -d loop_device # delete
losetup -f # find unused
losetup -a # list all used
losetup -r # read-only loop
losetup [-e encryption] [-o offset] [-r] {-f|loop_device} file # setup

Last Updated on Tuesday, 03 February 2009 22:17

Thursday, April 23, 2009

Fairfax Auto Parts


Alexandria
Fairfax Auto Parts
456 S. Pickett Street
Alexandria, VA 22304
703-823-0800

Annandale
Fairfax Auto Parts 7219 Columbia Pike
Annandale, VA 22003
703-354-7600

Burke
Fairfax Auto Parts 5663 Burke Centre Parkway Directions
Burke, VA 22015
703-425-4400
Kamp Washington Fairfax Auto Parts-No. Va. 10912 Lee Hwy. Directions
Fairfax, VA 22030
703-591-6500
Falls Church Fairfax Auto Parts 431 S. Maple Ave. Directions
Falls Church, VA 22046
703-534-1200
Merrifield Fairfax Auto Parts, Inc. 8701 Lee Hwy. Directions
Fairfax, VA 22031
703-560-1560
Newington Fairfax Auto Parts 8196-A Terminal Rd. Directions
Newington, VA 22079
703-339-8300
Vienna Fairfax Auto Parts 121 Church Street NE Directions
Vienna, VA 22180
703-281-5700
Chantilly Fairfax Auto Parts 14154-C Willard Road Directions
Chantilly, VA 20151
703-631-3800
Sterling Fairfax Auto Parts 47060 Harry Byrd Hwy. #100 Directions
Sterling, VA 22170
703-450-6600
Fairfax City Economy Auto Parts 3855 Pickett Road Directions
Fairfax, VA 22031
703-978-4500
Machine Shop Machine Shop 8701 Lee Hwy. Directions
Fairfax, VA 22031
703-560-0813
Manassas - Rt. 234 Economy Auto Parts 8106 Sudley Road Directions
Manassas, VA 20110
703-368-1002
Manassas - Euclid Ave. Champ Auto Parts 9088 Euclid Ave. Directions
Manassas, VA 20110
703-368-7106
Manassas - Rt. 28 Manassas Auto Parts 7809 Centreville Rd. Directions
Manassas, VA 20110
703-368-7191
Herndon Fairfax Auto Parts 23070 Oak Grove Road Directions
Sterling, VA 20166
703-707-0800

Monday, April 20, 2009

TBD


Computing Hourly or Annual Rate


Constant multiplier = 2080

1. How to compute for the Annual Salary given the hourly rate?
Hourly rate = $45.00
Annual = $45.00 x 2080
Annual = $93,600.00

2. How to compute for the Hourly Salary given the Annual Income?
Annual = $93,600.00
Annual = $93,600.00 / 2080
Hourly rate = $45.00

Friday, April 10, 2009

Copy CDROM to ISO image file


1. Using dd
[root] dd if=/dev/cdrom of=/usrISO/tncdcopy.iso

2. Using cat
[root] cat /dev/cdrom > /tmp/trendnet.iso

Note:
1. Ensure that the cd-rom is not mounted
2. These two commands will produce the same result and same size of ISO image

Wednesday, March 25, 2009

WAS 6.1 Application/Portal Developer


WebSphere Application Server 6.1 Portal Developer

DUTIES AND RESPONSIBILITIES

1. Expert level knowledge in WebSphere, WebSphere Portal, LDAP schema,
strong Java, J2EE and Struts are required.

2. Solid experience in Servlets, Web Services, SOAP, XML, Java Beans
and JSP is highly preferred.

3. This role designs, develops and supports application solutions to
meet client requirements delivered through a WebSphere Portal based intranet.

4. The successful candidate will have a strong understanding of Portlet
technologies and have practical hands-on experience developing and
delivering JSR 168 Portlet solutions and J2EE Applications.

5. He/She will design, develop and/or re-engineer highly complex
application components, and integrate software packages, programs
and reusable objects potentially residing on multiple platforms.

6. This role will also manage the WebSphere Portal environment
and mentor junior developer.


ESSENTIAL DUTIES AND RESPONSIBILITIES

1. Design/Develop/Maintain IBM WebSphere Portal solutions using JAVA,
J2EE, XML, EJB, JSP, JDBC, Struts framework, CSS, Javascript using
IBM WebSphere Studio Application Developer (WSAD) IDE.

2. Almost all solutions will be developed using IBM WebSphere and JSR168 Portlets.

3. Strong experience developing Multi-tier application architecture applications.

4. Manage IBM WebSphere and WebSphere Portal environment including, upgrades,
monitoring, security & deployment.

5. Maintain, develop and update the structured Portal Intranet framework
(security implementation, design, layout, graphical content and navigation.

6. Troubleshoots system problems and provides timely resolutions.

7. Maintain, develop and update J2EE Tomcat\MySQL solutions.

8. Supports end-users in the use of deployed portal applications as necessary.

9. Application training and usage documentation required.

10. Identify emerging technologies that can be leveraged in the framework.

11. Mentor others in emerging J2EE and/or IBM Portal and related technologies.

12. Effectively communicate new technology concepts to other team members
and capability of mentoring others.

13. Communicate project status and escalating issues to management as needed

14. Provide extensive input to the architectural design of projects and provide
expertise to project teams and ensure adherence to established architectural
standards and principles

15. Provide detailed system design documentation and deliverables, such as
functional requirements, technical specifications, architecture diagrams,
UML diagrams, sequence diagrams, component and deployment diagrams,
class diagrams, data models, process flows, use cases, and
navigation maps as required

Friday, March 20, 2009

Data Recovery Using FreeNAS

Data Recovery Using FreeNAS
Posted by FrugalNYC at 6:00 AM | Labels: backup, freenas, system admin, tech support

I have written several posts about FreeNAS in the last several weeks. For such a small and compact OS, I have found this to be one of my favorite tools of late. I first wrote about 9 Great Things About FreeNAS and then I wrote 9 Reasons To Use FreeNAS At Work. I then wrote 11 FreeNAS Tips that I picked up after using it and reading about it for several weeks.

Today I would like to talk about how FreeNAS can be used as a data recovery tool. Below is my account of how I used the FreeNAS LiveCD to restore data from a Windows Laptop. I've done this on a HP/Compaq Windows XP Laptop and it worked very well.

Bootup and Install

* I Boot up with the LiveCD.
* Configure the IP address via DHCP
* I go to another machine for the WebGUI to do additional configuration.
* From the WebGUI, I login with the default admin/freenas account.
* Then I setup the Disks - steps are below.



Adding the Disk I want to Recover

* Disks - Management - Add Choose the Disk.
* In My case it was the acd4, the only other one being a RAM Disk or CDROM Drive (acd0)
* I give the description as HD (Hard Disk)
* I leave everything else default, but I do change the Preformatted File system to NTFS
* Save the changes



Mount the Disk

* Disks - Mount Point - Management - Add mount point
* I Choose the Disk I configured above
* I chosse partition 1, since I know the Laptop only has one primary partition.
* Filesystem: I choose NTFS
* Sharename: I call it Windows. You can call it anything you want.
* I leave everything else as the default.
* save the changes.



Get to the Files

* For the easiest access to files I setup the FTP service.
* I go to Services - FTP
* I click enable and then Save and Restart.
* From windows explorer (on the machine I did the WebAdmin work and where I want the data restored to) I go to the folder ftp://freenasIP
* I see the files from my windows install and grab whatever files I need to backup.



Shutdown the Laptop

* When Done copying, I just shutdown the system.
* System - Shutdown


Voila! Now you know how to use FreeNAS as a data recovery tool. There are other dedicated recovery tools, such as SystemRescueCD, but I find FreeNAS very easy to setup and it gives me the results I want faster. Do you use FreeNAS? What features do you like best? Share your thoughts and comments. You can get the current iso of FreeNAS here. Do you have other useful resources for FreeNAS?


ADDITIONAL:
1. http://developer.novell.com/wiki/index.php/HOWTO:_Install_FreeNAS
2. http://pcwizcomputer.com/index.php?option=com_content&task=view&id=71&Itemid=47



For additional links to frugal tips and tricks follow me on Twitter. If you would like to contribute to FrugalNYC or FrugalTech in any way (guest posts, articles, ideas, interesting links, advice, financial assistance, or anything else), feel free to contact me via email. Click here to add this to your RSS reader or Subscribe to FrugalTech by Email.
Monday, March 2, 2009
Reactions:
4 comments:

Brian said...

Cool. It seems so obvious after hearing this, but I probably would have never thought of using my LiveCD for this!
March 2, 2009 9:33 AM
FrugalNYC said...

Hi Brian,

It pays to get a little creative huh? Technically, just about all LiveCD distros of Linux/BSD can be used to do simple data recovery work. I just find FreeNAS to be one of the easiest to use in this regard. :) Thanks for visiting and reading FrugalTech posts.
March 2, 2009 10:46 AM
ravi said...

nice post

to knew more about data recovery you must visit

www.ravi-datarecovery.blogspot.com
March 8, 2009 12:19 AM
FrugalNYC said...

Hi Ravi,

Thanks. I've added you to the blogroll. Good resource for data recovery.
March 10, 2009 9:51 AM

Post a Comment

Thursday, March 19, 2009

Video Hosting - Fedora 5 Server Configuration (Optimized for Dedibox servers)


Video Hosting - Fedora 5 Server Configuration (Optimized for Dedibox servers)
I found it quite hard to get up to date information on how to configure properly a video hosting server on Fedora.

Here is a quick tutorial to tell you every single step I used after setting up my server with fedora core 5 (bordeaux). My hosting provider is Dedibox. It is designed for beginners to follow the step by step; but advanced users will surely know which steps to skip !

This will help you installing:

* Fmpeg (http://ffmpeg.mplayerhq.hu)
* FFmpeg-PHP (http://ffmpeg-php.sourceforge.net)
* Mplayer + Mencoder (mencoder is now built into the mplayer svn release )
(http://www.mplayerhq.hu/design7/dload.html)
* flv2tool (http://inlet-media.de/flvtool2)
* LAME MP3 Encoder (http://lame.sourceforge.net)
* Libogg + Libvorbis (http://www.xiph.org/downloads)



Table of contents

* Requirements

* 1-click Setup

* Setup explained



REQUIREMENTS

First, here are all the packages I needed on my fresh FRESH INSTALL of FC5

yum install subversion
y
yum install ruby
y
yum install gcc
y
yum install ncurses-devel
y
yum install gcc-c++
y
yum install php*dev*
y


You'll need the Livna repository to install mplayer so let's set it up now:

vi /etc/yum.repos.d/livna.repo


Then in Vi, press the key "i" and copy and paste this:

[livna]
name=Livna for Fedora Core $releasever - $basearch - Base
baseurl=http://rpm.livna.org/fedora/$releasever/$basearch
http://livna.cat.pdx.edu/fedora/$releasever/$basearch
http://wftp.tu-chemnitz.de/pub/linux/livna/fedora/$releasever/$basearch
http://ftp-stud.fht-esslingen.de/pub/Mirrors/rpm.livna.org/fedora/$releasever/$basearch
#mirrorlist=http://rpm.livna.org/mirrorlist
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-livna

[livna-testing]
name=Livna for Fedora Core $releasever - $basearch - Testing
baseurl=http://rpm.livna.org/fedora/$releasever/$basearch/RPMS.lvn-testing
http://livna.cat.pdx.edu/fedora/$releasever/$basearch/RPMS.lvn-testing
http://wftp.tu-chemnitz.de/pub/linux/livna/fedora/$releasever/$basearch/RPMS.lvn-testing
http://ftp-stud.fht-esslingen.de/pub/Mirrors/rpm.livna.org/fedora/$releasever/$basearch/RPMS.lvn-testing
#mirrorlist=http://rpm.livna.org/mirrorlist-testing
enabled=0
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-livna


Save your file by pressing "esc" and:

:wq


Once Vi exited let's import the GPG Key for this repository:

wget rpm.livna.org/RPM-LIVNA-GPG-KEY
rpm --import RPM-LIVNA-GPG-KEY
rm -rf RPM-LIVNA-GPG-KEY



1-click SETUP (just copy and paste)

cd /usr/local/src
wget http://www3.mplayerhq.hu/MPlayer/releases/codecs/all-20061022.tar.bz2
wget http://rubyforge.org/frs/download.php/17497/flvtool2-1.0.6.tgz
wget http://easynews.dl.sourceforge.net/sourceforge/lame/lame-3.97.tar.gz
wget http://switch.dl.sourceforge.net/sourceforge/ffmpeg-php/ffmpeg-php-0.5.1.tbz2
wget http://downloads.xiph.org/releases/ogg/libogg-1.1.3.tar.gz
wget http://downloads.xiph.org/releases/vorbis/libvorbis-1.2.0.tar.gz
tar -xjf all-20061022.tar.bz2
tar -xzf flvtool2-1.0.6.tgz
tar -xzf lame-3.97.tar.gz
tar -xjf ffmpeg-php-0.5.1.tbz2
tar -xzf libogg-1.1.3.tar.gz
tar -xzf libvorbis-1.2.0.tar.gz
mkdir /usr/local/lib/codecs/
svn checkout svn://svn.mplayerhq.hu/ffmpeg/trunk ffmpeg
mv /usr/local/src/all-20061022/* /usr/local/lib/codecs/
chmod -R 755 /usr/local/lib/codecs/
mkdir /usr/local/src/tmp
chmod 777 /usr/local/src/tmp
export TMPDIR=/usr/local/src/tmp
cd /usr/local/src/lame-3.97
./configure
make && make install
cd /usr/local/src/libogg-1.1.3
./configure && make && make install
cd /usr/local/src/libvorbis-1.2.0
./configure && make && make install
cd /usr/local/src/flvtool2-1.0.6/
ruby setup.rb config
ruby setup.rb setup
ruby setup.rb install
yum install mplayer
y
cd /usr/local/src/ffmpeg/
./configure --enable-libmp3lame --enable-libvorbis --disable-mmx --enable-shared
make
make install
ln -s /usr/local/lib/libavformat.so.50 /usr/lib/libavformat.so.50
ln -s /usr/local/lib/libavcodec.so.51 /usr/lib/libavcodec.so.51
ln -s /usr/local/lib/libavutil.so.49 /usr/lib/libavutil.so.49
ln -s /usr/local/lib/libmp3lame.so.0 /usr/lib/libmp3lame.so.0
ln -s /usr/local/lib/libavformat.so.51 /usr/lib/libavformat.so.51
cd /usr/local/src/ffmpeg-php-0.5.1/
phpize
./configure
make
make install
echo ‘extension=/usr/local/lib/php/extensions/no-debug-non-zts-20020429/ffmpeg.so’ >> /etc/php.ini
service httpd restart

SETUP EXPLAINED

Download needed packages and unpack them:

cd /usr/local/src
wget http://www3.mplayerhq.hu/MPlayer/releases/codecs/all-20061022.tar.bz2
wget http://rubyforge.org/frs/download.php/17497/flvtool2-1.0.6.tgz
wget http://easynews.dl.sourceforge.net/sourceforge/lame/lame-3.97.tar.gz
wget http://switch.dl.sourceforge.net/sourceforge/ffmpeg-php/ffmpeg-php-0.5.1.tbz2
wget http://downloads.xiph.org/releases/ogg/libogg-1.1.3.tar.gz
wget http://downloads.xiph.org/releases/vorbis/libvorbis-1.2.0.tar.gz
tar -xjf all-20061022.tar.bz2
tar -xzf flvtool2-1.0.6.tgz
tar -xzf lame-3.97.tar.gz
tar -xjf ffmpeg-php-0.5.1.tbz2
tar -xzf libogg-1.1.3.tar.gz
tar -xzf libvorbis-1.2.0.tar.gz
svn checkout svn://svn.mplayerhq.hu/ffmpeg/trunk ffmpeg


Install Mplayer codecs

mkdir /usr/local/lib/codecs/
mv /usr/local/src/all-20061022/* /usr/local/lib/codecs/


Secure TMP folder

chmod -R 755 /usr/local/lib/codecs/
mkdir /usr/local/src/tmp
chmod 777 /usr/local/src/tmp
export TMPDIR=/usr/local/src/tmp


Install Lame

cd /usr/local/src/lame-3.97
./configure
make && make install


Install Ogg

cd /usr/local/src/libogg-1.1.3
./configure && make && make install


Install Vorbis

cd /usr/local/src/libvorbis-1.2.0
./configure && make && make install


Install FLVtools

cd /usr/local/src/flvtool2-1.0.6/
ruby setup.rb config
ruby setup.rb setup
ruby setup.rb install


Install Mplayer

yum install mplayer


Install FFMpeg

cd /usr/local/src/ffmpeg/
./configure --enable-libmp3lame --enable-libvorbis --disable-mmx --enable-shared
make
make install
ln -s /usr/local/lib/libavformat.so.50 /usr/lib/libavformat.so.50
ln -s /usr/local/lib/libavcodec.so.51 /usr/lib/libavcodec.so.51
ln -s /usr/local/lib/libavutil.so.49 /usr/lib/libavutil.so.49
ln -s /usr/local/lib/libmp3lame.so.0 /usr/lib/libmp3lame.so.0
ln -s /usr/local/lib/libavformat.so.51 /usr/lib/libavformat.so.51


Install FFMpeg-PHP

cd /usr/local/src/ffmpeg-php-0.5.1/
phpize
./configure
make
make install


Add the FFMpeg extension in php.ini and restart httpd.

echo ‘extension=/usr/local/lib/php/extensions/no-debug-non-zts-20020429/ffmpeg.so’ >> /etc/php.ini
service httpd restart


Posted by Romain at 01:29
Labels: Tutorials

Wednesday, March 18, 2009

Getting a feel for the network with ‘netstat’


It seems that my previous article, “Getting a feel for the network
with ’ss’” was pretty popular. ss is a great tool but isn’t always
part of a base install for your favorite version of Linux. With
that in mind, let’s talk about how to do some things with tools
that are more likely to be part of the base. This time we will
discuss netstat and next time we will cover just the tip of the
iceberg that is lsof.

Our tricks for the day:

* Get a list of active TCP connections

* Get a list of active TCP connections and resolve hostnames of IP addresses in question

* Get a list of listening TCP sockets

* Get a list of TCP connections in various other connection states

First netstat:

Get a list of TCP connections (in this case, we include “listening” TCP ports):

$ netstat -ant
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN
tcp 0 1 192.168.253.101:52812 74.52.160.50:80 FIN_WAIT1
tcp 509792 0 192.168.253.101:49200 38.119.55.141:80 ESTABLISHED
tcp 0 1 192.168.253.101:52813 74.52.160.50:80 FIN_WAIT1
tcp 0 0 :::22 :::* LISTEN

As before, except this time resolve the IP addresses in question:

$ netstat -at
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 localhost:ipp *:* LISTEN
tcp 509792 0 chaco.local:49200 rieko.ziaspace.com:www ESTABLISHED
tcp 0 0 *:ssh *:* LISTEN

In the previous commands we showed active TCP connections but also TCP
ports that were in the “listening” state. If you are messing with
netstat and lsof then you are probably at least somewhast familiar
with IP networking but, if not, listening basically means that some
process is ready to accept new connections on that port.

In this command we are going to show only TCP ports that are in the
listening state and not active TCP connections. Note that, as in my
previous article, the only processes listening for new connections
on my workstation are the SSH and CUPS daemons.

$ netstat -tl
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 localhost:ipp *:* LISTEN
tcp 0 0 *:ssh *:* LISTEN

Now for our final netstat trick, we are going to list all of the TCP
connections where a TCP SYN packet has been sent but the receiving end
has not yet replied. See Wikipedia for more information about the TCP
handshake. I’ve fired up a Gnutella client so that we have lots of
interesting TCP connections in the output:

$ netstat -tl | grep SYN
(Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.)
tcp 0 1 192.168.253.101:59227 142.217.112.185:2729 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:36291 74.193.252.111:37998 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:36874 12.210.29.230:53781 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:35878 69.245.72.170:2500 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:33314 24.94.77.8:50345 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:43488 24.238.218.203:1334 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:53485 24.95.79.143:1128 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:60224 69.133.19.41:24536 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:52441 72.51.246.127:4379 SYN_SENT 7542/gtk-gnutella
tcp 0 1 192.168.253.101:57700 70.80.99.180:23112 SYN_SENT 7542/gtk-gnutella

Okay, that’s it for today. If you want to do some extra credit then I suggest
looking at the ‘-p’ flag for netstat.

Job Description Senior Consultant


Brief Description:
Senior Consultant is responsible for evaluating existing
systems and/or new user needs for the enterprise spatial
data operations, data governance, and data related service
offerings

Complete Description:
1. Fulfillment of geospatial service catalog offerings,
development of solution proposals and tracking of
service delivery schedules in order to meet/exceed
customer commitments

2. Manages and coordinates the spatial data architecture.
Work involves coordinating with agency spatial data
stewards, creation of processes, workflow diagrams,
step-by-step user guides for agency data stewards to
update/maintain their own data located in the
staging/production environments, resolution of
spatial data issues

3. Leads and fulfills data governance action items
Data structure changes impacting enterprise web applications
Maintenance of spatial data dictionary to communicate spatial data holdings
Development of data sharing agreements

4. Development of monthly statistics for the
geospatial service offerings and monthly
reporting to the CTO Dashboard

5. Management of enterprise contracts, renewals
and product deliverables

6. Project management of the State GIS Clearinghouse

7. Weekly tracking and monitoring of GTO/ESF projects
(i.e. data infrastructure upgrade), requests and
action items, signoffs, and facilitation with ESRI
for help desk support

8. Other geospatial operations supported by this
position include change management and standard
operating procedures

Tuesday, March 17, 2009

Install VMware-server-1.0.7 in Fedora 10


1. Check the Linux version
--------------------------
[root@localhost modules]# uname -a
Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.x86_64 #1 SMP Mon Feb 23 13:00:23 EST 2009 x86_64 x86_64 x86_64 GNU/Linux

2. Check the VMWare server installed
------------------------------------
[root@localhost modules]# rpm -qa | grep VM
VMware-server-1.0.7-108231.i386
[root@localhost modules]#

3. Download the path for kernerl 2.6.27
---------------------------------------
http://www.insecure.ws/warehouse/vmware-update-2.6.27-5.5.7-2.tar.gz

Thursday, March 5, 2009

Verifying the integrity of nmap-4.76.tar.bz2 downloads


1. Download the NMap Signing Key
[root@localhost gpg_test]# wget http://nmap.org/data/nmap_gpgkeys.txt
--2009-03-05 12:40:40-- http://nmap.org/data/nmap_gpgkeys.txt
Resolving nmap.org... 64.13.134.48
Connecting to nmap.org|64.13.134.48|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 4975 (4.9K) [text/plain]
Saving to: `nmap_gpgkeys.txt'

100%[======================================>] 4,975 --.-K/s in 0.1s

2009-03-05 12:40:40 (46.2 KB/s) - `nmap_gpgkeys.txt' saved [4975/4975]

2. Import the Signing Keys using PGP
[root@localhost gpg_test]# gpg --import nmap_gpgkeys.txt
gpg: key 6B9355D0: "Nmap Project Signing Key (http://www.insecure.org/)" not changed
gpg: key 33599B5F: "Fyodor " not changed
gpg: Total number processed: 2
gpg: unchanged: 2

3. Verifying the Nmap and Fyodor PGP Key Fingerprints
[root@localhost gpg_test]# gpg --fingerprint nmap fyodor
pub 1024D/6B9355D0 2005-04-24
Key fingerprint = 436D 66AB 9A79 8425 FDA0 E3F8 01AF 9F03 6B93 55D0
uid Nmap Project Signing Key (http://www.insecure.org/)
sub 2048g/A50A6A94 2005-04-24

pub 1024D/33599B5F 2005-04-24
Key fingerprint = BB61 D057 C0D7 DCEF E730 996C 1AF6 EC50 3359 9B5F
uid Fyodor
sub 2048g/D3C2241C 2005-04-24

4. Verifying PGP key fingerprints (Successful)
[root@localhost gpg_test]# gpg --verify nmap-4.76.tar.bz2.gpg.txt nmap-4.76.tar.bz2
gpg: Signature made Fri 12 Sep 2008 05:03:59 AM EDT using DSA key ID 6B9355D0
gpg: Good signature from "Nmap Project Signing Key (http://www.insecure.org/)"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 436D 66AB 9A79 8425 FDA0 E3F8 01AF 9F03 6B93 55D0

5. View A typical Nmap release digest file
[root@localhost gpg_test]# cat nmap-4.76.tar.bz2.digest.txt
nmap-4.76.tar.bz2: MD5 = 27 8D D2 E8 49 CC 3D BB 94 7D F9 61 A1 AA FF D0
nmap-4.76.tar.bz2: SHA1 = A711 4173 8B45 12B6 D5B3 5EF9 4258 E525 DF30 A586
nmap-4.76.tar.bz2: RMD160 = EC93 522E 05E7 233E 8950 B28A B12B 4535 5E63 C0C7
nmap-4.76.tar.bz2: SHA224 = 4DBB6532 F94D3EDE 6BF900FC 9325FAA4 ADE46765
0B44D56C A2B7E136
nmap-4.76.tar.bz2: SHA256 = 4E24328C A6EC97AF B2A8CAF3 12B1F111 A15CF417
63A5AC41 E7A633FD B217D66D
nmap-4.76.tar.bz2: SHA384 = 17B27C42 12664066 D7E32A44 8EDC7D84 04AC23A2
6F6AD443 BCEA9114 F9F9A422 BC32C857 AF7B300B
5E11EF53 47C91975
nmap-4.76.tar.bz2: SHA512 = B1E04ED7 521744C0 090E1A30 81ED524A 7B3B1287
2090B064 D80E325E 4C5D273F 76FAE899 B28ECDBF
6E300D19 203EBE1D FDE6F3CA BDEAB7E7 6FDCCBB4
6139167E

6. Verifying Nmap hashes using md5sum
[root@localhost gpg_test]# md5sum nmap-4.76.tar.bz2
278dd2e849cc3dbb947df961a1aaffd0 nmap-4.76.tar.bz2

7. Verifying Nmap hashes using sha1sum
[root@localhost gpg_test]# sha1sum nmap-4.76.tar.bz2
a71141738b4512b6d5b35ef94258e525df30a586 nmap-4.76.tar.bz2

8. Verifying Nmap hashes using gpg
[root@localhost gpg_test]# gpg --print-md sha1 nmap-4.76.tar.bz2
nmap-4.76.tar.bz2: A711 4173 8B45 12B6 D5B3 5EF9 4258 E525 DF30 A586

Programmer Analyst


Job Description of A Programmer Analyst
---------------------------------------
1. Plans, develops, tests, and documents computer programs, applying knowledge
of programming techniques and computer systems.
2. Evaluates user request for new or modified program. Consults with user to
identify current operating procedures and clarify program objectives.
3. Formulates plan outlining steps required to develop program, using
methodologies such as structured analysis and design or object-oriented
development.
4. Captures requirements using industry standard development frameworks and
tools.
5. Designs reports, forms and letters along with computer terminal screen
displays to accomplish goals of user request.
6. Reviews screens, reports, forms and letters designs with users.
7. Converts project specifications, using industry standard tools, such as
object-oriented tools, into sequence of detailed instructions and logical
steps for coding into language processable by computer, applying knowledge
of computer programming techniques and computer languages.
8. Enters program codes into computer system.
9. Enters commands into computer to run and test program.
10. Reads computer printouts or observes display screen to detect syntax or
logic errors during program test, or uses diagnostic software to detect
errors.
11. Replaces, deletes, or modifies codes to correct errors.
12. Analyzes, reviews and alters program to increase operating efficiency or
adapt to new requirements.
13. Writes documentation to describe program development, logic, coding, and
corrections. Writes manual for users to describe installation and operating
procedures.
14. Assists users to solve operating problems.

Monday, March 2, 2009

Spyware Removal guide

Spyware Removal guide

For those that don't know, spyware is bad, spyware is really bad. It also has many different names. Like adware, malware, badware, trojans, worms, downloaders, junkware, etc. Whatever you call it it's bad and you need to know how to get rid of it. The most common method people use to remove spyware is to download some software from Download.com and run that to remove the spyware. This method works ok most of the time but it usually takes much longer than I would ever want to spend on a computer. This spyware removal guide presents a much faster more effective way.

To understand how to deal with spyware you first have to understand how it works. It gets on a computer by attaching itself to, or disguising itself as, some useful piece of software. Kazaa is the classic example of that It is a useful piece of Peer to Peer software but it is packed full of spyware. The first thing that spyware does when it is on a computer is add itself to various parts window's registry so that it will be loaded when windows starts up. So the first thing you need to do is removed these various registry entries so that you can then remove the spyware.

To do this you will need to use some cool software. The first cool software you should use is called msconfig. It is installed standard on Windows XP, Windows ME and Windows 98. It is not included with Windows 2000. Don't ask me why. I always run this right off before I do anything else. To access it all you have to do is click the Start button. Then click on Run and type in "msconfig" and click "ok". You are greeted with the System Configuration Utility. You can disable most start up items by clicking on "Selective Startup" and uncheck "Load Startup Items". If you do this most of the stuff that normally starts up will not start up when you reboot your computer. Then go to the Services tab and Disable all non-Microsoft services. Don't be timid in disabling anything in this utility. There is nothing you can do that will permanently damage Windows because you can always come back to this utility and undo your changes.

After you have ran msconfig I would reboot the computer into safe mode. You can do this by pressing "F8" while windows is starting up. Sometimes it hard to know when to do this. It's after your computer goes out of the bios and boots off the hard drive you should press F8. If in doubt repeatedly press F8 while the computer is starting up. The advantage of being in safe mode is that none but the cleverest Spyware is loaded in Safe Mode. In safe mode it is time to try the powerful program known as HiJackThis.exe. HiJackThis functions like msconfig but it is much more thorough at finding possible spyware problems. The rule to follow when using HiJackthis is, "If you don't know what it is get rid of it." When you run a scan with HiJackThis you will be presented with a list of possible spyware found in the registry. Keep in mid that it is possible spyware, just because it is there it doesn't mean it is bad. Most of the stuff listed here will be extensions to Internet explorer and stuff like that. Everything listed is optional. Your computer will work perfectly fine even if you removed everything listed. Once you check those things that you want to remove and you click "Fix Checked", restart your computer in normal mode and you should have about 90% of your spyware removed.

To find out if you have successfully removed all the spyware, start HiJackThis again and do a scan. If you find anything listed that you had previously removed that means that the spyware is still on your computer somewhere and has come back to plague your existence. At this point it is hard to give you an exact procedure on how to remove the remaining spyware. Probably the easiest thing to do is download a good spyware scanner and run that. You can see a list of the ones I recommend at the Spyware Scanners page. If the spyware scanners still fail to remove the spyware than you'll have to find a more involved procedure. A sure fire method of removing a known spyware file is by booting into an entirely different operating system and manually deleting it.

When you ran HiJackThis you probably noticed a file name associated with. This is most likely the file that is run when windows starts up that activates the evil spyware process. If you thought, "I'll just delete this file." It would be a great idea but if you tried to do so you probably came across the error, "Access Denied, file may be in use" or something like that. Don't ask me why but Windows is unable to delete a file if it is in use. There is absolutely no reason why this has to be the case. I have no problems deleting executables of running processes in Linux. Anyway, to delete this file you need to boot the computer from a different medium, the most convenient is probably a CD. The best type of bootable CD for spyware removal purposes is probably Bart's PE. You can find information on how to build a bootable CD with windows XP and spyware removal tools here.

If you took a look at that you probably noticed that it was a rather complicated procedure. It is quite possible that you already have a boot CD that will do what you need to do. If you have a windows Installation CD you could boot from it and then press 'r' to enter the recovery console. Sometimes it will ask you for your administrator password. If you don't know it try just pressing enter. If that doesn't work see Windows Password Recovery Guide for information on how to reset administrator passwords. Once you are presented with a prompt you can issue DOS commands like, "del /Path/to/file/filename.exe" to remove the offending file that you found with HiJackThis.exe (you did wright that file name down, right?).

Hopefully this spyware removal guide has helped you get your computer working as good as the day you purchased it. Of course this all would have been avoided if you had just used Linux. Don't forget to check out Spyware prevention once you get all the spyware removed.

Copyright © 2007–2009 by NNU Computer Whiz. All rights reserved.

Process text file of Book titles from B&N

Process the text file using this script

Friday, February 27, 2009

Convert UIF to ISO


Convert UIF to ISO

The fastest way to convert an UIF image to ISO image is UIF2ISO. It is a speedy command line tool, that will save you the hassle of installing wine and MagicISO.

This is how I downloaded and installed UIF2ISO, written by Luigi Auriemma.

1. We first need to install zlib and OpenSSL with apt-get.
sudo apt-get install zlib1g zlib1g-dev libssl-dev build-essential

2. Now we can download UIF2ISO with wget from a terminal, or from the author’s site here.
wget http://aluigi.altervista.org/mytoolz/uif2iso.zip

3. Once you have the file downloaded, unzip it and cd into the directory.
unzip uif2iso.zip
cd src

4. Finally compile the source, and create the executable.
make
sudo make install

5. Now you can convert the .uif file to an .iso with the following command:
uif2iso example.uif output.iso

Mounting an ISO

You don't necessarily need to burn a cd in order to access the files within the ISO. You can mount it with some simple commands.



Here is how to mount the ISO from command line.
sudo modprobe loop
sudo mkdir ISO_directory
sudo mount /media/file.iso /media/ISOPoint/ -t iso9660 -o loop

TBD



Tuesday, February 24, 2009

Installing Oracle9i on RedHat Linux (or Similar)

Get UUID info


[root@localhost alex]# blkid /dev/sda1
/dev/sda1: UUID="0E3CCDE13CCDC445" LABEL="HP_PAVILION" TYPE="ntfs"

[root@localhost alex]# ls -l /dev/disk/by-uuid/
total 0
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 0E3CCDE13CCDC445 -> ../../sda1
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 3864DD9564DD566A -> ../../sda3
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 3f480ba3-8683-452e-b355-cba2480b2a0a -> ../../sda9
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 51d4ad6a-673a-44c4-884c-fcbf14a8ea28 -> ../../sda5
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 6dd1961e-dc7c-4bf7-9fb2-70ff72eabecc -> ../../sda8
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 d94a3fcf-5b25-4320-8510-c21ce9691586 -> ../../sda7
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 dbaa1464-8820-4965-b9e8-c7f13dc9784b -> ../../sda6
lrwxrwxrwx 1 root root 10 2009-02-24 10:07 e17520dd-565c-4e2e-b594-f9a0da78fbc8 -> ../../sda2

Downloading Oracle 9i


Oracle9i Database Release 2 (9.2.0.4) Enterprise/Standard Edition
for Linux x86-64

Oracle9i Database Release 2 (9.2.0.4.0) for Linux x86-64
Download the Complete Files
amd64_db_9204_Disk1.cpio.gz (423,559,952 bytes) (cksum - 2519016497)
amd64_db_9204_Disk2.cpio.gz (578,948,873 bytes) (cksum -721603952)
amd64_db_9204_Disk3.cpio.gz (334,834,987 bytes) (cksum - 1896810138)

Directions
1. Uncompress the file using "gunzip".
[root]# gunzip amd64_db_9204_Disk1.cpio.gz
2. Extract the file resulting from the step above using "cpio"
[root]# cpio -idcmv < amd64_db_9204_Disk1.cpio

Tuesday, February 17, 2009

Harnessing Hibernate by Elliott,O'brien & Fowler


Harnessing Hibernate
by Elliott,O'brien & Fowler

CHAPTER 1: Installation and Setup
---------------------------------
1.Getting and Installing an Ant Distribution
1.1.[root]# cd /opt
1.2.[root]# wget http://www.ibiblio.org/pub/mirrors/apache/ant/binaries/apache-ant-1.7.1-bin.tar.gz
1.3.[root]# tar xvfz apache-ant-1.7.1-bin.tar.gz
1.4.[root]# ln -s /opt/apache-ant-1.7.1 /usr/local/ant
1.5.[root]# vi /etc/profile.d/ant.sh
----------------------------------
View the ant.sh file
----------------------------------
1.6.[root]# chmod a+x /etc/profile.d/ant.sh
1.7.[root]# source /etc/profile.d/ant.sh

2. Check Your Java Version
2.1.[root]# java -version

3. Check Ant version
3.1.[root]# ant -version

4. Getting and Installing the Maven Tasks for Ant
4.1.[root]# wget http://www.apache.org/dyn/closer.cgi/maven/binaries/maven-ant-tasks-2.0.9.jar
4.2.[root]# mv maven-ant-tasks-2.0.9.jar %ANT_HOME/lib/.
4.3.[root]# ant -diagnostics | grep maven | grep bytes

5. Using the HSQLDB Database Engine
5.1 Download the hsqldb jars from their website

6. Using and Installing Hibernate Core
6.1.Download the hibernate-distribution-3.3.1.GA-dist.tar.gz
6.2.[root]# mv hibernate-distribution-3.3.1.GA-dist.tar.gz /opt/.
6.3.[root]# cd /opt
6.4.[root]# tar xvfz hibernate-distribution-3.3.1.GA-dist.tar.gz
6.6.[root]# ln -s /opt/hibernate-distribution-3.3.1.GA /usr/local/hibernate

7. Setting Up a Project Hierarchy
7.1.[root]# mkdir /home/alex/HibernateProjects
7.2.[root]# cd /home/alex/HibernateProjects
7.3.[root]# mkdir data
7.4.[root]# mkdir src
7.5.[root]# mkdir -p src/com/oreilly/hh/data
7.5.[root]# vi src/build.xml
----------------------------------
View the build.xml file
----------------------------------
7.6.[root]# ant db
7.7.[root]# ant print-classpath

Thursday, February 12, 2009

Updating Fedora 15 to the Linux kernel version 3.0.3

Modified: 08/24/2011
Check the http://www.kernel.org/ website for the correct URL of the tarballs.

1.[root]# mkdir /usr/builds/src/
2.[root]# cd /usr/builds/src/
3.[root]# yum install wget
4.[root]# wget http://www.kernel.org/pub/linux/kernel/v3.0/linux-3.0.3.tar.bz2
5.[root]# tar xvjf linux-3.0.3.tar.bz2
6.[root]# ln -sfn /usr/builds/src/linux-3.0.3 /usr/src/kernels/linux
7.[root]# cd /usr/src/kernels/linux
8.[root]# wget http://www.kernel.org/pub/linux/kernel/v3.0/patch-3.0.3.bz2
9.[root]# bzip2 -dc patch-3.0.3.bz2 | patch -p1 -R
10.[root]# yum install kernel-devel kernel-headers gcc ncurses-devel
Note: Necessary only if previously not installed
11.[root]# make mrproper
Note: If there is no /boot/config-$(uname -r), perform a manual copy first.
12.[root]# cp /boot/config-2.6.35.11-83.fc14.i686 /boot/config-$(uname -r)
13.[root]# cp /boot/config-$(uname -r) ./.config
14.[root]# make menuconfig
(a) Load Alternative Configuration File
(b) .config
(c) Exit
(d) Yes
15.[root]# make clean
16.[root]# make all
17.[root]# make modules_install
18.[root]# make install

Sunday, February 1, 2009

Updating your ndiswrapper module


UPDATING THE ndiswrapper module WHEN YOU UPDATE THE FEDORA KERNEL
---------------------------------------------------------------------

1. Clean the yum database
-------------------------
[root@localhost alex]# yum clean all
Loaded plugins: refresh-packagekit
Cleaning up Everything

2. Update the packages based on the updates from database
----------------------------------------------------------
[root@localhost alex]# yum update
Loaded plugins: refresh-packagekit
fedora | 2.8 kB 00:00
fedora/primary_db | 8.1 MB 02:44
rpmfusion-free-updates | 2.7 kB 00:00
rpmfusion-free-updates/primary_db | 130 kB 00:00
rpmfusion-nonfree-updates | 2.7 kB 00:00
rpmfusion-nonfree-updates/primary_db | 56 kB 00:00
rpmfusion-free | 2.7 kB 00:00
rpmfusion-free/primary_db | 259 kB 00:01
adobe-linux-i386 | 951 B 00:00
adobe-linux-i386/primary | 10 kB 00:00
adobe-linux-i386 17/17
rpmfusion-nonfree | 2.7 kB 00:00
rpmfusion-nonfree/primary_db | 66 kB 00:00
http://mirrors.kernel.org/fedora/updates/10/x86_64/repodata/repomd.xml: [Errno 12] Timeout:
Trying other mirror.
updates | 2.3 kB 00:00
updates/primary_db | 2.4 MB 00:12
Setting up Update Process
Resolving Dependencies
--> Running transaction check
---> Package selinux-policy-targeted.noarch 0:3.5.13-40.fc10 set to be updated
---> Package kernel.x86_64 0:2.6.27.12-170.2.5.fc10 set to be installed
---> Package PackageKit-udev-helper.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package PackageKit-yum-plugin.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package gnome-packagekit.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package selinux-policy.noarch 0:3.5.13-40.fc10 set to be updated
---> Package kernel-firmware.noarch 0:2.6.27.12-170.2.5.fc10 set to be updated
---> Package PackageKit-yum.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package kernel-doc.noarch 0:2.6.27.12-170.2.5.fc10 set to be updated
---> Package xine-lib-pulseaudio.x86_64 0:1.1.16.1-1.fc10 set to be updated
---> Package kernel-headers.x86_64 0:2.6.27.12-170.2.5.fc10 set to be updated
---> Package PackageKit.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package libpurple.x86_64 0:2.5.4-1.fc10 set to be updated
---> Package xine-lib.x86_64 0:1.1.16.1-1.fc10 set to be updated
---> Package pidgin.x86_64 0:2.5.4-1.fc10 set to be updated
---> Package PackageKit-glib.x86_64 0:0.3.13-1.fc10 set to be updated
---> Package kernel-devel.x86_64 0:2.6.27.12-170.2.5.fc10 set to be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
Package Arch Version Repository
Size
================================================================================
Installing:
kernel x86_64 2.6.27.12-170.2.5.fc10 updates 20 M
kernel-devel x86_64 2.6.27.12-170.2.5.fc10 updates 5.5 M
Updating:
PackageKit x86_64 0.3.13-1.fc10 updates 361 k
PackageKit-glib x86_64 0.3.13-1.fc10 updates 124 k
PackageKit-udev-helper x86_64 0.3.13-1.fc10 updates 54 k
PackageKit-yum x86_64 0.3.13-1.fc10 updates 112 k
PackageKit-yum-plugin x86_64 0.3.13-1.fc10 updates 55 k
gnome-packagekit x86_64 0.3.13-1.fc10 updates 2.4 M
kernel-doc noarch 2.6.27.12-170.2.5.fc10 updates 9.3 M
kernel-firmware noarch 2.6.27.12-170.2.5.fc10 updates 361 k
kernel-headers x86_64 2.6.27.12-170.2.5.fc10 updates 755 k
libpurple x86_64 2.5.4-1.fc10 updates 7.4 M
pidgin x86_64 2.5.4-1.fc10 updates 1.3 M
selinux-policy noarch 3.5.13-40.fc10 updates 616 k
selinux-policy-targeted noarch 3.5.13-40.fc10 updates 2.0 M
xine-lib x86_64 1.1.16.1-1.fc10 updates 2.4 M
xine-lib-pulseaudio x86_64 1.1.16.1-1.fc10 updates 16 k

Transaction Summary
================================================================================
Install 2 Package(s)
Update 15 Package(s)
Remove 0 Package(s)

Total download size: 52 M
Is this ok [y/N]: y
Downloading Packages:
(1/17): xine-lib-pulseaudio-1.1.16.1-1.fc10.x86_64.rpm | 16 kB 00:00
(2/17): PackageKit-udev-helper-0.3.13-1.fc10.x86_64.rpm | 54 kB 00:00
(3/17): PackageKit-yum-plugin-0.3.13-1.fc10.x86_64.rpm | 55 kB 00:00
(4/17): PackageKit-yum-0.3.13-1.fc10.x86_64.rpm | 112 kB 00:00
(5/17): PackageKit-glib-0.3.13-1.fc10.x86_64.rpm | 124 kB 00:00
(6/17): kernel-firmware-2.6.27.12-170.2.5.fc10.noarch.rp | 361 kB 00:01
(7/17): PackageKit-0.3.13-1.fc10.x86_64.rpm | 361 kB 00:02
(8/17): selinux-policy-3.5.13-40.fc10.noarch.rpm | 616 kB 00:03
(9/17): kernel-headers-2.6.27.12-170.2.5.fc10.x86_64.rpm | 755 kB 00:04
(10/17): pidgin-2.5.4-1.fc10.x86_64.rpm | 1.3 MB 00:06
(11/17): selinux-policy-targeted-3.5.13-40.fc10.noarch.r | 2.0 MB 00:10
(12/17): xine-lib-1.1.16.1-1.fc10.x86_64.rpm | 2.4 MB 00:12
(13/17): gnome-packagekit-0.3.13-1.fc10.x86_64.rpm | 2.4 MB 00:12
(14/17): kernel-devel-2.6.27.12-170.2.5.fc10.x86_64.rpm | 5.5 MB 00:28
(15/17): libpurple-2.5.4-1.fc10.x86_64.rpm | 7.4 MB 00:38
(16/17): kernel-doc-2.6.27.12-170.2.5.fc10.noarch.rpm | 9.3 MB 00:49
(17/17): kernel-2.6.27.12-170.2.5.fc10.x86_64.rpm | 20 MB 01:40
--------------------------------------------------------------------------------
Total 196 kB/s | 52 MB 04:34
============================== Entering rpm code ===============================
Running rpm_check_debug
Running Transaction Test
Finished Transaction Test
Transaction Test Succeeded
Running Transaction
Updating : xine-lib 1/32
Updating : libpurple 2/32
Updating : pidgin 3/32
Updating : xine-lib-pulseaudio 4/32
Updating : kernel-firmware 5/32
Updating : selinux-policy 6/32
Updating : selinux-policy-targeted 7/32
Installing : kernel-devel 8/32
Updating : kernel-headers 9/32
Updating : kernel-doc 10/32
Installing : kernel 11/32
Updating : PackageKit-yum 12/32
Updating : PackageKit-yum-plugin 13/32
Updating : PackageKit-glib 14/32
Updating : PackageKit 15/32
Updating : gnome-packagekit 16/32
Updating : PackageKit-udev-helper 17/32
Cleanup : libpurple 18/32
Cleanup : PackageKit-yum 19/32
Cleanup : kernel-doc 20/32
Cleanup : PackageKit-yum-plugin 21/32
Cleanup : gnome-packagekit 22/32
Cleanup : PackageKit 23/32
Cleanup : selinux-policy 24/32
Cleanup : pidgin 25/32
Cleanup : PackageKit-udev-helper 26/32
Cleanup : xine-lib 27/32
Cleanup : kernel-headers 28/32
Cleanup : kernel-firmware 29/32
Cleanup : xine-lib-pulseaudio 30/32
Cleanup : PackageKit-glib 31/32
Cleanup : selinux-policy-targeted 32/32

=============================== Leaving rpm code ===============================

Installed:
kernel.x86_64 0:2.6.27.12-170.2.5.fc10
kernel-devel.x86_64 0:2.6.27.12-170.2.5.fc10

Updated:
PackageKit.x86_64 0:0.3.13-1.fc10
PackageKit-glib.x86_64 0:0.3.13-1.fc10
PackageKit-udev-helper.x86_64 0:0.3.13-1.fc10
PackageKit-yum.x86_64 0:0.3.13-1.fc10
PackageKit-yum-plugin.x86_64 0:0.3.13-1.fc10
gnome-packagekit.x86_64 0:0.3.13-1.fc10
kernel-doc.noarch 0:2.6.27.12-170.2.5.fc10
kernel-firmware.noarch 0:2.6.27.12-170.2.5.fc10
kernel-headers.x86_64 0:2.6.27.12-170.2.5.fc10
libpurple.x86_64 0:2.5.4-1.fc10
pidgin.x86_64 0:2.5.4-1.fc10
selinux-policy.noarch 0:3.5.13-40.fc10
selinux-policy-targeted.noarch 0:3.5.13-40.fc10
xine-lib.x86_64 0:1.1.16.1-1.fc10
xine-lib-pulseaudio.x86_64 0:1.1.16.1-1.fc10

Complete!
[root@localhost alex]#

3. Uninstall the old ndiswrapper module compiled using the old kernel
---------------------------------------------------------------------
[root@localhost ndiswrapper-1.54]# make uninstall
NOTE: Not all installed files are removed, as different distributions install ndiswrapper files at different places.
Run uninstall as many times as necessary until no "removing" messages appear below.
removing /sbin/loadndisdriver
removing /usr/sbin/ndiswrapper
removing /usr/sbin/ndiswrapper-buginfo

4. Compile a new version of ndiswrapper module using the new kernel
-------------------------------------------------------------------
[root@localhost ndiswrapper-1.54]# make
make -C driver
make[1]: Entering directory `/home/alex/Download/ndiswrapper-1.54/driver'
make -C /usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64 M=/home/alex/Download/ndiswrapper-1.54/driver
make[2]: Entering directory `/usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64'
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/crt_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/crt.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/hal_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/hal.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/iw_ndis.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/loader.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ndis_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ndis.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_io_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_io.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/pe_linker.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/pnp.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/proc.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/rtl_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/rtl.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/wrapmem.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/wrapndis.o
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/wrapper.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/usb_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/usb.o
MKSTUBS /home/alex/Download/ndiswrapper-1.54/driver/win2lin_stubs.h
AS [M] /home/alex/Download/ndiswrapper-1.54/driver/win2lin_stubs.o
LD [M] /home/alex/Download/ndiswrapper-1.54/driver/ndiswrapper.o
Building modules, stage 2.
MODPOST 1 modules
CC /home/alex/Download/ndiswrapper-1.54/driver/ndiswrapper.mod.o
LD [M] /home/alex/Download/ndiswrapper-1.54/driver/ndiswrapper.ko
make[2]: Leaving directory `/usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64'
make[1]: Leaving directory `/home/alex/Download/ndiswrapper-1.54/driver'
make -C utils
make[1]: Entering directory `/home/alex/Download/ndiswrapper-1.54/utils'
make[1]: Nothing to be done for `all'.
make[1]: Leaving directory `/home/alex/Download/ndiswrapper-1.54/utils'

5. Install the new ndiswrapper module
-------------------------------------
[root@localhost ndiswrapper-1.54]# make install
make -C driver install
make[1]: Entering directory `/home/alex/Download/ndiswrapper-1.54/driver'
make -C /usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64 M=/home/alex/Download/ndiswrapper-1.54/driver
make[2]: Entering directory `/usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64'
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/crt_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/crt.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/hal_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/hal.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ndis_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ndis.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_io_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/ntoskernel_io.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/rtl_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/rtl.o
MKEXPORT /home/alex/Download/ndiswrapper-1.54/driver/usb_exports.h
CC [M] /home/alex/Download/ndiswrapper-1.54/driver/usb.o
MKSTUBS /home/alex/Download/ndiswrapper-1.54/driver/win2lin_stubs.h
AS [M] /home/alex/Download/ndiswrapper-1.54/driver/win2lin_stubs.o
LD [M] /home/alex/Download/ndiswrapper-1.54/driver/ndiswrapper.o
Building modules, stage 2.
MODPOST 1 modules
LD [M] /home/alex/Download/ndiswrapper-1.54/driver/ndiswrapper.ko
make[2]: Leaving directory `/usr/src/kernels/2.6.27.12-170.2.5.fc10.x86_64'
echo /lib/modules/2.6.27.12-170.2.5.fc10.x86_64/misc
/lib/modules/2.6.27.12-170.2.5.fc10.x86_64/misc
mkdir -p /lib/modules/2.6.27.12-170.2.5.fc10.x86_64/misc
install -m 0644 ndiswrapper.ko /lib/modules/2.6.27.12-170.2.5.fc10.x86_64/misc
/sbin/depmod -a 2.6.27.12-170.2.5.fc10.x86_64 -b /
make[1]: Leaving directory `/home/alex/Download/ndiswrapper-1.54/driver'
make -C utils install
make[1]: Entering directory `/home/alex/Download/ndiswrapper-1.54/utils'
install -D -m 755 loadndisdriver /sbin/loadndisdriver
install -D -m 755 ndiswrapper /usr/sbin/ndiswrapper
install -D -m 755 ndiswrapper-buginfo /usr/sbin/ndiswrapper-buginfo

NOTE: Windows driver configuration file format has changed since 1.5. You must re-install Windows drivers if they were installed before.
make[1]: Leaving directory `/home/alex/Download/ndiswrapper-1.54/utils'
mkdir -p -m 0755 /usr/share/man/man8
install -m 644 ndiswrapper.8 /usr/share/man/man8
install -m 644 loadndisdriver.8 /usr/share/man/man8

6. Load the new ndiswrapper module using modprobe
--------------------------------------------------
[root@localhost ndiswrapper-1.54]# modprobe ndiswrapper
[root@localhost ndiswrapper-1.54]# modprobe ndiswrapper
[root@localhost ndiswrapper-1.54]# modprobe ndiswrapper

7. Check is ndiswrapper module is successfully loaded
-----------------------------------------------------
[root@localhost ndiswrapper-1.54]# modinfo ndiswrapper
filename: /lib/modules/2.6.27.12-170.2.5.fc10.x86_64/misc/ndiswrapper.ko
license: GPL
version: 1.54
description: NDIS wrapper driver
author: ndiswrapper team
srcversion: FB4F5DE146139E5A7B80324
depends:
vermagic: 2.6.27.12-170.2.5.fc10.x86_64 SMP mod_unload
parm: if_name:Network interface name or template (default: wlan%d) (charp)
parm: proc_uid:The uid of the files created in /proc (default: 0). (int)
parm: proc_gid:The gid of the files created in /proc (default: 0). (int)
parm: debug:debug level (int)
parm: hangcheck_interval:The interval, in seconds, for checking if driver is hung. (default: 0) (int)
parm: utils_version:Compatible version of utils (read only: 1.9) (charp)
[root@localhost ndiswrapper-1.54]#