Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Monday, February 24, 2014

25 Mythical and Humorous Facts About Linux Creator Linus Torvalds..

Most people feel Linus Torvalds is the world's greatest computer programmer/hacker. So it’s not surprising that many of his loyal fans have applauded him and have recited stories about his great accomplishments.

Linus Torvalds, Computer, Programmer, Facts, Mythical, Humorous, Accomplishment, Microsoft, Software, Anti-virus
As cited on junauza.com, here are some mythical and rather humorous facts about Linus Torvalds:

1- His initial words were syscalls.

2- His DNA is in binary.

3- His first written program had artificial intelligence.

4- He already has Linux 3.0 and is just keeping it to himself for creating suspense.

5- He can touch MC Hammer.

6- He doesn't worry about Microsoft patent crap, he simply does "sudo mv /tmp/ms /dev/null".

7- He can perform infinite loop in five seconds... in his head.

8- He can install Gentoo in a week.

9- He can halt a BSOD... on Vista 64-bit.

10- He doesn't require anti-virus software. Virii need anti-Linus software.

11- He doesn't wear glasses any longer, not due to the fact that he has had a laser eye surgery, but as he finally got his xorg.conf properly configured in his head.

12- He wrote the whole kernel in binary and reverse engineered it to C code for others benefit.

13- He can play 3D games in his head by interpreting the source code in real-time.

14- He takes a single look at your desktop and knows which porn sites you visited over the past decade.

15- His computer's clock isn't synchronized with the world but the world synchronizes with Linus Torvalds's clock.

16- He surfs the web using nothing but netcat.

17- He has developed warp drive, sun destroying bombs and a ray that can teleport him a new sausage each day before he drinks his morning beer.

18- He doesn't push the flush toilet button, brush his teeth, shower or clean his house; he simply says, "make clean".

19- He can defragment an NTFS partition using hand.

20- He doesn't debug and programs are always perfect.

21- He is real, unless declared Integer.

22- He can delete the universe by typing rm -rf /.

23- He does not sleep; he hacks.

24- His favorite joke is HURD.

25- He didn't design Linux to run on the 386.     

Tuesday, July 10, 2012

8 Best Linux Terminal Emulators You May Have Never Heard Of


8 Best Linux Terminal Emulators You May Have Never Heard Of: For some Linux users, the terminal or command line shell is a useful and powerful tool that can help accomplish tasks (from simple to complex) in a more efficient and often quicker way. Although it is not a necessity anymore, I think it would still be handy to have some basic command line skills. To those of you who are afraid to use the Linux terminal, perhaps you should get or download some Linux/UNIX command cheat sheets.

Since majority of popular Linux distributions utilizes either KDE or GNOME desktop environment, you may have only used terminal emulators such as Konsole, GNOME Terminal, and xterm. But did you know that there are capable and unique terminal emulators for Linux other than those I've mentioned?

Here is a list of some of the best Linux terminal emulators you may have never heard of (in no particular order):


Terminator
Terminator is currently my favorite Linux terminal emulator. It allows me to easily organize multiple command line sessions into resizable split panes within the same window. This way, I can do some command-line multitasking in a more efficient manner, minus the desktop clutter. Terminator is written in Python, and it will work on any modern POSIX system with Java 5 or later, which means it can also run on other operating system platforms aside from Linux such as Windows and Mac OS X.



Guake
Guake is a top-down terminal emulator for GNOME Desktop Environment that has a design inspired by consoles in computer games such as Quake and Doom. It can quickly slide down from the top of the screen using a single keystroke, and can be hidden by pressing the same key. The advantage of using Guake when compared to the standard terminal is that it is faster to open since the program is already loaded into the computer memory.



Yakuake
Yakuake (Yet Another Kuake) is a drop-down KDE terminal emulator with features almost similar to that of Guake. Its design was also inspired by consoles in computer games. Like Kate, Konqueror, and other KDE applications, Yakuake depends on Konsole for its terminal functionality.



rxvt
rxvt is a simple and lightweight terminal emulator that is aimed to be a slimmed-down replacement for the already slim xterm, removing several of its little-used features, like Tektronix 4014 emulation and toolkit-style configurability. Apart from features like those controlled by resource files, the terminal emulation of rxvt differs from xterm in a few important ways.



Tilda
Tilda is a slide-down GTK+ terminal emulator similar to that of Guake and Yakuake. The program also runs invisibly in the background allowing it to quickly slide up and down once a hotkey is pressed.



mrxvt
mrxvt is a multi-tabbed terminal emulator based on rxvt that provides DEC VT102 compatible terminals. Like rxvt, it is fast, lightweight, and flexible without depending on desktop environments such as GNOME or KDE. The main features of mrxvt include multiple tabs, dynamically changeable tab titles, customizable command for each tab, input broadcasting, fast pseudo-transparency with tinting, user supplied background images, multi-language support, Freetype font, logging, and more.



Wterm
Wterm is a fork rxvt that is also very fast and lightweight. Its look was designed for NeXTSTEP style window managers like Window Maker. It has terminal support for Latin, Chinese, and Greek characters and features customizable background images, background color tinting, and zero overhead pseudo-transparent background.



aterm
aterm is the AfterStep terminal emulator for the X Window System that is based (again) on rxvt. As described from its project webpage, aterm is designed to provide pleasing visual effects, while performing such a mundane function as terminal emulation under X.



If you know of other capable terminal emulators for Linux that I fail to include on the above list, please share them with us via comment.

Monday, June 25, 2012

3 Ways to Automate Tasks on Linux


Linux is, and always was, one of the most powerful operating systems on the planet. From Android to Ubuntu, Linux’s versatility has made it quite popular with developers, system admins, hackers, and of course, end users. Though simple to use and learn, Linux’s untapped prowess can be used to accomplish many tasks in your daily life. From running a garden sprinkler to rocking a baby’s cradle, Linux is just about as awesome as Chuck Norris.

Don’t worry if you are not that adventurous, because the penguin can also help you save the time you spend on simple repetitive tasks by automating them. Tasks like backing up your important folders, rebooting your computer, and even downloading torrents. So, whether you’re a little lazy (as all geeks are) or just someone who doesn't have much time, this article will guide you in saving a few precious hours in your life by automating boring repetitive tasks for you.


Take Automatic Backups
If you’re worried about losing your data, then backing it up safely is the best solution. We've already listed some of the best backup tools for Linux; however, the shining newDeja Dup is our favorite these days. Its simplicity as well as its inclusion as the default backup application in Ubuntu has made it a reliable choice. Deja Dup, once set up, can allow you to take automatic backups of your data without you having to manually do it. To get started, simply open Deja Dup by searching for it using the launcher (Super key).

Now, once the application starts, go to the “schedule” tab and select the frequency that suits you best. Also, don’t forget to choose whether to keep backups forever or for a set period of time. You don’t want to have your hard disk or online account bloated with just backups.

Then, once you are set, go back to the ‘Overview’ tab and turn ‘Automatic Backups’ on. This will ensure that your data is safe even when you’re not using the computer. Of course, you’ll have to leave your computer on for this.


Reboot or Shutdown your computer
Using the ‘at’ command you can shutdown or reboot your Linux device even while you’re away from it. So, let’s say you want to shutdown your computer at 3 PM. To get started, open the terminal first (Ctrl + Alt + T), then punch in the following command:

at 3pm
Now, the command will take you to a prompt mode wherein you’ll instruct ‘at’ to do a particular job. There, simply enter the command ‘halt’ without quotes. Press Ctrl+D to exit.

Now, you've instructed the computer to halt (that is to shut down) at 3pm. You can, in the same way, add more commands to the list. To check on the current pending jobs, simply enter the ‘atq’ command without quotes. To remove a particular job, use the ‘atrm’ command.


Auto-start torrent downloads
If you’re sleeping or out of the house and wanted to auto-start a download at a specific time, then Linux can be your best friend. Say, you’re leaving your house at 10 AM, you can then schedule Linux to start Transmission (popular torrent client) at 2 PM using the following command.

sleep 4h && transmission-gtk
The above command will start Transmission exactly 4 hours after you've issued it. If you want Transmission to run after 3 and a half hours, simply enter this command:

sleep 3h && sleep 30m && transmission-gtk
This can be very useful for people who use data plans where in the ISPs provide unlimited downloading at night. Also, if you want to stop the download before you wake up, or at a specific time, you can issue the following command:

sleep 8h && pkill transmission-gtk

Top 10 Most Infamous Black Hat Hackers of All Time

In the world of information technology, black hat hackers (also known as crackers or cyber-criminals) are known as the bad guys or villains. Most of them break into computers or networks without authorization to steal Money and classified and sensitive information, while others are doing it simply for the challenge or the thrill of hacking. To accomplish their sinister work, crackers often create malware (malicious software) like viruses and worms to gain control of computer systems.


I have gathered here a list of ten of the most popular cyber-criminals the world has ever known. These evil geniuses were involved in high profile hacking that possibly caused millions, if not billions of dollars in total damages. However, some of them have now turned to the good side and are using their talents for the benefit of mankind.


Without further delay, here are the top 10 most infamous black hat hackers of all time:


10. Jonathan James
At the age of 16, Jonathan James (also known as c0mrade) became the first juvenile imprisoned for cybercrime in the United States. James carried out a series of intrusions into various systems including the computers of the Defense Threat Reduction Agency (DTRA) of the US Department of Defense. James had installed an unauthorized backdoor in a computer server in Dulles, Virginia that he used to install a sniffer allowing him to intercept over three thousand messages passing to and from DTRA employees while collecting countless usernames and passwords. This intrusion caused NASA to shut down its computers for three weeks costing them $41,000 to check and secure their systems. Jonathan James committed suicide in 2008.


9. Kevin Poulsen
Kevin Poulsen (also known as Dark Dante) is a notorious black hat hacker in the 1980s. One of his popular hacks was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, assuring that he would be the 102nd caller, and the likely winner of a brand new Porsche 944. Poulsen went underground as a fugitive when the FBI started pursuing him, but was finally captured in 1991. He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison, which at that time was the longest sentence ever given for cracking. He is now a free man and is a senior editor at Wired News.


8. Albert Gonzalez
Albert Gonzalez is a cyber-criminal accused of masterminding the biggest ATM and Credit Card theft in history. From 2005 through 2007, he and his group have allegedly sold more than 170 million card and ATM numbers. Gonzalez's team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, which allowed him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million in plastic bags placed in a three-foot drum buried in his parents' backyard. Earlier this year, Gonzalez was sentenced to 20 years in federal prison.


7. Michael Calce 
In February 2000, Michael Calce (a.k.a. MafiaBoy) launched a series of highly publicized denial-of-service attacks against large commercial websites. His victims include Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web's leading search engine causing it to shutdown for about an hour. Calce exploited websites primarily for pride and to establish dominance for himself and his cybergroup named TNT. In 2001, the Montreal Youth Court sentenced him to eight months of open custody, one year of probation, restricted use of the Internet, and a small fine.


6. Markus Hess
Markus Hess is a German hacker in the late 1980s that was recruited by the KGB and was involved in a Cold War computer espionage incident. All the way from Germany, he was able to access computer systems from the Lawrence Berkeley Laboratory (LBL) located in California. By using LBL to “piggyback” to ARPANET and MILNET, Hess attack 400 U.S. military computers including OPTIMIS Database (The Pentagon), Anniston Army Depot, U.S. Air Force (Ramstein Air Base, West Germany), Fort Buckner, Camp Foster (Okinawa, Japan). He went to trial in 1990 and was found guilty of espionage. Hess was sentenced to a one to three year prison sentence but was eventually released on probation.


5. Vladimir Levin
Vladimir Levin is known for his involvement in the attempt to illegally transfer 10.7 million US dollars via Citibank's computers. In 1997, Levin was brought into U.S. custody, and he admitted to only one count of conspiracy to defraud and to stealing $3.7 million. The following year, he was convicted and sentenced to three years in prison, and ordered to pay more than $200,000. Of the stolen $10.7 million, Citibank claimed that only around $400,000 had been recovered. At the moment, Levin is free and now lives in Lithuania.


4. Robert Tappan Morris
Robert Tappan Morris is an 'accidental' black hat hacker infamous for creating the first ever computer worm on the Internet known as Morris Worm. In 1988, he created the worm while he was a graduate student at Cornell University with the original aim of measuring the size of the Internet or counting the number of computers connected to it. The Morris Worm spread rapidly and infected thousands of computers. The cost of possible loss in productivity caused by the worm at each system ranged from $20,000 to more than $530,000 as estimated. Without serving jail time, Morris was sentenced to community service, probation, and a fine of $10,000. He is currently a professor at Massachusetts Institute of Technology (MIT), in the Institute's department of Electrical Engineering and Computer Science.


3. Adrian Lamo
Adrian Lamo is widely known for breaking into a series of high-profile computer networks that include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times' internal database of expert sources and used LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo's arrest was issued, followed by a 15-month investigation by federal prosecutors in New York. After several days in hiding, he surrendered to the US Marshals, and then to the FBI. Lamo was ordered to pay around $65,000 in damages and was sentenced to six months house arrest at his parents' home, plus two years probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. At present, he is working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.


2. Gary McKinnon
Gary McKinnon has been accused of what one US prosecutor claims is the "biggest military computer hack of all time". Between February 2001 and March 2002, he reportedly exploited 97 United States military, Department of Defense, and NASA computers. McKinnon allegedly deleted critical files from operating systems that shut down the US Army’s Military District of Washington network of 2,000 computers for 24 hours. He supposedly deleted US Navy Weapons logs, causing a naval base's network of 300 computers unusable after the September 11th terrorist attacks. McKinnon is also charged with copying of sensitive data, account files, and passwords onto his own computer. He expresses that he was only looking for evidence of free energy suppression, a cover-up of UFO activity, and other technologies that may be useful to the public. At present, McKinnon is awaiting extradition to the United States.


1. Kevin Mitnick 
Kevin Mitnick was once considered as the most wanted computer criminal in United States history. He was involved in a highly publicized pursuit by authorities that his misadventures were depicted in two hacker films: Takedown (a.k.a. Hackers 2) and Freedom Downtime. While he was a fugitive, he cracked dozens of computer networks and copied valuable proprietary software and stole corporate secrets from some of the largest cellular telephone and computer companies in the US. Mitnick also intercepted and stole computer passwords, altered computer networks, read private e-mails, and cloned cellular phones to hide his location. In 1999, he confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication. Mitnick was sentenced to a total of 68 months in prison and was incarcerated for 5 years that included 8 months in solitary confinement. He was released in 2000 and is now a well-known computer security consultant, public speaker, and author.

Saturday, December 3, 2011

SQL Commands


SQL Commands 

SQL commands are instructions used to communicate with the database to perform specific task that work with data. SQL commands can be used not only for searching the database but also to perform various other functions like, for example, you can create tables, add data to tables, or modify data, drop the table, set permissions for users. SQL commands are grouped into four major categories depending on their functionality:
  • Data Definition Language (DDL) - These SQL commands are used for creating, modifying, and dropping the structure of database objects. The commands are CREATE, ALTER, DROP, RENAME, and TRUNCATE.
  • Data Manipulation Language (DML) – These SQL commands are used for storing, retrieving, modifying, and deleting data. These commands are SELECT, INSERT, UPDATE, and DELETE.
  • Transaction Control Language (TCL) – These SQL commands are used for managing changes affecting the data. These commands are COMMIT, ROLLBACK, and SAVEPOINT.
  • Data Control Language (DCL) - These SQL commands are used for providing security to database objects. These commands are GRANT and REVOKE.

Commercial Databases

  • Oracle
Oracle is the most popular relational database. It runs on both Unix and Windows. It used to be many times more expensive than SQL Server and DB2, but it has come down a lot in price.
  • SQL Server
SQL Server is Microsoft’s database and, not surprisingly, only runs on Windows. It has only a slightly higher market share than Oracle on Windows machines. Many people find it easier to use than Oracle.
  • DB2
IBM’s DB2 was one of the earliest players in the database market. It is still very commonly used on mainframes and runs on both Windows and Unix.

Popular Open Source Databases

  • MySQL
Because of its small size, its speediness, and its very good documentation, MySQL has quickly become the most popular open source database. MySQL is available on both Windows and Unix, but it lacks some key features such as support for stored procedures.
  • PostgreSQL
Until recently, PostgreSQL was the most popular open source database until that spot was taken over by MySQL. PostgreSQL now calls itself “the world’s most advanced Open Source database software.” It is certainly a featureful and robust database management system and a good choice for people who want some of the advanced features that MySQL doesn’t yet have. PostgreSQL does not yet natively support Windows, but it is supposed to in the upcoming 7.5 release.

Wednesday, October 5, 2011

Convert *.nrg CD Image created by NERO into standard *.iso format: Free application


If you have ever created backups of many compact disk or DVD disk using the Nero Express and later discovered that nero images (*.nrg) is not industry supported formats. As there are not so many softwares available which can  access those images easily. Even many virtual cd drives also denies these formats. Worried… have to recreate those disk in standart ISO format…. Just be relax…. today you will learn about a free software which can transform those cd or dvd images into iso easily.
This piece of application is called IMG to ISO which job is… as the name suggest to convert Nero Images into ISO format. This is a very simple application; you need to just browse the desired file; give the target location and click convert.ou
With in minutes you will get the converted file… in very compatible format which you can access using WIn Rar also. So don;t you are looking for a download link… here it is.

Wednesday, September 28, 2011

Switch Between Classic & Metro Start Menu on Windows 8 from Context Menu

We have covered an article on how to manual disable metro start menu and get back windows 7 style classic start menu on Windows 8, we had also covered a utility Start Menu Toggle which lets you to quickly switch between metro & classic start menu.
Now here is yet another small tweak Start Menu Selector which is designed to quickly change the Windows 8 Start Menu from Metro to classic style on Windows 8. When you download Start Menu Selector it comes with two executable files, one lets you to install Start Menu Selector and second executable lets you to delete the entry made by Start Menu selector in context menu.

Upon double clicking Start Menu Selector.exe it simply inserts the “Start Menu Selector” into system context menu. Right clicking anywhere on desktop you can bringe up context menu, click on Start Menu Selector so change the Metro start menu to classic Windows 7 style start menu.

If you want to revert back then again click on “Start Menu Selector” in context menu. To uninstall click on Delete Start Menu Selector From context menu.exe file and it will remove the entry from context menu.
Download Start Menu Selector.

Thursday, September 22, 2011

Password protected folders with & with out SOFTWARE

older lock with software

click here

http://www.esnips.com/doc/7f993235-e6dc-4ccc-b107-7ee46b69f793/pc-security(reg)


now just download it and make it full version by the side txt files key....
.................................................
folder lock without software
1
If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be f

ormatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do...


Right-click the folder that you want to make private and choose "Properties"

(or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box.














Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on.
Type in a password then confirm it. Click the "Create Password" button then close the Password window.
Click OK in the Properties dialog box.
Now anyone else logged on to your computer can't access that file without knowing your password.
-----------------------------------------------------------------------------------

2
if ur folder is zipped then directly u can open the file in it and see .... ADD A PASSWORD

and confirm ur password and it ll b safe