tag:blogger.com,1999:blog-60061146176255049702024-03-29T03:42:40.922-04:00Linux BlogDevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.comBlogger1521125tag:blogger.com,1999:blog-6006114617625504970.post-73678470716758290252013-06-12T21:32:00.001-04:002013-06-12T21:32:16.380-04:00White Paper - Keep Your PCs Safe while Surfing the Web<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://linuxpoison.tradepub.com/free/w_qa51/prgm.cgi" imageanchor="White Paper - Keep Your PCs Safe while Surfing the Web" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxSsbs7am2AOfVUDjQIN2yqHUiFDxns-1TRMLS-biSiBgXqCBuxKeAeq_kxKLfpXERNIvh07yeFKgsrQMOKq3rZjVdShKl8ZpeNJwrlg8p-yZqD0TBKU-Kzjx-u3Y1UYVgnMzqr4it07U/s1600/w_qa51c.gif" /></a>"<b><i>Keep Your PCs Safe while Surfing the Web</i></b>"<br />
<br />
Learn how Qualys BrowserCheck can make sure your PCs and browsers are up to date.<br />
<br />
The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security. This paper from the Bradley Strategy Group describes how users and businesses can protect their PCs using Qualys BrowserCheck, a free cloud-based service.<br />
<br />
Offered Free by: Qualys, Inc.<br />
Download your free copy of "<i>Keep Your PCs Safe while Surfing the Web</i>" - <a href="http://linuxpoison.tradepub.com/free/w_qa51/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br /></div>
Nikesh Jauharihttp://www.blogger.com/profile/13296676535987957703noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-82698653641982006922013-06-05T12:15:00.002-04:002013-06-05T12:15:34.238-04:00White Paper - Security and Trust: The Backbone of Doing Business Over the Internet<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://linuxpoison.tradepub.com/free/w_verb59/prgm.cgi" imageanchor="White Paper - Security and Trust: The Backbone of Doing Business Over the Internet" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPUuRl7-b3poBCkMp0UgpY6nQQ5yyyfoiXDM6Tl5LAp8tgYFPzxKaL3YJ1CPwV1ZxxUJm-XrpbYIR8tlf-lcWSGL59SSWfJ7mf-krr-o0MimglguH0KrKoWO5CdvUBfa3rCbcN5k0rrPE/s200/w_verb59c4.gif" width="154" /></a>"Security and Trust: The Backbone of Doing Business Over the Internet"<br />
<br />
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent.<br />
<br />
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.<br />
<br />
Sponsored by: <i>Symantec Website Security Solutions </i><br />
Download you free copy of "Security and Trust: The Backbone of Doing Business Over the Internet" -- <a href="http://linuxpoison.tradepub.com/free/w_verb59/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
Nikesh Jauharihttp://www.blogger.com/profile/13296676535987957703noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-17759117321613788752013-05-28T15:43:00.005-04:002013-05-28T15:43:57.201-04:00Whitepaper - The Importance of DMARC (Domain-based Message Authentication, Reporting & Conformance)<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://linuxpoison.tradepub.com/free/w_dyni05/prgm.cgi" imageanchor="Whitepaper - The Importance of DMARC (Domain-based Message Authentication, Reporting & Conformance)" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmHhIoB87duPjNM3p25YADNsApuh6I8SWrJ-tY2mo-VedtE29t-qfCLUixv8X1t_zhlLvxCVc_q7YuO0pNIX33dS2IFMuT791gq8p9CI0KuMXbJ7nQ4fN-W2gsrQWCc3yTZnX5ocoqKk/s1600/w_dyni05c.gif" /></a>"The Importance of DMARC (<i>Domain-based Message Authentication, Reporting & Conformance</i>)"<br />
<br />
With over 144 billion emails sent every day, spammers and phishers have a rapidly growing playground for their attacks.<br />
<br />
Keeping your customers safe goes hand in hand with keeping them happy. For instance, customers are 42% less likely to do business with a company that has undergone a phishing attack.<br />
<br />
Domain-based Message Authentication, Reporting & Conformance (DMARC) has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name. Download this white paper and learn why to keep your brand and customers safe from virtual attackers, implementing DMARC is critical for your email sends.<br />
<br />
Download your free copy of "The Importance of DMARC" - <a href="http://linuxpoison.tradepub.com/free/w_dyni05/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
Nikesh Jauharihttp://www.blogger.com/profile/13296676535987957703noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-77040174874232145942013-05-20T20:16:00.003-04:002013-05-20T20:16:37.448-04:00eBook - A guide to programming Linux kernel modules<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://linuxpoison.tradepub.com/free/w_pete01/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKUTEF5-N5uzpBBulAIDENXYWRKo8NDQPa9BXvhZw4c2wbdghXGPuilr8GJmBP4nnvKErAfOelYAlDz7Gc0N1cA5j3fMjcbXX4AijxR67OY5rsmzydTqcv6WvUmlfEmVaTSocC4RWIPg4/s1600/w_pete01c.gif" /></a>"<i>The Linux Kernel Module Programming Guide</i>"<br />
<br />
A guide to programming Linux kernel modules.<br />
An excellent guide for anyone wishing to get started on kernel module programming. The author takes a hands-on approach starting with writing a small "hello, world" program, and quickly moves from there.<br />
<br />
Far from a boring text on programming, Linux Kernel Module Programming Guide has a lively style that entertains while it educates.<br />
<br />
Download your free copy of "<i>The Linux Kernel Module Programming Guide</i>" -- <a href="http://linuxpoison.tradepub.com/free/w_pete01/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br /></div>
Nikesh Jauharihttp://www.blogger.com/profile/13296676535987957703noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-58166954052884540582013-05-13T12:06:00.000-04:002013-05-13T12:06:06.096-04:00eBook - Understanding the Linux Virtual Memory Manager<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk10/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://2.bp.blogspot.com/-9e1ZOFFOpLg/UZEPFsCsc8I/AAAAAAAAWtc/tx9OxS1cGAc/s1600/w_infk10c.gif" /></a>"<i><b>Understanding the Linux Virtual Memory Manager</b></i>"<br />
<br />
Finally, a comprehensive guide to the Linux VM! This book describes VM in unprecedented detail, presenting both theoretical foundations and a line-by-line source code commentary.<br />
<br />
VM's behavior affects every Linux kernel subsystem and dramatically impacts overall performance. But until now, there was only one way to understand VM: study the poorly documented source one line at a time. Now there's an easier, faster alternative. It systematically covers everything from physical memory description to out-of-memory management. Coverage includes:<br />
<br />
* Linux VM 2.4 architecture in depth-with diagrams and call graphs<br />
* Physical memory description, page tables, address spaces, and memory allocation<br />
* High memory, swapping, shared memory, and much more<br />
* Expert guidance for analyzing the code of any open source project<br />
* New Linux 2.6 kernel features in every chapter<br />
<br />
Well organized and superbly written, Understanding the Linux Virtual Memory Manager will be indispensable to every kernel programmer and researcher.<br />
<br />
Download your free copy of "<i>Understanding the Linux Virtual Memory Manager</i>" - <a href="http://linuxpoison.tradepub.com/free/w_infk10/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br />
<div>
<br /></div>
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-40540296884973088572013-05-06T15:09:00.001-04:002013-05-06T15:09:08.746-04:00eBook - Beginner's Guide to SSL Certificates<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://linuxpoison.tradepub.com/free/w_verb46/prgm.cgi" imageanchor="eBook - Beginner's Guide to SSL Certificates" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://4.bp.blogspot.com/-3G3xDZNh5rQ/UYf_dbx-yHI/AAAAAAAAWsE/gi8GxzWCnPE/s1600/w_verb46c.gif" /></a>"<i>Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options</i>"<br />
<br />
SSL stands for “Secure Socket Layer.” It is a technology that establishes a secure session link between the visitor's web browser and your website so that all communications transmitted through this link are encrypted and are, therefore, secure. SSL is also used for transmitting secure email, secure files, and other forms of information.<br />
<br />
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company.<br />
<br />
Sponsored by: Symantec Website Security Solutions<br />
Offered Free by: Symantec Corporation<br />
<br />
Download your free copy of "Beginner's Guide to SSL Certificates" - <a href="http://linuxpoison.tradepub.com/free/w_verb46/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-57285225036515833242013-05-02T10:53:00.000-04:002013-05-02T10:53:02.436-04:00eBook - Managing Linux Systems with Webmin<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk05/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://4.bp.blogspot.com/-gH0viuLcKkA/UYJ8066fgnI/AAAAAAAAWrk/3gOcy3EwFFM/s1600/w_infk05c.gif" /></a>"<i>Managing Linux Systems with Webmin System Administration and Module Development - Free 808 page eBook</i>"<br />
<br />
Easy, browser-based Linux/UNIX administration with Webmin--step by step.<br />
Webmin gives you an easy, browser-based solution for virtually any day-to-day Linux/UNIX administration task. Now, there's a definitive Webmin guide for every beginning-to-intermediate sysadmin. Written by Webmin's primary developer, Managing Linux® Systems with Webmin; delivers authoritative, step-by-step coverage of the latest version of Webmin, from basic installation to centrally managing multiple servers. Coverage includes:<br />
<br />
* How Webmin works--and how to install and secure it<br />
* Using Webmin to configure basic system services, including file systems, users/groups, and printing<br />
* Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more<br />
* Cluster modules: configuring multiple systems from one master server<br />
* Webmin modules: configuring Webmin itself<br />
* Full API documentation and instructions for writing your own Webmin modules and themes<br />
<br />
Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. Whether you're new to Linux/UNIX system administration or you simply want an alternative to the command line, Managing Linux® Systems with Webmin will be an indispensable resource.<br />
<br />
Download your free copy of "Managing Linux Systems with Webmin" - <a href="http://linuxpoison.tradepub.com/free/w_infk05/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-34173203537666759752013-04-23T11:42:00.004-04:002013-04-23T11:42:27.202-04:00eBook - Linux Patch Management: Keeping Linux Systems Up To Date<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
"<b><i>Linux Patch Management: Keeping Linux® Systems Up To Date</i></b>"<br />
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk12/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://3.bp.blogspot.com/-rLEu6yFLeUA/UXarlU4X5sI/AAAAAAAAWoM/Tcziv2Viwd8/s1600/w_infk12c.gif" /></a>Linux® Patch Management offers Linux professionals start-to-finish solutions, strategies, and examples for every environment, from single computers to enterprise-class networks.<br />
<br />
Michael Jang presents patching solutions for Red Hat, Fedora, SUSE, Debian, and other distributions. He systematically covers both distribution-specific tools and widely used community tools, such as apt and yum. This book's streamlined patch management techniques minimize impacts on users, networks, and administrators, and address applications as well as the underlying OS. Whatever your role in managing Linux® systems, Linux Patch® Management will reduce your costs, enhance the availability of your systems, and dramatically improve your personal efficiency.<br />
<br />
* The first start-to-finish guide to patching Linux® systems in production environments For Red Hat, Fedora, SUSE, Debian, and other leading distributions<br />
* Comprehensive coverage of apt, yum, Red Hat Network, YaST Online Update, Zenworks Linux Management, and other tools<br />
* High-efficiency techniques that minimize impacts on networks, users, and administrators<br />
* Consolidating patches on a Red Hat network, including cached updates, as well as patching systems based on RHEL rebuild distributions<br />
* Working with SUSE's update systems, including YaST Online Update and Zenworks Linux Management<br />
* Making the most of apt commands and the GUI-based Synaptic Package Manager<br />
* Configuring apt for RPM distributions such as Fedora and SUSE Linux<br />
* Creating repositories that can manage gigabytes of patches on diverse Linux® systems<br />
* Updating networks of Linux computers without overloading WAN or Internet connections<br />
* Configuring yum clients, including coverage of emerging GUI tools such as Yum Extender<br />
<br />
By: Michael Jang. Published by Prentice Hall. Part of the Bruce Perens' Open Source Series.<br />
<br />
Download your free copy of "Linux Patch Management: Keeping Linux Systems Up To Date" - <a href="http://linuxpoison.tradepub.com/free/w_infk12/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br />
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-63066089491573297742013-04-15T17:50:00.003-04:002013-04-15T17:50:38.904-04:00eBook - User Mode Linux<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk09/?p=w_infk09" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://4.bp.blogspot.com/--ONFZoQZXi8/UWx1bxwg1FI/AAAAAAAAWlU/PfyoDYe5ChA/s1600/w_infk09c.gif" /></a>"<b><i>User Mode Linux®</i></b>"<br />
In this book, you'll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.<br />
<br />
With User Mode Linux®; you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux®; shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux® servers. Coverage includes:<br />
<br />
* What User Mode Linux® is, how it works, and its uses in Linux networks<br />
* Key applications, including server consolidation, development, and disaster recovery<br />
* Booting and exploration: logins, consoles, swap space, partitioned disks, and more<br />
* Copy-On-Write (COW): UML's efficient approach to storing filesystem changes<br />
* In-depth discussion of User Mode Linux® networking and security<br />
* Centrally managing User Mode Linux® instances, and controlling their hardware resources<br />
* Implementing clusters and other specialized configurations<br />
* Setting up User Mode Linux® servers, step-by-step: small-scale and large-scale examples<br />
* The future of virtualization and User Mode Linux®<br />
<br />
Whether you're a netadmin, sysadmin, teacher, student, or programmer, User Mode Linux®--the technology and this book--is indispensable.<br />
<br />
Download your free copy of "User Mode Linux" -- <a href="http://linuxpoison.tradepub.com/free/w_infk09/?p=w_infk09" rel="nofollow" target="_blank">here</a><br />
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-62301857139297912502013-04-11T11:15:00.003-04:002013-04-11T11:15:28.635-04:00eBook - Java Application Development on Linux<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk04/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="http://2.bp.blogspot.com/-wccwya2V0QU/UWbTTxFTZYI/AAAAAAAAWlE/JmPrmwTda78/s1600/w_infk04c.gif" /></a>"<b><i>Java™ Application Development on Linux® - Free 599 Page eBook</i></b>"<br />
<br />
Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment.<br />
<br />
Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux.<br />
<br />
Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB).<br />
<br />
<b>Readers learn how to:</b><br />
* Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio<br />
* Develop business logic layers using Java DataBase Connectivity (JDBC)<br />
* Add a Web interface using servlets and JSPs<br />
* Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT<br />
* Deploy EJBs in Linux<br />
<br />
The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.<br />
<br />
By Carl Albing, Michael Schwarz. Published by Prentice Hall. Part of the Bruce Perens' Open Source Series.<br />
<br />
Download your free copy of - Java Application Development on Linux -- <a href="http://linuxpoison.tradepub.com/free/w_infk04/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br />
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com1tag:blogger.com,1999:blog-6006114617625504970.post-58681462488730555892013-04-03T11:58:00.002-04:002013-04-03T11:58:43.869-04:00eBook - Linux Quick Fix Notebook<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_infk02/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWI3f3BZBRtcnCtUpvEbK7BDplhrz75vqDhf0U4qUUiWEtbT6XfNNEjeq_RPVfCMWzCCusWsf9xeVnL4Gg2EH6i-B9kEkHbjCMDq4gEyRlt4_8dAMaYytxOPz2QhAdTHrbmv4GSt4sGV0/s1600/w_infk02c4.gif" /></a>Instant access to precise, step-by-step solutions for every essential Linux administration task from basic configuration and troubleshooting to advanced security and optimization.<br />
<br />
If you're responsible for delivering results with Linux, Linux® Quick Fix Notebook brings together all the step-by-step instructions, precise configuration commands, and real-world guidance you need. This distilled, focused, task-centered guide was written for sysadmins, netadmins, consultants, power users...everyone whose livelihood depends on making Linux work, and keeping it working.<br />
<br />
This book's handy Q&A format gives you instant access to specific answers, without ever forcing you to wade through theory or jargon. Peter Harrison addresses virtually every aspect of Linux administration, from software installation to security, user management to Internet services--even advanced topics such as software RAID and centralized LDAP authentication. Harrison's proven command-line examples work quickly and efficiently, no matter what Linux distribution you're using. Here's just some of what you'll learn how to do:<br />
<br />
* Build Linux file/print servers and networks from scratch<br />
* Troubleshoot Linux and interpret system error messages<br />
* Control every step of the boot process<br />
* Create, manage, secure, and track user accounts<br />
* Install, configure, and test Linux-based wireless networks<br />
* Protect your network with Linux iptables firewalls<br />
* Set up Web, email, DNS, DHCP, and FTP servers<br />
<br />
And much more...<br />
By Peter Harrison. Published by Prentice Hall. Part of the Bruce Perens' Open Source Series.<br />
<br />
Download your free copy of "Linux Quick Fix Notebook" - <a href="http://linuxpoison.tradepub.com/free/w_infk02/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br />
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-57849485211692673632013-03-26T14:03:00.000-04:002013-03-26T14:03:00.084-04:00White Paper - There's an App for That, But is it Secure?<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_hp350/prgm.cgi" imageanchor="White Paper - There's an App for That, But is it Secure?" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv8gBJJZiWi3aw88I27w-NXjxfc6ZeungBy9p1og3TFEQb_W4hi-pnleyS58hrEUqt6E_JFF3BtfkQKq1XS5pSuMSL5C5IsPqL3TqFWhblglriY6ntsurHCqADsxcIqxGgRxXqbUh9ZF4/s1600/w_hp350c.gif" /></a>"<b><i>There's an App for That, But is it Secure?</i></b>"<br />
<br />
This Tech Dossier will outline proven best practices to mitigate risk and embrace mobility without trepidation.<br />
<br />
Security has eroded over the past decade as companies strive to create applications for multiple platforms by farming design and development out to subcontractors. This trend has strained the processes and governance put in place to ensure application security.<br />
<br />
Download your free copy of "There's an App for That, But is it Secure?" -- <a href="http://linuxpoison.tradepub.com/free/w_hp350/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-32494073484464041712013-03-26T11:00:00.000-04:002013-03-26T11:00:01.402-04:00Display Dialog boxes from shell scripts - Whiptail<div dir="ltr" style="text-align: left;" trbidi="on">
<b><i>whiptail</i></b> is a lightweight replacement for dialog, to provide dialog boxes for shell scripts. It is built on the newt windowing library rather than the ncurses library, allowing it to be smaller in embedded environments such as installers, rescue disks, etc.<br>
<br>
Currently, these types of dialog boxes are implemented:<br>
yes/no box, menu box, input box, message box, text box, info box, checklist box, radiolist box gauge box, and password box.<br>
<br>
whiptail is designed to be drop-in compatible with dialog, but has less features: some dialog boxes are not implemented, such as tailbox, timebox, calendarbox, etc.<br>
<br>
<b>Whiptail Installation:</b><br>
Open the terminal and type following command to install whiptail:<br>
<blockquote class="tr_bq">
<span style="color: blue;">sudo apt-get install whiptail</span></blockquote>
<b></b><br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/display-dialog-boxes-from-shell-scripts.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-1780959715545000232013-03-25T11:00:00.000-04:002013-03-25T11:00:10.746-04:00Securely erase files and partition from magnetic media - Wipe<div dir="ltr" style="text-align: left;" trbidi="on">
Recovery of supposedly erased data from magnetic media is easier than what many people <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="613256bc-cc6a-4956-a048-3608993c24ff" ginger_sofatware_uiphraseguid="307dbdc5-dd89-4d5a-873d-d82c86ef28c4" grcontextid="wouldlike:0">wouldlike</span> to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent to recover the last two or three layers of data written to disk; wipe repeatedly overwrites special patterns to the files to be destroyed, using the fsync<span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="1cfd7a51-2599-43ad-8994-7af751f46773" ginger_sofatware_uiphraseguid="8741ba7f-518e-4058-b3d0-a2561946fe56" grcontextid="(:0">(</span>) call and/or the O_SYNC bit to force disk access. In normal mode, 34 patterns are used (of which 8 are random). These patterns were recommended in an article from Peter Gutmann (pgut001@cs.auckland.ac.nz) entitled "<i>Secure Deletion of Data from Magnetic and Solid-State Memory</i>". A quick mode allows you to use only 4 passes with random patterns, which is of course much less secure.<br>
<br>
Encrypting a whole partition with <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="9bed7d88-58d9-43d5-9f7a-be8f84e37452" ginger_sofatware_uiphraseguid="28c90b8f-d9e3-4735-aff7-0a40023dfd5d" grcontextid="cryptoloop:0">cryptoloop</span>, for example, does not help very much either, since there is a single key for all the partitions.<br>
<br>
Therefore wipe is best used to sanitize a <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="302673f9-c1b0-4542-a8e7-bf1ae9031df9" ginger_sofatware_uiphraseguid="89f600e3-6e1d-4740-90d1-1af94e48323c" grcontextid="harddisk:0">harddisk</span> before giving it to <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="af755055-37ba-4b89-a2e8-afb1093da073" ginger_sofatware_uiphraseguid="89f600e3-6e1d-4740-90d1-1af94e48323c" grcontextid="untrusted:1">untrusted</span> parties (i.e. <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="8cd7e6b6-bb5d-4594-b783-e1afc7407d25" ginger_sofatware_uiphraseguid="7b0d7aee-6b78-4cd0-8894-f763a0608c2c" grcontextid="sending:0">sending</span> your laptop for repair, or selling your disk).<br>
<b><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="1e05b556-4ae5-48cf-851a-2b86585f8b5a" ginger_sofatware_uiphraseguid="e6f2ef1d-723c-46a8-b5f7-10c9e15223d0" grcontextid="wipe:0"></span></b><br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/securely-erase-files-and-partition-from.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-62909866852476964152013-03-22T11:00:00.000-04:002013-03-22T11:00:03.247-04:00Convert webpages (HTML) to PDF using webkit - wkhtmltopdf<div dir="ltr" style="text-align: left;" trbidi="on">
<b><span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="913057ce-af19-4575-8026-8c062bde5e30" ginger_sofatware_uiphraseguid="28800a29-69ae-41a8-8dae-785009161519" grcontextid="Wkhtmltopdf:0"><i><span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="913057ce-af19-4575-8026-8c062bde5e30" ginger_sofatware_uiphraseguid="28800a29-69ae-41a8-8dae-785009161519" grcontextid="Wkhtmltopdf:0">Wkhtmltopdf</span></i></span></b> is a command line utility that can be used to convert a <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="a4c4b763-1bcd-499e-938b-76929d8e3411" ginger_sofatware_uiphraseguid="28800a29-69ae-41a8-8dae-785009161519" grcontextid="webpage:1">webpage</span> / html to PDF.<br />
<br />
<b><span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="0b0eecde-9281-4d3d-bbe6-5f5d373a035f" ginger_sofatware_uiphraseguid="96ba3884-4375-49de-9b2b-39ac06aff3bf" grcontextid="Wkhtmltopdf:0">Wkhtmltopdf</span> Features:</b><br />
* Convert web pages into PDF documents using <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="2a688616-1228-4fc2-8efc-3fbe34e81c19" ginger_sofatware_uiphraseguid="d8065768-9d28-4fcd-8ce1-fc975fe2c43f" grcontextid="webkit:0">webkit</span><br />
* Adding headers and footers (static version only)<br />
* TOC generation (static version only)<br />
* Batch mode conversions<br />
* (Linux) No longer requires <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="5cd95bdd-fe96-45ca-a748-8b6c3c479cd0" ginger_sofatware_uiphraseguid="545442c3-9a62-4494-ba4d-f8b04bbe933b" grcontextid="an:0">an</span> <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="c805fb89-d3e8-43cd-a2b5-daedf07076c9" ginger_sofatware_uiphraseguid="545442c3-9a62-4494-ba4d-f8b04bbe933b" grcontextid="XServer:1">XServer</span> to be running (however the X11 client libs must be installed)<br />
<br />
<b><span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="f2e67dc2-34b0-47a1-8dac-d7c649e9682e" ginger_sofatware_uiphraseguid="36b813c6-24d2-46d9-bd72-05c455af6baa" grcontextid="Wkhtmltopdf:0">Wkhtmltopdf</span> Installation:</b><br />
Open the terminal and type following command to <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="abed149d-02e2-4317-bd5b-d8771d4fe103" ginger_sofatware_uiphraseguid="d28f766d-7727-4c64-baef-ed1c63883245" grcontextid="intall:0">intall</span> Wkhtmltopdf:<br />
<blockquote class="tr_bq">
<span style="color: blue;"><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="ad164f61-85f2-469d-9085-305dc075f047" ginger_sofatware_uiphraseguid="46d126ce-4e51-4e2f-b2b0-b2f79b969ed1" grcontextid="sudo:0">sudo</span> apt-get install <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="359b8645-ba32-4a56-988c-7d1fc1cf4632" ginger_sofatware_uiphraseguid="46d126ce-4e51-4e2f-b2b0-b2f79b969ed1" grcontextid="wkhtmltopdf:1">wkhtmltopdf</span></span></blockquote>
<b><span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="2cec709f-5643-406a-97e5-520562012f52" ginger_sofatware_uiphraseguid="69fe7385-beb8-4e18-9f81-a93024c23b45" grcontextid="Wkhtmltopdf:0">Wkhtmltopdf</span> Usage:</b><br />
<span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="79a3b038-91a3-4fd0-b4ec-55db03d5dffa" ginger_sofatware_uiphraseguid="73a37ec6-9b5c-42fc-a69a-6d8a39aeb54e" grcontextid="Wkhtmltopdf:0">Wkhtmltopdf</span> is <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="6c023b3c-66d5-47e2-9711-410077b4001a" ginger_sofatware_uiphraseguid="73a37ec6-9b5c-42fc-a69a-6d8a39aeb54e" grcontextid="command line utility:1">command line utility</span>, the following lists some usages for <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="5edc6b33-e462-4bdb-9160-6645ae234470" ginger_sofatware_uiphraseguid="73a37ec6-9b5c-42fc-a69a-6d8a39aeb54e" grcontextid="wkhtmltopdf:2">wkhtmltopdf</span><br />
To convert a remote HTML file to PDF:<br />
<blockquote class="tr_bq">
<span style="color: blue;"><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="c019bda5-d5f2-4a74-bb04-9bc8a190292d" ginger_sofatware_uiphraseguid="c36ba271-39c6-4688-a6c3-248686f0f722" grcontextid="wkhtmltopdf:0">wkhtmltopdf</span> http://www.google.com google.pdf</span></blockquote>
To convert a local HTML file to PDF:<br />
<blockquote class="tr_bq">
<span style="color: blue;"><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="37356415-f528-49da-84e1-8798707a11aa" ginger_sofatware_uiphraseguid="04a637bd-eada-4083-a649-c1b4378b1dbb" grcontextid="wkhtmltopdf:0">wkhtmltopdf</span> my.html my.pdf</span></blockquote>
You can also convert to PS files if you like:<br />
<blockquote class="tr_bq">
<span style="color: blue;"><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="2bfa8226-4e20-4e20-8f9f-32f602289b85" ginger_sofatware_uiphraseguid="3d9892a9-debe-46cc-8d9e-0407f5118fde" grcontextid="wkhtmltopdf:0">wkhtmltopdf</span> my.html <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="de71b275-74a0-4fa4-8e5e-466fc338447f" ginger_sofatware_uiphraseguid="3d9892a9-debe-46cc-8d9e-0407f5118fde" grcontextid="my.ps:1">my.ps</span></span></blockquote>
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-66644539655168255882013-03-21T11:00:00.000-04:002013-03-21T11:00:03.077-04:00FLV Metadata Injector for FLV files - Yamdi<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="d9f1e935-d6d2-4558-9c0a-494b8571a64c" ginger_sofatware_uiphraseguid="ba299797-0604-4fdb-9543-268aadfe4e73" grcontextid="yamdi:0"><b><i><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="d9f1e935-d6d2-4558-9c0a-494b8571a64c" ginger_sofatware_uiphraseguid="ba299797-0604-4fdb-9543-268aadfe4e73" grcontextid="yamdi:0">yamdi</span></i></b></span> stands for Yet Another MetaData Injector and is a metadata injector for FLV files. It adds the <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="da96411d-f752-4d8b-9748-aede3c01d208" ginger_sofatware_uiphraseguid="8670d0df-1a6f-4b0f-8e69-2f823be42fd8" grcontextid="onMetaData:0">onMetaData</span> event to your FLV files. <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="74b053fb-8732-4bcc-b24b-97d414e36bf8" ginger_sofatware_uiphraseguid="1eba9e00-3a80-4e2e-aba4-2ca7631cbabe" grcontextid="yamdi:0">yamdi</span> should run under *BSD, Linux and Windows and is published under the BSD license.<br>
<br>
<span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="55a5a792-486a-455c-a165-de498a3ef36a" ginger_sofatware_uiphraseguid="04da13a2-4a74-4a8e-b840-15e33f69f929" grcontextid="Yamdi:0">Yamdi</span> features:<br>
* Large file support<br>
* H.264 support<br>
* <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="a2628fcb-97a2-4a37-8d9e-ef0d4f2ed306" ginger_sofatware_uiphraseguid="76239da5-7a7f-4426-a135-e82a9dc8bf14" grcontextid="onMetaData:0">onMetaData</span>, <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="fc4731ec-6221-4e35-903b-04744c211909" ginger_sofatware_uiphraseguid="76239da5-7a7f-4426-a135-e82a9dc8bf14" grcontextid="onLastSecond:1">onLastSecond</span>, <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="9f9a6fe3-dc26-4c11-a5e1-2484a43ef486" ginger_sofatware_uiphraseguid="76239da5-7a7f-4426-a135-e82a9dc8bf14" grcontextid="onLastKeyframe:2">onLastKeyframe</span> events<br>
* low memory footprint<br>
* XML metadata output<br>
* Binaries for Win32 and Win64 are available<br>
<b><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="c79dfe96-cc02-4b14-9f9c-9c9f3eede6aa" ginger_sofatware_uiphraseguid="dbbbadfe-3261-4afb-bbc3-a175755d418d" grcontextid="Yamdi:0"></span></b><br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/flv-metadata-injector-for-flv-files.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-11820532335914577142013-03-20T11:00:00.000-04:002013-03-20T11:00:06.755-04:00Mount archives for read/write under Ubuntu Linux - Archivemount<div dir="ltr" style="text-align: left;" trbidi="on">
<b><i><span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="e401a474-9143-4028-ac96-46489f03357c" ginger_sofatware_uiphraseguid="70455851-b5c7-4278-bad9-15c9fc2217b8" grcontextid="Archivemount:0">Archivemount</span></i></b> is a FUSE based file system for Unix variants, including Linux. Its purpose is to mount archives to a mount point where it can be read from or written to as with any other file system. This makes accessing the contents of the archive, which may be compressed, transparent to other programs, without decompressing them. The archive formats that <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="d9713e16-7c18-4637-8d12-6d12d3865aa8" ginger_sofatware_uiphraseguid="a201f027-6179-4666-9a4f-c3e9374d070d" grcontextid="archivemount:0">archivemount</span> supports are:<br>
<br>
* Old-style tar archives, .<br>
* Most variants of the POSIX “<span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="dd48b0a0-7019-4553-a688-5786d6b369d3" ginger_sofatware_uiphraseguid="2501c2c6-3d61-4a6d-b6b4-deeb53ad8ea2" grcontextid="ustar:0">ustar</span>” format, .<br>
* The POSIX “<span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct" ginger_sofatware_markguid="5d08aa2a-301c-4878-9db1-fc671f710426" ginger_sofatware_uiphraseguid="902b8c80-eeaa-48e4-8fbb-53673c0033d5" grcontextid="pax:0">pax</span> interchange” format, .<br>
* GNU-format tar archives, .<br>
* Most common cpio archive formats, .<br>
* ISO9660 CD images (with or without <span class="GINGER_SOFATWARE_correct" ginger_sofatware_markguid="5cfef05a-e33e-4e26-a2f6-b72aa613ad6f" ginger_sofatware_uiphraseguid="26c914e7-c783-43ac-b2e3-7a818ca6e5d8" grcontextid="RockRidge:0">RockRidge</span> extensions), .<br>
* Zip archives. .<br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/mount-archives-for-readwrite-under.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-48255572038924387492013-03-19T11:00:00.000-04:002013-03-19T11:00:07.590-04:00Rip Audio CDs in Linux with Sound Juicer<div dir="ltr" style="text-align: left;" trbidi="on">
<b><i>Sound Juicer</i></b> is an application front-end to the Cdparanoia CD ripping library. It allows the user to extract audio from compact discs and convert it into audio files that a personal computer or digital audio player can understand and play. It supports ripping to any audio codec supported by a GStreamer plugin, such as mp3 (via LAME), Ogg Vorbis, FLAC and uncompressed PCM formats.<br>
<br>
Sound Juicer is designed to be easy to use and to work with little user intervention. For example, if your computer is connected to the Internet, it will automatically attempt to retrieve track information from the freely-available MusicBrainz service. Sound Juicer is free and open source software and an official part of the GNOME desktop environment starting with version 2.10.<br>
<br>
<b>Sound Juice Features include:</b><br>
* Automatic track tagging via CDDB<br>
* Encoding to <span class="GRnoSuggestion GRcorrect" grcontextid="ogg:0" grmarkguid="b64bab4d-fe1a-425a-bd09-40563af54a4d" gruiphraseguid="46d3841e-4896-4fb8-a59f-5e3a5f2b7d67">ogg</span> / <span class="GRcorrect" grcontextid="vorbis:1" grmarkguid="6fdba20f-f6f7-4846-9177-8bbe702b19b8" gruiphraseguid="46d3841e-4896-4fb8-a59f-5e3a5f2b7d67">vorbis</span>, FLAC and raw WAV<br>
* Easy to configure encoding path<br>
* Multiple genres<br>
* Internationalization support<br>
<br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/rip-audio-cds-in-linux-with-sound-juicer.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-51341006513310234602013-03-18T11:46:00.001-04:002013-03-18T11:46:04.931-04:00eBook - Free PC Security Handbook<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_bund20/prgm.cgi" imageanchor="The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrCo8J9GNofxiRjKO1L2MTSBI7JmVfZkLx4UqnyOd3WEN3VsxbakcrhruezfddnmpeYY8LhYUXvqNTWFvSN4s66iJLPvhFqbTHCqq9tnVQwD2W6ghZkRuPC4E-OsJtIin4J_5eTk4bH-I/s1600/w_bund20c.gif" /></a>"<b><i>The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook</i></b>"<br />
<br />
Download this kit to learn everything you need to know about Information Security.<br />
<br />
The Essentials of Information Security bring together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.<br />
<br />
The following kit contents will help you get the most out of your Information Security research:<br />
* PC Security Handbook - 2nd Edition<br />
* Research Report: How the Major Mobility Platforms Compare in TCO and Security<br />
* Virtualization Maturity and Experience Breed Success<br />
* Securing Your Journey to the Cloud<br />
<br />
Download your free copy of "The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook" -- <a href="http://linuxpoison.tradepub.com/free/w_bund20/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-25964327873976441392013-03-15T11:00:00.000-04:002013-03-15T11:00:00.332-04:00Media Streaming Server In Ubuntu Linux - GNUMP3d<div dir="ltr" style="text-align: left;" trbidi="on">
<b><i>GNUMP3d</i></b> is a streaming server for MP3s, OGG <span class="GRcorrect" grcontextid="vorbis:0" grmarkguid="ba0da6da-fd0e-41f2-bf56-ae0d4686e1fc" gruiphraseguid="fcca01ad-eee2-4e8f-87d5-d7bdd67c715f">vorbis</span> files, movies and other media formats.<br>
<br>
GNUMP3d designed to be:<br>
* Small, stable, portable, self-contained, and secure.<br>
* Simple to install, configure, and use.<br>
* Portable across different varieties of Unix, the GNU Operating System, and Microsoft Windows platforms.<br>
<br>
<b>GNUMP3d Requirement:</b><br>
You need to have apache installed and configured for GNUMP3d to work<br>
For Apache installation and configuration - <a href="http://linuxpoison.blogspot.com/2008/03/installing-apache-web-server-on-ubuntu.html" target="_blank">here</a><br>
<b><br>
</b> <b>GNUMP3d Installation:</b><br>
Downloaded the GNUMP3d source code - <a href="http://www.gnu.org/software/gnump3d/download.html#Download" rel="nofollow" target="_blank">here</a><br>
GNUMP3d installation should require no more than the following:-<br>
<blockquote class="tr_bq">
<span style="color: blue;">tar -zxvf gnump3d-3.0.tar.gz<br>
<span class="GRcorrect" grcontextid="cd:0" grmarkguid="5673c08c-6ccb-4b47-b444-a13af47fe2c1" gruiphraseguid="2627cbdf-2bcb-4588-98de-3cdb22719066">cd</span> gnump3d-3.0<br>
<span class="GRcorrect" grcontextid="make:0" grmarkguid="daa7efa2-78db-42c8-96a1-c7f684f5773d" gruiphraseguid="be246ee8-23d8-4c7d-868d-b69373497de0">make</span> install</span></blockquote>
</div><a href="http://linuxpoison.blogspot.com/2013/03/media-streaming-server-in-ubuntu-linux.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-85426234102904642032013-03-14T11:00:00.000-04:002013-03-14T11:00:09.471-04:00Open Source Novel Writing Software - Storybook<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="GRcorrect" grcontextid="Storybook:0" grmarkguid="78592e16-deae-4779-a698-80cc90b3f51c" gruiphraseguid="f75cb3b4-26f0-4187-89c5-f6aeaa321eb8"><b><i><span class="GRcorrect" grcontextid="Storybook:0" grmarkguid="78592e16-deae-4779-a698-80cc90b3f51c" gruiphraseguid="f75cb3b4-26f0-4187-89c5-f6aeaa321eb8">Storybook</span></i></b></span> is a free Open Source novel-writing software for creative writers, novelists and authors. Starting with the plot <span class="GRcorrect" grcontextid="to:0" grmarkguid="07732afe-5223-4bd8-b8ee-6ec231651978" gruiphraseguid="3867384c-c2b3-46cb-b2c7-837601854f8a">to</span> the finished book — with Storybook you'll never lose the overview. Storybook helps you to keep an overview of multiple plot-lines while writing books, novels or other written works.<br>
<br>
Storybook assists you in structuring your book<br>
Manage all your data such as characters, locations, scenes, items, tags and ideas in one place. A simple interface is provided to enable you to assign your defined objects to each scene and to keep an overview of your work with user-friendly chart tools. With Storybook Memoria each object can be tracked in relation to time.<br>
<b></b><br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/open-source-novel-writing-software.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-25333774119264855212013-03-13T14:09:00.004-04:002013-03-13T14:09:52.791-04:00Install the latest Intel graphics drivers - Intel Linux Graphics Installer<div dir="ltr" style="text-align: left;" trbidi="on">
<b><i>Intel Linux Graphics Installer</i></b> allows you to easily install the latest graphics drivers for your Intel graphics hardware. This allows you to stay current with the latest enhancements, optimizations, and fixes to ensure the best user experience with your Intel graphics hardware.<br>
<br>
<b>Supported Linux Distributions at 1.0</b><br>
Ubuntu 12.04<br>
Ubuntu 12.10<br>
Fedora 17<br>
Fedora 18<br>
<br>
<b>Ubuntu</b><br>
Ubuntu's packages and repositories are signed with this GPG key.<br>
In order to "trust" the Intel Linux Graphics Installer, you will need to add a key to Ubuntu's software package manager ("apt"). Open a terminal, and execute this line:<br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/install-latest-intel-graphics-drivers.html#more">Continue Reading...</a>DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-5609830493514945832013-03-12T11:30:00.002-04:002013-03-12T11:30:06.325-04:00White Paper - Top 5 Myths of Website Security<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXri7F7xJPJvdgPWhsQP1vHpdDymqGCo96fSU-I1G9HpHDEbiPgYl4Dc0CBqCBPjGQ_W6aFhssfVAT-Z0GBp6nn8XKLFQqdsz0KfLmELA8W2e75kqSIEQDOhl1Ch0x1JLKXl0znbEfaSc/s1600/w_whit01c.gif" imageanchor="White Paper - Top 5 Myths of Website Security" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXri7F7xJPJvdgPWhsQP1vHpdDymqGCo96fSU-I1G9HpHDEbiPgYl4Dc0CBqCBPjGQ_W6aFhssfVAT-Z0GBp6nn8XKLFQqdsz0KfLmELA8W2e75kqSIEQDOhl1Ch0x1JLKXl0znbEfaSc/s1600/w_whit01c.gif" /></a>Hackers are now focusing attacks directly on websites in order to stay one step ahead of the latest security techniques.<br />
<br />
With over 70% of cyber attacks now occurring at the application layer, that means serious vulnerabilities for Small and Medium-sized Enterprises (SMEs).<br />
<br />
Download this Whitepaper to learn about the new security problems facing SMEs, starting with the facts behind some of the most common myths about website security.<br />
<br />
This white paper includes recommendations to help businesses improve their website security. Get your complimentary 9-page Whitepaper now.<br />
<br />
Download your free copy of "Top 5 Myths of Website Security" - <a href="http://linuxpoison.tradepub.com/free/w_whit01/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br /></div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-55721767333519975772013-03-05T11:00:00.000-05:002013-03-05T11:00:00.303-05:00Manage and Install Windows Application on Linux - q4wine<div dir="ltr" style="text-align: left;" trbidi="on">
<i><b><span class="GingerNoCheckStart"></span>Q4Wine</b></i> is a qt4 GUI for <a href="http://linuxpoison.blogspot.com/search?q=wine" rel="nofollow" target="_blank">WINE</a>, It will help you manage wine prefixes and installed applications. It currently support for both Linux and FreeBSD platforms.<br>
<br>
Q4Wine was initially written by Alexey S. Malakhov aka John Brezerk. General idea comes from WineTools scripts which were initially written by Frank Hendriksen.<br>
<br>
Q4Wine General features are:<br>
* Can export QT color theme into wine <span class="GRcorrect" grcontextid="colors:0" grmarkguid="22a7bbbe-9a81-4d29-9360-5c3a7ef9c08c" gruiphraseguid="09d50aaa-c924-449c-8bd5-3eb193d9f811">colors</span> settings.<br>
* Can <span class="GRcorrect" grcontextid="easy:0" grmarkguid="68c98760-7a1f-4c04-a6ba-52da151d0e0d" gruiphraseguid="2e2bdf70-8106-43ea-8c90-5d5c6e02c5a9">easy</span> work with different wine versions at <span class="GRcorrect" grcontextid="same time:1" grmarkguid="a813e41c-9211-4671-88fa-9713ff73a32d" gruiphraseguid="2e2bdf70-8106-43ea-8c90-5d5c6e02c5a9">same time</span>;<br>
* Easy creating, deleting and managing prefixes (<i>WINEPREFIX</i>);<br>
* Easy controls for wine process;<br>
* Autostart icons support;<br>
* Easy <span class="GRcorrect" grcontextid="cd:0" grmarkguid="598ac984-96d8-4ea3-918d-378081c0c154" gruiphraseguid="c864b0c6-e8e1-42a5-99da-826a19c8f3b0">cd</span>-image use;<br>
* You can extract icons from PE files (<span class="GRcorrect" grcontextid=".:0" grmarkguid="ecd46a96-d888-4250-a390-545e4c254f1c" gruiphraseguid="a13c6a1a-652e-472c-b921-3b828e32f74f">.</span><span class="GRcorrect" grcontextid="exe:1" grmarkguid="5b069663-3119-458a-83cc-0bae8ef031d7" gruiphraseguid="a13c6a1a-652e-472c-b921-3b828e32f74f">exe</span> .<span class="GRcorrect" grcontextid="dll:2" grmarkguid="d522599c-45d9-4ffb-a370-6907c71d3229" gruiphraseguid="a13c6a1a-652e-472c-b921-3b828e32f74f">dll</span>);<br>
* Easy backup and restore for <span class="GRcorrect" grcontextid="managed:0" grmarkguid="212646eb-956d-453f-a9c0-19012a38568a" gruiphraseguid="b087760d-eb62-45b0-adea-058abf64ec7f">managed</span> prefixes.<br>
* Winetriks support.<br>
And more... Explore it! ;)<br>
<b></b><br>
</div><a href="http://linuxpoison.blogspot.com/2013/03/manage-and-install-windows-application.html#more">Continue Reading...</a>Nikesh Jauharihttp://www.blogger.com/profile/13296676535987957703noreply@blogger.com0tag:blogger.com,1999:blog-6006114617625504970.post-52714069282208680482013-02-25T17:59:00.005-05:002013-02-25T17:59:46.999-05:00White Paper - Why Linux Virtualization is Ready for Prime Time<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://linuxpoison.tradepub.com/free/w_hp331/prgm.cgi" imageanchor="1" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXDCbWHT4QAKkBcNtMu5WE1ZtYXET7EaMHr_Nxet6FuPEw3WahOdM253ZCsHTB3zmM-DaEkOUdv1QWoSWKs2pWNYoutyf-Yez185Qv9nD0MW7U__wBesHMCL3BMj5Gz4SIqHB4s7hU9R8/s1600/w_hp331c.gif" /></a>"<b><i>Frost & Sullivan: Why Linux Virtualization is Ready for Prime Time</i></b>"<br />
<br />
In this paper, Frost & Sullivan examine historical concerns about Linux <span class="GRcorrect" grcontextid="virtualization:0" grmarkguid="7f14bed0-3909-4ac6-8c83-4ad3d146adea" gruiphraseguid="c22c4273-60e6-48d5-baa5-66751e4be3e4">virtualization</span>, and assess why, when, and how enterprises can safely <span class="GRnoSuggestion GRcorrect" grcontextid="virtualize:1" grmarkguid="6818557f-2ccc-4c30-9db7-08e992c7a0c5" gruiphraseguid="c22c4273-60e6-48d5-baa5-66751e4be3e4">virtualize</span> their critical Linux workloads.<br />
<br />
<span class="GRnoSuggestion GRcorrect" grcontextid="Virtualization:0" grmarkguid="33366edd-d504-48d1-bdc0-6bd7fb201d82" gruiphraseguid="855229ac-d77d-4cd1-bfa3-e63a154a2eaf">Virtualization</span> technologies have gained a strong footing in enterprise data centers in recent years. According to Frost & Sullivan research, 65 percent of all U.S. <span class="GRcorrect" grcontextid="businesses:0" grmarkguid="bc2a3b1a-8577-4265-90fa-5bdf287a2b9d" gruiphraseguid="6339aa67-c175-4b29-99a1-5ff3e260414e">businesses</span> have incorporated <span class="GRcorrect" grcontextid="virtualization:1" grmarkguid="afe08448-257a-4b18-95e7-9c4a79219254" gruiphraseguid="6339aa67-c175-4b29-99a1-5ff3e260414e">virtualization</span> into their data centers. For many of those, the commitment to <span class="GRcorrect" grcontextid="virtualization:0" grmarkguid="968524b0-8741-4a6b-9436-4f505e158e17" gruiphraseguid="9c38a59d-f042-44a8-810c-b3be87aaa5a7">virtualization</span> is serious -- 20 percent have <span class="GRnoSuggestion GRcorrect" grcontextid="virtualized:1" grmarkguid="4db8fe07-1763-4302-8e7f-c9d8436719fa" gruiphraseguid="9c38a59d-f042-44a8-810c-b3be87aaa5a7">virtualized</span> more than three-quarters of their servers--a number that is expected to double in the next two years.<br />
<br />
Download your free copy of "<i>Frost & Sullivan: Why Linux Virtualization is Ready for Prime Time</i>" - <a href="http://linuxpoison.tradepub.com/free/w_hp331/prgm.cgi" rel="nofollow" target="_blank">here</a><br />
<br />
<br />
</div>
DevOpshttp://www.blogger.com/profile/02331067901785181627noreply@blogger.com0