Tue, Aug 25, 2009 9:23 pm
Obtaining an IP Address via DHCP with Pump on a Knoppix System
To obtain an IP address via the Dynamic Host Configuration Protocol (DHCP)
on a Knoppix Linux system, you can use 
pump. As root, you can
issue the commands below:
ifconfig eth0 up
pump -i eth0
The options available for pump are shown below:
root@Knoppix:~# pump --help
Usage: pump [OPTION...]
  -c, --config-file=STRING     Configuration file to use instead of
                               /etc/pump.conf
  -h, --hostname=hostname      Hostname to request
  -i, --interface=iface        Interface to configure (normally eth0)
  -k, --kill                   Kill daemon (and disable all interfaces)
  -l, --lease=hours            Lease time to request (in hours)
  -L, --leasesecs=seconds      Lease time to request (in seconds)
  --lookup-hostname            Force lookup of hostname
  -r, --release                Release interface
  -R, --renew                  Force immediate lease renewal
  -v, --verbose                Log verbose debug info
  -s, --status                 Display interface status
  -d, --no-dns                 Don't update resolv.conf
  --no-gateway                 Don't set a gateway for this interface
  --no-setup                   Don't set up anything
  --no-resolvconf              Don't set up resolvconf
  --no-bootp                   Ignore non-DHCP BOOTP responses
  --script=STRING              Script to use
  --win-client-ident           Set the client identifier to match Window's
Help options:
  -?, --help                   Show this help message
[/os/unix/linux/knoppix] 
permanent link
 
Sun, Aug 23, 2009 4:42 pm
Checking User Acccounts with the dscl Command Utility
On an Apple OS X system, a user's account is distinguished from
other accounts by a 
User Identifier (UID), which is a unique
number that identifies a particular user on a system having
a particular login ID. A UID identifies the owner of a file and
controls users' access to files. 
OS X assigns some UIDs for special purposes
| Number | Use | Comment | 
|---|
| UID 0 | Reserved for the root user | Should not be deleted or modified except to change the password
of the root user. | 
| UIDs below 100 | Reserved for system use | Should not be deleted or modified. | 
| UIDs 500 - 2,147,483,648 | Users | Should be unique on the system. If modified, the ownership of files and 
directories for the user must be changed. | 
A user's name and UID can be viewed with
the dscl command utility.
To list users, within the terminal type:
dscl . list /users
To read a user account, within the terminal type:
dscl . read /users/
[/os/os-x] 
permanent link
 
Sun, Aug 23, 2009 3:20 pm
Services That Should Normally be Disabled
To increase security on an Apple OS X system, the following services should 
normally be disabled, unless you have a definite need for them:
- Windows File Sharing (SMB) - allows Windows™
users to access shared folders on your computer
- Personal Web Sharing / Hypertext Transfer Protocol (HTTP) - lets 
users of other computers view web pages in the sites folder on your 
computer
- Remote Login (SSH) - lets users of other computers access your 
computer using Secure Shell (SSH) and allows connection with Simple File 
Transfer Protocol (SFTP)
- File Transfer Protocol (FTP Access) - lets users of other computers 
exchange files with your computer using FTP applications and provides users 
access to all files on the Mac for which they have privileges. FTP transmits
userids and passwords as cleartext, so can could allow someone else on
the network on which your system resides to learn a userid and password for
your system.
- Remote Apple Events - allows applications on other Mac OS X 
computers to send Apple Events to your computer
- Printer Sharing / Line Printer Request (LPR) - lets other people 
use printers connected to your computer
[/os/os-x] 
permanent link
 
Sun, Aug 23, 2009 3:00 pm
Changing Firewall Settings
The firewall settings can be chaned on a MAC OS X system by taking
the following steps:
- Select the Apple menu
- Select the System Preferences option
- Select the Security option
- Select the Firewall tab
- Review and select options
 
Turning on a service automatically reconfigures the built-in firewall to open 
the appropriate port(s) necessary for that service. 
[/os/os-x] 
permanent link
 
Sun, Aug 23, 2009 2:49 pm
Sudo on OS X
The 
sudo command is used in the Terminal to execute a command with the
privileges of another user, such as root. On Mac OS X, those with
administrative privileges are allowed to use the sudo command.
On Unix and Linux systems, the su command is used to assume the identity of 
another user, typically root. Since the root account is normally disabled
on Mac OS X systems, su will not work. As an alternative to enabling the
root account, you can use sudo to run individual
commands as root, one at a time. If you need a root shell, you can get one by 
running sudo -s. The sudo command requires an
administrator password.
[/os/os-x] 
permanent link
 
Tue, Aug 18, 2009 9:59 pm
Gpg4win 2.0.0
If you want a graphical user interface (GUI) for the 
GNU Privacy Guard
(GPG) program for Windows, you can use 
Gpg4win
[ More Info ]
[/security/encryption/gnupg] 
permanent link
 
Mon, Aug 17, 2009 10:04 am
Importing Data from an Access Database in Microsoft Excel
You can import data from a Microsoft Access database in Microsoft Excel 2007,
even if you don't have Microsoft Access on the system. To do so, take the
steps below:
- Open Excel.
- Create a new blank workbook or open an existing one that you wish to 
use.
- Click on Data.
- Select Import External Data.
- Select Import Data.
- Browse to the location of the Access .mdb file
- You will then be prompted to select the table in the Access database
that you wish to import into an Excel spreadsheet. Select the table you wish
to use by clicking on it and then clicking on OK.
- An Import Data window will open asking you where you wish
to place the data in the Excel spreadsheet. The default location will be column
A row 1. If that is where you want the data to go, click on OK, otherwise
specify the location you wish to use.
  
 
References:
- 
Import Microsoft Access Data Into Excel
 Mysticgeek's Realm ::
Your Guide Through the Cyber Galaxy!
[/os/windows/office/excel] 
permanent link
 
Sun, Aug 16, 2009 1:00 pm
Wii Network Traffic When Powered On
I've been troubleshooting a problem with a Wii not having network
connectivity this weekend. The Wii was plugged into a switch that showed
the link was up. The Wii wasn't working when I had it configured for a
fixed IP address, gateway address, and DNS server addresses. I tried DHCP,
instead, but that didn't work, either. With a sniffer, I could observe the
Wii sending out DHCP requests, but I never saw any response coming back
from the DHCP server. Yet, I could see other network traffic reaching
the Wii. I plugged the cable going into the Datel USB network adapter
I was using with the Wii into my laptop and it would get an IP address
from the DHCP server, so all of the network cabling seemed to be good. I
even installed a driver for the Datel USB to Ethernet network adapter
into my laptop and loaded a driver for that adapter on the Windows Vista
laptop. That worked as well.
I was able to resolve the problem by putting a small 5-port hub between
the switch and the Wii. Everything worked fine then, but I don't know
why that worked. I thought there might a problem with autonegotiation
of the duplex and speed settings, but on the switch side I tried all
possible settings for the duplex setting, i.e. auto, full, and half,
with all possible combinations of the speed setting, i.e. auto, 100 Mbs,
10 Mbs, but none of the nine combinations worked. 
When I did get the Wii's Internet connectivity working, I captured
the traffic from/to it, so I would have a better idea of how it determines
whether it has Internet connectivity. I've recorded my notes
here.
[/gaming/wii] 
permanent link
 
Wed, Aug 12, 2009 4:26 pm
Clearing Space on /var
On a Solaris 7 system, I found there wasn't sufficient space
in 
/var to allow me to install software.
# gunzip libidn-1.14-sol7-sparc-local.gz
# pkgadd -d ./libidn-1.14-sol7-sparc-local
The following packages are available:
  1  SMClibidn     libidn
                   (sparc) 1.14
Select package(s) you wish to process (or 'all' to process
all packages). (default: all) [?,??,q]:
Processing package instance <SMClibidn> from </tmp/libidn-1.14-sol7-sparc-local>
libidn
(sparc) 1.14
Simon Josefsson et al
Using </usr/local> as the package base directory.
## Processing package information.
## Processing system information.
   20 package pathnames are already properly installed.
## Verifying disk space requirements.
WARNING:
    The /var filesystem has 0 free blocks. The current installation requires 152
 blocks, which includes a required 150 block buffer for open deleted files. 152 
more blocks are needed.
Do you want to continue with the installation of <SMClibidn> [y,n,?] n
Installation of <SMClibidn> was terminated due to user request.
No changes were made to the system.When I checked the contents of /var/log, I found the
following:
# ls -l
total 139882
-rw-------   1 root     sys      26576205 Aug 12 15:11 authlog
-rw-------   1 root     other    14635403 Aug 12 15:41 maillog
-rw-r--r--   1 root     root     6605320 Aug 12 15:44 named_querylog
-rw-r--r--   1 root     root     5538180 Jul 11 06:23 named_querylog.0
-rw-r--r--   1 root     root        3651 Jun 15 16:58 named_querylog.1
-rw-r--r--   1 root     other     794523 Jun 15 15:39 named_querylog.2.gz
-rw-------   1 root     other    4106078 Jun 24 18:04 poplog
-rw-------   1 root     other    13249096 Aug 12 14:50 sshd.log
-rwxrwxrwx   1 root     other        240 Jul 27  2000 sysidconfig.log
I moved authlog, maillog, and sshd.log
to a a directory under /home, recreated the files in
/var/log with touch, set the permissions
to 600, and changed the group to what it had been
previously on authlog.
# touch authlog.log
# touch maillog.log
# touch sshd.log
# chmod 600 authlog
# chmod 600 maillog
# chmod 600 sshdlog
# chgrp sys authlog
# ls -l
total 33402
-rw-------   1 root     sys            0 Aug 12 15:52 authlog
-rw-------   1 root     other          0 Aug 12 15:49 maillog
-rw-r--r--   1 root     root     6610244 Aug 12 15:54 named_querylog
-rw-r--r--   1 root     root     5538180 Jul 11 06:23 named_querylog.0
-rw-r--r--   1 root     root        3651 Jun 15 16:58 named_querylog.1
-rw-r--r--   1 root     other     794523 Jun 15 15:39 named_querylog.2.gz
-rw-------   1 root     other    4106078 Jun 24 18:04 poplog
-rw-------   1 root     other          0 Aug 12 15:55 sshd.log
-rwxrwxrwx   1 root     other        240 Jul 27  2000 sysidconfig.log
I then restarted the syslog daemon so it would use the new files.
# /etc/init.d/syslog stop
# /etc/init.d/syslog start
syslog service starting.
When I then checked the free space for /var, 94% of
the capacity was used, whereas it had been 100% previously.
# df -k
Filesystem            kbytes    used   avail capacity  Mounted on
/proc                      0       0       0     0%    /proc
/dev/dsk/c0t0d0s0    2052750 1646775  344393    83%    /
fd                         0       0       0     0%    /dev/fd
/dev/dsk/c0t0d0s3    1015542  893738   60872    94%    /var
/dev/dsk/c0t0d0s4    5058110 4968663   38866   100%    /home
swap                  269872    6728  263144     3%    /tmp
References:
- 
Moving Sendmail's Maillog 
File
 Date: August 10, 2005
 MoonPoint Support
[/os/unix/solaris] 
permanent link
 
Mon, Aug 10, 2009 12:27 pm
Proxychains and Knoppix
If you are using a Knoppix Linux system behind a 
SOCKS proxy server,
you can use the 
proxychains package to enable applications that don't natively understand
how to use a SOCKS proxy to work through the SOCKS proxy. 
The proxychains program forces any tcp connection made by any given TCP client 
to go through the specified proxy server (or proxy chain). It is a kind of 
proxifier. It acts like sockscap / premeo / eborder driver (intercepts TCP 
calls).  Proxychains supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers. 
Different proxy types can be mixed in the same chain.
Since Mozilla Firefox understands how to use SOCKS proxies, you can configure
it to go through the SOCKS proxy. You can configure it to use a SOCKS proxy
by clicking on Edit, then Preferences, and then the
Network tab. Click on Settings and then select
Manual proxy configuration. For a SOCKS proxy, put the address of
the SOCKS proxy server in the SOCKS Host field and the port that
is being used on that server in the Port field.
If I establish a SOCKS proxy server using the ssh command,
e.g. ssh -D 8055 jdoe@192.168.1.1, then I'm tunneling connections
to the SOCKS proxy through the encrypted SSH connection and I will use
127.0.0.1 in the SOCKS host field and 8055
in the Port field, rather than the default SOCKS proxy port of 
1080.
After downloading the proxychains package with Mozilla Firefox, aka iceweasel,
I used dpkg to install it.
root@Knoppix:/home/knoppix# dpkg --install proxychains_2.1-5_i386.deb 
Selecting previously deselected package proxychains.
(Reading database ... 0 files and directories currently installed.)
Unpacking proxychains (from proxychains_2.1-5_i386.deb) ...
dpkg: dependency problems prevent configuration of proxychains:
 proxychains depends on libc6 (>= 2.3.2.ds1-21); however:
  Package libc6 is not installed.
dpkg: error processing proxychains (--install):
 dependency problems - leaving unconfigured
Errors were encountered while processing:
 proxychains
Proxychains looks for its configuration file in the following order:
- ./proxychains.conf
- $(HOME)/.proxychains/proxychains.conf
- /etc/proxychains.conf
I copied the sample file /etc/proxychains.conf.dpkg-new
to /etc/proxychains.conf.
root@Knoppix:/home/knoppix# cp /etc/proxychains.conf.dpkg-new /etc/proxychains.conf
The following default information appears in that file:
# ProxyList format
#       type  host  port [user pass]
#       (values separated by 'tab' or 'blank')
#
#
#        Examples:
#
#               socks5  192.168.67.78   1080    lamer  secret
#               http    192.168.89.3    8080    justu   hidden
#               socks4  192.168.1.49    1080
#               http    192.168.39.93   8080    
#               
#
#       proxy types: http, socks4, socks5
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
http    10.0.0.5 3128
http    10.0.0.3 3128
http    10.0.0.5 3128
#socks5 192.168.1.4 1080
#socks4 10.5.81.143 1080
#http   192.168.203.18 8080
I commented out the http lines with the 10.0.0.5
address by placing a "#" at the beginning of the line. I then removed
the "#" from the socks5 line and changed the address
from 192.168.1.4 to 127.0.0.1, since I was establishing a socks proxy
using the ssh command. I changed the port from the default SOCKS port of 1080 
to the one I used when I established the SOCKS proxy with
ssh -D 8055 jdoe@192.68.1.1, i.e. port 8055.
I then had the following lines in proxychains.conf.
# http  10.0.0.5 3128
# http  10.0.0.3 3128
# http  10.0.0.5 3128
socks5 127.0.0.1 8055
#socks4 10.5.81.143 1080
#http   192.168.203.18 8080
I also commented out "random_chain" and "chain_len" and uncommented
"strict_chain".
I was then able to use proxychains with gpg to
import a public key for a package repository into the public keyring for the 
root account.
root@Knoppix:/home/knoppix# proxychains gpg --keyserver wwwkeys.eu.pgp.net --rec
v-keys 9AA38DCD55BE302B
gpg: requesting key 55BE302B from hkp server wwwkeys.eu.pgp.net
ProxyChains-2.1 (http://proxychains.sf.net)
random chain (1):....127.0.0.1:5555....194.171.167.98:11371..OK
gpg: /root/.gnupg/trustdb.gpg: trustdb created
gpg: key 55BE302B: public key "Debian Archive Automatic Signing Key (5.0/lenny) 
<ftpmaster@debian.org>" imported
gpg: no ultimately trusted keys found
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
I was also able to use proxychains for apt-get update
 by using proxychains apt-get update.
References:
- 
ProxyChains - README (HowTo) TCP and DNS through proxy server, HTTP and
SOCKS
 ProxyChains
[/os/unix/linux/knoppix] 
permanent link
 
Sun, Aug 09, 2009 6:25 pm
Using dpkg and apt-get with BitDefender Rescue CD
The 
dpkg utility can be used to add additional software
once you have booted a system with a BitDefender Rescue CD, but first
you need to create a few directories and files.
root@Knoppix:~# mkdir /var/lib/dpkg
root@Knoppix:~# mkdir /var/lib/dpkg/info
root@Knoppix:~# mkdir /var/lib/dpkg/updates
root@Knoppix:~# touch /var/lib/dpkg/status
root@Knoppix:~# touch /var/lib/dpkg/available
Alternatively, you can use the apt-get utility to download
and install the packages you wish to use - see
Using
apt-get with BitDefender Rescue CD
[ More Info ]
[/security/antivirus/bitdefender/rescuecd] 
permanent link
 
Sun, Aug 09, 2009 10:23 am
Debian Version
Knoppix is vased on the Debian distribution of Linux. You can find the
particular version of Debian on which it is based by checking
/etc/debian_version.
root@Knoppix:~# cat /etc/debian_version
lenny/sid
[/os/unix/linux/knoppix] 
permanent link
 
Thu, Aug 06, 2009 9:39 pm
Dell Latitude D505 Display Power Problem
I had to replace the motherboard on a Dell Latitude D505 laptop.
The display would blank unless pressure was put on the center control
cover near the power button.
[ More Info ]
[/pc/hardware/dell] 
permanent link
 
Sun, Aug 02, 2009 10:39 pm
BitDefender Rescue CD 2.0.0
BitDefender provides free rescue CD
software that you can use to scan a Windows system. The rescue CD is based
on 
Knoppix Linux. As of August 2, 2009,
BitDefender Rescue CD 2.0.0 uses Knoppix 2.6.19. You can download
an 
ISO file for the
rescue CD from 
http://download.bitdefender.com/rescue_cd/.
To use the rescue CD, boot the system from the CD. You may need to configure
the system's Basic Input Output
System (BIOS) to attempt to boot from a CD before attempting to boot
from the hard drive or hit a key that allows you to select the drive from
which you want to boot. When you system starts booting from the CD,  you
will see an initial startup nenu.
Start knoppix in English (US)
Start knoppix in French
Start knoppix in console mode
Memory test
Boot from first hard disk
BitDefender Rescue CD
based on Knoppix
You must hit Enter when the menu appears or move the cursor up or down
or the system will be booted from the hard drive rather than the
boot process continuing from the CD.
 
Click on the image to enlarge it
During the boot process, the virus definitions will be updated, if the
system has an Internet connection. If the software has a problem updating
the definitions it will hang for awhile at the stage where it tries
to update the virus definitions and then you will see the message
"Trying to update BitDefender-scanner...fail..check your network ?"
When the BitDefender Rescue CD completes booting, you will
have a Graphical User Interface (GUI). 
A BitDefender AntiVirus Scanner for Unices program will
start automatically and start scanning the hard drive in the
system.
By default, all partitions detected on the hard drive will be scanned.
When the scan completes, you'll have to choose what actions to take on the 
infected file(s). You can choose one action for all files or select an action 
for each item.
If you right-click somewhere on the desktop, you will see a list
of applications on the CD. You can get a terminal window by selecting
Terminal or Terminal (as root) by selecting from the
menu that appears when you right-click on the desktop. Don't pick
Exit from this menu, until you are ready to shut down the system.
I.e., wait until the scan has completed and you've chosen what to do with
any infected files detected 
[/security/antivirus/bitdefender/rescuecd] 
permanent link
 
 
 
Privacy Policy  
Contact
