Multimedia support in OpenSuse 10.3 (MP3, DiVX, etc.)

It’s time for OpenSuse 10.3, … RIP Windows Vista

Kool login screen for telnet, ssh and console

issue.doc

Just copy the content of above file into your /etc/issue and /etc/issue.net file and see the new sexy login screen (console, telnet and ssh)

Make sure to take the backup of your original issue and issue.net file.

How to disable CTRL-ALT-DEL from rebooting a Linux system

Find out the origin of any IP using geoiplookup

Geoiplookup is included in the Maxmind C library that you will probably already have installed in case you are using any geoip related applications. This also includes the free GeoLite Country database that is used for the lookups.
In case you don’t have the GeoIP C library already installed on a Debian system, you can install it very simple (you might have the libgeoip1 already installed but not geoip-bin; the later one includes the geoiplookup utility):

apt-get install libgeoip1 geoip-bin

Once installed you can use the geoiplookup utility from the command line to get the country of any IP (or hostname):

geoiplookup ipaddress|hostname

For example:

geoiplookup www.abc.com
GeoIP Country Edition: US, United States

This shows me in one command line where the IP that resolves to that particular hostname is located.

The GeoLite Country database is quite accurate, but you should update it (they make available a new release each month). To see when the database you are using was build:

geoiplookup -v
GEO-106FREE 20060601 Build 1 Copyright (c) 2006 MaxMind LLC All Rights Reserved

Secure Programming for Linux and Unix [PDF]

This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Specific guidelines for C, C++, Java, Perl, PHP, Python, Tcl, and Ada95 are included.

This book describes a set of guidelines for writing secure programs on Linux and Unix systems. For purposes of this book, a “secure program” is a program that sits on a security boundary, taking input from a source that does not have the same access rights as the program. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs.

This book does not address modifying the operating system kernel itself, although many of the principles discussed here do apply. These guidelines were developed as a survey of “lessons learned” from various sources on how to create such programs (along with additional observations by the author), reorganized into a set of larger principles.

http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO.pdf

—————-
Now playing: Metallica – Metallica – Until It Sleeps
via FoxyTunes

Stallman – If you want freedom don’t follow Linus Torvalds

The founder of the Free Software Foundation asks readers whether they will fight for freedom or be too lazy to resist.

“Please don’t call GNU ‘Linux’,” says Richard Stallman, the founder of the Free Software Foundation. In this interview, he also asks readers whether they will fight for freedom or be too lazy to resist.

http://www.pcworld.idg.com.au/index.php/id;211669437
—————-
Now playing: Metallica – Bleeding Me
via FoxyTunes

Follow

Get every new post delivered to your Inbox.