Mcrypt-cifrare file

 

Questo è un piccolo trucchetto per cifrare velocemente un file. Come ho avuto modo di scrivere in passato per altri metodi

qua e qua,la sicurezza non è mai troppa, specialmente quando si scrivono su un file dei dati sensibili.

Quello che serve è Mcrypt:

# apt-get install mcrypt

quindi per cifrare un file usiamo questi comandi:

mcrypt -a blowfish nome_file

dove -a indica l’algoritmo di cifratura. Per la lista completa:

mcrypt --l

a questo punto sceglieremo una password che inseriremo due volte, e ci troveremo un file criptato con estensione .nc.

Adesso non rimane che distruggere l’originale:

shred -n 10 -u -z -v nome_file

per decifrare il file:

mdecrypt nome_file.nc

Tutto qua, per altre opzioni man mcrypt

 

Shorewall installazione e configurazione



 

Shorewall (Shoreline Firewall) è un firewall che si appoggia al sistema  Netfilter (iptables/ipchains) del kernel Linux, per una più semplice gestione di avanzate configurazioni di rete. Prima di iniziare nell'installazione di shorewall, bisogna prima disinstallare eventualmente l'altro firewall. Esempio: firestarter:

# apt-get remove --purge firestarter

# apt-get install shorewall shorewall-common shorewall-shell shorewall-doc dash

 

1) Partiamo con la configurazione del file interfaces:

# gedit /etc/shorewall/interfaces

all'interno copiamo questo:

# Shorewall version 3.0 – Sample Interfaces File for one-interface configuration.
#
# /etc/shorewall/interfaces
#
# You must add an entry in this file for each network interface on your
# firewall system.
#
# Columns are:
#
# ZONE Zone for this interface. Must match the name of a
# zone defined in /etc/shorewall/zones. You may not
# list the firewall zone in this column.
#
# If the interface serves multiple zones that will be
# defined in the /etc/shorewall/hosts file, you should
# place "-" in this column.
#
# If there are multiple interfaces to the same zone,
# you must list them in separate entries:
#
# Example:
#
# loc eth1 –
# loc eth2 –
#
# INTERFACE Name of interface. Each interface may be listed only
# once in this file. You may NOT specify the name of
# an alias (e.g., eth0:0) here; see
# https://www.shorewall.net/FAQ.htm#faq18
#
# You may specify wildcards here. For example, if you
# want to make an entry that applies to all PPP
# interfaces, use 'ppp+'.
#
# There is no need to define the loopback interface (lo)
# in this file.
#
# BROADCAST The broadcast address for the subnetwork to which the
# interface belongs. For P-T-P interfaces, this
# column is left blank.If the interface has multiple
# addresses on multiple subnets then list the broadcast
# addresses as a comma-separated list.
#
# If you use the special value "detect", the firewall
# will detect the broadcast address for you. If you
# select this option, the interface must be up before
# the firewall is started, you must have iproute
# installed.
#
# If you don't want to give a value for this column but
# you want to enter a value in the OPTIONS column, enter
# "-" in this column.
#
# OPTIONS A comma-separated list of options including the
# following:
#
# dhcp – Specify this option when any of
# the following are true:
# 1. the interface gets its IP address
# via DHCP
# 2. the interface is used by
# a DHCP server running on the firewall
# 3. you have a static IP but are on a LAN
# segment with lots of Laptop DHCP
# clients.
# 4. the interface is a bridge with
# a DHCP server on one port and DHCP
# clients on another port.
#
# norfc1918 – This interface should not receive
# any packets whose source is in one
# of the ranges reserved by RFC 1918
# (i.e., private or "non-routable"
# addresses. If packet mangling or
# connection-tracking match is enabled in
# your kernel, packets whose destination
# addresses are reserved by RFC 1918 are
# also rejected.
#
# routefilter – turn on kernel route filtering for this
# interface (anti-spoofing measure). This
# option can also be enabled globally in
# the /etc/shorewall/shorewall.conf file.
#
# logmartians – turn on kernel martian logging (logging
# of packets with impossible source
# addresses. It is suggested that if you
# set routefilter on an interface that
# you also set logmartians. This option
# may also be enabled globally in the
# /etc/shorewall/shorewall.conf file.
#
# blacklist – Check packets arriving on this interface
# against the /etc/shorewall/blacklist
# file.
#
# maclist – Connection requests from this interface
# are compared against the contents of
# /etc/shorewall/maclist. If this option
# is specified, the interface must be
# an ethernet NIC and must be up before
# Shorewall is started.
#
# tcpflags – Packets arriving on this interface are
# checked for certain illegal combinations
# of TCP flags. Packets found to have
# such a combination of flags are handled
# according to the setting of
# TCP_FLAGS_DISPOSITION after having been
# logged according to the setting of
# TCP_FLAGS_LOG_LEVEL.
#
# proxyarp –
# Sets
# /proc/sys/net/ipv4/conf/<interface>/proxy_arp.
# Do NOT use this option if you are
# employing Proxy ARP through entries in
# /etc/shorewall/proxyarp. This option is
# intended soley for use with Proxy ARP
# sub-networking as described at:
#
#
# routeback – If specified, indicates that Shorewall
# should include rules that allow
# filtering traffic arriving on this
# interface back out that same interface.
#
# arp_filter – If specified, this interface will only
# respond to ARP who-has requests for IP
# addresses configured on the interface.
# If not specified, the interface can
# respond to ARP who-has requests for
# IP addresses on any of the firewall's
# interface. The interface must be up
# when Shorewall is started.
#
# arp_ignore[=<number>]
# – If specified, this interface will
# respond to arp requests based on the
# value of <number>.
#
# 1 – reply only if the target IP address
# is local address configured on the
# incoming interface
#
# 2 – reply only if the target IP address
# is local address configured on the
# incoming interface and both with the
# sender's IP address are part from same
# subnet on this interface
#
# 3 – do not reply for local addresses
# configured with scope host, only
# resolutions for global and link
# addresses are replied
#
# 4-7 – reserved
#
# 8 – do not reply for all local
# addresses
#
# If no <number> is given then the value
# 1 is assumed
#
# WARNING — DO NOT SPECIFY arp_ignore
# FOR ANY INTERFACE INVOLVED IN PROXY ARP.
#
# nosmurfs – Filter packets for smurfs
# (packets with a broadcast
# address as the source).
#
# Smurfs will be optionally logged based
# on the setting of SMURF_LOG_LEVEL in
# shorewall.conf. After logging, the
# packets are dropped.
#
# detectnets – Automatically taylors the zone named
# in the ZONE column to include only those
# hosts routed through the interface.
#
# upnp – Incoming requests from this interface
# may be remapped via UPNP (upnpd).
#
# WARNING: DO NOT SET THE detectnets OPTION ON YOUR
# INTERNET INTERFACE.
#
# The order in which you list the options is not
# significant but the list should have no embedded white
# space.
#
# Example 1: Suppose you have eth0 connected to a DSL modem and
# eth1 connected to your local network and that your
# local subnet is 192.168.1.0/24. The interface gets
# it's IP address via DHCP from subnet
# 206.191.149.192/27. You have a DMZ with subnet
# 192.168.2.0/24 using eth2.
#
# Your entries for this setup would look like:
#
# net eth0 206.191.149.223 dhcp
# local eth1 192.168.1.255
# dmz eth2 192.168.2.255
#
# Example 2: The same configuration without specifying broadcast
# addresses is:
#
# net eth0 detect dhcp
# loc eth1 detect
# dmz eth2 detect
#
# Example 3: You have a simple dial-in system with no ethernet
# connections.
#
# net ppp0 –
#
# For additional information, see
#
#
###############################################################################
#ZONE INTERFACE BROADCAST OPTIONS
net eth0   detect      routefilter,dhcp,tcpflags,logmartians,nosmurfs
#LAST LINE — ADD YOUR ENTRIES BEFORE THIS ONE — DO NOT REMOVE

 

Attenzione:Se al posto del router abbiamo un modem cambiare eth0 con ppp0. In ogni caso cercare di adattarlo alle nostre esigenze e configurazione.

 

2) Configurazione del file policy:

# gedit /etc/shorewall/policy

all'interno copiamo questo:

# Shorewall version 3.0 – Sample Policy File for one-interface configuration.
#
# /etc/shorewall/policy
#
# THE ORDER OF ENTRIES IN THIS FILE IS IMPORTANT
#
# This file determines what to do with a new connection request if we
# don't get a match from the /etc/shorewall/rules file . For each
# source/destination pair, the file is processed in order until a
# match is found ("all" will match any client or server).
#
# INTRA-ZONE POLICIES ARE PRE-DEFINED
#
# For $FW and for all of the zoned defined in /etc/shorewall/zones,
# the POLICY for connections from the zone to itself is ACCEPT (with no
# logging or TCP connection rate limiting but may be overridden by an
# entry in this file. The overriding entry must be explicit (cannot use
# "all" in the SOURCE or DEST).
#
# Columns are:
#
# SOURCE Source zone. Must be the name of a zone defined
# in /etc/shorewall/zones, $FW or "all".
#
# DEST Destination zone. Must be the name of a zone defined
# in /etc/shorewall/zones, $FW or "all"
#
# POLICY Policy if no match from the rules file is found. Must
# be "ACCEPT", "DROP", "REJECT", "CONTINUE" or "NONE".
#
# ACCEPT – Accept the connection
# DROP – Ignore the connection request
# REJECT – For TCP, send RST. For all other,
# send "port unreachable" ICMP.
# QUEUE – Send the request to a user-space
# application using the QUEUE target.
# CONTINUE – Pass the connection request past
# any other rules that it might also
# match (where the source or
# destination zone in those rules is
# a superset of the SOURCE or DEST
# in this policy).
# NONE – Assume that there will never be any
# packets from this SOURCE
# to this DEST. Shorewall will not set
# up any infrastructure to handle such
# packets and you may not have any
# rules with this SOURCE and DEST in
# the /etc/shorewall/rules file. If
# such a packet _is_ received, the
# result is undefined. NONE may not be
# used if the SOURCE or DEST columns
# contain the firewall zone ($FW) or
# "all".
#
# If this column contains ACCEPT, DROP or REJECT and a
# corresponding common action is defined in
# /etc/shorewall/actions (or
# /usr/share/shorewall/actions.std) then that action
# will be invoked before the policy named in this column
# is enforced.
#
# LOG LEVEL If supplied, each connection handled under the default
# POLICY is logged at that level. If not supplied, no
# log message is generated. See syslog.conf(5) for a
# description of log levels.
#
# Beginning with Shorewall version 1.3.12, you may
# also specify ULOG (must be in upper case). This will
# log to the ULOG target and sent to a separate log
# through use of ulogd
# ).
#
# If you don't want to log but need to specify the
# following column, place "-" here.
#
# LIMIT:BURST If passed, specifies the maximum TCP connection rate
# and the size of an acceptable burst. If not specified,
# TCP connections are not limited.
#
# See for additional information.
#
###############################################################################
#SOURCE DEST POLICY LOG LEVEL LIMIT:BURST
$FW net ACCEPT
net all DROP info
# The FOLLOWING POLICY MUST BE LAST
all all REJECT info
#LAST LINE — ADD YOUR ENTRIES ABOVE THIS LINE — DO NOT REMOVE

 

 

3) Creazione del file di configurazione zones:

# gedit /etc/shorewall/zones

all'interno copiamo questo:

# Shorewall version 3.0 – Sample Zones File for one-interface configuration.
#
# /etc/shorewall/zones
#
# This file determines your network zones.
#
# Columns are:
#
# ZONE Short name of the zone (5 Characters or less in length).
# The names "all" and "none" are reserved and may not be
# used as zone names.
#
# Where a zone is nested in one or more other zones,
# you may follow the (sub)zone name by ":" and a
# comma-separated list of the parent zones. The parent
# zones must have been defined in earlier records in this
# file.
#
# Example:
#
# #ZONE TYPE OPTIONS
# a ipv4
# b ipv4
# c:a,b ipv4
#
# Currently, Shorewall uses this information only to reorder the
# zone list so that parent zones appear after their subzones in
# the list. In the future, Shorewall may make more extensive use
# of that information.
#
# TYPE ipv4 – This is the standard Shorewall zone type and is the
# default if you leave this column empty or if you enter
# "-" in the column. Communication with some zone hosts
# may be encrypted. Encrypted hosts are designated using
# the 'ipsec'option in /etc/shorewall/hosts.
# ipsec – Communication with all zone hosts is encrypted
# Your kernel and iptables must include policy
# match support.
# firewall
# – Designates the firewall itself. You must have
# exactly one 'firewall' zone. No options are
# permitted with a 'firewall' zone. The name that you
# enter in the ZONE column will be stored in the shell
# variable $FW which you may use in other configuration
# files to designate the firewall zone.
#
# OPTIONS, A comma-separated list of options as follows:
# IN OPTIONS,
# OUT OPTIONS reqid=<number> where <number> is specified
# using setkey(8) using the 'unique:<number>
# option for the SPD level.
#
# spi=<number> where <number> is the SPI of
# the SA used to encrypt/decrypt packets.
#
# proto=ah|esp|ipcomp
#
# mss=<number> (sets the MSS field in TCP packets)
#
# mode=transport|tunnel
#
# tunnel-src=<address>[/<mask>] (only
# available with mode=tunnel)
#
# tunnel-dst=<address>[/<mask>] (only
# available with mode=tunnel)
#
# strict Means that packets must match all rules.
#
# next Separates rules; can only be used with
# strict..
#
# Example:
# mode=transport,reqid=44
#
# The options in the OPTIONS column are applied to both incoming
# and outgoing traffic. The IN OPTIONS are applied to incoming
# traffic (in addition to OPTIONS) and the OUT OPTIONS are
# applied to outgoing traffic.
#
# If you wish to leave a column empty but need to make an entry
# in a following column, use "-".
#
# THE ORDER OF THE ENTRIES IN THIS FILE IS IMPORTANT IF YOU HAVE NESTED OR
# OVERLAPPING ZONES DEFINED THROUGH /etc/shorewall/hosts.
#
# See
###############################################################################
#ZONE TYPE OPTIONS IN OUT
# OPTIONS OPTIONS
fw firewall
net ipv4
#LAST LINE – ADD YOUR ENTRIES ABOVE THIS ONE – DO NOT REMOVE

 

 

4) Configurazione del file rules.

# gedit /etc/shorewall/rules

all'interno copiamo questo:

Leggi tutto “Shorewall installazione e configurazione”

Cifrare documenti con Encfs

 

Esiste un altro modo oltre a questo per proteggere i nostri dati sensibili, e cioè utilizzare in coppia encfs e fuse per criptare una directory. Quindi installiamo:

# apt-get install encfs fuse-utils

carichiamo il modulo:

#modprobe fuse

per farlo caricare all'avvio del sistema:

#sh -c "echo fuse >> /etc/modules"

aggiungiamo il nostro utente al gruppo fuse

#adduser Utente fuse

verifichiamo:

DebianBox:/home/edmond# grep "fuse" "/etc/group"
fuse:x:118:edmond

Quindi iniziamo a creare la cartella da criptare, che chiamerò secret:

mkdir /home/Utente/.secret

mkdir /home/Utente/secret

a questo punto usiamo encfs per il montaggio:

encfs /home/Utente/.secret /home/Utente/secret

 

digitiamo p oppure x e scegliamo la password per encfs.

Ipotizzando di avere un documento importantissimo da nascondere:

cp topsecret.txt /home/Utente/secret

e poi smontiamo:

fusermount -u /home/utente/secret

a questo punto il documento sarà al sicuro, infatti al comando

ls /home/Utente/secret

non apparirà nulla. Mentre se noi rimontiamo ci apparirà 🙂

 

edmond@DebianBox:~$ encfs /home/edmond/.secret /home/edmond/secret
Password di EncFS:
edmond@DebianBox:~$ ls /home/edmond/secret
topsecret.txt

La sicurezza non è mai troppa 😉
 

Vnstat per monitorare la rete

Vnstat è un ottimo tool open source per monitorare la propria rete. Non è uno sniffer, si occupa soltanto di memorizzare in un file db, le informazioni presenti in /proc. Si può usare in maniera testuale e non solo, senza i privilegi di root. Per installarlo basta un:

apt-get install vnstat libgd2-xpm

Per avere un interfaccia grafica:

wget https://www.sqweek.com/sqweek/files/vnstat_php_frontend-1.4.tar.gz

lo scompattiamo in /var/www

cd /var/www

tar xvzf vnstat_php_frontend-1.4.tar.gz

Per comodità cambiamo il nome

 mv vnstat_php_frontend-1.4 vnstat

A questo punto incominciamo a creare il db, a secondo dal numero di interfaccia e dal nome:

vnstat -u -i eth0

oppure

vnstat -u -i eth0 && vnstat -u -i eth1

Dopo 5 minuti dando da terminale vnstat, iniziamo a vedere le statistiche. Per vederle in maniera più comoda:

https://localhost/vnstat/

 

 

Script per Gmail

 

Per scaricare la posta da Gmail io uso uno script per me utilissimo, dato che non sono interessato ad usare client di posta, ma al massimo i plugins per iceweasel-firefox. La particolarità di questo script è che una volta controllato il numero di nuove mail ricevute, si accende il led num lock (oppure caps lock o skroll lock) e lampeggia tante volte, quanto sono le email ricevute. L’unica dipendenza che serve è blinkd, presente nei repository.

apt-get install blinkd

Questo lo script:

#!/bin/bash
cd /tmp
username=Vostro_Username_Google_Senza_@gmail.com
password=$( zenity --entry --title="Password Gmail" --text="Inserisci password :" --hide-text )
if [[ -z $password ]]
then exit
fi
if [[ $password == "0" ]]
then password=$( zenity --entry --title="Password Gmail" --text="Inserisci password :" )
fi
sleep 15
function get_rss
{
wget -q -O .gmail_rss https://$username:$password@mail.google.com/mail/feed/atom --no-check-certificate
fc=$( cat .gmail_rss | grep "fullcount" | grep -o [1-9] )
}
while true
do
get_rss
if ! [[ fc == "0" ]]
then
    until [[ $fc == "" ]]
    do
    blink -n -r $fc
    get_rss
    sleep 15
    done
blink
fi
sleep 5m
done
rm -f .gmail_rss

chmod +x nome_script

 

Naturalmente per visualizzare il file .gmail_rss in /tmp bisogna visualizzare i file nascosti.

Lo script verifica la presenza di nuove mails ogni 10 minuti, per cambiare basta modificare "sleep 10m"

Il led che lampeggia è il num lock, per modificarlo basta sostituire blink -n -r $fc con blink -c -r $fc e si passa al capslock.

Queste le altre opzioni:

  -c,   –capslockled   use Caps-Lock LED
  -h,   –help          display this help and exit
  -m s, –machine=s     let keyboard of machine s blink
  -n,   –numlockled    use Num-Lock LED
  -r n, –rate=n        set blink rate to n
  -s,   –scrolllockled use Scroll-Lock LED
  -t n, –tcp-port=n    use tcp port n
  -v,   –version       output version information and exit

Per fermare o far partire i demoni  /etc/init.d/blinkd stop-start-restart.

Per altro man blinkd.

 

Programmi simili/alternativi Windows vs Gnu-Linux

Una delle difficoltà che s’incontrano nel passare da Windows a Gnu-Linux è la paura di non avere programmi a cui si è abituati o almeno equivalenti. Questa non è altro che una leggenda metropolitana, portata avanti da chi ha il monopolio assoluto e vorrebbe la morte dell’opensource. Certo su un professionista che per lavoro usa Photoshop piuttosto che Gimp, non c’è nulla da dire, ma tutti gli altri che usano Photoshop per correggere le proprie fotografie o gli occhi rossi, mi fanno soltanto ridere, e mi fanno pensare…. che se avessero dovuto comprarlo, col cazzo che lo avrebbero usato. Il software si paga, dato che c’è gente dietro che ci lavora, oppure bisognerebbe affidarsi all’opensource che di programmi ne ha tanti, non dimenticandosi che free non significa gratis, poiche anche in questo mondo vi sono programmi professionali a pagamento. Sotto alcuni esempi tratti da linuxalt.

 

Software Windows e simili/alternativi Gnu-Linux

 

3D Home Architect

Sweet Home 3D ( https://sweethome3d.sourceforge.net/index.html )

 

3D Studio Max

K-3D ( https://www.k-3d.org/ )
Wings 3D ( https://www.wings3d.com/ )
Art of Illusion ( https://www.artofillusion.org/ )
Blender ( https://www.blender.org/ )

 

ACDSee

KuickShow ( https://kuickshow.sourceforge.net/ )
ShowImg ( )
Gwenview ( https://gwenview.sourceforge.net/ )
GQview ( https://gqview.sourceforge.net/ )
Eye of GNOME ( https://www.gnome.org/projects/eog/ )

Adobe Acrobat Reader

okular ( )
Xpdf ( https://www.foolabs.com/xpdf/ )
Evince ( https://www.gnome.org/projects/evince/ )
ePDFView ( )
KPDF ( https://kpdf.kde.org/ )

Adobe Audition

Audacity ( https://audacity.sourceforge.net/ )

Adobe Illustrator

Skencil ( https://www.skencil.org/ )
Inkscape ( https://www.inkscape.org/ )
Karbon14 ( https://www.koffice.org/karbon/ )
Xara Xtreme for Linux ( https://www.xaraxtreme.org/ )

Adobe PageMaker

Scribus ( https://www.scribus.net/ )

Adobe PhotoAlbum

F-Spot ( https://f-spot.org/Main_Page )
KPhotoAlbum ( https://www.kphotoalbum.org/ )
digiKam ( https://www.digikam.org/ )

Adobe Photoshop

CinePaint ( https://www.cinepaint.org/ )
Krita ( https://www.koffice.org/krita/ )
GIMP ( https://www.gimp.org/ )

Adobe Premier

PiTiVi ( https://www.pitivi.org/wiki/Main_Page )
LiVES ( https://lives.sourceforge.net/ )
Kino ( https://www.kinodv.org/ )
Cinelerra ( )
kdenlive ( https://kdenlive.sourceforge.net/ )
Jahshaka ( )

Ant Movie Catalog

Moviefly ( https://savannah.nongnu.org/projects/lmc/ )

AOL Instant Messenger (AIM)

Kopete ( https://kopete.kde.org/ )
Pidgin ( https://pidgin.im )

APC PowerChute

Network UPS Tools ( https://www.networkupstools.org/ )
Apcupsd ( https://www.apcupsd.com/ )
PowerD ( https://power.sourceforge.net/ )

CDex

Sound Juicer ( )
Rubyripper ( https://wiki.hydrogenaudio.org/index.php?title=Rubyripper )
ripperX ( https://ripperx.sourceforge.net/ )
Grip ( )
KAudioCreator ( )

Collectorz

aviManager ( https://avimanager.sourceforge.net/ )
GCstar ( https://www.gcstar.org/ )
Tellico ( https://periapsis.org/tellico/ )
Alexandria ( https://alexandria.rubyforge.org/ )
Griffith ( )
vMovieDB ( https://vmoviedb.sourceforge.net/ )
Katalog ( )

Dreamweaver

Quanta Plus ( )
Geany ( https://geany.uvena.de )
Nvu ( )
Screem ( https://www.screem.org/ )
KompoZer ( https://www.kompozer.net/ )
Bluefish ( https://bluefish.openoffice.nl/index.html )

DVDShrink

k9copy ( https://k9copy.sourceforge.net/ )
OGMRip ( https://ogmrip.sourceforge.net/ )
Thoggen ( https://thoggen.net/ )
xdvdshrink ( https://dvdshrink.sourceforge.net/ )
DVD Rip-O-Matic ( )
qVamps ( https://vamps.sourceforge.net/ )
dvd::rip ( https://www.exit1.org/dvdrip/ )
AcidRip ( )

Everest

HardInfo ( )

Finale

Lilypond ( https://www.lilypond.org )
Denemo ( https://denemo.sourceforge.net/index.html )
Rosegarden ( https://www.rosegardenmusic.com/ )
NoteEdit ( )
Brahms ( https://brahms.sourceforge.net/ )

Flash

F4L ( https://f4l.sourceforge.net/ )

Fontographer

FontForge ( https://fontforge.sourceforge.net/ )

Forte Agent

Pan ( https://pan.rebelbase.com/ )

FruityLoops

LMMS ( https://lmms.sourceforge.net/ )
Hydrogen ( https://www.hydrogen-music.org/ )

Google Desktop Search

Google Desktop ( https://desktop.google.com/linux/index.html )
Beagle ( https://beagle-project.org/ )

Guitar Pro

TuxGuitar ( https://www.tuxguitar.com.ar/home.html )
DGuitar ( https://sourceforge.net/projects/dguitar/ )
kguitar ( https://sourceforge.net/projects/kguitar/ )

iTunes

Banshee ( )
aTunes ( https://www.atunes.org/ )
Quod Libet ( https://www.sacredchao.net/quodlibet )
SongBird ( https://www.songbirdnest.com )
Exaile ( https://www.exaile.org/ )
Amarok ( https://amarok.kde.org/ )
Listen ( https://listengnome.free.fr/ )
Rhythmbox ( https://www.gnome.org/projects/rhythmbox/ )
gtkpod ( https://www.gtkpod.org/ )

Legacy Family Tree

GRAMPS ( https://gramps-project.org/ )

LimeWire

FrostWire ( https://www.frostwire.com/ )

Meal Master

krecipe ( https://krecipes.sourceforge.net/ )
Gourmet Recipe Manager ( https://grecipe-manager.sourceforge.net/ )

Microsoft Access

Kexi ( https://www.koffice.org/kexi/ )
knoda ( https://www.knoda.org )
GNOME-DB ( https://www.gnome-db.org/ )

Microsoft Excel

KSpread ( )
Open Calc ( https://www.openoffice.org/product/calc.html )
Gnumeric ( https://www.gnome.org/projects/gnumeric/ )

Microsoft Frontpage

Quanta Plus ( )
Nvu ( )
KompoZer ( https://www.kompozer.net/ )
Bluefish ( https://bluefish.openoffice.nl/index.html )

Microsoft HyperTerminal

minicom ( https://alioth.debian.org/projects/minicom/ )
GtkTerm ( https://freshmeat.net/projects/gtkterm/ )

Microsoft Internet Explorer

Epiphany ( https://www.gnome.org/projects/epiphany/ )
Opera ( https://www.opera.com/download/ )
Firefox ( https://www.mozilla.com/firefox/ )
Konqueror ( https://www.konqueror.org/ )

Microsoft Media Center

XBMC Media Center ( https://xbmc.org/ )

Microsoft Money

KMyMoney ( https://kmymoney2.sourceforge.net/ )
GNUcash ( https://www.gnucash.org/ )
Gnofin ( https://gnofin.sourceforge.net/ )
Grisbi ( https://www.grisbi.org/ )

Microsoft Office

GNOME Office ( https://www.gnome.org/gnome-office/ )
KOffice ( https://www.koffice.org/ )
OpenOffice ( https://www.openoffice.org/ )

Microsoft OneNote

BasKet ( https://basket.kde.org/ )

Microsoft Outlook (Express)

Thunderbird ( https://www.mozilla.com/thunderbird/ )
Evolution ( https://www.gnome.org/projects/evolution/ )

Microsoft Powerpoint

Open Office Impress ( https://www.openoffice.org/product/impress.html )
KPresenter ( )

Microsoft Project

KPlato ( )
OpenProj ( )
GanttProject ( https://ganttproject.sourceforge.net/ )
Planner ( https://live.gnome.org/Planner )
TaskJuggler ( https://www.taskjuggler.org/ )

Microsoft Visio

Dia ( https://www.gnome.org/projects/dia/ )
Kivio ( )

Microsoft Windows Media Center

Freevo ( https://freevo.sourceforge.net/ )
Elisa Media Center ( )
MythTV ( https://www.mythtv.org )
LinuxMCE ( https://www.linuxmce.com/ )

Microsoft Word

Open Office Writer ( https://www.openoffice.org/product/writer.html )
AbiWord ( https://www.abisource.com/ )
Kword ( )

mIRC

Konversation ( https://konversation.kde.org/ )
KVIrc ( https://www.kvirc.net/ )
BitchX ( https://www.bitchx.org/ )
Xchat ( https://www.xchat.org/ )
ChatZilla! ( https://chatzilla.hacksrus.com/ )
irssi ( https://www.irssi.org/ )
Pidgin ( https://pidgin.im )

Mp3tag

Kid3 ( https://kid3.sourceforge.net/ )
Pinkytagger ( https://pinkytagger.sourceforge.net/ )
EasyTAG ( https://easytag.sourceforge.net/ )
Cowbell ( https://more-cowbell.org/ )
Audio Tag Tool ( https://pwp.netcabo.pt/paol/tagtool/ )

MSN messenger

Mercury Messenger ( https://www.mercury.to/ )
Kopete ( https://kopete.kde.org/ )
aMSN ( https://amsn-project.net/ )
Pidgin ( https://pidgin.im )

Mudbox

SharpConstruct ( )

Nero Burning Rom

X-CD-Roast ( https://www.xcdroast.org/ )
Brasero ( https://perso.orange.fr/bonfire/index.htm )
GnomeBaker ( https://gnomebaker.sourceforge.net/ )
Graveman ( https://graveman.tuxfamily.org/ )
K3b ( https://www.k3b.org/ )

NetMeeting

Ekiga ( )

NetStumbler

Kismet ( https://www.kismetwireless.net/ )
SWScanner ( https://www.swscanner.org/ )

NewzCrawler

RSSOwl ( https://www.rssowl.org/ )
L iferea ( https://liferea.sourceforge.net/ )
BasKet ( https://basket.kde.org/ )
Akregator ( https://akregator.kde.org/ )
Blam ( )
Straw ( https://www.gnome.org/projects/straw/ )

Notepad

leafpad ( https://tarot.freeshell.org/leafpad/ )
NEdit ( https://www.nedit.org/ )
jEdit ( https://www.jedit.org/ )
Kate ( https://kate-editor.org/ )
gedit ( https://www.gnome.org/projects/gedit/ )
Scribes ( https://scribes.sourceforge.net/ )
tpad ( https://tclpad.sourceforge.net/ )

OrangeCD Catalog

GWhere ( https://www.gwhere.org )

Origin

SciGraphica ( https://scigraphica.sourceforge.net/ )

Partition Magic

Partimage ( https://www.partimage.org/Main_Page )
GParted ( https://gparted.sourceforge.net/ )
QtParted ( https://qtparted.sourceforge.net )

Picasa

F-Spot ( https://f-spot.org/Main_Page )
KPhotoAlbum ( https://www.kphotoalbum.org/ )
digiKam ( https://www.digikam.org/ )

Pro Tools

Ardour ( https://www.ardour.org )

Quicken

KMyMoney ( https://kmymoney2.sourceforge.net/ )
GNUcash ( https://www.gnucash.org/ )
Gnofin ( https://gnofin.sourceforge.net/ )
Grisbi ( https://www.grisbi.org/ )

SoulSeek

Nicotine ( )
Nicotine-Plus ( https://nicotine-plus.sourceforge.net/ )

SoundForge

ReZound ( https://rezound.sourceforge.net/ )

TexnicCenter

Total Commander

GNOME Commander ( https://www.nongnu.org/gcmd/ )
xfe ( https://roland65.free.fr/xfe/ )
Tux Commander ( https://tuxcmd.sourceforge.net/ )
Midnight Commander ( https://www.ibiblio.org/mc/ )
Krusader ( https://krusader.sourceforge.net/ )

Traktor DJ

Mixxx ( https://mixxx.sourceforge.net/ )
terminatorX ( https://www.terminatorx.org/ )

Videora

thin liquid film ( )

Winamp

Audacious ( )
Amarok ( https://amarok.kde.org/ )
XMMS ( https://www.xmms.org/ )

Windows Media Player

KPlayer ( https://kplayer.sourceforge.net/ )
VideoLAN ( https://www.videolan.org/ )
xine ( https://xinehq.de/ )
mplayer ( https://www.mplayerhq.hu/design7/news.html )

Windows Movie Maker

PiTiVi ( https://www.pitivi.org/wiki/Main_Page )
LiVES ( https://lives.sourceforge.net/ )
Open Movie Editor ( https://openmovieeditor.sourceforge.net/HomePage )
Avidemux ( https://fixounet.free.fr/avidemux/ )
Cinelerra ( )
kdenlive ( https://kdenlive.sourceforge.net/ )

WinIso

ISO Master ( https://littlesvr.ca/isomaster/ )
KIso ( https://kiso.sourceforge.net/ )

WinMerge

KDiff3 ( https://kdiff3.sourceforge.net/ )
Meld ( https://meld.sourceforge.net/ )
xxdiff ( https://furius.ca/xxdiff/ )
Kile ( https://kile.sourceforge.net/ )

WinTV

XdTV ( https://xawdecode.sourceforge.net/ )
tvtime ( https://tvtime.sourceforge.net/ )

WS_FTP

gFTP ( https://gftp.seul.org/ )
FireFTP ( https://fireftp.mozdev.org/ )

Zbrush

SharpConstruct ( )

ZoneAlarm

Guarddog ( https://www.simonzone.com/software/guarddog/ )
Firestarter ( https://www.fs-security.com/ )

 

Cambiare MAC address con Linux

 

Per cambiare il nostro MAC address non bisogna fare altro che eseguire 3 semplici passaggi.

Per prima cosa bisogna ricordarsi che i numeri e le lettere ammessi sono: 1 2 3 4 5 6 7 8 9 0 a b c d e f

Dopodiche ci si costruisce a piacere un MAC address tipo questo 1a:2b:3c:4d:5e:6f

Quindi da root

ifconfig eth0 down
ifconfig eth0 hw ether 1a:2b:3c:4d:5e:6f
ifconfig etho up

Per controllare il nuovo MAC address

ifconfig

 

Super Grub Disk su penna usb

 

Super Grub Disk come si sa è utilissimo, è uno di quei tool che dovrebbe essere sempre ha portata di mano, poichè prima o poi capita di doverlo usare, evitando così la procedura manuale. E' disponibile come immagine iso, floppy ed usb. Può essere molto comodo tenerlo in una chiavetta usb per diversi motivi, in primis per comodità, dato che ha differenza dei cd, che ognuno di noi possiede in gran numero, e li tiene infognati in ogni dove, di penne usb al max se ne possiede 2, 3, 4 , quindi sono sempre facili da trovare. Un altro buon motivo, è dato dal fatto che, installando SGD su una penna usb, questa può essere usata lo stesso per conservarne i dati, basta non toccare l'unica cartella di nome boot, che tra l'altro è di 1mb. Si puo scaricare da questa questa pagina anche in italiano. L'installazione è semplice, e si esegue in pochi passi.

Una volta scaricato super_grub_disk_italiano_usb_0.9673.tar.bz2, scompattarlo, e la cartella boot, copiarla sulla penna:

 

cp -r boot /media/disk

dove disk è la nosta penna. Smontare la penna, ed assicurarsi che ciò sia avvenuto per davvero, altrimenti non funziona.

 

umount /dev/sdg1 nel mio caso

Da root digitare

 

grub

adesso vediamo come grub identifica la nostra penna. Aiutandoci con il tasto tab.

 

grub> geometry (hd

grub> geometry (hd Possible disks are: hd0 hd1 hd2

grub> geometry (hd2)

drive 0x82: C/H/S = 31/255/63, The number of sectors = 501759, /dev/sdg Partition num: 0, Filesystem type is fat, partition type 0x6

Quindi si nota che il dispositivo è hd2 ed è identificato anche come /dev/sdg. Quindi:

device (hd2) /dev/sdg

root (hd2,0)

setup (hd2)

quit

exit

sync
 

 Riavviamo e ci assicuriamo che il pc sia settato per fare il boot da usb.

Virus Ipotesi di complotto

 

Questa è una notizia che secondo me ha dell’incredibile se avesse ulteriori riscontri. Come notizia non è freschissima, ma

io ne sono venuto a conoscenza da poco tramite il mensile hakin9 di questo mese, che ha sua volta, cita come fonte zone-h.

Comunque lo scenario secondo me può essere credibile. Un alleanza tra le case anti-virus e il governo americano stesso,

complice, aggiungo io, involontaria la Microsoft che equipaggia con il suo sistema operativo Il 90% o più ( mi pare)

dell’utenza mondiale. Io sinceramente, più uso Linux e più mi sento sicuro, e convinto della mia scelta, anche se ha

significato e forse significherà ancora, rinunciare a qualcosa in termini di usabilità. Qua la notizia, e qua la mia risposta o

filastrocca dedicata a tutti questi signori che….. non mi avranno mai.

.

Super Grub Disk in italiano

 

Qualche giorno fa ho "conosciuto" adrian15, il papà di SGD, e mi ha chiesto se ero interessato alla traduzione italiana di Sgd. Io naturalmente ho accettato, e mi sono messo subito all’opera, sempre contento di dare un contributo alla causa dei pinguini. Devo dire che tradurre un programma non è come tradurre una semplice frase, anche perchè ci sono dei termini che in inglese significano una cosa, ed in italiano non significano quasi nulla. se poi vai a guardare come gli altri hanno tradotto nelle rispettive lingue il programma, allora davvero non ne vieni a capo:) Comunque ho dato il massimo ed ho tradotto SGD, ho inviato il tutto ad adrian15, ed aspetto notizie su quando inserirà la traduzione, o su altri sviluppi. Per chi ha bisogno di SGD in italiano subito ho messo a disposizione quello appena modificato da me, scaricabile da qua. Una volta scaricato lo scompattiamo con

 

tar -xvf public_sgd_source_code_0.9654.tar.gz

entriamo nella cartella creata

 

cd /home/UTENTE/Desktop/public_sgd_source_code_0.9654

e adesso siamo pronti a prepararci un iso

 

./make_sgd.sh cdromiso /home/UTENTE/mysgdiso.iso

chiaramente sostituire il nome utente con il vostro.

 

a questo punto la si può masterizzare, e si avrà SGD in italiano.

 

Aggiornamento 26/10

 

Scaricare Sgd in italiano direttamente dal sito ufficiale, come immagine iso, floppy, usb.