Questo è un semplice comando per chi ha bisogno di generare una password:
< /dev/urandom tr -dc A-Za-z0-9_ | head -c10 ; echo
dove il numero 10 sta per la lunghezza della password generata.
c59RL5TrHs
Debian Gnu-Linux Opensource
Quello di usare GPG è un altro modo per cifrare documenti importanti, in alternativa ad encfs e mcrypt. Esistono dell’interfacce
grafiche per generare chiavi GPG. Per chi usa Gnome, seahorse, per chi usa Kde, kgpg. In questo caso utilizzo il terminale.
Per prima cosa bisogna generare la chiave con il comando :
gpg --gen-key
a questo punto rispondiamo alle domande che ci appaiono a video, ed inseriamo i nostri dati, come nome, email, ecc ecc,
scegliamo una password, ed incominciamo a muovere il mouse fino a che la password non è stata creata., non ci deve
apparire un messaggio di questo tipo:
Adesso siamo pronti a cifrare un file, utilizzando il nome che abbiamo scelto all’inizio della creazione della chiave.
Cifrare:
gpg -e -r edmond prova.txt
o in alternativa:
gpg --encrypt --recipient edmond prova.txt
Decifrare:
gpg --output prova.txt --decrypt prova.txt.gpg
oppure:
gpg --output prova.txt --symmetric prova.txt.gpg
Per ulteriori informazioni, man gpg
Questo è un piccolo trucchetto per cifrare velocemente un file. Come ho avuto modo di scrivere in passato per altri metodi
qua e qua,la sicurezza non è mai troppa, specialmente quando si scrivono su un file dei dati sensibili.
Quello che serve è Mcrypt:
# apt-get install mcrypt
quindi per cifrare un file usiamo questi comandi:
mcrypt -a blowfish nome_file
dove -a indica l’algoritmo di cifratura. Per la lista completa:
mcrypt --l
a questo punto sceglieremo una password che inseriremo due volte, e ci troveremo un file criptato con estensione .nc.
Adesso non rimane che distruggere l’originale:
shred -n 10 -u -z -v nome_file
per decifrare il file:
mdecrypt nome_file.nc
Tutto qua, per altre opzioni man mcrypt
Shorewall (Shoreline Firewall) è un firewall che si appoggia al sistema Netfilter (iptables/ipchains) del kernel Linux, per una più semplice gestione di avanzate configurazioni di rete. Prima di iniziare nell'installazione di shorewall, bisogna prima disinstallare eventualmente l'altro firewall. Esempio: firestarter:
# apt-get remove --purge firestarter
# apt-get install shorewall shorewall-common shorewall-shell shorewall-doc dash
1)
Partiamo con la configurazione del file interfaces:
#
gedit /etc/shorewall/interfaces
all'interno copiamo questo:
# Shorewall version 3.0 – Sample Interfaces File for one-interface configuration.
#
# /etc/shorewall/interfaces
#
# You must add an entry in this file for each network interface on your
# firewall system.
#
# Columns are:
#
# ZONE Zone for this interface. Must match the name of a
# zone defined in /etc/shorewall/zones. You may not
# list the firewall zone in this column.
#
# If the interface serves multiple zones that will be
# defined in the /etc/shorewall/hosts file, you should
# place "-" in this column.
#
# If there are multiple interfaces to the same zone,
# you must list them in separate entries:
#
# Example:
#
# loc eth1 –
# loc eth2 –
#
# INTERFACE Name of interface. Each interface may be listed only
# once in this file. You may NOT specify the name of
# an alias (e.g., eth0:0) here; see
# https://www.shorewall.net/FAQ.htm#faq18
#
# You may specify wildcards here. For example, if you
# want to make an entry that applies to all PPP
# interfaces, use 'ppp+'.
#
# There is no need to define the loopback interface (lo)
# in this file.
#
# BROADCAST The broadcast address for the subnetwork to which the
# interface belongs. For P-T-P interfaces, this
# column is left blank.If the interface has multiple
# addresses on multiple subnets then list the broadcast
# addresses as a comma-separated list.
#
# If you use the special value "detect", the firewall
# will detect the broadcast address for you. If you
# select this option, the interface must be up before
# the firewall is started, you must have iproute
# installed.
#
# If you don't want to give a value for this column but
# you want to enter a value in the OPTIONS column, enter
# "-" in this column.
#
# OPTIONS A comma-separated list of options including the
# following:
#
# dhcp – Specify this option when any of
# the following are true:
# 1. the interface gets its IP address
# via DHCP
# 2. the interface is used by
# a DHCP server running on the firewall
# 3. you have a static IP but are on a LAN
# segment with lots of Laptop DHCP
# clients.
# 4. the interface is a bridge with
# a DHCP server on one port and DHCP
# clients on another port.
#
# norfc1918 – This interface should not receive
# any packets whose source is in one
# of the ranges reserved by RFC 1918
# (i.e., private or "non-routable"
# addresses. If packet mangling or
# connection-tracking match is enabled in
# your kernel, packets whose destination
# addresses are reserved by RFC 1918 are
# also rejected.
#
# routefilter – turn on kernel route filtering for this
# interface (anti-spoofing measure). This
# option can also be enabled globally in
# the /etc/shorewall/shorewall.conf file.
#
# logmartians – turn on kernel martian logging (logging
# of packets with impossible source
# addresses. It is suggested that if you
# set routefilter on an interface that
# you also set logmartians. This option
# may also be enabled globally in the
# /etc/shorewall/shorewall.conf file.
#
# blacklist – Check packets arriving on this interface
# against the /etc/shorewall/blacklist
# file.
#
# maclist – Connection requests from this interface
# are compared against the contents of
# /etc/shorewall/maclist. If this option
# is specified, the interface must be
# an ethernet NIC and must be up before
# Shorewall is started.
#
# tcpflags – Packets arriving on this interface are
# checked for certain illegal combinations
# of TCP flags. Packets found to have
# such a combination of flags are handled
# according to the setting of
# TCP_FLAGS_DISPOSITION after having been
# logged according to the setting of
# TCP_FLAGS_LOG_LEVEL.
#
# proxyarp –
# Sets
# /proc/sys/net/ipv4/conf/<interface>/proxy_arp.
# Do NOT use this option if you are
# employing Proxy ARP through entries in
# /etc/shorewall/proxyarp. This option is
# intended soley for use with Proxy ARP
# sub-networking as described at:
#
#
# routeback – If specified, indicates that Shorewall
# should include rules that allow
# filtering traffic arriving on this
# interface back out that same interface.
#
# arp_filter – If specified, this interface will only
# respond to ARP who-has requests for IP
# addresses configured on the interface.
# If not specified, the interface can
# respond to ARP who-has requests for
# IP addresses on any of the firewall's
# interface. The interface must be up
# when Shorewall is started.
#
# arp_ignore[=<number>]
# – If specified, this interface will
# respond to arp requests based on the
# value of <number>.
#
# 1 – reply only if the target IP address
# is local address configured on the
# incoming interface
#
# 2 – reply only if the target IP address
# is local address configured on the
# incoming interface and both with the
# sender's IP address are part from same
# subnet on this interface
#
# 3 – do not reply for local addresses
# configured with scope host, only
# resolutions for global and link
# addresses are replied
#
# 4-7 – reserved
#
# 8 – do not reply for all local
# addresses
#
# If no <number> is given then the value
# 1 is assumed
#
# WARNING — DO NOT SPECIFY arp_ignore
# FOR ANY INTERFACE INVOLVED IN PROXY ARP.
#
# nosmurfs – Filter packets for smurfs
# (packets with a broadcast
# address as the source).
#
# Smurfs will be optionally logged based
# on the setting of SMURF_LOG_LEVEL in
# shorewall.conf. After logging, the
# packets are dropped.
#
# detectnets – Automatically taylors the zone named
# in the ZONE column to include only those
# hosts routed through the interface.
#
# upnp – Incoming requests from this interface
# may be remapped via UPNP (upnpd).
#
# WARNING: DO NOT SET THE detectnets OPTION ON YOUR
# INTERNET INTERFACE.
#
# The order in which you list the options is not
# significant but the list should have no embedded white
# space.
#
# Example 1: Suppose you have eth0 connected to a DSL modem and
# eth1 connected to your local network and that your
# local subnet is 192.168.1.0/24. The interface gets
# it's IP address via DHCP from subnet
# 206.191.149.192/27. You have a DMZ with subnet
# 192.168.2.0/24 using eth2.
#
# Your entries for this setup would look like:
#
# net eth0 206.191.149.223 dhcp
# local eth1 192.168.1.255
# dmz eth2 192.168.2.255
#
# Example 2: The same configuration without specifying broadcast
# addresses is:
#
# net eth0 detect dhcp
# loc eth1 detect
# dmz eth2 detect
#
# Example 3: You have a simple dial-in system with no ethernet
# connections.
#
# net ppp0 –
#
# For additional information, see
#
#
###############################################################################
#ZONE INTERFACE BROADCAST OPTIONS
net eth0 detect routefilter,dhcp,tcpflags,logmartians,nosmurfs
#LAST LINE — ADD YOUR ENTRIES BEFORE THIS ONE — DO NOT REMOVE
Attenzione:Se al posto del router abbiamo un modem cambiare eth0 con ppp0. In ogni caso cercare di adattarlo alle nostre esigenze e configurazione.
2) Configurazione del file policy:
# gedit /etc/shorewall/policy
all'interno copiamo questo:
# Shorewall version 3.0 – Sample Policy File for one-interface configuration.
#
# /etc/shorewall/policy
#
# THE ORDER OF ENTRIES IN THIS FILE IS IMPORTANT
#
# This file determines what to do with a new connection request if we
# don't get a match from the /etc/shorewall/rules file . For each
# source/destination pair, the file is processed in order until a
# match is found ("all" will match any client or server).
#
# INTRA-ZONE POLICIES ARE PRE-DEFINED
#
# For $FW and for all of the zoned defined in /etc/shorewall/zones,
# the POLICY for connections from the zone to itself is ACCEPT (with no
# logging or TCP connection rate limiting but may be overridden by an
# entry in this file. The overriding entry must be explicit (cannot use
# "all" in the SOURCE or DEST).
#
# Columns are:
#
# SOURCE Source zone. Must be the name of a zone defined
# in /etc/shorewall/zones, $FW or "all".
#
# DEST Destination zone. Must be the name of a zone defined
# in /etc/shorewall/zones, $FW or "all"
#
# POLICY Policy if no match from the rules file is found. Must
# be "ACCEPT", "DROP", "REJECT", "CONTINUE" or "NONE".
#
# ACCEPT – Accept the connection
# DROP – Ignore the connection request
# REJECT – For TCP, send RST. For all other,
# send "port unreachable" ICMP.
# QUEUE – Send the request to a user-space
# application using the QUEUE target.
# CONTINUE – Pass the connection request past
# any other rules that it might also
# match (where the source or
# destination zone in those rules is
# a superset of the SOURCE or DEST
# in this policy).
# NONE – Assume that there will never be any
# packets from this SOURCE
# to this DEST. Shorewall will not set
# up any infrastructure to handle such
# packets and you may not have any
# rules with this SOURCE and DEST in
# the /etc/shorewall/rules file. If
# such a packet _is_ received, the
# result is undefined. NONE may not be
# used if the SOURCE or DEST columns
# contain the firewall zone ($FW) or
# "all".
#
# If this column contains ACCEPT, DROP or REJECT and a
# corresponding common action is defined in
# /etc/shorewall/actions (or
# /usr/share/shorewall/actions.std) then that action
# will be invoked before the policy named in this column
# is enforced.
#
# LOG LEVEL If supplied, each connection handled under the default
# POLICY is logged at that level. If not supplied, no
# log message is generated. See syslog.conf(5) for a
# description of log levels.
#
# Beginning with Shorewall version 1.3.12, you may
# also specify ULOG (must be in upper case). This will
# log to the ULOG target and sent to a separate log
# through use of ulogd
# ).
#
# If you don't want to log but need to specify the
# following column, place "-" here.
#
# LIMIT:BURST If passed, specifies the maximum TCP connection rate
# and the size of an acceptable burst. If not specified,
# TCP connections are not limited.
#
# See for additional information.
#
###############################################################################
#SOURCE DEST POLICY LOG LEVEL LIMIT:BURST
$FW net ACCEPT
net all DROP info
# The FOLLOWING POLICY MUST BE LAST
all all REJECT info
#LAST LINE — ADD YOUR ENTRIES ABOVE THIS LINE — DO NOT REMOVE
3) Creazione del file di configurazione zones:
# gedit /etc/shorewall/zones
all'interno copiamo questo:
# Shorewall version 3.0 – Sample Zones File for one-interface configuration.
#
# /etc/shorewall/zones
#
# This file determines your network zones.
#
# Columns are:
#
# ZONE Short name of the zone (5 Characters or less in length).
# The names "all" and "none" are reserved and may not be
# used as zone names.
#
# Where a zone is nested in one or more other zones,
# you may follow the (sub)zone name by ":" and a
# comma-separated list of the parent zones. The parent
# zones must have been defined in earlier records in this
# file.
#
# Example:
#
# #ZONE TYPE OPTIONS
# a ipv4
# b ipv4
# c:a,b ipv4
#
# Currently, Shorewall uses this information only to reorder the
# zone list so that parent zones appear after their subzones in
# the list. In the future, Shorewall may make more extensive use
# of that information.
#
# TYPE ipv4 – This is the standard Shorewall zone type and is the
# default if you leave this column empty or if you enter
# "-" in the column. Communication with some zone hosts
# may be encrypted. Encrypted hosts are designated using
# the 'ipsec'option in /etc/shorewall/hosts.
# ipsec – Communication with all zone hosts is encrypted
# Your kernel and iptables must include policy
# match support.
# firewall
# – Designates the firewall itself. You must have
# exactly one 'firewall' zone. No options are
# permitted with a 'firewall' zone. The name that you
# enter in the ZONE column will be stored in the shell
# variable $FW which you may use in other configuration
# files to designate the firewall zone.
#
# OPTIONS, A comma-separated list of options as follows:
# IN OPTIONS,
# OUT OPTIONS reqid=<number> where <number> is specified
# using setkey(8) using the 'unique:<number>
# option for the SPD level.
#
# spi=<number> where <number> is the SPI of
# the SA used to encrypt/decrypt packets.
#
# proto=ah|esp|ipcomp
#
# mss=<number> (sets the MSS field in TCP packets)
#
# mode=transport|tunnel
#
# tunnel-src=<address>[/<mask>] (only
# available with mode=tunnel)
#
# tunnel-dst=<address>[/<mask>] (only
# available with mode=tunnel)
#
# strict Means that packets must match all rules.
#
# next Separates rules; can only be used with
# strict..
#
# Example:
# mode=transport,reqid=44
#
# The options in the OPTIONS column are applied to both incoming
# and outgoing traffic. The IN OPTIONS are applied to incoming
# traffic (in addition to OPTIONS) and the OUT OPTIONS are
# applied to outgoing traffic.
#
# If you wish to leave a column empty but need to make an entry
# in a following column, use "-".
#
# THE ORDER OF THE ENTRIES IN THIS FILE IS IMPORTANT IF YOU HAVE NESTED OR
# OVERLAPPING ZONES DEFINED THROUGH /etc/shorewall/hosts.
#
# See
###############################################################################
#ZONE TYPE OPTIONS IN OUT
# OPTIONS OPTIONS
fw firewall
net ipv4
#LAST LINE – ADD YOUR ENTRIES ABOVE THIS ONE – DO NOT REMOVE
4) Configurazione del file rules.
# gedit /etc/shorewall/rules
all'interno copiamo questo:
Esiste un altro modo oltre a questo per proteggere i nostri dati sensibili, e cioè utilizzare in coppia encfs e fuse per criptare una directory. Quindi installiamo:
# apt-get install encfs fuse-utils
carichiamo il modulo:
#modprobe fuse
per farlo caricare all'avvio del sistema:
#sh -c "echo fuse >> /etc/modules"
aggiungiamo il nostro utente al gruppo fuse
#adduser Utente fuse
verifichiamo:
DebianBox:/home/edmond# grep "fuse" "/etc/group"
fuse:x:118:edmond
Quindi iniziamo a creare la cartella da criptare, che chiamerò secret:
mkdir /home/Utente/.secret
mkdir /home/Utente/secret
a questo punto usiamo encfs per il montaggio:
encfs /home/Utente/.secret /home/Utente/secret
digitiamo p oppure x e scegliamo la password per encfs.
Ipotizzando di avere un documento importantissimo da nascondere:
cp topsecret.txt /home/Utente/secret
e poi smontiamo:
fusermount -u /home/utente/secret
a questo punto il documento sarà al sicuro, infatti al comando
ls /home/Utente/secret
non apparirà nulla. Mentre se noi rimontiamo ci apparirà 🙂
edmond@DebianBox:~$ encfs /home/edmond/.secret /home/edmond/secret
Password di EncFS:
edmond@DebianBox:~$ ls /home/edmond/secret
topsecret.txt
La sicurezza non è mai troppa 😉
Vnstat è un ottimo tool open source per monitorare la propria rete. Non è uno sniffer, si occupa soltanto di memorizzare in un file db, le informazioni presenti in /proc. Si può usare in maniera testuale e non solo, senza i privilegi di root. Per installarlo basta un:
apt-get install vnstat libgd2-xpm
Per avere un interfaccia grafica:
wget https://www.sqweek.com/sqweek/files/vnstat_php_frontend-1.4.tar.gz
lo scompattiamo in /var/www
cd /var/www
tar xvzf vnstat_php_frontend-1.4.tar.gz
Per comodità cambiamo il nome
mv vnstat_php_frontend-1.4 vnstat
A questo punto incominciamo a creare il db, a secondo dal numero di interfaccia e dal nome:
vnstat -u -i eth0
oppure
vnstat -u -i eth0 && vnstat -u -i eth1
Dopo 5 minuti dando da terminale vnstat, iniziamo a vedere le statistiche. Per vederle in maniera più comoda:
https://localhost/vnstat/
Per scaricare la posta da Gmail io uso uno script per me utilissimo, dato che non sono interessato ad usare client di posta, ma al massimo i plugins per iceweasel-firefox. La particolarità di questo script è che una volta controllato il numero di nuove mail ricevute, si accende il led num lock (oppure caps lock o skroll lock) e lampeggia tante volte, quanto sono le email ricevute. L’unica dipendenza che serve è blinkd, presente nei repository.
apt-get install blinkd
Questo lo script:
#!/bin/bash
cd /tmp
username=Vostro_Username_Google_Senza_@gmail.com
password=$( zenity --entry --title="Password Gmail" --text="Inserisci password :" --hide-text )
if [[ -z $password ]]
then exit
fi
if [[ $password == "0" ]]
then password=$( zenity --entry --title="Password Gmail" --text="Inserisci password :" )
fi
sleep 15
function get_rss
{
wget -q -O .gmail_rss https://$username:$password@mail.google.com/mail/feed/atom --no-check-certificate
fc=$( cat .gmail_rss | grep "fullcount" | grep -o [1-9] )
}
while true
do
get_rss
if ! [[ fc == "0" ]]
then
until [[ $fc == "" ]]
do
blink -n -r $fc
get_rss
sleep 15
done
blink
fi
sleep 5m
done
rm -f .gmail_rss
chmod +x nome_script
Naturalmente per visualizzare il file .gmail_rss in /tmp bisogna visualizzare i file nascosti.
Lo script verifica la presenza di nuove mails ogni 10 minuti, per cambiare basta modificare "sleep 10m"
Il led che lampeggia è il num lock, per modificarlo basta sostituire blink -n -r $fc con blink -c -r $fc e si passa al capslock.
Queste le altre opzioni:
-c, –capslockled use Caps-Lock LED
-h, –help display this help and exit
-m s, –machine=s let keyboard of machine s blink
-n, –numlockled use Num-Lock LED
-r n, –rate=n set blink rate to n
-s, –scrolllockled use Scroll-Lock LED
-t n, –tcp-port=n use tcp port n
-v, –version output version information and exit
Per fermare o far partire i demoni /etc/init.d/blinkd stop-start-restart.
Per altro man blinkd.
Una delle difficoltà che s’incontrano nel passare da Windows a Gnu-Linux è la paura di non avere programmi a cui si è abituati o almeno equivalenti. Questa non è altro che una leggenda metropolitana, portata avanti da chi ha il monopolio assoluto e vorrebbe la morte dell’opensource. Certo su un professionista che per lavoro usa Photoshop piuttosto che Gimp, non c’è nulla da dire, ma tutti gli altri che usano Photoshop per correggere le proprie fotografie o gli occhi rossi, mi fanno soltanto ridere, e mi fanno pensare…. che se avessero dovuto comprarlo, col cazzo che lo avrebbero usato. Il software si paga, dato che c’è gente dietro che ci lavora, oppure bisognerebbe affidarsi all’opensource che di programmi ne ha tanti, non dimenticandosi che free non significa gratis, poiche anche in questo mondo vi sono programmi professionali a pagamento. Sotto alcuni esempi tratti da linuxalt.
3D Home Architect
Sweet Home 3D ( https://sweethome3d.sourceforge.net/index.html ) |
3D Studio Max
K-3D ( https://www.k-3d.org/ ) |
Wings 3D ( https://www.wings3d.com/ ) |
Art of Illusion ( https://www.artofillusion.org/ ) |
Blender ( https://www.blender.org/ ) |
ACDSee
KuickShow ( https://kuickshow.sourceforge.net/ ) |
ShowImg ( ) |
Gwenview ( https://gwenview.sourceforge.net/ ) |
GQview ( https://gqview.sourceforge.net/ ) |
Eye of GNOME ( https://www.gnome.org/projects/eog/ ) |
Adobe Acrobat Reader
okular ( ) |
Xpdf ( https://www.foolabs.com/xpdf/ ) |
Evince ( https://www.gnome.org/projects/evince/ ) |
ePDFView ( ) |
KPDF ( https://kpdf.kde.org/ ) |
Adobe Audition
Audacity ( https://audacity.sourceforge.net/ ) |
Adobe Illustrator
Skencil ( https://www.skencil.org/ ) |
Inkscape ( https://www.inkscape.org/ ) |
Karbon14 ( https://www.koffice.org/karbon/ ) |
Xara Xtreme for Linux ( https://www.xaraxtreme.org/ ) |
Adobe PageMaker
Scribus ( https://www.scribus.net/ ) |
Adobe PhotoAlbum
F-Spot ( https://f-spot.org/Main_Page ) |
KPhotoAlbum ( https://www.kphotoalbum.org/ ) |
digiKam ( https://www.digikam.org/ ) |
Adobe Photoshop
CinePaint ( https://www.cinepaint.org/ ) |
Krita ( https://www.koffice.org/krita/ ) |
GIMP ( https://www.gimp.org/ ) |
Adobe Premier
PiTiVi ( https://www.pitivi.org/wiki/Main_Page ) |
LiVES ( https://lives.sourceforge.net/ ) |
Kino ( https://www.kinodv.org/ ) |
Cinelerra ( ) |
kdenlive ( https://kdenlive.sourceforge.net/ ) |
Jahshaka ( ) |
Ant Movie Catalog
Moviefly ( https://savannah.nongnu.org/projects/lmc/ ) |
AOL Instant Messenger (AIM)
Kopete ( https://kopete.kde.org/ ) |
Pidgin ( https://pidgin.im ) |
APC PowerChute
Network UPS Tools ( https://www.networkupstools.org/ ) |
Apcupsd ( https://www.apcupsd.com/ ) |
PowerD ( https://power.sourceforge.net/ ) |
CDex
Sound Juicer ( ) |
Rubyripper ( https://wiki.hydrogenaudio.org/index.php?title=Rubyripper ) |
ripperX ( https://ripperx.sourceforge.net/ ) |
Grip ( ) |
KAudioCreator ( ) |
Collectorz
aviManager ( https://avimanager.sourceforge.net/ ) |
GCstar ( https://www.gcstar.org/ ) |
Tellico ( https://periapsis.org/tellico/ ) |
Alexandria ( https://alexandria.rubyforge.org/ ) |
Griffith ( ) |
vMovieDB ( https://vmoviedb.sourceforge.net/ ) |
Katalog ( ) |
Dreamweaver
Quanta Plus ( ) |
Geany ( https://geany.uvena.de ) |
Nvu ( ) |
Screem ( https://www.screem.org/ ) |
KompoZer ( https://www.kompozer.net/ ) |
Bluefish ( https://bluefish.openoffice.nl/index.html ) |
DVDShrink
k9copy ( https://k9copy.sourceforge.net/ ) |
OGMRip ( https://ogmrip.sourceforge.net/ ) |
Thoggen ( https://thoggen.net/ ) |
xdvdshrink ( https://dvdshrink.sourceforge.net/ ) |
DVD Rip-O-Matic ( ) |
qVamps ( https://vamps.sourceforge.net/ ) |
dvd::rip ( https://www.exit1.org/dvdrip/ ) |
AcidRip ( ) |
Everest
HardInfo ( ) |
Finale
Lilypond ( https://www.lilypond.org ) |
Denemo ( https://denemo.sourceforge.net/index.html ) |
Rosegarden ( https://www.rosegardenmusic.com/ ) |
NoteEdit ( ) |
Brahms ( https://brahms.sourceforge.net/ ) |
Flash
F4L ( https://f4l.sourceforge.net/ ) |
Fontographer
FontForge ( https://fontforge.sourceforge.net/ ) |
Forte Agent
Pan ( https://pan.rebelbase.com/ ) |
FruityLoops
LMMS ( https://lmms.sourceforge.net/ ) |
Hydrogen ( https://www.hydrogen-music.org/ ) |
Google Desktop Search
Google Desktop ( https://desktop.google.com/linux/index.html ) |
Beagle ( https://beagle-project.org/ ) |
Guitar Pro
TuxGuitar ( https://www.tuxguitar.com.ar/home.html ) |
DGuitar ( https://sourceforge.net/projects/dguitar/ ) |
kguitar ( https://sourceforge.net/projects/kguitar/ ) |
iTunes
Banshee ( ) |
aTunes ( https://www.atunes.org/ ) |
Quod Libet ( https://www.sacredchao.net/quodlibet ) |
SongBird ( https://www.songbirdnest.com ) |
Exaile ( https://www.exaile.org/ ) |
Amarok ( https://amarok.kde.org/ ) |
Listen ( https://listengnome.free.fr/ ) |
Rhythmbox ( https://www.gnome.org/projects/rhythmbox/ ) |
gtkpod ( https://www.gtkpod.org/ ) |
Legacy Family Tree
GRAMPS ( https://gramps-project.org/ ) |
LimeWire
FrostWire ( https://www.frostwire.com/ ) |
Meal Master
krecipe ( https://krecipes.sourceforge.net/ ) |
Gourmet Recipe Manager ( https://grecipe-manager.sourceforge.net/ ) |
Microsoft Access
Kexi ( https://www.koffice.org/kexi/ ) |
knoda ( https://www.knoda.org ) |
GNOME-DB ( https://www.gnome-db.org/ ) |
Microsoft Excel
KSpread ( ) |
Open Calc ( https://www.openoffice.org/product/calc.html ) |
Gnumeric ( https://www.gnome.org/projects/gnumeric/ ) |
Microsoft Frontpage
Quanta Plus ( ) |
Nvu ( ) |
KompoZer ( https://www.kompozer.net/ ) |
Bluefish ( https://bluefish.openoffice.nl/index.html ) |
Microsoft HyperTerminal
minicom ( https://alioth.debian.org/projects/minicom/ ) |
GtkTerm ( https://freshmeat.net/projects/gtkterm/ ) |
Microsoft Internet Explorer
Epiphany ( https://www.gnome.org/projects/epiphany/ ) |
Opera ( https://www.opera.com/download/ ) |
Firefox ( https://www.mozilla.com/firefox/ ) |
Konqueror ( https://www.konqueror.org/ ) |
Microsoft Media Center
XBMC Media Center ( https://xbmc.org/ ) |
Microsoft Money
KMyMoney ( https://kmymoney2.sourceforge.net/ ) |
GNUcash ( https://www.gnucash.org/ ) |
Gnofin ( https://gnofin.sourceforge.net/ ) |
Grisbi ( https://www.grisbi.org/ ) |
Microsoft Office
GNOME Office ( https://www.gnome.org/gnome-office/ ) |
KOffice ( https://www.koffice.org/ ) |
OpenOffice ( https://www.openoffice.org/ ) |
Microsoft OneNote
BasKet ( https://basket.kde.org/ ) |
Microsoft Outlook (Express)
Thunderbird ( https://www.mozilla.com/thunderbird/ ) |
Evolution ( https://www.gnome.org/projects/evolution/ ) |
Microsoft Powerpoint
Open Office Impress ( https://www.openoffice.org/product/impress.html ) |
KPresenter ( ) |
Microsoft Project
KPlato ( ) |
OpenProj ( ) |
GanttProject ( https://ganttproject.sourceforge.net/ ) |
Planner ( https://live.gnome.org/Planner ) |
TaskJuggler ( https://www.taskjuggler.org/ ) |
Microsoft Visio
Dia ( https://www.gnome.org/projects/dia/ ) |
Kivio ( ) |
Microsoft Windows Media Center
Freevo ( https://freevo.sourceforge.net/ ) |
Elisa Media Center ( ) |
MythTV ( https://www.mythtv.org ) |
LinuxMCE ( https://www.linuxmce.com/ ) |
Microsoft Word
Open Office Writer ( https://www.openoffice.org/product/writer.html ) |
AbiWord ( https://www.abisource.com/ ) |
Kword ( ) |
mIRC
Konversation ( https://konversation.kde.org/ ) |
KVIrc ( https://www.kvirc.net/ ) |
BitchX ( https://www.bitchx.org/ ) |
Xchat ( https://www.xchat.org/ ) |
ChatZilla! ( https://chatzilla.hacksrus.com/ ) |
irssi ( https://www.irssi.org/ ) |
Pidgin ( https://pidgin.im ) |
Mp3tag
Kid3 ( https://kid3.sourceforge.net/ ) |
Pinkytagger ( https://pinkytagger.sourceforge.net/ ) |
EasyTAG ( https://easytag.sourceforge.net/ ) |
Cowbell ( https://more-cowbell.org/ ) |
Audio Tag Tool ( https://pwp.netcabo.pt/paol/tagtool/ ) |
MSN messenger
Mercury Messenger ( https://www.mercury.to/ ) |
Kopete ( https://kopete.kde.org/ ) |
aMSN ( https://amsn-project.net/ ) |
Pidgin ( https://pidgin.im ) |
Mudbox
SharpConstruct ( ) |
Nero Burning Rom
X-CD-Roast ( https://www.xcdroast.org/ ) |
Brasero ( https://perso.orange.fr/bonfire/index.htm ) |
GnomeBaker ( https://gnomebaker.sourceforge.net/ ) |
Graveman ( https://graveman.tuxfamily.org/ ) |
K3b ( https://www.k3b.org/ ) |
NetMeeting
Ekiga ( ) |
NetStumbler
Kismet ( https://www.kismetwireless.net/ ) |
SWScanner ( https://www.swscanner.org/ ) |
NewzCrawler
RSSOwl ( https://www.rssowl.org/ ) |
L iferea ( https://liferea.sourceforge.net/ ) |
BasKet ( https://basket.kde.org/ ) |
Akregator ( https://akregator.kde.org/ ) |
Blam ( ) |
Straw ( https://www.gnome.org/projects/straw/ ) |
Notepad
leafpad ( https://tarot.freeshell.org/leafpad/ ) |
NEdit ( https://www.nedit.org/ ) |
jEdit ( https://www.jedit.org/ ) |
Kate ( https://kate-editor.org/ ) |
gedit ( https://www.gnome.org/projects/gedit/ ) |
Scribes ( https://scribes.sourceforge.net/ ) |
tpad ( https://tclpad.sourceforge.net/ ) |
OrangeCD Catalog
GWhere ( https://www.gwhere.org ) |
Origin
SciGraphica ( https://scigraphica.sourceforge.net/ ) |
Partition Magic
Partimage ( https://www.partimage.org/Main_Page ) |
GParted ( https://gparted.sourceforge.net/ ) |
QtParted ( https://qtparted.sourceforge.net ) |
Picasa
F-Spot ( https://f-spot.org/Main_Page ) |
KPhotoAlbum ( https://www.kphotoalbum.org/ ) |
digiKam ( https://www.digikam.org/ ) |
Pro Tools
Ardour ( https://www.ardour.org ) |
Quicken
KMyMoney ( https://kmymoney2.sourceforge.net/ ) |
GNUcash ( https://www.gnucash.org/ ) |
Gnofin ( https://gnofin.sourceforge.net/ ) |
Grisbi ( https://www.grisbi.org/ ) |
SoulSeek
Nicotine ( ) |
Nicotine-Plus ( https://nicotine-plus.sourceforge.net/ ) |
SoundForge
ReZound ( https://rezound.sourceforge.net/ ) |
TexnicCenter
Total Commander
GNOME Commander ( https://www.nongnu.org/gcmd/ ) |
xfe ( https://roland65.free.fr/xfe/ ) |
Tux Commander ( https://tuxcmd.sourceforge.net/ ) |
Midnight Commander ( https://www.ibiblio.org/mc/ ) |
Krusader ( https://krusader.sourceforge.net/ ) |
Traktor DJ
Mixxx ( https://mixxx.sourceforge.net/ ) |
terminatorX ( https://www.terminatorx.org/ ) |
Videora
thin liquid film ( ) |
Winamp
Audacious ( ) |
Amarok ( https://amarok.kde.org/ ) |
XMMS ( https://www.xmms.org/ ) |
Windows Media Player
KPlayer ( https://kplayer.sourceforge.net/ ) |
VideoLAN ( https://www.videolan.org/ ) |
xine ( https://xinehq.de/ ) |
mplayer ( https://www.mplayerhq.hu/design7/news.html ) |
Windows Movie Maker
PiTiVi ( https://www.pitivi.org/wiki/Main_Page ) |
LiVES ( https://lives.sourceforge.net/ ) |
Open Movie Editor ( https://openmovieeditor.sourceforge.net/HomePage ) |
Avidemux ( https://fixounet.free.fr/avidemux/ ) |
Cinelerra ( ) |
kdenlive ( https://kdenlive.sourceforge.net/ ) |
WinIso
ISO Master ( https://littlesvr.ca/isomaster/ ) |
KIso ( https://kiso.sourceforge.net/ ) |
WinMerge
KDiff3 ( https://kdiff3.sourceforge.net/ ) |
Meld ( https://meld.sourceforge.net/ ) |
xxdiff ( https://furius.ca/xxdiff/ ) |
Kile ( https://kile.sourceforge.net/ ) |
WinTV
XdTV ( https://xawdecode.sourceforge.net/ ) |
tvtime ( https://tvtime.sourceforge.net/ ) |
WS_FTP
gFTP ( https://gftp.seul.org/ ) |
FireFTP ( https://fireftp.mozdev.org/ ) |
Zbrush
SharpConstruct ( ) |
ZoneAlarm
Guarddog ( https://www.simonzone.com/software/guarddog/ ) |
Firestarter ( https://www.fs-security.com/ ) |
Per cambiare il nostro MAC address non bisogna fare altro che eseguire 3 semplici passaggi.
Per prima cosa bisogna ricordarsi che i numeri e le lettere ammessi sono: 1 2 3 4 5 6 7 8 9 0 a b c d e f
Dopodiche ci si costruisce a piacere un MAC address tipo questo 1a:2b:3c:4d:5e:6f
Quindi da root
ifconfig eth0 down
ifconfig eth0 hw ether 1a:2b:3c:4d:5e:6f
ifconfig etho up
Per controllare il nuovo MAC address
ifconfig
Super Grub Disk come si sa è utilissimo, è uno di quei tool che dovrebbe essere sempre ha portata di mano, poichè prima o poi capita di doverlo usare, evitando così la procedura manuale. E' disponibile come immagine iso, floppy ed usb. Può essere molto comodo tenerlo in una chiavetta usb per diversi motivi, in primis per comodità, dato che ha differenza dei cd, che ognuno di noi possiede in gran numero, e li tiene infognati in ogni dove, di penne usb al max se ne possiede 2, 3, 4 , quindi sono sempre facili da trovare. Un altro buon motivo, è dato dal fatto che, installando SGD su una penna usb, questa può essere usata lo stesso per conservarne i dati, basta non toccare l'unica cartella di nome boot, che tra l'altro è di 1mb. Si puo scaricare da questa questa pagina anche in italiano. L'installazione è semplice, e si esegue in pochi passi.
Una volta scaricato super_grub_disk_italiano_usb_0.9673.tar.bz2, scompattarlo, e la cartella boot, copiarla sulla penna:
cp -r boot /media/disk
dove disk è la nosta penna. Smontare la penna, ed assicurarsi che ciò sia avvenuto per davvero, altrimenti non funziona.
umount /dev/sdg1 nel mio caso
Da root digitare
grub
adesso vediamo come grub identifica la nostra penna. Aiutandoci con il tasto tab.
grub> geometry (hd
grub> geometry (hd Possible disks are: hd0 hd1 hd2
grub> geometry (hd2)
drive 0x82: C/H/S = 31/255/63, The number of sectors = 501759, /dev/sdg Partition num: 0, Filesystem type is fat, partition type 0x6
Quindi si nota che il dispositivo è hd2 ed è identificato anche come /dev/sdg. Quindi:
device (hd2) /dev/sdg
root (hd2,0)
setup (hd2)
quit
exit
sync
Riavviamo e ci assicuriamo che il pc sia settato per fare il boot da usb.