Category Archives: security

Video – TeamViewer remote Desktop Connection by xComptoturialx

Bookmark this page!

TeamViewer: Control remoto para Linux y Android

Ante de nada, quiero disculparme con todos los seguidores de Galigio por la falta de Post en Castellano, espero poder volver a contribuir con mi granito de arena y compartir mis ideas. Bueno volviendo a lo nuestro, os quiero hablar del programa TeamViewer.

Hace tiempo estuve mirando para poder efectuar el aceso remoto entre mi PC y el PC de un amigo, ambos con Linux; desafortunadamente hay que reconocer que es posible pero no de una forma muy rápida y sencilla, el programa LogmeIn que era una de los disponible funcionaba solo con Windows y MAC también. Afortunadamente hace unos meses estuve investigando otra vez y pude averiguar que TeamViewer está disponible para Linux, Mac, Windows y también para Smartphones. La versión para Linux está disponible en diferentes paquetes: deb 32/64 bit, rpm 32/64 bits y también tar.gz; para Smartphone está disponible para Android, iPhone e iPad. Yo que uso Kubuntu he instalado la versión deb y también la he instalado en mi Smartphone Android.

Tengo que reconocer que funciona muy muy bien, desde mi teléfono puedo entrar en el escritorio de mi PC sin ningún problema y funciona muy rápido sin quedarse colgado. También he hecho una prueba entrando en el portátil de mi hermana mientra ella estaba en su casa y yo en la mía, todo muy bien, he podido efectuar una asistencia remota en su portátil e ayudarla con algún problemita que tenia. En fin, puede que no os cuente nada nuevo pero os aconsejo de probar esta aplicación porque seguro que siempre pude venir bien para diferentes usos. os dejo el enlace a su pagina Web. Bookmark this page!

The dawn of Morpheus’ era. Google’s supremacy and your privacy: short considerations about Google+

In the last days, I tested Google+ and it really works! It’s fast, well-organized with a really intuitive graphical interface and, for the “first time”, I was able to start conversations with different groups without worrying to say something inappropriate to the wrong person. The problem is that it wasn’t the very “first time” I had the possibility to share a conversation because, for some months, I was one of the testers of Diaspora, an open-source project, which was financed through kickstarter.com

Diaspora is a start-up project in its alpha release and the most interesting supported features are the https streaming and the possibility to create separate conversations with preselected groups. During the past months Diaspora has not  grown fast but this kind of timeline is not unusual considering the number of developers involved, the financial capital used and all the different problems that a start-up has to solve during the first year of existence. The Diaspora’s real added value was the idea of a more secure social media through https and dedicated conversation shared between homogeneous groups of people.

On the contrary Google hasn’t had this kind of problems while developing a similar project, Google+. Anyway Google is so well structured and financially powerful that can reach the goals in a very short time if someone, at Mountain View, really believes on the future possibilities of a project. In few words, this is the natural dominance of a big player in an imperfect market where the start-up can be annihilated by a faster and richer competitor which is able to use more human resources and capitals.

I personally believe that Google, in such a way, has contaminated the natural software “diversity” growth and has too easily prevailed over the Diaspora’s guys. I am not talking about copyrights or trademarks which have often damaged the software development, I am talking about software evolution, the “natural” selection that allows small groups of people with better ideas to survive and prevail over the bigger companies. We cannot be sure that, after the completion of Diaspora, new valuable projects wouldn’t have springed from that team. Perhaps it’s time to critically ask ourselves if Google has become too big and too powerful over the web and if we need a new generation of laws or rules just to perimeter it (not to censure its works or split the company).

Back to Google+, I can strongly affirm that all the features I tested were well programmed and extremely intuitive to use. Moreover, Google+ integrates many other Google products (e.g. Picasa, YouTube, Voice, etc..) and you can share a lot of contents directly with the right people using the, now “famous”, Circles feature.

But at this point, we need another old -no software related- question mark. How many information about our lives are stored in Google servers? All the Google online software are successfully principally due to their high level of usability. None force you to use Google’s products, you are 100% free to decide but usually you have specific accounts to manage your photographs, favourite RSS, documents, phone directory, emails and now also your friends, family and more… All these information profile you and your personal attitudes better than ever. Using the right mathematical function, Google potentially has an accurate profile of you than no one else and sometime it is reasonable to believe that Google knows us better than we do.

In this prospective the “digital identification” card someone proposed some years ago to better regulate the web and check the people online activity, sounds prehistoric. The natural evolution of the net, connected to the lack of a real liberal regulation, has created a “nice” superpower company that potentially has the possibility to share our most intimate data with third parties influencing in a way or another our destinies. Can the privacy disclaimers we accept with each Google service protect our data in a bullet-proof way? Personally I have some little doubts!

On the other hand, during the last year we assisted to the dawn of more decentralized online services (www.yacy.net, www.faroo.com, www.majestic12.co.uk, etc..) and payment systems (www.bitcoin.org) which are able to guarantee a more efficient encrypted privacy. To  extremely simplify the concept it is possible to say that these new technologies represent a possible future horizon that will be developed in few years. Consequently, it is reasonable to predict that two parallel Internet will exist in the near future.

The first is the logical evolution of the web we know today with a more “efficient” control developed by Governments and specialised “agencies”. The second will be something near to what we watched in the Matrix saga. A semi-secret Internet, developed by unknown “experts” where the privacy will be one of the most valuable elements and where we will use a new generation of dynamic encryption software. If we consider that nowadays it is technically possible to build low-cost telecommunication satellites, the only residual barrier for the creation of this new web is represented by the cost of the vectors to bring them into the space. Waiting for a cheap orbital launcher, new technologies have been experimented to build alternative webs. The transmission of encrypted computer data through the radio frequencies is one of the most interesting projects. But this is another story also because we should consider the risks related to a second new encrypted Internet if not used in a proper way…

To conclude, let me say that Google’s people are the best but now, it is time they start thinking a little bit less about online software or visionary technologies and much more about the potential social and freedom risks of their work. There are not precise rules about these topics because just few politicians have a real knowledge about the “digital frontier” and for this reason they have the terrific possibility to regulate themselves in the best way and be really transparent. History rules, when there is not effectiveness regulation, there is the risk that, sooner or later, lobbies persuade politicians to law in a wrong way. If we think about what happened in the last thirty years we can focus our attention on specific tragic events which allowed Parliaments to overreact and chain our civil rights and our privacy in a way that has not roots in our democratic societies.

On the contrary, with new democratic and “illuminated” rules or self-reforms, honestly created by real experts, there will less needs for a parallel Internet and perhaps the dawn of Morpheus’ era will be postponed for a while. At the moment we can only hope that Google people are not became too old to consider that they could change their point of view. The current Google technological path is just one of the many they can develop. Now this path seems to be efficient and, of course, profitable but perhaps the near future needs something different and less dangerous for our privacy and civil rights… (to be continued, sooner or later…). AddThis

Terminate unresponsive programs on Ubuntu

Xkill is part of the X11 utilities pre-installed in Ubuntu and a tool for terminating misbehaving X clients or unresponsive programs. You can easily add a shortcut key to launch xkill with the steps below:
– Go to System > Preferences > Keyboard Shortcuts.
– Click the Add button to create a custom shortcut.
– Enter xkill to both the Name and Command boxes and click the Apply button.
– Click on Disabled at the xkill row in the Keyboard Shortcuts window (Disabled is then changed to New shortcut…).
– Press a new key combination, e.g. Ctrl+Alt+X (New shortcut… is then changed to Ctrl+Alt+X).
– Click the Close button.
Xkill is ready for use. Press the above key combination to turn the cursor to an X-sign, move the X-sign and drop it into a program interface to terminate the unresponsive program, or cancel the X-sign with a right-click. AddThis

Recovering root password under Linux with single user mode

It happens sometime that you can’t remember root password. On Linux, recovering root password can be done by booting Linux under a specific mode: single user mode.
This tutorial will show how to boot Linux in single user mode when using GRUB and finally how to change root password.
During normal usage, a Linux OS runs under runlevels between 2 and 5 which corresponds to various multi-user modes. Booting Linux under runlevel 1 will allow one to enter into a specific mode, single user mode. Under such a level, you directly get a root prompt. From there, changing root password is a piece of cake.
Some Linux distribution, such as Ubuntu for instance, offer a specific boot menu entry where it is stated “Recovery Mode” or “Single-User Mode“. If this is your case, selecting this menu entry will boot your machine into single user mode, you can carry on with the next part. If not, you might want to read this part.
Using GRUB, you can manually edit the proposed menu entry at boot time. To do so, when GRUB is presenting the menu list (you might need to press ESC first), follow those instructions:
– use the arrows to select the boot entry you want to modify.
– press e to edit the entry
– use the arrows to go to kernel line
– press e to edit this entry
– at the end of the line add the word: single
– press ESC to go back to the parent menu
– press b to boot this kernel
The kernel should be booting as usual (except for the graphical splash screen you might be used to), and you will finally get a root prompt (sh#).
Here we are, we have gained root access to the filesystem, let’s finally change the password.
As root, changing password does not ask for your old password, therefore running the command:
# passwd
will prompt you for your new password and will ask you to confirm it to make sure there is no typo.
That’s it, you can now reboot your box and gain root access again. AddThis mp3 link

System Recovery Tools: a possible cross-platform approach through open source and proprietary solutions

The following system recovery tools will be useful to you if you are facing problem of data loss or if your system is simply crashing. It is advisable to burn copies of these tools much before any disaster strikes.

Open Source and Free approach:

G4L aka Ghost for Linux is one of the system recovery tools that is mainly a cloning and hard disk and partition imaging tool. This tool is similar to “Norton Ghost”. The images created are compressed optionally and transferred to a FTP server instead of opting for cloning locally. Ideally, of the several tools described above it is advisable to use the most suitable tool for your needs. The tool that will be most useful during a crisis like a crash or server failure will be a better tool.

The Ultimate Boot CD is one of the system recovery tools which will be very helpful when you want to run CDRom-based diagnostic tools thereby consolidating as many diagnostic tools into one bootable CD as possible. Since you can now boot from USB memory devices a script you can run “Ultimate Boot CD” from USB memory stick and a script on the script on the CD will enable you to boot newer systems from your USB sticks. This is many steps ahead than many of the other recovery tools. Moreover it gives you the flexibility of booting your system with a USB memory stick.

Knoppix is one of the system recovery tools which is essentially a bootable CD with GNU/Linux software. It ensures automatic detection of hardware and supports a wide range of devices like sound cards, most of the graphic cards, USB and SCSI devices and other peripherals. It can be used as an educational CD, a Linux demo or for system recovery purposes. Alternatively it can be used as a commercial platform for software demos. There is no need to install anything on the hard-disk as the CD is capable of storing 2GB of software installed in it. Thus this tool is a truly multi-purpose recovery tool.

Proprietary solutions:

O&O Disk recovery: This software tool scans every portion of your hard-disk, digital camera or memory card for lost files. It is so effective and reliable that it is possible to reconstruct data even when files systems have been destroyed or formatted. More than 350 types of files like music formats, word documents, movie, graphics, Excel workbooks, photo and access databases can be recognized, reconstructed and restored.

SuperDuper is one of the system recovery tools makes recovery effortless as it creates a completely bootable backup effortlessly. The strengths of this software are that it is user-friendly, easy to use with a built-in scheduler that it makes backup automatically. Moreover it performs well independent of the processor that is both on Power PC Macs as well as Intel PCs. It is particularly useful when your software application with the latest update is not working or when your hard drive begins to make noise. It is also very handy when you want to restore a stable copy of your system though you do not want t lose your existing system files or cases like this. AddThis mp3 link

Some Linux security tips for Rootkit Hunter

If you run Rootkit Hunter and you haven’t modified your stock Red Hat configuration of the SSH service (sshd), chances are it will find that you allow root logins. Rootkit Hunter considers these as possible security risks. However, to fix this, you can simply login as root, fire up a text editor, and edit the file

/etc/ssh/sshd_config

Make the following changes:
You’ll find a commented line like this:
#Protocol 2,1
Uncomment it and change it to:
Protocol 2
This will disallow logins using the older versions of the protocol

Look for the commented line
#PermitRootLogin yes
Uncomment the line and change it so it reads:
PermitRootLogin no
This will configure sshd NOT to allow root logins.

After this, be sure to restart sshd (assuming you run the service in the first place so:
Service sshd restart

By the way Rootkit scanner is scanning tool to ensure you for about 99.9% you’re clean of nasty tools. This tool scans for rootkits, backdoors and local exploits.

AddThis mp3 link

Stay safe! Install Rootkit Hunter on Linux and FreeBSD

Rootkit Hunter is a Unix-primarily based scanning tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of vital files with known good ones in online database, looking for default directories (of rootkits), improper permissions, hidden records data, suspicious strings in kernel modules and particular tests for Linux or FreeBSD. Most instances rootkits are self-hiding toolkits utilized by blackhats, crackers and script kiddies, to keep away from the attention of the system admin. If you’re unsure  as to whether your system is compromised, you will get a second opinion from sources such as Linux-oriented forum. If your system is contaminated with a rootkit, cleaning it up will not be an option. Restoring can be not an option unless you might be expert, and have autonomous and an impartial means of verifying that the backup is clear, and does not include misconfigured or stale software. Never trust a potentially compromised machine! Basically a clean install of the OS is always advisable after backing up the system. AddThis mp3 link

BleachBit: a free, powerful software to increase your privacy on Ubuntu and Windows

Since the first release many thins has been changed on BleachBit. I perfectly remind its first version that I uninstalled because I didn’t feel comfortable with the possible disaster I could do on my Ubuntu computer. Now BleachBit is very different: more powerful and easy to use! This software can be used on Linux (in my test I used Ubuntu 10.04 LTS) and Windows. To install it on Ubuntu you have to use Synaptics ( System  —> Administration —> Synaptics) and search for bleachbit in the search bar. For the Windows installation please, download the .exe file and install it. After the installation on Ubuntu, open BleachBit going to Applications —> System Tools —> BleachBit. Now, you have a very understandable menu bar in the left side of your screen.  If you click on the main sub-menus you can automatically read some information about what every option will delete on tour PC. Moreover, if the delete options you choose are potentially dangerous, a pop up mini alert will inform you about the risks. We recommend to use the Preview option before bleaching your PS. In this way you can have a final picture of what you are doing and how many bytes are you deleting. On the preference menu you can decide to overwrite files to hide contents or to run BleachBit every time you start your computer. Last but not least, BleachBit supports many languages that you can select from Edit —> Preferences —> Languages. AddThis mp3 link