Saturday 21 June 2014

How to Dual-Booting With Windows 8 And Linux

Here are six ways to set up multi-booting with Windows 8 and Linux:

1. Install the Linux GRUB bootloader
-Install the Linux GRUB bootloader as the default boot object.

-The catch here is you need to have a UEFI-compatible Linux distribution (openSuSE, Fedora, Linux Mint and Ubuntu).

-When you install a UEFI-compatible Linux distribution and everything works well, you will get the GRUB boot menu after a reboot. You can then choose either Linux or Windows 8 to boot from it. 

2. Use the BIOS Boot Select Key
-There's a possibility that doing everything of the above still gets you nowhere, and you're still getting Windows rather than Linux after reboot.

-In that case you can use the BIOS Boot Selection option (activated by pressing a special key that varies between systems during the power-on or reboot process.) 

-Pressing the special key will interrupt the Windows boot process and you will get a list of available operating systems (Windows 8 and Linux).

3. Enable 'Legacy Boot'
-Some systems make it difficult to enable Legacy Boot. The option might be well hidden in the BIOS configuration, or require a BIOS password before they will let you change it. 

-Legacy Boot allows you to install more or less any Linux distribution, without worrying about UEFI compatbility.

4. Try a workaround
-There is a "next boot" option available, which specifices a one time boot configuration. 

-If it is set the system will try to boot that item first, and will also clear that setting so that on the next boot it goes back to using the default boot sequence list. 

-The next boot configuration can be set from Linux using efibootmgr -n XXXX, where XXXX is the item number from the boot list.

-Add the efibootmgr command to the Linux startup scripts. Every time you boot Linux, it would reset the value so that it would boot Linux again the following time.

5. Trick the default boot process
-Put the Linux shim.efi (or grubx64.efi) image where the Windows Boot Manager is normally located. This is a cleaver trick to trick the default boot process. 

6. Install a different Boot Manager 
-rEFInd has the advantage of being able to boot almost anything - Windows, Linux, MacOS. It automatically finds whatever might be on the disk and then presents you with a boot selection list. 

Source: ZDNet

Friday 20 June 2014

You Can Buy And Sell App Source Codes


Want to sell an app on Android or iOS? You don't always have to write your own source code

Here are 11 websites that will aid you in the transactions.

1. ChupaMobile
This is perhaps the top website for buying and selling of Android and iOS app source codes. It has a huge collection of games and apps and is very easy to navigate through. You can also sort the listings by frameworks.

2. Apptopia

This is amongst the best sources for buying completed apps. Moreover, you don't just purchase the source code, you purchase the entire app, which includes the intellectual property rights and others. 

3. CodeCanyon
If you have an Envato account then this website would be a good choice for you. They do not have a very huge collection yet, but being part of the Envato family makes payment processing etc. easier.

4. Bluecloud Solutions
This website is quite useful for anyone looking to start a business with the next app they buy. You of course do not want to buy something that's not up to the mark, so you will need to choose only the good ones. This website makes the choice for you and shows only the apps that have potential.

5. BinPress
This website hosts source code from open source projects on the internet, desktop PCs and for mobile devices. 

6. AppCoda
If you're looking to buy stuff only for iOS apps then this is the way to go. 

7. Sell My App
Although this website sells completed app source codes from the Android, iOS, BlackBerry and @ Windows apps, it is tilted towards iOS, with a bigger collection.

8. SellMyAppz.com
This website has a pretty large selection of apps for both Android and iOS operating systems.

9. CodeStore
Here you can purchase four types of app templates. These include comic book app template, a photo showcase app template, story book app template and coloring book app template.

10. AppSplit
This follows a practice similar to Ebay, but for app source codes. You have to bid on the app against others and the can win only if your bit is i

11. Sellfy
This is an ecommerce portal where you can setup your own shop and sell your apps, ebooks, software and other things.

10 Awesome Things You Can Do On Your Linux


Using Windows/Mac should not deter you from enjoying the finer things in life

Well, here are 10 such tricks only Linux can offer: 

1. Get malware free environment

-Rest assured your Linux-powered device will not be affected by viruses.

-Not every file found in the wild is executed in Linux.

-Does not allow auto-runs every time you plug a new disk.

2. Make upgrade without rebooting

-Every time you install software in Windows, it will ask you to reboot. However, with Linux you're saved the trouble!

3. You can also maintain the timestamp

-You can know when a file was last accessed with the help of 'touch' command.

-Prevents anyone from stealthily touching your files as it maintains a timestamp.

-Further, there is no limit in length for a filename.

4. You can search and install software easily

-Synaptic Package manager gives you access to most significant software packages from one source. Simply select your preference using drop down box to get the software that suits you best.

5. You can keep your system on for hundreds of hours and still have good processing speed

-Linux can clock several hours with multiple users using it and still runs at usual speed unlike Windows.

6. Move bootable drives between machines without re-installing them

-Each time you add RAM, Windows will always ask you to re-install. This is not the case with Linux.

7. Get software issues solved through forums

-If something goes wrong in Windows, you have to run to an expert to fix it. With Linux, you have discussion forums to help you achieve the same.

8. Get all your hardware supported

-Test all our hardware using live CD before installing the OS.

9. Choose your customised OS from hundreds of distributors

-Linux is just the engine and different operating systems are built around it. You can hand pick the one that suits your need.

10. Install Linux for “free” and keep your Windows

-You can install Linux in a separate drive and keep your Windows as well.

-Also you can run Windows applications on Linux platform using WINE.

Source: Silicon India

Monday 19 May 2014

Here Are The Top 8 Hacker Operating Systems

A complete hacker centric operating system, a dream come true for every ethical hacker out there.

 It's the era of ethical hacking as we speak. The fact that there are so many useful tools and resources available at your beck and call make hacking a sheer delight, and sometimes even a walk in the park. We have compiled here a list of 8 cool hacker centric operating systems you must give a try.


1.Bugtraq

Bugtraq is a distribution based on GNU/Linux aimed at digital forensics, penetration testing, Malware Laboratories, and GSM Forensics. This distribution has a huge range of penetration, forensic and laboratory tools. Bugtraq is available with XFCE, Gnome and KDE based on Ubuntu, Debian and OpenSuse. 

2.Parrot-sec Forensic OS

Parrot Security OS is an advanced operating system developed by Frozenbox Network and designed to perform security and penetration tests, do forensic analisys or act in anonimity. 

3.BackBox

BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatic systems analysis toolkit. BackBox desktop environment includes a minimal yet complete set of tools required for ethical hacking and security testing.

4.GnackTrack

GnackTrack is an open and free project to merge penetration testing tools and the linux Gnome desktop. It is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.

5.DEFT

DEFT is a Live CD built on top of Xubuntu with tools for computer forensics and incident response. It's a very light and fast live system created for the Computer Forensics specialists.

6.NodeZero Linux

NodeZero Linux is reliable, stable, and powerful. Based on the industry leading Ubuntu linux distribution, NodeZero Linux takes all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.

7.Pentoo

Pentoo is a security-focused livecd based on Gentoo. It's basically a gentoo install with lots of customised tools, customised kernel, and much more.

8.Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is preinstalled with numerous penetration-testing programs, including nmap, Wireshark, John the Ripper and Aircrack-ng. 

Wednesday 9 April 2014

Email Clients For Linux Users.



Email clients are applications that make it much easier to manage your email messages. Here are some open source options for email clients that are quite popular amongst Linux users.

1. Claws Mail
This is an email client that is based on GTK+ and features,

- Quick response
- Graceful, and sophisticated interface
- Easy configuration, intuitive operation
- Abundant features
- Extensibility
- Robustness and stability                                        



2. Thunderbird
Mozilla's free email application is perhaps the most popular amongst Linux users.

3. KMail
From the website: KMail is the email component of Kontact, the integrated personal information manager from KDE.

4. Balsa
Balsa is an e-mail client for GNOME, highly configurable and incorporating all the features you would expect in a robust mail client.

5. Sylpheed
This is a lightweight and easy-to-use email client that Linux users can try out.

6. Alpine
From the website: Alpine is a fast, easy to use email client that is suitable for both the inexperienced email user as well as for the most demanding of power users. Alpine is based on the Pine® Message System, which was also developed at the University of Washington. Alpine can be learned by exploration and the use of context-sensitive help. The user experience is highly customizable through the use of the Alpine Setup command.

7. Cone
From the website: Cone is a screen-oriented E-mail/News reader and writer. If you are reading this documentation from within Cone, you are actually reading the simplified HTML version of Cone's documentation that's formatted as a folder of E-mail messages. Each online tutorial chapter appears as a separate message. Use PgUp and PgDn to read each chapter. Press N and P to move to the next/previous chapter.

8. Pine
Pine stands for Program for Internet News and Email.

9. mutt
This is a text-based mail client that is based on the Unix operating system.

10. SquirrelMail
This is another email client that many Linux users love and use.


Wednesday 2 April 2014

Open Source Tools for Windows System Admin

As a System Admin for Windows, here are your gears of war Here are 10 admin tools that come in handy for the same.

1. Wireshark

This is a free software-based protocol analyser, which is a very useful tool for Windows administrators. Many say that it makes network traffic analysis easier by many degrees.

2. AMANDA


This is a Windows-based tool that stands for Advanced Maryland Automatic Network Disk Archiver. It allows the administrator to create a master backup server, which can support both Windows-powered servers and desktops.

3. MailArchiva


Email archiving is front and center in Exchange 2010, thanks to the increase in compliance regulation enforcement across the industry. But for those who are not yet using Exchange 2010, MailArchiva provides a worthwhile means for bringing compliance to Exchange 2000/2003 and other mail servers, such as Postfix, Sendmail, Qmail, iMail, and Lotus Notes.

4. Exchange 2010 RBAC Manager


Exchange 2010 RBAC Manager is a great tool for admins working with role-based access control and Exchange. RBAC Manager (aka RBAC Editor GUI) helps overcome the lack of a GUI tool to work with the new role-based administration side to Exchange, enabling admins to connect, whether or not you're a PowerShell master. The tool is written in C# and uses PowerShell behind the scenes to allow you to create and manage roles in your Exchange 2010 environment.

5. Core Configurator 2.0 for Server Core


This is a command-line tool for Windows Server 2002 and Windows Server 2008 R2. 

6. AutoSPInstaller for SharePoint 2010


This tool makes use of a number of different scripts in order to install SharePoint and implements database names that are untouched in all of this process.

7. OCS Inventory


This tool helps you to locate the devices that are connected to your network and hardware and software that has been installed on your computer. You have to instal the OCS client inventory agent on your systems.

8. UltraDefrag


This is a defragmentation tool for Windows-based computers. It is updated continuously to ensure improvements in the performance.

9. Nmap for Windows


Yes, this used to be a Linux-only platform at one point of time. But just like it was for Linux, Nmap for windows is a very useful and important security resource fr Windows computers.

10. Zenmap


This tool can be used for mapping a topology of devices that have been connected to your network. It works on Nmap and provides a graphical user interface for the comman-line tool.



Monday 31 March 2014

Tools For System And Network Admin


Are you a system administrator? If yes, then these tools will come in handy for you

System and Network Analysis: As an administrator, it is your job to monitor the system and network that you are presiding over. Analysis is an important part of being in the know of what's happening and when a particular action is required. That is where system and network analysis tools come in handy.

1. NTFS Permissions Explorer
2. Xirrus Wi-Fi Inspector
3. Whois
4. ShareEnum
5. PipeList
6. TcpView
7. The Dude
8. Microsoft Baseline Security Analyzer
9. WireShark
10. Look@LAN
11. RogueScanner
12. Capsa Free Network Analyzer
13. SuperScan
14. Blast
15. UDPFlood
16. IPplan
17. NetStumbler
18. PingPlotter
19. SolarWinds Free Permissions Analyzer for AD
20. Angry IP Scanner
21. FreePortMonitor
22. WirelessNetView
23. BluetoothView
24. Vision
25. Attacker
26. Total Network Monitor
27. IIS Logfile Analyser
28. ntop

System testing and troubleshooting: What's the next logical step after analysis your network? Of course, testing whether your analysis was right or wrong. To put it more clearly, as a system or network admin, it is one of your jobs to perform tests on your domain. These are the tools that let you do that.
29. Pinkie
30. VMWare Player
31. Oracle VirtualBox
32. ADInsight
33. Process Monitor
34. SpiceWorks Network Troubleshooting
35. RAMMap
36. Autoruns
37. LogFusion
38. Microsoft Log Parser
39. AppCrashView
40. RootKitRevealer

System and network management: These are tools that allow you to manage the network or system. In a way, they comprise of various tools that help an IT professional to manage a bunch of tasks or certain specific tasks.
41. Bitcricket IP Subnet Calculator
42. EMCO Remote Installer Starter
43. ManagePC
44. Pandora FMS
45. SNARE Audit and EventLog Management
46. OCS Inventory
47. Zenoss Core – Enterprise IT Monitoring
48. Unipress Free Help Desk
49. SysAidIT Free Help Desk
50. Cyberx Password Generator Pro

System and Network Management: These are tools that allow you to manage the network or system. In a way, they comprise of various tools that help an IT professional to manage a bunch of tasks or certain specific tasks.
51. KeePass Password Safe
52. TweakUAC
53. Microsoft Application Compatibility Toolkit
54. ExtraSpy Employee Monitor
55. NetWrix USB Blocker Freeware
56. FileZilla
57. Wake On Lan 2 .NET
58. Speccy
59. Active Directory Explorer (ADExplorer)
60. ADRestore

File and disk management: These are tools that allow you to perform various operations on your files. These include operations like de-duplication, copying, file comparison, merging, encryption, syncing, searching and renaming of files. These files can be invaluable additions to your arsenal as a system administrator.
61. Disk2vhd
62. Defraggler
63. PageDefrag
64. PsPad
65. MD5Summer
66. Universal Viewer
67. FreeCommander
68. Recuva
69. Steganos LockNote
70. Microsoft SyncToy
71. 7-Zip
72. PeaZip
73. Bacula
74. Areca Backup
75. DirSync Pro
76. Amanda Network Backup
77. WebSynchronizer
78. KGB Archiver
79. Iometer
80. Notepad++

Performance and availability monitoring: These tools allow you to monitor your system and network performance and monitor them for possible errors etc. They provide functions such as monitoring of memory utilisation, network utilisation, disk utilisation, CPU utilisation etc. In addition, you can also use the network monitoring tools in order to ensure that your network is performing at its optimal levels and is stable.
81. ManageEngine Free HyperV Performance Monitor
82. Nagios
83. ManageEngine Free Exchange Health Monitor
84. Kratos Exchange Monitor
85. ManageEngine Free Windows Health Monitor
86. ManageEngine Free Ping Tool
87. ManageEngine Free SQL Health Monitor Tool
88. ManageEngine Free VM Configuration Tool
89. Kratos Network Device Monitor
90. IxChariot QCheck
91. EasyNetMonitor

Remote management: As a system or network admin, you will be dealing with a lot of remote connections and clients. In order to manage this task efficiently, you need tools like the ones mentioned below. You can use them to remotely administer clients and servers, manage remote desktop sessions and various other functions.
92. Remote Desktop Manager
93. TightVNC
94. Microsoft RDCMan
95. Terminals
96. PsFile

All-in-one toolkits: Sometimes you do not want to use different tools for different purposes. You want tools that can manage multiple functionalities by themselves so that you don't have to switch over to a new one whenever your attention is needed in a new direction. These are all-in-one kits that fill up some of the gaps that exist in this respect.
97. Net Tools 5.0
98. ManageEngine Free Windows Tools 2
99. Axence NetTools Pro
100. Free IP Tools
101. PsTools

Open Source Backup Tools For Linux


There are different kinds of backup tools, which perform the same operating but in different ways and for different systems.
Experts have for a long time laid emphasis on backing up your system or network's data. The best way to ensure that you don't lose data is to use tools for creating backups.

Graphical User Interface (GUI): A graphical user interface always makes any task much easier than it would be otherwise. The same is applicable for tools that are used to backup your data in Linux.
1. Areca Backup
2. BackupPC
3. Bacula
4. fwbackups
5. Keep
6. Simple Backup Solution

Command-line: While GUIs do make the job easier, many Linux users still prefer to use the Command Line for as many tasks as possible. If you're such an user then these are the tools for you.
7. afbackup
8. AMANDA
9. Cedar Backup
10. Duplicity
11. Dump/restore
12. tar

Snapshot backups: In order to save time, some software create backups on a snapshot. This is a read-only copy of the data that can be used in order to restore lost information.
13. FlyBack
14. Time Vault

Thursday 20 March 2014

How To Find IP Conflicts In Linux

This tool sends ARP (Address Resolution Protocol) packets on local network to collect the addresses. If there is multiple MAC addresses claiming the same IP address, then there is conflict.
To install arp-scan on Ubuntu or Debian type:

To install arp-scan on Ubuntu or Debian type:
$ sudo apt-get install arp-scan
For Fedora, CentOS or Redhat:
$ sudo yum install arp-scan
To detect IP conflicts, run the following:
$ sudo arp-scan –I eth0 -l
An output example:
192.168.1.10   00:1b:a9:63:a2:4c       BROTHER INDUSTRIES, LTD.
192.168.1.30   00:1e:8f:58:ec:49       CANON INC.
192.168.1.33   00:25:4b:1b:10:20       Apple, Inc
192.168.1.37   10:9a:dd:55:d7:95       Apple Inc
192.168.1.38   20:c9:d0:27:8d:56       (Unknown)
192.168.1.39   d4:85:64:4d:35:be       Hewlett Packard
192.168.1.39   00:0b:46:e4:8e:6d       Cisco (DUP: 2)
192.168.1.40   90:2b:34:18:59:c0       (Unknown)
In this instance, the 19.168.1.39 IP is in conflict since it appears twice.