Linux Mint is not as famous as some of the other distros of linux, I wonder why .. I recently came to know about Linux Mint ..So I installed it after knowing that Mint is based on Ubuntu.
Linux Mint is 98% Ubuntu . It offers excellent Interface. It borrows its start menu from OpenSuse. And the best part is that it provides inbuilt codecs and other softwares, so you can start working with it right away. And the installation took me less than 10 minutes. There are essential softwares which are provided with Linux Mint .
So Ubuntu /Kubuntu fans , do try this..
A Group to promote the use of open source software and the *nix operating systems, Linux in particular.
Sunday, September 5, 2010
Thursday, August 19, 2010
Monday, July 5, 2010
Minix- an operating system
This operating system was created by Andrew S. Tanenbaum. Minix greatly influenced the design decisions of Linus Torvalds applied in the creation of Linux kernel. So it has lot of historical importance. This operating system is developed even now and is available for free download from Minix
Minix is a Unix-like computer operating system based on a microkernel architecture.Some of the key features of this operating system are:
-> Extremely small with the kernel within 6000 lines of code.
-> POSIX compliant
-> Parts that run in user mode runs in seperate modules and are insulated from each other. So very efficient in bug handling.
->Very reliable even in the case of a driver crash
And the best part of installing minix is for beginners who want to learn more about an operating system . They can use minix and can easily sperate each of the layers in order to understand each of its features.
Minix is a Unix-like computer operating system based on a microkernel architecture.Some of the key features of this operating system are:
-> Extremely small with the kernel within 6000 lines of code.
-> POSIX compliant
-> Parts that run in user mode runs in seperate modules and are insulated from each other. So very efficient in bug handling.
->Very reliable even in the case of a driver crash
And the best part of installing minix is for beginners who want to learn more about an operating system . They can use minix and can easily sperate each of the layers in order to understand each of its features.
Saturday, July 3, 2010
Open source coder's block?
Here is an excellent pdf describing how you can beat the coder's blog:
Also, the catb link mentioned in the pdf is extremely helpful teaching how to be a hacker
Also, the catb link mentioned in the pdf is extremely helpful teaching how to be a hacker
Saturday, June 12, 2010
Top 6 Hacking Tools in Linux
1.NMAP
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.
click here for NMAP tool
2.Nikto
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers
click here for Nikto tool
3.THC-Amap
Amap is a next-generation tool for assistingnetwork penetration testing.
It performs fast and reliable application protocol detection, independant
on the TCP/UDP port they are being bound to.
click here for THC-Amap
4.Ethereal
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
click here for Ethereal
5.THC-Hydra
Number one of the biggest security holes are passwords, as every password security study shows.
Hydra is a parallized login cracker which supports numerous protocols to attack. New modules
are easy to add, beside that, it is flexible and very fast.
click here for THC-Hydra
click here for nessus
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.
click here for NMAP tool
2.Nikto
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers
click here for Nikto tool
3.THC-Amap
Amap is a next-generation tool for assistingnetwork penetration testing.
It performs fast and reliable application protocol detection, independant
on the TCP/UDP port they are being bound to.
click here for THC-Amap
4.Ethereal
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
click here for Ethereal
5.THC-Hydra
Number one of the biggest security holes are passwords, as every password security study shows.
Hydra is a parallized login cracker which supports numerous protocols to attack. New modules
are easy to add, beside that, it is flexible and very fast.
click here for THC-Hydra
6.Nessus
Nessus vulnerability scaer, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
click here for nessus
Friday, June 11, 2010
A beginning
A google search for LUGs in coimbatore will throw numerous results. LUGs have been there, but are now stale. This is a group hoping to keep alive the linux, open source and hacker culture alive and propogate the use of open standards and open source software and tools.
What will follow are:
1) workshops
2) hackathons
3) mailing lists
4) collaborative debugging
5) Our own server space
Till then, please do click follow and leave some comments. Interested contributors are welcome to mail us at ilugcbe@gmail.com.
We'd love to hear from you.
Anirudh R
What will follow are:
1) workshops
2) hackathons
3) mailing lists
4) collaborative debugging
5) Our own server space
Till then, please do click follow and leave some comments. Interested contributors are welcome to mail us at ilugcbe@gmail.com.
We'd love to hear from you.
Anirudh R
Subscribe to:
Posts (Atom)