background preloader

Build-a-killer-customized-arch-linux-installation-and-learn-all-about-linux-i...

Build-a-killer-customized-arch-linux-installation-and-learn-all-about-linux-i...

20 Linux Server Hardening Security Tips Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication All data transmitted over a network is open to monitoring. Use scp, ssh, rsync, or sftp for file transfer. #1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. #2: Minimize Software to Minimize Vulnerability Do you really need all sort of web services installed? #3: One Network Service Per System or VM Instance

10 Technical Papers Every Programmer Should Read (At Least Twice) 10 Technical Papers Every Programmer Should Read (At Least Twice) this is the second entry in a series on programmer enrichment Inspired by a fabulous post by Michael Feathers along a similar vein, I’ve composed this post as a sequel to the original. All papers are freely available online (i.e. not pay-walled)They are technical (at times highly so)They cover a wide-range of topicsThe form the basis of knowledge that every great programmer should know, and may already Because of these constraints I will have missed some great papers, but for the most part I think this list is solid. A Visionary Flood of Alcohol Fundamental Concepts in Programming Languages (link to paper) by Christopher Strachey Quite possibly the most influential set of lecture notes in the history of computer science. Why Functional Programming Matters (link to paper) by John Hughes An Axiomatic Basis for Computer Programming (link to paper) by C. Taken to mean: by Leslie Lamport (1978) by Luca Cardelli and Peter Wegner

Linux Mint vs. Ubuntu: the Best Option? For the last few years, there has been something of a popularity contest between two well-known Linux distros: Linux Mint and Ubuntu. Both of these distributions share the same code base, as Ubuntu is based on Debian and Linux Mint is based on Ubuntu. In both instances, the distributions took the foundation that Debian built, then added their own flavor to make it more user friendly. The similarities between the two distributions go even further, in that Ubuntu packages work flawlessly on Linux Mint, just as Ubuntu PPAs work well on Linux Mint. When Linux Mint was first being developed, the degree of separation from Ubuntu was very minimal. For this article, I’ll tap into my own experiences with both distributions over the years. Easy isn't a dirty word All too often, I hear the word "easy" being tossed around as if it's a bad word when describing Linux distributions. In recent years, I've actually found the two distributions shift further apart than ever before.

Crack/Keygen Sites That Are Safe To Use Blindly searching the web for cracks & keygens is about as smart as using Limewire to search for antivirus software - something not well-advised. Undoubtedly and unfortunately, the number of crack sites with overtones of a malicious agenda heavily outweigh sites that just want to serve up the honest goods. Having said that, there actually are quite a few creditable ‘crack’ sites that won’t try to bombard you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. We’ve done the hard work for you, and present a list of “clean” crack sites for all the latest warez. Be aware that the site reviews herein only include information about each site, not the contents of the ‘cracks’ themselves. Our Recommendation: Due to security flaws and exploits, avoid using Internet Explorer when browsing potentially harmful websites (such as any of these on the list) - use Firefox instead. Recommended (Clean) Crack Sites Malware / Spyware ? www.serialkey.net

Valve: Linux More Viable Than Windows 8 for Gaming In a presentation at Ubuntu Developer Summit currently going on in Denmark, Drew Bliss from Valve said that Linux is becoming more viable platform as an alternative to Windows 8. Windows 8 ships with its own app store and it is moving away from an open platform model. Some other points from the talk: Steam client is running nicely on Ubuntu and many developers have approached them with good game products.Cooperation with Canonical has been good.Ubuntu is preferred platform as it has a large user base and good community support with a strong company like Canonical behind it. Linux has everything they need: good OpenGL, pulseaudio, OpenAL and input support.New Source engine games will be available for Linux.No firm time frame for Steam Linux release, but soon.Copy protection is up to the game publishers. Drew announced that anyone with a Launchpad account attending UDS will be given Steam access through a beta key.

The Tao Of Programming Translated by Geoffrey James Transcribed by Duke Hillard Transmitted by Anupam Trivedi, Sajitha Tampi, and Meghshyam Jagannath Re-html-ized and edited by Kragen Sittler Last modified 1996-04-10 or earlier Table of Contents Book 1 - The Silent Void Thus spake the master programmer: ``When you have learned to snatch the error code from the trap frame, it will be time for you to leave.'' Something mysterious is formed, born in the silent void. If the Tao is great, then the operating system is great. The Tao of Programming flows far away and returns on the wind of morning. The Tao gave birth to machine language. The assembler gave birth to the compiler. Each language has its purpose, however humble. But do not program in COBOL if you can avoid it. In the beginning was the Tao. Programmers that do not comprehend the Tao are always running out of time and space for their programs. How could it be otherwise? The wise programmer is told about Tao and follows it. The highest sounds are hardest to hear.

vi tips and tricks: Ten cool commands sure to impress your friends When coming to grips with the vi editor—either for the first time or as a regular user—most people tend to have a grasp of the core command set that allows them to perform those functions they use most regularly: navigating or saving a file; inserting, updating, deleting, or searching for data; or quitting without saving changes. However, the vi editor is extremely powerful and rich in features and functionality. Even after many years of use, you can still uncover new commands that you didn't realize existed. The commands covered in this article are amongst those less well known, but they can help you to work smarter by short-cutting existing methods you may use or allowing you to do something that you never realized you could do with vi. Before we start just a recap on the two modes of vi: command and insert. Turn line numbering on and off The vi editor has a number of options that determine the look and feel of an editing session. Listing 1. Listing 2. Back to top Auto-indentation #! #! #!

Sound Types FindSounds Search the Web for Sounds What types of sounds can be found on the Web using FindSounds? Below is a partial list. Animal Sounds alligator, baboon, bat, bear, bobcat, buffalo, bullfrog, camel, cat, cheetah, chimpanzee, chinchilla, chipmunk, cougar, cow, coyote, crocodile, deer, dinosaur, dog, dolphin, donkey, elephant, elk, ferret, fox, frog, gibbon, goat, gorilla, grizzly bear, guinea pig, hippo, horse, hyena, jaguar, kitten, lamb, lemur, leopard, lion, llama, marmot, monkey, moose, mouse, orca, panda, panther, pig, polar bear, prairie dog, puppy, rabbit, raccoon, rat, rattlesnake, rhinoceros, rodent, sea lion, seal, sheep, snake, squirrel, sugar glider, tiger, toad, whale, wolf, zebra Sounds of the Holidays Christmas sleigh bells; Halloween creak, creature, evil laugh, ghost, howl, monster, scream, witch; Independence firecrackers, fireworks; New Year's balloon, party horn, pop cork; Thanksgiving turkey Insect Sounds bee, cicada, cricket, insects, katydid, mosquito, wasp

Google's Android Reborn as Network-Hacking Kit The Pwn Pad Photo: Pwnie Express The folks at security tools company Pwnie Express have built a tablet that can bash the heck out of corporate networks. Called the Pwn Pad, it’s a full-fledged hacking toolkit built atop Google’s Android operating system. Pwnie Express will be selling the cool-looking hack machines — based on Google’s Nexus 7 tablets — for $795. They’ll be introduced at the RSA security conference in San Francisco next week, but Pwnie Express is also releasing the Pwn Pad source code, meaning that hackers can download the software and get it up and running on other types of Android phones and tablets. Some important hacking tools have already been ported to Android, but Pwnie Express says that they’ve added some new ones. “Every pen tester we know has a phone and a tablet and a laptop, but none of them has been able to do pen-testing from the tablet,” says Dave Porcello, Pwnie Express’s CEO. A year ago, we introduced you to the Pwn Plug, another Pwnie Express product.

Category:Programming Tasks Programming tasks are problems that may be solved through programming. When such a task is defined, Rosetta Code users are encouraged to solve them using as many different languages as they know. The end goal is to demonstrate how the same task is accomplished in different languages. These are the Programming Tasks that have been defined and solved. Feel free to add solutions in languages not already included. The Category:Simple is a small subset with only "really simple" tasks, like "Hello World", and demonstrations of basic language-features. The Category:Draft Programming Tasks is a list of tasks, some of which are just awaiting more implementations before they can be promoted to tasks. Read the guidelines on creating new tasks. The following 871 pages are in this category, out of 871 total.

HackQuest :: Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!) by Joel Spolsky Wednesday, October 08, 2003 Ever wonder about that mysterious Content-Type tag? You know, the one you're supposed to put in HTML and you never quite know what it should be? Did you ever get an email from your friends in Bulgaria with the subject line "???? I've been dismayed to discover just how many software developers aren't really completely up to speed on the mysterious world of character sets, encodings, Unicode, all that stuff. But it won't. So I have an announcement to make: if you are a programmer working in 2003 and you don't know the basics of characters, character sets, encodings, and Unicode, and I catch you, I'm going to punish you by making you peel onions for 6 months in a submarine. And one more thing: In this article I'll fill you in on exactly what every working programmer should know. A Historical Perspective The easiest way to understand this stuff is to go chronologically. And all was good, assuming you were an English speaker. Unicode Hello Encodings Right?

BitLet - the BitTorrent Applet In the summer of 2007, shortly after launching Novlet, Daniele and I still had time to spare and were looking for something new to build. Sure enough, within a short period, Daniele came up with the idea that would soon become BitLet: a BitTorrent client that could run in a browser without requiring users to install anything on their computer. Back then, browsers had very limited capabilities: AJAX had been recently introduced (in 2005), web applications were moving from static pages to dynamic client UIs but no browser could do things like opening sockets and writing files locally, central requirements for a peer to peer file sharing application. We found a solution in an unlikely piece of technology: Java applets. One of the main reasons is that Java applets didn’t look that great. What made BitLet possible, however, was the idea that we could have the applet implement the BitTorrent protocol while relying only on the browser for its interface.

Game From Scratch C++ and SFML Edition! Want to create a game using C++ and SFML? This is the perfect place to start! This tutorial series will follow the creation of a simple game in C++ from the very beginning till the end, a micro-version of the overall purpose of this site. C++ is an evolving language standard and a great many tutorials out there are horrifically outdated or just plain bad. Similarly, most tutorials in books or on sites are by their very nature required to be very short and concise. This series is meant to be a living document, so if you have any questions on specific section, let me know and I will update accordingly! Finally, I don’t pretend to be an expert on C++ nor SFML, so if you see a mistake or you disagree with something I have said, let me know. Alright, lets get this started. EDIT: This tutorial was written a couple years ago and targets Visual Studio 2010. The Introduction Part 1 In this section we set up and configure your Visual C++ project and configure Visual C++ to work properly with SFML.

Related: