Hello again!! My waiting has come to the end…. Finally, I just bought a new computer to replace the old one(not really old, still p4 ). I’m quite happy with this computer and this computer allowed me to do so many things with Linux… The first distros that I just installed inside this new computer is gOS Linux. I like the UI of gOS, just like I said before, gOS will be my next major OS after ubuntu and xp. So, I’ll make it quad boot between XP, gOS, OSX X86, and Ubuntu.
Here is the spec of my new computer, not bad but not good either ;
hdd 250 gb
2 Gb of RAM
Nvidia geforce 8600 512 mb
and the other things that must be inside the usual computer .
I just finally installed ubuntu, gOS, and XP. The other things that I still confused is my OSX X86
I’m using jAS OS X 10.4.7 . Probably, I need to use kalyway 10.5.2 . If anybody know how-to install OSX inside this PC, please contact me .
Oh, and here are another announcements, I will renew the TuxWorld layout, just to make it more fresh. I will install this new templates as soon as possible. Hope people will like this layout.
I just wondering, that gnome sooner or later will launch Gnome 3. I think Gnome 3 will have a lot of changes even though I don’t know much information and seems to be gnome developers doesn’t want to talk much about this next generation of windows manager. Seen from the current gnome 2.20, I think it will take a pretty long time to reach Gnome 3.0. But I already have a blueprint of gnome 3(I made this idea based on the peoples ideas. I just found so many people ideas about gnome 3.
Now these are my prediction with gnome 3…..
Linux, the darling competitor to Microsoft – The latest flavor of UNIX is taking off in corporate networks. A common misconception is that the majority of security vulnerabilities are in the windows operating system(OS). However, Linux — and even it’s sister variant of UNIX are certainly prone of the same types security vulnerabilities as we’re starting to see more and more.
Hackers are attacking Linux in droves because of it’s popularity and growing usage in today’s network environment. Because some of Linux are free — in the sense that you don’t have to pay for base OS , many organizations installing Linux for they web servers, e-mail servers, and any kind of servers in hope to saving money. Linux has grown in popularity for other reasons as well, including the following:
- Abundant resources available, including books, websites, and consultant expertise.
- The perception that Linux is more secure that windows
- Unlikeness that Linux will get hit with as much malware as windows and it’s applications do. This is an area in which Linux excels when it comes to security, but it probably won’t stay any way.
- Uncreased buy-in from other UNIX vendors, including IBM and Sun Microsystems, Even Novell is stopping development on the mighty NetWare OS, instead opting for a Linux-based kernel.
- Growing ease to use.
Now, we go to the main articles that I will give you some information to hack Linux. Many other attacks are possible against a Linux-based system. Linux can be tested remotely without being authenticated to the system.After you login to Linux with a valid username and password, you can collect a lot of information by running security tests to see how your system might stand up to a malicious internal user in a hacker with a valid login.
I will demonstrate the vulnerabilities by using and Red Hat Linux. I use Red Hat Linux because of it’s arguably some of the popular Linux distros.
Now, about Linux vulnerabilities, when Linux system is hacked, the victim organizations can experience the same side effects as their windows using counterparts, including:
- Leakage of confidential intellectual property and customer information
- Cracked passwords
- Corrupted or deleted databases
- Systems taken completely offline.
Now I will give you some tools, you can choose the tools, so you can use many UNIX-based security tools to test your Linux systems. Some are much better than others. I often find that my windows-based commercial tools do as good job as any. My favorites as follows:
- Windows-based superscan ( http://www.foundstone.com/resources/proddesc/superscan.htm ) for ping sweeps and TCP port scanning.
- Nmap (www.insecure.org/nmap) for OS fingerprinting and more detailed port scanning
- Windows-based LANguard network security scanner (www.gfi.com/lannetscan) for port scanning, OS enumeration, and vulnerability testing
- Amap (http://packages.debian.org/unstable/net/amap) for application version mapping
- Tiger (ftp://fto.debian.org/debain/pool/mail/tiger)for automaticlly assessing local system security settings
- VLAD the scanner(www.bindview.com/services/RAZOR/Utilities/Unix-Linux/vld.cfm) to test for the SANS Topt 10 Security vulnerability testing.
- Backtrack. (www.remote-exploit.org/index.php/BackTrack) this is a distros that bootable toolset for practically every tool you can imagine — all without having to load Linux on your local system.
- For windows password hacking, there is a live cd distros named “ophcrack” it can find and show your windows password easily using a rainbow table.
Thousands of other Linux hacking and testing toools are available. And the key is to find a set of tools — preferably few as possible– that can do the job that you need to do and that you feel comfortable working with.
for file permission hacks, by default rouge programs that run with root privileges can be easily hidden. An external attacker or rouge insider may do this to hide hacking foles, such as rootkits, on the system. This can be done with SetUID and SetGID coding in their hacking programs.
About SetUID and SetGID:
In linux, there is a special file types allow programs to run with the owner’s rights:
- SetUID (for user IDs)
- SetGID (for group IDs)
SetUID and SetGID are required when a user runs a program that need a full access to the system to perform task (root / superuser). For example, when a user invokes the passwd program to change his or her password, the program is actually loaded and without root or any other user’s privileges. This is done so that the user can run the program and the program can update the password database without root’s having to get involved in the process manually.
So, there are some information, tips, and tricks to hacking Linux, if I continue to type this blog, seems I’m gonna fill this blogs with a thousand of words (lol). But, seems this is the important things that you must learn from Linux hacking. And that’s all about hacking Linux, try it at your linux, and I advice you to try it at your Virtual PC or VMware, Virtual Box is OK. But if you are some expert person Linux, you can tried it at the native OS.
Everybody using 7.10??? I think ubuntu 7.04 is much better than 7.10, my drivers didn’t working perfectly with ubuntu 7.10, but 7.04 is OK. Even, ubuntu 7.04 use less memory than 7.10. So, if you want to see my ubuntu 7.04 (already tweaked) see this screenshots:
Look! I’m using office xp! I can run office xp at my ubuntu 7.04. I will give you the tricks if you want to know about installing windows software at linux. And you can see I’m using compiz fusion and I can run windows xp and ubuntu together by using vmware.