Skip to main content

Posts

Showing posts from October, 2009

How to install Skype on Ubuntu 9.10 Karmic Koala

The two methods  below doesn't work now. Please see http://blog.dipinkrishna.info/2009/11/how-to-download-and-install-skype-for_3060.html for a successfull installation of skype on ubuntu. I have provided two methods. Please do comment which one is successful. Follow these steps to install skype in ubuntu 9.10 (64 bit).         First add:             deb http://packages.medibuntu.org/ karmic free non-free         to your source.list Now open a terminal and type: $ sudo wget http://www.medibuntu.org/sources.list.d/hardy.list -O /etc/apt/sources.list.d/medibuntu.list Then do an update: $ sudo apt-get update $ sudo apt-get --yes -q --allow-unauthenticated install medibuntu-keyring $ sudo apt-get -q update And finally install Skype. $ sudo apt-get install skype Ready ... now start skype with $ skype OR Download the setup 32 -bit 64 -bit Launch the Skype install .deb file (just double click it) and follow the on screen prompts. (To start Skype  at system st

Seahorse - Encryption Made Easy

Seahorse is a GNOME application for managing encryption keys. It also integrates with nautilus, gedit and other places for encryption operations. With seahorse you can... Create and manage PGP keys Create and manage SSH keys Publish and retrieve keys from key servers Cache your passphrase so you don't have to keep typing it Backup your keys and keyring more... You can quickly secure confidential files by using Seahorse. Here is how. Install Seahorse: sudo apt-get install seahorse-plugins Then restart Nautilus: killall nautilus && nautilus & After the installation, go to System > Accessories > Passwords and Encryption Keys and select File > New > PGP Key , Then enter your name, email. You may also change the encryption method (or just leave the default option) and the encryption key length, but be aware that the longer the key, the more it will take to secure a file (but obviously, the file will be more secure). When u finis

Google is giving web masters access to the malicious code

Google is giving web masters access to the malicious code it finds in their web pages. If the Google bot detects malicious code when indexing a web page, search results pointing to this page will be tagged with an appropriate warning. Website operators can now use the Webmaster Tools to access detailed information about the affected code and trace a problem more quickly. To do gain access to these tools web masters must first validate their web presence by associating it with a Google account. Google points out that the presented malicious code can only serve as a starting point for a comprehensive web page or server decontamination process. Removing the suspect code without closing the security hole that allowed it to be injected into a system will probably result in a re-infection. Another new feature in the Webmaster Tools is "Fetch as Googlebot", which presents the content of a page the way it is seen by Google. The information available there, for example concerning a

Google's memory stress test tool

Google has released its Stressful Application Test , known by its Unix name as stressapptest. According to Google, Stressful Application Test, which has been used inside the company for sometime, can be used for memory stress testing, hardware qualification and debugging, memory interface tests and disk testing. The test attempts to create realistic high load situations by maximizing randomised traffic to memory from processor and I/O. The developers advise users that running stressapptest on a live system "could cause other applications to become extremely slow or unresponsive". More details about the Stressful Application Test can be found in the Introduction and User Guide . Stressful Application Test 1.0.0 is available to download from Google Code and is released under version 2.0 of the Apache License . An installation guide is also available. Original post: http://www.h-online.com/open/news/item/Google-releases-memory-stress-test-tool-832987.html

How to download torrent files from command line(Linux Terminal)

This can be achieved by using the ultra-lightweight text-based BitTorrent client "rTorrent". If you are using Ubuntu, you can install rTorrent via Synaptic Package Manager, or with this command: $ sudo apt-get install rtorrent You can also get rTorrent HERE . Now, we will start using rTorrent. But first, download a '.torrent' file. You can download it through this command: $ rtorrent filename.torrent By default the downloads (finished and unfinished) will be saved in your home directory. See this post for more info.

Recover deleted files in linux using Photorec easily

PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it will still work even if your media's filesystem has been severely damaged or re-formatted. For more safety, PhotoRec uses read-only access to handle the drive or memory support you are about to recover lost data from. Important: As soon as a pic or file is accidentally deleted, or you discover any missing, do NOT save any more pics or files to that memory device or hard disk drive; otherwise you may overwrite your lost data. This means that even using PhotoRec, you must not choose to write the recovered files to the same partition they were stored on. FAT, NTFS, ext2/ext3/ext4 filesystems store files in data blocks (also called clusters under Windows). The cluster or block size remains at

Create deb file of packages installed in your system

You can create .deb file of any installed package on your system. For this you will need the package dpkg-repack. So install this package by: apt-get install dpkg-repack  Now run by typing dpkg-repack at terminal To generate a .deb file of rhythmbox, type this at terminal: sudo  dpkg-repack rhythmbox This will create a .deb file in the directory where you are running the command.

How to create an ISO disk image of a CD or DVD from command line

The attempt to copy the entire disk image using cp may omit the final block if it is an unexpected length; dd will always complete the copy if possible. We can use the dd command to create an ISO disk image of a CD or DVD. dd if= /dev/cdrom of= /home/dipin/mydisk.iso bs=2048 conv=sync,notrunc change /dev/cdrom and /home/dipin/mydisk.iso as per your needs. The attempt to copy the entire disk image using cp may omit the final block if it is an unexpected length; dd will always complete the copy if possible. Note that notrunc means do not truncate the output file.

What is DNS hosting service

DNS hosting service is a service that runs Domain Name System servers. Most, but not all, domain name registrars include DNS hosting service with registration. Free DNS hosting services also exist. Many third-party DNS hosting services provide Dynamic DNS. DNS hosting service is better when the provider has multiple servers in various geographic locations that minimize latency for clients around the world. DNS can also be self-hosted by running DNS software on generic Internet hosting services. A number of sites offer free DNS hosting, either for second level domains registered with registrars which do not offer free (or sufficiently flexible) DNS service, or as third level domains (selection.somedomain.com). These services generally also offer Dynamic DNS. Free DNS typically includes facilities to manage A, MX, CNAME, TXT and NS records of the domain zone. In many cases the free services can be upgraded with various premium services. Source: http://en.wikipedia.org/wiki/DNS_hosting_se

what is dedicated server hosting service

A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources. Note, however, that not all servers are dedicated. In some networks, it is possible for a computer to act as a server and perform other functions as well. A dedicated hosting service , dedicated server , or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. Server administration can usually be provided by the hosting company as an add-on service. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers are most often hou