Suramya's Blog : Welcome to my crazy life…

April 14, 2005

Subversion Tutorial

Filed under: Tutorials — Suramya @ 7:56 PM

Subversion is a really powerfull versioning system like CVS. Here’s a tutorial On subversion that tells you who to set it up : Subversion Tutorial

– Suramya

How to Obscure a URL

Filed under: Security Tutorials,Tech Related — Suramya @ 3:49 AM

This very interesting article has a lot of details about tricks which are known to the spammers and scammers to obscure URL’s to make it easier to run scams and phishing attacks.

Check it out.

– Suramya

Debian Kernel Compile instructions

Filed under: Tutorials — Suramya @ 3:47 AM

Compiling a linux kernel is not an easy job if you don’t know what you are doing and most of the articles and tutorials out there don’t really make sense to me. I found a Debian kernel compile how-to by Falko Timme which does a really good job of explaining what to do and how to do it.

Check it out over here.

– Suramya

April 12, 2005

Linux software RAID with mdadm

Filed under: Knowledgebase,Linux/Unix Related — Suramya @ 3:30 PM

Software RAID is an inexpensive way to create instant backups and protect your systems against data loss in the event that one drive fails. Learn some basic RAID management over Here

– Suramya

Building an Infrared Transmitter

Filed under: Computer Hardware,Tech Related — Suramya @ 3:28 PM

Several motherboards have the necessary hardware for the installation of an infrared transmitter/receiver, requiring only the installation of a module containing the infrared sensor. The great problem, however, is that this module is not easily found in the market and, when it is, its price is high. Our friend Alain Gailland created this module and any user who knows how to use a solder iron can assemble it.

Read complete article: Here

Ethical Hacking/Computer Security Tutorial’s

Filed under: Security Tutorials,Tech Related — Suramya @ 12:13 AM

Have a look at these sites especially the guides and tutorials. You can use their links to find other sites and so on.

More to be added soon (As and when I go through my bookmark collection to find them)

– Suramya

Crypto-Loops

Filed under: Security Tutorials,Tech Related — Suramya @ 12:11 AM

A loopback device is a very special device that allows you to mount a normal file as it was a physical device. Loopback devices can be encrypted and these are called Crypto-Loops.

A good tutorial on Crypto-Loop is available here.

– Suramya

April 11, 2005

Ver 0.1 of IM2Email released

Filed under: Software Releases,Website Updates — Suramya @ 6:56 AM

Ver 0.1 of IM2Email is a little perl script that connects to a AOL IM server, collects all IM’s sent to it and sends them to the specified email address. This program was developed on the request of Vinit Bhansali who seemed to think that something like this would be useful.

Check it out over here and let me know what you think of it.

Coming Soon: Email2IM, which will send all emails it recieves as an IM to a specified AIM account.

– Suramya

CollageGenerator is back up

Filed under: Software Releases,Website Updates — Suramya @ 4:31 AM

I finally got my system completely back up and running so the CollageGenerator is back up. I haven’t completed the new version yet but I am hopeful that I should have it done by the end of the week.

Sorry about the downtime.

– Suramya

How to log idle users out of a Linux system?

Filed under: Security Tools,Tech Related — Suramya @ 1:37 AM

Idle users are a big problem if the system doesn’t either log them out or lock the session. This is so because if a session is idle that means it might be unattended and could be used by an unauthorized person to gain access to restricted resources.

In windows idle the OS can be instructed to lock accounts after a specific idle time and in KDE/Gnome the screensaver’s allow us to the same thing. But this doesn’t cover the shell access. Users can remain logged in indefinetly unless they logout. Below are some programs that will log a user out if they exceed the specified idle time:

  • Set TMOUT= in /etc/profile. (Only for bash, sh users)
  • Use timeoutd
  • Use porttime to control login times.

If you know of any other ways please let me know.

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress