Suramya's Blog : Welcome to my crazy life…

September 18, 2011

How to set different backgrounds for each desktop in KDE 4.6.5

Filed under: Computer Tips,Linux/Unix Related,Tech Related — Suramya @ 11:59 PM

I have talked about How to set different backgrounds for each desktop in KDE4 in a previous post. However in KDE 4.6.5 the previous steps no longer work, so posting the new steps to get different backgrounds in KDE:

  • Click on the ‘Start Menu’ (The K at the bottom Right of the screen)
  • Click on ‘System Settings’ under the Settings menu
  • Double Click on the ‘Workspace Behavior’ under the “Workspace Appearance and Behavior” section
  • Check the “Different widgets for each desktop”
  • Click Apply

That’s it. Now you can change the wallpaper by Right clicking on the desktop and selecting ‘Desktop Settings’. Its good to know that the KDE Developers paid attention to complaints that the users made about their software and addressed it.

– Suramya

September 5, 2011

Getting RTL8111/8168B PCI Express Gigabit Ethernet controller to work in Debian 6

Filed under: Knowledgebase,Linux/Unix Related,Tech Related,Tutorials — Suramya @ 11:28 PM

Once I got Debian 6 installed on my server I needed to connect it to the internet to download updates etc, however my network card wasn’t being detected correctly so I had to perform the following steps to get it to work correctly:

  • Download the latest Linux drivers for the RTL8111 Chipset from the Realtek site on a computer that can connect to the Internet.
  • Copy the file over to your new system via USB or smoke signals
  • Login as root to the server
  • Identify the kernel version that you are running, using the following command:
  • uname -a

    It will give you a result like the following:

    Linux StarKnight 2.6.30-2-686 #1 SMP Sat Aug 27 16:41:03 UTC 2011 i686 GNU/Linux

    Now you need to install the kernel source code for this version on the server. First we need to find the package name of the kernel source code, we do that by running the following command:

    apt-cache search linux |grep header |grep 2.6 

    If you have a 2.4.x kernel, replace grep 2.6 with grep 2.4. Once you have the package name install it using the following command as root:

    apt-get install linux-headers-2.6.30-2-686

    Make sure you replace linux-headers-2.6.30-2-686 with the package name you got.

    Once we have the kernel source installed we can go ahead and install the driver using the following commands:

    tar -jxvf r8168-8.025.00.tar.bz
    cd r8168-8.025.00
    ./autorun.sh 
    

    This will compile the drive and install it. I didn’t get any errors when I ran it, but if you do get errors try searching for the error message on Google, it usually provides a solution.

    After I installed the driver I tried initializing my network but kept getting the following error message:

    StarKnight:~# ifdown eth0
    ifdown: interface eth0 not configured
    StarKnight:~# ifup eth0
    Ignoring unknown interface eth0=eth0.
    

    Fixing it was fairly simple though, all I had to do was edit the /etc/network/interfaces file and add the following lines to it (This assumes you are using DHCP):

    auto eth0
    iface eth0 inet dhcp
    

    Once you add the lines, you can try starting the network again using the command:

    ifup eth0

    If all went well, you will be assigned an IP address and will now be able to successfully browse the net.

    Hope this helped.

    – Suramya

    June 11, 2010

    The first foldable dual screen ebook reader/netbook is out

    Filed under: Computer Hardware,Linux/Unix Related,Tech Related — Suramya @ 2:07 AM

    If I would ever get a ebook reader I think I will go for this one or something similar.

    This is an Android device which has a 9.7″ E-paper Display and a 10.1″ LCD Touchscreen Display. So you can have a book open on one side and surf the web on the other side. Or have a programming manual open on one side and code on the other.

    The enTourage eDGeâ„¢ Specifications are as follows:

    * Dimensions: 8.25″ x 10.75″ by 1.0″ (closed)
    * Weight: approx. 3 lbs.
    * Internal Memory: 4 GB (3 GB for user)
    * E-reader File Formats: ePub, PDF
    * LCD Touchscreen Display Size: 1024 x 600 (10.1″)
    * E-paper Display Size: 9.7″ e-Ink®(1200 x 825), 8 shades of gray
    * E-paper Input: Wacom® Penabled®
    * Operating System: Linux with Google® Android®
    * Screen Rotation: 90 and 180 degrees
    * Connectivity: WiFi 802.11 b/g, Bluetooth capability
    * Battery Life: 16+ hours utilizing the e-reader screen / up to 6 hours running the LCD screen
    * Battery Type: Lithium-ion polymer
    * External Memory: SD card slot, 2 USB ports
    * Audio and Microphone Jack: 3.5 mm each. Includes internal microphone and speakers.
    * Audio playback: MP3, WAV, 3GPP, MP4, AAC, OGG, M4A
    * Video playback: 3GP, MP4, Adobe Flash Lite (H.264)
    * Input: Stylus input on e-paper and touchscreen. Virtual keyboard. USB keyboard (optional)

    The cost is $499.

    – Suramya

    Source: Handle With Linux.

    May 26, 2010

    Microsoft’s E&D Chief confirms that the Courier Tablet ‘wasn’t a device’

    Filed under: Computer Hardware,My Thoughts,Tech Related — Suramya @ 8:20 PM

    The courier tablet caused a big splash when a video from Microsoft that showcased the functionality of the Tablet was released and a lot of people were eagerly waiting for its launch. However when its launch was canceled last month a lot of skeptics wondered if there was ever an actual device or was it all a ‘concept’.

    Now thanks to Microsoft’s Entertainment and Devices Chief Robbie Bach we know for sure. He confirmed in his exit interview that the Courier Tablet ‘wasn’t a device’. In his own words:

    Well, Courier — Courier, first of all, wasn’t a device. The project and the incubation and the exploration we did on Courier I view as super important. The “device” people saw in the video isn’t going to ship, but that doesn’t mean we didn’t learn a bunch and innovate a bunch in the process.

    So basically it was all a big PR stunt. I not saying that companies should stop publicizing their feature lists or that the company should include every feature in their feature list into the final product. I know that its not always possible to include every feature that you envision into the final product. But still… If MS had a device in production that did a major portion of the features that were touted in the video or even a minor portion of them it would still make sense. But creating a PR hype on a product that they have no intention of releasing and then giving it a launch date is cheating and just wrong. I believe that such devices are rightly called vaporware.

    It looks to me like all they were doing was trying to steal some of the hype from the product launches of other companies.

    – Suramya

    Source: Robbie Bach Q&A Part 3
    Thanks to: The Raw Feed for the initial heads up

    May 18, 2010

    Boot From a USB Drive even when your BIOS Won’t Let You

    Filed under: Computer Software,Computer Tips,Tech Related — Suramya @ 11:37 PM

    If you are like me then you have gotten into the habit of carrying a Live Linux CD with you at times, I keep mine in my Laptop bag so its there when I need it. However CD’s have a lot of inherent problems like, an inability to update the version without burning a new disk and a susceptibility to scratches.

    Having a Bootable USB drive with the latest version of Linux solves all these problems. USB drives are quite cheap now and it makes sense to have one available loaded with the latest diagnostic tools. But till date I didn’t carry a bootable USB drive with me because a lot of the systems I encountered didn’t allow me to boot from USB which made the bootable drive pretty much useless. Now, there is a way to fix the problem. What you need is a Blank CD and the latest version of PLoP.

    PLoP is a Bootmanager that allows you to create a boot CD that will enable the system to boot from a USB drive even when that option is not supported by the BIOS. You can download PLoP from here. Installing it is quite easy. You just need to extract the .ZIP file that you downloaded and burn the .iso image to a CD. There are two ISO images on the CD and you can use either one of them, however according to the readme file plpbtnoemul.iso should work “everywhere” so if you have some doubt use that image.

    Once you burn the image to the CD, reboot the system and configure it to boot off the CD. When the system boots up you will get a boot menu that will allow you to choose USB as the device to boot from. Once you do that the system will boot off the USB drive as normal and you can proceed from there.

    Hope you find this as helpful as I am going to.

    – Suramya

    Source: Boot From a USB Drive Even if your BIOS Won’t Let You – How-To Geek.

    March 28, 2010

    Wikibooks has a open-content textbook on Cryptography

    Filed under: Computer Security,Interesting Sites,Tech Related — Suramya @ 11:56 PM

    I don’t know if you have heard about Wikibooks yet or not. If you haven’t then you are missing out on a great resource. Basically Wikibooks is a community for creating a free library of educational textbooks that anyone can edit. Sort of like Wikipedia but specifically for Books.

    One of the books they have is a book on Cryptography that is quite easy to read and follow. At the time of this writing a lot of the sections in the book still have to be added but new content is added regularly and over time I think it will become a great resource for everyone.

    Check it out.

    – Suramya

    February 27, 2010

    How to use UDP Tunneling to avoid hotspot or firewall restrictions

    Filed under: Computer Security,Knowledgebase,Tech Related — Suramya @ 11:59 PM

    A lot of times when you connect to a wireless hotspot or a network there are restrictions in place which prevent you from accessing the web without some sort of authentication or restrict the kind of connections allowed. Usually that’s not a problem but at times you need to be able to bypass the restrictions.

    In normal cases the firewalls in place usually allow outgoing connections to pass through but in some cases even outbound connections are blocked or you need to pay for access. In such cases you can use UDP Tunneling to bypass any restrictions.

    Keep in mind that using such methods on a network will not endear you to your network administrator and if caught might cause you trouble. You might even end up in Jail. So don’t try to use this for anything illegal or to browse porn at work.

    The way it works is that when you try to browse to a website your system sends a request to a name server on UDP Port 53. On a lot of hotspots/firewalls/proxies the system waits for the Name server to respond and when it gets a response it redirects you to a login page or redirects you to a web proxy. What allows us to do a UDP tunnel is the fact that all port 53 UDP traffic is allowed out to anywhere on the web, without any kind of authentication.

    So if you have a VPN configured to connect over UDP port 53 instead of the default port 1194 then you should be able to bypass the restrictions.

    Basically what you have to do is setup a OpenVPN server on a public server and then configure it to use port 53 instead of the default 1194. Once you do that you can configure your VPN client on a laptop to connect to the server on port 53. Once connected all new connections will go over the VPN connection and you should be able to browser the web without issues or blocks.

    Thanks to Adam Palmer for the tip.

    [Update 11/26/2014] Please use the updated link iodigitalsec.com as the original one is broken.

    I think I am going to set up a VPN server on my desktop so when I am away from home and need web access I can use this technique to get access.

    – Suramya

    February 24, 2010

    Getting Wireless on my HP Pavilion DV5000 to work on Linux

    Filed under: Computer Software,Knowledgebase,Linux/Unix Related,Tech Related — Suramya @ 10:46 PM

    I have heard that connecting to wireless networks can give a lot of trouble in Linux. I have even experienced the same when I tried out Debian and Red Hat Enterprise Linux (RHEL) 5 on my HP Pavilion DV5000 laptop. In Debian I managed to get the card working but on RHEL I couldn’t get it to work.

    Actually I could have gotten it to work but lacked the time to spend trying out various solutions. Plus the final solution wasn’t very elegant or portable. Basically what I ended up doing was hardcoding the config file to connect to a particular wireless network. Which obviously wasn’t a very portable solution.

    When I decided to try out Backtrack 4 which is a Linux-based penetration testing distribution that is based off Ubuntu I was worried that my wireless card (Broadcom BCM4318) would again cause issues. If you have been using Linux then you probably have heard of this-chip set as earlier versions of Linux had a lot of problems getting this card to work and so I was expecting a lot of work before I got the card to work.

    While the OS was installing I did a little search on google and that reminded me of a post on Tech Republic that talked about 10 tools to connect to wireless networks in Linux so I decided to try out each of them to see which one worked for me.

    Fortunately for me the first program I tried (wicd) solved my problem. All I had to do to get the network working was: log in as root and then run the following command:

    /etc/init.d/wicd start

    Once I ran the command all my network cards were automatically detected and I could configure them. However since its a pain to configure the cards manually, I ran the following command to start the GUI based client for wicd:

    wicd-client

    When you run wicd-client a new icon shows up in the system tray (next to the clock) and if you double click on the icon the Wicd manager starts and allows you to configure any wireless/wired network that the system detects.

    Over all, wicd is quite easy and a lot more intuitive than the default KDE Network manager, plus another advantage is that wicd supports WPA which the default KDE Network manager doesn’t.

    Now that I have gotten the card working on Ubuntu I am going to re-install RHEL on the laptop and see if wicd can get the card working over there also. But that’s work for another day.

    – Suramya

    February 15, 2010

    Augmented Reality: Tattoo that transforms into a flying dragon

    Filed under: Computer Related,Computer Software,My Thoughts,Tech Related — Suramya @ 7:52 PM

    Augmented reality, the words bring to mind a science fiction world where people wear glasses hooked up to computers that give additional information on the item being looked at. I have read scores of novels where this technology is in use by humans (both in a positive and negative sense) but till date this technology was still in the realm of Science Fiction.

    Now this has changed. ThinkAnApp studio based in Buenos Aries has developed specialized software that allows them to create a tattoo that when viewed through a camera gets transformed into a flying dragon. Or anything else you want. Pretty cool eh?

    Here’s what the Tattoo looks like when viewed through a camera:

    Check out the video demoing the tattoo in action here.

    This is just a prototype and isn’t released for public use yet. But it is a step in the right direction and slowly but surely we are moving closer to the day when the virtual world will overlay the real world and open up all the awesome possibilities that entails.

    Source: ThinkAnApp – Augmented Reality (tattoo).

    – Suramya

    February 5, 2010

    Learn to use search effectively in Linux using grep

    Filed under: Linux/Unix Related,Tech Related,Tutorials — Suramya @ 11:59 PM

    grep is a really powerful tool that allows you to search for specific string/data within a given text. This text can be a list of files or the content of a given file, even a list of programs running. Basically it allows you to filter the required text from background noise.

    As you can imagine it is a very powerful tool but most people don’t really learn to use it well. Zahid Irfan wrote a very nice blog post on ‘Why grep almost never yields something productive‘ for new Linux users and has some great examples that explain grep usage quite well for all users both new and experienced

    Check it out.

    – Suramya

    « Newer PostsOlder Posts »

    Powered by WordPress