Wednesday, January 12, 2011

How to Install Ubuntu On Your Computer

Installing Linux on your computer is easier than it sounds. Many Linux programs are actually quite user friendly, and with practice you can be zooming around a Linux OS almost as quickly as you can with Windows. I say almost as quickly because Linux is very different and you have probably been using Windows for quite a while now.
So let’s get to it then.
What you will need:

1. A Linux OS and a way to install it, such as with a USB thumb drive, or CD or DVD.

2. A computer with some Extra Hard Drive space.

For this tutorial and most others I will be using the current version of Ubuntu which is v10.10. I am using the 64-bit edition of Ubuntu, but if your computer can’t handle 64-bit (if you are not sure it probably cannot, but check anyway) then use 32-bit, there is really no noticeable difference to any computer novice. It’s mainly backend stuff.

Installation:

The Ubuntu installation CD (anything having to do with the ubuntu .iso you downloaded will be referred to as the installation CD for the time being) also acts as a live CD, so when you launch it you get a full desktop with some of the features of Ubuntu.
We are going to install ubuntu, so unless you want to play around with the features first, select the install button.

The Installation page will give you a checklist and a couple options. Make sure the computer you are on meets the requirements. If you have an internet connection on that computer you probably want the installation to download and install updates. Check that box if you do. This makes everything easier in the long run.


The next page asks if you want to erase your entire Hard Disk and use the entire thing or specify partitions manually. This is your choice, if you are dedicating your entire computer to Ubuntu, you can chose to erase the entire disk, but if you are dual booting, or if you have data on other partitions, chose specify partitions manually.

Lets take a look at specifying partitions manually. This is a partition manager program, which allows you to create, delete or change your partitions.
To create a new partition select the partition you want and go to “new partition table”. This will create a new table for you to use, and it might delete the old one. You want to select the new partition as primary, and unless you have a preference chose the partition location as the beginning. If you have free space, go to “add” and specify the partition size.



Below the partition size is a drop down menu that says “use as”. This is asking what file system you want to use on the partition. My favorite file system is the ext4 system, which is the newest but if you have another preference you can choose whichever one you want many people prefer ext3 because it’s supposed to be more stable than ext4. Note that “swap” is not a file system but rather a space for temporary storage.



Then create a mount point. The mount point is used as the physical location for your file system. Just type “/” for mount point, nothing else.



After creating your main partition you will want to create a small swap partition. It can be tiny but you need it.

After you are done with that, select the main partition that you want to install Ubuntu on and click install now.
Then go through the customary stuff, closest city, that sort of thing. I know they left some cities out, so select the closest city they have to your location.





While it’s installing you will be asked for keyboard layout, password and usernames that sort of thing.
Then you will be asked to restart and CONGRADULATIONS you have your very own Ubuntu operating system on your computer!
A guide on Duel Booting will be out shortly.

Monday, January 10, 2011

Intro to linux operating systems

An operating system is one of the most important pieces of software in your computer. It contains everything needed to run programs and manage computer resources. Operating systems have various roles in today’s world. From Point-Of-Sale systems at Wendy’s, to high traffic business servers in a corporate office Operating systems are versatile and important pieces of software. But not everybody uses Microsoft Windows. There are thousands of operating systems out there, most still in use today. From Apple’s OS X to Canonical Ltd’s Ubuntu, there are operating systems that can do practically anything you want, within reason. And if they don't do exactly what you want, you are free to take an open-source operating system and re-write it however you please, but more on that later.
So today I am going to introduce you to some of the other operating systems out there. These will be for anything from personal home use, to servers, business use and even some specialized uses.


Ubuntu: A favorite of most beginner Linux users, Ubuntu is by far one of the most user friendly versions of Linux out there. Coupled with it versatility and a very wide range of supported components this distribution is a very good choice not only for beginners. The Ubuntu operating system comes in either a desktop version, a netbook version, or a server version (does not come with GUI) comes in 32-bit and 64-bit flavors (not for netbook).
Best for: Beginner –intermediate
Costs: free

Slackware: This OS was designed for ease of use and stability. Slackware is also one of the most unix-like distributions out there. Slackware is more modular than other OS’s allowing it to be used for almost anything, from a home computer OS to a machine room server. You can strip it down to bare basics or add tons of features onto it to create a perfect OS. However it requires a bit of work and knowledge of Linux to be able to modify it.
Best for: Intermediate – Expert
Cost: free

Cent OS: This OS is what is known as an Enterprise-Class Distribution, which means it’s meant for use in organizations and businesses. However Cent OS can and is used on private servers and computers. With Cent OS you can do a multitude of things, from hosting websites to hosting software. However Cent OS does not have strong commercial support, so it’s mainly used in smaller organizations.
Best for: ( Beginner – Intermediate- Expert)
Cost: Free

CloneZilla Live: A “Live” distribution is a distribution that is usually run off of a CD or DVD, though now you can run it off of a USB thumb drive (it will save on there too!). A live distribution does not need to be installed on the computer in which its running. It runs in RAM, instead of on a hard drive. CloneZilla is an operating system designed with a specific purpose in mind, to allow you to do file and hard drive backup and recovery. Clonezilla live is great for single machine backup and restore, while other version called CloneZilla SE (sever edition) is made for massive deployment, and can clone 40+ computers at once!
Best For: (Anyone who wishes to backup their computer system once in a while)
Cost: free

BackTrack: Now the Backtrack linux operating system is meant to be a “live” distribution, and is used mainly in penetration testing. This means that this operating system is packed with tools designed to break into other computers and report the results. This is mainly used by Security processionals hired to do penetration testing on a company’s network to figure out where the security breaches are. This is a great tool for hacking. It can be customized however you want, so you do not have to wade through tons of programs to find the ones you need.
Best for: (Expert)
Cost: Free

Now, I only showed you a handful of Linux Distributions, I have used all of these before and I have found them to be very useful, or interesting. For hundreds more distributions, go to Distrowatch.com

Sunday, January 9, 2011

How To Install Linux On A USB Thumb Drive

Today I am going to show you how to install a Linux operating system on a USB drive the easy way. There are a few things you will need beforehand. A 2 – 4GB USB thumb drive is imperative. You can do this with less than 2 GB’s but it depends on how large the operating system is. Also, all of the stuff on that USB drive will be deleted so move any important files.
1. First download the program called Unetbootin.

2. Look through Unetbootins distribution drop down menu and chose the distribution you want. If they do not have the distro you want, surf over to Distrowatch.com and find a Linux operating system that fits your needs.

3. If you downloaded the OS file from another place, you need to select the disk image choice and enter in the distribution file location.

4. Select your USB drive letter, and click OK. If you cannot find the drive letter use the checkbox that says “Show All Drives”.

5. Now sit back and let it install. By the time it is done it will have turned your USB drive into a bootable Linux Operating System that you can launch on practically any computer!

Thursday, December 30, 2010

How to get the most protection out of your passwords

Today I stumbled across a neat thing; it’s a list of the 500 most common passwords (not my site, and I have no affiliation with it in any way). So I thought I would talk a little about passwords. A password is the most basic and least secure form of protection for any electronic device. It is the most common form of protection because it is the easiest to implement. And it is considered the least secure form because it relies on you, the user, and you are the weakest link.
So how can you protect yourself and you’re accounts from hackers? I threw together a few pointers to keep you and your accounts safe.

1. Do not use any simple or common passwords. You can find the 500 most common passwords in the above link.

2. Do not use any passwords that have any relation to you, or anything close to you. Do not use family names, birthdays, hometowns, or favorite things. They might be easy to remember, but all of that information can be taken off of, say a Facebook page. Even if you do not have a Facebook page that information can be gleaned quite easily. Either from following you around on the internet, certain types of hacking attacks, or even rummaging through your garbage, if someone out there really wants something they can most likely figure out how to get it.

3. Use a password that is simple to remember, but hard to figure out. While random words are ok, try using a random string of letters or numbers you can remember. I use a mnemonics-like password that is easy to modify. I have about six passwords I use, all based off of one password. That way even I can remember what they are.

4. Change little things in the password. Like if you absolutely need to have a name or date, write it backwards or in an unusual fashion. Take letters and make them numbers or numbers and make them letters. Whenever I need to use a mixture of letters and numbers I don’t add numbers on, I change a letter into a number. For instance, I use 3 for E, 0 for O, and so on and so forth.

5. Do not use the same password for each and every website you have an account on. Especially for bank and other important sites like email. I use one password for most of my little accounts such as forum accounts, but my email, bank, and paypal passwords are all different.

6. Do not write your password down anywhere. Especially on a sticky note stuck to your screen. In fact, If you need to write it down anywhere for some odd reason, keep it away from your computer. Also do not write just one word, or one word with “password” written before it. Put it in some odd sentence or in a line of gibberish. But really, unless you have no short/long term memory, do not write it down. One of the first things people do when attempting to hack onto a computer physically is to check around the computer, under the keyboard, and inside the drawers of the desk for odd slips of paper with one word or phrase. If it’s a password to a computer in your organization that you have written down, be aware that you have singlehandedly compromised your entire office, and possibly even the entire organizations network. Congratulations!

7. The strongest passwords of all are random numbers, letters, and characters. Its impractical but impossible to break. Such as 5u8f#@d43&^.

These are seven of the most important pointers to consider when creating a safe password that is worthy of protecting you're accounts.
Good luck,
Milandon

Wednesday, December 29, 2010

How to crack DRM protection and convert your Ebook format

So a while ago I bought an Amazon Kindle. To be short, it is a very useful device. I have stopped getting regular books and have started buying eBooks from the Amazon website. Each eBook is usually around $6 - $12 dollars, and I usually read a book and a half each week. So as you can imagine it gets kind of expensive for a college student. About three and a half weeks ago I received my birthday present from my aunt, who lives in Alabama. My birthday is in September, and while my aunt is usually late sending gifts, this took the cake. It was not her fault, I talked to her today and she said that gift was sent a long time ago. I suspect it got lost somewhere. Anyways it was $40 dollars in borders gift cards, so I was very happy with my gift. Once I finished the current book I was reading I surfed over to borders, and purchased a book. It took me less than five minutes to realize that borders only allowed you to download eBooks in two formats; one is for the Borders Nook, and the other is in the very popular .epub format.
.epub, short for electronic publication, is a free and open file extension format created by the International Digital Publishing Forum (IDPF). It is one of the most common ebook formats, due to its flexibility with reflowable content, which means that the text can be optimized to fit any type of display device. Unfortunately the kindle won’t read .epub files. This is weird because it is one of the most popular file formats for ebooks out there. So while trying to figure out what rational thinking person would leave .epub out of their “compatible” list, I stumbled across a fix. There is a file format program out there that can convert .epub files into another format. No, it is not Mobi. This program is called Calibre, and just like Mobi, but Mobi cannot convert .epub files. My favorite format to convert my files to is the .mobi format which is readable by my Amazon Kindle. Easy enough right? Well, sometimes it’s not so simple. Many .epub formatted ebooks that you purchase from a website such as Borders have DRM protection on the ebooks. DRM stands for Digital Rights Management, which is the management system used to control access to digital content. This is what is supposed to keep you from illegally copying files and content and distributing them over the internet. However DRM’s can be very annoying while trying to access or convert certain files. Therefore in order to use my eBook that I just purchased (and is non-refundable by the way) with my Amazon Kindle, I need to break the DRM protection. So here is how I broke the DRM protection and converted the file into a readable format for my Kindle.
Disclaimer: Breaking DRM protection is usually against the Terms Of Service for any given digital content product, but it is not illegal. Please use the information below responsibly.
You will need to download the latest Python library, Pycrypto, Calibre and the latest adobe Digital Editions. You also need the other two files which are called ineptkey.pyw, and aineptepub.pyw.
1. Install the Python Library, Pycrypto, Calibre and the latest Adobe Digital Editions.
2. Open the link that puts your Ebook into Adobe Digital Editions (the download link)
3. Run ineptkey.pyw you should get a message saying “Key successfully retrieved to adeptkey.der” this has created a new file called adeptkey.der in your current directory, you do not need to run this file.
4. Run aineptepub.pyw. Chose the directory of the Adobe Digital Editions, and then the output directory which is where the cracked copy of your ebook will go.
5. Launch Calibre, and drag the cracked copy into the Calibre window. Or you can use “add ebook”.
6. Click the convert book button, you might need to hover your mouse over the buttons to find the right one. Select the type of file you want your ebook to be converted to.
7. Click “ok” and the window will close. At the bottom right of the Calibre window it will show you how many jobs you have working and if it is done or not.
8. Once that is done open the file location and find the newly converted ebook in your chosen format. Copy that to your favorite reading device and enjoy!

IF you guys have trouble with this or want a more indepth how-to, please dont hesitate to tell me that in your comments, and I will attempt to make a better guide!

Thursday, December 23, 2010

Stuxnet Computer Attack


So this new virus called Stuxnet was discovered by Symantec's security team, and its purpose was revealed when it was reverse engineered. They figured out that it was designed to get into a computer, and once it's there it injects code into the programmable logic controllers for specialized equipment. This means that it can cause equipment to function in an undesired way, such as causing a pipe to backup, or releasing clamps at the wrong time causing cargo to fall or roll out of place. This can not only be dangerous for a company's bottom line and deadlines, but it can also cause a massive loss of life and limb. While reverse engineering the virus, the Symantec team found out that this virus was engineered to target two high profile targets in particular, the Bushehr nuclear power plant, and the Natanz nuclear power plant which are both located in Iran. This virus has already infected the Bushehr Nuclear Facility, but fortunately it was detected.

Now, there are quite a few countries that have the capabilities and resources to do it. Pretty much the USA, Israel, and most of the other Arab countries are the suspects. Personally I think America did it, because the other countries are located in the middle east. Chance is if one of these power plants had a meltdown it would devastate a huge region of Iran, and if there were winds on that day the fallout could be carried for miles. So it's very unlikely that one of Iran's neighbors programmed the virus. It is possible a country farther away from Iran did it, also. But Bandar-e-Bushehr, Iran which is near where the Busehr Nuclear Facility is located. It is quite a popular place, seeing how it is the provincial capital of Busehr Providence, the city is home to around 816,115 people.

So, seeing as how so many countries don't want Iran to build nuclear missiles, how can I put the blame on America, rather than other country or terrorists? Well, first off the USA has been making quite a stink for quite a while about it. For some reason they do not want Iran to achieve nuclear missiles. I always found this to be a double standard because I don't consider Iran with nukes to be any less dangerous than the USA with nukes, and that's still pretty dangerous. Also, we already have enough nukes and the capabilities to launch them anywhere in the world. There is a term for the nuclear war that will come if one country launches a nuke, it's called the Sixty Minute War because that's how long it would take for every nuclear capable country to detect and launch all their nuclear missiles. It is widely believed that if one country launches a nuke, another country who is not the target will see it, and think they are being attacked and then launch their nukes. Now, if the United States got rid of all their nukes I would stand behind them and demand they do something about Iran. But they won't.

So, now that we all understand there is STILL a constant threat of nuclear annihilation, I will see you guys next time!

Signing off and thanks for listening to my rant,

Milandon

Wednesday, December 22, 2010

What is a virus, and why is it on your computer?

So your computer has a virus. Don't panic. A computer virus is nothing to be scared of. Most viruses are harmless, and the ones that are damaging to your computer can be removed quickly and easily with a little know-how. What is a computer virus? Well, a computer virus is simply a program written to cause havoc with your computer. During the early years of computers and the internet, viruses were written mainly for fun. Nowadays however viruses are either written to wreck havoc or as a dirty way to make money. For instance, recently a new virus sprung up that targets industrial computers and the equipment it is attached to, specifically two Iranian nuclear power plants. There are other more common viruses that were written to steal money from hardworking people. One such virus is called AntiVirus Soft, which locks down your computer claiming that you have a malicious virus, until you buy their overpriced and thoroughly useless "anti-virus" program.

How do you know you have a virus?

A virus can take many forms, some are right in your face and prevent you from using your computer. Some mess with a certain component or program. But what if you just have a bug? A bug in your computer is not a literal bug, though that is how it got its name. A bug is a problem with a piece of software or your computer that prevents a function or the whole thing from working correctly. A good way to tell if you have a bug is to see if there is an error message. Another way is to run an anti-virus scan and then remove what comes up. If that doesn't work, try googling the errors you are getting to identify the problem. You might not think it, but Google is a very useful tool for any tech savvy person, including professionals and people who pretend to be professionals.

How can you remove said virus?

So now you are probably asking how do you get rid of this virus. Well you could take it to a professional, where you are probably charged by the hour, and will most likely run you upwards of $150 -$200. Or you can opt to do it yourself. Before you make a decision, don't worry. As long as you are careful and read up on what you are going to do before you start fixing your problem, you should be all set. But you shouldn't just read one page on one site and think you know everything. It's good to use multiple sites for information, though make sure every site or guide you find is knowledgeable enough about computers.

What guides should you use?

So now you are probably wondering what guides are the good ones, and what ones are the bad ones. Well, there is one guide in particular which was written by a person who worked in the computer industry for 20+ years. Take a look at his guide, and it will most likely help you out in ways you can't even imagine.