Conky with Scripts, Weather, Email and images

Conky by Proto from LxH

Well, I decided that finally I had enough freetime to start playing with Conky. I am ok editing conkyrc, adding different fonts and so forth but i’ve never used scripts or images.

Bruce and the Conky boys who run Conky Hardcore! regularly post their Conky configs on LxH so I decided to have a look for something challenging (for me) and found a Conky config by Proto.

Conky first run
First off I just copied his conkyrc and ran it. Not surprisingly I was faced with a terminal full of errors. Directories not found, image files not found, missing scripts etc. I also had to change references to my Wireless network connection and also add my email details.

Conky and extra directories
I realised that the entire Conky setup was split into 3 main directories inside the .Conky directory. Conky1, Conky2 and Conky3. Each of these directories had image, script and sh directories. I moved everything to its correct location and started to make a bit of progress.

Email config [Solved]
Even though Proto had provided me with an TotalEmails script, I kept getting a “No conkyEmail” error, and a quick Google search led me to Kaivalagi’s python script at Ubuntu Forums. I followed his instructions and added the Karmic Koala repo and installed his conkyEmail script.
http://ubuntuforums.org/showthread.php?t=869771
However, now I had one email script in my home directory, and another in /usr/share/conkyemail/conkyEmail.py. I looked through the example that he provided, and looked through both scripts, but I thought, ok, this is beyond me. I’m off to LxH Conky Forum to see if the boys can help me on this one.

EDIT: I solved the email problem by also adding the same email details to my conkyrc as are in the totalemails script.

Harddrive Temperature
The next error I was getting was “sh: hddtemp: not found”, I knew about this from before and installed hddtemp with aptitude directly from then terminal.

Conky Sensors:
I solved this by installing lm-sensors.

Vertical and Horizontal Alignment
Finally, after removing the extra HDD and changing afew things, I only had to try to align everything. Basically, I have a laptop with a 1200X800 widescreen and also that removing some sections made things move up and down, leaving it looking a bit skewiff!

Block Obsessive Spam Bots by Redirecting their IP address

//

I had a major problem on two forums with obsessive spam attacks. These are the aggressive spambots which repeatedly attack every two minutes, clogging the forum logs with error messages.

Kaptcha was in place for sign ups, but sometimes human spammers sign up then add the details (login + password)  to a spambot script.

1. You add a ban trigger which stops them from posting – They continually try to post spam

2. You add a ban trigger which stops them from logging in – They continually try to login

3. You delete the account and ban the IP, Email address, User name – They come back with different details

I was at my wit’s end so I decided to try and use an htaccess file with a rewrite permanent redirect.

I Googled and found these two sites: HERE and HERE.

This is the result:

RewriteEngine On
RewriteBase /
RewriteCond %{REMOTE_ADDR} ^94\.23\.216\.104$ [OR]
RewriteCond %{REMOTE_ADDR} ^94\.23\.216\.103$ [OR]
RewriteCond %{REMOTE_ADDR} ^62\.60\.136\.28$ [OR]
RewriteCond %{REMOTE_ADDR} ^94\.23\.207\.161$ [OR]
RewriteCond %{REMOTE_ADDR} ^61\.145\.121\.124$ [OR]
RewriteCond %{REMOTE_ADDR} ^94\.23\.216\.105$ [OR]
RewriteCond %{REMOTE_ADDR} ^94\.23\.216\.106$ [OR]
RewriteCond %{REMOTE_ADDR} ^212\.117\.162\.244$ [OR]
RewriteCond %{REMOTE_ADDR} ^216\.224\.124\.124$ [OR]
RewriteCond %{REMOTE_ADDR} ^212\.117\.164\.65$ [OR]
RewriteCond %{REMOTE_ADDR} ^91\.121\.109\.65$
RewriteRule .* http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm [R,L]

My domains are hosted at ICDsoft on Linux servers and have the mod rewrite engine turned off by default. So that had to be enabled. Below that are the Rewrite Conditions which basically tell the server to redirect the incoming IP addresses to the Cyberstalking page of usdoj.gov, which is very apt site for the bastards (spambots) to end up.

I basically have a clean error log directory now, and if a new spambot gets through, I just add its IP to htaccess, and redirect it well away from my forums.

Many people who use Linux have Linux forums, mine are Smf hosted at ICDsoft, and I thought that this info may help some of you fight back the ever increasing spam attacks.

Incidentally, the support at ICDsoft is awesome, I have 4 servers and many sites hosted with them and can do nothing but recommend the quality:

Ubuntu Slowdown – Dual Boot Loses Swap UUID [Fix]

//

ubuntu-logo-100x90This was reported as an issue before when dual-booting Ubuntu with another distro. Basically the Swap UUID Doesn’t get updated in /etc/fstab when another distro is installed on another partition.

I installed Fedora for a test run on a spare partition, with Grub being installed to MBR.

Later after an Ubuntu update, which included a new kernel and also a newer Grub, Ubuntu took back control of Grub.

I booted into Ubuntu, only to find that everything was a bit sluggish, and having experienced this before, I checked my Swap partition in  readiness to solve this problem which I had a feeling was repeating itself.

Check Swap:

free -m

With the result:

Swap:            0          0          0

Fix with “blkid” to find the real UUID of the Swap Partition:

blkid


/dev/sda1: LABEL="ACER" UUID="320D-180E" TYPE="vfat"
/dev/sda2: LABEL="Fedora-12-i686-L" UUID="3b915b51-c7ce-4077-975d-df2a177b94cb" TYPE="ext4"
/dev/sda3: UUID="78a42ee0-4d8a-474c-9cd6-b3f3a6dd6449" TYPE="ext4"
/dev/sda4: UUID="4bfbb29b-78da-4172-ae54-b1bb934de7f5" TYPE="swap"

Then use Nano to Fstab and change the old Swap UUID to the new UUID:

sudo nano /etc/fstab

Now just turn Swap on and check used memory again:

sudo swapon -a

with the result:

free -m

   Swap:         1153          0       1153

So there you have it, if you install another Linux distro on a spare partition to dual-boot and use the same Swap partition, you may find that when you boot into Ubuntu that it is a little sluggish than usual.

This is a known problem for dual and triple booters, but easily remedied, as you see above.

//

Sabayon Linux 5.1

sabayonFabio Erculiani has announced the release of Sabayon Linux 5.1, a Gentoo-based desktop distribution with GNOME or KDE desktops: “The best, refined blend of GNU/Linux, coming with bleeding edge edges, is eventually here. Features: based on the new GCC 4.4.1 and glibc 2.10; ships with a desktop-optimized Linux kernel 2.6.31; provides extra server-optimized and OpenVZ-enabled kernels in repositories; installer now available in multiple languages; complete ext4 file system support; features X.Org 7.5 and up-to-date FLOSS, NVIDIA, AMD video drivers; containing GNOME 2.28 (with GNOME Shell) and KDE 4.3.4; outstanding 3D desktop applications (Compiz, Compiz Fusion and KWin)….” See the release announcement for a complete list of new features and changes. Download the KDE (K) or GNOME (G) edition for your preferred architecture: Sabayon_Linux_5.1-r1_x86_K.iso (1,936MB, MD5, torrent), Sabayon_Linux_5.1-r1_x86_G.iso (1,734MB, MD5, torrent). Sabayon_Linux_5.1-r1_amd64_K.iso (2,032MB, MD5, torrent), Sabayon_Linux_5.1-r1_amd64_G.iso (1,882MB, MD5, torrent).

Stay up to date with all the latest distro releases at http://distrowatch.com

Ready to run ChromeOS available – ChromiumOS Cherry

chromiumcherrySo, after all the hype about ChromeOS, we were all pretty narked when we found that Google had only released the source code, and we would have to manually compile the distro.

Fear not! Hexxeh to the rescue. Hexxeh decided that he would be the one to give ChromeOS to the masses via a ready made USB pendrive image that anybody can download, and boot directly into ChromeOS on any machine (which can boot from USB). There are instructions for: MacWindowsLinux

I first picked up on Hexxeh on Twitter and then followed the project to his blog which outlines plans and also offers various mirrors and a torrent to obtain the image. On his blog’s FAQ he says that he is “a student who occasionally pretends he’s a Web Developer/Programmer and works on various websites with people” and he started this project “Because I think Chromium OS is a cool idea, and I thought I’d fill a gap that hadn’t been filled”.

It’s great that somebody has taken the time to provide the masses with something which we first saw as a bit of a let-down after all the hype. Could this be the first ever ChromeOS derivative? I hope so, and this weekend I will be providing a full write up.

Go to his blogs to get the full details and also follow him on Twitter:

Hexxeh’s Blog:- http://blog.hexxeh.net/

ChromiumOS Cherry: – http://chromeos.hexxeh.net/

Hexxeh on Twitter:- http://twitter.com/hexxeh

[Howto] Faster internet with Google DNS

Yet another contribution from Google to help us get what we need over the internet…………… quickly!

Google launched it’s own DNS service, and seeing as their bots crawl practically everything on the net, you will find even new sites will be stored, listed and ready to go. Hopefully this service will be a lot faster than your usual ISP.

How to configure them:

Gui
Every distro has it’s own Network Config Manager Gui, and i’m not going to post screenshots of all of them for Kde, Gnome and Xfce4 etc. The basic theory is that you right-click your netork icon, and edit the IpV4 settings and choose DHCP (addresses only) and then add the two Google DNS server IP’s – 8.8.8.8, 8.8.4.4.

Geek style
Open /etc/resolv.conf (I use Nano text editor)

sudo nano /etc/resolv.conf

Then edit the dns servers to the Google ones.

nameserver 8.8.8.8
nameserver 8.8.4.4

Follow our guide on how to stop Network manager overwriting your settings:
http://debianandi.blogspot.com.es/2013/01/stop-resolvconf-being-overwritten-by.html

Now either restart your network connection, or reboot completely and start surfing. You should see a faster domain name resolution.

It looks like OpenDNS has a new rival on the block!

Linux Trojan Discovered in Screensaver

trojanSo, there was a trojan infected screensaver uploaded to Gnome-Look.Org (recently removed) that inserted a bash script into /usr/bin/ by using wget and then executing the script. Originally the script’s contents were a ping command but this was later changed to:  rm -f ./*.*

What does this tell us about Linux security? In fact what does this
tell us about any computer operating system’s security?

Right, it tells us that it means absolutely nothing if a stupid user
is prepared to sacrifice his/her security to get something pretty and
fluffy from an untrusted 3rd party web site.

The main security for Linux, apart from being practically crack-proof
is the fact that we get our applications and goodies from verified
secure repositories. That is now history thanks to the Windows mentality
that is infecting the minds of the usually security-conscious Linux
users.

It’s fate. It was bound to happen sooner or later thanks to Linux’
popularity over the last couple of years. Along with it came the 3rd
party apps and goodies sites which generally offer the same stuff which is
available in most distro repos.

My message? Only trust verified Linux distro repos and stay away from these
3rd party sites which are lacking the staff/time to check each upload before
making it available to the general populace.

How to make sudo insult you when you mess up

tuxFound at: http://ubuntu-tutorials.com/

I recently found a fun feature available within the sudo program that will insult you when you do the wrong thing such as enter your password incorrectly. I’ll tell you how you can activate the feature for a few laughs and also give a few examples of what insults you might get.

To turn the feature on you’ll need to use the following command:

sudo visudo

(always use visudo when you need to edit your sudoers file as it has a self-check system that won’t let you screw it up.)

Find the line that begins with Default and append insults to the end. (Any addition to that line is comma separated.) Your entry will then look like this:

Defaults !lecture,tty_tickets,!fqdn,insults

Save the file and you’ll notice the next time you screw up your sudo password you’ll get an insult.

Note: to clear your sudo session and be required to enter the password again try:

sudo -K

A few examples below:

Maybe if you used more than just two fingers…

I have been called worse.

Listen, burrito brains, I don’t have time to listen to this trash.

Good luck!

Ubuntu 10.04 Will Have Simple Scan

scanner

Posted on: http://anotherubuntu.blogspot.com

Robert Ancell is working on making scanning on Ubuntu “just work”. Currently scanning is performed using the default installed Xsane. Xsane has many options, has a style that does not integrate into the current Ubuntu desktop and does not allow scanning from within applications. In Karmic it was proposed to peplaced Xsane with the application Gnome-Scan, but Gnome-Scan was not found to be stable enough.
Robert Ancell’s application titled Simple Scan is basically a frontend for SANE – which is the same backend as XSANE uses. This means that all existing scanners will work and the interface is well tested. However, this does not rule out changing the backend in the future. Besides a much cleaner interface, Simple Scan will also have a GTK+ interface that integrates nicely with the Ubuntu desktop.

Simple Scan is under heavy development, but hopefully Robert will have something solid, slick and intuitive to ship in Ubuntu 10.04.

http://people.ubuntu.com/~robert-ancell/simple-scan/
https://wiki.ubuntu.com/DesktopTeam/Specs/Lucid/DocumentScanning

This Wave is going to be bigger than Google Wave

merry-xmasCan this one be bigger than Google Wave?

If you use Facebook, other social sites and forums, copy and paste this Merry Christmas wave and let’s see if how far it reaches!

Just a bit of Xmas fun!

„ø¤MERRYº°¨¨°º¤ø°¨¨°º¤ø ¸„ø¤º°¨¨°º¤ø¸CHRISTMAS¤ø ¸„ø¤º°¨¨°º¤ø ø¤º°¨¨¨°º¤ø¸„ø¤MERRYº°¨¨°º¤ø ¸„ø¤º°¨¨°º¤ø ¸„ø¤º°¨¨°º¤ø,„CHRISTMAS¤ø ¸„ø¤º°¨¨°º¤øø¤º°…. Copy and paste and keep the wave going!

25 cool Linux terminal commands for Newbies

terminalSo you’ve just installed Ubuntu or PcLinuxOS and you’ve decided that all those GUI’s and point ‘n’ click applications are just like Windows. You’ve had Linux for a week or so and you’ve caught the Über-Geek-Hacker bug and have decided to see what you can do via the terminal like the real Geeks do.

How about connecting to a remote server, getting system information, making zip files?. What about listing directories, searching for files, moving files around, creating directories and deleting stuff? Cool huh?

Well, fire up your terminal and work your way from 25 to 1 and get into some real Geekness!

25) host

host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options.

Example:
$ host mail.yahoo.com
mail.yahoo.com is an alias for login.yahoo.com.
login.yahoo.com is an alias for login-global.yahoo8.akadns.net.
login-global.yahoo8.akadns.net is an alias for login.yahoo.akadns.net.
login.yahoo.akadns.net has address 69.147.112.160

24) dig

dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. Other lookup tools tend to have less functionality than dig.

$ dig mail.yahoo.com

; <> DiG 9.4.1-P1 <> mail.yahoo.com
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9867
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 8, ADDITIONAL: 8

;; QUESTION SECTION:
;mail.yahoo.com.                        IN      A

;; ANSWER SECTION:
mail.yahoo.com.         195     IN      CNAME   login.yahoo.com.
login.yahoo.com.        65      IN      CNAME   login-global.yahoo8.akadns.net.
login-global.yahoo8.akadns.net. 122 IN  CNAME   login.yahoo.akadns.net.
login.yahoo.akadns.net. 51      IN      A       69.147.112.160

;; AUTHORITY SECTION:
akadns.net.             84671   IN      NS      zc.akadns.org.
akadns.net.             84671   IN      NS      zd.akadns.org.
akadns.net.             84671   IN      NS      eur1.akadns.net.
akadns.net.             84671   IN      NS      use3.akadns.net.
akadns.net.             84671   IN      NS      usw2.akadns.net.
akadns.net.             84671   IN      NS      asia9.akadns.net.
akadns.net.             84671   IN      NS      za.akadns.org.
akadns.net.             84671   IN      NS      zb.akadns.org.

;; ADDITIONAL SECTION:
za.akadns.org.          23366   IN      A       195.219.3.169
zb.akadns.org.          23366   IN      A       206.132.100.105
zc.akadns.org.          23366   IN      A       61.200.81.111
zd.akadns.org.          23366   IN      A       63.209.3.132
eur1.akadns.net.        17773   IN      A       213.254.204.197
use3.akadns.net.        17773   IN      A       204.2.178.133
usw2.akadns.net.        17773   IN      A       208.185.132.166
asia9.akadns.net.       17773   IN      A       220.73.220.4

;; Query time: 27 msec
;; SERVER: 24.92.226.9#53(24.92.226.9)
;; WHEN: Mon Aug 20 13:34:17 2007
;; MSG SIZE  rcvd: 421

23) mkdir

The mkdir utility creates the directories named as operands, in the order specified, using mode “rwxrwxrwx” (0777) as modified by the current umask(2).

Example:
$ mkdir test
$ ls -l | grep test
drwxr-xr-x  2 owner  group         512 Aug 20 13:35 test

22) rm

The rm utility attempts to remove the non-directory type files specified on the command line. If the permissions of the file do not permit writ- ing, and the standard input device is a terminal, the user is prompted (on the standard error output) for confirmation.

Example (file):

$ rm test2
$ ls -l | grep test2

Example (dir):
what you get when you try to rm a dir is:

$ rm test
rm: test: is a directory

to get around this do:

$ rm -r test
$ ls -l | grep test

21) cp

In the first synopsis form, the cp utility copies the contents of the source_file to the target_file. In the second synopsis form, the con- tents of each named source_file is copied to the destination target_directory. The names of the files themselves are not changed. If cp detects an attempt to copy a file to itself, the copy will fail.

Example:

$ cp test test2
$ ls -l | grep test
-rw-r–r–  1 owner  group           0 Aug 20 13:40 test
-rw-r–r–  1 owner  group           0 Aug 20 13:41 test2

copy a directory do:

$ cp -r test test2
$ ls -l | grep test
drwxr-xr-x  2 owner  group         512 Aug 20 13:42 test
drwxr-xr-x  2 owner  group         512 Aug 20 13:42 test2

20) grep

grep searches the named input FILEs (or standard input if no files are named, or the file name – is given) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.

Example:

$ ls
example test    three
$ ls | grep th
three

19) ls

For each operand that names a file of a type other than directory, ls displays its name as well as any requested, associated information. For each operand that names a file of type directory, ls displays the names of files contained within that directory, as well as any requested, asso- ciated information.

Example:

$ ls
example test    three
$ ls -l
total 0
-rw-r–r–  1 owner  group  0 Aug 20 13:44 example
-rw-r–r–  1 owner  group  0 Aug 20 13:44 test
-rw-r–r–  1 owner  group  0 Aug 20 13:44 three

18) startx

The startx script is a front end to xinit that provides a somewhat nicer user interface for running a single session of the X Window Sys- tem. It is often run with no arguments.

Example:
To use startx user most have .xinitrc file in there home directory. Examples of the file are:

$ cat ~/.xinitrc
exec fluxbox
(this will start fluxbox)
$ cat ~/.xinitrc
exec gnome-session
(this will start gnome)
$ cat ~/.xinitrc
exec startkde
(this will start kde)

17) nano

nano is a small, free and friendly editor which aims to replace Pico, the default editor included in the non-free Pine package. Rather than just copying Pico’s look and feel, nano also implements some missing (or disabled by default) features in Pico, such as “search and replace” and “go to line and column number”.

Example:

$nano test

(will open test file for edit to exit type: Ctrl+X)

*)vi

Vi is a screen oriented text editor. Ex is a line-oriented text edi- tor. Ex and vi are different interfaces to the same program, and it is possible to switch back and forth during an edit session. View is the equivalent of using the -R (read-only) option of vi.

Example:

$vi test

(Added on request)
to start typing on test use: i when your done type (esc)  to save type :wq! to not save use :q!

16) pwd

The pwd utility writes the absolute pathname of the current working directory to the standard output.

Example:

$ pwd
/usr/home/username/test

15) cat

The cat utility reads files sequentially, writing them to the standard output. The file operands are processed in command-line order. If file is a single dash (`-‘) or absent, cat reads from the standard input. If file is a UNIX domain socket, cat connects to it and then reads it until EOF. This complements the UNIX domain binding capability available in inetd(Cool.

Example:

$ cat test
this is the contents of the file test

14) man

The man utility formats and displays the on-line manual pages. This ver- sion knows about the MANPATH and PAGER environment variables, so you can have your own set(s) of personal man pages and choose whatever program you like to display the formatted pages. If section is specified, man only looks in that section of the manual. You may also specify the order to search the sections for entries and which preprocessors to run on the source files via command line options or environment variables. If enabled by the system administrator, formatted man pages will also be compressed with the “/usr/bin/gzip -c” command to save space.

Example:

$ man find

Show information about the command find

13) kill

The kill utility sends a signal to the processes specified by the pid op- erands.

Example:

$ kill 694

(694 is the id of the program running)

12) locate

The locate program searches a database for all pathnames which match the specified pattern. The database is recomputed periodically (usually weekly or daily), and contains the pathnames of all files which are pub- licly accessible.

Example:

#locate Xorg.0.log
/var/log/Xorg.0.log
/var/log/Xorg.0.log.old

(you man need to run /usr/libexec/locate.updatedb to update locate listing)

11) ifconfig

The ifconfig utility is used to assign an address to a network interface and/or configure network interface parameters. The ifconfig utility must be used at boot time to define the network address of each interface present on a machine; it may also be used at a later time to redefine an interface’s address or other operating parameters.

Example:
# ifconfig
em0: flags=8843 metric 0 mtu 1500
options=18b
ether 00:16:41:16:28:2a
inet 192.168.1.2 netmask 0xffffff00 broadcast 192.168.1.255
media: Ethernet autoselect (1000baseTX )
status: active
lo0: flags=8049 metric 0 mtu 16384
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x2
inet6 ::1 prefixlen 128
inet 127.0.0.1 netmask 0xff000000

10) ssh

ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP ports can also be forwarded over the secure channel.

Example:

#ssh localhost
Password:
Welcome to FreeBSD-World

(you wouldn’t use local host you would use the computer ip or hostname you are connecting to)

9) gzip

The gzip program compresses and decompresses files using Lempel-Ziv cod- ing (LZ77). If no files are specified, gzip will compress from standard input, or decompress to standard output. When in compression mode, each file will be replaced with another file with the suffix, set by the -S suffix option, added, if possible. In decompression mode, each file will be checked for existence, as will the file with the suffix added.

Example:

$ gzip -9 test.tar
test.tar.gz

$ gzip -d test.tar.gz
$ ls | grep test.tar
test.tar

8) bzip2

bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.

Example:

$ bzip2 -9 test.tar
$ ls | grep test.tar
test.tar.bz2
$ bzip2 -d test.tar.bz2
$ ls | grep test.tar
test.tar

7) zip

zip is a compression and file packaging utility for Unix, VMS, MSDOS, OS/2, Windows NT, Minix, Atari and Macintosh, Amiga and Acorn RISC OS.

Example:

$ zip test.zip test
adding: test/ (stored 0%)
$ ls | grep test
test
test.zip
$ unzip test.zip
Archive:  test.zip

6) tar

tar creates and manipulates streaming archive files. This implementation can extract from tar, pax, cpio, zip, jar, ar, and ISO 9660 cdrom images and can create tar, pax, cpio, ar, and shar archives.

Example:

$ tar -cf t2.tar example test three
$ ls | grep t2
t2.tar
$ tar -xf t2.tar
(files are now extracted)

5) mount

The mount utility calls the nmount(2) system call to prepare and graft a special device or the remote node (rhost:path) on to the file system tree at the point node. If either special or node are not provided, the appropriate information is taken from the fstab(5) file.

Example:

# cat /etc/fstab
# Device                Mountpoint      FStype  Options         Dump    Pass#
/dev/ad4s1b             none            swap    sw              0       0
/dev/ad4s1a             /               ufs     rw              1       1
/dev/acd0               /cdrom          cd9660  ro,noauto       0       0
# mount /cdrom
# ls /cdrom
4.1             TRANS.TBL       etc
# umount /cdrom
# ls /cdrom
#

(/cdrom is already listed in the fstab if it was not I would have to do ‘mount /dev/acd0 /cdrom’)

4) passwd

The passwd utility changes the user’s local, Kerberos, or NIS password. If the user is not the super-user, passwd first prompts for the current password and will not continue unless the correct password is entered.

Example:

$ passwd
Changing local password for username
Old Password:
New Password:
Retype New Password:
$

3) ping

The ping utility uses the ICMP protocol’s mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (“pings”) have an IP and ICMP header, followed by a “struct timeval” and then an arbitrary number of “pad” bytes used to fill out the packet.

Example:

$ ping -c 5 www.yahoo.com
PING www.yahoo-ht3.akadns.net (69.147.114.210): 56 data bytes
64 bytes from 69.147.114.210: icmp_seq=0 ttl=47 time=48.814 ms
64 bytes from 69.147.114.210: icmp_seq=1 ttl=47 time=32.916 ms
64 bytes from 69.147.114.210: icmp_seq=2 ttl=47 time=32.361 ms
64 bytes from 69.147.114.210: icmp_seq=3 ttl=47 time=33.912 ms
64 bytes from 69.147.114.210: icmp_seq=4 ttl=47 time=33.846 ms

www.yahoo-ht3.akadns.net ping statistics —
5 packets transmitted, 5 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 32.361/36.370/48.814/6.249 ms

2) tail

The tail utility displays the contents of file or, by default, its stan- dard input, to the standard output.

# tail /var/log/auth.log
Aug 19 20:38:05 laptop su: username to root on /dev/ttyv0
Aug 20 00:10:38 laptop login: login on ttyv0 as username
Aug 20 00:11:30 laptop su: username to root on /dev/ttyp0
Aug 20 00:56:32 laptop su: username to root on /dev/ttyp1
Aug 20 01:31:26 laptop su: username to root on /dev/ttyv0
Aug 20 10:25:58 laptop login: login on ttyv0 as username
Aug 20 10:26:21 laptop su: username to root on /dev/ttyp0
Aug 20 13:58:06 laptop su: username to root on /dev/ttyp1
Aug 20 14:18:23 laptop su: username to root on /dev/ttyp1
Aug 20 14:27:39 laptop su: useranme to root on /dev/ttyp1

1) top

Top displays the top processes on the system and periodically updates this information.

Example:

last pid:  5327;  load averages:  0.00,  0.00,  0.00                                                                    up 0+04:05:41  14:30:28
44 processes:  1 running, 43 sleeping
CPU states:  0.2% user,  0.0% nice,  1.3% system,  0.0% interrupt, 98.5% idle
Mem: 198M Active, 608M Inact, 128M Wired, 26M Cache, 111M Buf, 31M Free
Swap: 1024M Total, 8K Used, 1024M Free

PID USERNAME    THR PRI NICE   SIZE    RES STATE  C   TIME   WCPU COMMAND
694 username       1  96    0 53004K 48212K select 1   4:23  0.10% Xorg
10306 username       1  96    0  7496K  4300K select 1   0:04  0.05% xterm

Debian Squeeze freeze and Ubuntu Dev Syncing

The Debian GNU/Linux project is looking at a development freeze in March next year for its next release, Squeeze, the project leader Steve McIntyre says.

A freeze means that no new features are incorporated and only bug fixes are done. The release does not take place until all RC (release critical) bugs are squashed.

McIntyre was hopeful that this would translate into a release sometime by the middle of the Northern summer.

“It would be nice to have things done before we head off to New York for DebConf in July, so that we’re free of the release work while we discuss future plans,” he told iTWire, in response to a query.

Debian’s last release, Lenny, hit the download servers on February 14 this year.

Earlier this year, the owner of Canonical, Mark Shuttleworth, had proposed that Debian sync releases with Ubuntu so that the work could be spread. Ubuntu releases every six months as it is tied to the GNOME release schedule.

Said McIntyre: “In terms of the discussions with Mark and the Ubuntu team, those are still happening here and there. As the major components of both our releases are shared, we’re hoping to be able to sync up on the same or similar upstream versions and spread some of the work.

“Exactly if and how that will happen depends on the teams involved, but we should be able to help each other. Maybe in future we’ll be able to sync more tightly, but that’s going to take time.”

He said things were fairly quiet in the project right now. “That’s what typically happens in the middle of a release cycle. We’ve got some Bug Squashing Parties coming up in the next few weeks to help us kill off some of the release critical bugs in Squeeze, and I’ll be hosting one of those at my place in Cambridge next weekend.”

McIntyre said the process of organising the next Debian conference had begun. “We’re now looking for sponsors to aid us in paying for the conference. It will be quite exciting to hold DebConf in the US for the first time – we’re expecting a much bigger audience from our US-based developers and users than normal, and I can’t wait to meet more of them.”

McIntyre is in his second term as leader and said he would not be running for election again. “After two years of being nominally ‘in charge’ I’ll be happy to pass the reins over to somebody else.

“There are plenty of other qualified folks around who could do the job, and in my increasingly-tight spare time it would would be nice to do more technical stuff again,” he said.

Debian, which was set up in 1993, provides ports for more architectures than any other GNU/Linux distribution. The distribution is highly regarded, especially for its software management capabilities.