Exchangeable image file format (Exif) is a specification for the image file format used (mostly) by digital cameras. Exif is metadata hidden behind an image/audio/video created by device while image being taken, exif data is introduced by the Japan Electronic Industries Development Association (JEIDA) with purpose to encourage interoperability between imaging devices. learning exif data is part of digital forensic studies, trough exif data we learn when was image is being taken, what device is use to take, and what is being manipulated.   

What information inside Exif data ?
Exif usually contain of supporting information of file, that information can be [1] Date and time information, digital cameras will record the current date and time and save this in the metadata.[2] Camera settings, the information of camera setting includes static information such as the camera model and make, and information that varies with each image such as orientation, aperture, shutter speed, focal length, metering mode, and ISO speed information. [3] A thumbnail for previewing the picture on the camera's LCD screen, in file managers, or in photo manipulation software, if a file was being manipulated the data will be shown here. And the last information of exif data is [4] Descriptions and copyright information, this case not created by imaging device but it created by application like a photo editor.

How to read exif data on Ubuntu Linux ?
Reading exif data is quiet simple in ubuntu, we have application called exiftool (also available in windows/machintos) which can help us to read, write, and edit metadata on exif data. to install exiftool we can use the synaptics package manager or go to official exiftool website to download and install. exiftool is command-line application which run on terminal, to running this application we can use this syntax synopsis.
exiftool [OPTIONS] FILE
as case studies, we will try to use this application to analyze image then see what hidden information behind them, we have two identic image and one which of them is has being edited by image editor application, let see what goes in their metadata :


Continuing our discuss in introduction backtrack for computer/digital forensic tools part I, in this part we will try to dig how deep is backtrack have a potential source as computer/digital forensic tools. Backtrack is a linux distro which can put many kit into one vessel and collaborated each other, this is an excess of backtrack which not owened by other. Talking of computer/digital forensic tools we have too clasify some parts of tool into different part besides of it's use, after i read some article with the same topic of computer/digital forensic many of them classify it's into five major classification, that is ..
  1. Data Acquisition
  2. Data Recovery and Carving
  3. Meta Data Analysis
  4. Network Forensic
  5. Log File Analysis
After looking at the five major clasification of digital forensic tool above, we agree that Backtrack 4 have all candidate to meet all requirement, let peel of one by one.

Data Acquisition
Data Acquisition is set of application which is responsible to interrogate harddrive and get neccessary information from them, in this field we have some particular job like make an 'identic' copy of harddrive then analyse them without ruin the original evidance and doing File System Interrogration jobs even it NTFS/FAT/EXT3 or Other. To do a data acquisition jobs in backtrack we have such application Advanced Forensic Format Library (afflib), Automated Image and Restore (air-imager), dd, dcfl-dd, lsof, guymanager, acidlab, and RDA. All applicaton mentioned can be installed using backtrack package manager. 

Data Recovery and Carving
The Data Recovery tools is set of application which responsible to get erase data back, analyzing hidden and erase partition, and fixing a broken block of filesystem. Data carving is extracting data (files) out of undifferentiated blocks (raw data) for the purpose of file identification. We have such application like ddrescue, foremost-menu, scalpel, xpilco, allin1, and autopsy In backtrack to do Data Recovery and Carving.

Meta Data Analysis
Meta Data Analysis is looking for hidden variable behind the file and data, to do a meta data analysis we need some application which can do activity like dissassembling a file (ducument/image/audio/video) and get hidden variable like when was file last accessed, when was it modified, or simeting like when was file has been created and using what tools it's has been created, looking for meta data analysis tool we have application called libtsk1, vinetto, also image and video editor (gimp,fspot,audancity) in backtrack. 

Network Forensic
Network Forensic tools is not much different if compare with network security program, cause that is have real same algorithm eventhough we do the reverese enginnering ones. Network forensic tools covered such jobs like make an analysis of network traffic, captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging, identification network error, sniffing and loging network activity in various port (telnet, ssh, imap, pop3, smtp) and many more. This part is the specialization of backtrack, we have many network security/network forensic tools in this distro that can be use, this is the following of them : netcat, netflow, tcpdump, kismet, wireshark, and very lot of stuff.

Who didn't know Mr.Mark Shuttleworth, this people is equal with the famous 'Mark' of the year besides Mark Zuckerberk (Facebook Founder) and Mark Mullenweg (Wordpress Founder), Mark "Richard" Shuttleworth was born in 18 September 1973, he is the Man behind Ubuntu, the Man behind Canonical, the Man behind HBD Venture Capital, and also the first African space traveler. Mark "ubuntu" Shuttleworth is an African entrepreneur with a love of technology, innovation, change and space flight. He start his debut by founding Thawte (is acompany specialising in digital certificates and cryptography) Then Founding The Shuttleworth Foundation (is a non-profit organisation that accelerates social innovation in Africa with a particular focus on education.) in 2001, One of important point we would know about Mark "Ubuntu" Shuttleworth is he not only work for the future of open source software, but also for the future of learning, South Africa, and the world at large.
Mr. Mark Shuttleworth as keynote speaker
This article will not discuss of biography or history of Mark Suttleworth, we start this discuss by imagine that "How about we meet Mr.Mark shuttleworth, what would you ask if you have just one question" just like joan osborne said. Some people admire to ubuntu, Some people have same interest with Mr.Mark Shuttleworth did or someone else have a same problem like affrican which Mark Shutterworth Foundation concentrated.

if it would happened to me of course i will not ask question like some movie in bollywood "Hello Mr.Mark my name is Khan and i'm not terrorist, what about you ?" or something like "Who will be the next president if this country ?". Eventhough it would be less if just one question, i will start explain my purpose with, besides of data in google we know that ubuntu is become very popular lately and the data said that 'indonesia' is the top of region where  ubuntu is become popular, then my question is
When will connoical & Mr. Mark  come to indonesia to held ubuntu release party like other country has ?
Every people have own purpose to ask, every people have own reason to do, we think it would be gratefull if Mr. Mark Shuttleword read this :D, and now how about you ?

Computer/Digital Forensic has become popular lately, start form Bank Robbery, Hacking/Cracking/Hijacking up to popular scandal on the artist sex tape using this method to find the truth. Computer forensics is the generic name that we use for the analysis and reporting on our findings from the forensic analysis of all computer or digital-related media. This not only includes PC/Laptop or Server hard drives but also other storage devices such as USB drives, MP3 players, memory cards, SIMS and data gathered via network analysis. Computer/Digital Forensic is a part of computer security, computer practitioners (computer analist/computer expert)clasified this method into offensive security action which usually did after insident. Digital forensic actualy do after computer criminal insident, common Digital forensics cases include:
drug dealing, internet misuse, pornography in the workplace, rape, illegal downloads, IP theft, paedophilia, murder, virus/malware infection, fraud, email analysis, data recovery, contract negotiations, e-discovery, peer-peer activities, spyware analysis, spoofed and threatening emails, document tracking
Talking of computer security tools not separrated with the most popular computer security tool of the year 'backtrack', backtrack has so many tools and application to do such security penetration testing, security attack and also computer security action for computer/digital forensic purpose. When we first boot up the new Backtrack 4, you might have noticed something slightly different that is ...

We can see that backtrack has include 'computer/digital forensic' as main cause existence of this distro
All types of operating systems can be analysed, from DOS and Microsoft Windows-based, through to MAC, UNIX variants, and those utilising more obscure systems. If the data is stored electronically, then it can probably be forensically analysed. From other wellknown literacy, There are five basic steps to the computer forensics:
   1. Preparation (of the investigator, not the data)
   2. Collection (the data)
   3. Examination
   4. Analysis
   5. Reporting

Which one must be analyzed ?
Computer/digital forensic tools is work to analyze a digital evidence, in the computer world we know that many device can be potential evidence which help computer analyst find the truth, here some potential evidance can be found :
       images, time and date stamps, removable cartridges, memory card, video, sound

Evidence can also be found in files and other data areas created as a routine function of the various types of computer operating systems. In many cases, the user is not aware that data is being written to these areas or files. Passwords, Internet activity, deleted files and temporary backup files are examples of data that can often be recovered and examined.


I love music, we love music, all people love music. a Moment ago people around the world has been seeing closing ceremony of the worldcup 2010 South Africa, we look so many attraction, passion, couriousity and a lot of fun there, That moment inspiring ubuntubuzz to bring a high quality music wallpapers with the name "the glorious moment of the concert hall", we bring great atmospher of the concert of popular artist around the world. Here we come to all music lover to display our special choosen picture in their lovely ubuntu desktop taken from flickr, have fun ..
  • James tylor  Aerosmith
  • From the moment of Rock in Rio, Madrid 2009


Data is an important asset owned by company, data which is the raw of information require a necessary method how keep and preserve well, to reduce the impact of damage and data loss which possibility occur. Backup and restore procedure that a part of disaster recovery planning is one of the way that can be perform to reduce the impact of data disaster. From statement above we can conclude that  all of us need to ensure all important data of us or our company must be backup well. And now the answer is, how to design a reliable backup and restore system which can run on linux ?
To design or build backup and restore system we must have reliable tool to move data from source to destination via network, lucky we have rsync running in linux operating system. Rsync is such application which can move data (use incremental method) from one computer to another through ftp, scp, and ssh, rsync is small and multi perform application which can be use as server or client.  

Step 1
First time before you start build a system we must describe what system we want to build otherwords describe fungsional and non fungsional sytem requirement then design the layout of application.

Step 2
Step 2 we must prepare our system and install all required application, for this section for required application we can install ssh-server, mysql5.0-server, and rsync as main application. with no less important  don't forget to describe supporting factors such database design, working directory, and previllages user to run.

Step 3
Important part of backup and restore system is script to copy/move data form one computer to another, for this section i have provide some script write in bash language that found in internet then modified it then you can download by following this link. Maybe you can't use script given directly, you can modified that script and fit to your system.  I will give explanation to have clear illustration, you can open the script while read this.
  • This script is running by cron, work valid by parameter save in file (/var/www/LIBT/exec/. That file configuration contain of  backup parameter such us name of session, rsync parameter, source and destination mechines. this file writen by application interface (you can build by your self) which help user to descibe backup session they want to build.
  • This script work to manage/colaborate supported application like rsync, mv, cp, mysql, chmod, chown, etc.
  • Plot of backup procedure of this script is  -- [read configuration file] -- [check input parameter given] -- [decide local/remote backup] -- [perform backup/rotate backup] -- [write log/give feedback]-- .This script can due incremental backup so if you have running the same backup before, system will save previous data backup and make a new copy of data backup, this important procedure can be use to implemented restore point.


Growth of web 2.0 era make competition of software developer race to bring best performance and usability of website. Many of paltform such Adobe Flex, JavaFX, and Microsoft Silverlight competing to conquer programmer to use theirs product and bring rich internet application to the best performance of website. Especially in Linux/Ubuntu we have application called Moonlight to help running/displaying Microsoft Silverlight Application platform on linux/ubuntu desktop. Here step by step installing Moonlight add-on on Mozilla Firefox so that you can run Microsoft Silverlight in your Ubuntu 10.04 desktop.
  • Choose the application platform, this platform is depend on what kind of operating system installed in your desktop, If you have 64bit proccessor but you had install 32bit operating system, wise for us to choose 32bit platform.
Choose the application platform
  • Download and install the Moonlight add-on to firefox, the Moonlight plugin has 3.8Mb size and need  approximately 3 minute to be installed. When installing the Novell Moonlight plugin, Firefox may prevent the installation and present you with an information bar, to continue the installation click "edit option" and allow add-on to be installed.
Installing Moonlight add-on to Firefox

  • If installation process has complate with no error, you have succesfull installed Moonlight  add-on on your Mozilla Firefox, to start using this plugin restart the browser and you have Mozilla Firefox Silverlight friendly then.
  • If you interest to compare the performance of Adobe Flex, JavaFX, and Microsoft Silverlight, i suggest you to visit this link to get explanation and ilustration.


Wine is a linux application which lets us  to run windows application in Linux OS family, yesterday (16 july 2010) winehq has released new stable version of Wine 1.2, the development team has claimed almost 3.000 bugs fixed and more than 23.000 changes. here they are several change we found at wine 1.2 Stable. 
  • Wine 1.2 support on x86-64 processors and also support for 64 bit applications.
  • There are new icons for all the built-in applications based on the Tango set for a nicer integration with the native Unix desktop look. 
  • Smoth looking on LCD Screen, The subpixel configuration is derived from the system fontconfig and Xft settings.
  • The OLE storage performance can degrade pretty badly on files with a particular layout.
That is simple way to installed wine 1.2 on Ubuntu Lucid Lynx, if you already have installed previous version of Wine you can upgrade using aptitude by following instructions below.
sudo add-apt-repository ppa:ubuntu-wine/ppa 
sudo apt-get update && sudo apt-get upgrade wine
if want perform fresh install of wine 1.2, change "sudo apt-get upgrade wine" above with "sudo apt-get install wine".

OpenSUSE which Free/OpenSource version of Linux SUSE Enterprise, is various version of linux distro developed (supported) by novell. Yesterday (07/15/2010)
openSUSE has release openSUSE 11.3 Stable with support for 32-bit and 64-bit system. The new openSUSE 11.3 bring bright application named spideroak which can perform an online backup and file syncronizing trough internet for free, to get latest version of openSUSE can be downloaded in here.

Cisco IOS is an operating system by Cisco System which offer a better way to build a managable netwok interconnection, this operating system used on the vast majority of Cisco Router and Cisco Network Switch. As article i wrote in ubuntubuzz, here the list of Cisco IOS can be used for GNS3, Dynamips, or Dynagen :

Dear visitor,
We were sorry that we can't provide free download cisco ios images on this page (anymore), we afraid of breaking "Free Open Source Software" rule and violate some cisco authorities about legal software, very unfortunate that Cisco does not provide any flexibility to CCNA, CCNP, CCIE students to learn more about cisco Routers/Switch by provide a free IOS For Download. 


For complete instruction the way to use Cisco IOS for simulating a Cisco Router and Cisco Network Switch, see my previous article here.

Cisco Network is well perform network equipment and platform, there are many companys in the world entrust their network being handle by this instrument. A lot of advantages we get if we know much about this network equipment eventhough it's not simple way to learn more about all Cisco Netwok familly. 

Not only Microsoft, Java, or Oracle, Cisco System provide Cisco Netwok Career Certifications which provide profesional IT certification for Cisco System Product such us CCNA, CCDA, CCNP, CCDP, CCSP, CCVP, and CCNA Security. There are five levels of certification: Entry, Associate, Professional, Expert, and Architect, as well as seven different paths, Routing & Switching, Design, Network Security, Service Provider, Storage Networking, Voice, and Wireless.

My personal opinion Cisco Netwok Career Certifications is not cheap, but it's very important for profesional network engginer to have it.  get the best preparation is the best effort we can do. There are many network/cisco simulator in a market as we know Boson, Networksim and All official Network simulator form Cisco System that can be install in our desktop and we can learn from it.

FBlogger in draft special version of Blogger where the Blogger development team try out the new features before they release them to everyone, to access google in draft you can go to http://draft.blogger.com/, if you already have blogspot account or blog you can make this (draft.blogger.com) to your default dashboard. Blogger already have beautifful change based on google in draft and it's review, see what different from it's old version of Blogger.

Blogger Stat, Built-in blog statistics made blog monitoring as easy as Google Analytics
Blogger stat is one of the the new feature of Blogger, Blogger Stat is built-in blogger tools for monitoring blog statistics and track your blog traffic, if you wanna start using this feature Just go to Blogger in Draft, and you'll notice a new "Stats" tab. You don't have to install or configure anything to start benefitting from Stats.
Blogger Stat of traffic inbound
Blogger Stat show mount of visitor 

Ubuntu One is the personal cloud service that simplifies your digital life. Ubuntu one is such application bundled with Ubuntu OS which help us to keep in touch by sharing, buying, searching, manage file, data or music with other people using internet, ubuntu one serve new experience of data sharing. Imagine buying music and getting it delivered to the computers of your choice or synchronizing your files and notes and accessing them from anywhere. Or consolidating your computer and mobile phone contacts and safely sharing documents and pictures with them. Ubuntu One can already do this and more (https://one.ubuntu.com/).
To start using this service we can go to http://one.ubuntu.com/account then create new account (user & password) and follow the instructions or follow theh directions in this link.


Domain is important part of website or blog, domain could become a powerfull brand if we made seriously. There are lot of service whom provide free domain and hosting for us to make a new website and blog such wordpress and blogger, but in a same time they don't serve a niche domain for us to made a powerfull brand for our website or blog. As i read in blogoscoped.com there’s a few things you might need to adjust in the different Google apps when changing/moving to a new domain from wordpress/blogger to comercial domain (for eexample  we would change blogger domain from old.blogspot.com to new.com):
  • Add the new domain in your AdSense channels
    Choose AdSense -> AdSense Setup -> Channels -> URL Channels -> Add new URL channels
  • Change your reply-to address in Gmail, if you used a redirect
    Choose Gmail -> Settings -> Accounts -> Edit info
  • Change your signature in Gmail, if you used the old domain name in it Choose Gmail -> Settings
  • Add your domain into the Google Webmaster Tools
    Choose Google Webmaster Tools -> Add Site (you then need to verify your site by e.g. uploading an HTML file)
  • Tell Google Webmaster Tools your preferred domain, and allow advanced image functionality
    Choose Google Webmaster Tools -> [your domain] -> Preferred domain/ Enhanced image search
  • If you’re using the AJAX Search API, generate a new key to work with your domain
    Choose Google AJAX Search API -> Generate API Key





Backtrack is the most attractive security tools now days, using this swish army knive (backtrack) we have more than 300 security tools which can be use to penetrate and evaluate network security in wired or wireless network. As my tutorial before in how to install backtrack on ubuntu 10.04 here the new guidance how to install Backtrack on USB Flash Drive. Before we start, it's better if you download the latest version of backtrack first here.
Installing Backtrack on USB Flash Drive via Ubuntu  
Using Ubuntu 10.04 you have a simplest way to make backtrack running on your USB Flash Drive, just prepare the backtrack .iso image then go to System > Administration > Startup Disk Creator.