// API callback
readpostlabels({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789"},"updated":{"$t":"2024-08-12T18:26:29.602+07:00"},"category":[{"term":"gnu\/linux"},{"term":"Ubuntu"},{"term":"free software"},{"term":"new operating system release"},{"term":"beginner's guide"},{"term":"Review"},{"term":"libreoffice"},{"term":"tips and trick"},{"term":"Application"},{"term":"package management system"},{"term":"Gnome"},{"term":"desktop environment"},{"term":"PPA"},{"term":"iso download links"},{"term":"kde plasma desktop"},{"term":"beginner"},{"term":"KDE"},{"term":"Kubuntu"},{"term":"news"},{"term":"big list"},{"term":"how to install operating system"},{"term":"linux"},{"term":"ubuntu 18.04"},{"term":"Privacy"},{"term":"trisquel"},{"term":"ubuntu 20.04 focal fossa"},{"term":"LTS"},{"term":"ubuntu 17.10"},{"term":"firefox"},{"term":"what to do after"},{"term":"bionic beaver"},{"term":"Tutorial"},{"term":"elementary os"},{"term":"Debian"},{"term":"Security"},{"term":"inkscape"},{"term":"command lines"},{"term":"Linux Mint"},{"term":"artful aardvark"},{"term":"AppImage"},{"term":"desktop"},{"term":"graphic design"},{"term":"programming"},{"term":"uefi"},{"term":"Video"},{"term":"Education"},{"term":"Release"},{"term":"flatpak"},{"term":"internet tool"},{"term":"libreoffice writer"},{"term":"customization"},{"term":"file manager"},{"term":"gnome shell extension"},{"term":"unity"},{"term":"Android"},{"term":"Installation"},{"term":"cinnamon"},{"term":"gimp"},{"term":"ebook"},{"term":"ubuntu 22.04 jammy jellyfish"},{"term":"ubuntu 24.04 noble numbat"},{"term":"PDF"},{"term":"how to"},{"term":"kernel"},{"term":"telegram"},{"term":"terminal"},{"term":"xfce"},{"term":"download"},{"term":"libreoffice calc"},{"term":"opendocument format"},{"term":"xubuntu"},{"term":"multiboot"},{"term":"applications recommendation"},{"term":"external hard disk drive"},{"term":"torrents"},{"term":"Intermezo"},{"term":"Ubuntu 12.04"},{"term":"command line"},{"term":"gnu"},{"term":"DeepIn"},{"term":"grub"},{"term":"opensuse"},{"term":"apt-get"},{"term":"snap"},{"term":"Game"},{"term":"Upgrade"},{"term":"apt"},{"term":"dualboot"},{"term":"new desktop environment release"},{"term":"scribus"},{"term":"usb bootable"},{"term":"zotero"},{"term":"bootloader"},{"term":"examples"},{"term":"guide"},{"term":"nautilus"},{"term":"trisquel 8"},{"term":"ubuntu 17.04"},{"term":"Thunderbird"},{"term":"alternative"},{"term":"degoogle"},{"term":"dolphin"},{"term":"fedora"},{"term":"kde neon"},{"term":"livecd"},{"term":"switching from windows to gnu\/linux"},{"term":"wifi"},{"term":"Server"},{"term":"Torrent"},{"term":"Wallpapers"},{"term":"bulk convert"},{"term":"spreadsheet"},{"term":"tweaking"},{"term":"ubuntu 11.10"},{"term":"Networking"},{"term":"bionic beginner's guide the series"},{"term":"community"},{"term":"element"},{"term":"email"},{"term":"fully free gnu\/linux distros"},{"term":"glim"},{"term":"gpt"},{"term":"hardware"},{"term":"instant messenger"},{"term":"jitsi"},{"term":"lubuntu"},{"term":"multimedia"},{"term":"repository"},{"term":"school"},{"term":"ubuntu 19.04"},{"term":"zorin os"},{"term":"bootable"},{"term":"disco dingo"},{"term":"federated social network"},{"term":"free software community"},{"term":"install"},{"term":"java"},{"term":"juno"},{"term":"mastodon"},{"term":"matrix"},{"term":"new free software release"},{"term":"pantheon"},{"term":"qt"},{"term":"budgie desktop environment"},{"term":"debian 10"},{"term":"gnome shell"},{"term":"gnome tweak tool"},{"term":"imap"},{"term":"korganizer"},{"term":"nextcloud"},{"term":"open source"},{"term":"ubuntu 19.10"},{"term":"update"},{"term":"Gnome-shell"},{"term":"MATE"},{"term":"c++"},{"term":"checksums"},{"term":"collection"},{"term":"eoan ermine"},{"term":"gafam"},{"term":"geany"},{"term":"gnome 3.26"},{"term":"gnome 3.30"},{"term":"gnome disk utility"},{"term":"gnu\/linux computer vendors"},{"term":"hard disk drive"},{"term":"imagemagick"},{"term":"inkscape for students the series"},{"term":"introduction"},{"term":"iso"},{"term":"laptop"},{"term":"libreoffice math"},{"term":"peertube"},{"term":"sed"},{"term":"unity desktop environment"},{"term":"usb"},{"term":"virtual machine"},{"term":"windows"},{"term":"writer"},{"term":"xmpp"},{"term":"CLI"},{"term":"Mozilla"},{"term":"bios"},{"term":"buster"},{"term":"chrome"},{"term":"chromium"},{"term":"command"},{"term":"command lines tutorial the series"},{"term":"compilation"},{"term":"cosmic cuttlefish"},{"term":"debian 12 bookworm"},{"term":"flash disk drive"},{"term":"gnome 3.32"},{"term":"gnu gpl"},{"term":"hacking"},{"term":"linux mint 19"},{"term":"lxde"},{"term":"qt creator"},{"term":"thunar"},{"term":"trisquel flidas guide"},{"term":"troubleshooting"},{"term":"ubuntu 21.10 impish indri"},{"term":"wtdai"},{"term":"youtube"},{"term":"FFmpeg"},{"term":"bash looping"},{"term":"canonical"},{"term":"configuration"},{"term":"deb"},{"term":"deepin 20"},{"term":"dpkg"},{"term":"ethical online service"},{"term":"f-droid"},{"term":"gnome 3"},{"term":"gtk"},{"term":"how to upgrade ubuntu"},{"term":"invidious"},{"term":"kubuntu artful guide"},{"term":"mageia"},{"term":"mate desktop"},{"term":"mozilla firefox"},{"term":"netbeans"},{"term":"office"},{"term":"oneiric"},{"term":"partition"},{"term":"plasma 5.15"},{"term":"qemu"},{"term":"selfhosting"},{"term":"soffice"},{"term":"source code"},{"term":"synaptic"},{"term":"themes"},{"term":"thinkpad"},{"term":"tips"},{"term":"tips and tricks"},{"term":"ubuntu 16.04"},{"term":"ubuntu 18.10"},{"term":"ubuntu mate"},{"term":"video call"},{"term":"visual basic alternatives"},{"term":"vlc"},{"term":"0ad"},{"term":"32-bit"},{"term":"Blankon"},{"term":"Cloud"},{"term":"Hotspot"},{"term":"Manual"},{"term":"Precise Pangolin"},{"term":"Video Tutorial"},{"term":"alternative world"},{"term":"backup"},{"term":"beta 2"},{"term":"bittorrent"},{"term":"comparison"},{"term":"covid19"},{"term":"crop"},{"term":"dde"},{"term":"deepin 15.4"},{"term":"download accelerator"},{"term":"electronic engineering"},{"term":"extension"},{"term":"floss alternatives"},{"term":"fsf certified distro"},{"term":"games"},{"term":"gmail"},{"term":"gtk3"},{"term":"iso image"},{"term":"lenovo"},{"term":"libreoffice writer guide series"},{"term":"linux mint 20 ulyana"},{"term":"magazine"},{"term":"mail client"},{"term":"microsoft excel alternatives"},{"term":"network manager"},{"term":"obs studio"},{"term":"offline"},{"term":"openmandriva"},{"term":"proxy"},{"term":"rss feeds"},{"term":"solution"},{"term":"svg"},{"term":"ubuntu 20.10 groovy gorilla"},{"term":"ubuntu 21.04 hirsute hippo"},{"term":"user interface"},{"term":"xenial xerus"},{"term":"yakkety yak"},{"term":"Blogging"},{"term":"Business"},{"term":"Linux News"},{"term":"accessibility"},{"term":"android phone"},{"term":"aqemu"},{"term":"browser"},{"term":"calendar"},{"term":"dark theme"},{"term":"deb package"},{"term":"desktop publishing"},{"term":"desktop theme"},{"term":"documentation"},{"term":"editor"},{"term":"encryption"},{"term":"equation editor"},{"term":"fediverse"},{"term":"file sharing"},{"term":"fix"},{"term":"font"},{"term":"gui"},{"term":"icon"},{"term":"impress"},{"term":"lxqt"},{"term":"mathematics"},{"term":"microsoft office alternative"},{"term":"mozilla thunderbird"},{"term":"nemo"},{"term":"official flavors"},{"term":"openvpn"},{"term":"operating system release"},{"term":"prozilla"},{"term":"qt framework"},{"term":"raspberry pi"},{"term":"rolling release"},{"term":"screencasting"},{"term":"snappy"},{"term":"software development"},{"term":"source code hosting"},{"term":"sources.list"},{"term":"survey"},{"term":"teacher"},{"term":"ubuntu 16.10"},{"term":"ubuntu software center"},{"term":"ubuntubuzz magazine"},{"term":"utility"},{"term":"video conference"},{"term":"video editor"},{"term":"wayland"},{"term":"yaru theme"},{"term":"IRC"},{"term":"Mandriva"},{"term":"Mobile"},{"term":"Raring Ringtail"},{"term":"Text Editor"},{"term":"adobe"},{"term":"arabic"},{"term":"bash"},{"term":"bibliography"},{"term":"bigbluebutton"},{"term":"blender"},{"term":"client"},{"term":"convert"},{"term":"converter"},{"term":"cpp"},{"term":"custom distro"},{"term":"deepin 15.3"},{"term":"default applications"},{"term":"desktop language"},{"term":"disroot"},{"term":"dnscrypt"},{"term":"download manager"},{"term":"enigmail"},{"term":"epub"},{"term":"error"},{"term":"fcm"},{"term":"file type association"},{"term":"firefox addon"},{"term":"floss"},{"term":"formula"},{"term":"freecad"},{"term":"gnome 3.34"},{"term":"gnome 3.36"},{"term":"gnome evolution"},{"term":"google"},{"term":"gui designer"},{"term":"image editor"},{"term":"internet"},{"term":"iridium browser"},{"term":"kde connect"},{"term":"keepassxc"},{"term":"libreoffice 6.0"},{"term":"libreoffice templates"},{"term":"memory usage comparison"},{"term":"messenger"},{"term":"migration"},{"term":"movim"},{"term":"neon"},{"term":"notebookbar"},{"term":"odf"},{"term":"onlyoffice"},{"term":"operation tulip"},{"term":"pacman"},{"term":"persepolis download manager"},{"term":"phone"},{"term":"revive old computers"},{"term":"rss reader"},{"term":"serena"},{"term":"slackware"},{"term":"spss alternatives"},{"term":"startpage.com"},{"term":"switch from whatsapp"},{"term":"system76"},{"term":"tor"},{"term":"trick"},{"term":"ubuntu 18.04 bionic beaver"},{"term":"ubuntu budgie"},{"term":"ubuntu phone"},{"term":"ubuntu unity remix"},{"term":"website"},{"term":"wine"},{"term":"16.04"},{"term":"ASCII"},{"term":"Animation"},{"term":"Children"},{"term":"Deepin File Manager"},{"term":"Dock"},{"term":"Drivers"},{"term":"Eclipse"},{"term":"FOSS"},{"term":"Information"},{"term":"Misclenous"},{"term":"Quantal Quetzal"},{"term":"Release Schedule"},{"term":"Simulation"},{"term":"Ubuntu 12.10"},{"term":"Web"},{"term":"air"},{"term":"appcenter"},{"term":"audio"},{"term":"audio video conversion"},{"term":"bulk processing"},{"term":"caja"},{"term":"calamares"},{"term":"cinelerra"},{"term":"citation"},{"term":"communication"},{"term":"compile from source"},{"term":"computer"},{"term":"database"},{"term":"debian 11"},{"term":"debian kde"},{"term":"debian live edition"},{"term":"deepin 15.10"},{"term":"deepin 15.6"},{"term":"desktop client"},{"term":"development"},{"term":"distro comparison"},{"term":"dnf"},{"term":"document"},{"term":"download .odf"},{"term":"download .odt"},{"term":"dropbox"},{"term":"dual boot"},{"term":"dvd"},{"term":"elementary os 6"},{"term":"emacs"},{"term":"eye candy"},{"term":"fedora 34"},{"term":"fedora 38"},{"term":"file archiving"},{"term":"flathub"},{"term":"fonts"},{"term":"gcc"},{"term":"geda"},{"term":"getting started"},{"term":"gitea"},{"term":"gnome 42"},{"term":"google calendar"},{"term":"guix"},{"term":"hack"},{"term":"how to download operating system"},{"term":"i386"},{"term":"icedove"},{"term":"init freedom"},{"term":"keepassx"},{"term":"keyboard layout"},{"term":"kvm"},{"term":"latex"},{"term":"liberation fonts"},{"term":"libreoffice 6.2"},{"term":"libreoffice extension"},{"term":"libreoffice impress"},{"term":"librepcb"},{"term":"linux-libre"},{"term":"magazines"},{"term":"mageia 9"},{"term":"mail merge"},{"term":"mbr"},{"term":"menu"},{"term":"microsoft word alternatives"},{"term":"mirrors"},{"term":"mx linux"},{"term":"ods"},{"term":"online"},{"term":"openoffice"},{"term":"parabola gnu\/linux"},{"term":"password management"},{"term":"photography"},{"term":"plasma 5.18"},{"term":"poppler-utils"},{"term":"poster"},{"term":"pureos"},{"term":"recovery"},{"term":"riot\/matrix"},{"term":"screenshot"},{"term":"search engine"},{"term":"settings"},{"term":"shutter"},{"term":"snap packages"},{"term":"statistical analysis"},{"term":"supertuxkart"},{"term":"switching from github"},{"term":"synfig studio"},{"term":"system settings"},{"term":"systemd"},{"term":"tara"},{"term":"teaching"},{"term":"testing"},{"term":"trisquel 11"},{"term":"trisquel 9"},{"term":"twitter"},{"term":"ublock origin"},{"term":"ubuntu 22.10 kinetic kudu"},{"term":"ubuntu 23.04 lunar lobster"},{"term":"ubuntu-planet"},{"term":"unity tweak tool"},{"term":"virtualbox"},{"term":"virtualization"},{"term":"voice call"},{"term":"web browser"},{"term":"wxwidgets"},{"term":"xonotic"},{"term":"Alarm"},{"term":"Ambiance"},{"term":"Award"},{"term":"BitTorret"},{"term":"BlackBerry"},{"term":"Data Safety"},{"term":"Design"},{"term":"GNU dd"},{"term":"Graphic"},{"term":"Islam"},{"term":"Mac to Ubuntu"},{"term":"Plugin"},{"term":"Quran"},{"term":"Red Hat"},{"term":"Sharing"},{"term":"Ubuntu TV"},{"term":"Zekr"},{"term":"aguslr's multiboot usb"},{"term":"alacarte"},{"term":"alternative fonts"},{"term":"anonymity"},{"term":"apache"},{"term":"baobab"},{"term":"bitmessage"},{"term":"c programming"},{"term":"calc"},{"term":"caldav"},{"term":"centos"},{"term":"chat"},{"term":"chinese"},{"term":"clock"},{"term":"codeberg.org"},{"term":"collabora"},{"term":"college"},{"term":"compiz"},{"term":"computer aided design"},{"term":"coreldraw alternatives"},{"term":"debian 9"},{"term":"deepin 15.5"},{"term":"desktop environment review"},{"term":"desktop icons"},{"term":"development version"},{"term":"digital dictionary"},{"term":"do-release-upgrade"},{"term":"electronic design automation"},{"term":"elementary os 7"},{"term":"end of life"},{"term":"eol"},{"term":"espeak"},{"term":"excel alternatives"},{"term":"ext4"},{"term":"facebook"},{"term":"fcitx"},{"term":"fedora 32"},{"term":"file archiver"},{"term":"filesystem"},{"term":"firefox os"},{"term":"fixing"},{"term":"flowblade"},{"term":"framasoft"},{"term":"free downloads"},{"term":"fruux"},{"term":"gambas"},{"term":"game creation software"},{"term":"games recommendation"},{"term":"gitlab"},{"term":"gmail alternative"},{"term":"gnome 3.25"},{"term":"gnome 3.28"},{"term":"gnome 40"},{"term":"gnome 43"},{"term":"gnome 44"},{"term":"gnome 46"},{"term":"gnome calendar"},{"term":"gparted"},{"term":"grub bootloader"},{"term":"https everywhere"},{"term":"icon theme"},{"term":"ide"},{"term":"image converter"},{"term":"inkscape 0.92.4"},{"term":"input method"},{"term":"integrate"},{"term":"internet decentralization"},{"term":"japanese"},{"term":"kde 4"},{"term":"kde 5"},{"term":"kicad"},{"term":"kim"},{"term":"language"},{"term":"laptop with linux"},{"term":"learning"},{"term":"lightdm"},{"term":"lightweight distro"},{"term":"linux mint 19.1"},{"term":"liveusb"},{"term":"loki"},{"term":"lubuntu 18.10"},{"term":"mass production"},{"term":"merge"},{"term":"microsoft"},{"term":"microsoft excel"},{"term":"mkv"},{"term":"mockup"},{"term":"mozc"},{"term":"mp4"},{"term":"mysql"},{"term":"network speed indicator"},{"term":"new libreoffice release"},{"term":"newbie"},{"term":"notabug.org"},{"term":"office suite"},{"term":"online storage"},{"term":"openjdk"},{"term":"openshot video editor"},{"term":"pcmanfm"},{"term":"pine64"},{"term":"plasma 5.10"},{"term":"plasma 5.10.5"},{"term":"plasma 5.11"},{"term":"portable"},{"term":"preview"},{"term":"printing"},{"term":"purism librem"},{"term":"regex"},{"term":"screencast"},{"term":"signal"},{"term":"sk1"},{"term":"slax"},{"term":"snapcraft.io"},{"term":"ssh"},{"term":"star labs"},{"term":"statistics"},{"term":"student"},{"term":"summary"},{"term":"syncthing"},{"term":"system tray"},{"term":"template"},{"term":"text formatting"},{"term":"text to speech"},{"term":"translation"},{"term":"ubiquity"},{"term":"ubuntu 23.10 mantic minotaur"},{"term":"ubuntu touch"},{"term":"ubuntu tweak"},{"term":"ubuntubuzz thematic ebook"},{"term":"unity 8"},{"term":"usb tethering"},{"term":"video editing"},{"term":"virt-manager"},{"term":"whatsapp alternatives"},{"term":"wlan"},{"term":"word processor"},{"term":"wordpress"},{"term":"www.privacytools.io"},{"term":"yunohost"},{"term":"zesty zapus"},{"term":"zsync"},{"term":"1.5"},{"term":"15.10"},{"term":"17.04"},{"term":"32 bit"},{"term":"Administrator"},{"term":"Audio Editor"},{"term":"Backtrack"},{"term":"Chrome OS"},{"term":"Contest"},{"term":"Enterprise"},{"term":"Gedit"},{"term":"HUD"},{"term":"IEEE"},{"term":"Linus Trovalds"},{"term":"Mac"},{"term":"Note"},{"term":"Opera"},{"term":"PRISM"},{"term":"ROSA"},{"term":"Skype"},{"term":"Success"},{"term":"Sweet Home 3D"},{"term":"Tablet"},{"term":"Tweak"},{"term":"Ubuntu Edge"},{"term":"Ubuntu One"},{"term":"abrowser"},{"term":"academic"},{"term":"almalinux"},{"term":"alpha 2"},{"term":"alpha version"},{"term":"apt-cache"},{"term":"apt-proz"},{"term":"apt-rdepends"},{"term":"arch"},{"term":"ardour"},{"term":"art"},{"term":"audio conference"},{"term":"audio recording"},{"term":"autosave"},{"term":"average"},{"term":"b2g"},{"term":"bandwidth monitoring"},{"term":"bash shell"},{"term":"basic"},{"term":"beta 1"},{"term":"beta review"},{"term":"bitmap"},{"term":"blankon 11"},{"term":"blkid"},{"term":"blogger.com"},{"term":"boot"},{"term":"booting"},{"term":"branded gnu\/linux laptop"},{"term":"brightness"},{"term":"buckwalter"},{"term":"bulk resizing"},{"term":"bullseye"},{"term":"c language"},{"term":"cad"},{"term":"calibre"},{"term":"charts"},{"term":"chatting"},{"term":"checksum"},{"term":"cloudtube"},{"term":"cnc machines"},{"term":"codeblocks"},{"term":"codecs"},{"term":"collection of laptop reviews"},{"term":"collective resources"},{"term":"columns"},{"term":"compton compositor"},{"term":"conecto"},{"term":"count"},{"term":"cryptpad"},{"term":"deepin 15.11"},{"term":"deepin 15.7"},{"term":"deepin desktop"},{"term":"dejavu fonts"},{"term":"dell"},{"term":"delta chat"},{"term":"dependency"},{"term":"disk drive"},{"term":"disk partitioning"},{"term":"disk usage analyzer"},{"term":"dns"},{"term":"dns leak"},{"term":"dns over https"},{"term":"dns over tls"},{"term":"doc"},{"term":"docx"},{"term":"drop shadow"},{"term":"dtk"},{"term":"duckduckgo.com"},{"term":"elementary tweaks"},{"term":"emerald"},{"term":"emulator"},{"term":"etiona"},{"term":"evolus pencil"},{"term":"fdisk"},{"term":"figma alternatives"},{"term":"file manager comparison"},{"term":"file searching"},{"term":"firefox 57"},{"term":"flareget"},{"term":"free ebook"},{"term":"freetube"},{"term":"full circle"},{"term":"g++"},{"term":"gala"},{"term":"galago pro"},{"term":"gdevelop"},{"term":"gif"},{"term":"gnome 3.22"},{"term":"gnome 45"},{"term":"gnome control center"},{"term":"gnome seahorse"},{"term":"gnome shell theme"},{"term":"gnome software"},{"term":"gnu agpl"},{"term":"gnu freefont"},{"term":"gnu jami"},{"term":"gnu operating system"},{"term":"gnu pspp"},{"term":"gnu ring"},{"term":"gnupg"},{"term":"godot engine"},{"term":"gogs"},{"term":"google chrome alternative"},{"term":"gratis"},{"term":"gtile"},{"term":"gtk4"},{"term":"gtkmm"},{"term":"h-node"},{"term":"hera"},{"term":"hiragana"},{"term":"horror"},{"term":"html5"},{"term":"hyperbola gnu\/linux"},{"term":"hyphenation"},{"term":"i18n"},{"term":"id cards"},{"term":"image"},{"term":"indicator"},{"term":"indicator-multiload"},{"term":"infographic"},{"term":"inkscape 1.0"},{"term":"inkscape extension"},{"term":"insync"},{"term":"internet archive"},{"term":"internet of things"},{"term":"k3b"},{"term":"katakana"},{"term":"kazam"},{"term":"kde 5.9"},{"term":"kdenlive"},{"term":"kindle"},{"term":"kmail"},{"term":"knotes"},{"term":"ksuperkey"},{"term":"ktorrent"},{"term":"kvantum"},{"term":"l10n"},{"term":"launchpad"},{"term":"layout"},{"term":"lazarus"},{"term":"librecad"},{"term":"libreho.st"},{"term":"libreoffice 5.3"},{"term":"libreoffice 7"},{"term":"libreoffice 7.6"},{"term":"libreofice"},{"term":"licensing"},{"term":"lightning addon"},{"term":"linux kernel"},{"term":"linux mint 18.1"},{"term":"linux mint 18.2"},{"term":"lmms"},{"term":"lock screen"},{"term":"lsblk"},{"term":"lubuntu next"},{"term":"mac address"},{"term":"macro"},{"term":"mailo"},{"term":"manjaro"},{"term":"manokwari"},{"term":"mattermost"},{"term":"migrate from github"},{"term":"modification"},{"term":"mouse pointer"},{"term":"movie"},{"term":"movie maker alternatives"},{"term":"multitab"},{"term":"mumble"},{"term":"natron"},{"term":"new distribution release"},{"term":"newpipe"},{"term":"news subscriptions"},{"term":"ngspice"},{"term":"nixnet"},{"term":"nload"},{"term":"odp"},{"term":"odt"},{"term":"okular pdf reader"},{"term":"online accounts"},{"term":"online calendar."},{"term":"opengl"},{"term":"openra"},{"term":"opt out global surveillance"},{"term":"oxygen desktop theme"},{"term":"p2p"},{"term":"packages.ubuntu.com"},{"term":"paragraph styles"},{"term":"parallel installs"},{"term":"partitioning"},{"term":"pavucontrol"},{"term":"pcmanfm-qt"},{"term":"pdfsam"},{"term":"pdftoppm"},{"term":"photo"},{"term":"pidgin"},{"term":"pine64 pinebook"},{"term":"pipewire"},{"term":"plasma"},{"term":"plasma 5.16"},{"term":"plasma 5.24"},{"term":"plasma 5.9"},{"term":"plasma mobile"},{"term":"plasma vault"},{"term":"point release"},{"term":"pomodoro"},{"term":"powerpoint alternatives"},{"term":"powerpoint to impress"},{"term":"printer"},{"term":"prompt"},{"term":"raspbian"},{"term":"recent documents"},{"term":"record desktop"},{"term":"recording"},{"term":"red eclipse"},{"term":"remastering"},{"term":"remote desktop"},{"term":"repair"},{"term":"research"},{"term":"resources"},{"term":"restore"},{"term":"rocketchat"},{"term":"rpm"},{"term":"rufus"},{"term":"rust programming language"},{"term":"scan"},{"term":"schildichat"},{"term":"science"},{"term":"scrcpy"},{"term":"screen"},{"term":"screenshot tool"},{"term":"script"},{"term":"sdl"},{"term":"searx"},{"term":"sftp"},{"term":"shortcut keys"},{"term":"simplified chinese"},{"term":"simulide"},{"term":"skype replacement"},{"term":"slack.com"},{"term":"slideshow"},{"term":"social network"},{"term":"socks"},{"term":"software center"},{"term":"software updater"},{"term":"solus os"},{"term":"sound volume"},{"term":"source dvd"},{"term":"split"},{"term":"stand alone"},{"term":"stardict"},{"term":"storage"},{"term":"students"},{"term":"sum"},{"term":"super key"},{"term":"table"},{"term":"task management"},{"term":"text"},{"term":"text editing"},{"term":"the series"},{"term":"threema"},{"term":"tomboy"},{"term":"toolbar"},{"term":"touchpad"},{"term":"tox"},{"term":"transmission"},{"term":"ubports"},{"term":"ubuntu preinstalled"},{"term":"ui\/ux design"},{"term":"uluwatu"},{"term":"unetbootin"},{"term":"ungoogled chromium"},{"term":"uruk"},{"term":"usage"},{"term":"user guide"},{"term":"user guide book"},{"term":"vector editor"},{"term":"video recording"},{"term":"visual studio alternatives"},{"term":"vlookup"},{"term":"vnstat"},{"term":"voip"},{"term":"volla"},{"term":"wallpaper"},{"term":"warzone 2100"},{"term":"webcam"},{"term":"webgl"},{"term":"widget"},{"term":"writeas"},{"term":"wvdial"},{"term":"xampp"},{"term":"youtube alternatives"},{"term":"zulip"},{"term":"\/e\/"},{"term":"12.10"},{"term":"15.04"},{"term":"16"},{"term":"16.04.3"},{"term":"16.04.4"},{"term":"16.04.5"},{"term":"2.0"},{"term":"2017"},{"term":"2019"},{"term":"2023 calendar"},{"term":"2d"},{"term":"3.4"},{"term":"3d"},{"term":"3d desktop"},{"term":"7z"},{"term":"8.7"},{"term":"Accomplishments"},{"term":"Adobe AIR"},{"term":"Anonymous"},{"term":"AppImageUpdate"},{"term":"Apple"},{"term":"Apport"},{"term":"Archiver"},{"term":"Azure"},{"term":"Chromuim OS"},{"term":"Clound computing"},{"term":"Code"},{"term":"Comic"},{"term":"Currency"},{"term":"DouDouLinux 1.0"},{"term":"Drawers"},{"term":"DreadOut"},{"term":"EasyStroke"},{"term":"FPS"},{"term":"File"},{"term":"Google+"},{"term":"IDM"},{"term":"IOS"},{"term":"Imgur"},{"term":"Indie"},{"term":"Islamic"},{"term":"Joli Cloud"},{"term":"Launcher"},{"term":"Linux Action Show"},{"term":"MaaS"},{"term":"Management"},{"term":"Mark Shuttleworth"},{"term":"Marlin"},{"term":"Monitor"},{"term":"Music"},{"term":"Nokia"},{"term":"Notetaking"},{"term":"Nvidia"},{"term":"Popular"},{"term":"Quote"},{"term":"RTOS"},{"term":"Ramadaan"},{"term":"Release Party"},{"term":"Skolelinux"},{"term":"Sneak Peak"},{"term":"Steve Jobs"},{"term":"Store"},{"term":"TextMate"},{"term":"Ubuntu 12.04 Server"},{"term":"Ubuntu Dash"},{"term":"Ubuntu OS"},{"term":"Ubuntu-ID Summit"},{"term":"Vuse"},{"term":"WebApp"},{"term":"Windows 8"},{"term":"Wireless"},{"term":"Wordpress Themes"},{"term":"Wunderlist"},{"term":"ZTE"},{"term":"able2extract"},{"term":"academic journals"},{"term":"academic papers"},{"term":"acer"},{"term":"acm"},{"term":"action"},{"term":"adb"},{"term":"add-on"},{"term":"add-ons"},{"term":"add\/remove programs"},{"term":"adobe brackets"},{"term":"adobe premiere alternatives"},{"term":"advanced mate menu"},{"term":"after install"},{"term":"aircraft shooting"},{"term":"akregator"},{"term":"al hadith"},{"term":"al quran"},{"term":"all about a distro"},{"term":"all about trisquel"},{"term":"allegro"},{"term":"alliance cad system"},{"term":"alpine"},{"term":"alternatives to isis workbench"},{"term":"alternatives to proteus"},{"term":"amber"},{"term":"amd ryzen"},{"term":"amd64"},{"term":"amiri quran font"},{"term":"analysis"},{"term":"android-x86"},{"term":"annotate"},{"term":"annotation"},{"term":"announcement"},{"term":"antix"},{"term":"anydesk alternatives"},{"term":"apa style"},{"term":"apache license"},{"term":"apache software foundation"},{"term":"api"},{"term":"app center"},{"term":"appearance"},{"term":"appeditor"},{"term":"appimage package"},{"term":"appimagehub"},{"term":"apple garamond"},{"term":"applet"},{"term":"appliances"},{"term":"applications"},{"term":"appstream"},{"term":"apt-cdrom"},{"term":"apt-fast"},{"term":"apt.conf"},{"term":"aptitude"},{"term":"architects"},{"term":"arduino"},{"term":"arial alternatives"},{"term":"astro menace"},{"term":"asturix"},{"term":"audacity"},{"term":"audio player"},{"term":"authentication"},{"term":"autocad alternatives"},{"term":"autocrypt"},{"term":"autofilter"},{"term":"automatic updates"},{"term":"automount"},{"term":"avidemux"},{"term":"avnc android"},{"term":"awk"},{"term":"azirevpn.com"},{"term":"b00merang project"},{"term":"backend"},{"term":"backports"},{"term":"bash script"},{"term":"basic language"},{"term":"basic usage"},{"term":"basilisk browser"},{"term":"batch rename"},{"term":"beta1"},{"term":"bind"},{"term":"bittorrent seeding"},{"term":"blocking adult websites"},{"term":"blogging services"},{"term":"blogs"},{"term":"bonobo pro"},{"term":"bookmarks"},{"term":"bootstrap"},{"term":"borderline"},{"term":"briar"},{"term":"broadcasting"},{"term":"bsd"},{"term":"btrfs"},{"term":"budgie 10.4"},{"term":"bug"},{"term":"bulk"},{"term":"bulk reducing"},{"term":"bulletin"},{"term":"burn"},{"term":"caladea font"},{"term":"calc templates"},{"term":"calculator"},{"term":"calibri alternatives"},{"term":"calibri font"},{"term":"calligra suite"},{"term":"cambridge"},{"term":"campus"},{"term":"camtasia replacement"},{"term":"catalog"},{"term":"ccsm"},{"term":"cd"},{"term":"cdcat"},{"term":"celebration"},{"term":"chakra"},{"term":"change"},{"term":"changer"},{"term":"chart"},{"term":"cheat"},{"term":"chm viewer"},{"term":"chromium bsu"},{"term":"chroot"},{"term":"cinnxp"},{"term":"cleaner"},{"term":"cmake"},{"term":"codeberg"},{"term":"codeigniter"},{"term":"codename"},{"term":"colibre"},{"term":"color palettes"},{"term":"comic neue"},{"term":"commafeed"},{"term":"comments"},{"term":"compare sheets"},{"term":"comparing appimage flatpak snap"},{"term":"compatible"},{"term":"complex text layout"},{"term":"computer architecture"},{"term":"computer failure"},{"term":"concatenate"},{"term":"configuratio"},{"term":"conky"},{"term":"content management system"},{"term":"contextual groups"},{"term":"contour line"},{"term":"contribute"},{"term":"contribution"},{"term":"converseen"},{"term":"copr repository"},{"term":"copy"},{"term":"copyleft"},{"term":"countif"},{"term":"cover"},{"term":"cpu-x"},{"term":"cpu-z"},{"term":"cpu-z alternatives"},{"term":"crash"},{"term":"creating"},{"term":"cross platform"},{"term":"cryptography"},{"term":"cups"},{"term":"cursor"},{"term":"custom"},{"term":"cuztomization"},{"term":"danger"},{"term":"darktable"},{"term":"dash"},{"term":"dash to dock"},{"term":"data entry form"},{"term":"datetime format"},{"term":"dbeaver"},{"term":"dead cyborg"},{"term":"dead project resurrection"},{"term":"debian 12"},{"term":"debian 9.9"},{"term":"debian dvd"},{"term":"debian repository"},{"term":"debian unstable"},{"term":"deepin 15.8"},{"term":"deepin 20.6"},{"term":"deepin applications"},{"term":"deepin screen recorder"},{"term":"deepin screenshot"},{"term":"deepin system monitor"},{"term":"default"},{"term":"dejadup"},{"term":"delete"},{"term":"delphi alternative"},{"term":"dep-11"},{"term":"desktop decoration"},{"term":"desktop environment removal"},{"term":"desktop evironment"},{"term":"desktop integration"},{"term":"desktop modding"},{"term":"desktop notes"},{"term":"desktop publiashing"},{"term":"desktop search"},{"term":"developer"},{"term":"devuan"},{"term":"devuan 2.0"},{"term":"devuan 4 chimaera"},{"term":"devuan 5 daedalus"},{"term":"devuan gnu+linux"},{"term":"df"},{"term":"diaspora"},{"term":"different page numbering"},{"term":"digikam"},{"term":"dim"},{"term":"disable"},{"term":"discourse forum"},{"term":"distros"},{"term":"dnfdragora"},{"term":"docfetcher"},{"term":"document format conversion"},{"term":"donation"},{"term":"dot"},{"term":"dotty"},{"term":"download navi"},{"term":"download youtube"},{"term":"downthemall!"},{"term":"dpkg manual install"},{"term":"dpkg-deb"},{"term":"drakrpm"},{"term":"draw"},{"term":"drive"},{"term":"drm-free"},{"term":"dropdown"},{"term":"dual monitor"},{"term":"duckduckgo"},{"term":"dump"},{"term":"easy"},{"term":"easyimageblocker"},{"term":"echo"},{"term":"ehci"},{"term":"elaix"},{"term":"electronic workbench alternatives"},{"term":"element messeger"},{"term":"elementary-x gtk theme"},{"term":"elf"},{"term":"email server"},{"term":"encoding"},{"term":"encrypted"},{"term":"end to end encryption"},{"term":"endless os"},{"term":"english"},{"term":"enso os"},{"term":"enve"},{"term":"epson"},{"term":"etcher"},{"term":"etherpad"},{"term":"evolution"},{"term":"excel to calc"},{"term":"excel to pdf"},{"term":"exercise"},{"term":"exfat"},{"term":"experiment"},{"term":"explanation"},{"term":"export"},{"term":"extended security maintenance"},{"term":"extract"},{"term":"f4"},{"term":"f5"},{"term":"fairphone"},{"term":"fan speed"},{"term":"fbcat"},{"term":"feature"},{"term":"fedora 33"},{"term":"fedora 39"},{"term":"fedora 40"},{"term":"fedora kde"},{"term":"fedora rawhide"},{"term":"fennec"},{"term":"file chooser dialog"},{"term":"file compression"},{"term":"file transfer"},{"term":"files"},{"term":"film making"},{"term":"final beta"},{"term":"final cut pro alternatives"},{"term":"finchvpn.com"},{"term":"find and replace"},{"term":"firmware"},{"term":"first person shooter"},{"term":"flare rpg"},{"term":"flash"},{"term":"flidas"},{"term":"flightgear"},{"term":"flossmanuals.net"},{"term":"fluffychat"},{"term":"fluxbox"},{"term":"folder"},{"term":"folio"},{"term":"font management"},{"term":"foolscap"},{"term":"footnote"},{"term":"for your kids"},{"term":"formatting"},{"term":"forum"},{"term":"fosscord"},{"term":"framagenda"},{"term":"framework laptop"},{"term":"free"},{"term":"free pascal"},{"term":"free software foundation"},{"term":"free softwre"},{"term":"freebsd"},{"term":"freeciv"},{"term":"freedombox"},{"term":"freedos"},{"term":"freefont"},{"term":"freenode"},{"term":"freeze"},{"term":"fsf france"},{"term":"fsf high priority projects"},{"term":"full disk encryption"},{"term":"fun"},{"term":"furniture"},{"term":"fx-foundry"},{"term":"game engine"},{"term":"gazelle pro"},{"term":"gdebi"},{"term":"gdisk"},{"term":"gdocs"},{"term":"getdeb"},{"term":"getgnulinux.org"},{"term":"gimp plugin registry"},{"term":"git.privacytools.io"},{"term":"global menu"},{"term":"global surveillance"},{"term":"gmic"},{"term":"gna!"},{"term":"gnewsense"},{"term":"gnirehtet"},{"term":"gnome 3.38"},{"term":"gnome 41"},{"term":"gnome clocks"},{"term":"gnome:next"},{"term":"gnu autotools"},{"term":"gnu gettext"},{"term":"gnu icecat"},{"term":"gnu octave"},{"term":"gnu r"},{"term":"gnu\/linux companies"},{"term":"gnu\/linux conferences"},{"term":"gnu\/linux organizations"},{"term":"gnu\/linux. kicad"},{"term":"goldendict"},{"term":"google alternatives"},{"term":"google calendar alternative"},{"term":"google chrome"},{"term":"google desktop"},{"term":"google drive alternative"},{"term":"google drive alternatives"},{"term":"google forms alternative"},{"term":"google indirection"},{"term":"google scholar alternatives"},{"term":"google web designer"},{"term":"gresik"},{"term":"grml"},{"term":"groupedbar"},{"term":"growing liberty"},{"term":"grub prompt"},{"term":"grub-emu"},{"term":"gsconnect"},{"term":"gtk3 theme"},{"term":"guadec"},{"term":"guadec 2017"},{"term":"guake"},{"term":"guest"},{"term":"guide lines"},{"term":"gwenview"},{"term":"gwoffice"},{"term":"hacker"},{"term":"hackmdio"},{"term":"haiku os"},{"term":"hanacaraka"},{"term":"hangugeo"},{"term":"harvard"},{"term":"headings"},{"term":"helloSystem"},{"term":"hephaestus"},{"term":"hexchat"},{"term":"hide"},{"term":"hifive"},{"term":"high resolution"},{"term":"history"},{"term":"hlookup"},{"term":"home"},{"term":"host"},{"term":"how to contribute"},{"term":"how to upgrade linux mint"},{"term":"http"},{"term":"https"},{"term":"hubic"},{"term":"hw-probe"},{"term":"i-nex"},{"term":"i386 architecture"},{"term":"ibm power"},{"term":"ibus"},{"term":"icalendar"},{"term":"icecat"},{"term":"ics"},{"term":"if"},{"term":"image flow"},{"term":"images"},{"term":"imap. keepassxc"},{"term":"independence"},{"term":"indonesia"},{"term":"indonesian"},{"term":"info"},{"term":"inkgenerator"},{"term":"inkscape 1.0alpha"},{"term":"inkscape 1.3"},{"term":"insert"},{"term":"instagram desktop"},{"term":"instant mess"},{"term":"intel"},{"term":"intel vt"},{"term":"interactive"},{"term":"internationalization"},{"term":"internet access sharing"},{"term":"invidition"},{"term":"invitation"},{"term":"islamic software"},{"term":"issue 12"},{"term":"italc"},{"term":"itb"},{"term":"jabber"},{"term":"jami"},{"term":"jamovi"},{"term":"jasp"},{"term":"javanese language"},{"term":"javanese script"},{"term":"javascript"},{"term":"jessie"},{"term":"jigdo"},{"term":"join"},{"term":"k-9"},{"term":"kabitk"},{"term":"kallithea"},{"term":"kanji"},{"term":"kaos"},{"term":"kate"},{"term":"kde 5.12"},{"term":"kde 5.13"},{"term":"kde 5.8"},{"term":"kde applications 19.04"},{"term":"kde slimbook"},{"term":"kde system settings"},{"term":"keyboard"},{"term":"keymon"},{"term":"kfgqpc uthmanic font"},{"term":"kids"},{"term":"kmplayer"},{"term":"knoppix"},{"term":"komodo"},{"term":"konsole"},{"term":"kontalk"},{"term":"korean"},{"term":"krename"},{"term":"krita"},{"term":"krita 3.1"},{"term":"krusader file manager"},{"term":"kubuntu 20.04 lts jammy jellyfish"},{"term":"kubuntu focus"},{"term":"kwin"},{"term":"la capitaine icon pack"},{"term":"laptop temperature"},{"term":"latte dock"},{"term":"legacy firefox addon"},{"term":"lemur pro"},{"term":"len"},{"term":"lens"},{"term":"letter"},{"term":"letterpress"},{"term":"libc6-dev"},{"term":"liberachat"},{"term":"liberation serif"},{"term":"libre software"},{"term":"libre software phone"},{"term":"libre speed test"},{"term":"libreboot"},{"term":"librejs"},{"term":"libreoffice 5.4"},{"term":"libreoffice 6.1"},{"term":"libreoffice 7.3"},{"term":"libreoffice 7.5"},{"term":"libreoffice base"},{"term":"libreoffice draw"},{"term":"libreoffice impress templates"},{"term":"libreoffice online"},{"term":"license"},{"term":"liferea"},{"term":"light desktop theme"},{"term":"light table"},{"term":"lineageos"},{"term":"linux mint 18"},{"term":"linux mint 18.3"},{"term":"linux mint 21 vanessa"},{"term":"linux mint 22 wilma"},{"term":"linuxpizza"},{"term":"list"},{"term":"live streaming"},{"term":"llvm\/clang"},{"term":"lm-sensors"},{"term":"lmde"},{"term":"lmde 6"},{"term":"localization"},{"term":"log"},{"term":"login screen"},{"term":"long bond"},{"term":"look and feel"},{"term":"looping"},{"term":"lorem ipsum"},{"term":"lower"},{"term":"lpmq isep misbah font"},{"term":"lsb_release"},{"term":"lscpu"},{"term":"lshw"},{"term":"lspci"},{"term":"luks"},{"term":"maff"},{"term":"mageia control center"},{"term":"magig sysrq"},{"term":"mailing list"},{"term":"makefile"},{"term":"malware"},{"term":"mandalika"},{"term":"manpages"},{"term":"manually"},{"term":"manufactures"},{"term":"mapquest"},{"term":"marco window manager"},{"term":"markdown"},{"term":"master documents"},{"term":"mate 1.18"},{"term":"mate 1.7"},{"term":"math"},{"term":"mathematic"},{"term":"matrix chat"},{"term":"matroska"},{"term":"media"},{"term":"media player"},{"term":"media player indicator"},{"term":"mediawiki"},{"term":"mega.co.nz"},{"term":"megaglest"},{"term":"memory"},{"term":"menu bar"},{"term":"menulibre"},{"term":"metacity"},{"term":"metager.de"},{"term":"metalink"},{"term":"microsd"},{"term":"microsoft 365 alternatives"},{"term":"microsoft office alternatives"},{"term":"microsoft windows"},{"term":"microsoft word to pdf"},{"term":"min and max"},{"term":"mint"},{"term":"mintstick"},{"term":"misc"},{"term":"mit"},{"term":"mit license"},{"term":"mkvmerge"},{"term":"mkvtoolnix"},{"term":"mobi"},{"term":"moneytext"},{"term":"monthly"},{"term":"mount"},{"term":"mounty"},{"term":"mp3"},{"term":"mplayer"},{"term":"ms paint alternatives"},{"term":"msgfmt"},{"term":"mtp"},{"term":"multibootusb"},{"term":"multiple files"},{"term":"multisystem"},{"term":"muon discover"},{"term":"mutimedia"},{"term":"mx-18"},{"term":"nano"},{"term":"nautilus alternatives"},{"term":"nautilus wipe"},{"term":"navigation"},{"term":"navigator"},{"term":"netrunner"},{"term":"network"},{"term":"network diagram"},{"term":"new"},{"term":"new computer brand"},{"term":"new inkscape release"},{"term":"new laptop release"},{"term":"new year"},{"term":"newsgroup"},{"term":"nextcloud talk"},{"term":"nextgenerator"},{"term":"ng"},{"term":"nheko"},{"term":"nic"},{"term":"nimbus fonts"},{"term":"ninja-ide"},{"term":"no root required"},{"term":"nodejs"},{"term":"nomaden"},{"term":"nonfree software"},{"term":"nordic"},{"term":"nostalgia"},{"term":"notes"},{"term":"noto fonts"},{"term":"npapi"},{"term":"ntfs"},{"term":"number to text converstion"},{"term":"numbertext"},{"term":"octopi"},{"term":"odin"},{"term":"ods to pdf"},{"term":"odt to pdf"},{"term":"official"},{"term":"offline wikipedia"},{"term":"old phones"},{"term":"olive video editor"},{"term":"one late night"},{"term":"online forms"},{"term":"open access"},{"term":"open as root"},{"term":"open font license"},{"term":"open in terminal"},{"term":"open source software"},{"term":"open standard"},{"term":"open street map"},{"term":"openbox"},{"term":"opendns"},{"term":"openpgp"},{"term":"openpower"},{"term":"openrc"},{"term":"opensuse argon"},{"term":"opensuse krypton"},{"term":"opensuse leap 15.5"},{"term":"opml"},{"term":"optical character recognition"},{"term":"options"},{"term":"orbis"},{"term":"orca screen reader"},{"term":"organizer"},{"term":"oryx pro"},{"term":"ostree"},{"term":"otto"},{"term":"overheating"},{"term":"overview"},{"term":"owncloud"},{"term":"oxford"},{"term":"packagekitd"},{"term":"page formatting"},{"term":"page styles"},{"term":"paint"},{"term":"paint.net alternatives"},{"term":"paper size"},{"term":"parabola"},{"term":"parental control"},{"term":"parrot security os"},{"term":"pascal"},{"term":"password"},{"term":"password reset"},{"term":"paste special"},{"term":"pclinuxos"},{"term":"pdf converter"},{"term":"pdf reader"},{"term":"pdfimages"},{"term":"pdflatex"},{"term":"pdfseparate"},{"term":"pdftotext"},{"term":"pdfunite"},{"term":"peek gif recorder"},{"term":"penpot"},{"term":"peppermint"},{"term":"performance improvements"},{"term":"persepolis integration"},{"term":"phone number"},{"term":"php"},{"term":"ping indicator"},{"term":"pinta"},{"term":"pinta image editor"},{"term":"pipelining"},{"term":"pitivi"},{"term":"pivot table"},{"term":"pkill"},{"term":"planets"},{"term":"plasma 5.10.95"},{"term":"plasma 5.12"},{"term":"plasma 5.19"},{"term":"plasma 5.22"},{"term":"plasma 5.23"},{"term":"plasma 5.8"},{"term":"plasma widget"},{"term":"playdeb"},{"term":"playlist"},{"term":"pleroma"},{"term":"podcast"},{"term":"pop3"},{"term":"popular applications"},{"term":"porteus"},{"term":"posix"},{"term":"postmarketos"},{"term":"power management"},{"term":"powerpoint to pdf"},{"term":"ppc64el"},{"term":"ppp0"},{"term":"practice"},{"term":"pre-release"},{"term":"presentation"},{"term":"primitive ftp"},{"term":"printed books"},{"term":"productive"},{"term":"productivity"},{"term":"promotion"},{"term":"proper"},{"term":"protonvpn"},{"term":"prozgui"},{"term":"pulsar editor"},{"term":"pureos 9"},{"term":"pycharm"},{"term":"q4os"},{"term":"qmmp audio player"},{"term":"qpdfview"},{"term":"qr code"},{"term":"qstardict"},{"term":"qtox"},{"term":"quad9 dns service"},{"term":"quassel"},{"term":"query"},{"term":"quick"},{"term":"quick look"},{"term":"quiz"},{"term":"quranlo"},{"term":"rainlendar"},{"term":"ramme"},{"term":"randbetween"},{"term":"raptor talos"},{"term":"raring"},{"term":"raven"},{"term":"reader"},{"term":"real time strategy"},{"term":"realtime"},{"term":"recomm"},{"term":"recommended applications. ubuntu 17.10"},{"term":"recycle"},{"term":"reddit"},{"term":"redesign"},{"term":"redirection"},{"term":"redshiftgui"},{"term":"reference manager"},{"term":"referral"},{"term":"reinstallation"},{"term":"reminders"},{"term":"remmina"},{"term":"remote calendar"},{"term":"remote login"},{"term":"repack"},{"term":"repology.org"},{"term":"reset"},{"term":"resizing"},{"term":"resolv.conf"},{"term":"resource"},{"term":"respects your freedom"},{"term":"rest"},{"term":"restore point"},{"term":"reusability"},{"term":"reuse"},{"term":"reverse tethering"},{"term":"revolt chat"},{"term":"rewards"},{"term":"riscv"},{"term":"rocky linux"},{"term":"role playing game"},{"term":"root"},{"term":"rootmagz"},{"term":"rotate"},{"term":"round"},{"term":"roundcube"},{"term":"route"},{"term":"rpm fusion"},{"term":"rpmdrake"},{"term":"rstudio"},{"term":"rsync"},{"term":"ruby"},{"term":"sable touch"},{"term":"sad news"},{"term":"sales report"},{"term":"scheherazade font"},{"term":"schematics"},{"term":"screen mirroring"},{"term":"screen recording"},{"term":"screen sharing"},{"term":"screenkey"},{"term":"screensaver"},{"term":"scudcloud"},{"term":"seabios"},{"term":"seacloud"},{"term":"seafile"},{"term":"search \u0026 replace"},{"term":"searchencrypt.com"},{"term":"searx.me"},{"term":"selene"},{"term":"sensors"},{"term":"sepia search"},{"term":"service"},{"term":"session"},{"term":"setup"},{"term":"share"},{"term":"shell script"},{"term":"shellshape"},{"term":"shotcut"},{"term":"shotwell"},{"term":"show in groups"},{"term":"sid"},{"term":"sideloading desktop environments"},{"term":"sigma"},{"term":"simple scan"},{"term":"simplescreenrecorder"},{"term":"sitemap"},{"term":"sketchup alternatives"},{"term":"slimbook"},{"term":"slitaz"},{"term":"smart rss"},{"term":"smartphone and laptop"},{"term":"smplayer"},{"term":"snapd"},{"term":"snapping"},{"term":"snippet"},{"term":"snopyta"},{"term":"socks proxy"},{"term":"software"},{"term":"software \u0026 updates"},{"term":"software freedom"},{"term":"software package availability"},{"term":"software project hosting"},{"term":"software replacements"},{"term":"sony ericsson"},{"term":"sonya"},{"term":"sort by date"},{"term":"source list"},{"term":"sourcehut"},{"term":"speadsheet"},{"term":"speaker"},{"term":"spectral"},{"term":"speech-dispatcher"},{"term":"split view"},{"term":"spss alternative"},{"term":"square root"},{"term":"stable"},{"term":"stanford"},{"term":"startup disk creator"},{"term":"stdio.h"},{"term":"step by step"},{"term":"sticky"},{"term":"storage media"},{"term":"story"},{"term":"stylish"},{"term":"sublime"},{"term":"sublime text alternatives"},{"term":"sumif"},{"term":"svn"},{"term":"sway"},{"term":"sweethome3d"},{"term":"switching from macos to gnu\/linux"},{"term":"swt"},{"term":"sylpheed"},{"term":"syslinux"},{"term":"system"},{"term":"system administration"},{"term":"system monitor"},{"term":"system tools"},{"term":"systemback"},{"term":"systemctl"},{"term":"systemd-resolved"},{"term":"sysvinit"},{"term":"t430"},{"term":"table of contents"},{"term":"table of figures"},{"term":"tambora"},{"term":"task manager"},{"term":"teamviewer alternatives"},{"term":"technology"},{"term":"telecommunication"},{"term":"telegram desktop"},{"term":"teletype"},{"term":"tessa"},{"term":"testdisk"},{"term":"tex gyre heros"},{"term":"texinfo"},{"term":"texmaths"},{"term":"the gnu project"},{"term":"the linux project"},{"term":"theme"},{"term":"thessaloniki"},{"term":"third-person"},{"term":"tianocore"},{"term":"tigervnc server"},{"term":"tiling window"},{"term":"timer"},{"term":"times new roman"},{"term":"times new roman alternatives"},{"term":"tinkering"},{"term":"titlebar"},{"term":"tkgate"},{"term":"to do list"},{"term":"tool"},{"term":"tools"},{"term":"topicons plus extension"},{"term":"tor the onion router"},{"term":"traditional chinese"},{"term":"trigonometry"},{"term":"trinity desktop environment"},{"term":"trisque"},{"term":"trisquel 10 nabia"},{"term":"trophies"},{"term":"trusty tahr"},{"term":"trylinux.today"},{"term":"tty"},{"term":"tumblr"},{"term":"tunneling"},{"term":"tusky"},{"term":"tuxcut"},{"term":"tuxedo computers"},{"term":"tuxmath"},{"term":"twitrss"},{"term":"typing indicator"},{"term":"typography"},{"term":"uberwriter"},{"term":"ubunchu"},{"term":"ubuntu 13.04"},{"term":"ubuntu 14.04"},{"term":"ubuntu 18.04."},{"term":"ubuntu 18.04. bionic beaver"},{"term":"ubuntu 20.04"},{"term":"ubuntu 24.04"},{"term":"ubuntu advantage"},{"term":"ubuntu buzz"},{"term":"ubuntu forum"},{"term":"ubuntu gnome"},{"term":"ubuntu kylin"},{"term":"ubuntu studio"},{"term":"uget"},{"term":"ugm"},{"term":"ukui"},{"term":"uname"},{"term":"unicode"},{"term":"uninstall"},{"term":"unique features"},{"term":"unity launcher"},{"term":"unity tweak"},{"term":"university"},{"term":"unix-like"},{"term":"unoconv"},{"term":"unsupported ubuntu releases"},{"term":"upcoming operating system release"},{"term":"update notification"},{"term":"upgrading libreoffice"},{"term":"upper"},{"term":"uruk 2"},{"term":"usb debugging"},{"term":"usenet"},{"term":"user experience"},{"term":"user friendly"},{"term":"userstyles"},{"term":"vala"},{"term":"vector"},{"term":"vector operating system"},{"term":"vectorization"},{"term":"version control"},{"term":"vfx"},{"term":"video compositing"},{"term":"video sharing"},{"term":"video transcoding"},{"term":"view"},{"term":"viewer"},{"term":"virtual terminal"},{"term":"vnc"},{"term":"vnstat-php"},{"term":"warpinator"},{"term":"wayfire"},{"term":"weather"},{"term":"web server"},{"term":"web-based"},{"term":"websites"},{"term":"where to buy gnu\/linux computers"},{"term":"wicd network manager"},{"term":"wily werewolf"},{"term":"winamp alternatives"},{"term":"window snapping"},{"term":"windowbuilder"},{"term":"winff"},{"term":"wipro"},{"term":"wire"},{"term":"wonderful indonesia"},{"term":"wordpress.com"},{"term":"work"},{"term":"wps office"},{"term":"writer flyer"},{"term":"www"},{"term":"wxsmith"},{"term":"wysiwyg"},{"term":"x"},{"term":"x11"},{"term":"xbookmarksync"},{"term":"xchm"},{"term":"xfce 4.14"},{"term":"xfs"},{"term":"xfwm"},{"term":"xhci"},{"term":"xlookup"},{"term":"xls"},{"term":"xmarks"},{"term":"xml"},{"term":"xorg"},{"term":"xperia"},{"term":"xrandr"},{"term":"xrdp"},{"term":"xscreensaver"},{"term":"xubuntu 22.04 jammy jellyfish"},{"term":"xul"},{"term":"xwd"},{"term":"yakuake"},{"term":"yast"},{"term":"youtube front end"},{"term":"youtube-dl"},{"term":"yunit"},{"term":"zip"},{"term":"zoiper"},{"term":"zoom screen"},{"term":"zorin os 12"},{"term":"zorin os 15"},{"term":"zorin os 16"},{"term":"zorin os 17"},{"term":"zotero connector"},{"term":"zypper"}],"title":{"type":"text","$t":"Ubuntu Buzz !"},"subtitle":{"type":"html","$t":"Unofficial Ubuntu Blog"},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https:\/\/www.ubuntubuzz.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/-\/hacking?alt=json-in-script\u0026max-results=50"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/search\/label\/hacking"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"9"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"50"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-2761868235345128568"},"published":{"$t":"2012-03-16T20:51:00.000+07:00"},"updated":{"$t":"2012-03-16T20:54:03.482+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Anonymous"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Linux News"},{"scheme":"http://www.blogger.com/atom/ns#","term":"news"}],"title":{"type":"text","$t":"Anonymous OS: Ubuntu based \"malicious\" OS pulled down amid panic"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/www.observer.com\/files\/2011\/09\/anonymous-logo-1.jpg\" imageanchor=\"1\" style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"197\" src=\"http:\/\/www.observer.com\/files\/2011\/09\/anonymous-logo-1.jpg\" width=\"200\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\nEarlier this week, someone created a \u003Ca href=\"http:\/\/anonymous-os.tumblr.com\/\" target=\"_blank\"\u003ETumblr webpage\u003C\/a\u003E for a new operating system called “Anonymous-OS Live.”.\n However Soon after the operating system became available, the \u003Ca href=\"https:\/\/twitter.com\/#%21\/anonops\/status\/180092538395443201\" target=\"_blank\"\u003E@AnonOps\u003C\/a\u003E a Twitter account that is believed to speak for Anonymous posted a message saying it was fake and \"wrapped in trojans\" but despite the \nwarnings, more than 26,000 people still downloaded it.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nThe creators of the OS denied it was infected with viruses arguing,\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cblockquote class=\"tr_bq\"\u003E\nIn our world, in \u003Ci\u003ELinux\u003C\/i\u003E and \u003Ci\u003Eopensource\u003C\/i\u003E world, there are no viruses.\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nAnd If any user\u0026nbsp; believe that \u003Cb\u003EAnonymous-OS\u003C\/b\u003E “\u003Ci\u003Eis wrapped in trojans\u003C\/i\u003E” or “\u003Ci\u003Ebackdoored OS by any Law enforcement Company or Hacker\u003C\/i\u003E” please don’t download it!\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nBut don’t mislead the world that \u003Ci\u003ELinux\u003C\/i\u003E is dangerous and has trojans!\u003C\/blockquote\u003E\n\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003EYou could download it \nas a torrent and via direct download, but as of today, only the former \noption. \u003Ca href=\"http:\/\/sourceforge.net\/blog\/anonymous-os-response\/\"\u003ESourceForge\u003C\/a\u003E pulled it down.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nThe 1.36 GB download is based on Ubuntu - one of the most popular versions\n of the Linux operating system. With \u003Ca href=\"http:\/\/mate-desktop.org\/\" target=\"_blank\"\u003EMate Desktop\u003C\/a\u003E Environment and is pre-loaded with lots of website sniffing and security tools. The software's creators say they put it \ntogether for \"education purposes to checking the security of web pages\".\u0026nbsp; They also warn not to use any of the tools “to destroy any web page” \nbecause doing say may make mean you “end up in jail because is a crime \nin most countries!”\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nHere are few of the Screenshots of Anonymous OS\u0026nbsp; as posted on the tumbler page.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/img843.imageshack.us\/img843\/9740\/73396660.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"225\" src=\"http:\/\/img843.imageshack.us\/img843\/9740\/73396660.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003C\/div\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/img20.imageshack.us\/img20\/7622\/70970679.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"225\" src=\"http:\/\/img20.imageshack.us\/img20\/7622\/70970679.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/img94.imageshack.us\/img94\/4830\/56040702.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"303\" src=\"http:\/\/img94.imageshack.us\/img94\/4830\/56040702.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/img692.imageshack.us\/img692\/8148\/41128933.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"225\" src=\"http:\/\/img692.imageshack.us\/img692\/8148\/41128933.png\" width=\"400\" \/\u003E\u0026nbsp;\u003C\/a\u003E\u003C\/div\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/img43.imageshack.us\/img43\/6196\/62875442.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"225\" src=\"http:\/\/img43.imageshack.us\/img43\/6196\/62875442.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cbr \/\u003E\n\u003Cb\u003EDownloading Anonymous OS\u003C\/b\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nThe Official Direct Download link from Sourceforge is however taken down earlier this morning but the Anonymous OS is available for download from torrents available \u003Ca href=\"http:\/\/linuxtracker.org\/download.php?id=fb410f6e36ce83aa0cd5957c6584a4f5225e510b\u0026amp;f=Anonymous-OS_0.1%20Live%2032bit.torrent\" target=\"_blank\"\u003Ehere\u003C\/a\u003E. Adventurous users can download and make a bootable CD\/USB image of the Live iso using unetbootin tool. However it is not recommended to download and use it, keeping the \u003Ca href=\"http:\/\/www.metro.co.uk\/tech\/893339-anonymous-operating-system-prompts-security-warnings\" target=\"_blank\"\u003Ewarnings from top security companies\u003C\/a\u003E in mind. \u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/2761868235345128568"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/2761868235345128568"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2012\/03\/anonymous-os-ubuntu-based-malicious-os.html","title":"Anonymous OS: Ubuntu based \"malicious\" OS pulled down amid panic"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}]},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-4928834419678926468"},"published":{"$t":"2012-03-09T03:15:00.000+07:00"},"updated":{"$t":"2012-03-09T03:15:02.533+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hack"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"programming"},{"scheme":"http://www.blogger.com/atom/ns#","term":"ruby"}],"title":{"type":"text","$t":"Hackety Hack: Ruby Programming for novices"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/upload.wikimedia.org\/wikipedia\/en\/thumb\/1\/11\/Hackety-Star-Title.png\/250px-Hackety-Star-Title.png\" imageanchor=\"1\" style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"200\" src=\"http:\/\/upload.wikimedia.org\/wikipedia\/en\/thumb\/1\/11\/Hackety-Star-Title.png\/250px-Hackety-Star-Title.png\" width=\"193\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjX1IhbPVADb7lb9gsWjJarkGas_mDrgs3nkmKx-T4pj8NKm9hUXpNihigpSCfOpYZidU6q4OVBl0UllU7bOpI5JwF6CCnA_dH4DQDvbxx-qGIC17XyypX3HJKdWyX6eaZy9iJFw8fp2zU\/s200\/hacky-mouse-hand.png\" imageanchor=\"1\" style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\"\u003E\u003C\/a\u003E\u003Ca href=\"http:\/\/hackety.com\/\"\u003E\u003Cb\u003EHackety Hack\u003C\/b\u003E\u003C\/a\u003E is an open source application that teaches individuals how to create software using Ruby Programming language. It combines an IDE with an extensive Lessons system. Hackety Hack is a cross-platform\n desktop application available for Windows, Mac and Linux, it also has integration with the website, where \n\"Hackers\" can share what they've learned, ask questions, and submit \nfeedback.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nUsing Hackety Hack does not require any programming experience, and is designed for absolute starters in computer programming.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u0026nbsp;With Hackety Hack, you\u003Cb\u003E \u003C\/b\u003Ecan learn the \u003Ca href=\"http:\/\/www.ruby-lang.org\/en\/\"\u003ERuby programming language\u003C\/a\u003E. Ruby is used for all kinds of programs, including desktop applications and websites.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Ca href=\"http:\/\/hackety.com\/programs\"\u003EHere\u003C\/a\u003E is a list of programs which users have made using Hackety Hack. \u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWBX5N-_rFKC2v7FtpssYyuG_C1Xa_dOruQjCqjcFyzPzXw-U99irPTVNKzq-F0D2x1gdvW6cdMzG-nJyoIeHyNpaKVvnONMmfJNt0sFdBE8oyhFM_QxrCFTanaVZnytoXuvlqU41W_yo\/s1600\/Hack.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"251\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWBX5N-_rFKC2v7FtpssYyuG_C1Xa_dOruQjCqjcFyzPzXw-U99irPTVNKzq-F0D2x1gdvW6cdMzG-nJyoIeHyNpaKVvnONMmfJNt0sFdBE8oyhFM_QxrCFTanaVZnytoXuvlqU41W_yo\/s400\/Hack.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cbr \/\u003E\n\u003Cb\u003EInstalling Hackety Hack\u003C\/b\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nDownload Hackety Hack from \u003Ca href=\"https:\/\/github.com\/downloads\/hacketyhack\/hacketyhack\/hacketyhack-1.0.1.run\"\u003Ehere\u003C\/a\u003E, this will download a binary \u003Ci\u003Erun\u003C\/i\u003E file. Change the file permissions to executable,\u003Cbr \/\u003E\n\u003Cblockquote class=\"tr_bq\"\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E$ sudo chmod +x hacketyhack-1.0.1.run\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/blockquote\u003E\nNow you are ready to run the Hackety Hack, open the terminal and issue the following command,\u003Cbr \/\u003E\n\u003Cblockquote class=\"tr_bq\"\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E$ .\/hacketyhack-1.0.1.run\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/blockquote\u003E\n\u0026nbsp;or double click the \u003Ci\u003Erun\u003C\/i\u003E file in the file browser.\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nNow you are ready to hack Hollywood style :) \u003Cbr \/\u003E\n\u003Cimg border=\"0\" height=\"146\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjX1IhbPVADb7lb9gsWjJarkGas_mDrgs3nkmKx-T4pj8NKm9hUXpNihigpSCfOpYZidU6q4OVBl0UllU7bOpI5JwF6CCnA_dH4DQDvbxx-qGIC17XyypX3HJKdWyX6eaZy9iJFw8fp2zU\/s200\/hacky-mouse-hand.png\" width=\"200\" \/\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\nEnjoy!\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/4928834419678926468"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/4928834419678926468"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2012\/03\/hackety-hack-ruby-programming-for.html","title":"Hackety Hack: Ruby Programming for novices"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWBX5N-_rFKC2v7FtpssYyuG_C1Xa_dOruQjCqjcFyzPzXw-U99irPTVNKzq-F0D2x1gdvW6cdMzG-nJyoIeHyNpaKVvnONMmfJNt0sFdBE8oyhFM_QxrCFTanaVZnytoXuvlqU41W_yo\/s72-c\/Hack.png","height":"72","width":"72"}},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-8429566845573318494"},"published":{"$t":"2011-03-21T17:10:00.001+07:00"},"updated":{"$t":"2011-04-11T21:54:53.242+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Application"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"tips and trick"}],"title":{"type":"text","$t":"How to hack pidgin, beware pidgin password storing vulnerability"},"content":{"type":"html","$t":"\u003Cdiv style=\"font-family: \u0026quot;Helvetica Neue\u0026quot;,Arial,Helvetica,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Ci\u003E\"Are you pidgin user ?\"\u003C\/i\u003E\u003C\/span\u003E, \u003Cspan style=\"font-size: large;\"\u003Ewe have a tips for you ...\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: \u0026quot;Helvetica Neue\u0026quot;,Arial,Helvetica,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EThere is a security issue regarding passwords storing in pidgin, you should have to think back when using automatic login through \u003Cb\u003E\u003Ci\u003E\"remember password\"\u003C\/i\u003E\u003C\/b\u003E on this application. Why? Because pidgin will store your account password in\u003Cb\u003E plain text\u003C\/b\u003E it's mean that pidgin save your password in clear text without any encryption. If you are using ubuntu or other distro the account settings stored in \u003Cu\u003E\u003Ci\u003E\/home\/\u003C\/i\u003E\u003C\/u\u003E\u003C\/span\u003E\u003Cu\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003E\u0026lt;\u003C\/b\u003E\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003E\u003Cb\u003Euser\u003C\/b\u003E\u003C\/i\u003E\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003E\u0026gt;\u003C\/b\u003E\u003C\/span\u003E\u003C\/u\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cu\u003E\u003Ci\u003E\u003Cuser\u003E\/.purple\/accounts.xm\u003C\/user\u003E\u003C\/i\u003E\u003Ci\u003E\u003Cuser\u003El\u003C\/user\u003E\u003C\/i\u003E.\u003C\/u\u003E and for windows user the file will strored in \u003Cu\u003E\u003Ci\u003EC:\\Documents and Settings\\user\\Application Data\\.purple\\\u003Cuser\u003Eaccounts.xml\u003C\/user\u003E.\u003C\/i\u003E\u003C\/u\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Ctable align=\"center\" cellpadding=\"0\" cellspacing=\"0\" class=\"tr-caption-container\" style=\"margin-left: auto; margin-right: auto; text-align: center;\"\u003E\u003Ctbody\u003E\n\u003Ctr\u003E\u003Ctd style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuiQQhhZnSiVOpN6oPp48E8eF5pac5qt1mzNH9G3YKz2Z5AJw8T2QeTar-rW_8Y2l917xBDHFj12yXNO6jDe5fyZrLEz94ENqE5Y649AISNZ5KEj4wqTyRs2nOg29erzLDA52fSQuIJms\/s1600\/pidgin+save+password+.png\" imageanchor=\"1\" style=\"margin-left: auto; margin-right: auto;\"\u003E\u003Cimg border=\"0\" height=\"320\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuiQQhhZnSiVOpN6oPp48E8eF5pac5qt1mzNH9G3YKz2Z5AJw8T2QeTar-rW_8Y2l917xBDHFj12yXNO6jDe5fyZrLEz94ENqE5Y649AISNZ5KEj4wqTyRs2nOg29erzLDA52fSQuIJms\/s320\/pidgin+save+password+.png\" width=\"249\" \/\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003Ctr\u003E\u003Ctd class=\"tr-caption\" style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003EPidgin save password\u003C\/i\u003E screenshoot\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003C\/tbody\u003E\u003C\/table\u003E\u003Cdiv style=\"font-family: \u0026quot;Helvetica Neue\u0026quot;,Arial,Helvetica,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EIf you enable \u003Ci\u003Eremember password\u003C\/i\u003E, you will find tags\u0026nbsp; \u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003E\u0026lt;password\u003Cpassword\u003E\u003C\/password\u003E\u0026gt; \u003C\/b\u003E in that file (\u003Ci\u003E\u003Cuser\u003Eaccounts.xm\u003C\/user\u003E\u003Cuser\u003El\u003C\/user\u003E\u003C\/i\u003E\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E) then followed by your account password. And yes, \"\u003Cb\u003Enaked\u003C\/b\u003E\" just like that..\u003C\/span\u003E\u003C\/div\u003E\u003Ctable align=\"center\" cellpadding=\"0\" cellspacing=\"0\" class=\"tr-caption-container\" style=\"margin-left: auto; margin-right: auto; text-align: center;\"\u003E\u003Ctbody\u003E\n\u003Ctr\u003E\u003Ctd style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSO_M-Aj4a3Iwigk-GblMnEouQAFCAQi5a16guntuF3As3h7UWODnAbLSU6TmmJMRy6Pb_8EDniV_vDRDvkSdjvwklSUom88DxpA0ms_Eh7uhwoFVQpz22S-ZoKxotmo4gRQXMr6MUKaw\/s1600\/pidgin+password.png\" imageanchor=\"1\" style=\"margin-left: auto; margin-right: auto;\"\u003E\u003Cimg border=\"0\" height=\"247\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSO_M-Aj4a3Iwigk-GblMnEouQAFCAQi5a16guntuF3As3h7UWODnAbLSU6TmmJMRy6Pb_8EDniV_vDRDvkSdjvwklSUom88DxpA0ms_Eh7uhwoFVQpz22S-ZoKxotmo4gRQXMr6MUKaw\/s320\/pidgin+password.png\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003Ctr\u003E\u003Ctd class=\"tr-caption\" style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003EPidgin password stored in accounts.xml \u003C\/i\u003E\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003C\/tbody\u003E\u003C\/table\u003E\u003Cdiv style=\"font-family: \u0026quot;Helvetica Neue\u0026quot;,Arial,Helvetica,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EThere's still \u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003Evulnerabilities\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E regarding passwords storing in pidgin\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E, our suggestion is \u003Cb\u003Edon't activate automatic login using \"\u003Ci\u003Eremember password\u003C\/i\u003E\" while using pidgin, \u003C\/b\u003Ecause you have been stripped..\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/8429566845573318494"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/8429566845573318494"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2011\/03\/how-to-hack-pidgin-risky-password.html","title":"How to hack pidgin, beware pidgin password storing vulnerability"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuiQQhhZnSiVOpN6oPp48E8eF5pac5qt1mzNH9G3YKz2Z5AJw8T2QeTar-rW_8Y2l917xBDHFj12yXNO6jDe5fyZrLEz94ENqE5Y649AISNZ5KEj4wqTyRs2nOg29erzLDA52fSQuIJms\/s72-c\/pidgin+save+password+.png","height":"72","width":"72"}},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-4531985617125198844"},"published":{"$t":"2010-08-06T18:37:00.000+07:00"},"updated":{"$t":"2010-08-06T18:40:07.974+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Security"},{"scheme":"http://www.blogger.com/atom/ns#","term":"tips and trick"}],"title":{"type":"text","$t":"Learn How Brute-force Work, Safe your system from destructive attack"},"content":{"type":"html","$t":"\u003Cdiv style=\"text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003EBrute-force password cracking is simply trying a password of A with the given salt, folowing by B to Z until every possible character combination is tried. It is very time consuming, but given enough time brute force cracking WILL get the password. Lerning how brute force work is very important part if you want to be\/aready work in computer network and computer system field cause a failure authentication is a fatal tragedy.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"http:\/\/www.tabloidpcplus.com\/wp-content\/uploads\/2010\/02\/Hacker.jpg\" imageanchor=\"1\" style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"213\" src=\"http:\/\/www.tabloidpcplus.com\/wp-content\/uploads\/2010\/02\/Hacker.jpg\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003EIn cryptography, a brute-force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found. The selection of an appropriate key length depends on the practical feasibility of performing a brute force attack. By obfuscating the data to be encoded, brute-force attacks are made less effective as it is more difficult to determine when one has succeeded in breaking the code. The resources required for a brute force attack scale exponentially with increasing key size, not linearly. As a result, doubling the key size for an algorithm does not simply double the required number of operations, but rather squares them. Although there are algorithms which use 56-bit symmetric keys, usually 128- to 256-bit keys are standard.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003Elearning how Brute-force work is not just talk about how to use it's (the method) to attack some commrades mechines, but it's simply way to diffense our machines form destructive method like this.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003EWhat the symtoms you are being (brute-force) attack ?\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003Ethis explanation is taking form \u003C\/span\u003E\u003Ca href=\"http:\/\/kevin.vanzonneveld.net\/techblog\/article\/block_brute_force_attacks_with_iptables\/\" style=\"font-family: Verdana,sans-serif;\"\u003Ethis\u003C\/a\u003E\u003Cspan style=\"font-family: Verdana,sans-serif;\"\u003E, Since 2005 there has been an immense increase in brute force SSH attacks and though Linux\u0026nbsp; is pretty secure by default, it does not stop evil programs from indefinitely trying to login with different passwords. Without proper protection your server is a sitting duck waiting for a bot to guess the right combination and hit the jackpot. But with just 2 commands we can stop that.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: x-small;\"\u003E\u003Ci\u003EJul 28 21:32:16 impala sshd[10855]: Illegal user office from 213.191.74.219\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cspan style=\"font-size: x-small;\"\u003E\u003Ci\u003EJul 28 21:32:16 impala sshd[10855]: Failed password for illegal user office from 213.191.74.219 port 53033 ssh2\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10857]: Illegal user samba from 213.191.74.219\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10857]: Failed password for illegal user samba from 213.191.74.219 port 53712 ssh2\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10859]: Illegal user tomcat from 213.191.74.219\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10859]: Failed password for illegal user tomcat from 213.191.74.219 port 54393 ssh2\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10861]: Illegal user webadmin from 213.191.74.219\u003Cbr \/\u003E\nJul 28 21:32:16 impala sshd[10861]: Failed password for illegal user webadmin from 213.191.74.219 port 55099 ssh2\u003C\/i\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"text-align: justify;\"\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003ETips that make you stay alert is, don't forget to check the logs (system\/application logs) every time, from the symtom above we conclude that our mechines is being-brute force from the ip 213.191.74.219. Notice explanation above, brute force method is trying to combine a possible character from A to Z to get the right password and when the combination is wrong our machines will give respond and write it the logs, and this is potential evidance to dig. Do you see the rate at which this is happening? Nowadays' connection speeds allow for crackers to try an enormous amount of combinations every second! It's time to stop this before someone hits the jackpot and my server is compromised. \u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"text-align: justify;\"\u003E\u003Cb\u003E\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003EHow to deffense from brute-force attack ?\u003C\/span\u003E\u003C\/b\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003ETalking about how to keep safe is not just about administrator responsibility, but all user who have an interest in the system is having responsibility to keep the system safe. There are several techniques that an admin might employ to force users to use better passwords, and several different packages that could be loaded and configured onto most Unix systems to better secure the passwords with out forgetting that password is must easy to remember, here they are several technique How to keep save from Brute-force attack : \u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003EAs User\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E1. Make a best combination of Character, Alphabet, Number, then Lowercase and Uppercase. Ex : cR1styn4\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E2. Longer is good, make your password at least 6 character.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E3. Change periodicaly your paassword.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E4. Avoid using object name (name of parent, name of city, etc) \u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003EAs administrator\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E1. Make several constraint that make user notice to their password.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E2. Build a plated firewall.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E3. Shadowed password. (i think you are if you are unix\/linux user)\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E4. Having 3rd party application (IDS,Honeypot) is not bad.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E5. Check the logs and doing action, block some potential attacker.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/4531985617125198844"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/4531985617125198844"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/08\/learn-how-brute-force-work-safe-your.html","title":"Learn How Brute-force Work, Safe your system from destructive attack"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}]},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-6373033779128147167"},"published":{"$t":"2010-07-29T10:03:00.000+07:00"},"updated":{"$t":"2010-07-29T20:49:31.147+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Security"}],"title":{"type":"text","$t":"Introduction of Backtrack for Computer\/Digital Forensic Tools (Part II)"},"content":{"type":"html","$t":"\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EContinuing our discuss in \u003Ca href=\"http:\/\/www.ubuntubuzz.com\/2010\/07\/introduction-backtrack-for-digital.html\"\u003Eintroduction backtrack for computer\/digital forensic tools part I\u003C\/a\u003E, in this part we will try to dig how deep is backtrack have a potential source as computer\/digital forensic tools. Backtrack is a linux distro which can put many kit into one vessel and collaborated each other, this is an excess of backtrack which not owened by other. Talking of computer\/digital forensic tools we have too clasify some parts of tool into different part besides of it's use, after i read some article with the same topic of computer\/digital forensic many of them classify it's into five major classification, that is ..\u003C\/span\u003E\u003C\/div\u003E\u003Col style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003EData Acquisition\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003EData Recovery and Carving\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003EMeta Data Analysis\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003ENetwork Forensic\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003ELog File Analysis\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ol\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EAfter looking at the five major clasification of digital forensic tool above, we agree that Backtrack 4 have all candidate to meet all requirement, let peel of one by one.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003Cb\u003EData Acquisition\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EData Acquisition is set of application which is responsible to interrogate harddrive and get neccessary information from them, in this field we have some particular job like make an 'identic' copy of harddrive then analyse them without ruin the original evidance and doing File System Interrogration jobs even it NTFS\/FAT\/EXT3 or Other. To do a data acquisition jobs in backtrack we have such application Advanced Forensic Format Library (\u003Ca href=\"http:\/\/www.afflib.org\/\"\u003Eafflib\u003C\/a\u003E), Automated Image and Restore (\u003Ca href=\"http:\/\/air-imager.sourceforge.net\/\"\u003Eair-imager\u003C\/a\u003E), \u003Ca href=\"http:\/\/www.gnu.org\/software\/coreutils\/\"\u003Edd\u003C\/a\u003E, dcfl-dd, \u003Ca href=\"ftp:\/\/vic.cc.purdue.edu\/pub\/tools\/unix\/lsof\/\"\u003Elsof\u003C\/a\u003E, \u003Ca href=\"http:\/\/guymager.sourceforge.net\/\"\u003Eguymanager\u003C\/a\u003E, acidlab, and \u003Ca href=\"http:\/\/md5sa.com\/downloads\/rda\/index.htm\"\u003ERDA\u003C\/a\u003E. All applicaton mentioned can be installed using backtrack package manager.\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003Cb\u003EData Recovery and Carving\u003C\/b\u003E\u003Cbr \/\u003E\nThe Data Recovery tools is set of application which responsible to get erase data back, analyzing hidden and erase partition, and fixing a broken block of filesystem. Data carving is extracting data (files) out of undifferentiated blocks (raw data) for the purpose of file identification. We have such application like \u003Cspan id=\"goog_1316424338\"\u003E\u003C\/span\u003E\u003Ca href=\"http:\/\/www.gnu.org\/software\/ddrescue\/ddrescue.html\"\u003Eddrescue\u003Cspan id=\"goog_1316424339\"\u003E\u003C\/span\u003E\u003C\/a\u003E, foremost-menu, \u003Ca href=\"http:\/\/www.digitalforensicssolutions.com\/Scalpel\"\u003Escalpel\u003C\/a\u003E, xpilco, allin1, and \u003Ca href=\"http:\/\/www.sleuthkit.org\/autopsy\/index.php\"\u003Eautopsy\u003C\/a\u003E In backtrack to do Data Recovery and Carving.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003Cb\u003EMeta Data Analysis\u003C\/b\u003E\u003Cbr \/\u003E\nMeta Data Analysis is looking for hidden variable behind the file and data, to do a meta data analysis we need some application which can do activity like dissassembling a file (ducument\/image\/audio\/video) and get hidden variable like when was file last accessed, when was it modified, or simeting like when was file has been created and using what tools it's has been created, looking for meta data analysis tool we have application called libtsk1, \u003Ca href=\"http:\/\/vinetto.sourceforge.net\/\"\u003Evinetto\u003C\/a\u003E, also image and video editor (\u003Cspan id=\"goog_1316424366\"\u003E\u003C\/span\u003E\u003Ca href=\"http:\/\/www.gimp.org\/\"\u003Egimp\u003Cspan id=\"goog_1316424367\"\u003E\u003C\/span\u003E\u003C\/a\u003E,\u003Ca href=\"http:\/\/f-spot.org\/Main_Page\"\u003Efspot\u003C\/a\u003E,\u003Ca href=\"http:\/\/audacity.sourceforge.net\/\"\u003Eaudancity\u003C\/a\u003E) in backtrack.\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003Cb\u003ENetwork Forensic\u003C\/b\u003E\u003Cbr \/\u003E\nNetwork Forensic tools is not much different if compare with network security program, cause that is have real same algorithm eventhough we do the reverese enginnering ones. Network forensic tools covered such jobs like make an analysis of network traffic, captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging, identification network error, sniffing and loging network activity in various port (telnet, ssh, imap, pop3, smtp) and many more. This part is the specialization of backtrack, we have many network security\/network forensic tools in this distro that can be use, this is the following of them : \u003Ca href=\"http:\/\/netcat.sourceforge.net\/\"\u003Enetcat\u003C\/a\u003E, netflow, \u003Ca href=\"http:\/\/www.tcpdump.org\/\"\u003Etcpdump\u003C\/a\u003E, \u003Ca href=\"http:\/\/www.kismetwireless.net\/\"\u003Ekismet\u003C\/a\u003E, \u003Ca href=\"http:\/\/www.wireshark.org\/\"\u003Ewireshark\u003C\/a\u003E, and very lot of stuff.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003Cb\u003ELog File Analysis\u003C\/b\u003E\u003Cbr \/\u003E\nThere are components of files that may have evidentiary value including the date and time of creation, modification, deletion, access, user name or identification, and file attributes. computer-created files (log) which can be potential evidence are backup files, log files, configuration files, printer spool files, cookies, swap files,hidden files, system files, history files, temporary files,link files, event logs. All application program in every computing work has always make a log file which can be a perfect evidence if we're dig correctly, to do such log analysis job in backtrack we have such application aneteater, \u003Ca href=\"http:\/\/freshmeat.net\/projects\/wflogs\"\u003Ewflogs\u003C\/a\u003E, \u003Ca href=\"http:\/\/www.klake.org\/sma\/\"\u003Esma\u003C\/a\u003E, \u003Ca href=\"http:\/\/software.inl.fr\/trac\/wiki\/EdenWall\/NuLog\"\u003Enulog\u003C\/a\u003E, \u003Ca href=\"http:\/\/awstats.sourceforge.net\/\"\u003Eawstat\u003C\/a\u003E, galleta-menu, and \u003Ca href=\"http:\/\/www.paterva.com\/\"\u003Emaltego\u003C\/a\u003E.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\nEventually we have finish our discuss in Introduction of backtrack as computer\/digital forensic tools, looking to our conclusion \u003Ca href=\"http:\/\/www.ubuntubuzz.com\/2010\/07\/introduction-backtrack-for-digital.html\"\u003Ebefore\u003C\/a\u003E now we have realy agree that Backtrack linux have some potential resource to be reliable digital forensic tools. In other \u003Cspan class=\"short_text\" id=\"result_box\"\u003E\u003Cspan title=\"\"\u003Eoccasion we will discuss one by one that application above to get clear explanation how to make it and use it wisely.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/6373033779128147167"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/6373033779128147167"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/07\/introduction-of-backtrack-for.html","title":"Introduction of Backtrack for Computer\/Digital Forensic Tools (Part II)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}]},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-1485021875642597155"},"published":{"$t":"2010-07-25T13:20:00.000+07:00"},"updated":{"$t":"2010-07-29T20:50:04.868+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Review"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Security"}],"title":{"type":"text","$t":"Introduction of Backtrack for Computer\/Digital Forensic Tools (Part I)"},"content":{"type":"html","$t":"\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EComputer\/Digital Forensic has become popular lately, start form Bank Robbery, Hacking\/Cracking\/Hijacking up to popular scandal on the artist sex tape using this method to find the truth. Computer forensics is the generic name that we use for the analysis and reporting on our findings from the forensic analysis of all computer or digital-related media. This not only includes PC\/Laptop or Server hard drives but also other storage devices such as USB drives, MP3 players, memory cards, SIMS and data gathered via network analysis. Computer\/Digital Forensic is a part of computer security, computer practitioners (computer analist\/computer expert)clasified this method into offensive security action which usually did after insident. Digital forensic actualy do after computer criminal insident, common Digital forensics cases include:\u003C\/span\u003E\u003C\/div\u003E\u003Cblockquote style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003Edrug dealing, internet misuse, pornography in the workplace, rape, illegal downloads, IP theft, paedophilia, murder, virus\/malware infection, fraud, email analysis, data recovery, contract negotiations, e-discovery, peer-peer activities, spyware analysis, spoofed and threatening emails, document tracking\u003C\/i\u003E\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003ETalking of computer security tools not separrated with the most popular computer security tool of the year 'backtrack', backtrack has so many tools and application to do such security penetration testing, security attack and also computer security action for computer\/digital forensic purpose. When we first boot up the new Backtrack 4, you might have noticed something slightly different that is ...\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E\u003Ctable align=\"center\" cellpadding=\"0\" cellspacing=\"0\" class=\"tr-caption-container\" style=\"font-family: Verdana,sans-serif; margin-left: auto; margin-right: auto; text-align: center;\"\u003E\u003Ctbody\u003E\n\u003Ctr\u003E\u003Ctd style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghQHqIt076vVdcK_eo70-_qg4N8YMxZ397PBUgTPIq-4G1dFGIigkvJz0E64MYqXWSqSHjYVdn_JenwnbRRRVIIgoIq9puCL35l1TZZn95WQR05XZBKQZEfw7Li4VyHyMEZ3Lnod1DGDw\/s1600\/backtrack+grub.jpg\" imageanchor=\"1\" style=\"margin-left: auto; margin-right: auto;\"\u003E\u003Cimg border=\"0\" height=\"148\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghQHqIt076vVdcK_eo70-_qg4N8YMxZ397PBUgTPIq-4G1dFGIigkvJz0E64MYqXWSqSHjYVdn_JenwnbRRRVIIgoIq9puCL35l1TZZn95WQR05XZBKQZEfw7Li4VyHyMEZ3Lnod1DGDw\/s320\/backtrack+grub.jpg\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003Ctr\u003E\u003Ctd class=\"tr-caption\" style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EWe can see that backtrack has include 'computer\/digital forensic' as  main cause existence of this distro\u003C\/span\u003E\u003C\/td\u003E\u003C\/tr\u003E\n\u003C\/tbody\u003E\u003C\/table\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EAll types of operating systems can be analysed, from DOS and Microsoft Windows-based, through to MAC, UNIX variants, and those utilising more obscure systems. If the data is stored electronically, then it can probably be forensically analysed. From other wellknown literacy, There are five basic steps to the computer forensics:\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp; 1. Preparation (of the investigator, not the data)\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp; 2. Collection (the data)\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp; 3. Examination\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp; 4. Analysis\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp; 5. Reporting\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003EWhich one must be analyzed ?\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EComputer\/digital\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E forensic tools is work to analyze a digital evidence, in the computer world we know that many device can be potential evidence which help computer analyst find the truth, here some potential evidance can be found :\u003C\/span\u003E\u003C\/div\u003E\u003Cblockquote style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u003Ci\u003E images, time and date stamps, removable cartridges, memory card, video, sound\u003C\/i\u003E\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003EEvidence can also be found in files and other data areas created as a routine function of the various types of computer operating systems. In many cases, the user is not aware that data is being written to these areas or files. Passwords, Internet activity, deleted files and temporary backup files are examples of data that can often be recovered and examined. \u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cspan style=\"font-size: small;\"\u003EBacktrack linux have some potential resource to be reliable digital forensic tools. \u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003EBacktrack\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E have so many tools to help computer analyst to do some jobs like Examine drive, Analizing drive, Recovery dive, Vulnerabilities check, Penetration testing, and File interogration. Actualy this is the end of part I, we will continue this diccuss as soon as posisble using title \"\u003Ca href=\"http:\/\/www.ubuntubuzz.com\/2010\/07\/introduction-of-backtrack-for.html\"\u003EBacktrack for Computer\/Digital Forensic Tools Part II\u003C\/a\u003E\", See u there ..\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/1485021875642597155"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/1485021875642597155"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/07\/introduction-backtrack-for-digital.html","title":"Introduction of Backtrack for Computer\/Digital Forensic Tools (Part I)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghQHqIt076vVdcK_eo70-_qg4N8YMxZ397PBUgTPIq-4G1dFGIigkvJz0E64MYqXWSqSHjYVdn_JenwnbRRRVIIgoIq9puCL35l1TZZn95WQR05XZBKQZEfw7Li4VyHyMEZ3Lnod1DGDw\/s72-c\/backtrack+grub.jpg","height":"72","width":"72"}},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-7661309611454134389"},"published":{"$t":"2010-07-01T17:54:00.000+07:00"},"updated":{"$t":"2010-07-29T20:52:26.111+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Security"},{"scheme":"http://www.blogger.com/atom/ns#","term":"tips and trick"}],"title":{"type":"text","$t":"Installing Backtrack 4 on USB Flash Drive"},"content":{"type":"html","$t":"\u003Cspan style=\"font-family: Verdana,sans-serif; font-size: small;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"http:\/\/www.backtrack-linux.org\/\"\u003EBacktrack\u003C\/a\u003E is the most attractive security tools now days, using this swish army knive (\u003Ca href=\"http:\/\/www.blogger.com\/\"\u003Ebacktrack\u003C\/a\u003E) we have more than 300 security tools which can be use to penetrate and evaluate network security in wired or wireless network. As my tutorial before in \u003Ca href=\"http:\/\/www.ubuntubuzz.com\/2010\/06\/running-backtrack-application-in-ubuntu.html\"\u003Ehow to install backtrack on ubuntu 10.04\u003C\/a\u003E here the new guidance how to install Backtrack on USB Flash Drive. Before we start, it's better if you download the latest version of backtrack first \u003Ca href=\"http:\/\/repo.ugm.ac.id\/iso\/backtrack\/\"\u003Ehere\u003C\/a\u003E.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003E\u003Cb\u003EInstalling Backtrack on USB Flash Drive via Ubuntu\u003C\/b\u003E \u0026nbsp; \u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EUsing Ubuntu 10.04 you have a simplest way to make backtrack running on your USB Flash Drive, just prepare the backtrack .iso image then go to \u003Cb\u003ESystem \u0026gt; Administration \u0026gt; Startup Disk Creator.\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; font-family: Verdana,sans-serif; text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIANMPpamHHbCKop2UP4kQtE23GcP_XIi22ub63VOCmPUEJTOzaTtnbcKOho0gdrcOIxY0hGy1gxeyfxwzmuvu93vmdQ1n_G0R3DDmleVYYfnRYdZLvqd3Vdjk8ooeO52ipNxrT5uVX5U\/s1600\/Ubuntu+Startup+Disk+Creator.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIANMPpamHHbCKop2UP4kQtE23GcP_XIi22ub63VOCmPUEJTOzaTtnbcKOho0gdrcOIxY0hGy1gxeyfxwzmuvu93vmdQ1n_G0R3DDmleVYYfnRYdZLvqd3Vdjk8ooeO52ipNxrT5uVX5U\/s320\/Ubuntu+Startup+Disk+Creator.png\" \/\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003EBrowse the backtrack iso in \"Source disk image (.iso)\", chose USB Flash Drive will be use in \"Disk to Use\" , Then make a bootable backtrack USB Flash Drive by \"Make Start Disk\". All of data in your flash Drive will not erase if you not click the tab \"Erase Disk\" and it's better if you prepare the Flash Drive in FAT file system\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003E\u003Cb\u003EInstalling Backtrack on USB Flash Drive via Windows Family\u003C\/b\u003E\u0026nbsp;\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EBefore we start, clean all data in flash drive, then extract backtrack .iso\/image file using winrar or other file extractor and copy all file into your USB Flash Drive (*note : don't copy including the folder, just file inside the folder). if all proccess complate go to terminal (cmd) then change directory into USB Flash Drive (cd) and execute bootinst.bat. If there is no error message while processing, congratulation you have backtrack running in your USB Flash Drive.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ci\u003E \u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/7661309611454134389"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/7661309611454134389"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/07\/installing-backtrack-on-usb-flash-drive.html","title":"Installing Backtrack 4 on USB Flash Drive"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIANMPpamHHbCKop2UP4kQtE23GcP_XIi22ub63VOCmPUEJTOzaTtnbcKOho0gdrcOIxY0hGy1gxeyfxwzmuvu93vmdQ1n_G0R3DDmleVYYfnRYdZLvqd3Vdjk8ooeO52ipNxrT5uVX5U\/s72-c\/Ubuntu+Startup+Disk+Creator.png","height":"72","width":"72"}},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-5839854679326983839"},"published":{"$t":"2010-06-11T10:08:00.000+07:00"},"updated":{"$t":"2011-03-21T18:11:16.828+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"tips and trick"}],"title":{"type":"text","$t":"Running Backtrack Application in Ubuntu 10.04"},"content":{"type":"html","$t":"\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghD5oMOZ_65dQBmv5vmDwBy03Q0UtV0r_NYX5a7QDLyd12MW7J8wvAQL1ma1ooMQVOCePy2Vjtsb9FpxI-eXg3tPzslNoDC_SqTmBfzd3iYmHPbgoj_nfh57UfOcwgxbodAoLGbMzW3Yk\/s1600\/backtrack+4+logo.png\" imageanchor=\"1\" style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghD5oMOZ_65dQBmv5vmDwBy03Q0UtV0r_NYX5a7QDLyd12MW7J8wvAQL1ma1ooMQVOCePy2Vjtsb9FpxI-eXg3tPzslNoDC_SqTmBfzd3iYmHPbgoj_nfh57UfOcwgxbodAoLGbMzW3Yk\/s320\/backtrack+4+logo.png\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cspan style=\"font-size: small;\"\u003EBacktrack is such a linux distro (like ubuntu and fedora) specializing in computer\/network security, BackTrack is\u2029 the\u2029 world’s\u2029 leading\u2029 penetration\u2029 testing\u2029 and\u2029 information\u2029 security\u2029 auditing \u2029distribution.\u2029\u2029With hundred \u2029of \u2029tools \u2029pre installed \u2029and \u2029configured\u2029 to \u2029run \u2029out\u2029 of\u2029 the\u2029 box,\u2029 BackTrack\u2029 4\u2029 provides\u2029 a\u2029 solid\u2029 Penetration\u2029 testing\u2029 platform\u2029 \u2029 ‐\u2029 from\u2029 Web\u2029 application\u2029 Hacking\u2029 to \u2029RFID \u2029auditing\u2029–\u2029its \u2029all\u2029 working \u2029in \u2029once \u2029place. Even backtrack is a separately linux distro all of application inside of backtrack can be run under ubutu or other linux distribution such fedora or redhat.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E \u003Cspan style=\"font-size: large;\"\u003E\"\u003Ci\u003EHow to run a backtrack application under ubuntu or other linux distro ?\u003C\/i\u003E\"\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif;\"\u003E\u003Cspan style=\"font-size: small;\"\u003EThe guide bellow is the answer, follow the intructions bellow to add backtrack application\/package in our database, so you can install or use it afterward.\u003C\/span\u003E\u003C\/div\u003E\u003Col\u003E\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003Ewget -q http:\/\/archive.offensive-security.com\/backtrack.gpg -O- | sudo apt-key add -ok-\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003Esudo echo \"deb http:\/\/archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse\" \u0026gt; \u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026gt;\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E \/etc\/apt\/sources.list\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003Eupdate package database by typing \"apt-get update\", wait until all proccess finish.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003Eopen your \u003Cb\u003Esynaptics\u003C\/b\u003E, look \"left side of your synaptics\" 'you have backtrack application package now :)\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003C\/span\u003E  \u003C\/li\u003E\n\u003C\/ol\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003Eif the list above can't work well, there is another instruction may help you :\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Col style=\"color: #444444;\"\u003E\u003Cli style=\"font-family: \u0026quot;Courier New\u0026quot;,Courier,monospace;\"\u003E\u003Cspan style=\"font-size: small;\"\u003Eecho deb http:\/\/repo.offensive-security.com\/dist\/bt4 binary\/ \u0026gt;\u0026gt; \/etc\/apt\/sources.list \u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"font-family: \u0026quot;Courier New\u0026quot;,Courier,monospace;\"\u003E\u003Cpre\u003E\u003Cspan style=\"font-size: small;\"\u003Eexport http_proxy=\"http:\/\/myproxyserver.com:8080\"\nwget http:\/\/repo.offensive-security.com\/dist\/bt4\/binary\/public-key \u0026amp;\u0026amp; sudo apt-key add public-key \u0026amp;\u0026amp; sudo aptitude update\u003C\/span\u003E\u003C\/pre\u003E\u003C\/li\u003E\n\u003Cli style=\"font-family: \u0026quot;Courier New\u0026quot;,Courier,monospace;\"\u003E\u003Cpre\u003E\u003Cspan style=\"font-size: small;\"\u003Elinks -dump http:\/\/repo.offensive-security.com\/dist\/bt4\/binary\/ | awk '{print $3}' | grep -i deb | cut -d . -f 1 \u0026gt; backtrack.txt\u003C\/span\u003E\u003C\/pre\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cpre\u003E\u003Cspan style=\"font-family: \u0026quot;Courier New\u0026quot;,Courier,monospace; font-size: small;\"\u003Efor i in $(cat backtrack.txt); do sudo aptitude -y install $i; done \u003C\/span\u003E\u003C\/pre\u003E\u003C\/li\u003E\n\u003C\/ol\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003EHere the are a list of backtrack application\/package can\u0026nbsp; be used :\u003C\/span\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u003Ci\u003E\u0026nbsp; BackTrack\u2029‐\u2029Enumeration\u2029\u003C\/i\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Tunneling\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Bruteforce\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Spoofing\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Passwords\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Wireless\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Discovery\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Cisco\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029–\u2029Web\u2029Applications\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Forensics\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Fuzzers\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Bluetooth\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Misc\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Sniffers\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029VOIP\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Debuggers\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Penetration\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029Database\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029‐\u2029RFID\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029–\u2029Python\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Ci\u003E\u003Cspan style=\"font-size: small;\"\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; BackTrack\u2029–\u2029Drivers\u2029\u003C\/span\u003E\u003C\/i\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana,sans-serif; text-align: justify;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/5839854679326983839"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/5839854679326983839"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/06\/running-backtrack-application-in-ubuntu.html","title":"Running Backtrack Application in Ubuntu 10.04"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghD5oMOZ_65dQBmv5vmDwBy03Q0UtV0r_NYX5a7QDLyd12MW7J8wvAQL1ma1ooMQVOCePy2Vjtsb9FpxI-eXg3tPzslNoDC_SqTmBfzd3iYmHPbgoj_nfh57UfOcwgxbodAoLGbMzW3Yk\/s72-c\/backtrack+4+logo.png","height":"72","width":"72"}},{"id":{"$t":"tag:blogger.com,1999:blog-7163505543723996789.post-7115670108657370430"},"published":{"$t":"2010-05-11T10:07:00.000+07:00"},"updated":{"$t":"2010-06-15T07:26:05.619+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Review"}],"title":{"type":"text","$t":"Safe your network connection using tux cut in Ubuntu 10.04 (lucid lynx)"},"content":{"type":"html","$t":"\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E\u0026nbsp;Tux cut is this is a small program to do the (\u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_0\" style=\"font-family: verdana; font-size: small;\"\u003Enetcut\u003C\/span\u003E\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E) job \"cut the network connection from a  user in the same network\" running on \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_1\" style=\"font-family: verdana; font-size: small;\"\u003Elinux\u003C\/span\u003E\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E operating system. Tux cut is the same program as \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_2\" style=\"font-family: verdana; font-size: small;\"\u003Enetcut\u003C\/span\u003E\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E (windows) which usually running using visual basic library, this is a small and \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_3\" style=\"font-family: verdana; font-size: small;\"\u003Epowerfull\u003C\/span\u003E\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E program to help us to safe and secure our \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_4\" style=\"font-family: verdana; font-size: small;\"\u003Einternet\u003C\/span\u003E\u003Cspan style=\"font-family: verdana; font-size: small;\"\u003E connection from `greedy` user who consuming much bandwidth.\u003Cbr \/\u003E\n\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"font-family: verdana; text-align: left;\"\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgW8853wzy8vPeZ7GdouCSYXB4KA9x7DThbiPXekl0cCnFezJ1XwAHdn2yLvQTAe8XsK_y2c8eVVUq9S2Gbu15OlAvQUUKZAebHvVLspCn8coL78CmiLdvHQ54LUHGVKk1wk4YxwBNhTx4\/s1600\/TuxCut.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"236\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgW8853wzy8vPeZ7GdouCSYXB4KA9x7DThbiPXekl0cCnFezJ1XwAHdn2yLvQTAe8XsK_y2c8eVVUq9S2Gbu15OlAvQUUKZAebHvVLspCn8coL78CmiLdvHQ54LUHGVKk1wk4YxwBNhTx4\/s320\/TuxCut.jpg\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E \u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E \u003C\/span\u003E\u003Cspan style=\"font-size: small; font-weight: bold;\"\u003EDownload tux cut (*. deb package)\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\nbefore we start download all application needed. Select *.deb program if you running on \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_5\" style=\"font-size: small;\"\u003Edebian\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\/\u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_6\" style=\"font-size: small;\"\u003Eubuntu\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E  \u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_7\" style=\"font-size: small;\"\u003Evarian\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E (\u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_8\" style=\"font-size: small;\"\u003Ekubuntu\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E,\u003C\/span\u003E\u003Cspan class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_9\" style=\"font-size: small;\"\u003Eedubuntu\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E).\u003Cbr \/\u003E\n\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv class=\"body\" dir=\"ltr\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Ccode\u003E\u003C\/code\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote\u003E\u003Cspan style=\"font-size: small;\"\u003Ehttp:\/\/bitbucket.org\/a_atalla\/tuxcut\/downloads\/\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003Edownload and adjust with your linux version or download the latest version \u003Ca href=\"http:\/\/bitbucket.org\/a_atalla\/tuxcut\/downloads\/TuxCut-3.1_all.deb\"\u003E        \u003Cspan style=\"font-weight: bold;\"\u003ETuxCut-3.1_all.deb\u003C\/span\u003E\u003C\/a\u003E.\u003Cbr \/\u003E\n\u003C\/span\u003E\u003Cspan style=\"font-size: small; font-weight: bold;\"\u003EPrepare supporting application\u003C\/span\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E\u003Cspan style=\"font-size: small;\"\u003Eto ensure that tux cut can be running well, install supporting application needed.\u003Cbr \/\u003E\n\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote style=\"font-style: italic;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E* arp-scan\u003Cbr \/\u003E\n* arp-tables\u003Cbr \/\u003E\n* dsniff\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003Einstall arp-scan using command :\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote style=\"font-style: italic;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E$ sudo apt-get install arp-scan\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003Einstall dsniff using command\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote style=\"font-style: italic;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E$ sudo apt-get install dsniff\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003Einstall arp-tables using command\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote\u003E\u003Cspan style=\"font-size: small;\"\u003E$ sudo apt-get install arptables\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-weight: bold;\"\u003E installing Tux Cut-3.1\u003C\/span\u003E\u003Cbr \/\u003E\ninstall tux cut using command :\u003Cspan style=\"font-weight: bold;\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cblockquote\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-weight: bold;\"\u003E\u003Cspan style=\"font-style: italic; font-weight: normal;\"\u003E$ sudo dpkg -i  TuxCut-3.1.deb\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-weight: bold;\"\u003E\u003Cspan style=\"font-style: italic; font-weight: normal;\"\u003E$ apt-get install -f\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/blockquote\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-weight: bold;\"\u003E\u003C\/span\u003E\u003Ccode\u003E\u003C\/code\u003ECoungratulation your system already has a tux cut now, happy surffing ..  :)\u003Cbr \/\u003E\n\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/7115670108657370430"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/7163505543723996789\/posts\/default\/7115670108657370430"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.ubuntubuzz.com\/2010\/05\/secure-your-network-connection-using.html","title":"Safe your network connection using tux cut in Ubuntu 10.04 (lucid lynx)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgW8853wzy8vPeZ7GdouCSYXB4KA9x7DThbiPXekl0cCnFezJ1XwAHdn2yLvQTAe8XsK_y2c8eVVUq9S2Gbu15OlAvQUUKZAebHvVLspCn8coL78CmiLdvHQ54LUHGVKk1wk4YxwBNhTx4\/s72-c\/TuxCut.jpg","height":"72","width":"72"}}]}});