Hardware :: Mini Box For Hacked Linux?
Dec 28, 2010
I'm wondering if there is a mini pc than I can use to install my compiled linux.For watching video, listening radio from internet..As small as possible, with HDMI, audio output, no more than 3 PCI ports, many USB ports and without the old PS/2 ports.
View 2 Replies
ADVERTISEMENT
Nov 22, 2010
is there a mini-linux distro with a browser that comes with plugins for adobe flash (to watch videos videos) and support for pdfs and powerpoint pages. it would also be nice to have a media player for mp3 and wmv files.
View 12 Replies
View Related
Nov 6, 2010
A few months ago, I got one of these and it is great for travel. I had to buy Norton for it and now the trial MS Office has expired which burns me. MS Windoze 7 Light is an adventure plus all the other bundled useless (to me) HP stuff.I use SUSE Linux 11.2 on my main mail/internet desktop and I like it a lot so I have been thinking about swapping the hard drive out of the HP Mini and loading 11.2.
Has anybody done this? I've searched but haven't turned up any threads about this. I'm a newbie so maybe I need to be pointed?Maybe there is a more suitable Linux distribution but I only know SUSE and am ok with it.My HP is a Mini 210-1000 if that is relevant.
View 9 Replies
View Related
Sep 27, 2010
I`m trying to find minimalistic distributive for vmware player with switch user option. With gdmflexiserver or something like this.Or perhaps there is a way how to do this in puppylinux or DSL.
View 2 Replies
View Related
Apr 7, 2011
my server is web server with centos 5 & parallel 9, don't why all web sites in this server have been added a home pages which is not mind. even the mysql admin also redirected to other site, what i can do!
View 6 Replies
View Related
May 25, 2011
Let me start by saying its a school assignment, and therefore not a real world situation. Nevertheless, I would appreciate any help I can get.The company ProvidIT has contacted us, their website has been hacked. Instead of their normal website, it shows Buy creditcard details online, click here (cc4u.jpg). A classical defacement.The following offenses also might have been committed. So its our job to find evidence for those offences.(I had to translate the Dutch law articles, so they might not be 100% acurate legally speaking, but you get the idea)
- Unlawfully accessing automated systems
- Copy or tap (eavesdrop) data after hacking
- Unlawfully access or use system resources of a 3rd party computer
[code]....
View 3 Replies
View Related
Mar 8, 2010
I want to know if any one hacked or getting into my computer. I am using lucidlynx right now, My computer directly connected to modem, not using any wireless router. How can i check if some one hacked? How to prevent it?
View 6 Replies
View Related
Jan 3, 2011
I have a 6yo laptop...z60m. Solid little thing that I knocked around so much the hinge broke. My dad jerryrigged it so it can stay open.
So now I use it as a glorified DVD player. Then, around February the hard drive died. I put it in fresh, loaded a couple of regular games and the DVD modifications to play DVD's. So, besides the basic upgrade to 9.1 not much as been done.
Well, last week my panel disappeared. I procrastinated and last night I got on the computer. I did F2 and "xfce-panel" and my panel reappeared exactly how I'd last tweaked it.
With on exception. This blue globe, "Akonadi" had mysteriously appeared.
Thing is that I haven't installed or updated anything for 8 months...why? becuase I haven't had this thing connected to the Internet. The wireless tower has been on. (my bad) but all of the signigals in my neck of the wood are encripted so I just let it be.
I don't know where this program came from. Is it loaded in xubuntu? Why would it show up? And furthermore if there was someone with malicious intent (unfortunatly I do have to take that into consideration) have put this on for data collection?
View 8 Replies
View Related
Feb 27, 2011
I have windows computer and it is being hacked.About month ago or more some one hacked my router and install new firmware from Firmware Version: Talisman/Basic V1.2.9a
My router is linksys and SSID got changed to sveasoft.I had WPA set up and MAC filtering .
Some one hacked my router and change Firmware Version.And user name and password also got change to just admin.
Well now I got a pop up from my Kaspersky saying network attack scan.generic.TCP 74.63.245.168
only thing I can find on it http://whatismyipaddress.com/ip/74.63.245.168
It is Limestone Networks in Dallas.
Some strang things have been happing to my computer in past 4 months and is getting worse.
I have no firewall or router now.And have not gone to the store and get new router yet and I'm thinking of formatting my computer and putting linux and get good firewall like zone-alarm.
View 9 Replies
View Related
Apr 11, 2011
Awoke to millions of failed SSH attempts into my public server. Behind a firewall which forwards only SSH and HTTP. Local iptables deny everything except SSH and HTTP. Exact same symptoms and results as Chris over at his site: here.I just want to know how they managed to execute a script, or make changes etc? Here's some info:According to cat /var/log/secure | grep "Accepted" no one besides myself gained entry via SSH.The FTP account (500:48 (Purposely in apache group)) is chrooted to a 775 directory and vsftpd does not accept anonymous entry. vsftpd and xferlog's are empty?
Code:
You have new mail in /var/spool/mail/root
[root@dev etc]# tail /var/spool/mail/root
[code]....
View 11 Replies
View Related
Dec 21, 2009
if anyone of you have shifted using Paid Red Hat Linux with CentOS, and what are your experiences of moving from Paid Linux to Unpaid Linux CenOS. When do you suggest a person use Paid Linux and when to use Unpaid Linux?
View 1 Replies
View Related
Apr 16, 2010
I have learnt that the network locked huawei modems may be unlocked to use any sim card bu getting a special unlock code and it should ask for it when a "foreign" SIM card is inserted. This procedure works well in Windows, but in Linux where I use wvdial, I dont get prompted for this unlock code. Does anyone know how to insert the unlock code in Linux using any Linux tool (GAMMU/GNOKII/Minicom etc)?
View 2 Replies
View Related
May 5, 2010
i would just like to verify that the command
lspci would show the FC adapter installed
is there any other command that i can use to verify the FC adapter is being installed
View 4 Replies
View Related
Aug 27, 2009
I am sick to the back teeth of fedora 11 Every time I try and run yum for any install at all it just keeps saying segment fault. When I have tried installing mysql it keeps coming up with the same fault yet again segment fault. I even get this stupid error when trying to install postgresql:
[Code]...
Its got nothing to do with my connection at all keeps happening at home, work when I use my vmWare server, I have a netinstall of FC10 so I am going back to that.
If anyone can help me in using a better method of making yum work, then thats brilliant but one final try and one error I am going back, this is a major rant as I am working for clients now and this just isnt suitable, if FC10 does this then I am going to a different dist like CentOS or something more robust as this is just rediculous!
View 14 Replies
View Related
Oct 21, 2010
make a check list of things to do to see if i can figure out if my machine is or not compromised .
View 9 Replies
View Related
Feb 19, 2011
I had a serious breach of the cellular segment of my communications network this week. All I can say is nobody got hurt. The attackers also knew where to find me via email. I'm concerned that perhaps they've penetrated this aspect of my system as well, although they seemed pretty specifically focused on the phone. There have been no changes on anything on my computer, and of course, I went ahead and changed all the passwords. How can I verify or at least look into the possibility of having been hacked as well.
View 8 Replies
View Related
Mar 22, 2011
my computer has been surely hacked for at least more than two months; my private information are being hacked and spread around! I initally used Windows Vista and I had the firewall off and no antivirus software. When I realized that my OS had been hacked, I began turning my firewall on and installing security softwares, but nothing stopped the hack.
Yesterday, I erased all my partitions and installed Ubuntu 10.10. I installed rkhunter and a firewall. I changed my static IP adress, at least for the sake of knowledge, to another one, then I got disconnected since my router only allows my old IP.
When I'm about to write my admin password, I disconnect from the network. I've scanned my system using rkhunter, and the result is a list of 30 suspicious files!
Can I adjust my router in a way that it can allow any IP adress? If yes, can I have a non-static IP adress? How to prevent the hacking in the first place? However, I believe, I don't know yet, that my Ubuntu has also been hacked...
If I can't get rid of the hacker(s), then I should permanently disconnect from internet and find another way to receive information anonymously through the internet.
View 9 Replies
View Related
Jul 3, 2009
I have LAN with 20 machines. I see that one of them is infected. Its sending a lot of packets to the internet. My internet connection at this momment is realy slow. What should I do? How to detect which machine is infected? I'm using hardware firewall. Fortigate... Its hard to configure there nice logs. Any good software. I don't want to switch off network cable from each machine and check.
View 10 Replies
View Related
Nov 14, 2010
I always use professional services to secure my servers. Everything was fine for years but a week ago my server got hacked.I don't know how the hacker got my username/password - it was not something like admin, password.9 months ago my PC was infected with some virus which connected to the FTP server by using password which was saved in CuteFTP and infected all index files with some javascript. Then I changed the user/FTP password and didn't save it anymore in Cute FTP. Of course, I checked all the folders and re-uploaded all infected files. Is it possible that this virus uploaded some hidden file which was able to get the new password for this account?
The server was hacked from so called Tor IP address. I am tiref of worrying about server security and now have an idea to get a static IP address from my ISP and to allow logins only from this IP address. What do you think about it? This idea looks good for me but are there any risks to lose access to the server. Can ISP provider change the static IP address for some reason?
View 9 Replies
View Related
Feb 12, 2010
I want to Migrate my C++ Application from SuSE Linux to Red Hat Linux.What impact analysis i should do?
View 3 Replies
View Related
Apr 5, 2011
Am I safe when surfing the web with default Firewall setting? Can My Computer be hacked when the firewall is in the default setting? I have no knowledge on configuring Firewalls
View 11 Replies
View Related
Mar 20, 2011
I need to install a program on a linux router. Can this also be done on a linksys router that has ddwrt installed on it? How?
View 2 Replies
View Related
Nov 18, 2010
A scan on my computer reported as up many local ips which simply does not exist in my network. This host is supposed to have ip 192.168.0.4, but all other ip should not be there. I have a USB modem connected to a Linux box, connected itselfs to a wifi linksys router and thats it.
# nmap -sP '192.168.*.*' | grep -v down
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2010-11-18 21:46 CET
Host 192.168.0.4 appears to be up.
Host 192.168.7.27 appears to be up.
Host 192.168.10.0 appears to be up.
[Code]...
View 3 Replies
View Related
Sep 13, 2010
for a while I?ve seen hundreds of attempts via ssh against my system. They finally stop and this could mean only two things my security measures are working "NOT" or they actually got in. In any case browsing around my system for suspicious changes I found a file"agent.4015" on my tmp folder. This file denies read privileges to root and I?m afraid to chmod until I know for sure what it is.
View 4 Replies
View Related
Apr 13, 2010
I need to know whether Ubuntu can be hacked when it is installed as a dual boot with W7 by hacking windows and getting access to the Ubuntu partition?
What I would also like to know if this way can be used to put a key logger or screen capture in Ubuntu which installs next time Ubuntu is started?
View 9 Replies
View Related
Apr 28, 2010
I believe it is a keylogger because my Facebook account has been hacked, I believe my email has as well. I heard that even if you reformat a harddrive, the virus could still sit there and apparently that is what happened to me. how to be rid of it and keep my security. I installed RKhunter and Chkrootkit. Rkhunter reports warning files while checking my filesystem. I can post a log if need be.
View 9 Replies
View Related
Jun 19, 2010
My server (Ubuntu 10.04 desktop) was hacked. I had my ethernet plugged in to an Intel 82557 Ethernet Pro card (Pulse) when my server was first attacked. After it was attacked I reinstalled the system but my ethernet card still would not work. Ubuntu recognized it, but it is continually disconnected and the little status lights on the card do not light up anymore.
So then I plugged the ethernet to the mother board itself. Well, my server was hacked again and now the ethernet on the motherboard does not work. Again, Ubuntu (after a reinstall) recognizes the hardware but nothing happens when I plug the etherent in. The motherboard is a BioStar P4M900 VIA chipset. I have a few of the system logs here [URL] which I saved right after the first attack.
View 9 Replies
View Related
Aug 19, 2010
Has anyone hacked/installed Ubuntu on the Nokia N900 and/or Android phone? MeeGo is coming very close to a full desktop distro. I am very curious to see what sort of performance Ubuntu (or something lighter like Lubuntu) exhibits on a mobile device.
View 3 Replies
View Related
Jun 13, 2011
I just got control over a server that was hacked several months back. The other day we started receiving rejected emails sent from my server to a yahoo email address that is no longer active that contained users login information. I am trying to find the process that is sending these emails. So far its been like finding a needle in a haystack. The email that is being sent is appending the login information each time it is sent so there must be a local file that contains this information. I have tried using grep and find without any luck.
View 2 Replies
View Related
Apr 9, 2010
I've discovered that after restoring my site's backup this has happened to me again. How to delete the hacked /home/crocbits directory so that I can restore the backup under the same username. When I try to delete /home/crocbits I get this message when logged in as root:
[Code]...
View 9 Replies
View Related