Ubuntu :: Finding Information Supplied To Verify A Downloaded .iso For Security?

May 28, 2011

I searched Using my User Name and did not find the post post made for this problem.Still the search using the User name does not return the first post or this.

View 4 Replies


ADVERTISEMENT

Ubuntu :: Supplied To Verify The Integrity Of A Downloaded Iso?

May 28, 2011

I am not able to find any information to verify a downloaded .iso file for security and integrity at [URL]../download/ubuntu/download .Are they supplied elsewhere?

View 1 Replies View Related

Fedora Installation :: Where To Get The Md5 Checksum To Verify If The Downloaded Iso Correct

Sep 13, 2009

I just downloaded the "Fedora-11-i686-Live-KDE.iso" and "Fedora-11-i686-Live.iso". I want to check if the downloaded files correct or not. I can use a tool to get the md5 sum of the downloaded files. But I want to compare them with the original ones.

View 6 Replies View Related

OpenSUSE :: MD5 Hashcheck - Check And Verify Downloaded File

Aug 5, 2010

Is there a program available which will check and verify a downloaded file. Ubuntu has gtkhash and Mandriva uses Parano. I know how to Md5 using the command line, but gui software would be a bonus.

View 4 Replies View Related

General :: Verify Vmware Drivers To Test Version Information?

Aug 16, 2010

I have noticed kernel.org with kernel releases on the mainline.Example: 2.6.36-rc1 is currently on the mainline. What does it mean? Does it mean that feature changes been freezed.Does it mean "2.6.36-rc1 Released". I have job to verify vmware drivers to test the version information, Can I test it now through compiling for vmware drivers now. Lots of Git activity goes on after kernel comes on mainline. Does it mean our vmware drivers can only be tested after kernel if finally announced

View 4 Replies View Related

Ubuntu :: Finding Downloaded Applications

Feb 6, 2010

Where can I find the downloaded applications?I downloaded digital camera apps and can find them, the same with some bible dictionaries.

View 3 Replies View Related

Security :: Verify FF Add-on Is Using Tor/Privoxy?

Mar 10, 2010

Mint 8 (Ubuntu 9.10, Karmic Koala), FF 3.5.8 with noscript, betterprivacy, ghostery, torbutton Complete newbie regarding wireshark or netactview but I was advised to try one of these to determine if a Firefox add-on was using Tor.

View 6 Replies View Related

General :: Finding The Location Of Downloaded Packages?

Oct 7, 2010

Where are downloaded packages saved when i download using yum?

View 2 Replies View Related

Ubuntu Security :: Broke Into Computer - Verify Attack?

Dec 28, 2010

mpg123 suddenly started playing a police siren occationly. I checked the process once I heard it, and root was the process owner. How could this happen? Have someone broke into my computer? If so - how could I verify an attack? I run Ubuntu 9.10.

View 2 Replies View Related

Ubuntu Security :: Encrypted Home Folders - Verify That It's Actually Performing The Encryption/decryption?

May 1, 2010

I ticked the box for this when I installed Lucid, but how can I verify that it's actually performing the encryption/decryption?

View 4 Replies View Related

Fedora Installation :: Finding Information About Installed Package?

Mar 26, 2009

I just installed a package using the System -> Administration -> Add/Remove s/w tool.

How can I find information about what files it has installed and where? I was expecting to get some header files from this package but cannot find them in the normal places like /usr/include etc.

View 5 Replies View Related

Programming :: Finding A Code For Network Adapter Information?

Nov 13, 2009

I want to get the hardware information in linux. As in windows we can have API to get the network adapter information and all. But in linux why dont we have? i try to read network adapter info in /proc/bus/devices file.. but that file is very hard to parse.and i looked at the lspci source c ode. but unfortunately I dint undersatnd that code to get the network adapter information.

View 1 Replies View Related

Ubuntu Security :: How To Launch Downloaded TrueCrypt

Mar 7, 2011

I downloaded TruCrypt but can't get it to launch.

View 2 Replies View Related

Security :: Iptables: Verify Traffic On Port To Check If It Is Legitimate For That Port?

Apr 18, 2011

Is there any way to verify if packets being trafficked over a certain port are valid for the service you want to use this port for?

One obvious example that probably clarifies my question:
When I open port 443 (outgoing or incoming) for https/ssl traffic, I don't want this port to be used for say openvpn traffic.
Thus: when someone wants to surf to a website with https, it should be ok but if someone wants to connect to his home openvpn server over that same port, it should be blocked.

View 5 Replies View Related

Security :: LDAP Can't Bind "certificate Verify Error"

Apr 14, 2010

this is not on the master node, but rather the node that is being replicated to. The problem occurs when i query using ldapsearch or an `getent passwd` EG ldapsearch:

Code:

[root@cakeslave ~]# ldapsearch -x -b 'cn=Christian Unger,ou=People,dc=example,dc=org' -D "cn=replica,dc=example,dc=org" -H ldaps://cakeslave.example.org -w cakewalk
ldap_bind: Can't contact LDAP server (-1)
additional info: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed

[code]....

The cacert.pem in /etc/ssl/certs and /etc/openldap/certificate are identical (check using md5sum). I have done an strace and found that it looks at /etc/pki/tls/cert.pem .

View 6 Replies View Related

Ubuntu Security :: Downloaded With A Terminal The Program ClamAV?

Feb 14, 2010

I just downloaded with a terminal the program ClamAV. But where it is located? I don't see it in Application - accessories -etc ? neither in "Places", etc where it is? ps: the place where I found about this was here:[URL]...

View 4 Replies View Related

Ubuntu Security :: Hide System Information How Match RAM

Jun 25, 2010

Im using Ubuntu 9.10.When I use Nessus scan to scan my computer I can receive information about how match RAM, how man CPU etc.

View 1 Replies View Related

Security :: Backing Up Dmcrypt Information?

Dec 6, 2010

As a matter of routine, I use dd to collect my hard drive master boot records, and I save the resulting file someplace where I can always get to it if I have to. It has occasionally saved me when some kind of disaster has struck and damaged a partition table or rendered a drive unbootable.Since I have switched to a fully encrypted system, I have been wondering exactly how to save the dmcrypt information. Dmcrypt works with a standard filesystem, and the filesystem itself isn't encrypted, only the contents.Thus dmcrypt must write a header someplace that includes all the information needed to decrypt the contents of the partition, including the key and the type of encryption employed.

Should something happen that causes that header to become corrupted, the entire partition is inaccessible and no recovery tool will work. So, it would seem like a really good idea to use dd to copy that header someplace safe.Now, I haven't taken the time to sit down, read the dmcrypt code, and try to figure out how to do it from that. The command cryptsetup luksDump doesn't do what I want because it dumps that information, but not in a format that would be immediately useful in copying the information back to a damaged partition. And every howto I've found tells me how to set up dmcrypt, and encrypt partitions and so forth. None tell me how to recover this information, other than mentioning that it is stored in the first few sectors of the partition.

Looking at some of this through a hex editor, I *think* that saving the first 512 bytes of the partition gives me what I want, but I'm not positive of that and I hesitate to depend on any putative backup scheme of this sort that I haven't vetted. I want to save no more than I need, and I certainly don't want to save any less than what I need.Edit: As I think about it, the first 512 bytes can't be enough because Luks/dmcrypt permits multiple keys. So how much information do I need to save?

View 5 Replies View Related

Ubuntu Installation :: Security Updates Clobber Configuration Information?

Jan 13, 2010

Why can't Ubuntu store configuration information in a way that it wouldn't need to be clobbered in order to apply security updates? For example, this mornings updates told me I had to choose between using a new version of smb.conf that's part of the security patches, stick with the old version, or let the update installer merge them. Of course, the first two choices have obvious drawbacks: why should I have to choose between losing all my SMB settings or refusing security fixes? So I chose the merge, which came back with "Conflicts found during three-way merge! edit `/etc/samba/smb.conf' and sort them out manually."

View 5 Replies View Related

Security :: Using The Ubuntu Gateway To Gain Information About A Physical Burglary?

Jun 15, 2010

We've had a site broken into, and several of the desktop computers physically stolen. The Ubuntu 9.10 router/gateway/firewall/web filter box has however NOT been stolen. I'm wondering if there is any information we can get from this that would help the police.

NAT and firewalling are handled by firehol. It runs a DHCP server to provide the desktops with IP addresses. It runs a Samba server with some file shares. It runs Squid and Dansguardian in an intercepting-proxy configuration. Of particular interest might be whether the MAC addresses of the stolen desktops can be obtained, which might help with tracking them down. Also anything to narrow down the time of the break-in.

View 2 Replies View Related

Fedora Security :: Tweaks For Storing Information In Ram?

Nov 19, 2010

I've been looking for a tweak that would allow me to store temp and log files in ram. I've found a few that involved editing the fstab file, but they were either Ubuntu articles or they were over a year old and perhaps didn't apply to Fedora 14.I hear there is also a 'noatime' command that can help speed up processes by telling the kernel not to saved when files are accessed.And what are the advantages and disadvantages of noatime, and writing log/tmp files to ram?

View 7 Replies View Related

Ubuntu Security :: Patch For Sudo That Allows Sudoers Information To Be Pulled From MySQL?

Apr 12, 2011

This may be a stupid (?) question, but does any one know of a patch for sudo that allows the sudoers information to be pulled from mySQL?
I run multiple servers with multiple people working on them and would like a one-stop update of permissions.
Yes, I could use rsync or the like, but I'm just wondering if this has been done, or could be done.

(Sorry if this is the wrong forum, I'm kinda new around here, posting wise and this seemed to fit. Feel free to move it if it's not)

View 3 Replies View Related

Fedora Security :: Setting Up Server To Store User Login Information

Mar 18, 2010

I wanted to set up Computer Lab. loading Fedora 11 OS and one system acting as a Server to store Users(Student) Login Informations. When students do a programs, all programs (eg, C++ programs) files should be saved in the local fedora system but when login to the system, the login should be validate by a Server System.

View 5 Replies View Related

Ubuntu Security :: Finding Connections On Ports Despite Ufw Rules?

May 2, 2010

my ufw rules have been loaded and active yet using iptraf i see tcp connections on ports that were never allowed by ufw. can anyone explain this too me does ufw just not work?

View 6 Replies View Related

General :: Blacklist A DNS Server Supplied Via DHCP?

Jul 2, 2010

The DHCP server on a network I use specifies a DNS server that I do not want to use. Is there a way to continue to use DHCP but to modify the provided information or to "blacklist" one (of the three provided) DNS servers?

The client in question is running Ubuntu 10.04. Networking is managed by NetworkManager but I'm not wedded to that. In fact, I don't like it and wouldn't mind a reason to use something else.

View 1 Replies View Related

General :: Eliminate Error When No Parameter Is Supplied?

Apr 23, 2011

I am familiar with bash, but my works require csh. in my .cshrc, I created this alias:alias cd 'cd !:1; ls -l' It works very well except for one case: when I cd without any parameter:

cd In which case, I get the "Bad ! arg selector" error. How do I eliminate this error?

View 1 Replies View Related

Security :: Finding Source Of Pings ?

Oct 17, 2010

How i know who is pinging me or trying?

View 1 Replies View Related

Debian Installation :: All Packages Downloaded Gone - Use Package Downloaded?

Mar 1, 2010

after the netinst finished to download the last package, one hour later the process never continues, I checked the log file and I didn't find anything suspecious, also dmesg and nothing, in fact, in the log file before checked I found that the last line was registered just a minute ago - DHCP renew IP-, so my questions are:

1. all the packages downloaded are gone?, can I restart the installation using all those packages downloaded?

2. where I can find the error or problem that cause that the installation was freezed?

3. in the case that installation needs to start from the beginning, can I use the package downloaded?

View 3 Replies View Related

Software :: Warning: Invalid Argument Supplied For Foreach()

Apr 27, 2011

I am trying to duplicate our company website running from Centos 5.5 to another Fedora 13 box. The output is ok but when I tried to open 1 page which automatically search pdf files, this errors appear:

Warning: fopen(help_search/file - file.txt) [function.fopen]: failed to open stream: No such file or directory in/var/www/html/site/index.php on line 1018

Warning: Invalid argument supplied for foreach() in /var/www/html/site/index.php on line 1023

Warning: strtotime() [function.strtotime]: It is not safe to rely on the system's timezone settings.You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected 'Asia/Manila' for 'PHT/8.0/no DST' instead in/var/www/html/site/index.php on line 1297

Warning: date()[function.date]: It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected 'Asia/Manila' for 'PHT/8.0/no DST' instead in /var/www/html/site/index.php on

I was just confused because in Centos 5.5 it works fine.

View 2 Replies View Related

Fedora Security :: Finding The Source Of A Break In ?

Jul 16, 2010

I noticed a very very high cpu usage on my webserver. All four CPUs were running on 100%.

Top shows several perl processes from apache that run for a long time, with a high %CPU.

Since the server was fc10, I did a fresh installation to fc13, and the fresh installation didn't have this issue. Then I loaded back all the user-data, and it started again.

Several, 4, 6, 8, ... 100 perl processes from apache.

lsof -p with the pid of such a process

Code:

The estabilished connection is sometimes "proud2pirate.com" wich is a non-existing domain.

View 14 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved