How To View CHM Files In Linux?
0 comments 12/31/2009 08:43:00 AM Posted by Surendra Kumar AnneLabels: Applications, How-To's, Softwares and Downloads, Tutorials
If you are a book worm then defiantly you will know what is a CHM file?
For those who don't know the CHM files let me explain it. CHM file is a compiled HTML files/document(s) in to a e-book kind so that we can view and index easily. This formate is the proprietary of Microsoft and by default the application to view CHM files in windows is installed.
We have to install CHM file viewer. There are so many applications to achieve this such as
* gnochm
* CHMsee
* FBReader
Qt
* Okular
* kchmviewer
* Kchm
* chmcreator
Other
* xCHM
* Archmage
* DisplayCHM
* CHM Reader Firefox addon
In this post I will show you how to install gnochm application to view CHM files.
#rpm -ivh libchm1.0.40-1.i386.rpm
#rpm -ivh python-chm.0.8.4-1.i386.rpm
#rpm -ivh 0.9.11-2.i386.rpm
Installing gnochm in Ubuntu
#apt-get install gnochm
Configuration of SQUID Reverse Proxy
0 comments 12/31/2009 06:46:00 AM Posted by Meghana M BhombhoreLabels: Proxy Servers
- Don’t install SQUID from package installations such as rpm in Redhat and apt-get/deb in Debain.
- Download the source package from squid official site, then compile it and install it according to your needs.
- In order to SQUID run perfectly please change the ownership of the installation folder to squid.
- By default SQUID will not create cache directory in the installation directory, so we have to create it manually with ownership as squid user and we have to execute squid –z in order to SQUID work properly which will create.
Prerequired packages:
1)gcc compiler
2)openSSL
d. --with-openssl will enable openSSL properties on squid
#/opt/squid/sbin/squid -k parse
How To View PDF Files/Documents In Linux?
0 comments 12/29/2009 07:01:00 PM Posted by Surendra Kumar AnneLabels: How-To's, Softwares and Downloads, Tutorials
When i started using Linux. Big question was in my mind is whether i can view PDF(Portable Document Format) files or not? but as Linux prove to be "get your work done in many ways". a classic example is PDF viewers in Linux.
Its very much easy to install PDF viewer
You can install either
xpdf
For Red-hat flavours
For Ubuntu
apt-get install xpdf
or
kpdf
For Redhat flavors
rpm -ivh kpdf.ver.i386.rpm
apt-get install kpdf
or
For Redhat/Ubuntu flavors
http://ardownload.adobe.com/pub/adobe/reader/unix/9.x/9.2/enu/AdbeRdr9.2-1_i486linux_enu.bin
Download Acrobat Reader from the above link and install
./AdbeRdr9.2-1_i486linux_enu.bin
Enjoy reading PDF documents. If you are having any issues in installing the packages please feel free to comment.
Contribute To linuxnix.com. With Hacks/Tutorials/Tips Etc.
2 comments 12/26/2009 05:57:00 AM Posted by Surendra Kumar AnneLabels: News
Contribute
Howtos/tips/configurations/hacks/Tutorials etc
Do you like linuxnix.com? Have written a tutorial and would you like to share it with others, you can publish it on linuxnix.com. Register your self by sending a mail to howtos@linuxnix.com about your interest. We will contact you back.Help Us To Serve You Better...!
- Please do not submit copy righted content(You must either be the author of the material or have the original author's consent to publish it).
- Please don't submit incomplete tutorials - we can publish only finished tutorials and you can take help from us if you struck with some where.
- You can submit even small topics too, for linuxnix.com quantity does not matter. Only quality matters.
- If you are good at grammer/vocabalory and saw any mistakes in linuxnix.com you are always welcome to mail spell@linuxnix.com.
Access Linux From Windows Through Virtual Network Computing(VNC)
0 comments 12/18/2009 08:35:00 AM Posted by Meghana M BhombhoreLabels: How-To's, Tutorials
VNC(Virtual Network Computing) is an open source utility to access any remote host through GUI. In this post we will see how to login to Linux server from a windows machine.
Step1 : Install VNCserver on Linux machine
#rpm –ivh vnc-server-4.1.2-9.el5.i386.rpm
Step2 : Start VNC server now
#service vncserver restart
#vncserver
Note and this is very important :
1. Now it will ask for a password to access the Linux server through VNC viewer and this password is for root user to login from any machine through VNC.
2. If you want to access GUI for a particular user, first login to that user account and execute vncserver command. When you execute this command in the user login it will ask for a password, and this password is for the user to login from remote host through VNC to the Linux server.
3. For security reasons please give different password for accessing Linux through VNC other than your password to login to the Linux machine. If you remember and understand these points your goal is almost completed.
Step3 : Make sure that your Linux server is running in run level 5/GUI. Any of the below command will start your GUI service in Linux.
#init 5
Or
#startx
Step4 : By default Linux will not allow login to GUI. We have to configure VNC server to allow user to login through GUI. For configuration VNC server edit ~/.vnc/xstartup file
#vi ~/.vnc/xstartup
Uncomment these below two lines in the file, then save and exit the file.
unset SESSION_MANAGER
exec /etc/X11/xinit/xinitrc
Step5 : Now once again start the vncserver( just execute vncserver command) in user account, so that it will continuously on. When you execute the command it will provide valuable information how to access the server. The clipped output is as follows, here if you see its saying to access the GUI you have to give hostname as rp2.test.com:2
[kumar@rp2 ~]$ vncserver
New 'rp2.test.com:2 (kumar)' desktop is rp2.test.com:2
Starting applications specified in /home/kumar/.vnc/xstartup
Log file is /home/kumar/.vnc/rp2.persistent.co.in:2.log
Step6 : Now login to Windows machine where VNC viewer is installed and try to access the Linux server.
Some FAQ :
1.What is the port no for VNC server?
Ans : 5800+
2.Which are the other tools which will work same as VNC?
Ans : VNC, TS, Citrix, Reflection etc.
3.What is the significance of rdesktop?
Ans : Rdesktop is an utility to access windows machines from Linux.
Please comment regarding this post:-)
Google's Browser For Linux And MAC World Relesed
0 comments 12/16/2009 07:20:00 PM Posted by Surendra Kumar AnneLabels: Google, News
Hello every one...! Google released its browser for Linux and MAC world officially. There is an unofficial build which most of the Linux geeks using till this point. Now its officially build from Google with a rotine beta tag. Though Google (many)servers run on linux, Google have showed less intrest to linux based applications(For example there is no gtalk client for linux till this point officially). May be this is because of user base and market too. Google taken nearly 1.2years to develop a Linux based browser after Google chrome browser for windows announced in 2 September 2008.
There are many featuers in this browser though it is a beta release.
1.Extentions(Are some kind of add-ons with which we can add our favorite utilites to the browser).
2.Theams(We can chage the look of the browser).
3.A task manager(Google chrome considers each tab as an individual application, so if one tab crashes it will not affect other, we can kill that tab by using this task manager).
4.Efficiently utilization of empty tab by keeping nine most visited sites, so its easy to access that sites when we open a new tab.
And many more improvements to come. I will update this post with new findings.
Installing a RPM package
1.Download it as RPMS (For Redhat, Centos etc)
a.Install the rpm package
rpm --ivh packagename.ver.arch.rpm
Installing DEB package
Download it as DEB (for Debina, Ubuntu)
2.Install deb packagesudo dpkg -i package.debPlease Comment your thoughts regarding this post:-)
IPTables In Linux Explained
2 comments 12/12/2009 02:36:00 AM Posted by Meghana M BhombhoreLabels: IPTables, Security
IPtables (Netfilter) :
IPtables is the default firewall for Linux. Its a vast subject which can not be covered in one post. I will try to give as much info as possible at the same time not to make it complex. Lets start with basics.
What is a firewall?
Ans : A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications --Wikipedia.org
A IPtables firewall contains tables which in tern contains rules to block or unblock a perticular communication.
A table can be a
1.Filter table -- Used to filter packets.
2.NAT(Network Adress Translator) table -- Used for NATing of source and destination ip address(Used for sharing internet)
3.Mangale table -- Its a combination of Filter and NAT tables
4.RAW table -- Used to for marking packets not to track.
1.Filter table : This is the default table which contaions three chains.
a.INPUT Chain : To apply a rule on packets which are coming into the system.
b.FORWARD Chain : For packets being routed through the system
c.OUTPUT Chain : For packets locally generated which are going out from the system.
2.NAT table : This table is having three chains.
a.PREROUTING Chain : For altering the packets as soon as they come in to the system
b.OUTPUT Chain : For packets locally generated which are going out from the system.
c.POSTROUTING Chain : For altering the packets which are about to go out from the system.
3.MANGLE Table : This is a combination of forwording, security and translating packets. We can say this one as hybride table of both FILTER and NAT table. This contains five chains.
1.PREROUTING
2.OUTPUT
3.INPUT
4.FORWARD
5.POSTROUTING
4.RAW Table : Contaions two chains.
1.PREROUTING
2.OUTPUT
So lets go to the configuration of IPTables : In the following examples I will be taking FILTER Table to explain.
Example1 : To see/list what are the rules configured in the system
#iptables -L -t filter
This will list all the rules which are created under FILTER Table
-L for listing
-t for specifying table type(here table type is FILTER)
#iptables -L -t nat
#iptables -L -t mangle
#iptables -L -t raw
These three iptables are self explantory.
Example2 : Inserting a rule in to a table
#iptables -I INPUT 2 -t filter -s 192.168.0.1/24 -j DROP
-I for inserting a rule in to a table, so in this example I am inserting an INPUT rule and position two(2). So depending on number we can insert a rule in any position of a table.
-s for specifying the source of this packet. This source may be a IP adress/netmaks or a network-adress/netmask. -j for specifying what to do on the target packet. Here we specified to drop any packet which comes from 192.168.0.1, so there is no reply to the source about the packet status. With -j these are the options we can specify.
1.DROP -- For droping a packet with out informing the status of this packets to the source/destination. So there is no inforamtion to source/destination about the status of the packet.
2.REJECT -- Will reject the packets and information is sent to source/destantion about the rejection of packet by the server.
3.ACCEPT -- Will accpet for the delevery of the packet to designated destination.
4.QUEUE -- this is used to queue the packets to user space. Let me put in this way.. this is just to forward all the packets to some other utility(such as SNORT) which take care of packet filtering.
What actually this rule is specifying?
Ans : This rule specifies its an input rule at second position of the filter table to drop all the communication which is originating from 192.168.0.1
Example3 : To append a rule in to a table
#iptables -A INPUT -t filter -d 132.160.0.0/16 -j REJECT
-A for append a rule at the end of a table
-d for specifying the destination of this packet. This destination may be a IP adress/netmaks or a network-adress/netmask.
What actually this rule is specifing?
Ans : This rule specifies its an input rule which is appended to a filter table to reject all the packets which are destinated to 132.160.0.0 network.
Example4 : Deleting perticular rule
#iptables -D INPUT 3 -t filter
-D for specifing deletion of a rule
What actually this rule is specifing?
Ans : This rule specifies delete an input rule which is in third position of the filter table.
Example5 : Flushing/removeing entire table
#iptables -F -t filter
-F for specifing to flush/remove a table from iptables configuration.
What actually this rule is specifing?
Ans : This rule specifies flush/remove all the rules which are in filter table.
From here we will see how to block a
1.Blocking network
2.Blocking an ip address
3.Blockign Entire protocal stack
4.Blocking protocol
5.Blocking port(source port or Destination port)
Example6 : Blocking(Rejecting) a perticular network
#iptables -A INPUT -t filter -s 192.168.0.0/24 -j REJECT
What actually this rule do?
Ans : This rule specifies under filter table please block(REJECT) all traffic from 192.168.0.0 to 192.168.0.225 ip addresses, nothing but entire 192.168.0.0/24 network.
Example7 : Blocking(Rejecting) a perticular ip address
#iptables -A INPUT -t filter -s 123.45.0.1 -j REJECT
What acutally this rule do?
Ans : This rule specifies under filter table please block(REJECT) all the traffic originating from 192.168.0.1 ip address.
Example8 : Blocking(Rejecting) entire protocol stack.
#iptables -A INPUt -t filter -s 192.168.0.1 -p all -j REJECT
What acutally this rule do?
Ans : This rule specifies under filter table please block all the traffic with all the protocols(such as TCP,UDP,ICMP etc) which are origenating from 192.168.0.1 ip address.
Example9 : Blocking a perticular protocol
#iptables -A INPUT -t filter -s 192.168.0.1 -p tcp -j REJECT
What acutally this rule do?
Ans : This rule specifies under filter table please block all the traffic which uses tcp protocol to communicate from 192.168.0.1 ip address.
Example10 : Blocking perticular destination port
#iptables -A INPUT -t filter -s 192.168.0.1 -p tcp -dport 21 -s 192.168.0.1 -j REJECT
What acutally this rule do?
Ans : This rule specifies under filter table please block all the FTP(port no:21) traffic orignating from 192.168.0.1 ip address.
Example11 : Blocking perticular source port
#iptables -A OUTPUT -t filter -d 192.168.0.1 -p udp -sport 1929 -j REJECT
What acutally this rule do?
Ans : This rule specifies under filter table please block all the traffic which is origanting from server through port 1929 destinated to 192.168.0.1 to be blocked.
5.Saving iptable :
#service iptables save
Why we actually require to save iptables?
Ans : Most of the services in linux have their own configuration files so same will be applicable for the iptables. So when ever we do iptables save the configuration by default will be saved to /etc/sysconfig/iptables
6.Satrting iptables :
#service iptables start
7.Restarting iptables :
#service iptables restart
Checking wether iptables is running or not
#service iptables status
Please comment your thoughts regarding this post:-)
Job Portal On Linuxnix.com -- http://jobs.linuxnix.com
0 comments 12/08/2009 11:09:00 AM Posted by Surendra Kumar AnneLabels: News
BASH_History_Capabalities
2 comments 12/05/2009 08:29:00 AM Posted by Meghana M BhombhoreLabels: Basic-Commands, Basics
Though this is a basic topic known to many of you, But I want to share so that some one will get new things.
BASH(Broune Again Shell) is the default shell in Linux, which will act as a communicator between Kernel and user. Its having so many capabilities such as
a.Short cuts
b.Command chaining
c.History
As I mention we will see all about BASH shell history capabilities here. And I have divided this BASH capabilities in to three parts like basics, medium and advanced.
Basic capabilities of BASH History:
1.To see all the commands what we executed previously
#history
2.To check the history size of your system
#echo $HISTSIZE
3.To check where is your history file, which stores all your previous commands
#echo $HISTFILE
4.To browse history.
Just press up/down arrow to browse history
5.To see all the commands which have particular word
#history | grep string
Example:
#history | grep cd
Medium capabilities of Bash history:
6.Some times browsing history is very tedious job and some times we are executing some big big commands so there is a capability in Bash to over come this ie search-i-reverse. For doing this press ctrl+r and type a string in previous command which you want to execute.
Lets see it with an example
root@krishna-laptop:~#(reverse-i-search)`se': service winbind restart
if you see above I just pressed ctrl+r and then started to type se, it is showing service winbind restart command, so I no need to type entire command and I have to justent press enter
root@krishna-laptop:~# service winbind restart
* Stopping the Winbind daemon winbind [ OK ]
* Starting the Winbind daemon winbind [ OK ]
root@krishna-laptop :~#
7.Changing the size of history. Most of the Linux machines by default it can store up to 500 previously executed commands. Some people likes to change it to some value, here i want to keep my previously executed 3000 commands.
#HISTSIZE=3000
8.to execute previous command
#!!
or
!-1
9.To execute 25 command in bash history
#!25
10.To execute a recent command which start with a string
#!string
11.To clear all the history
#HISTSIZE=0
or
#history –c
12.In Linux when we execute some command there will be no output of the command, for example useradd or mount -a commands will not give you output saying that command is executed successfully or not at that time we can used the below command to see whether the previous command is executed successfully or not
#echo $?
If the out put of the above command is "0", that indicates previous command executed successfully, for any other values the command is not executed successfully(total there are 256 values, 0-255).
Advanced capabilities of Bash history:
History Modifiersreferences:
http://linux.about.com/od/commands/l/blcmdl3_history.htm
http://www.linuxtopia.org/online_books/redhat_linux_debugging_with_gdb/using-history-interactively.html
http://docstore.mik.ua/orelly/linux/lnut/ch08_06.htm
http://www.catonmat.net/blog/the-definitive-guide-to-bash-command-line-history/
Please comment your thoughts regarding this post:-)