Binrev Financier
  • Content count

  • Joined

  • Last visited

  • Days Won


Alk3 last won the day on June 23 2010

Alk3 had the most liked content!

Community Reputation

0 Neutral

About Alk3

  • Rank
    "I Hack, therefore, I am"

Profile Information

  • Gender
    Not Telling
  • Country
  • Location

Contact Methods

  • ICQ

Recent Profile Visitors

15,836 profile views
  1. I think it will do something similar to what you are trying to accomplish, but I don't think it will change the output of what you are trying to ammend. The whole point of log rotate is to rotate logs out periodically to archive and organize; and consequently rename archived files. You could just disable log rotate on that log file and it will not be renamed.
  2. The daily line in your logrotate config file will make logrotate create a new file with the date at the end every day. After looking at the man page i could not find "dateext", but I imagine it is a correct value in your version of logrotate. I would think that dateext means that the log file is saved with the date as the extension... You need to take a look at the log rotate man page if you plan to fix your problem. Not really sure how you plan to have someone else fix this for you... just follow the man page.
  3. Hi all, I was looking to get my Red Hat System Administrator Certification and then hopefully move on to my RHCE cert too. I am quite experienced in Linux (7 years now), only problem is I am a Debian and Ubuntu user. I will be graduating from ITT Tech with my Associates in Computer Networking Systems and I hope to expand on my degree. What steps would someone in my situation take to study for this exam? Are there any good online resources that would help me study for this exam for free? If I was to purchase a book, which book would be best suited to help me study for this exam? -alk3
  4. Is there software that will use speech recognition to open a word document or text file and convert the text into an audio mp3 (or similar format)? What I am trying to do: Write notes while studying school course work Create an audio file that contains those notes Listen to my notes on the road while I drive. I know there is probably something on the web about this but I just cannot seem to find it. I see that google translate has a way to create an audio file, but it seems that I would have to program an application to use the google text to speech api. Now I could possibly do this, but I am trying to find out if there is an easy way for someone else who is not tech savvy to do this.
  5. It sounds like you could have a similar problem to this guy: Check the comments for a forum post talking more about it. I am not sure if you are experiencing the freezing they talked about but if you upgraded from 14 to 16 it's gotta be the same issue.
  6. I do not RECOMMEND you spend your days on this forums asking easily answered questions. Research will help you expand your mind and your willpower to think with logic. Asking without looking is frowned upon by many. Now that you know that, something like this will work: YOU -> Privoxy -> Squid -> User Agent Spoof -> Read spoofed IP List -> HTTP GET -> Ettercap IP replace -> HTTP POST -> Connection Closed. Ettercap can find and replace anything in a HTTP header. Use this to spoof your IP address from a predefined list.Set up Privoxy to block DNS leaks. Set up squid to anonymize your computer fingerprint, browser, and web referrer.Write a python or ruby script to craft your HTTP Get, Post, and Log in cookie on the web siteThe trick is to keep yourself anonymous or this is pointless and your account will be banned.You can also install Paros and modify the settings to spoof your system specs and modify packet headers on the fly followed by crafted HTTP Requests. I am not going to show you exactly how to do this. I do not believe in handing out free information anymore, laziness is futile these days. But I will link you the appropriate reading materials. This is quite an elementary spoofing attack, just be aware that you are executing a HTTP Header Injection and probably breaching the Terms of Service on this site in doing so. Someone else might have a better idea of what your consequences will be for doing this. You are hacking there server, and the counter application. That counter will effect other users too. I am sure a XSS attack of sorts will allow you to make other people double post the page, for extra hits. =================== Ruby NET HTTP Library - web application vulnerability assessment + Privoxy http://ettercap.sour...opic.php?t=2833http://www.irongeek..../ettercapfilter
  7. Long constructive answer: I do not seem to believe you googled very much about this topic. You should program an entire brute force suite so you can do it yourself. C++ or C, or with the use of an interpreted programming language like Python or Ruby. With an interpreted programming language the brute force program will run the password check faster, but because its interpreted the entire process runs slower (you load the whole library). I would only suggest an interpreted programming language for password cracking of WEAK passwords. Python / Ruby / Perl can be used if you have a lot of time and a really strong password list. Short Sugarcoated Answer: Web Browser -> -> Search: "password" + "cracker" -> clicky ->
  8. Here you go: Get a firefox add on (assuming you use firefox) that swaps your user agent for a false user agent.Run a squid + privoxy proxy server on your localhost with the paranoid or strict anonymous settingsInstall NoScript in firefox Good information here:'s probably a good idea to skip the "Open Proxy" route and to skip the "SSH Forwarding setup" because both are quite a pain to put up with.
  9. You require Valium, sir.
  10. Google much?
  11. Linux is not as difficult as people would like to lead you to believe. It's just like learning to ride a bike. Sure, your first bike has training wheels, its smaller and it might have wider wheels. All bikes have the same premises: two wheels, a frame, handlebars, and a seat. If you wish to become more than just a bike rider, you have to learn the finer mechanics of how a bicycle works. Just like riding a bicycle, there is a degree of difficulty you have to actively choose to be apart of while diving into the Linux world. It's also important to realize that Linux distros are just variances of Linux, just like a bike that has streamers is to a bike without streamers. What do you plan to do once you know the basics? Do you wish to learn about programming in the *nix environment? Do you wish to learn about *nix networking? Do you wish to apply Linux system security? Do you wish to find a Microsoft Windows replacement? Would you like to build a Linux operating system from scratch? What type of media are you going to use to run your Linux distro? Are your install medias and and their relevant components old pieces of hardware? All of these questions are important to consider while choosing a Linux distro because it will allow you to maximize your Linux experience. The most obvious difference between any Linux distribution is the package manager. I have used probably over 50 different Linux distributions, including Live CDs / HD installs built from scratch. The next section is partly based on my opinions after having used listed distros. Ubuntu: Good starter distro. Not exactly any more difficult than running Windows. You will still have to search for the majority of the software you require to satisfy your interests. You will also find a lot of bloat in this distro, as it attempts to satisfy the needs of the mainstream computer user. The .deb package management is no more constrained on a Ubuntu system than on a Debian system. If the software you need is not available, its a pain in the ass to make it work. Ubuntu does however have a very large package selection in its repository. Gentoo: Perfect if you wish to build your entire system from scratch. However the problem with this distribution is it forces the user to comply with distribution standards that are very gentoo-centric. You will need to learn a lot JUST about the Gentoo distribution to operate the OS prior to actually diving into Linux. Software can easily be tailored to any Gentoo installation, whether its in the portage repos or not. Installs, Upgrades, new software installs can and will be very complex with this distro. Expect to pour in hours of work to make this distro do what you need it to do. Slackware: Perfect if you wish to install a distro that completely allows customization of the entire distribution to specific needs. The package manager is quite simple to use, but if a piece of software is not present as a slackware package you will have to be forced to comply to distribution standards in order to create and install your software packages. A ./configure && make && make install is always just around the corner if you feel a slackware package is over the top. This distro leaves the user with the most options available in choosing what they want out of their new OS install. Fedora: Cutting edge software versions with all the newest features. Known as a development distribution, while still allowing for a comfortable desktop environment. Easily converted to a server, desktop, network device with just a few software changes. RPM, YUM, and their counterparts have been a big pain in the ass for me, and I am sure several people on this forum can attest to that. Debian: Older, extremely stable software versions, with less cutting edge features. Knows as a stable desktop and server platform. Allows for an extremely customizable set up, while keeping your package management simple. Has every piece of software available, old and new, just like the other distributions. Getting newer software isn't as much of a hassle though with testing and unstable package version repositories available. You will find that your are confined by Debian-centric standards as to how you install software and by how difficult it is to make this distro move beyond those standards for extra customization. As for Live CD distributions: Yes the nature of the distro is that you can load it up without installing to your hard disk. You can tinker and run Linux. What people fail to explain about Live Distributions is that 90% of the Live environment is hacked so that it will run off of the DVD/CD/USB media. Hacked may be an improper term to describe this, as live systems are quite brilliant in most cases. Nonetheless, you will learn more about how that Live CD works than how Linux works if you make a Live distro your prefered Linux flavor. Examples of Live distros: If I could regain the opportunity to relearn what I do about Linux, I would have probably chosen to dive into Linux using Slackware. Slackware teaches you how the innards of Linux functionality. In some cases it forces the user to learn to shell script and even program to operate the system. Your first install of this distro will teach you most of the basics to Linux. Once your slackware box is installed you will have greater freedom to choose which direction you wish to go with your Linux install and with your Linux career. Other members of this forum will likely disagree with me, and you should too. Linux provides its users with the freedom to do what they want to with the OS. Your preferences as to what you wish to do is likely different than mine. Please take a look at the following web site and make up your own mind.
  12. Perfect solution! Usually used on embedded systems due to lack of a proper video card. Good last resort if your video card will not function in Linux.
  13. Did it ever occur to you to just send an email to that account? People phish all the time for information. Sending an email to confirm a person's identity is not illegal. Spoof your email address and make the email look legit. He might be stupid enough to respond with legit info. Facebook and Myspace are all good sources for phishing emails. OR, Send an IM to that guy on AIM IM, send a link of a created blank web page on a web host you own and look at your web host logs. However, the easiest thing you could do to circumvent obfuscation of IP, info, and identity is to call up AOL. Use a bit of SE, make up some falsified identity of your own, and confirm the owner of the email address from a third party source. Make sure you don't call from your home phone. BUT, I am not telling you to break the law. Just probe for information within the bounds of the law.
  14. Unless you have found that the video driver has a legit bug in it, this can be solved quite simply. I have not used Ubuntu 10.04 or Fedora 13 but video issues in Linux usually are attributed to a misconfiguration in the X Server. Edit your xorg.conf file to match the settings recommended for your video card. The flickering will stop unless, like I said, the video driver has a outstanding bug. AMG! Hate to tell you RTFM but this is a RTFM moment.