joi, 31 ianuarie 2013

GNOME Developer Experience Hackfest 2013

This week I’m attending the Developer Experience hackfest in Brussels.

This week Red Hat and the GNOME Foundation giving you the chance to attend the Developer Experience hackfest in Brussels.

The goal of the hackfest is to improve the overall application developer experience.

There are three main areas of work we suggest for this hackfest:

  • Tooling (Anjuta, Monodevelop, application bundling, intltool, gtk-doc, autofoo and friends...)
  • Developer docs and mindshare (unified online/offline API reference UI, app developer community building...)
  • Further platform needs (improvement of data driven apps and other needs with unclear answer)
  • Application bundling and sandboxing, application as first class concept in the kernel

Read more about this event here.

duminică, 27 ianuarie 2013

duminică, 20 ianuarie 2013

New tutorials I made ...

About the tutorials that I've written lately.

How to get? the GLSL and OpenGL version.

The Extra Objects addon - blender 2.65.

Using pdftk to change pdf files.

Using standard C library sysconf .

All of this tutorials can be read here.

If you want something special send me a mail.

marți, 15 ianuarie 2013

The linux command: dmidecode

The linux command dmidecode is a tool for dumping a computer's DMI.

# dmidecode -h
Usage: dmidecode [OPTIONS]
Options are:
 -d, --dev-mem FILE     Read memory from device FILE (default: /dev/mem)
 -h, --help             Display this help text and exit
 -q, --quiet            Less verbose output
 -s, --string KEYWORD   Only display the value of the given DMI string
 -t, --type TYPE        Only display the entries of given type
 -u, --dump             Do not decode the entries
 -V, --version          Display the version and exit

Let's see the option: -t.

# dmidecode -t -h
Invalid type keyword: -h
Valid type keywords are:
  bios
  system
  baseboard
  chassis
  processor
  memory
  cache
  connector
  slot

Now let's show you some infos about my old processor.

# dmidecode -t processor
# dmidecode 2.9
SMBIOS 2.3 present.

Handle 0x0004, DMI type 4, 32 bytes
Processor Information
 Socket Designation: SOCKET A
 Type: Central Processor
 Family: Other
 Manufacturer: AuthenticAMD
 ID: 62 06 00 00 FF FB 83 03
 Signature: Family 6, Model 6, Stepping 2
 Flags:
  FPU (Floating-point unit on-chip)
  VME (Virtual mode extension)
  DE (Debugging extension)
  PSE (Page size extension)
  TSC (Time stamp counter)
  MSR (Model specific registers)
  PAE (Physical address extension)
  MCE (Machine check exception)
  CX8 (CMPXCHG8 instruction supported)
  APIC (On-chip APIC hardware supported)
  SEP (Fast system call)
  MTRR (Memory type range registers)
  PGE (Page global enable)
  MCA (Machine check architecture)
  CMOV (Conditional move instruction supported)
  PAT (Page attribute table)
  PSE-36 (36-bit page size extension)
  MMX (MMX technology supported)
  FXSR (Fast floating-point save and restore)
  SSE (Streaming SIMD extensions)
 Version: AMD Athlon(TM) MP 1700+
 Voltage: 1.7 V
 External Clock: 133 MHz
 Max Speed: 2250 MHz
 Current Speed: 1466 MHz
 Status: Populated, Enabled
 Upgrade: Other
 L1 Cache Handle: 0x0009
 L2 Cache Handle: 0x000A
 L3 Cache Handle: Not Provided

Also you can use this format to read infos.

# dmidecode --type 0 --type 13 

The numbers tell what to read, see:

bios
system  1, 12, 15, 23, 32
baseboard  2, 10, 41
chassis  3
processor  4
memory  5, 6, 16, 17
cache  7
connector  8
slot  9

luni, 14 ianuarie 2013

Java 7 fails to restrict access to privileged code

Java 7 Update 10 and earlier versions of Java 7 contain a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

What can happen?

A user to visit a specially crafted HTML document allow a remote attacker may be able to execute arbitrary code on a vulnerable system.

Read the article here.

duminică, 6 ianuarie 2013

Last tutorials that I've written ...

I make some tutorials. This is low level tutorials but can give some refresh for your mind and it's good to know something new.

Install povray and arbaro under Fedora .

Remote Web Server PHP using the NetBeans IDE

Alice - 3D educational programming environment

Create first android project using adt-bundle-linux...

Simple way to create png image with an input text.

Using pip for installing and managing Python packa...

All of this tutorials can be read here.

If you want something special send me a mail.

I will try to make new tutorials with gcc , fasm and maybe OpenGL.

Thank you. Regards.

Deadlock make with Unity - Linux 32 and 64.

Another game for Linux users : Deadlock.

Also the Windows and OSX users can play this game using the webbrowser with the Unity plugin.

Recommended:


- Intel Core-2-Quad 2.4GHz or similar
- 2 Go Ram
- DX9 3D video card such as Nvidia GTX280 or Radeon HD5850 or newer.

You need to have the GLIBCXX_3.4.11 under Linux OS.

Deadlock website

vineri, 4 ianuarie 2013

Nifflas' Games - Knytt Underground - beta version linux 32 and 64-bit

Today I you tell about another game :

The game working well with Linux 32-bit and 64-bit, OSX and Windows.

The type of the game it's side-scrolling game.

The graphic of the game is nice with many lights , effects and beautiful sounds.

The official page it's here.

The game come with a demo version, but ...

You can be purchasing the game from Fastspring you get access to the full version Linux betas

The game need the GLIBC_2.11 libs.

miercuri, 2 ianuarie 2013

Vulnerability? google paypal facebook and internal ip

Do you have any idea about an Internal IP Address or a Private IP Address that too assigned for Multinational Companies? Yeah, today we are gonna discuss about Internal IP or Private IP address Disclosure.

Disclosure of an Internal IP like 192.168.*.* or 172.16.*.* , can really Impact ? Most security researchers call it as "bull shit" vulnerability. But when it comes to impact calculation even if the server is behind a firewall or NAT, an attacker can see internal IP of the remote host and this may be used to further attacks.

Read more here.

Linux - Fedora and Android make read-only file system.

I don't know what is the problem with linux - Fedora and Andoid OS.

After I put my usb cable seam Fedora make from write disk to read-only.

Maybe the Android when scan the device set to read-only.

So you can get some error like this when you use the chown commmand:

chown: changing ownership of ...: Read-only file system

That can be one big problem when you want to copy files on your tablet.

I found a solution, just use remount.

# mount -o rw,remount /media/disk

If you want to make read-only , use:

# mount -o ro,remount /media/disk

That will solve this issue.