All posts by Brian

Fedora Core 2 – Review

05.22.04

Greetings everyone. Believe it or not, I’m going to attempt my first Linux distro review. First, allow me to say that I have only been using Linux for about 5 months, so I’m a comparative newbie to many in the Linux world. I don’t make presumptions to know everything. With that in mind, this review is not geared toward the Linux veteran, but for people who have more curiosity than experience with Linux.

First some hardware specs:
Motherboard: MSI “865 Neo2-PFS (Platinum Edition)” i865PE Chipset
Processor: Intel Celeron 2.0GHz (Yes I know it’s lame. I care not.)
Video Card: ATI Radeon 9500 Pro
RAM: 1024MB Kingston PC2700
Sound Card: Soundblaster Live 5.1
Hard Disks: 120GB WD “Special Edition” IDE; 40GB Seagate IDE
Optical Drives: Lite-on DVD-ROM; Sony CD-RW
Mouse: Logitech MX300 (USB)

My brief experience with Linux so far centers mainly around Fedora Core 1. Naturally, I was excited to try FC2 (Tettnang). I downloaded the 4GB DVD iso using BitTorrent, and burned it on my Mac. From there, I did a clean install of FC2. The slick, python-based Anaconda installer is very similar to FC1, and in my opinion is easier than a Windows XP install. I chose a slightly modified “Desktop” install, which took roughly 20 minutes to complete on my system. The installer correctly identified ALL of my hardware, and upon first boot I had full networking, sound, and video. My 3-button mouse had full functionality as well. The only problem is that I do not yet have full 3D-acceleration. FC2 has dropped XFree86 in favor of X.org, and as far as I know ATI has not yet released a driver that will support X.org. If I’m wrong, let me know.

FC2 booting FC2 Desktop

Grub is the default bootloader for FC2, and during the installation it correctly identified that I also had a Windows installation and allowed me to painlessly set up a dual-boot. Somewhat humorously, it labeled the Windows partition as “Other”, but it was simple to relabel it using the “Edit” button.

Some highlights of FC2 include kernel 2.6.5, Gnome 2.6, KDE 3.2.2, Mozilla 1.6, and the GIMP 2.0. The default desktop is Gnome, which is fine with me. If you’ve never used it, Gnome 2.6 takes some getting used to. To explain, Nautilus, the file manager, is now “spatial”, focusing more on drag & drop and productivity. In a nutshell, each folder opens a new window, and files open in their respective applications rather than opening within the file manager. At first, I disliked this “spatial” UI, citing that it felt too much like Mac OS 9/Win95 for me. But, it is slowly growing on me. The best part is that switching back to the older “browser-styled” navigation scheme is easy. Simply fire up GConf (Fedora -> System Tools -> Configuration Editor) and browse to /apps/nautilus/preferences. Now check “always_use_browser”. Voila, you are now back to the old style. /* If you had any windows open, you may have to re-log in to Gnome for the changes to take effect. Also, you can fire up GConf at the terminal by typing $ gconf-editor */

Gnome 2.6 Always use browser Spatial

One of the first things I do on any Linux install is add my user name to the /etc/sudoers file. It’s a good idea to do this, because then you can execute the sudo command to make changes outside your home directory instead of running as root in the terminal. Coming from an OS X background, this makes sense to me. Fire up your favorite editor (nano in my case) and proceed as follows:

$ su
[enter your root password]
# nano -w /etc/sudoers
[now under “User privilege specification”, you should see root ALL=(ALL) ALL. In my case I’ll add brian ALL=(ALL) ALL. Substitute your user name for mine.]
[press ctrl+x to exit nano]
[press y then enter to save changes]
# exit

[EDIT] Since posting this review, I have since learned that adding your username to the etc/sudoers file is a controversial security risk. Perhaps a better way is to investigate ‘visudo.’

Now when you execute a command that requires root privileges, simply add sudo in front of it and give it your user password instead of the root password.

There are at least three ways to update software packages on FC2. The obvious one is up2date, which notifies you of updated packages by changing the blue check in the bottom right of the “tray” into a red exclamation mark. A less obvious, but more powerful method of updating is through yum. Open a terminal, and type:

$ sudo yum update
[enter your user password]
$ sudo yum upgrade

Voila, your system is up to date. You should also be aware that a port of Debian’s apt is also available for Fedora. One of the first things I do on a Fedora install is download and install apt.

Download the rpm, and install it with:
$ sudo rpm -Uvh apt-[package-name].rpm

Once it’s installed, type:
$ sudo apt-get update
$ sudo apt-get install synaptic

Synaptic is a GUI frontend for apt that makes installing software a cinch. Both yum and apt automatically handle dependencies, helping to eliminate the dreaded “RPM Hell.” From what I’ve read, up2date is slowly being phased out in favor of yum or apt.

For legal reasons, FC2 doesn’t come with built-in MP3 support. However, this is easily remedied with synaptic (Fedora -> System Tools -> Synaptic Package Manager). Or type:

$ sudo synaptic

Use synaptic to browse the available packages, and install xmms-mp3 as seen in the picture. You now have mp3 support.

MP3 Support

I like to use my computer as an FTP server,so I set one up using vsftpd. I’ve had no crashes or stability problems. One of my biggest pet peeves about FC1 was that I would occasionally have to activate my NIC (eth0) manually after a reboot. I’m pleased to say that I have not had that problem with FC2.

Conclusion:
Positives: FC2 is a stable, reliable, professional distro that will only improve in coming months. There’s a plethora of help available on the web, and it’s easy to find support because it’s one of the more popular distros. I appreciate having the power of apt/synaptic available as well. FC2 feels noticeably faster than FC1, due in part to the nature of the 2.6 kernel. I’ve tried a lot of Linux distros, and for some reason I keep coming back to Fedora. Perhaps I’m just partial to the Bluecurve theme.

Negatives: FC2 does not have as much out of the box support and user-friendliness as other distros, such as Mandrake 10 Official. One has to do more installing and configuring of extra packages, such as the Flash player, and obtaining mp3/java support/3D acceleration. Thankfully, none of this is too difficult. Like its predecessors, FC2 is still only optimized for i386. Perhaps I’m out of line here, but who still uses 386s? More importantly, who would attempt to run kernel 2.6 and the latest KDE/Gnome on a 386? Even though FC2 is noticeably faster than FC1, I would really like to see FC2 optimized for at least i586!

Habibbijan’s recommendation and rating:
FC2 is a fine workhorse of a distro that won’t appeal too much to the Arch/Gentoo/Slackware crowd, but is stable and flexible nonetheless. However, unless you enjoy growing pains, wait a month or two to allow it to mature a bit before installing it. 8.5 out of 10.

10 Must-Have Free Applications for Mac OS X

01.19.05

The following is a list of free applications that greatly enhance Mac OS X at zero cost to the end user. I compiled this list with a few key points in mind.

  • The application has to be free. No shareware allowed. It IS ok if a free application also has a paid version if the paid version has added functionality, similar to AVG Free versus the paid versions in Windows.
  • The application should be relatively easy to use.
  • The application should do a good job at providing some specific functionality.
  • The application gets added points for beauty and elegance. After all, this is OS X.

I want to acknowledge that limiting myself to ten applications was difficult. Therefore, I decided to list a few runners-up at the bottom. I also want to emphasize that the items listed are in random order! All of these applications provide a different functionality, and ordering them by rank is futile and pointless. Finally, this is a subjective list; others will certainly disagree with my choices. I am fine with that. That said, here we go. This is *my* list of ten “must-have” applications for OS X.

—- (In random order) —-

1. Mozilla Firefoxhttp://getfirefox.com

About:
Firefox is a terrific open-source browser that blocks pop-ups and features tabbed browsing. While Safari is also a great browser, Firefox adds a more functional search box, and the availability of themes and extensions greatly enhance its looks and functionality. Want to control iTunes from within Firefox? Done. Want to completely block advertisements (including flash ads)? Done. Firefox also has a slick, “find-as-you-type” search feature.

2. Cyberduckhttp://icu.unizh.ch/~dkocher/cyberduck

About:
Cyberduck is a free, open-source FTP client that is also capable of handling sFTP. The “bookmarks” are a nice touch, and it even interfaces smoothly with TextWrangler (see below)!

3. TextWranglerhttp://www.barebones.com/products/textwrangler/index.shtml

About:
Once a commercial application, TextWrangler is now free. TextWrangler is a “high-performance” text editor whose sole purpose is to produce and change content, and it excels at manipulating generic text files and source code. Not only does it include FTP and sFTP support, it also interfaces seamlessly with Cyberduck and Applescript.

4. NeoOffice/Jhttp://www.planamesa.com/neojava/en/index.php

About:
NeoOffice/J is an aqua port of OpenOffice.org, which includes a word processor, a spreadsheet program, a presentation program, an HTML editor, and more. Because it runs natively in aqua, it uses the same fonts as other OS X applications. While it will not yet suit the needs of those who rely heavily of Macros and scripting, NeoOffice/J will suit the needs of 95% of users. (Aside: I have had a handful of crashes on startup with NeoOffice/J, but it is still impressive enough to make the top ten. This is still “beta” software, and will improve over time at no charge to you, the user.)

5. RsyncXhttp://archive.macosxlabs.org/rsyncx/rsyncx.html

About:
RsyncX is a implementation of rsync (a Unix tool for intelligently backing up files) that has support for HFS+ file systems and also utilizes a GUI. Use this powerful tool to make backups of selected files to another place on your machine or over a network. You can even use RsyncX to “push” a copy of your booted volume to a networked computer, bless it for either OS 9 or OS X, and then reboot the remote machine.

6. VLChttp://www.videolan.org/vlc/

About: VLC (VideoLAN Client) is an open-source, highly-portable multimedia player for various audio and video formats, as well as DVDs, VCDs, and various streaming protocols. It functions well as a stand-alone media player, but you can also use it as a server to stream in unicast or multicast.

7. Audacityhttp://audacity.sourceforge.net/

About:
Audacity is a free, open-source audio editor. While not yet in the same league as the larger commercial applications, Audacity will easily fit the needs of someone who requires a simple, easy-to-use multi-track waveform editor. Be sure to grab the extra packages, such as Lame (for mp3 exporting), the VST-plugin enabler, and the manual.

8. WhatSizehttp://www.id-design.com/software/whatsize/index.php

About:
WhatSize is a neat utility that allows you to quickly calculate the size of a given folder, its subfolders, and all files contained within. While it is calculating, you can open subfolders to browse their contents as well. WhatSize also reports information about hidden files and cache files. (Aside: This is one of those slick little applications that you do not realize how much you need until you try it.)

9. BitTorrenthttp://bittorrent.com/

About:
BitTorrent is a tool used for distributed file sharing. It works by “seeding” files and tapping into the unused upload bandwidth of any computer running it. To use it, you have to upload while you download; no “leeching” allowed. While BitTorrent can certainly be used for “illegal” file distribution, there are many perfectly legal uses as well, such as downloading various Linux distributions. Use wisely.

10. Handbrakehttp://handbrake.m0k.org/

About:
Handbrake is an easy-to-use, open-source DVD to MPEG-4 (or AVI) converter. It can encode directly from DVDs or from VIDEO_TS folders. It also supports 2-pass encoding, picture deinterlacing, cropping, and scaling. It encodes audio in either AAC, MP3, or OGG formats.

Runners-up:

GIMP – http://gimp.org/macintosh/

About:
The GIMP (GNU Image Manipulation Program) is a powerful image editor. Though not quite on the level of Photoshop, the GIMP is a “creme- of-the-crop” open-source application that will easily suit the needs of all but professional graphic artists. The only reason that GIMP did not make the top ten is that it has to run in X11 as there is not (to my knowledge) a native aqua port, and this may cause confusion for people who do not have X11 installed.

Adium X – http://www.adiumx.com/

About:
Adium X is an open-souce, multi-protocol instant messaging client that is based on GAIM. It looks similar to iChat, but allows you to connect to different IM services from within one application. It is a “must-have” for those who like to chat. (Aside: I did not include this in the top ten because I do not really like to chat. Yes, it is personal. After all, this is an opinion piece.)

SoundFlower – http://www.cycling74.com/products/soundflower.html

About:
SoundFlower is an open-source audio system extension that allows you to “pipe” audio from one application to another easily. Once installed, SoundFlower simply shows up as another audio device. One example of a use for SoundFlower is to record streaming audio from iTunes into Audacity. I did not include this package in the top ten simply because most people would not have much of a use for it. Also be sure to check out “soundflowerbed.”

Blender – http://blender3d.org/

About:
Blender is an open-source 3D graphics creation suite that includes modeling, animation, rendering, post-production, realtime interactive 3D, and game creation, all in one package! You have really got to see it to believe it. While extremely impressive, this package did not make it to the top ten because of the rather steep learning curve. There are lots of great tutorials available on the web site though.

3ivx D4 – http://www.3ivx.com/

About:
While 3ivx is more of a codec toolkit than an application per se, it is important enough to include on OS X. Not only does 3ivx allow you to decode most MPEG-4 files, it allows you to encode video MPEG-4 at a higher quality and with higher compression than Apple MPEG-4. 3ivx is completely compatible with Quicktime and Quicktime- compatible encoding applications. The only problem is that it may have some issues playing certain AVI files. Though you can download a separate application from them to fix this playback issue, it is enough to keep it from the top ten.

MacTheRipper – http://www.ripdifferent.com/~mtr/

About:
This is an open-source DVD ripper that has the ability to remove CSS encryption. That said, it is intended for use on DVDs that you actually own. It works perfectly well, but due to speed issues it did not make the top ten, though perhaps that is not fair. Ripping the same DVD on my “less-beefy” PC only took one-third the time, and this may be an optimization issue with OS X or with my Superdrive, and not necessarily with MacTheRipper.

—- Brian Bondari —-
Copyright 2005

Windows Security Guide

Update: though much of this guide is still relevant, some parts are outdated. This guide is in need of an overall revamp, which might happen soon. If you have any suggestions, feel free to comment. May 2007

06.12.04

The following are recommendations for securing and using your Microsoft Windows operating system, compiled from years of use and observation. In a nutshell:

  1. Use common sense.
  2. Use and update antivirus software.
  3. Run Windows Update service frequently.
  4. Use a browser other than Internet Explorer.
  5. Use a software firewall.
  6. Scan for Adware/Spyware.
  7. Run as a “limited” user.
  8. Know what’s on your system.
  9. Probe your ports.
  10. Alternatives.
  11. Make backups.

1. Use common sense.

Rule number one of internet security: What you don’t know CAN hurt you. Due to the massive popularity of Microsoft Windows, and its inherent insecurity, it pays to be in control of your PC, not the other way around.

The internet is full of malicious people and programs, who want nothing more than to scam you or break into your computer. Ever received an e-mail from eBay, PayPal, or a bank asking you to “confirm your account” by entering passwords, credit card numbers, or social security numbers? It’s a scam, and if you comply, you’re almost guaranteed to become a victim of identity theft. Be smart. Question everything.

Ever received a virus as an e-mail attachment? Sure, we all have. Sometimes I receive several in one day. NEVER open an e-mail attachment unless you KNOW what it is, and why it was sent. Your friends are not immune. Don’t open an attachment just because it came from a friend. Many viruses masquerade as patches sent from Microsoft. News flash: Microsoft does NOT send patches via e-mail. Delete it immediately if you receive one.

Use Outlook or Outlook Express? Be especially careful. Many people humorously dub “Outlook” as “Lookout” because the majority of e-mail viruses target the soft underbelly of Outlook. If you use Outlook or OE, be sure to disable the “preview pane” under the “View” menu. This way, an infected attachment will not automatically execute when you click that e-mail message.

2. Use and update antivirus software.

This is critical. Running a Windows operating system on the internet without antivirus software is comparable to swimming through shark-infested waters with an open wound. Just as importantly, make sure you UPDATE the antivirus software. New viruses come out everyday, and antivirus software is only as effective as its latest virus definitions. Most new antivirus software comes with either an “automatic” or “scheduled” update feature. Know what you have and verify that it’s working!

Inevitably, the “What antivirus software should I use?” question arises. The answer is that it doesn’t really matter. Most people use and recommend big names like Norton or McAfee, but these are not the only options. You don’t even have to pay for antivirus software. My favorite free programs are AVG [http://www.grisoft.com], Avast [http://www.avast.com], and Antivir [http://www.free-av.com/]. No matter what program you use, never install more than one antivirus program.

[KU specific: KU has a site-license with Sophos antivirus, which means that students, faculty, and staff can download and install their software for free. See http://www.ku.edu/acs/virus for more information.]

3. Run Windows Update service frequently.

This is equally as critical as running antivirus software. New vulnerabilities are discovered frequently in Windows operating systems, and it’s important to patch those vulnerabilities as quickly as possible by visiting the Windows Update web site. One way to do this is to launch Internet Explorer, click the “Tools” menu, and click “Windows Update.” Make sure to install all of the “Critical” updates, but scan through the “Recommended” updates as well.

If you use Windows XP, you can set your system to automatically download and install updates at a time you specify. Right-click on “My Computer” and then click “Properties.” In the new window, click the “Automatic Updates” tab. Click the radio button for the option to download and install the updates everyday at a specific time. Choose your time, and click OK. Hint: Make sure your computer is usually on at the time you specify.

If you use Microsoft Office, you should also check for security updates. [http://office.microsoft.com/home/default.aspx]

4. Use a browser other than Internet Explorer.

Most people equate “Internet Explorer” with the Internet, and this is a crying shame, because IE is a terrible web browser with a horrendous security record. Do you like pop-ups? No? Then don’t use IE. Some forms of spyware can automatically install when you visit malicious sites with IE. IE is also easily “hijacked” by malicious programs.

There is also a moral implication involved here. In a nutshell, there is a group called the World Wide Web Consortium [http://www.w3c.org] that sets standards for how web browsers should behave and render HTML (the “code” behind web sites). Microsoft has completely ignored w3c, deciding instead to set their own standards. This has lead to a schism in web design, in that some designers code exclusively for IE, and others code for standards-compliant browsers.

My favorite alternative browser is called Firefox [http://www.getfirefox.com]. It’s free, it supports tabbed-browsing, it blocks pop-ups, and it is standards-compliant. I strongly suggest that you try it. The only reason to use IE is for Windows Update, since Microsoft does not support browsers not based on the IE-core (big surprise).

5. Use a software firewall.

A software firewall serves two purposes: It prevents unauthorized access INTO your operating system, and prevents information from LEAVING your operating system without your permission.

Without getting into too much detail, most attacks from outside come through “ports.” If your computer is behind a hardware firewall (such as at a major university or business), most ports should automatically be blocked. A software firewall provides an added layer of protection against port attacks.

Some Windows software loves to “dial home” to Microsoft or another company and report information about your computer and surfing habits. Sometimes this is justified, but sometimes it’s downright unnecessary and should be considered a violation of privacy. A correctly-configured software firewall will allow you to determine what information is sent from your computer into the unknown. Remember, your computer is not a television. Information travels both ways.

My personal favorite software firewall is called ZoneAlarm [http://www.zonelabs.com]. You can download a free version, or you can try a demo for a paid version. If you think you may be behind a hardware firewall, or are part of a larger network of computers (such as at a major university), contact your system administrator about the necessity of a software firewall. The sys admin may also have recommendations for the configuration of a software firewall.

[For advanced users: If you are feeling savvy, disable unnecessary Windows services. For a terrific guide on what services are running, their descriptions, and whether or not to disable them, visit Black Viper’s site [http://majorgeeks.com/page.php?id=12]. Read it, decide what to disable, and lock down your system.]

6. Scan for Adware/Spyware.

If you use Windows, you need to know about Adware and Spyware. Adware is usually pretty harmless, but sometimes annoying. It usually comes bundled as third-party applications with freely downloadable programs, such as KaZaa. The purpose of Adware is to display advertisements, often in the form of annoying pop-up windows. When you installed that free screensaver program, did you actually read the license agreement? No? Congratulations! You’re now infested with Adware.

Spyware is much more serious. This includes programs that read “cookies” (text files with information about your surfing habits), key loggers (programs that record every key you press – Logged into a bank account recently?), and other malicious programs that I generically refer to as “internet flotsam.” Again, did you actually READ the license agreement when you installed that fancy cursors program? Collectively, too much adware and spyware can slow even a fast computer down to a crawl.

To exterminate Adware/Spyware, download Ad-aware [http://www.lavasoft.de] and/or Spybot [http://www.safer-networking.org]. Update them, and run them at least once a week. You’ll be surprised at what they catch. Be careful about what you delete with these programs. Some ‘free’ programs (mainly file-sharing programs) will not function properly after their adware is removed. Still, I recommend that you delete everything they catch and then uninstall the offending programs. Be smart about what you install in the first place, and you won’t have too many problems of this nature.

7. Run as a “limited” user.

The default user in Windows XP is called the “administrator.” Newly-created user accounts have administrative privileges by default. This means that you can install software, delete the Windows folder, format your hard drive, and do just about anything else that you want. If you get infected by a virus, it can also do whatever it wants without asking your permission. This is a major reason why almost all viruses target Windows.

An often-neglected, but excellent security measure is to do your daily tasks as a limited user rather than an administrator. Limited users are prohibited against installing new software, they cannot access protected system files, and generally are protected against doing something stupid or allowing someone/something else to do it for them. This means that a malicious program will do drastically less damage under a “limited” user account.

To do this, simply go to the Control Panel (Start — Settings) and select “User Accounts”. Click on “Create a new Account”, give it a name, select “Limited User”, and assign a password. You may need to copy your documents into the “Shared Documents” folder or into the “My Documents” folder of your new profile (generally found in “C:\Documents and settings\your_username\My Documents” Then log off and log on to your new limited account and give it a whirl.

If you need to install new software or make major changes to your system, simply log out and log back into your original account. Note: Some older software may not work well under a limited account. Your best bet is to set up a limited account and try it.

Hint: If your computer has already passed through the hands of a capable systems administrator, this should not be a concern for you.

8. Know what’s on your system.

If you have followed my advice so far, you are already more secure than 95 percent of Windows users. However, there are still more things that you can do.

By default, Windows hides file extensions for known file types. While this may seem convenient, it can present a security concern. Malicious programs frequently take advantage of these hidden extensions by fooling the user into thinking it’s a different type of file. For example, you open a text file on your desktop called “patch.txt.” The next thing you know, a window opens that reads, “yuo just been pwned by l33t hax0r!” Then your hard drive is erased. Whoops! What you did not know was that the “patch.txt” file was actually an executable called “patch.txt.exe,” but Windows hid the last part from you because it was a “known file type.”

To disable this “feature,” open any folder, such as My Documents. Click the “Tools” menu, click “Folder Options,” and then click the “View” tab. Look down the list until you see a checkmark labeled “Hide Extensions for Known File Types”. Remove the check from that box. Windows will now display ALL file extensions, placing you in the driver’s seat.

9. Probe your ports.

Now it is time to test your fully patched system. Even if you think you are fully protected, new vulnerabilities are found almost daily. It pays to have constant vigilance.

Remember the “port attacks” mentioned under item five? Let’s see how secure your operating system is. Open a web browser and surf to http://www.grc.com. This is a site maintained by a security guru named Steve Gibson. Click on “Shields Up!” Scroll down to “Hot Spots,” and click on “Shields Up!” again. Click on “Proceed” and then select “All Service Ports.” Wait a few minutes while you watch the ensuing test. Green results are best, blue is ok, and red means trouble, unless you know what you are doing (such as running a web server). Ideally, you should have all green results.

You can test your antivirus software by downloading the EICAR test virus [http://www.trendmicro.com/en/security/test/overview.htm]. Note: This is not a virus, but merely a test file that your antivirus software should recognize as a virus. Try to download the file to your hard drive. If your antivirus software does not catch it, check the settings to make sure it is actively scanning files. If your software still does not catch it, try different antivirus software ASAP!

10. Alternatives.

I have already mentioned an alternative to Internet Explorer, but there are also alternatives to other widely-used Windows programs. For example, I strongly recommend using a different mail client over Outlook due to security reasons mentioned under item one. Thunderbird [http://mozilla.org/products/thunderbird] and Eudora [http://www.eudora.com] are excellent (and free) alternatives.

Would you like a free alternative to Microsoft Office? Try OpenOffice [http://www.openoffice.org].
How about a free instant messaging client with no advertisements that is compatible with AIM (Oscar and TOC protocols), ICQ, MSN Messenger, Yahoo, IRC, Jabber, Gadu-Gadu, and the Zephyr networks? Try Pidgin [http://pidgin.im/pidgin/home/].

If you have made it through this entire guide, and feel utterly disgusted and overwhelmed about Windows security, you should at least know that there are also alternatives to the entire Microsoft Windows operating system. Mac OS X [http://www.apple.com/macosx] and Linux [http://www.ubuntu.com] are two alternatives. Neither are without flaws, but both have a more strongly implemented security policy than Windows.

11. Make backups.

No matter what operating system you use, it is critical to back up your data. There is no excuse not to have backups. Your hard drive could die. Your computer could be cracked by an unscrupulous person. You could get a destructive virus. There could be a flash flood. Do I make myself clear?

There are several methods of creating backups. Is your computer capable of “burning” CDs? If so, purchase some CD-R or CD-RW discs and back up your critical data. Remember to keep those discs in a safe place. You could also consider purchasing an extra hard drive (internal or external) for data storage. Most newer computers are now capable of “burning” DVDs. If you are lucky enough to have one, this is an excellent method of backing up data, as DVDs have considerably more storage space than CDs.

Are you on a network? If so, you might be able to store critical data on a server. Speak to your network administrator for more details.

[KU specific: You may be able to back up data to a network file server. Open “My Network Places” and view your workgroup computers. Look for a computer with your department name. For instance, if you’re located in Murphy Hall, connect to the MUSIC_DANCE server. Enter your username and password. If successful, you can then save files to the server. Contact your local administrator if you need assistance.]

If you made it through this guide, you are well on your way to a more secure system. Remember that no computer is invulnerable, and it is important to always be aware of new security vulnerabilities. After all, the safest computer is one that is disconnected from the internet (or at the bottom of a landfill).

—- Brian Bondari —-
© 2004

Going live….

habibbijan.com will soon make the switch from my personally-hacked together code base to using WordPress as its foundation. While I’m somewhat sad to be “graduating” from my personally-written HTML, CSS, and PHP, working with WordPress will make maintainance and integration much easier.

I’m also switching web hosts in the process, so we’ll see how long this takes. See you soon.

Arch Linux Tips

I’m a recent Arch Linux convert. I appreciate the quickness of install and the ease of Pacman. Yet I had a few slightly annoying issues configuring my system that I would like to address here. For the sake of reference I’m currently using kernel 2.6.10 and uDev.

1) Blacklist ‘pciehp.’

Upon first boot, I noticed that there was an error loading the ‘pciehp’ module. This did not cause a problem for me as I have no need for PCI hotplugging, but it added a few seconds to the boot time. There are two ways to solve this problem. One way is to recompile the kernel and leave out the ‘pciehp’ module. The faster way is to add ‘pciehp’ to a list of blacklisted modules. Edit “/etc/hotplug/blacklist” and add the offending module name to the list.

2) Use “/dev/input/mice”

After I installed xorg (pacman -Sy xorg), I ran ‘xorgconfig’ to configure it. Once finished, I found that every time I tried to start X my machine hard locked. I could not kill X or switch to a virtual terminal. Needless to say, this was frustrating beyond belief. After extensive “googling,” I suspected that my mouse settings were incorrect. If you accept the default location for the mouse (/dev/mouse) and you’re using uDev instead of devfs, this will probably happen to you as well. I suspect that this is an issue with xorg and uDev in general and not just with Arch, but what do I know? I DO know that specifying /dev/input/mice instead of /dev/mouse solved my problem.

3) Rip CDs as a user.

After installing Grip (pacman -S grip), I tried to rip a CD as a regular user. No go. Even though I specified the correct path to my CD-ROM (/dev/cdroms/cdrom1), Grip failed to initialize the CD. However, if I ran Grip as root, it found the CD immediately. This led me to believe that it was a permission problem. For the record, here’s my ‘/etc/fstab’ entry for the CD-ROM:

/dev/cdroms/cdrom1 /mnt/cd iso9660 ro,user,noauto,unhide 0 0

First I made sure that I my user was in the ‘audio’ group (/etc/group), and then I checked the permission number of my drive (/dev/cdroms/cdrom1). It was 777, so I stewed in fury for a while. Finally, it dawned on me that “/dev/cdroms/cdrom1” was just a symbolic link to “/dev/hdd,” and the permission number for hdd was only 660! I changed it to 664, and commenced ripping of CDs as a regular user. I should have caught that sooner, but it drove me crazy for a while.

[EDIT] I’ve learned that changing permissions this way for udev only results in a temporary change. It resets if you reboot / restart uDev. To fix this permanently, it’s easier to create a special permissions file called “/etc/udev/permissions.d/00-myrules.permissions”. Then add at least the following lines to this file:

# disk devices for having access to audioripping and burning
hdc:root:users:660
hdd:root:users:660

Please see the section on “modifying permissions and rules” at this location:

http://wiki2.archlinux.org/index.php/UdevHowTo

4) Fix Blender’s startup problem.

Here’s another small issue. When starting Blender, I promptly received an “ERROR: File .blanguages not found” message. This is not a big deal, as the program still ran, but it got on my nerves. To fix it, you need to copy the “.Blanguages” file from “/usr/share/blender/” to your home directory.

$ cp /usr/share/blender/.Blanguages ~/

Now when you start Blender, you won’t receive that error message. Be sure to do that for each user. For more information, please see this article.

5) Get the latest version of Fluxbox.

If you wish to use Fluxbox on Arch, I suggest that you grab the development version (currently 0.9.11) instead of the older, “stable” version (0.1.14). The “development” version is much more feature-rich, and yes, it is “stable” as well. However, the latest version of Fluxbox is in the “unstable” repository. Here’s the process I used to get it. Of course, this will change when this version is officially declared “stable.”

Edit your “/etc/pacman.conf” file. Un-comment the following line:
Include = /etc/pacman.d/unstable

Open a terminal and type (as root):
# pacman -Sy fluxbox-devel

You should now have the latest version of Fluxbox. If you wish, add a comment to the “unstable” line of “/etc/pacman.conf” again. Enjoy.

Hint: You can use Pacman to search for the name of a package before you install it. For example, if I want to install Firefox but don’t know the official name of the package in the repository, what would you do?

In Fedora you would type: “apt-cache search firefox” or “yum search firefox”
In Gentoo you would type: “emerge search firefox”

In Arch you type: “pacman -Ss firefox” (without the quotes)

This drove me crazy until I learned how to do it.

I hope that helps/prevents others from having the same problems.

http://archlinux.org/
Arch Install Guide
Arch HowTos

—- Brian Bondari —-