Posts Tagged ‘Downloads’

tv-Linux

Following on from a recent post Nmap Cheat Sheet’I have decided to create another cheat sheet but this time for GNU/Linux as I am constantly referring to it for reference. These kind of things are very handy as if you are like myself and don’t use Linux on a daily basis they can play a major part in jogging the little grey cells.

Download:  Cheat Sheet commands for GNU/Linux

CheatSheet commands for GNU / Linux

System Information

1. arch: show the architecture of the machine (1).
2. uname -m: show the architecture of the machine (2)..
3. uname -r: show the kernel version used.
4. dmidecode -q: display the components (hardware) system.
5. hdparm -i /dev/hda: show the characteristics of a hard disk.
6. hdparm -tT /dev/sda: make reading test on a hard disk.
7. cat /proc/cpuinfo: CPU information show.
8. cat /proc/interrupts: show interrupts.
9. cat /proc/meminfo: verify memory usage.
10. cat /proc/swaps: show swap files.
11. cat /proc/version: display the version of the kernel.
12. cat /proc/net/dev: network adapters and display statistics.
13. cat /proc/mounts: display the mounted file system.
14. lspci -tv: show PCI devices.
15. lsusb -tv: show USB devices.
16. date: display the system date.
17. cal 2013: show calendar 2013.
18. cal 07 2013: show the calendar for the month July 2013.
19. date 041217002013.00: place (declare, set) date and time.
20. clock -w: save changes to the BIOS date.

Shutdown (Reset System or Log out)

1. shutdown -h now: Shut down system (1).
2. init 0: Shut down system (2).
3. telinit 0: Shut down system (3).
4. halt: shutdown the system (4).
5. shutdown -h hours:minutes &: planned shutdown of the system.
6. shutdown -c: cancel a planned shutdown of the system.
7. shutdown -r now: Restart (1).
8. reboot: Reboot (2).
9. logout: close session.

Files and Directories

1. cd /home: enter the “home” directory.
2. cd ..: go back one level.
3. cd ../..: back 2 levels.
4. cd: go to the root directory.
5. cd ~user1: go to directory user1.
6. cd -: go (back) to the previous directory.
7. pwd: : show the path of the working directory.
8. ls: see the files in a directory.
9. ls -F: see the files in a directory.
10. ls -l: show details of files and folders in a directory.
11. ls -a: show hidden files.
12. ls *[0-9]*: show the files and folders that contain numbers.
13. tree: display files and folders in a tree starting from the root. (1)
14. lstree: display files and folders in a tree starting from the root. (2)
15. mkdir dir1: create a folder or directory called ‘dir1’.
16. mkdir dir1 dir2: create two folders or directories simultaneously (Create two directories at once)
17. mkdir -p /tmp/dir1/dir2: create a directory tree.
18. rm -f file1: delete the file called file1.
19. rmdir dir1: delete the folder called dir1.
20. rm -rf dir1: delete a folder called dir1 with its contents recursively.
21. rm -rf dir1 dir2: delete two folders (directories) with its contents recursively.
22. mv dir1 new_dir: rename or move a file or folder (directory).
23. cp file1: copy a file.
24. cp file1 file2: copy two files together.
25. cp dir /* . : copy all the files in a directory within the current working directory.
26. cp -a /tmp/dir1 . : copy a directory within the current working directory.
27. cp -a dir1: copy a directory.
28. cp -a dir1 dir2: copy two directories.
29. ln -s file1 lnk1: create a symbolic link to the file or directory.
30. ln file1 lnk1: creating a physical link to the file or directory.
31. touch -t 0712250000 file1: modify the real time (time of creation) of a file or directory.
32. file file1: output (screen dump)
33. iconv -l: lists of known encryption.
34. iconv -f fromEncoding -t toEncoding inputFile > outputFile: creates a new form of the input file is encoded in assuming and making a ToEncoding fromEncoding.
35. find . -maxdepth 1 -name *.jpg -print -exec convert ”{}” -resize 80×60 “thumbs/{}” \;: grouping resized files in the current directory and send them to directories in thumbnail view (requires converting from ImageMagick).

Finding Files

1. find / -name file1: file and directory search from the root of the system.
2. find / -user user1: find files and directories belonging to user user1.
3. find /home/user1 -name \*.bin: search files with extension ‘. bin ‘directory within it’ / home/user1.
4. find /usr/bin -type f -atime +100: look at binary files used in the last 100 days.
5. find /usr/bin -type f -mtime -10: find the changed files created within the last 10 days.
6. find / -name \*.rpm -exec chmod 755 ‘{}’ \;: look for files with extension. ‘rpm’ and change permissions.
7. find / -xdev -name \*.rpm: Find files with extension ‘. rpm’ ignoring them removable devices such as cdrom, pen-drive, etc ….
8. locate \*.ps: find files with extension. ‘ps’ primarily executed with the command ‘updatedb’.
9. whereis halt: show the location of a binary file. In this case you are wondering Where he command ‘halt’
10. which halt: show the full path (full path to it) to a binary / executable.

Mounting a file system

1. mount /dev/hda2 /mnt/hda2: mount a disk called hda2. Check first the existence of the directory ‘/ mnt/hda2?, If not, create it.
2. umount /dev/hda2: removing a disk called hda2. Out first from point ‘/ mnt/hda2.
3. fuser -km /mnt/hda2: force umount when the device is busy.
4. umount -n /mnt/hda2: running disassembly without reading the file / etc / mtab. Useful when the file is read-only or the hard drive is full.
5. mount /dev/fd0 /mnt/floppy: mount a floppy disk (floppy).
6. mount /dev/cdrom /mnt/cdrom: mount a cdrom / dvdrom.
7. mount /dev/hdc /mnt/cdrecorder: mount a rewritable cd or dvdrom.
8. mount /dev/hdb /mnt/cdrecorder: mount a rewritable cd / dvdrom (a dvd).
9. mount -o loop file.iso /mnt/cdrom: mount a file or iso image.
10. mount -t vfat /dev/hda5 /mnt/hda5: mount a FAT32 file system.
11. mount /dev/sda1 /mnt/usbdisk: mount a usb thumb drive or a memory (without specifying the filesystem type).

Hard Disk Space

1. df -h: display a list of mounted partitions.
2. ls -lSr |more: show the size of the files and directories sorted by size.
3. du -sh dir1: Estimate the space used by the directory dir1.
4. du -sk * | sort -rn: show the size of the files and directories sorted by size.
5. rpm -q -a –qf ‘%10{SIZE}t%{NAME}n’ | sort -k1,1n: show space used by the installed rpm packages organized by size (Fedora, Redhat and others).
6. dpkg-query -W -f=’${Installed-Size;10}t${Package}n’ | sort -k1,1n: show space used by the packages installed, organized by size (Ubuntu, Debian and others) .

Users and Groups

1. groupadd name_of_the_group: create a new group.
2. groupdel name_of_the_group: delete a group.
3. groupmod -n new_name_of_the_group old_name_of_the_group: rename a group.
4. useradd -c “Name Surname ” -g admin -d /home/user1 -s /bin/bash user1: Create a new user belonging to the “admin”.
5. useradd user1: create a new user.
6. userdel -r user1: delete a user (‘-r’ eliminates home directory).
7. usermod -c “User FTP” -g system -d /ftp/user1 -s /bin/nologin user1: change user attributes.
8. passwd: Changing password.
9. passwd user1: change the password of a user (only root).
10. chage -E 2013-12-31 user1: place a time limit for the user’s password. In this case says that the key expires on December 31, 2013.
11. pwck: correct syntax check the file format of ‘/ etc / passwd’ and the existence of users.
12. grpck: check correct syntax and format of the file ‘/ etc / group’ and the existence of groups.
13. newgrp group_name: Registers a new group to change the default group of newly created files.

File Permissions (Use “+” to place permissions and “-” to remove)

1. ls -lh: Show permissions.
2. ls /tmp | pr -T5 -W$COLUMNS: Terminal divided into 5 columns.
3. chmod ugo+rwx directory1: : enable read permissions (r) , write (w) and execute (x) to the owner (u) group (g) and others (o) on the directory ‘directory1
4. chmod go-rwx directory1: remove read permission (r), write (w) and (x) running the group (g) and others (o) on the directory ‘directory1
5. chown user1 file1: cchange owner of a file.
6. chown -R user1 directory1: change the owner of a directory and all files and directories contained within.
7. chgrp group1 file1: changing group of files.
8. chown user1:group1 file1: change user and group ownership of a file.
9. find / -perm -u+s: display all system files with SUID configured.
10. chmod u+s /bin/file1: set the SUID bit on a binary file. The user that running that file takes the same privileges as the owner.
11. chmod u-s /bin/file1: disable SUID bit on a binary file.
12. chmod g+s /home/public: place a SGID bit on a directory-similar to SUID but for directory.
13. chmod g-s /home/public: disable SGID bit on a directory.
14. chmod o+t /home/public: place a bit STIKY in a directory. Allows deletion of files only rightful owners.
15. chmod o-t /home/public: STIKY disable bit in a directory.


Special Attributes on files (Use “+” to place permissions and “-” to remove)

1. chattr +a file1: allows to writte by opening a file only append mode.
2. chattr +c file1: allows a file to be compressed / decompressed automatically.
3. chattr +d file1: ensures that the program ignore delete files during backup.
4. chattr +i file1: convert the file unchanged, so it can not be removed, altered, renamed, or bound.
5. chattr +s file1: allows a file to be deleted safely.
6. chattr +S file1: ensures that a file is modified, the changes are written in synchronous mode as with sync.
7. chattr +u file1: allows you to restore the contents of a file even if it is canceled.
8. lsattr: show special attributes.


Compressed files

1. bunzip2 file1.bz2: decompress in file called ‘file1.bz2.
2. bzip2 file1: compress a file called file1.
3. gunzip file1.gz: decompress a file called ‘file1.gz.
4. gzip file1: compress a file called ‘file1.
5. gzip -9 file1: compress with maximum compression.
6. rar a file1.rar test_file: create a zip file called ‘file1.rar’.
7. rar a file1.rar file1 file2 dir1: compress ‘file1,’ file2 and ‘dir1Simultaneously.
8. rar x file1.rar: decompress rar file.
9. unrar x file1.rar: decompress rar file.
10. tar -cvf archive.tar file1: create an uncompressed tarball.
11. tar -cvf archive.tar file1 file2 dir1: create an archive containing ‘file1,file2 and dir1.
12. tar -tf archive.tar: show contents a file.
13. tar -xvf archive.tar: extract a tarball.
14. tar -xvf archive.tar -C /tmp: extract a tarball in / tmp.
15. tar -cvfj archive.tar.bz2 dir1: create a tarball compressed into bzip2.
16. tar -xvfj archive.tar.bz2: decompress a bzip2 compressed tar file.
17. tar -cvfz archive.tar.gz dir1: create a gzip tarball.
18. tar -xvfz archive.tar.gz: decompress a gzip compressed tar archive.
19. zip file1.zip file1: create a zip file.
20. zip -r file1.zip file1 file2 dir1: compress in zip several files and directories simultaneously.
21. unzip file1.zip: decompress a zip file.


RPM Packages (Red Hat, Fedora…etc)

1. rpm -ivh package.rpm: install an rpm package.
2. rpm -ivh –nodeeps package.rpm: installing an rpm package ignoring dependencies requests.
3. rpm -U package.rpm: upgrade a rpm package without changing configuration files.
4. rpm -F package.rpm: upgrade a rpm package only if it is installed.
5. rpm -e package_name.rpm: remove a rpm package.
6. rpm -qa: show all rpm packages installed on the system.
7. rpm -qa | grep httpd: show all rpm packages with the name “httpd”.
8. rpm -qi package_name: get information on a specific package installed.
9. rpm -qg “System Environment/Daemons”: show rpm packages of a software group.
10. rpm -ql package_name: show list of files given by a rpm package installed.
11. rpm -qc package_name: show configuration files list given by a rpm package installed.
12. rpm -q package_name –whatrequires: show list of dependencies required for a rpm package.
13. rpm -q package_name –whatprovides: show the capacity provided by a rpm package.
14. rpm -q package_name –scripts: scripts show started during installation / removal.
15. rpm -q package_name –changelog: display the history of revisions of a rpm package.
16. rpm -qf /etc/httpd/conf/httpd.conf: check which rpm package belongs to a given file.
17. rpm -qp package.rpm -l: show list of files given by a rpm package not yet been installed.
18. rpm –import /media/cdrom/RPM-GPG-KEY: Import digital signature public key.
19. rpm –checksig package.rpm: verify the integrity of a package rpm.
20. rpm -qa gpg-pubkey: verify the integrity of all rpm packages installed.
21. rpm -V package_name: check the file size, licenses, rates, owner, group, check MD5 digest and last modified.
22. rpm -Va: check all rpm packages installed on the system. Use with caution.
23. rpm -Vp package.rpm: verify a rpm package not yet installed.
24. rpm2cpio package.rpm | cpio –extract –make-directories *bin*: extracting executable file from a rpm package.
25. rpm -ivh /usr/src/redhat/RPMS/`arch`/package.rpm: install a package built from a source rpm.
26. rpmbuild –rebuild package_name.src.rpm: build a rpm package from a source rpm.


YUM packages updater (Red Hat, Fedora…etc)

1. yum install package_name: download and install a rpm package..
2. yum localinstall package_name.rpm: This will install an RPM and attempt to resolve all dependencies for you, using your repositories.
3. yum update package_name.rpm: update all rpm packages installed on the system.
4. yum update package_name: upgrade a rpm package.
5. yum remove package_name: remove a rpm package.
6. yum list: list all packages installed on the system.
7. yum search package_name: Find a package repository rpm.
8. yum clean packages: clean a cache erasing downloaded packages.
9. yum clean headers: remove all header files that the system uses to resolve the dependency.
10. yum clean all: delete from the cache packages and header files.

Deb packages (Debian, Ubuntu…etc)

1. dpkg -i package.deb: upgrade a deb package.
2. dpkg -r package_name: remove a deb package.
3. dpkg -l: show all deb packages installed on the system.
4. dpkg -l | grep httpd: show all deb packages with the name “httpd”
5. dpkg -s package_name: to obtain information on a specific package installed on the system.
6. dpkg -L package_name: show list of files given by a package installed on the system.
7. dpkg –contents package.deb: show list of files given by a package not yet installed.
8. dpkg -S /bin/ping: check which package owns a given file.

APT packages updater (Debian, Ubuntu …etc)

1. apt-get install package_name: install / upgrade a deb package.
2. apt-cdrom install package_name: install / upgrade a deb package from cdrom.
3. apt-get update: update the package list.
4. apt-get upgrade: update all installed packages
5. apt-get remove package_name: remove a deb package.
6. apt-get check: check the correct resolution of dependencies.
7. apt-get clean: clean up cache from packages downloaded.
8. apt-cache search searched-package: returns list of packages that corresponds to the series’ wanted packages. ”

View the contents of a file

1. cat file1: view the contents of a file starting from the first row.
2. tac file1: view the contents of a file starting from the last line.
3. more file1: view content along a file.
4. less file1: command like ‘more’ but can save the file movement and backward movement.
5. head -2 file1: see the first two lines of a file.
6. tail -2 file1: see the last two lines of a file.
7. tail -f /var/log/messages: see in real time what has been added to the file.

Text Manipulation

1. cat file1 file2 .. | command <> file1_in.txt_or_file1_out.txt: general syntax for text manipulation using PIPE, STDIN and STDOUT.
2. cat file1 | command( sed, grep, awk, grep, etc…) > result.txt: general syntax to manipulate a text from a file and write the output to a new file.
3. cat file1 | command( sed, grep, awk, grep, etc…) » result.txt: general syntax to manipulate a text from a file and add result in an existing file.
4. grep Aug /var/log/messages: search words “Aug” on file ‘/ var / log / messages’.
5. grep ^Aug /var/log/messages: look for words that begin with “Aug” on file ‘/ var / log / messages’
6. grep [0-9] /var/log/messages: select all lines in the file ‘/ var / log / messages’ that contain numbers.
7. grep Aug -R /var/log/*: search for the string “Aug” in directory ‘/ var / log’ and below.
8. sed ‘s/stringa1/stringa2/g’ example.txt: relocate “string1” with “string2” in example.txt
9. sed ‘/^$/d’ example.txt: delete all blank lines from the example.txt
10. sed ‘/ *#/d; /^$/d’ example.txt: Remove comments and blank lines example.txt
11. echo ‘esempio’ | tr ‘[:lower:]‘ ‘[:upper:]‘: convert lowercase to uppercase
12. sed -e ’1d’ result.txt: deletes the first line of the file sample.txt
13. sed -n ‘/stringa1/p’: display only lines that contain the word “string1”.

Character set and file conversion

1. dos2unix filedos.txt fileunix.txt: convert a text file format from MSDOS to UNIX.
2. unix2dos fileunix.txt filedos.txt: convert a text file format from UNIX to MSDOS.
3. recode ..HTML < page.txt > page.html: convert a text file to html.
4. recode -l | more: show all available format conversions.

Analysis of the file systems

1. badblocks -v /dev/hda1: Check for bad blocks on disk hda1.
2. fsck /dev/hda1: repair / check integrity Linux system file on disk hda1.
3. fsck.ext2 /dev/hda1: repair / check integrity ext 2 file system on disk hda1.
4. e2fsck /dev/hda1: repair / check integrity ext 2 file system on disk hda1.
5. fsck.ext3 /dev/hda1: repair / check integrity ext 3 file system on disk hda1.
6. fsck.vfat /dev/hda1: repair / check integrity ext 3 file system on disk hda1.
7. fsck.msdos /dev/hda1: repair / check integrity of a file from MSDOS system on disk hda1.
8. dosfsck /dev/hda1: repair / check integrity of a file from a DOS system on disk hda1.

Formatting a filesystem

1. mkfs /dev/hda1: create a Linux file system on the partition hda1.
2. mke2fs /dev/hda1: create a system file type on the partition hda1
3. mke2fs -j /dev/hda1: create a Linux file system type ext3 (journal) on hda1 partition.
4. mkfs -t vfat 32 -F /dev/hda1: ccreate a FAT32 file system on hda1.
5. fdformat -n /dev/fd0: flooply format a disk.
6. mkswap /dev/hda3: create a swap file system.

Working with SWAP

1. mkswap /dev/hda3: create a swap file system.
2. swapon /dev/hda3: activate a new swap partition.
3. swapon /dev/hda2 /dev/hdb3: activate two swap partitions.

Backup

1. dump -0aj -f /tmp/home0.bak /home: make a complete backup directory ‘/ home’.
2. dump -1aj -f /tmp/home0.bak /home: make incremental backup directory ‘/ home’.
3. restore -if /tmp/home0.bak: restoring a backup interactively.
4. rsync -rogpav –delete /home /tmp: synchronization between directories.
5. rsync -rogpav -e ssh –delete /home ip_address:/tmp: rsync through SSH tunnel.
6. rsync -az -e ssh –delete ip_addr:/home/public /home/local: synchronize a local directory with a remote directory via ssh and compression.
7. rsync -az -e ssh –delete /home/local ip_addr:/home/public: Synchronize a remote directory with a local directory via ssh and compression.
8. dd bs=1M if=/dev/hda | gzip | ssh user@ip_addr ‘dd of=hda.gz’: make a backup on a hard disk on a remote host via ssh.
9. dd if=/dev/sda of=/tmp/file1: save the contents of a hard drive to a file. (In this case the hard drive is “sda” and the file “file1”).
10. tar -Puf backup.tar /home/user: make incremental backup directory ‘/ home / user’.
11. ( cd /tmp/local/ && tar c . ) | ssh -C user@ip_addr ‘cd /home/share/ && tar x -p’: copy the contents of a directory on a remote directory via ssh.
12. ( tar c /home ) | ssh -C user@ip_addr ‘cd /home/backup-home && tar x -p’: copy a local directory on a remote directory via ssh.
13. tar cf – . | (cd /tmp/backup ; tar xf – ): local copy preserving permits and links from one directory to another.
14. find /home/user1 -name ‘*.txt’ | xargs cp -av –target-directory=/home/backup/ –parents: finding and copying all files with ‘. txt’ from one directory to another.
15. find /var/log -name ‘*.log’ | tar cv –files-from=- | bzip2 > log.tar.bz2: find all files with ‘. log’ and make a bzip file.
16. dd if=/dev/hda of=/dev/fd0 bs=512 count=1: make a copy of MRB (Master Boot Record) to floppy.
17. dd if=/dev/fd0 of=/dev/hda bs=512 count=1: restore the backup of the MBR (Master Boot Record) saved on a floppy.

CD-ROM

1. cdrecord -v gracetime=2 dev=/dev/cdrom -eject blank=fast -force: clean or erase a rewritable cd.
2. mkisofs /dev/cdrom > cd.iso: create an iso image of cdrom on disk.
3. mkisofs /dev/cdrom | gzip > cd_iso.gz: create a compressed iso image of cdrom on disk.
4. mkisofs -J -allow-leading-dots -R -V “Label CD” -iso-level 4 -o ./cd.iso data_cd: create an iso image from a directory.
5. cdrecord -v dev=/dev/cdrom cd.iso: burn an iso image.
6. gzip -dc cd_iso.gz | cdrecord dev=/dev/cdrom -: burn an iso image compression.
7. mount -o loop cd.iso /mnt/iso: mount an iso image.
8. cd-paranoia -B: take songs from a cd to wav files.
9. cd-paranoia – ”-3”: take the first 3 songs from a CD to wav files.
10. cdrecord –scanbus: scan bus to identify the channel scsi.
11. dd if=/dev/hdc | md5sum: to run an md5sum in a device such as a cd.

LAN and Wi-Fi

1. ifconfig eth0: show the configuration of an Ethernet network card.
2. ifup eth0: activate an interface ‘eth0’
3. ifdown eth0: disable an interface ‘eth0’
4. ifconfig eth0 192.168.1.1 netmask 255.255.255.0: set an IP address.
5. ifconfig eth0 promisc: configure ‘eth0’ common mode for packets (sniffing).
6. dhclient eth0: active interface ‘eth0’ dhcp mode.
7. route -n: show route table
8. route add -net 0/0 gw IP_Gateway: default input configuration.
9. route add -net 192.168.0.0 netmask 255.255.0.0 gw 192.168.1.1: Configure static route for network search ‘192 .168.0.0/16’
10. route del 0/0 gw IP_gateway: remove the static route.
11. echo “1” > /proc/sys/net/ipv4/ip_forward: enable ip route.
12. hostname: display the system hostname.
13. host http://www.example.com: hostname search to resolve the name to an IP address (1).
14. nslookup http://www.example.com: find the host name to resolve the name to an IP address and vice versa (2)
15. ip link show: show the link status of all interfaces.
16. mii-tool eth0: show the link status of ‘eth0’
17. ethtool eth0: display statistics for ‘eth0’.
18. netstat -tup: show all active network connections and their PID.
19. netstat -tupl: show all network services listening on the system and its PID.
20. tcpdump tcp port 80: show all HTTP traffic.
21. iwlist scan: show wireless networks.
22. iwconfig eth1: show the configuration of a wireless network card.
23. whois http://www.example.com: search Whois database.

Microsoft Windows Networks (SAMBA)

1. nbtscan ip_addr: net bios name resolution.
2. nmblookup -A ip_addr: net bios name resolution.
3. smbclient -L ip_addr/hostname: show remote actions of a windows host.


IP Tables (FIREWALL)

1. iptables -t filter -L: show all chains of the filter table.
2. iptables -t nat -L: show all chains of the nat table.
3. iptables -t filter -F: clear all rules from the filter table.
4. iptables -t nat -F: clean all nat table rules.
5. iptables -t filter -X: delete any user-created chain.
6. iptables -t filter -A INPUT -p tcp –dport telnet -j ACCEPT: allow input telnet connections.
7. iptables -t filter -A OUTPUT -p tcp –dport http -j DROP: block output HTTP connections.
8. iptables -t filter -A FORWARD -p tcp –dport pop3 -j ACCEPT: allow POP connections to a front chain.
9. iptables -t filter -A INPUT -j LOG –log-prefix “DROP INPUT”: registering an input string.
10. iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE: configure a PAT (Port Address Translation) on eth0, hiding the forced departure packages.
11. iptables -t nat -A PREROUTING -d 192.168.0.1 -p tcp -m tcp –dport 22 -j DNAT –to-destination 10.0.0.2:22: redirect packets directed from one host to another.

Monitoring and debugging

1. top: show cpu processes.
2. ps -eafw: show cpu processes.
3. ps -e -o pid,args –forest: shows Linux processes in a hierarchal manner.
4. pstree: show system processes tree.
5. kill -9 ID_Process: force close and finish process..
6. kill -1 ID_Process: force a process to reload the configuration.
7. lsof -p $$: display a list of files opened by processes.
8. lsof /home/user1: lists open files on a given path by the system.
9. strace -c ls >/dev/null: show system calls made ​​and received by a process.
10. strace -f -e open ls >/dev/null: display library calls.
11. watch -n1 ‘cat /proc/interrupts’: show interruptions in real time.
12. last reboot: show reboot history.
13. lsmod: display the loaded kernel.
14. free -m: Displays the status of RAM in megabytes.
15. smartctl -A /dev/hda: monitor the reliability of a hard drive via SMART.
16. smartctl -i /dev/hda: check if SMART is enabled on a hard disk.
17. tail /var/log/dmesg: show events inherent in the charging process of the kernel.
18. tail /var/log/messages: show system events.

Other useful commands

1. apropos …keyword: display a list of commands that belong to the keywords of a program, are useful when you know what makes your program, but not know the command name.
2. man ping: display manual pages on-line, for example, in a ping command, use the ‘-k’ to find any related command.
3. whatis …keyword: Displays the description of what the program does.
4. mkbootdisk –device /dev/fd0 `uname -r`: create a floppy boteable.
5. gpg -c file1: encrypt a file with GNU security guard.
6. gpg file1.gpg: decode a file with GNU Security Guard.
7. wget -r http://www.example.com: download an entire website.
8. wget -c http://www.example.com/file.iso: download a file with the possibility to stop the download and resume later.
9. echo ‘wget -c http://www.example.com/files.iso‘ | at 09:00: Start a download at any time. In this case begin at 9 am.
10. ldd /usr/bin/ssh: display the shared libraries required by ssh.
11. alias hh=’history’: place an alias for a command-hh = history.
12. chsh: change the command Shell.
13. chsh –list-shells: is an appropriate command to find out if you have to remote into another terminal.
14. who -a: show who is registered, and print time of last import system, dead processes, system logging processes, active processes produced by init, current and past performance of the system clock changes.

TV watching

What is a virtual private network (VPN)

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization’s network.

That’s all well and good but what do you really want a VPN for; looking at Facebook from school, downloading torrents from a site that your ISP has blocked, to watch streaming sites from a foreign county or just to stop big brother from spying on you.
So having said that below is a list of the top 19 free VPN services (would have been 20 but one site was down)

 

 

1) Free VPN by WSC

The Free VPN service protects web surfing session on your home Internet network as well as on Public Internet networks (both wired and wireless). Free VPN enables you to access all web content freely and securely. Free VPN supports Windows 7/Vista/XP (both 32 bit and 64 bit)

Free VPN Features

  • Access blocked websites from within a corporate environment
  • Watch Hulu.com, Pandora.com, ABC.com, BBC.co.uk Abroad
  • Use VoIP software like Skype if it’s blocked.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices and ISP hubs.
  • Hide your IP address for your privacy online.

Download – thefreevpn to access blocked websites.

2) Hotspot Shield

Hotspot Shield is yet another free VPN service available that ensures your privacy and security online. If you want to install Hotspot Shield on your iPhone then visit here for more information on how to configure free VPN on iPhone. It works on both wireless and wired connections providing unlimited Bandwidth. Supports Windows 7/Vista/XP, Mac OS, Snow Leopard.

Features of Hotspot Shield

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.

Download – Hotspot Shield to protect your identity online

3) AlwaysVPN

AlwaysVPN creates an encrypted link between your computer and AlwaysVPN servers and then forwards all of your internet traffic through this link.

AlwaysVPN Features

  • Prevent local eavesdroppers from listening in on your web communication.
  • Bypass restrictive firewalls.
  • Allows you to Access US only web content like Hulu, ABC and other video networks that were blocked previously.
  • Bypass Government firewalls or web content filtering.

4) Tor VPN

Tor is free software that protects your online privacy, business activities and relationships. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe’s PDF plugin, and others that can be manipulated by hackers into revealing your IP address and thereby stealing confidential information. Using Tor might disable Youtube. If you want to view videos at Youtube, you can reconfigure Torbutton to allow it. Supports Windows Mac OS and Linux.

Download Tor to protect your online privacy

5) ItsHidden

Most free VPN service on the Internet like Tor provides limited bandwidth or usage restriction. ItsHidden.com is the ultimate FREE surfing privacy service on the Internet that provides you over 5 GB of dedicated bandwidth to its users. ItsHidden works on BitTorrent (BT) traffic (both upload and download transfer) making it useful for users whose torrent traffic been choked by their ISP, or users who need to hide themselves for anti-piracy organizations from sharing copyrighted content. There is no software required and ItsHidden.com works on all Platforms including Windows, Mac, Linux, IPhone etc

Features of ItsHidden

  • ItsHidden.com is fast and reliable with over 5 gigabits of dedicated bandwidth.
  • Instant access & no software is needed
  • Total privacy, no records of your surfing are kept by us
  • 128-bit secure connection to ensure privacy over all networks

Sign up for ItsHidden VPN service.

6) UltraSurf

UltraSurf is a popular tool to protect Internet privacy with anonymous surfing and browsing. The tool hides or mask the IP addresses and locations, clean browsing history, cookies & more to hide your identity online. With Ultrasurf you can also browse any website freely, that were blocked before. Support Windows only.

Download UltraSurf 9.8. Firefox users need to download the Firefox add-on besides the software

7) NotMyIP

NotMyIP is free online privacy protection software that hides your real online identity from cyber thieves by masking your IP address, which might reveal sensitive information. Not my IP lets you access blocked websites, allows you to vote and comment on forums you were banned before, and further more to prevent other people (organizations) to follow you online by providing you different proxies from all over the world.

Download Not My IP – Free Online Protection Tool.

8) Freenet

Freenet is free tool that allows you to share files, browse, publish, and chat on forums, without fear of censorship anonymously. Freenet when used in “darknet” mode, where users only connect to their friends, is very difficult to detect. Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Supports Windows, Mac OS, Linux

Download Freenet for Windows, Mac OS and Linux

9) Freegate

Freegate is an anti-censorship tool that enables internet users from mainland China, Iran, Syria, Tunisia, Turkey and United Arab Emirates, to view blocked websites and content by their governments. The tool uses multiple open proxies allowing users to penetrate firewalls used to block web sites. Freegate works by tapping into an anti-censorship backbone, DynaWeb, DIT’s P2P-like proxy network system and FirePhoenix used most widely to get around China’s Great Firewall. Supports Windows OS only.

Download – Freegate to penetrate China’s Great Firewall

10) GPass

GPass is a highly advanced software that encrypts online data, hide IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. It encrypts the data sent on the internet, keeping your content safe. The tool allows accessing blocked websites by penetrating into the firewalls and bypassing network censorship. GPass supports streaming audio/video, email, instant messaging, download managers, as well as web surfing. Supports Windows.

Download GPass for Windows

11) JonDo

The JonDo anonymous proxy software protects your Internet access against observation from ISPs, websites and even against the anonymous proxy servers and their operators. Blogger can use it for publishing their views anonymously in order to avoid punishment, disadvantages at work.Supports Windows, Mac OS, Linux

Download JonDo for Windows Mac & Linux

12) UltraVPN

UltraVPN is a client/server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection.

UltraVPN Features

  • Watch streaming websites like hulu.com or favorite-tvshows.com
  • Access blocked websites from within a corporate environment
  • Connect or log in into MSN if it’s blocked
  • Use VoIP software like Skype if it’s blocked
  • Protect your email and browsing privacy

Download UltraVPN for Windows

13) GNUnet

GNUnet is a secure peer-to-peer networking tool that uses a service on top of the networking layer allowing anonymous file-sharing. The tool uses link-encrypted connections with stable bandwidth utilization to communicate between peers. GNUnet uses a simple, excess-based economic model to allocate resources.

Download GNUnet for Windows, Mac & Linux

14) Alonweb

VPN service offers to preserve anonymity on the web and encrypt the transferred data. VPN provides a secure connection, hides your real IP address and encrypts the transferred data (correspondence, passwords, sent files). Just register yourself for free anonymous web surfing. Free VPN service from Alonweb offers its users connection via two servers: Netherlands and Panama with some limitations (not for premium users) like – Only 1Gb of data traffic per month is available, maximum HTTP request size is 2Mb, heavy traffic consuming protocols and games are blocked.

Register yourself on Alonweb for free VPN

15) Your Freedom

Your Freedom VPN service that bypass restrictive firewalls, filter web proxies and hides network or IP address. Once installed you can easily penetrate into a firewall or a filtering web proxy and access blocked web pages. The tool allows you to stay anonymous, as your IP address is not logged with every access to someone’s web page. Nearly all applications work with Your Freedom, but make sure to have an Internet access entirely. It also allow you to play many online games like World of Warcraft, Second Life, Lineage 2, Final Fantasy XI, EVE Online and many more through web proxies. Supports Windows and Mac

Download Your Freedom to bypass firewalls & Filter web proxies

16) CyberGhost

CyberGhost conceals your IP address and completely protects your data transmissions from eavesdroppers. With 128-bit AES encryption, you can surf anonymously. Supports Windows OS only.

Download CyberGhost to surf anonymously

17) Loki Network Project

It is free VPN service and SSL based free VPN server to protect your private data like IP address, e-mail/FTP/HTTP passwords, web-sites visited, uploaded/downloaded files and etc. It also bypasses internet access limitations, if any. Public Loki VPN Service also protects data from being intercepted by various network sniffers in your LAN segment and safely bypass traffic interception and analyses on corporate, ISP or even country level firewall. Supports Windows only.

Download Loki Network Project to bypass any limitations in visiting web-sites or any other Internet services

18) Comdo EasyVPN

Free VPN software, Comodo EasyVPN uses 128 bit encryption providing you complete security right on top of Internet. EasyVPN allows you to create your own private ‘network-within-the-Internet’ that only the contacts you invite are able to view and use.

Features of Comodo EasyVPN

  • Access your PC from anywhereEasyVPN makes it simple to gain control of any machine in your network.
  • Security by Comodo – EasyVPN allows you to create your own private ‘network-within-the-Internet’ that only the contacts you invite are able to view and use.
  • Remote File and Printer Sharing – Creating an EasyVPN network allows you to exchange files and folders and even print to your local printer from any remote location.

Download Comodo EasyVPN 32 bit version | 64 bit version

19) Wippien

Wippien allows you to access your friends’ shares, printers, services, desktop, even ping them by providing an IP address. Wippien uses WeOnlyDo wodVPN component to establish P2P between peers, and then redirects all traffic from Virtual Network Adapter through wodVPN to remote side.

Download Wippien

A dispute over whether a Swedish ISP can be forced to hand over the details of one its subscribers to an anti-piracy group has just received its long-awaited ruling from the Europe’s highest court. A few moments ago the ECJ announced that there are no EU barriers which prevent the ISP handing over its customers’ private details to copyright holders.

Not long after Sweden’s controversial IPRED legislation became law in 2009, five book publishers handed a request for information to a local court.

The rightsholders, represented by anti-piracy group Antipiratbyrån, wanted to force local ISP ePhone to hand over the personal details of a subscriber who allegedly stored more than 2000 audio books on his server, 27 of which breached the publishers’ copyrights.

In June that year the court ordered ePhone to provide the information but the ISP felt it would be wrong to comply, and instead took their case to the Court of Appeal. The ruling of the lower court was overturned on appeal and the case was sent to the Sweden’s highest court.

In the event even the Supreme Court couldn’t decide and it in turn forwarded the case to the European Court of Justice. A few moments ago the ECJ released its decision, one that is sure to please rightsholders.

The ECJ decided that there are no EU barriers which stop ePhone being ordered to provide the information as requested by Antipiratbyrån and the book publishers. The Court said that Swedish law strikes an appropriate balance between the rights of copyright holders and citizens’ rights to privacy.

Having obtained the decision from the ECJ, the case will now head back to Sweden’s Supreme Court.

“We feel very satisfied with this judgment. It is extremely important that we have received this message,” said Kristina Ahlinder, president of the Publishers’ Association.

“The important next step is that the Supreme Court gives us the authority, that the evidence is sufficient and that we have the right to share this information. The illegal publication that has occurred from this IP address is comprehensive,” Ahlinder added

If Sweden’s Supreme Court indeed decides that ePhone must hand over the information, it is not clear if the publishers are even ready to continue with a civil case against the alleged infringer. But of course, other entities such as the music and movie industries have been watching closely too, since it clarifies their position going forward. IFPI, among others, are welcoming the ruling.

Microsoft Network Monitor
Microsoft Network Monitor is a network protocol analyzer that lets you capture, view, and analyze network traffic. Version 3.3 of Network Monitor is available in 32- and 64-bit versions. Download it now.

Microsoft Baseline Security Analyzer
The Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed to help administrators of small and medium-sized businesses ensure that their Windows-based computers are secure. You can use MBSA to determine the security state of your computers in accordance with Microsoft security recommendations. MBSA also offers specific remedia¬tion guidance for security problems it detects, such as misconfigurations and missing security updates.
At the time of writing this, the current version was MBSA 2.1. This version is available in 32- and 64-bit versions, but it does not install on Windows 7. A new version that supports Windows 7 is due to be released sometime in the future. You can download the current version and get information regarding the a version for Windows 7 at microsoft.com/mbsa/.

Microsoft IPsec Diagnostic Tool
The Microsoft IPsec Diagnostic Tool helps network administrators troubleshoot network-related failures, focusing primarily on Internet Protocol security (IPsec).The tool checks for common network problems on the host machine and, if it finds any problems, it suggests re¬pair commands. The tool also collects IPsec policy information on the system and parses the IPsec logs to try to determine why the failure might have happened. The tool also provides trace collection for virtual private network (VPN) connections, the Network Ac¬cess Protection (NAP) client, Windows Firewall, Group Policy updates, and wireless and system events. The diagnostic report generated by the tool is derived from the system logs collected by the tool during its analysis phase. Download it now.

Windows Sysinternals Suite
The Windows Sysinternals Suite is a set of advanced tools for troubleshooting issues with Windows-based computers. These tools were originally developed by Winternals Software LP, which Microsoft acquired in 2006. Some of the useful and popular tools included in this suite are:

  • Autoruns This tool lets you see what programs are configured to start up automati¬cally when your system boots. It also displays the full list of registry and file locations where applications can configure autostart settings.
  • BgInfo This tool automatically generates desktop backgrounds that include important information about the system, including IP addresses, computer name, network adapt¬ers, and more.
  • Process Explorer This tool lets you find out what files, registry keys, and other objects that your processes have open, which dynamic-link libraries (DLLs) they have loaded, and who owns each process.
  • Process Monitor This tool lets you monitor the file system, registry, process, thread, and DLL activity on your computer in real time.
  • PsTools This set of command-line tools can be used for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and performing other tasks.
  • RootkitRevealer This tool lets you scan your system for rootkit-based malware.
  • ShellRunas This tool allows you to launch programs as a different user using a shell context-menu entry.
  • TCPView This tool lets you view active sockets on the computer in real time.

Download the entire Sysinternals Suite now.

1. The Pirate Bay

The Pirate Bay is probably the best known BitTorrent brand on the Internet. The site was founded in 2003 and is still expanding, despite the various legal troubles and blockades that were designed to hurt the site in recent years. The Pirate Bay currently has close to 2 billion page views a month.

2. Torrentz

Torrentz has been the leading BitTorrent meta-search engine for years. Unlike the other sites featured in the list Torrentz does not host any torrent files, it merely redirects visitors to other places on the web.

3. KickassTorrents

Founded in 2009, KickassTorrents is one of the youngest sites in the list, and this year it moved up to the top 3. Responding to the increasing worries about domain seizures, the site moved from its kickasstorrents.com domain to kat.ph a few months ago. The site continues to innovate and release new features every other week.

4. IsoHunt

In 2010 isoHunt became the first search engine forced to implement a keyword filter provided by the MPAA. Despite this setback, isoHunt continues to be listed among the top torrent sites. In 2012, isoHunt hopes to get rid of the filter through the Appeals Court.

5. BTjunkie

BTjunkie had to deal with a setback a few months ago when the site was blocked in Italy following a court order. In response to the block, the site’s owners launched an ad-free proxy site for Italians only. Just as last year, BTjunkie settles in fifth place.

6. ExtraTorrent

ExtraTorrent is one of those robust torrent indexes that doesn’t make the news very often. Compared to last year the site has moved up a spot and is now the 6th most popular torrent venue.

7. Demonoid

The semi-private tracker continues to attract a massive audience, also on the new .me domain name. Behind the scenes the site’s owners are working on a new and improved look.

8. EZTV

Unlike the other sites in the top 10, TV-torrent distribution group EZTV is a niche site specializing in TV content only. Despite its fair share of downtime this year, EZTV has managed to get a spot in the top 10 for the first time in its six year existence.

9. Bitsnoop

BitSnoop is another newcomer that gained a large audience this year. This didn’t go unnoticed by the RIAA, who filed a complaint at the U.S. District Court of Columbia and obtained a subpoena to reveal the identity of BitSnoop’s owner a few months ago.

10. 1337x

1337x is also new to the top 10, and focuses more on the community aspect than some competitors. The site’s owners say they started 1337x to “fill an apparent void where it seemed there was a lack of quality conscience ad free torrent sites with public trackers.” Its 10th place this year proves that they’re getting the success formula right.

REMEMBER😉

The top 10 most downloaded movies on BitTorrent, ‘Conan the Barbarian’ tops the chart this week, followed by ‘Rise of the Planet of the Apes’. ‘Our Idiot Brother’ completes the top three.

This week there are four newcomers in our chart. Conan the Barbarian is the most downloaded movie of the week.

The data for our weekly download chart is collected by TorrentFreak, and is for informational and educational reference only. All the movies in the list are BD/DVDrips unless stated otherwise.

Ranking (last week) Movie IMDb Rating / Trailer
1 (3) Conan the Barbarian 5.3 / trailer
2 (…) Rise of the Planet of the Apes 7.8 / trailer
3 (…) Our Idiot Brother 6.8 / trailer
4 (1) Killer Elite 6.7 / trailer
5 (…) 11-11-11 4.5 / trailer
6 (2) The Hangover Part II 6.8 / trailer
7 (4) Captain America: The First Avenger 7.2 / trailer
8 (9) Harry Potter and the Deathly Hallows: Part 2 8.3 / trailer
9 (…) The Devil’s Double 7.1 / trailer
10 (6) Crazy Stupid Love 7.8 / trailer

Following the High Court ruling ordering UK ISP BT to block Usenet indexing site Newzbin2, it was only a matter of time before that momentum was capitalized upon by the movie and music industries. Today a coalition of companies led by the BPI demanded that BT also block The Pirate Bay, either voluntarily or by consenting to a court order.

It has always been presumed that the legal action to have Newzbin2 blocked in the UK was just the beginning for the music and movie studios. Today we have that confirmation.

A coalition of the willing, headed up by the BPI and including the major Hollywood studios, approached BT, the UK’s leading ISP, with a demand – block The Pirate Bay voluntarily or consent to a court order.

The self-styled “world’s most resilient torrent site” is no stranger to censorship. It is already blocked by ISPs in Ireland, Italy, Turkey, Denmark and Belgium but the quest to put it completely out of business continues.

“The Pirate Bay is no more than a huge scam on the global creative sector. It defrauds musicians and other creators of their wages, and it destroys UK jobs,” said Geoff Taylor, BPI Chief Executive.

“Unlike legal music download sites, it exposes consumers to the risk of viruses, theft of personal information and inappropriate content. We would not tolerate Counterfeits ‘R’ Us on the High Street – if we want economic growth, we cannot accept illegal rip-off sites on the internet either. We hope that BT will do the right thing and block The Pirate Bay.”

But at this stage PaidContent is reporting that BT will not simply roll over and comply with the demand for The Pirate Bay to be blocked voluntarily.

“BT cannot block web sites willy nilly,” said the BT source.

Voluntary action aside, BT has reportedly been given the chance to consent to a court order. If the ISP refuses it seems likely that the parties will end up in court for a mirrored re-run of the arguments in the Newzbin2 case. If there are no surprises the High Court could order a blockade of The Pirate Bay in the first half of 2012.

After a lengthy legal process the censoring of Newzbin2 finally kicked in earlier this week, but users of the site are reportedly bypassing the block by various means including the use of Newzbin2′s very own anti-blocking software.

A feature to unblock The Pirate Bay in the event that it too became blocked was already added to the client several weeks ago.

Speaking with TorrentFreak, a Pirate Bay insider laughed off the efforts to slow down the site and said that every time there are attempts at censorship the resulting publicity only gives them a boost.

“Thanks yet again for the free advertising,” they conclude.

Reported by http://torrentfreak.com

According to a report which has flown almost completely under the radar, last year an ISP sent out around 300 “first strike” warning letters wrongfully accusing innocent subscribers of Internet piracy. ISP Eircom implemented the scheme in partnership with the recording industry and is now being investigated by the Irish Data Protection Commissioner.

In February 2009, IRMA – representing EMI, Sony, Universal and Warner – reached an 11th hour out-of-court settlement with Irish ISP Eircom on the issue of illicit file-sharing. The deal would see Eircom introduce a graduated response system for dealing with errant subscribers.

“Eircom is proceeding with implementation of the protocol which could result in the suspension and ultimately disconnection of broadband service for those customers who deliberately and persistently infringe copyright,” the company said in a December 2010 statement, reiterating their commitment to the scheme.

But little did we know that the fears of “3 strikes” opponents had already come true.

From deep inside the “how the hell did the majority of the media miss this department”, it now becomes clear that by October 2010, Eircom had already sent out around 300 warning letters to completely innocent subscribers.

The company seems to have tried to play down the error saying that computer clocks were incorrectly adjusted to compensate for daylight saving time, some comfort to the unlucky letter recipients.

According to TJ McIntyre at digital rights site EDRI.org, as a result of this failure the Irish Data Protection Commissioner is now investigating the entire Eircom scheme.

“The significance of this case goes well beyond simple technical failings however, as the complaint to the Data Protection Commissioner (DPC) has triggered a wider investigation of the legality of the entire three strikes system,” he writes.

The DPC is said to be not only investigating the complaint but also “whether the subject matter gives rise to any questions as to the proportionality of the graduated response system operated by Eircom and the music industry.”

McIntyre says that when the Eircom/IRMA deal was being agreed, the DPC expressed concerns with it, not least over the question of whether or not IP addresses are personal data. However, until someone raised a complaint, that issue was put on the back burner. The delivery of 300 false “first strike” warning letters appears to have met that criteria.

“The complaint in this case has now triggered that action, and it seems likely that the Commissioner will reach a decision reflecting his previous views that using IP addresses to cut off customers’ internet connections is disproportionate and does not constitute ‘fair use’ of personal information,” McIntyre explains.

“If so, the Commissioner has the power and indeed the duty to issue an enforcement notice which would prevent Eircom from using personal data for this purpose – an outcome which would derail the three strikes system unless Eircom successfully challenges that notice before the courts, or unless the music industry were to succeed in its campaign to secure legislation introducing three strikes into Irish law.”

The way this story has flown largely under the mainstream tech news radar will have been a relief to Eircom and IRMA. Something tells us that is about to change.

For the latest torrent news visit Torrent Freak

Top 10 Torrent Sites


2 – Torrentz

3 – IsoHunt


5 – btjunkie


7 – ExtraTorrent . com

8 – TorrentDownloads . NET


Creepy is a software package for Linux or Windows – with a Mac OS X port in the works – that aims to gather public information on a targeted individual via social networking services in order to pinpoint their location. It’s remarkably efficient at its job, even in its current early form, and certainly lives up to its name when you see it in use for the first time.

 

 

Screenshots:

Map with results

Features

Map providers available :

  • Google Maps
  • Virtual Maps
  • Open Street Maps

Location information retieval from :

  • Twitter’s tweet location
    • Coordinates when tweet was posted from mobile device
    • Place (geographical name) derived from users ip when posting on twitter’s web interface. Place gets translated into coordinates using geonames.com
    • Bounding Box derived from users ip when posting on twitter’s web interface.The less accurate source , a corner of the bounding box is selected randomly.
  • Geolocation information accessible through image hosting services API
  • EXIF tags from the photos posted.

Social networking platforms currently supported :

  • Twitter
  • Foursquare (only checkins that are posted to twitter)

Image hosting services currently supported :

  • flickr – information retrieved from API
  • twitpic.com – information retrieved from API and photo exif tags
  • yfrog.com – information retrieved from photo exif tags
  • img.ly – information retrieved from photo exif tags
  • plixi.com – information retrieved from photo exif tags
  • twitrpix.com – information retrieved from photo exif tags
  • foleext.com – information retrieved from photo exif tags
  • shozu.com – information retrieved from photo exif tags
  • pickhur.com – information retrieved from photo exif tags
  • moby.to – information retrieved from API and photo exif tags
  • twitsnaps.com – information retrieved from photo exif tags
  • twitgoo.com – information retrieved from photo exif tags

Automatic caching of retrieved information in order to reduce API calls and the possibility of hiting limit rates.

GUI with navigateable map for better overview of the accumulated information

4 Maps providers (including Google Maps) to use.

Open locations in Google Maps in your browser

Export retrieved locations list as kmz (for Google Earth) or csv files.

Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application.

User/target search for twitter and flickr.

Creepy is the brainchild of Yiannis Kakavas, a 26-year-old academic working on his thesis on critical infrastructure protection at Technischen Universität Darmstadt in Germany following his completion of an MSc in information and communications security at the Royal Institute of Technology in Stockholm.

To try this totally free application go to http://ilektrojohn.github.com/creepy it is totally worth it.

There are three types of gamers in this world the casual gamer, the serious gamer and the dedicated gamer.

  • The casual gamer – Sees a game trailer on the net or sees a great looking front cover on the shelf of the gaming store and thinks ‘That looks ok, I’ll have a go at that’.
  • The serious gamer – Plays games types they prefer like MMO’s, FPS or RPG’s. Joins gaming clans and spends their social time reading forums about the games they are playing.(If you know what even one of those acronyms were you are not a casual gamer)
  • The dedicated gamer – Now the dedicated gamer is a strange beast, they are a mix between the serious gamer and the geek. These gamers know what they like and are very good at playing, all be it not as good as the serious gamer but always finish in the top 5. Now these gamers like to know how the game physics work and how maps and textures are made in the game environment.

This article is focused on dedicated gamer and as one myself, I know that all dedicated gamers love and need to try betas.

When a new product is created or upgraded, there are several stages in development before the product can be sold in the commercial marketplace. The first stage is the alpha stage, in which the product is tested by software testers within the company and debugged as necessary. A beta version is the name for the second stage of software testing, in which it is released for free or a reduced price to a group of users.

The beta version of a software release is considered to be a preview. It has all the standard features, but is not yet ready for wide release or sale. During this point, the company will collect feedback from users about the product’s usability — what they like and what should be changed — before the product’s wide release. A beta version of a program can be either a closed beta, which is limited to a specific group of users, or an open beta, which is available for the general public to use.

Though beta version products will often have all the features available in the final version of the product, they generally have limited, if any, technical support available to users. However, many products will often remain in beta version for years, during which time they are used by a wide audience as if they were full versions of products.

So lets have some open betas – these are beta versions open to the general public for FREE.

All Betas

Title Phase Genre Site Date Added
League of Legends Gone Gold RTS Web Site 1/18/2011 4:14:00 PM
Rift: Planes of Telara PreBeta MMORPG Web Site 11/7/2010 12:00:00 PM
Darkspore PreBeta RPG Web Site 11/5/2010 6:06:00 PM
FireFall Signup MMOFPS Web Site 9/30/2010 11:26:00 AM
World of Tanks Closed Other Web Site 8/1/2010 6:21:00 AM
Bloodline Champions Signup MMOFPS Web Site 8/1/2010 6:05:00 AM
Fallout Online PreBeta MMORPG Web Site 8/1/2010 5:58:00 AM
Dawntide Open MMORPG Web Site 6/2/2010 8:09:00 AM
TERA Online Signup MMORPG Web Site 6/2/2010 8:00:00 AM
Adventure Quest Worlds Gone Gold MMORPG Web Site 4/17/2010 6:50:00 PM
Alien Breed Evlolution Episode 1 Gone Gold FPS Web Site 1/27/2010 10:10:00 AM
Port Galaxy PreBeta MMORPG Web Site 1/14/2010 11:27:00 AM

There are many site that allow you to sign up for free betas www.betawatcher.com being one of the best

Another being bigdownload.com

After looking at the above sites and maybe even trying some games, what type of gamer are you?