Cookie

Mount a remote device in tunneling “sshfs”

Several articles ago I explained how to mount a remote machine via FTP, so that the PC on which we operate is seen as a directory locale. The program used to establish the connection between the two machines is unpronounceable: “curlftpfs“. Today we will do the same thing, but the protocol used will be the’SSH. We will find several similarities to the article previously developed, one in all the impronunciabilità the software used: “sshfs“.

How much of the useful software, “sshfs” is directly installed via repository. It will be sufficient to look inside the graphical tool in use to the distribution. (more…)

We recover deleted files with Foremost

Perhaps not everyone knows that when you delete files from our devices, they are not deleted, but only “hidden” waiting to be overwritten, and it is precisely for this reason that we believe that the files deleted can be recovered (always if you are not already been overwritten).

Foremost is a program open source a command line to Linux that recovers deleted files. It is of extreme simplicity, present in the repository and performs its job without fuss. As stated in the site, Foremost was originally developed for l '”Air Force Office of Special Investigation” U.S., and for the “center studies and research information security and systems“. Subsequently was released the source code and even the general public could benefit from the advantages offered by Foremost. (more…)

HTML Purifier per “purify” HTML l'

Today we see a small program in PHP on that adapts well to any of our web pages. It is HTML Purifier a common libreria PHP, that cleans up the HTML dates of the pages by removing all tag e i markup unnecessary, that often weigh down the page. Also makes the code of our pages secure (I'm thinking about dynamic sites: WordPress, Joomla, Drupal, etc..) contrasting effectively XSS attacks (Cross-site scripting).

For those who want to use HTML Purifier hand operation is more than obvious; downloaded and extracted the package we give write permissions the folder /HTMLPurifier/DefinitionCache/Serializer: (more…)

Enable a swap on any external drive connected (USB also)

In today's article we deal with computer and speed. Consequence of the granting of Windows 7 I became aware of a new, small utility: ReadyBoost. In practice is nothing more than a swap USB drive: enter the key, enable ReadyBoost on the stick, disappears from the key resources and is used for storage of temporary files (not all, some files targeted).

Perhaps not everyone knows that enable a swap USB is not recommended due to (maybe three) main reasons: (more…)

Linux also has a children's applications “portable”, but it is necessary?

For some years now the “portable software” the “x-software” is an established, software che no need to install, but starts directly through an executable. These software were written natively for “turn” below Windows, given the low share of dependencies, and in fact has been appreciated by most of these users on the network, not to mention the praise some of the main newspapers IT online.

What's this substantially? In short, the “portable software” the “x-software” software is often open source, packed, including all dependencies necessary for the operation which goes simply launched and does not require installation. In a few words could be sufficient within the computer a root directory containing links the software is not portable to “soil” the Windows registry, preventing possible malfunction. They are also designed for use by removable devices, come on cd USB flash drives. Simply have the program unpacked the stick. (more…)

Prey: pull the money after a year

Last year, in this period between the pages of this blog there was talk of “Prey” (official website), un software open source (which is not common among the tracking programs) Multiplatform able (if installed) of track the location of your computer if it is stolen. Among the features are already implemented in each report: photo by webcam, screenshot Instant, IP address public and private, and in addition to geolocation using the IP address Prey is able to triangulate its position according to the distance of the closest wi-fi networks. After trying it I personally find that the detected position is disconcertingly accurate. (more…)

As I solved the problems with the disks “fsck”

A few years ago I bought a USB Disk sternum because of the limited space that I could offer to the files inside the computer (and also for me some healthy backup at regular intervals), and I opted for a nice LaCie the 1tb memory. I'm talking about even a few years ago, it was in fact the most capacious hard on the consumer market.

Just today, despite the apparent normal ignition, I realize that in addition to the classic blue light indicates that the operation of the device, he's added una rossa that certainly does not make me hopeful. I'm going to ripescarmi the PDF manual that I had lungimirantemente copied to my hard drive and I find that the red light indicates a disk error. (more…)

Check a Linux desktop from Windows or Linux with VNC

In today's post we see how access to a desktop GNU / Linux (which we will call “server”) da un pc GNU/Linux o Windows (which we will call “client”) with VNC. For today's article, I draw inspiration from an interesting post in English.

Log in to a desktop GNU / Linux from a any other system, located in a anywhere (LAN, internet) using VNC is relatively simple. The result can be obtained regardless of operating system used (GNU/Linux, Windows the Mac OS X). One of the most interesting features is that this procedure can be implemented in a free with a small expenditure of time and without being experts. (more…)

“Print” time and date automatically in a photo

Today we are insert current date and time in an image using the terminal. By itself, the procedure is not complicated, let's see how.

Meanwhile, we see how to make us say the date and time from PC:

[user@localhost ~]$ echo $(date -R)
Tue, 24 Aug 2010 11:45:04 +0200

And now let's see how place it in the we are interested in using ImageMagick. This program allows us to perform many image manipulation, without having to go through the GUI. There is also a primitive graphical interface, but ImageMagick is mainly used for a number of automation (that soon we will see) command line, the invoked by PHP. (more…)