Monday, February 27, 2012

Installing Pakages rpm ang tar

RPM

rpm -iUhv <pkgname>.rpm

rpm -F <pkgname>.rpm
rpm -e <pkgname>.rpm
rpm -l <pkgname>.rpm

i...install

U...update

h...Print  50  hash marks as the package archive is unpacked

v...print normally routine progress messages

F...Fresh install

e...erase install

l...listing details

 

tar -xvzf package_name.tar.gz

x= extract v=verbose z=(un)compress f=file

tar -jxvf package_name.tar.bz2

j=bzip2

 

 

CHANGING FILE PERMISSIONS

Changing the permissions can be done with names and numbers, I like the numbers

chmod 754  test.txt

Here is why:
4=read 2=write 1=execute.
The three numbers in the chmod above are for the

"user" ( the first number ),

"group" ( the second number ) and

"others" ( the third number )

So if I want to give the user all permissions: 4+2+1=7
and i give the group read an execute permissions: 4+1=5
and all others only read permission 4=4

chmod takes either the decimal representation of the permissions or a symbolic representation.

The symbolic representation is [ugoa][+-][rwx]. This is one of the letters

u  (user=file owner),

g  (group), o(others),

a   (all=u and g and o) followed by + or - to add or remove permissions and then the symbolic      representation of the permissions in the form of

r   (read)

w   (write)

x   (execute).

To make the file "file.txt" writable for all you type: "chmod a+w  file.txt"

See through Terminal

Guake is an application which will give us a see through terminal.with tis terminal u can work on terminal and see the background as well see movies/photos etc

yum install guake*

Sunday, February 26, 2012

BYPASS WINDOWS PASSWORD

Here we will see two type of password bypassing for windows

1.using ubuntu live cd and chntpw command

2. using offline nt password recovery cd or usb

  1. Use chntpw to delete a Windows password : With chntpw utility, you can erase the password of      any Windows account, freeing access.first load the ubuntu live cd and linstall chntpw .



  • Open a Terminal window by clicking on the Ubuntu menu, click Accessories, then Terminal.

  • Enter the command cd / media and confirm with Enter.

  • Enter the ls command and confirm with Enter. The list of hard disk drives is displayed. You should see the reference noted above.

  • Then enter the command cd followed by the reference hard drive containing Windows. In our case, the command is cd FAC4AC2BC4ABE7D9. Confirm with Enter.

  • Then type the command cd WINDOWS/system32/config to access the Windows system folder where are saved passwords. Press Enter.

  • Then enter the command sudo-i chntpw Sat and confirm by pressing Enter.

  • Press the button 1 and press Enter.

  • SAM is the file that contains the Windows registry. The list of users on your system is displayed. Enter the code located in the RID column beside the name of the user you want to reset the password to zero code preceded by 0x and press Enter. For RID 03E8, the command becomes 0x03e8 here.

  • Then press the 1 key to erase the password for the selected account and confirm by pressing Enter.

  • The password is then deleted as you said the message Password cleared. Press! And press Enter to exit from the menu.

  • Then press the q key, validate and confirm the registration of the change by pressing ahead. Confirm with Enter.

  • Then close the Terminal window and restart your computer by clicking the Stop button and then click Restart. Confirm the operation and remove the Ubuntu CD in your drive when you are asked. Press Enter.


2. Offlint nt password recovery(http://pogostick.net/~pnh/ntpasswd/)

first download the cd or usb zip files form below and follow the steps

http://pogostick.net/~pnh/ntpasswd/cd110511.zip

http://pogostick.net/~pnh/ntpasswd/usb110511.zip

cd...if u r using a cd then simply  download the iso and burn it in the cd and use it

usb...

  • Copy all the files that is inside the usbXXXXXX.zip or on the CD onto an usb drive, directly on the drive, not inside any directory/folder.

  • It is OK if there are other files on the USB drive from before, they will not be removed.

  • Install bootloader on the USB drive, from command prompt in windows (start the command line with "run as administrator" if possible)Replace X: with the drive letter the USB drive shows up as (DO NOT USE C:)

    • X:syslinux.exe -ma X:




  • If it seems like nothing happened, it is usually done.

  • However, a file named ldlinux.sys may appear on the USB drive, that is normal.

  • It should now in theory be bootable.


now use the cd or usb to reset the password use the walkthrough if needed http://pogostick.net/~pnh/ntpasswd/

How to activate Root login

Open your Te rminal from Applications -> System Tools -> Terminal

-----------Now Login as a root from your terminal

------------Now go to your :-- cd /etc/pam.d/

-------------Then first take a backup of gdm file

***********************cp gdm gdm.bkp


---------------Find and Comment or remove this line into your gdm file
---------------auth required pam_succeed_if.so user != root quiet


Save & Exit From that File.


-----------------Then first take a backup of gdm-password file

***************cp gdm-password gdm-password.bkp


--------------------Find and Comment or remove this line into your gdm file
--------------------auth required pam_succeed_if.so user != root quiet


Save & Exit from File.

Monday, February 13, 2012

BYPASS UBUNTU PASSWORD


  1. Reboot the system, and when you are at the selection prompt(GRUB menu), highlight the line for Linux and press ‘e’.

  2. This will take you to another screen, where you should select the entry that begins with “kernel” and press “e” again….

  3. Append "single" to the end of that line (without the quotes and give space)

  4. If your system requires you to enter your root password to log into single-user mode, then append init=/bin/bash after “single“. Hit “Enter” to save the changes.

  5. Press “b” to boot into Single User mode.

  6. Once the system finishes booting, you will be logged in as root. Use passwd and choose a new password for root.

  7. Type reboot to reboot the system, and you can login with the new password you just selected.

  8. ENTER INTO THE TTY MODE AND ENTER AS ROOT TO GET ALL THE USER NAME with users AND CHANGE THE PASSWORD OF USER WITH passwd "username" (without Quotes) to get the promt to change the password

PYTHON APPLICATIONS....PART 1

 

A software for controlling the keyboard and mouse of Ur laptop with a Bluetooth enabled Symbian phone.actually this was ma mini project and we did this in two platforms QT and .NET ,later during an interview the interviewer asked me why did we u two different platforms instead of doing it in one ..........this question was stuck in ma mind for long time which forced me to do this in a single platform . later i chose python for doing this..and here it goess

we do this in two parts
1.client ie ur phone
2.server ie ur laptop

let start with client

requirements

a Symbian phone with Bluetooth and python installed .you can get the python for ur mobile from following links

http://dl.dropbox.com/u/30579529/mobile%20applications/sis/pips.sis
http://dl.dropbox.com/u/30579529/mobile%20applications/sis/pips_nokia_1_3_SS.sis
http://dl.dropbox.com/u/30579529/mobile%20applications/sis/Python_2.0.0.sis
http://dl.dropbox.com/u/30579529/mobile%20applications/sis/pythonapps_zxcyexuy.sis
http://dl.dropbox.com/u/30579529/mobile%20applications/sis/PythonScriptShell_2.0.0_3_0.sis
http://dl.dropbox.com/u/30579529/mobile%20applications/sis/PythonScriptShell_2.0.0_devcert_signed.sis

make sure that u have installed all the files in ur phone

now u can find the python shell in ur phone application menu
the best way to do this to make a .py file and run it in python>>run script option in ur phone

the following  code actually

1.switch on the phone bluetooth if its off and search for a server and connects it tothe server .

2.search for each key press  make and send to the server with send function(it actually sends the mobile ascii value)

code:

 

import appuifw
import socket
import graphics
import e32
import btsocket as socket
 
keyboard_state={}
last_keycode=0
 
def bt_connect():
    global sock
    sock=socket.socket(socket.AF_BT,socket.SOCK_STREAM)
    target=''
    if not target:
        address,services=socket.bt_discover()
        print "Discovered: %s, %s"%(address,services)
        if len(services)>1:
            choices=services.keys()
            choices.sort()
            choice=appuifw.popup_menu([unicode(services[x])+": "+x
                                        for x in choices],u'Choose port:')
            target=(address,services[choices[choice]])
        else:
            target=(address,services.values()[0])
    print "Connecting to "+str(target)
    sock.connect(target)
    print "OK."
     
     
def callback(event):
    if event['type'] == appuifw.EEventKeyDown:
        keyboard_state[event['scancode']]=1
    elif event['type'] == appuifw.EEventKeyUp:
        keyboard_state[event['scancode']]=0
    elif event['type'] == appuifw.EEventKey:
        last_keycode=event['keycode']
         
    canvas.text((0,60),u'%s'%(last_keycode))
    sock.sendall(u'%s'%(last_keycode))
     
 
bt_connect()
     
canvas=appuifw.Canvas(event_callback=callback)
appuifw.app.body=canvas
 
 
lock=e32.Ao_lock()
appuifw.app.exit_key_handler=lock.signal
lock.wait()

 

BYPASS FEDORA PASSWORD

1. Reboot the system
2. When you see the Grub menu, highlight your Fedora installation with the arrow keys and press ‘e’ to edit.
3. Again use the arrow keys to highlight the line saying ‘kernel’ at the beginning and press ‘e’ again, which will let you edit that line.
4. Append a space at the end of the line and type ’single’ without the quotes there. Press the Enter key.
5. Now press ‘b’ which will take you to the Linux single user mode where you’ll have privileged access without typing a password.
6. Now you do a passwd, and change your root password. Then reboot. You are done.

Now enter into TTY mode and login as root and use passwd "username" to change the password of needed password

enjoyyyyyyyy............