Pages

Thursday, January 31, 2013

GNOME Developer Experience Hackfest 2013

This week I’m attending the Developer Experience hackfest in Brussels.
This week Red Hat and the GNOME Foundation giving you the chance to attend the Developer Experience hackfest in Brussels.
The goal of the hackfest is to improve the overall application developer experience.
There are three main areas of work we suggest for this hackfest:

  • Tooling (Anjuta, Monodevelop, application bundling, intltool, gtk-doc, autofoo and friends...)
  • Developer docs and mindshare (unified online/offline API reference UI, app developer community building...)
  • Further platform needs (improvement of data-driven apps and other needs with an unclear answer)
  • Application bundling and sandboxing, the application as the first class concept in the kernel

Read more about this event here.

Tuesday, January 15, 2013

The linux command: dmidecode

The linux command dmidecode is a tool for dumping a computer's DMI.

# dmidecode -h
Usage: dmidecode [OPTIONS]
Options are:
 -d, --dev-mem FILE     Read memory from device FILE (default: /dev/mem)
 -h, --help             Display this help text and exit
 -q, --quiet            Less verbose output
 -s, --string KEYWORD   Only display the value of the given DMI string
 -t, --type TYPE        Only display the entries of given type
 -u, --dump             Do not decode the entries
 -V, --version          Display the version and exit

Let's see the option: -t.

# dmidecode -t -h
Invalid type keyword: -h
Valid type keywords are:
  bios
  system
  baseboard
  chassis
  processor
  memory
  cache
  connector
  slot

Now let's show you some infos about my old processor.

# dmidecode -t processor
# dmidecode 2.9
SMBIOS 2.3 present.

Handle 0x0004, DMI type 4, 32 bytes
Processor Information
 Socket Designation: SOCKET A
 Type: Central Processor
 Family: Other
 Manufacturer: AuthenticAMD
 ID: 62 06 00 00 FF FB 83 03
 Signature: Family 6, Model 6, Stepping 2
 Flags:
  FPU (Floating-point unit on-chip)
  VME (Virtual mode extension)
  DE (Debugging extension)
  PSE (Page size extension)
  TSC (Time stamp counter)
  MSR (Model specific registers)
  PAE (Physical address extension)
  MCE (Machine check exception)
  CX8 (CMPXCHG8 instruction supported)
  APIC (On-chip APIC hardware supported)
  SEP (Fast system call)
  MTRR (Memory type range registers)
  PGE (Page global enable)
  MCA (Machine check architecture)
  CMOV (Conditional move instruction supported)
  PAT (Page attribute table)
  PSE-36 (36-bit page size extension)
  MMX (MMX technology supported)
  FXSR (Fast floating-point save and restore)
  SSE (Streaming SIMD extensions)
 Version: AMD Athlon(TM) MP 1700+
 Voltage: 1.7 V
 External Clock: 133 MHz
 Max Speed: 2250 MHz
 Current Speed: 1466 MHz
 Status: Populated, Enabled
 Upgrade: Other
 L1 Cache Handle: 0x0009
 L2 Cache Handle: 0x000A
 L3 Cache Handle: Not Provided

Also you can use this format to read infos.

# dmidecode --type 0 --type 13 

The numbers tell what to read, see:

bios
system  1, 12, 15, 23, 32
baseboard  2, 10, 41
chassis  3
processor  4
memory  5, 6, 16, 17
cache  7
connector  8
slot  9

Sunday, January 6, 2013

Deadlock make with Unity - Linux 32 and 64.

Another game for Linux users: Deadlock.
Also, the Windows and OSX users can play this game using the web browser with the Unity plugin.
Recommended:

- Intel Core-2-Quad 2.4GHz or similar
- 2 Go Ram
- DX9 3D video card such as Nvidia GTX280 or Radeon HD5850 or newer.
You need to have the GLIBCXX_3.4.11 under Linux OS.
Deadlock website

Wednesday, January 2, 2013

Vulnerability? google paypal facebook and internal ip


Do you have any idea about an Internal IP Address or a Private IP Address that too assigned for Multinational Companies? Yeah, today we are gonna discuss about Internal IP or Private IP address Disclosure.
Disclosure of an Internal IP like 192.168.*.* or 172.16.*.* , can really Impact? Most security researchers call it as "bull shit" vulnerability. But when it comes to impact calculation even if the server is behind a firewall or NAT, an attacker can see internal IP of the remote host and this may be used to further attacks.
Read more here.

Linux - Fedora and Android make read-only file system.

I don't know what is the problem with Linux - Fedora and Android OS.
After I put my USB cable seam Fedora make from write disk to read-only.
Maybe the Android when scan the device set to read-only.
So you can get some error like this when you use the chown command:
chown: changing ownership of ...: Read-only file system
That can be one big problem when you want to copy files on your tablet.
I found a solution, just use remount.
# mount -o rw,remount /media/disk
If you want to make read-only, use:
# mount -o ro,remount /media/disk
That will solve this issue.