Search:

Type: Posts; User: rogeriopvl; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    22
    Views
    2,086

    Poll: Re: what python idle do you use under ubuntu?

    Yes it does, just add the line:


    syntax on

    in your ~/.vimrc and that's it :)
  2. Replies
    22
    Views
    2,086

    Poll: Re: what python idle do you use under ubuntu?

    I would say gedit (with the oblivion theme btw) :)

    You don't need the idle. just open multiple terminal windows and test the scripts with the command "python myscript.py".

    If you wish to use...
  3. Replies
    18
    Views
    1,188

    [ubuntu] Re: Found virus

    If you are running Ubuntu, you have no reason to worry. Those virus were probably found in the windows partition or in some shared folders. Just delete/repair those files.
  4. Replies
    7
    Views
    840

    [all variants] Re: I got owned/hacked

    Check for rootkits (install rkhunter) and check in detail every log. If you were hacked and noticed in time, you might have some trails that the attacker left unclean.
  5. Replies
    7
    Views
    694

    [kubuntu] Re: Hard disk compromised after a hacker?

    I can't see any screenshot. And that doesn't mean anything, if those files on tmp where created by processes running with root privileges it's pretty normal that you can't access them.
  6. Re: what firewalls & antivirus programs are you using?

    none.
  7. Replies
    7
    Views
    694

    [kubuntu] Re: Hard disk compromised after a hacker?

    I'm not completely sure, but I think that you got those files and folders when you where using Windows. And probably you didn't see them in windows because they were hidden.

    So don't worry too...
  8. Replies
    8
    Views
    853

    [ubuntu] Re: Default Keyring

    Then probably you have set a different password for the keyring. Delete the keyring, if you don't rely on it to remember any password.
  9. Thread: grsecurity

    by rogeriopvl
    Replies
    3
    Views
    857

    [ubuntu] Re: grsecurity

    I'm sure that if you don't use your machine as a server, you won't need that software.

    Don't fill in your Ubuntu with unnecessary software, you are only slowing down your system for nothing.
  10. Replies
    7
    Views
    748

    [all variants] Re: Login not working

    If you can, connect a usb keyboard to your laptop and try to login with it...

    Your laptop keyboard might not be linux compatible, although that might sound ridiculous, I've seen that happen.
  11. Replies
    8
    Views
    853

    [ubuntu] Re: Default Keyring

    That probably happens because you have the password to send email stored in the keyring (memorized). The keyring is the place where all you passwords are. Have you tried to insert your Ubuntu user...
  12. [ubuntu] Re: Can I have a user without any passwords?

    Yes you can, but you shouldn't.
  13. Replies
    5
    Views
    967

    [all variants] Re: Untrust worthy friend

    You have tons of different ways to monitor. Like, check the browser history, bash history, set up a keylogger that activates when he starts his session etc..
  14. Replies
    7
    Views
    748

    [all variants] Re: Login not working

    I think that the problem is with your keyboard, have you tried with a different one?
  15. Replies
    20
    Views
    716

    Re: Haskell syntax help?

    Maybe this book helps you out:

    http://book.realworldhaskell.org/read/
  16. [ubuntu] Re: problem with ssh, key spontaneously changes

    I would go for that, it already happened to me.
  17. Replies
    11
    Views
    2,227

    [ubuntu] Re: Firestarter detected hit

    Well, a hit is just a blocked attempt to something. You should not worry about it, only if you see several attempts from one IP address, and even in that case, if you have no services listening for...
  18. Replies
    1
    Views
    386

    [ubuntu] Re: Browsing log based on user id

    Why not instead of finding out their surfing habbits, block the access to those sites with a proxy? And with a proxy you can also log all HTTP traffic (I' not sure, if the username gets logged also).
  19. Replies
    9
    Views
    840

    [all variants] Re: Monitoring computer usage

    Well, I understand your point. But you should give your kids the right to privacy, unless of course you notice something suspicious.
  20. Replies
    1
    Views
    1,488

    [ubuntu] Re: Increase security

    Check this post, has everything you need to know:

    http://ubuntuforums.org/showthread.php?t=765421
  21. Replies
    8
    Views
    7,676

    [other] Re: OpenVPN vs OpenSSH

    In most cases, SSH suits just fine for home computers. VPN is most suited for companies to provide external access to their intranet.
  22. Replies
    9
    Views
    840

    [all variants] Re: Monitoring computer usage

    What do you mean by monitoring email and IM activity? Read every mail and conversation?
  23. Replies
    1
    Views
    4,379

    [ubuntu] Re: Copy folder to root

    you have to use the sudo command, or open nautilus with sudo and copy paste the folder.


    sudo cp -R /path_to_folder_to_copy/ /var/www/

    or


    sudo nautilus
  24. Replies
    5
    Views
    453

    Re: BASH script Security problem?? Help!

    I don't see any error :\
  25. Replies
    7
    Views
    696

    [ubuntu] Re: rkhunter log analysis

    If not, you may add it.
Results 1 to 25 of 103
Page 1 of 5 1 2 3 4