Installing And Securing Linux Mint 17, And Installing Adobe Reader

I was installing Linux Mint 17 for a virtual machine on my PC, and I decided it was a good idea to record the whole process.  Furthermore, I also installed Adobe Reader manually on Linux Mint 17, and so by watching this video you will also know how to do this.  If you’re trying to do what I’ve done within this video, make sure you do not deny shell access and lock the password for the regular user or users that you want to use, because if doing so you will not be able to log into the system.  Of course, if you follow my video closely, deny shell access means editing the /etc/passwd file, and lock password means editing the /etc/shadow file by executing the command line passwd -l [username].

Moreover, if you’re trying to edit the /etc/fstab file as I’d done in the video, make sure you make a copy of the original /etc/fstab file first before editing the original /etc/fstab file.  /etc/fstab file is very important, because it tells the system how to load up the devices such as hard drive, and screwing this file up will prevent your system from loading/booting.  Having the original copy of /etc/fstab file will allow you to restore it in the case that you screw up the original /etc/fstab file.

If you are going to pay close attention to my part of editing /etc/fstab file, you will notice that I’d made error on adding rw option to the /tmp and /dev/shm devices, but you will also notice that I had correct the errors in the video few seconds later.  Basically, rw option is correct, but in the video, before I made the option as rw I had the option as wr.  By having the option as wr, the system won’t recognize this option.  So instead of wr, it should be rw.

rw is a permission option.  By adding rw option to /tmp and /dev/shm, the /tmp and /dev/shm devices won’t allow anything to execute commands in these devices, but these devices only allow whatever to read and write to them.  Anyhow, you can check out this video right after the break.  Enjoy!!!

About these ads

Allowing Specific IP Addresses To Access QNAP’s Web Apps Using .htaccess File And Preventing All Other IP Addresses From Meddling With QNAP’s Web Apps

If you’re using QNAP as a NAS, you probably know that QNAP allows you to install web apps onto QNAP server.  Web apps are cool, but these web apps can be a security nightmare.  This is why you often have to upgrade these web apps.  One example of a popular web app that you can install on QNAP server is WordPress.  Anyhow, whether a web app might carry a computer vulnerability or not, you want to secure your QNAP’s web apps with .htaccess file.  By adding .htaccess file to /share/Web directory in QNAP server, you add one more hoop (security layer) for hackers to have dealt with.  In the video right after the break, I’m going to show you how to add a very simple .htaccess file to QNAP’s /share/Web directory to thwart a possible malicious user which might be able to bypass the router’s firewall and hack your QNAP server using web apps’ vulnerabilities.  Enjoy!!!

Watch Dogs May 27th Count Down, New Trailer

May 27th count down to Watch Dogs frenzy, because gamers will be rocking away as Watch Dogs heroes.  Get ready y’all and giddy up your excitement, because this game will look gorgeous on PC.  Nonetheless, this game will look pretty sick still on consoles, but not as slick as PC (i.e., with good graphic card).  Check out a new Watch Dogs’ trailer right after the break.  Enjoy!!!

Virtual Machine Is A Very Beautiful Thing

Virtual machine is a very beautiful thing, but the majority computer users might be ignorant of it.  How beautiful virtual machine is?  Let me just say this right off the bat, virtual machine is there to piss off evil doers!  It’s so beautiful that you can basically download computer viruses onto a virtual machine without the fear of these nasty things go around and infect a physical machine.  Of course, with just about anything, if one is so inept in computer things, one might be able to allow the computer viruses and what not to infect the whole Intranet (LAN) network even one is using a virtual machine.  Nonetheless, one has to be very inept to do so.  For an example, allowing virtual machine to be on the same subnet with a physical machine without its own protection measures (i.e., antivirus, firewall and what not) — thus, showing just another door to the evil doers.  The evil doers can use a compromised active virtual machine as a gateway for their Intranet (LAN) hacking activities.  The beautiful thing is that if one is smart enough to secure a virtual machine, one basically has a hardened sandbox which can easily be used as a platform for browsing the dangerous web at will.  Perhaps, even downloading computer viruses and what not for testing purposes such as testing to see the effectiveness of an antivirus program.  Professional antivirus software reviewers are mostly using a hardened virtual machine to test to see how effective an antivirus program can be.

Virtual machine is so beautiful that it is very perverted.  How?  I’ve heard how many people have seen their computers got infected with computer viruses, worms, trojans, and what not just because they have been browsing dangerous pornographic websites.  What’s worse is that these folks do not use readily available simple measures such as Javascript blocker software/plugins (e.g., ScriptSafe, Noscript, etc…).  For an example, I’d talked to one person who complained that he would format his computer often, because he caught too many computer viruses.  This very person would like to say that he’s an advance computer user.  Nonetheless, he’d told me that he befuddled how his Windows machine kept on catching a flu (i.e., sarcasm for computer viruses).  Furthermore, he told me that it was too easy for his computer to catch a flu whenever he got perverted.  Obviously, it meant that he browsed pornographic websites and his computer caught a flu.  In the end, he told me his assumption that there’s no way a PC can be OK if one is browsing a pornographic website.  I told him flat out that he’s dead wrong.  The simplest answer I could give to him at that point was that just make sure his physical machine is clean (i.e., not being infected with any computer virus) and then install a virtual machine.

Virtual machine is beautiful since it’s allowing us to have a secure sandbox to play around.  Of course, it’s a bit more complicated than just a secure sandbox, because a virtual machine can run just about all major operating systems.  Furthermore, a virtual machine can be a quick testing ground for security software and what not.  If a virtual machine user doesn’t like what he or she sees, he or she can simply go through few clicks to delete a virtual machine and make a new one.  My suggestion for whoever that does browse the web dangerously is to install a virtual machine on a clean physical machine, install Linux such as Ubuntu, install firewall and ClamAV onto Ubuntu, harden up Ubuntu (virtual machine) as if it’s running on a real machine, and then browse the dangerous web.

Virtual machine is a strange beast, because it can do certain things exceptionally well and efficient, but it can be totally useless at times.  For an example, playing games on a virtual machine is a no no.  First of all, a virtual machine does not use a dedicated graphic card, because it’s emulating one.  Even if a virtual machine environment allows a physical computer to share dedicated graphic resources, I doubt a virtual machine could really share dedicated graphic resources efficiently.  Playing intensive graphic resource demanding games would be almost impossible.  Nonetheless, if one uses a virtual machine for applications such as virtualizing a NAS (i.e., Network Attached Storage server), it can become very interesting.  Imagining this further, how interesting it is for one to be able to clone a virtualized NAS easily, right?  Virtual machine platforms such as VirtualBox is certainly carrying the option of allowing a computer user to clone a virtual machine through few clicks of a mouse.

In summary, virtual machine is very beautiful, but the degrees of beautifulness are scaling accordingly according to whoever is using it.  One can simply use a virtual machine to test out how effective an antivirus software can be, but one can also use it to run a virtualized NAS.  If one is horny, one can simply browse the dangerous pornographic websites with a virtual machine.  Basically, virtual machine is quite useful and secure if one knows how to use it as a sandbox.

 

How To Use CrashPlan To Backup Data To QNAP And Backup QNAP’s Data To CrashPlan Central

Normally, CrashPlan won’t allow you to backup computer data to network share/drive.  Nonetheless, you can get around this if you’re using iSCSI.  In the video right after the break, I show you how to create iSCSI with QNAP (Network Attached Storage) server,  connect to QNAP’s iSCSI target, and format iSCSI share as NTFS share for Windows 7/8.  This way, you can use CrashPlan software (free or paid) to backup data from a local computer to QNAP’s iSCSI share, and you can go one step further by backing up the data of iSCSI share (on QNAP or whatever NAS that may be) to CrashPlan Central (cloud service for hosting backup data).  Enjoy!!!

Follow

Get every new post delivered to your Inbox.

Join 920 other followers