Pages

Tuesday 20 December 2011

LINUX ?? How to

For My Friends Request , i my self created this tutorial.,
do not have too much to say, we quickly began.

1.)Arch

Many people said it is for advanced linux and i must said too, because it does :
This document will guide you through the process of installing Arch Linux: a simple, lightweight GNU/Linux distribution targeted at competent users. This guide is aimed at new Arch users, but strives to serve as a strong reference and informative base for all.
download tutorial from this places.

2.) Debian

This is what i use and the great ones in my opinions :
so, check this out :
download from this place :

Tutorial installation download from this sites :
you can burn debian iso on usb flashdisk using this command :


# dd if=debian-6.0.3-i386-netinst.iso of=/dev/sdb
or
for image file using :
ImageWriter
 
3.) Ubuntu
You Cann Download stuff from here.
and Full Complete Tutorial Intalling From Here.
May you nedd To Do Something after that. please download at this.

Saturday 17 December 2011

Disable ipv6 on Debian HOW TO

I’ve recently installed a new LDAP server on Debian Lenny and I wanted to disable IPv6 as it is unnecessary for me in this moment. With netstat I checked the listening processes:
netstat -tunlp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 2226/slapd
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 2215/sshd
tcp6 0 0 :::389 :::* LISTEN 2226/slapd
tcp6 0 0 :::22 :::* LISTEN 2215/sshd

and lsmod showed something like this:
Module Size Used by
ipv6 235364 12
...

So, to disable IPv6 I changed /etc/modprobe.d/aliases:
...
# alias net-pf-10 ipv6
# Disable ipv6
alias net-pf-10 off
alias ipv6 off
...




put AddressFamily inet into /etc/ssh/ssh_config - restart ssh
in /etc/modprobe.d/blacklist.conf setting blacklist ipv6
 
I also disabled these lines in /etc/hosts to avoid confusions:
...
## The following lines are desirable for IPv6 capable hosts
#::1 localhost ip6-localhost ip6-loopback
#fe00::0 ip6-localnet
#ff00::0 ip6-mcastprefix
#ff02::1 ip6-allnodes
#ff02::2 ip6-allrouters
#ff02::3 ip6-allhosts


disabled these lines in /etc/avahi_daemon.conf too :
...
/etc/avahi/avahi-daemon.conf -> say use-ipv6=no

BIND. Ensure listen-on-v6 { none; }; in /etc/bind/named.conf.options. Restart bind9.


APACHE2. Ensure Listen 0.0.0.0:80 in /etc/apache2/ports.conf file. Restart apache2.


Just add this option to your kernel boot line:
ipv6.disable=1 (Press e to edit at the grub boot screen ...)

NTP. Ensure -4 option is set in /etc/default/ntp (e.g. NTPD_OPTS='-4 -g'). Restart ntp.

If you like that, you can put this in /etc/default/grub:

GRUB_CMDLINE_LINUX="ipv6.disable=1"

and then run update-grub

The next time the system boots it will have ipv6 disabled. Let verify it with:
netstat -tunlp
Here is a sample output:
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address     Foreign Address   State       PID/Program name
tcp        0      0 192.168.10.2:53   0.0.0.0:*         LISTEN      895/named       
tcp        0      0 127.0.0.1:53      0.0.0.0:*         LISTEN      895/named       
tcp        0      0 0.0.0.0:22        0.0.0.0:*         LISTEN      734/sshd        
tcp        0      0 127.0.0.1:953     0.0.0.0:*         LISTEN      895/named       
udp        0      0 192.168.10.2:53   0.0.0.0:*                     895/named       
udp        0      0 127.0.0.1:53      0.0.0.0:*                                     




Finally I restarted the server.
shutdown -r now
lsmod|grep ipv6
...

Thursday 8 December 2011

Wireless on Debian HOW TO

Broadcom BCM4311, BCM4312, BCM4313, BCM4321, BCM4322, BCM43224, BCM43225, BCM43227, BCM43228 devices (wl) on Debian

    The proprietary Broadcom wl driver (aka broadcom-sta) provides support for some Broadcom-based PCI hardware. It includes a binary-only component targeted for the x86 or x86-64 architecture. Supported devices are listed at the end of this page.
     The BCM4313, BCM43224 and BCM43225 chipsets are alternatively supported by the brcm80211 driver.

Instalation :

Wheezy

1.Add a "non-free" component to /etc/apt/sources.list, for example:
# Debian Wheezy/7.0 testing
deb http://ftp.us.debian.org/debian squeeze main non-free contib
deb-src http://ftp.us.debian.org/debian squeeze main non-free contib

2.Update the list of available packages. Install the Module-Assistant and Wireless-Tools package.
              # aptitude update
          # aptitude install module-assistant wireless-tools
 
3.Build and install a broadcom-sta-modules-* package for your system, using Module-Assistant: 
          # m-a a-i broadcom-sta
 
if something wrong with your installation, just install Realtek Firmware :
# aptitude install firmware-realtek
 
4.Blacklist the brcm80211 module, to prevent it conflicting for support of BCM4313, BCM43224 and BCM43225 devices:
# echo blacklist brcm80211 >> /etc/modprobe.d/broadcom-sta-common.conf
 
5.Rebuildyour initial ramdisk, to blacklist modules defined at /etc/modprobe.d/broadcom-sta-common.conf within initramfs:  
# update-initramfs -u -k $(uname -r)
 
6.Unloaad conflicting modules:

# modprobe -r b44 b43 b43legacy ssb brcm80211
 
7.Load the wl module:
# modprobe wl
 
8.Verify your device has an available interface:  
# iwconfig
 
9.Reebot your System n you will see wifi confirmation that your connection can estabilished show on Network Manager 
#shutdown -r now

Module Assistant on Debian How To

Module Assistant on Debian

module-assistant (often abbreviated as m-a) can be used in command line or in interactive mode :














To keep it simple, we run all the commands as root,
so open a terminal as root

in Gnome Application menu/Accessories/Root Terminal.
or KDE menu/System/More Applications/Terminal Program - Super User Mode.

First we need to install module-assistant (you can re-run that command if you aren't sure).
apt-get install module-assistant

Then we get module-assistant to download the headers corresponding to the current kernel, and other 'build-essential' tools... simply run :
 
m-a prepare














Update list of module :

      m-a update

INTERACTIVE MODE

     If you don't like typing commands, you can run module-assistant in interactive mode. simply type : 
 
m-a
 
     This will take you to a menu with the options: Overview, Update, Prepare, Select and Exit. Prepare will configure and install any packages you need in order to compile kernel modules (e.g. kernel headers, gcc, etc). The Select menu takes you to a screen where you can select which modules you want to compile.
m-a -t list | grep -E '^[^ ].*\(' | cut -d " " -f 1 | sort
If you want the package description, use:
for x in $( m-a -t list | grep -E '^[^ ]\
.*(' | cut -d " " -f 1 | sort ) ;\
do  echo Package: $x ; (apt-cache show $x |\
grep -E '^(Description|Package| )' ) \
2>&1  ; echo  ; done | uniq  > /tmp/m-a

Monday 5 December 2011

IPTABLES on Debian ?? HOW TO

Installing IPTABLES on Debian ::

install required component, all done with one command :

aptitude update && aptitude -u full-upgrade && aptitude install iptables && aptitude clean

or u can check the cache that the programs installed correctly on your machine :

                 dpkg -l iptables

n u will see the screenshot like this :
and seewhere is the places that already installed :
if you cannot see that, then it done with :

                 apt-get update && apt-get install iptables

now, we need to create test rules.,

                 nano /etc/iptables.angel.rules

you can downloads my rules from this site

store them :

                   iptables-restore < /etc/iptables.angel.rules

and :           iptables -L

if you satisfied with that, now we need to save them :

                    iptables-save > /etc/iptables.devil.rules

and init the scripts on network interfaces 

                     nano /etc/network/if-pre-up.d/iptables

inside if.pre.up file you create, insert :
  #!/bin/bash
  /sbin/iptables-restore < /etc/iptables.devil.rules

and now we make it exetutable

                      chmod +x /etc/network/if-pre-up.d/iptables

we must add too the scripts on network configurations :

                      nano /etc/network/interfaces

and insert : "pre-up iptables-restore < /etc/iptables.devil.rules"

after two files, look at screenshot :

done.!!