Monthly Archives: October 2009

How To Secure MySQL Database Server From Anonymous Logins


Secure MySQL Database Server From Anonymous Logins

MySQL is one of the most popular database server in the world. It’s high performance and cost free attract much more people. MySQL database servers are a common location for attackers. So it is important to check the security setting of each MySQL servers.

Blocking anonymous access and securing MySQL databases with authorized users are more important. This help us to increase the security level of MySQL server and reduce the data loss.

In normal condition fresh installation of MySQL allows anonymous access to the MySQL database server. To increase the security of MySQL server we need to set MySQL root password,block anonymous and network access.


Steps for preventing attacks on MySQL Server.

Set up MySQL root access password.

Open terminal and enter the following commands,

mysqladmin -u root password secretpassword

or

Login into MySQL

# mysql
mysql> use mysql;
mysql> UPDATE user SET password = password('secretpassword') WHERE user = 'root';


Disabling Anonymous Users

# mysql -u root -p mysql

Enter Password: secretpassword

mysql> DELETE FROM user WHERE user = '';
mysql> FLUSH PRIVILEGES;


Disabling Networking in MySQL

Add the following lines into “/etc/my.cnf” file

[mysqld]

# Prevent network access to MySQL.

skip-networking

Cheers!

Melbin Mathew

www.talk2melbin.com

Difference Between Virus, Trojan, Worms, Spyware, Adware And Malware

malware

Virus, Trojan, Worms, Spyware, Adware And Malware

All these categories operate without the knowledge of the system owner. Their intention is to destroy and steal the system data. Some times the latest Anitvirus software will not be able to detect and resolve the situation. The whole machine working gets affected. Loss of time and data are much huge in such situations.

Virus (Vital Information Resources Under Siege)

Virus is a program written smartly to replicate on the network and destroy the host computers. If any machine is affected with virus, removal of the virus will be a head ache for us. It would spread through emails, pictures, file sharing etc.

Trojan

Trojan’s are the programs which used to gain access to the host computer. The trojan infected machine open path to the attackers to stole the data. Backdoor of the affected systems are used for attacks like DDOS attacks etc..

Worms

The basic difference between a computer virus and a computer worm is that a virus requires a program(host program) to run and replicate where as a computer worm can spread without a host program. But analysis shows that modern computer worms uses files to hide inside.

In short computer worm is a self replicating program which uses a network to send copies of itself to all the hosts in the network even without user intervention.

Spyware

Spyware is a malware that is secretly installed on the users computer and collects information about the users without their knowledge. A typical example is keylogger installed on the computers to secretly monitor the users.

Other than monitoring the users computing, spyware programs collect various information such as Internet surfing habits, sites visted and may ven interfer with user control of the computer. They may install additional software’s secretly and may redirect the webpages.

Adware

Adware are the programs which bring much ads to our computer. If the infect machine connected to Internet, at sudden so many POP-UP’s will be opening with ads. By closing one ads window another one will be opening. They consume much bandwidth.

Malware

Malwares are the program with malicious intention. They are the general term used for bad-software . Viruses, Trojans, Spams, Adware, Spyware etc. fall under the malware category. Their intention is to create backdoor entry to the attackers, steal data and prepare the host computer for attacking another systems.

Cheers!

Melbin Mathew

www.talk2melbin.com

How To Make Fake Funny Virus With Examples

FunnyVirus

How To Make Fake Funny Virus

We are all aware of computer virus’s. They do much harm to our computers. There are also some fake virus that does not make any harm to our systems.

You can play prank on others using fake, funny virus. Here are some examples for creating funny virus.

1. Fake funny virus – Open window virus

  • Open a notepad and add the following lines,

START

START

START

START

START

START

START

START

START

  • save the file as funnyvirus.bat. Double click on the file to execute.

Output:

Multiple command prompt windows will open.

2. Fake funny virus – Error generation virus

  • Open a notepad and add the following lines,

do

x= msgbox("Pc System Crashed",16, "Warning")

x= msgbox("Shutting Down",16, "Warning")

x= msgbox("Virus Found",16, "Warning")

x= msgbox("Oops System Crashed",16, "Warning")

loop

  • save the file as funnyvirus.vbs. Double click on the file to execute.

Output:

Multiple error messages will pop up.

  • To stop the application use Task Manager and end the program.

3. Fake funny virus – Open window virus

  • Open a notepad and add the following lines,

@echo off

copy 100% funnyvirus.bat

start funnyvirus.bat

  • save the file as funnyvirus.bat

Output:

Apx around 218 multiple command prompt windows will open.

  • Close the group to exit.

4. Fake funny virus – Error generation virus

  • Open a notepad and add the following lines,

test1= msgbox("Please contact Administrator",16, "Warning")

test2= msgbox("Please contact Administrator",16, "Warning")

test3= msgbox("Please contact Administrator",16, "Warning")

test4= msgbox("Please contact Administrator",16, "Warning")

test5= msgbox("Please contact Administrator",16, "Warning")

test6= msgbox("Please contact Administrator",16, "Warning")

test7= msgbox("Please contact Administrator",16, "Warning")

  • save the file as funnyvirus.vbs

Output:

Multiple error messages will pop up.

5. Fake funny virus – Shutdown virus

  • Open a notepad and add the following lines,

shutdown -s -t 300 -c "Virus Infection Detected System Going to Shutdown"

  • save the file as funnyvirus.bat

Ouput:

System shutdown count down starts

  • To exit go to -> run -> type “shutdown -a” to abort the shutdown.

6. Fake funny virus – Talking virus

  • Open a notepad and add the following lines,

StrText="Caution Virus Infection Detected, System Going To Crash"

set Objvoice=CreateObject("SAPI.SpVoice")

Objvoice.Speak StrText

  • save it as funnyvirus.vbs file and execute.

Output:

We can hear the typed text message “Caution Virus Infection Detected, System Going To Crash” through speaker.

Cheers!

Melbin Mathew

www.talk2melbin.com

Attack History Of Computer Viruses

virus

Computer Viruses in History

Computer viruses have a relatively short history by the damages caused by some of the most dangerous viruses pushed cyber-experts to open a chapter that includes a huge database on computer viruses and the cost of damages caused along with companies, government and universities highly affected by malware.

Here are some of the most dangerous computer viruses in history:

Jerusalem – 1987

This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got “acquainted” with it – the Jerusalem University.

Along with a number of other computer viruses, including “Cascade”, “Stoned”, “Vienna” the Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.

Morris (a.k.a. Internet Worm) – November 1988

This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.

To be able to spread the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. There were a number of other interesting ideas used by the virus – for example it could pick user passwords.

Solar Sunrise – 1998

A decade later the situation didn’t change, it might have gotten even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computers systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa – 1999

For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after it overloaded servers the virus led to unpredictable problems. For the first time it spread in the Usenet discussion group alt.sex. Melissa was hidden within a file called “List.DiC”, which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.

Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest represented a collaboration of FBI, New Jersey State Police and Monmouth Internet.

Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 or Outlook 98.

I Love You – May 2000

Using a similar method as the Melissa, the computer virus dubbed “I Love You” managed to infect millions of computers around the world in just one night. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union’s global Cybercrime Treaty.

The Code Red worm – July 2001

This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT as well as Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at a total of $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

Nimda – 2001

Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having up to 5 different methods of infecting computers systems and duplicating itself.

Downadup – 2009

The latest and most dangerous virus is the “downadup” worm, which was also called “Conficker”. The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft’s operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.

Note Taken From : http://infoniac.com

Still one among us are planning for another attack….

Cheers!
Melbin Mathew
www.talk2melbin.com

Run commands for windows users

Do you use the Run feature in Windows XP?  For most, this feature remains unused (or rarely used).  The main reason most people don’t use the Run feature is because they don’t know the Commands.  So, here is the solution….


To Access…. Run Command
Accessibility Controls access.cpl
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat (if installed) acrobat
Adobe Designer (if installed) acrodist
Adobe Distiller (if installed) acrodist
Adobe ImageReady (if installed) imageready
Adobe Photoshop (if installed) photoshop
Automatic Updates wuaucpl.cpl
Bluetooth Transfer Wizard fsquirt
Calculator calc
Certificate Manager certmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Component Services dcomcnfg
Computer Management compmgmt.msc
Control Panel control
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel (If Installed)* directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Management diskmgmt.msc
Disk Partition Manager diskpart
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox (if installed) firefox
Folders Properties control folders
Fonts control fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
HyperTerminal hypertrm
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwconn1
Internet Explorer iexplore
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel (If Installed) jpicpl32.cpl
Java Control Panel (If Installed) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed) access.cpl
Microsoft Chat winchat
Microsoft Excel (if installed) excel
Microsoft Frontpage (if installed) frontpg
Microsoft Movie Maker moviemk
Microsoft Paint mspaint
Microsoft Powerpoint (if installed) powerpnt
Microsoft Word (if installed) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
Nero (if installed) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager (If Installed) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter (If Installed) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Character Editor eudcedit
Quicktime (If Installed) QuickTime.cpl
Quicktime Player (if installed) quicktimeplayer
Real Player (if installed) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy (XP Prof) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Shuts Down Windows shutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration cliconfg
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility (Scan Immediately) sfc /scannow
System File Checker Utility (Scan Once At Next Boot) sfc /scanonce
System File Checker Utility (Scan On Every Boot) sfc /scanboot
System File Checker Utility (Return to Default Setting) sfc /revert
System File Checker Utility (Purge File Cache) sfc /purgecache
System File Checker Utility (Set Cache Size to size x) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI (if installed) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility (if installed) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msmsgs
Windows Picture Import Wizard (need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Update Launches wupdmgr
Windows Version (to show which version of windows) winver
Windows XP Tour Wizard tourstart
Wordpad write

Cheers!

Melbin Mathew

www.talk2melbin.com

How To Check The User Creation Date And Time On Windows And Linux

How To Check The User Creation Date And Time On Windows And Linux

Finding user creation date on the Operating system is a key fact on security audit. This help us to ensure the validity of the user.


On Windows Operating System user creation date are analyised by checking Event viewers, Profiles creation date and net command.

1. Check on Event viewer. It would be good to enable the audit logs.

2. Profile creation date, help us to know the first login date.

002

*If the user have never login into the Operating System. System will not create a new profile folder.

3. Check the user status using net command.

Run -> cm -> net user nameofuser

001


On Linux Operating System user creation date are analyised by checking home directory creation, messages and auditlog.

1. Check the creation data of user home directory

# ls -ld /home/melbin/

Output

drwx—— 5 melbin melbin 4096 Aug 28 22:07 /home/melbin/

2. Grep messages logs.

cat /var/log/messages | grep melbin cat /var/log/messages.* | grep melbin

3. If system auditd are enabled. Search the logs using grep, aureport, ausearch commands. Daemon auditd collects audit subsystem logs and log them on /var/log/audit/audit.log. SELinux uses the audit subsystem.

* aureport –auth | grep melbin

* ausearch

These are two programs, ausearch and aureport, that provide retrieval capabilities. Ausearch is a grep program in that it can be given certain parameters and it will display any records that match. The aureport program was designed to aid in doing reports via awk, perl, or grep. It can select different kinds of information in the audit logs and present them in either columnar form or rankings. Some of the information it can select includes: logins, users, terminals, host names, executables, file access, avc objects, syscalls, watches, or event types.


cat /var/log/audit/audit.log | grep melbin cat /var/log/audit/audit.* | grep melbin

Cheers!
Melbin Mathew
www.talk2melbin.com

How To Backup And Restore Mozilla FireFox/Flock On Windows And Linux

How To Backup And Restore Mozilla Fire Fox On Windows And Linux

Mozilla Firefox is a commonly used Internet browser. Some time we need keep the backup of Firefox because we don’t need to loose our favorite bookmarks, saved sessions etc.

Conditions like Operating system re installation or up gradation and even hardware failures might cause loss of our favorite bookmarks. Following steps help us to backup and restore Mozilla Firefox.

Mozilla Backup And Restore On On Linux Operating System

Mozilla Firefox profile and contents are saved on the user home directory.

# ls ~/.mozilla

By default Mozilla contents are kept on a hidden folder. It prevent accidentally deletion of the folder.

Backup Mozilla Firefox to the backup location using “cp” command.

# cp -r ~/.mozilla /backuplocation/mozilla-backup


Restore Mozilla Firefox

Close Mozilla Firefox application and copy the backup to user home directory.

# cp -r /backuplocation/mozilla-backup ~/.mozilla

Mozilla Backup And Restore On Windows Operating System

On Windows machine we are able to take backup of Mozilla Firefox using an application called MozBackup

Download MozBackup Application from the url link http://mozbackup.jasnapaka.com/download.php
moz01
Run MozBackup on windows machine

Select backup.
moz02
If multiple profiles are using, we need to select each of them for backup.

Save the profile as .pcv file. The .pcv file have all the backup of Mozilla Firefox.

Run MozBackup and select restore.
moz03

Choose the previously saved .pcv file for restoration.

Cheers!
Melbin Mathew
www.talk2melbin.com

How To Add/Configure Network Printer On Windows PC – Hp LaserJet N/W Series

How To Add/Configure Network Printer On Windows PC

A printer which is connected on a network is called network printer. The printer have assigned with a static ip address. All the communication between the printer and computer are done using this ip addresses.

We cannot able to add all printers to the network. To to add a printer to a network, it must have Ethernet port and it’s functions. Commonly we use print servers to manage and share the printer. Where the printer server is the machine on which the printer driver and software is installed.

Using network printer helps,

* Direct communication between printer and computer.

* It won’t affect the print service if the print server is down.

* Network printer itself provide buffering.

* Faster than print server.

* No need to access share.

* We can directly plug our laptop or computer into the network for printing.

* Guest users are restricted to use our network shares.

Adding HP Laser Jet 1220 series and similar network printers can be done using these steps.

001

Select Printer and Faxes from control panel or start menu.

002

Click on “Add a Printer”

003

Select Local Printer attached to this computer and Uncheck Automatically detect and install my plug and play printer.

004

Create a new port using TCP/IP

005

Press Next to continue

006

Enter network printer ip address. Make sure the printer is turned on

007

Press Finish button.

008

Select printer driver from windows default driver library.

009

If needed change the printer name.

010

Take a test page.

If the machine already have a default printer. Next windows ask for setting this HP printer as default one.

012

Click finish.

Now we are ready to take printouts.

Cheers!

Melbin Mathew

www.talk2melbin.com

Remote SSH Login Without Password, Execute Command Via SSH and Backup Up Data Using Rsync

Remote SSH Login Without Password, Execute Command Via SSH and Backup Data Using Rsync

Secure Shell or SSH is a network protocol that allows encrypted data transfer and password between networks. SSH protocol is commonly used for remote server management. It gives us safe and secure path to work on remote machines.

Each time while we access a remote machine via ssh protocol, we need to manually enter the password. This would be a tough job during the repeated access. More server logins are easier via ssh key pair. This technology doesn’t require password for login. Private and public keys are used for this purpose. It is important to keep your keys secure, otherwise our server get hacked by others.

We use ssh key pair for remote login and execution of commands via ssh.

First check whether SSH keys are present.

# ls ~/.ssh/

If not generate new SSH keys.

# ssh-keygen -t dsa

Output

Generating public/private dsa key pair.

Enter file in which to save the key (/root/.ssh/id_dsa):

Enter passphrase (empty for no passphrase): NewPassword

Enter same passphrase again: NewPassword

Your identification has been saved in /root/.ssh/id_dsa.

Your public key has been saved in /root/.ssh/id_dsa.pub.

The key fingerprint is:

2d:25:2d:39:88:63:3d:97:56:4a:75:af:f9:1e:0c:29 root@jmj.talk2melbin.com

* Generate SSH pair using new password.

* Don’t use the same root password.

Secure SSH folder with permission.

# chmod 755 ~/.ssh/

Copy the generated id_dsa.pub to remote server. Using “ssh-copy-id” is secure than “scp” command.

# ssh-copy-id -i ~/.ssh/id_dsa.pub root@remoteserver

Output

ssh key pair generation

Now try logging into the machine, with “ssh ‘root@remoteserver'”, and check in:

.ssh/authorized_keys

to make sure we haven’t added extra keys that you weren’t expecting.

Login into remote server.

# ssh remote server

Prompt ask for password. Enter the password used during the generation of SSH key.

Output

Enter passphrase for key ‘/root/.ssh/id_dsa':

Security can increase using SSH Agent

SSH Remote Login Without Password.

check the status of identities,

# ssh-add -L

output

The agent has no identities.

Add ssh identities

# ssh-add

output

Enter passphrase for /root/.ssh/id_dsa:

Identity added: /root/.ssh/id_dsa (/root/.ssh/id_dsa)

After adding check the status using,

# ssh-add -L

Output

ssh-dss AAAAB3NzaC1kc3MAAACBALrFcmm ……….= /root/.ssh/id_dsa

Now happily login remote server without password.

# ssh user@remoteserver

Execute Command On Remote Server via SSH

We are able to run commands on remote server without login. Some examples are given below,

# ssh root@remoteserver 'ps -ef | grep apache | grep -v grep | wc -l'

Output

8

ssh root@remoteserver 'top -b -n 1 | head -n 10'

Output

top – 21:29:08 up 53 days, 23:30, 3 users, load average: 0.15, 0.07, 0.01

Tasks: 107 total, 1 running, 106 sleeping, 0 stopped, 0 zombie

Cpu(s): 0.2%us, 0.1%sy, 0.0%ni, 99.0%id, 0.4%wa, 0.1%hi, 0.2%si, 0.0%st

Mem: 4037612k total, 4009164k used, 28448k free, 236620k buffers

Swap: 4096496k total, 144k used, 4096352k free, 3297004k cached

PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND

1 root 15 0 10344 684 572 S 0.0 0.0 0:04.59 init

2 root RT -5 0 0 0 S 0.0 0.0 0:00.38 migration/0

3 root 34 19 0 0 0 S 0.0 0.0 0:02.03 ksoftirqd/0

Small Backup Script Using RSYNC

Script is scheduled on the backup storage machine via crontab.

Ruining the script will help to backup MySQL folder from remote server to another. This keep a backup copy of MySQL root folder of another machine. Logs are generated to view the data transfer between the server with actual date.

#/bin/bash echo "-------------------------------------------------------------------------------------------------" >> /var/BACKUP/secure/log/mysql.log /bin/date >> /var/BACKUP/secure/log/mysql.log rsync -avz -e "ssh -i /root/.ssh/id_dsa" root@remoteserverip:/var/lib/mysql /var/BACKUP/secure/ >> /var/BACKUP/secure/log/mysql.log

root@remoteserverip:/var/lib/mysql ; is remote server from where we took MySQL folder backup and /var/BACKUP/secure/ ; is the backup location to where we store the backup.

Cheers!

Melbin Mathew

www.talk2melbin.com

How To Change Thunderbird Default Font Like Outlook 2007

Change Thunderbird Default Font And Look Like Outlook

Appearance and style on email composition is important. I liked the composition style of Microsoft Outlook 2007 than default composition style of Thunderbird mail client.

Changing the fonts on Thunderbird took like Microsoft outlook 2007 can be accomplished using the following steps,


1. Download Microsoft Outlook Fonts.

Microsoft have newly introduced new fonts for Microsoft Outlook 2007.

* Cambria

* Calibri

* Consolas

Search and download those fonts from ” http://www.fontyukle.com/en/ara.php ”

* Cambria http://www.fontyukle.com/en/ara.php?ara=Cambria&button=Search

* Calibri http://www.fontyukle.com/en/ara.php?ara=Calibri&button=Search

* Consolas http://www.fontyukle.com/en/ara.php?ara=Consolas&button=Search


2. Install the fonts.

On Windows, Go to Control panel -> Fonts and copy all the newly downloaded fonts. You need administrator privileges for installing the new fonts.

On Linux, Open a new window type on the location bar “fonts:///”. This will open up the font folder. Copy all the newly downloaded fonts into the folder.

Once the fonts are copied into the machine close and reopen the applications.


3. Change Thunderbird preference.

Open Thunder Bird -> Edit -> Preferences


a) Click on Display and change the setting,

Select Formating Tab,

Use The Following Colors

* Text Color: Black

* Background Color: White

Plain Text Messages

* Use the following font: Fixed width font

* When displaying quoted plain text messages: Style = Regular, Size = Regular, Color = White

Fonts for: Western

* Proportional: Sans-serif, Size = 15

* Serif: Cambria

* Sans-serif: Calibri

* Monospace: Consolas, Size = 14 (10.5 pt is the default for Monoscape in Outlook 2007)

Allow messages to use other fonts


b) Click on Composition and change the setting,

Select General Tab,

Open Thunder Bird -> Edit -> Preferences -> Select General Tab

HTML

* Font: Variable Width

* Size: Medium

* Colors: Black/White

Send Options

* Send the message in HTML anyway

Try new email composition.

Cheers!

Melbin Mathew

www.talk2melbin.com