Sep 112010
 

Damn vulnerable linuxDamn Vulnerable Linux – The most vulnerable and exploitable operating system ever!

Damn Vulnerable Linux is the most complete training environment for IT security with over 500.000 downloads. It includes all tools you need ready to go. Additionally tons of training material and exercises are included. Damn Vulnerable Linux works fine under Windows, Linux and Mac OSX using any virtual machine such as VMware, Qemu or KVM. You can let it run installed natively on a standard PC or even boot it from USB.

Continue reading »

Flattr this!

Sep 092010
 

3d graphics3D computer graphics software refers to programs used to create 3D computer-generated imagery. This article only covers some of the software used.

3D modelers are used in a wide variety of industries. The medical industry uses them to create detailed models of organs. The movie industry uses them to create and manipulate characters and objects for animated and real-life motion pictures. The video game industry uses them to create assets for video games. The science sector uses them to create highly detailed models of chemical compounds. The architecture industry uses them to create models of proposed buildings and landscapes. The engineering community uses them to design new devices, vehicles and structures as well as a host of other uses. There are typically many stages in the “pipeline” that studios and manufacturers use to create 3D objects for film, games, and production of hard goods and structures.

Let’s see what Linux offers in this area.

Continue reading »

Flattr this!

Sep 072010
 

Twitter tuxToday I want to offer some interesting profiles that I follow on Twitter, I found many useful information following their twittering.

Idea (and many links) come from this post:
http://linuxtoy.org/archives/25-linux-twitterers.html

Linux kernel
KernelTracker: Get the latest version of the Linux kernel.

Linux distributions

Continue reading »

Flattr this!

Sep 062010
 

sshIn this article I want to show some use, not trivial, of ssh, but first:

What is SSH?

From Wikipedia:

Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notablypasswords, in plaintext, rendering them susceptible to packet analysis.The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.

Continue reading »

Flattr this!

Sep 042010
 

Jamin e ardourOften when I suggest Linux as an alternative I hear, yes i like it unfortunate that there is nothing as software for processing digital audio, so I must stay with Windows.

A sufficiently powerful computer with good quality sound cards, can become very suitable for a hobbyist recording studio, as well as an excellent solution for a teaching laboratory, although there are already those who use the programs that we are to speak at semiprofessional. With a little patience and expertise in Linux, you can indeed create a workstation for processing digital audio at no charge for licenses. The Open Source products for this type of work most suitable and popular right now are probably Ardour, Jamin and Rosengarden.
Continue reading »

Flattr this!