Thursday, January 8, 2009

Installing Linux on Playstation 3 - Part 2



This video is courtesy ps3jp911.

This video shows you how to install Linux on your Playstation 3.

Wi-Foo: The Secrets of Wireless Hacking

Installing Linux on Playstation 3 - Part 1



This video is courtesy ps3jp911.

This video shows you how to install Linux on your Playstation 3.

Wi-Foo: The Secrets of Wireless Hacking

Wednesday, January 7, 2009

Linux Filesystem Hierarchy - Part 2



This video is courtesy BinarySignal.

An introduction to the filesystem hierarchy in Linux.

Wi-Foo: The Secrets of Wireless Hacking

Linux Filesystem Hierarchy - Part 1



This video is courtesy BinarySignal.

An introduction to the filesystem hierarchy in Linux.

Wi-Foo: The Secrets of Wireless Hacking

Creating Screencasts in Ubuntu



This video is courtesy BinarySignal.

Wi-Foo: The Secrets of Wireless Hacking

Connecting to IRC in Ubuntu



This video is courtesy BinarySignal.


A quick demo of how to connect to IRC in Ubuntu.

Wi-Foo: The Secrets of Wireless Hacking

Installing Ubuntu from within Windows - using Wubi



This video is courtesy reponzo01.

This video is for anyone wanting to try out Ubuntu without having to worry about partitioning or doing anything to your Windows installation.

This tutorial walks you through installing Ubuntu with Wubi (http://wubi-installer.org/).

Wubi (Windows-based Ubuntu Installer) is an official Windows-based free software installer for Ubuntu.Wubi can also uninstall Ubuntu from within Windows.

Wubi installs Ubuntu as a single file on your harddrive. No partioning required.

And just as easily, you can uninstall Ubuntu using your Windows Control Panel...the Add/Remove Programs thing.

Don't take Wubi for granted. It actually installs the entire Ubuntu operating system...fully functional. You can boot into it like you normally would, watch videos, play games and even do the 3D effects. It's a real installation...but just in one main file.

Wi-Foo: The Secrets of Wireless Hacking

Triple Boot Windows XP,Vista,Ubuntu - Part 4



This video is courtesy reponzo01.

This 30-minute walk-through video tutorial (split into 4 parts) walks you through the partitioning and installation processes of Windows and Ubuntu.

Learn how to correctly configure your harddrive to handle all three operating systems.

Use this tutorial to simply dual boot between Windows XP and Windows Vista. Or between Windows and Ubuntu.

Use this tutorial to learn how to install Ubuntu without needing to reformat or reinstall your current Windows installation.

Why is this tutorial so long? I hate to leave people wondering "why...". I like to explain everything I do and why I do it. Only this way are people more knowledgeable about what they are doing!

Good luck in your booting endeavours!

This tutorial was done on the following system configuration:

Intel Core 2 Duo 2.40GHz
Intel DG965WH Media Motherboard
ATI Radeon X550 Video Card
2GB PC6400 DDR2 RAM
8X Dual Layer DVD Burner
80GB 7200 IDE Maxtor Harddrive
17" Polyview LCD Monitor
480W Power Supply

Wi-Foo: The Secrets of Wireless Hacking

Triple Boot Windows XP,Vista,Ubuntu - Part 3



This video is courtesy reponzo01.

This 30-minute walk-through video tutorial (split into 4 parts) walks you through the partitioning and installation processes of Windows and Ubuntu.

Learn how to correctly configure your harddrive to handle all three operating systems.

Use this tutorial to simply dual boot between Windows XP and Windows Vista. Or between Windows and Ubuntu.

Use this tutorial to learn how to install Ubuntu without needing to reformat or reinstall your current Windows installation.

Why is this tutorial so long? I hate to leave people wondering "why...". I like to explain everything I do and why I do it. Only this way are people more knowledgeable about what they are doing!

Good luck in your booting endeavours!

This tutorial was done on the following system configuration:

Intel Core 2 Duo 2.40GHz
Intel DG965WH Media Motherboard
ATI Radeon X550 Video Card
2GB PC6400 DDR2 RAM
8X Dual Layer DVD Burner
80GB 7200 IDE Maxtor Harddrive
17" Polyview LCD Monitor
480W Power Supply

Wi-Foo: The Secrets of Wireless Hacking

Triple Boot Windows XP,Vista,Ubuntu - Part 2



This video is courtesy reponzo01.

This 30-minute walk-through video tutorial (split into 4 parts) walks you through the partitioning and installation processes of Windows and Ubuntu.

Learn how to correctly configure your harddrive to handle all three operating systems.

Use this tutorial to simply dual boot between Windows XP and Windows Vista. Or between Windows and Ubuntu.

Use this tutorial to learn how to install Ubuntu without needing to reformat or reinstall your current Windows installation.

Why is this tutorial so long? I hate to leave people wondering "why...". I like to explain everything I do and why I do it. Only this way are people more knowledgeable about what they are doing!

Good luck in your booting endeavours!

This tutorial was done on the following system configuration:

Intel Core 2 Duo 2.40GHz
Intel DG965WH Media Motherboard
ATI Radeon X550 Video Card
2GB PC6400 DDR2 RAM
8X Dual Layer DVD Burner
80GB 7200 IDE Maxtor Harddrive
17" Polyview LCD Monitor
480W Power Supply

Wi-Foo: The Secrets of Wireless Hacking

Triple Boot Windows XP,Vista,Ubuntu - Part 1



This video is courtesy reponzo01.

This 30-minute walk-through video tutorial (split into 4 parts) walks you through the partitioning and installation processes of Windows(XP and Vista)and Ubuntu.

Learn how to correctly configure your harddrive to handle all three operating systems.

Use this tutorial to simply dual boot between Windows XP and Windows Vista. Or between Windows and Ubuntu.

Use this tutorial to learn how to install Ubuntu without needing to reformat or reinstall your current Windows installation.

Why is this tutorial so long? I hate to leave people wondering "why...". I like to explain everything I do and why I do it. Only this way are people more knowledgeable about what they are doing!

Good luck in your booting endeavours!

This tutorial was done on the following system configuration:

Intel Core 2 Duo 2.40GHz
Intel DG965WH Media Motherboard
ATI Radeon X550 Video Card
2GB PC6400 DDR2 RAM
8X Dual Layer DVD Burner
80GB 7200 IDE Maxtor Harddrive
17" Polyview LCD Monitor
480W Power Supply

Wi-Foo: The Secrets of Wireless Hacking

Tuesday, January 6, 2009

Remote Application Deployment with NX



This video is courtesy emiemi2.

Virtual Network Computing (VNC) is a useful tool for accessing and controlling remote machines, but its responsiveness leaves much to be desired -- especially when you're accessing remote machines via a slow network connection.

NX is a new technology that allows one to run remote X11 sessions across slow or low-bandwidth network connections.It provides near local speed application responsiveness over high latency, low bandwidth links.

NX compresses the X11 data to minimize the amount of data transmitted. NX also makes extensive use of caching, to make the session as responsive as possible.For example, if a menu is opened, the first time it will take a few seconds, but every subsequent time the menu is opened,it will appear almost instantly.

This video is an introduction to NX - a technology that makes remote applications fly over internet.

Wi-Foo: The Secrets of Wireless Hacking

GSPCA Drivers for Webcams



This video is courtesy emiemi2.

Webcams are notorious for their lack of support under Linux. But thanks to GSPCA, many webcams now have functional V4L drivers. This tutorial covers the building, installation, and configuration of the GSPCA drivers, including how to adjust color balance and brightness directly at the kernel module level.

Wi-Foo: The Secrets of Wireless Hacking

Movie editing with FFmpeg



This video is courtesy emiemi2.

Non-linear video editing tools are great, but they're not always the best tool for the job. This is where a powerful tool like FFmpeg becomes useful.

FFmpeg is a computer program that can record, convert and stream digital audio and video in numerous formats.FFmpeg is a command line tool that is composed of a collection of free software / open source libraries. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Apple Inc. Mac OS X, Microsoft Windows and AmigaOS.

This tutorial covers the basics of transcoding video, as well as more advanced tricks like creating animations, screen captures, and slow motion effects.

Wi-Foo: The Secrets of Wireless Hacking

PGP - Part 1



This video is courtesy emiemi2.

Pretty Good Privacy (PGP) is a computer program that provides cryptographic privacy and authentication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications.

The Free Software Foundation has developed its own OpenPGP-compliant program called GNU Privacy Guard (abbreviated GnuPG or GPG). GnuPG is freely available together with all source code under the GNU General Public License (GPL)

This tutorial shows how you can use GnuPG to secure and verify data on your Linux box.

Wi-Foo: The Secrets of Wireless Hacking

PGP - Part 1



This video is courtesy emiemi2.

Pretty Good Privacy (PGP) is a computer program that provides cryptographic privacy and authentication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications.

The Free Software Foundation has developed its own OpenPGP-compliant program called GNU Privacy Guard (abbreviated GnuPG or GPG). GnuPG is freely available together with all source code under the GNU General Public License (GPL)

This tutorial shows how you can use GnuPG to secure and verify data on your Linux box.

Wi-Foo: The Secrets of Wireless Hacking

Anonymous browsing with Tor part 2



This video is courtesy emiemi2.

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Tor works by routing a user's Internet connection through a long and wholly undocumented and unlogged list of participating hosts. Theoretically, it is impossible to trace a connection back to its origin through this system. With the lack of logging, the only practical way is to monitor participating hosts and try and figure out who is doing what. The result is that anyone who uses Tor is anonymous to anyone whose services he is using. This provides the Tor user the freedom to privacy, and complete freedom from being identified.

The first part is simply about what Tor is and how it works. The second part contains step-by-step instructions for installing Tor and Privoxy on your GNU/Linux box.

Linux Shells by Example

Anonymous browsing with Tor part 1


This video is courtesy emiemi2.

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Tor works by routing a user's Internet connection through a long and wholly undocumented and unlogged list of participating hosts. Theoretically, it is impossible to trace a connection back to its origin through this system. With the lack of logging, the only practical way is to monitor participating hosts and try and figure out who is doing what. The result is that anyone who uses Tor is anonymous to anyone whose services he is using. This provides the Tor user the freedom to privacy, and complete freedom from being identified.

The first part is simply about what Tor is and how it works. The second part contains step-by-step instructions for installing Tor and Privoxy on your GNU/Linux box.

UNIX Shells by Example

Remote Login using VNC/SSH



This video is courtesy emiemi2.

VNC stands for Virtual Network Computing. It is a remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install special software.

A very common application of VNC is in remote system administration, where it is used to allow administrators to take control of employee machines to diagnose and fix problems, or to access and administer server machines without making a trip to the console.

VNC is also widely used in educational contexts, for example to allow a distributed group of students simultaneously to view a computer screen being manipulated by an instructor, or to allow the instructor to take control of the students' computers to provide assistance.

The VNC server uses SSH(Secure Shell - a network protocol that allows data to be exchanged using a secure channel between two networked devices.)

This video shows how to install and configure a VNC server.

Perl by Example

NDISwrapper Installation




This video is courtesy emiemi2.

Native drivers for Unix and Linux are not available for many wireless network adapters, as manufacturers supply neither drivers nor the information required to write them.NDISwrapper is a free software driver wrapper that enables the use of Microsoft Windows drivers for wireless network devices (cards, USB modems, and routers), on Unix-like operating systems, for devices sharing the same architecture only, namely either x86 or x86-64. NDISwrapper works by implementing the Windows kernel and NDIS APIs, and dynamically linking the driver to this implementation.

This video illustrates the installation and use of NDISwrapper.

Linux Shells by Example