Thursday, March 26, 2015

Setup DHCP or static IP address from command line in Linux

Read full details here: Setup DHCP or static IP address from command line in Linux

Did you ever had trouble with Network Manager and felt that you need to try to setup DHCP or static IP address from command Line in Linux? I once accidentally removed Gnome (my bad, wasn't paying attention and did an apt-get autoremove -y .. how bad is that.. ) So I was stuck, I couldn't connect to Internet to reinstall my Gnome Network Manager because I'm in TEXT mode network-manager was broken.  I learned a good lesson. you need internet for almost anything these days unless you've memorized all those manual command.

This guide will guide you on how to setup DHCP or static IP address from command Line in Linux. It saved me when I was in trouble, hopefully you will find it useful as well. In case you've only got Wireless, you can use this guide to connect to WiFi network from command line in Linux.
Note that my network interface is eth0 for this whole guide. Change eth0 to match your network interface.
Static assignment of IP addresses is typically used to eliminate the network traffic associated with DHCP/DNS and to lock an element in the address space to provide a consistent IP target.

Step 1 : STOP and START Networking service

Some people would argue restart would work, but I prefer STOP-START to do a complete rehash. Also if it's not working already, why bother?
# /etc/init.d/networking stop
 [ ok ] Deconfiguring network interfaces...done.
 # /etc/init.d/networking start
 [ ok ] Configuring network interfaces...done.

Step 2 : STOP and START Network-Manage

Read the rest of it here: Setup DHCP or static IP address from command line in Linux

Monday, March 23, 2015

Spoof or change MAC address in Linux

Read full details here: Spoof or change MAC address in Linux

Change MAC address in Linux

This guide takes you through step by step procedures on how to change MAC address in Linux. I’ve tried to make it generic to cover most Linux distros. If you have a different option, please comment and I will include it in my guide.
Under GNU/Linux, the MAC address of a network interface card (NIC) can be changed by following the procedures below.
NOTE: MAC addresses used within this article are provided for example only. Substitute according to your requirements.
NOTE: Commands below MUST be executed with root privileges (e.g. prepended with sudo if required), in order for things to work

Read the rest of it here: Spoof or change MAC address in Linux

Monday, March 16, 2015

Free VPN providers of 2015

PN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company’s internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.A Virtual Private Network, or VPN, allows a group of computers or networks to connect to each other over public network—usually, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

VPNs allow employees to securely access their company’s intranet while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location.

Benefits of using VPN

Here’s my top 11 reasons why you would want to use VPN services.
  1. VPN provides Privacy and cloaks your IP address.
  2. Use any network (public or private or free WiFi) with encryption
  3. Login to your home or Work network from anywhere with confidence.
  4. Bypass censorship and content monitoring.
  5. Browse and bypass Firewall and censorship policy at work or Anywhere!
  6. Access region restricted services from anywhere (i.e. Youtube videos, NetFlix or BBC Player etc.)
  7. Transfer or receive files with privacy.
  8. Hide your voice/VOIP calls.
  9. Use Search Engines while hiding some of your identity.
  10. Hide yourself
  11. Cause you like to be anonymous.
As you can see from the list above, VPN not necessarily hides everything. Search engines can probably still recognizes you based on your cookies, previous browsing behavior, account sign-in (duh!), browser plug-ins (i.e. Alexa, Google Toolbar etc.).

Free VPN providers of 2015

Privacy is a realistic goal than anonymity. Privacy is inherently personal and has different definitions for different people, but privacy generally means the ability to exclude information about yourself. Privacy can also mean the right to express yourself. VPN or TOR, nothing makes you truly anonymous, but they can protect your privacy to a greater extent. Here’s 9 free VPN providers of 2015 for you to play with.
  1. HotSpot Shield Free [Windows Only, asked for my Phone Number!]
  2. Private Tunnel Free [Just 100mb data only]

Read the rest of it here: Free VPN providers of 2015

Wednesday, March 4, 2015

cPanel logs location

Read full details here: cPanel logs location

cPanel logs location

Finding cPanel logs been always an issue for everyone. cPanel seems to distribute the logs in all over the disk. Saying that, cPanel got a nice Poster that you can print out but the PDF file is 42MB. This post is a collection of all the cPanel logs location for access, Apache, email, error, ftp, mysql, WHM and other possible applications.

If you live in USA, Canada or Mexico, they will even send you a high resolution printed copy. Select open in New Window to on the image below to view full-size.

cPanel logs location - blackMORE Ops - DropMini

Following log locations are covered in this guide:
  1. Access logs
  2. Apache Web Server Logs
  3. Email logs
  4. Error logs
  5. Ftp logs
  6. MySQL logs and
  7. WHM logs.
If you want to access logs via WHM GUI, cPanel documentation got more details here.

Read the rest of it here: cPanel logs location

Sunday, March 1, 2015

A very detailed guide on how to setup VPN on Kali Linux and Ubuntu

Read full details here: A very detailed guide on how to setup VPN on Kali Linux and Ubuntu

Every day millions of people uses different VPN service providers to protect their online privacy. But it not all VPN providers are as anonymous or as secured or dedicated to protecting your Online privacy as they claim to be. Some VPN service providers even log your activity and if you are living in a country where certain sites are not allowed or you might get prosecuted for doing something as simple as scanning a network (yes, it’s in-fact an offense in many First World countries). I wrote this article on fixing VPN grayed out problem in Kali Linux. Many readers asked me to write a complete guide on how to set up VPN and which ones are secured.


Fact is, I simply cannot test all VPN providers. I cannot vouch for other users experiences and I usually only write stuffs I am sure about. Of many VPN providers, PrivateInternetAccess is claimed to be the best and fastest and according to their ToS and Privacy Policy, they seems to be well praised and recommended by several reviews such as done by TorrentFreak and LifeHacker. I strongly suggest readers to do some research before committing to any providers.
Following eight questions were taken from TF website and I feel that you should be asking yourself the same questions before going for any VPN providers: (I’ve added some comments below, your opinion might be different).
  1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long?
    • No logs.
  2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?
    • Out of US, GB or any NATO affiliated countries if possible. But then you compromise on speed. Alternatively suspend user account instead of handing over logs or data.
  3. What tools are used to monitor and mitigate abuse of your service?
    • Other than abuse blocking and service uptime, no monitor at all.
  4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?
    • Suspend user account instead of handing over logs or data.
  5. What steps are taken when a valid court order requires your company to identify an active user of your service?
    • Suspend user account instead of handing over logs or data.
  6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?
    • I never cared for BT, but I guess no discrimination on any type of traffic.
  7. Which payment systems do you use and how are these linked to individual user accounts?
    • Anything and everything. Best would be BitCoin. Setup own BTminer and pay with that. In that way, little/no online trace whatever.
  8. What is the most secure VPN connection and encryption algorithm you would recommend to your users?
    • AES-128, RSA2048 or higher supported. Don’t use SHA1. 
As I mostly use Kali Linux, my primary concentration would be on that. However, Kali Linux and Ubuntu uses same Network Manager, so this guide applies to the any Debian variant such as Kali Linux, and Ubuntu variants such as Linux Mint etc.  In short, if you follow this guide, you will be able to setup VPN on Kali Linux, Ubuntu, Debian Linux Mint etc.

Read the rest of it here: A very detailed guide on how to setup VPN on Kali Linux and Ubuntu