null 2.0

Slackware Linux, Oracle, Programming

VMware Workstation 12.5.7 on Slackware 14.2 current (kernel 4.9.35)

No patch is needed but one has to rebuild vmmon and vmnet modules:
vmmon module:
# cd /usr/lib/vmware/modules/source
# tar xvf vmmon.tar
# cd vmmon-only
# make
# gzip vmmon.ko
# cp vmmon.ko.gz /lib/modules/4.9.35/kernel/drivers/misc/
# cd ..
# rm vmmon.o
# rm -rf vmmon-only

vmnet module (same as vmmon):
# cd /usr/lib/vmware/modules/source
# tar xvf vmnet.tar
# cd vmnet-only
# make
# gzip vmnet.ko
# cp vmnet.ko.gz /lib/modules/4.9.35/kernel/drivers/misc/
# cd ..
# rm vmnet.o
# rm -rf vmnet-only

Now load new modules:
# depmod -a
and try to start vmware service:
# /etc/init.d/vmware restart

If, after that, vmware still doesn’t start, take a look at logs at
/tmp/vmware-<username>/vmware-apploader-<pid>.log
If there is error as the end looking like this:
Unable to load libfontconfig.so.1
there is solution for that too:
# cd /usr/lib/vmware/lib/libz.so.1
# mv libz.so.1 libz.so.1.old
# ln -s /usr/lib64/libz.so.1 .

After that everything should work fine.

uninstalling vmware on slackware

i tried uninstalling with vmware-installer but nothing happened, so this is how i managed to uninstall it manually

uninstall step by step:

# locate vmware | less
# rm /usr/include/vmware-vix -r
# rm /usr/sbin/vmware-authd
# rm /usr/bin/vmware-*
# rm /usr/doc/vmware-* -r
# rm /usr/lib/vmware* -r
# rm /var/log/vmware-installer -r
# rm /etc/vmware* -r

VPN server (pptpd) install on Slackware 13

– download pptpd from SlackBuilds and install
– configuration files:
— /etc/pptpd.conf – here change ip addresses for clients and server name if you want, mine:
localip 192.168.158.249
remoteip 192.168.158.250-253

— /etc/ppp/options.pptpd – encription configuration, I left it as it was
— /etc/ppp/chap-secrets – add client usernames and passwords here, like:
popeye pptpd oliva * username: popeye password: oliva server pptpd (as set in pptpd.conf)

problem:
– users cannot login, this message in /var/log/syslog:
Plugin /usr/lib/pptpd/pptpd-logwtmp.so is for pppd version 2.4.3, this is 2.4.4
solution:
– comment out option logwtmp in /etc/pptpd.conf:
#logwtmp

Firefox – new profile for using with TOR (winXP)

this is for Windows but for Linux should be the same

start firefox profile manager from Run dialog:
firefox -profilemanager
and create new profile, let’s call it tor

now add -P default to your standard firefox shortcut to make it start with default profile:
"C:\Program Files\Mozilla Firefox\firefox.exe" -P default

and make new shortcut for tor profiled firefox:
"C:\Program Files\Mozilla Firefox\firefox.exe" -no-remote -P tor
notice -no-remote argument – it’s telling firefox to start new process instead of remotely hooking on already running process which is standard firefox behaviour

start the tor firefox and make some changes in configuration, Tools->Options (Edit->Preferences in Linux):
– in content: turn off java and javascript
– in privacy: turn off history and clean history while you’re there
– in security: turn off password remembering
– in advanced->update: turn off all updates (do it manually)
– in advanced->network->(connection)Settings: change proxy setting to manual and make it use your privoxy proxy (localhost:8118, socks v5 proxy)
in Tools->Add-ons: disable all add-ons and all plugins

I know it looks paranoid but this is firefox just for surfing over tor network and it should be as safe as possible, and easiest way is to turn everything off, you allways have your default firefox for “normal” surfing.

Slackware 13 Privoxy proxy server installation

1.) get privoxy from SlackBuilds.org and install it

2.) take a look at privoxy configuration file /etc/privoxy/config. Here you already have line for using with tor but it’s commented out so find it and uncomment it so it says forward-socks4a / 127.0.0.1:9050 . (carefully with the dot in the end, it’s mandatory)
– privoxy has great comments in config file so you can easily understand which option does what. I changed logging level to debug levels 1, 1024, 4096 and 8192 (four separate lines in config) and made it listen on my network interface listen-address 192.168.0.1:8118
– it may be a good idea to set forwarded-connect-retries 10 cause tor network is really slow and timeouts can happen oftenly.

3.) start privoxy: /etc/rc.d/rc.privoxy start

4.) if you want to make privoxy autostart with system make rc.privoxy file executable: chmod 755 /etc/rc.d/rc.privoxy and add this to your rc.local:
# Start Privoxy proxy server
if [ -x /etc/rc.d/rc.privoxy ]; then
/etc/rc.d/rc.privoxy start
fi

next:
configuring firefox profile to use tor network and maximize anonymity

TOR (The Onion Router) on Slackware 13

1.) get tor from SlackBuilds.org
– tor needs libevent library, you need to get it from SlackBuilds.org and install before installing tor itself.

Note:
Tor version 0.2.1.20 has problems with openssl-0.9.8l-i486-1 – I had to remove it and install older version from slackware 12.2 repository (openssl-0.9.8i-i486-1). Tor just stopped at Bootstrapped 10% and couldn’t get further from there (it should go to 100% if working normally).

2.) after installation take a look into tor configuration file at /etc/tor/torrc
– essentially, you can just leave everything as is. Tor will be running on localhost port 9050 and it will be available only from localhost.
– the only thing I changed here is uncommented line SocksListenAddress 192.168.0.1:9050 so I can use it as proxy from other computers in network. If you don’t need tor listening on outer network interface or you use it strictly as http proxy and intend to install proxy on the same machine as tor then you can just leave everything as it is.

3.) Start tor by typing /etc/rc.d/rc.tor start

4.) if you want to make tor autostart with system make rc.tor file executable: chmod 755 /etc/rc.d/rc.tor and add this to your rc.local:
# Start Tor
if [ -x /etc/rc.d/rc.tor ]; then
/etc/rc.d/rc.tor start
fi

security note
Do not use tor network to access your mail or other confidential data without using some other encryption like ssl (sites with https:// prefix) because you never know who is sitting at tor exit point that you currently use (exit points change all the time – every 10 minutes or so) and what is he/she doing, like sniffing traffic or changing your data as it flows through his/her computer. Read some tor documentation at torproject to understand how it all works.

next:
– install privoxy proxy server for better anonymity protection as it routes DNS requests also into the tor network and is capable of stripping headers that your browser sends with requests

change default java platform in Netbeans

this works for Netbeans 6.5 – 6.7 (probably works for others versions as well):

find netbeans_install_dir/etc/netbeans.conf file

change netbeans_jdkhome line to point to new jdk

daily time update

to update system time:
# ntpdate zg1.ntp.carnet.hr

to make it update every day create file in /etc/cron.daily
# nano /etc/cron.daily/time_update

then write this in file:
#!/bin/bash
ntpdate zg1.ntp.carnet.hr

exit and save the file (ctrl+x)

and make it executable:
# chmod +x /etc/cron.daily/time_update

Linux Shortcuts and Commands

great list with description:
http://www.unixguide.net/linux/linuxshortcuts.shtml

who logged in last on computer

# last

see man pages for more