segunda-feira, dezembro 18, 2006

FLV Online Converter

This service converts a FLV file (Youtube's movie,etc) to another format (AVI/MOV/MP4/MP3/3GP). The service is using a unique technologies (JP), and converts FLV to MPEG4 faster and losslessy than a typical transcoder.

When you submit an url, this service will download and convert the video format. Then you can download the converted file.

domingo, novembro 26, 2006

sábado, novembro 25, 2006

20 Must Read HOWTOs and Guides for Linux

sexta-feira, novembro 24, 2006

Security Configuration Guides

NSA initiatives in enhancing software security cover both proprietary and open source software, and we have successfully used both proprietary and open source models in our research activities. NSA's work to enhance the security of software is motivated by one simple consideration: use our resources as efficiently as possible to give NSA's customers the best possible security options in the most widely employed products. The objective of the NSA research program is to develop technologic advances that can be shared with the software development community through a variety of transfer mechanisms. NSA does not favor or promote any specific software product or business model. Rather, NSA is promoting enhanced security.

domingo, novembro 05, 2006

Linux Kernel Swear Counts

sábado, novembro 04, 2006

No More Ads in your Firefox!

Get this plugins:



segunda-feira, outubro 30, 2006


Arudius is an information assurance (IA) Linux live CD with tools for penetration testing and vulnerability analysis. IA has many other aspects besides network security. However, it seems that the mainstream public identifies informaion assurance primarily with securing network-enabled systems, so we decided to go with the mainstream and call Arudius a tool for information assurance. The CD consists of a Zenwalk Linux base on top of which a large collection of network security testing software (full list) has been installed - including tools listed on Top 75 list plus many other tools listed on Freshmeat, and other information assurance sites around the world.

Linux Podcasts

segunda-feira, outubro 23, 2006

Virtual Serial Port Driver

A virtual serial port is a trade term used by certain vendors of COM port redirector software that emulates a serial port (RS-232, RS-422, and RS-485). This port is created by special software products which enable extra serial ports in operation system without additional hardware installation (such as expansion cards, etc.). Unlike the standard physical serial port the virtual one can be assigned any name (COM255, VSP33, etc.) to. It is possible to create unlimited number of virtual serial ports in your PC. The only limitation is the performance capacity of your system, as it may require a substantial amount of resources to emulate say 255 serial ports on slow computers.

Virtual serial port emulates all serial port functionality, including Baud rate, Data bits, Parity bits, Stop bits, etc. Additionally it allows controlling the data flow, emulating all signal lines (DTR/DSR/CTS/RTS/DCD/RI) and customizing pinout (only advanced solutions).

Serial ports emulation can be useful in case there is a lack of available physical serial ports or they do not meet the current requirements. For instance, virtual serial ports can help you share data between several applications from one GPS device connected to serial port. Another option is to communicate with any other serial devices via internet or LAN as if they are locally connected to computer (Serial-over-Ethernet technology). You can establish connection between two computers or applications via emulated null-modem link. Most of the available virtual serial port emulators are compatible with Windows 9x, Windows NT, Windows 2000, Windows ME, Windows 2003, Windows XP and some of them run under Windows CE, Windows Mobile and Pocket PC.

Virtual serial ports are available as both commercial products and free software.

Virtual Serial Port Driver (VSPD) turns serial ports of Tibbo Device Servers into remote COM ports of your PC. VSP Manager is used to create and manage Virtual Serial Ports (VSPs).

w3bfukk0r - scan webservers for hidden directories (forced browsing)

w3bfukk0r is a forced browsing tool, it basically scans webservers (HTTP/HTTPS) for a directory by using HTTP HEAD command and brute force mechanism based on a word list. Features:

* HTTP/HTTPS(SSL) support
* Banner grabbing
* User-Agent faking
* Proxy support (HTTP/S)
* Reports found and non-existend directories

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:

* Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
* Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
* Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.

sábado, outubro 07, 2006


Beryl is a combined window manager and compositing manager that runs on top of Xgl or AIGLX using OpenGL to provide effects accelerated by a 3D graphics card on the desktop.

What is the difference between compiz and beryl?

* Uses flat file backend instead of gconf meaning almost no gnome dependency.
* Needs "beryl-settings", an application to configure settings instead of gconf-editor.
* Has a lot of extra plugins and enhanced features in other plugins.
* Starts with beryl-manager.
* Has a themeable decorator (emerald).
* Has a theme manager (emerald-themer).
* Changes frequently: new features are added on a daily basis.
* Made by a community right here at, although submissions of extra plugins and enhancements from here to freedesktop would make the compiz better over all.

segunda-feira, outubro 02, 2006

Computer Power Supply Calculator

domingo, outubro 01, 2006

Linux Sysadmin Tools

segunda-feira, setembro 11, 2006

Spamer was condemned in Virginia

The Court of Appeals of Virginia upheld yesterday what is believed to be the first conviction in the nation under a state anti-spamming law that makes it a felony to send unsolicited mass e-mails.

A North Carolina man was convicted in Loudoun County two years ago of illegally sending tens of thousands of e-mails to America Online customers. Prosecutors said Jeremy Jaynes flooded the servers at the Internet company's headquarters in Loudoun with bulk e-mail advertisements for computer programs and stock pickers.

Jaynes was sentenced last year to nine years in prison on three counts of violating the state's anti-spam law and was allowed to remain free on $1 million bond while his case was appealed. Thomas M. Wolf, an attorney for Jaynes, said he plans to appeal yesterday's decision.


domingo, setembro 10, 2006

Splitting Large Files to Span Multiple Disks using TAR

The two extra command line options you need to use over and above the standard syntax are -M (--multi-volume) which tells Tar you want to split the file over multiple media disks. You then need to tell Tar how big that media is, so that it can create files of the correct size. To do this you use the --tape-length option, where the value you pass is number x 1024 bytes.

The example below shows the syntax used. Lets say the largefile.tgz is 150 Meg and we need to fit the file on two 100 Meg Zip drives.

tar -c -M --tape-length=102400 --file=disk1.tar largefile.tgz

The value 102400 is 1024 x 100, which will create a 100 Meg file called disk1.tar and then Tar will prompt for volume 2 like below :-

Prepare volume #2 for disk1.tar and hit return:

In the time of tape drives you would have taken the first tape out of the machine and inserted a new tape, and pressed returned to continue. As we want Tar to create the remaining 50 Meg in a separate file, we issue the following command :-

n disk2.tar

This instructs Tar to continue writing the remaining 50 Meg of largefile.tgz to a file named disk2.tar. You will then be prompted with the line below, and you can now hit return to continue.

Prepare volume #2 for disk2.tar and hit return:

You would repeat this process until your large file has been completely processed, increasing the disk number in the file each time you are prompted.

Other example:
tar cvf arq1.tar -M --tape-length=500000 bigarq.txt

Putting the File Back Together

The process is similar when putting the large file back together from its split-up files. Below is the syntax used to re-create the large file from the disk1.tar and disk2.tar images.

C:\tar>tar -x -M --file=disk1.tar largefile.tgz
Prepare volume #2 for disk1.tar and hit return: n disk2.tar
Prepare volume #2 for disk2.tar and hit return:


sexta-feira, setembro 08, 2006

SMTP reply codes

500 Syntax error, command unrecognized [This may include errors such as command line too long]
501 Syntax error in parameters or arguments
502 Command not implemented
503 Bad sequence of commands
504 Command parameter not implemented

211 System status, or system help reply
214 Help message [Information on how to use the receiver or the meaning of a particular on-standard command; this reply is useful only to the human user]

220 Service ready
221 Service closing transmission channel
421 Service not available, closing transmission channel [This may be a reply to any command if the service knows it must shut down]

250 Requested mail action okay, completed
251 User not local; will forward to
450 Requested mail action not taken: mailbox unavailable [E.g., mailbox busy]
550 Requested action not taken: mailbox unavailable [E.g., mailbox not found, no access]
451 Requested action aborted: error in processing
551 User not local; please try
452 Requested action not taken: insufficient system storage
552 Requested mail action aborted: exceeded storage allocation
553 Requested action not taken: mailbox name not allowed [E.g., mailbox syntax incorrect]
354 Start mail input; end with .
554 Transaction failed

Source: RFC 821

quarta-feira, setembro 06, 2006

Debian Installers

Convert CUE/BIN images to ISO in Linux

It's simple:

bchunk image.bin image.cue image.iso

Then you can mount ISO image with "mount" command:

mount -o loop -t iso9660 image.iso /mnt

terça-feira, agosto 22, 2006

Linux Test Tools

The purpose of this Linux Test Tools Table is to provide the open-source community with a comprehensive list of tools commonly used for testing the various components of Linux.

domingo, agosto 06, 2006

Linux Command line Tips

sábado, agosto 05, 2006

Comparison of Linux distributions

The many available Linux distributions differ for a range of reasons including technical, organizational, and philosophical.

Technical variations include support for different hardware devices and systems or software package configurations. Organizational differences may be motivated by technical decisions but also by philosophical or even historical reasons. Some distributions specialise in use on desktops, servers or routers. Other criteria include security, including how quickly security upgrades are available; ease of package management; and number of binary packages available.

These tables compare the latest stable release of major distributions on a range of objective criteria. It does not cover the subjective merits of each operating system, branches marked as unstable/beta, nor compare Linux distributions with other operating systems.

Look at:

sexta-feira, agosto 04, 2006

Warsaw's Laws of Hackering

In the great tradition of Murphy's Law and other related laws, I offer my humble few. I'm not sure I have rightful claim to originating all these, so if you find a previous reference to these laws, please let me know!

Warsaw's First Law: The Rule of Estimate Accuracy Insurance
When making a time estimate for any programming task, make your best formalized guess, then multiply by two and bump it up a unit. E.g. "I think it will take me three days to hack in those changes to the frobnicator"; My official estimate: 6 weeks.

Warsaw's Second Law: Unbending Law of Commit Scheduling
Never change anything after 3pm on a Friday.

Corollary to Warsaw's Second Law
If you do change anything after 3pm on Friday, you will break it, and thus end up fixing it for the entire weekend. You will probably not be able to sleep, and if you do fall asleep, you will dream about the breakage. On Monday morning, you will fix the problem in five minutes.

Warsaw's Third Law: Law of Software in a Vacuum
All software sucks. Make sure yours sucks less.

Warsaw's Fourth Law: The Law of Pinball Machine Instructions
It doesn't matter a wit if the instructions are printed clearly for all to see, nobody will read them. They'll just drop their quarters and start pushing buttons like a Tommy. Software is the same.

Warsaw's Fifth Law: A Rose By Any Other Name (a.k.a the Pink Floyd Rule)
All names are stupid until you become rich and famous with it.


segunda-feira, julho 24, 2006

YouOS - A Web Operating System

YouOS is an experiment in a new kind of computing platform.

sábado, julho 22, 2006

The Top 20 Most Critical Internet Security Vulnerabilities

Top Vulnerabilities in Windows Systems
W1. Windows Services
W2. Internet Explorer
W3. Windows Libraries
W4. Microsoft Office and Outlook Express
W5. Windows Configuration Weaknesses

Top Vulnerabilities in Cross-Platform Applications
C1. Backup Software
C2. Anti-virus Software
C3. PHP-based Applications
C4. Database Software
C5. File Sharing Applications
C6. DNS Software
C7. Media Players
C8. Instant Messaging Applications
C9. Mozilla and Firefox Browsers
C10. Other Cross-platform Applications

Top Vulnerabilities in UNIX Systems
U1. UNIX Configuration Weaknesses
U2. Mac OS X

Top Vulnerabilities in Networking Products
N1. Cisco IOS and non-IOS Products
N2. Juniper, CheckPoint and Symantec Products
N3. Cisco Devices Configuration Weaknesses


terça-feira, julho 18, 2006

Server monitoring

To make all sorts of graphs:

apt-get install munin munin-node


To compute more statistics:

* anteater
* isoqlog
* mailgraph

Monitor system logs: logcheck:

* sends you mail with abnormal log lines
* It's important to customize what is normal and you do it with regular expressions


Games for Linux

segunda-feira, julho 17, 2006

Phoronix Linux Compatible Hardware

Phoronix LCH is designed to be a community-driven indexing system for computer hardware under GNU/Linux. This system allows you to post GNU/Linux information on hardware as well as sharing your own personal experiences when it comes to GNU/Linux compatibility. You are also able to browse and search the database for other hardware as well. This is designed to make it much more effortless when deciding what GNU/Linux compatible hardware to go with during your next upgrade. Phoronix LCH is not distribution specific, and allows comments from all versions of GNU/Linux. Phoronix LCH is to spread what works and what doesn't when it comes to hardware under Linux.

sábado, julho 15, 2006

Dell laptop explodes at Japanese conference

A laptop reported to be a Dell burst into flame and was caught on camera during a recent Japanese conference. Guess this laptop could be a poster child to prove that laptops really can cause sterility if they are on your lap. :-)

Fully Open Source NTFS Support Under Linux

The Linux NTFS project has released a beta version of its fully open source userspace (using FUSE) 3G-Linux NTFS support driver. According to the developer, this driver beats hands down other NTFS support solutions performance-wise (including commercial Paragon NTFS driver and also Captive NTFS, which is using windows ntfs.sys driver under WINE).

terça-feira, julho 04, 2006

The Ten Most Critical Wireless and Mobile Security Vulnerabilities

1. Default WiFi routers: By default, wireless routers are shipped in an un-secured state.

2. Rogue Access Points: set up an authorized access point, without informing the network administrator.

3. Wireless Zero Configuration: When a computer connects to an access point, it generally stores the details of that connection locally. The next time the computer is turned on, the wireless network card immediately looks for the connection and re-establishes the connection. Since the SSID value is sent as plain text, anyone with a sniffer can see it. Programs like Karma automate this process.

4. Bluetooth exploits: BlueSnarfing, BlueBugging, BlueJacking, BlueTooth DoS attacks.

5. WEP Weaknesses: passwords can easily be cracked using Airsnort.

6. Clear Text Encryption Passwords: Some of the most popular mobile encryption programs even store the password in plain text in the registry.

7. Malicious Code: "Airborne" mobile viruses.

8. Autorun: Windows Mobile devices contain a little-known autorun feature that can provide an attacker with a quick and easy method of infection. When a media card is inserted into the PDA, Windows Mobile will copy over the autorun.exe (if it exists), create a copy in the /Windows directory, and execute it. A user can prevent this by creating a read-only dummy executable called autorun.exe and put it in the /Windows folder.

9. Multiple VoIP attacks: VoIP is mostly sent in an unencrypted format. As a result, anyone can see the connection information and capture/record the conversation. Programs like VoMiT and Cain & Abel can easily capture and record conversations. Other programs like sipbomber can kick a user offline. In addition, SiVus (a VoIP scanner) can quickly locate VoIP enabled systems.

10. Lost and stolen devices: All mobile databases should be encrypted. A good, written security policy and user education are also important. Mobile devices should all have a login copyright banner, along with return information.

Fonte: Help Net Security ( )

segunda-feira, julho 03, 2006


Partition Image is a Linux/UNIX utility which saves partitions in many formats (see below) to an image file. The image file can be compressed in the GZIP/BZIP2 formats to save disk space, and split into multiple files to be copied on removable floppies (ZIP for example), ... Partitions can be saved across the network since version 0.6.0.

segunda-feira, junho 26, 2006


The main goal of nUbuntu is to create a distribution which is derived from the Ubuntu distribution, and add packages related to security testing, and remove unneeded packages, such as Gnome,, and Evolution. nUbuntu is the result of an idea two people had to create a new distribution for the learning experience. Many people ask, "What makes it better than X?", or "Why should I use this over Y". Our answer to this question is, we do not think about whether people are using it or not. We are more concerned about the learning process. If you want to try something with a clean interface, fast, and an excellent range of programs please don't hesitate to download nUbuntu.

domingo, junho 25, 2006

Top 100 Network Security Tools

After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. Fyodor asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with.

domingo, junho 18, 2006

Sistemas Operacionais na Copa 2006

FIFA World Cup - FreeBSD
Yahoo! - FreeBSD
Phillips - FreeBSD
Toshiba - Solaris 9 / FreeBSD
McDonalds - Solaris 8 / FreeBSD
Coca-Cola Company - Linux / IBM Appliances
Adidas - Linux / Windows 2003
Budweiser - Windows 2000
Avaya - Solaris 8 / Windows 200 / FreeBSD
Continental - Linux / IBM
Deutsche Telekom - Solaris 8 / FreeBSD
Fly Emirates - Windows 2003
Fuji Film - Solaris 8
Gillette - Windows 2000
Mastercard - Solaris 8 / FreeBSD / Windows 2000

Fonte: FUG-BR ( )

quinta-feira, junho 15, 2006

Red Hat Knowledgebase

Red Hat Knowledgebase is a library of tips, troubleshooting advice, and current information updated daily by Red Hat technicians.

quarta-feira, junho 07, 2006

Ubuntu Weekly Newsletter

Ubuntu Weekly Newsletter - Reporting all of this weeks Ubuntu, Kubuntu, Edubuntu and Xubuntu action.

terça-feira, junho 06, 2006


DSPAM is one of the web's premiere anti-spam solutions, written by Jonathan Zdziarski. These pages are devoted to explaining how to install and use DSPAM.

domingo, junho 04, 2006

Automatix for Dapper and Breezy

Items for specifically Breezy or Dapper will have a BR-Breezy, DP-Dapper or BD for both.

1) Installs multimedia codecs - BD
2) Installs all Firefox plugins (java, flash, etc) (except Adobe reader and mplayer) - BD
3) Installs RAR, ACE and UNRAR archive support - BD
4) Installs skype - BD
5) Installs Acrobat reader 7 and firefox plugin for the same. - BD
6) Installs Gnomebaker (CD/DVD burning s/w for GNOME) - BD
7) Installs gftp (FTP client for GNOME with ssh capability) - BD
8) Installs Frostwire (GPL clone of Limewire) - BD
9) Installs multimedia editors (Audacity (audio), Kino (video), EasyTag (ID3)) - BD
10) Installs DVD (dvdrip) ripper - BD
11) Installs Mplayer and mplayerplug for Firefox - BD
12) Installs totem-xine, Realplayer, VLC and Beep Media Player (with docklet) - BD
13) Installs Opera Browser - BD
14) Installs Debian Menu (shows all installed applications) (this kills and restarts your gnome-panel without warning u but its a completely harmless operation!) - BD
15) Installs Bittornado and Azureus (Bittorrent clients) - BD
16) Installs Avidemux (Video editing tool) (New version 2.1.0) - BD
17) Enables Numlock on (turns numlock on Gnome startup) - BD
18) Installs Programming Tools (Anjuta (C/C++ IDE), Bluefish (HTML editor), Screem (Web Development Env.) and NVU (HTML editor)) - BD
19) Install GnomePPP (Graphical Dial up connection tool) - BD
20) Installs MS true type fonts - BD
21) Configures ctrl-alt-del to start gnome-system-monitor (aka windows) - BD
22) Installs Streamripper and Streamtuner - BD
23) Installs NON-FREE audio and dvd codecs - BD
24) Installs ndisgtk (WiFi configurator Graphical user interface) - BD
25) Upgrades Open Office to 2.0 (final version), installs openoffice clipart and installs OO2 thumbnailer. - BR
26) Adds 3 nautilus scripts (open any file with gedit as root; open a nautilus window as root in any folder; open gnome search tool in any folder (Right click in a nautilus window and look under "scripts") - BD
27) Installs SUN'S JAVA JRE version 1.5 - BD
28) Installs SUN'S JAVA JDK version 1.5 - BD
29) Installs wine (u need to run winecfg manually after installation) - BD
30) Enables ejection of CD when CDROM drive button is pressed. - BD
31) Installs AMSN 0.95 (MSN client with webcam support) - BD
32) Installs Mercury Messenger (Java based MSN client with webcam support) - BR
33) Installs BUM (Boot-up Manager) - BD
34) Installs DCPP (Linux DC++ client) - BD
35) Installs sbackup (Backup and restoration solution) - BD
36) Installs the latest version of Rhythmbox - DP
37*) Installs firestarter (GNOME firewall frontend) and adds firestarter to GNOME startup - BR
38*) installs gdesklets (GNOME eyecandy) and adds gdesklets to GNOME startup - BD
39*) Gamepads (Makes USB gamepads work) - BR
40*) Turns DMA ON on Intel and AMD machines (needs a restart) - BR
41*) NVIDIA cards (Detects Nvidia cards and installs drivers) (Needs a restart) - BD
42*) Adds midi capability to your Ubuntu box (test by playing a midi file with timidity or pmidi from terminal) - BR
43*) Installs Firefox and its plugins(themes and extensions are not retained.bookmarks need to be copied from backup folder) - BR
44*) Installs Mozilla-Thunderbird 1.5 (US-only version) (no support for non-US-english language packs and enigmail) - BD
45*) Fixes Gnome sound related issues (ALSA and ESD config) (needs a restart) (ONLY FOR GNOME! NOT TO BE USED ON KDE/XFCE) - BR

domingo, maio 28, 2006

Linux wireless LAN support

This is an attempt to create a, more or less complete listing of wireless devices with information about the chipset they are based on and whether or not they are supported in Linux. The basis of this list came from this list.
This list isn't complete, so if you have any information about a wireless card, its chipset and whether or not it is supported, please help to support.
This list doesn't specify anything about how much of your card is supported. So a card that only works without encryption is listed the same as one that also has support for WEP/WPA. For the specifics about how much of your card is supported, please refer to the driver page listed for your card.

quinta-feira, maio 18, 2006

Secure BIND Template

sexta-feira, maio 12, 2006

Linus vs. Tanenbaum

sábado, maio 06, 2006

GTER-21 e GTS-7 em Porto Alegre

GTER 21ª Reunião, Porto Alegre - 26 e 27 de Junho de 2006:

GTS-7, a se realizar em Porto Alegre. 26 e 27 de junho de 2006:

quinta-feira, abril 27, 2006

Linux Performance Tuning

When a distribution is packaged and delivered to clients, it is designed to be fully compatible with most of the computers available in the market. This is a very heterogeneous set of hardware (hard disks, video cards, network cards, etc.). So distribution vendors like Red Hat, SuSe, Mandriva and the rest of them choose some conservative configuration options to assure a successful installation.

sábado, abril 22, 2006

Lm Sensors

quarta-feira, abril 12, 2006

segunda-feira, abril 10, 2006

Theodore Ts'o

One of the core kernel developers for the Linux operating system. Implemented and maintained the serial driver, POSIX job control, POSIX signal handling, and the ext2 filesystem utilities. Chair of the Technical Board for Linux International. Developed a device driver for the Rocketport intelligent serial board on contract for Comtrol, Inc. Maintainer of the TSX-11.MIT.EDU ftp site (first ftp in U.S.A. to house Linux).

quinta-feira, abril 06, 2006

Squid Result Codes

A valid copy of the requested object was in the cache.

The requested object was not in the cache.

The requested object was cached but STALE. The IMS query for the object resulted in "304 not modified".

The requested object was cached but STALE. The IMS query failed and the stale object was delivered.

The requested object was cached but STALE. The IMS query returned the new content.

The client issued a "no-cache" pragma, or some analogous cache control command along with the request. Thus, the cache has to refetch the object.

The client issued an IMS request for an object which was in the cache and fresh.

The object was believed to be in the cache, but could not be accessed.

Request for a negatively cached object, e.g. "404 not found", for which the cache believes to know that it is inaccessible. Also refer to the explainations for negative_ttl in your squid.conf file.

A valid copy of the requested object was in the cache and it was in memory, thus avoiding disk accesses.

Access was denied for this request.

The requested object was retrieved from the cache during offline mode. The offline mode never validates any object, see offline_mode in squid.conf file.

A valid copy of the requested object was in the cache.

The requested object is not in this cache.

Access was denied for this request.

An invalid request was received.

During "-Y" startup, or during frequent failures, a cache in hit only mode will return either UDP_HIT or this code. Neighbours will thus only fetch hits.

Seen with errors and cachemgr requests.

The following codes are no longer available in Squid-2:

Errors are now contained in the status code.



Deleted, TCP_IMS_HIT used instead.

Hit objects are no longer available.


Http Status Codes

000 Used mostly with UDP traffic.

100 Continue
101 Switching Protocols
*102 Processing

200 OK
201 Created
202 Accepted
203 Non-Authoritative Information
204 No Content
205 Reset Content
206 Partial Content
*207 Multi Status

300 Multiple Choices
301 Moved Permanently
302 Moved Temporarily
303 See Other
304 Not Modified
305 Use Proxy
[307 Temporary Redirect]

400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
406 Not Acceptable
407 Proxy Authentication Required
408 Request Timeout
409 Conflict
410 Gone
411 Length Required
412 Precondition Failed
413 Request Entity Too Large
414 Request URI Too Large
415 Unsupported Media Type
[416 Request Range Not Satisfiable]
[417 Expectation Failed]
*424 Locked
*424 Failed Dependency
*433 Unprocessable Entity

500 Internal Server Error
501 Not Implemented
502 Bad Gateway
503 Service Unavailable
504 Gateway Timeout
505 HTTP Version Not Supported
*507 Insufficient Storage

600 Squid header parsing error

segunda-feira, abril 03, 2006

Linux Kernel Mailing List

100 newest messages:

domingo, março 26, 2006

Tabela comparativa dos chips da ATI e nVidia



quinta-feira, março 16, 2006

Desvendando o /proc

quinta-feira, março 02, 2006

The table of equivalents / replacements / analogs of Windows software in Linux

One of the biggest difficulties in migrating from Windows to Linux is the lack of knowledge about comparable software. Newbies usually search for Linux analogs of Windows software, and advanced Linux-users cannot answer their questions since they often don't know too much about Windows :). This list of Linux equivalents / replacements / analogs of Windows software is based on our own experience and on the information obtained from the visitors of this page (thanks!).

This table is not static since new application names can be added to both left and the right sides. Also, the right column for a particular class of applications may not be filled immediately. In future, we plan to migrate this table to the PHP/MySQL engine, so visitors could add the program themselves, vote for analogs, add comments, etc.

terça-feira, fevereiro 28, 2006

Lançado Gentoo 2006.0

Grub Splash Images

sábado, fevereiro 25, 2006

quinta-feira, fevereiro 23, 2006

GTK no Ubuntu usando KDE

Para mudar os temas GTK no Ubuntu:

# apt-get install gtk-theme-switch gtk-engines-geramik

$ gtk-theme-switch2

terça-feira, fevereiro 14, 2006

quarta-feira, fevereiro 08, 2006

How to set up a mail server on a GNU / Linux system

Step by step guide to install Postfix
Ubuntu + Postfix + Courier IMAP + MySQL + Amavisd-new + SpamAssassin + ClamAV + SASL + TLS + SquirrelMail + Postgrey

quarta-feira, fevereiro 01, 2006

segunda-feira, janeiro 30, 2006


Wikitravel é um projeto que visa criar um guia mundial de viagens gratuito, completo, atualizado e disponível para todos.

terça-feira, janeiro 10, 2006

True Lies

Em 2007 ele irá contar o que realmente aconteceu.

sexta-feira, janeiro 06, 2006

Cyber Security Bulletin SB2005