Home
Welcome to Anubis-Linux (v.2)
Contents
1. C and ASM its name parodies C Netwide Assembler nasm a great assembler Flat Assembler fasm same as above High Level Assembler hla assembler for HLA High Level Assembly a newer language improving on ASM Yasm Modular Assembler yasm tasm a great NASM rewrite BCC AS86 and LD86 C compiler assembler and linker for the venerable Intel 80x86 CPU series flawfinder helps find security problems in C C source f both as Win32 with GUI and Linux console app D Oulde this utility can help you learn a lot POSIX Manuals invaluable collection of MANuals for any system programmer Wireshark tshark tcpdump KHexEdit KDE s own hexeditor KDebugger kdbg and gdb KDE s own debugger based on GDB OllyDbg the famed shareware Win32 debugger hte professional file viewer editor analyzator NTCore Explorer Suite valuable tools for Win32 executable analysis network traffic analysis tools sniffers replacement for KNetworkManager some report es it works better PuTTY Telnet SSH Rlogin connections program Tor Privoxy better anonymity protection on the Internet rkhunter chkrootkit unhide lynis Navale KSystemLog security auditing tools Vidalia TorK Tor configuration utilities harden nids snort Network Intrusion Detection System remember to run dpkg reconfigure snort hunt packit PackEth penetration testing tools KNm
2. but apparently they re free at this time And don t forget about the MEPIS User s Manual it s a must read 1 Mr Eckel was kind enough to give me permission to redistribute the TIC volumes and the source code within Anubis Linux unmodified and solely for educational purposes 2 The included PDF has the wrong copyright information Please see http www advancedlinuxprogramming com errata html for detailed information Have fun using Anubis Linux I hope you ll find it useful e take care to edit out Standby and Suspend to settings from KPowersave as some computers stop responding trying to suspend this was already done by default but left in as a warning Wine will not start Win32 executables marked as executable unmark them by accessing the file properties sheet or right click and select Run with Wine or even better fix the bug then send me the fix be careful when using Wine on the LiveCD especially as root it will fill up the ramdisk with temporary files in the wine directory and choke your system this can be fixed by deleting that directory or it can be prevented by creating a symlink named wine which points someplace where there are no space constraints maybe a directory you make in var e FASMW cannot assemble its examples in the ANUBIS folder this happens because the filesystem is read only you must move the examples to a writable directory such as your home directory
3. the fields with IP 127 0 0 1 port 8118 be advised loading times will be lengthened but the better anonymity is well worth it you should also try out Konqueror which is in some respects superior to Firefox for instance it can be set to not send a User ID string and can split up the window etc It can also make use of Tor Privoxy of course please use Vidalia to start stop Tor e the Guarddog firewall is by default configured very aggressively it will allow DNS HTTP HTTPS FTP and that s about it no miscellaneous network protocols no instant messaging etc to change this start Guarddog and set it up to your liking e the SELinux and Snort systems are activated by default they may affect your online experience to some degree if you have any questions or problems visit our forums and post I wanted to make Anubis Linux a base distribution for those interested to study programming and networking amongst other things Feel free to explore around the documentation and don t forget about the Experts Guide The apps added were in my opinion important and left out in the plain vanilla MEPIS some of these will need to be run in a shell with wine marked with category application description GNU C Compiler g GCC s brother Code Blocks codeblocks an elegant IDE for C C programmers Dev C same as above but compiles Win32 executables Sphinx C Compiler Russian made C compiler C is a hybrid between
4. Or you could read the big book on BASH also there Bottom line BASH will also teach you the basic inner workings of your Linux so if you want to work in more advanced areas such as LiveCD remastering you can t do it without knowing how to use the shell Not to mention some commands don t have immediate click button correspondent It is easy to back up your original MBR from the shell by using the dd command raw copy utility Read more about it in the Linux documentation section and the built in BASH introduction e in Linux case matters ABC Abc and aBc are all different files directories commands the filesystem also allows you to use some symbols in the filename that you can t use under Win and then there s something called hardlinking which again you can t do under Windows becau whoops got carried away see above 03 if you want to know more e another nice thing about Linux if a file doesn t have an extension it will try to automatically detect its type you can try this by clearing the extension for an image file or PDF e Linux doesn t use drives everything is seen as a file so how do you access the contents of a drive you mount it see Kwikdisk app lower right taskbar or or my BASH tutorial after mounting with Kwikdisk use ana or to move around e in Linux you will install software through packages or by compiling it you will se REE use for downloading amp installing packages for local p
5. Welcome to Anubis Linux v 2 a programming networking security oriented remastered version of SimplyMEPIS A gentle introduction to Linux for ex Windows users Anubis Linux is a distribution based on SimplyMEPIS Being a remaster means that MEPIS LLC doesn t support it and its development in any way The original MEPIS License and documentation are preserved in docs MEPIS zip and info MEPIS zip for informational purposes Anubis Linux contains cryptographic software that is forbidden under U S law to be exported to and used in certain countries Please inform yourself on the matters particular to the region where you live in Anubis Linux is provided AS IS No guarantees and no warranties whatsoever expressed or implied are given regarding Anubis Linux s correct functioning or fitness for a particular purpose The authors of Anubis Linux shall not be held liable in case of any kind of damage whatsoever i e data loss induced or caused by the use of Anubis Linux This is experimental software You use Anubis Linux at your own risk The documentation and software in Anubis Linux are freely redistributable but licensed varyingly Please check their individual licenses for more information All trademark copyright rights are property of their respective owners Linux is a registered trademark of Linus Torvalds Debian is a registered trademark of Software in the Public Interest Inc MEPIS and the MEPIS Logo are registered tra
6. ackages you will use unless you become fond of BASH and then you ll use E and e the Clipboard function in KDE is slightly smarter than the one in Win a short history of the contents is saved see app Klipper lower right taskbar again also you only need to select the text and it ll automatically be copied e what sets MEPIS apart from other distros are its MEPIS Assistants see K Menu System for instance repairing a damaged bootloader or installing nVIDIA ATi video card drivers is a fairly easy task using the Assistants NOTE for this version of AL the Mepis tools may not work correctly sorry e KDE can install and use Windows fonts this has a dramatic impact on your surfing experience see K Menu Control Center System Administration Font Installer e Windows will never be able to run Linux apps natively fortunately Linux can run most Win apps Anubis Linux comes with Wine which will allow you to install and use your favorite softwares IrfanView Winamp 7 Zip FM WinRAR etc most games will work too I tested Counter Strike 1 6 worked fine e AL comes with the famed Tor Privoxy combo which can enhance your anonymity on the Internet a fast explanation Tor is a SOCKS proxy and can t be used directly Privoxy is set to use Tor and finally your browser is set to use Privoxy In Firefox go to Edit Preferences gt Advanced Network Settings choose Manual Proxy Configuration and fill in
7. ap SYSLINUX KDE s own Nmap GUI program package for bootable media creation qemu gemulator package for OS testing in a virtual machine i e from inside another OS and its GUI frontend chntpw Ophcrack Midnight Commander mc WinNT SAM database editors Norton Commander clone for Linux Krusader Total Commander clone for Linux KCHM Viewer KDE s own CHM Help file viewer UHARC included for fun Uwe Herklotz s famed high compression archiver and deserves 7 Zip Archiver 7zFM exe Win32 version of 7 Zip included because everyone loves a GUI SMXI family scripts powerful scripts for system configuration see http www smx1 org CSFP Anubis Linux Edition my very own secure password re generators OpenGL SDL Fmod Allegro libraries for game programmers With all these tools and docs you could now do interesting things such as make Linux FASM recompile itself for AMD64 if AMD64 is what you re running on now otherwise it d be pointless Or maybe write bootloaders or even BIOS firmware Or spy on people using the same networks as you Heh heh Some things had to be uninstalled if you need them nobody stops you from remastering AL It s quite easy all you need to do is read the BASH and Remastering docs Then you can add OpenOffice to your own LiveDVD edition of AL Also for some apps such as FASMW and EG you should change the display font Co
8. demarks of MEPIS LLC Etcetera Anubis Linux technical help discussions are supported by volunteers over at MEPISLovers org Forums and AnLin Jackal Forums END OF DISCLAIMER LICENSE I hope you ll get accustomed to the extra buttons on the app s titlebars feel free to experiment A neat thing beside shade and keep on top is that you can modify the style yourself by right clicking on the titlebar and selecting or the Control Center in the K Start Menu Also you don t have to always move the window from the titlebar keep Alt depressed and you can click and drag a given app window from anywhere Fast and comfortable but it ll take getting used to so try it You also have multiple desktops see the 4 part thing in the taskbar You can even set to have more than 4 desktops if you wish key stroke function effect Ctrl Esc Process Table like Win s Task Manager Ctrl Alt Esc mouse pointer of death Ctrl Alt Del Ctrl Alt Shift Del almost the same as Ctrl Alt Del in Win Ctrl F1 F12 fast switch to desktop 1 12 Alt Fl K Start Menu Alt F2 run command I use this a lot Alt F3 app context menu Alt F4 close app Ctrl C send kill to console app Ctrl D send end input to console app Knowing how to use BASH will raise your Linux experience to a whole new level I also wrote a fast tutorial on it it s a text file in Linux docs section
9. ed HTTPS traffic port 443 that means other relay nodes won t know what you re transmitting towards the exit node but the exit node does so if you re using Tor to log into a forum for example and they usually don t encrypt the login such as let s say Email providers the exit node will possibly know your login details and where they fit but it won t know your IP you can read more about Tor in the AL Docs Section 4 in the end using Tor is much like using a highly anonymous proxy server as far as the Internet is concerned which doesn t have any information on you except that what it s carrying out to the Internet on your behalf and that server s world location changes all the time unless you force otherwise a list of the exit nodes is maintained though so it s possible for someone to figure out you re behind Tor but less likely that they find out exactly who you are finally some sites can bypass proxies and even Tor that s because they use active content for example flash media which when run can establish connections themselves and won t care about what proxy you ve set in your browser which leads us to the next point e never disable NoScript in Firefox and remember to use the Seroogle SSL search engine those intercepting your network traffic including your ISP will or should have a hard time figuring out what you search for and Google will or should have a hard time profiling you it s said that they w
10. ill log your search and IP for 1 5 years s iptstate and netstat are small but efficient utilities to keep track of the current network connections netstat will also list ports open by daemons even though these may be blocked by the Guarddog iptables firewall anyway NetActView AL Edition is a powerful GUI version of netstat its author says tshark tcpdump and Wireshark are sniffers and go a step further they capture and dissect the traffic to offer great detail of what s happening alas they require advanced networking knowledge in order to be truly useful see part 07 for suggested books e you can run dmesg last lastb to display kernel logins and bad logins respectively e KSystemLog and fwlogwatch console app are more specialised than the above e csfpl and esfp2 can be used as password re generators feel free to edit the source code and recompile it to better suit your needs they can currently create strong passwords which have a length of up to 128 characters or even 2048 in version 2 as re generators they can take the password crafting data from standard input max 128 bytes or a file unlimited length with most secure password generators you end up having to store the password breaking that tradition is the goal of CSFP Darik s Boot And Nuke aka DBAN is available on the LiveCD it allows for secure erasure of your hard disk s data otherwise skilled individuals using the right software can
11. recover your supposedly erased data which is sometimes undesirable e beware of Flash tracking cookies they will be stored as SOL files in your macromedia folder as the browsers do not automatically clean this folder it is advised that you do it yourself these cookies can potentially render any IP spoofing technique ineffective e Vidalia should be used to start stop and configure Tor TorK disabled the firewall during tests Feel free to check out the designated documentation in Section 4 books such as CINSS and Advanced IDS T with Snort are of great importance Buffer Overflow Smashing the Stack and Secure Progs Section 3 are good if you want to become a respectable systems programmer All the documentation hereby provided is freely redistributable But there are some major books that you should really check out Who knows maybe by the time you read this they were already re released under the GNU Free Documentation License or I mean and made available to freely download All these books are for after you ve already learned the basics well with the exception of the first two book author How Linux Works Brian Ward Computer Networks Andrew Tanenbaum Maximum Security Mark Taber Hardening Linux James Turnbull Applied Cryptography Bruce Schneier Hacknotes LUPSR Nitesh Dhanjani Thinking in C 1 and Advanced Linux Programming 2 would ve been in the list too
12. urier is my personal choice Please bare in mind that Anubis Linux incorporates a large amount of unstable and insecure software In other words software that has not yet been thoroughly tested against security flaws Malicious individuals could discover flaws in the software and use it to gain control over your computer You could ask why not just stick to the stable tested and secure versions instead Answer is progress Newer better and with more features Newer kernel newer filesystems newer base apps After all AL is not designed as a home operating system it s mainly about teaching you to code and use Linux more efficiently so that you will eventually be able to do those advanced geeky things by yourself A bit like the Linux From Scratch project but less Spartan in my opinion And then a lot of effort has been put into making AL as secure as possible even with its inherently insecure software packages Since we got that sorted I d now like to speak about Internet usage and how can AL provide good online security Some of these programs can only be run as root user Use either kdesu as precedent in the Run Command address bar or start the Konsole and login with su 5 Snort is an IDS Intrusion Detection System you must reconfigure it with and then document yourself on how it s used best see Section 4 of the AL Docs e Guarddog is a firewall which uses iptables in the background once you become familiar
13. with iptables read the Iptables Tutorial in Section 3 you may want to start using it directly or maybe not heh heh Guidedog is a tool used to masquerade IP addresses through the router I have personally never used it to this time but it should come in handy for those using a router macchanger will change the MAC address of your network interface to the desired value e Privoxy is more than just a way to connect to the Tor network it is a very efficient web filtering program which can block ads and known malicious sites modify the referrer header hostname and so on if you want Privoxy to function simply as a content filter feel free to edit the file removing or commenting the line this will make Privoxy to stop asking Tor for data you will still have to connect to Privoxy by local IP MoN port 8178 after restarting it e The Onion Router network aka Tor what is it and how does it work it s a worldwide network of computers of which you are a client for as long as you have Internet connection and the Tor daemon is running start stop or restart via Jese iniba ior relay nodes route the traffic along the special exit nodes are the ones which finally contact the outside Internet i e your destination website you can configure the Tor daemon to run from your PC as an exit node if you wish but you might want to inform yourself on the possible legal issues beforehand anyway relay nodes exchange encrypt
Download Pdf Manuals
Related Search
Related Contents
Teatro Bedienungsanleitung Version 3.x (PDF ca. 2MB) 日立ルームエアコン 取扱説明書 WILLOWY PUPPIES JRL-600 取扱説明書(第4版 追加分) GM862-QUAD / PY Software User Guide MANUEL D`UTILISATION U-Line 2275ZWCOL Refrigerator User Manual 7"-Android-Tablet-PC X5.Outdoor Tablette tactile X5.Outdoor HDMI 7" Style Sample for C&N Word Style Sheet 120202 RCA RTD206 Speaker System User Manual Copyright © All rights reserved.
Failed to retrieve file