PAM

PAM with Radius Authentication


PAM Radius Module allows any PAM-capable machine to become a RADIUS client for authentication and accounting requests. The actual authentication will be performed by a RADIUS server. The freeradius can be used for radius server. Download the PAM Radius Module To download the PAM Radius module, click here. Installing & configuring PAM Radius Module To…

2012 in review, welcome 2013


A very happy new year Thanks to all my friends and followers. The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog. Here’s an excerpt: 4,329 films were submitted to the 2012 Cannes Film Festival. This blog had 38,000 views in 2012. If each view were a film, this blog would power…

How to find USB device in Linux


I wondered when I had to find the USB device name in Linux using shell script (shell command), it was little tricky, specially in case of UDEV. You can use different methods to get this like using udevinfo command, from sysfs, from /var/log/messages. Using udevinfo: for DEV in /dev/sd*; do udevinfo -q env -n $DEV…

Ubuntu 12.10 Beta 2 Release


Ubuntu released the second and final beta of Ubuntu 12.10 version, code name “Quantal Quetzal”, just two days before. It is a development release, the Ubuntu developers are moving quickly to bring an absolute latest and greatest software. From the release announcement “The Ubuntu team is pleased to announce the final beta release of Ubuntu…

10 Must Play Linux games for 2012


Gaming on Linux? A few years ago this would only be said as a joke. Thankfully for us, Linux gaming has evolved offering some mature open source games, as well as some very nice commercial games. Let’s try and find out what are the best 10 games a Linux gamer must play this year… Oil…

Android

Mobile Security with Android


Hacking experts on Wednesday demonstrated ways to attack Android smartphones using methods they said work on virtually all such devices in use today, despite recent efforts by search engine giant Google (GOOG.O) to boost protection. Experts showed off their prowess at the Black Hat hacking conference in Las Vegas, where some 6,500 corporate and government…