the linux newb

all things tech

USB on VirtualBox 2.4.4 with OpenSuSE 11.1

I was browsing the Internet with a problem that I had with USB on VirtualBox. The USBs were greyed out and I could not select them. I came across two possible solutions. I did both, and it worked. Now, you may just have to do one of them, but I was trying everything that I could to get it to work. Here are the solutions:

Search for rule 50-udev-default.rules
and change the permissions as follows:

# libusb device nodes
#SUBSYSTEM==”usb”, ENV{DEVTYPE}==”usb_device”,
NAME=”bus/usb/$env{BUSNUM}/$env{DEVNUM}”, MODE=”0664″

I did the following also:

Look in the directory /etc/udev/rules.d/ for the file 10-vboxdrv.rules. Create a backup of this file by:
cp 10-vboxdrv.rules 10-vboxdrv.rules.bak
and then do the following:
mv 10-vboxdrv.rules 60-vboxdrv.rules

then reboot, and hopefully everything works. Good luck!

23/06/2009 Posted by | how-to, Linux, open source, opensuse, Productivity | 1 Comment

Man-in-the-Middle attack with Interceptor

The good folks over at did a little diddy on a network monitor that can be placed on the wired side of the network instead of collecting just wireless packets.  Interceptor is a network tap for the wired LAN that can collect packets, so you can come back later and analyze.  It also gives you the ability to run a wireless access point on the backside and create your own VPN tunnel from the outside, where you can be sitting in a van checking out what is happening on the network.

You can read more about Interceptor at  Give it a look, you might find something interesting.  Thanks to for pointing this out to me, and a special thanks to Robin Wood for creating such a great tool!

22/03/2009 Posted by | open source, Security | 1 Comment

OpenSuSE 11 and a Pinnacle 800i

A while back I bought a Pinnacle PCTV 800i for my box.  Now, mind you, I had Windows XP installed on this box; but I could NEVER get the damned thing to work.  I am not kidding!  The card was designed for Windows XP, but Pinnacle really dropped the ball on this one.

Well, I recently pulled this machine back out and installed OpenSuSE 11 on it.  Everything works like a charm.  I remembered that I still had that card boxed up; so I pulled it out, blew the dust off of it, and put it in the machine.  I have installed some usb tv cards for my laptop, so I decided to do the same steps from before with this card, even though it’s a PCI card (Steps are below).

I could not believe it, but when I fired up TVTime, the damn card worked.  Absolutely unbelieveable!  So finally, if my fiance’ is watching TV in the living room, I can escape to my office and watch football!

To get this working, just visit

Or follow these instructions:

Run lspci -vvnn (to make sure the card is recognized)

You should see some output that looks like:

00:0a.0 Multimedia video controller [0400]: Conexant CX23880/1/2/3 PCI Video and Audio Decoder [14f1:8800] (rev 05)
	Subsystem: Pinnacle Systems Inc. Unknown device [11bd:0051]
	Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV+ VGASnoop- ParErr- Stepping- SERR- FastB2B-
	Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR-
	Latency: 32 (5000ns min, 13750ns max), Cache Line Size: 32 bytes
	Interrupt: pin A routed to IRQ 19
	Region 0: Memory at dc000000 (32-bit, non-prefetchable) [size=16M]
	Capabilities: [44] Vital Product Data
	Capabilities: [4c] Power Management version 2
		Flags: PMEClk- DSI+ D1- D2- AuxCurrent=0mA PME(D0-,D1-,D2-,D3hot-,D3cold-)

		Status: D0 PME-Enable- DSel=0 DScale=0 PME-

Next, go to this website, and get the firmware.  There are three seperate files, and I suggest you take a look at the README.

Now, go grab the bzip or gzip from

There are instuctions on that site on how to install.  Mainly, copy the tar to /lib/firmware and extract.  Run make and make install.

Now, you should be cooking with gas.  One drawback to using TVTime, is that the sound will not be produced until you install sox from yast and run this command:

sox -c 2 -s -r 32000 -t ossdsp /dev/dsp2 -t ossdsp -r 32000 /dev/dsp

Cheers, and a big screw you to Pinnacle for making me sit on this thing for soooo long.  A huge HELL YEA to SuSE for doing it the right way for soooo long!

07/12/2008 Posted by | how-to, open source, opensuse, videos | 1 Comment

Bastille Hardening Program

You have heard of DISA’s Gold Disk as a tool to harden a Windows machine.  Well, Bastille is a program specifically designed to harden a Linux box.  Users can choose to run the program through command line or a GUI.  Bastille is designed for use on Red Hat, Fedora, SuSE, Mandrake, Debian, Gentoo, HP-UX, or Mac OS X.  The web site offers an easy how-to for installation.  On my OpenSuSE 10.3 machine, I had to add Perl-TK and the Curses packages for the GUI to work.

Through the GUI, Bastille asks the user a set of questions, and the user’s answers determine what settings are applied to the system.  One of the best features of Bastille is the ability to revert to previous settings if unwanted settings are applied.


12/05/2008 Posted by | how-to, Linux, open source, Security | Leave a comment

Likewise Open


I saw where Ubuntu 8.04 Release Candidate was available for download, and as I was reading about what they had added to the distribution, I came across Likewise Open (something new for me). Likewise Open enables Linux, Mac, and Unix authentication on a Microsoft network using Active Directory credentials.

Likewise Open supports 110 Unix, Linux, and Mac platforms, enforces the same password policies for non-Windows users as for Windows users, and users can access any kerberized services.

Likewise Open is an open source community project sponsored by Likewise Software.

24/04/2008 Posted by | Linux, open source, Productivity | Leave a comment

AutoScan Network – Monitoring Tool


AutoScan is a network monitoring tool for Windows and Linux that scans a network and outputs all attached devices. The network administrator then can input names of devices, what OS they are running, contact information, etc. and makes monitoring a network easier. If a device is attached to the network after AutoScan has been set up, then the administrator has an option to alert himself/herself with the new device being “seen” as an intrusion. The tool also shows all ports that are open on each device that has been scanned. Download the tool and try it for yourself…


05/03/2008 Posted by | Linux, open source, Productivity | Leave a comment

Nmap’s new scripting engine…

In the past, pentesters would have to write their own scripts for further exploration of results found from an Nmap test. But now with the stable release of Nmap 4.5, the Nmap Scripting Engine (NSE) is included (the project actually started with the alpha release in version 4.21)(some scripts can be found in /usr/share/nmap/scripts).

What does NSE do? Well, for example, if a penetration test is ran and an HTTP server is found running on one of the machines; then, in the past, administrators would write a script to determine the version of the web server. Now, with NSE, the scripts are already written or easier to write.

Developers say that NSE is most effective with small to mid-sized organizations. If you have to scan a large organization, Nessus or GFI LANguard would be more effective.

For more information, click here

22/02/2008 Posted by | Linux, open source, Security | Leave a comment

Encrypt Thunderbird Profile with Truecrypt in Linux

Thanks to Chris who sent me this information about encrypting your Mozilla Thunderbird profile through Truecrypt in Linux through symbolic links. Not only do you have all of your profiles encrypted, but you also have easy back-ups. Not to mention all passwords that you have saved in Thunderbird are also encrypted (not reversibly hashed as before). There has been no noticeable performance problems when loading Thunderbird. Chris is working on encrypting his Firefox profile also, but has ran into a couple of issues that he is currently resolving. THANKS CHRIS!

   1. Close Thunderbird
   2. Move the Profile folder for Thunderbird into your truecrypt partition.
   4. ln -s (where the profile is moved to)
   5. Restart Thunderbird
   6. Now it should act as it did before, only now the files are stored in an
      encrypted partition.
   7. If you don't mount the encrypted partition first, it just gives you an
      error that it can't start.
   8. Mount and start again.
   9. Voila!!

29/01/2008 Posted by | open source, Security | | 1 Comment

Spicebird Beta 0.4 Review

I have been using Spicebird now for a little over a week and this is what I think about it.  I know that Spicebird is still in beta, but here are some things that I noticed did not work well.  The IM client that works along side Googletalk does not show some of my contacts as online, when in fact they are online.  Also, Spicebird does not allow for some add-ons (if not all) to be added.  I use Google Calendar through Mozilla’s Lightning and Google Provider to manage my calendar events in Thunderbird.  If Spicebird will not allow for the add-ons, then I am “up a creek” when trying to use my calendar functions.  Other than these things, I am pleased with the progression of Spicebird, the developers are definitely moving in the right direction.  I hope they continue to better this project because I would love to have something on Linux that works as well as Outlook on Windows.  On the other hand, I have not used Spicebird with my domain (mail server, jabber server, etc.) yet, and this may open up new doors.  If you have used Spicebird, I would love to hear your comments about it.

22/01/2008 Posted by | open source, Productivity | | Leave a comment

Spicebird Beta 0.4

The desktop collaboration tool, Spicebird, has released it’s first public beta.  I just downloaded it and am about to install it.  I will write a review about it as soon as I tinker with it.

15/01/2008 Posted by | open source, Productivity | Leave a comment