HYIP-Man: December 2013
Wednesday, December 04, 2013
hidden features on Google search
1. Calculator

Google's calculator function is far more powerful than most people realise. As well as doing basic maths (5+6 or 3*2) it can do logarithmic calculations, and it knows constants (like e and pi), as well as functions like Cos and Sin. Google can also translate numbers into binary code – try typing '12*3 in binary'.

2. Site search

By using the 'site:' keyword, you can make Google only return results from one site. So for example, you could search for "site:hyip-man.blogspot.com linux" and only get stories on linux  from the HYIP-MAN  website.

3. Conversions

Currency conversions and unit conversions can be found by using the syntax: <amount> <unit1> in <unit2>. So for example, you could type '1 GBP in USD', '20 C in F' or '15 inches in cm' and get an instant answer.

4. Time zones

Search for 'time in <place>' and you will get the local time for that place, as well as the time zone it is in.

5. Translations

A quick way to translate foreign words is to type 'translate <word> to <language>'. So for example, 'translate pomme to english' returns the result apple, and 'translate pomme to spanish' returns the result 'manzana'.

6. Search for a specific file type

If you know you are looking for a PDF or a Word file, you can search for specific file types by typing '<search term> filetype:pdf' or '<search term> filetype:doc'

7. Check flight status

If you type in a flight number, the top result is the details of the flight and its status. So, for example, typing in BA 335 reveals that British Airways flight 335 departs Paris at 15.45 today and arrives at Heathrow Terminal 5 at 15.48 local time.

8. Search for local film showings

Search for film showings in your area by typing 'films' or 'movies' followed by your postcode. In the UK, this only narrows it down to your town or city. In the US this is more accurate, as results are displayed according to zip-code.

9. Weather forecasts

Type the name of a city followed by 'forecast', and Google will tell you the weather today, including levels of precipitation, humidity and wind, as well as the forecast for the next week, based on data from The Weather Channel.

10. Exclude search terms

When you're enter a search term that has a second meaning, or a close association with something else, it can be difficult to find the results you want. Exclude irrelevant results using the '-' sign. So for searches for 'apple' where the word 'iPhone' is not used, enter 'apple -iPhone'.

10. Exclude search terms

When you're enter a search term that has a second meaning, or a close association with something else, it can be difficult to find the results you want. Exclude irrelevant results using the '-' sign. So for searches for 'apple' where the word 'iPhone' is not used, enter 'apple -iPhone'.

12. Related search

To search for web pages that have similar content to a given site, type 'related:' followed by the website address into the Google search box. For example, typing 'related:telegraph.co.uk' gives a list of other UK newspaper websites.

3. Package tracking

If you have a package tracking number from the USPS, UPS or FedEx, simply plug it into Google Search and it will provide a convenient link for you.

14. Define

Google's dictionary function allows you to type define:term and get definitions of words. So a search for define:discombobulated tells you that it is the past participle, past tense of discombobulate, which means to disconcert or confuse.

15. Barrel Roll

Simply type “do a barrel roll” into the search bar and Google dutifully obeys. Warning: this Google trick is known to make grown men squeal with delight.

By Sophie Curtis

Battlefield 4 PC game update released

The latest Battlefield 4 update for PC has been rolled out today, bringing numerous fixes to the game including an audio bug where audio would sometimes randomly drop out. Below are the full patch notes for today's update, which should download automatically upon booting up.

CHANG LOG:
  • Removed the blur effect on soldiers that appeared when Commanders were using EMP attacks 
  • Fixed the audio bug where audio sometimes randomly dropped out while playing on certain multiplayer maps (typically Golmud Railway and Hainan Resort) 
  • Fixed the "one-hit kill bug" where occasionally damage from a single bullet was applied multiple times 
  • Fixed a common crash that would occur when exiting from the Single Player Campaign to Main Menu 
  • Tweaked the network and computer performance screen to show proper values. Players can now test their computer and network connection and get recommendations if they need to adjust something to improve their gameplay experience
new Linux worm

Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to traditional computers. Variants exist for chip architectures usually found in devices such as home routers, set-top boxes and security cameras. Although no attacks against these devices have been found in the wild, many users may not realize they are at risk, since they are unaware they own devices that run Linux.

The worm, Linux.Darlloz, exploits a PHP vulnerability to propagate itself in the wild. The worm utilizes the PHP 'php-cgi' Information Disclosure Vulnerability (CVE-2012-1823), which is an old vulnerability that was patched in May 2012. The attacker recently created the worm based on the Proof of Concept (PoC) code released in late Oct 2013.

Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target. Currently, the worm seems to infect only Intel x86 systems, because the downloaded URL in the exploit code is hard-coded to the ELF binary for Intel architectures.

Linux is the best known open source operating system and has been ported to various architectures. Linux not only runs on Intel-based computers, but also on small devices with different CPUs, such as home routers, set-top boxes, security cameras, and even industrial control systems. Some of these devices provide a Web-based user interface for settings or monitoring, such as Apache Web servers and PHP servers.

We have also verified that the attacker already hosts some variants for other architectures including ARM, PPC, MIPS and MIPSEL on the same server.


Figure:The “e_machine” value in ELF header indicates the worm is for ARM architecture.

These architectures are mostly used in the kinds of devices described above. The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux. However, we have not confirmed attacks against non-PC devices yet.

Vendors of devices with hidden operating systems and software, who have configured their products without asking users, have complicated matters. Many users may not be aware that they are using vulnerable devices in their homes or offices. Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software.

To protect from infection by the worm, Symantec recommends users take the following steps:

1.Verify all devices connected to the network

2.Update their software to the latest version

3.Update their security software when it is made available on their devices

4.Make device passwords stronger

5.Block incoming HTTP POST requests to the following paths at the gateway or on each device if not required:

  • -/cgi-bin/php
  • -/cgi-bin/php5
  • -/cgi-bin/php-cgi
  • -/cgi-bin/php.cgi
  • -/cgi-bin/php4

Related:
Free BitDefender Antivirus on UBUNTU LINUX

Red Hat unveils new version of Red Hat Enterprise Linux 6
Red Hat, Inc., a provider of open source solutions, has announced the availability of Red Hat Enterprise Linux 6.5, a new version of Red Hat Enterprise Linux 6.

Red Hat Enterprise Linux 6.5 expands Red Hat's vision of providing an enterprise platform that has the stability to free IT to take on major infrastructure challenges and the flexibility to handle future requirements, with an extensive partner and support ecosystem.

Red Hat Enterprise Linux 6.5 is designed for those who build and manage large, complex IT projects, especially enterprises that require an open hybrid cloud. From security and networking to virtualization, Red Hat Enterprise Linux 6.5 provides the capabilities needed to manage these environments, such as tools that aid in quickly tuning the system to run SAP applications based on published best practices from SAP.

Red Hat Enterprise Linux 6.5 continues the push for integrated security functionality that combines ease-of-use and up-to-date security standards into the platform. The addition of a centralized certificate trust store enables standardized certificate access for security services.


Also included are tools that meet leading security standards, including OpenSCAP 2.1, which implements the National Institute of Standards and Technology's (NIST's) Security Content Automation Protocol (SCAP) 1.2 standard. With these additions, Red Hat Enterprise Linux 6 provides a secure platform upon which to build mission-critical services and applications.

In the financial services and trading-related industries, application latency is measured in microseconds, not seconds. Now, the latest version of Red Hat Enterprise Linux 6 fully supports sub-microsecond clock accuracy over the local area network (LAN) using the Precision Time Protocol (PTP). Precision time synchronization is a key enabler for delivering better performance for high-speed, low latency applications. Red Hat Enterprise Linux 6.5 can now be used to track time on trading transactions, improving time stamp accuracy on archived data or precisely synchronizing time locally or globally.

Thanks to other networking enhancements in Red Hat Enterprise Linux 6.5, system administrators now have a more comprehensive view of network activity. These new capabilities enable sysadmins to inspect IGMP (Internet Group Management Protocol) data to list multicast router ports, multicast groups with active subscribers and their associated interfaces, all of which are important to many modern networking scenarios, including streaming media.

Red Hat Enterprise Linux 6.5 continues Red Hat's commitment to improving the overall virtualization experience and includes several improvements that make it a compelling choice for running in virtualized environments. Sysadmins can now dynamically enable or disable virtual processors (vCPUs) in active guests, making it an ideal choice for elastic workloads. The handling of memory intensive applications as Red Hat Enterprise Linux guests has also been improved, with configurations supported for up to 4TB of memory on the Kernel-based Virtual Machine (KVM) hypervisor.

The KVM hypervisor also integrates with GlusterFS volumes to provide direct access to the distributed storage platform, improving performance when accessing Red Hat Storage or GlusterFS volumes. Finally, guest drivers have been updated to improve performance of Red Hat Enterprise Linux 6.5 running as a guest on supported third-party hypervisors.

As application deployment options grow, portability becomes increasingly important. Red Hat Enterprise Linux 6.5 enables customers to deploy application images in containers created using Docker in their environment of choice: physical, virtual, or cloud. Docker is an open source project to package and run lightweight, self-sufficient containers; containers save developers time by eliminating integration and infrastructure design tasks.

Red Hat Enterprise Linux 6.5 stays current with the advancements in Solid-State Drive (SSD) controller interface, introducing support for NVM Express (NVMe)-based SSDs. The NVMe specification aims to standardize the interface for PCIe-based SSDs and its inclusion in Red Hat Enterprise Linux 6.5 positions the platform to support an expanding range of future NVMe-based devices.

Improvements have also been added to improve enterprise storage scalability within Red Hat Enterprise Linux 6.5. It is now possible to configure more than 255 LUNs connected to a single iSCSI target. In addition, control and recovery from SAN for iSCSI and Fibre Channel has been enhanced, and updates to the kexec/kdump mechanism now make it possible to create debug (dump) files on systems configured with very large memory (e.g. 6TB).

Red Hat Enterprise Linux 6.5 makes it easier to track and manage subscription consumption across the enterprise, integrating subscription tracking into existing business workflow. Usability enhancements include support for remote access to Windows clients and servers that use a newer version of the RDP protocol, including Windows 7 and 8 desktops and Windows Server 2012.
Related Posts:
The most complete list of commands on linux
Valve Has Joined The Linux Foundation

Valve’s love affair with open-source operating system Linux has been steadily growing throughout 2013. In February, Valve released its Steam platform for Linux. In May, it released some of its most popular games for the platform. In September, the company announced its Linux-based SteamOS for its living room ‘Steam Machines.’

Today, the company continued its ties to the open source operating system by officially joining the Linux Foundation. alongside Cloudius Systems and HSA Foundation, who are also joining today.

The Linux Foundation, which was founded in 2000, is a collaborative project that aims to help promote and improve Linux-based projects. The company provides financial support for Linux’s kernel developers to keep the operating system up to day and improving, including Linus Torvalds. The Foundation also helps manage and protect the IP associated with Linux.

“Joining the Linux Foundation is one of many ways Valve is investing in the advancement of Linux gaming. Through these efforts, we hope to contribute tools for developers building new experiences on Linux, compel hardware manufacturers to prioritize support for Linux, and ultimately deliver an elegant and open platform for Linux users,” said Mike Sartain of Valve in a press release.
More @

Free BitDefender Antivirus on UBUNTU LINUX

What is BitDefender ?

BitDefender is a program to check for Windows viruses and malware. It can be run in the background or on demand when required. Once installed it can be found under Applications - Systems Tools. It can be used as an alternative to clamav/clamtk.

Installation

Ubuntu 11.04 and more recent

An updated method of installation for BitDefender using Ubuntu 11.04 is described here:

Ubuntu 10.04 LTS or using Gnome

Add the repository by going to System - Administration - Software Sources, click on the 'Other Software' (previously 'Third Party Software') tab. Now click on 'Add' and enter

deb http://download.bitdefender.com/repos/deb/ bitdefender non-free

Click on 'Close' and press 'Reload' when prompted. Ignore the 'public key is not available' message (as we'll add it next) and press 'Close'. Now in Applications - Accessories - Terminal add the repository key:

wget http://download.bitdefender.com/repos/deb/bd.key.asc  sudo apt-key add bd.key.asc

Now update the apt cache with

sudo apt-get update

Install the graphical interface and command line program (2 files) with

sudo apt-get install bitdefender-scanner-gui

Once complete you now need to log out and log back in again. a menu shortcut will be generated (Applications - System Tools - BitDefender Scanner).

Before running the scanner it's probably best to install the latest virus/malware signatures by clicking on the 'Update' button.

License

BitDefender comes with a standard 30 day free license, when first installed. It is free for private and personal use - the license can be extended to one year by requesting a new license key from http://www.bitdefender.com/site/Products/ScannerLicense/ For all business use a paid for license is required.