Một vài tổng kết về họat động phần mềm mã mở ở Việt Nam thời gian gần đây:
A. Về Cộng đồng LUG ở Việt Nam
Danh sách các cộng đồng chính:
- HanoiLug (hơn 300 thành viên) http://blog.hanoilug.org/ và trung
bình 10 emails trao đổi hàng ngày.
- HueLug http://www.huelug.org/
- SaigonLUG http://saigonlug.org/ với 75 thành viên và trung bình 4
emails trao đổi hàng ngày.
- Ubuntu-VN http://www.ubuntu-vn.org/ với hơn 21 ngàn thành viên và
130 ngàn bài viết.
Các LUG có nhiều hoạt đồng online và offline thường xuyên.
# LUG là từ viết tắt của Linux Users Group
Các nhóm FOSS khác:
Ruby on Rails, NukeViet, Magento Vietnam, Vietnam Java, OpenStreetMap
B. Doanh nghiệp mã mở:
Về các công ty liên quan tới mã mở: Theo điều tra sơ bộ, hiện có
khoảng 20 công ty ở Việt Nam chuyên về mã mở.
Vài nhận xét nhỏ về các công ty mã mở ở Việt Nam.
1. Có thể nói rằng toàn bộ các công ty IT *sử dụng* phần mềm mã mở
Chú ý: Firefox cũng là phần mềm mã mở.
Người sử dụng PNMM không ý thức được rằng họ đang dùng PNMM
và do đó không hiểu được trách nhiệm, quyền lợi của
mình với PNMM và phần mềm đóng.
2. Xu hướng tùy biến các PNMM có sẵn là chủ đạo
Lý do: Chi phí tiếp cận nhỏ, phù hợp với các công ty vừa và nhỏ ở Việt Nam.
3. Phát triển PNMM làm sản phẩm chủ đạo và coi đó là một mô hình kinh doanh
chưa phát triển ở Việt Nam.
Lý do: Xem 2.
C. Về dự án MOST:
Mục tiêu: Tạo một hệ điều hành tiếng Việt dành cho người Việt.
Thánh viên: Hơn 160 thành viên trên toàn quốc và nước ngoài:
Thành quả: Việt hóa những phần mềm chính với tỉ lệ Việt Hóa cao.
LibreOffice/OpenOffice.org: 95+%
Gnome: 90+%
Mozilla Firefox/ThunderBird: 97+%
Ubuntu (toàn bộ bản phân phối): 90+%
MOST là một dự án đòi hỏi cập nhật bản dịch liên tục và chuẩn hóa những từ ngữ,
đặc biệt là thuật ngữ IT mới xuất hiện trong quá trình dịch.
Dự án MOST đã sử dụng hiệu quả và công minh nguồn tài trợ của Bộ Khoa
học và Công nghệ trong việc Việt Hóa những sản phẩm trên.
Trao đổi: http://lists.hanoilug.org/listinfo/du-an-most
Trang chủ: http://du-an-most.hanoilug.org/MostWiki
2011/08/20
2011/08/11
HTC hydra cracking speed
If password length is not greater than 5 and contains only lower cases,
it will take less than 1 hour and a half to crack such telnet password.
http://thc.org/thc-hydra/
wget http://www.thc.org/releases/hydra-6.5-src.tar.gz
tar xvzf hydra-6.5-src.tar.gz
cd hydra-6.5-src
./configure --prefix=$HOME; make; make install
[user@serverName hydra-6.5-src]$ cd
[user@serverName ~]$ hydra
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only fo r legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:43:14
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns]
[-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
[-4|-6] [-x MIN:MAX:CHARSET] [server service [OPT]]|[service://server[:PORT][/O PT]]
Options:
-R restore a previous aborted/crashed session
-S connect via SSL
-s PORT if the service is on a different default port, define it here
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help
-e ns additional checks, "n" for null password, "s" try login as pass
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE server list for parallel attacks, one entry per line
-o FILE write found login/password pairs to FILE instead of stdout
-f exit after the first found login/password pair (per host if -M)
-t TASKS run TASKS number of connects in parallel (default: 16)
-W TIME defines the wait time between connects for one thread in seconds
-w TIME defines the max wait time in seconds for responses (default: 20)
-4 / -6 prefer IPv4 (default) or IPv6 addresses
-v / -V verbose mode / show login+pass combination for each attempt
-U service module usage details
server the target server (use either this OR the -M option)
service the service to crack. Supported protocols: cisco cisco-enable cvs ft p[s] http[s]-{head|get} http[s]-{get|post}-form http-proxy icq irc imap ldap2 ld ap3[-{cram|digest}md5] mssql mysql nntp oracle-listener oracle-sid pcnfs pop3 pc anywhere rexec rlogin rsh sip smb smtp smtp-enum snmp socks5 svn teamspeak telne t vnc vmauthd xmpp
OPT some service modules need special input (use -U to see details)
Use HYDRA_PROXY_HTTP/HYDRA_PROXY_CONNECT and HYDRA_PROXY_AUTH env for a proxy.
Hydra is a tool to guess/crack valid login/password pairs - use allowed only
for legal purposes! If used commercially, tool name, version and web address
must be mentioned in the report. Find the newest version at http://www.thc.org/t hc-hydra
Examples:
hydra -l john -p doe 192.168.0.1 imap
hydra -l john -p doe 192.168.0.1 imap PLAIN
hydra -l john -p doe 192.168.0.1 imap PLAIN -s 143
hydra -l john -p doe imap://192.168.0.1/PLAIN
hydra -l john -p doe imap://[::FFFF:192.168.0.1]:143 -6
[user@serverName ~]$ hydra -x -h
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:45:41
Hydra bruteforce password generation option usage:
-x MIN:MAX:CHARSET
MIN is the minimum number of characters in the password
MAX is the maximum number of characters in the password
CHARSET is a specification of the characters to use in the generation
valid CHARSET values are: 'a' for lowercase letters,
'A' for uppercase letters, '1' for numbers, and for all others,
just add their real representation.
Examples:
-x 3:5:a generate passwords from length 3 to 5 with all lowercase letters
-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers
-x 1:3:/ generate passwords from length 1 to 3 containing only slashes
-x 5:5:/%,.- generate passwords with length 5 which consists only of /%,.-
The bruteforce mode was made by Jan Dlabal, http://houbysoft.com/bfg/
[user@serverName ~]$
[user@serverName ~]$ hydra -l user -x 3:5:a localhost telnet
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:47:10
[DATA] 16 tasks, 1 servers, 12355928 login tries (l:1/p:12355928), ~772245 tries per task
[DATA] attacking service telnet on port 23
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
[STATUS] 282.00 tries/min, 282 tries in 00:01h, 12355646 todo in 730:15h
The session file ./hydra.restore was written. Type "hydra -R" to resume session.
it will take less than 1 hour and a half to crack such telnet password.
http://thc.org/thc-hydra/
wget http://www.thc.org/releases/hydra-6.5-src.tar.gz
tar xvzf hydra-6.5-src.tar.gz
cd hydra-6.5-src
./configure --prefix=$HOME; make; make install
[user@serverName hydra-6.5-src]$ cd
[user@serverName ~]$ hydra
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only fo r legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:43:14
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns]
[-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
[-4|-6] [-x MIN:MAX:CHARSET] [server service [OPT]]|[service://server[:PORT][/O PT]]
Options:
-R restore a previous aborted/crashed session
-S connect via SSL
-s PORT if the service is on a different default port, define it here
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help
-e ns additional checks, "n" for null password, "s" try login as pass
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE server list for parallel attacks, one entry per line
-o FILE write found login/password pairs to FILE instead of stdout
-f exit after the first found login/password pair (per host if -M)
-t TASKS run TASKS number of connects in parallel (default: 16)
-W TIME defines the wait time between connects for one thread in seconds
-w TIME defines the max wait time in seconds for responses (default: 20)
-4 / -6 prefer IPv4 (default) or IPv6 addresses
-v / -V verbose mode / show login+pass combination for each attempt
-U service module usage details
server the target server (use either this OR the -M option)
service the service to crack. Supported protocols: cisco cisco-enable cvs ft p[s] http[s]-{head|get} http[s]-{get|post}-form http-proxy icq irc imap ldap2 ld ap3[-{cram|digest}md5] mssql mysql nntp oracle-listener oracle-sid pcnfs pop3 pc anywhere rexec rlogin rsh sip smb smtp smtp-enum snmp socks5 svn teamspeak telne t vnc vmauthd xmpp
OPT some service modules need special input (use -U to see details)
Use HYDRA_PROXY_HTTP/HYDRA_PROXY_CONNECT and HYDRA_PROXY_AUTH env for a proxy.
Hydra is a tool to guess/crack valid login/password pairs - use allowed only
for legal purposes! If used commercially, tool name, version and web address
must be mentioned in the report. Find the newest version at http://www.thc.org/t hc-hydra
Examples:
hydra -l john -p doe 192.168.0.1 imap
hydra -l john -p doe 192.168.0.1 imap PLAIN
hydra -l john -p doe 192.168.0.1 imap PLAIN -s 143
hydra -l john -p doe imap://192.168.0.1/PLAIN
hydra -l john -p doe imap://[::FFFF:192.168.0.1]:143 -6
[user@serverName ~]$ hydra -x -h
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:45:41
Hydra bruteforce password generation option usage:
-x MIN:MAX:CHARSET
MIN is the minimum number of characters in the password
MAX is the maximum number of characters in the password
CHARSET is a specification of the characters to use in the generation
valid CHARSET values are: 'a' for lowercase letters,
'A' for uppercase letters, '1' for numbers, and for all others,
just add their real representation.
Examples:
-x 3:5:a generate passwords from length 3 to 5 with all lowercase letters
-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers
-x 1:3:/ generate passwords from length 1 to 3 containing only slashes
-x 5:5:/%,.- generate passwords with length 5 which consists only of /%,.-
The bruteforce mode was made by Jan Dlabal, http://houbysoft.com/bfg/
[user@serverName ~]$
[user@serverName ~]$ hydra -l user -x 3:5:a localhost telnet
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-10 18:47:10
[DATA] 16 tasks, 1 servers, 12355928 login tries (l:1/p:12355928), ~772245 tries per task
[DATA] attacking service telnet on port 23
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
Error: Not a TELNET protocol or service shutdown: (null)
[STATUS] 282.00 tries/min, 282 tries in 00:01h, 12355646 todo in 730:15h
The session file ./hydra.restore was written. Type "hydra -R" to resume session.
Microsoft patches 1990s-era 'Ping of Death'
Tin hot về security của Microsoft đây.
Đúng là với mã đóng thì security chỉ là thuốc an thần.
Microsoft today issued 13 security updates that patched 22 vulnerabilities in Internet Explorer, Windows, Office and other software, including one that harked back two decades to something dubbed "Ping of Death."
http://www.computerworld.com/s/article/9219022/Microsoft_patches_1990s_era_Ping_of_Death_
Đúng là với mã đóng thì security chỉ là thuốc an thần.
Microsoft today issued 13 security updates that patched 22 vulnerabilities in Internet Explorer, Windows, Office and other software, including one that harked back two decades to something dubbed "Ping of Death."
http://www.computerworld.com/s/article/9219022/Microsoft_patches_1990s_era_Ping_of_Death_
2011/08/04
Install zip 3.0 on Linux
Install zip 3.0 on Linux #latest as of 2011/08/03
sudo yum -y install zip
$ rpm -qil zip
-> Sẽ biết gói "zip" ở http://www.info-zip.org/
Download
wget ftp://ftp.info-zip.org/pub/infozip/src/zip30.tgz
tar xvzf zip30.tgz
cd zip30
vim INSTALL
# make -f unix/Makefile generic
# make -f unix/Makefile install
sudo yum -y install zip
$ rpm -qil zip
-> Sẽ biết gói "zip" ở http://www.info-zip.org/
Download
wget ftp://ftp.info-zip.org/pub/infozip/src/zip30.tgz
tar xvzf zip30.tgz
cd zip30
vim INSTALL
# make -f unix/Makefile generic
# make -f unix/Makefile install
gzip, bip2, xz benchmark
[vuhung@ tmp]$ time tar czf FileName.`date -I`.tar.gz /home/FileName/FileName/
tar: Removing leading `/' from member names
real 0m15.661s
user 0m14.136s
sys 0m2.837s
[vuhung@ tmp]$ time tar cjf FileName.`date -I`.2.tar.bz2 /home/FileName/FileName/
tar: Removing leading `/' from member names
real 1m51.738s
user 1m49.911s
sys 0m3.423s
[vuhung@ tmp]$ time tar cJf FileName.`date -I`.2.tar.xz /home/FileName/FileName/
tar: Removing leading `/' from member names
real 2m26.520s
user 2m24.423s
sys 0m3.217s
[vuhung@ tmp]$ ls -l FileName.2011-08-03.*
-rw-rw-r-- 1 vuhung vuhung 148975540 Aug 3 20:03 FileName.2011-08-03.2.tar.xz
-rw-rw-r-- 1 vuhung vuhung 191752152 Aug 3 20:00 FileName.2011-08-03.2.tar.bz2
-rw-rw-r-- 1 vuhung vuhung 199892101 Aug 3 19:56 FileName.2011-08-03.tar.gz
tar: Removing leading `/' from member names
real 0m15.661s
user 0m14.136s
sys 0m2.837s
[vuhung@ tmp]$ time tar cjf FileName.`date -I`.2.tar.bz2 /home/FileName/FileName/
tar: Removing leading `/' from member names
real 1m51.738s
user 1m49.911s
sys 0m3.423s
[vuhung@ tmp]$ time tar cJf FileName.`date -I`.2.tar.xz /home/FileName/FileName/
tar: Removing leading `/' from member names
real 2m26.520s
user 2m24.423s
sys 0m3.217s
[vuhung@ tmp]$ ls -l FileName.2011-08-03.*
-rw-rw-r-- 1 vuhung vuhung 148975540 Aug 3 20:03 FileName.2011-08-03.2.tar.xz
-rw-rw-r-- 1 vuhung vuhung 191752152 Aug 3 20:00 FileName.2011-08-03.2.tar.bz2
-rw-rw-r-- 1 vuhung vuhung 199892101 Aug 3 19:56 FileName.2011-08-03.tar.gz
登録:
投稿 (Atom)