Wednesday, 30 July 2014


33 Free eBooks On Unix!   
 
From Linux learners to perspective hackers, learning Unix is a must. So here we bring to you 33 free ebooks on Unix for downloading and online reading. Have fun!  


Monday, October 14, 2013:  Unix is a multi-tasking and multi-user computer operating system which was designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. Infact Linux derives much of its basic design from principles established in Unix.

So if you want to dig deep in Linux, then knowledge of Unix is always an advantage and to help you to do that, we bring to you 33 ebooks on Unix and that too free!
Linux, Unix, open source, Free ebooks, free ebooks on unix, free eboks on bash, ebooks on bash commandline, ebooks on gimp, Linux command line, free ebooks on Unix


1. Introduction to Unix by F.G. Fiamingo, L. DeBula, L. Condron - The Ohio State University, 1998

Table of contents: History of Unix; Unix Structure; Getting Started; System Resources and Printing; Shells; Special Unix Features; Text Processing; Other Useful Commands; Shell Programming; Editors; Unix Command Summary; A Short Unix Bibliography

2. Guide to X11 by Steve Ambler, et al. - Wikibooks, 2010

This book is about the X Window System. Some users describe it as the Unix and Linux graphics drivers. X11 is the graphical environment for Unix or Unix-like systems, including *BSD and GNU/Linux; it provides access to screen, keyboard, and mouse.

3. Guide to Unix - Wikibooks, 2010

This book is a guide to Unix and Unix-like operating systems, such as GNU/Linux and *BSD. The book targets Unix or non-Unix users seeking background, Unix system users, and Unix system administrators (background and administrator instructions).

4. The Craft of Text Editing by Craig A. Finseth - Lulu.com, 2006

This book covers all aspects of creating a character-based text editor. In the process, it discusses many aspects of creating a large application program including user interface, speed/memory/I/O tradeoffs, and many other considerations.

5. An Awk Primer by Aurelio A. Heckert - Wikibooks, 2011

Awk has two faces: it is a utility for performing simple text-processing tasks, and it is a programming language for performing complex text-processing tasks. Awk is useful for simple, quick-and-dirty computational programming.

6. A Quick Introduction to Unix by Jim Tyson, et al. - Wikibooks, 2011

Unix is an operating system designed for use on any kind of computer or computing device. It is a multi-tasking, multi-user system. Unix is also part of the underlying technology of the Internet. Many of the web servers run Apache under Unix.

7. Bourne Shell Scripting - Wikibooks, 2011

This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.

8. Learning the vi editor - Wikibooks, 2006

vi is a powerful editor that is ubiquitous amongst Unix and Unix-like operating systems, but is available on many other operating systems. Even if you use another editor you must have a passing knowledge of vi as an administrator.

9. The Daemon, the Gnu, and the Penguin by Peter H. Salus - Reed Media Services, 2008

In addition to covering a history of free and open source, The Daemon, the Gnu, and the Penguin explores how free and open software is changing the world. It is authored by Peter Salus, a noted UNIX, open source, and Internet historian and author.

10. Unix System Administration by Frank G. Fiamingo - The Ohio State University, 1996

Systems administration is the installation and maintenance of the UNIX computer system. The system administrator will need to maintain the software and hardware for the system. This includes hardware configuration, software installation, etc.

11. Writing GNOME Applications by John R. Sheets - Addison-Wesley Professional, 2000

This book will help Linux programmers learn the basics of GNOME and understand how to write applications using this environment. Focusing on the essentials, the book guides you through GNOME's elements and explains how these elements function.

12. Motif Programming Manual by Dan Heller, Paula Ferguson, David Brennan - O'Reilly, 1994

The Motif Programming Manual is a source for complete, accurate, and insightful guidance on Motif application programming. There is no other book that covers the ground as thoroughly or as well as this one. The book has been updated to Motif 1.2.

13. Motif Programming by Dave Marshall - Cardiff School of Computer Science, 1999

This book introduces the fundamentals of Motif programming and addresses wider issues concerning the X Window system. This is a practical introduction to writing Motif programs. The key principles are always supported by example programs.

14. Grokking the GIMP by Carey Bunks - Sams, 2000

This book is not about tips and tricks, and it's not a collection of image manipulation problems. It is about understanding image manipulation concepts, about knowing which GIMP tools are most effective, and about the savvy use of these tools.

15. Filesystem Hierarchy Standard by R. Russell, D. Quinlan, C. Yeoh - Filesystem Hierarchy Standard Group, 2004

The filesystem standard has been designed to be used by Unix distribution developers, package developers, and system implementors. However, it is primarily intended to be a reference on how to manage a Unix filesystem or directory hierarchy.

16. Effective AWK Programming by Arnold D. Robbins, 2001

This tutorial covers the entire spectrum of awk script development: From the basics of opening, searching, and transforming text files, to a comprehensive tutorial for regular expressions, to more advanced features like internetworking.

17. C-shell Cookbook by Malcolm J. Currie - Starlink Project, 2006

This cookbook describes the fundamentals of writing scripts using the UNIX C shell. It shows how to combine Starlink and private applications with shell commands and constructs to create powerful and time-saving tools for performing repetitive jobs.

18. MH and xmh: Email for Users and Programmers by Jerry Peek - O'Reilly, 1995

This book explains how to use, customize, and program with MH electronic mail commands, available on virtually any UNIX system. MH is notable for its flexibility: you'll be able to do things you never thought you could do with an email program.

19. The Unix Programming Environment by Mark Burgess - Oslo College, 2001

The Unix Programming Environment is a revised version of the UNIX compendium which forms the basis for a one or two semester course in UNIX. It is a reference guide which contains enough to help you to find what you need from other sources.

20. GNU Bash Reference Manual by Chet Ramey, Brian Fox - Network Theory Ltd., 2006

A description of the features that are present in the Bash shell. GNU Bash is an implementation of the POSIX.2 specification, with additional features from the C-shell and Korn shell. Most Bourne shell scripts can be run by Bash without modification.

21. Beej's Guide to Unix Interprocess Communication by Brian "Beej Jorgensen" Hall, 2007

This document discusses several methods of Interprocess Communication, some of which are better suited to certain tasks than others. If you know C or C++ and are pretty good using a Unix environment, these documents are for you.

22. The Book of Webmin by Joe Cooper - No Starch Press, 2003

A comprehensive guide to the Webmin system administration tool, documenting its features while explaining each of the core services. With numerous real-world examples, the book covers the standard system features and the most popular services.

23. Porting UNIX Software by Greg Lehey - O'Reilly, 1995

The book deals with the whole life cycle of porting, from setting up a source tree on your system to correcting platform differences. It discusses the differences between versions of UNIX and the areas where porters tend to have problems.

24. ANSI C for Programmers on UNIX Systems by Tim Love, 1999

This document introduces C by providing and explaining examples of common programming tasks. It enables the reader to learn from available source code by clarifying common causes of incomprehension. Exercises form an integral part of the course.

25. AIX Reference for Sun Solaris Administrators by IBM Redbooks - Vervante, 2002

This book is written for Sun Solaris administrators who wants to transfer their knowledge of Solaris UNIX skills to the AIX 5L operating system. This redbook will basically compare system administration tasks in Solaris 8 to AIX 5L Version 5.1.

26. IBM Certification Study Guide AIX V4.3 System Administration by IBM Redbooks - IBM, 1999

This is a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators develop the knowledge and skills required for the certification.

27. UNIX Text Processing by Dale Dougherty, Tim O'Reilly - Hayden Books, 1987

The book shows how to use UNIX to prepare written documents. An introduction to the ex, vi, and sed editors and troff and nroff text processing tools. At the end, these tools are brought together by the make utility to do any text processing job.

28. Bash Guide for Beginners by Machtelt Garrels, 2008

Useful concepts in the daily life of a Bash user. Basic shell knowledge is required. Discussion about common shell practices and building blocks, grep, awk and sed tools with more examples. The second part is about loops, functions and traps.

29. The Art of UNIX Programming by Eric S. Raymond - Addison-Wesley Professional, 2003

The first part of the book is philosophy and history of UNIX, the second part unfolds the Unix principles into more specific advice about design, the third part focuses on tools for solving problems, and the fourth part is about community.

30. Secure Programming for Linux and Unix HOWTO by David A. Wheeler, 2003

The book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.

31. The UNIX-HATERS Handbook by Simson Garfinkel, Daniel Weise, Steven Strassmann - John Wiley & Sons Inc, 1994

Self-help guide for people affected by the world's most esoteric operating system. Turn here for answers to all-important questions, such as... Why does the online documentation lie to us? Why does the user's guide bear no relationship to reality.

32. Advanced Bash-Scripting Guide by Mendel Cooper - Lulu.com, 2008

This text progresses rapidly toward an advanced level of instruction, it is a textbook, self-study manual, reference and source of knowledge on UNIX shell scripting. The exercises and examples invite reader participation. Suitable for classroom use.

33. The Unix Shell Guide by Norman J. Buchanan, Douglas M. Gingrich - University of Alberta, 1996

This book is intended to assist Unix users in understanding and dealing with five of the most popular Unix shells: the Bourne shell (sh); the C shell (csh); the Korn shell (ksh); the TC shell (tcsh); and the Z shell (zsh).

Tuesday, 29 July 2014



Here Are The Top Techniques To Hack A Facebook Account Password   
 
These tricks are some of the more preferred choices of hackers around the world to hack into a Facebook account!  

 Social networking giant Facebook is indeed a giant of sorts in the recent times. With more and more people using the platform to connect with their near and dear ones, the chances of being hacked have also gone haywire. Hackers could make use of either of the following tricks to get through your account for their vested interests. Beware!
Facebook Account Password, hack, hackers, Facebook account, Phishing, Keyloggers, RATs, Primary Email address, Social Engineering
1.Phishing

Phishing is the attempt to sabotage sensitive information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication. These entities normally range from popular social web sites, auction sites, banks, online payment processors to IT administrators. Phishing is normally carried out by means of email spoofing/instant messaging (emails used in the process usually carry links to websites that have been infected with malware.). These spoofed emails/messages usually direct the users to a separate however extremely genuine looking website where they might be asked to re-enter their account information. These genuine-looking websites are in fact fake/scams in disguise and lure users into submitting their sensitive information. Once through, users' account gets hacked!

2.Keyloggers/RATs

Keyloggers are essentially a surveillance tool often used by employers to ensure employees use work computers for business purposes only. However, with time hackers have come to make good use of the tool for their own vested interests. The process of keylogging becomes particularly effective if the miscreant somehow gains physical access to the victim's computer. All that a hacker needs to do now is to install a keylogger into the victims's computer and direct the same to his/her destination. The keylogger will now record all the victim's keystrokes into a log file and send it to the destination chosen by the hacker. The hacker can then use these logs to acquire the victims's account information and hack into it.

3.Primary Email address

This is quite an obvious way for hackers to get through your Facebook accounts. If a hacker is able to somehow hack into your primary email address what you're also using to log into Facebook, well, it's a walk in the park for him/her after that. The hacker can easily use Facebook's 'Forgot password' trick to make the social networking site to send the victim's password to the designate primary email account, that unfortunately has already been compromised.

4.Social Engineering

Social Engineering is the psychological manipulation of people into performing actions or divulging confidential information. This will eventually depend upon the hacker's logical expertise. It could involve a probable guessing of the password based on the victim's Facebook and other social networking profiles. 

Thursday, 24 July 2014



10 Most Bizarre Programming Languages Ever! 

 
If you thought that programmers can’t have a sense of humour, then take a look at these programming languages. These are a few most strangely named programming languages.  


  Programming languages aren’t always meant to write complex codes. Sometimes programmers develop languages that aren’t meant to be used for high level coding. There are some truly bizarre programming languages, which fall under the Esoteric Programming Language or Esolang category. These are languages that have been developed to test a programmers ideas or simply as a joke. Real world usability is perhaps the last things on the developer’s mind in this case.
esoteric programming languages, brainfuck, malbolge, INTERCAL, Befunge, Piet, Velato, Chef, Whitespace, tech news, bizarre programming languages, news

INTERCAL: Creators Donald R. Woods and James M. Lyon wanted to create a programming language, which had no similarity to any existing language. The authors say that “the full name of the language is Compiler Language With No Pronounceable Acronym, which for obvious reasons, abbreviated INTERCAL”.

The language was developed in 1972 and it uses redundant and cryptic syntax for simple operations. It’s user manual has directions like, “Caution! Under no circumstances confuse the mesh with the interleave operator, except under confusing circumstances!”

The program’s compiler rejects a program if the program doesn’t have enough PLEASE modifiers and it also uses statements like FORGET and IGNORE.

Whitespace: This is an esoteric language, which uses whitespace characters for its syntax. The language was designed by Edwin Brady an Chris Morris on April Fool’s Day 2003.

Chef: Programs in this language look like cooking recipes. It was designed by David Morgan-Mar in 2002. Stacks in this language are called mixing bowls or baking dishes, while the instructions that manage the stacks are said to be mixing or stirring.

Velato: This language uses MIDI files as its source code. The programs are defined by the pitch and order of notes. The programs in this language can be represented on paper as sheets of music.

Shakespeare: In this language, your program is presented like a Shakespearean play. The first line of the program is the title, while the variables are declared in the Dramatis Personae. Each of the variables must be named after a character from a Shakespearean play. The language was designed by Jon Aslung and Karl Hasselstrom.

Omgrofl: Created in 2006 by one Juraj Borza, this language works on internet slangs. As it evident by the name itself, which is composed of the slangs omg (oh my god) and rofl (rolling on the floor laughing). Variables in this language have to be slangs, like lol, lool, looool and so on. The conditional statement ‘if’ in C is replaced by ‘wtf’ in this language.

Piet: It was named after Piet Mondrian, the geometric abstract painter and has been designed by the designer of Chef. Programming is done through colours.

Befunge: In this language, the programs are arranged on a two dimensional grid, which is known as the playfield. It was created in 1992 by one Chris Pressey, who wanted to make is as tough as possible to compile a program.

Malbolge: If you’ve read Dante’s Inferno, then you would definitely recognise the name of the eight circle of Hell. This programming language was designed in 1998 by Ben Olmstead. This is a step beyond befunge and wants to make it as difficult as possible to write the code itself. The first Malboge program took two years to appear and that too was not written by a human, but a Lisp program.

Brainfuck: This is perhaps the most well known esoteric programming language ever created. The language was created in 1992 by Urban Muller who wanted to design a language that could be implemented using the smallest compiler. Compilers of branfuck have been smaller than 200 bytes. It has only eight commands, which are — > < + _ . , [ ]. 
Apache OpenOffice Vs LibreOffice   
 
We bring you the pros and cons of using Apache OpenOffice and LibreOffice.  
 
  Apache OpenOffice and LibreOffice have descended from OpenOffice.org. Over the past couple of years, nearly all Linux distributions have made LibreOffice as their default office suite. But in the past one and a half year, OpenOffice has been relaunched into a newly organized Apache project. This gives free software users two options in place of one.
Linux, OpenOffice, Apache, LibreOffice, Apps, Difference, Formats, Fonts, Support, Extension policies.

As cited on datamation.com, here’s looking at a comparative of the two apps.

Differences in the Apps – Many features in LibreOffice's and OpenOffice's applications are similar. In Draw, there is no difference, in Impress, the main difference being that LibreOffice's latest release includes support for controlling a slide show from an Android device. The selection of slide backgrounds is different between the two and either selection should be sufficient.

In case of Writer, the most popular application, the differences are basically in a minor key.

In LibreOffice, the status bar at the base of the editing window has a word and character count. Also, LibreOffice's comments can be anchored to paragraphs rather than a single point. LibreOffice also has a simplified Find field, which is the same as that in a web browser.
Formats and Fonts –Major differences come under the category of format and font support. For exmple, OpenOffice still supports saving to formats. It can open .docx files, but, unlike LibreOffice, cannot save to it.

LibreOffice also offers font support with the latest version supporting OpenType which is the preferred format for modern fonts as it has support for multiple languages and advanced typography. Neither OpenOffice nor LibreOffice interact best with Microsoft formats when a document is mostly text and has a minimum of tables, draw objects, and complex formatting.

But in case you want to exchange native and Microsoft formats, LibreOffice has certain advantages. It can not only read and write to recent Microsoft formats, but also does font handling, which removes any need for font substitution.

Extension Policies - OpenOffice as well as LibreOffice can support well-rounded collections of extensions that can be downloaded and added within minutes to enhance or change features. In many cases, an extension that can work with one will work with the other too. The difference being in LibreOffice you don’t need to install the most popular extensions as it comes installed with them. They are already enabled or integrated. The extensions include Lightproof, a basic grammar checker; Report Builder for summarizing and printing from data bases; Presentation Minimizer for reducing the size of presentations; Wiki Publisher for blogging, and Presentation Console for delivering slide shows, as well as a number of others.
These extensions are available for OpenOffice as well. In OpenOffice, you don’t need to be aware of them and make efforts to locate them.

Interfaces in Transition - Both OpenOffice and LibreOffice are suites that come with a robust set of features, but have interfaces that are stuck in the mid-1990s. In the latest version, OpenOffice's has limited its changes to the side bar. This feature has to be specifically enabled in LibreOffice from Tools -> Options -> LibreOffice -> Advance.

The sidebar consists of features for manual formatting. At its best, the sidebar is a simplified version of some of the tabs for formatting characters and paragraphs, like Border tab in all applications, and the Format tab for spreadsheet cells. LibreOffice offers the task pane in Impress, while is similar to the sidebar, summarizing many of the steps in slide design in the names of its tabs.

However, it is the Writer editing window where many of LibreOffice's interface enhancements have taken place. It has a word and character count in the status bar at the bottom of the window, and the cramped sub-menus for managing and editing templates have been changed with a stream-lined interface in which buttons replace drop-down menus.

Making a Choice

LibreOffice has a small but a big advantage. While Apache OpenOffice was being formed, LibreOffice got talent around the world who wanted the code. The main advantage for LibreOffice is what can be termed as the license-drain. While the Apache License is compatible with LibreOffice's GNU General Public License, the Less GNU General Public License is incompatible with the Apache License.

While LibreOffice can easily borrow code from OpenOffice, OpenOffice cannot borrow from LibreOffice. This situation may vary especially as Apache OpenOffice benefits from huge name recognition in comparison to LibreOffice. Yet LibreOffice has instantly earned wide support and has an active community that has done more in three years than OpenOffice.org managed in twelve



Top 10 Open Source Anti-Virus And Anti-Malware Apps   
 
Looking for the best free and open source apps to protect against malware? Here they are!  
Rate this news:   (3 Votes)
  Contrary to what many people think, anti-malware programs do not end with Symantec, McAfee etc. The world of open source has quite a few options in the anti-malware and anti-spyware segment. Here are 10 of the best that you can use!
malware, spyware, worms, trojans, viruses, antimalware, antispyware, open source security apps, Clam AntiVirus, best antimalware apps, top antimalware apps

1. ClamWin Free Antivirus

This is an app that works only on the Windows platform and works on the well known ClamAV engine in order to detect spyware and viruses. It has a Microsoft Outlook plug-in, automatic downloads and other useful features.

2. ClamAV

This is an open source product that is based on the Clam Antivirus engine. It is specially designed in order to protect email gateways. It has features like command line scanners, automatic updates. It works on Linux, Unix and BSD platforms.

3. Moon Secure Antivirus

This open source app is based on ClamAV and works on the Windows platform. Although it is based on ClamAV, developers usually use an alternate antivirus engine.

4. Rootkit Hunter

This is an open source tool that is used for scanning the system for rootkits and unwanted tools. You can not use it for scheduled or live scanning but you can still run Rootkit hunter daily. It works on Linux and Unix platforms.

5. AMaVis

AMaVis is short for A Mail Virus Scanner. As the name suggests, this app stands between your anti-virus software and email client, scanning incoming emails for viruses. It is compatible with all platforms.

6. ClamMail

This is a free antivirus software that protects messages that you receive on Thunderbird, Outlook, Eudora dn other POP3-based applications. It operated on the Windows platform and is a combination of the POP3 email proxy and the ClamAV engine.

7. P3Scan

This is an email proxy serve that can be used for scanning both outgoing and incoming messages. It cans for malware, trojans, viruses, spam and worms. It operates on the Linux platform and is also based on the ClamAV engine.

8. Viralator

This is an open source app that works alongside your anti-virus and supplements you computer's protection. It blocks malware, which may have evaded your anti virus. It is compatible with Linux and Unix platforms.

9. xpy

This is a tiny program, which is less than 60 KB in size. It adds to your computer's performance and improves its security by closing vulnerabilities that may lead to spyware creeping across your Windows-based system.

10. Nixory

This is a open source app that has been designed for improving the protection for Firefox users. It blocks unwanted spyware and cookies and works along side other anti spyware programs. 




17 Free Ebooks For Those Interested In Java!

Java is an unescapable language for any Android developer today. From games to app, Java programming is at the core of almost all Android development. In addition, it's got other uses too. So, these 17 free ebooks, would make for a valuable addition for any programmer's collection.

Wednesday, 23 July 2014


8 Free Open Source Game Engines For Android Game Development 


Game engines give developers the tools required to pull the several elements of a game together into one unit. With mobile gaming picking up, more developers are paying attention to Android and iOS platforms. So, keeping that in mind, here are eight free gaming engines that you can use for your next game!

1. Alien3D: This is an OpenGL ES-based game engine for the Android operating system that is available for free.

Language: Java
Platforms: Android 
Price: Free 
License: Apache License 2.0 (Open Source) 

2. AllBinary Platform: This is another OpenGL ES-based game engine that can be used for Android games. The ZeptoRacer 3D game was developed on this.

Language: Java
Platforms: Android HTML5
Price: Free
License: AllBinary Open License Version 1 (Open Source) 

3. AndEngine: This free 2D OpenGL-based game engine was used to design games like Spaceman Bob, Man vs Mosquito, Xelorians, Save the Earth and many others.

Language: Java 2D games
Platforms: Android
Price: Free
License: Apache license (Open Source)

4. Android Box2d: This rigid 2D body physics engine has been written in C++ and is an open source engine available for free.

Language: Java
Platforms: Android 
Price: Free 
License: GNU GPL v2 (Open Source)

5. Android GL Engine: This engine, coded in Java, can be used in order to develop 2D games for Google’s Android operating system.

Language: Java
Platforms: Android 
Price: Free 
License: GNU Lesser General Public License (Open Source)

6. App Game Kit: This game engine allows you to code once and then run your game on multiple platforms. It has been used for games like App-In-Ball Pinball Simulator for Android and Big Guys for iPhone.

Language: C++
Platforms: iOS, Android, Windows
Price: Free Trial
License: Proprietary

7. Ardor3D: Using this engine, you can run your games on computer platforms as well. These include Windows, Linux, Mac OS X and Solaris. The engine supports both Java and OpenGL.

Language: Java
Platforms: Android
Price: Free
License: libpng/zlib license (Open Source)

8. BatteryTech Engine: This engine can again be used for a variety of mobile platforms like Android, iOS and others. It provides direct access to several XCode and Android projects and uses many open standards. You can use it for both 2D and 3D games. 

Language: C++
Platforms: iPhone, Android 
Price: Free 
License: Proprietary