jeudi 29 janvier 2015

Audacious Music Player for Linux

audacious

Audacious is an advanced open source audio player based on new QT+ based interface. It is descendant of old XMMS and provides all necessary audio player features such as Music Library, Search, Stream music, equalizer and many more.

What’s new in Audacious 3.6-beta1

  • New QT based interface alongside GTK+.
  • Searching by genre in the search tool plugin
  • The playlist manager can be docked in the GTK+ interface
  • Crossfading on seek and manual song change
  • Support for “album artist” in song tags
  • Search results are filtered by number of songs in the search tool plugin
  • Cue files are automatically added to playlists and to the library
  • Song lengths read from ID3 tags are sanity-checked
  • Adjustable HTTP buffer size
  • Optional calculation of a more accurate song length estimate for MP3 files

…many more. For complete list of changes, features visit release notes.

How to Install Audacious

Debian, Ubuntu, Linux Mint, elementary

Installation via Terminal

sudo apt-get install audacious

Fedora, CentOS

Installation via Terminal

yum install audacious
yum install audacious-plugins-freeworld

Run

  • Type Audacious in dash. Click the launcher icon.
  • For Gnome, go to
Audacious running with classic and GTK+ theme in Ubuntu

Audacious running with classic and GTK+ theme in Ubuntu

Links

Troubleshooting and Support

If you face any issues while installing or using Audacious, you may drop a note using comment section at the end of this article, Or you can post your query in any of the support channels mentioned below.

How to Uninstall/Remove Audacious

Via Terminal

sudo apt-get remove audacious


lundi 19 janvier 2015

Wanna, gonna et gotta – Explications

Lorsque vous regardez des films en V.O. ou que vous écoutez des chansons d’artistes américains, vous tombez certainement souvent sur des mots tels que wanna, gonna ou gotta.

Pourtant, si vous les cherchez dans un dictionnaire classique, il y a peu de chances que vous trouviez ces mots. Comment cela se fait-il ?

Et bien tout simplement, Wanna, gotta et gonna sont des contractions qui se font uniquement à l’oral, c’est pour ça qu’on ne les vois jamais dans les dictionnaires. De plus, il s’agit d’un anglais familier que l’on n’entendra pas dans une conversation au langage soutenu. On les emploie plus souvent dans l’anglais américain que britannique.

Que veulent dire ces trois mots ?

- Wanna est la contraction de « want to« .
Par exemple : « I want to eat a pizza » –> I wanna eat a pizza

- Gotta est la contraction de « got to » voire même parfois de « have got to« , ou même « have to« .
Par exemple : « We have got to go » ou « we have to go » –> we gotta go.

- Enfin, gonna est la contraction de « going to ».
Par exemple : « I am going to eat a pizza. » –> I’m gonna eat a pizza.

Bien sûr il ne faut pas écrire cela dans des lettres ou des documents écrits. Souvenez-vous que ces contractions font uniquement
partie de l’anglais parlé et/ou familier. On les voit aussi souvent dans les chansons.

A Change is Gonna Come - (= a change is going to come) – Sam Cooke

Pour aller plus loin :

Il existe de nombreux autres mots qui sont abrégés de la même manière à l’oral en anglais (principalement l’anglais américain). Par exemple :

Gimme –> give me

Dunno –> don’t know (ex : I dunno = I don’t know)

Lotta –> lot of

Watcha –> what are you, ou « what you » (ex: watcha doin’ ? = what are you doing ?)

Gotcha –> got you (ça veut dire « je t’ai eu » –> gotcha !)

etc.


dimanche 18 janvier 2015

WHAT IS IP SPOOFING ? WHY DO HACKERS USE IT MOSTLY ?

Well we have pointed out a question here that what is actually ip Spoofing and why hackers use it ? First of all we would like to tell you actually what is IP Spoofing and how it works. Below we are going to share the same, First lets have a look at our main question that what is it.

2000px-IP_spoofing_en.svg

IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source.

IP spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trustedhost to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network. Here’s how it works: The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source.

HOW DOES IT WORKS ?

When IP spoofing is employed to hijack a browser, a traveller United Nations agency sorts within the computer address (Uniform Resource Locator) of a legitimate web site is taken to adishonest web content created by the hijacker. for instance, if the hijacker spoofed the Library of Congress information processing system, then any net user United Nations agency typewrittenwithin the computer address www.loc.gov would see spoofed content created by the hijacker.

If a user interacts with dynamic content on a spoofed page, the highjacker will gain access to sensitivedata or pc or network resources. He may steal or alter sensitive knowledge, like a mastercard rangeor arcanum, or install malware . The hijacker would even be able to lead of a compromised pc to use it as a part of a zombie army so as to transfer spam.

WHY HACKERS PREFER IT ?

Well the reasons here are so simple and common reasons one of the reason would be its very easy to use. Yes IP Spoofing is easy for the hackers.

There are several other reasons  like it doesn’t allow them to leave the footprints behind them. So this saves them a bit. IP Spoofing can be done with ease so this is the prime reason behind it.


lundi 5 janvier 2015

Guide to protect yourself from Virus, RAT, and any other harmful files

Here is an in-detail thread about self-protection from all the intrusions, hack attempts, rats, keylogging, stealing etc.

The basic idea is to have a good army of ANTI's to protect yourself. You will need the following tools:-

1) Anti-Virus :- Run an Anti-Virus no matter how powerful your system is. Even free ones would do. Below is the list of free topline Anti-Virus.

* Avira Antivirus Personal
* Avast
* Panda Cloud



2) Anti-Malware :- There are two recommendation that i would give. Both of them are free, do a great job and both run on your demand.

* MalwareBytes Anti-Malware
* Super AntiSpyware



3) Host Intrusion Prevention System :-
This is also known as HIPS. It can Prevent you from unwanted intrusions like telnet acess etc. My personal recommendation is

* Win Patrol



4) Firewall :- Dont forget to run Windows Firewall. If its setup correctly it can block most unwanted intrusions. And you could also run free firewalls out there. Some of the most used ones include

* Comodo Firewall
* Sunbelt Firewall



5) Key Scrambler :- Use some free key scramblers to protect yourself from keylogging. And most importantly use a virtual keyboard while typing in passwords of bank logins, paypal login etc.
Some of the free ones are:-

* KeyScrambler Personal 2.6



6) Browser Selection :- Internet browsers are personal choice. No matter whatever browser you use, never save any password.
If you want to save passwords, then use the following method:-

* Download Mozilla Firefox and install it.
* Open Firefox ----> Tools ----> Options -----> Security Tab.
* Tick "Remember password for sites" and "Use a master password".
* Type in a master password.



Now each time you goto a login page where the password is saved, it will first ask for the master password, hence protecting your password from stealers.

7) Sandboxie :- Use Sandboxie if you are a heavy downloader. What sandboxie does is understood from the picture below:
[Image: FrontPageAnimation.gif]

SandBoxie are sometimes ineffective too as some RAT file like Cybergate has Anti sandboxie option.


8) Use VmWare to run unknown software . It is similar to sandboxie.

9) Never save any password on IM clients like MSN, Yahoo, Skype etc.

10) Never save passwords on ftp clients like filezilla, smart ftp etc.

11) Never download any software which says poker chips creator , free paypal money adder etc. Never believe in such softwareswhich don't exist. Its all fake software which are binded probably with a bot.

12) Never visit links which you are not sure.

13) Never accept pictures sent through IM clients where the sender in unkown.

14) Finally make sure all your windows, anti-virus, anti-malware definitions are upto date .


These will atleast save your from Script-Kiddies or Newbie. Some Advance Exploit Expert could still dismantle your feel of security :)