Cookie Law – La stupidità nel regolamentare l’uso dei cookie

Premetto che ritengo la “cookie law” una delle cose più stupide ed inutili mai viste.
Paragonabile FORSE solo alla norma sugli amministratori di sistema in quando a idiozia.
Detto questo… visto che siamo TUTTI costretti ad adeguarci … UBBIDISCO..

Ma vorrei sollevare una riflessione… quanto sarà costato e costerà a tutti, enti pubblici e società private, questo stupido giochetto ?

Meditate gente, meditate!

Detto questo … ecco la soluzione più rapida che ho trovato (quando non sia possibile adottare un plugin ad HOC)

Nella sezione HEAD del sito aggiungere quanto segue:


<!-- ---------------- cookie ------------------------- -->
<link rel="stylesheet" media="screen" href="http://www.provincia.prato.it/cookie.css" type="text/css" />
<!-- ---------------- /cookie ------------------------- -->

Nel Body inserire in alto quanto segue:

<!-- ---------------- cookie ------------------------- -->
<div id="banner_cookie">
<div id="banner_interno">
<div id="banner_sx">
Questo sito utilizza cookies tecnici e di terze parti per funzionalit&agrave; quali la condivisione sui <i>social network</i> e/o la visualizzazione
di media.
Se non acconsenti all'utilizzo dei cookie di terze parti, alcune di queste funzionalit&agrave; potrebbero essere non disponibili.
Per maggiori informazioni consulta la <a target="_blanc" href="http://www.miosito.it/privacy_cookie.html">privacy policy</a>
</div>
<div id="banner_dx">
Acconsenti all'utilizzo di cookie di terze parti?
<br />
<br />
<a href='javascript:void(0);' onclick='CookieOk();'><b>Si, acconsento</b></a>
<a href='javascript:void(0);' onclick='CookieKo();'><b>No, non acconsento</b></a>
</div>
</div>
</div>

<script type="text/javascript" src="http://www.miosito.it/cookie.js"></script>
<!-- ---------------- /cookie ------------------------- -->

I due file sono i seguenti:

cookie.css:

#banner_cookie {
display: none;
z-index: 99999;
position: fixed;
left: 0px;
right: 0px;
top: 0px;
width: 100%;
min-height: 40px;
padding: 14px;
background-color: #000000;
background-color: rgba(0, 0, 0, 0.8);
color: #ffffff;
line-height: 1.5;
font-family: "Lucida Grande", Verdana, Arial, Helvetica, sans-serif;
font-size: 14px;
text-align: left;
}

#banner_interno {
width: 960px;
margin-left: auto;
margin-right: auto;
}
#banner_sx {
width: 60%;
float: left;
padding-right: 24px;
}

#banner_dx {
width: 35%;
float: right;
}

#banner_sx a {
color: #ffffff;
text-decoration: underline;
}

#banner_sx a:hover, #banner_sx a:focus {
color: #000000;
background: #ffffff;
text-decoration: underline;
}

#banner_dx a {
padding: 4px;
border-radius: 4px;
background: #dfdfdf;
color: #000000;
font-weight: bold;
text-decoration: none;
}

#banner_dx a:hover, #banner_dx a:focus {
color: #dfdfdf;
background: #000000;
}

cookie.js:

function CookieOk()
{
var expiration = new Date();
expiration.setTime(expiration.getTime() + (60000*60*24*365));
setCookie("ok_cookie","1",expiration,"/");
document.getElementById("banner_cookie").style.display="none";
window.location.reload(true);
}
function CookieKo()
{
var expiration = new Date();
expiration.setTime(expiration.getTime() + (60000*60*24*365));
setCookie("ok_cookie","2",expiration,"/");
document.getElementById("banner_cookie").style.display="none";
}

function setCookie(name,value,expires,path,domain,secure){document.cookie=name+"="+escape(value)+((expires==null)?"":"; expires="+expires.toGMTString())+((path==null)?"":"; path="+path)+((domain==null)?"":"; domain="+domain)+((secure==null)?"":"; secure")}
function getCookie(name){var cname=name+"=";var dc=document.cookie;if(dc.length>0){begin=dc.indexOf(cname);if(begin!=-1){begin+=cname.length;end=dc.indexOf(";",begin);if(end==-1)end=dc.length;return unescape(dc.substring(begin,end))}}return null}
function delCookie(name,path,domain){if(getCookie(name)){document.cookie=name+"="+((path==null)?"":"; path="+path)+((domain==null)?"":"; domain="+domain)+"; expires=Thu, 01-Jan-70 00:00:01 GMT"}}

var check_cookie = getCookie("ok_cookie");

if ( (check_cookie == null) || (window.location.href.indexOf("privacy")>0) )
{
document.getElementById("banner_cookie").style.display="block";
}

Installazione di Ocserv – openconnect server vpn

Installazione

yum install autoconf automake gcc libtasn1-devel zlib zlib-devel  trousers trousers-devel gmp-devel gmp xz texinfo libnl-devel libnl  tcp_wrappers-libs tcp_wrappers-devel tcp_wrappers dbus dbus-devel  ncurses-devel pam-devel readline-devel bison bison-devel flex gcc  automake autoconf wget
wget http://www.infradead.org/~tgr/libnl/files/libnl-3.2.25.tar.gz
tar -zxvf nettle-2.7.1.tar.gz
cd nettle-2.7.1
./configure --prefix=/opt/
make && make install
tar -xvf gnutls-3.3.10.tar.xz
cd gnutls-3.3.10
export LD_LIBRARY_PATH=/opt/lib/:/opt/lib64/
NETTLE_CFLAGS="-I/opt/include/" NETTLE_LIBS="-L/opt/lib64/ -lnettle"  HOGWEED_CFLAGS="-I/opt/include" HOGWEED_LIBS="-L/opt/lib64/ -lhogweed"  ./configure --prefix=/opt/
wget http://www.carisma.slowglass.com/~tgr/libnl/files/libnl-3.2.24.tar.gz
tar xvf libnl-3.2.24.tar.gz
cd libnl-3.2.24
./configure --prefix=/opt/
make && make install
tar -xvf ocserv-0.8.8.tar.xz
cd ocserv-0.8.8
ls
LIBGNUTLS_CFLAGS="-I/opt/include/" LIBGNUTLS_LIBS="-L/opt/lib/ -lgnutls"  LIBNL3_CFLAGS="-I/opt/include" LIBNL3_LIBS="-L/opt/lib/ -lnl-3  -lnl-route-3" ./configure --prefix=/opt/
make && make install
export LD_LIBRARY_PATH=/opt/lib/:/opt/lib64/

export PATH=$PATH:/opt/bin:/opt/sbin

Configurazione di Ocserv – openconnect server vpn

Generazione dei certificati

mkdir /etc/ocserv/

cd /etc/ocserv/

export LD_LIBRARY_PATH=/opt/lib/:/opt/lib64/

export PATH=$PATH:/opt/bin:/opt/sbin

certtool --generate-privkey --outfile ca-key.pem

cat << _EOF_ > ca.tmpl
cn = "VPN CA"
organization = "Provincia di Prato"
serial = 1
expiration_days = 9999
ca
signing_key
cert_signing_key
crl_signing_key
_EOF_

certtool --generate-self-signed --load-privkey ca-key.pem --template ca.tmpl --outfile ca-cert.pem
certtool --generate-privkey --outfile server-key.pem

cat << _EOF_ > server.tmpl
cn = "openconnect.provincia.prato.it"
organization = "ProvinciaDiPrato"
expiration_days = 9999
signing_key
encryption_key #only if the generated key is an RSA one
tls_www_server
_EOF_

certtool --generate-certificate --load-privkey server-key.pem  --load-ca-certificate ca-cert.pem --load-ca-privkey ca-key.pem  --template server.tmpl --outfile server-cert.pem

certtool --generate-privkey --outfile mpadmin-key.pem

cat << _EOF_ > mpadmin.tmpl
cn = "mpadmin"
unit = "admins"
expiration_days = 9999
signing_key
tls_www_client
_EOF_

certtool --generate-certificate --load-privkey mpadmin-key.pem  --load-ca-certificate ca-cert.pem --load-ca-privkey ca-key.pem  --template mpadmin.tmpl --outfile mpadmin-cert.pem

File di configurazione: ocserv.conf

[root@localhost ocserv]# cat ocserv.conf
# User authentication method. Could be set multiple times and in that case
# all should succeed.
# Options: certificate, pam.
auth = "certificate"
#auth = "plain[./test1.passwd]"
#auth = "pam"

# A banner to be displayed on clients
banner = "Welcome"

# Use listen-host to limit to specific IPs or to the IPs of a provided hostname.
#listen-host = [IP|HOSTNAME]

use-dbus = no

# Limit the number of clients. Unset or set to zero for unlimited.
#max-clients = 1024
max-clients = 16

# Limit the number of client connections to one every X milliseconds
# (X is the provided value). Set to zero for no limit.
#rate-limit-ms = 100

# Limit the number of identical clients (i.e., users connecting multiple times)
# Unset or set to zero for unlimited.
max-same-clients = 2

# TCP and UDP port number
tcp-port = 4444
udp-port = 4444

# Keepalive in seconds
keepalive = 32400

# Dead peer detection in seconds
dpd = 440

# MTU discovery (DPD must be enabled)
try-mtu-discovery = false

# The key and the certificates of the server
# The key may be a file, or any URL supported by GnuTLS (e.g.,
# tpmkey:uuid=xxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx;storage=user
# or pkcs11:object=my-vpn-key;object-type=private)
#
# There may be multiple certificate and key pairs and each key
# should correspond to the preceding certificate.
server-cert = /etc/ocserv/server-cert.pem
server-key = /etc/ocserv/server-key.pem

# Diffie-Hellman parameters. Only needed if you require support
# for the DHE ciphersuites (by default this server supports ECDHE).
# Can be generated using:
# certtool --generate-dh-params --outfile /path/to/dh.pem
#dh-params = /path/to/dh.pem

# If you have a certificate from a CA that provides an OCSP
# service you may provide a fresh OCSP status response within
# the TLS handshake. That will prevent the client from connecting
# independently on the OCSP server.
# You can update this response periodically using:
# ocsptool --ask --load-cert=your_cert --load-issuer=your_ca --outfile response
# Make sure that you replace the following file in an atomic way.
#ocsp-response = /path/to/ocsp.der

# In case PKCS #11 or TPM keys are used the PINs should be available
# in files. The srk-pin-file is applicable to TPM keys only (It's the storage
# root key).
#pin-file = /path/to/pin.txt
#srk-pin-file = /path/to/srkpin.txt

# The Certificate Authority that will be used
# to verify clients if certificate authentication
# is set.
#ca-cert = /path/to/ca.pem
ca-cert = /etc/ocserv/ca-cert.pem

# The object identifier that will be used to read the user ID in the client certificate.
# The object identifier should be part of the certificate's DN
# Useful OIDs are:
#  CN = 2.5.4.3, UID = 0.9.2342.19200300.100.1.1
#cert-user-oid = 0.9.2342.19200300.100.1.1

# The object identifier that will be used to read the user group in the client
# certificate. The object identifier should be part of the certificate's DN
# Useful OIDs are:
#  OU (organizational unit) = 2.5.4.11
#cert-group-oid = 2.5.4.11

# A revocation list of ca-cert is set
#crl = /path/to/crl.pem

# GnuTLS priority string
tls-priorities = "PERFORMANCE:%SERVER_PRECEDENCE:%COMPAT"

# To enforce perfect forward secrecy (PFS) on the main channel.
#tls-priorities = "NORMAL:%SERVER_PRECEDENCE:%COMPAT:-RSA"

# The time (in seconds) that a client is allowed to stay connected prior
# to authentication
auth-timeout = 40

# The time (in seconds) that a client is not allowed to reconnect after
# a failed authentication attempt.
#min-reauth-time = 2

# Cookie validity time (in seconds)
# Once a client is authenticated he's provided a cookie with
# which he can reconnect. This option sets the maximum lifetime
# of that cookie.
cookie-validity = 172800

# Script to call when a client connects and obtains an IP
# Parameters are passed on the environment.
# REASON, USERNAME, GROUPNAME, HOSTNAME (the hostname selected by client),
# DEVICE, IP_REAL (the real IP of the client), IP_LOCAL (the local IP
# in the P-t-P connection), IP_REMOTE (the VPN IP of the client). REASON
# may be "connect" or "disconnect".
#connect-script = /usr/bin/myscript
#disconnect-script = /usr/bin/myscript

# UTMP
use-utmp = true

# PID file
pid-file = /var/run/ocserv.pid

# The default server directory. Does not require any devices present.
#chroot-dir = /path/to/chroot

# socket file used for IPC, will be appended with .PID
# It must be accessible within the chroot environment (if any)
socket-file = /var/run/ocserv-socket

# The user the worker processes will be run as. It should be
# unique (no other services run as this user).
run-as-user = nobody
run-as-group = daemon
# Network settings

device = vpns

# The default domain to be advertised
default-domain = provincia.prato.it

ipv4-network = 172.21.0.0
ipv4-netmask = 255.255.0.0
# Use the keywork local to advertize the local P-t-P address as DNS server
ipv4-dns = 172.21.1.29

# The NBNS server (if any)
#ipv4-nbns = 192.168.2.3

#ipv6-address =
#ipv6-mask =
#ipv6-dns =

# Prior to leasing any IP from the pool ping it to verify that
# it is not in use by another (unrelated to this server) host.
ping-leases = false

# Leave empty to assign the default MTU of the device
# mtu =

#route = 192.168.1.0/255.255.255.0
#route = 192.168.5.0/255.255.255.0

#
# The following options are for (experimental) AnyConnect client
# compatibility. They are only available if the server is built
# with --enable-anyconnect
#

# Client profile xml. A sample file exists in doc/profile.xml.
# This file must be accessible from inside the worker's chroot.
# The profile is ignored by the openconnect client.
#user-profile = profile.xml

# Unless set to false it is required for clients to present their
# certificate even if they are authenticating via a previously granted
# cookie. Legacy CISCO clients do not do that, and thus this option
# should be set for them.
#always-require-cert = false

######################################################################################

Creo file di start del servizio: ocserv.start

[root@localhost ocserv]# cat ocserv.start
#!/bin/bash
export LD_LIBRARY_PATH=/opt/lib/:/opt/lib64/
export PATH=$PATH:/opt/bin/:/opt/sbin/
iptables -t nat -F
iptables -t nat -A POSTROUTING -j MASQUERADE
ocserv -c /etc/ocserv/ocserv.conf

########################################################################################

JoomlaFAP installazione e accessibilità

Intro
Prima di tutto occorre ringraziare per il MERAVIGLIOSO progetto e agiungere i corretti riferimenti
Sito del progetto: http://joomlacode.org/gf/project/joomlafap1_5

Download: http://joomlacode.org/gf/project/joomlafap1_5/frs/

Segnalazioni di errore su: http://joomlacode.org/gf/project/joomlafap1_5/tracker/

Le istruzioni sono nei video tutorial: http://joomlacode.org/gf/project/joomlafap1_5/docman/?subdir=466

Installazione e configurazione

Scarica joomla 1.5 – Joomla_1.5.10_ita-Stable.tgz e esegui l’installazione

Scarica il template
http://joomlacode.org/gf/download/frsrelease/9169/34135/tpl_accessible_81.zip
da qui
http://joomlacode.org/gf/project/joomlafap1_5/frs/?action=FrsReleaseBrowse&frs_package_id=3542

oppure usa quello allegato che è modificato da me copiandolo nella root del sito ed estraendolo lì con tar -zxvf template….)

template-maox-accessibiletar

scarica il modulo per le access-key da qui
http://joomlacode.org/gf/project/joomlafap1_5/frs/?action=FrsReleaseBrowse&frs_package_id=3543

attualmente è il seguente:
http://joomlacode.org/gf/download/frsrelease/9022/33465/com_accesskeys_77.zip

Poi scarica le patch del core da qui
http://joomlacode.org/gf/project/joomlafap1_5/scmsvn/?action=browse&path=%2Fcorepatches%2F

basta il file delle differenze:
joomla_fap_15_2009-03-29.diff

oppure, su linux (dopo aver installato subversion) creare una dir
temporanea:
mkdir tmp
cd tmp
svn checkout –username anonymous http://joomlacode.org/svn/joomlafap1_5/corepatches/
password: anonymous

copiare il file delle differenze nella root del sito:
cp joomla_fap_15_2009-03-29.diff ../

ed eseguire la patch:
patch -p0 < joomla_fap_15_2009-03-29.diff

Adesso copiare nella root del sito i 3 file delle differenze allegati di seguito ed
eseguire:
(serve x passare la validazione dell’xhtml)

maoxcom_contact

maoxcom_newsfeeds

maoxcom_weblinks

patch -p0 < MaoX.com_newsfeeds.diff
patch -p0 < MaoX.com_weblinks.diff
patch -p0 < MaoX.com_contact.diff

Nella sezione amministrativa:

modificare il Top Menu (sezione moduli) come nelle immagini allegate di seguito

Installare il componente access_key
Settare il template accessibile come predefinito.

Il risultato può essere visualizzato qui:

http://portale-energia.provincia.prato.it/

VMWare esxi – installare vmware tools su una slackware 12.2

Questa è una guida per installare i VMWare Tools su Slackware 12.2

Questi sono i passaggi da seguire:


links "http://prdownloads.sourceforge.net/libdnet/libdnet-1.11.tar.gz?download"
tar -zxvf libdnet-1.11.tar.gz
cd libdnet-1.11
./configure
make && make install && ldconfig
wget http://download.icu-project.org/files/icu4c/4.0.1/icu4c-4_0_1-src.tgz
wget http://slackbuilds.org/slackbuilds/12.2/libraries/icu4c.tar.gz
tar -zxvf icu4c-4_0_1-src.tgz
tar -zxvf icu4c.tar.gz
cd icu4c
mv ../icu4c-4_0_1-src.tgz ./
./icu4c.SlackBuild
mv /tmp/icu4c-4.0.1-i486-1_SBo.tgz /root/
installpkg ./icu4c-4.0.1-i486-1_SBo.tgz
wget http://mesh.dl.sourceforge.net/sourceforge/open-vm-tools/open-vm-tools-2009.02.18-148847.tar.gz
tar -zxvf open-vm-tools-2009.02.18-148847.tar.gz
cd open-vm-tools-2009.02.18-148847
./configure --includedir=/usr/include/uriparser --without-x --without-icu
make

Dalla VIM cliccare su Inventory-> Virtual Machine -> Install VMware Tools
tornare sulla console


mount /mnt/cdrom
cp /mnt/cdrom/VMwareTools-3.5.0-123629.tar.gz /root/
tar -zxvf VMwareTools-3.5.0-123629.tar.gz
cd open-vm-tools-2009.02.18-148847/modules/linux/
for i in *; do sudo mv ${i} ${i}-only; tar -cf ${i}.tar ${i}-only; done
cp *.tar /root/vmware-tools-distrib/lib/modules/source/
cd /root/vmware-tools-distrib/
mkdir /etc/pam.d
touch /etc/rc.d/init.d/network
ifconfig eth0 down
ifconfig eth1 down
ifconfig eth2 down
rmmod pcnet32
./vmware-install.pl
vmware-config-tools.pl

Ringrazio marcpem per l’how to originale

Spero sia di aiuto a tutti.
Saluti

Slackware 12 su Asus Z99j o Aj8n – Gestione ACPI e tasti funzione

Apena installata, la mia distro preferita (ovviamente Slackware 12) ACPI aveva qualche problama.
Sulla barra non compariva l’icona del controllo delle batterie e i tasti funzione non funzionavano 🙂
Ecco come ho risolto:

In fondo al file /etc/rc.d/rc.modules ho aggiunto le seguenti righe:
#######################################################
## ACPI MAOX X ASUS
/sbin/modprobe asus_acpi
/sbin/modprobe video
/sbin/modprobe battery
/sbin/modprobe container
/sbin/modprobe button
/sbin/modprobe ac
/sbin/modprobe thermal
/sbin/modprobe processor
/sbin/modprobe fan

/sbin/depmod -ae
###########################################################à
In queso modo è comparsa l’icona delle batterie e posso gestire il risparmio energetico.

Per i tasti funzione:
in /etc/acpi ho modificato il file acpi_handler.sh come segue:

###########################################################
root@trinity2:/etc/acpi# cat acpi_handler.sh
#!/bin/sh
# Default acpi script that takes an entry for all actions

IFS=${IFS}/
set $@

case “$1” in
button)
case “$2” in
power) /sbin/init 0
;;
*) logger “ACPI action $2 is not defined”
;;
esac
;;
hotkey)
case “$2” in
ATKD)
case “$3” in
0000005e)
logger “WIFI in Accenione…”
/etc/acpi/wifi_on.sh
logger “WIFI Acceso!”
echo “WIFI Acceso!” | wall
;;
0000005f)
logger “WIFI in Spegnimento…”
/etc/acpi/wifi_off.sh
logger “WIFI Spento!”
echo “WIFI Spento!” | wall
;;
00000032)
logger “MUTE / UNMUTE AUDIO…”
MUTE=`amixer get PCM | grep Left | grep -v Right | cut -d ” ” -f 9`
if [ $MUTE == [on] ]; then
/usr/bin/amixer set PCM mute
else
/usr/bin/amixer set PCM unmute
fi
;;
00000031)
logger “Abbasso il volume…”
amixer set PCM 2-
;;
00000030)
logger “Alzo il volume…”
amixer set PCM 2+
;;
*)
logger “AA $3 AA $4”
logger “BB $3 BB $4”
;;
esac
;;
*) logger “ACPI action $2 is not defined”
;;
esac
;;
*)
logger “ACPI group $1 / action $2 is not defined $3 AAA $4 BBBB $5 CCCC”
;;
esac
###############################################################

Con questo file riesco a controllare il volume e l’attivazione della wireless dai tasti funzione su linux.
Premendo Fn+F10 attivo o disattivo l’audio
Premendo Fn+F11 abbasso l’audio
Premendo Fn+F12 alzo l’audio

e, sempre in /etc/acpi/ ho aggiunto i seguenti file:
#################WIFI_ON############################################
root@trinity2:/etc/acpi# cat wifi_on.sh
#!/bin/bash
/sbin/ifconfig eth0 down
/sbin/modprobe ipw3945
/sbin/depmod -ae
/sbin/ipw3945d –quiet
sleep 5
/sbin/dhcpcd -d -t 15 eth1
#################################################################

#######################WIFI_OFF###############################
root@trinity2:/etc/acpi# cat wifi_off.sh
#!/bin/bash
/sbin/ifconfig eth1 down

/sbin/ipw3945d –kill
/sbin/ipw3945d –kill
killall ipw3945d

/sbin/rmmod ipw3945
/sbin/depmod -ae

/etc/rc.d/rc.inet1 restart
###############################################################

poi un bel
chmod ugo+x /etc/acpi/wifi_*

In questo modo posso attivare e disabilitare la wireless tramite la combinazione di tasti
Fn+F2

Come installare VMWare server su Fedora Core 7

Una meravigliosa guida che spiega come installare vmware server su fedora 7.

http://www.howtoforge.com/vmware_server_fedora7

ecco il cuore della guida:

make[2]: *** [/tmp/vmware-config2/vmmon-only/linux/driver.o] Error 1
make[1]: *** [_module_/tmp/vmware-config2/vmmon-only] Error 2
make[1]: Leaving directory `/usr/src/kernels/2.6.21-1.3194.fc7-i686′
make: *** [vmmon.ko] Error 2
make: Leaving directory `/tmp/vmware-config2/vmmon-only’
Unable to build the vmmon module.

For more information on how to troubleshoot module-related problems, please
visit our Web site at “http://www.vmware.com/download/modules/modules.html” and
“http://www.vmware.com/support/reference/linux/prebuilt_modules_linux.html”.

Execution aborted.

This happens because VMware Server isn’t ready for a 2.6.21 kernel yet (the default kernel in Fedora 7 is 2.6.21.3). Therefore, we must patch VMware Server a little bit. This can be done as follows:

wget http://knihovny.cvut.cz/ftp/pub/vmware/vmware-any-any-update110.tar.gz
tar xvfz vmware-any-any-update110.tar.gz
cd vmware-any-any-update110
./runme.pl

The ./runme.pl command will continue the VMware Server installation. This time it should succeed, and again you can accept all default values. When it asks you

In which directory do you want to keep your virtual machine files?
[/var/lib/vmware/Virtual Machines]

you can either accept the default value or specify a location that has enough free space to store your virtual machines.

At the end of the installation, you will be asked to enter a serial number:

Please enter your 20-character serial number.

Type XXXXX-XXXXX-XXXXX-XXXXX or ‘Enter’ to cancel:

Fill in your serial number for VMware Server.

After the successful installation, you can delete the VMware Server download file and the installation directory:

cd /home/falko/Desktop
rm -fr vmware-server-distrib
rm -f VMware-server-*.tar.gz

You will now find VMware Server under Applications > Other

ATTENZIONE:
Può essere causa di errore l'assenza di xinetd, quindi prima di iniziare l'installazione assicurarsi di avere xinetd:
yum install xinetd

ATTENZIONE 2:
Una altra possibile causa di problemi è la presenza del file
/etc/vmware/not_configured
occorre eliminarlo:
rm /etc/vmware/not_configured

Suspend to ram – sospensione in ram su Fedora 7

Per abilitare il suspend to ram e il suspend to diskho modificato il /etc/grub.conf come segue:

kernel /boot/vmlinuz-2.6.21-1.3228.fc7 ro root=LABEL=/ rhgb vga=791 selinux=0 resume=/dev/sda3 quiet

In questa riga ho:to il suspend to disk e il suspend to ram
abilitato il frame buffer a una risoluzione di 1024x768x32
disabilitato il SELinux

Aircrack-ng su Fedora 7 con driver atheros madwifi-ng(ath_pci)

Aircrack-ng su Fedora 7 con driver atheros madwifi-ng(ath_pci)

Per aircrack occorre patchare i driver madwifi-ng appena installati
Seguire i seguenti passaggi per patchare i driver:

ifconfig ath0 down
ifconfig wifi0 down
rmmod wlan_wep ath_rate_sample ath_rate_onoe ath_pci wlan ath_hal ath_rate_amrr 2>/dev/null
svn checkout http://svn.madwifi.org/trunk/ madwifi-ng
wget http://patches.aircrack-ng.org/madwifi-ng-r2277.patch
cd madwifi-ng
patch -Np1 -i ../madwifi-ng-r2277.patch
make
make install
depmod -ae
modprobe ath_pci
cd ..
wget http://download.aircrack-ng.org/aircrack-ng-0.9.1.tar.gz
tar -zxvf aircrack-ng-0.9.1.tar.gz
cd aircrack-ng-0.9.1
make && make install

funzionaaaa!!!

si rimanda qui per la suite: http://aircrack-ng.org/doku.php#aircrack-ng_suite

Madwifi ng driver for atheros minipci wireless fedora 7

Madwifi ng driver for atheros minipci wireless:

Sacrico i driver con un bel

wget http://ovh.dl.sourceforge.net/sourceforge/madwifi/madwifi-0.9.3.1.tar.bz2

tar -jxvf madwifi-0.9.3.1.tar.bz2

cd madwifi-ng

make && make install && depmod -ae

modprobe ath_pci

adesso dovrebbe funzionare tutto.

un bel

iwconfig

di conferma e tutto è ok.


Se non dovesse funzionare provate a cercare su
/etc/sysconfig/network-script/ifcfg-wifi0
e modificate :
DEVICE=wifi0
con
DEVICE=ath0

Adesso tutto ok.
Bye