FSF releases the GNU General Public License, version 3

BOSTON, Massachusetts, USA—Friday, June 29, 2007—The Free Software Foundation (FSF) today released version 3 of the GNU General Public License (GNU GPL), the world’s most popular free software license.

“Since we founded the free software movement, over 23 years ago, the free software community has developed thousands of useful programs that respect the user’s freedom. The programs are in the GNU/Linux operating system, as well as personal computers, telephones, Internet servers, and more. Most of these programs use the GNU GPL to guarantee every user the freedom to run, study, adapt, improve, and redistribute the program,” said Richard Stallman, founder and president of the FSF.

Version 3 of the GNU GPL strengthens this guarantee, by ensuring that users can modify the free software on their personal and household devices, and granting patent licenses to every user. It also extends compatibility with other free software licenses and increases international uniformity.

Jeremy Allison, speaking on behalf of the Samba team, states that they see the new license as “a great improvement on the older GPL,” and that it is “a necessary update to deal with the new threats to free software that have emerged since version 2 of the GPL.”

I am currently looking at the GPL version 3 and all my #Joomla components will be available under that licence soon.

Google Desktop available on Linux


Google was set to launch late on Wednesday a beta version of Google Desktop search for #Linux in a sign of encouragement by the search giant for #Linux on the desktop.

Google Desktop allows people to search the Web while also searching the full text of all the information on their computer, including Gmail and their Web search history. Because the index is stored locally on the computer, users can access Gmail and Web history while offline. from News.com

 You can now use on linux:

Mac user can also enjoy some Google tools like Desktop search

t was a nice surprise for me to see that google desktop does not eat too much resources, even when indexing the harddrive. Better than beagle (.NET under Mono) or Strigi, Pinot, Tracker and Recoll (these five search engines work together on a common search API for the free desktop called Xesam [freedesktop.org].).
Time to install OpenSuse again 🙂

OpenComment recommended upgrade

XAJAX team has release a new version of its library for PHP and ajax: XAJAX 0.2.5

xajax 0.2.5 has been created as a bridging step to xajax v0.5. xajax 0.2.5 aims to be forwards and backwards-compatible with xajax versions, while at the same time providing important security updates that have been lingering around in the xajax codebase for a while
It’s been just over one year since we released our last version of xajax and it was about time we released another version. Work on v0.5 has been going well and we’re almost ready for a release, but there were a few things that couldn’t wait for the next version. Thats where xajax 0.2.5 steps in. For a start, we’re getting things ready for you to move over to the new xajax v0.5 syntax by letting you use easier to use methods to respond to client requests. We’ve also fixed up a few bugs that have been lingering around and been annoying everyone for some time. Last but not least, we’ve fixed up a couple of important security vunerabilities.

I’ve made a new version of the mambot http://www.xajax-joomla.com/

Just remove the mambot and install this new version XAJAX System Mambot For #Joomla v0.2.zip (look in my download section). I am running also now OpenComment 3.0.30 with the latest version of Xajax

Rootkit scanner for linux

A rootkit is a set of software tools intended to conceal running processes, files or system data from the operating system. Rootkits have their origin in benign applications, but in recent years have been used increasingly by malware to help intruders maintain access to systems while avoiding detection. Rootkits exist for a variety of operating systems, such as Microsoft Windows, #Linux and Solaris. Rootkits often modify parts of the operating system or install themselves as drivers or kernel modules. [WikiPedia]

Rootkit scanner is scanning tool which scans for rootkits, backdoors and local exploits by running tests like:

  • MD5 hash compare
  • Look for default files used by rootkits
  • Wrong file permissions for binaries
  • Look for suspected strings in LKM and KLD modules
  • Look for hidden files
  • Optional scan within plaintext and binary files

Rootkit Hunter is released as GPL licensed project and free for everyone to use. You can download it at
http://www.rootkit.nl/projects/rootkit_hunter.html

This tools is just a tar with a set of files inside. It is highly recommended to run it from a read only media to avoid hacker tampering attempts.  run

./installer.sh
# then
rkhunter

Rootkit Hunter 1.2.9, Copyright 2003-2006, Michael Boelen

Under active development by the Rootkit Hunter project team. For reporting
bugs, updates, patches, comments and questions see: rkhunter.sourceforge.net

Rootkit Hunter comes with ABSOLUTELY NO WARRANTY. This is free software,
and you are welcome to redistribute it under the terms of the GNU General
Public License. See LICENSE for details.

Valid parameters:
--checkall (-c)           : Check system
--createlogfile <file>*   : Create logfile (file is optional, defaults to
                          : /var/log/rkhunter.log)
--cronjob                 : Run as cronjob (removes colored layout)
--display-logfile         : Show logfile at end of the output
--help (-h)               : Show this help
--nocolors*               : Don't use colors for output
--report-mode*            : Don't show uninteresting information for reports
--report-warnings-only*   : Show only warnings (lesser output than --report-mode,
                          : more than --quiet)
--skip-application-check* : Don't run application version checks
--skip-keypress (-sk)*    : Don't wait after every test (non-interactive)
--quick*                  : Perform quick scan (instead of full scan)
--quiet*                  : Be quiet (only show warnings)
--update                  : Run update tool and check for database updates
--version                 : Show version and quit
--versioncheck            : Check for latest version
--bindir <bindir>*        : Use <bindir> instead of using default binaries
--configfile <file>*      : Use different configuration file
--dbdir <dir>*            : Use <dbdir> as database directory
--rootdir <rootdir>*      : Use <rootdir> instead of / (slash at end)
--tmpdir <tempdir>*       : Use <tempdir> as temporary directory
Explicit scan options:
--allow-ssh-root-user*    : Allow usage of SSH root user login
--disable-md5-check*      : Disable MD5 checks
--disable-passwd-check*   : Disable passwd/group checks
--scan-knownbad-files*    : Perform besides 'known good' check a 'known bad' check
--check-deleted           : Perform 'deleted files' check
--check-listen            : Perform 'listening applications' check
Multiple parameters are allowed
*) Parameter can only be used with other parameters

False alarms:

* Filesystem checks
   Checking /dev for suspicious files...                      [ OK ]
   Scanning for hidden files...                               [ Warning! ]
---------------
/etc/.pwd.lock /dev/.udevdb 
---------------
Please inspect:  /dev/.udevdb (directory) 

/dev normally contains only device names and hence udev stores its private configuration information in a hidden directory. Rkhunter
complains because rootkits are known to create such directories.
 

Got hacked…

 Everything has started with an email

Trojan-Downloader.VBS.Agent‎
From: Enrique MONTECRISTO (xxxxx@xxxxxx.com)
Sent: Mon 6/18/07 10:04 PM
To: cedricwalter@xxxxxxx.com
   
Hello Cedric,
When I browse your website with Firefox, I get this kind of warning from my GDATA antivirus shield :
http://www.gdata.de/trade/GB/productview/727/16
—————————
Virus: Trojan-Downloader.VBS.Agent.u
Adress: stat1count.net
—————————-
Virus: Trojan-Downloader.JS.Agent.fq
Address: stat1count.net
—————————-
Is it a fake ?

The "virus" Trojan-Downloader.JS. seems like a malicious javascript inline somewhere in my homepage
Thanks to Firefox WebDeveloper toolbar, it was quite easy to locate the malicious script (View all javascript)

The Hacker was inserting 2 strange line in my content. He has tampered:


Continue reading Got hacked…