Top 10 Open Source Software & Commercial

Top 10 Open Source
1. Dia
2. OpenLaszlo
3. Skencil
4. Gimpshop
5. Mozilla SeaMonkey
6. KompoZer
7. CamStudio
8. OpenOffice Draw
9. Scribus
10. Inkscape

Top 10 Commercial
1. Visio
2. Norton Ghost
3. Photoshop
4. Nero Burning Rom
5. Dreamweaver
6. Access
7. Outlook
8. Illustrator
9. MSN Messenger
10. Premiere Pro

See Other Here

Advertisements – next big money maker for internet surfers?

agloco next big money maker

Agloco seems to be the talk of the net at the moment for making money online. The good thing is that it’s not a program for blog publishers or for people who own websites only, it’s for anybody who surfs internet everyday and can refer others to sign up agloco as well. Agloco makes money on advertising and shares with you the monthly earnings.

Here is the calculator from agloco for you to estimate how much you could earn every month. John of is doing pretty good I think, here is a post by him telling people that he has crossed 4000 referrals mark.

Darren of has joined the program as well, here is a short review of the program by him.

Agloco has a list of their Top 10 earners and more at as well.

And lastly here is a video interview with the founders of glaco at

So wanna earn while you surf the net? Sign up at

Learn UNIX in 10 minutes.

Moving around the file system:
Listing directory contents:
Changing file permissions and attributes
Moving, renaming, and copying files:
Viewing and editing files:
Environment variables
Interactive History
Filename Completion
Bash is the way cool shell. 
Command Substitution
Searching for strings in files: The grep  command
Searching for files : The find command
Reading and writing tapes, backups, and archives: The tar command  
File compression: compress, gzip, and bzip2
Looking for help: The man and apropos commands
Basics of the  vi editor

   Basic UNIX Command Line (shell) navigation  : Last revised May 17 2001 


File and directory paths in UNIX use the forward slash "/" 
to separate directory names in a path.


/              "root" directory
/usr           directory usr (sub-directory of / "root" directory)
/usr/STRIM100  STRIM100 is a subdirectory of /usr

Moving around the file system:

pwd               Show the "present working directory", or current directory.
cd                Change current directory to your HOME directory.
cd /usr/STRIM100  Change current directory to /usr/STRIM100.
cd INIT           Change current directory to INIT which is a sub-directory of the current 
cd ..             Change current directory to the parent directory of the current directory.
cd $STRMWORK      Change current directory to the directory defined by the environment 
                        variable 'STRMWORK'.
cd ~bob           Change the current directory to the user bob's home directory (if you have permission).

Listing directory contents:

ls    list a directory
ls -l    list a directory in long ( detailed ) format

   for example:
$ ls -l 
drwxr-xr-x    4 cliff    user        1024 Jun 18 09:40 WAITRON_EARNINGS
-rw-r--r--    1 cliff    user      767392 Jun  6 14:28 scanlib.tar.gz
^ ^  ^  ^     ^   ^       ^           ^      ^    ^      ^
| |  |  |     |   |       |           |      |    |      |  
| |  |  |     | owner   group       size   date  time    name 
| |  |  |     number of links to file or directory contents
| |  |  permissions for world
| |  permissions for members of group
| permissions for owner of file: r = read, w = write, x = execute -=no permission
type of file: - = normal file, d=directory, l = symbolic link, and others...

ls -a        List the current directory including hidden files. Hidden files start 
             with "." 
ls -ld *     List all the file and directory names in the current directory using 
             long format. Without the "d" option, ls would list the contents 
             of any sub-directory of the current. With the "d" option, ls 
             just lists them like regular files. 

Changing file permissions and attributes

chmod 755 file       Changes the permissions of file to be rwx for the owner, and rx for 
                     the group and the world. (7 = rwx = 111 binary. 5 = r-x = 101 binary)
chgrp user file      Makes file belong to the group user.
chown cliff file     Makes cliff the owner of file.
chown -R cliff dir   Makes cliff the owner of dir and everything in its directory tree. 

You must be the owner of the file/directory or be root before you can do any of these things. 

Moving, renaming, and copying files:

cp file1 file2          copy a file
mv file1 newname        move or rename a file
mv file1 ~/AAA/         move file1 into sub-directory AAA in your home directory.
rm file1 [file2 ...]    remove or delete a file
rm -r dir1 [dir2...]    recursivly remove a directory and its contents BE CAREFUL!
mkdir dir1 [dir2...]    create directories
mkdir -p dirpath        create the directory dirpath, including all implied directories in the path.
rmdir dir1 [dir2...]    remove an empty directory

Viewing and editing files:

cat filename      Dump a file to the screen in ascii. 
more filename     Progressively dump a file to the screen: ENTER = one line down 
                  SPACEBAR = page down  q=quit
less filename     Like more, but you can use Page-Up too. Not on all systems. 
vi filename       Edit a file using the vi editor. All UNIX systems will have vi in some form. 
emacs filename    Edit a file using the emacs editor. Not all systems will have emacs. 
head filename     Show the first few lines of a file.
head -n  filename Show the first n lines of a file.
tail filename     Show the last few lines of a file.
tail -n filename  Show the last n lines of a file.


The behavior of the command line interface will differ slightly depending 
on the shell program that is being used. 

Depending on the shell used, some extra behaviors can be quite nifty.

You can find out what shell you are using by the command:

    echo $SHELL

Of course you can create a file with a list of shell commands and execute it like
a program to perform a task. This is called a shell script. This is in fact the 
primary purpose of most shells, not the interactive command line behavior. 

Environment variables

You can teach your shell to remember things for later using environment variables.
For example under the bash shell:

export CASROOT=/usr/local/CAS3.0               Defines the variable CASROOT with the value 
export LD_LIBRARY_PATH=$CASROOT/Linux/lib      Defines the variable LD_LIBRARY_PATH with 
                                               the value of CASROOT with /Linux/lib appended, 
                                               or /usr/local/CAS3.0/Linux/lib 

By prefixing $ to the variable name, you can evaluate it in any command:

cd $CASROOT         Changes your present working directory to the value of CASROOT

echo $CASROOT       Prints out the value of CASROOT, or /usr/local/CAS3.0
printenv CASROOT    Does the same thing in bash and some other shells. 

Interactive History

A feature of bash and tcsh (and sometimes others) you can use 
the up-arrow keys to access your previous commands, edit 
them, and re-execute them.

Filename Completion

A feature of bash and tcsh (and possibly others) you can use the
TAB key to complete a partially typed filename. For example if you
have a file called constantine-monks-and-willy-wonka.txt in your 
directory and want to edit it you can type 'vi const', hit the TAB key, 
and the shell will fill in the rest of the name for you (provided the 
completion is unique).

Bash is the way cool shell. 

Bash will even complete the name of commands and environment variables.
And if there are multiple completions, if you hit TAB twice bash will show
you all the completions. Bash is the default user shell for most Linux systems. 


grep string filename > newfile           Redirects the output of the above grep
                                         command to a file 'newfile'.
grep string filename >> existfile        Appends the output of the grep command 
                                         to the end of 'existfile'.

The redirection directives, > and >> can be used on the output of most commands 
to direct their output to a file.


The pipe symbol "|" is used to direct the output of one command to the input 
of another.

For example:

ls -l | more   This commands takes the output of the long format directory list command 
               "ls -l" and pipes it through the more command (also known as a filter).
               In this case a very long list of files can be viewed a page at a time.

du -sc * | sort -n | tail  
               The command "du -sc" lists the sizes of all files and directories in the 
               current working directory. That is piped through "sort -n" which orders the 
               output from smallest to largest size. Finally, that output is piped through "tail"
               which displays only the last few (which just happen to be the largest) results.

Command Substitution

You can use the output of one command as an input to another command in another way 
called command substitution. Command substitution is invoked when by enclosing the 
substituted command in backwards single quotes. For example:

cat `find . -name aaa.txt`

which will cat ( dump to the screen ) all the files named aaa.txt that exist in the current 
directory or in any subdirectory tree. 

Searching for strings in files: The grep  command

grep string filename    prints all the lines in a file that contain the string

Searching for files : The find command

find search_path -name filename 

find . -name aaa.txt    Finds all the files named aaa.txt in the current directory or 
                        any subdirectory tree. 
find / -name vimrc      Find all the files named 'vimrc' anywhere on the system. 
find /usr/local/games -name "*xpilot*"       
                        Find all files whose names contain the string 'xpilot' which 
                        exist within the '/usr/local/games' directory tree. 

Reading and writing tapes, backups, and archives: The tar command  

The tar command stands for "tape archive". It is the "standard" way to read 
and write archives (collections of files and whole directory trees).

Often you will find archives of stuff with names like stuff.tar, or stuff.tar.gz.  This 
is stuff in a tar archive, and stuff in a tar archive which has been compressed using the
gzip compression program respectivly. 

Chances are that if someone gives you a tape written on a UNIX system, it will be in tar format, 
and you will use tar (and your tape drive) to read it. 

Likewise, if you want to write a tape to give to someone else, you should probably use 
tar as well. 

Tar examples:

tar xv      Extracts (x) files from the default tape drive while listing (v = verbose) 
            the file names to the screen.
tar tv      Lists the files from the default tape device without extracting them. 
tar cv file1 file2      
            Write files 'file1' and 'file2' to the default tape device.
tar cvf archive.tar file1 [file2...]   
            Create a tar archive as a file "archive.tar" containing file1, 
tar xvf archive.tar  extract from the archive file
tar cvfz archive.tar.gz dname    
            Create a gzip compressed tar archive containing everything in the directory 
            'dname'. This does not work with all versions of tar.
tar xvfz archive.tar.gz          
            Extract a gzip compressed tar archive.  Does not work with all versions of tar. 
tar cvfI archive.tar.bz2 dname   
            Create a bz2 compressed tar archive. Does not work with all versions of tar

File compression: compress, gzip, and bzip2

The standard UNIX compression commands are compress and uncompress. Compressed files have 
a suffix .Z added to their name. For example:

compress part.igs    Creates a compressed file part.igs.Z

uncompress part.igs  Uncompresseis part.igs from the compressed file part.igs.Z.
                     Note the .Z is not required.

Another common compression utility is gzip (and gunzip). These are the GNU compress and 
uncompress utilities.  gzip usually gives better compression than standard compress, 
but may not be installed on all systems.  The suffix for gzipped files is .gz

gzip part.igs     Creates a compressed file part.igs.gz
gunzip part.igs   Extracts the original file from part.igs.gz

The bzip2 utility has (in general) even better compression than gzip, but at the cost of longer 
times to compress and uncompress the files. It is not as common a utility as gzip, but is 
becoming more generally available. 

bzip2 part.igs       Create a compressed Iges file part.igs.bz2
bunzip2 part.igs.bz2 Uncompress the compressed iges file. 

Looking for help: The man and apropos commands

Most of the commands have a manual page which give sometimes useful, often more or less 
detailed, sometimes cryptic and unfathomable discriptions of their usage. Some say they 
are called man pages because they are only for real men. 


man ls      Shows the manual page for the ls command

You can search through the man pages using apropos


apropos build     Shows a list of all the man pages whose discriptions contain the word "build"

Do a man apropos for detailed help on apropos.

Basics of the  vi editor

                Opening a file
vi filename

                Creating text 
Edit modes: These keys enter editing modes and type in the text
of your document. 

i     Insert before current cursor position
I     Insert at beginning of current line
a     Insert (append) after current cursor position
A     Append to end of line
r     Replace 1 character
R     Replace mode
<ESC> Terminate insertion or overwrite mode

                 Deletion of text

x     Delete single character
dd    Delete current line and put in buffer
ndd   Delete n lines (n is a number) and put them in buffer
J     Attaches the next line to the end of the current line (deletes carriage return).


u     Undo last command

                 cut and paste
yy    Yank current line into buffer
nyy   Yank n lines into buffer
p     Put the contents of the buffer after the current line
P     Put the contents of the buffer before the current line

                cursor positioning
^d    Page down
^u    Page up
:n    Position cursor at line n
:$    Position cursor at end of file
^g    Display current line number
h,j,k,l Left,Down,Up, and Right respectivly. Your arrow keys should also work if
      if your keyboard mappings are anywhere near sane.

               string substitution

:n1,n2:s/string1/string2/[g]       Substitute string2 for string1 on lines
                                   n1 to n2. If g is included (meaning global),  
                                   all instances of string1 on each line
                                   are substituted. If g is not included,
                                   only the first instance per matching line is

    ^ matches start of line
    . matches any single character
    $ matches end of line

These and other "special characters" (like the forward slash) can be "escaped" with \
i.e to match the string "/usr/STRIM100/SOFT" say "\/usr\/STRIM100\/SOFT" 


:1,$:s/dog/cat/g                   Substitute 'cat' for 'dog', every instance
                                   for the entire file - lines 1 to $ (end of file)

:23,25:/frog/bird/                 Substitute 'bird' for 'frog' on lines
                                   23 through 25. Only the first instance 
                                   on each line is substituted.

              Saving and quitting and other "ex" commands

These commands are all prefixed by pressing colon (:) and then entered in the lower
left corner of the window. They are called "ex" commands because they are commands
of the ex text editor - the precursor line editor to the screen editor 
vi.   You cannot enter an "ex" command when you are in an edit mode (typing text onto the screen)
Press <ESC> to exit from an editing mode.

:w                Write the current file.
:w new.file       Write the file to the name 'new.file'.
:w! existing.file Overwrite an existing file with the file currently being edited. 
:wq               Write the file and quit.
:q                Quit.
:q!               Quit with no changes.

:e filename       Open the file 'filename' for editing.

:set number       Turns on line numbering
:set nonumber     Turns off line numbering


The USENET FAQs should be the first place you look for an answer to specific questions.
You can find most of them at RTFM
The contents of this directory includes vi, bash, and comp.unix.questions FAQs.
Searching USENET archives are very useful too. has a USENET archive (formerly's) . 
Advanced Group Search rules.

This document was converted from plain text using Vim and 
then hacked.  Vim is the best version of the one true text editor: vi.

Copyright (c)  2000-2006 
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1
or any later version published by the Free Software Foundation;
with Invariant Section: Preface, with Front-Cover Texts, and with no
Back-Cover Texts. A copy of the license can be found on the GNU web site

Server Hardening

  1. On your firewall (you do have one don’t you?) check the incoming MySQL port and if 3306 is open, close it. If this port is left open it can pose both a security and server abuse threat since not only can hackers attempt to break into MySQL, any user can host their SQL database on your server and access it from another host and so (ab)use your server resources
  2. Check /tmp permissions. /tmp should be chmod 1777
  3. Check /tmp ownership /tmp should be owned by root:root
  4. Check /etc/cron.daily/logrotate for /tmp noexec workaround. Due to a bug in logrotate if /tmp is mounted with the noexec option, you need to have logrotate use a different temporary directory. If you don’t do this syslog may not restart correctly and will write to the wrong (older) log files. See here for a way to do this
  5. Check /var/tmp permissions. /var/tmp should be chmod 1777
  6. Check /var/tmp ownership. /var/tmp should be owned by root:root
  7. Check /var/tmp is mounted as a filesystem. /var/tmp should either be symlinked to /tmp or mounted as a filesystem
  8. Check /var/tmp is mounted noexec,nosuid. /var/tmp isn’t mounted with the noexec,nosuid options (currently: none). You should consider adding a mountpoint into /etc/fstab for /var/tmp with those options
  9. Check /usr/tmp permissions. /usr/tmp should be chmod 1777
  10. Check /usr/tmp ownership. /usr/tmp should be owned by root:root
  11. Check /usr/tmp is mounted as a filesystem or is a symlink to /tmp. /usr/tmp should either be symlinked to /tmp or mounted as a filesystem
  12. Check /etc/resolv.conf for localhost entry. You should not specify or localhost as a nameserver in /etc/resolv.conf – use the servers main IP address instead

  13. Check /etc/named.conf for recursion restrictions. If you have a local DNS server running but do not have any recursion restrictions set in /etc/named.conf this is a security and performance risk and you should look at restricting recursive lookups to the local IP addresses only. Unrestricted recursive lookups are as good as a DDoS attack against your system. They will eat up all your system resources
  14. Check server runlevel. For a secure server environment you should only run the server at runlevel 3. You can fix this by editing /etc/inittab and changing the initdefault line to:
    id:3:initdefault: and then rebooting the server
  15. Check nobody cron. You have a nobody cron log file – you should check that this has not been created by an exploit
  16. Check Operating System support. Make certain that your OS version is still supported by the manufacturer and that upgrades continue to be available
  17. Check SSHv1 is disabled. You should disable SSHv1 by editing /etc/ssh/sshd_config and setting: Protocol 2 (remove the hash # from in front of the line and edit out the 1.1)
  18. Check SSH on non-standard port. Moving SSH to a non-standard port avoids basic SSH port scans. Edit /etc/ssh/sshd_config and setting: Port nnnn Where nnnn is a port of your choosing. Don’t forget to open the port in the firewall first!
  19. Check SSH PasswordAuthentication. For ultimate SSH security, you might want to consider disabling PasswordAuthentication and only allow access using PubkeyAuthentication. For more information read this article and this article
  20. Check telnet port 23 is not in use. Close this port in your firewall. Telnet is an insecure protocol and you should disable the telnet daemon if it is running
  21. Check shell resource limits. You should enable shell resource limits to prevent shell users from consuming server resources – DOS exploits typically do this. If you are using cPanel/WHM set Shell Fork Bomb Protection.
  22. Disable all instances of IRC – BitchX, bnc, eggdrop, generic-sniffers, guardservices, ircd, psyBNC, ptlink. If you are using WHM you can do this in the Background Process Killer.
  23. Check apache for mod_security if not installed install it from source
  24. Check apache for mod_evasive. You should install the mod_evasive apache module from source to help prevent DOS attacks against apache. Note that this module breaks FrontPage functionality
  25. Check apache for RLimitCPU. You should set a value RLimitCPU to prevent runaway scripts from consuming server resources – DOS exploits can typically do this.
  26. Check apache for RLimitMEM. You should set a value RLimitMEM to prevent runaway scripts from consuming server resources – DOS exploits can typically do this
  27. Check php for enable_dl. You should modify /usr/local/lib/php.ini and set:
    enable_dl = off This prevents users from loading php modules that affect everyone on the server. Note that if use dynamic libraries, such as ioncube, you will have to load them directly in php.ini1
  28. Check php for disable_functions. You should modify /usr/local/lib/php.ini and disable commonly abused php functions, e.g.:
    disable_functions = show_source, system, shell_exec, passthru, exec, phpinfo, popen, proc_open Some client web scripts may break with some of these functions disabled, so you may have to remove them from this list
  29. Check phpsuexec. To reduce the risk of hackers accessing all sites on the server from a compromised PHP web script, you should enable phpsuexec when you build apache/php. Note that there are side effects when enabling phpsuexec on a server and you should be aware of these before enabling it.

grab’it from here

Kerendahan Hati

  • Berbicara sesedikit mungkin tentang diri sendiri.
  • Uruslah sendiri persoalan-persoalan.
  • Hindarilah rasa ingin tahu [urusan orang lain].
  • Janganlah mencampuri urusan orang lain.
  • Terimalah pertentangan dengan kegembiraan.
  • Jangan memusatkan perhatian kepada kesalahan orang lain.
  • Terimalah hinaan dan caci maki.
  • Terimalah perasaan tak diperhatikan, dilupakan dan dipandang rendah.
  • Mengalah terhadap kehendak orang lain.
  • Terimalah celaan walaupun anda tidak layak menerimanya.
  • Bersikap sopan dan peka, sekalipun seseorang memancing amarah anda.
  • Janganlah mencoba agar dikagumi dan dicintai.
  • Bersikap mengalah dalam perbedaan pendapat, walaupun anda benar.
  • Pilihlah selalu yang tersulit.

Bukti Kurangnya Kerendahan Hati

  • Berpikir bahwa apa yang dikatakan atau dilakukan lebih baik dari apa yang dikatakan atau dilakukan.
  • Selalu ingin menututi kemauan sendiri.
  • Berdebat dengan keras kepala dan dengan sikap yang kurang baik tanpa peduli benar atau salah.
  • Menyatakan pendapat ketika tidak diminta.
  • Memandang rendah pendapat orang lain.
  • Tidak menggangap bakat-bakat serta kemampuan diri sebagai pinjaman dari tuhan.
  • Tidak menyadari bahwa diri sendiri tidak layak atas segala penghargaan dan pujian, bahkan tidak atas bumi tempatnya berpijak dan atas barang-barang yang dimiliki.
  • Membicarakan diri sendiri sebagai contoh dalam percakapan-percakapan.
  • Berbicara buruk tentang diri sendiri sehingga orang lain kagum atau menyanggah dengan pujian.
  • Membela diri apabila ditegur.
  • Menyembunyikan kesalahan-kesalahan yang memalukan dari pembimbing rohani, sehingga kesan baiknya terhadapmu tidak berkurang.
  • Senang menerima pujian dan penghargaan.
  • Sedih karena orang lain lebih dihargai.
  • Berusaha menonjolkan diri.
  • Mempercakapkan kejujuran, kecerdasan, kecakapan atau gengsi jabatan diri sendiri.
  • Merasa malu atas kekurangan diri sendiri.

Kupon Namecheap

Ini yang Terakhir : MARCHMADNESS

Lumayan untuk registrasi domain di NameCheap dapet diskon US$0.89.