Install inSSIDer 2 wifi scanner in ubuntu using .deb package

Leave a comment

inSSIDer is FREE, open-source Wi-Fi scanning software. And yet you want to know more. Wow. you truly are our type of geek. Take a look at the features below to see what makes inSSIDer special.

What’s Unique about inSSIDer?

  • Uses the Native Wi-Fi API and your current Wireless network card
  • Sort results by Mac Address, SSID, Channel, RSSI and “Time Last Seen”
  • Compatible with most GPS devices (NMEA v2.3 and higher)

How can inSSIDer help me?

  • Inspect your WLAN and surrounding networks to troubleshoot competing access points
  • Track the strength of received signal in dBm over time
  • Filter access points in an easy-to-use format
  • Highlight access points for areas with high Wi-Fi concentration
  • Export Wi-Fi and GPS data to a KML file to view in Google Earth.
  • Filter through hundreds of scanned access points

Install inSSIDer 2 in ubuntu

Download deb packages from here

Once you have deb packages you can install by double clicking on it or run the following command from your terminal:

sudo dpkg -i inssider_0.1.0.0111_i386.deb


How to Install Source Files in Ubuntu

Leave a comment

For all those who are beginners in any Linux (Ubuntu) find hard to find the package files of their distro and end up in finding a source package (which is either in tar.gz or .gz), so now people think how to install these source files?

Lets see now how would you be installing source files in Ubuntu..

Source files contain the programs and hence before the installation you need to compile them, so you need to install the build-essentials from the synaptic package manager, else this build-essentials is already present in the cd, and so you can install it, .else you can install it by typing it in the terminal:

sudo aptitude install build-essential

Suppose you have a source file name src.tar.gz, what you do initially is that you need to extract the source files and then in the terminal navigate to the folder where the source file is extracted using the cd commands, and then type the following:



sudo make install

clean install

Lets see what each one of them does…

  • ./configure: checks whether the required dependencies are available on your system or not, if not an error is reported.
  • make compiles the source code and make install is used to install the program in to the location, if it asks for an installation location it is recommended to install all the source to /usr/src
  • clean install removes any temporary files created in the installation process of the source.

And thats it your source file is installed in your system.

Indicator-screenshotting tool Lookit 0.3 hits Beta

Leave a comment

The latest version of TinyGrab inspired screenshot tool ‘Lookit’ has hit beta status and is on the look out for the brave and the bold amongst you to do some testing…

New features
There are plenty of new features to play with including “support for non-compositing window managers & actually drawing the selection rectangle (though this feature doesn’t always place nice with compiz, I’m looking into it)” Lookit developer Zach told us earlier today.

The project, which is now hosted on github, provides users – and ardent bloggers like myself – with a complete solution for both taking/selecting and uploading screenshots in one fell swoop. The work flow it affords is particularly neat for screenshots are automatically uploaded to your preferred service once taken and any resulting URLs are copied to the system clipboard ready for use.

As before, Lookit 0.3 can upload images via Imgur, FTP, SSH or simply ‘save’ them to folder of your choice. 

PPA Installation
The beta release of ‘LookIt’ can be downloaded in .deb from from the project page or installed from the testing PPA below in a few hours time.
sudo add-apt-repository ppa:lookit/testing
sudo apt-get update && sudo apt-get install lookit
The latest stable version can be installed using the Lookit stable PPA:
sudo add-apt-repository ppa:lookit/ppa
sudo apt-get update && sudo apt-get install lookit

Indicator-Workspaces updated for Maverick

Leave a comment

Upgraded to Ubuntu 10.10 and want to install the workspaces indicator applet? Good news – the PPA has been updated to support Maverick.

The utility allows simple switching between workspaces from the panel, negating the need for the stock GNOME workspaces-switcher applet.

The preferences pane allows you to change the number of workspaces/workspace rows ad-hoc anytime you wish.


Installing the indicator is easy; either download the following .deb installer or add the official PPA.


sudo add-apt-repository ppa:geod/ppa-geod

sudo apt-get update && sudo apt-get install indicator-workspaces

Download a .deb installer here.

The tool doesn’t ship with a menu entry by default by you can easily create one: –

  • Go to ‘System > Preferences > Main Menu’
  • Choose ‘Accessories’ in the left-hand list
  • Click on the ‘New Item’ button
  • Choose a name and enter ‘indicator-workspaces’ for the command
  • Finalize by clicking the ‘Add’ button

Indicator-Virtualbox adds quick-click OS launching to your panel

Leave a comment

Indicator-Virtualbox offers a quick way to launch virtual machines via the desktop panel.

Indicator virtualbox for Ubuntu

The applet, created by astrapi, sits in your panel and, on opening, lists all the virtual machines configured in Virtualbox. Selecting an entry launches the machine without the need to call the main virtualbox window.


The Indicator can be installed from astrapi‘s PPA

sudo add-apt-repository ppa:michael-astrapi/ppa
sudo apt-get update && sudo apt-get install indicator-virtualbox

To launch press ALT + F2 (or just open a Terminal) and type:


Everything you need to know about 2011

Leave a comment

What is

The annual conference is one of the largest Open Source conferences in the southern hemisphere, and one of three major international grassroots Linux conferences worldwide, the other two being Linux Symposium and Linux Kongress.

Originally founded in 1999 by Linux Kernel Hacker Rusty Russell under the acronym “CALU,” the conference changed its name to in 2001, when it was held in Sydney.

LCA 2011 will be the 12th, (11th if you don’t count CALU), and it is the second time it has been held in Brisbane, Australia. Previous locations include Perth, Melbourne, Adelaide and two conferences in New Zealand, Dunedin in 2006 and Wellington last year.

LCA 2003 in Perth, Australia


Each year LCA keeps growing, and this year the organizers were expecting a whopping 700 people to show up (this number will be influenced by the recent flooding) for the 5 days of keynotes, talks, sessions, workshops and social events that make LCA what it is.

LCA 2006 in Otago University, Dunedin, New Zealand

What happens at an LCA?

During an LCA, there are several different “categories” of activities that take place in a tight schedule throughout the week.

  • Miniconfs
  • Keynotes
  • Presentations
  • Tutorials
  • Social Events and BOFs
  • Lightning Talks

Miniconfs were first introduced in 2002, and are a series of talks and presentations related to one specific area of Open Source software/hardware. They generally run for a half-day to two days worth of talks, and everything in between.

Recurring Miniconfs often include topics such as Debian, System Administration, Education, Open Source in Business and Multimedia.

Keynotes are hour long talks by prominent leading people in the Open Source community. To give you an idea of how prominent these speakers are, in 2004 one of the keynote speakers was Linus Torvalds, the “father of Linux;” in 2006 Mark Shuttleworth, founder of Ubuntu was the leading keynote and this year we are treated to Google’s Vice President, Vint Cerf.

In fact, LCAs can take a lot of credit for Ubuntu, as Mark Shuttleworth hired a lot of people from LCA 2005 and 2006 in Dunedin to work on the foundations of Ubuntu. One of these people is Jeff Waugh.

Mark Shuttleworth talking at LCA 2006 in Dunedin, NZ

Presentations are talks that happen throughout the day, on everything from The latest and coolest with HTML5 video to Building a Linux powered coffee roaster.

Tutorials are exactly what they sound like, a gathering of people who get together to learn a specific skill.

Social Events usually occur in the evenings, and involve people getting together to go out to a restaurant or a bar to talk about Linux, Open Source, and to network, exchange business cards and the like.

Socializing at LCA2010 in Wellington, NZ

BOFs are topic-related meetups to talk about specific projects and/or software among many other things.

Lightning Talks are fast-paced 90-second long speed talks designed to keep the audience interested and engaged. They are usually held on the final day of the conference.

First time at an LCA? This guide may be of use.

Why should you care about LCA2011?

Conferences like spur innovation, enthusiasm and new projects, as well as allowing people to mix with others to discuss a common interest.

Conferences are where stuff gets done and where the magic happens.

But why listen to me? My good friend, LCA2011 Paper Chair and University of Queensland staff member Marco Ostini can elaborate some more:

“Each LCA has born great fruits: a peaceful understanding between the GNOME and KDE communities was initiated at an LCA, Mozilla sought and received great support from a previous LCA (Firefox & Thunderbird have grown lots since then) and OLPC received significant developer support at the 2008 LCA in Melbourne.”

LCA2011 is the first to host a Rocketry miniconf, where people can build their own solid propellant fuelled rocket, and purchase or build their own Open avionics, and then launch them to 5000 feet from a rocketry club at the end of the conference, and record the telemetry.

Organizers at LCA 2011 in Brisbane

Pretty awesome stuff, right? But it doesn’t stop there. At each LCA, many Open Source friendly companies send along employees to mix with the community volunteers.

“IBM, HP and Google over the years understood that they are part of the community at an LCA, and not in a position to dictate to the community. Each of those companies have reaped massive benefits from their involvement with LCA.”

I asked Marco whether he agreed with the statement that LCAs lead to a lot of open source innovation and progress.

Indeed, A lot of FOSS is done by people who haven’t met. Once they do at an LCA, things change for the better.

Conferences like LCA are a big deal in the Open Source world. Decisions get made, people communicate, misunderstandings are resolved, and new projects are born and worked on. It’s a time when Open Source members the world over culminate in a fascinatingly strong bond, and it’s a prime example of what makes Open Source such a great thing.

Hence why I’m going to be flying to Brisbane on Sunday and reporting on as much as I can throughout the week, hopefully passing what I learn on to you guys. I’ll be there when projects make announcements, and I’ll provide a summary of the keynotes. I’ll also be running around with my DSLR and digital dictaphone grabbing photos of everything and interviewing people as much as I can.

If you want an insight into how Open Source is progressing, look no further than conferences like LCA – because this is the real deal.

Tunisia’s bitter cyberwar

Leave a comment

Anonymous has joined with Tunisian activists to call for end to the government’s stifling of online dissent.

Originally writed by “Yasmine Ryan

Thousands of Tunisians have taken to the streets in recent weeks to call for extensive economic and social change in their country.

Among the fundamental changes the protesters have been demanding is an end to the government’s repressive online censorship regime and freedom of expression.

That battle is taking place not just on the country’s streets, but in internet forums, blogs, Facebook pages and Twitter feeds.

The Tunisian authorities have allegedly carried out targeted “phishing” operations: stealing users passwords to spy on them and eradicate online criticism. Websites on both sides have been hacked.

Anonymous, the loosely-knit group of international web activists that drew world attention for their “distributed denial of service” (DDoS) attacks on the servers of companies that blocked payments and server access to the whistle-blowing website, WikiLeaks, joined the fray, in solidarity with the Tunisian uprising.

Most international news organisations have no presence in the country (and, some say, a lack of interest in the protests). Media posted online by Tunisian web activists has been some of the only material that has slipped through the blackout, even if their videos and photos haven’t generated quite the same enthusiastic coverage by Western media as the Iranian protest movement did in 2009.

Killing dissent

The attacks against some of the most vocal voices in the Tunisian cyber-community were sharp and swift.

Sofiene Chourabi, a journalist for Al-Tariq al-Jadid magazine and blogger known for his unabashed criticism of the Tunisian authorities, has been unable to recover his email and Facebook accounts after they were hijacked several days ago.

The first attempted hijacking of his Facebook account happened last week.

“Here we don’t really have Internet, we have a national intranet” 

Azyz Amamy, Tunisian web activist

“My personal account on the Facebook, including around 4200 friends, was exposed to failed hacking attempt last Friday, but I quickly recovered it after an unidentified person had taken control of it,” he told Al Jazeera.

Then, on Monday, Chourabi was locked out of his Facebook and Gmail accounts.

Chourabi says he believes the Tunisian Internet Agency is responsible for hijacking his accounts. The agency has blocked access to his Facebook wall since October 2009, and his blogs are also unreachable from within Tunisia.

Several of his friends have contacted Facebook and Google asking for his accounts to be returned, to no avail.

“I think it is high time for Facebook and Google to take serious steps to protect Tunisian activists and journalists,” he said in an interview via email, using a new account.

Facebook is working to ensure it can respond to all its users, Stefano Hesse, Facebook’s head of communications for Europe, the Middle East and Africa, told Al Jazeera.

“One thing needs to be clear: we, as Facebook, are not censoring any content, and we had not been approached by the local government in order to do anything regarding anyone,” Hesse said via email.

Google did not respond to requests for comment from Al Jazeera.

Lina Ben Mhenni also had her Facebook page and Yahoo email account pirated, although she managed to retain control of her blog.

She told Al Jazeera that, as of Wednesday, web users in Tunisia were unable to change their passwords for Facebook.

Another activist who was caught in the phishing campaign is a Tunis-based man, who goes by the name of Azyz Amamy in the online world.

Amamy told Al Jazeera in a phone interview that his Facebook and email accounts had been hijacked on Monday. Amamy was able to recover both accounts within two hours, after Facebook and Gmail responded to his request. The difference is that he had retained control of a separate email account with which he had registered both accounts.

Two hours was enough time for the authorities to get the login information for his four blogs from his email accounts, deleting all the content.

“When they took Lina [Ben Mhenni]’s account, and Sofiene Chourabi’s, within an hour all the Facebook pages they administrated had disappeared. And then their accounts were deleted,” Amamy explained.

The speed of the phishing operation, hitting several high-profile targets in a single day, demonstrated that it was exceptionally sophisticated, he said.

As well as Chourabi, Amamyma and Ben Mhenni, those known to have been targeted include Med Salah M’Barek, Slim Azzabi and Haythem El Mekki.

Amamy suspects the phishing operation was far-reaching and that many more were hit, but are too scared to go public.

Several sources Al Jazeera spoke with said web activists had been receiving anonymous phone calls, warning them to delete critical posts on their Facebook pages or face the consequences.

‘Phishing’ for dissent

The phishing was carried out by a malware code, several sources told Al Jazeera.

Sami Ben Gharbia, who monitors Tunisia’s web censorship for Global Voices, said that Google and Facebook were in no way complicit in the sophisticated phishing technique.

The initial signs that something was underway came on Saturday, he said, when the secure https protocol became unavailable in Tunisia.This forced web users to use the non-secure http protocol.

The government’s internet team then appears to have gone phishing for individuals’ usernames and passwords on services including Gmail, Facebook, Yahoo and Hotmail.

Web activists and journalists alerted others of the alleged hacking by the government via Twitter, which is not susceptible to the same types of operations.

“The goal, amongst others, is to delete the Facebook pages which these people administer,” a Tunisian internet professional, who has also been in contact with Anonymous, told Al Jazeera in an emailed interview.

The same source, who asked to remain unidentified due to the potential consequences for speaking out, said that in communication with the international group, he had come up with a Greasemonkey script for fireFox internet browsers that deactivated the government’s malicious code.

The script had been installed 1,669 times at the time of writing.

“It isn’t like China and Gmail several months ago, where China attacked Gmail,” the web professional said in an email, referring to last year’s incident when Chinese hackers allegedly broke in the accounts of Chinese dissidents.

“This is much more intelligent (anfd I’m proud of this intelligence!). It’s the communication with Gmail [and the other sites] that is intercepted,” he said.

The Committee to Protect Journalists says there is clear proof that the phishing campaign is organised and co-ordinated by the Tunisian government, as did other sources that Al Jazeera spoke with.

Unexpected allies

Tunisian web activists found an ally in Anonymous, whose international activists have turned their attention to overthrowing the Tunisian regime of web censorship.

The group’s DDoS attacks, which began on Sunday night, local time, succeeded in taking at least eight websites, including those for the president, prime minister, the ministry of industry, the ministry of foreign affairs, and the stock exchange.

The web site of the government internet agency – known by Tunisian web dissidents ironically as “Ammar 404”, or “Page not ffound” for its oversight of censorship operations – was also targeted.

In email correspondence with Al Jazeera, one Anonymous activist described the group as a “hive mind,” centred on collective, rather than individual, identity.

The activists, who prefer to go unnamed, co-ordinate their operations through discussions held in Internet Relay Chat (IRC) networks, a type of online discussion forum.

Al Jazeera discussed “OpTunisia” with a group of the online activists on Tuesday. The operation began when one Anon spent last weekend “spamming” the forum, drawing support from activists around the world.

The Tunisian government first drew the Anons’ ire, they say, when it extended its pervasive filtering to WikiLeaks.

“The thing that did it for us, was initially their censoring of WikiLeaks, when WikiLeaks reports on .tn came out,” one participant in the forum wrote in response to questions from Al Jazeera, referring the Tunisia-based website that had been set up to host the WikiLeaks memos.

With their collective gaze turned to Tunisia, the Anons came into contact with Tunisian web activists.

“We did initially take an interest in Tunisia because of WikiLeaks, but as more Tunisians have joined they care more about the general internet censorship there, so that’s what it has become,” another Anon said.

It is hard to generalise the Anons’ diverse range of motivations and ever-changing targets, but most appear to share an outrage over the Tunisian government’s censorship and phishing activities, and a sense of solidarity with Tunisian web users.

Attacking government-linked websites is much more dangerous for those living within Tunisia, they noted, who risk arrest if they are identitied by the authorities.

“Although many Tunisians understandably do not feel comfortable participating in this operation out of precaution, I estimate there [were] about 50 Tunisians participating, to whom we provide the means and knowledge to properly secure their online behaviour from exposure to their government,” one Anon activist wrote via email.

Ben Gharbia says he accessed IRC to observe the discussions, and that there were some people chatting in Tunisian dialect.

By Tuesday, the government appeared to have taken steps to protect its websites from attack by making them inaccessible from overseas. The same sites were available within Tunisia.

On Wednesday, Anonfymous informed Al Jazeera that its own site was under DDoS attack. Anonymous was continuing its DDoS attacks on Thursday, and is likely to move on to another target now that momentum has gathered.

“We, as Anonymous, feel we have accomplished our mission with the major media now involved in Tunisia.  We will keep DDoS’ing that DNS server probably until after the [Thursday’s] strike,” wrote the source by email.

Government hacking, en masse

This is hardly the first time Tunisian censors have phished for dissidents’ private information, nor is its censorship anything new.

Most popular video-sharing websites have been blocked for years now. Facebook was completely blocked in 2008.

Tunisia no longer blocks the entire Facebook platform, and is one of the main ways people are able to share video.

Individual Facebook pages are quickly censored, however, often within an hour of going online, Ben Gharbia said.

“Once they identify a link that needs to be blocked, they block it instantly,” he said.

In the siege against cyber dissidence, Twitter has been a bastion for activists. Because people can access Twitter via clients rather than going through the website itself, many Tunisians can still communicate online. The web-savvy use proxies to browse the other censored sites.

Yet even if bloggers manage to maintain their blogging, the censorship deprives them of those readers who do not use proxies. The result is what Ben Gharbia described as the “killing” of the Tunisian blogosphere.

Ben Mhenni said that the government’s biggest censorship of webpages en masse happened in April 2010, when more than 100 blogs were blocked, in addition to other websites.

She said the hijackings that had taken place in the past week, however, marked the biggest government-organised hacking operation. Most of the pages that had been deleted in recent days were already censored.

Amamy said the government’s approach to the internet policy is invasive and all-controlling.

“Here we don’t really have internet, we have a national intranet,” he said.

You can follow Yasmine on Twitter @yasmineryan

Older Entries Newer Entries