星球
【Themes】AwOken - Awesome Token icon
2010/12/30 1:43:00 | 凍仁的 Ubuntu 筆記
凍仁已經忘記是從什麼時候開始喜歡用黑黑的佈景主題,是因為紅配黑?還是白色太刺眼?不過這樣一來就得花更多的時間尋找合適的 Gtk, Icons themes,懷念以前 gdm 很好改的時代。
這個 awoken-icon-themes 原先是給支援 PPA 的 Ubuntu 不過凍仁已經成功在 Debian squeeze sid 跑起來了。
於 Debian 下安裝
AwOken 是凍仁目前除了 Macbuntu 以外最具客製化的 Icon themes,種類很多種,有空再慢慢玩了。
這個 awoken-icon-themes 原先是給支援 PPA 的 Ubuntu 不過凍仁已經成功在 Debian squeeze sid 跑起來了。
Installation
於 Ubuntu 下安裝jonny@maverick:~$ sudo add-apt-repository ppa:alecive/antigone && sudo apt-get update
jonny@maverick:~$ sudo apt-get install awoken-icon-theme
於 Debian 下安裝
jonny@squeeze:~$ sudo vi /etc/apt/sources.list至 System → Preferences → Appearance → Theme → Customize → Icons 視窗選取 AwOken。
....
deb http://ppa.launchpad.net/alecive/antigone/ubuntu maverick main
deb-src http://ppa.launchpad.net/alecive/antigone/ubuntu maverick main
Take a look at the readme pdf
[!IFRAME FILTERED!]Configure the set
於 terminal 底下出輸入jonny@debian-base:~$ bash ~/.icons/AwOken/awoken-icon-theme-customization
***********************************
Customization script for AwOken icon set. Current Release: 1.5
Please consider a small donation (1$ goes a long way) via PayPal to 'alecive87@gmail.com'
***********************************
Installation directory: /usr/share/icons/AwOken -> installation type: PPA. Good choice.
***********************************
Select an option from below, typing the number of your choice:
1) Something went wrong? Choose this option!
2) TAKE A LOOK AT THE README PDF
3) Configure the set
4) Recover configuration options from previous installations
5) Quit this script
Wich option do you prefer? 3
You choose: Configure the set
Now I'll run configuration script
***********************************
CONFIGURATION SCRIPT
This part is still under testing, so it's more than welcome any detection of any bug you'd find.
My mail is 'alecive87@gmail.com'
***********************************
I'm using this path for iconset in configuration process: /usr/share/icons/AwOken
***********************************
Now I'll start the configuration process. If there is a file called /home/jonny/.AwOkenrc, I'll use it to configure the set in the way you want. If not, I'll ask you some simple questions to create one.
Configuration file already exists.
Now I'll modify the configuration file located in /home/jonny/.AwOkenrc.
***********************************
What kind of folder type do you prefer? (Type the number of your choice)
1) dark 4) tlagdark 7) violet 10) s11-original
2) gray 5) tlaglight 8) white 11) classy
3) metal 6) token 9) s11 12) sonetto
folder_type? 5 # 可參考下方 PDF 的資料夾圖示。
Your choice was: tlaglight
***********************************
What kind of start here icon do you prefer? I'll not show all 61 options, but if you want I'll open a nautilus window to see them. Do you want this (y/[n])?
y
Now type the name of the icon of choice.
WARNING: type only the last part of the icon before file extension!! For example, type 'gaia2' or 'centos' or 'arch4'
start_here? debian
# 請參考 /usr/share/icons/AwOken/clear/128x128/start-here 內的主選單圖示。
Your choice was debian
***********************************
What kind of trash icon do you prefer? (Type the number of your choice)
1) trash1 4) trash4
2) trash2 5) See icons before choosing them
3) trash3
trash_type? 2 # 選 5 可先看圖示種類
Your choice was: trash2
***********************************
Do you want colored applications or greyish apps? (Type the number of your choice)
1) color
2) no-color
color_type? 1
Your choice was: color
***********************************
Last three questions (I incorporate them in one question): change gedit icon, home icon and computer icon.
For each option, type the number of your choice, as above. Name that ends with 1 is the colored version, name that ends with 2 is the grayish version.
1) gedit1 3) See icons before choosing them
2) gedit2
gedit_type? 2
Your choice was: gedit2
1) computer1 4) computer4
2) computer2 5) computer5
3) computer3 6) See icons before choosing them
computer_type? 1
Your choice was: computer1
1) home1 4) home4
2) home2 5) home5
3) home3 6) See icons before choosing them
home_type? 1
Your choice was: home1
***********************************
Configuration process is finished. Notice that until now script has changed only main options. Do you want to run other options of the customize.sh file? (y/[n]) n
***********************************
Now I'll start the recovery script. Type any key to continue. <Enter>
......
Reading user config....
Changing option in the configuration file...
DONE
Fresh_install option is set to no. So I'll stop here the recovery process. If you want that other options run, just answer properly in the configuration step. But it's at your own risk! :S
AwOken 是凍仁目前除了 Macbuntu 以外最具客製化的 Icon themes,種類很多種,有空再慢慢玩了。
資料來源:
★AwOken - Awesome Token icon set GNOME-Look.org
★antigone by alecive on Ubuntu PPA
Grub fix on CentOS 5
2010/12/22 12:19:00 | 凍仁的 Ubuntu 筆記
凍仁近來翻到 電腦備份王2:Clonezilla live 一書中有提到若使用 Clonezilla 還原 MBR 後會與原先的畫面有所不同,其實這是因為找不到 splash.xpm.gz 的關係,整體使用上而言是不會有什麼影響,倘若想美化一下,可參照書中的方法改用文字介面的方式來呈現。
# grub.conf generated by anaconda
#
# Note that you do not have to rerun grub after making
# changes to this file
# NOTICE: You have a /boot partition. This means
# that all kernel and initrd paths are relative
# to /boot/, eg.
# root (hd0,0)
# kernel /vmlinuz-version ro root=/dev/hda2
# initrd /initrd-version.img
#boot=/dev/hda
default=0
timeout=5
# splashimage=(hd0,0)/grub/splash.xpm.gz
color cyan/red white/red
hiddenmenu
title CentOS (2.6.18-194.17.1.el5)
root (hd0,0)
kernel /vmlinuz-2.6.18-194.17.1.el5 ro root=LABEL=/
initrd /initrd-2.6.18-194.17.1.el5.img
話說改完以後的介面跟 Debian lenny 的 Grub 一樣簡潔有力!
資料來源:
★電腦備份王2:Clonezilla live - aNobii
USN-1033-1: Eucalyptus vulnerability
2010/12/17 4:39:58 | Ubuntu security notices
Referenced CVEs:
CVE-2010-3905
Description:
===========================================================
Ubuntu Security Notice USN-1033-1 December 16, 2010
eucalyptus vulnerability
CVE-2010-3905
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 10.10:
eucalyptus-java-common 2.0+bzr1241-0ubuntu4.1
In general, a standard system update will make all the necessary changes.
Details follow:
It was discovered that Eucalyptus did not verify password resets from
the Admin UI correctly. An unauthenticated remote attacker could issue
password reset requests to gain admin privileges in the Eucalyptus
environment.
改善 Ubuntu 登入桌面時間過長另一解法
2010/12/15 19:51:00 | 手把手玩Ubuntu
前篇:Ubuntu從GDM登入後,進入桌面時間愈來愈長?是講用 Shell Script 控制有點麻煩,今天發現其實直接修改程式所屬的 desktop 檔也能辦的到,而且蠻方便就可以達成目的。
1、輸入指令會發現有很多 desktop 檔,這是開機登入桌面時會執行的檔案。
cd ~/.config/autostart/
ls
2、只要在想延後執行程式的 desktop...
請按標題讀更多:)
1、輸入指令會發現有很多 desktop 檔,這是開機登入桌面時會執行的檔案。
cd ~/.config/autostart/
ls
2、只要在想延後執行程式的 desktop...
請按標題讀更多:)
關閉 Ubuntu 的 Ipv6
2010/12/15 19:02:00 | 手把手玩Ubuntu
Ubuntu 預設開啟 ipv6 ,但目前還不普及,加上有時候開啟會讓網路速度變慢。我有遇過 Firefox 在開啟時瀏覽網頁會變很慢,把他關閉瀏覽網頁就恢復正常。
可以單獨在 Firefox 關閉,但我不只一個帳號懶的一個一關,加上用不到直接在系統關閉了。
1、開啟 /etc/sysctl.conf 。
sudo gedit...
請按標題讀更多:)
可以單獨在 Firefox 關閉,但我不只一個帳號懶的一個一關,加上用不到直接在系統關閉了。
1、開啟 /etc/sysctl.conf 。
sudo gedit...
請按標題讀更多:)
USN-1024-2: OpenJDK regression
2010/12/14 7:01:22 | Ubuntu security notices
Description:
===========================================================
Ubuntu Security Notice USN-1024-2 December 13, 2010
openjdk-6 regression
https://launchpad.net/bugs/688522
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 10.10:
openjdk-6-jdk 6b20-1.9.2-0ubuntu2
After a standard system update you need to restart any Java services,
applications or applets to make all the necessary changes.
Details follow:
USN-1024-1 fixed vulnerabilities in OpenJDK. Some of the additional
backported improvements could interfere with the compilation of certain
Java software. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that certain system property information was being
leaked, which could allow an attacker to obtain sensitive information.
USN-1032-1: Exim vulnerability
2010/12/11 8:24:46 | Ubuntu security notices
Referenced CVEs:
CVE-2010-4344
Description:
===========================================================
Ubuntu Security Notice USN-1032-1 December 11, 2010
exim4 vulnerability
CVE-2010-4344
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
exim4-daemon-custom 4.60-3ubuntu3.2
exim4-daemon-heavy 4.60-3ubuntu3.2
exim4-daemon-light 4.60-3ubuntu3.2
Ubuntu 8.04 LTS:
exim4-daemon-custom 4.69-2ubuntu0.2
exim4-daemon-heavy 4.69-2ubuntu0.2
exim4-daemon-light 4.69-2ubuntu0.2
Ubuntu 9.10:
exim4-daemon-custom 4.69-11ubuntu4.1
exim4-daemon-heavy 4.69-11ubuntu4.1
exim4-daemon-light 4.69-11ubuntu4.1
In general, a standard system update will make all the necessary changes.
Details follow:
Sergey Kononenko and Eugene Bujak discovered that Exim did not correctly
truncate string expansions. A remote attacker could send specially crafted
email traffic to run arbitrary code as the Exim user, which could also
lead to root privileges.
USN-1031-1: ClamAV vulnerabilities
2010/12/10 8:13:43 | Ubuntu security notices
Referenced CVEs:
CVE-2010-4260, CVE-2010-4261, CVE-2010-4479
Description:
===========================================================
Ubuntu Security Notice USN-1031-1 December 10, 2010
clamav vulnerabilities
CVE-2010-4260, CVE-2010-4261, CVE-2010-4479
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 10.04 LTS
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 10.04 LTS:
libclamav6 0.96.3+dfsg-2ubuntu1.0.10.04.2
Ubuntu 10.10:
libclamav6 0.96.3+dfsg-2ubuntu1.2
In general, a standard system update will make all the necessary changes.
Details follow:
Arkadiusz Miskiewicz and others discovered that the PDF processing
code in libclamav improperly validated input. This could allow a
remote attacker to craft a PDF document that could crash clamav or
possibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)
It was discovered that an off-by-one error in the icon_cb function
in pe_icons.c in libclamav could allow an attacker to corrupt
memory, causing clamav to crash or possibly execute arbitrary code.
(CVE-2010-4261)
In the default installation, attackers would be isolated by the
clamav AppArmor profile.
USN-1019-1: Firefox and Xulrunner vulnerabilities
2010/12/10 7:01:37 | Ubuntu security notices
Referenced CVEs:
CVE-2010-3766, CVE-2010-3767, CVE-2010-3768, CVE-2010-3770, CVE-2010-3771, CVE-2010-3772, CVE-2010-3773, CVE-2010-3774, CVE-2010-3775, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778
Description:
===========================================================
Ubuntu Security Notice USN-1019-1 December 09, 2010
firefox, firefox-{3.0,3.5}, xulrunner-1.9.{1,2} vulnerabilities
CVE-2010-3766, CVE-2010-3767, CVE-2010-3768, CVE-2010-3770,
CVE-2010-3771, CVE-2010-3772, CVE-2010-3773, CVE-2010-3774,
CVE-2010-3775, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.04 LTS:
firefox-3.0 3.6.13+build3+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9.2 1.9.2.13+build3+nobinonly-0ubuntu0.8.04.1
Ubuntu 9.10:
firefox-3.5 3.6.13+build3+nobinonly-0ubuntu0.9.10.1
xulrunner-1.9.1 1.9.1.16+build2+nobinonly-0ubuntu0.9.10.1
xulrunner-1.9.2 1.9.2.13+build3+nobinonly-0ubuntu0.9.10.1
Ubuntu 10.04 LTS:
abrowser 3.6.13+build3+nobinonly-0ubuntu0.10.04.1
firefox 3.6.13+build3+nobinonly-0ubuntu0.10.04.1
xulrunner-1.9.2 1.9.2.13+build3+nobinonly-0ubuntu0.10.04.1
Ubuntu 10.10:
abrowser 3.6.13+build3+nobinonly-0ubuntu0.10.10.1
firefox 3.6.13+build3+nobinonly-0ubuntu0.10.10.1
xulrunner-1.9.2 1.9.2.13+build3+nobinonly-0ubuntu0.10.10.1
After a standard system update you need to restart Firefox and any
applications which use Xulrunner to make all the necessary changes.
Details follow:
Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov
discovered several memory issues in the browser engine. An attacker could
exploit these to crash the browser or possibly run arbitrary code as the
user invoking the program. (CVE-2010-3776, CVE-2010-3777, CVE-2010-3778)
It was discovered that Firefox did not properly verify the about :blank
location elements when it was opened via window.open(). An attacker could
exploit this to run arbitrary code with chrome privileges. (CVE-2010-3771)
It was discovered that Firefox did not properly handle
elements when
processing a XUL tree. If a user were tricked into opening a malicious web
page, an attacker could exploit this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-3772)
Marc Schoenefeld and Christoph Diehl discovered several problems when
handling downloadable fonts. The new OTS font sanitizing library was added
to mitigate these issues. (CVE-2010-3768)
Gregory Fleischer discovered that the Java LiveConnect script could be made
to run in the wrong security context. An attacker could exploit this to
read local files and run arbitrary code as the user invoking the program.
(CVE-2010-3775)
Several problems were discovered in the JavaScript engine. If a user were
tricked into opening a malicious web page, an attacker could exploit this to
crash the browser or possibly run arbitrary code as the user invoking the
program. (CVE-2010-3766, CVE-2010-3767, CVE-2010-3773)
Michal Zalewski discovered that Firefox did not always properly handle
displaying pages from network or certificate errors. An attacker could
exploit this to spoof the location bar, such as in a phishing attack.
(CVE-2010-3774)
Yosuke Hasegawa and Masatoshi Kimura discovered that several character
encodings would have some characters converted to angle brackets. An
attacker could utilize this to perform cross-site scripting attacks.
(CVE-2010-3770)
processing a XUL tree. If a user were tricked into opening a malicious web
page, an attacker could exploit this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-3772)
Marc Schoenefeld and Christoph Diehl discovered several problems when
handling downloadable fonts. The new OTS font sanitizing library was added
to mitigate these issues. (CVE-2010-3768)
Gregory Fleischer discovered that the Java LiveConnect script could be made
to run in the wrong security context. An attacker could exploit this to
read local files and run arbitrary code as the user invoking the program.
(CVE-2010-3775)
Several problems were discovered in the JavaScript engine. If a user were
tricked into opening a malicious web page, an attacker could exploit this to
crash the browser or possibly run arbitrary code as the user invoking the
program. (CVE-2010-3766, CVE-2010-3767, CVE-2010-3773)
Michal Zalewski discovered that Firefox did not always properly handle
displaying pages from network or certificate errors. An attacker could
exploit this to spoof the location bar, such as in a phishing attack.
(CVE-2010-3774)
Yosuke Hasegawa and Masatoshi Kimura discovered that several character
encodings would have some characters converted to angle brackets. An
attacker could utilize this to perform cross-site scripting attacks.
(CVE-2010-3770)
USN-1020-1: Thunderbird vulnerabilities
2010/12/10 6:57:05 | Ubuntu security notices
Referenced CVEs:
CVE-2010-3768, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778
Description:
===========================================================
Ubuntu Security Notice USN-1020-1 December 09, 2010
thunderbird, thunderbird-locales vulnerabilities
CVE-2010-3768, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 10.04 LTS
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 10.04 LTS:
thunderbird 3.1.7+build3+nobinonly-0ubuntu0.10.04.1
Ubuntu 10.10:
thunderbird 3.1.7+build3+nobinonly-0ubuntu0.10.10.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
Details follow:
Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov
discovered several memory issues in the browser engine. An attacker could
exploit these to crash THunderbird or possibly run arbitrary code as the
user invoking the program. (CVE-2010-3776, CVE-2010-3777, CVE-2010-3778)
Marc Schoenefeld and Christoph Diehl discovered several problems when
handling downloadable fonts. The new OTS font sanitizing library was added
to mitigate these issues. (CVE-2010-3768)