Mobil Mewah

Salah satu sumber Inspirasi.

Mobil Sport terbaik

Anda pasti bisa memilikinya.

Bermain dengan pesawat

Salah satu ide yang gila, Balapan di udara.

Bermain di angkasa

Apakah ini salah satu Goals dalam hidup anda? anda pasti bisa mencapainya

Friday 18 April 2014

The Best Compression available

When working with files, especially large files and need to be transfered over the network, one optimization can be done is with the file size. We can compress the file to the smallest size, but how small is small ?

So i look up for some comparison about the file compression to be used in linux system. For usual compression in linux, the compression used was .tar.gz or .tar.bz2 . I prefer use .tar.bz2 because better than .tar.gz .

But you know what, there are other compression that is better which is .rar and .7z .

I look for some data and got the comparison chart. You can see the chart below.
Surely the result is compelling, and look to use .7z . In linux there are 7zip package which called p7zip , in debian linux.

I also tested with my current file, which use bz2, and compress it using 7z, I got around 20Mb - 100 Mb more disk space with 7z compression, even with mp4 video files.

So more disk space left for storage when using 7z compression. No worries with the compatibility, because 7zip also available in any Operating System like linux, windows, MacOS.

Here are some how to use 7z compression.

To install :

$ sudo apt-get install p7zip-full

To compress :

$ 7za a big-bang-theory.7z  big-bang-theory/

To test compression :

$ 7za t big-bang-theory.7z

To uncompress :

$ 7za x big-bang-theory.7z

So happy Compressing.


Monday 14 April 2014

Heartbleed SSL Vulnerability

Recently the IT Security community had a security event  about OpenSSL bug which is widely use by server that implement SSL/TLS secure connection.

The bug enable an attacker to see 64k size of memory content of the server without leaving a trace. This including the primary data, which is private key of the encryption.

The bug revealed by Neel Mehta of Google's security team and reported the defect on April 1, 2014 to the OpenSSL team.

The Heartbleed name it self come from a Finnish cybersecurity company, which also created the bleeding heart logo, and launched the domain Heartbleed.com to explain the bug to the public, which called codenomicon. They reported on April 3, 2014.

This bug effect was so big to the internet community. On April 10, "Cisco Systems and Juniper Networks, two of the biggest creators of Internet equipment, announced that their products had been affected by the Heartbleed bug. Routers, firewalls and switches, all likely been affected by the bug, leaving your personal information at risk of being stolen by hackers."



Even some independent researchers On April 12, were able to steal private keys using this attack from an experimental server intentionally set up for that purpose by CloudFlare.

What is the impact of this ?

When a service that use OpenSSL which is vulnerable, some attacker may be able to retrieve sensitive information, anything include secret keys which is the primary information in OpenSSL infrastructure.


With the secret key, they can create a spoofing server, even run a Man in The Middle attack with the private key. Even with you not know that it was happening.

Who uses OpenSSL ? any service which utilize SSL/TLS would it be https server, vpn connection end point, in switch, router, email, is using the OpenSSL for the underlying system.

I also use the OpenSSL software, because its opensource and free. Many internet server and services use it. But not every OpenSSL implementation affected. Check your OpenSSL software version you use.

The affected versions of OpenSSL include OpenSSL 1.0.1 through 1.0.1f (inclusive). OpenSSL 1.0.1g, OpenSSL 1.0.0 branch and OpenSSL 0.9.8 branch are not vulnerable

Almost every Linux distribution come with OpenSSL by default. My self using FreeBSD, but the affected version is up to FreeBSD 9.2 or release that use OpenSSL version mentioned above. You can check in FreeBSD website.

Even in my local linux machine, which is Linux Debian 7.1 Wheezy affected by this. But Debian had release a fix in here.

What to do for user is make sure have a password which is changed every 30 days minimal. With this event, you better change your password. I even hear yahoo was affected and they fix it quickly, but who knows what had leaked.


Monday 7 April 2014

Text To Speech in Linux Debian

Do you know that in linux, you can enjoy a good quality of text to speech application with good quality like the one available in Windows.

And just like other high quality open source software, these application are free to use.

The one i found out and used it is quite easy to use.

I will share it in here so you can benefit with the application.

First you need libreOffice, which will become the GUI. Neat right, because we usually use libreOffice to word processing office like apps.

Then we combine SVOX tools (pico) with LibreOffice.

To install in linux debian :

$sudo apt-get install libttspico0 libttspico-utils libttspico-utils 

And how to run the tts? well, we can use the LibreOffice extension.

Install the readtext extension of LibreOffice.

To install the readtext extension, just download the extension, then in LibreOffice, go to Tools - Extension Manager , and add the extension file.

After that you must reload LibreOffice. It will show up as a small smiling icon in the left side of the toolbar.


And to use it, just select the text, and click the readtext extension icon (a Happy face with a ballon) , a pop up will be shown, and setup the command line options to use PICO_READ_TEXT_PY .


Then you get a working text-to-speech system with the beauty of Open Source program.

Enjoy the text to speech system.

Tuesday 1 April 2014

Debian linux Routing configuration

In Debian linux, i need to add some IP specific routing config. I have a default route for internet, and have other gateway for other services to access.

So i need to be able make the routing configuration is injected when the network services loaded.

How to do this are, in your /etc/network/interfaces add this :

auto eth0

iface eth0 inet static
  hwaddress 00:1b:24:b0:b7:8f
  address 192.168.113.109
  netmask 255.255.255.0
  broadcast 192.168.113.255
  gateway 192.168.113.224
  up route add -net 172.16.0.0 netmask 255.255.0.0 gw 192.168.113.204
  up route add -net 172.30.0.0 netmask 255.255.0.0 gw 192.168.113.205
  up route add -net 192.168.0.0 netmask 255.255.0.0 gw 192.168.113.206
  up route add -net 10.0.0.0 netmask 255.255.0.0 gw 192.168.113.104


So the result are like this :

Default traffic going to 192.168.113.224 , and traffic going to network 172.16.x.x going through gateway 192.168.113.204 , and same rule apply to the next network destination.

You can add more route according your needs.



Twitter Delicious Facebook Digg Stumbleupon Favorites More