[TIPS] Making searching easier on OpenERP

| Tuesday, May 1, 2012

OpenERP is increasingly becoming a serious contender in the ERP market, as its features and usability improve. This tip explains how its flexible views provide ways to save time retrieving the data you want. You can search for the exact data you are interested in by just filling out the necessary search filters, but if there is a search which you perform on a regular basis, you have the option of saving filters to make life easier.
This feature was added in the OpenERP webclient from version 6.0.0 and is available for all users. Simply go to any tree view and you will notice to the bottom right of the search filters, there is a drop down selection box ‘– Filters –’… this is where the magic happens.

Read more >>>

How to mount ntfs/fat32 external USB drive to CentOS/Fedora/RHEL

| Monday, April 30, 2012

First you need ntfs mount. For that you need to install two packages.
This gets your ntfs-3g

wget http://marush.com/wp-content/uploads/2009/03/ntfs-3g-200921-el5i686.rpm
Then run to install ntfs-3g
rpm -ihv  ntfs-3g-200921-el5i686.rpm
Second get this fuse (I do not know why. Without fuse you can not mount ntfs-3g. Please go through fuse sourceforge document.)
wget http://pkgs.fedoraproject.org/repo/pkgs/fuse/fuse-2.6.0.tar.gz/fa6c7b07a0be3a3e30d6cf3a6bad5817/fuse-2.6.0.tar.gz

Read more >>>

New module to choose the fiscal position from the country

| Wednesday, April 4, 2012

In standard OpenERP, you can choose a fiscal position for every partner, and your choice will be used when you select a Partner in an Invoice or Sale Order. In many situations it’s convenient to set a default position for all partners belonging to a specific country.
he module we developed is called account_fiscal_position_country, and can be found on apps.openerp.com.

Configuration
Go to Sales > Configuration > Address Book > Localisation > Countries.
Choose a country, and enter the default Fiscal Position for that country.
Usage
Done that, when you create a Sale or Purchase Invoice and select a Partner, the Fiscal Position you defined for the country of the Partner will be selected. Note that the standard OpenERP behaviour is still defined: if you set a specific Fiscal Position for that Partner, that one (and not the one from the Country) will be used.
Sale Orders
To get the same functionality in Sale Orders, install the module account_fiscal_position_country_sale as well. The modules are kept separate to minimize dependencies.
Of course, feedback is welcome! You can use the bug tracker in launchpad for that:
source:http://adf.ly/4i5KS

Read more >>>

Installasi postgresql 9.0 ubuntu

|

hello …. im here to shared again about installation postgresql :D this is new version stable :D
This is a very quick and painless process. If you have not done so already, make your life easier by installing python-software-properties:



$sudo apt-get purge postgresql*
$sudo apt-get update
next :
$sudo apt-get install python-software-properties
Next up is adding the backports repo and updating apt:
$sudo add-apt-repository ppa:pitti/postgresql && sudo apt-get update
UPDATE: In the comments, Jason Froebe points out that if you already have an earlier version of PostgreSQL installed, you can just upgrade it:
$ sudo apt-get upgrade
Finally install postgresql-9.0:
$ sudo apt-get install postgresql-9.0 libpq-dev
The libpq-dev package is for compiling wrappers/clients against libpq.
There you’re done!
NOTE:
Default config directory is: /etc/postgresql/9.0/main
Default data directory is: /var/lib/postgresql/9.0/main
Cheers :D
Source : http://adf.ly/4i7Tt

Read more >>>

computer security (learn first)

| Wednesday, March 24, 2010

This article is about computer security hackers. For other types of computer hackers, see Hacker (computing). For other uses, see Hacker.
In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls.[1] The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.[2]
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This community was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers"


Read more >>>

computer security

|

This article is about computer security hackers. For other types of computer hackers, see Hacker (computing). For other uses, see Hacker.
In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls.[1] The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.[2]
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This community was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers"


Read more >>>

Top 13 Security/Hacking Tools & Utilities

|

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
Get Nmap Here

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Get Nessus here

3. John the Ripper

Get New Realese JTR
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
Get Here

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice
Get superscan Here

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Get p0f here

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Here

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.
Get Yersinia here

9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
get here

10. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
Get here LCP

11. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Get kismet here

12. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized “rogue” access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving

Get here

13. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
hping

Read more >>>