GROWL

Antivirus, forensics, intrusion detection, cryptography, etc.
Message
Author
User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

GROWL

#1 Post by Lobster »

GROWL release 2.1 from Lobster April 2017
  • Guard!
    Restrict!
    Observe!
    Watch!
    Lookout!
This is very much a simple security template
GROWL is a simple, open, configurable, Puppy Security Tool. GROWL is used for enhancing security, education and probing ones set up.

Save the code as a text file, make it executable. Click to run. Modify if needed.

New for 2.1 Updated for Slacko64 Puppy -
New Password Generator from SFR, many new links and services

Code: Select all

#! /bin/bash
#
# GROWL v2.1 2017 Fri 7 April
# Security enhancements, probes, online services and info for Puppy Linux
# thanks to SFR, Shadow, Linux Kodachi, Buddha Vajrasattva and Puppy yap dogs (security paranoids everywhere)

# New for 2.1 
# eth0 disconnect, reconnect
# SFR Password Generator
# htop process viewer, pswrd reset, ipinfodb probe, noc.to probe, webkay probe, GNU Privacy Guard
# more anon proxies added, final thoughts
# 
# New for 1.9 Updated for Slacko64 Puppy - 6.3.2, Quick Start Help Button added, unblockweb.co proxy, Browser Paranoid Kit 

####### BEGIN not implemented ############
 
# <menuitem>
# <label>Temp Disable Firewall</label>
# <action>rxvt -e /etc/rc.d/rc.firewall stop</action>
# </menuitem>
# <menuitem>
# <label>Enable Firewall</label>
# <action>rxvt -fn *-Fixed-*-20-* -geometry 40x15+480+400 -C -bg orange -e /etc/rc.d/rc.firewall start ; sleep 10</action>
# </menuitem>

# <menuitem>
# <label>Activate EzTables Firewall</label>
# <action>rxvt -e /usr/sbin/fatdog-service-manager.sh</action>
# </menuitem> 

# <menuitem>
# <label>Reset root password</label>
# <action>passwd -d root 'test1' &</action>   
# </menuitem> 

####### END not implemented ############

#### SFR Password Generator
PASSGEN () 
{
   # Generates a password with at least:
   # - 1 lowercase letter
   # - 1 uppercase letter
   # - 1 digit
   # - 1 punctuation mark
   
   TITLE="PassGen"
   
   # Min: 8, Max:256, Default: 16
   LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
   [ $? -ne 0 ] && exit
   
   [ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end
   
   while true; do
      while true; do
         PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
         if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
            break   # all criteria were met, so break the loop
         fi
      done
      
      echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
      [ $? -ne 0 ] && break
   done
}

export -f PASSGEN

#### End of Password Generator code

export Grrr='
<window title="GROWL 2.1" window-position="1">
<vbox>
<menubar>
<menu> 
<menuitem>
<label>Quick DISCONNECT eth0</label>       
<action>ifconfig eth0 down &</action>
</menuitem>
<menuitem>
<label>Connect eth0</label>
<action>ifconfig eth0 up &</action>
</menuitem>   
<menuitem>
<label>Password Generator</label>
<action>PASSGEN &</action>
</menuitem>
<menuitem>
<label>Run as spot</label>
<action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action>
<action>rxvt -e su spot &</action>
<action>exit</action>
</menuitem>
<menuitem>
<label>Browser Paranoid Kit</label>   
<action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user SPOT" 600x0`</action>
<action>rxvt -e su spike &</action>           
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action>
<action>exit</action>
</menuitem>       
<menuitem>
<label>Run Browser securely</label>
<action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
<action>su spike -c&</action>
<action>firefox -safe-mode &</action>
</menuitem>
<menuitem>
<label>Encrypt a File: bycrypt</label>
<action>bcrypt_gui &</action>
</menuitem>
<menuitem>
<label>Ccrypt install</label>
<action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action>
</menuitem>
<menuitem>
<label>Enhanced Lock Screen</label>
<action>rm -f /root/.xlockrc</action>
<action>xmodmap -e "keycode 37="</action>
<action>xmodmap -e "keycode 109="</action>
<action>rxvt -e /usr/local/apps/Xlock/AppRun &</action>
<action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action>
<action>xmodmap -e "keycode 37=Control_L"</action>
<action>xmodmap -e "keycode 109=Control_R"</action>
</menuitem>
<menuitem>
<label>Remove Flash cookies</label>
<action>rm -rf /root/.macromedia</action>
<action>rm -rf /intrd/pup_rw/root/.macromedia/</action>
<action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>         
</menuitem>
<menuitem stock="gtk-quit">
<action>echo You selected the quit menu item</action>
<action type="exit">exit by menu</action>
</menuitem>
<label>Security</label>
</menu>
<menu>         
<menuitem>
<label>lsof process viewer</label>       
<action>rxvt -e lsof -i &</action>
</menuitem>
<menuitem>
<label>Htop process viewer</label>       
<action>rxvt -e htop &</action>
</menuitem>
<menuitem>
<label>Ipinfodb</label>
<action>defaultbrowser ipinfodb.com &</action>               
</menuitem> 
<menuitem>
<label>Noc.to</label>
<action>defaultbrowser noc.to &</action>               
</menuitem>
<menuitem>           
<label>Webkay</label>
<action>defaultbrowser webkay.robinlinus.com &</action>
</menuitem>
<menuitem>
<label>Shields Up</label>
<action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
</menuitem>
<menuitem>
<label>DNS leak test</label>
<action>defaultbrowser https://www.dnsleaktest.com &</action>
</menuitem>         
<menuitem>
<label>Hackermode</label>
<action>defaultbrowser https://www.hackerwatch.org/probe/ &</action>               
</menuitem>
<label>Probes</label>
</menu>   
<menu>   
<menuitem>
<label>LastPass Password Manager</label>
<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action>
<action>rxvt -e su spike &</action>           
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action>
<action>exit</action>
</menuitem>
<menuitem>           
<label>Photonmail</label>
<action>defaultbrowser https://protonmail.com/ &</action>
</menuitem>
<menuitem>           
<label>Curlmyip</label>
<action>defaultbrowser curlmyip.net &</action>
</menuitem>           
<menuitem>
<label>Run IRC Chat securely</label>
<action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action>
<action>su spot -c defaultchat &</action>
</menuitem>
<menuitem>
<label>Last Password</label>
<action>defaultbrowser https://lastpass.com/ &</action>
</menuitem>
<menuitem>
<label>Ipleak</label>
<action>defaultbrowser https://ipleak.net/ &</action>
</menuitem>
<menuitem>
<label>Startpage Search</label>
<action>defaultbrowser https://www.startpage.com/ &</action>
</menuitem>
<menuitem>           
<label>Filterbypass proxy</label>
<action>defaultbrowser https://www.filterbypass.me &</action>
</menuitem> 
<menuitem> 
<label>Unblock Proxy</label>
<action>defaultbrowser https://unblockweb.co/ &</action>
</menuitem>
<menuitem>           
<label>Anonymouse proxy</label>
<action>defaultbrowser anonymouse.org &</action>
</menuitem>
<menuitem>
<label>Vpnbook proxy</label>
<action>defaultbrowser http://www.vpnbook.com/webproxy &</action>
</menuitem>
<menuitem>
<label>HideMe Proxy</label>
<action>defaultbrowser https://hide.me/en/proxy &</action>
</menuitem>       
<label>Services</label>
</menu>
<menu>       
<menuitem>           
<label>Puppy Security Discussions</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/index.php?f=47&ppage=30&sort=lastpost&order=DESC &</action>
</menuitem>     
<menuitem>           
<label>About Flash Cookies</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
</menuitem>
<menuitem>
<label>Security Tips</label>
<action>defaultbrowser http://puppylinux.org/wikka/security &</action>
</menuitem>
<menuitem>
<label>Browser Security Add Ons</label>
<action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action>
</menuitem>
<menuitem>
<label>ISP shaping traffic?</label>
<action>defaultbrowser http://br
This would meanoadband.mpi-sws.org/transparency/glasnost.php &</action>
</menuitem>
<menuitem>
<label>Spot, Fido, root</label>
<action>defaultbrowser file:///usr/share/doc/root.htm &</action>
</menuitem>
<menuitem>
<label>FAQ</label>
<action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action>
</menuitem>
<menuitem>
<label>Honeynet Open Security info</label>
<action>defaultbrowser http://www.honeynet.org/about &</action>
</menuitem>
<menuitem>
<label>CIA Hacking info</label>
<action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action>
</menuitem>
<menuitem>         
<label>GNU Privacy Guard</label>
<action>`Xdialog --wrap --screencenter --left --title "GNU Privacy Guard" --msgbox "Install gnupg from the puppy installer \n GPG stands for GNU Privacy Guard. It is a key-based encryption method which means that a pair of keys is used to encrypt  \n and decrypt a message so that it arrives securely \n " 600x0`</action>
<action>defaultbrowser https://distrowatch.com/weekly.php?issue=20140407 &</action>
</menuitem> 
<menuitem>
<label>Install 64bit Tor Browser</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action>
</menuitem>   
<menuitem>
<label>Uefi Secure boot</label>
<action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action>
</menuitem>   
<menuitem>
<label>Edit source</label>
<action>geany GROWL21.sh &</action>
</menuitem>
<menuitem>
<label>Build a tin hat</label>
<action>defaultbrowser http://zapatopi.net/afdb/ &</action>
</menuitem>
<menuitem>
<label>Credits</label>
<action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 2.1\nApril 2017\nUpdated by Lobster. Password Generator Code by SFR" 600x0`</action>
</menuitem> 
<menuitem>
<label>Final thoughts ...</label>
<action>mplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action>
</menuitem>
<label>Help</label>
</menu>   
</menubar>
<frame>
<pixmap>
<input file>/usr/share/midi-icons/lock-screen48.png</input>
</pixmap>
<text><label>GROWL 2.1</label></text>
</frame>
<hbox>
<button help>
<action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'GROWL is a simple, open, configurable, Puppy Security Tool. \n\n Puppy Linux for the desktop, is more secure than Ios, Windows or Chrome OS \n\n GROWL is used for enhancing security, education, online services and probing ones set up. \n\n Lobster, April 2017')'" 600x0`</action>
</button>
<button cancel></button>
</hbox>
</vbox>
</window>'

gtkdialog4 --program Grrr
unset Grrr

PREVIOUS VERSION BELOW
___


Growl v 1.8 April 2015
VERSION bugs removed and non working DNS check hijack removed

  • New for 1.6:
    Updated for Puppy 5.3.1 'Slacko', Puppy Browser (Lucid specific) removed,
    browser run in safe mode
    edit file added
    update gtkdialog4
    LastPass Password Manager
To make use of this
save the 1.8 script text in a new script file (right click in required directory - then select new, script) :)

Code: Select all

#! /bin/bash
#
# Growl v 1.8 April 2015
# bugs removed and non working DNS check hijack removed
# created by Shadow and Lobster
# security enhancements and probes for Puppy Linux
# New for 1.7: DNS  checker added
# New for 1.6: Updated for Puppy 5.3.1 'Slacko', Puppy Browser (Lucid specific) removed,
# browser run in safe mode, edit file added, update gtkdialog4, LastPass Password Manager,


###################
# run secure telnet
# install fprot
#  <menuitem>
#     <label>install torr</label>
#        </menuitem>
#      <menuitem>
#            <label>restart x server</label>
#        </menuitem>
#      <menuitem>
#           <label>run secure telnet</label>
#        </menuitem>
#      <menuitem>
#     <label>install fprot</label>
#        </menuitem>
#

###################

#             <menuitem>
#            <label>Temp Disable Firewall</label>
#             <action>rxvt -e /etc/rc.d/rc.firewall stop</action>
#       </menuitem>
#              <menuitem>
#              <label>Enable Firewall</label>
#              <action>rxvt -fn *-Fixed-*-20-* -geometry 40x15+480+400 -C -bg orange -e /etc/rc.d/rc.firewall start ; sleep 10</action>
#        </menuitem>

export Grrr='
<window title="GROWL" window-position="1">
<vbox>
  <menubar>
    <menu>
        <menuitem>
             <label>Hide My Ass</label>
             <action>defaultbrowser http://hidemyass.com/ &</action>
         </menuitem>
         <menuitem>
            <label>Run Firewall</label>
            <action>rxvt -e /usr/sbin/firewall_install.sh</action>
         </menuitem>
         <menuitem>
            <label>Run as spot</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action>
            <action>rxvt -e su spot &</action>
            <action>exit</action>
         </menuitem>
         <menuitem>
           <label>Run IRC Chat securely</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action>
            <action>su spot -c defaultchat &</action>
         </menuitem>
         <menuitem>
             <label>Install Noscript</label>   
             <action>`Xdialog --wrap --screencenter --left --title "install noscript" --msgbox "Install noscript. \n As super user SPOT" 600x0`</action>
             <action>rxvt -e su spike &</action>           
             <action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/722 &</action>
             <action>exit</action>
         </menuitem>
         <menuitem>
          <label>LastPass Password Manager</label>
          <action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action>
          <action>rxvt -e su spike &</action>           
          <action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action>
          <action>exit</action>
         </menuitem>
         <menuitem>
            <label>Run Browser securely</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
            <action>su spike -c&</action>
            <action>seamonkey -safe-mode &</action>
         </menuitem>
         <menuitem>
             <label>Encrypt a File: bycrypt</label>
             <action>rxvt -e /usr/sbin/bcrypt_gui &</action>
         </menuitem>
         <menuitem>
             <label>Ccrypt install</label>
             <action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action>
         </menuitem> 
         <menuitem>
                 <label>Enhanced Lock Screen</label>
                 <action>rm -f /root/.xlockrc</action>
                 <action>xmodmap -e "keycode 37="</action>
                 <action>xmodmap -e "keycode 109="</action>
                 <action>rxvt -e /usr/local/apps/Xlock/AppRun &</action>
                 <action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action>
                 <action>xmodmap -e "keycode 37=Control_L"</action>
                 <action>xmodmap -e "keycode 109=Control_R"</action>
        </menuitem>
        <menuitem>
               <label>Remove Flash cookies</label>
               <action>rm -rf /root/.macromedia</action>
               <action>rm -rf /intrd/pup_rw/root/.macromedia/</action>         
        </menuitem>
               <menuitem stock="gtk-quit">
               <action>echo You selected the quit menu item</action>
               <action type="exit">exit by menu</action>
        </menuitem>
      <label>Security</label>
    </menu>
    <menu>
        <menuitem>
               <label>Shields Up</label>
               <action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
        </menuitem>       
        <menuitem>
               <label>Hackermode</label>
               <action>defaultbrowser http://hackerwatch.org/probe/ &</action>
        </menuitem>
        <menuitem>
               <label>Pcflank</label>
               <action>defaultbrowser http://www.pcflank.com/scanner1.htm &</action>
        </menuitem>
    <label>Probes</label>
    </menu>       
    <menu>
        <menuitem>
           <label>Credits</label>
            <action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 1.8\nApril 2015\nCreated by Lobster and Shadow" 600x0`</action>
        </menuitem>
        <menuitem>
             <label>About Flash Cookies</label>
             <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
         </menuitem> 
         <menuitem>
             <label>Security Tips</label>
             <action>defaultbrowser http://puppylinux.org/wikka/security &</action>
         </menuitem>
         <menuitem>
             <label>Seamonkey Security</label>
             <action>defaultbrowser https://addons.mozilla.org/en-US/seamonkey/browse/type:1/cat:46 &</action>
         </menuitem>
         <menuitem>
             <label>ISP shaping traffic?</label>
             <action>defaultbrowser http://broadband.mpi-sws.org/transparency/glasnost.php &</action>
         </menuitem>
         <menuitem>
           <label>Fido non root</label>
           <action>defaultbrowser http://bkhome.org/blog/?viewDetailed=02240 &</action>
         </menuitem>
         <menuitem>
           <label>FAQ</label>
           <action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action>
         </menuitem>
          <menuitem>
           <label>Last Password</label>
           <action>defaultbrowser https://lastpass.com/ &</action>
         </menuitem>
         <menuitem>
           <label>Edit source</label>
           <action>geany /usr/local/bin/growl &</action>
         </menuitem>
         <menuitem>
           <label>Build a tin hat</label>
           <action>defaultbrowser http://zapatopi.net/afdb/ &</action>
         </menuitem>
    <label>Help</label>
   </menu>   
  </menubar>
  <frame>
       <pixmap>
         <input file>/usr/share/midi-icons/lock-screen48.png</input>
       </pixmap>
       <text><label>Slacko GROWL 1.8</label></text>
   </frame>
   <hbox>
      <button cancel></button>
  </hbox>
</vbox>
 </window>'

gtkdialog4 --program Grrr
unset Grrr 
Last edited by Lobster on Fri 07 Apr 2017, 13:53, edited 14 times in total.
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

seaside
Posts: 934
Joined: Thu 12 Apr 2007, 00:19

#2 Post by seaside »

Lobster,

GRRReat example of pull-down menuing with GTKdialog.

As to the efficacy of the security programs included, I personally can attest that after using this program, not a single virus has found me and furthermore, the implementation of the metal hat instruction has also proved invaluable - not once have I been struck by aluminum foil! :D

Fun and useful information do go together. :idea:

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#3 Post by Lobster »

Thanks Seaside :)
Just had new feature noscript on and it was stopping me from editing this post . . . :?
Have now added for GROWL 0.5:
also
* Direct link to install 'Noscript'
* Run Puppy Browser
* Lock Screen
* About info
8)
Last edited by Lobster on Wed 18 Nov 2009, 11:11, edited 1 time in total.
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

aragon
Posts: 1698
Joined: Mon 15 Oct 2007, 12:18
Location: Germany

#4 Post by aragon »

lobster,

if you want to do something about
# lock screen security protection level = low, suitable for young children, coleagues at # work and Window users
you might want to look at slock: http://www.murga-linux.com/puppy/viewtopic.php?t=37642

work fine, but read the note!

aragon

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#5 Post by Lobster »

:) thanks aragon

It is an extra program :shock:
and this stand alone bash script would do the same
thing

Code: Select all

#!/bin/sh
rm -f /root/.xlockrc
rxvt -e /usr/local/apps/Xlock/AppRun
just click on key
add the same again
go to get food . . .
enter key word you typed to get back in . . .

that code incidentally is in Growl :)
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

aragon
Posts: 1698
Joined: Mon 15 Oct 2007, 12:18
Location: Germany

#6 Post by aragon »

aaah, ok!

and with that Ctrl+Alt+Backspace doesn't work?

aragon

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#7 Post by Lobster »

well I suppose you could disable the ctrl keys (if you must)
like so

Code: Select all

xmodmap -e 'keycode 37='
xmodmap -e 'keycode 109='
so you have:

Code: Select all

#!/bin/sh
xmodmap -e 'keycode 37='
xmodmap -e 'keycode 109='
rm -f /root/.xlockrc
rxvt -e /usr/local/apps/Xlock/AppRun
xmodmap -e 'keycode 37=Control_L'
xmodmap -e 'keycode 109=Control_R'
:)
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
MU
Posts: 13649
Joined: Wed 24 Aug 2005, 16:52
Location: Karlsruhe, Germany
Contact:

#8 Post by MU »

Lobster,

the browser does not run as spot.
You can check it like this:
a Gtk program (like seamonkey) will not look as usual, as there is no GTK themefile for spot.
So seamonkey uses the default grey style, where the scrollbars look like in Windows 95.

To run as spot, you had to modify your script:

Code: Select all

       <menuitem>
             <label>Run browser securely</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Run default browser. \n As super user SPOT" 600x0`</action>
	       <action>su spot -c defaultbrowser &</action>
         </menuitem>
Same with Puppybrowser.

Mark
[url=http://murga-linux.com/puppy/viewtopic.php?p=173456#173456]my recommended links[/url]

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#9 Post by Lobster »

Thanks Mark

0.7 has your mods
also disabled ctrl keys on screenlock
(I think)
The enclosed
zip file includes the enhanced Puppy powered version :)
Attachments
growl7.zip
(7.02 KiB) Downloaded 2393 times
Last edited by Lobster on Wed 18 Nov 2009, 11:10, edited 1 time in total.
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#10 Post by Lobster »

0.8 uploaded - see first post in this thread
added probe options
and 'remove flash cookies' option
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#11 Post by Lobster »

Image

the code in the first post has been updated to v1
(just replace existing Growl text with the supplied code)
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
munduruku
Posts: 10
Joined: Thu 27 Aug 2009, 13:25
Location: City of Porto Alegre in Brazil
Contact:

#12 Post by munduruku »

I experimenting difficulties in downloading ISO with
correct SHA256SUM and I realized perpetrators kind of
enter my computer prior to the ISO is finished and now I am learning more about detecting the intruders, that is how I got to this page and I thank you the charity of offering us so many answers. I liked the SEASIDE statement : "the implementation of the metal hat instruction has also proved invaluable - not once have I been struck by aluminum foil!". I am a biochipped person under Maser Micro-wave torturing and I don't use tin foil because if the federals attack someone with Maser North-American patent 60011991, tin foil really does increase the Maser effect, I am wearing right now wedding net cloth coated with a mixture of mineral graphite and plastic glue. The comparison SEASIDE did struck me of a timely instruction, we have to firewall the computer and also our cortex, without geodesic domes to protect our households form micro-wave wireless signals we will never know for sure who are stealthily connected to the motherboard, let alone our brains.

User avatar
walter90
Posts: 282
Joined: Wed 26 Aug 2009, 03:53
Location: Pennsylvania, USA

#13 Post by walter90 »

munduruku wrote:I experimenting difficulties in downloading ISO with
correct SHA256SUM and I realized perpetrators kind of
enter my computer prior to the ISO is finished and now I am learning more about detecting the intruders, that is how I got to this page and I thank you the charity of offering us so many answers. I liked the SEASIDE statement : "the implementation of the metal hat instruction has also proved invaluable - not once have I been struck by aluminum foil!". I am a biochipped person under Maser Micro-wave torturing and I don't use tin foil because if the federals attack someone with Maser North-American patent 60011991, tin foil really does increase the Maser effect, I am wearing right now wedding net cloth coated with a mixture of mineral graphite and plastic glue. The comparison SEASIDE did struck me of a timely instruction, we have to firewall the computer and also our cortex, without geodesic domes to protect our households form micro-wave wireless signals we will never know for sure who are stealthily connected to the motherboard, let alone our brains.

Oooooookay.....!

So Lobster, do I need to keep coming back here to get code updates?

User avatar
upnorth
Posts: 287
Joined: Mon 11 Jan 2010, 19:32
Location: Wisconsin UTC-6 (-5 DST)
Contact:

#14 Post by upnorth »

Cool Program! 8)
Thanks.

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#15 Post by Lobster »

http://www.murga-linux.com/puppy/viewto ... 765#458765

What code is required to delete cookies and supercookies from browsers?
If we have all the locations then it should be something like
<action>del /user/firefox/superdupercookylocation</action>
possibly the permissions would need to be changed too?
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
upnorth
Posts: 287
Joined: Mon 11 Jan 2010, 19:32
Location: Wisconsin UTC-6 (-5 DST)
Contact:

#16 Post by upnorth »

Seems like the real trick here would be to get the names with path of the files to delete.

so I wondered if the find command would work universally:
for the supercookies
#find ./.mozilla -name webappsstore.sqlite
For me this returns an exact listing of the files to be deleted.
(from both firefox&seamonkey profiles)
Not sure what to do next though.

update:
used this successfully to delete, with a webappsstore.sqlite & coolkies.sqlite present in both seamonkey and firefox profiles and assuming the default dir of ~/

find ./.mozilla -name webappsstore.sqlite| xargs rm
find ./.mozilla -name cookies.sqlite| xargs rm

and this will accomplish the same task -take your pick:
find ./.mozilla -name webappsstore.sqlite -exec rm {} \;
find ./.mozilla -name cookies.sqlite -exec rm {} \;

better run that by the experts in programming thread though, to make sure
:?:
In the case of both firefox and seamonkey, when the app is running, the file webappstore.sqlite didn't exist on disk so was probably somewhere in a protected memory space. There is also a special lock file (link to socket) in the profile dir when they are running.

for the regular cookies in firefox and seamonkey 2.x:. I just deleted cookies.sqlite and cookies.sqlite-journal in my seamonkey profile while it was running, restarted and its fine.

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#17 Post by Lobster »

thanks upnorth
A job for the tin hats :wink:
I never use GROWL - too paranoid Dude . . .

. . . so it up to those interested to update it
anyone?

Thanks again
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#18 Post by Lobster »

Just tried to use the ##slackware channel with xchat (also on freenode) they would not let me join from root

That is a bit unslack
anyway I upgraded GROWL
here is the code if anyone wants to pet it :)

Code: Select all

#! /bin/bash
# Growl v 1.2 May16 2011
# created by Shadow and Lobster
# security enhancements and probes for Puppy Linux

###################
# run secure telnet
# install fprot
#  <menuitem>
#           <label>install torr</label>
#        </menuitem>
#      <menuitem>
#            <label>restart x server</label>
#        </menuitem>
#      <menuitem>
#           <label>run secure telnet</label>
#        </menuitem>
#      <menuitem>
#            <label>install fprot</label>
#        </menuitem>
#
###################

#             <menuitem>
#            <label>Temp Disable Firewall</label>
#             <action>rxvt -e /etc/rc.d/rc.firewall stop</action>
#       </menuitem>
#              <menuitem>
#              <label>Enable Firewall</label>
#              <action>rxvt -fn *-Fixed-*-20-* -geometry 40x15+480+400 -C -bg orange -e /etc/rc.d/rc.firewall start ; sleep 10</action>
#        </menuitem>

export Grrr='
<window title="GROWL" window-position="1">
<vbox>
  <menubar>
    <menu>
       <menuitem>
            <label>Run Firewall</label>
            <action>rxvt -e /usr/sbin/firewall_install.sh</action>
        </menuitem>
        <menuitem>
            <label>Run as spot</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action>
            <action>rxvt -e su spot &</action>
            <action>exit</action>
         </menuitem>
         <menuitem>
             <label>Install Noscript</label>   
             <action>`Xdialog --wrap --screencenter --left --title "install noscript" --msgbox "Install noscript. \n As super user SPOT" 600x0`</action>
             <action>rxvt -e su spot &</action>           
             <action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/722 &</action>
             <action>exit</action>
         </menuitem>
         <menuitem>
            <label>Run Browser securely</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
            <action>su spot -c defaultbrowser &</action>
         </menuitem>
         <menuitem>
            <label>Run IRC Chat securely</label>
            <action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux chanelas super user SPOT" 600x0`</action>
            <action>su spot -c defaultchat &</action>
         </menuitem>
         <menuitem>
             <label>Puppy Browser</label>
             <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Puppy Browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
             <action>su spot -c PuppyBrowser &</action>
         </menuitem>
         <menuitem>
             <label>Encrypt a File: bycrypt</label>
             <action>rxvt -e /usr/sbin/bcrypt_gui &</action>
         </menuitem>
         <menuitem>
             <label>Ccrypt install</label>
             <action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action>
         </menuitem>  
         <menuitem>
                 <label>Enhanced Lock Screen</label>
                 <action>rm -f /root/.xlockrc</action>
                 <action>xmodmap -e "keycode 37="</action>
                 <action>xmodmap -e "keycode 109="</action>
                 <action>rxvt -e /usr/local/apps/Xlock/AppRun &</action>
                 <action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action>
                 <action>xmodmap -e "keycode 37=Control_L"</action>
                 <action>xmodmap -e "keycode 109=Control_R"</action>
        </menuitem>
        <menuitem>
               <label>Remove Flash cookies</label>
               <action>rm -rf /root/.macromedia</action>
               <action>rm -rf /intrd/pup_rw/root/.macromedia/</action>         
        </menuitem>
               <menuitem stock="gtk-quit">
               <action>echo You selected the quit menu item</action>
               <action type="exit">exit by menu</action>
        </menuitem>
      <label>Security</label>
    </menu>
    <menu>
        <menuitem>
               <label>Shields Up</label>
               <action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
        </menuitem>        
        <menuitem>
               <label>Hackermode</label>
               <action>defaultbrowser http://hackerwatch.org/probe/ &</action>
         </menuitem>
         <menuitem>
               <label>Pcflank</label>
               <action>defaultbrowser http://www.pcflank.com/scanner1.htm &</action>
         </menuitem>
    <label>Probes</label>
    </menu>       
    <menu>
        <menuitem>
           <label>About</label>
            <action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 0.8\n18 Nov 2009\nCreated by Shadow and Lobster" 600x0`</action>
        </menuitem>
        <menuitem>
             <label>About Flash Cookies</label>
             <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
         </menuitem>  
         <menuitem>
             <label>Black Ops</label>
             <action>defaultbrowser http://puppylinux.org/wikka/BlackOps &</action>
         </menuitem> 
         <menuitem>
             <label>Seamonkey Security</label>
             <action>defaultbrowser https://addons.mozilla.org/en-US/seamonkey/browse/type:1/cat:46 &</action>
         </menuitem> 
         <menuitem>
             <label>ISP shaping traffic?</label>
             <action>defaultbrowser http://broadband.mpi-sws.org/transparency/glasnost.php &</action>
         </menuitem> 
         <menuitem>
           <label>FAQ</label>
           <action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action>
         </menuitem>
         <menuitem>
           <label>Build a tin hat</label>
           <action>defaultbrowser http://zapatopi.net/afdb/ &</action>
         </menuitem>
    <label>Help</label>
   </menu>   
  </menubar>
  <frame>
       <pixmap>
         <input file>/usr/share/midi-icons/lock-screen48.png</input>
       </pixmap>
       <text><label>GROWL 1.2</label></text>
   </frame>
   <hbox>
        <button cancel></button>
  </hbox>
</vbox>
 </window>'

gtkdialog3 --program Grrr
unset Grrr
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#19 Post by Lobster »

See first post for updated GROWL

new for 1.3
  • New for 1.3: Puppy Security link to wikl, Last Password link in help, Fido non root in Help, Hide My Ass - browse via proxy
To make use of this
save the 1.3 script text in a new script file (right click in required directory - then select new, script) :)

Puppys Are Safe
Spread CUR (Courage, Understanding and Reassurance) rather than FUD
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

#20 Post by nooby »

Quote from Lobster

Just tried to use the ##slackware channel with xchat (also on freenode) they would not let me join from root
/ Quote from Lobster ends here

Whoa as we say Up North Sweden :) How did they know you where in root.

Does not that mean that every "mean" site would know that we are root too and blast every attach weapon them have at us? sql java injection whatever names them have?

We should get some Stealth Shields Up kind of being invisible.
I use Google Search on Puppy Forum
not an ideal solution though

Post Reply