Because their long list of features, looks the most complete mobile browser:
- The familiar Awesome Bar;
- Weave Sync for sharing your browser state between your PC and mobile;
- tabbed browsing and Firefox add-ons.
$sudo apt-get install alien
$sudo alien -k name_of_rpm_file.rpm
#! /bin/sh
echo "\n\nSETTING UP IPTABLES FIREWALL..."
echo " Loading firewall server rules..."UNIVERSE="0.0.0.0/0"
# Clear any existing rules and setting default policy to DROP
iptables -P INPUT DROPiptables -F INPUTiptables -P OUTPUT DROPiptables -F OUTPUTiptables -P FORWARD DROPiptables -F FORWARD
# Flush the user chain.. if it existsif [ "`iptables -L | grep LOG_AND_DROP`" ]; theniptables -F LOG_AND_DROPfi
# Delete all User-specified chainsiptables -X
# Reset all IPTABLES countersiptables -Z
# Creating a DROP chainiptables -N LOG_AND_DROPiptables -A LOG_AND_DROP -j LOG --log-prefix "atack happens------->"iptables -A LOG_AND_DROP -j REJECT --reject-with icmp-host-unreachable
echo " - Loading INPUT rulesets"
######################################################################## INPUT: Incoming traffic from various interfaces. All rulesets are# already flushed and set to a default policy of DROP.#
# loopback interfaces are valid.#iptables -A INPUT -i lo -s $UNIVERSE -d $UNIVERSE -j ACCEPT
# remote interface, claiming to be local machines, IP spoofing, get lostiptables -A INPUT -s 192.168.0.0/24 -j LOG_AND_DROPiptables -A INPUT -s 127.0.0.0/8 -j LOG_AND_DROPiptables -A INPUT -s 200.200.200.200 -j LOG_AND_DROPiptables -A INPUT -p tcp ! --syn -m state --state NEW -j LOG_AND_DROPiptables -A INPUT -p ip -f -j LOG_AND_DROPiptables -A INPUT -p tcp --tcp-flags ALL ACK,RST,SYN,FIN -j LOG_AND_DROPiptables -A INPUT -m state -p icmp --state INVALID -j LOG_AND_DROP
# Allow any related traffic coming back to the MASQ server iniptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPTiptables -A INPUT -i lo -s 200.200.200.200 -j ACCEPTiptables -A INPUT -i lo -s 127.0.0.1 -j ACCEPT
# Catch all rule, all other incoming is denied and logged.iptables -A INPUT -s $UNIVERSE -d $UNIVERSE -j LOG_AND_DROP
echo " - Loading OUTPUT rulesets"
######################################################################## OUTPUT: Outgoing traffic from various interfaces. All rulesets are# already flushed and set to a default policy of DROP.#
iptables -A OUTPUT -o lo -d 200.200.200.200 -j ACCEPTiptables -A OUTPUT -o lo -d 127.0.0.1 -j ACCEPTiptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPTiptables -A OUTPUT -m state --state NEW -j ACCEPT
echo " - Loading FORWARD rulesets"
######################################################################## FORWARD: Enable Forwarding and thus IPMASQ# Allow all connections OUT and only existing/related IN
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPTiptables -A FORWARD -s 192.168.0.0/24 -m state --state NEW -j ACCEPT
# Catch all rule, all other forwarding is denied and logged.iptables -A FORWARD -j LOG_AND_DROPecho " Firewall server rule loading complete\n\n"
#!/bin/bash
declare -a ARRAYAfter you have all files in PDF extension you can use this command to join all PDF files:
ARRAY=$(ls | grep .jpg | grep -v .pdf)
for i in $ARRAY; do
mv "$i" "$i.pdf"
done
#código#!/bin/bash
#Program made by
##António L. R. Mendes
function setPaper(){declare -a ARRAY
PATH_IMG=$1
TIME=$2
ARRAY=$(ls $PATH_IMG | grep [jpg][png] | sort -R)
for i in $ARRAY; do
gconftool-2 -t str -s /desktop/gnome/background/picture_filename "$PATH_IMG/$i"
sleep $TIME
done
setPaper $PATH_IMG $TIME
}
#we can config:
# $1 - path to the images
# $2 - time to change
PATH_IMG=$1
TIME=$2
if [ ! -d "$PATH_IMG" ]; then
echo "The directory $PATH_IMG is not a valid directory."
exit
fi
if [ ! $TIME -gt 0 ]; then
echo "The time introduced is not valid so the default value is 60 sec."
$TIME=60
fi
echo "Program will change images in $PATH_IMG every $TIME seconds."
setPaper $PATH_IMG $TIME