Friday, August 26, 2011

HEARING ART


 
Many people can 'say', but few are willing to 'hear'. And if we want to go back to the law of nature, we should have to listen more than talk. Is not God gave us two ears and only one mouth? :-)

Likewise, if we see the newborn. First auditory function than others. So why listen more difficult than speaking?

Although invisible to hear is an easy thing, but in fact many people prefer to listen rather than listen.
Listening is an essential part of determining effective communication. Without the ability to hear the good, will usually appear a lot of problems.

What often happens, we feel that we are most true. We are not interested in hearing opinions that differ and depend only on our way.

Always feel right, most competent, and never make mistakes
ough ... maybe angel! :-)

If we always feel that we are correct, and we're the most appropriate way, that means we never listen.

Ideas and our opinions are very difficult to change if the facts do not support our beliefs. Even if there are any facts we may only just glanced at it.

Maybe this time we are comfortable with the way we are, but for a long period of time, people will resist and resent us.

If we want to start listening to other people, then one day we will realize our mistakes. The answer to overcome this trait is to hone skills active listening.

Hearing is not always with the mouth shut, but it also involves our active participation. Good to hear not expect the coming turn to speak.

Listening is a commitment to understanding the other person talks and our feelings. It is also a form of appreciation that what other people are talking about is beneficial to us. At the same time we are also biased to take maximum benefit from the talks.

Art of listening can build a relationship. If we do well, people will be attracted to us and we will be more harmonious interaction.

The following simple techniques that can be practiced by the Companions with the very natural to be a good listener:
1.       Maintain good eye contact with.
This indicates to the listener about the openness and sincerity of our
2.       Lean forward. This shows our interest in the subject.
This method will also remind us to have another sudat view, ie not just focus on ourselves.
3.       Create questions
when there are things that need clarification or new information that we need to investigate from our speaker.
4.       Create a distraction talks
Interesting. This can make the conversations more lively and not monotonous.
5.       Cuplik or reset some of the words spoken by our speaker.
This shows that we really listen well to memorize a few snippets of words.
6.      Make a commitment to understand what he says, even though we dislike or anger.
From here we will find out the values ​​that we applied the other person, which may differ from the values ​​that we apply.

By trying to understand, so we'll find a bias point of view, insight, perception or a new awareness, which does not occur to us earlier.

A good listener is actually almost as interesting as a good conversationalist. If we are always in the correct pattern for a certain period, then one day we will feel the benefits.

The process might seem long and tedious, but eventually it will feel valuable efforts that we have done. We will feel better about ourselves, our relationships, our friends, our children, and jobs.
Conclusion: Be a good listener, because these properties may be key to developing a positive mind, and is one of the Companions ladder to achieve success! :-)

Friday, August 12, 2011

WIRELESS HACKING


With the ease of accessing the internet via wireless, many laptop users are always looking for or take advantage of hotspots available to always be active. There are simply open the email, there are just in it for browsing, in fact, there is also to send the office duties. The pemilk and hotspot users do not realize that perhaps, among them some harm. For simple cases, a false public hotspot can trap the users to provide their username and password without them knowing that they have given it.in this article, I will explain some of the tricks used by some people who intend in using wireless ugly. To prevent problems, can be seen in another article in this website that provides solutions and prevention.
To make wireless hacking, the first step taken is to find a wireless network that is closest to you. This can be done with Wardrive (if done outside the room) or around hotspots around the existing (if indoors). In this article, the author tries to describe how to use Wardrive because it is safer and remember we are just trying to figure out which wireless networks are weak.
Wardrive
Wardrive is an electronic fishing expedition to find a weak wireless networks around you. Most, most of these wireless networks are not even given a password or encryption to protect it. 
This activity is performed to look for any network that will be the object of attack.Thus, we can carry out attacks against wireless networks that we have to target. To do the activity of this simple equipment needed to start it.
List of equipment needed:
• GPS receiver 
if your area already have a GPS, you can easily mark any areas that you explore and give a special mark in the areas where you already are exploring such a weak wireless network.
• Wireless PCMI card 
equipment is required to extend your wireless network. Typically, this equipment is equipped with a jack for wireless receiver antenna or cellular network support for a wider network.
• Wireless antenna receiver 
equipment is required to add wireless coverage PCMI card that you have to connect the jack he had into the wireless card. If the wireless card you have do not have the jack, you can buy a wireless antenna that uses a usb port that has many in the market. But, if you are not satisfied with the ability to obtain the network using equipment you have, you can membikinnya cheaply by following the instructions on the website below: http://www.instructables.com/id/EQARE4I72GEPUCHTHU/
Search Wireless Network
Most wireless networks that supply does not have security or encryption to protect it.To track it down, it takes the equipment supports. There are two tools that are commonly used for this purpose.
• Network Stumbler or better known as NetStumbler 
windows based software is very easy to find wireless signals emitted from the hotspot to the user. Meet the author of many wireless users use this software to find the right location to get a wireless signal from a strong hotspot or hotspot in the area surveyed is good enough or not.
• Kismet 
One of the functions that are missing from NetStumbler is the ability to display the SSID of the hotspot. on the access point, they are routinely broadcasting this info always. cuman, it mostly contains the SSID info unreadable or encrypted. This program will find and display the SSID is not broadcast by the hotspot and it is very important to search for wireless networks to be tested.
Entering the wireless network that has been found
After finding a line network, the next step is to try to connect to a network. If the network does not use security encryption, you can directly access to the SSID. If the SSID is not broadcast, you can enter the SSID is not broadcast. Of course, you can easily find that is not broadcast using the existing features of kismet is not it? If the network is encrypted, you need one of the tools below.
• CoWPAtty 
This software uses the brute force method to open a WPA-PSK, PSK which itself is considered as a new WEP wireless security security unrtuk in this rumah.Progam try some of the various options from the dictionary file if anyone is in accordance with what is used as key
• ASLeap 
if any network using LEAP, this tool can be used to find such a username and password data that are online on the network, and access override pemiliknya.LEAP not protect the process such as EAP, which was a major weakness for the LEAP.
Wireless data sniffing or steal
No matter whether you are connected directly to a wireless network or not, if there are wireless networks in the area near you, there is always the data that passes through the network whenever it is. To retrieve data, you need the equipment to retrieve or view data.
• Wireshark (Ethereal predecessor) 
where there is still debate how ynag quickest in responding to this program, there is no doubt that this software is very useful. he can look for an existing wireless network complete with security info. This software can loot the data from the 802.11 hotspot management and can also be used as a tool to look for hotspots that do not protect themselves with the SSID.
• SwitchSniffer 
This software is a program that can search for the active user in the LAN switch network and can take a whole packet of data without the consent of the user is concerned, this software can also detect the program is running and membokir arpspoofer sessions like firewall defenses. if you combine this program with another sniffer program, you can view and retrieve user id and passwords of other users in your network.
Your next action?
Once you know how the process of hacking, it's up to you what to do with data or hotspots that you have found and you exploit it. if you want to report to admin hotspots that there are weaknesses, you have become part of the Ethical hackers.but, if you even further exploit these hotspots, then you become Blackcap Hacker.you would choose to be, it is your right. I only share info only. I hope this tutorial is useful for you.
Sources: 
- Hack proofing your network 
- hacking wireless networks for dummies 
- http://www.ethicalhacker.net/content/view/16/24/

Thursday, August 11, 2011

Learning Linux Basics


1. Foder Structure In Linux
As Windows has its own folder structure (eg: \ Windows, \ Program files, \ Document and Settings), on Linux also has its own file structure. Here are the existing folder structure on the Linux 
/ = root 
|-bin = binary 
|-boot = kernel save 
|-etc = configuration files 
|-home = user data file 
|-lib = library 
|-usr = application 
|-var = mail / log / database 
|-mnt = mount-point 
|-tmp = temp 
|-sbin = binary super user
2. Installation Preparation Linux (Mandriva 2006)
  1. Media for insallasi can be: CD / DVD, HDD and Network (ftp, http, nfs) 
    Partition in Linux, at least consists of two partitions, namely:
    1. A / (root) 
      partition is used as a system of Linux itself. Partitions can be of type: ext3, ext2, reiserfs, etc.. I recommend using ext3 partition type, because it is journalized FS.
    2. Partition swap 
      partition is used as virtual memory, if there is insufficient RAM. The recommended minimum size is 2X the size of RAM, but if your RAM in the upper 1 GB, there should be 2X the size of RAM.
    3. Home partitions 
      Partition home is not necessarily there, but I suggest to make this partition, because the existence of this partition, then your documents will be separated from the / partition (root). What are the benefits? When you re-installed Linux, or switching windows, then your data will not be lost. This is just the same as you create 2 partitions in Windows, namely the partition for Windows and partition for your documents. Home partition can be of type ext3, ext2, reiserfs, etc..
  2. For those of you who use CD / DVD to install Linux, then you can simply boot from the CD / DVD to perform the installation. Because the CD / DVD is bootable Linux in general
  3. But for those who want to install via network (network), you simply create a boot disk or bootable Flash Disk. Making boot disk should be done on a computer that has installed Linux. Here's how:
    1. To create a boot disk, and network_drivers.img network.img necessary files. To create a bootable Flash Disk, is required all.img file. Usually the files are located in the install directory / images in the CD / DVD Mandriva Mandriva or directory located on the server.
    2. Copy the file to a floppy disk or to flash disk, the way is as follows:
      1. For floppy disks, please first floppy disk format. This is to avoid the errors that occur on the diskette. How to format a floppy disk, type in Console: mformat a:
      2. Then, the image that has been made ​​should be copied to a floppy disk or flash disk. For floppy disks, copy the image with the command: 
        $ dd if = network.img of = / dev/fd0 
        $ dd if = network_drivers.img of = / dev/fd0 
        Network.img to a diskette (Diskette boot) and network_drivers.img to disk 2.
        For flash disks, copy the image with the command: 
        # dd if = all.img of = / dev/sda1
        Note the sign of $ and #. $ Sign, it means you are logged in as a normal user, while the # sign means that you are logged in as root.
  4. After the floppy / flash disk booting is finished, you just boot the computer using a floppy or flash disk, then just follow the instructions. How to install it please refer to another thread.
3. Basic Linux Commands
Description: 
Linux Command = Command Description DOS = command
  • ls = dir = browse files
  • clear = cls = clear display on the monitor screen
  • cp = copy = copy files
  • mv = ren, move = rename the file, and it could be to move files to specified directory
  • cd = cd = change directory (if no parameters will go to the home directory)
  • mkdir = md = make directory
  • = rd = rmdir remove empty directories
  • cat = type = browse files
  • rm = del = delete files or directories
  • pwd = cd = see the current active directory
  • more = more = view per page
  • grep = <<no ada>> = filter or view files based on specific words
  • free = to = view memory information
If the DOS to display the description of a command use /? , then Linux can use the command man . Example, to know the function of the ls command, then it can use man ls
To display a list of commands in linux, use the command info .
Some examples of use Linux basic commands:
  • Displays a list of file or directory ls-a = View all the files or directories, including hidden (starting with the sign. (point)) ls-l = Displays the files and directories in a complete display, including size, modification date, owner, group and mode attributes ls-R = Menapilkan all files or directories. If there is a directory, the directory's contents will be displayed as well


  • Create a directory several levels within a command. An example directory has a structure like this: 
    Computers 
    |-Hardware 
    |-CPU 
    |-Memory 
    | HDD- 
    |-Software 
    |-OS 
    |-Office
  • Then you can use the following commands: 
    $ mkdir-p Computers / {Hardware / {CPU, Memory, HDD}, Software / {OS, Office}}
  • To see its structure, use the command tree (if no, first install the tree with his command urpmi tree )
  • To delete a directory Computers including underneath it (in DOS using a command deltree ), use the command 
    rm-rf $ Computer 
    -rf Parameter means is to remove all directories that are in it (-r) without asking again (-f).
  • Creating a file and view the contents: 
    Creating a file can be done with the command cat , do almost the same as the command DOS (via copy con filename ), the way is $ cat> filename to save the file, press ^ D.
  • View the content of the file, done with the command cat filename
  • View the content of the file but only the first 10 rows only head filename
  • View the content of the file but only 10 lines are tail filename
  • View the content of the file but only the first 5 rows only head -5 filename
  • View the content of the file but only row 5 only head -5 filename | tail -1
  • Pause command: 
    On Linux there are two kinds of commands to view a list / file content per screen. Command is more andless 
    The difference lies more with less on what is displayed in large numbers. More commands can only view a screen without being able to see what is displayed, so it can not scroll up to see a display that has passed.
    Command less , more complete than more because less can view the past by using the up arrow.
4. Function Keyboard on Linux
  • Ctrl + Alt + Fn = (n = 1 .. 6) Switch to the terminal to the-n. We can run multiple terminals at once, so it means we can log as many as six times simultaneously in the terminal / console
  • Ctrl + Alt + F7 = Move to Xwindow which has been running
  • Ctrl + Alt + Del = Restart the computer
  • Ctrl + Alt + Backspace = Deadly Xwindow server (in Xwindow), this command is useful when Xwindow damaged so it can not exit normally.
  • Ctrl + c = cancel the ongoing process
  • Ctrl + d = Send a message EOF (End of File) to the ongoing process
  • Up = Displays a list of commands that have been returned we typed.
  • ~ = User directories
  • | (Pipeline) = function is the same as in DOS, which is to run multiple commands simultaneously. But the command after the pipeline will use the input generated by the command before the pipeline. Example: ls | grep Desktop, that is the command grep will filter all the output generated by the ls command. So the output of the ls command to be input to the grep command.
Command Information System on Linux
  • pwd = displays the currently active directory.
  • hostname = Displays the name of the computer being used
  • whoami = Displays the login name We
  • WHO = Displays the currently active users
  • id username = Displays the user ID and Group ID
  • last = Displays a list of users who logged in last time
  • ps = Displays the current process run by the user is currently active. If the parameter is added axu , then the process shown is a process run by each user.
  • top = same as ps, but sorted by CPU usage
  • free = Information memory, including RAM and Virtual Memory
  • df-h = Displays the capacity of HDD (df = disk free)
  • du-bh = Display details of HDD usage for each subdirectory (du = disk usage)
5. Creating User and Group
Linux operating system from the beginning it was designed to work with multiple users, means it is in Linux we can do login with different user names, and of course with different rights and permissions are different for files and directories.
Not only makes the user only, but all existing users can be grouped. For example, we can group users by department in the company, for example Group Marketing, Purchasing, Finance, Accounting, etc..
Now how do we create a user and group on Linux? The way is easy, and as I told at the beginning of the thread, we will do everything via command line or so-called text-based.
  • Create a user, use the command # useradd Username
    This will create a new user in accordance with our user name input. Note also that creating the user will make a directory in accordance with the user name in the directory / home. In addition, the default user group is the user name as well.
  • View a list of existing users, the command # cat / etc / passwd
    list of the user, will be shaped like this 
    guest: x: 500:500: guest: / home / guest: / bin / bash
    From the list, see if the list is divided into seven columns / sections are separated by a: (colon).
    • Column 1 contains the username
    • Column 2 contains the password (only ditandi by a 'x', which means having a password)
    • Column 3 contains the UID (user ID), UID is always started from 500
    • Column 4 contains the GID (Group ID), the GUID is also always starts from 500
    • Column 5 contains the user's Full name
    • Column 6 contains the user's home directory
    • Column 7 contains the user's shell
  • Looking at the user's password in the form terekripsi, the command # cat / etc / shadow
  • Deleting a user, use the command # userdel username
    This command will remove users that we input, but does not remove the user directories in the folder / home.
  • Delete the user and his home folder, use the command # userdel-r username
  • Creating a Group, use the command # groupadd NamaGroup
    This will create a new group. When the newly created group will be empty, meaning no members in this group. As explained above, that each production will start from the GID is 500. Now what if we want to give this GID to 700? Use the command # groupadd-g 700 NamaGroup .
  • View a list of existing group, use the command # cat / etc / group
  • Adding users to a specific group, the command # usermod-G NamaGroup Username
  • Deleting Group, use the command # groupdel NamaGroup
6. User File and Directory Permissions in Linux
Since working with multiple users, then the file permissions and directory of each user is also a very vital.Often a particular user does not want the directory and the files do not want to be seen by others. And it could be directories or specific files that are allowed for others to see. Or it could be just groups of users that are allowed to see it but another group should not be seen. That is what the user permissions in Linux. We can determine the user or group who can view certain files or directories.
Let you perform the command ls-l , next to the far left will appear the user permissions of files and directories are displayed. The format is like this drwxrwxrwx which consists of 10 digits. Of that format, divided into four segments, namely: d rwx rwx rwx
  • Segment 1 indicates the type, whether in the form of directories, regular files or link files. The code is:
    • d = directory
    • - = Regular file
    • l = link file
  • Segment 2 indicate the permissions for the owner (owner)
  • Segment 3 indicates the permissions for the group
  • Segment 4 marks other than the owner and group permissions (others)
For segment 2, 3 and 4 always rwx format, meaning:
  • r = read, access to reading a file
  • w = write, access to do the writing, editing (rename, edit), deletion of files or directories.
  • x = execute, access to run a file or into a directory.
So if the format of permissions is like this:
  1. drwxrwxr-this means that:
    • The directory is (because starting with the letters d, which means the directory) can be read, edited by the owner, and owners can also go into that directory.
    • The directory is readable, edited by his group, and his group can get into that directory.
    • This directory can only be viewed by a user or another group, can not do the editing (rename and delete), and can not get into that directory.
  2. -Rw-r -
    • The file (since starting the sign - which means a regular file) can be read, edited by the owner, but can not be executed / executed (like. Exe in windows), because there are no permissions to execute (x)
    • The file is only readable by his group, without being able to edited / deleted and can not be executed
    • This file can not be read, edited / deleted and run by the user and group to another.
7. Giving Permission To Files and Directories
We already know what the existing permissions on files and directories in Linux. But we do not know how to give permissions to the file or directory. In Linux, to give permissions can be done with the command chmodpermissions FileAtauDirektori .
Option for the command chmod can be done in 2 ways, using letters and symbols using the symbol numbers.To use the symbol letters, the letters used consisted of:
  • u = owner
  • g = group
  • o = others
  • a = all
  • + = Add permission
  • - = Decrease permissions
  • r = permission to read (read)
  • w = permission to write (write)
  • x = permission to execute or enter the directory (execute)
To give write access to the group, then the options that we have to give is g + w . 
To remove read access to the user or any other group, then the options that we have to give is or .
In addition to the symbol letters, we can also use the symbol numbers. Symbol these numbers should be given at once for owner, group and others. So, if the symbol of the letter we can give permissions for owner, group or any others, then the symbol of this figure should be given all at once. Therefore, the symbol rate is always contains 3 digits, where the first digit will contain the owner permissions, group permissions for the second digit and third digit for permission others. Symbol numbers are:
  • 4 = for read permissions (read)
  • 2 = for write permission (write)
  • 1 = for permission to run (execute)
So, if we want to give this permission to users
  • DRW-r-xr- then the command when using the letter symbols are:
    $ Chmod u + rw, ux, g + r, g-wx, o + r, o-wx file
    when using the symbol rate, then the command:
    $ Chmod 654 file
    Number 6 is read and write access, since read access is 4 and the write is 2, then the number is 6.Likewise for group permissions, permissions number 5 comes from reading a value of 4, and the permission to run valuable one. Since the user or another group may only be read only, then given a value of 4.
  • Another example, suppose initially permissions are like this drwxrw - and we want to replace it to be like this DRW-rx- , then the command:
    $ Chmod ux, i, g + x
    or
    $ Chmod 654 file
To change the owner of a file or directory, use the following command: chown PemilikBaru NamaFileAtauDirektori
To change the group of a file or directory, use the command beikut: chgrp GroupBaru NamaFileAtauDirektor
8. Example Use of User Permission
For more details, we will go straight into a case only.
  1. We will create a group with the name of IT and also make the user with the names: Benny, Budi, and Iwan . And remember do not forget to provide a password. The command:
    1. # Groupadd it
    2. # Useradd benny
    3. # Passwd benny
    4. # Useradd mind
    5. # Passwd mind
    6. # Useradd iwan
    7. # Passwd iwan
  2. Except Iwan, users are members of the IT group. The command:
    1. # Usermod-G it benny
    2. # Usermod-G it mind
  3. Next is to make the directory for the group where each member of the group it can read, write and execute the directory, but not for other users or groups. And any files or directories within it must have the same permissions to that directory, that can read, write and execute the directory. 
    The command: 
    • # Mkdir / home / it
    • # Chgrp it / home / it
    • # Chmod g + rwxs, o-rwx / home / it (or write # chmod 2770 / home / it) 
      Watch it for no additional permissions hurus 's' and the symbol of a 4-digit numbers. The letter 's' (or the number 4 at the symbol rate) means special permissions. The effect of this is a special permission, if that directory already we set ungrouped into it , then any files or directories within it are made ​​after permission is made, then his group will follow the main directory. 
      If using a symbol rate, then the special permissions are placed on the first digit. Means the second digit is for owner permissions, group permissions for the third digit and fourth digit for permission others. If no special permission, then we can write the 3-digit format. For the symbol rate, the following is meant:
      • 4 = u + s
      • 2 = g + s
      • 1 = sticky bit (that which can remove only the owner, for the letter symbol is marked with the letter 't').
    • Now try to login with user benny, and try to create any file in the directory / home / it.
    • Then try to login with the user's mind, edit the file. It turned out that mind can edit the user files is.This is because the group the file is it, where the group permissions are read, write and execute.
    • Now try to login with user iwan, and try to edit files created by user benny earlier. Apparently not.Iwan user can not even go into the directory / home / it at all. This happens, because the user iwan is not a member of the group it.
9. Using the VI Text Editor
There are many text editors available on Linux, from the CLI-based to GUI-based. Some text editors are
  1. vi
  2. emacs
  3. joe (for those who want to reminisce with WordStar / ws, joe is a lot like him)
  4. pico
  5. etc.
Vi text editor is composed of two kinds of modes, namely editing and command. When in editing mode, we can edit the file that we created, such as add, delete or edit the text.
When in command mode, meaning we can give commands to vi. The commands are referred to it as a command exit, save, copy, delete, etc.. This command can also be in visual form. When in the visual mode, we can do to block certain lines and make a copy of that line and so on.
To enter into editing mode, you can press the i . To switch modes, from editing mode to command mode, we can press the ESC key .
  • Create and open a file 
    To create or open a file, it can be done with the command: $ vi filename If the filename given is a new file name (file not exist), then it means we will create a new file. But if the filename already exists, meaning we will open the file.

    Here are some other command in the opened file:
    • $ Vi + n filename
      To open the file directly at line number n
    • $ Vi + filename
      To open the file directly on the last line
    • $ Vi + / file_name word
      To open the file directly on the first word found
    • $ Vi-R filename
      Open the file in read mode, and not for editing. The command can also be done with the command $ view file_name
  • Exit and save
    • To exit vi, press ESC followed by pressing the button : q and end with ENTER
    • If the file has had edited, and we want to exit without saving, then you need to do is press the ESC , followed by buttons : q! and end with ENTER
    • To save and exit vi, press ESC and continue by pressing : wq
    • To save without exiting, press the ESC key followed by pressing the : X
  • The commands editing
    1. Moving the cursor
      • 0 = Move to beginning of line
      • $ = Move to end of line
      • w = Move to next word
      • b = Move back to the previous word
      • a = To insert characters
      • c = to cut a word or line
      • p = To copy a word or phrase that is truncated ( paste )
      • yy = To copy a row.
      • 2yy = To copy the 2 lines.
      • dd = To remove the line.
      • 2dd = To delete two lines
      To perform a visual copy + paste, can be done by pressing the v , the block rows to be copied, then press y . Put the cursor to the destination and press p .
    2. Editing text
      • cw = Delete one word before the cursor
      • C2B = delete two previous word
      • c $ = delete one line in front of the cursor
      • c0 = delete one word behind the cursor
      • ~ = Convert lowercase to uppercase
      • u = Undo, do the cancellation of the final editing.
      • A = insert a character at the end of the line
      • I = insert characters at the beginning of the line
      • o = open a blank line below the cursor
      • O = open a blank line above the cursor
      • s = delete character at cursor and text swap
      • S = delete line and exchange text
      • R = occupy characters, words, sentences into lines that have been made.
      • J = merge two rows.
    3. Swapping text 
      common format to exchange text commands are: 
      : <jangkauan> s / <kata that will diganti> / <kata pengganti> / option 
      Option can be given is 
      g = global search for the word 
      i = ignore uppercase / lowercase
      Example: 
      We will replace the word "line" into the word "line", then the command:
      : 1, $ s / line / line / g
    4. Finding words
      • / Find = find the first word in front of the cursor the same as looking for
      • ? Search = search for first word on the back of the same search
      • n = to find the word looking for the next but the direction of the previous
      • N = to search word search to the next but after that.
10. Installing Programs on Linux
Installation on Linux consists of two kinds, namely the installation of the repository and the installation of additional programs (non-repository). Installation of the repository means we will install additional programs already provided by Linux distributions, such as from a CD / DVD or from a server (and mirrors) distro itself.
Installing additional programs (non-repository), it means we will install other programs that are not found in Linux distributions or can we also will install the programs that are in the distro, but a different version.
  • Installation of the Repository
    for the installation of the repository, depending on the distro we use, because each distro has commanded respectively. Here are some commands that exist in several distributions: 
    1. Mandriva = urpmi
    2. Red Hat & Fedor = yum
    3. OpenSUSE & SUSE = YaST2
    4. Ubuntu, Kubuntu, Edubuntu, Xubuntu = apt-get
    5. PCLinuxOS = apt-get
    Example:
    • Installing a tree in Mandriva, urpmi tree
    • Installing webmin on PCLinuxOS, apt-get install webmin
  • Additional Installation Program (non repostori)
    There are times when we did not find any application that we want in the Linux distribution that we use, or application that we want there, but we need a higher version. At times like that we need to install additional programs (non-repository) is. Additional program installation, this depends on the derivative distributions that we use. 
    In general, distributions of Linux available today can be divided into 3 groups, namely:
    1. Red Hat derivatives (which have shaped the installer. Rpm)
    2. Debian derivative (having the shape of the installer. Deb)
    3. Slackware derivatives (which have shaped the installer. Tgz)
    In this discussion, we will use the installer shaped. Rpm. The command to install package. Rpm is rpm-ivh packagename . The parameter i mean We will do the installation .
    Parameters v means all progress will be displayed to the screen.
    Parameter h mean progressnya display in a bar form, so it would seem the percentage.
    To upgrade the package. Rpm, use the parameter U to replace the parameter i . To remove an application, use parametera e .
    Explanations and further examples of the installation package. Rpm will be explained in the follow-up thread after thread. Continued later in the thread, will explain how to install package. Rpm is more complete, including the installation that requires dependencies, and installation via source code
    source : binus hacker