jueves, 26 de julio de 2007
Como Bajar Videos de youtube muy facil
1. entramos en youtube.com
2. buscamos el video
3. espremos que carge la lenia roja, para que cuando lo bajemos sea rapido
4. ahora añademos (kiss) despues de la www.(kiss aki la escribimos)...la direccion del video
5. nos carga una pagina de youtube que nos permite descargar el video, donde nos sale (download Now) y bajamos el video
6. ahora neceistamos un programa para reproducer el formato (.flv) osea el video. aki os dejo el link para descargar el programa (es freeware)
http://www.programas-gratis.net/php/programa2.php?id_programa=3216
7. y final feliz xd, ahora ya pdemos descargar cuantos videos keramos y sentarnos muy trankilos.
jueves, 19 de julio de 2007
martes, 17 de julio de 2007
Mapa mental usando wikipedia
Ejemplos de uso de lsof
lsof
lsof
is the Linux/Unix über-tool. I use it most for getting network connection related information from a system, but that's just the beginning for this amazing and little-known application. The tool is aptly called lsof because it "lists open files". And remember, in Unix just about everything (including a network socket) is a file.
is also the Linux/Unix command with the most switches. It has so many it has to use both pluses and minuses.
usage: [-?abhlnNoOPRstUvV] [+|-c c] [+|-d s] [+D D] [+|-f[cgG]] [-F [f]] [-g [s]] [-i [i]] [+|-L [l]] [+|-M] [-o [o]] [-p s] [+|-r [t]] [-S [t]] [-T [t]] [-u s] [+|-w] [-x [fl]] [--] [names]
As you can see, lsof
has a truly staggering number of options. You can use it to get information about devices on your system, what a given user is touching at any given point, or even what files or network connectivity a process is using. lsof
replaces my need for both netstat
and ps
entirely. It has everthing I get from those tools and much, much more.
Show Your Network Connections
Show all connections with -i
lsof -i
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME dhcpcd 6061 root 4u IPv4 4510UDP *:bootpc sshd 7703 root 3u IPv6 6499TCP *:ssh (LISTEN) sshd 7892 root 3u IPv6 6757TCP 10.10.1.5:ssh->192.168.1.5:49901 (ESTABLISHED)
Show only TCP (works the same for UDP)
lsof -iTCP
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME sshd 7703 root 3u IPv6 6499TCP *:ssh (LISTEN) sshd 7892 root 3u IPv6 6757TCP 10.10.1.5:ssh->192.168.1.5:49901 (ESTABLISHED)
-i :port
shows all networking related to a given port
lsof -i :22
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME sshd 7703 root 3u IPv6 6499TCP *:ssh (LISTEN) sshd 7892 root 3u IPv6 6757TCP 10.10.1.5:ssh->192.168.1.5:49901 (ESTABLISHED)
To show connections to a specific host, use @host
lsof -i@192.168.1.5
sshd 7892 root 3u IPv6 6757TCP 10.10.1.5:ssh->192.168.1.5:49901 (ESTABLISHED)
Show connections based on the host and the port using @host:port
lsof -i@192.168.1.5:22
sshd 7892 root 3u IPv6 6757TCP 10.10.1.5:ssh->192.168.1.5:49901 (ESTABLISHED)
Grep
ping for "LISTEN" shows what ports your system is waiting for connections on
lsof -i| grep LISTEN
iTunes 400 daniel 16u IPv4 0x4575228 0t0 TCP *:daap(LISTEN)
Grep
ping for "ESTABLISHED" shows current active connections
Grep
lsof -i| grep ESTABLISHED
firefox-b 169 daniel 49u IPv4 0t0 TCP 1.2.3.3:1863->1.2.3.4:http(ESTABLISHED)
Working with Users, Processes, and Files
You can also get information on various users, processes, and files on your system using
:
Show what a given user has open using -u
-u
lsof -u daniel
-- snipped -- Dock 155 daniel txt REG 14,2 2798436 823208 /usr/lib/libicucore.A.dylib Dock 155 daniel txt REG 14,2 1580212 823126 /usr/lib/libobjc.A.dylib Dock 155 daniel txt REG 14,2 2934184 823498 /usr/lib/libstdc++.6.0.4.dylib Dock 155 daniel txt REG 14,2 132008 823505 /usr/lib/libgcc_s.1.dylib Dock 155 daniel txt REG 14,2 212160 823214 /usr/lib/libauto.dylib -- snipped --
See what files and network connections a command is using with -c
-c
lsof -c syslog-ng
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME syslog-ng 7547 root cwd DIR 3,3 4096 2 / syslog-ng 7547 root rtd DIR 3,3 4096 2 / syslog-ng 7547 root txt REG 3,3 113524 1064970 /usr/sbin/syslog-ng syslog-ng 7547 root mem REG 0,0 0 [heap] syslog-ng 7547 root mem REG 3,3 105435 850412 /lib/libpthread-2.4.so syslog-ng 7547 root mem REG 3,3 1197180 850396 /lib/libc-2.4.so syslog-ng 7547 root mem REG 3,3 59868 850413 /lib/libresolv-2.4.so syslog-ng 7547 root mem REG 3,3 72784 850404 /lib/libnsl-2.4.so syslog-ng 7547 root mem REG 3,3 32040 850414 /lib/librt-2.4.so syslog-ng 7547 root mem REG 3,3 126163 850385 /lib/ld-2.4.so -- snipped --
Pointing to a file shows what's interacting with that file
lsof /var/log/messages
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME syslog-ng 7547 root 4w REG 3,3 217309 834024 /var/log/messages
The -p
switch lets you see what a given process ID has open, which is good for learning more about unknown processes
-p
lsof -p 10075
-- snipped -- sshd 10068 root mem REG 3,3 34808 850407 /lib/libnss_files-2.4.so sshd 10068 root mem REG 3,3 34924 850409 /lib/libnss_nis-2.4.so sshd 10068 root mem REG 3,3 26596 850405 /lib/libnss_compat-2.4.so sshd 10068 root mem REG 3,3 200152 509940 /usr/lib/libssl.so.0.9.7 sshd 10068 root mem REG 3,3 46216 510014 /usr/lib/liblber-2.3 sshd 10068 root mem REG 3,3 59868 850413 /lib/libresolv-2.4.so sshd 10068 root mem REG 3,3 1197180 850396 /lib/libc-2.4.so sshd 10068 root mem REG 3,3 22168 850398 /lib/libcrypt-2.4.so sshd 10068 root mem REG 3,3 72784 850404 /lib/libnsl-2.4.so sshd 10068 root mem REG 3,3 70632 850417 /lib/libz.so.1.2.3 sshd 10068 root mem REG 3,3 9992 850416 /lib/libutil-2.4.so -- snipped --
The -t
option returns just a PID
lsof -t -c Mail
350
ps aux | grep Mail
daniel 350 0.0 1.5 405980 31452 ?? S Mon07PM 2:50.28 /Applications/Mail.app
Advanced Usage
Using-a
allows you to combine search terms, so the query below says, "show me everything running as daniel connected to 1.1.1.1"
-a
lsof -a -u daniel -i @1.1.1.1
bkdr 1893 daniel 3u IPv6 3456TCP 10.10.1.10:1234->1.1.1.1:31337 (ESTABLISHED)
Using the -t
and -c
options together you can HUP processes
kill -HUP `lsof -t -c sshd`
You can also use the -t
with -u
to kill everything a user has open
kill -9 `lsof -t -u daniel`
lsof +L1
shows you all open files that have a link count less than 1, often indicative of a cracker trying to hide something
lsof +L1
lsof +L1
(hopefully nothing)
Conclusion
This primer just scratches the surface of lsof
man lsof