Dual-Booting Windows and Linux How to build a computer with two (or more) operating systems


                         

You don't have to give up Windows to try Linux.
If you'd like to give Linux a try, but you can't (or simply don't want to) give up your Windows operating system or applications, and you can't afford to build two computers, then consider building a dual-boot system.
A dual-boot computer is one that is capable of running two different operating systems (but not at the same time). It's also possible to build computers than can boot three or more different operating systems, which are called multi-boot computers.
When designing a dual-boot system, the most important considerations are to make sure that there's enough hard drive space to accommodate both systems, and to make sure that all of the hardware is compatible with both systems. In practice, this means making sure it's all Linux-compatible, since practically any recent hardware will work with Windows.
Linux hardware compatibility is less of an issue now than it used to be. That used to be the single most frustrating thing about building a Linux box. But nowadays, Linux has become so popular as a desktop OS (especially outside the United States) that it's easy to find compatible hardware. But you can check here just to make sure that the hardware you're considering is compatible.

Installing Windows and Linux on the Same PC

There are several ways to configure a dual-boot PC. You can, for example, use third-party software such as Paragon Partition Manager 11 Personal to set up multiple partitions before you actually start installing the operating systems. This is very handy if you frequently install and remove operating systems for hobby, business, or educational purposes, and also makes it easier to make modifications and repairs to the partitions once the systems are installed.
If you don't want to use third-party software to pre-partition your hard drive, however, then you don't really have to. Pretty much all Linux distributions have built-in utilities in the setup routines that can create new partitions and manipulate existing ones. QtParted and GParted are two of the graphical partitioning front-ends more commonly included with Linux distributions. All popular Linux distros also include ntfsresize, which can non-destructively re-size existing NTFS partitions, and can be accessed through the graphical partitioning interface (or via the terminal, if you're doing a text-based installation).
In short, a Linux distribution will include everything you need to partition a hard drive for a multiple-boot machine configuration because most distros assume that the user may be adding Linux to a machine that already hosts Windows, so they include utilities to make room for Linux. But when you're building a new multi-boot computer, there's an easier way to set up the hard drive from the start that make the process more straightforward and less time-consuming.

The Easy Way to Set Up a New Dual-Boot System

When you're building a new dual-boot computer, you don't have to worry about re-sizing partitions.
The Windows installer also contains a utility to create partitions. Unlike Linux installers, however, the Windows installer can't create non-Windows partitions. But that's no big deal. You just run the Windows installer first and let it create the Windows partition(s) you need, but leave the rest of the hard drive "raw" or unused to leave space for your later Linux installation.
By default, the Windows partitioner will want to create one huge partition that takes up the entire hard drive. But you can override this selection. When you get to that point (it happens very early on in the installation), simply reduce the size of the partition to whatever size you want the Windows partition to be. Exactly how big that partition should be depends on a lot of factors, but basically, you want both the Windows and Linux sides to be big enough that you won't run out of space some time in the future.

Using Multiple Hard Drives

You could, for example, use two hard drives, and install Windows on one and Linux on the other. If you want to create a shared data partition, decide which drive it's going to live on. (If one drive is bigger than the other, you may want to partition that drive into two sections: one for the OS it's hosting, and the other for the data partition.)Another option you may choose for your dual-boot computer is to use multiple hard drives. There are several possible configuration options.
Another possibility using two drives would be to partition one drive into two partitions to host both operating systems, and partition the other drive into one big partition to store the data, which would be shared by both operating systems.
If you decide to use multiple drives, it's important to make sure that Windows is installed on the first partition of the primary drive (or the primary master, if you're using PATA drives). Why? Because that's where Windows will expect to be installed, and it just makes life easier to do it that way.

Step-By-Step Instructions to Create a Dual-Boot System

Okay, now that I've sufficiently confuzled you, here's the simple, step-by-step version of my advice.
I'm going to assume that you're using one big hard drive, which will be partitioned into three sections: One for the Windows system, one for the Linux system, and one big partition for shared data. If you want to use multiple hard drives or some other partitioning scheme, you can ask for specific advice in the Forum.
  1. Use a big hard drive (at least 500 GB is recommended - 750GB or 1TB would be even better) so each system will have plenty of room, and there will be plenty of room for documents and data.
  2. Windows will be installed on the first partition because that's where Windows wants to be installed, and it gets cranky when it's installed elsewhere. (Linux, on the other hand, is more laid-back and doesn't care very much where it's installed.)
  3. Boot to your Windows installation CD with the drive unpartitioned. When you get to the part where Windows wants to know where to install itself, create a single NTFS partition at the beginning of the drive.

    If you're going to be creating a separate data partition (which I recommend), then a partition size of 100GB should be enough for Windows and its programs. But if you plan to install a lot of games, desktop publishing, graphics design, or Web development applications, you probably should make the Windows system partition a little bigger because those type of apps tend to be big and to include a lot of graphics files in their program directories.
  4. Let the installer finish installing Windows on the single partition you just created.
  5. After Windows installs and reboots, activate it, install any additional needed drivers, and download all the available Windows updates. This may require quite some time and several reboots. (You can wait until after the Linux system is installed before installing the Windows updates, if you like; but then if Windows vomits on an update, it may be harder to fix once the dual-boot configuration is in place.)
  6. Once all the updates are installed, from within Windows, create a new partition on the hard drive for the shared data and give it a name (like "My Stuff," for example).

    Make this partition big. How big? Well, basically subtract the space you'll need for your Linux installation from however much space is available on the drive, and create a partition of that size. So if you have 400 GB of free space, and you want to give Linux 100 GB, then make the shared data partition 300 GB.
  7. When the new partition has been created, map your libraries to the new partition. This will establish the new partition as the place to store your stuff, if you do it correctly.
  8. Reboot the machine into Windows and log into your Windows user account. Wait until the machine has completelystarted, and then shut it down. This is to insure that the changes you just made have been saved to the registry.
  9. Boot into your Linux installation CD or DVD. There will be some obvious link or button to click to install Linux. If you're pretty sure that all your hardware is supported in Linux, then just click that button. If not, then look for a link or button that says "Try Linux," "Run Live CD," or some such thing. If available with your distro, this will boot Linux without actually installing it. (This option is available with Ubuntu, Mepis, Knoppix, Fedora, and many other Linux distributions, but not all of them.)
  10. Once you have decided to install, start the Linux installer.
  11. Early on in the installation process, the Linux installer will ask you where to install Linux. You'll be offered several options, one of which should be to use the unused hard drive space. That's the option you want.
  12. You'll be asked what Linux partitions you want to create. Unless you're already familiar with Linux partitioning, I suggest you create only two: "/" and "swap." The swap partition should be at least 1.5 times the amount of installed RAM. The / partition should consume the rest of the unused space.

    Unless you're an experienced Linux user with a reason to want a particular file system, I suggest that you use whatever default file system the distribution recommends for the / partition.
  13. You probably will be asked to create a "root" or "administrator" account and password, and a user account and password. Make your user account name in Linux the same as you chose in Windows, and you have a better chance of the installer finding your Windows data partition.
  14. If the installer recognizes the shared data partition you created under Windows, and offers to make it available to you in Linux, say yes. If it doesn't, no big deal. You can link it later from within Linux.
  15. At some point you will be asked to configure a bootloader (usually LILO or GRUB) and write it to the MBR. The most important thing to do here is to make sure that the bootloader the installer is proposing has recognized and offered to boot both your Windows and Linux systems. This almost always happens without a hitch, but make sure anyway.

    By default, the bootloader usually will include other options, such as booting into Linux repair mode, or the CD or floppy drive. Leave those options in place, as well. They could come in handy.
  16. You also will be offered the option of which system should be the default operating system. Most times, Linux will choose itself, but you can override it if you like. The default operating system is the one that will boot if you turn on the computer and do nothing else. (When you want to boot to the non-default operating system, you just have to hit the up or down arrow button on your keyboard to highlight the OS you want, and then hit enter.)

    Finally, you'll most likely be offered the option of how long the system should wait before booting the default OS. The time the installer will suggest may range from ten to 30 seconds. That's how much time the system will give you to decide whether to hit the up or down arrow to override booting the default OS.
  17. Once you're sure that the bootloader recognizes all of the systems and that the options are what you want, click the button or link to "write," "save," or "commit" the bootloader to the MBR.
  18. Depending on your Linux distribution, there may be some other steps, which should be quite self-explanatory. Once the installer announces that it is finished, remove the installation media (if instructed) and boot into Linux. Log into your account and download whatever updates for itself it finds, then reboot back into Linux to make sure that any changes have been fully configured.
And that's that. You now have a dual-boot, Windows / Linux computer. But there are some caveats.

If at any time a Windows update, service pack, or repair install overwrites the MBR with its own bootloader, you will no longer be able to boot your Linux system. In the past, we used to create emergency boot floppies to fix this problem. Nowadays, most Linux distributions include this functionality on the installation CD or DVD. It's usually called "Repair Mode" or some such thing, and one of the first things it looks for is a broken bootloader.


0 comments:

How To Secure Your WordPress Blog


Getting a website hacked is occurring more often nowadays. You just have to read the news to know who these high profile hackers are. Hackers like Anonymous and Lulz have dominated the headlines recently hacking high profiled websites such as government websites like the CIA. Then there are those low profile hackers who hack ordinary websites. If you own WordPress sites for quite a while, chances are, you had experienced being hacked. If not then you are one of the lucky ones. Although the only fool-proof way from getting hacked is to disconnect your computer or server from a network, there are other ways in order to make your website more secure than it is now.
Here are 11 ways that you can use to secure your WordPress blog.
1 – Encrypt your login
Your password is sent unencrypted whenever you login. If you are on a public network, hacker can easily ‘sniff’ out your login credential using network sniffers. So it is always good to have your password encrypted as you login. A plugin that does this task is the Chap Secure Login plugin. This plugin adds a random hash to your password and authenticate your login with the CHAP protocol.
2 – Use a strong password
Even though your password is being encrypted as you login, if you use common or easy to guess password then you are not in a better position. Ensure you use a strong password that is difficult for others to guess. A strong password is usually characterize by making use a combination of digits, special characters and upper/lower case to form your password. You can also use the password checker on WordPress 2.5 and above to check the strength of your password.
3 – Change your login name
The default username is admin is widely known to hackers so it is essential to change the login name. In your WordPress dashboard, go to Users and set up a new user account. Give this new user administrator role. Log out and log in again with the new user account.
Go to Users again. This time, check the box besides the admin user and press Delete. When it asks for deletion confirmation, select the “Attribute all posts and links to:” and select your new username from the drop down bar. This will transfer all the posts to your new user account. Press Confirm Deletion.
4 – Define user privilege
If there is more than one author for your blog, be sure to define what the capabilities or role for each user group will be. This will give you the ability to control what users can and cannot do in the blog. It’s bad practice to assign all of them the administrator role as this gives them a lot of power and control over your website.
5 – Upgrade to the latest version of WordPress and plugins
The WordPress team are continually improving the security of WordPress itself as they also fall victim to hackers. Having the latest version of WordPress always contains bugs fixes for any security vulnerabilities.
6 – Backup your WordPress database
This is perhaps the most important pointer of all. When hackers take your site down, at least you can have the security of restoring its last known working version. Ask you web hosting provider if they backup you site. Otherwise there are plugins that can do the backup for you.
7 – Remove WordPress version info
The more information that you give to hackers the better they can prepare for a hack attack. Some WordPress sites/themes include the WordPress version info in the meta tag. Hackers can easily get hold of this information and plan specific attack targeting the security vulnerability for that version. To remove the WordPress version info, log in to your WordPress dashboard. Go to Design->Theme Editor. On the right, click on the Header file. On the left where you see a lot of codes, look for a line that looks like:
<meta name=”generator” content=”WordPress <?php bloginfo(’version’); ?>” />
Delete it and press Update File. In WP2.6 and above, WordPress automatically includes the version in the Wp_head section. To fix this, you can simply install the WP-Security Scan plugin.
8 – Protect your wp-admin folder
Your wp-admin folder contains all the important website information and it is the last place that you want to give access to others. Use AskApache Password Protect to password protect the directory and give access right only to authorized personnel.

9 – Hide your plugins folder
If you go to your http://yourwebsite.com/wp-content/plugins, you can see a list of plugins that you are using for your blog. Be sure to hide this page by uploading an empty index.html to the plugin directory. Open your text editor. Save the blank document as index.html. Using a ftp program, upload the index.html to the wp-content/plugins folder.
10 – Perform a regular security scan
Install the wp-security-scan plugin and perform a regular scan of your blog setting for any security loopholes. This plugin can also help you to change your database prefix from wp_ to a custom prefix.
11 – Stop brute force attack
Hackers can easily crack your login password and credential using brute force attack. To prevent that from happening, you can install the login lockdown plugin. This plugin records the IP address and timestamp of every failed WordPress login attempt. Once a certain number of failed attempts are detected, it will disable the login function for all requests from that range.




1 comments:

Computer Viruses: Protecting Your Computer from Unwelcome Intruders.

When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years. These program codes have gone beyond mere annoyances with the worst kinds disabling your PC, but they have become portals for remotely perpetuating more sinister activity that can clandestinely hack into sites, mount denial of services or steal confidential and personal data for fraudulent financial gain at your expense.Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to themIn 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.

The 2011 Norton Cybercrime Report reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware. But when you consider that roughly 4.3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection.
What can I do to protect myself from computer viruses and Trojans?
These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.
A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.
In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.
Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.
Protect Yourself
There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.
Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.
Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.
Prevention
Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).
1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.
2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.
Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.
3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.
If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.
5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.
9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site:http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.





0 comments:

5 Ways To Prevent Your Facebook Account From Getting Hacked

You’ve probably already heard that Facebook accounts are hacked to gain personal information, but you might not be aware of how easy that just might be for hackers. With hackers increasingly targeting Facebook as a primary source of collecting user information, and corporations using your information to make decisions about your rates , you really should have a plan for protecting yourself.

Here are some tips to prevent getting hacked:
  1. Use strong passwords. The names of yourself, your spouse, parents, siblings or dog, or your birthday, do not qualify. Use a mix of letters, digits and punctuation (but not blank spaces). Use both capital and lowercase letters. The longer your password, the better. The shorter your password, the easier it is to hack, especially if it’s a common word or name. A good starting point is six characters, though 8, 10 or 12 are even better. If you have trouble remembering, do something about that, else consider using an unusual phrase or combo of words that only you or a few people might know, then substitute some of the letters with digits and/or punctuation. Humorous combinations might make it easier to remember, but otherwise write your password down in a SAFE place. Or just keep using the “Forgot password?” option to reset your password.
  2. Change your password regularly. By regularly I mean monthly or even weekly, not yearly. Facebook’s “Forgot password?” option is one way, or you can go to your account’s settings.
  3. Don’t friend everyone. That “hot chick” whom you don’t know and looks like some Hollywood starlet might be a guy. Avoid the person who doesn’t even have a profile pic, let alone any friends in common with you. If you haven’t met them, be cautious. Also, don’t friend friends whom you know to use weak passwords. If their account is compromised, hackers can still learn certain things about you from your profile, or could send you a message via the friend’s account to lure you to a malware site.
  4. Don’t click on links willy-nilly. If you click on a status update that a “friend” posted on your wall and it looks fishy, don’t assume they actually did it. Their account could be compromised. If your clicking takes you to a Facebook application that you’re unsure of, there’s no obligation to click through. For example, AllFacebook Editor Nick O’Neill recently posted about a fake ‘Like photo’ application.
  5. Don’t believe all emails. Don’t forget that honest web services will never ask you to do certain things in an email. For example, Facebook will NEVER send you an email asking you to change your password or enter personal details. If they need you to do that, they will tell you where in your account settings you can go to do that. On a similar note, protect your email account that you registered for Facebook with, else someone can succeed in resetting your Facebook password.
Have any tips on how to protect a Facebook account? Feel free to share in the comments.



0 comments: