Adobe plugin installed – (Browser – Iceweasel in Knoppix 6.2)


SENARIO = THIS; – Needed permissions to “Write-Files” into the plugins directory.

This browser (Iceweasel), ..  is some derivative from the Firefox stable. And it is the default browser with this distro.

The default behaviour, where it reverts to its original-state after shut-down -/- reboot, .. deletes any files left on the desktop, and removes all browser shortcuts and history.

I had previously confirmed the correct file -/- plugin required to make youtube-videos play, .. using the Linux Firefox ver 3.6.3. Once this file ( was copied into the plugins directory, and restarted the browser, .. youtube-videos play. This browser was installed onto a separate harddisk mounted in the docking-station, .. and so now, always available.

BELOW – The sequence of commands used – (after; su – ) to allow me to write ‘a file’ into the plugins directory (NON persistent version of Knoppix on usb-stick)

Finally got it to work! – ADDED – (permissions) ugo+w to the target directory. Actual command typed out below –

chmod o+w /usr/lib/iceweasel/plugins
chmod g+w /usr/lib/iceweasel/plugins
chmod u+w /usr/lib/iceweasel/plugins

There might be a short-cut to do “All-three” of these in one-go.
AFTER completing the adding of permissions in this manner, …
I was able to copy and paste the iceweasel-plugin required into this directory. ( – All that is required to make the youtube videos play.

While some of the webpages are still in the History of this browser, (I will list them quickly below)

#1: –
#2: –

UPDATE: – (Repeating this process will reinforce what has been learnt) – the screen-dump below shows only the command used to complete the “permission-changes” required to allow writing to the plugins directory.


Some other notes taken from youtube video on basic permissions (pasted below)

The GUI – Hide(s) the permission(‘s)
Most graphical tools hide the detail.

ls -l
ls -ld

Displays the permissions of the directory

ls -l .

Lists the content of the directory
. dot means the current directory.

+++ +++


#1: – Users,
#2: – Group,
#3: – Others,

The tutorials focus on setting permissions on “a-File” – where-as I am wanting to set permissions on the actual directory.

I will have to repeat this process -(every reboot) – for this usb-distro Knoppix 6.2 ~

HENCE; – Need to learn about the next topic called >>> Preserve changes or Revert on Shutdown <<< – which, … requires some definition of exactly what this means. (New post required here, – as this is getting right-off the original ‘post-topic’) – (A link will be added soon for topic “Preserve Changes or Revert on Shutdown”)

FireTorrent 2.0.1 (add-on)

Installed the firefox addon called “FireTorrent 2.01” – (to download Xubuntu-iso >>> xubuntu-10.04-desktop-i386.iso <<<)

Currently using Knoppix 6.2 – but figuring out HOW to install “a” torrent-client, was harder than it sounds, .. so I searched on the Firefox-Addons for bit-torrent clients, … install the addon, … and downloaded xubuntu.

+++ Just want to note some url(s) for later reference +++

#1: –

#2: –

"Xfce is a lightweight desktop environment for various *NIX systems. Designed for productivity, it loads and executes applications fast, while conserving system resources." - Olivier Fourdan, creator of Xfce Xfce 4.6 embodies the traditional UNIX philosophy of modularity and re-usability. It consists of a number of components that together provide the full functionality of the desktop environment. They are packaged separately and you can pick and choose from the available packages to create the best personal working environment.

net neutrality

GOOGLED: net neutrality (AND; Some of the links pasted below)




Friday 12, 2010 – The group, Anonymous, blocked the main government website and, the Australian parliament’s homepage, for a second day running in protest over controversial plans to filter the internet.

Codenamed “Operation: Titstorm”, the hacking campaign involves hundreds of people from around the world and used a technique called Distributed Denial of Service (DDoS) to jam web traffic, one of the protesters said.

The main-stream media (TV) – is not reporting on this much (Or, I have stopped watching), and so, ..  ANY good ‘Internet-Search’ reveals a wealth of information on these topics).  – I hope to follow up soon on this topic, from the technical angle, without the political-hype, lies, and deception provided by bias reporters, and hence provide my-own biased opinion.

AND – Google; Operation Tits storm

TED – 4chan’s moot takes pro-anonymity to TED 2010

In the closing minutes, moot’s purpose for speaking became clear: he insisted that anonymity is a good thing, yet we’re all giving it up voluntarily. He wasn’t talking about the NSA or tech policy or anything like that. Rather, he said sites like 4chan may go the way of the dinosaur because people are choosing to join social networking sites and persistent identity services. One of the ‘Net’s greatest strengths is disappearing as a result, but moot claimed that sites like 4chan show that a lot of good can come of anonymity, too. He seemed puzzled as to why everyone wants their identity tied to so much of what they say and do online. Do people hold back? Do they censor themselves? The power of being able to say or post whatever you want is undeniably strong, but moot didn’t speak to the dangers of anonymity.

FINALLY; – (I found these two comments – to be accurate and insightful ~ From URL;

daniel marsh Posted at 4:41 PM February 12, 2010
Why do people keep saying it’s a child porn filter?? Conroy wants to censor sites like youtube for goodness sakes. it’s about banning anything and everything he doesn’t like not just child porn.

GE of Canberra Posted at 4:23 PM February 12, 2010
This just demonstrates how underprepared the government is to make sweeping changes to internet access. I predicted cyber attacks in response to the filter months ago, I can’t believe the government are so naive, and to now see them flailing around helpless against simple DDOS attacks is pathetic. This internet filter issue is waking a sleeping giant, DDOS is surely just the tip of the iceberg. The underground community have more resources and are more organised than what people give them credit for. How can they seriously complain about these attacks not being a legitimate form of political protest, when they are pushing this filter ahead without any public consultation in the first place? What goes around comes around.

Knoppix 6.2 ~ is fun!

Installed pendrive version of knoppix-6.2 onto 4GB USB stick – Everything required just works. NOTE; Need Administrator permissions to successfully install to a usb stick

Setup Internet connection, (Not to hard – if you have the ISP / DNS ip numbers)

TESTED on older hardware HP – D530 mobo

Open Office 3, starts QUICKLY, .. most impressed. Will be using it again soon.

Downloaded Knoppix 6.2 from pendrivelinux

The distro is provided as an ISO file – and there is a installer file – USB-Installer-For-Knoppix6.2-v0.2.exe – which installs the OS to the USB without any fuss, just point the installer to the downloaded ISO file, and provide a path to the blank USB stick and thats it.

Some development information on wikipedia about ‘ADRIANE’ (development started around Jan-09, and Knoppix-Ver 6.2 / ADRIANE 1.2 released 18 November 2009)

The KNOPPIX 6.0.1 / ADRIANE 1.1 is a CD-edition again, and a complete rebuild from scratch. LXDE as default desktop and a very reduced software collection in order to easily fit on CD.

Adriane Knoppix is a variation that is intended for blind and visually impaired people, which can be used entirely without vision oriented output devices.

This review by Dmitri Popov provides a nice overview (If anybody is interested)

The Internet’s three virtues

POINT – 8. The Internet’s three virtues

Taken from; ‘World of Ends’ – What the Internet Is
by Doc Searls and David Weinberger

In a Nutshell – The Nutshell –

1. The Internet isn’t complicated
2. The Internet isn’t a thing. It’s an agreement.
3. The Internet is stupid.
4. Adding value to the Internet lowers its value.
5. All the Internet’s value grows on its edges.
6. Money moves to the suburbs.
7. The end of the world? Nah, the world of ends.
8. The Internet’s three virtues:
a. No one owns it
b. Everyone can use it
c. Anyone can improve it
9. If the Internet is so simple, why have so many been so boneheaded about it?
10. Some mistakes we can stop making already

For those without the TIME – READ; Scroll-Down and Read (Especially Point 8, 8a, 8b, 8c)

“The Internet interprets censorship as damage and routes around it,”

POINT – 8. The Internet’s three virtues
(I have ‘Re-Worded’ this just a little for my own interpretation)

8.a Nobody owns it
It can’t be owned, even by the companies whose “pipes” it passes through, because it is an agreement, not a thing. The Internet not only is in the public domain, it is a public domain.

8.b Everyone can use it
The Internet was built to include everyone on the planet.
You don’t need a system administrator to let you participate. The Internet purposefully leaves permissions out of the system.

8.c Anybody can improve it
Anyone can make the Internet a better place to live, work and raise up kids. It takes a real blockhead with a will of iron to make it worse.
In the same way the agreement about how to encode images on paper enabled fax machines to use telephone lines without requiring any changes to the phone system itself.
The creators of these services (email and newsgroups) didn’t simply come up with end-based applications, and they sure didn’t tinker with the Internet protocol itself.


net-neutrality; TAGED under ‘GNU License’ (My perspective – nobody owns the Internet -and nobody should own it – especially big business that already make HUGE profits) – OBVIOUSLY; It is more complicated than that, .. (As usual, – the more I dig around, the more complicated this gets, and the fuzzy-bits intrude) – [MORE fuzzy-bits]

THIS EXPLIANS (In part) >>> Best video yet on Net Neutrality <<<

THE FCC (and what role they play?)
The Second Computer Inquiry is the second proceeding in the FCC trilogy The Computer Inquiries, which created the FCC’s policy of regulating the way in which telecommunications carriers’ networks are opened up and made available to enhanced services (aka computer networks).

Some background information on this topic; As I have often questioned, (As an interested observer) ‘Is the Internet already tiered?’ – Meaning; Should carriers be able to sell multi-tiered access to heavy users? OR; They are already doing this!

From the laymans point of view – It already IS multi-tiered, for those prepared to PAY-MORE, they get a FASTER connection.

THIS-DEBATE; ‘Net Neutrality’ – is MORE about the users ability to upload their own content, and THAT RIGHT is under threat from the like of big telco companies (AT&T verizon, and Cablevision) wanting to take away that ability, and turn the Internet into a ‘One-directional-medium’, more LIKE radio and TV.

PASTED BELOW; Is an outline from – which points to ‘summer-2005’, as being [QUOTE] “The separation of the physical communications layer from the content and applications layers was a cornerstone of telecommunications law–putting control of the Internet in the hands of the users at the edges

[THE IMPORTANT BIT – QUOTE Cont’d] , .. “but in the summer of 2005 — under intense pressure from phone and cable lobbyists — the FCC removed this cornerstone.”

ARTICLE; Net Neutrality is the Internet’s First Amendment
Save the Internet (Most of it pasted below – but not all)

Almost 40 years ago, the Federal Communications Commission was confronted with the question of how to handle the transmission of data over telecommunications networks. When a federal court broke up Ma Bell in 1982, it required the Baby Bells to provide nondiscriminatory interconnection and access to their networks. These decisions to require the communications network to treat information service in a nondiscriminatory manner was the key building block of the Internet — it’s First Amendment.

Under these protections, the physical wires over which data and information flow were treated differently than the data and information themselves. When network owners can’t mess with the content, the content market remains free and vigorously competitive. This separation of the physical communications layer from the content and applications layers was a cornerstone of telecommunications law–putting control of the Internet in the hands of the users at the edges but in the summer of 2005 — under intense pressure from phone and cable lobbyists — the FCC removed this cornerstone.

In the years since then, these network owners have openly declared that they intend to build business models based on discrimination, extorting money from online content and applications providers and favoring the Web sites and services that they own or with whom they strike special deals. This plan violates the fundamental principle of nondiscrimination that has been law for generations, and which gave us a free-flowing Internet that allows the best ideas to emerge on their own merits.

From a technical prepective;  (A nice simple approach to the Internet)

Advocates of Net Neutrality are not promoting new regulations. We are attempting to restore tried and tested consumer protections and network operating principles that made the Internet a great engine for free speech and innovation. By passing Net Neutrality legislation we’re restoring under law the open Internet’s most fundamental principle.

Remote Exploit – Penatration TOOLs

BackTrack is the most top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It’s evolved from the merge of the two wide spread distributions – Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.

Download BackTrack from HERE

There is an alternative in the form of a vmware applicance HERE (BT3 658MB dl)

AND; There is a vm BackTrack BETA Ver4 HERE (About 1100 MB dl)

Linux – Splashtop comes with the S10e

THIS LINUX OS; Is the one used on the NSW – DET Ideapad

Splashtop is an instant-on commercial Linux distribution targeting PC motherboard vendors and other device manufacturers.  It is developed by DeviceVM. It uses Bootsplash[5], SquashFS, Blackbox, SCIM, and the Linux kernel 2.6

Concept [The Wikipedia Overview]

Splashtop is intended to be integrated on a read-only device and shipped with the hardware, rather than installed by the user. It does not prevent the installation of another operating system for dual booting. It boots in about 5 seconds, and is thus marketed as “instant-on.”

MORE >>> Other products featuring Splashtop
Lenovo IdeaPad S9e, S10, S10e, S10-2, S12, which rebrands Splashtop as “Lenovo Quick Start”

MORE URLs (Pasted below)

With Splashtop, you can access the Internet and your favorite applications seconds after turning on your PC.

Linux Distro – Linpus

WIKIPEDIA-INFO: >>> Linpus Linux is a Fedora based operating system created by the Taiwanese firm Linpus Technologies Inc.[1] Linpus was designed specifically to fully support the Asian market, with full Unicode support for the Chinese and Japanese languages. A special version, Linpus Lite, was written to run on devices with lower-cost hardware such as netbooks. It has both an icon and tab-based “Simple mode”, designed for new users; and, a conventional style “PC mode” for those wanting a more Microsoft Windows-like interface. It is targeted at handheld devices with smaller screens, and supports resolutions as low as VGA (640×480).[2] <<< | Download – Limpus-Lite = 700 MB

HERE IS WHAT I WANTED: (Linpus QuickOS – sometimes Loaded the S10e, maybe always, I have not bought one yet) The marketing blurb is pasted below – with a link to the download url for this distro.

With Linpus QuickOS you don’t have to wait for Windows to start enjoying your online life. Linpus QuickOS isn’t designed to replace your Windows, but give you more choice to access key applications quickly. It combines breakthrough technology, hardware cooperation, and Linpus’ open source expertise and experience to create the most complete product in this space.

SYSTEM REQUIREMENTS: (Features might be BETTER description for this)

* Linux operating system targeted at low cost computer market;
* Icon interface
* low power hardware requirements

As described on the ‘Linpus QuickOS’ site.

ANOTHER-NOTE; It seems that Linpus Lite, AND Linpux QuickOS, are ‘one-&-the-same’ distro. (The usual marketing spin –  designed to sell stuff, adding to the busy clang of technology hype 🙂 , .. so much fun)


There are also Desktop and Media Centre versions of this OS;
* LINPUS – Linux Desktop = 3.6 GB Download
* LINPUS – Linux Media Centre = 4.5 GB Download

GNU License

Open Source Initiative OSI – The GPL:Licensing

Tue, 2006-10-31 04:56 — nelson [OSI Approved License]

The GNU General Public License (GPL)

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.


The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.