Installing MATE

The following is courtesy of:  Sylvia Sanchez:

Like KDE, MATE has its own spin.  But if you want to install it along your current desktop, you can do it following these instructions.

First, update your system using your graphical tool, or use this command:

sudo dnf update

To install everything needed, use this command:

sudo dnf groupinstall mate-desktop

You may want to install Mate related tools as well. You can do that with this command: (recommended)

sudo groupinstall mate-applications

The system will show you the amount to download and the final size once installed.  If you’re okay, type y (or the equivalent for “yes” in your language).  The installation itself is automatic, so you can do other things while packages install if it takes a while. If you use Terminal in a standard Fedora Workstation install, a notification sounds once the command is done.  If you’re using Konsole or other tool, you may want to keep an eye on the process to know when it’s finished.

After installing your new desktop, of course you’ll want to try it. For best results, shut down your system and turn it on again. At the login screen, once you select or provide your user name, the password screen appears. There is a small gear icon which shows you options for desktop environments. Select MATE and then provide your password as usual.

Once you log in, you will find something like this:

Bare Mate Desktop

You can play with the settings to change the appearance as you want.  Anything you want to change is under the System menu which contains three separate items: Preferences, Administration, and Control Center.  If you find this familiar, it isn’t a coincidence. MATE looks exactly the same as Gnome 2, from it was originally forked, and it resembles the Apple OS X style.

Under Preferences you can change GTK colors, styles, desktop themes, and icons.  If you choose Control Center, you’ll launch the main program to tweak MATE. From here you can change everything about its look and feel, but you can also perform administrative tasks like configuring hardware or setting passwords.

Settings Menu and Folders

You can find more info about MATE here at their official website. You can also visit the official Fedora MATE spin website to get an installable MATE image put together by MATE fans and contributors in Fedora.

System Information

A lot has happened since the end of the year, so let me try to catch everybody up to date….

Around Nov 2019, the Fedora Linux server sustained a system hard drive crash.  No big deal, right?  This is why I have spare hardware and backup sets and drive images.  To prevent, or minimalize the loss of data.  So, I couldn’t find any spare 250GB drives, so, I installed a 320GB drive as the boot device and restored the image.  The current Fedora OS at the time was F31, so, I figured that I would upgrade the server to current while I was at it.  The upgrade from F28 to F30 went fine, but that’s as far as it would go.  Awhile back, Fedora stopped supplying live 32 bit images, but would upgrade an existing 32 bit image.  That ended with F31.  The server was a HP D530 @2.8GHz, with 4GB of ram, and was 32 bit only, so I ordered a couple new servers.  I’m not really upset over that, as the existing D530 has been running 24/7 since September 2010.  Not a bad run for a server: 9 years.

I picked up a pair of HP Elite 8300 Convertible Mini Tower computers at a great price, both came with 8GB Ram (Expandable to 32GB).  The CPU is a quad core i5-3470 running at 3.2GHz (32/64 bit).  It has been running since Jan 2020 and rarely runs at less than 98.5% idle, with a load usually of 0.1. The four cores of the CPU usually hang out at about 80 degress Fahrenheit, and trying to push the CPU doesn’t get the temperature to move at all… The server usually never even touches the swap, instead staying within the 8GB of memory, so putting another 8GB into it isn’t really a priority.  I performed a fresh F31 install, and restored the KRAB server, and many more items.  I also had suspended auto backups for a few months, but the auto backup rotation is now up and running and the full backups run much faster now that the system is 64 bit with more memory.

On a side note, my friend, Duck Landes and I worked on, and got set up a KRAB radio relay.  He also expanded his existing four channels and added a couple more besides the relay.  The URL for the server is: quackhouseradio.net.  There, you will find the following channels:

QH1: Bootleg Rock and Blues, Duck’s Live Broadcasts
QH2: Bootleg Blues and Old Time Radio
QH3: History
QH4: Bootleg Concerts and KRAB Live Broadcasts
QH5: Horror
QH6: Old Time Radio
KRAB: KRAB Radio Relay

The streams are as easy as going to the correct channel, and just clicking on the winamp or media player icons.  (In the case of KRAB, you can either do that, or click one of the two listen buttons in KRAB’s left frame.) If you chose that method, it should ‘fall back’ to KRAB server, if  QHR server becomes unavailable.  The KRAB server URL is krabradio.net, fyi.

So, this all has kept me fairly busy since the coronavirus pandemic started, but keep your eyes open for an upcoming 10GB music upload that I am working on….

Comodo Antivirus for Linux Issue (and fix)

In my last post, I talked about a bitcoin miner and Comodo Antivirus.  Well, you may not realize this, but Comodo AV is available for most of the main Linux distributions, in their native packages.  You just have to select your distribution and whether it’s 32 or 64 bit, and download it…. You will see from the image at the right, that it bears a striking resemblance to its windows cousin.  In my case, since I use Fedora, I received an .rpm file (stands for redhat package management).  Installation was a snap using the terminal shell, and after a reboot, it showed up in the menu of my Mate desktop manager. 😉  However, there was a fly in the ointment.  After the RPM installed successfully, I was told to run /opt/COMODO/post_setup.sh as root (or sudo).  However, it failed building the filesystem filter driver, as seen on the left.  Without that, there will be no ‘real time’ virus protection, which kind of is the whole reason for running an antivirus package in the first place, doesn’t it?  Well, I have the solution for y’all right here.  All you need to do is to download this replacement file:   cav_kernel4.1_driver  and replace the defective driver.tar file in /opt/COMODO/ (or where ever your distribution puts the main directory).  This replacement is for kernel 4.1 or less…. Then, you can rerun the post_setup.sh and it should build the filesystem filter driver properly.  😉

Hope that I managed to help anybody that’s having issues with CAVL.

Server connectivity issues have been resolved

Over the past few months, there have been a variety of issues plaguing my server(s) and network.  These problems have come and gone, making arriving at a solution very difficult.

I have a fairly unique networking setup, utilizing a main router flashed with an open source firmware. This router is wireless bridged to another similar router, extending the wireless umbrella’s range.  The bridged router only handles wireless duties, and operates as a print server.  All of the servers are directly connected to the main router.

Initially, it seemed as there were dns issues, that I thought were entirely Frontier’s fault.  They seemed that they were, a few service calls were placed, and they eventually found a bad wire out at the pole.  Things seemed to get a bit better, but they were still tweaky.  

I tried a variety of things: reflashed and reconfigured the router, replaced the router with the backup router, even replaced the power brick.  The router was found to be running under extreme load, somewhere around 1.5 or so, with 4096 Active IP connections (100% — maxed out).

So, I rolled my sleeves up, started by enabling the built in firewall in the router, moving the main server out of the DMZ, and port forwarded required ports to it.  This all allowed me the ability to actually start checking the router’s configuration, but it would still periodically overheat and reboot on its own.

So, then, I was able to manage to get ssh enabled in the router, and connected to it via putty ssh client, so as to ease the webgui load…  Using the netstat command, I noticed an absolute flood of connections from one of the ancillary servers.

I tracked it down to a bit of malware that somehow got on one of the servers.  (No idea how, as I don’t surf the internet from there, or collect email.) All I can imagine is that on one of the rare occasions that I ran a web browser there, I clicked on an infected link.  What was going on was a piece of malware called cron64/tsm.  It sets up house in .bashtemp and .X19-unix directories, so as to pass casual scrutiny.  So, I cleaned everything, and the router is behaving much nicer now, as the router has been online for just about 48 hours WITHOUT a spontaneous reboot. 😉

The router’s load average is running around .15 now, occasionally going up to about .45.  The Active IP connections have dropped from the maxed out 4096 to around 200.  Things are back to working as they should be.

Now, what is cron64/tsm?  It’s a bitcoin miner.  They are fairly easy to get infected with, so I should take this time to spread the word….

BitCoins and crypto currency – these are the talk of the town. In December 2017, the value of a single BitCoin crossed $19,000 to nearly touch $20,000. It had been steadily increasing and analysts are comparing the Bitcoin run to the dot-com bubble of the late 1990s. This has induced cyber criminals to find out ways to surreptitiously steal/mine Bitcoins, and miner viruses are one such tool.

Bitcoins are created as a reward for a process known as mining. Bitcoin is a cryptocurrency and used as a worldwide payment system. The anonymity associated with the cryptocurrency has led to it being used for criminal, fraudulent and illegal activities. It is widely used in dark web transactions, drug trade, etc…,

Though predominantly used for nefarious activities, Bitcoins are being accepted by certain businesses and organizations for products, and services and can also be exchanged for other currencies, though to a limited extent.

BitCoin mining is a record-keeping service that is done using computer processing power. Bitcoin transactions are recorded in blockchains, which functions as a public ledger. The consistentency and completeness of the blockchain is maintained in an unalterable state by miners, who repeatedly verify and collect newly broadcast transactions – this is called as a block.  Cyber criminals infect vulnerable computers with BitCoin Miner Virus to steal computer processing power. This drastically affects the performance of the system. Hence, users must be able to detect and remove BitCoin Miner virus.

Symptoms of BitCoin Miner Virus:
Overusage of CPU and GPU
Overheating of system
Drastic slowing down of system
Sustained mining could break your PCs hardware.

How is the BitCoin Miner Malware Spread
The BitCoin miner malware are spread through numerous methods, such as email attachments, and embedded in compromised websites. This malware is also found embedded in Trojan Horse viruses. It has also been spread across Windows networks by exploiting the EternalBlue vulnerability.

How to Detect BitCoin Miner Virus
It is very difficult to detect the BitCoin Miner Virus as it is a fileless malware. Traditional antivirus solutions, and most modern virus protection software are NOT capable of detecting fileless malware. You may attempt manual removal, however, it requires considerable technical skill as you have to interact with registry entries such as ActiveScriptEventConsumer, EventFilter, IntervalTimerInstruction, AbsoluteTimerInstruction, and FilterToConsumerBinding. This is quite complicated and sensitive, and incorrect handling could brick your system.

Antivirus and Virus Protection Software
An efficient Antivirus solution that can detect and block fileless malware is what you need. Traditional solutions detect malware based on virus definitions, and hence they cannot detect fileless malware. The Comodo Antivirus which is a part of Comodo Internet Security and Comodo Advanced Protection solutions provides protection against all types of malware including fileless malware such as BitCoin Miner Virus. Comodo Antivirus provides cloud-based resilient default deny protection to block all unknown files including zero-day malware. All unknown files are automatically contained in a sophisticated virtual container where they are allowed to execute and their behavior is observed. This container combines a virtualization of COM interfaces, Disk, Registry, and Memory. The unknown file believes that it is making changes to the real environment, however, it is making changes only to the virtual system. The behavior of the file helps decide if the file is good or malicious.

This virtual containerization, which is unique to Comodo, is the only antivirus solution that can detect and remove the BitCoin Miner Virus.

The moral of this story is that if you aren’t using Comodo Internet Security, you should be.  It’s available for Windows, Mac and Linux….  And, it’s free.

Tech, music, and general ramblings…..