For long time the SourceForge was one of the most trusted open source projects repositories, where one could go to download the latest versions of numerous useful applications. They were a site safe from influence of various shady commercial interests, providing the installers and binaries as they are built by the project developers.
Few days ago it was announced on several technical sites that SourceForge has changed its business practice, and that it had went the CNET’s download.com way: they now repackage original installers into their own wrapper installers that (beside starting the contained original installer of the application one is interested in) perform drive-by installations of various cr*pware (adware, shareware, etc).
Following articles illustrate what is know about that change at this moment:
An afterthought: The same company that owns SourceForge is also owner of SlashDot discussion forum/site. So, I expect that they will go down the drain soon, too.
Update: Apparently this is going on for some time now:
Related: “C|Net’s Download.Com trojans” – https://eikonal.wordpress.com/2011/12/06/cnets-download-com-trojans/
Found this somewhere on web several months ago. Very useful for long lists of machines that one want to order by IP addresses.
Sub sortIP() 'sorts IP addresses
Dim i As Long, j As Long, k As Long
Dim RangeToSort As Range
Dim IPaddress As String
Dim IPColumn As Long
IPaddress = "#*.#*.#*.#*"
Set RangeToSort = Selection
'If just one cell selected, then expand to current region
If RangeToSort.Count = 1 Then
Set RangeToSort = RangeToSort.CurrentRegion
'Check if row 1 contains an IP address. If not, it is a header row
'first find column with IP addresses. Check row 2 since row 1 might be a Header
IPColumn = 1
Do Until RangeToSort.Cells(2, IPColumn).Text Like IPaddress
If IPColumn > RangeToSort.Columns.Count Then
MsgBox ("No valid IP address found in Row 1 or Row 2")
IPColumn = IPColumn + 1
If Not RangeToSort(1, IPColumn).Text Like IPaddress Then
Set RangeToSort = RangeToSort.Offset(1, 0). _
Resize(RangeToSort.Rows.Count - 1, RangeToSort.Columns.Count)
'one extra column for the IP sort order
ReDim rg(RangeToSort.Rows.Count - 1, RangeToSort.Columns.Count)
For i = 0 To UBound(rg)
For k = 1 To UBound(rg, 2)
rg(i, k) = RangeToSort.Cells(i + 1, k).Text
IP = Split(rg(i, IPColumn), ".")
For j = 0 To 3
rg(i, 0) = rg(i, 0) & Right("000" & IP(j), 3)
rg = BubbleSort(rg, 0)
For i = 0 To UBound(rg)
For k = 1 To UBound(rg, 2)
RangeToSort.Cells(i + 1, k) = rg(i, k)
Function BubbleSort(TempArray As Variant, d As Long) 'D is dimension to sort on
Dim temp() As Variant
Dim i As Integer, j As Integer, k As Integer
Dim NoExchanges As Boolean
k = UBound(TempArray, 2)
ReDim temp(0, k)
NoExchanges = True
For i = 0 To UBound(TempArray) - 1
If TempArray(i, d) > TempArray(i + 1, d) Then
NoExchanges = False
For j = 0 To k
temp(0, j) = TempArray(i, j)
TempArray(i, j) = TempArray(i + 1, j)
TempArray(i + 1, j) = temp(0, j)
Loop While Not NoExchanges
BubbleSort = TempArray
Related here: Excel to text – https://eikonal.wordpress.com/2011/02/14/excel-to-text/ | Excel files processing – https://eikonal.wordpress.com/2011/02/25/excel-files-processing/ | IT tips pages – https://eikonal.wordpress.com/2010/02/08/it-tips-pages/
> excel2txt PasswdFiles.xls
Done, processed 1 Excel file, created 16 data files.
Related here: Excel sortIP macro – https://eikonal.wordpress.com/2012/02/07/excel-sortip-macro/
| Excel files processing – https://eikonal.wordpress.com/2011/02/25/excel-files-processing/
| IT tips pages – https://eikonal.wordpress.com/2010/02/08/it-tips-pages/
These one-liners are collected from various sites and articles on web – see the list of Sources at the bottom of this posting.
- Deleting all empty lines from the input file:
- In-place replacement:
sed –i ‘/^$/d’ INPUTFILE
- In-place replacement with backup of original file:
sed –ibak ‘/^$/d’ INPUTFILE
- In-place deletion of all occurences of a string in a file:
sed –i ‘/WORDTOBEDELETED/d’
- How to replace the first occurrence only (of a string match) in a file, using sed
sed '0,/THISSTRING/s//TOTHATSTRING/' INPUTFILE
- Append environment variable PATH with sed:
sed -e '/^PATH/s/"$/:\/usr\/lib\/myprog\/bin"/g' -i /etc/environment
- Remove all whitespace from beinning of lines:
sed 's/^[ \t]*//g' foo
- Deleting the / from all html files contained in current folder:
sed -i ‘s/src=”\//src=”/g’ *.html
- Greedy matching:
% echo "foobar" | sed 's///g'
- Non greedy matching:
% echo "foobar" | sed 's/]*>//g'
Related here: Command line based text replace – https://eikonal.wordpress.com/2010/07/13/command-line-based-text-replace/
Related here: Scripting languages – https://eikonal.wordpress.com/2010/06/15/awk-sed/
| Unix tricks – https://eikonal.wordpress.com/2011/02/15/unix-tricks/
| SED tricks – https://eikonal.wordpress.com/2010/10/05/sed-tricks/
| Memory of things disappearing > nmap stuff > getports.awk – https://eikonal.wordpress.com/2010/06/23/memory-of-things-disappearing-nmap-stuff-getports-awk/
| AWK – https://eikonal.wordpress.com/2011/09/30/awk/
System information tools / Gathering system information
- Belarc Advisor – http://www.belarc.com/free_download.html
- SIW – http://download.cnet.com/SIW/3000-2094_4-10326678.hml
- CPU-Z – http://www.cpuid.com/softwares/cpu-z.html
- WinAudit – http://www.snapfiles.com/get/winaudit.html
WinAudit allows you to perform a detailed audit of the hardware and software configuration of your computer. The resulting audit report contains details on installed software, license information, peripherals, memory usage, processor model, network settings, startup programs and more. It can be viewed from within the application, or optionally exported to text, nicely formatted web page, XML and spreadsheet formats, or sent by email. WinAudit also supports ODBC connections and can export audit data to an existing database. Very small, standalone program that works well.
- SystemReport by Gaijin – http://www.gaijin.at/en/dlsysreport.php – Gatters informations about the hardware, operating system, installed software, and much more of the local machine. SystemReport is a package of console applications, which also can be executed individually. With batch files the gathering process can be automated. The included graphical user interface enables you to configure the process and run each of the console applications automatically. The informations are displayed in a window and can be exported as RTF or plain text file.
- Speccy by Piriform – http://www.piriform.com/speccy | download – http://www.filehippo.com/download_speccy | info – http://ixplizit.wordpress.com/2010/08/03/speccy/ – an advanced System Information tool
Hard disk size usage
Hard disk defragmentation
Partitioning hard disks
Currently running processes
Port mappers / Currently open ports
- FPort by Foundstone@McAfee – http://www.foundstone.com/us/resources/proddesc/fport.htm; [FREEWARE]
- CurrPorts – http://www.snapfiles.com/get/cports.html [FREEWARE] – it allows viewing a list of ports that are currently in use, and the applications using them. You can close a selected connection and also terminate the process using it, and export all or selected items to a HTML or text report. Additional information includes the local port name, local/remote IP address, highlighted status changes and more. Other features include logging of changes, custom filters and more.
- Opened Ports Viewer by Gaijin – http://www.gaijin.at/en/dlopview.php – … displays a list with all opened ports on a machine, including the associated process (similar the console command “netstat”). The port list can be sorted and filtered. An export function enables youto save the list as HTML, CSV or plain text file. Opened Ports Viewer can be used in multi-user environments and on USB sticks.
Control of startup programs
System maintenance and Patching
Registry cleaning and maintenance
Recovering product keys
Oops!Backup by Altaro – http://www.altaro.com/timemachine/index.php [COMMERCIAL]
Here: Security tools –https://eikonal.wordpress.com/2010/07/28/security-tools/ | Portable tools – https://eikonal.wordpress.com/2010/01/08/portable-applications/.
2011.02.28: This post was getting too large, so I broke it into smaller pieces:
There are still some smaller islands of content that do not yet deserve separate postings:
- GFI Languard
Datamining / logs management
See also local info at this blog:
The “replace” command
replace OLD-STRING NEW-STRING OUTPUT-FILE
$ replace UNIX Linux newfile
$ cat /etc/passwd | replace : '|'
- Partial support for regular expressions: \^ – matches start of line, and $ matches end of line.
- Example: replace all IP address 192.168.1.2 start of line:
$ replace \^192.168.1.2 192.168.5.10 newfile
- a bash script, ‘fixer.sh’
replace CHANGEFROM CHANGETO $1.tmp
mv $1.tmp $1
now run this command line:
$ grep CHANGEFROM |cut -d':' -f1 |xargs -n 1 fixer.sh
the results is that all files in the directory (or whatever you grep for) will be changed automagically.
just make sure the grep doesn’t include the fixer script itself, or it will die half-way through changing when execute permissions are reset!
Related: Regular expressions – https://eikonal.wordpress.com/2010/04/02/regular-expressions/
| Perl online – https://eikonal.wordpress.com/2010/02/15/perl-online/