• Recent Post

  • RSS R o o t s e c u r e

    • Passport Database Outage: 'We Regret The Inconvenience'
      Job interviews missed, work and wedding plans disrupted, children unable to fly home with their adoptive parents -- the consequences keep proliferating in the aftermath of a database outage that crippled the US State Department's process for issuing passports, visas, and other documents related to travel to the US.Tags: USGOVIndustry News […]
    • Taking great ideas from the lab to the fab
      A "valley of death" is well-known to entrepreneurs—the lull between government funding for research and industry support for prototypes and products. To confront this problem, in 2013 the National Science Foundation (NSF) created a new program called InTrans to extend the life of the most high-impact NSF-funded research and help great ideas transit […]
    • Twitter acquires password security startup Mitro
      Twitter has acquired a small startup called Mitro, which focuses on password security. Mitro announced Thursday that it is joining Twitter in its New York office and will be "focusing on a variety of geo-related projects." The company will not be integrated into the social network, but rather keep working on its own products that let several people […]
    • Some are twisting the facts in requests to be forgotten, Google says
      Some of those seeking to scrub their histories from the Web under Europe’s “right to be forgotten” rule are being economical with the truth when making their requests, Google said Thursday. In a letter to European data regulators, Google listed some of the challenges it faces in complying with the ruling, which allows people to compel search engines like Goo […]
    • Hackers can tap USB devices in new attacks, researcher warns
      USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher has revealed. Karsten Nohl, chief scientist with Berlin's SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips th […]
    • Wikileaks Reveals Super Injunction Blocking Reporting On Massive Australian Corruption Case Involving Leaders Of Malaysia, Indonesia & Vietnam
      Today, 29 July 2014, WikiLeaks releases an unprecedented Australian censorship order concerning a multi-million dollar corruption case explicitly naming the current and past heads of state of Indonesia, Malaysia and Vietnam, their relatives and other senior officials. The super-injunction invokes “national security” grounds to prevent reporting about the cas […]
    • Woman files $123M suit against Facebook over photoshopped nude photos
      Houston woman Meryem Ali has filed a $123-million lawsuit against both Facebook and a former friend who posted a picture of her on an "imposter" Facebook profile under her name, according to Texas Lawyer. Photographs "that depict the true face of plaintiff" were altered with Photoshop and "attached to false, phony, naked body shots, […]
    • 'Internet of Things' full of vulnerabilities
      A recent research report [PDF] from HP's Fortify on Demand division found that seven out of ten of the most commonly used Internet of Things consumer devices contain serious security vulnerabilities. Fortify on Demand said that some of the vulnerabilities include insufficient or non existent authentication mechanisms with weak passwords, data and firmwa […]
    • iPhone gets first free app for encrypting voice calls
      An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers. Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.Tags: AppleiPhoneEncryptionSoftware-Pr […]
    • BitTorrent's Bleep messenger is a secure, decentralized chat platform
      There's a distinctive sound your computer makes when an online friend is trying to get your attention. Sometimes its high pitched, other times its a low, warm tone, but regardless of your chat software, the onomatopoeia probably reads something like "bleep" which -- by no coincidence, we're sure -- is what BitTorrent is calling its new me […]

Cyrus Rico

.::Everything Must Be Share::.

Mengedit tampilan grub linux mint 8

Terkadang bosan juga melihat tampilan grub yang gitu-gitu aja,
makanya klo diganti mungkin akan sedikit lebih seru kali yupz,,,,

Oke,
mari kita mulai dengan mengedit grub.cfg dengan menggunakan nano atau jika anda lebih senang menggunakan text editor lain boleh diganti dengan text editor kesayangan anda dan jangan lupa di backup grub.cfg sebelum memulai. masuk ke terminal lalu ketikkan :
sudo nano /boot/grub/grub.cfg
lalu masukkan password anda,
maka anda akan melihat tampilan seperti ini :

cari menuentry “Linux Mint 8 Helena, linux 2.6.31-14-generic (/dev/sda5)”
ubah tulisan yang berada di dalam tanda kutip sesuai selera anda sebagai contoh :
menuentry “Linux nu paling cool”

dan juga menu entry yang lain yang ingin anda ubah.
Lalu setelah selesai diedit kemudian save dengan menekan Ctrl – O lalu enter kemudian exit dengan menekan Ctrl – X.
ok, sekarang anda telah selesai mengedit menu di grub.

Lalu bagaimana mengedit gambar background defaultnya?
Mari kita bahas cara mengganti backgroundnya, secara default background yang dapat digunakan di grub adalah yang berekstensi .png, jadi jika anda ingin mengganti background grub di linux mint anda harus menggunakan gambar yang berekstensi .png.

Tapi bagaimana klo gambar yang saya punya berekstensi .jpg?
Gunakan gimp untuk mengconvert gambar tersebut dan atur ukurannya menjadi :
lebar = 640 pixels
tinggi = 480 pixels

lalu letakkan di /boot/grub
kemudian edit lagi grub.cfg dengan nano,
cari baris ini :
if background_image /boot/grub/Orphen.png ; then
ganti Orphen.png sesuai dengan nama gambar anda.

Huft….
Akhirnya beres juga,
sekarang restart komputer anda dan lihat perubahannya.
Jreng….jreng…..jreng….

Categories: Tutorial