Tuesday, 24 March 2009

ohDontForget.Com

OhDon'tForget.com

It does only one thing, but it does it oh, so well. On the home
page, just type in a cell phone number and a brief message ("Pick up
dry cleaning") and this site sends it out as a text message to that
phone on the date and at the time you specify. The site detects your
time zone so you don't have to include that, nor do you have to even
register or look at any ads. (Recipients will be charged a regular
text-messaging fee.) You'll need to be brief, as there's a
160-character limit on messages, although soon users will be able to
ramble on longer, and Oh, Don't Forget... will transmit the message in
parts so that it all gets through, the site's creator Jason Stirman
says. The service works with all U.S. carriers, a few select Canadian
ones and a few in Europe and Japan, but you don't have to know your
recipient's carrier to send a message. (If you changed carriers but
saved your old number, you must take one extra simple step: see Add
Your Number.)


Another way to nag your spouse: Teleflip's flipOut service, which lets
you email a text message of up to 120 characters to anybody's phone by
sending it to yourfriendsnumber@teleflip.com. Your email appears as a
text message, and the reply turns up as an email message in your inbox.
TeleFlip has another service called FlipMail, which lets you read your
email on any cell phone, be it "smart" or otherwise. Here too you must
pay your carrier for text-messaging services, and while it's ad free,
longer missives are sliced and diced to meet the 120
character-per-message max. You also have to "white list" your friends,
because flipMail only allows messages from pre-approved email addresses
to get through.


Blogged with the Flock Browser

Monday, 23 March 2009

Rescued from Hackers

Hackers have newer methods to hack into your systems.They are smart
enough to detect security loop holes in your PC and enter through open
ports,unencrypted Wi-Fi connections,malicious websites or internet
servers.It is better you check your PC periodically for invasions and
protect your system to prevent pilfering and damage of data.



Read the following tools that will rescue your PC when it is in danger.



Detecting security loopholes




Paros :Scans Internet Traffic and identify if any website contains any malicious codes.


Netcat : Finds potential trouble spots in the network.

Network Scanner : Searches for open spots.


Angry IP-Scanner : Fast IP and port scanner.




Nmap : Shows open ports and logs.


AiO secretmaker : Protects from intruders.




Airsnort : Verifies WEP keys in Wi-Fi network.


Whisker : Tests the web-server for security loopholes.




amap : Spies via open ports.


Wikto : Finds damaged programs on web servers.

WinHTTrack : Reproduces websites on the hard disk.


HTTPrint : Detects potentially harmful programs.




Nikto : The command line version of Wikto.


Libwhisker : Pest libary for Nikto and Co.




Kismet : Detects intruders in the Wi-Fi network.


Netstumbler : Tracks down Wi-Fi access points.




Cain&Abel : Finds coded passwords.


John the Ripper : Helps to find passwords.




THC Hydra : Detects security leaks in the network.


Pwdump : Restores NT-Logon passwords.



Rainbow Crack : Checks password security.




Eliminating malicious programs




Attack Tool Kit : Simulates exploit attacks.


Metasploit Framework : Check network.




a-squared free : Finds over 90,000 trojans.


Blacklight : Unmasks invisible rootkits.




Rootkit Revealer : Rootkit scanner for Professionals.


Hijack This : Unveils Browser Hijackers.




Spybot Search&Destroy : Removes spyware.


Antivir : Extensive virus scanner.




Spyware Blaster : Removes spyware.


Trojan Check : Checks for Trojans.




BitDefender Pro : Professional Virus Protection.


Tracking hackers




3D-Traceroute : Enhancement for the Tracert command.



Securing PC’s




Snort : Warns of intrusions into PC.


IDSCenter : Graphical user interface for snort.




Ossec-Hids : Intrusion Detection System.


Base Displays : Snort evaluation on the browser.




Sguil IDS : Uses the snort engine.


GPG4Win : Encodes important data.




OpenSSL : Actually secures SSL connections.


Tor Encodes : TCP/IP connection.




Armor2net : Firewall


Stunnel : Similar to open SSL;encodes mail as well.




OpenVPN : Sends data via a virtual network card.


Truecrypt : Encodes complete drives.




ArchiCryptStealth : Hides the surfer.


SpyBlocker : Blocks spyware.




Having the listed tools, have fun, no one could ever hack you!

Have a say? Please Coment!

Blogged with the Flock Browser

Sunday, 22 March 2009

Some Googles you may not had discovered yet!

There might be some rare human being around who has surfed Internet but hasn’t used Google in some way or the other. Still there are some great works of Google that are known but to a smaller community of people. They are worth looking. Today I came around a Google page where Google pays tributes to moms around the worlds. That made me search on for something more. Here is the compiled list. Worth a look for all the Google lovers/critics.

Google Moms

Google’s way of expressing love.


Rare Google Beta Logo
They really have improved.


Google Heart 1 & Google Heart 2
Google’s way of expressing love on valentines day.


Google’s Metaplex
Google’s way of saying “April fool”


Google Newsletter
You have read Google’s blog, but did you read this. It contains there progress from the day it was launched to till date.


Google’s Search Statistics For 9/11/01
… and there tribute. (a rather general one)

Google Zietgeist
What you see here is a cumulative snapshot of interesting queries people are asking – some over time, some within country domains, and some on Google.com – that perhaps reveal a bit of the human condition.


Google’s Help To Build Better Query
Some useful sets of tips from the makers themselves.


Google Doodles
Few more: UncleSam, Microsoft, Mac, Linux, BSD. Google remembers all.


Google’s Languages Which Only Google Can Understand (This Link Is For Ewmew Fudd)
More for you. Bork, Bork, Bork!, thlngan Hol, H4×0r, lgpay Atinlay. Did you understand any one of them? I did not.


A real cool real time collection of how people go wrong with spelling while searching for Birteny spears aaa Britney spears
That’s bad. Most of you Britney fans never even cared to know about Britney’s original spelling?


Google’s Librarian Central Newsletter
They do take care of everyone.


And last a non Google page but worth a look.


How was that? I am sure many might have been new to you. Your Comments?


Saturday, 21 March 2009

How to tick off your geek linux friend? 50 ways



1. watch terminal star wars

To start this article off right, no Linux user can claim the status of geekhood unless they've seen Star Wars ASCII-style. To watch a fascinating version of Star Wars via the Terminal, type:
telnet towel.blinkenlights.nl ...and press ENTER.

2. kill a process

It's an embarrassing situation to have a browser fail to open due to the "process is already running" error, only to discover you've no idea how to kill that process (or any others, for that matter). To kill a process, open the Terminal and type:
ps aux
...and scroll through until you find the process you need to kill. The beginning of the data line will have a process ID number. Locate that number and type:
sudo kill -9 processID
...replacing processID with the actual number. Voila! Process terminated.


3. View Latest Log Messages

What to see the latest log messages? Type:
tail -f /var/log/messages

4. disable system beep

Linux insists on beeping at you; this isn't just any beep, however--it is a system beep, impervious to the mute button on your computer. If the startling, abrupt sound is like nails raking over a chalkboard to you, then this trick will let you kill that little beep forever.
Type:
sudo rmmod pcspkr ...and enjoy the silence.

5. rip dvd

While your friends, trapped in the infernal shareware trap that is Windows, grapple for an easy way to rip their DVDs, all you need is one tidbit of code. Insert the disc into your optical drive, then open the Terminal and type:
dd if=/dev/cdrom of=/cdrom_image.iso
...the disc will be saved as an ISO.

6. mount iso files

Lets say you've acquired a program's ISO and lack an optical drive (or a black DVD-R); how shall you run it? By mounting it in a 'virtual disc drive' of sorts. To mount as ISO, open the Terminal and type:
mkdir /mnt/iso
...to make a directory for it, and then:
mount NAME.iso /mnt/iso/ -t iso9660 -o loop

7. Monitor Non-SSH Network Traffic

A good pass time when bored and a better way to see what is happening on the network, type:
tcpdump not port 22

8. encrypt files

If you keep any sort of sensitive data on your machine, encryption is your best chance at keeping data pickers from sneaking around your files and perusing the forbidden info. If you're running Ubuntu, you can just right-click a file and choose 'Encrypt File'. If you'd like a different option, install GnuPG. Once it's installed, open the terminal and type:
gpg -c filename.doc
...after which you will be prompted with:
Enter passphrase:
Repeat passphrase:
...choose a password you will remember, as you can't recover it. To decrypt a password, enter:
gpg filename.doc.gpg
...you'll be prompted to enter the password you chose and open the decrypted file.

9. filter websites

So your kid brother or new guest or workers are visiting certain websites you don't want them to access. How do you block these sites? Open the Terminal and type:
gedit /etc/hosts
...replacing gedit with your favorite text editor. A file will open. In that file, add:
127.0.0.1 website.com
...replacing website.com with the actual website name, and they won't be able to access that website.

10. Download a Website

You might find a website so good you just have to save it to a hard drive. Other times, you might need to archive a website before it goes under and find it easiest to download the entire site at once. To do this with the Terminal, type:
wget http://www.website.com/
.... to download it all.

11. log off other users

Is someone on your network doing something they shouldn't? How would you like to bump them off the system without them knowing? To do this, open the Terminal and type:
skill -kill -u username
...replacing username with the actual system you want to shut down. This will only shut down their programs and then log them off, but it's enough to get the point across.

12. run multiple x servers

Running multiple X servers allows you to run your own graphical interface when you're using the computer, and allows a different user to run their own interface when using the computer. To accomplish this task is a bit more involved then this article wishes to cover. To view an excellent, in-depth tutorial on accomplishing this, visit:http://ubuntuforums.org/showthread.php?t=213756

13. Compile Source Code

At some point, you're going to need to install something that isn't compiled. You need to know how to install this, and it's not as hard as it seems. This method should work; there are times that it won't, however, as compiling code can be a time-waster.
Start by downloading the tar.gz and saving it to your desktop. Open the terminal and run:
tar xvzf program.tar.gz
...this will unpack the archive. Now CD to the desktop by typing:
cd desktop
...then enter:
./configure
...then:
make
...and finally:
make install
...to install the program onto your computer.

14. Sniff Your Wifi

Maybe it's curiosity, or maybe you have a real need, but either way, it's useful to be able to 'sniff' your wifi; i.e, analyzing use, detecting networks, and detecting intrusions. There are a few different types of sniffers available, but the most popular one is Kismet. To install it, run:
sudo apt-get install kismet
...or the equivalent installation syntax for your distro. You'll find the program in your Internet menu.

15. Monitor Live Data

This command will be enough to entrance any geek for hours. With this, you can monitor real-time shifting data on your system via the Terminal:
watch -n.1 'cat /proc/interrupts'

16. Blocking Ads

Do you ever get tired of seeing Google ads, particularly adsense? Some users try to mix the adsense in with actual links to maximize clicks, which can make it difficult to navigate a website. Other common ads come from DoubleClick, etc. If you want to block those ads from working, you can do so by entering the following:
gedit /etc/hosts
...and adding:
127.0.0.1 http://www.doubleclick.net/
....and any other sites you don't want to work.

17. Block IP Addresses

If you're running a server and having issues with a particular user, you can block that users IP address using IPtables. To install iptables, run:
sudo apt-get install iptables
...or whatever the equivalent is for your distro. Once installed, you can block an IP address by running:
iptables -A INPUT -s IPADDRESS -j DROP
...replacing ipaddress with the actual address.

18. Create a Ramdisk

Just the mention of a ramdisk might make your geek senses tingle. If you're in need of super fast read speeds, you can make a ramdisk easily using this command:
mkdir/ ramdisk
mount none -t tmpfs -o size=128M /ramdisk
....to make a ramdisk that is 128MB in size. To make a different size, enter a different value.

19. hide your ip address

We won't speculate on the reason you may want to hide your IP address, but it's something every geek needs to do at one point or another. There are a few methods to do this, but by far the best and easiest method is using the wonderful onion-routing system that is Tor.
To install Tor, go to TORPROJECT.ORG and download the version for your distro. Install it according to your distro, then repeat the process with Privoxy
Now, I'm going to add the instructions straight from the Tor Project website so there's no confusion on what to do next (as a mistake could mean your IP is still visible):
"Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/) and add the line forward-socks4a / 127.0.0.1:9050 . to the top of the config file. Don't forget to add the dot at the end.
Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out three lines by inserting a # before the line. The three lines are:
logfile logfile
and the line
jarfile jarfile
and (on some systems) the line
debug 1 # show each GET/POST/CONNECT request
Depending on which default config file you have for Privoxy, you may also need to turn off enable-remote-toggle, enable-remote-http-toggle, and enable-edit-actions. You'll need to restart Privoxy for the changes to take effect."
Finally, install the Torbutton add-on in Firefox so you can toggle Tor on an off in the bottom right corner of the browser.

20 Watch System Logs

If you're trying to get a device running or program working but something is going bonkers, it might be in your best interest to watch the system logs and see what's being reported. To do this, type:
tail -f /var/log/messages

21. check system uptime

If you need to know how long your machine has been running, a simple system uptime command will give you that info, along with users and a few other tidbits of info. To check system uptime on Linux, open the Terminal and type:
uptime
...yep, it really is that easy.

22. start a geeky fire

If creative art-types curl up in front of a roaring fire for inspiration, where do left-brain geeky types go to get the creative juices flowing? How about a roaring ascii fire in the Terminal? To get the fire blazing, type
sudo apt-get install libaa-bin
...and to run the fire, type:
aafire
...in the terminal.

23. automatic backup

Automatic backups allow you to make sure your files are always backed up and safe from sudden loss or accidental deletion. The goal with backups is to be able to select files and have then update regularly. The method to do this is too involved for this article, so visit this excellent link to learn how: http://linuxgazette.net/104/odonovan.html

24. Check Processes Others are Running

In the same vein as terminating a process, why not check up on what other's are running? To take a peek at your computer-mates running apps, open the Terminal and type:
ps aux | grep - v `whoami`
...and while you're at it, why not kill the process free up some CPU?

25. Launch a Program from Terminal

After manually installing an app, you might discover that the pesky little program disappeared; no matter what you do or where you look, it seems impossible to add it to the system menu. For just such a time, you'll need to know how to run a program using the Terminal. Type:
appname ...replacing appname with the name of the actual program you wish to launch. Note that when you launch an app via this method, the Terminal must remain open for the app to keep running.

26. Fix a Screwed-up Terminal

If you play around in the Terminal long enough, you're bound to screw it up at some point. You'll know when it's borked--it starts beeping at you and spewing around random phrases like Uncle Sal after a kegger or two. To correct said problem, type:
reset
...and watch serenity overcome the chaos.

27. Unmount a Drive in Use

Have you ever tried unmount a drive, only to have an error tell you that some mysterious program you neither see nor remember starting is using said drive? The solution is to kill that process so the drive can be unmounted. How do you find out which process is tying up the drive? With this piece of Terminal code
lsof +D /mnt/windows
...and it'll not only tell you what program is using the drive, but will also give you it's process ID. Use the kill process tip above to terminate this process and safety unmount your drive.

28. Clear Personal Data upon Logout

When you logout, you want all traces of your activities to be cleared from the computer. Most distros will do this all their own, but if you're running a particularly finicky system, you might have to manually add that feature. To make the computer clear remnants of your last foray on the system, open the Terminal and type the following:
gedit ~/.bash_logout
...replacing gedit with 'kate' or whatever your favorite text editor is. When the text file opens, add:
clear
...and hit Ctrl+s to save; if your distro allows it (ahem, Ubuntu), use clear_console instead..

29. Prevent SSH Root Login

You don't want an unauthorized someone to log into your sever as a root user, which gives the full breadth of destructive powers to them. To prevent that, change the settings so that root login is impossible. To do this, open Terminal and type:
gedit /etc/ssh/ssh_config
...and add:
PermitRootLogin no
...to the text file that opens, preventing users from logging in as the all-powerful root user.

30. Find Old Commands

Looking for an old command you ran that you can only vaguely remember? To find it, you use this query in the Terminal:
history | grep -i "keywords"
...where keywords is the parts of the command you remember. It will search and display all previously run commands with those keywords and show you an ID number. To rerun that command without typing it again, you can type
! IDnumber

31. Erase all data traces

If you're planning to delete something sensitive, such as a file or photo, and don't want any traces of that data to remain on your hard drive, you want to use this command. Be very careful!
shred -z -u file
...will write over whatever file you point it to with different data a few times before deleting it forever.

32. Speed Up the Gnome Menu

If you're a blazing fast type of person, you probably find Gnome's menu delay more frustrating than stylish. If you want to rid yourself of that delay, type this into the Terminal:
gedit ~/.gtkrc-2.0
...replacing gedit with your favorite text editor. In the file that opens, add this text:
gtk-menu-popup-delay = 0
...save the file.

33. Restarting When Frozen

Sometimes your system will just freeze. When that happens, you're left with the option of waiting it out or resetting. How do you reset without do damage to your data? Simple.
Press ALT + Sys Rq and, while holding those buttons down, type: REISUB. The system will restart safely.

34. Disabling Touchpad

How many times have you been playing a game, only to graze the laptops touchpad and have it mess something up? The solution is to disable it's function. To do that, refer to this detailed tutorial on disabling the touchpad in Linux.

35. Backup Your System

Backing up your system is the ultimate way to be prepared for a system crash. To do so, follow these steps:
Run Terminal as root.
type: cd /
tar cvpzf backup.tgz --exclude=/proc --exclude=/lost+found --exclude=/backup.tgz --exclude=/mnt --exclude=/sys /
This will create an archive of your system. Be sure you have enough hard drive space to handle it.

36. Customize the Terminal

If you spend most of your time in the Terminal, then it's only fitting to customize it to meet your needs. There are many different ways to change the Terminal's look--too many to list here. To see the dozens of options available to you, as well as how to apply them, hit up this link: http://ubuntuforums.org/showthread.php?t=674446

37. Ejecting CD/DVD Drive

Sometimes you'll push the button on the DVD drive and nothing will happen. For those times, there's a simple way to get it to open. In the Terminal, type
eject
...and it will pop open.

38. Collaborating Between Screens

Lets say you have two Linux users in the same space but different rooms. You want to show one person how to do something, but you don't want to get up. How do you solve this dilemma? By collaborating the screen. This method will allow you to both see the same screen and see the actions each other do on it.
su - username
...where username is the username of the machine whose screen you want to see...
ssh machine
...replacing machine with the name of whatever computer the other person is on....
screen -S foo
...both of you type this into your own machines and voila! You're both now sharing the same screen.

39. Examine the CPU

Are you in need of detailed info about your CPU? Then use this code:
cat /proc/cpuinfo
...and you'll get a whole slew of info

40. Stopwatch

Every need to time something on the fly and happen to lack a watch? No worries!
time cat
...and press control+d to stop the timer.

41. Schedule a Download for the Middle of the Night

Sometimes you want to download something that is large and will take quite a time. The best time to do this is the middle of the night (or while you're away). To schedule a download for a certain time, type this:
echo 'wget url' | at 01:00
...changing URL to the actual web address and the time to whatever (24-hour clock).

42. View Available Wifi

Do you want a quick and simple list of available wifi networks, as well as a whole slew of info about them? If so, type:
iwlist scan

43. Find Website IP Address

School and work proxies often block websites but not IP addresses--you can access a banned address by entering that websites IP address instead of it's normal .com address. Some places ban the popular sites that allow you to lookup a websites IP address, but you don't need them. To find out a website's IP address, type:
whois website.com

44. Terminal Three-month Calendar

If you're running a bare-bones window manager, such as blackbox, the fastest way to see a calendar is with the terminal. To see this, type:
cal -3
...and it will display a three month calendar.

45. HTML to Text Conversion

Do you want to quickly turn a text file into an HTML file? Use:
recode ..HTML < file.txt > file.html

46. Rip Music CD to WAV

What fun is working on the computer without a little music? While your friends are busy searching for a decent music ripping program, you can copy an audio cd to WAV files using this simple command:
cdparanoia -B

47. Find the Biggest CPU Hog

Is a certain process running your CPU right into the ground? How do you find said process without picking your way through the ps aux results? With this command:
ps -e -o pcpu,cpu,nice,state,cputime,args --sort pcpu | sed '/^ 0.0 /d'
...at which point you can kill it with sudo kill -9.

48. Reboot History

If you need to see your current machines reboot history, type:
last reboot

49. Battery Checkup

Is your computer battery lasting less and less every week? Check the charge capabilities of your battery by typing:
grep -F capacity: /proc/acpi/battery/BAT0/info

50. All the Little Filesystems

Particularly useful if you're mounting different drives, using the following command will allow you to see all the filesystems currently mounted on your computer and their respective specs:
mount | column -t

Install Ubuntu on Windows XP using VirtualBox

Introduction
VirtualBox allows you to run an entire operating system inside another operating system. Please be aware that you should have a minimum of 512 MB of RAM. 1 GB of RAM or more is recommended.
Comparison to Dual-Boot
Many websites (including the one you're reading) have tutorials on setting up dual-boots between Windows and Ubuntu. A dual-boot allows you, at boot time, to decide which operating system you want to use. Installing Ubuntu on a virtual machine inside of Windows has a lot advantages over a dual-boot (but also a few disadvantages).
Advantages of virtual installation
  • The size of the installation doesn't have to be predetermined. It can be a dynamically resized virtual hard drive.
  • You do not need to reboot in order to switch between Ubuntu and Windows.
  • The virtual machine will use your Windows internet connection, so you don't have to worry about Ubuntu not detecting your wireless card, if you have one.
  • The virtual machine will set up its own video configuration, so you don't have to worry about installing proprietary graphics drivers to get a reasonable screen resolution.
  • You always have Windows to fall back on in case there are any problems. All you have to do is press the right Control key instead of rebooting your entire computer.
  • For troubleshooting purposes, you can easily take screenshots of any part of Ubuntu (including the boot menu or the login screen).
  • It's low commitment. If you later decide you don't like Ubuntu, all you have to do is delete the virtual hard drive and uninstall VirtualBox.
  • You don't have to burn a CD to install Ubuntu easily.
Disadvantages of virtual installation
  • In order to get any kind of decent performance, you need at least 512 MB of RAM, because you are running an entire operating system (Ubuntu) inside another entire operating system (Windows). The more memory, the better. I would recommend at least 1 GB of RAM.
  • Even though the low commitment factor can seem like an advantage at first, if you later decide you want to switch to Ubuntu and ditch Windows completely, you cannot simply delete your Windows partition (as you would be able to in a dual-boot situation). You would have to find some way to migrate out your settings from the virtual machine and then install Ubuntu over Windows outside the virtual machine.
  • Every time you want to use Ubuntu, you have to wait for two boot times (the time it takes to boot Windows, and then the time it takes to boot Ubuntu within Windows).

Installation Process
The first thing you have to do is obtain VirtualBox. Visit the VirtualBox website's download page.

Select the appropriate Windows download. In most cases, you should select x86. Use AMD64 only if you know you have a 64-bit processor.

Next, visit the Ubuntu website to download the Ubuntu disk image. Click the Download link to go to the download page.

On the download page, just follow the defaults and, from the drop-down menu, select the appropriate download location (if you live in Asia, select an Asian download location; if you live in Europe, pick a European one; if you live in North America, pick a North American one; etc.). This should download the latest desktop version of Ubuntu.

When you do finally choose to download Ubuntu, Windows should ask what you want to do with the file. You definitely want to download it. Do not open it with some application (especially not WinRar). Download the file. Do not open it at all. It is a very large (almost 700 MB) single file with a .iso file extension.

Your download should take quite a while, at least an hour on a broadband connection.

While waiting for Ubuntu to download, you can install VirtualBox. The setup is just like with most Windows software. Double-click the installation file you downloaded earlier. Then keep clicking through the installation wizard. The default answers should work fine.

Next, start up VirtualBox from the Start menu. If, for some reason, it doesn't show up in the menu, you can also find it in C:\Program Files\innotek VirtualBox\VirtualBox.exe

Click New to set up a new virtual machine profile.

Click Next

Title your virtual machine. Here I called it Ubuntu. The type of OS is probably Linux 2.6, but if you don't know the OS type, there is also an option for unknown.

VirtualBox will try to guess how much RAM to allocate for the virtual machine. Since my computer has 512 MB of RAM, it decided 256 MB would be good (I agree). If you have 1 GB of RAM, 512 MB might be a good allocation.

You probably don't have a virtual hard drive to install Ubuntu to, so go ahead and create a new one.

It doesn't hurt to go with the defaults for the virtual hard drive creation process.

The next thing we want to do is click on the CD-ROM settings.

Add a CD to mount and select the .iso file you downloaded from the Ubuntu website.

Now you're ready to get started! Select the newly created virtual machine profile and click Start.

Select Start or Install Ubuntu

After it boots up, click the Install icon on the desktop.

Answer all the questions. If you don't know the answer, just go with the defaults.

Wait for Ubuntu to install. This can take anywhere between fifteen minutes and an hour, depending on your computer's specifications.

Instead of rebooting right away, choose to continue to use the "live" session.

Then, go to System > Quit > Shut down to shut down your virtual machine.

After it has shut down, restart VirtualBox and change the CD-ROM settings so that you are no longer using the .iso you downloaded (you won't need it any more, now that you've installed Ubuntu).

This time, when Ubuntu boots up, you'll get a log in screen and can actually start using your installation!
Related Posts with Thumbnails