Bienvenido! - Willkommen! - Welcome!

Bitácora Técnica de Tux&Cía., Santa Cruz de la Sierra, BO
Bitácora Central: Tux&Cía.
Bitácora de Información Avanzada: Tux&Cía.-Información
May the source be with you!

Saturday, April 24, 2010

Chew-WGA & removeWAT

why-win7?!
 *****AVOID WINDOWS UPDATE KB971033*****
This Windows update somehow removes the self-activation.....hence:
Windows 7
Build 7600
This copy of Windows in not genuine

If you have already installed KB971033 and got a black wallpaper saying that your copy is not genuine , run RemoveWat 2.2.5 from torrentz.com/5b098a55ccf283db26329d5886605d96c710995a
RemoveWAT 2.2.5 by Hazar
http://thepiratebay.org/torrent/5396065
Only Use This IF Windows 7 Loader by Daz 1.7.7 Doesn't Work for you !!!!
-------------------------------------------------------
Windows 7 Loader v1.7.7 (REPACK) (x86 - x64) by Daz
Bittorrent source of ISO 32&64b Win7

Torrent Download
or HERE
WORKS ON ALL EDITIONS OF 7/R2!
NOT FOR VISTA/ORIGINAL SERVER 2008!!!!
IMPROVEMENTS SINCE 1.0:
renames slmgr on x64 aswell
Works on unicode systems
silent mode with /s switch
UI tweaked slightly
No reboot neccessary
Passes WGA on X64

This is a little tool I put together to remove WAT (Windows Activation Technologies) completely from the OS, whilst still retaining
genuine status and receiving all updates (optional aswell). You can also pass the genuine check in things like Windows Defender.
There will be no windows activation section in control panel (thanks to nononsence)
no slmgr
no nags, no prompts, nothing. WAT gone.

IMPORTANT NOTES/INSTRUCTIONS IN ARCHIVE!
Version 2.2.5
Update:
Fully protects from WAT Update (KB971033)
Disables trial time bomb in evaluation ISOs fully
Only Use This IF Windows 7 Loader by Daz 1.7.7 Doesn't Work for you !!!!
Installion and Use:
1. UnRAR
2. Run as Adminstrator
3. Click on Remove WAT button
Enjoy !!!
To Return Windows 7 to Original State:
1. UnRAR
2. Run as Adminstrator
3. Click on Restore WAT button



Source
Chew-WGA was designed to test the security resistance of various software protections built into Windows 6.1.x operating systems, and is intended for educational purposes only. It works by making certain changes to the software protection platform and the multilingual user interface resources.

This utility should never be executed on a system intended for continual use. If you want to use your copy of Windows continually, you are required to purchase a license.
Some notable features include:
- all-language compatibility
- works on Windows 7 all versions
- compatible with 32-bit and 64-bit file-systems

- no master boot record fiddling
- no risk of PC bricking
- very reliable patching mechanism
- windows updates work
- doesn’t use any keys
- full uninstaller included
- solid, clean, efficient coding
- tamper resistant (protect by CGA - Chew Genuine Advantage seal)
- hotfix resistant
- the most reliable chew-wga version yet
Does this use a blacklisted key?
No. In fact, it doesn’t use any keys at all. Windows 7 doesn’t even need to be activated for Chew-WGA to work.
Does the Chew-WGA method work on Windows Server 2008 R2 X64 RTM?
Chew-WGA 0.9 has been tested on Windows Server 2008 R2 X64, and works beautifully.
|Spreadmyfiles|
Download.

***** HOW TO CHECK ACTIVATION OF WINDOWS *****
1. Type cmd in Start menu.

2. Right-click on the first result (cmd.exe) and click on Run as administrator (confirm by clicking Yes if required).
3. Type
Code:
slmgr -dli
Code:
slmgr -xpr
Code:
slmgr -dlv
Press ENTER after each command.
--------------------------------------------

TO THOSE WHO ARE HAVING TROUBLE ON BLANK/BLACK SCREEN WITH FLASHING/BLINKING UNDERSCORE/CURSOR..

I'VE SOLVED THE CAUSES..

FOR ME.. REMOVED ALL WHAT'S ON YOUR USB: MOUSE, KEYBOARD, EXTERNAL HDD, BLUETOOTH ANYTHING THAT CONNECTS TO YOUR USB..

AND LASTLY GO TO YOUR BIOS (F2, DEL ETC.. WHICH IS ON THE START UP SCREEN WHEN YOU OPEN YOUR COMPUTER)
TO THOSE PEOPLE WHO HAVE CORE 2 DUO, DUAL CORE, QUAD CORE.. WINDOWS 7 IS HAVING PROBLEM ON SOME OF THE PROCESSORS LIKE THE QUAD CORE THAT'S WHY THEY WON'T BOOT UP AND STA **** IN THE BLACK SCREEN, YOU MUST DISABLE THE SECONDARY CORE WHICH IS LOCATED ON YOUR BIOS.. I DON'T KNOW EXACTLY WHERE TO FIND IT BECAUSE WE HAVE DIFFERENT MOTHERBOARDS BUT MINE IS INTEL.. BIOS SETTING IS F2.. AND THE DISABLING YOUR SECONDARY CORE IS ON FIRST SCREEN OF THE BIOS SETTINGS..

I DON'T KNOW IF THIS WILL HELP YOU BUT I SOLVED MINE BECAUSE OF THIS, I TRIED DOWNLOADING TWO KINDS OF WINDOWS 7, AND BURN THE 1ST WIN 7 TO 2 DVDs AND STILL NOT WORKING, BUT ON THIS 2ND WIN7 (THIS TORRENT), I TRIED EXPERIMENTING MY BIOS.. AND POOOOOFF!!! IT'S WORKING NOW..

BIOS SLIC Version SLP OA 2.0 or 2.1

How to Check or Verify PC Motherboard BIOS SLIC Version is SLP OA 2.0 or 2.1 for OEM Activation
System-Locked Pre-installation (SLP) is the mechanism used by big royalty OEM computer manufacturers to factory activate pre-installed Windows operating system on branded desktop PC, laptop, notebook, netbook and nettop computer so that activation process of Windows is done transparently and automatically once end-user first starts the computer. The offline OEM-style pre-activation that bypass Windows Product Activatin (WPA) is implemented to reduce the chance of annoying mass PC buyers from having to deal with activation after buying the computer.

There are now three different version of SLP, namely SLP 1.0 for Windows XP and Windows Server 2008, SLP 2.0 for Windows Vista and Windows Server 2008, and SLP 2.1, which supports Windows 7, Windows Server 2008 R2, and has backward-compatibility support for Windows Vista and Windows Server 2008 too.
For OEM activation to work and able to authenticate OEM licensing for Windows, three (3) components or criteria must exist and fulfill:
  1. Full SLIC table in BIOS
  2. OEM certificate (xrm-ms) which corresponds with OEMID and OEMTableID (Windows Marker) in SLIC table.
  3. OEM-SLP product key
SLP OEM Activation 2.1 works in very much the similar way of OEM Activation (OA) 2.0, with no change to activation technology, and OEM does not require to change factory process to accommodate new SLP 2.1 OEM activation. The only changes is Windows Marker version is now version 2.1 instead of 2.0. Even the digital certificate, which has file extension of .xrm-ms, signed by Microsoft with OEM’s SLIC public key (0×9C bytes) with Microsoft’s private key together with OEMID of SLIC table, is unchanged.

The second part of SLIC table, Windows Marker (0xB6 bytes) is created and signed by OEM with OEMTableID and OEMID together with OEM private key that matches OEM’s SLIC public key. OATools released by Microsoft will now write a new version 2.1 of OEMTables, hence a new Windows Market in different binary format for Windows 7 and Windows Server 2008 R2 OEM activation. Windows Vista and Windows Server 2008 accept both Windows Marker formats (OA version 2.0 and OA version 2.1), but not vice versa.
Thus, aside from new OEM-SLP product key (leaked Windows 7 Ultimate OEM-SLP product key) which is required for each edition of Windows 7 and Windows Server 2008 R2 in order to complete the OEM activation process, whether or not the SLIC 2.1 exists in the BIOS will determine whether the installed Windows 7 or Windows Server 2008 R2 can achieve instant offline activation on system boot up.
How to Determine, Check and Verify Whether SLIC in BIOS is OA 2.1 Capable for OEM Activation
Download and install RW-Everything Read & Write Utility. Run RW-Everything, then click on Access pull down menu, follow by ACPI Tables. In the opened ACPI Table window, click on SLIC tab. The display will look something like the illustration below, or see SLIC 2.0 and 2.1 example here.
see image at orig. article
A ACPI Tables Dump with SLIC 2.0
see image at orig. article
A BIOS SLIC Table Dump of OA 2.1
If the 4 bytes in highlighted area are 00 00 00 00, the SLIC is version 2.0
If the 4 bytes in highlighted area are 01 00 02 00, the SLIC is version 2.1.
If you’re having SLIC 2.0 in BIOS, try to wait for computer manufacturer if it will release new BIOS update that includes SLIC 2.1 table. Else, it’s possible to modify the BIOS (hardmod or biosmod) to include the SLIC 2.1 (assistance available at Windows 7 forum), or uses a OEM-BIOS emulator which commonly known as Windows 7 Loader, which in turn made use by various activators and toolkit to emulate a SLIC 2.1 on boot up.

Friday, April 23, 2010

Windows 7 activation controls

Source
Windows 7 Ultimate Cracked and Activated Permanently with OEM SLP Master Product Key (with SLIC 2.1)

http://speedywap.com/proceed/5500691d4300b142e459682cec7283f9/digitallife+%C2%B7windows+7
READ it
The cracks currently floating around the internet are called Chew WGA and RemoveWGA. They provide one click patch solution for Windows 7 RTM. The cracks do not actually validate or activate windows, but lets you use Windows 7 indefinitely. Microsoft has confirmed that they are aware of these cracks for Windows 7 and are working swiftly to fix this. Knowing Microsoft this shouldn’t take too long. The Security fix from Microsoft will most likely be a Windows 7 Update patch. People who use pirated and cracked software, will mostly likely be unable to update Windows 7 without deactivating the crack.
People who use pirated and cracked software are mostly likely to be open to malware and virus attacks, personally I recommend buying the original software, If you can’t afford it Ubuntu Linux is a great option its Free and Open Source, and in some ways is better than windows in terms of security.
Windows 7 Activation MGAWindows 7 Activation MGA
Windows 7 System PropertiesWindows 7 System Properties
Source: Orginally reported by Cnet

V7_SL_2.4.8.rar
Yeah, new Win7 activation toolkit. Just get yourself Windows 7 releases from GRP or WZT, choose one of the activation methods and you’re good to go. Read instructions first.
Ensure you login as administrator. Activate your copy of windows 7 / Vista/ Server 2008, all edition or uninstall all types of cr**k (bootmgr,bootloader or key/cert) from any loader in one click.
http://www.downtr.net/find/Windows+7+Ultimate+Wta+Crack.html
Win7 activation toolkit. Just get yourself Windows 7 releases from GRP or WZT, choose one of the activation methods and you’re good to go. Read instructions first.
If you have no idea of OEM activation, just click install (default), reboot ur PC and check status.
It will work in
Windows 7 Ultimate x86 & x64
Windows 7 Professional x86 & x64
Windows 7 Home Premium x86 & x64
Windows 7 Home Basic x86 & x64
Windows 7 Starter x86
Windows Server(R) 2008 Standard x86 & x64
Windows Server 2008 R2 Standard x86 & x64
Windows Server(R) 2008 Enterprise x86 & x64
Windows (R) Small Business Server 2008 x86 & x64
Windows Vista Ultimate x86 & x64
Windows Vista Business x86 & x64
Windows Vista Home Premium x86 & x64
Windows Vista Home Basic x86 & x64
Windows Vista Starter x86
Basic Info :
OEM (Certificate & Key) install only where bios already (or modded) contains slic 2.1
Add slic 2.1 to Bootloader (0.97 grldr customised by Zsmin for me) with option (Default,Alternative, Low Memory, Debug, Forceful)
- default option allows auto-detect best method where possible
- alt method relocates SLIC, RSDT, XSDT and RSD PTR to low memory
- low memory method relocates SLIC to low memory
- forceful mode tries to activate on systems where some checks don't complete successfully, may cause problems.
- Debug mode allows view to process behind bootloader.
Install GUID Path (Thanks to PAYMYRENT) failing which install using Mount method.
Add Security to bootloader (Read Access only).
Randomly renamed grubloader (Thanks to PAYMYRENT) failing which allow its user to try normal grldr.
Add slic 2.1 to Bootmgr (No grldr means less time to boot, not recommended).
Certificate install where you want to replace certificate only.
Key install where you want to replace key only.
OEM Slic detection with matching OEM Key if possible. (You can always choose different OEM Key available or own custom key)
Check incorrect custom key.
Detects SLIC version(Thanks to MasterDisaster) and then autoselect best activation mode.
Detects BIOS Mod, any loader or if no loader installed in most cases.
Advantage :
Fast Install (since based on WMI script).
Single file.
Much smaller in size (since based on .NET Framework 2.0).
Bootloader are randomly renamed and so uninstall of old ldr not necessary.
Slic can be added in bootmgr (Not recommended).
Cert & Slic option are together for OEM install.
Cert can be installed/replaced only.
Key can be replaced only.
Option to add your customised OEM info and logo.
Option to backup and restore your licence (useful for retail and mak key users).
Option to dump slic and any number of OEM certificate inside with respective OEM ID.
Default start autoselect best activation mode, slic, cert and key.
Detects BIOS Mod, any loader or if no loader installed in most cases from MBR of disk.
File size: 1593887 bytes (1.52 Mbytes)
MD5...: 68abcb864a973a5aadb850d18aa2e7dc
SHA1..: 11cbe27aaf873cbf5f1a1780afa508dfd2a8c4dd
Tested with some major antivirus.
Also online tested and found ok. VirusTotal report 0/39

Change 2.4.8:
* Fix for autoselection of OEM slic, cert and key.
OS: Windows Vista, Server 2008, Seven
Language: English
License: Cracked
Size: 1.52 MB
Download:

http://uploadbox.com/files/wthID4G3fv
Mirror:
http://turbobit.net/7q14hh6tcyqd.html

Source 
Basic Info:
OEM (Certificate & Key) install only where bios already (or modded) contains slic 2.1
Add slic 2.1 to Bootloader (0.97 grldr customised by Zsmin for me) with option (Default,Alternative, Low Memory, Debug, Forceful)
- default option allows auto-detect best method where possible
- alt method relocates SLIC, RSDT, XSDT and RSD PTR to low memory
- low memory method relocates SLIC to low memory
- forceful mode tries to activate on systems where some checks don't complete successfully, may cause problems.
- Debug mode allows view to process behind bootloader.
Add option to install GUID Path (Thanks to PAYMYRENT) or Mount method.
Add Security to bootloader (Read Access only and are randomly named to avoid detection.)
Add slic 2.1 to Bootmgr (No grldr means less time to boot, not recommended).
Certificate install where you want to replace certificate only.
Key install where you want to replace key only.
OEM Slic detection with matching OEM Key if possible. (You can always choose different OEM Key available or own custom key)
Check incorrect custom key.
Detects SLIC version(Thanks to MasterDisaster) and then autoselect best activation mode.
Instructions:
1. Unzip
2. Follow steps in 'Mode of Activation' below
Mode of Activation:
1. OEM (Certificate & Key) install only where bios already (or modded) contains slic 2.1
2. Add slic 2.1 to Bootloader (0.97 grldr customised by Zsmin for me) with option (Default,Alternative, Low Memory, Debug, Forceful).
3. Add slic 2.1 to Bootmgr (No grldr means less time to boot, not recommended).
4. Certificate install where you want to replace certificate only.
5. Key install where you want to replace key only.

Cobian errror -No se pudo crear el directorio de destino

- the filename, directory name or volume label syntax is incorrect.
Alternate-Data-Streams
Site1
SolutionA
you cannot create a project within a path that has an ampersand (&) in it, which my original projects path did.  In Tools/Options/Projects and Solutions/General, I selected the "Show advanced build configurations' option.  This allows me to select the project build location on creation of a project, and I am now able to ensure it does not try to create in the path with the ampersand in it
SolutionB
facing some problem with INI association. The problem is: “Whenever I try to open any file with extension “.ini” (either by double clicking or open with Notepad), It prompts “The filename, directory name, or volume label syntax is incorrect”
Same file opens if I open it using WordPad. The problem is occurring with all “.ini” files. If I create a text file, type something and save it with extension .ini, I can’t open it by double clicking or by right click and follow Open with >> Notepad.”
Actually It is caused by a Virus/Trojan and it can be fixed manually. So I am sharing the solution to fix it.
How To:
1. Open Registry Editor (Type regedit in Start Search or Run Dialog box)
2. Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\inifile\shell\open\command
3. Now set its (Default) value to: %SystemRoot\%system32\Notepad.exe %1

Or you can simply download the zip file and extract. Run Registry Patch and that’s it.
Applies To:
  • Windows Server 2008 R2
  • Windows Server 2008
  • Windows 7
  • Windows Vista
  • Windows XP
SolutionZ

Restrict internet user in a workgroup

Source
Connecting Clients to Windows Networks 
to set file permissions on a workgroup network and restrict everyone except for one workgroup user from accessing the folder. The thing is that workgroup user is using a differne PC in the network
User Accounts in Active Directory

Workgroup Resources

Windows 7 x86 Memory Hack

Source

Physical_Address_Extension

http://www.twistysdownload.com/forums/softwares/64971-ready-4gb-full-use-4gb-ram.html
modern 32-bit versions of Windows can support more than 4GB RAM (up to 64GB of as shown here

PAE is not the whole story. While the processor and OS might well support more than 4GB of physical memory, the memory controller needs to have the appropriate number of address lines. In all but the latest Intel CPUs, the memory controller was a par of the chipset. Latest chipsets have more than 32 address lines, but some older ones (which were still used in new models some 2 years ago or even less, i.e. Intel 945PM) have only 32 (which amounts to 2^32 bytes or 4GB of physical address space). Those address lines need to be shared with other hardware (mainly the GPU), so there's no way you can address 4GB of physical RAM on those chipsets, no matter the OS.

32bit versions of windows use 64 bit physical addresses since NT 4. It can't use more than 4GB in a single virtual address space, but there are always multiple virtual address spaces, one per process actually.
It doesn't truly support over 4GB, it "fakes" it. Older OS's also had this feature but removed for some odd reason. Its called PAE or Physical Address Extension. There are limits though, for example with PAE, 1 Application can only use upto 4GB of ram.
In a true 64bit system, a application can use more than 4GB of RAM.
I remember prior to XP SP1 or SP2 they allowed to you activate PAE via the bootloader, but removed it in later Service Packs.
PAE can cause problems with your system, for consumer purposes it causes problems you can read online as to why, however for server purposes they have more things to "limit" it which works a lot better.
PAE can be turned on if you ran the following command in command prompt, but i highly recommend you not to:
BCDEdit /set PAE forceenable
Support and Using are 2 totally different things.
Architecturally, there is no way that 32bit windows can use more than 4GB or ram, since it just doesn't have enough bits to allocate that much ram. its only 2^32, which is the actual "hard" limit on the Operating System and in some older computers which doesn't support 2^64 (64bit).
Anyways why dont you just install 64bit Operating system instead of attempting to hack it? 
The other option of using more than 4GB of ram on a 32Bit OS is to "enable" the PSE-36
option of the CPU. In this mode the CPU uses 36-Bit values to adress the RAM and offers the OS RAM-frames so the 32-Bit OS can handle it.
Oh and yes.. your chipset must be able to handle 4GB or more...

Wednesday, April 21, 2010

eCryptfs Encrypted Home

Source by kaijanmaki.net © 2010
thanks to Antti Kaijanmäki!

To recover an eCryptfs encrypted home directory created with ubuntu jaunty installer from a backup.
I thought that it would go smoothly, after all I had written down the recovery passphrase when I installed the system some time a go. Well, it wasn’t all that smooth.
After like 1,5 hours or so I finally had the backup decrypted and I thought that it would be useful to others, too, if I share my findings as I discovered from emergency googling that others are struggling from the same problem and no one has provided any complete solution.
The backup was on external USB HDD, but it should not matter as long as you have your old encrypted .Private somewhere at hand.
First you need to make sure ecryptfs-utils is installed:
$ sudo aptitude install ecryptfs-utils
Create a directory where the backup is opened:
$ cd /mnt
$ sudo mkdir OldHome
Then create a symbolic link to your backup of your old .Private:
$ sudo ln -s /media/3e8ea0ac-xxxx-xxxx-a35a-8ff17406fdb8/home/user/.Private OldPrivate
Now, here’s the part that was missing from all the instructions. At least Ubuntu is using filename encryption to hide the real filenames. You need two keys for accessing: one for accessing the file content and one to decrypt the filenames to be meaningful. To get the key do:
$ sudo ecryptfs-add-passphrase --fnek
Passphrase:
Enter the recovery passphrase: the long one you had to manually write down to a piece of paper when you installed the system. Then you should have a similar output as the following:
Inserted auth tok with sig [xxxxxxxxxxxxxxx] into the user session keyring
Inserted auth tok with sig [yyyyyyyyyyyyyyyy] into the user session keyring
Now, write down the second signature [yyyyyyyyyyyyyyyy].
Now you are ready to decrypt the backup:
$ sudo mount -t ecryptfs OldPrivate OldHome/
Passphrase:
Select cipher:
1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
2) blowfish: blocksize = 16; min keysize = 16; max keysize = 56 (not loaded)
3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
Selection [aes]:
Select key bytes:
1) 16
2) 32
3) 24
Selection [16]:
Enable plaintext passthrough (y/n) [n]:
Enable filename encryption (y/n) [n]: y
Filename Encryption Key (FNEK) Signature [xxxxxxxxxxxxxxx]: yyyyyyyyyyyyyyyy
Attempting to mount with the following options:
ecryptfs_unlink_sigs
ecryptfs_fnek_sig=yyyyyyyyyyyyyyyy
ecryptfs_key_bytes=16
ecryptfs_cipher=aes
ecryptfs_sig=xxxxxxxxxxxxxxx
WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
it looks like you have never mounted with this key
before. This could mean that you have typed your
passphrase wrong.

Would you like to proceed with the mount (yes/no)? : yes
Would you like to append sig [df3c98e4c85db0c5] to
[/root/.ecryptfs/sig-cache.txt]
in order to avoid this warning in the future (yes/no)? : no
Not adding sig to user sig cache file; continuing with mount.
Mounted eCryptfs
Now you ara able to access the decrypted backup in OldHome directory and you also have correct filenames.

18 Responses to “Recovering Files From eCryptfs Encrypted Home”

  1. Gyrlano Says:
    could help me solve the following problem:
    Inserted auth tok with sig [ff4aae46a4d814b4] into the user session keyring
    Inserted auth tok with sig [5c53936d7608a270] into the user session keyring
    gyrlano@gyrlano:/$ sudo mount -t ecryptfs OldPrivate OldHome/
    Passphrase:
    Select cipher:
    1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    2) blowfish: blocksize = 16; min keysize = 16; max keysize = 56 (not loaded)
    3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
    4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
    Selection [aes]: 1
    Select key bytes:
    1) 16
    2) 32
    3) 24
    Selection [16]: 1
    Enable plaintext passthrough (y/n) [n]:
    Enable filename encryption (y/n) [n]: y
    Filename Encryption Key (FNEK) Signature [ff4aae46a4d814b4]: 5c53936d7608a270
    Attempting to mount with the following options:
    ecryptfs_unlink_sigs
    ecryptfs_fnek_sig=5c53936d7608a270
    ecryptfs_key_bytes=16
    ecryptfs_cipher=aes
    ecryptfs_sig=ff4aae46a4d814b4
    WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
    it looks like you have never mounted with this key
    before. This could mean that you have typed your
    passphrase wrong.
    Would you like to proceed with the mount (yes/no)? : yes
    Would you like to append sig [ff4aae46a4d814b4] to
    [/root/.ecryptfs/sig-cache.txt]
    in order to avoid this warning in the future (yes/no)? : no
    Not adding sig to user sig cache file; continuing with mount.
    Error mounting eCryptfs: [-2] No such file or directory
    Check your system logs; visit
    gyrlano@gyrlano:/$
    I will be grateful.
  2. antti Says:
    You could first check that Filename Ecryption is used (ls , does the names look cryptic?) and then check output of dmesg command for clues what goes wrong. And also try to reboot and start over, too. I had multiple tries first without a reboot when I had the same error and when I rebooted and tried again it worked. I probably had wrong keys in my keyring due to experimenting different things.
  3. Eitan Says:
    Super awesome! Thank you very much. I’ve been trying to figure this out for weeks.
  4. GodGen Says:
    /*/*/
    Antti, you’re the world’s largest. ThankS!!!!! !!!!! !!!!!
    /*/*/
  5. Cliff Says:
    Thank you a million times! I ran across several instructions for recovering an encrypted home from another install/system and your instructions were the only ones that worked for me. Just like you, I successfully mounted my private folder only to find that the filenames and content were still hopelessly encrypted. Thank you once again…
  6. Cliff Says:
    @Grylano
    I got this error when the mount-point directory didn’t exist prior to the mount:
    Error mounting eCryptfs: [-2] No such file or directory
    It has nothing to do with encryption and should really have occurred after a sanity check on the mount syntax (as oppossed to having you type a whole bunch of stuff and then failing).
  7. Paddy Says:
    Thank you!
    Why on earth isn’t it in the official documentation?
  8. Matt Says:
    Thanks, this was very helpful. Found your post on the Ubuntu Forums and it led me here.
  9. Hector Diaz Says:
    you are my hero!!!!!
  10. Drew S. Says:
    “Filename Encryption Key (FNEK) Signature [xxxxxxxxxxxxxxx]: yyyyyyyyyyyyyyyy”
    That’s the secret sauce that I always manage to forget! Thank you!
  11. Wyn Williams Says:
    I think I love you ! I had 83,000 bloody files decrypted with fuc**d up file names, now I see them.
    I searched for two days for this solution so a MASSIVE THANKYOU !!!!
  12. Angelverde Says:
    Increible, muchas gracias, en ningun lugar encontre solución similar.
    Haré un post y te enlazo, sino te importa.
  13. Recuperar los archivos y carpetas encriptadas con eCryptfs « El tux Angelverde Says:
    [...] passphrase siempre la tuve a la mano y después de buscar por toda la red me tope con la respuesta, una respuesta que parece ser la única solución y sin asumir perdida alguna. Yo olvide mi contraseña pero es muy probable que hayas hecho una [...]
  14. Jul Says:
    Thanks a lot. I tried to decrypt my old home directory for hours.
  15. Ed Says:
    Thanks for this post. It just helped me migrate a bunch of files off of a flaky Wubi install to a shiny new native install.
    I have a couple things to add:
    1) Don’t skip on the ’sudo’. I went in circles a couple of times because I ran ‘ecryptfs-add-passphrase –fnek’ as myself.
    2) If you didn’t write down your recovery passphrase, but still have your .ecrypt directory, you can run ‘ecryptfs-unwrap-passphrase .ecryptfs/wrapped-passphrase’ to get it back.
    3) You need to enter that recovery passphrase for both the ‘ecryptfs-add-passphrase’ and ‘mount’ command. (Yeah, I put in my login password for the mount a few times before I realized that was wrong.)
  16. Seb Has Says:
    Man you are gooooooooooooooooooooood!
  17. Gotit Says:
    Well, I’ve tried I don’t know how many times but it just won’t give me permission! Could you please take a look and tell me what I’m doing wring? This is on a Karmic install if that makes a difference:
    ubuntu@ubuntu:/mnt$ sudo ecryptfs-add-passphrase –fnek
    Passphrase:
    Inserted auth tok with sig [9feeafb7d362cca0] into the user session keyring
    Inserted auth tok with sig [50f4f62c9ec87247] into the user session keyring
    ubuntu@ubuntu:/mnt$ sudo mount -t ecryptfs OldPrivate OldHome/
    Passphrase:
    Select cipher:
    1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    2) blowfish: blocksize = 16; min keysize = 16; max keysize = 56 (not loaded)
    3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
    4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
    6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
    Selection [aes]:
    Select key bytes:
    1) 16
    2) 32
    3) 24
    Selection [16]:
    Enable plaintext passthrough (y/n) [n]:
    Enable filename encryption (y/n) [n]: y
    Filename Encryption Key (FNEK) Signature [9feeafb7d362cca0]: 50f4f62c9ec87247
    Attempting to mount with the following options:
    ecryptfs_unlink_sigs
    ecryptfs_fnek_sig=50f4f62c9ec87247
    ecryptfs_key_bytes=16
    ecryptfs_cipher=aes
    ecryptfs_sig=9feeafb7d362cca0
    WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
    it looks like you have never mounted with this key
    before. This could mean that you have typed your
    passphrase wrong.
    Would you like to proceed with the mount (yes/no)? : yes
    Would you like to append sig [9feeafb7d362cca0] to
    [/root/.ecryptfs/sig-cache.txt]
    in order to avoid this warning in the future (yes/no)? : no
    Not adding sig to user sig cache file; continuing with mount.
    Mounted eCryptfs
    ubuntu@ubuntu:/mnt$ dir
    OldHome OldPrivate
    ubuntu@ubuntu:/mnt$ cd OldHome
    bash: cd: OldHome: Permission denied
    ubuntu@ubuntu:/mnt$
    Thanks
  18. antti Says:
    Gotit: original file permissions apply even when you try to access the files on a different machine or live-CD. Live-CD user is just a regular user who does not have a permission to access your unencrypted home directory. Only root can access any files.
    You either have to access the backup as root:
    Mounted eCryptfs
    $ sudo su
    # cd OldHome
    or you have to change the owner of the directory and files:
    Mounted eCryptfs
    $ sudo chown $USER OldHome/ -R
    $ cd OldHome

Tuesday, April 20, 2010

uninstall with dpkg

dpkg: warning: ignoring request to remove XXdebianpackagenameXXX  which isn't installed

sudo dpkg --remove --force-remove-reinstreq debianpackagename

If it works, then:

sudo apt-get update

sudo apt-get upgrade


=======================
I solve in this way
sudo gedit /var/lib/dpkg/status
in the document i find this
Package: avast4workstation
Status: install ok installed
Priority: extra
Section: alien
Installed-Size: 22144
Maintainer: root
Architecture: i386
Version: 1.0.8-2
Depends: libc6 (>= 2.3.2.ds1-21)
Description: avast! antivirus
avast! is an antivirus package that lets you do both on-demand and
on-access scanning. It combines excellent detection rates with
high speed and superior stability of the antivirus engine.
(Converted from a rpm package by alien version 8.52.)
and i cut it, then save and i solve the problem!!!!
now the update manager works again!
=======================
I tried the following and it worked...

sudo gedit /var/lib/dpkg/status

in the document find this...

Package: avast4server
Status: deinstall reinstreq half-configured
Priority: extra
Section: alien
.....

and change it to...

Package: avast4server
Status: install ok installed
Priority: extra
Section: alien
....

Next go to the .deb installation package that you downloaded and open it in archive manager. Extract to your hard disk. You can now browse to these files to find the 'data.tar.gz' file which is another archive. Open this as 'root' and find the file 'avastd' -- it's in the directory (within the archive) called '/./etc/init.d/'

As 'root', create in your filesystem a directory called /etc/sysconfig/ and then extract 'avastd' to that directory.

Start Synaptic. It will identify a broken link which is the 'avast4server' package. You can select this to do a 'Complete Removal'

Removal proceeds without error!




Audio lost and more

WARNING: All config files need .conf: /etc/modprobe.d/, it will be ignored in a future release
Fuente
$ killall pulseaudio
$ sudo alsa reload
o
$sudo alsa force-reload
Installing alsaconf- howto from source, it will pull in all depends and it just makes life a little better when you can get it to work right.
or a debian package
Edgy Eft (6.10) version:
http://seveas.ubuntulinux.nl/~dennis...veas1_i386.deb

I'm not familiar with FUSE that much, so I will let WIKI explain it to you.
GVFS - Wikipedia, the free encyclopedia




http://www.kernel.org/doc/Documentation/sound/alsa/HD-Audio-Models.txt



  sudo aptitude install module-assistant build-essential
  sudo module-assistant prepare,update
  sudo module-assistant build,install alsa
  sudo depmod



Fuente
http://tecnotravel.com.ar/2009/11/02...-karmic-koala/

Instalar Alsa desde el repositorio de backports (linux-backports-modules-alsa-karmic-generic). Luego se reinicia y listo

Entrar al directorio /etc/modprobe.d y renombrar los ficheros ( no directorios ). Hay que agregarle un .conf al final de cada archivo:






mv archivename archivename.conf
Importante: Estoy hay que hacerlo como root y es recomendable realizar un respaldo del directorio antes de hacer cualquier cambio.
Todos los archivos dentro de /etc/modprobe.d/ deben terminar con .conf Mas informacion: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517954

Sunday, April 18, 2010

subversion in ubuntu

Install svn with Web Access on Ubuntu

This article covers installing subversion with the apache module so that it can be easily accessed from other systems on a public network. If you want a more secure svn server, you could use svnserve+ssh, which isn’t covered in this article.
To install subversion, open a terminal and run the following command:
sudo apt-get install subversion libapache2-svn
We’re going to create the subversion repository in /svn, although you should choose a location that has a good amount of space.
sudo svnadmin create /svn
Next we’ll need to edit the configuration file for the subversion webdav module. You can use a different editor if you’d like.
sudo gedit /etc/apache2/mods-enabled/dav_svn.conf
The Location element in the configuration file dictates the root directory where subversion will be acessible from, for instance: http://www.server.com/svn
The DAV line needs to be uncommented to enable the dav module
# Uncomment this to enable the repository,
DAV svn
The SVNPath line should be set to the same place your created the repository with the svnadmin command.
# Set this to the path to your repository
SVNPath /svn
The next section will let you turn on authentication. This is just basic authentication, so don’t consider it extremely secure. The password file will be located where the AuthUserFile setting sets it to…  probably best to leave it at the default.
# Uncomment the following 3 lines to enable Basic Authentication
AuthType Basic
AuthName “Subversion Repository”
AuthUserFile /etc/apache2/dav_svn.passwd
To create a user on the repository use, the following command:
sudo htpasswd2 -cm /etc/apache2/dav_svn.passwd
Note that you should only use the -c option the FIRST time that you create a user. After that you will only want to use the -m option, which specifies MD5 encryption of the password, but doesn’t recreate the file.
Example:
sudo htpasswd2 -cm /etc/apache2/dav_svn.passwd geek
New password:
Re-type new password:
Adding password for user geek
Restart apache by running the following command:
sudo /etc/init.d/apache2 restart
Now if you go in your browser to http://www.server.com/svn, you should see that the repository is enabled for anonymous read access, but commit access will require a username.
Read Subversion

Saturday, April 17, 2010

Wireless on Feisty Fawn (with ndiswrapper)

Source
Credit goes to bmartin
Atheros AR5007EG
Make sure you use the appropriate version of the drivers for your version of Linux. If you’re using a 64-bit version of Linux, you must use 64-bit drivers. You can check this using the following command:
getconf LONG_BIT
I recommend using the wicd program for WiFi connectivity. It boasts built-in WPA support and has been successful where other network connection manager programs have failed.
This chipset showed up on my Acer Aspire 5050-3785.
lspci 
the command spit out the following info:
Atheros Unknown device 001c (rev 01)
It also has been incorrectly labelled as an AR5006X device, in some cases.
Here is a step by step procedure to install the drivers manually.
Open a terminal and copy/paste the following lines:
Download the ndiswrapper (v1.4 source code and AR5007EG Windows drivers:
wget http://wifix.sourceforge.net/software.php?title=ndiswrapper
Download the AR5007EG Windows XP drivers
If you’re using a 32-bit version of Linux, use this command
wget http://blakecmartin.googlepages.com/ar5007eg-32-0.2.tar.gz
For 64-bits of blazing WiFi glory, use this:
wget http://blakecmartin.googlepages.com/ar5007eg-64-0.2.tar.gz
Extract the archives:
tar xvf ar5007eg-*.tar.gz
tar xvf ndiswrapper-newest.tar.gz
Ensure you have your kernel headers and the build essential package.
sudo aptitude update
sudo aptitude install linux-headers-$(uname -r) build-essential
Blacklist the ath_pci kernel module (it doesn’t support our chipset).
echo “blacklist ath_pci” | sudo tee -a /etc/modprobe.d/blacklist
Compile ndiswrapper
pushd ndiswrapper-*/
sudo make uninstall
make
sudo make install
popd
Install the Windows drivers (using ndiswrapper):
pushd */ar5007eg/
sudo ndiswrapper -i net5211.inf
popd
Make sure ndiswrapper loads up every time we start Linux
sudo modprobe ndiswrapper
echo “ndiswrapper” | sudo tee -a /etc/modules
Restart your computer.
sudo init 6

Installing Madwifi drivers

What is madwifi you may ask? Madwifi is actually a special driver that will allow Ubuntu or another Linux recognize your wireless cards that refuse to be recognized by Ubuntu already. But wait -- madwifi isn't for everyone! madwifi only supports certain chipsets, and if yours isn't supported, it's quite probable that following this installation guide will make no difference on your ability to use your wireless card under Linux. So, if you aren't sure whether your card is supported by this driver, visit the following page:
http://madwifi.org/wiki/Compatibility 

The madwifi install guides we have aren't that good/easy. 
These instructions at the Debian MacBook Wiki are an excellent resource
and I modified these instructions to work on Ubuntu. 
This is for everyone on Feisty Fawn (7.04) that is installing the madwifi set of drivers (unfortunately these instructions don't work in Dapper).
Warning: These instructions don't seem to do any good because newer MacBooks and other laptops with related wireless chipsets require madwifi-hal, so this guide shouldn't be followed anymore! Instead, use these instructions:
http://ubuntuforums.org/showpost.php...9&postcount=25

Acer Aspire 3694WLMi & Atheros

Source
 Acer Aspire 3694WLMi & Atheros 
$ wget  http://wifix.sourceforge.net/software.php?title=ndiswrapper
or wget http://vostorga.org/files/ar5007eg-64-0.2.tar.gz
$ tar -xvzf ar5007eg-*.tar.gz
$ tar -xvzf ndiswrapper-newest.tar.gz
Got it going by installing ndisgtk & extracting the file manually to my desktop & using ndisgtk(GUI for ndiswapper) to add the driver.
But probs connecting using WPA

Howto: To install madwifi drivers if they are not already preinstalled in gutsy, so first just try using them if they're not installed follow this link

To get WPA2 CCMP PSK working:
sudo apt-get install wpa_supplicant 
Create a file called wpa_supplicant.conf in your /etc directory
Code:
sudo gedit /etc/wpa_supplicant.conf
paste the following into that file
Code:
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
# ap_scan=2 maybe 0 or 1 just try
ap_scan=2
fast_reauth=1

network={
ssid="your network SSID goes here"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP
psk="your passprase for wpa2 network goes here"
}
next make the file executable
Code:
chmod 777 /etc/wpa_supplicant.conf
Then execute this command from terminal to connect to your wpa network
(you might have to exchange the -iath0 with your wifi device name. so -ieth0 of -iwlan0 you get the right one my executing iwconfig in terminal)

This should start the network and connect to your accesspoint.
if it works you can add the -B option to the line which makes it run in the background
Code:
wpa_supplicant -w -Dmadwifi -iath0 -B -c/etc/wpa_supplicant.conf
the only thing is that this works if your using the madwifi dirver ( -Dmadwifi ), so if you can't install that one I don't know how ndiswrapper should work with this.

Hope this works. credit goes to Xploitz
Heres another thread on ubuntuforums that might help http://ubuntuforums.org/archive/index.php/t-392666.html

Ndiswrapper en tarjeta wireless

en Atheros AR5007 sobre HP DV6770se
Sucede que la nueva laptop DV6770se tiene una tarjeta wireless Atheros AR5007, pero al ejecutar un lscpi tengo la siguiente salida:
# lspci | grep -i wireless
03:00.0 Ethernet controller: Atheros Communications, Inc. AR5006EG 802.11 b/g Wireless PCI Express Adapter (rev 01)
La salida del lspci la reconoce incorrectamente, aún ocupando un kernel 2.6.24 y pciutils 2.2.7-r1 . He leído que en otros sistemas la salida del lspci es la siguiente:
Atheros unknown device 001c (rev 01)
Esto me puso a dudar si efectivamente había un driver trabajando para madwifi, tropezando con el siguiente link : http://madwifi.org/ticket/1679 lo que en resumidas cuentas menciona que solo hay soporte para x86, por lo que para esos casos de emergencia me dispuse a configurar ndiswrapper:
Obteniendo Archivos
Se debe de obtener los archivos inf, los cuales he subido en http://vostorga.org/files/ar5007eg-64-0.2.tar.gz ,
$ wget -c http://vostorga.org/files/ar5007eg-64-0.2.tar.gz
Procedemos a descomprimirlos....
$ tar xvfz ar5007eg-64-0.2.tar.gz
ar5007eg-64-0.2/
ar5007eg-64-0.2/ar5007eg/
ar5007eg-64-0.2/ar5007eg/net5211.inf
ar5007eg-64-0.2/ar5007eg/net5211.cat
ar5007eg-64-0.2/ar5007eg/ar5211.sys
ar5007eg-64-0.2/README
Instalando ndiswrapper
Debemos de instalar el módulo de ndiswrapper para realizar esta operación, en mi caso basta con
# emerge net-wireless/ndiswrapper
En debian o similares bastará con
#apt-get install ndiswrapper
Hay que notar que para que lo anterior tenga éxito necesitamos las fuentes del kernel, por consecuencia cada vez que recompilemos el kernel deberemos de reinstalar el módulo.
Procedemos a instalar los drivers a través del comando
# ndiswrapper -i ar5007eg-64-0.2/ar5007eg/net5211.inf
La cual da una salida similar a:
installing net5211 ...
forcing parameter MapRegisters from 256 to 64
forcing parameter MapRegisters from 256 to 64
forcing parameter MapRegisters from 256 to 64
forcing parameter MapRegisters from 256 to 64
.........
Verificamos que se haya instalado correctamente
# ndiswrapper -l
net5211 : driver installed
device (168C:001C) present
Levantamos el módulo haciendo
#modprobe ndiswrapper
Verificando interfaz
Luego verificamos con los comandos que estamos acostumbrados con wireless
#iwconfig
wlan0 IEEE 802.11g ESSID:off/any
Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated
Bit Rate:54 Mb/s
Encryption key:off
Power Management:off
Link Quality:0 Signal level:0 Noise level:0
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0

Atheros AR5BXB63 in Acer Aspire 5420

Atheros AR5BXB63 on Ubuntu with madwifi
SourceAA
Source B
 The Linux wireless regulatory database 
http://wireless.kernel.org/download/wireless-regdb/debs/
This package contains the wireless regulatory database used by all cfg80211 based Linux wireless drivers. The wireless database being used is maintained by John Linville, the Linux wireless kernel maintainer. The regulatory database is used by CRDA and cfg80211 to configure wireless devices to operate within the radio spectrum allowed in the local jurisdiction. 
WPA supplicant 
http://hostap.epitest.fi/wpa_supplicant/
wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA and WPA2 (IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/association of the wlan driver.
wpa_supplicant is designed to be a "daemon" program that runs in the background and acts as the backend component controlling the wireless connection. wpa_supplicant supports separate frontend programs and a text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with wpa_supplicant.
wpa_supplicant uses a flexible build configuration that can be used to select which features are included. This allows minimal code size (from ca. 50 kB binary for WPA/WPA2-Personal and 130 kB binary for WPA/WPA2-Enterprise without debugging code to 450 kB with most features and full debugging support; these example sizes are from a build for x86 target).
nl80211 userspace
http://git.sipsolutions.net/?p=iw.git

Texto mejorado y simplificado por cebaehren
Opción A
Soporte de Atheros por HAL, modo monitor e inyección.

Solución valida tanto para 32 como para 64 bits.
Descargar los drivers de Madwifi HAL y usar el parche de Aircrack


2. Disable the following options:
  • Atheros Hardware Access Layer (HAL)
  • Support for Atheros 802.11 wireless LAN cards.
3. Reboot your system

4. After reboot, open a terminal and issue the following:
Update: For updated releases please visit http://snapshots.madwifi.org/special
$ sudo apt-get install build-essential
$ wget http://snapshots.madwifi.org/special/madwifi-ng-r3366+ar5007.tar.gz
$ tar xfz madwifi-ng-r3366+ar5007.tar.gz
$ cd madwifi-ng-r2756+ar5007
$ make
$ sudo make install
$ sudo modprobe ath_pci

5. Done! If everything went well, your wi-fi is ready to use! In order to verify it, you can issue the following:$ ifconfig wifi0
wifi0     Link encap:UNSPEC  HWaddr 00-19-7E-3F-59-55-00-00-00-00-00-00-00-00-00-00
      UP BROADCAST RUNNING MULTICAST  MTU:1500  
 
Additionally, you can put it inside your /etc/modules file so everytime you boot up your laptop it will automatically call the
ath_pci module!
As root: 
echo ath_pci >> /etc/modules 
Opción AA
If you have Atheros AR5007 wireless network adapter follow this procedure to make it work in ubuntu 8.04

For i386 Users
First go to System--Administration--Hardware Drivers and disable by un-ticking the following option
Atheros Hardware Access Layer (Hal)
Then Reboot your system.
Preparing your system
sudo apt-get install build-essential
Then open the terminal from Applications--Accessories--Terminal and copy the following commands:
wget http://snapshots.madwifi.org/special/madwifi-ng-r2756+ar5007.tar.gz
tar xfz madwifi-ng-r2756+ar5007.tar.gz
cd madwifi-ng-r2756+ar5007
make
sudo make install
sudo modprobe ath_pci
sudo reboot
That’s it now your wireless should work without any problem.
For AMD64 Users
If you are using 64 bit version following this procedure
Blacklist the default driver
echo “blacklist ath_pci” | sudo tee -a /etc/modprobe.d/blacklist

wget -c http://vostorga.org/files/ar5007eg-64-0.2.tar.gz
Extract driver using the following command
tar xvf ar5007eg-*.tar.gz

[Installing ndiswrapper

#apt-get install ndiswrapper
Don't forget to reinstall the module each time a compiling the kernel.
Installing the drivers:
# ndiswrapper -i ar5007eg-64-0.2/ar5007eg/net5211.inf
Download the 64 bit driver] or if the package was downloaded:
tar xvf ndiswrapper-newest.tar.gz
Ensure you have your kernel headers and the build essential package.
sudo aptitude update
sudo aptitude install linux-headers-$(uname -r) build-essential
Install ndisgtk
sudo apt-get install ndisgtk
Either use ndisgtk to install the driver or
sudo ndiswrapper -i net5211.inf
Load up ndiswrapper every time Linux is loaded
sudo modprobe ndiswrapper
echo “ndiswrapper” | sudo tee -a /etc/modules
Restart your system using the following command
sudo reboot
Your card should have been detected and it should show available networks but if it does not, try
sudo iwlist scan

Opción B
Gracias mil, GoGAddict!!
Con drivers ya parcheados y listos para instalar
Primero e importante: 
sudo apt-get install build-essential
luego descargar
http://www.megaupload.com/?d=78U8TB7O
o

http://rapidshare.com/files/143396780/MadWifi_Hal_parcheados_para_seguridadwireless_por_GoGAddict.tar.html
En una terminal desconectar las unidades wifi:
ifconfig ath0 down
ifconfig wifi0 down

Ir a la carpeta de los drivers descomprimida en el escritorio
cd
cd Desktop
cd madwifi-hal-0.10.5.6-r3861-20080903

Configuración usando los scripts:
cd scripts
./madwifi-unload
./find-madwifi-modules.sh $(uname -r)
cd ..

Compilación e instalación
make
make install

Luego
modprobe ath_pci
Voilá: todo instalado y listo para funcionar.
iwconfig

Si no reconoce la interfaz, al reiniciar el equipo lo hará.
Opción BB
Créditos a Morglum007

Bueno, mucha gente anda preguntando porque Wifislax no funciona con esta tarjeta. La opción de los drivers es buena, pero yo me he tirado 3 dias completos hasta que precompile y metí los drivers correctamente en la suite, ya que si no lo tienes instalado en el disco duro, jodido lo llevas al tener que reiniciar.
En cualquier caso, he dejado la distro completa para meterse en un pen y funciona con la susodicha tarjeta (probado y comprobado en un Asus X51RL con AR5007EG en modo monitor) con versión de drivers madwifi del 1 de agosto de 2008.
La hubiese pasado a iso, pero no tenia espacio en disco, así que espero que alguien por aquí la pase a dicha iso y deje esta magnífica suite en versión CD.
Teneis los archivos completos en:

http://rapidshare.com/files/139477864/Archive.zip.001.html
http://rapidshare.com/files/139499337/Archive.zip.002.html
http://rapidshare.com/files/139524912/Archive.zip.003.html
http://rapidshare.com/files/139532358/Archive.zip.004.html

Comprimido con 7zip, descomprimis, copiais en un pen con config FAt/FAT32 y ejecutais el .bat de la carpeta boot para hacer el pen de arranque.

NOTA al respecto del .bat: Si cuando ejecutais el bat os da error y el pen no se vuelve de arranque, es el VISTA. Si algo he aprendido con el tocoteo en los mbr con el bcdedit y puñetas en vinagre es que el VIsta aun en modo Admin hace LO QUE LE SALE (especialmente con SCSI o S-ATA). Desconozco si son las versiones home basic o premium, pero ejecutad el sh en linux o en XP si podeis. NO es problema del PEN, como veo en algunos post, es problema del VISTA. En mi caso he usado un sandisk de 1 gB ( no funciona bat en VISTA , ni tampoco programas como BCDedit o BCDedit Pro para sistemas multiboot, pero si en XP, incluyendo edición de LILO, eLILO o GRUB bajo dichos OS. Vista se niega a modificar algo o lo complica todo, un caos amos, nasti de plasti, una cagada.....).
Ya teneis "live" con soporte atheros.

Atheros - madwifi.org unaccessible

http://madwifi-project.org/wiki/About/ath5k
ath5k is a completely FOSS Linux driver for Atheros wireless cards. It is based on MadWifi and the OpenHAL. In ath5k we've gotten rid of the entire 2-module-layer HAL architecture, ath5k now just calls hardware functions directly.
We've been working on ath5k for some time (that's why you'll find ath5k_* named files inside madwifi-old-openhal and dadwifi-openhal branches) but the actual new mac80211 driver interface was put together by Jiri Slaby whose work was committed on wireless-dev's new ath5k branch. ath5k is based on madwifi-old-openhal branch and some bits of his code came from dadwifi-openhal. Jiri is now part of the MadWifi team and we are working together on advancing ath5k. ath5k is now part of the wireless-2.6 tree.
Madwifi.org DNS servers down?
A temporary fix.
add the following line to your /etc/hosts file:

217.24.1.134  snapshots.madwifi.org
Btw.
http://snapshots.madwifi-project.org/ resolves to this address.
See also: http://madwifi-project.org/wiki/UserDocs/GettingMadwifi
217.24.1.134  madwifi.org
217.24.1.134  snapshots.madwifi.org
217.24.1.134  svn.madwifi.org
217.24.1.135  lists.madwifi.org

 
http://wireless.kernel.org/en/users/Drivers/ath5k
http://madwifi-project.org/wiki/About/ath5k
MadWIfi is working on providing a driver for users which does not require compiling a wireless-2.6 git kernel. In the meantime if you want to help test the latest driver you will need to compile a recent kernel. If you want to get the very latest then read the hacking ath5k guide to get ath5k. If you don't want to deal with git then please try out an mm (Andrew Morton) release from kernel.org. You will now find the mm releases have the ath5k driver.
To enable ath5k, you must first enable mac80211:
Networking  --->
  Wireless  ---> 
     Improved wireless configuration API 
     Generic IEEE 802.11 Networking Stack (mac80211)
Please note that there is another 802.11 networking stack:
 Generic IEEE 802.11 Networking Stack
You do not need this. This option enables the old SoftMAC stack we hope to kill one of these days. You can still safely enable this though.
You can then enable ath5k in the kernel configuration under
Device Drivers  --->
  [*] Network device support  --->
        Wireless LAN  --->
             Atheros 5xxx wireless cards support
You can also get current ath5k code by downloading compat-wireless package from wireless.kernel.org.
For user discussion and non-developement problems there is a mailing-list ath5k-users.
Supported Chipsets
MAC chips
AR5210
AR5211
AR5212
PHY chips
RF5110
RF5111/2111
RF5112/2112
RF2413
RF5413
RF2425
For more infos check out Chipsets

Hacking ath5k

ath5k is currently available through different places.
Developers are encouraged to work using the git repository. If you are not familiar with git please check out our Linux wireless git-guide. Alternatively you can use the Linux wireless compatibility package but please be sure to post patches in unified diff format (diff -u). To learn how to submit patches please read our Submitting patches guideline.  
Documentation available

Enabling ath5k

To enable ath5k in the kernel configuration, you must first enable mac80211:
Networking  --->
  Wireless  --->
     Improved wireless configuration API
     Generic IEEE 802.11 Networking Stack (mac80211)

Please note that there is another 802.11 networking stack:
 Generic IEEE 802.11 Networking Stack

You do not need this. This option enables the old SoftMAC stack we hope to kill one of these days. You can still safely enable this though.
You can then enable ath5k in the kernel configuration under
Device Drivers  --->
  [*] Network device support  --->
        Wireless LAN  --->
             Atheros 5xxx wireless cards support


supported chips

AR5210   - 802.11a   (Crete/fez)
AR5211   - 802.11ab  (Oahu) (draft g -OFDM only- supported by hw but not by ath5k)
AR5212   - 802.11abg (Venice)
AR5213   - 802.11abg (Hainan)
AR2413/4 - 802.11bg  (Griffin)
AR5413/4 - 802.11abg (Eagle)
AR5423/4 - 802.11abg (Condor) (PCI-E)
AR2425   - 802.11bg  (Swan) (PCI-E)
AR2417   - 802.11bg  (Nala) (PCI-E)

To try the driver you can do this:
modprobe ath5k
sudo ip link set wlan%d up
sudo iwconfig wlan%d essid any
# Make sure you get auth'd and then assoc'd
# Then either set an IP manually or get it via DHCP
ping gw

You'll probably see an immediate rate drop to 1M, this is because of how we currently handle rate control. You should be able to keep at least at 11M for 802.11b/g but for now set this manually:
iwconfig wlan%d rate 11M
MORE...