Growl by Lobster

Moderator: Forum moderators

Post Reply
darry19662018
Posts: 453
Joined: Sat Dec 14, 2019 12:24 am
Has thanked: 54 times
Been thanked: 65 times

Growl by Lobster

Post by darry19662018 »

GROWL release 2.1 from Lobster April 2017

Guard!
Restrict!
Observe!
Watch!
Lookout!


This is very much a simple security template
GROWL is a simple, open, configurable, Puppy Security Tool. GROWL is used for enhancing security, education and probing ones set up.

Save the code as a text file, make it executable. Click to run. Modify if needed.
Growl.gz
(11.17 KiB) Downloaded 85 times
Growl.gz
(11.17 KiB) Downloaded 85 times
Remove .gz

Original Murga thread: http://murga-linux.com/puppy/viewtopic.php?p=335216
Last edited by darry19662018 on Sat Jul 18, 2020 11:10 pm, edited 1 time in total.
darry19662018
Posts: 453
Joined: Sat Dec 14, 2019 12:24 am
Has thanked: 54 times
Been thanked: 65 times

Re: Growl by Lobster

Post by darry19662018 »

Code: Select all

#! /bin/bash
#
# GROWL v2.1 2017 Fri 7 April
# Security enhancements, probes, online services and info for Puppy Linux
# thanks to SFR, Shadow, Linux Kodachi, Buddha Vajrasattva and Puppy yap dogs (security paranoids everywhere)

# New for 2.1
# eth0 disconnect, reconnect
# SFR Password Generator
# htop process viewer, pswrd reset, ipinfodb probe, noc.to probe, webkay probe, GNU Privacy Guard
# more anon proxies added, final thoughts
#
# New for 1.9 Updated for Slacko64 Puppy - 6.3.2, Quick Start Help Button added, unblockweb.co proxy, Browser Paranoid Kit

####### BEGIN not implemented ############
 
# <menuitem>
# <label>Temp Disable Firewall</label>
# <action>rxvt -e /etc/rc.d/rc.firewall stop</action>
# </menuitem>
# <menuitem>
# <label>Enable Firewall</label>
# <action>rxvt -fn *-Fixed-*-20-* -geometry 40x15+480+400 -C -bg orange -e /etc/rc.d/rc.firewall start ; sleep 10</action>
# </menuitem>

# <menuitem>
# <label>Activate EzTables Firewall</label>
# <action>rxvt -e /usr/sbin/fatdog-service-manager.sh</action>
# </menuitem>

# <menuitem>
# <label>Reset root password</label>
# <action>passwd -d root 'test1' &</action>   
# </menuitem>

####### END not implemented ############

#### SFR Password Generator
PASSGEN ()
{
   # Generates a password with at least:
   # - 1 lowercase letter
   # - 1 uppercase letter
   # - 1 digit
   # - 1 punctuation mark
   
   TITLE="PassGen"
   
   # Min: 8, Max:256, Default: 16
   LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
   [ $? -ne 0 ] && exit
   
   [ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end
   
   while true; do
      while true; do
         PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
         if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
            break   # all criteria were met, so break the loop
         fi
      done
     
      echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
      [ $? -ne 0 ] && break
   done
}

export -f PASSGEN

#### End of Password Generator code

export Grrr='
<window title="GROWL 2.1" window-position="1">
<vbox>
<menubar>
<menu>
<menuitem>
<label>Quick DISCONNECT eth0</label>       
<action>ifconfig eth0 down &</action>
</menuitem>
<menuitem>
<label>Connect eth0</label>
<action>ifconfig eth0 up &</action>
</menuitem>   
<menuitem>
<label>Password Generator</label>
<action>PASSGEN &</action>
</menuitem>
<menuitem>
<label>Run as spot</label>
<action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action>
<action>rxvt -e su spot &</action>
<action>exit</action>
</menuitem>
<menuitem>
<label>Browser Paranoid Kit</label>   
<action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user SPOT" 600x0`</action>
<action>rxvt -e su spike &</action>           
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action>
<action>exit</action>
</menuitem>       
<menuitem>
<label>Run Browser securely</label>
<action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
<action>su spike -c&</action>
<action>firefox -safe-mode &</action>
</menuitem>
<menuitem>
<label>Encrypt a File: bycrypt</label>
<action>bcrypt_gui &</action>
</menuitem>
<menuitem>
<label>Ccrypt install</label>
<action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action>
</menuitem>
<menuitem>
<label>Enhanced Lock Screen</label>
<action>rm -f /root/.xlockrc</action>
<action>xmodmap -e "keycode 37="</action>
<action>xmodmap -e "keycode 109="</action>
<action>rxvt -e /usr/local/apps/Xlock/AppRun &</action>
<action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action>
<action>xmodmap -e "keycode 37=Control_L"</action>
<action>xmodmap -e "keycode 109=Control_R"</action>
</menuitem>
<menuitem>
<label>Remove Flash cookies</label>
<action>rm -rf /root/.macromedia</action>
<action>rm -rf /intrd/pup_rw/root/.macromedia/</action>
<action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>         
</menuitem>
<menuitem stock="gtk-quit">
<action>echo You selected the quit menu item</action>
<action type="exit">exit by menu</action>
</menuitem>
<label>Security</label>
</menu>
<menu>         
<menuitem>
<label>lsof process viewer</label>       
<action>rxvt -e lsof -i &</action>
</menuitem>
<menuitem>
<label>Htop process viewer</label>       
<action>rxvt -e htop &</action>
</menuitem>
<menuitem>
<label>Ipinfodb</label>
<action>defaultbrowser ipinfodb.com &</action>               
</menuitem>
<menuitem>
<label>Noc.to</label>
<action>defaultbrowser noc.to &</action>               
</menuitem>
<menuitem>           
<label>Webkay</label>
<action>defaultbrowser webkay.robinlinus.com &</action>
</menuitem>
<menuitem>
<label>Shields Up</label>
<action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
</menuitem>
<menuitem>
<label>DNS leak test</label>
<action>defaultbrowser https://www.dnsleaktest.com &</action>
</menuitem>         
<menuitem>
<label>Hackermode</label>
<action>defaultbrowser https://www.hackerwatch.org/probe/ &</action>               
</menuitem>
<label>Probes</label>
</menu>   
<menu>   
<menuitem>
<label>LastPass Password Manager</label>
<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action>
<action>rxvt -e su spike &</action>           
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action>
<action>exit</action>
</menuitem>
<menuitem>           
<label>Photonmail</label>
<action>defaultbrowser https://protonmail.com/ &</action>
</menuitem>
<menuitem>           
<label>Curlmyip</label>
<action>defaultbrowser curlmyip.net &</action>
</menuitem>           
<menuitem>
<label>Run IRC Chat securely</label>
<action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action>
<action>su spot -c defaultchat &</action>
</menuitem>
<menuitem>
<label>Last Password</label>
<action>defaultbrowser https://lastpass.com/ &</action>
</menuitem>
<menuitem>
<label>Ipleak</label>
<action>defaultbrowser https://ipleak.net/ &</action>
</menuitem>
<menuitem>
<label>Startpage Search</label>
<action>defaultbrowser https://www.startpage.com/ &</action>
</menuitem>
<menuitem>           
<label>Filterbypass proxy</label>
<action>defaultbrowser https://www.filterbypass.me &</action>
</menuitem>
<menuitem>
<label>Unblock Proxy</label>
<action>defaultbrowser https://unblockweb.co/ &</action>
</menuitem>
<menuitem>           
<label>Anonymouse proxy</label>
<action>defaultbrowser anonymouse.org &</action>
</menuitem>
<menuitem>
<label>Vpnbook proxy</label>
<action>defaultbrowser http://www.vpnbook.com/webproxy &</action>
</menuitem>
<menuitem>
<label>HideMe Proxy</label>
<action>defaultbrowser https://hide.me/en/proxy &</action>
</menuitem>       
<label>Services</label>
</menu>
<menu>       
<menuitem>           
<label>Puppy Security Discussions</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/index.php?f=47&ppage=30&sort=lastpost&order=DESC &</action>
</menuitem>     
<menuitem>           
<label>About Flash Cookies</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
</menuitem>
<menuitem>
<label>Security Tips</label>
<action>defaultbrowser http://puppylinux.org/wikka/security &</action>
</menuitem>
<menuitem>
<label>Browser Security Add Ons</label>
<action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action>
</menuitem>
<menuitem>
<label>ISP shaping traffic?</label>
<action>defaultbrowser http://br
This would meanoadband.mpi-sws.org/transparency/glasnost.php &</action>
</menuitem>
<menuitem>
<label>Spot, Fido, root</label>
<action>defaultbrowser file:///usr/share/doc/root.htm &</action>
</menuitem>
<menuitem>
<label>FAQ</label>
<action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action>
</menuitem>
<menuitem>
<label>Honeynet Open Security info</label>
<action>defaultbrowser http://www.honeynet.org/about &</action>
</menuitem>
<menuitem>
<label>CIA Hacking info</label>
<action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action>
</menuitem>
<menuitem>         
<label>GNU Privacy Guard</label>
<action>`Xdialog --wrap --screencenter --left --title "GNU Privacy Guard" --msgbox "Install gnupg from the puppy installer \n GPG stands for GNU Privacy Guard. It is a key-based encryption method which means that a pair of keys is used to encrypt  \n and decrypt a message so that it arrives securely \n " 600x0`</action>
<action>defaultbrowser https://distrowatch.com/weekly.php?issue=20140407 &</action>
</menuitem>
<menuitem>
<label>Install 64bit Tor Browser</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action>
</menuitem>   
<menuitem>
<label>Uefi Secure boot</label>
<action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action>
</menuitem>   
<menuitem>
<label>Edit source</label>
<action>geany GROWL21.sh &</action>
</menuitem>
<menuitem>
<label>Build a tin hat</label>
<action>defaultbrowser http://zapatopi.net/afdb/ &</action>
</menuitem>
<menuitem>
<label>Credits</label>
<action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 2.1\nApril 2017\nUpdated by Lobster. Password Generator Code by SFR" 600x0`</action>
</menuitem>
<menuitem>
<label>Final thoughts ...</label>
<action>mplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action>
</menuitem>
<label>Help</label>
</menu>   
</menubar>
<frame>
<pixmap>
<input file>/usr/share/midi-icons/lock-screen48.png</input>
</pixmap>
<text><label>GROWL 2.1</label></text>
</frame>
<hbox>
<button help>
<action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'GROWL is a simple, open, configurable, Puppy Security Tool. \n\n Puppy Linux for the desktop, is more secure than Ios, Windows or Chrome OS \n\n GROWL is used for enhancing security, education, online services and probing ones set up. \n\n Lobster, April 2017')'" 600x0`</action>
</button>
<button cancel></button>
</hbox>
</vbox>
</window>'

gtkdialog4 --program Grrr
unset Grrr 
User avatar
mikeslr
Posts: 2851
Joined: Mon Jul 13, 2020 11:08 pm
Has thanked: 173 times
Been thanked: 861 times

Re: Growl by Lobster

Post by mikeslr »

spuppy wrote: Thu May 20, 2021 1:36 pm

Who can make .pet or .deb ?

Security Profile - makes hackers crazy. Usefull .pet .deb download ? Where link ?
https://www.forum.puppylinux.com/viewto ... 151&t=2994

Hi spuppy, welcome to the kennels. :) :thumbup:

First off, you don't need a pet/deb. Growl is a simple bash-script which calls other applications. Bash is Puppy's builtin interpretor language. All you really have to do is remove its false ".gz" ending -- needed in order to trick the Forum into recognizing the file as an allowed attachment-- and drop it into /root/my-applications/bin. Then restart-x and anytime you want Growl to run, just open a terminal and type "Growl". As with all things Linux, spelling, capitalization [and punctuation] are important. About using with a "Live USB-Puppy", this is the only way unless you create an adrv.sfs or a ydrv.sfs. See, viewtopic.php?p=12983#p12983. Use its Save2SFS module. You don't have to create a SaveFile before using it. If you don't do that, you can just place the growl.gz script where you can find it and follow the above instructions.

As you're a newbie, I've attached a pet.

growl_NOARCH-2.1.pet
(32.55 KiB) Downloaded 74 times

But under Puppys its usually easy for anyone to create pets. So in addition to installing it, I recommend you take the time to examine it. Creating the attached pet only took a couple minutes; far less time than to write the following; and far less time than you had to wait for someone to publish a pet.

To create your own pet, Right-Click an empty space and from the pop-up menu select New>Directory, Give it a name. In this case I chose growl-NOARCH-2.1, the name of the application, a description telling that it's not confined to any Puppy, and the version number.

Right-Click the pet and from the pop-up menu select UExtract. What you'll find are a bunch of nested-folders. These nested folders were created by Right-Clicking as described above. I use the symbol ">" to mean 'file-browse into". So you'll find two files in /root>/my-applications>/bin: (1) the same 'Growl" bash-script you obtain by merely removing the false ".gz"; and (b) an icon, growl.png. To create a menu entry requires three files: an executable such as the bash-script Lobster wrote; an icon -- I used Lobster's avatar; and a desktop file. I put both the executable and the icon in /root/my-applications/bin. While Puppys will recognize 'executables' anywhere 'on-the-path' [=any bin or sbin folder] the bin folder in /root/my-applications is unique to Puppys: so provides a handy place to locate executables unique to Puppy. Icons can be placed anywhere; but putting it in the same location as the executable simplifies writing the Desktop file: hint --copy, paste, edit.
Linux uses the desktop files found in /usr/share/applications to generate a menu-entry. Desktop files [all are in /usr/share/applications and end with the suffix ".desktop"] are plain text files. You can rename them and open and edit them in any text editor.
This is what I did to create one for Growl. I wanted it to show up on the menu where other security applications appear. On my system there were two: Login & Security Manager on the System's sub-menu and Bcrypt on the Personal sub-menu. The former seemed a more appropriate location. So within the growl_NOARCH-2.1 folder I created the /usr/share/application folder --same browse-into and Right-Click technique set out above-- and dropped a copy of "loginmanager.desktop" into it. Right-Click that file and renamed it GROWL-Security-Manager.desktop. Right-Clicked that and opened it in a text editor. You'll notice a list of short sentences, each having a Subject, an = sign, then some text. The text is the 'argument' Linux is to apply to the Subject. The four most important Subjects are:
"Name=". It will be followed by the name that will appear on the Menu.
"Icon=". It is followed by the argument of the EXACT location and name of the icon; in this case /root/my-applications/bin/growl.png.
"Exec=". It is followed by the argument of the EXACT location and name of the executable; in this case /root/my-applications/bin/Growl.
Categories=X-System-security. This is why I chose the loginmanager.desktop. Some of Puppys' Categories are unique to Puppys' way of displaying things on the Menu. It's easier to copy than to remember or guess.
Finally, with all the files in place, I file-browsed up so that I could Right-Click the growl-NOARCH-2.1 folder and choose "Create a pet package".

Post Reply

Return to “Security/Privacy”