Password Generation from CLI

For discussions about programming, programming questions/advice, and projects that don't really have anything to do with Puppy.
Post Reply
Message
Author
User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

Password Generation from CLI

#1 Post by Lobster »

My sister proudly displayed her new password book. However what if 'Greys' or intelligent Lizards from another dimension sneak in and have a peak?

This works on my 64 based Puppy from the command line to generate a random password, then I can add a few non-alphanumerics for good measure. Any good?

Code: Select all

openssl rand -base64 20
the 20 can be change to 8 or whatever ...

I want to to find Puppy code for GROWL (my developing Security code) to generate a password. Many systems now require letters, upper and lowercase and numbers AND this 'stuff'

Code: Select all

!"$%^&*()_+
Ay Caramba! Mama Mia!

Any coders solved this?
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
SFR
Posts: 1800
Joined: Wed 26 Oct 2011, 21:52

#2 Post by SFR »

Would something like this do the trick?

Code: Select all

#!/bin/sh 

# Generates a password with at least: 
# - 1 lowercase letter 
# - 1 uppercase letter 
# - 1 digit 
# - 1 punctuation mark 
# 
# [[:lower:]] = lowercase letters 
# [[:upper:]] = uppercase letters 
# [[:digit:]] = digits 
# [[:punct:]] = punctuation marks 

#LENGTH="${1//[^[:digit:]]/}"   # this syntax works with Bash/BB-Ash, but not Dash 
LENGTH="$(echo "$1" | tr -cd '[[:digit:]]')" 

[ -z ${LENGTH} ] && { echo "Usage: $0 <password_length>"; exit 1; } 
[ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end 

while true; do 
   PASS="$(cat /dev/urandom | tr -cd '[[:alnum:]][[:punct:]]' | head -c ${LENGTH})" 
   if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then 
     break   # all criteria were met, so break the loop 
   fi 
done 

echo "${PASS}" 
exit
Greetings!
Last edited by SFR on Wed 05 Apr 2017, 19:28, edited 1 time in total.
[color=red][size=75][O]bdurate [R]ules [D]estroy [E]nthusiastic [R]ebels => [C]reative [H]umans [A]lways [O]pen [S]ource[/size][/color]
[b][color=green]Omnia mea mecum porto.[/color][/b]

User avatar
greengeek
Posts: 5789
Joined: Tue 20 Jul 2010, 09:34
Location: Republic of Novo Zelande

#3 Post by greengeek »

The SFR script doesn't seem to work for me on my Slacko 5.6 derivative. Hangs in terminal and never returns a password. Will reboot and try again.

User avatar
Keef
Posts: 987
Joined: Thu 20 Dec 2007, 22:12
Location: Staffordshire

#4 Post by Keef »

Works OK in Fatdog.

Will try it on Slacko next...

User avatar
SFR
Posts: 1800
Joined: Wed 26 Oct 2011, 21:52

#5 Post by SFR »

greengeek wrote:The SFR script doesn't seem to work for me on my Slacko 5.6 derivative. Hangs in terminal and never returns a password. Will reboot and try again.
Just checked in Slacko-5.7 and indeed, it hangs. Thanks for the info, btw.

Anyway, it turned out Slacko does not recognize '[[:graph:]]' class for some reason, so I replaced it with '[[:alnum:]][[:punct:]]' combo.
Script corrected.

Greetings!
[color=red][size=75][O]bdurate [R]ules [D]estroy [E]nthusiastic [R]ebels => [C]reative [H]umans [A]lways [O]pen [S]ource[/size][/color]
[b][color=green]Omnia mea mecum porto.[/color][/b]

slavvo67
Posts: 1610
Joined: Sat 13 Oct 2012, 02:07
Location: The other Mr. 305

#6 Post by slavvo67 »

Both work in Quirky Xerus.

Personally, I'm not a fan of long clunky passwords nor am I foolish enough to use: qwerty or 123456... LOL

Anyway, thank you both for the new toys!

slavvo67

User avatar
greengeek
Posts: 5789
Joined: Tue 20 Jul 2010, 09:34
Location: Republic of Novo Zelande

#7 Post by greengeek »

SFR wrote:Just checked in Slacko-5.7 and indeed, it hangs....Slacko does not recognize '[[:graph:]]' class for some reason, so I replaced it with '[[:alnum:]][[:punct:]]' combo.
Thanks - works great now. How ironic - the first time I run the script the generated password ends with "NZ". Hows that for random!

Code: Select all

# ./pwgen
Usage: ./pwgen <password_length>
# ./pwgen 9
1b4{Y0lNZ
# ./pwgen 9
K%F-k74Bq
#
Cheers!

User avatar
MochiMoppel
Posts: 2084
Joined: Wed 26 Jan 2011, 09:06
Location: Japan

#8 Post by MochiMoppel »

SFR wrote:Anyway, it turned out Slacko does not recognize '[[:graph:]]' class for some reason, so I replaced it with '[[:alnum:]][[:punct:]]' combo.
It hangs for me too in 5.6 (are we talking about 5.6 or 5.7?)

On the other hand I find nothing wrong with [:graph:]. I made a small script to test all POSIX bracket expressions. Like all other expressions [:graph:] is properly recognized:

Code: Select all

#!/bin/sh
# POSIX bracket expressions
#~ [:alnum:]    Alphanumeric characters [a-zA-Z0-9]
#~ [:alpha:]    Alphabetic characters   [a-zA-Z]
#~ [:ascii:]    ASCII characters
#~ [:blank:]    Space and tab
#~ [:cntrl:]    Control characters
#~ [:digit:]    Digits  [0-9]
#~ [:graph:]    Visible characters (anything except spaces and control characters)
#~ [:lower:]    Lowercase letters   [a-z]
#~ [:print:]    Visible characters and spaces (anything except control characters)
#~ [:punct:]    Punctuation and symbols
#~ [:space:]    All whitespace characters, including line breaks
#~ [:upper:]    Uppercase letters   [A-Z]
#~ [:word:]     Word characters (letters, numbers and underscores)
#~ [:xdigit:]   Hexadecimal digits

BRACKET=[:graph:]

echo $BRACKET
echo ---------
for i in {0..127}; do  # ASCII decimal
    CHARACTER=$(echo -e "\x$(printf %x $i)")
    INCLUDED=${CHARACTER/[$BRACKET]/OK}
    [[ $INCLUDED != OK ]] && INCLUDED=-
    ASCIIDEC="00$i"
    ASCIIDEC=${ASCIIDEC: -3}
    echo ASCII $ASCIIDEC $INCLUDED
done

User avatar
SFR
Posts: 1800
Joined: Wed 26 Oct 2011, 21:52

#9 Post by SFR »

MochiMoppel wrote:
SFR wrote:Anyway, it turned out Slacko does not recognize '[[:graph:]]' class for some reason, so I replaced it with '[[:alnum:]][[:punct:]]' combo.
It hangs for me too in 5.6 (are we talking about 5.6 or 5.7?)
Both.
On the other hand I find nothing wrong with [:graph:]. I made a small script to test all POSIX bracket expressions. Like all other expressions [:graph:] is properly recognized:
Yes, it seems shell can handle it, but not Busybox tr, which is the only one in Slackos (and maybe all Puppies?):

Code: Select all

# Slacko-5.7 (Busybox tr)
# strings /usr/bin/tr | grep -w '^.*:]'
alpha:]
alnum:]
digit:]
lower:]
upper:]
space:]
blank:]
punct:]
cntrl:]
xdigit:]
#
#
# Fatdog (Coreutils tr)
# grep -ao '\[:.*:]' /usr/bin/tr
[::]
[:alnum:]
[:alpha:]
[:blank:]
[:cntrl:]
[:digit:]
[:graph:]
[:lower:]
[:print:]
[:punct:]
[:space:]
[:upper:]
[:xdigit:]
[:lower:] and [:upper:]
[:upper:] and/or [:lower:]
# 
Oh well, yet another thing I need to watch over in my scripts...

Greetings!
[color=red][size=75][O]bdurate [R]ules [D]estroy [E]nthusiastic [R]ebels => [C]reative [H]umans [A]lways [O]pen [S]ource[/size][/color]
[b][color=green]Omnia mea mecum porto.[/color][/b]

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#10 Post by Lobster »

Thanks SFR that works nicely. :D

The first version you posted did not because many Puppys use Busybox instead of the full Bash. Thanks for modifying the code in the first post . . .

I look at the code and I am baffled (my brain is mostly jelly) I can not code to save my sardine collection . . . :oops:

Rather than calling the code as a separate code snippet, I want to incorporate into GROWL directly. Might that be possible? :idea:

How can this be done? It will take me ages to work out so here is your code (which runs but should not unless called . . . with the sort of menu item required . . .)

My feeling is your code would make a useful addition to Puppy with a front end (not everyone is comfortable from the command line)

Code: Select all

<menuitem> 
<label>RNG Password</label> 
<action>echo "${PASS}" &</action> 
</menuitem>
This is GROWL with your code but for obvious reason the code needs to be separate or in a procedure of some sort?

Code: Select all

#! /bin/bash 
# 
# GROWL v2.06 March 2017 beta  Thur 6 April - not release version
 

#### SFR Password Generator
# Generates a password with at least:
# - 1 lowercase letter
# - 1 uppercase letter
# - 1 digit
# - 1 punctuation mark
#
# [[:lower:]] = lowercase letters
# [[:upper:]] = uppercase letters
# [[:digit:]] = digits
# [[:punct:]] = punctuation marks

#LENGTH="${1//[^[:digit:]]/}"   # this syntax works with Bash/BB-Ash, but not Dash
LENGTH="$(echo "$1" | tr -cd '[[:digit:]]')"

[ -z ${LENGTH} ] && { echo "Usage: $0 <password_length>"; exit 1; }
[ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end

while true; do
   PASS="$(cat /dev/urandom | tr -cd '[[:alnum:]][[:punct:]]' | head -c ${LENGTH})"
   if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
     break   # all criteria were met, so break the loop
   fi
done

# echo "${PASS}"

#### End of Password Generator code

export Grrr=' 
<window title="GROWL 2.06" window-position="1"> 
<vbox> 
<menubar> 
<menu>  
<menuitem> 
<label>Quick DISCONNECT eth0</label>        
<action>ifconfig eth0 down &</action> 
</menuitem>
<menuitem> 
<label>Connect eth0</label> 
<action>ifconfig eth0 up &</action> 
</menuitem>   
<menuitem> 
<label>RNG Password</label> 
<action>echo "${PASS}" &</action> 
</menuitem>
<menuitem> 
<label>Reset root password</label>
<action>passwd -d root 'test1' &</action>   
</menuitem>    
<menuitem> 
<label>Run as spot</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action> 
<action>rxvt -e su spot &</action> 
<action>exit</action> 
</menuitem> 
<menuitem> 
<label>Browser Paranoid Kit</label>    
<action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user SPOT" 600x0`</action> 
<action>rxvt -e su spike &</action>            
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action> 
<action>exit</action> 
</menuitem>        
<menuitem> 
<label>Run Browser securely</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action> 
<action>su spike -c&</action> 
<action>firefox -safe-mode &</action> 
</menuitem> 
<menuitem> 
<label>Encrypt a File: bycrypt</label> 
<action>bcrypt_gui &</action> 
</menuitem> 
<menuitem> 
<label>Ccrypt install</label> 
<action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action> 
</menuitem> 
<menuitem> 
<label>Enhanced Lock Screen</label> 
<action>rm -f /root/.xlockrc</action> 
<action>xmodmap -e "keycode 37="</action> 
<action>xmodmap -e "keycode 109="</action> 
<action>rxvt -e /usr/local/apps/Xlock/AppRun &</action> 
<action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action> 
<action>xmodmap -e "keycode 37=Control_L"</action> 
<action>xmodmap -e "keycode 109=Control_R"</action> 
</menuitem> 
<menuitem> 
<label>Remove Flash cookies</label> 
<action>rm -rf /root/.macromedia</action> 
<action>rm -rf /intrd/pup_rw/root/.macromedia/</action> 
<action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>          
</menuitem> 
<menuitem stock="gtk-quit"> 
<action>echo You selected the quit menu item</action> 
<action type="exit">exit by menu</action> 
</menuitem> 
<label>Security</label> 
</menu> 
<menu>         
<menuitem> 
<label>lsof process viewer</label>        
<action>rxvt -e lsof -i &</action> 
</menuitem>
<menuitem> 
<label>Htop process viewer</label>        
<action>rxvt -e htop &</action> 
</menuitem>
<menuitem> 
<label>Ipinfodb</label> 
<action>defaultbrowser ipinfodb.com &</action>               
</menuitem>  
<menuitem> 
<label>Noc.to</label> 
<action>defaultbrowser noc.to &</action>               
</menuitem>
<menuitem> 			
<label>Webkay</label> 
<action>defaultbrowser webkay.robinlinus.com &</action> 
</menuitem> 
<menuitem>
<label>Shields Up</label> 
<action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action> 
</menuitem>
<menuitem>
<label>DNS leak test</label> 
<action>defaultbrowser https://www.dnsleaktest.com &</action> 
</menuitem>          
<menuitem> 
<label>Hackermode</label> 
<action>defaultbrowser https://www.hackerwatch.org/probe/ &</action>               
</menuitem>
<label>Probes</label> 
</menu>    
<menu>    
<menuitem> 
<label>LastPass Password Manager</label> 
<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action> 
<action>rxvt -e su spike &</action>            
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action> 
<action>exit</action> 
</menuitem> 
<menuitem> 			
<label>Photonmail</label> 
<action>defaultbrowser https://protonmail.com/ &</action> 
</menuitem>
<menuitem> 			
<label>Curlmyip</label> 
<action>defaultbrowser curlmyip.net &</action> 
</menuitem>            
<menuitem> 
<label>Run IRC Chat securely</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action> 
<action>su spot -c defaultchat &</action> 
</menuitem>
<menuitem> 
<label>Last Password</label> 
<action>defaultbrowser https://lastpass.com/ &</action> 
</menuitem> 
<menuitem> 
<label>Ipleak</label> 
<action>defaultbrowser https://ipleak.net/ &</action> 
</menuitem> 
<menuitem> 
<label>Startpage Search</label> 
<action>defaultbrowser https://www.startpage.com/ &</action> 
</menuitem> 
<menuitem> 			
<label>Filterbypass proxy</label> 
<action>defaultbrowser https://www.filterbypass.me &</action> 
</menuitem>  
<menuitem>  
<label>Unblock Proxy</label> 
<action>defaultbrowser https://unblockweb.co/ &</action> 
</menuitem> 
<menuitem> 			
<label>Anonymouse proxy</label> 
<action>defaultbrowser anonymouse.org &</action> 
</menuitem>
<menuitem> 
<label>Vpnbook proxy</label> 
<action>defaultbrowser http://www.vpnbook.com/webproxy &</action> 
</menuitem> 
<menuitem> 
<label>HideMe Proxy</label> 
<action>defaultbrowser https://hide.me/en/proxy &</action> 
</menuitem>       
<label>Services</label> 
</menu>
<menu>       
<menuitem> 			
<label>Puppy Security Discussions</label> 
<action>defaultbrowser http://www.murga-linux.com/puppy/index.php?f=47&ppage=30&sort=lastpost&order=DESC &</action> 
</menuitem> 	
<menuitem> 			
<label>About Flash Cookies</label> 
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action> 
</menuitem> 
<menuitem> 
<label>Security Tips</label> 
<action>defaultbrowser http://puppylinux.org/wikka/security &</action> 
</menuitem> 
<menuitem> 
<label>Browser Security Add Ons</label> 
<action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action> 
</menuitem> 
<menuitem> 
<label>ISP shaping traffic?</label> 
<action>defaultbrowser http://br
This would meanoadband.mpi-sws.org/transparency/glasnost.php &</action> 
</menuitem> 
<menuitem> 
<label>Spot, Fido, root</label> 
<action>defaultbrowser file:///usr/share/doc/root.htm &</action> 
</menuitem> 
<menuitem> 
<label>FAQ</label> 
<action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action> 
</menuitem> 
<menuitem> 
<label>Honeynet Open Security info</label> 
<action>defaultbrowser http://www.honeynet.org/about &</action> 
</menuitem> 
<menuitem> 
<label>CIA Hacking info</label> 
<action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action>
</menuitem> 
<menuitem>         
<label>GNU Privacy Guard</label>
<action>`Xdialog --wrap --screencenter --left --title "GNU Privacy Guard" --msgbox "Install gnupg from the puppy installer \n GPG stands for GNU Privacy Guard. It is a key-based encryption method which means that a pair of keys is used to encrypt  \n and decrypt a message so that it arrives securely \n " 600x0`</action> 
<action>defaultbrowser https://distrowatch.com/weekly.php?issue=20140407 &</action> 
</menuitem>  
<menuitem> 
<label>Install 64bit Tor Browser</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action> 
</menuitem>   
<menuitem> 
<label>Uefi Secure boot</label>
<action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action> 
</menuitem>   
<menuitem> 
<label>Edit source</label> 
<action>geany GROWL20 &</action> 
</menuitem> 
<menuitem> 
<label>Build a tin hat</label> 
<action>defaultbrowser http://zapatopi.net/afdb/ &</action> 
</menuitem>
<menuitem> 
<label>Credits</label> 
<action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 2.06\nApril 2017\nUpdated by Lobster" 600x0`</action> 
</menuitem>  
<menuitem> 
<label>Final thoughts ...</label> 
<action>mplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action> 
</menuitem>
<label>Help</label> 
</menu>    
</menubar> 
<frame> 
<pixmap> 
<input file>/usr/share/midi-icons/lock-screen48.png</input> 
</pixmap> 
<text><label>GROWL 2.06</label></text> 
</frame> 
<hbox> 
<button help>
<action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'GROWL is a simple, open, configurable, Puppy Security Tool. \n\n Puppy Linux for the desktop, is more secure than Ios, Windows or Chrome OS \n\n GROWL is used for enhancing security, education, online services and probing ones set up. \n\n Lobster, March 2017')'" 600x0`</action>
</button>
<button cancel></button> 
</hbox> 
</vbox> 
</window>' 

gtkdialog4 --program Grrr 
unset Grrr
Really liked your code. It produces gibberish - ideal for secure passwords . . . :D
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
SFR
Posts: 1800
Joined: Wed 26 Oct 2011, 21:52

#11 Post by SFR »

Lobster wrote:Rather than calling the code as a separate code snippet, I want to incorporate into GROWL directly. Might that be possible? :idea:
Sure. The easiest way is to use it as a function:

Code: Select all

#! /bin/bash 
# 
# GROWL v2.06 March 2017 beta  Thur 6 April - not release version 


PASSGEN () {
	#### SFR Password Generator 
	# Generates a password with at least: 
	# - 1 lowercase letter 
	# - 1 uppercase letter 
	# - 1 digit 
	# - 1 punctuation mark 
	
	TITLE="Password Generator"
	
	# Min: 8, Max:256, Default: 16
	LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
	[ $? -ne 0 ] && exit
	
	[ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end 
	
	while true; do
		while true; do 
			PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
			if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then 
				break   # all criteria were met, so break the loop 
			fi
		done 
		
		echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
		[ $? -ne 0 ] && break
	done
	#### End of Password Generator code 
}

export -f PASSGEN

export Grrr=' 
<window title="GROWL 2.06" window-position="1"> 
<vbox> 
<menubar> 
<menu>  
<menuitem> 
<label>Quick DISCONNECT eth0</label>        
<action>ifconfig eth0 down &</action> 
</menuitem> 
<menuitem> 
<label>Connect eth0</label> 
<action>ifconfig eth0 up &</action> 
</menuitem>    
<menuitem> 
<label>RNG Password</label> 
<action>PASSGEN &</action> 
</menuitem> 
<menuitem> 
<label>Reset root password</label> 
<action>passwd -d root 'test1' &</action>    
</menuitem>    
<menuitem> 
<label>Run as spot</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run as spot" --msgbox "Run as Super User. \n SPOT" 600x0`</action> 
<action>rxvt -e su spot &</action> 
<action>exit</action> 
</menuitem> 
<menuitem> 
<label>Browser Paranoid Kit</label>    
<action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user SPOT" 600x0`</action> 
<action>rxvt -e su spike &</action>            
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action> 
<action>exit</action> 
</menuitem>        
<menuitem> 
<label>Run Browser securely</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action> 
<action>su spike -c&</action> 
<action>firefox -safe-mode &</action> 
</menuitem> 
<menuitem> 
<label>Encrypt a File: bycrypt</label> 
<action>bcrypt_gui &</action> 
</menuitem> 
<menuitem> 
<label>Ccrypt install</label> 
<action>rxvt -e defaultbrowser http://puppylinux.org/wikka/ccrypt &</action> 
</menuitem> 
<menuitem> 
<label>Enhanced Lock Screen</label> 
<action>rm -f /root/.xlockrc</action> 
<action>xmodmap -e "keycode 37="</action> 
<action>xmodmap -e "keycode 109="</action> 
<action>rxvt -e /usr/local/apps/Xlock/AppRun &</action> 
<action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action> 
<action>xmodmap -e "keycode 37=Control_L"</action> 
<action>xmodmap -e "keycode 109=Control_R"</action> 
</menuitem> 
<menuitem> 
<label>Remove Flash cookies</label> 
<action>rm -rf /root/.macromedia</action> 
<action>rm -rf /intrd/pup_rw/root/.macromedia/</action> 
<action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>          
</menuitem> 
<menuitem stock="gtk-quit"> 
<action>echo You selected the quit menu item</action> 
<action type="exit">exit by menu</action> 
</menuitem> 
<label>Security</label> 
</menu> 
<menu>          
<menuitem> 
<label>lsof process viewer</label>        
<action>rxvt -e lsof -i &</action> 
</menuitem> 
<menuitem> 
<label>Htop process viewer</label>        
<action>rxvt -e htop &</action> 
</menuitem> 
<menuitem> 
<label>Ipinfodb</label> 
<action>defaultbrowser ipinfodb.com &</action>                
</menuitem>  
<menuitem> 
<label>Noc.to</label> 
<action>defaultbrowser noc.to &</action>                
</menuitem> 
<menuitem>           
<label>Webkay</label> 
<action>defaultbrowser webkay.robinlinus.com &</action> 
</menuitem> 
<menuitem> 
<label>Shields Up</label> 
<action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action> 
</menuitem> 
<menuitem> 
<label>DNS leak test</label> 
<action>defaultbrowser https://www.dnsleaktest.com &</action> 
</menuitem>          
<menuitem> 
<label>Hackermode</label> 
<action>defaultbrowser https://www.hackerwatch.org/probe/ &</action>                
</menuitem> 
<label>Probes</label> 
</menu>    
<menu>    
<menuitem> 
<label>LastPass Password Manager</label> 
<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action> 
<action>rxvt -e su spike &</action>            
<action>rxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action> 
<action>exit</action> 
</menuitem> 
<menuitem>           
<label>Photonmail</label> 
<action>defaultbrowser https://protonmail.com/ &</action> 
</menuitem> 
<menuitem>           
<label>Curlmyip</label> 
<action>defaultbrowser curlmyip.net &</action> 
</menuitem>            
<menuitem> 
<label>Run IRC Chat securely</label> 
<action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action> 
<action>su spot -c defaultchat &</action> 
</menuitem> 
<menuitem> 
<label>Last Password</label> 
<action>defaultbrowser https://lastpass.com/ &</action> 
</menuitem> 
<menuitem> 
<label>Ipleak</label> 
<action>defaultbrowser https://ipleak.net/ &</action> 
</menuitem> 
<menuitem> 
<label>Startpage Search</label> 
<action>defaultbrowser https://www.startpage.com/ &</action> 
</menuitem> 
<menuitem>           
<label>Filterbypass proxy</label> 
<action>defaultbrowser https://www.filterbypass.me &</action> 
</menuitem>  
<menuitem>  
<label>Unblock Proxy</label> 
<action>defaultbrowser https://unblockweb.co/ &</action> 
</menuitem> 
<menuitem>           
<label>Anonymouse proxy</label> 
<action>defaultbrowser anonymouse.org &</action> 
</menuitem> 
<menuitem> 
<label>Vpnbook proxy</label> 
<action>defaultbrowser http://www.vpnbook.com/webproxy &</action> 
</menuitem> 
<menuitem> 
<label>HideMe Proxy</label> 
<action>defaultbrowser https://hide.me/en/proxy &</action> 
</menuitem>        
<label>Services</label> 
</menu> 
<menu>        
<menuitem>           
<label>Puppy Security Discussions</label> 
<action>defaultbrowser http://www.murga-linux.com/puppy/index.php?f=47&ppage=30&sort=lastpost&order=DESC &</action> 
</menuitem>     
<menuitem>           
<label>About Flash Cookies</label> 
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action> 
</menuitem> 
<menuitem> 
<label>Security Tips</label> 
<action>defaultbrowser http://puppylinux.org/wikka/security &</action> 
</menuitem> 
<menuitem> 
<label>Browser Security Add Ons</label> 
<action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action> 
</menuitem> 
<menuitem> 
<label>ISP shaping traffic?</label> 
<action>defaultbrowser http://br 
This would meanoadband.mpi-sws.org/transparency/glasnost.php &</action> 
</menuitem> 
<menuitem> 
<label>Spot, Fido, root</label> 
<action>defaultbrowser file:///usr/share/doc/root.htm &</action> 
</menuitem> 
<menuitem> 
<label>FAQ</label> 
<action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Make sure adblock is enabled (low) or install noscript (high security)" 600x0`</action> 
</menuitem> 
<menuitem> 
<label>Honeynet Open Security info</label> 
<action>defaultbrowser http://www.honeynet.org/about &</action> 
</menuitem> 
<menuitem> 
<label>CIA Hacking info</label> 
<action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action> 
</menuitem> 
<menuitem>          
<label>GNU Privacy Guard</label> 
<action>`Xdialog --wrap --screencenter --left --title "GNU Privacy Guard" --msgbox "Install gnupg from the puppy installer \n GPG stands for GNU Privacy Guard. It is a key-based encryption method which means that a pair of keys is used to encrypt  \n and decrypt a message so that it arrives securely \n " 600x0`</action> 
<action>defaultbrowser https://distrowatch.com/weekly.php?issue=20140407 &</action> 
</menuitem>  
<menuitem> 
<label>Install 64bit Tor Browser</label> 
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action> 
</menuitem>    
<menuitem> 
<label>Uefi Secure boot</label> 
<action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action> 
</menuitem>    
<menuitem> 
<label>Edit source</label> 
<action>geany GROWL20 &</action> 
</menuitem> 
<menuitem> 
<label>Build a tin hat</label> 
<action>defaultbrowser http://zapatopi.net/afdb/ &</action> 
</menuitem> 
<menuitem> 
<label>Credits</label> 
<action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "Growl v 2.06\nApril 2017\nUpdated by Lobster" 600x0`</action> 
</menuitem>  
<menuitem> 
<label>Final thoughts ...</label> 
<action>mplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action> 
</menuitem> 
<label>Help</label> 
</menu>    
</menubar> 
<frame> 
<pixmap> 
<input file>/usr/share/midi-icons/lock-screen48.png</input> 
</pixmap> 
<text><label>GROWL 2.06</label></text> 
</frame> 
<hbox> 
<button help> 
<action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'GROWL is a simple, open, configurable, Puppy Security Tool. \n\n Puppy Linux for the desktop, is more secure than Ios, Windows or Chrome OS \n\n GROWL is used for enhancing security, education, online services and probing ones set up. \n\n Lobster, March 2017')'" 600x0`</action> 
</button> 
<button cancel></button> 
</hbox> 
</vbox> 
</window>' 

gtkdialog4 --program Grrr 
unset Grrr
Greetings!
[color=red][size=75][O]bdurate [R]ules [D]estroy [E]nthusiastic [R]ebels => [C]reative [H]umans [A]lways [O]pen [S]ource[/size][/color]
[b][color=green]Omnia mea mecum porto.[/color][/b]

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#12 Post by Lobster »

:D

Many thanks SFR 8)
Works a treat. Very nicely and quickly done. Would have taken me too long ...

Will now put out GROWL 2.1 as an official release shortly . . .

Appreciate the code work :D
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

Post Reply