VeilidGROWL
There I was (and this is a true story) pondering how to kill two fish with one stick
... and therefore Puppy has a new test version of the very simple to understand GROWL security program.
You will notice
it is being renamed Veilid Growl - Veilid is the second fish
Have also added a menu for the Fediverse (Including Mastodon which you may have heard of)
https://veilid.com/ - Once it gets to version Veilid Growl 1.0 (currently at 0.6) I might release it on the fediverse ... this is the RC - release candidate pretty rough ... I should call it a beta but hey ho!
Veilid that is a another story ...
I have included all my notes for Growl
To run it:
Pet your Puppy (if availble)
Save the enclosed code into a text file called 'VeilidGrowl0.6.sh'
Change the permissions of the file to executible
Click in ROX or filemanager on VeilidGrowl0.6.sh and it should open a terminal and run on most PuppysAny modifications or not working, let me know in this thread
Code: Select all
#! /bin/bash
#
# Veilid Growl v0.6 Give Receive Open Welcome Learn
# Puppy GROWL v2.5RC Guard! Restrict! Observe! Watch! Lookout!
# developed on Puppy 8 (BionicPup 64bit) and then FossaPup64 version 9.6 (released Mar 2023)
#
# Thu 12 Oct 15:06:41 BST 2023
# GROWL name changed to 'VeilidGROWL'
# added Veilid Menu
# added Firefox and PrivacyBadger options
# removed redundant programs and updated links
# updated: Help with GtkDialog tutorial, Old Puppy GROWL info
# updated and moved code to new forum link
# 2 new high quality search engines added under Services
# SearXNG and Whoogle
# changed to urxvt terminal from rxvt
# removed bycrypt not in default Fossapup64
#
# <menuitem>
#<label>Encrypt a File: bycrypt (Puppy)</label>
#<action>bcrypt_gui &</action>
#</menuitem>
# seems to have gone ... not sure what it was anyway
#<menuitem>
#<label>Crpt Secure email</label>
#<action>defaultbrowser https://crpt.info &</action>
#</menuitem>
# removed this centralised potential selling of passwords
#<menuitem>
#<label>LastPass Password Manager</label>
#<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action>
#<action>urxvt -e su spike &</action>
#<action>urxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action>
#<action>exit</action>
#</menuitem>
#### Notes for Menuing
##
## Grrr=Growl Menu
## rxvt=terminal/console/commandline
## su /spot is a Puppy Super User
##
##add somewhere
##Lots of codes.
##https://techdator.net/iphone-secret-codes/
##https://joyofandroid.com/android-secret-codes-hidden-menu-dialler-codes/
##https://www.youtube.com/watch?v=6iaR3WO71j4
#### End of 0.5 notes
## ###### add this stuff
# previously on Puppy
# GROWL v2.5 rc - Sat pm April 20 019 - tested on Puppy 8 (BionicPup 64bit)
# Security enhancements, probes, online services and info for Puppy Linux
# thanks to SFR, Shadow, Linux Kodachi, Liberte Linux, Buddha Vajrasattva and our Puppy yap dogs (security paranoids)
# New notes for 2.4
# lsof -i not working from probe menu probably because of previous gtkdialog error - works directly from command line
# tor install this action removed but useful link <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action>
# edit source code moved to security menu
# Crpt Secure email added
# Ipleak moved to probes
# ecosia search engine added
# changed media player and browser to defaultmediaplayer defaultbrowser
# added https://www.schneier.com/ link under help
# unconventional NSA Hacking info added
# added youtube and open security links
# improves + notes August 2021 for fatdog
# <action>rxvt -e defaultbrowser -safe-mode &</action>
# <action>su spike -c defaultbrowser -safe-mode &</action>
# <menuitem>
# <label>Run Browser securely</label>
# <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action>
# <action>rxvt -e defaultbrowser -safe-mode &</action>
# </menuitem>
##https://techdator.net/iphone-secret-codes/
##https://joyofandroid.com/android-secret-codes-hidden-menu-dialler-codes/
##https://www.youtube.com/watch?v=6iaR3WO71j4
#### Code begins here
#### SFR Password Generator
PASSGEN ()
{
# Generates a password with at least:
# - 1 lowercase letter
# - 1 uppercase letter
# - 1 digit
# - 1 punctuation mark
TITLE="PassGen"
# Min: 8, Max:256, Default: 16
LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
[ $? -ne 0 ] && exit
[ ${LENGTH} -lt 4 ] && LENGTH=4 # must be at least 4, or else the loop below will never end
while true; do
while true; do
PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
break # all criteria were met, so break the loop
fi
done
echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
[ $? -ne 0 ] && break
done
}
export -f PASSGEN
#### Code begins here
#### SFR Password Generator 2
## Min: 8, Max:256, Default: 16
#LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
#[ $? -ne 0 ] && exit
#[ ${LENGTH} -lt 4 ] && LENGTH=4 # must be at least 4, or else the loop below will never end
#while true; do
#while true; do
#PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
#if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
#break # all criteria were met, so break the loop
#fi
#done
#PASSGEN2 ()
#{
## Generates a password with at least:
## - 1 lowercase letter
## - 1 uppercase letter
## - 1 digit
## - 1 punctuation mark
#while true; do
#Min: 8, Max:256, Default: 16
#LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
#[ $? -ne 0 ] && exit
#TITLE="PassGen2"
#echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
#[ $? -ne 0 ] && break
#fi
#done
#}
#export -f PASSGEN2
#### End of Password Generator2 code
#### Program 'Grrr' using GtkDialogue begins below
export Grrr='
<window title="Veilid GROWL v0.5" window-position="1">
<vbox>
<menubar>
<menu>
<menuitem>
<label>Quick DISCONNECT eth0</label>
<action>ifconfig eth0 down &</action>
</menuitem>
<menuitem>
<label>Connect eth0</label>
<action>ifconfig eth0 up &</action>
</menuitem>
<menuitem>
<label>Password Generator</label>
<action>PASSGEN &</action>
</menuitem>
<menuitem>
<label>Password Generator2</label>
<action>PASSGEN2 &</action>
</menuitem>
<menuitem>
<label>Veilid</label>
<action>defaultbrowser https://veilid.com/ &</action>
</menuitem>
<menuitem>
<label>Install Firefox</label>
<action>`Xdialog --wrap --screencenter --left --title "Firefox Browser" --msgbox "Install Firefox\nfrom Quickpet/Browsers\n\nFirefox is not Chrome/Google controlled" 600x0`</action>
<action>defaultbrowser https://wiki.debian.org/Firefox &</action>
</menuitem>
<menuitem>
<label>Install PrivacyBadger</label>
<action>`Xdialog --wrap --screencenter --left --title "PrivacyBadger for firefox" --msgbox "Install PrivacyBadger\nfrom Quickpet/Browsers\n\nPrivacyBadger blocks trackers " 600x0`</action>
<action>defaultbrowser https://packages.debian.org/buster/webext-privacy-badger &</action>
</menuitem>
<menuitem>
<label>Photonmail</label>
<action>defaultbrowser https://protonmail.com/ &</action>
</menuitem>
<menuitem>
<label>Signal</label>
<action>defaultbrowser https://signal.com/ &</action>
</menuitem>
<menuitem>
<label>Install Tor Browser</label>
<action>`Xdialog --wrap --screencenter --left --title "Tor Browser" --msgbox "Install Tor\nfrom Quickpet/Browsers\n\nTor was originally developed by the CIA" 600x0`</action>
<action>quickpet &</action>
</menuitem>
<menuitem>
<label>Browser Paranoid Kit</label>
<action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user spike" 600x0`</action>
<action>urxvt -e su spike &</action>
<action>urxvt -e defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action>
<action>exit</action>
</menuitem>
<menuitem>
<label>Run Browser Privately</label>
<action>`Xdialog --wrap --screencenter --left --title "Run browser privately" --msgbox "Default browser runs privately \n not saving sites visited" 600x0`</action>
<action>rxvt -e defaultbrowser -privately &</action>
</menuitem>
<menuitem>
<label>Enhanced Lock Screen (Puppy) </label>
<action>rm -f /root/.xlockrc</action>
<action>xmodmap -e "keycode 37="</action>
<action>xmodmap -e "keycode 109="</action>
<action>rxvt -e /usr/local/apps/Xlock/AppRun &</action>
<action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action>
<action>xmodmap -e "keycode 37=Control_L"</action>
<action>xmodmap -e "keycode 109=Control_R"</action>
</menuitem>
<menuitem>
<label>Remove Flash cookies from Puppy</label>
<action>rm -rf /root/.macromedia</action>
<action>rm -rf /intrd/pup_rw/root/.macromedia/</action>
<action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>
</menuitem>
<menuitem>
<label>Edit source code</label>
<action>geany VeilidGrowl0.5RC.sh &</action>
</menuitem>
<menuitem stock="gtk-quit">
<action>echo You selected the quit menu item</action>
<action type="exit">exit by menu</action>
</menuitem>
<label>Veilid</label>
</menu>
<menu>
<menuitem>
<label>Fedi.social</label>
<action>defaultbrowser https://fedia.social/ &</action>
</menuitem>
<menuitem>
<label>Firefish.social</label>
<action>defaultbrowser https://firefish.social/ &</action>
</menuitem>
<menuitem>
<label>infosec.town</label>
<action>defaultbrowser https://infosec.town/ &</action>
</menuitem>
<label>Federation</label>
</menu>
<menu>
<menuitem>
<label>Htop process viewer</label>
<action>rxvt -e htop &</action>
</menuitem>
<menuitem>
<label>Cover Your Tracks (EFF)</label>
<action>defaultbrowser https://coveryourtracks.eff.org/ &</action>
</menuitem>
<menuitem>
<label>Ipinfodb</label>
<action>defaultbrowser ipinfodb.com &</action>
</menuitem>
<menuitem>
<label>Webkay</label>
<action>defaultbrowser webkay.robinlinus.com &</action>
</menuitem>
<menuitem>
<label>Shields Up</label>
<action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
</menuitem>
<menuitem>
<label>DNS leak test</label>
<action>defaultbrowser https://www.dnsleaktest.com &</action>
</menuitem>
<menuitem>
<label>Ipleak</label>
<action>defaultbrowser https://ipleak.net/ &</action>
</menuitem>
<label>Probes</label>
</menu>
<menu>
<menuitem>
<label>Run IRC Chat securely (Puppy) </label>
<action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action>
<action>su spot -c defaultchat &</action>
</menuitem>
<menuitem>
<label>Ecosia Search</label>
<action>defaultbrowser https://www.ecosia.org/ &</action>
</menuitem>
<menuitem>
<label>SearXNG Search</label>
<action>defaultbrowser https://search.bus-hit.me/ &</action>
</menuitem>
<menuitem>
<label>Whoogle Search</label>
<action>defaultbrowser https://whoogle.io/ &</action>
</menuitem>
<menuitem>
<label>Anonymouse proxy</label>
<action>defaultbrowser anonymouse.org &</action>
</menuitem>
<menuitem>
<label>Vpnbook proxy</label>
<action>defaultbrowser http://www.vpnbook.com/webproxy &</action>
</menuitem>
<menuitem>
<label>HideMe Proxy</label>
<action>defaultbrowser https://hide.me/en/proxy &</action>
</menuitem>
<label>Services</label>
</menu>
<menu>
<menuitem>
<label>Puppy Forum</label>
<action>defaultbrowser https://forum.puppylinux.com/ &</action>
</menuitem>
<menuitem>
<label>Puppy Security Discussions</label>
<action>defaultbrowser https://forum.puppylinux.com/viewforum.php?f=54&sid=0117b05c957192cf95d1c149eacbcc85 &</action>
</menuitem>
<menuitem>
<label>About Flash Cookies</label>
<action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
</menuitem>
<menuitem>
<label>Browser Security Add Ons</label>
<action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action>
</menuitem>
<menuitem>
<label>Spot, Fido, root</label>
<action>defaultbrowser file:///usr/share/doc/root.htm &</action>
</menuitem>
<menuitem>
<label>Honeynet Open Security info</label>
<action>defaultbrowser http://www.honeynet.org/about &</action>
</menuitem>
<menuitem>
<label>Surveillance Self-Defense (EFF)</label>
<action>defaultbrowser https://ssd.eff.org/ &</action>
</menuitem>
<menuitem>
<label>CIA Hacking info</label>
<action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action>
</menuitem>
<menuitem>
<label>Unconventional Security info</label>
<action>defaultbrowser https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html &</action>
</menuitem>
<menuitem>
<label>NCSC UK security guidance</label>
<action>defaultbrowser https://www.ncsc.gov.uk/guidance &</action>
</menuitem>
<menuitem>
<label>EUFI Secure boot</label>
<action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action>
</menuitem>
<menuitem>
<label>GtkDialog tutorial</label>
<action>defaultbrowser https://wikka.puppylinux.com/gtkdialog &</action>
</menuitem>
<menuitem>
<label>GROWL info</label>
<action>defaultbrowser https://wikka.puppylinux.com/Lobster &</action>
</menuitem>
<menuitem>
<label>Build a tin hat</label>
<action>defaultbrowser http://zapatopi.net/afdb/ &</action>
</menuitem>
<menuitem>
<label>FAQ</label>
<action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Install latest Firefox browser (does not use Google Data Servers)" 600x0`</action>
</menuitem>
<menuitem>
<label>Credits</label>
<action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "VeilidGrowl v 0.5\nOctober 023\nUpdated by Lobster. Password Generator Code by SFR" 600x0`</action>
</menuitem>
<menuitem>
<label>Final thoughts ...</label>
<action>defaultmediaplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action>
</menuitem>
<label>Help</label>
</menu>
</menubar>
<frame>
<pixmap>
<input file>/usr/share/midi-icons/lock-screen48.png</input>
</pixmap>
<text><label>VeilidGROWL 0.6</label></text>
<text><label>based on FossaPup64 GROWL 2.5</label></text>
</frame>
<hbox>
<button help>
<action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'VeilidGROWL v0.6 is a simple, open, configurable, Security Tool. \n\n Written in bashscript using the GtkDialog4 container and Puppy Linux, Geany text environment.\n\n VeilidGROWL is used for enhancing security, education, online services and probing ones set up.\n\n Lobster Mon 9 Oct 07:19:35 BST 2023')'" 600x0`</action>
</button>
<button cancel></button>
</hbox>
</vbox>
</window>'
gtkdialog4 --program Grrr
unset Grrr