Transferring files between an Android device and a Linux system via USB cable


Some newer Android devices do not offer regular USB-drive like connection. Instead they use the MTP protocol.

In order to easily transfer files between your Android device and your favorite Linux distro (yes, Debian!) with a USB cable, via MTP transfer protocol :
As root

apt-get install jmtpfs

Make sure your regular user belongs to the “fuse” group

usermod -a -G fuse username

(you need to logout and login again)

Connect your Android device to your computer with your USB cable, then as a regular user :

mkdir -p ~/Android_transfer
jmtpfs Android_transfer/

After a few seconds, files on the Android device should appear in the mount point 🙂

To properly unmount :

fusermount -u ~/Android_transfer

For more info, as always :

man jmtpfs
jmtpfs -h

Mageia 4 Xen Server

mageia logo

A quick guide for a working Xen hypervisor (Dom0) on a Mageia 4 host.

Minimal installation for a server

Fetch a network install iso (64 bit!)

I chose a Text installer, but do a graphical install if you prefer. We are doing a minimal install.

  • Install from HTTP (choose your favorite mirror)
  • Desktop : custom
  • uncheck everything
  • next screen (“Type of install”), use default choices
  • bootloader : I prefer GRUB2

Installation finished, reboot, login as root.

Continue reading

Wifi repeater/range extender script

Updated September 17, 2014 : updated, improved and should be working! (Use at your own risk!). Thanks to AL for pointing errors!

# Wireless Repeater/Range extender script
# Last changes:
#   - 20/Apr/2014 : added ad filtering (uses an additional hosts file)
#   - 12/Apr/2013 : adapted for Debian (tested under 7.0 Wheezy)
# thanks to : (link dead now)
# hardware requirements : 2 wireless NICs
# software requirements : iptables, wpa_supplicant, hostapd, dnsmasq, dhcpcd (or dhclient)
# This is a standalone script, it will not use your existing configuration files
# (wpa_supplicant/hostapd)
# Both wireless interfaces will use WPA/WPA2 encryption.
# - you must have root rights
# - stop your wireless connection manager (networkmanager, wicd, etc...)
# - disable your firewall
# - disable power management (prevent the computer to go into suspend mode when unused)
# This script has been tested on OpenSUSE 12.2, Debian 7.0
# but should work on other Linux systems with minor adaptations.
# TODO : repeater with 1 wireless NIC + 1 ethernet NIC

# this is the wireless interface we use to connect to our existing Access Point

# enter here your existing SSID and WPA passphrase

# this is the wireless interface we use to create our new AP (the "repeater" AP)

# your new AP's SSID (change the name eventually)
# Be sure to use different channels for the 2 AP's for best performance
# we can use the same passphrase (or not)

# temp files (will contain passphrases in clear text, so make sure they are not world readable)

# URL and filename to download for the ad filter hosts file
# Thanks to
# just comment the two variables if you don't want to use ad filtering

# log file for dnsmasq

# Path for used commands (adapt to your system)
#for Debian we use dhclient (installed by default)
DHCPCD=$(which dhclient)
HOSTAPD=$(which hostapd)
WPASUPPLICANT=$(which wpa_supplicant)
DNSMASQ=$(which dnsmasq)
IPTABLES=$(which iptables)


USAGE="Usage : `basename $0` \
\n\nWireless repeater/extender script."

MSG_STOP="Repeater has been stopped."

# sub-routines
 xmessage -center -timeout $2 "$1"

# Main program
if [[ "$#" -ne 1 || "$1" == "help" ]]; then
 # show program help
 echo -e "$USAGE"
 exit 0

# check if we are root
if [ $EUID -ne 0 ]; then
   echo `basename $0` ": this script must be run as root!" 1>&2
   exit 1
# check for software we need
if [ ! -x $DHCPCD ]; then
 echo "FATAL: $DHCPCD not found!"; exit 1
if [ ! -x $HOSTAPD ]; then
 echo "FATAL: $HOSTAPD not found!"; exit 1
if [ ! -x $WPASUPPLICANT ]; then
 echo "FATAL: $WPASUPPLICANT not found!"; exit 1
if [ ! -x $DNSMASQ ]; then
 echo "FATAL: $DNSMASQ not found!"; exit 1
if [ ! -x $IPTABLES ]; then
 echo "FATAL: $IPTABLES not found!"; exit 1
# check for wireless interfaces
ifconfig $WLAN_STA 1>&2>/dev/null
if [[ $? -ne 0 ]]; then
 echo "FATAL: Wireless interface $WLAN_STA unavailable!"; exit 1
ifconfig $WLAN_AP 1>&2>/dev/null
if [[ $? -ne 0 ]]; then
 echo "FATAL: Wireless interface $WLAN_AP unavailable!"; exit 1

# stop the repeater?
if [ "$1" == "stop" ]; then
 # be sure the repeater is already running
 if [ -f "$PIDFILE" ]; then
 # kill existing wireless connections from previous execution of this script
 echo -n -e "Stopping... "
 $DHCPCD -x $WLAN_STA 2>/dev/null
 $DHCPCD -x $WLAN_AP 2>/dev/null
 killall wpa_supplicant 2>/dev/null

 # kill running hostapd daemon if it exists
 killall hostapd 2>/dev/null

 # kill dnsmasq dhcp
 killall dnsmasq 2>/dev/null

 # empty existing temp.conf files, for security

 echo "OK"

 # restore firewall rules
 echo -n -e "Restoring firewall... "
 iptables-restore /dev/null
service wicd stop 2>/dev/null

# create temp wpa_supplicant.conf file for our STA interface

# enable packet forwarding and add firewall rules to allow forwarding packets
# between our 2 network interfaces.

sysctl -w net.ipv4.ip_forward=1

# create pid file
echo $$ >"$PIDFILE"

echo -e "\nWireless repeater access point \"$WLAN_AP_SSID\" is *up* and running!\n"
echo -e "To stop it : `basename $0` stop"
show_notification "Wireless repeater access point \"$WLAN_AP_SSID\" is *up* and running!" 3

# optional : open a new xterm which displays the DNS log in realtime
xterm -e "tail -f $DNSMASQ_LOG" &

exit 0

# unknown command, show usage
echo -e "$USAGE"
exit 1

Debian 6.0 (Squeeze) on the Xplore iX104C3 rugged Tablet PC


System specs

A nice review here :

Users handbook :

Note: my model only has a digitizer (tablet PC model), no touchscreen (dual mode version)

Debian stable to the rescue

First I wanted to install Arch Linux on this system, but soon I encountered a severe setback : the Wacom stylus would not work. Then I tried Ubuntu 12.04 (Precise), everything worked out of the box, except the stylus!
Explanation : it seems the support for this older, serial Wacom tablet has been removed from the X.Org Wacom input drivers, since the 0.10.6 version and up.
(more info can be found here : )

Fortunately Debian Squeeze still uses a working 0.10.5 driver version!

Continue reading

Wireless Ad-hoc server script

Today, a quick and dirty Bash script which will allow you, for instance, to quickly serve files from your laptop to other wireless devices (Warning here, we use WEP encryption which is not secure).

# Wireless Ad-hoc script
# /
# This script will setup your wireless adapter in Ad-Hoc mode
# and start a DHCP server so that other peers (eg. an Android device)
# can receive an IP address and connect to your computer.
# After that, you can start a minimal webserver (darkhttpd for example)
# so that you can quickly share some files with minimal effort!
# This script must be run as root.
# Tested on Arch Linux.
# Some adaptations may be needed for other Linux systems.
# Requirements: iw, ifconfig commands, and dnsmasq.
# WARNING : WEP encryption is weak security :)

# User variables

# Main program
echo -n "Stopping wireless connections (if any)... "
# adapt to your system; I use wicd
systemctl stop wicd && echo "OK"
# for networkmanager
#systemctl stop NetworkManager

echo -n "Starting wireless Ad-hoc mode... "
ifconfig $mywlan down || exit 1
iwconfig $mywlan mode ad-hoc || exit 1
iwconfig $mywlan essid $myessid
iwconfig $mywlan channel $mychan
[ "$mywepkey" ] && iwconfig $mywlan key $mywepkey

ifconfig $mywlan $myip
ifconfig $mywlan up && echo "OK"
echo -n "Starting DHCP server ... "
dnsmasq --dhcp-range="$mydhcprange" && echo "OK"

echo "--------------------------------------"
echo "ESSID : $myessid"
[ "$mywepkey" ] && echo "WEP KEY : $mywepkey"
echo "This computer's IP : $myip"
echo "--------------------------------------"

# debug
#iwconfig $mywlan

while true; do
echo -n "Enter 'q' to quit. "
read value
if [ "$value" == "q" ]; then

echo -n "Killing DHCP server... "
killall dnsmasq && echo "OK"
echo -n "Killing wireless... "
# restoring the wlan interface to "default" mode
ifconfig $mywlan down
iwconfig $mywlan mode managed
iwconfig $mywlan essid off
iwconfig $mywlan key off
echo "OK"
echo "Wireless Ad-hoc mode terminated."
# now you can restart your network manager

exit 0

Linux Slackware 14.0 (64 bits) quick setup

Slackware 14.0 (XFCE)

Slackware 14.0 (XFCE desktop)

System used for this howto :
VirtualBox 4.2 virtual machine, with
2 cpu’s
1024Mb RAM
20Gb Hard disk


Download the official (64 bit) DVD iso
Boot the DVD
Select your keyboard map, login as “root”.
Create your partitions (I use cfdisk)
# cfdisk /dev/sda
First partition (/dev/sda1) : swap
(use at least the same size as your RAM for suspend-to-disk to work)
Second (bootable) partition (/dev/sda2) : Linux
Start the installer
# setup
Go to ADDSWAP and follow the steps. For my Linux root partition I use ext4 as filesystem.
Package selection
I choose Default, but personally deselect “GNU Emacs”, “TeX” and “Games” as I don’t use them.
We will install KDE international language later.
Select prompting mode. I select “terse” which is faster.
Default choices are used for the rest of the installation steps.
End of installation
# reboot

Post-installation configuration

Note : root login is permitted by ssh in the default Slackware installation.
First login on the system, login as root, then check your mail
# mail
or even better, use mutt
# mutt

Setup Slackpkg and update your freshly installed system

Select your mirror
# nano /etc/slackpkg/mirrors
Uncomment ONE mirror.
# slackpkg update
# slackpkg upgrade-all

Set the system locale

Show list of supported locales
# locale -a
Then set it (changes will be effective after a reboot)
# nano /etc/profile.d/
(here for french systems)
export LANG=fr_FR.utf8
(Do the same for /etc/profile.d/lang.csh if you use the tcsh shell)
Add your KDE international language (here french for me).
Note: installing the KDE environment will also install the Calligra office suite.
# slackpkg search l10n
# slackpkg install kde-l10n-fr calligra-l10n-fr
Note 1 : you’ll have to select the language to use in KDE’s system settings (look under Locale).
Note 2 : the language pack in XFCE will be automatically detected after you set the systemwide locale.


Note : your system should have a valid DNS name otherwise email relaying will be refused ( “Sender address rejected: Domain not found” ).
Use netconfig to reconfigure hostname and domain if needed
# netconfig
Configure the MTA so that the system can send outgoing mail to the internet.
We will use our ISP’s SMTP smarthost. For this we need to generate a new configuration file
# cd /usr/share/sendmail/cf/cf
# nano
Uncomment the SMART_HOST define :
dnl define(`SMART_HOST',`')
Save changes and build the config file
# ./Build
Copy the generated .cf file to sendmail’s directory
# cp /etc/mail/
Now start sendmail (also this way sendmail will be automatically started on boot, Slackware-style)
# chmod +x /etc/rc.d/rc.sendmail
# /etc/rc.d/rc.sendmail start
Send an email for testing
# echo 'from my Slackware box'| mail -s 'Hello'
See the logs to see if everything goes well
# tail /var/log/maillog
Forward root mail
We create a .forward file in root’s home so that emails sent to root@localhost will be forwarded to another address (useful for cron jobs and daemons)
# echo >/root/.forward
(several different addresses can be added to the file, one per line)
Test the forwarding
# echo 'from my Slackware box'| mail -s 'Forwarding' root@localhost

X.Org systemwide keyboard settings

You can setup keyboard layout in KDE or XFCE settings. If you prefer to set it up systemwide, just create the file :
# nano /etc/X11/xorg.conf.d/10-evdev.conf
Section "InputClass"
        Identifier "evdev keyboard catchall"
        MatchIsKeyboard "on"
        MatchDevicePath "/dev/input/event*"
        Driver "evdev"
        option "xkblayout"      "fr"

Virtualbox guest additions (optional, only if running in a VM)

It’s easy to do since Slackware’s default install includes a standard development environment and the kernel source.
(First mount the VirtualBox Additions cdrom)
# mount /dev/sr0 /mnt/tmp
# sh /mnt/tmp/

Create a regular user “fred”

# adduser fred
Additional groups (press the UP arrow key) : audio cdrom floppy plugdev video power netdev lp scanner

Graphical login

Edit the /etc/inittab
# nano /etc/inittab
Comment out some ttys while we are at it (will save some memory)
c1:12345:respawn:/sbin/agetty –noclear 38400 tty1 linux
c2:12345:respawn:/sbin/agetty 38400 tty2 linux
c3:12345:respawn:/sbin/agetty 38400 tty3 linux
#c4:12345:respawn:/sbin/agetty 38400 tty4 linux
#c5:12345:respawn:/sbin/agetty 38400 tty5 linux
#c6:12345:respawn:/sbin/agetty 38400 tty6 linux
Save changes, reboot.
Now you should be presented to the default session manager (KDM or XDM if you did not install KDE)

Install additional software

Surprise! There’s an “extra” directory on the DVD! It contains some popular applications :
Chromium web browser, Java, Flash player plugin, …
Just open a terminal and read the TXT file (README) for instructions.
Note: the flashplayer-plugin slackbuild found on the DVD does not work (outdated flash player version no more available for download).
Or just copy extra/flashplayer-plugin/* files to /tmp, edit the .slackbuild file
# nano flashplayer-plugin.SlackBuild
Save changes and run the slackbuild
# sh flashplayer-plugin.SlackBuild
Install the generated package
# installpkg /tmp/flashplayer-plugin-
Also, as an alternative, the slackbuild found on will work ( ).

Additional software from 3rd party packages

(versions are likely to change since the writing of this document)
VLC (from AlienBob’s repository)
(as root)
# cd
# wget
# installpkg vlc*
LibreOffice (from RlWorkman’s repository)
# wget
# installpkg libreoffice*
Note : the language packs are not included.
AlienBob also has LibreOffice packages (including the language packs), just wait for some days for the updated packages for Slackware 14.0 to appear 🙂

Filesystem optimizations

# nano /etc/fstab
Add the “noatime” option for the rootfs.
/dev/sda2        /                ext4        defaults,noatime         1   1
Add /tmp in tmpfs
tmpfs           /tmp            tmpfs           defaults,nosuid,nodev   0       0

Generic Kernel, faster boot and resume from hibernation

Generate an initramfs
# /usr/share/mkinitrd/ -r
Copy the result to your command prompt and execute it
(in my case)
# mkinitrd -c -k 3.2.29 -f ext4 -r /dev/sda2 -m mbcache:jbd2:ext4 -u -o /boot/initrd.gz
Then update lilo’s (bootloader) configuration
# nano /etc/lilo.conf
– add the “compact” directive (will gain some boot speed) at the beginning
– decrease the “timeout” value to your liking (a value of 50 should be enough)
– add a “default” directive for our new kernel entry :
then add a new kernel entry at the end
image= /boot/vmlinuz-generic-3.2.29
  initrd = /boot/initrd.gz
  label = Linux-generic
  append="quiet fastboot resume=/dev/sda1"
Save changes, make sure lilo is executed to update the bootloader code
# lilo -v
Then reboot. Less messages, (a little) faster boot times 🙂
Be sure to test suspend-to-disk (hibernate) and system resume.


By default, no firewall is configured at all.
# iptables -L
We can generate a simple firewall configuration from this website :
Then copy and paste our generated firewall to /etc/rc.d/rc.firewall
(the generated config needs some adjustments, like the path to the iptables executable in the IPT variable)
# iptables script generated 2012-09-30
# Flush old rules, old custom tables
$IPT --flush
$IPT --delete-chain
# Set default policies for all three default chains
# Enable free use of loopback interfaces
# All TCP sessions should begin with SYN
$IPT -A INPUT -p tcp ! --syn -m state --state NEW -s -j DROP
# Accept inbound TCP packets
#$IPT -A INPUT -p tcp --dport smtp -m state --state NEW -s -j ACCEPT
#$IPT -A INPUT -p tcp --dport http -m state --state NEW -s -j ACCEPT
#$IPT -A INPUT -p tcp --dport https -m state --state NEW -s -j ACCEPT
$IPT -A INPUT -p tcp --dport ssh -m state --state NEW -s -j ACCEPT
# Accept inbound ICMP messages
$IPT -A INPUT -p ICMP --icmp-type 8 -s -j ACCEPT
$IPT -A INPUT -p ICMP --icmp-type 11 -s -j ACCEPT

Start firewall at boot

# chmod +x /etc/rc.d/rc.firewall
If you want to disable the firewall
# iptables -F
To disable at boot time
# chmod -x /etc/rc.d/rc.firewall

That’s it!


Read the TXT files on the DVD! Lots of useful info for special setups (encrypted, lvm/raid, etc)
Need to boot in single user mode (useful for rescue)?
Append “S” to your kernel line at boot time.
Need to reconfigure your system?
# pkgtool
Want to change the default desktop environment?
# xwmconfig
Want to change the default X session manager?
# chmod -x /usr/bin/kdm
This will use XDM instead of KDM as the default session manager

Useful links

Official Slackware wiki
Packages list
AlienBob’s packages
Rlworkman’s packages
Great sendmail howto