Category Archives: internet

VPN Connection from Ubuntu 13.04 to AVM Fritzbox

Pre Requisites

Install Cisco compatible VPN Client with

sudo apt-get install vpnc network-manager-vpnc network-manager-vpnc-gnome


  • Login into your Fritzbox as admin
  • Go to System -> Fritzbox Users
  • Click on the edit icon from one of your users
  • Check the VPN Checkbox
  • Click on the Link in the last line for showing the VPN settings
  • Leave the Popup with the settings open


  • Click on the Connections Menu icon in the toolbar on top
  • Go to VPN Connections -> Configure VPN
  • Click on Add Button at the right side
  • Choose from the list under VPN the Cisco compatible VPN client type
  • Click on create button
  • Enter the following values (<Ubuntu>: <Fritzbox>)
    • Connection Name : Fritzbox
    • Gateway: <Server Adress>
    • User Name: <IPSec Identifier>
    • User Password :<User Password>
    • Group Name: <IPSec Identifier>
    • Group Password: <IPSec Pre-Shared Key>
  • Set the Password Option to “Saved” (optional)
  • Click on save button
  • Cut the cable connection if established
  • Establish a mobile connection
  • Choose from VPN menu the new created VPN connection
  • Try accessing the Fritzbox web interface with your favorite browser

Ad block with Squid3 and Quintolabs instead of Adblock Plus


Under the twitter hashtag #adblockgate you find news related to the business of the company behind the adblock plus browser plugin for chrome or firefox.

The problem with their business is the secret white list which serve you ads without a chance to avoid them.

The advantage of this solution here is to have a central ad blocking service for all of your devices including smart phones and tablets.

Used Software (under ubuntu 13.04):

  • Apache Httpd (for serving the pac file)
  • Squid3 (as primary proxy)
  • Quintolabs (as  ICAP Server for ad blocking)

Install Apache Httpd

apt-get install apache2

Install Squid3

apt-get install squid3

Install Quintolabs

open Download page and choose deb File and run the command (as root)

dpkg -i qlproxy-2.0.0.d746b-ubuntu_i386.deb

Create PAC File for the web clients

Change <your ubuntu host ip> with the ip of your server

nano /var/www/proxy.pac

function FindProxyForURL(url, host) {
// avoid anti virus update problems
if (shExpMatch(host,"*")) {
return "DIRECT";

// avoid anti virus update problems
if (shExpMatch(host,"*")) {
return "DIRECT";
// avoid proxy for URLs inside your network
if (isInNet(host, "", "")) {
return "DIRECT";

// the rest goes through your proxy
return "PROXY <your ubuntu host ip>:3128";

Configure Squid3

nano /etc/squid3/squid.conf

acl manager proto cache_object
acl localhost src ::1
acl to_localhost dst ::1
acl localnet src # RFC1918 possible internal network
acl SSL_ports port 443
acl Safe_ports port 80          # http
acl Safe_ports port 21          # ftp
acl Safe_ports port 443         # https
acl Safe_ports port 70          # gopher
acl Safe_ports port 210         # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280         # http-mgmt
acl Safe_ports port 488         # gss-http
acl Safe_ports port 591         # filemaker
acl Safe_ports port 777         # multiling http
http_access allow all
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost
http_access deny all
http_port 3128
cache_mem 768 MB
maximum_object_size_in_memory 1024 KB
memory_replacement_policy heap GDSF
cache_replacement_policy heap LFUDA
pid_filename /var/run/
buffered_logs on
coredump_dir /var/spool/squid3
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern -i (/cgi-bin/|\?) 0     0%      0
refresh_pattern (Release|Packages(.gz)*)$      0       20%     2880
refresh_pattern .               0       20%     4320
negative_dns_ttl 5 minutes
via off
ignore_expect_100 on
forward_timeout 30 seconds
connect_timeout 30 seconds
read_timeout 30 seconds
request_timeout 30 seconds
persistent_request_timeout 1 minutes
client_lifetime 20 hours
dns_timeout 5 minutes
ipcache_size 10240
forwarded_for delete
client_db off
acl home_network src
icap_enable on
icap_preview_enable on
icap_preview_size 4096
icap_persistent_connections on
icap_send_client_ip on
icap_send_client_username on
icap_client_username_header X-Client-Username
icap_service qlproxy1 reqmod_precache bypass=0 icap://
icap_service qlproxy2 respmod_precache bypass=0 icap://
adaptation_access qlproxy1 allow all
adaptation_access qlproxy2 allow all

Patch Quintolabs

To use own ad block lists change the settings file

nano /opt/quintolabs/qlproxy/bin/

adblock = {
“DataDir” : macro_var + “/spool/adblock”,
“DataFiles” : {
“easylist.txt” : “”,
“easyprivacy.txt” : “”,
“easylistgermany.txt” : “”,
“fanboy-russian.txt” : “”,
“own-adblock.txt” : “”

own-adblock.txt can be used as alias for own ad block subscriptions. See further configuration below.

Change the validation of ad block lists to avoid verification errors with different headers

nano /opt/quintolabs/qlproxy/bin/

change verify function line to this

if’\[Adblock\s+Plus’, line) != None:

Configure Quintolabs

Enable ad block module in the global config

nano /etc/opt/quintolabs/qlproxy/qlproxyd.conf

adblock_enabled = yes

and disable the other modules

urlblock_enabled = no
httpblock_enabled = no
contentblock_enabled = no
adultblock_enabled = no

Enable relaxed module for your subnet

nano /etc/opt/quintolabs/qlproxy/policies/relaxed/members.conf

Change the last line to (assuming is the network subnet of your clients)

user_ip_subnet =

set pass through domains for your antivirus tool by editing

nano /etc/opt/quintolabs/qlproxy/policies/relaxed/exceptions.conf

Change the lines with domain name for your needs like this for bitdefender

# disable filtering for all third level domains of the following servers
domain_name =
domain_name =
domain_name =
domain_name =

Enable all ad block subscriptions

nano /etc/opt/quintolabs/qlproxy/policies/relaxed/rules/block_ads.conf

use_subscription = easylist.txt
use_subscription = easylistgermany.txt
use_subscription = fanboy-russian.txt
use_subscription = easylist_custom.txt
use_subscription = easyprivacy.txt
use_subscription = own-adblock.txt

Restart Quintolabs to read change configs

/etc/init.d/qlproxy restart

Update ad block list for the first time


Restart Quintolabs to read change ad block lists

/etc/init.d/qlproxy restart

Restart web and proxy server

restart squid3

service apache2 restart

Configure windows browser

  1. Start internet explorer and open settings.
  2. Go to connection tab
  3. click on lan settings
  4. click second checkbox for “script for automatic configuration” and enter (replace <servername> with your ubuntu hostname)http://<servername>/proxy.pac
  5. Confirm dialog with ok and close settings with ok
  6. Restart all browsers

This affect chrome and internet explorer.

Under Firefox

  1. open settings
  2. go to advanced
  3. go to network
  4. Click on connections
  5. Set the last line to the same url as step 4 from above and click on the radiobox over the url for “automatic proxy configuration url”
  6. Click on “reload” button beside the url text field

Remove existing browser plugins

Uninstall chrome and firefox adblock plus plugins

Set proxy under android for the wlan

  1. Open settings 
  2. Click on wlan (which is enabled)
  3. Hold the entry with your ssid pressed
  4. Choose from menu “change network setttings”
  5. Click on checkbox “show extended settings”
  6. Choose “manual” as proxy settings
  7. Choose <servername> (like in the url above) as proxy hostname
  8. Choose “3128” as proxy port
  9. Click on save button

Test ad block

Open web pages like the following to see if the ad banners are removed by the proxy server

Check if proxy can be detected by external web sites

Sample sites which looks for http header in the request to see if you are coming via a proxy

“Proxy server not detected.”

“This request appears NOT to have come via a proxy.”

Ubuntu 13.04 on Lenovo Thinkpad X60

Hardware Spec

  • 4GB RAM
  • 120 GB Samsung SSD 830 (AHCI Mode)
  • Dual Core L7500 @ 1.6 Ghz

Used Distro

Ubuntu 13.04 x64 Desktop Edition


Download the iso file and use unetbootin to install on a usb stick. Leave the stick in the laptop. Reboot. Go into bios by pressing ThinkVantage button and then F1. Choose Startup -> Boot If the usb hdd is excluded then include them with x button and move up with F6. Press F10 to save and exit. Power on the laptop and choose “Install ubuntu” to start installation process.

After installation

recommended additional software (install with “apt-get install <name>”)

  • ntp (for correct date and time)
  • xournal (tablet programm for writing combined with stylus notes)
  • libxss1 (prerequisites for google chrome)
  • lingconf2-4 (prerequisites for google chrome)

Google Chrome

Open Download page and click on chrome download button. Choose “64bit .deb” and click on “accept and install” button

Get rid of anoying shopping hints in unity

apt-get remove unity-lens-shopping

Click on the amazon icon in the unity starter with right click and choose remove from starter

Getting special Hardware to work

Hibernate on closing laptop

Test if it works by running


If the laptop suspend to disk and start at the current state after reboot everything is fine to go on.

Edit file /etc/polkit-1/localauthority/50-local.d/com.ubuntu.enable-hibernate.pkla

[Re-enable hibernate by default]

Reboot machine and open Energy menu (click on the battery in the top bar and choose energy settings) to define the hibernate state if the laptop cover is closed.

Gnome Buttons on the left side

gsettings set org.gnome.desktop.wm.preferences button-layout ‘:minimize,maximize,close’

Fingerprint Sensor

sudo apt-add-repository ppa:fingerprint/fingerprint-gui && sudo apt-get update

sudo apt-get install libbsapi policykit-1-fingerprint-gui fingerprint-gui

run the fingerprint.gui:

  1. Show Vendor => Choose STMicroelectronics and click next
  2. Choose a finger and click next
  3. Repeat five times to scan and click next
  4. Click on the test button and see if it works

Now you can login or authenticate for sudo with your fingerprint



Using Vaadin Eclipse Plugin under Win7 x64

  1. Download and extract Eclipse x32
  2. Download and extract jboss 7.1
  3. Download and install Java JDK x32
  4. Open eclipse.ini and set path to jvm.dll

    C:/Program Files (x86)/Java/jdk1.7.0_21/jre/bin/server/jvm.dll

  5. Download and install xulrunner from sourceforge
  6. Start Eclipse
  7. Go to help menu -> install new software
  8. Enter “” in “work with” field and hit enter
  9. Click checkbox beside vaadin
  10. Click next button to start installation
  11. Restart eclipse
  12. Open server view
  13. Right click and new => server
  14. click on “Download Additional server adapters”
  15. Choose jboss as and install
  16. Restart eclipse
  17. Open server view
  18. Right click and new => server
  19. Choose jboss as 7.1
  20. Hit next
  21. Choose extracted jboss dir from step 2 as home directory
  22. hit finish
  23. In the project explorer hit right mouse menu and choose new project
  24. Choose vaadin 7 project
  25. Enter Project Name and hit finish
  26. Open right mouse menu “add and remove” on the jboss inside server view
  27. add new project with add button and hit finish
  28. start server
  29. right mouse click on the project and choose “run as” => “run on server”
  30. Choose jboss and hit finish
  31. browser will shown with your first vaadin app
  32. hit “click me” button to see if all works

Visual Designer is available if you create a “Vaadin composite” in your project.
Make sure the new file is open in the “vaadin editor”. Switch to the design tab.

Trash mailer

a short list of trash mailer…