Get Thunderbird to launch Firefox/Chrome browsers in Linux!

This isn’t like Windows!

If your like me you probably clicked a link in Thunderbird and thought you would be taken to your favorite browser but that isn’t the case with Linux. The pop up screen asking you which application to launch is quite similar to Windows but there is a problem. If you have had no experience with Linux then you might ask yourself “Where’s the program files?” It seems that Windows and Linux differs from each other in that aspect. I did have to do some things to get Thunderbird to get it to launch a browser. This quick tutorial will help those new to Linux to do what they have always done on Windows. I will warn people that clicking on links in your emails is the first way to get a virus or a credit card stolen but that is for another topic and discussion!

Some Preparations are in order!

For some of use this is something that should already be included, but it seems that Mozilla didn’t add some important config scripts into the Thunderbird application for Linux. Thanks to Google, I found the answers and I thought I would also share them with people so it would be much easier for others to enable launching the browser in Thunderbird.

You will need to add these strings in Thunderbird:

In Thunderbird: edit > Preferences > Advanced > Config Editor

Right click anywhere in the list and click ADD > String. Then add these strings with values!

  • String: network.protocol-handler.app.http Value: x-www-browser
  • String: network.protocol-handler.app.https Value: x-www-browser
  • String: network.protocol-handler.app.ftps Value: x-www-browser

Once that is done, your ready for the next step of the process.

Where Do I find these files?

Most cases you will find these files in only one place and that is almost like a C: Drive. In order to find the right program, you first need to go:

  1. /usr/bin/firefox.sh (shell script)
  2. /usr/bin/chromium-browser.sh (shell script)
  3. /usr/bin/rekonq.ex (Executable)

These are the two files you will need to tell Thunderbird to launch the right application when you click on a link. You should only need to do this once for each type of link from http, https, and the last one is the file transfer protocol but if you do this, I see no reason why you would be able to launch your favorite browser. Depending on which browser you have installed, it should be easily found in the the bin directory and you should be able to launch your browser even if it is not a well known browser. .

Let’s Rock Linux

Paul Sylvester

Setting up Email Filters for Twitter Phish — Getting Phishing out of the way

Ok So we’ve all had the problem of having to deal with this twitter phish, and you can see there are more and more twitter spam.

So how do you start Filtering out the Bad twitter spam?

I’m using Mozilla Thunderbird so this will not be a complete way for people who use other email software.

Select Tools and then Message Filters

Once You find your way to this menu you would click new and then you do this:

To get here in Thunderbird Tools From the Menubar and select Message Filters

Now once you’ve named your twitter filter, I named it “Twitter Spam” but you may name it whatever you would like.   I then selected to “Match all of the Following”, if you don’t do this it will send all direct messages to your spam folder.  You’d get no direct message from anyone about anything.   I told the filter if it was from “*@postmaster.twitter.com”.   Once you done that you would click the plus sign to add [ad#ad2-right]another row and then I selected the “Subject”.  I selected that to filter whatever is in the subject body of the message and filtered for “http://*.access-logins.com”.  Then I clicked Move Message to Spam Folder.  You can move it to your own twitter spam folder, it is just nice to move it away from the important stuff.   You also if you like can Mark it as read also by clicking the Plus sign and selecting “Mark as read” so that you don’t have to worry about reading each and every one.   For people who are wondering the Asterisk is a Wild Card which means it does not matter what is in there that is import to prevent getting spam from people you know or from sites you know are phishing.

Some people might like to do this for Google Mail and I see no problem in people doing this before you even get the email but if you’re not using Google mail and would like to do this for your email hosting account by all means follow these steps and you shouldn’t get much phish direct messages.  I will say if they us another Free hosting account you’ll get it for the time but it won’t be constant.   I hope this helps people get this out of there way.  Soon this will be in the past.

If you suspect you will get more blogspot.com links also you can set up a seperate filter to filter for “http://*.blogspot.com” just follow the instructions just like you did but use that instead of the other internet address.  I’d also tell people to not Direct message you about a site  if it is important to look at to reply to you but don’t direct message you. 

IE vulnerability in the Wild

Well this was bound to happen, hackers found this vulnerability and is using it for their own purposes.  [ad#ad2-right]It seems they put a virus on your system.  Microsoft has issued an Recommendation and to check out Microsoft Security Bulletin MS06-055.

“What we’ve seen from the exploit so far is it stealing game passwords, but it’s inevitable that it will be adapted by criminals,” he said. “It’s just a question of modifying the payload the trojan installs.”

Said Mr Ferguson: “If users can find an alternative browser, then that’s good mitigation against the threat.”

[Via BBC News]

[ad#ad2-left]I personally like to recommend a program that will do a better job at security and that is Firefox,  I also suggest people use the Thunderbird and not Microsoft mail program.  This will greatly reduce your likely hood of getting a virus or Trojan.   Most of the time hackers like to find new ways to infection to get into your system.  If you want to preven having a virus in the future, I’d recommend going to my Malware Resource and check out a good firewall and anti-virus.   This will prevent you from getting some of the viruses and other types of malware.

Uncovering a Virus/Trojan

Getting done with the first part really got my juices flowing. I was shopping looking and thinking about this next article. I came up to only one option turning this into a 3-5 length post due to all the content that I will have.  So where did we leave off?  Oh that is right figuring out if you have a virus/Trojan.  The instant I made a post about this 12 hours later someone make a comment and here is what he said:
[ad#ad2-right]

Rene Van Belzen

I can’t wait to read part two of this article. I always wondered how you’d know you’re infected if a virus don’t want to be detected and no virus definitions are yet available, because the virus is so new.

Now the truth is anytime a Virus does something it usually leaves a footprint somewhere and somehow.   Even the hardest working hacker can’t plan for all possibilities and that is where we begin.   I have been helping people for a while with viruses and know that no matter how hard the virus tries to hide you can usually find it relatively quickly and easily do to virus check here are the ways I’ve done to figure out if they may or may not have a virus/Trojan.

Now if this is a client’s computer and you don’t want to be rude to the client, there are a few indications of user error and installing a virus.   This is relatively simple, all you do is do a quick inventory of all the start menu programs.  You’d want to look for any P2P file sharing program, If they have Firefox Installed, and if they are using Window Mail and not Thunderbird.   You see 80% to 90% of virus downloaded are installed by the End USER.  They either downloading a game and installing a virus with [ad#ad2-left]a game, or not protecting themselves by using Internet Explorer or Using Windows Mail.  That is usually my first step due to the fact, I’ve got to be diplomatic about finding out about security ways.  Also make sure they are up to date on there Window updates, unless they are using a really old system then you will have to work even harder.  Also you can suspect a virus if the client is talking about having problem with a program recently although this isn’t always true it sometimes is the case due to the fact hackers don’t have a big chance to test these viruses/Trojans out before they set them into the wild.  So there are always going to be unplanned problems associated with them.

After the first initial search of desktop, you should really know the likely hood of a possible virus getting on the system and later we will talk about counter measures to prevent virus attacks in the future.   There are a few places a hacker likes to put commands.   Hackers love to put in the Registry to run a program every time Windows starts.  It usually in:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\

Usually 50% to 70% of virus like to make sure the program to runs.  This is a flaw in Windows because hackers can edit this without much effort but there isn’t many places a hacker can go to make sure a program is set to run when you boot.   So this is also a benifit to finding those little programs.

Now just like the Regisitry, Hackers also like to put programs in a few areas on the hard drive.   This is also kinda hard to hide because most of the time these are consider important to the system but if you know what to look for you can pretty much figure out if it is truelly a system file.  These areas of the hard drive are:

  • C:\WINDOWS\System32[ad#ad2-right]
  • C:\WINDOWS
  • %programfiles%\common files\microsoft shared
  • %windir%\temp\

These are just a few but if you look hard enough it can be found most of the time.   Most of the time I use the registry to tell me where these programs are so I can do a further check of the program.  Some of this is not needed with some of the programs that I recommend but this is for those who want to be a through job and make sure the virus is gone.

On my next post we will talk about some good tools for the trade to help get rid of a virus/Trojan.  This little step here is used to  better help identify a virus and also give you chance to google each name on the list of registry and the hard drive  to see if you can identify the virus.

Backup your Mozzila Thunderbird profiles

So you have all this mail you want to back up in case something terrible happens to your hard drive.  So here is ways to backup your email and other programs in Vista.  I think Vista has a new way of keeping program profiles in an hierarchical setup.  So what is the HIDDEN directory it is:

[ad]

C:\Users\[USER]\AppData\Roaming\Thunderbird\Profiles

Now as you can see your Thunderbird profile is in a hidden directory in the AppData Directory.  You can easily get to the hidden directory by typing %appdata% {enter} in the search bar of Vista.  Now How do you backup and restore.   The program I use to backup is GoodSync I send the data to the cloud and when I need it I can restore it back to the directory. Now what about restoring, if you have to do a complete re-install of Thunderbird you can always copy over the back up to the Thunderbird Profiles directory and install Mozilla Thunder bird and it should see it.   If by chance you load up Thunderbird and you have to re add everything you would have to delete everything in that directory and then restore from the back up.

It is also a good idea to backup all the roaming directory from time to time.  This way you have every important program needed in case of a problem with your drive.    These are just a few tips and tricks to keep your data safe from having problems in the long run.

[ad]