Category Archives: Linux-Mint

Yet another way to get the IP address of a host and print it. And other useful networking commands.

This is a good way to get the IP address of a host and print it to the terminal.

homer@deusexmachina ~ $ host | awk '/ has address / { print $4 }' | cut -d " " -f14-

This is a very useful one liner for getting an IP address.

Very useful awk tips:

The finger command shows information about users that are logged into a machine.

homer@deusexmachina ~/Documents $ finger -lmps
Login: homer                            Name: John Cartwright
Directory: /home/homer                  Shell: /bin/bash
On since Tue Apr 15 09:29 (EST) on tty8 from :0
    2 hours 2 minutes idle
On since Tue Apr 15 09:49 (EST) on pts/0 from :0.0
   1 hour 1 minute idle
On since Tue Apr 15 11:30 (EST) on pts/1 from
   6 seconds idle
No mail.

The who am i command shows information about your user. I am logged into my machine over SSH so it shows the hostname of my current ISP.

homer@deusexmachina ~/Documents $ who am i
homer    pts/1        2014-04-15 11:30 (

Display the routing table with the ip route command.

homer@deusexmachina ~/Documents $ ip route
default via dev eth0  proto static dev eth0  proto kernel  scope link  src  metric 1 dev virbr0  proto kernel  scope link  src

Another way to show the routing table. Use the arp -a command.

homer@deusexmachina ~/Documents $ arp -a
? ( at 84:c9:b2:bd:c2:e7 [ether] on eth0

Yet another way to show the routing table on Linux.

homer@deusexmachina ~/Documents $ route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
default         UG    0      0        0 eth0     *        U     1      0        0 eth0   *        U     0      0        0 virbr0

Windows XP support has ended. This is time to update to a better operating system.

Windows XP support has ended.

Windows XP support has ended.

Support for Windows XP has ended, this means that there will be no further updates for Windows XP on the desktop. This is a good time to upgrade either to Windows 7, which is supported until 2020; or to use Linux Mint and enjoy a faster and more reliable desktop operating system. I am using Linux Mint 16, I have Windows 7 Ultimate running in a KVM Hypervisor Window with Firefox nightly, this is a good way to use Windows and Linux at the same time. This way, if the Windows installation clogs up I still have the ability to re-build the VM in short order and be up and running with Windows apps. But Linux has quite a few useful applications that make it a good desktop choice. I am downloading the ATI video drivers within the VM, I am intending to test if the accelerated video drivers will work in a KVM Hypervisor. That will be very interesting. Windows XP has had three service packs applied and it still is not as secure as Linux. But if you run as an unprivileged user and not with an Administrator account, it will be more secure than the default. Although you really should install something more recent if you want worthwhile security. You could even use Windows Server 2012 R2 build 9600 as a desktop operating system and that would be very secure indeed. That build has the new Modern UI shortcut button. Windows 7 is very secure, I like to run as a normal user and UAC takes care of authenticating me when I need the Administrator password.

But Microsoft might get over their tablet and phone obsession and create an operating system for the PC again, with a Windows 7 styled interface. That would be very good for PC users. Tablets are cool, but you cannot program and build a game on one. Developing a map for Goat Simulator is easy on PC when you are using Unrealed 3.0, but not practical on a tablet. That is why we still have PCs to game on and run Hypervisors. I managed to get Spice working with my KVM Hypervisor, I can run Windows 7 at 1600*900 in a window and the performance is very good indeed. After installing 2.4 gigabytes of updates onto my Windows 7 VM it is now working very well. I just installed Firefox Nightly to browse with. The new Chrome layout is quite strange, but it is still usable. I doubt that the new Firefox will work on Windows XP. That operating system is fast and usable, but not very trustworthy these days. Better to upgrade to Mint and enjoy a faster and more reliable desktop with better hardware support. Read more about your options for upgrading here: There are many options out there.

How to encrypt a file with gpg on Linux and then decrypt it later.

The gpg utility for Linux is used to create public and private key pairs to encrypt files for secure transmission over the Internet.

To initialize this utility; run this command.

homer@deusexmachina ~ $ gpg --gen-key
gpg (GnuPG) 1.4.14; Copyright (C) 2013 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: directory `/home/homer/.gnupg' created
gpg: new configuration file `/home/homer/.gnupg/gpg.conf' created
gpg: WARNING: options in `/home/homer/.gnupg/gpg.conf' are not yet active during this run
gpg: keyring `/home/homer/.gnupg/secring.gpg' created
gpg: keyring `/home/homer/.gnupg/pubring.gpg' created
Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096
Requested keysize is 4096 bits
Please specify how long the key should be valid.
         0 = key does not expire
        = key expires in n days
      w = key expires in n weeks
      m = key expires in n months
      y = key expires in n years
Key is valid for? (0) 4y
Key expires at Mon 02 Apr 2018 19:14:45 EST
Is this correct? (y/N) y

You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and E-mail Address in this form:
    "Heinrich Heine (Der Dichter) [email protected]>"

Real name: John Cartwright
E-mail address:
Not a valid e-mail address
E-mail address: [email protected]
You selected this USER-ID:
    "John Cartwright <[email protected]>"

Change (N)ame, (C)omment, (E)-mail or (O)kay/(Q)uit? O
You need a Passphrase to protect your secret key.

We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, use the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.

Not enough random bytes available.  Please do some other work to give
the OS a chance to collect more entropy!  (Need 235 more bytes)
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, use the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: /home/homer/.gnupg/trustdb.gpg: trustdb created
gpg: key DBEF7849 marked as ultimately trusted
public and secret key created and signed.

gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2018-04-02
pub   4096R/DBEF7849 2014-04-03 [expires: 2018-04-02]
      Key fingerprint = 6668 2347 5ADF 7577 F09C  B7BF 8B1F 1877 DBEF 7849
uid                  John Cartwright <[email protected]>
sub   4096R/7ED8DC5A 2014-04-03 [expires: 2018-04-02]

Then you may encrypt a file using your keys.

homer@deusexmachina ~/Documents $ gpg --encrypt-file doom02.png 
You did not specify a user ID. (you may use "-r")

Current recipients:

Enter the user ID.  End with an empty line: John Cartwright

Current recipients:
4096R/7ED8DC5A 2014-04-03 "John Cartwright <[email protected]>"

Now we have two files, the original and an encrypted file. This is using 4096 bit RSA encryption, so this would be extremely hard to break.

homer@deusexmachina ~/Documents $ ls -hula doom02*
-rw-r--r-- 1 homer homer 3.0M Apr  3 20:37 doom02.png
-rw-r--r-- 1 homer homer 3.0M Apr  3 20:37 doom02.png.gpg

Now use this command to decrypt the file.

homer@deusexmachina ~/Documents $ gpg --decrypt-file doom02.png.gpg 

You need a passphrase to unlock the secret key for
user: "John Cartwright <[email protected]>"
4096-bit RSA key, ID 7ED8DC5A, created 2014-04-03 (main key ID DBEF7849)

gpg: encrypted with 4096-bit RSA key, ID 7ED8DC5A, created 2014-04-03
      "John Cartwright <johncartwright3[email protected]>"
File `doom02.png' exists. Overwrite? (y/N) y

That is how simple this is. You need a lot of computer activity to generate some entropy, I just played Community Chest 4 MAP32 “Mutare”, that did the job.

Using the tar command on Linux to uncompress tar.gz files with the command line.

The tar command on Linux is very useful for uncompressing files on your Linux machine. The most used command on a Linux system is uncompressing files that you have downloaded from an Internet source.

The tar -xvf command will uncompress a tar.gz file.

~$ tar -xvf myfile.tar.gz

To uncompress a tar.bz2 file use this command.

~$ tar -jxvf myfile.tar.bz2

Here is an example.

mint@mint ~/Downloads $ tar -jxvf libdvdcss-1.2.13.tar.bz2 

To create a tar.gz archive of a directory and its contents, use this command: tar -zcvf archive.tar.gz dir/

mint@mint ~/Downloads $ tar -zcvf mine.tar.gz mine/

To uncompress to a specific directory, use the uncompress command with the -C parameter. Here I am uncompressing the archive to /tmp.

mint@mint ~/Downloads $ tar -xvf mine.tar.gz -C /tmp/

To list the contents of a tar.gz file; use this command.

mint@mint ~/Downloads $ tar -tvf mine.tar.gz
drwxr-xr-x mint/mint         0 2014-02-18 01:24 mine/
-rw-r--r-- mint/mint      8552 2014-02-18 01:24 mine/mylist.txt
-rw-r--r-- mint/mint         0 2014-02-18 01:24 mine/my.txt

For a tar.bz2 file; you would use this command.

mint@mint ~/Downloads $ tar -jtvf mine.tar.bz2
drwxr-xr-x mint/mint         0 2014-02-18 01:24 mine/
-rw-r--r-- mint/mint      8552 2014-02-18 01:24 mine/mylist.txt
-rw-r--r-- mint/mint         0 2014-02-18 01:24 mine/my.txt

An alternative to CPU-Z for your Ubuntu or Linux Mint desktop. This utility is awesome.

A very good CPU-Z alternative for a Linux machine.

Screenshot I-Nex CPU info.

Screenshot I-Nex CPU info.

This awesome utility for Linux is an alternative to the CPU-Z program for Windows machines. This allows the user to gather information about their computer with a nice tabbed interface. There is a tab to gather system/OS information as well as CPU statistics. This is very useful for testing out a new computer with Linux installed to see what hardware you have installed.

The tabs are:

  • CPU;
  • GPU;
  • Motherboard;
  • Audio;
  • Drives;
  • System;
  • Kernel;
  • Memory;
  • Network;
  • USB Input;

So, this is quite a comprehensive system information application. This allows the computer user to gather a lot of information about your Linux computer.

We need to add Gambas3 PPA to install I-Nex in Ubuntu and Linux Mint. Use the commands listed below to add both PPAs and install I-Nex in Ubuntu and Linux Mint.

homer@deusexmachina ~ $ sudo add-apt-repository ppa:i-nex-development-team/stable
homer@deusexmachina ~ $ sudo add-apt-repository ppa:nemh/gambas3
homer@deusexmachina ~ $ sudo apt-get update
homer@deusexmachina ~ $ sudo apt-get install i-nex

Then type i-nex in a terminal or look for it under the System Tools menu.

Screenshot I-Nex System information.

Screenshot I-Nex System information.

How to find out which rpm package provides a file that you need.

How to find out what rpm package provides a file that you need.

The yum provides command is useful for finding out this information. You may use wildcards to search for a file, this can make finding it easier.

[homer@localhost jackhammer]$ yum provides */redhat**.jpg
Loaded plugins: langpacks
nagios-3.5.1-4.fc20.x86_64 : Nagios monitors hosts and services and yells if somethings breaks
Repo        : fedora
Matched from:
Filename    : /usr/share/nagios/html/images/logos/redhat.jpg

stardict-3.0.4-7.fc20.x86_64 : A powerful dictionary platform written in GTK+2
Repo        : fedora
Matched from:
Filename    : /usr/share/stardict/dic/stardict-dict/res/redhat_logo.jpg

Here is another example.

[homer@localhost ~]$ yum provides */
Loaded plugins: langpacks
glibc-2.18-11.fc20.i686 : The GNU libc libraries
Repo        : fedora
Matched from:
Filename    : /lib/

glibc-2.18-12.fc20.i686 : The GNU libc libraries
Repo        : updates
Matched from:
Filename    : /lib/

This is another way to search the rpm database for certain packages.

[homer@localhost ~]$ yum search redhat
Loaded plugins: langpacks
======================================================= N/S matched: redhat =======================================================
publican-redhat.noarch : Common documentation files for RedHat
perl-CPANPLUS-Dist-Fedora.noarch : CPANPLUS backend to build Fedora/RedHat RPMs
pybugz.noarch : Command line interface for Bugzilla written in Python
python-rhsm.x86_64 : A Python library to communicate with a Red Hat Unified Entitlement Platform
redhat-lsb.i686 : Implementation of Linux Standard Base specification
redhat-lsb.x86_64 : Implementation of Linux Standard Base specification
redhat-lsb-core.i686 : LSB Core module support
redhat-lsb-core.x86_64 : LSB Core module support
redhat-lsb-cxx.i686 : LSB CXX module support
redhat-lsb-cxx.x86_64 : LSB CXX module support
redhat-lsb-desktop.i686 : LSB Desktop module support
redhat-lsb-desktop.x86_64 : LSB Desktop module support
redhat-lsb-languages.i686 : LSB Languages module support
redhat-lsb-languages.x86_64 : LSB Languages module support
redhat-lsb-printing.i686 : LSB Printing module support
redhat-lsb-printing.x86_64 : LSB Printing module support
redhat-lsb-submod-multimedia.i686 : LSB Multimedia submodule support
redhat-lsb-submod-multimedia.x86_64 : LSB Multimedia submodule support
redhat-lsb-submod-security.i686 : LSB Security submodule support
redhat-lsb-submod-security.x86_64 : LSB Security submodule support
redhat-lsb-supplemental.x86_64 : LSB supplemental dependencies required by LSB certification tests
redhat-lsb-trialuse.i686 : LSB Trialuse module support
redhat-lsb-trialuse.x86_64 : LSB Trialuse module support
redhat-menus.noarch : Configuration and data files for the desktop menus
redhat-rpm-config.noarch : Red Hat specific rpm configuration files
rhn-client-tools.noarch : Support programs and libraries for Red Hat Satellite or Spacewalk
rhnsd.x86_64 : Spacewalk query daemon
yum-rhn-plugin.noarch : Spacewalk support for yum

  Name and summary matches only, use "search all" for everything.

There is also the yum search all command that allows full searching of all rpm packages.

[homer@localhost ~]$ yum search all ssh-client
Loaded plugins: langpacks
==================================================== Matched: ssh-client ====================================================
gsi-openssh.x86_64 : An implementation of the SSH protocol with GSI authentication
gsi-openssh-clients.x86_64 : SSH client applications with GSI authentication
openssh.x86_64 : An open source implementation of SSH protocol versions 1 and 2
openssh-clients.x86_64 : An open source SSH client applications

These commands make finding files on your Fedora Linux machine even easier than before.

Using iptables on a Linux system to secure your computer against Internet threats. This is important.

South Park computer guy.

South Park computer guy.

securing your Linux computer with iptables is a great way to make sure that you are safer from Internet attacks. The iptables(8) system is the built in firewall for a Linux system. This makes it very easy to secure your computer.

Before you change any settings, backup your iptables configuration.

iptables-save > backup.conf

if the iptables configuration goes awry, you may restore the iptables configuration this way.

iptables-restore backup.conf

Or this command, this will restore the default iptables configuration.

iptables -F

Blocking incoming ICMP ping requests is accomplished with this iptables command.

iptables -A INPUT --proto icmp --icmp-type 0 -j DROP

If not, go straight to these:

iptables -A INPUT --proto icmp -j ACCEPT
iptables -A INPUT --proto udp --sport 53 -j ACCEPT
iptables -A INPUT --proto udp --dport 67 -j ACCEPT
iptables -A INPUT --proto udp --dport 68 -j ACCEPT
iptables -A INPUT --proto tcp --dport 22 -s -j ACCEPT
iptables -A INPUT --proto tcp --dport 22 -j DROP

Here is some more useful iptables stuff.

# Flush all existent rules
iptables -F
iptables -X

# Allow unlimited traffic on loopback
iptables -A INPUT -i lo -j ACCEPT
iptables -A OUTPUT -o lo -j ACCEPT

# Allow established,related into eth0
iptables -A INPUT -i eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT

# Allow DNS in
iptables -A INPUT -p udp -i eth0 --sport 53 -j ACCEPT

# Some router stuff that might be necessary for DHCP
# iptables -A INPUT --proto icmp -j ACCEPT
# iptables -A INPUT --proto udp --sport 53 -j ACCEPT
# iptables -A INPUT --proto udp --dport 67 -j ACCEPT
# iptables -A INPUT --proto udp --dport 68 -j ACCEPT

# Accept everything out

# Drop everything else
iptables -P FORWARD DROP
iptables -P INPUT DROP

Read more about iptables before using it.

It’s a set of commands that, when issued, change the rules on the iptables firewall. You can either issue them one by one via a terminal or same it as a file, run chmod +x my_file so it can be executed, and then execute it so you don’t have to run each command one by one.

Here is how to create a script to do all of this in one go.

echo "iptables -A INPUT --proto icmp -j ACCEPT" < iptset
echo "iptables -A INPUT --proto udp --sport 53 -j ACCEPT" << iptset
echo "iptables -A INPUT --proto udp --dport 67 -j ACCEPT" << iptset
echo "iptables -A INPUT --proto udp --dport 68 -j ACCEPT" << iptset
echo "iptables -A INPUT --proto tcp --dport 22 -s -j ACCEPT" << iptset
echo "iptables -A INPUT --proto tcp --dport 22 -j DROP" << iptset
chmod +x iptset
mv iptset /usr/bin/iptset

This will help keep your computer secure.

Here I am putting these commands into my Linux Mint 16 laptop.

deusexmachina ~ # iptables -A INPUT --proto icmp -j ACCEPT
deusexmachina ~ # iptables -A INPUT --proto udp --sport 53 -j ACCEPT
deusexmachina ~ # iptables -A INPUT --proto udp --dport 67 -j ACCEPT
deusexmachina ~ # iptables -A INPUT --proto udp --dport 68 -j ACCEPT
deusexmachina ~ # iptables -A INPUT --proto tcp --dport 22 -s -j ACCEPT
deusexmachina ~ # iptables -A INPUT --proto tcp --dport 22 -j DROP

And checking the entries have been properly inserted, using the iptables-save command.

deusexmachina ~ # iptables-save
# Generated by iptables-save v1.4.18 on Fri Jan 31 22:03:08 2014
-A INPUT -p icmp -j ACCEPT
-A INPUT -p udp -m udp --sport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -p udp -m udp --dport 68 -j ACCEPT
-A INPUT -s -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j DROP
# Completed on Fri Jan 31 22:03:08 2014

How to disable the caps lock key permanently on Linux Mint and Ubuntu.

The caps lock key on Linux is very annoying when hit accidentally. Especially when you are typing a password. This simple command will disable the key permanently.

homer@deusexmachina ~ $ setxkbmap -option ctrl:nocaps

If you put this in Startup Applications which may be found under System-Preferences-Startup Applications, the caps lock key will be disabled when your Linux Mint MATE desktop loads up. This is a very good trick.

Edit Startup Programs.

Edit Startup Programs.

This way you will never be bothered by the caps lock key ever again.

A very good tiling window manager for Linux that is easy to use and very fast.

Dwm window manager. This is very good for a Linux laptop user.

Dwm window manager. This is very good for a Linux laptop user.

The dwm window manager for Linux is a very fast and very easy to use WM that offers a tiling WM and a very fast way to interact with your Linux machine. Type sudo apt-get install dwm dmenu to install this window manager. As shown in the screenshot to the right, this is a very slim and good looking WM. Just like Larswm and Awesome, this is a fast alternative to the MATE and KDE desktop environments. With the WM running, type Mod1-p to open a menu in the top bar. Then type the name of the program you wish to open, e.g xmms and hit enter. There are 9 desktops by default and you may have Firefox open on one desktop and xmms open on another. This makes your desktop more productive. There is a status program here: which will print the time to the status bar. Comment out the #include “dump.h” line before compiling though. But this does work. The ability to customize this window manager lifts it above the others. I am using it on Fedora 20 and it works perfectly. Give this a go and see what you think of it.

The best GTK themes and wallpapers for your Ubuntu or Linux Mint desktop.

Some very good GTK themes and wallpapers for your Linux desktop.

GTK Themes.

Zukitwo: A very good GTK theme for Gnome Shell and MATE.

DeLorean-Dark — Gnome 3.4 & 3.6:–+Gnome+3.4+%26+3.6?content=153866.


Pirate Ubuntu.

Piratunbu theme 6.0: A pirate themed look for Ubuntu.

reNIX (for Unity and GS): A squared theme for Unity and Gnome Shell.

Win2-7 Remix: A Windows 7 styled theme for Unity and Gnome.

Windows 7 styled Caja window.

Windows 7 styled Caja window.


Elements GTK theme.


Tri screen space wallpaper with mountains and lovely nebula:

Tri screen space wallpaper.

Tri screen milky way wallpaper:

Awesome nebula wallpaper with lovely green color:

Awesome green nebula.

Super high-resolution wallpaper of a castle in Scotland:

Scottish castle.

Quad screen wallpaper of Ayers Rock:

A Hong Kong wallpaper for 4 or more screens:

Hong Kong Panorama.

Tri screen everest panorama:

Everest panorama.

Skyrim Dawnstar wallpaper:

Skyrim Dawnstar.

Icon themes.

Plateau: A flat theme for MATE and Unity/Gnome Shell.

Just another Buuf Remix:

MacUltimateLeopard: A Mac OSX theme for Linux. Perfect for MATE.

How to search and replace text in a file with sed. Not using cat.

The sed command is very useful for searching and replacing text in a file. This is how to search for and replace a text string in a file.

Homer@bejiitas ~
$ sed -i 's/<main>/<mein>/gi;' my.c

This is how to search and replace text in a file and leave a backup copy with a tilde character appended to the file-name.

sed --in-place=~ 's/Australia/Austraya/gi;' au-WaggaWagga

This is the way to filter a text file with sed and output to STDOUT. Not using GNU cat. Just have the filename as the second argument to the cat command.

homer@deusexmachina ~/Documents $ sed 's/pacman/apt/gi;' blog.txt

And you may also pipe the output of a command into sed. This is useful for building a long command for the perfect shell function.

homer@deusexmachina ~/Documents $ echo "Hello World" | sed 's/World/Homer/gi;'
Hello Homer

You can also add line numbers to a text file. Here I am adding line numbers to a file that contains a list of IP addresses. I also added double hyphens to separate the line numbers from the IP addresses.

homer@deusexmachina ~/Documents $ awk -F, '{if($2=="") print NR " --", $0}' iplist.txt
1 -- 209.185.108
2 -- 209.185.253
3 -- 209.85.238
4 --
5 --
6 --
7 --
8 --
9 --
10 --
11 --
12 --
13 --
14 --
15 --
16 --
17 --
18 --
19 -- 216.239.46
20 --
21 --
22 --
23 --
24 --
25 --
26 --
27 --
28 --
29 --
30 --
31 -- 216.239.59.s 99
32 --

I found that solution here:

On another note; there is an interesting answer here: http://stacBut eh this explains how to convert an IP address to binary using the command line.

But the ipcalc command is best for this.

homer@deusexmachina ~ $ ipcalc
Address:          11000000.10101000.00000001. 00000001
Netmask: = 24   11111111.11111111.11111111. 00000000
Wildcard:            00000000.00000000.00000000. 11111111
Network:       11000000.10101000.00000001. 00000000
HostMin:          11000000.10101000.00000001. 00000001
HostMax:        11000000.10101000.00000001. 11111110
Broadcast:        11000000.10101000.00000001. 11111111
Hosts/Net: 254                   Class C, Private Internet

Alien Arena. A quality multiplayer game for Linux. Named after Quake 3 Arena.

Alien Arena. Good graphical quality.

Alien Arena. Good graphical quality.

I have just tried out the Alien Arena multiplayer game on Ubuntu. Running it with the default settings with my 1 Gigabyte ATI Radeon card and 6 Gigabytes of RAM, this was one enjoyable game. The focus of this shooter is multiplayer online action. Rather like another quality Linux game Corebreach. You can create your own servers and play against people online or join a game that is already running. The online games work very well, I joined an Instagib deathmatch game and it ran very well. I had 254 ping, but I was still able to score a few frags. The netcode is therefore top quality.

So type sudo apt-get install alien-arena and install this quality game. You will love it.

The music files are in ogg format. They may be found in this folder if you want to listen to them with Audacious.


Another Alien Arena screenshot.

Another Alien Arena screenshot.