Getting your fill of Security

 
 

Sent to you by l5g via Google Reader:

 
 

via Room362.com RSS Feed by Rob Fuller on 5/29/09

I recently posted a blog post to Exotic Liability's website with the same title, and I realized that it would make a great thing to post to here, and update regularly, or just put it on the wiki I keep saying that I get going here. Enough rambling, here is how you can get your fill of security:

Podcasting:
GetMon – http://www.getmon.com/ – This is a great site because you can download or listen to any of the security podcasts right from their site if you want to.
HackerMedia – http://www.hackermedia.org/ – They put together like podcasts into different categories, and they overlap. So if you want the "Linux" feed, you'll get podcast A, B, and C. But maybe podcast C does Linux security, so if you subscribe to the "Security" feed, you might get C, E, and G. You can also get the everything feed

Bloggers (RSS Feeds):
Security Bloggers Network – http://www.securitybloggers.net/ – A consolidated feed of a HUGE list of security blogs

Twitter:
Security Twits – http://www.security-twits.com/ – A long list of security related twitter accounts. From people to events, to companies.

Places to learn:
The Academy Pro – http://www.theacademypro.com/
Learn Security Online – http://www.learnsecurityonline.com/
Free IT Security Training – http://www.freeitsecuritytraining.com/
Virtual Training Environment by Carnegie Mellon – https://www.vte.cert.org/vteweb/

Challenge Sites and Sites that are OK to attack:
(Make sure you know which is which before you haul off and start attacking though)
(Most of these stolen from Chris Nickerson's reply to Show 17 Links blog post)

http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
http://testasp.acunetix.com/Default.asp
http://test.acunetix.com/
http://hackme.ntobjectives.com/
http://www.foundstone.com/us/resources/proddesc/hacmeshipping.htm
http://www.foundstone.com/us/resources/proddesc/hacmecasino.htm
http://www.foundstone.com/us/resources/proddesc/hacmebooks.htm
http://www.foundstone.com/us/resources/proddesc/hacmetravel.htm
http://lampsecurity.org/capture-the-flag-5
http://zero.webappsecurity.com/
http://www.hackertest.net/
http://www.hackthissite.org/
http://www.mavensecurity.com/WebMaven.php
http://ha.ckers.org/challenge/
http://ha.ckers.org/challenge2/
http://demo.testfire.net/
http://scanme.nmap.org/
http://www.hellboundhackers.org/
http://www.overthewire.org/wargames/
http://roothack.org/
http://heorot.net/
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately…
http://wocares.com/xsstester.php
https://how2hack.net
http://hax.tor.hu/
http://www.bright-shadows.net/
http://www.dareyourmind.net/
http://hackergames.net/
http://www.hackquest.com/
http://www.darkmindz.com/
http://www.caesum.com/game/
http://www.net-force.nl/
http://www.osix.net/
http://www.mibs-challenges.de/
http://projecteuler.net/
http://uva.onlinejudge.org/
http://ace.delos.com/usacogate

So now you have absolutely ZERO reason to have one moment of time on your hands ;-)
Know of another good resource? Post a comment.

UPDATE: ethicalhack3r from http://www.ethicalhack3r.co.uk pointed me to his project called "Damn Vulnerable Web App". You can find it on Sourceforge here: http://sourceforge.net/projects/dvwa/

Related posts:

  1. Offensive Security Certified Professional I recently obtained the status Offensive Security Certified Professional. It...
  2. Getting your fill of Reverse Engineering and Malware Analysis Matt, from the Exotic Liability forums, posed a suggestion for...
  3. SBN move to Lijit Alan posted this about the SBN: Well there is not...


 
 

Things you can do from here:

 
 

Getting your fill of Reverse Engineering and Malware Analysis

 
 

Sent to you by l5g via Google Reader:

 
 

via Room362.com RSS Feed by Rob Fuller on 6/12/09

Matt, from the Exotic Liability forums, posed a suggestion for a episode: "Getting started [in] reverse engineering hardware drivers?". I thought this was an interesting topic to attack so, I dug a bit into my RSS feed pile of goo and compiled this list of links. Hope this helps Matt.

Individuals —

Skywing – http://www.nynaeve.net/
Egypt – http://0xegypt.blogspot.com/
Yoni – http://blogs.msdn.com/michael_howard/
Raymond Chen – http://blogs.msdn.com/oldnewthing/
Sia0 – http://blogs.msdn.com/michkap/
Rob P – http://geekswithblogs.net/robp/Default.aspx
Quantam – http://qstuff.blogspot.com/
Phn1x – http://hamsterswheel.com/techblog/
Halavar Flake – http://addxorrol.blogspot.com/
Pedram – http://pedram.redhive.com/blog
Tyler Shields – http://www.donkeyonawaffle.org/
Wesley Shields – http://www.atarininja.org/
Peter Wieland – http://blogs.msdn.com/peterwie/
Michael Howard – http://blogs.msdn.com/michael_howard/
Doron Holan – http://blogs.msdn.com/doronh/
Nico Waisman – http://eticanicomana.blogspot.com/
Dmitry Vostokov – http://www.dumpanalysis.org/blog/
Nicolas Sylvain – http://nsylvain.blogspot.com/
Alex Ionescu – http://www.alex-ionescu.com/
Mattheiu Suiche – http://www.msuiche.net/
Larry Osterman – http://blogs.msdn.com/larryosterman/
Koby Kahane – http://kobyk.wordpress.com/
Jason Geffner – http://malwareanalysis.com/communityserver/blogs/geffner/default.aspx
Ero Carrera – http://blog.dkbza.org/
Dino Dai Zovi – http://blog.trailofbits.com/
Ilja – http://blogs.23.nu/ilja/
Nate Lawson – http://rdist.root.org/
Mark Russinovich – http://blogs.technet.com/markrussinovich/
Jose Nazario – http://www.wormblog.com/
Jonathan Morrison – http://blogs.msdn.com/itgoestoeleven/
John Robbins – http://www.wintellect.com/cs/blogs/jrobbins/default.aspx
Ilias Tsigkogiannis – http://blogs.msdn.com/iliast/
Daniel Reynaud – http://indefinitestudies.org/
Joanna Rutkowska – http://theinvisiblethings.blogspot.com/
Matthieu Kaczmarek – http://www.loria.fr/~kaczmare/index.en.htm
Silvio Cesare – http://silviocesare.wordpress.com/
Philippe Beaucamps – http://www.loria.fr/~beaucphi/
Debugging Toolbox – http://blogs.msdn.com/debuggingtoolbox/

Fravia's saved works (RIP) – http://www.woodmann.com/fravia/index.htm

Groups —

Offensive Computing – http://www.offensivecomputing.net/
The Cover of Night – http://www.thecoverofnight.com/blog/
LHS – http://lhs.loria.fr/
NT Debugging – http://blogs.msdn.com/ntdebugging/
Hex Blog – http://www.hexblog.com/
Engineering for Fun – http://blog.engineeringforfun.com/

Company —

OpenRCE – http://www.openrce.org/articles/
DV Labs – http://dvlabs.tippingpoint.com/blog/
Matasano – http://www.matasano.com/log/
VeraCode – http://www.veracode.com/blog/
Trend Micro – http://blog.trendmicro.com/

Forums —

Reverse Engineering – http://community.reverse-engineering.net/index.php
OpenRCE – http://www.openrce.org/forums/
Assembly Forums – http://www.asmcommunity.net/board/

Sandboxing and Analysis —

Joe Box – http://www.joebox.org/
Virus Total – http://www.virustotal.com/
Wepawet – http://wepawet.cs.ucsb.edu/
F-Secure -http://www.f-secure.com/en_US/security/security-lab/
Anubis – http://anubis.iseclab.org/
Jotti – http://virusscan.jotti.org/en
Sunbelt CWSandbox – http://www.sunbeltsecurity.com/Submit.aspx?type=cwsandbox&cs=A41CD150B37359889A553671CBFD2360

Misc —

Code Breakers Journal – http://www.codebreakers-journal.com/
The Art of Assembly – http://webster.cs.ucr.edu/AoA/DOS/AoADosIndex.html
Intel Processor Instruction Set A-M/N-Z – http://www.intel.com/products/processor/manuals/
WASM.ru with translation – http://66.196.80.202/babelfish/translate_url_content?lp=ru_en&url=http://www.wasm.ru&.intl=us

Related posts:

  1. Getting your fill of Security I recently posted a blog post to Exotic Liability's website...
  2. Runtime Packers – hold the cheese So we are taking a short break from my...
  3. DEFCON 16: The Tools not the Toools Originally posted to the Zero Day blog on Ziff Davis:...


 
 

Things you can do from here:

 
 

白眉大侠 paimei 在python 2.6 下的安装使用

http://code.google.com/p/paimei/  更新的比较少了 issue中有人共享了一些patch 


有个依赖 pydasm http://dkbza.org/pydasm.html 
决定对python 2.6 编译一个pydasm.pyd 
metasploit的cygwin环境不全 

chrome 切换代理

chrome使用的是ie的代理设置,切换代理  用python写了段代码 

一般用两个代理 gapproxy 使用的是 http代理 
另一个 ssh tunnel

#!/usr/bin/env python
#-*- coding:utf-8 -*-

import sys
from _winreg import *

subkey = "Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings"

def usage():
    print " 0 exit"
    print " 1 no proxy"
    print " 2 1080"
    print " 3 8000"
    

if __name__ == '__main__':
    key = OpenKey(HKEY_CURRENT_USER, subkey, 0, KEY_ALL_ACCESS)
    print QueryValueEx(key, "ProxyServer")

    proxyEnable = 1#"00000001"
    proxyServer = "socks=127.0.0.1:1080"

    usage()
    c = int(input("input command 0/1/2/3: "))
    while(c != 0):
        if c == 1:
            proxyEnable = 0 # "00000000"            
        elif c == 2:
            proxyEnable = 1 #"00000001"
            proxyServer = "socks=127.0.0.1:1080"
        elif c == 3:
            proxyEnable = 1 #"00000001"
            proxyServer = "http=127.0.0.1:8000"

        SetValueEx(key, "ProxyEnable", 0, REG_DWORD, proxyEnable)
        SetValueEx(key, "ProxyServer", 0, REG_SZ, proxyServer)

        print "Current State:"
        print "   ", QueryValueEx(key, "ProxyEnable")
        print "   ", QueryValueEx(key, "ProxyServer")

        c = int(input("Input command 0/1/2/3: "))

    CloseKey(key)

关于chrome屏蔽广告

这里只讨论编写chrome上的插件,不考虑hosts,代理之类的


 由于chrome现在还不支持 content policy 所以只能 隐藏广告,而不能阻止广告文件的下载


相关资料

Intel Math Kernel Library

Intel Math Kernel Library 


有一个python包装  PyIMSL Studio http://www.vni.com/ 
方便快速模型开发 检验 统一的算法 

go 语言看起来不错

结构上很像pascal 语法上也很像,有net 的package , 与c语言相比 有 GC 字符串处理更方便等 还有一个噱头是多核

以后有时间了仔细看看 

ncat 与 netcat

http://junker.org/~tkh16/ncat-for-netcat-users.php


ncat是nmap 5带的 增加了不少功能 值得用一下

Some of the new features in Ncat compared to the original Netcat are:

  • IPv6 support
  • SSL support
  • Proxy support (both using a proxy and acting as one!)
  • Ability to chain Ncat's together
  • Ability to specify specific hosts to allow or deny access to in listen mode
  • Connection brokering

windows 自启动位置 列表

http://pentestit.com/2009/09/27/windows-auto-start-locations/


We have tried to find their Windows Vista entries too. Windows 7, we don't know yet. Now, some might not work on all platforms. They might not work on Windows 98, 95, ME, etc. as they are not Windows NT bases and the NT's work differently. Some will also work without any registry key manipulation.

We have maintained a few known abbreviations just to shorten the post. They are as follows:
HKLM : HKEY_LOCAL_MACHINE
HKCU : HKEY_CURRENT_USER
HKCR : HKEY_CLASSES_ROOT
%windir% : The Windows Directory. Can be C:Windows or C:WINNT or anything, depending on thelocation, the OS & the customization of the OS!
%USERPROFILE% : Normally is C:Documents and Settings, depending on the installation location.
%ALLUSERSPROFILE% : Normally is C:Documents and SettingsAll Users, depending on the installation location.

Please keep in mind that the Windows registry is very sensitive and you should fiddle with it only if you know how to get out of it! We should not be held responsible for any harm coming out of their usage!

Beginning with registry methods:

1. HKLMSystemCurrentControlSetControlTerminal ServerWdsrdpwdStartupPrograms
2. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonAppSetup
3. HKLMSoftwarePoliciesMicrosoftWindowsSystemScriptsStartup
4. HKCUSoftwarePoliciesMicrosoftWindowsSystemScriptsLogon
5. HKLMSoftwarePoliciesMicrosoftWindowsSystemScriptsLogon
6. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit
7. HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystemShell
8. HKCUSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell
9. HKLMSoftwareMicrosoftWindowsCurrentVersionPoliciesSystemShell
10. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell
11. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonTaskman
12. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRunonce
13. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRunonceEx
14. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRun
15. HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun
16. HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunOnceEx
17. HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunOnce
18. HKCUSoftwareMicrosoftWindows NTCurrentVersionWindowsLoad
19. HKCUSoftwareMicrosoftWindows NTCurrentVersionWindowsRun
20. HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRun
21. HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun
22. HKCUSoftwareMicrosoftWindowsCurrentVersionRun
23. HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce
24. HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnceSetup
25. HKCUSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRunonce
26. HKCUSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRunonceEx
27. HKCUSOFTWAREMicrosoftWindows NTCurrentVersionTerminal ServerInstallSoftwareMicrosoftWindowsCurrentVersionRun
28. HKLMSOFTWAREClassesProtocolsFilter
29. HKLMSOFTWAREClassesProtocolsHandler
30. HKCUSOFTWAREMicrosoftInternet ExplorerDesktopComponents
31. HKLMSOFTWAREMicrosoftActive SetupInstalled Components
32. HKCUSOFTWAREMicrosoftActive SetupInstalled Components
33. HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerSharedTaskScheduler
34. HKLMSOFTWAREMicrosoftWindowsCurrentVersionShellServiceObjectDelayLoad
35. HKCUSOFTWAREMicrosoftWindowsCurrentVersionShellServiceObjectDelayLoad
36. HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks
37. HKCUSoftwareClasses*ShellExContextMenuHandlers
38. HKLMSoftwareClasses*ShellExContextMenuHandlers
39. HKCUSoftwareClassesAllFileSystemObjectsShellExContextMenuHandlers
40. HKLMSoftwareClassesAllFileSystemObjectsShellExContextMenuHandlers
41. HKCUSoftwareClassesFolderShellExContextMenuHandlers
42. HKLMSoftwareClassesFolderShellExContextMenuHandlers
43. HKCUSoftwareClassesDirectoryShellExContextMenuHandlers
44. HKLMSoftwareClassesDirectoryShellExContextMenuHandlers
45. HKCUSoftwareClassesDirectoryBackgroundShellExContextMenuHandlers
46. HKLMSoftwareClassesDirectoryBackgroundShellExContextMenuHandlers
47. HKCUSoftwareClassesFolderShellexColumnHandlers
48. HKLMSoftwareClassesFolderShellexColumnHandlers
49. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerShellIconOverlayIdentifiers
50. HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerShellIconOverlayIdentifiers
51. HKCUSoftwareMicrosoftCtfLangBarAddin
52. HKLMSoftwareMicrosoftCtfLangBarAddin
53. HKCUSoftwareMicrosoftWindowsCurrentVersionShell ExtensionsApproved
54. HKLMSoftwareMicrosoftWindowsCurrentVersionShell ExtensionsApproved
55. HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects
56. HKCUSoftwareMicrosoftInternet ExplorerUrlSearchHooks
57. HKLMSoftwareMicrosoftInternet ExplorerToolbar
58. HKCUSoftwareMicrosoftInternet ExplorerExplorer Bars
59. HKLMSoftwareMicrosoftInternet ExplorerExplorer Bars
60. HKCUSoftwareMicrosoftInternet ExplorerExtensions
61. HKLMSoftwareMicrosoftInternet ExplorerExtensions
62. HKLMSystemCurrentControlSetServices
63. HKLMSystemCurrentControlSetServices
64. HKLMSystemCurrentControlSetControlSession ManagerBootExecute
65. HKLMSystemCurrentControlSetControlSession ManagerSetupExecute
66. HKLMSystemCurrentControlSetControlSession ManagerExecute
67. HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
68. HKLMSoftwareMicrosoftCommand ProcessorAutorun
69. HKCUSoftwareMicrosoftCommand ProcessorAutorun
70. HKLMSOFTWAREClassesExefileShellOpenCommand(Default)
71. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWindowsAppinit_Dlls
72. HKLMSystemCurrentControlSetControlSession ManagerKnownDlls
73. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSystem
74. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUIHost
75. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotify
76. HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonGinaDLL
77. HKCUControl PanelDesktopScrnsave.exe
78. HKLMSystemCurrentControlSetControlBootVerificationProgramImagePath
79. HKLMSystemCurrentControlSetServicesWinSock2ParametersProtocol_Catalog9
80. HKLMSYSTEMCurrentControlSetControlPrintMonitors
81. HKLMSYSTEMCurrentControlSetControlSecurityProvidersSecurityProviders
82. HKLMSYSTEMCurrentControlSetControlLsaAuthentication Packages
83. HKLMSYSTEMCurrentControlSetControlLsaNotification Packages
84. HKLMSYSTEMCurrentControlSetControlLsaSecurity Packages
85. HKLMSYSTEMCurrentControlSetControlNetworkProviderOrder
86. HKCUSoftwareMicrosoftWindows NTCurrentVersionWindowsload
87. HKCRbatfileshellopencommand @=""%1" %*"
88. HKCRcomfileshellopencommand @=""%1" %*"
89. HKCRexefileshellopencommand @=""%1" %*"
90. HKCRhtafileShellOpenCommand @=""%1" %*"
91. HKCRpiffileshellopencommand @=""%1" %*"
92. HKLMSoftwareClassesbatfileshellopencommand
93. HKLMSoftwareClassescomfileshellopencommand
94. HKLMSoftwareClassesexefileshellopencommand
95. HKLMSoftwareClasseshtafileshellopencommand
96. HKLMSoftwareClassespiffileshellopencommand
97. HKLMSystemCurrentControlSetControlClass{4D36E96B-E325-11CE-BFC1-08002BE10318}UpperFilters
98. HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonVmApplet
99. HKLMSoftwareMicrosoftWindows NTCurrentVersionInitFileMapping
100. HKLMSoftwareMicrosoftWindows NTCurrentVersionAedebug
101. HKLMSoftwareClassesCLSID{CLSID}Implemented Categories{00021493-0000-0000-C000-000000000046}
102. HKLMSoftwareClassesCLSID{CLSID}Implemented Categories{00021494-0000-0000-C000-000000000046}
103. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.batApplication
104. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.cmdApplication
105. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.comApplication
106. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.exeApplication
107. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.htaApplication
108. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.pifApplication
109. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.scrApplication
110. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.batProgID
111. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.cmdProgID
112. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.comProgID
113. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.exeProgID
114. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.htaProgID
115. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.pifProgID
116. HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerFileExts.scrProgID
117. HKLMSoftwareCLASSESbatfileshellopencommand @=""%1" %*"
118. HKLMSoftwareCLASSEScomfileshellopencommand @=""%1" %*"
119. HKLMSoftwareCLASSESexefileshellopencommand @=""%1" %*"
120. HKLMSoftwareCLASSEShtafileShellOpenCommand @=""%1" %*"
121. HKLMSoftwareCLASSESpiffileshellopencommand @=""%1" %*"
122. HKCRvbsfileshellopencommand
123. HKCRvbefileshellopencommand
124. HKCRjsfileshellopencommand
125. HKCRjsefileshellopencommand
126. HKCRwshfileshellopencommand
127. HKCRwsffileshellopencommand
128. HKCRscrfileshellopencommand
129. HKLMSoftwareMicrosoftActive SetupInstalled ComponentsKeyName
StubPath=C:PathToFileFilename.exe

Now, we will start with folder auto start locations.
%ALLUSERSPROFILE%Start MenuProgramsStartup
%USERPROFILE%Start MenuProgramsStartup
%windir%Tasks
%windir%System32Tasks - Windows Vista
%ALLUSERSPROFILE%MicrosoftWindowsStart MenuProgramsStartup
%USERPROFILE%AppDataRoamingMicrosoftWindowsStart MenuProgramsStartup

In addition to this, there are some more files which when added an entry, will restart the file.
win.ini:
[windows]
load=file.exe

OR

[windows]
run=file.exe

system.ini:
[boot]
Shell=Explorer.exe file.exe

windirdosstart.bat (Windows 95 or Windows 98 only)
windirsystemautoexec.nt
windirsystemconfig.nt

还有个GSL - GNU Scientific Library

http://www.gnu.org/software/gsl/


Introduction

The GNU Scientific Library (GSL) is a numerical library for C and C++ programmers. It is free software under the GNU General Public License.

The library provides a wide range of mathematical routines such as random number generators, special functions and least-squares fitting. There are over 1000 functions in total with an extensive test suite.

The complete range of subject areas covered by the library includes,

Complex NumbersRoots of Polynomials
Special FunctionsVectors and Matrices
PermutationsSorting
BLAS SupportLinear Algebra
EigensystemsFast Fourier Transforms
QuadratureRandom Numbers
Quasi-Random SequencesRandom Distributions
StatisticsHistograms
N-TuplesMonte Carlo Integration
Simulated AnnealingDifferential Equations
InterpolationNumerical Differentiation
Chebyshev ApproximationSeries Acceleration
Discrete Hankel Transforms Root-Finding
MinimizationLeast-Squares Fitting
Physical ConstantsIEEE Floating-Point
Discrete Wavelet Transforms Basis splines

Unlike the licenses of proprietary numerical libraries the license of GSL does not restrict scientific cooperation. It allows you to share your programs freely with others.

python -i

 <l5g> After I input some command such us define a function in the python shell, i want to dump them to a new py file, so i don't need to type more, the question is "Is there a method to do it(dump)"
[160327] <verte> l5g: no.
[160329] <jorrit> Why not use copy/paste to paste what you just typed into an editor?
[160350] <Alberth> l5g: there is trickery with the inspect module, but you better start by typing Python code in a file in the first place.
[160356] <joeyjones> mzz: want to take a look at my working code?
[160433] <l5g> I remember matlab can do it.
[160438] <joeyjones> actually, i need to make some tweaks
[160442] <Alberth> Python != Matlab
[160454] <_RedGhost_> ricree: I'd match the block between {% %} and replace with a the result of a callback, personally
[160533] <l5g> Alberth I just mean python can study from matlab :-)
[160545] <-- Quits: Stormhawk (n=stormhaw@aspin.csc.warwick.ac.uk) (Remote closed the connection)
[160551] <Alberth> l5g: not really, the application domain is different
[160601] <-- Quits: ab3 (n=ab3@ip-83-134-167-7.dsl.scarlet.be) (Read error: 113 (No route to host))
[160606] <-- Parts: e6nian (i=deacec8f@gateway/web/freenode/x-kuixdagceuakapgk)
[160607] <mzz> joeyjones: why?
[160633] --> Joins: Stormhawk (n=stormhaw@aspin.csc.warwick.ac.uk)
[160722] <sentix> 15g Another way is to write your code in one file and import it to the console `import MyFile` works well
[160724] <Alberth> l5g: matlab is for interactive exploring, python is for executing code
[160728] <joeyjones> mzz: i ahev the feeling i may have borked some other stuff in it :p
[160729] <joeyjones> http://pastebin.ca/1623506
[160828] <l5g> sentix , yeah it's a good tip
[160854] <Alberth> l5g: just consider the interactive shell for quick and dirty experimenting, and use an editor for all other cases.
[160857] <sentix> 15g: One cautionary note,  if the file imports other files... If I remember correctly, a re-import won't re-import those files
[160919] <bob2> l5g: go the other way
[160927] <bob2> l5g: write it in a file, then 'python -i x.py'
[160929] --> Joins: huin (n=huin@82.152.222.96-->英国)
[160932] 

怎么使py2exe生成的文件更小

首先要了解py2exe的原理,可以参看 手动制作python的exe可执行程序

http://wiki.woodpecker.org.cn/moin/PyExe  这个上面也有很多参考资料 , 其中 
http://pyinstaller.python-hosting.com/ 看上去不错,不过官方最近还没发布新版,老版已经不好用了, 并且py2.6 在windows上面现在
支持还有问题,等等看吧!

根据py2exe 官方的文档 http://www.py2exe.org/index.cgi/OptimizingSize 可以显著的把程序变小

如果不需要生成单一的exe文件的话,分开upx
使用py2exe bundle_files http://www.py2exe.org/index.cgi/SingleFileExecutable 生成一个文件后,再用upx http://upx.sourceforge.net/ 也可以