Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office! Copyright, David Spring M

Total Page:16

File Type:pdf, Size:1020Kb

Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office! Copyright, David Spring M Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office! Copyright, David Spring M. Ed. Collegeintheclouds.org FreeyourselffromMicrosoftandtheNSA.org September 2013 Free Yourself from Microsoft and the NSA | David Spring M. Ed. Page ii Dedication This book is dedicated to 8 freedom pioneers... Gary Kildall... 1942 -1994 Gary was a computer programmer who in 1975 invented both the DR DOS operating system and the BIOS Computer Start Up Program. Gary is often called the “father of the personal computer.” The original MS Windows operating system, called MS-DOS was a virtual copy of DR DOS – making Microsoft the biggest copyright violator in history. We cover more about Gary Kildall in Chapter 1, Section 3. Thomas Penfield Jackson... 1936 – 2013 Judge Jackson presided over the 1998 – 2000 trial of US versus Microsoft and wrote a 207 page “Findings of Fact” which document many of the events we discuss in this book. Judge Jackson ruled that Microsoft had repeatedly violated the Sherman Antitrust Act and therefore should be broken up. His decision was overturned by a corrupt Court of Appeals. But his Findings of Fact still speak truth to injustice today. Edward Snowden in June 2013, Edward Snowden released NSA documents which changed the course of this book. These NSA documents reveal a massive spy program by the NSA, with the help of Microsoft, and provide additional evidence that support my claims of an NSA “open back door” to the Windows operating system. Edward confirmed my research that the NSA is spying on us. In this book, we explain how they spy on us. Glenn Greenwald Without the courage and determination of Glenn Greenwald, Edward Snowden's story would have been buried by a wall of NSA propaganda. It is a frightening thing that we currently have so few real reporters willing to speak truth to injustice. We must all more closely examine where we are getting our “news” from. Free Yourself from Microsoft and the NSA | David Spring M. Ed. Page iii Richard Stallman Computer programmer, founder of the GNU project and the Free Software Foundation, and advocate for the public and scientific benefits of free software programs. GNU stands for GNU is Not Unix. Unix is a closed source operating system. GNU is basically just a joke that only a computer programmer would understand. It means GNU/Linux is a free operating system. Linus Torvalds Computer programmer and developer of the free open source Linux operating system which is at the heart of the Linux Mint distribution. Linus built the Linux operating system in 1991 and decided to give it away so that everyone would benefit. Linus currently develops and maintains the Linux “core” program for the Linux Foundation in Beaverton, Oregon. Clem Lefebvre Founder of the Linux Mint project – which is the Linux distribution closest to Windows XP and Windows 7. “It is extremely important to us that people are happy with their computer. Our goal is to bring people what they need, what they want and what they ask for. People should not be forced to migrate to something new just because someone else thinks they should.” Aaron Swartz...1986 - 2013 Inventor of RSS (Really Simple Syndication) and advocate for the principle that science and innovation, paid for with public tax payer dollars, belongs in the public domain. Aaron called this basic human right “the freedom to connect.” Aaron said “There is no justice in following unjust laws. It is time to come into the light and oppose the private theft of public knowledge. Sharing knowledge is a moral imperative.” It is because of their devotion to the free exchange of knowledge that we still have the ability to free ourselves from the chains of Microsoft and the NSA. Free Yourself from Microsoft and the NSA | David Spring M. Ed. Page iv On your keyboard, press CTRL+Click to jump to any chapter. Free Yourself from Microsoft and the NSA... Table of Contents Preface: Could All the Conspiracy Theories Actually be True? Chapter 1... How Microsoft became a Branch of the NSA.............1 1.1 Hidden Links between Microsoft and the NSA.............................................2 1.2 Why Linux is More Secure than Windows..................................................13 1.3 Emergence of the Evil Empire....................................................................19 1.4 US Protects Microsoft Monopoly in trade for NSA Backdoor.....................31 Chapter 2... Super Bugs, Cyber Wars, Disastrous Updates and Blackmail..........................................................................................45 2.1 Super Bugs and Cyber Wars......................................................................46 2.2 The Flame Virus and Windows Update Disasters......................................55 2.3 Microsoft Blackmail Warning: Upgrade or Die!...........................................71 2.4 UEFI: The Microsoft - NSA Kill Switch........................................................77 Chapter 3... Why we must end the Microsoft Monopoly..............89 3.1 Top Ten Reasons to use Linux instead of Windows 8................................90 3.2 Why Windows 8 Blue will not fix the Real Problems................................101 3.3 The Fatal Flaw of the Microsoft Windows Monopoly................................107 3.4 The Real Cost of the Microsoft Monopoly................................................117 Chapter 4... Linux to the Rescue..................................................129 4.1 A Brief History of Linux Operating Systems.............................................130 4.2 Benefits of Linux Mint over Linux Ubuntu.................................................143 4.3 Four Steps to the Freedom of Open Source Tools...................................148 4.4 Install Linux Mint in a Virtual Machine......................................................155 Chapter 5... Set up and Use Linux Mint.......................................159 5.1 How to use Linux Mint Mate.....................................................................160 5.2 Set up and use the Mate File Manager....................................................169 5.3 Add Free Programs to Linux Mint Mate....................................................176 5.4 Add a Shared Folder to Linux Mint Mate..................................................183 Free Yourself from Microsoft and the NSA | David Spring M. Ed. Page v Chapter 6... Back Up Your Data and Dual Boot..........................189 6.1 Protect yourself from Windows Booby Traps...........................................190 6.2 Create multiple backups of your system..................................................204 6.3 Dual Boot Linux Mint with Windows XP or Windows 7.............................211 6.4 Dual Boot Linux Mint with Windows 8......................................................231 Chapter 7... Benefits of LibreOffice Writer..................................245 7.1 Why Libre Office Writer is better than Microsoft Word.............................246 7.2 Customizing the Libre Office Writer Main Menu.......................................261 7.3 Create your own Custom Template..........................................................270 7.4 More Free Tools for Libre Writer...............................................................280 Chapter 8... Hidden Benefits of Libre Office...............................291 8.1 Advantages of Libre Writer for Creating a Print or EBook........................292 8.2 Create your own custom styles................................................................297 8.3 Use Libre Office Calc to create a chart....................................................308 8.4 Use Libre Office Impress to make a slide presentation............................314 Chapter 9... Additional Free Open Source Tools........................321 9.1 Free Screen recording tools for Linux Mint..............................................322 9.2 Edit your video with Open Shot Video Editor...........................................333 9.3 Open Source Alternatives to NSA Partners..............................................339 9.4 How to use Windows programs in Linux Mint..........................................357 Chapter 10... Linux Mint Quick Start Guide................................365 10.1 Back up your computer and partition your hard drive............................366 10.2 Dual Boot Linux Mint with Windows XP or Windows 7..........................377 10.3 Easy Steps and Free Tools for Using Linux Mint...................................385 10.4 Final Steps to Freedom..........................................................................396 About the Author.........................................................................................408 Free Yourself from Microsoft and the NSA | David Spring M. Ed. Page vi Preface: Could All the Conspiracy Theories Actually be True? “This wholesale invasion of Americans' and foreign citizens' privacy does not contribute to our security; it puts in danger the very liberties we are trying to protect.” Daniel Ellsberg June 10 2013 Welcome to the open source community and to our comprehensive step by step guide on learning how to install and use free open source tools (software) on your computer. Open source means the software is free and can be shared by anyone with anyone for any purpose. Open source is like a public library...free and open knowledge shared with the community for the common good. Free as in Freedom. No patents, no hassles, no barriers, no limits! If you are concerned about Microsoft handing over your
Recommended publications
  • Access Control
    Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control.
    [Show full text]
  • Microsoft Skype for Business Deployment Guide
    Microsoft Skype for Business Deployment Guide Multimedia Connector for Skype for Business 8.5.0 3/8/2020 Table of Contents Multimedia Connector for Skype for Business Deployment Guide 4 Architecture 6 Paired Front End Pools 9 Federation Platform with Microsoft Office 365 Cloud 12 Managing T-Server and UCMA Connectors 14 Prerequisites 16 Provisioning for UCMA Connectors 22 Using Telephony Objects 24 Managing UCMA Connectors 28 Managing T-Server 33 Upgrading Multimedia Connector for Skype For Business 36 Configuring Skype for Business Application Endpoints 37 Configuring Skype for Business User Endpoints 38 High-Availability Deployment 39 Performance 45 Managing Workspace Plugin for Skype for Business 46 Using Workspace Plugin for Skype for Business 51 Handling IM Transcripts 60 Supported Features 61 Alternate Routing 62 Call Monitoring 63 Call Supervision 64 Calling using Back-to-Back User Agent 70 Conference Resource Pools 77 Disable Lobby Bypass 80 Emulated Agents 82 Emulated Ringing 85 Handling Direct Calls 86 Handling Pass-Through Calls 89 Hiding Sensitive Data 91 IM Treatments 93 IM Suppression 94 Music On Hold 97 No-Answer Supervision 98 Presence 99 Remote Recording 103 Remote Treatments 110 Transport Layer Security 112 UTF-8 Encoding 114 Supported Media Types 116 T-Library Functionality 120 Attribute Extensions 124 Hardware Sizing Guidelines and Capacity Planning 130 Error Messages 132 Known Limitations and Workarounds 134 Multimedia Connector for Skype for Business Deployment Guide Multimedia Connector for Skype for Business Deployment Guide Welcome to the Multimedia Connector for Skype for Business Deployment Guide. This Deployment Guide provides deployment procedures and detailed reference information about the Multimedia Connector for Skype for Business as a product, and its components: T-Server, UCMA Connector, and Workspace Plugin.
    [Show full text]
  • Sourcefire White Paper
    And Its Role in the Security Model www.sourcefire.com June 2002 Sourcefire, Inc. 7095 Samuel Morse Drive Suite 100 Columbia, MD 21046 410.290.1616 | 410.290.0024 TABLE OF CONTENTS Table of Contents ............................................................................................................2 Open Source Software: OSS...........................................................................................3 What is OSS?..........................................................................................................................3 History.....................................................................................................................................4 Opinions on OSS.....................................................................................................................4 Arguments in favor of OSS ......................................................................................................5 Security, Stability, and Cost .......................................................................................................................5 Standards, Immediacy, and Lack of Restrictions......................................................................................7 Arguments Against OSS..........................................................................................................7 Status Quo and Security.............................................................................................................................8 Poor Packaging and Support .....................................................................................................................9
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Deploying Microsoft Windows Server Update Services
    Deploying Microsoft Windows Server Update Services Microsoft Corporation Published: June 3, 2005 Author: Tim Elhajj Editor: Sean Bentley Abstract This paper describes how to deploy Microsoft® Windows Server™ Update Services (WSUS). You will find a comprehensive description of how WSUS functions, as well as descriptions of WSUS scalability and bandwidth management features. This paper also offers step-by-step procedures for installation and configuration of the WSUS server. You will read how to update and configure Automatic Updates on client workstations and servers that will be updated by WSUS. Also included are steps for migrating from Microsoft Software Update Services (SUS) to WSUS, as well as steps for setting up a WSUS server on an isolated segment of your network and manually importing updates. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
    [Show full text]
  • Microsoft DNS
    1 a. Domain Name Service (DNS) encompassing Microsoft DNS From Wikipedia, the free encyclopedia Jump to: navigation, search Microsoft DNS is the name given to the implementation of domain name system services provided in Microsoft Windows operating systems. Contents [hide] 1 Overview 2 DNS lookup client o 2.1 The effects of running the DNS Client service o 2.2 Differences from other systems 3 Dynamic DNS Update client 4 DNS server o 4.1 Common issues 5 See also 6 References 7 External links [edit] Overview The Domain Name System support in Microsoft Windows NT, and thus its derivatives Windows 2000, Windows XP, and Windows Server 2003, comprises two clients and a server. Every Microsoft Windows machine has a DNS lookup client, to perform ordinary DNS lookups. Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions, registering the machines' names and IP addresses. Some machines run a DNS server, to publish DNS data, to service DNS lookup requests from DNS lookup clients, and to service DNS update requests from DNS update clients. The server software is only supplied with the server versions of Windows. [edit] DNS lookup client Applications perform DNS lookups with the aid of a DLL. They call library functions in the DLL, which in turn handle all communications with DNS servers (over UDP or TCP) and return the final results of the lookup back to the applications. 2 Microsoft's DNS client also has optional support for local caching, in the form of a DNS Client service (also known as DNSCACHE). Before they attempt to directly communicate with DNS servers, the library routines first attempt to make a local IPC connection to the DNS Client service on the machine.
    [Show full text]
  • Microsoft Office
    Microsoft Office MICROSOFT OFFICE INTRODUCTION Microsoft Office is an office suite of desktop applications, servers and services for the Microsoft Windows and OS X operating systems. It was first announced by Bill Gates of Microsoft on August 1, 1988 at COMDEX in Las Vegas. Initially a marketing term for a bundled set of applications, the first version of Office contained Microsoft Word, Microsoft Excel and Microsoft PowerPoint. Over the years, Office applications have grown substantially closer with shared features such as a common spell checker, OLEdata integration and Visual Basic for Applications scripting language. Microsoft also positions Office as a development platform for line-of-business software under the Office Business Applications brand. On 10 July 2012, Softpedia reported that Office is used by over a billion people worldwide. The current versions are Office 2013 for Windows, released on October 11, 2012; and Office 2011 for OS X, released October 26, 2010 On 24 October 2012, the RTM final code of Office 2013 Professional Plus was released to TechNet and MSDN subscribers for download. On 15 November 2012, the 60-day trial version of Office 2013 Professional Plus was released for download. All devices running Windows Phone and Windows RT come pre-installed with Office Mobile and Office RT, respectively. Office Mobile is also available for Android phones and the iPhone. A version of Office for the iPad was launched in March 2014. A web-based version of Office called Office Online, is also available COMPONENTS Word Microsoft Word is a word processor and was previously considered the main program in Office.
    [Show full text]
  • Linux Boot Loaders Compared
    Linux Boot Loaders Compared L.C. Benschop May 29, 2003 Copyright c 2002, 2003, L.C. Benschop, Eindhoven, The Netherlands. Per- mission is granted to make verbatim copies of this document. This is version 1.1 which has some minor corrections. Contents 1 introduction 2 2 How Boot Loaders Work 3 2.1 What BIOS does for us . 3 2.2 Parts of a boot loader . 6 2.2.1 boot sector program . 6 2.2.2 second stage of boot loader . 7 2.2.3 Boot loader installer . 8 2.3 Loading the operating system . 8 2.3.1 Loading the Linux kernel . 8 2.3.2 Chain loading . 10 2.4 Configuring the boot loader . 10 3 Example Installations 11 3.1 Example root file system and kernel . 11 3.2 Linux Boot Sector . 11 3.3 LILO . 14 3.4 GNU GRUB . 15 3.5 SYSLINUX . 18 3.6 LOADLIN . 19 3.7 Where Can Boot Loaders Live . 21 1 4 RAM Disks 22 4.1 Living without a RAM disk . 22 4.2 RAM disk devices . 23 4.3 Loading a RAM disk at boot time . 24 4.4 The initial RAM disk . 24 5 Making Diskette Images without Diskettes 25 6 Hard Disk Installation 26 7 CD-ROM Installation 29 8 Conclusions 31 1 introduction If you use Linux on a production system, you will only see it a few times a year. If you are a hobbyist who compiles many kernels or who uses many operating systems, you may see it several times per day.
    [Show full text]
  • Licensing Windows and Microsoft Office for Use on the Macintosh
    Volume Licensing brief Licensing Windows and Microsoft Office for use on the Macintosh This brief applies to all Volume Licensing programs. Contents Summary .............................................................................................................................................................................. 1 What’s new in this brief .................................................................................................................................................... 1 Details .................................................................................................................................................................................... 1 Licensing of the Windows operating system for the Mac ................................................................................ 1 Scenarios ....................................................................................................................................................................... 2 Licensing of Microsoft Office for Windows and Microsoft Office for Mac .................................................. 6 Frequently asked questions ............................................................................................................................................ 7 Summary This licensing brief addresses the commonly asked questions about licensing the Windows operating system and Microsoft Office to run on the Macintosh. What’s new in this brief This replaces a previous version published in August 2015. It has
    [Show full text]
  • How Do I Download Microsoft Games on My Pc How to Reinstall a Purchased Game from Microsoft Store That Is Not Showing up in Library
    how do i download microsoft games on my pc how to reinstall a purchased game from microsoft store that is not showing up in Library. Thanks for your feedback, it helps us improve the site. How satisfied are you with this reply? Thanks for your feedback. First, try signing out of the Microsoft Store. Click your Profile picture at the top right, click your account then sign out. Restart your computer, launch the Microsoft Store app, sign in again, then attempt downloading again. Click the ellipsis in the top right corner of the screen (. ) Click My Library Scroll through the list then click the Cuphead app if its listed there, then click the download button. If doesn't help, let us know and we can explore more options. Other things you can try. Start by running the Windows Store Apps troubleshooter. Open Start > Settings > Update & security > Troubleshoot Scroll down to the bottom Click Windows Store Apps. Click Run the troubleshooter. When complete try opening the Store again. Also check if the Store works in another user account. Press Windows key + R Type: wsreset.exe Hit Enter. Do this a couple times then try launching the Store again. Your Antivirus might be interfering with the Store, try disabling it 'temporarily' to see if it launches. Check Windows Update and install the latest updates. Sometimes Microsoft releases infrastructure fixes for the Store through Windows Update. You can also try resetting the store app using the following instructions: Reinstall the Store: Press Windows key + X Click Windows PowerShell (Admin) At the command prompt, type the following then hit Enter: Get-AppXPackage *WindowsStore* -AllUsers | Foreach.
    [Show full text]
  • Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
    Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods.
    [Show full text]
  • Umail Account Migration to Exchange Online Starts on June 1
    UMail account migration to Exchange Online starts on June 1 You're receiving this email because you're subscribed to UIT's public email list. Starting Tuesday, June 1, 2021, University Information Technology (UIT) will begin to gradually migrate all University of Utah and University of Utah Health faculty and staff UMail accounts from Microsoft Exchange Server (hosted on campus) to Microsoft Exchange Online (hosted online by Microsoft infrastructure). The upgrade is part of the effort to modernize the U’s communication technology and better meet the needs of those working, learning, and teaching remotely. Faculty and staff will receive a targeted email 24 to 48 hours prior to initiation of their account migration. The total time for your migration depends on the size of the mailbox(es) to be moved and amount of data to be transferred to Microsoft servers. Extremely large mailboxes can take a number of days to transfer. If you’re unable to access your UMail account through your desktop/mobile client or web browser after the migration, please refer to this IT Knowledge Base article for instructions. Please note that UMail is always accessible via Outlook Web Access (OWA) using a web browser. After your account is moved to Exchange Online, you may receive a notification that says “The Microsoft Exchange Administrator has made a change that requires you to quit and restart Outlook.” Please follow the directions. The migration includes an updated interface for OWA, which will redirect from https://www.umail.utah.edu/ to https://outlook.office.com/. The interfaces of the Outlook desktop and mobile clients will remain the same for most users, although some macOS users may automatically update to the latest version of Outlook for Mac.
    [Show full text]