LINUX JOURNAL (ISSN 1075-3583) Is Published Monthly by Belltown Media, Inc., 2121 Sage Road, Ste

Total Page:16

File Type:pdf, Size:1020Kb

LINUX JOURNAL (ISSN 1075-3583) Is Published Monthly by Belltown Media, Inc., 2121 Sage Road, Ste ™ HOW TO HARDEN YOUR SSH CONNECTIONS Since 1994: The Original Magazine of the Linux Community JANUARY 2014 | ISSUE 237 | www.linuxjournal.com SECURITY ENCRYPTED BACKUP SOLUTIONS With TrueCrypt and SpiderOak An Introduction to TAKING ADVANTAGE OF QUANTUM ENCRYPTION CRYPTOGRAPHY TIPS FOR USING TOR THE PAX Browse the Web ARCHIVING Anonymously UTILITY + SOLID-STATE DRIVES Are They Worth It? LJ237-Jan2014.indd 1 12/17/13 3:42 PM UPCOMING CONFERENCES For a complete list of USENIX and USENIX co-sponsored events, see www.usenix.org/conferences FAST ’14: 12th USENIX Conference on File and 23rd USENIX Security Symposium Storage Technologies August 20–22, 2014, San Diego, CA, USA February 17–20, 2014, Santa Clara, CA, USA www.usenix.org/conference/usenixsecurity14 www.usenix.org/conference/fast14 Submissions due: Thursday, February 27, 2014 2014 USENIX Research in Linux File and Storage Workshops Co-located with USENIX Security ’14 Technologies Summit EVT/WOTE ’14: 2014 Electronic Voting Technology In conjunction with FAST ’14 Workshop/Workshop on Trustworthy Elections February 20, 2014, Mountain View, CA, USA USENIX Journal of Election Technology Submissions due: January 17, 2014 and Systems (JETS) Published in conjunction with EVT/WOTE NSDI ’14: 11th USENIX Symposium on www.usenix.org/jets Networked Systems Design and Implementation Submissions for Volume 2, Issue 2, due: December 5, 2013 April 2–4, 2014, Seattle, WA, USA Submissions for Volume 2, Issue 3, due: April 8, 2014 www.usenix.org/conference/nsdi14 HotSec ’14: 2014 USENIX Summit on Hot Topics 2014 USENIX Federated Conferences Week in Security June 17–20, 2014, Philadelphia, PA, USA FOCI ’14: 4th USENIX Workshop on Free and Open Communications on the Internet USENIX ATC ’14: 2014 USENIX Annual Technical Conference HealthTech ’14: 2014 USENIX Workshop on Health www.usenix.org/conference/atc14 Information Technologies Paper titles and abstracts due January 28, 2014 Safety, Security, Privacy, and Interoperability of Health Information Technologies HotCloud ’14: 6th USENIX Workshop on Hot Topics in Cloud Computing CSET ’14: 7th Workshop on Cyber Security Experimentation and Test WiAC ’14: 2014 USENIX Women in Advanced Computing Summit WOOT ’14: 8th USENIX Workshop on Offensive Technologies HotStorage ’14: 6th USENIX Workshop on Hot Topics in Storage and File Systems OSDI ’14: 11th USENIX Symposium on Operating UCMS ’14: 2014 USENIX Configuration Systems Design and Implementation Management Summit October 6–8, 2014, Broomfield, CO, USA www.usenix.org/conference/osdi14 ICAC ’14: 11th International Conference on Abstract registration due April 24, 2014 Autonomic Computing Co-located with OSDI ’14: USRE ’14: 2014 USENIX Summit on Release Engineering Diversity ’14: 2014 Workshop on Diversity in Systems Research Do you know about the USENIX LISA ’14: 28th Large Installation System Open Access Policy? Administration Conference USENIX is the first computing association to offer free November 9–14, 2014, Seattle, WA, USA and open access to all of our conferences proceedings https://www.usenix.org/conference/lisa14 and videos. We stand by our mission to foster excel- Submissions due: April 14, 2014 lence and innovation while supporting research with a practical bias. Your membership fees play a major role in making this endeavor successful. Please help us support open access. Renew your USENIX membership and ask your colleagues to join or renew today! www.usenix.org/membership twitter.com/usenix www.usenix.org/youtube www.usenix.org/gplus Stay Connected... www.usenix.org/facebook www.usenix.org/linkedin www.usenix.org/blog LJ237-Jan2014.indd 2 12/17/13 3:42 PM coe_lj_10-29-13.indd 1 10/30/13 9:37 AM $UH\RXFRQVLGHULQJVRIWZDUHGHÀQHGVWRUDJH" zStax StorCore =)68QLÀHG6WRUDJH IURP6LOLFRQ ZFS Unified Storage 0HFKDQLFVLVWUXO\VRIWZDUHGHÀQHGVWRUDJH )URPPRGHVWGDWDVWRUDJHQHHGVWRDPXOWLWLHUHGSURGXFWLRQVWRUDJHHQYLURQPHQWWKHzStax StorCore =)6XQLÀHGVWRUDJHDSSOLDQFHVKDYHWKHULJKWPL[RISHUIRUPDQFHFDSDFLW\DQGUHOLDELOLW\WRÀW\RXUQHHGV zStax StorCore 64 January Case Study Feature zStax StorCore 104 8QLÀHG6WRUDJHLV&UXFLDO3DUWRI 6HDUFKDQG'LVFRYHU\IRUWKH&ORXG 7DONZLWKDQH[SHUWWRGD\ www.siliconmechanics.com/casestudies www.siliconmechanics.com/zstax LJ237-Jan2014.indd 3 12/17/13 3:42 PM JANUARY 2014 CONTENTS ISSUE 237 SECURITY FEATURES 68 Quantum 80 More Secure 94 Encrypted Backup Cryptography SSH Connections Solution “Home Classical cryptography Secure shell Paranoia Edition” may not be good connections can A solution for enough in providing be hardened for safeguarding your security in the extra security. personal information. near future. Federico Kereki Tim Cordova Subhendu Bera Cover Cover Image © Can Photo Stock Inc. / maxkabakov ON THE COVER /V^[V/HYKLU@V\Y::/*VUULJ[PVUZW ,UJY`W[LK)HJR\W:VS\[PVUZ^P[O;Y\L*Y`W[HUK:WPKLY6HRW (U0U[YVK\J[PVU[V8\HU\[T*Y`W[VNYHWO`W ;VY!)YV^ZL[OL>LI(UVU`TV\ZS`W ;HRPUN(K]HU[HNLVM,UJY`W[PVUW ;PWZMVY<ZPUN[OLWH_(YJOP]PUN<[PSP[`W :VSPK:[H[L+YP]LZ·(YL;OL`>VY[O0[&W 4 / JANUARY 2014 / WWW.LINUXJOURNAL.COM LJ237-Jan2014.indd 4 12/17/13 3:42 PM INDEPTH 108 Solid-State Drives—Get One Already! If you’ve been on the fence, this article should convince you to give SSDs a try. Brian Trapp COLUMNS 36 Reuven M. Lerner’s At the Forge 26 MANDELBULBER Talking to Twitter 44 Dave Taylor’s Work the Shell Easy Watermarking with ImageMagick 50 Kyle Rankin’s Hack and / A Bundle of Tor 56 Shawn Powers’ The Open-Source Classroom Encrypting Your Cat Photos 120 Doc Searls’ EOF Returning to Ground from the Web’s Clouds 50 TOR KNOWLEDGE HUB 106 Webcasts and White Papers IN EVERY ISSUE 8 Current_Issue.tar.gz 10 Letters 16 UPFRONT 34 Editors’ Choice 64 New Products 125 Advertisers Index 94 TRUECRYPT LINUX JOURNAL (ISSN 1075-3583) is published monthly by Belltown Media, Inc., 2121 Sage Road, Ste. 395, Houston, TX 77056 USA. Subscription rate is $29.50/year. Subscriptions start with the next issue. WWW.LINUXJOURNAL.COM / JANUARY 2014 / 5 LJ237-Jan2014.indd 5 12/18/13 10:15 AM Executive Editor Jill Franklin [email protected] Senior Editor Doc Searls [email protected] Associate Editor Shawn Powers [email protected] Art Director Garrick Antikajian [email protected] Products Editor James Gray [email protected] Editor Emeritus Don Marti [email protected] Technical Editor Michael Baxter [email protected] Senior Columnist Reuven Lerner [email protected] Security Editor Mick Bauer [email protected] Hack Editor Kyle Rankin lj@greenfly.net Virtual Editor Bill Childers [email protected] Contributing Editors )BRAHIM (ADDAD s 2OBERT ,OVE s :ACK "ROWN s $AVE 0HILLIPS s -ARCO &IORETTI s ,UDOVIC -ARCOTTE 0AUL "ARRY s 0AUL -C+ENNEY s $AVE 4AYLOR s $IRK %LMENDORF s *USTIN 2YAN s !DAM -ONSEN Publisher Carlie Fairchild [email protected] Director of Sales John Grogan [email protected] Associate Publisher Mark Irgang [email protected] Webmistress Katherine Druckman [email protected] Accountant Candy Beauchamp [email protected] Linux Journal is published by, and is a registered trade name of, Belltown Media, Inc. PO Box 980985, Houston, TX 77098 USA Editorial Advisory Panel "RAD !BRAM "AILLIO s .ICK "ARONIAN s (ARI "OUKIS s 3TEVE #ASE +ALYANA +RISHNA #HADALAVADA s "RIAN #ONNER s #ALEB 3 #ULLEN s +EIR $AVIS -ICHAEL %AGER s .ICK &ALTYS s $ENNIS &RANKLIN &REY s !LICIA 'IBB 6ICTOR 'REGORIO s 0HILIP *ACOB s *AY +RUIZENGA s $AVID ! ,ANE 3TEVE -ARQUEZ s $AVE -C!LLISTER s #ARSON -C$ONALD s #RAIG /DA *EFFREY $ 0ARENT s #HARNELL 0UGSLEY s 4HOMAS 1UINLAN s -IKE 2OBERTS +RISTIN 3HOEMAKER s #HRIS $ 3TARK s 0ATRICK 3WARTZ s *AMES 7ALKER Advertising E-MAIL: [email protected] URL: www.linuxjournal.com/advertising PHONE: +1 713-344-1956 ext. 2 Subscriptions E-MAIL: [email protected] URL: www.linuxjournal.com/subscribe MAIL: PO Box 980985, Houston, TX 77098 USA LINUX is a registered trademark of Linus Torvalds. LJ237-Jan2014.indd 6 12/17/13 3:43 PM ® has the tools to keep you a!oat. Key Features: t Dual Intel® Xeon® Processors 5600 Series TrueNAS® Uni"ed Storage features the Intel® Xeon® Processor t Support for CIFS, NFS, iSCSI, and more 5600 series and supports high availability, remote replication, t Active Directory, LDAP, and NIS integration deduplication, encryption, compression, and snapshots. It has t Multi-Petabyte Scalability the tools to deal with any storage challenge you may face. Intel, the Intel logo, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and other countries. Call iXsystems toll free or visit our website today! 1-855-GREP-4-IX | www.iXsystems.com LJ237-Jan2014.indd 7 12/17/13 3:43 PM Current_Issue.tar.gz Lapsang SHAWN POWERS Souchong! ack when we were kids, my BirdCam project (which you’ll hear “security” meant little more than more about in a month or so), I found Bhaving a secret password to keep his column particularly interesting. If you little siblings out of the treehouse. That’s need to work with photos, especially if still the case in some situations. Take the direct interaction isn’t possible, Dave’s title of this column, for instance. If you column will be interesting for you too. go to the #linuxjournal IRC channel on Kyle Rankin gets into the security FreeNode, saying “Lapsang Souchong” mindset this month by approaching will mark you as part of the inner circle. privacy. Specifically, he explains how (Note, this does not make you one of the to set up Tor in order to browse the cool kids...possibly the exact opposite!) Web in private. Tor is just as useful as When it comes to computer security, it once was, but thankfully, it’s gotten however, things are quite a bit more easier and easier to implement. I follow complex. Whether you want to encrypt Kyle’s column with The Open Source your data or lock down network Classroom, and this month, I talk access, Linux provides a wide variety of about file encryption.
Recommended publications
  • Linux Kernel and Driver Development Training Slides
    Linux Kernel and Driver Development Training Linux Kernel and Driver Development Training © Copyright 2004-2021, Bootlin. Creative Commons BY-SA 3.0 license. Latest update: October 9, 2021. Document updates and sources: https://bootlin.com/doc/training/linux-kernel Corrections, suggestions, contributions and translations are welcome! embedded Linux and kernel engineering Send them to [email protected] - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 1/470 Rights to copy © Copyright 2004-2021, Bootlin License: Creative Commons Attribution - Share Alike 3.0 https://creativecommons.org/licenses/by-sa/3.0/legalcode You are free: I to copy, distribute, display, and perform the work I to make derivative works I to make commercial use of the work Under the following conditions: I Attribution. You must give the original author credit. I Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. I For any reuse or distribution, you must make clear to others the license terms of this work. I Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. Document sources: https://github.com/bootlin/training-materials/ - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 2/470 Hyperlinks in the document There are many hyperlinks in the document I Regular hyperlinks: https://kernel.org/ I Kernel documentation links: dev-tools/kasan I Links to kernel source files and directories: drivers/input/ include/linux/fb.h I Links to the declarations, definitions and instances of kernel symbols (functions, types, data, structures): platform_get_irq() GFP_KERNEL struct file_operations - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 3/470 Company at a glance I Engineering company created in 2004, named ”Free Electrons” until Feb.
    [Show full text]
  • SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4
    SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xi 1 Available Documentation xii 2 Feedback xiv 3 Documentation Conventions xv I BASICS 1 1 General Notes on System Tuning 2 1.1 Be Sure What Problem to Solve 2 1.2 Rule Out Common Problems 3 1.3 Finding the Bottleneck 3 1.4 Step-by-step Tuning 4 II SYSTEM MONITORING 5 2 System Monitoring Utilities 6 2.1 Multi-Purpose Tools 6 vmstat 7
    [Show full text]
  • Vasco Alexandre Maia Dos Santos Infraestrutura Segura E
    Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure “The walls between art and engineering exist only in our minds” — Theo Jansen Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure Dissertação apresentada à Universidade de Aveiro para cumprimento dos re- quisitos necessários à obtenção do grau de Mestre em Engenharia de Com- putadores e Telemática, realizada sob a orientação científica do Doutor Diogo Nuno Pereira Gomes, Professor auxiliar do Departamento de Eletrónica, Te- lecomunicações e Informática da Universidade de Aveiro, e do Doutor João Paulo Silva Barraca, Professor auxiliar do Departamento de Eletrónica, Tele- comunicações e Informática da Universidade de Aveiro. o júri / the jury presidente / president Prof. Doutor André Ventura da Cruz Marnoto Zúquete professor auxiliar da Universidade de Aveiro vogais / examiners committee Prof. Doutora Ana Cristina Costa Aguiar professora auxiliar convidada da Faculdade de Engenharia da Universidade do Porto Prof. Doutor Diogo Nuno Pereira Gomes professor auxiliar da Universidade de Aveiro (orientador) agradecimentos / Gostava de agradecer, em primeiro lugar ao Professor Doutor Diogo Gomes acknowledgements e ao Professor Doutor João Paulo Barraca pela oportunidade de integrar o ATNOG e trabalhar nesta dissertação, bem como por todo o apoio dado ao longo do mestrado.
    [Show full text]
  • Red Hat Enterprise Linux for Real Time 7 Tuning Guide
    Red Hat Enterprise Linux for Real Time 7 Tuning Guide Advanced tuning procedures for Red Hat Enterprise Linux for Real Time Radek Bíba David Ryan Cheryn Tan Lana Brindley Alison Young Red Hat Enterprise Linux for Real Time 7 Tuning Guide Advanced tuning procedures for Red Hat Enterprise Linux for Real Time Radek Bíba Red Hat Customer Content Services [email protected] David Ryan Red Hat Customer Content Services [email protected] Cheryn Tan Red Hat Customer Content Services Lana Brindley Red Hat Customer Content Services Alison Young Red Hat Customer Content Services Legal Notice Copyright © 2015 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Linux Kernel Development
    Linux Kernel Development Third Edition Developer’s Library ESSENTIAL REFERENCES FOR PROGRAMMING PROFESSIONALS Developer’s Library books are designed to provide practicing programmers with unique, high-quality references and tutorials on the programming languages and technologies they use in their daily work. All books in the Developer’s Library are written by expert technology practitioners who are especially skilled at organizing and presenting information in a way that’s useful for other programmers. Key titles include some of the best, most widely acclaimed books within their topic areas: PHP & MySQL Web Development Python Essential Reference Luke Welling & Laura Thomson David Beazley ISBN 978-0-672-32916-6 ISBN-13: 978-0-672-32978-6 MySQL Programming in Objective-C 2.0 Paul DuBois Stephen G. Kochan ISBN-13: 978-0-672-32938-8 ISBN-13: 978-0-321-56615-7 Linux Kernel Development PostgreSQL Robert Love Korry Douglas ISBN-13: 978-0-672-32946-3 ISBN-13: 978-0-672-33015-5 Developer’s Library books are available at most retail and online bookstores, as well as by subscription from Safari Books Online at safari.informit.com Developer’s Library informit.com/devlibrary Linux Kernel Development Third Edition Robert Love Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Cape Town • Sydney • Tokyo • Singapore • Mexico City Linux Kernel Development Acquisitions Editor Third Edition Mark Taber Development Copyright © 2010 Pearson Education, Inc. Editor All rights reserved. Printed in the United States of America. This publication is protected by Michael Thurston copyright, and permission must be obtained from the publisher prior to any prohibited repro- Technical Editor duction, storage in a retrieval system, or transmission in any form or by any means, elec- Robert P.
    [Show full text]
  • The GNU General Public License (GPL) Does Govern All Other Use of the Material That Constitutes the Autoconf Macro
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the StorageGRID PreGRID Environment products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-10078_A0_ur001-Copyright 2015 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the BSD 1.0 • Free BSD - 44_lite BSD 1.0 Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. • All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. • Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
    [Show full text]
  • Interaction Between the User and Kernel Space in Linux
    1 Interaction Between the User and Kernel Space in Linux Kai Lüke, Technische Universität Berlin F Abstract—System calls based on context switches from user to kernel supported in POSIX as well as System V style. A very space are the established concept for interaction in operating systems. common principle for IPC are sockets, and pipes can be seen On top of them the Linux kernel offers various paradigms for commu- as their most simple case. Besides the popular IP family with nication and management of resources and tasks. The principles and TCP/UDP, the local Unix domain sockets play a big role basic workings of system calls, interrupts, virtual system calls, special for many applications, while Netlink sockets are specific purpose virtual filesystems, process signals, shared memory, pipes, Unix or IP sockets and other IPC methods like the POSIX or System V to the Linux kernel and are not often found in user space message queue and Netlink are are explained and related to each other applications due to portability to other operating systems. in their differences. Because Linux is not a puristic project but home for There have been attempts to bring the D-BUS IPC into many different concepts, only a mere overview is presented here with the kernel with a Netlink implementation, kdbus and then focus on system calls. Bus1, but this will not be covered here. Also comparative studies with other operating systems are out of scope. 1 INTRODUCTION 2 KERNEL AND USER SPACE ERNELS in the Unix family are normally not initiating K any actions with outside effects, but rely on requests The processes have virtualized access to the memory as well from user space to perform these actions.
    [Show full text]
  • Media Players Documentation Release 2.5
    Media Players Documentation Release 2.5 Isuma Apr 03, 2019 Contents 1 Installation 3 1.1 BIOS configuration............................................3 1.2 Naming convention............................................3 1.3 Install Debian...............................................3 1.4 More in-depth OS installation instruction................................4 1.5 Configure Puppet.............................................5 1.6 Stretch Fixes...............................................7 1.7 Configuring and Running Git Annex..................................7 2 Old Installation Details 9 2.1 Puppet..................................................9 2.2 Git-annex................................................. 10 2.3 Git-annex configuration......................................... 12 2.4 Other configurations........................................... 18 3 Testing 21 3.1 Backend................................................. 21 3.2 CableTV................................................. 21 3.3 Git-annex sync.............................................. 21 3.4 Isuma.tv................................................. 22 4 Maintenance 23 4.1 Changing preferred content....................................... 23 4.2 Unused and deleted files......................................... 24 4.3 Metadata................................................. 24 4.4 Settings.................................................. 26 4.5 External synchronisation drives..................................... 28 4.6 Creating user accounts.........................................
    [Show full text]
  • Download File
    Software Engineering Methodologies and Life Scott Lennon COMSE6156 { Columbia University sl3796; New York, USA } [email protected] *Abstract ~ The paradigms of design patterns and methodologies result in better code quality. We will also focus software engineering methodologies are methods that apply on research that examines code to determine which model to areas outside the software space. As a business owner and produces code with less security vulnerabilities, and is cohesive student, I implement many software principles daily in both to industry compliance standards. My conclusions shall draw a my work and personal life. After experiencing the power of direct nexus for the reader between models within the software Agile methodologies outside the scope of software engineering paradigm and their use outside of the scope of engineering, I always think about how I can integrate the software development. I will underscore a variety of themes, computer science skills that I am learning at Columbia in including personal experience and a case study measuring effectiveness of paradigm implementation. I will present studies my life. For my study, I seek to learn about other software using Agile methods for child rearing [3] to enable the reader to engineering development processes that can be useful in life. see possible correlations of software engineering methodologies I theorize that if a model such as Agile can provide me with as it can apply to challenges in life. I have used myself as an useful tools, then a model that the government and most of ongoing case study, a study which undoubtedly will last far the world trusts should have paradigms I can learn with as longer than the Spring semester of 2016.
    [Show full text]
  • Project Utopia
    Project Utopia http://0-delivery.acm.org.innopac.lib.ryerson.ca/10.1145/1100000/10901... Project Utopia Robert Love Abstract Users—what will they plug in next? Robert is making the computer make sense of hardware, so you don't have to. For the better part of a decade, Linux enthusiasts have waxed poetic on the inherent greatness and looming success of Desktop Linux. Our kernel is so robust! Our applications are infinitely configurable! This is the year of Desktop Linux! Who would ever use Microsoft Windows? These claims and similar—particularly when made back in the 20th century—seem, in retrospect, so trite. Not that I stand righteous—oh no, I laid the praise down as thick as anyone else did. I too was a convert. At least, I did until I realized that hardware support in Linux was awful. Like a deck of cards, my rosy view of Desktop Linux came crashing down, making an 180 degree turn from glowing to ghastly. Heartbroken, I cried myself to sleep every night and went on an inexplicable diet consisting only of cheese and pudding. But this did not last long. One day, the Linux community decided to do something about it. We outlined a plan not only to reach feature parity with the other desktop operating systems, but also to surpass them. Hardware support has come a long way in the last year and a half. This is the story of just how far. A Past Since Forgotten The steps for installing a new hardware peripheral on a Mac might go a bit like this: Step 1: plug hardware in to Mac.
    [Show full text]
  • <Document Title>
    DATE OSS Disclosure Document CM_CI1 3rd Dec 2019 OSS Licenses used in RN_AIVI Project CM_CI1_RN_AIVI_Scope3.x This document is provided as part of the fulfillment of OSS license conditions and does not require users to take any action before or while using the product. Page- 1 © This is the exclusive property of ROBERT BOSCH ENGINEERING AND BUSINESS SOLUTIONS PRIVATE LIMITED. Without their consent, it may not be reproduced or given to third parties DATE OSS Disclosure Document CM_CI1 3rd Dec 2019 Contents 1 List of used Open Source Components. ............................................................................................... 6 2 Appendix - License Text ............................................................................................................... 133 2.1 BSD-4-Clause (University of California-Specific) ........................................................... 133 2.2 Academic Free Licensev. 2.1 ........................................................................................... 134 2.3 Academic Free License v1.1 ............................................................................................ 136 2.4 Apache License 1.1 ......................................................................................................... 138 2.5 Apache License 2.0 ......................................................................................................... 139 2.6 Apple Public Source License 1.1 ..................................................................................... 142 2.7 Artistic
    [Show full text]
  • 30240 - Embedded Systems II
    30240 - Embedded Systems II Información del Plan Docente Academic Year 2017/18 Faculty / School 110 - Escuela de Ingeniería y Arquitectura Degree 439 - Bachelor's Degree in Informatics Engineering ECTS 6.0 Year 4 Semester Indeterminate Subject Type Compulsory Module --- 1.General information 1.1.Introduction 1.2.Recommendations to take this course 1.3.Context and importance of this course in the degree 1.4.Activities and key dates 2.Learning goals 2.1.Learning goals 2.2.Importance of learning goals 3.Aims of the course and competences 3.1.Aims of the course 3.2.Competences 4.Assessment (1st and 2nd call) 4.1.Assessment tasks (description of tasks, marking system and assessment criteria) 5.Methodology, learning tasks, syllabus and resources 5.1.Methodological overview The learning process designed for this course relies on lectures, problems, assignments and computer lab sessions. Subject overview and theoretical fundations are introduced in lectures, closely referred to case studies. 30240 - Embedded Systems II Problems sessions foster the participation of the students. Lab sessions are organized in reduced groups, where the student sets up, program and check the systems. In order to foster continuous and autonomous learning, there can be additional learning activities throughout the course's period. 5.2.Learning tasks The course's program encompasses the following activities 1. On-site activities: 2.4 ECTS (60 hours) a) Regular classes and lectures (30 h) Presentation of theoretical and practical contents, illustrated with case studies and fostering the participation of the students. b) Problem-solving sessions (12 h) The students will get involved in problem solving related to the theoretical contents.
    [Show full text]