Reverse Engineering a Nit That Unmasks Tor Users

Total Page:16

File Type:pdf, Size:1020Kb

Reverse Engineering a Nit That Unmasks Tor Users 2016 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings May 25th, 1:00 PM Reverse Engineering a Nit That Unmasks Tor Users Matthew Miller University of Nebraska at Kearney, [email protected] Joshua Stroschein Dakota State University, [email protected] Ashley Podhradsky Dakota State University, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Aviation Safety and Security Commons, Computer Law Commons, Defense and Security Studies Commons, Forensic Science and Technology Commons, Information Security Commons, National Security Law Commons, OS and Networks Commons, Other Computer Sciences Commons, and the Social Control, Law, Crime, and Deviance Commons Scholarly Commons Citation Miller, Matthew; Stroschein, Joshua; and Podhradsky, Ashley, "Reverse Engineering a Nit That Unmasks Tor Users" (2016). Annual ADFSL Conference on Digital Forensics, Security and Law. 10. https://commons.erau.edu/adfsl/2016/wednesday/10 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Reverse Engineering a NIT that unmasks TOR users CDFSL Proceedings 2016 REVERSE ENGINEERING A NIT THAT UNMASKS TOR USERS Miller, Matthew Stroschein, Joshua Podhradsky, Ashley [email protected] [email protected] [email protected] University of Nebraska at Kearney and Dakota State University ABSTRACT This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary les and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the NIT logged data, and how the NIT utilized a capability in ash to deanonymize a Tor user. The challenges with the investigation and concerns of the NIT will also be discussed. Keywords: Tor, NIT, deanonymization, Tor Hidden Services, ash 1. INTRODUCTION enforcement have actively modied Tor hidden service website to deanonymize the users. In a The FBI was given access to a group of comput- traditional website, the Internet Protocol (IP) ers that were running a The Onion Router (Tor) address of a client is used as a component of Hidden Service that hosted illegal content. The the IP networking layer. Thus an IP address FBI then requested and received a warrant to is required for a website to operate properly. investigate the individuals whom accessed the To thwart authorities, users of illegal content illegal content on those servers. When content is moved to using proxy addresses to access web- accessed via the Tor network [1], the IP address sites. The poxy service will make the connection of the computer requesting the content is hid- for the client and mask the identity of the user. den. The FBI developed a Network Investiga- To deanonymize proxy users, law enforcement tive Technique (NIT) that would deanonymize can get a court order to seize and modify the the users of the Tor Hidden Service. For a short proxy servers. With the advent of Tor, users can period of time, the FBI ran a server that sup- bounce their encrypted trac through the Tor plied a ash object (NIT) to a users browser, network to achieve anonymity. The movement which in turn would deanonymize those users. to Tor has pushed law enforcement to use more The data gathered from the NIT was used as technically advanced methods of deanonymiza- probable cause to acquire search warrants. This tion. story was reported in many outlets [2] [5] [6] [9] [10]. Our team was retained to investigate the 2. NIT FRAMEWORK NIT to ensure that it only collected the infor- The NIT consisted of several dierent systems mation specied in the original warrant. Our that worked in concert to deanonymize users team's original report has been published for of the Tor Hidden Service. This section is public viewing [8]. broken down into separate sections based the This investigation is one of the rst where law dierent systems that were analyzed. A high c 2016 ADFSL Page 195 CDFSL Proceedings 2016 Reverse Engineering a NIT that unmasks TOR users Users Browser Line 15: generate random SID Flash Lines 18-38: determine method of decloaking hidden service request 3 Lines 1680-1692: use GALLERY_API_KEY to encrypt (server, SID, type) which creates the ECID TOR Network Line 73: include ECID as id in gallery.swf socket connection gallery.php Lines 46-48: resolve domain that hidden service response includes ECID 1 2 Line 49: make a socket connection to cornhusker Cookie cornhusker Logger FBI DNS and Logging Lines 29-34: send operating Server TOR Hidden Service Server system, architecture, and ECID to Server (FBI Controlled) cornhusker gallery.swf Figure 2. NIT Source Code Overview Figure 1. NIT High Level Overview level overview of the NIT is shown in Figure The server side code in gallery.php created 1. Section 2.1 describes how a Session Identier a unique SessionID each time a tracked web- (SessionID) was generated and logged. Section page was loaded. The data ow is shown 2.2 describes the ash application that makes in Figure 2. This SessionID is a random socket connections. Section 2.3 describes how number generated using the mcrypt_create_iv the FBI decrypted and logged data gathered and MCRYPT_DEV_URANDOM functions, from DNS queries. Section 2.4 describes how which are both standard mcrypt encryption the socket connection was logged. Section 2.5 functions. The random number generation is discusses how the data from the logs on dier- shown in Figure 4 on Line 15. After the ent servers were correlated. Section 2.6 discusses SessionID was generated, the FBI would log the our testing of the reliability and reproducibility data which included IDs for the uri, discussion of the NIT. Section 2.7 discusses some of the board, the thread and if the user was a modera- issues related to the log correlation and data va- tor (mod). This is done on line 16 and is shown lidity. in Figure 4. The code for the logging is shown in Figure 5. This code simply logs to a table 2.1 Server Side Code named 'visitors' in a SQL database. The main goal of the NIT was to deanonymize After the SessionID was created, the FBI's users of a Tor Hidden Service by revealing their code would determine which decloaking method public IP address. To accomplish this the FBI to use. This is shown in Figure 6. The browser generated an identier for users of the Tor Hid- that we tested was the Rekonq browser (as per den Service. This code needed to be dynamic the logs and FBI report). The Rekonq browser and change for each user of the webpage, and would cause the 3rd case (Lines 33-36) to be thus the FBI used php for the server side script- executed. The code then delivers the correct ing. When the user would visit one of the method of decloaking based on the variables pages that was being tracked, a page named with a prex display. For the Rekonq browser, gallery.php would be executed. Figure 3 shows gallery.php le would include a ash le named one of these pages that included gallery.php. gallery.swf and it would pass an id to the ash The gallery.php page is included in an iframe object. This id is created using the FBI's gen- and it has a size of 1 pixel by 1 pixel. erate_cookie function. The result of the gener- Page 196 c 2016 ADFSL Reverse Engineering a NIT that unmasks TOR users CDFSL Proceedings 2016 Figure 3. Tracked Webpage 1481.html Figure 4. PHP Variables in gallery.php ate_cookie function will be known as the En- 2.2 Flash Application and Socket crypted Session Identier (ECID). The gener- Server ate_cookie function uses the shared key named GALLERY _AP I_KEY , sets method to 'swf' The above section describes how the SessionID and uses the random SessionID that was gener- and ECID are generated. The ECID is passed to ated above. the ash object through the parameter named id. The FBI did not provide the source code for the ash application for our analy- Figure 8 shows the code that was used to gen- sis. This will be discussed in Section 4. To erate the ECID. The data stored in the ECID understand the functionality of the applica- is a commercial at (@) delimited data structure, tion, we reverse engineered the source code and data is terminated with a $. The num- for the ash application using the JPEXS de- ber 2 at the beginning represents which server compiler [7]. The reverse engineered source generated the cookie. There were three dier- is shown in Figure 9. In this ash code ent servers, each one had a dierent hardcoded the function is called shortly after value. The method is 'swf' and the $session_id loadGallery the ash application is loaded by the browser. is the SessionID from above. This data is en- This function loads the ECID on Line 42. If crypted with a random initialization vector (iv) that value is not null, the ash application and using the GALLERY _AP I_KEY .
Recommended publications
  • USA V Cottom Et Al 8:13-Cr-00108-JFB-TDT U.S. District Court District of Nebraska
    8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 1 of 29 - Page ID # 2406 NIT Forensic and Reverse Engineering Report, Continued from January 2015. USA v Cottom et al 8:13-cr-00108-JFB-TDT U.S. District Court District of Nebraska Investigators: Dr. Ashley Podhradsky, CHFI Dr. Matt Miller Mr. Josh Stroschein 06/05/2015 8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 2 of 29 - Page ID # 2407 Executive Summary: On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to serve as expert witnesses on USA v Cottom et al, 8:13-cr- 00108-JFB-TDT. The case is in federal court in Omaha and is centered on the viewing and possession of child pornography. The investigators were informed that the central issue of the case is the identification from the FBI’s “Network Investigative Technique” or NIT that was used to identify the IP address of users on The Onion Router (TOR) network. The investigators, Ashley, Matt and Josh, were informed that there were three servers containing contraband images that the FBI found and took offline in November of 2012. Shortly thereafter, the FBI placed the NIT on the servers and put the servers back online with the goal to identify the true IP address of end users accessing the servers through the TOR network. From there, several end users true IP addresses were identified which resulted in actual identification of the end users.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Computational Resource Abuse in Web Applications
    Computational Resource Abuse in Web Applications Juan David Parra Rodriguez Dissertation eingereicht an der Fakult¨atf¨ur Informatik und Mathematik der Universit¨at Passau zur Erlangung des Grades eines Doktors der Naturwissenschaften A dissertation submitted to the faculty of computer science and mathematics in partial fulfillment of the requirements for the degree of doctor of natural sciences Betreuer: Prof. Dr. rer. nat. Joachim Posegga Passau, Germany, April 2019 Abstract Internet browsers include Application Programming Interfaces (APIs) to support Web applications that require complex functionality, e.g., to let end users watch videos, make phone calls, and play video games. Meanwhile, many Web applications employ the browser APIs to rely on the user's hardware to execute intensive computation, access the Graphics Processing Unit (GPU), use persistent storage, and establish network connections. However, providing access to the system's computational resources, i.e., processing, storage, and networking, through the browser creates an opportunity for attackers to abuse resources. Principally, the problem occurs when an attacker compromises a Web site and includes malicious code to abuse its visitor's computational resources. For example, an attacker can abuse the user's system networking capabilities to perform a Denial of Service (DoS) attack against third parties. What is more, computational resource abuse has not received widespread attention from the Web security community because most of the current specifications are focused on content and session properties such as isolation, confidentiality, and integrity. Our primary goal is to study computational resource abuse and to advance the state of the art by providing a general attacker model, multiple case studies, a thorough anal- ysis of available security mechanisms, and a new detection mechanism.
    [Show full text]
  • Upgrade Issues
    Upgrade issues Graph of new conflicts libsiloh5-0 libhdf5-lam-1.8.4 (x 3) xul-ext-dispmua (x 2) liboss4-salsa-asound2 (x 2) why sysklogd console-cyrillic (x 9) libxqilla-dev libxerces-c2-dev iceape xul-ext-adblock-plus gnat-4.4 pcscada-dbg Explanations of conflicts pcscada-dbg libpcscada2-dev gnat-4.6 gnat-4.4 Similar to gnat-4.4: libpolyorb1-dev libapq-postgresql1-dev adacontrol libxmlada3.2-dev libapq1-dev libaws-bin libtexttools2-dev libpolyorb-dbg libnarval1-dev libgnat-4.4-dbg libapq-dbg libncursesada1-dev libtemplates-parser11.5-dev asis-programs libgnadeodbc1-dev libalog-base-dbg liblog4ada1-dev libgnomeada2.14.2-dbg libgnomeada2.14.2-dev adabrowse libgnadecommon1-dev libgnatvsn4.4-dbg libgnatvsn4.4-dev libflorist2009-dev libopentoken2-dev libgnadesqlite3-1-dev libnarval-dbg libalog1-full-dev adacgi0 libalog0.3-base libasis2008-dbg libxmlezout1-dev libasis2008-dev libgnatvsn-dev libalog0.3-full libaws2.7-dev libgmpada2-dev libgtkada2.14.2-dbg libgtkada2.14.2-dev libasis2008 ghdl libgnatprj-dev gnat libgnatprj4.4-dbg libgnatprj4.4-dev libaunit1-dev libadasockets3-dev libalog1-base-dev libapq-postgresql-dbg libalog-full-dbg Weight: 5 Problematic packages: pcscada-dbg hostapd initscripts sysklogd Weight: 993 Problematic packages: hostapd | initscripts initscripts sysklogd Similar to initscripts: conglomerate libnet-akamai-perl erlang-base screenlets xlbiff plasma-widget-yawp-dbg fso-config- general gforge-mta-courier libnet-jifty-perl bind9 libplack-middleware-session-perl libmail-listdetector-perl masqmail libcomedi0 taxbird ukopp
    [Show full text]
  • Opensuse 11.4 Release Party, Hackerspace Brmlab KDE Plasma Workspaces 4.6
    openSUSE 11.4 Release Party, hackerspace brmlab KDE Plasma Workspaces 4.6 ● Fire ox integration ● LibreO ice integration ● oxygen%"tk theme for GTK applications ● KUp(ate)pplet → KPackageKit ● PulseA*(io (can be remove(- KDE Plasma Desktop 4.6 KDE Plasma Desktop 4.6 KDE Plasma Netbook 4.6 KDE Plasma Netbook 4.6 &.$ME 2.30 &.$ME 3 Preview ● &.$ME 3.0 release in April 2311 ● “pre,iew4 in openSUSE 11.4 &.$ME 3 Preview &.$ME 3 Preview &.$ME 3 Preview 5 ce 4.8 ● new X ce 4.8 release ● moved a2ay from HAL and own VFS ● replace( by &9$, &8FS, *(ev, :onsoleKit, PolicyKit ● Th*nar ● SF'P, S/B, F'P, WebD)8 support ● Free(esktop.org menus ● 5 con settings e(itor 5 ce 4.8 5 ce 4.8 #XDE 3.5 ● smaller *sability and stability ixes #XDE 3.5 #XDE 3.5 Firefox 4.0 ● ma=or redesign of UI ● tabs above ad(ress bar ● signi icant improvements o the rendering engine ● can *se "raphics car( for ren(erin" ● S*pport or new 2ebstan(ar(s like WebM an( 7'/#< ● 4.3 ;eta 10, inal ,ia *p(ate Firefox 4.0 $ther Browsers ● Chromi*m in Contrib repository ● Konqueror uses WebKit now ● others in repositories (Rekonq, Arora, Epiphany) ● $pera 11, A(obe Flash Player 10.2 in Non%$SS repo ● Moonlight 2.4 ● $penJDK Ja,a 6 plugin #ibreOffice 3.3.1 ● ork of OpenO ice – end of 2010 ● import & e(it o S8G files ● 1 million rows in Calc ● easier slide layout han(ling in Impress #ibreOffice 3.3.1 zypp + YaST C WebDaS' ● Bypp ● /*lti:*rl backen( – Bsync + Metalink ● YaS' ● #8/ base( layout (*ring installation ● 8& group *lly encrypte( ● WebYaS' zypp + YaST C WebDaS' zypp + YaST C WebDaS' Under the hood ● Kernel 2.6.3E ● better har(2are support +e.".
    [Show full text]
  • TROGUARD: Context-Aware ProtecOn Against Web-Based Socially Engineered Trojans
    TROGUARD: Context-Aware Protec6on Against Web-Based Socially Engineered Trojans Rui Han, Alejandro Mesa, University of Miami Mihai Christodorescu, QualComm Research Saman Zonouz, Rutgers University Mo#va#on • Waterfall screen saver Trojan 2 Mac OS threats Rank Name Percentage 1 Trojan.OSX.FakeCo.a 52% 2 Trojan-DownloaDer.OSX.Jahlav.d 8% 3 Trojan-DownloaDer.OSX.Flashfake.aI 7% 4 Trojan-DownloaDer.OSX.FavDonw.c 5% 5 Trojan-DownloaDer.OSX.FavDonw.a 2% 6 Trojan-DownloaDer.OSX.Flashfake.ab 2% 7 Trojan-FakeAV.OSX.Defma.gen 2% 8 Trojan-FakeAV.OSX.Defma.f 1% 9 Exploit.OSX.Smid.b 1% 10 Trojan-DownloaDer.OSX.Flashfake.af 1% McAfee an6virus solu6on: hVp:www.securelist.com 3 Example Malwares Malware Descripons Plaorm TrojanClicker.VB Trojan socially Windows engineered as adobe .395 flash update and Mac OS X Trojan or Adware socially Windows, Mac Faked An6-Virus engineered as an6-virus so]ware OS X, and Linux Malware socially Android Opfake Browser engineered as Opera Browser Legi6mate applicaons Mac OS X and WireLuker socially engineered with ad-wares and Trojan iOS 4 ContribUons • Answer the ques6on: “Is this program doing what I expected it to do?” • Bridge the seman6c gap between func6onality classes and low level behaviors • Built on 100 Linux app profiles • High detec6on rate on 50 Trojan apps 5 TROGUARD ArchItectUre TROGUARD Offline Dynamic Application Functionality Application Functionality Functionality Class Profile Database Feature Tracing Generation Extraction Application Functionality Profile Database Online Inference of Download Perceived
    [Show full text]
  • Download the Latest Android Sdk How to Download the Latest Version of Android SDK for Visual Studio .NET 2017
    download the latest android sdk How to download the latest version of Android SDK for Visual Studio .NET 2017. I would like to make use of the latest version of Android SDK, but it doesn't show up in "Android SDKs and Tools". I'm using MS Visual Studio Professional 2017, and I have to use Google repository, because it doesn't work with Microsoft repository. Can you advise? 1 Answer 1. If you're using Microsoft Visual Studio , I assume that you are or planning to work with Xamarin , and since you're asking for advice, I'd recommend that you work with android sdk from Microsoft repository instead of Google's as its clearly shown in the screenshot "unsupported" . However, if you still want to get latest sdk tool, switch to tab "Tools" instead of "Platforms" you'll see all the version and from there you can update as needed. Download the latest android sdk. OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines . A smart contract is a decentralized application that executes business logic in response to events. Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting . Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, . Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt .
    [Show full text]
  • Third Quarterly Report of 2011
    3RD QUARTER 2011 ISSUE 19 d e s i g n e r 2011 developers s DESKTOP CONTENTS free users Welcome Message SUMMIT Page 2. software T Why and How KDE R Rocks at Mentoring This past year, KDE sent 150 people through their formal O mentoring program, helping them to become better software P developers and open source contributors. In this interview, E Lydia Pintscher explains how and why. Page 3. R Community Activites KDE e.V. sponsors developer Y sprints, meetings, and activities all over the world. T I In this edition of the report, we hear about KDE at the 2011 Desktop Summit, the N Plasma Active Meeting, the KDE Telepathy Sprint, the Calligra Mini-Sprint, and KDE e.V. U General Assembly. Pages 4-14. Systems Admin Report M Technical overview of the year. Page 15. M Financials Financial reports for the fiscal O year and for Quarter 3, 2011. C Attendees at the 2011 Berlin Desktop Summit. Izabel (upper left), Elizabeth (lower left), Ivan E (upper right), and Kimmo (lower right, photos taken by Claudio Saavedra). D K Developers WELCOME MESSAGE The Desktop Summit is 2011's third quarter brought the KDE community one of the largest together for its yearly flagship event. Similar to software gatherings 2009, when Gran Canaria hosted the first ever anywhere. Hundreds of Desktop Summit, KDE gathered again with its peers software developers from from the GNOME camp for the Desktop Summit. In dozens of projects came 2009, KDE and GNOME held separate, but co- to work with colleagues located events.
    [Show full text]
  • Search Engines by Andy Pepperdine
    2013-03-28 Searching and Browsers U3A in Bath How to get the best out of search engines by Andy Pepperdine Introduction This paper is about how to select search engines and search terms to answer questions on the net. It will also include comments about some of the search engines that are available, but it does not purport to be inclusive; I can cover only those I have experience of or have heard of. Finally, a comment will be made about the more popular browsers and how to customise the search bars on them where possible. Example of search In this example we want to find out why a newly purchased Lenovo laptop, running Ubuntu 12.10, cannot see its bluetooth, which it apparently has. The first step is to identify the key parts of the question, which in this case are bluetooth and lenovo and ubuntu, so we can start with those and see what turns up. One of the items might well be a blog entry somewhere describing how to get it working. In fact, in the particular case we studied, there were a few immediate entries of interest. Just those particular ones were enough to find a few things that pointed us in the right direction. This is general. If you can find the keywords that restrict the issue to the minimum yu will find what you are looking for. Of course, if one of the words has multiple meaning, then you may need further help by adding other words that might be associated with the question you have.
    [Show full text]
  • Kde Booklet Ver8.Pdf
    Table of Contents In the Internet era, KDE enables you to chat, Communicate blog, share, and exchange with your friends and Page 3 colleagues. KDE Applications connect you to the world. Learn & Play With KDE education applications and games, you can learn something new and have fun with Page 7 innovative software. Create When you need to put your thoughts and fee- lings in words and images, KDE applications are Page 11 there to help you do just that. Enjoy KDE has powerful applications that offer you new ways to enjoy your music, photos, and videos. Page 15 Whatever the devices you use, you can easily Workspaces start and manage applications within a Work- Page 18 space. Founded in 1996, KDE has become one of the Community largest Free Software communities, gathering ar- Page 22 tists, developers, translators, writers, and others from all over the world. The KDE community provides opportunities for Contribute new people eager to get involved. Come and Page 26 take a look! KDE technology is being deployed around the KDE in use world in a variety of situations. In schools, in Page 34 offices and libraries. We want to give you some examples! Experience Freedom KDE Introduction Dear reader! On the following pages, you can learn a bit about the KDE community and what we have created. This booklet was Our large and diverse community has built a com- written by (in no prehensive set of applications and tools to have particular order): fun, keep in touch, and get work done. We’ll pres- Luca Beltrame, ent some of these applications and give you some Stuart Jarvis, useful tips and hints.
    [Show full text]