Enhancing Multi-User OS with Network Provenance for Systematic Malware Defense

Total Page:16

File Type:pdf, Size:1020Kb

Enhancing Multi-User OS with Network Provenance for Systematic Malware Defense Enhancing Multi-user OS with Network Provenance for Systematic Malware Defense A Dissertation presented by Wai Kit Sze to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University May 2016 Stony Brook University The Graduate School Wai Kit Sze We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation Dr. R. Sekar - Dissertation Advisor Professor of Computer Science Dr. Donald Porter - Chairperson of Defense Assistant Professor of Computer Science Dr. Long Lu - Committee member of Defense Assistant Professor of Computer Science Dr. Trent Jaeger- Committee member of Defense Professor of Computer Science and Engineering Department, Pennsylvania State University This dissertation is accepted by the Graduate School Charles Taber Dean of the Graduate School ii Abstract of the Dissertation Enhancing Multi-user OS with Network Provenance for Systematic Malware Defense by Wai Kit Sze Doctor of Philosophy in Computer Science Stony Brook University 2016 Desktop OSes adopt users as the basic unit of trust. Every file and process owned by the same user has the same userid as the user. This design stems from the very first multi-user OS created in the late 1950s, where computers were self-contained and file contents were entirely under the control of users. With the spread of the Internet, it is common to have those code and data from the Internet. Users do not necessarily have the ability to fully understand every file they download. However, OSes do not distinguish between downloaded files from regular user files, and they simply reuse the same trust model and treat downloaded files as if users own files— OSes assume users understand the consequences of using these files. When malware exploits this design flaw, OSes simply warn users that using files from the Internet can compromise the systems and let the user to decide whether to use the files. In this dissertation, we propose Spif, which generalizes the OS trust-hierarchy with provenance information| Spif extends the trust-hierarchy with principals to encode both local users and remote provenance information. Principals in Spif can have different trust relationships. Spif is general and can model trust-hierarchy of systems like Same-Origin Policy, Android and Bubbles. With just two provenances having a unidirectional trust relationship, Spif can already provide usable integrity protection to defend against unknown, high-profile malware such as Stuxnet and Sandworm. We also demonstrate a secure software installation system based on Spif. Trust-hierarchy and access-controls are enforced deeply inside OSes. Generalizing trust-model in OSes can therefore affect every application and component inside OSes. Instead of building a brand new OS from scratch or instrumenting existing OSes to enforce a new trust-model directly, Spif achieves this generalization by re-purposing security-mechanisms common in contemporary OSes. This re-purposing automatically mediates every resource access, incurs low performance overhead, and is agnostic to both OSes and applications. Spif has been implemented on various OSes, including Linux, BSD, and Windows. Spif also runs large unmodified applications such as Firefox, Microsoft Office, Adobe Reader, and Photoshop. iii Table of Contents Contents 1 Introduction 2 2 Background and Related work5 2.1 Malware detection and avoidance.............................5 2.1.1 Anti-virus......................................5 2.1.2 Origin-based protection..............................6 2.1.3 Code-signing....................................7 2.2 Policy-based confinement.................................8 2.2.1 Drawbacks for policy-based confinement.....................8 2.2.2 Privilege separation................................ 10 2.3 Isolation-based approach.................................. 10 2.3.1 Drawbacks for applying isolation on desktop environment........... 11 2.3.2 Attempts to make isolation more usable for desktop environment....... 11 2.4 Information flow control.................................. 13 2.4.1 Usability problems with IFC policies....................... 13 2.4.2 Modern application of IFC............................ 14 2.4.3 Decentralized information flow control...................... 15 3 Portable Information Flow Tracking 16 3.1 Approach overview..................................... 16 3.1.1 Reliable tracking system.............................. 18 3.1.2 Robust policy enforcement............................ 18 3.1.3 Application transparency............................. 18 3.1.4 Preserving user experience............................. 18 3.1.5 Automating policy development......................... 19 3.1.6 Implementation on contemporary OSes..................... 19 3.2 Threat Model........................................ 19 3.3 Containing Untrusted Processes.............................. 20 3.3.1 Inner Sandbox UI ................................. 21 3.3.2 Transparency Library UL ............................. 22 3.3.3 Helper Process UH ................................. 23 3.3.4 Windows implementation............................. 24 3.4 Protecting Benign Processes................................ 24 3.4.1 Benign Sandboxing Library............................ 25 3.4.2 Secure Context Switching............................. 26 3.4.2.1 Transition on UNIX........................... 27 3.4.2.2 Transition on Windows......................... 27 3.5 Policy Inference....................................... 27 3.5.1 Untrusted Code Policy............................... 28 3.5.1.1 Explicitly specified versus implicit access to files........... 28 3.5.1.2 Computing Implicitly Accessed Files.................. 29 3.5.2 Benign Code Policy................................ 30 3.5.2.1 Logical isolation............................. 30 3.5.2.2 Untrusted execution........................... 30 3.5.2.3 Trust-confined execution........................ 31 3.5.3 Trial-execution based inference.......................... 31 iv 3.6 Security Guarantees.................................... 32 3.6.1 Integrity Preservation............................... 32 3.6.2 Availability Preservation.............................. 34 3.7 Implementation....................................... 35 3.7.1 Spif initialization................................. 35 3.7.2 UL and BL realization............................... 35 3.7.2.1 Policy enforcement mechanics...................... 35 3.7.2.2 Enforcement on system calls...................... 36 3.7.3 Initial file labeling................................. 37 3.7.4 Relabeling...................................... 38 3.7.5 Display server and DBus.............................. 39 3.7.6 File utilities..................................... 39 3.8 Evaluation.......................................... 40 3.8.1 Code complexity.................................. 40 3.8.2 Preserving Functionality of Code......................... 40 3.8.2.1 Benign mode............................... 40 3.8.2.2 Untrusted mode............................. 41 3.8.2.3 Overall.................................. 42 3.8.3 Usage experience.................................. 43 3.8.4 Experience with malicious software........................ 44 3.8.4.1 Real world malware on Ubuntu..................... 44 3.8.4.2 Real world exploit on Ubuntu...................... 44 3.8.4.3 Simulated targeted attacks on Ubuntu................. 44 3.8.5 Real world exploit on Windows.......................... 45 3.8.5.1 Real world malware on Windows.................... 46 3.8.6 Performance.................................... 47 3.8.6.1 Micro-benchmark............................ 47 3.8.6.2 Macro-benchmark............................ 47 3.9 Discussion.......................................... 49 3.9.1 Alternative choices for enforcement........................ 49 3.9.2 Limitations..................................... 50 3.9.3 Other architectural/implementation vulnerabilities............... 50 3.10 Related Work........................................ 51 4 Functionality and usability in policy enforcement mechanisms 53 4.1 Formalizing Functionality, Compatibility and Usability................. 54 4.1.1 Integrity policies.................................. 55 4.1.2 Comparing functionalities of integrity policies.................. 56 4.1.3 Compatibility.................................... 56 4.1.4 Maximizing functionality and compatibility................... 57 4.2 Self-Revocation Free Downgrading............................ 58 4.2.1 Abstractions.................................... 59 4.2.2 Information Flow Policies............................. 59 4.2.3 Forward information flows............................. 60 4.2.4 Constraint propagation.............................. 61 4.2.5 Properties...................................... 61 4.3 SRFD Implementation and Evaluation.......................... 62 4.3.1 Abstractions: Subjects, Objects, and Handles.................. 63 4.3.2 Constraint propagation.............................. 63 4.3.3 Tracking subjects.................................. 64 4.3.4 Limitations..................................... 64 v 4.3.5 Performance.................................... 64 4.3.6 User Experience.................................. 66 4.3.7 Defense against malware.............................. 67 4.4 User-level SRFD...................................... 68 4.4.1 Downgrading mechanism............................. 68 4.4.2 userid propagation and maintenance......................
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Nix on SHARCNET
    Nix on SHARCNET Tyson Whitehead May 14, 2015 Nix Overview An enterprise approach to package management I a package is a specific piece of code compiled in a specific way I each package is entirely self contained and does not change I each users select what packages they want and gets a custom enviornment https://nixos.org/nix Ships with several thousand packages already created https://nixos.org/nixos/packages.html SHARCNET What this adds to SHARCNET I each user can have their own custom environments I environments should work everywhere (closed with no external dependencies) I several thousand new and newer packages Current issues (first is permanent, second will likely be resolved) I newer glibc requires kernel 2.6.32 so no requin I package can be used but not installed/removed on viz/vdi https: //sourceware.org/ml/libc-alpha/2014-01/msg00511.html Enabling Nix Nix is installed under /home/nixbld on SHARCNET. Enable for a single sessiong by running source /home/nixbld/profile.d/nix-profile.sh To always enable add this to the end of ~/.bash_profile echo source /home/nixbld/profile.d/nix-profile.sh \ >> ~/.bash_profile Reseting Nix A basic reset is done by removing all .nix* files from your home directory rm -fr ~/.nix* A complete reset done by remove your Nix per-user directories rm -fr /home/nixbld/var/nix/profile/per-user/$USER rm -fr /home/nixbld/var/nix/gcroots/per-user/$USER The nix-profile.sh script will re-create these with the defaults next time it runs. Environment The nix-env commands maintains your environments I query packages (available and installed) I create a new environment from current one by adding packages I create a new environment from current one by removing packages I switching between existing environments I delete unused environements Querying Packages The nix-env {--query | -q} ..
    [Show full text]
  • 18 Free Ways to Download Any Video Off the Internet Posted on October 2, 2007 by Aseem Kishore Ads by Google
    http://www.makeuseof.com/tag/18-free-ways-to-download-any-video-off-the-internet/ 18 Free Ways To Download Any Video off the Internet posted on October 2, 2007 by Aseem Kishore Ads by Google Download Videos Now download.cnet.com Get RealPlayer® & Download Videos from the web. 100% Secure Download. Full Movies For Free www.YouTube.com/BoxOffice Watch Full Length Movies on YouTube Box Office. Absolutely Free! HD Video Players from US www.20north.com/ Coby, TV, WD live, TiVo and more. Shipped from US to India Video Downloading www.VideoScavenger.com 100s of Video Clips with 1 Toolbar. Download Video Scavenger Today! It seems like everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos. There are basically two ways to download videos off the Internet and that’s how I’ll split up this post: either via a web app or via a desktop application. Personally, I like the web applications better simply because you don’t have to clutter up and slow down your computer with all kinds of software! UPDATE: MakeUseOf put together an excellent list of the best websites for watching movies, TV shows, documentaries and standups online.
    [Show full text]
  • “Laboratório” De T V Digital Usando Softw Are Open Source
    “Laboratório” de TV digital usando software open source Objectivos Realizar uma pesquisa de software Open Source, nomeadamente o que está disponível em Sourceforge.net relacionado com a implementação de operações de processamento de sinais audiovisuais que tipicamente existem em sistemas de produção de TV digital. Devem ser identificadas aplicações para: • aquisição de vídeo, som e imagem • codificação com diferentes formatos (MPEG-2, MPEG-4, JPEG, etc.) • conversão entre formatos • pré e pós processamento (tal como filtragens) • edição • anotação Instalação dos programas e teste das suas funcionalidades. Linux Aquisição Filtros Codificação :: VLC :: Xine :: Ffmpeg :: Kino (DV) :: VLC :: Transcode :: Tvtime Television Viewer (TV) :: Video4Linux Grab Edição :: Mpeg4IP :: Kino (DV) Conversão :: Jashaka :: Kino :: Cinelerra :: VLC Playback :: Freej :: VLC :: FFMpeg :: Effectv :: MJPEG Tools :: PlayerYUV :: Lives :: Videometer :: MPlayer Anotação :: Xmovie :: Agtoolkit :: Video Squirrel VLC (VideoLan Client) VLC - the cross-platform media player and streaming server. VLC media player is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network. http://www.videolan.org/ Kino (DV) Kino is a non-linear DV editor for GNU/Linux. It features excellent integration with IEEE-1394 for capture, VTR control, and recording back to the camera. It captures video to disk in Raw DV and AVI format, in both type-1 DV and type-2 DV (separate audio stream) encodings. http://www.kinodv.org/ Tvtime Television Viewer (TV) Tvtime is a high quality television application for use with video capture cards on Linux systems.
    [Show full text]
  • Release Notes for Fedora 15
    Fedora 15 Release Notes Release Notes for Fedora 15 Edited by The Fedora Docs Team Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners.
    [Show full text]
  • Design and Implementation of Image Processing and Compression Algorithms for a Miniature Embedded Eye Tracking System Pavel Morozkin
    Design and implementation of image processing and compression algorithms for a miniature embedded eye tracking system Pavel Morozkin To cite this version: Pavel Morozkin. Design and implementation of image processing and compression algorithms for a miniature embedded eye tracking system. Signal and Image processing. Sorbonne Université, 2018. English. NNT : 2018SORUS435. tel-02953072 HAL Id: tel-02953072 https://tel.archives-ouvertes.fr/tel-02953072 Submitted on 29 Sep 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Sorbonne Université Institut supérieur d’électronique de Paris (ISEP) École doctorale : « Informatique, télécommunications & électronique de Paris » Design and Implementation of Image Processing and Compression Algorithms for a Miniature Embedded Eye Tracking System Par Pavel MOROZKIN Thèse de doctorat de Traitement du signal et de l’image Présentée et soutenue publiquement le 29 juin 2018 Devant le jury composé de : M. Ales PROCHAZKA Rapporteur M. François-Xavier COUDOUX Rapporteur M. Basarab MATEI Examinateur M. Habib MEHREZ Examinateur Mme Maria TROCAN Directrice de thèse M. Marc Winoc SWYNGHEDAUW Encadrant Abstract Human-Machine Interaction (HMI) progressively becomes a part of coming future. Being an example of HMI, embedded eye tracking systems allow user to interact with objects placed in a known environment by using natural eye movements.
    [Show full text]
  • OFELIA Bridge Setup
    Bridging Devices onto the OFELIA Testbed David R Newman December 10, 2013 1 Introduction The OFELIA testbed makes it possible to bridge devices onto slices created via an island's Expedient site. This document will provide instructions on how to bridge both Linux and Windows devices. OpenVPN is the best suited application for setting up an Ethernet bridge from a Linux virtual machine on the OFELIA testbed. It can be installed as a server package on most Linux distributions and as a client on most Linux and Windows distributions. OpenVPN's Linux instructions on how to do setup an Ethernet bridge using OpenVPN can be found at: http://openvpn.net/index.php/open-source/documentation/miscellaneous/76-ethernet-bridging.html This guide is an adaptation of these instructions for setting up an Ethernet bridge to an OFELIA island virtual machine. It assumes that you have already: 1. Created your own OFELIA account. 2. Connected to the OFELIA testbed network over VPN. 3. Created a project through an OFELIA island's Expedient website . 4. Added a slice to that project. 5. Created a couple of virtual machines on the OFELIA island's virtual machine servers. 6. Congured a owspace connecting together these virtual machines with one or more switches. Section 2 describes the project, test slice and owspace used as an exemplar in this guide. If you need help getting to a similar point follow the instructions at: https://alpha.fp7-ofelia.eu/doc/index.php/Working_with_the_OFELIA_Control_Framework Section 3 describes how to generate the server-side conguration for Ethernet bridging and section 4 how to generate the client-side conguration.
    [Show full text]
  • SUSE® Linux Enterprise Desktop 12 and the Workstation Extension: What's New ?
    SUSE® Linux Enterprise Desktop 12 and the Workstation Extension: What's New ? Frédéric Crozat <[email protected]> Enterprise Desktop Release Manager Scott Reeves <[email protected]> Enterprise Desktop Development Manager Agenda • Design Criteria • Desktop Environment in SUSE Linux Enterprise 12 • GNOME Shell • Desktop Features and Applications 2 Design Criteria SUSE Linux Enterprise Desktop Interoperability Ease of Use Security Ease of Management Lower Costs 4 SUSE Linux Enterprise Desktop 12 • Focus on technical workstation ‒ Developers and System administrators • One tool for the job • Main desktop applications will be shipped: ‒ Mail client, Office Suite, Graphical Editors, ... • SUSE Linux Enterprise Workstation Extension ‒ Extend SUSE Linux Enterprise Server with packages only available on SUSE Linux Enterprise Desktop. (x86-64 only) 5 Desktop in SUSE Linux Enterprise 12 As Part of the Common Code Base SUSE Linux Enterprise 12 Desktop Environment • SUSE Linux Enterprise 12 contains one primary desktop environment • Additional light-weight environment for special use-cases: ‒ Integrated Systems • Desktop environment is shared between the server and desktop products 7 SUSE Linux Enterprise 12 Desktop Environment • GNOME 3 is the main desktop environment ‒ SLE Classic mode by default ‒ GNOME 3 Classic Mode and GNOME 3 Shell Mode also available • SUSE Linux Enterprise 12 ships also lightweight IceWM ‒ Targeted at Integrated Systems • QT fully supported: ‒ QT5 supported for entire SLE12 lifecycle ‒ QT4 supported, will be removed in future
    [Show full text]
  • Openbsd Gaming Resource
    OPENBSD GAMING RESOURCE A continually updated resource for playing video games on OpenBSD. Mr. Satterly Updated August 7, 2021 P11U17A3B8 III Title: OpenBSD Gaming Resource Author: Mr. Satterly Publisher: Mr. Satterly Date: Updated August 7, 2021 Copyright: Creative Commons Zero 1.0 Universal Email: [email protected] Website: https://MrSatterly.com/ Contents 1 Introduction1 2 Ways to play the games2 2.1 Base system........................ 2 2.2 Ports/Editors........................ 3 2.3 Ports/Emulators...................... 3 Arcade emulation..................... 4 Computer emulation................... 4 Game console emulation................. 4 Operating system emulation .............. 7 2.4 Ports/Games........................ 8 Game engines....................... 8 Interactive fiction..................... 9 2.5 Ports/Math......................... 10 2.6 Ports/Net.......................... 10 2.7 Ports/Shells ........................ 12 2.8 Ports/WWW ........................ 12 3 Notable games 14 3.1 Free games ........................ 14 A-I.............................. 14 J-R.............................. 22 S-Z.............................. 26 3.2 Non-free games...................... 31 4 Getting the games 33 4.1 Games............................ 33 5 Former ways to play games 37 6 What next? 38 Appendices 39 A Clones, models, and variants 39 Index 51 IV 1 Introduction I use this document to help organize my thoughts, files, and links on how to play games on OpenBSD. It helps me to remember what I have gone through while finding new games. The biggest reason to read or at least skim this document is because how can you search for something you do not know exists? I will show you ways to play games, what free and non-free games are available, and give links to help you get started on downloading them.
    [Show full text]
  • Breve Manual De GTK- Recordmydesktop
    GTK-RecordMyDesktop – Serafín Vélez Barrera Breve manual de GTK- RecordMyDesktop 1/14 GTK-RecordMyDesktop – Serafín Vélez Barrera Breve manual de GtkRecordMyDesktop por Serafín Vélez Barrera se encuentra bajo una Licencia Creative Commons Atribución- NoComercial-CompartirIgual 3.0 Unported. 2/14 GTK-RecordMyDesktop – Serafín Vélez Barrera Índice 1. Introducción 2. ¿Entonces para qué sirve? 3. ¿Cómo lo instalo? 4. La interfaz 5. Opciones avanzadas 6. Crear el vídeo 3/14 GTK-RecordMyDesktop – Serafín Vélez Barrera 1. Introducción Más de una vez seguramente que navegando has visto algún vídeo demostrativo de cómo hacer algo con el ordenador, por ejemplo como utilizar GIMP, Inkscape u otras aplicaciones muy interesantes. Bien, las personas que han hecho esos vídeos han necesitado de un programa para grabar el escritorio y para esto se diseñó GTK- RecordMyDesktop. 4/14 GTK-RecordMyDesktop – Serafín Vélez Barrera 2. ¿Entonces para qué sirve? Pues con esta aplicación lo que podemos hacer es la grabación de nuestro escritorio de una forma sencilla, rápida a como hacen muchas otras aplicaciones. Podemos combinar esta herramienta junto con otras para realizar ediciones de más calidad, como por ejemplo la aplicación Pitivi con la que podemos editar vídeos y así hacer screencasts personalizados. 5/14 GTK-RecordMyDesktop – Serafín Vélez Barrera 3. ¿Cómo lo instalo? En las distribuciones Linux lo podemos instalar desde los paquetes precompilados o bien descargar el código fuente y compilarlo nosotros mismos. Así por facilidad lo mejor es instalar un paquete precompilado. A continuación no es más que ejecutemos la orden correspondiente a nuestra distribución: Ubuntu/Debian: aptitude install gtk- recordmydesktop Gentoo: emerge gtk-recordmydesktop Fedora: yum install gtk-recordmydesktop OpenSuSe: zypper in gtk-recordmydesktop 6/14 GTK-RecordMyDesktop – Serafín Vélez Barrera 4.
    [Show full text]
  • Release Notes for Xfree86® 4.8.0 the Xfree86 Project, Inc December 2008
    Release Notes for XFree86® 4.8.0 The XFree86 Project, Inc December 2008 Abstract This document contains information about the various features and their current sta- tus in the XFree86 4.8.0 release. 1. Introduction to the 4.x Release Series XFree86 4.0 was the first official release of the XFree86 4 series. The current release (4.8.0) is the latest in that series. The XFree86 4.x series represents a significant redesign of the XFree86 X server,with a strong focus on modularity and configurability. 2. Configuration: aQuickSynopsis Automatic configuration was introduced with XFree86 4.4.0 which makes it possible to start XFree86 without first creating a configuration file. This has been further improved in subsequent releases. If you experienced any problems with automatic configuration in a previous release, it is worth trying it again with this release. While the initial automatic configuration support was originally targeted just for Linux and the FreeBSD variants, as of 4.5.0 it also includes Solaris, NetBSD and OpenBSD support. Full support for automatic configuration is planned for other platforms in futurereleases. If you arerunning Linux, FreeBSD, NetBSD, OpenBSD, or Solaris, try Auto Configuration by run- ning: XFree86 -autoconfig If you want to customise some things afterwards, you can cut and paste the automatically gener- ated configuration from the /var/log/XFree86.0.log file into an XF86Config file and make your customisations there. If you need to customise some parts of the configuration while leav- ing others to be automatically detected, you can combine a partial static configuration with the automatically detected one by running: XFree86 -appendauto If you areusing a platform that is not currently supported, then you must try one of the older methods for getting started like "xf86cfg", which is our graphical configuration tool.
    [Show full text]