An Engineer's Primer on Linux, Firefox, Thunderbird and Openoffice

Total Page:16

File Type:pdf, Size:1020Kb

An Engineer's Primer on Linux, Firefox, Thunderbird and Openoffice An Engineer's Primer on Linux, Firefox, Thunderbird and OpenOffice A White Paper by: Brent Scott LaReau, Consultant www.designsbylareau.com Revised: April 17, 2007 Copyright c 2007 by Brent Scott LaReau Brent Scott LaReau, Consultant Voice/FAX (U.S.A.): 847-428-4923 This document and its content is protected by copy- E-mail: [email protected] right, regardless of how this document or its content is Web: www.DesignsByLaReau.com printed, viewed, encoded, stored or transmitted. Per- Mail (U.S.A.): 2413 W. Algonquin Road, PMB #258 mission to paraphrase, reproduce or copy any part, or Algonquin, IL 60102-9776 all, of this document or its content is granted only if: 1. The reproduction or copy is not achieved for profit without this author's express consent, and. 2. Sufficient information is included to identify this document and its author. Specifically: • The full title of this document plus its copy- right date(s), and. • This author's full name (Brent Scott LaReau) and his brief or complete contact information. About the Author Disclaimer Brent Scott LaReau has been an independent consul- tant since 1987. Information in this document is subject to change without notice and is distributed on an \as is" basis, without war- ranty. Although every precaution has been taken in the He provides design and development services in elec- preparation of this document, its author shall not have any tronics, software, embedded systems and devices, web liability to any person or entity with respect to any loss or and intranet sites, knowledge base construction, tech- damage caused or alleged to be caused directly or indirectly nical writing, Information Security, and on-site train- by the information contained in this document. ing/mentoring. He is proficient in heterogeneous sys- tem design, where diverse components use different programming languages, interfaces, databases, net- works and communications protocols. Brent earned his BSEE at Marquette University, grad- uating first in his class. His academic awards include the International Engineering Consortium's (IEC's) William L. Everitt Award, Marquette University's Top Scholars in Curriculum Award, and the College of Lake Trademark Information County's Outstanding Academic Excellence in Mathe- matics and Outstanding Scholar Award. Trademarked names may appear in this document. Rather than use a trademark symbol with every occurrence of a He is a member of the Institute of Electrical and Elec- trademarked name, such names are used in an editorial tronics Engineers (IEEE), the Association of Comput- fashion and to the benefit of the trademark owner, with no ing Machinery (ACM), and American Mensa, Ltd. intention of infringement of the trademark. 2 Contents 1 Introduction and Overview 5 2 Linux 6 2.1 The Operating System Is NOT the Computer! . 6 2.2 Meet the Kernel . 6 2.3 GNU/Linux . 6 2.4 Live CDs: Zero to Linux in Two Minutes . 7 2.4.1 Versions for Windows Users or Linux Newcomers . 7 2.4.2 Flagship Versions . 7 2.4.3 Small Versions . 8 2.4.4 USB Versions . 8 2.5 OK, What's the Catch? . 9 2.5.1 Wine, so Sweet . 9 2.5.2 Mono: A Safety \.NET" . 9 2.6 How to Get Started with Linux|Now! . 9 3 Firefox 11 3.1 Internet Explorer Is NOT the Internet! . 11 3.2 Firefox Emerges from Its Hole . 11 3.3 Tabbed Browsing? Cool! . 11 3.4 Other Features . 11 3.5 Automatic Updates . 11 3.6 Security . 11 3.7 Privacy . 12 3.8 Getting Firefox . 12 3 CONTENTS 4 Thunderbird 13 4.1 Outlook Is NOT the E-mail! . 13 4.2 Features . 13 4.3 Security . 13 4.4 Spam Filtering . 13 4.5 Customization . 13 4.6 Automatic Updates . 13 4.7 Getting Thunderbird . 14 5 OpenOffice 15 5.1 Excel is NOT the Spreadsheet! . 15 5.2 Not so Suite . 15 5.3 Beware the EULA . 15 5.4 Free as in Beer, Free as in Speech . 16 5.5 Components . 16 5.6 Features . 16 5.7 Who Owns Your Data? . 16 5.8 Getting OpenOffice . 17 6 Lagniappe 18 6.1 GIMP: Graphics . 18 6.2 K3b: CD Burning . 18 6.3 Scribus: Desktop Publishing . 18 6.4 Nmap: Network Scanner . 18 6.5 Wireshark: Network Analyzer . 18 6.6 KHexEdit: Binary File Editor . 19 6.7 KWrite and Kate: Syntax-highlighting Text Editors . 19 6.8 KSnapshot: Screen Grabber . 19 6.9 KCalc: Scientific Calculator . 19 6.10 KStars: Astronomy . 19 6.11 TEX, LATEX and LYX . 19 4 Part 1 Introduction and Overview \If a man does not keep pace with his companions, perhaps hardware platforms than any other operating system it is because he hears a different drummer. Let him step to on the planet|cell phones, webcams, personal video the music which he hears, however measured or far away." recorders, game systems, PCs/Macs, mainframe com- |Henry David Thoreau (1817-1862) puters, multi-node clusters, and supercomputers. It's an engineers' delight. ecurity is a major concern as we become ever Plus, a great number of Linux software applications are more dependent on data communications net- available|for free. For example, OpenOffice is a suite S works such as the Internet to conduct our busi- of software applications that is similar to Microsoft ness. We have seen an exponential increase in spyware Office. Firefox is a popular web browser with many and other malware, which place our identities and our advantages over Internet Explorer. Thunderbird is an confidential data at risk1. Any engineer whose com- easy replacement for Outlook Express. These three puter has suffered a malware infection doesn't want applications are just the tip of the iceberg. another such experience|ever. Interestingly, OpenOffice, Firefox and Thunderbird are Computer security vendors would have us believe that available for Windows, too. Since malware commonly security can be purchased|from them|at a price. enters Windows computers through two major en- But Information Security experts know that you can- try points|Internet Explorer and Outlook|replacing not purchase security. Information Security is a pro- these with Firefox and Thunderbird can dramatically cess, not a product. This process requires a \layered" increase your Internet security when using Windows. approach, where malware must surmount many obsta- cles before finding a vulnerability to exploit. This White Paper shows how you can get Linux up and running on most PC-compatible (x86-based) comput- One way to create an obstacle is to not use what every- ers in less than five minutes|risk-free and cost-free| one else is using, since those who create malware are by running Linux from a CDROM instead of installing not so stupid as to select targets that are very rarely it to your hard drive. You can install Linux to your found. Instead, malware writers target what \every- hard drive later if you wish. one"is using: Microsoft software, especially Windows, Outlook, Internet Explorer, Microsoft Office, and Me- We will also introduce Firefox, Thunderbird and dia Player. OpenOffice, which together fill most engineers' three biggest needs: Web browsing, e-mail and office pro- For this reason, Linux and applications such as Fire- ductivity. These three applications are included with fox, Thunderbird and OpenOffice remain immune to many versions of Linux (including the CDROM-based normal malware. You can relax|Linux puts the fun version mentioned previously), so you can try them back into personal computing! without having to install them. Besides being immune to malware, Linux offers zero li- (Hmmm. easy, quick, free, secure, and powerful. censing costs, excellent reliability, and an ability to run Gee, I wonder if I should try any of these?) well on older PCs. Arguably, Linux runs on far more 1See \An Engineer's Primer on Information Security" by this author, available at his web site [5]. 5 Part 2 Linux Linus Torvalds began to create the Linux kernel while he The first Linux-based operating systems were com- was attending the University of Helsinki in 1991. He was 21 pleted in 1992 by combining system utilities and li- years old. Today, Torvalds and more than two dozen other braries from the GNU Project [13]1 with the Linux distinctive programmers continue to refine the kernel. kernel. Therefore, we should really say \GNU/Linux" instead of\Linux", but most people use the latter term for brevity. 2.1 The Operating System Is NOT the Computer! 2.3 GNU/Linux For many years, most computers have been pre-loaded with an operating system|usually Windows or Mac GNU, which stands for \GNU is Not Unix", is a large OS|before being shipped from the factory. Therefore, collection of software libraries and applications that to- most people (including some engineers) intuitively feel gether create a Unix-like operating system. This makes that an operating system is somehow integrated with GNU/Linux a Unix-like operating system too2. a computer's hardware. GNU/Linux has all the features you would expect in a But in fact, an operating system is a replaceable part modern fully-fledged Unix, including true multitask- even though Microsoft would have everyone believe ing, virtual memory, shared libraries, demand load- otherwise. Therefore, you can choose which operating ing, shared copy-on-write executables, proper mem- system to run on your computer hardware. ory management, and multi-stack networking includ- For example, you could choose to run Linux. It's free. ing IPv4 and IPv6. It's meant to stay up for months at a time. Its license has impossibly easy terms compared to Microsoft's. As GNU/Linux matured, various people, groups and You can install Linux on as many computers as you companies began to produce and distribute customized want.
Recommended publications
  • Herramientas En GNU/Linux Para Estudiantes Universitarios
    Herramientas en GNU/Linux para estudiantes universitarios El Escritorio KDE David Vaquero Santiago Herramientas en GNU/Linux para estudiantes universitarios: El Escritorio KDE por David Vaquero Santiago Copyright (c) 2.003 David Vaquero Santiago Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Tabla de contenidos 1. El Escritorio KDE..............................................................................................................................................1 1.1. La Historia de KDE.................................................................................................................................1 1.2. .................................................................................................................................................................1 2. ..............................................................................................................................................................................3 2.1. El escritorio KDE....................................................................................................................................3 3. Konqueror: La herramienta polivalente..........................................................................................................8
    [Show full text]
  • Optimization of Fontconfig Library Optimization of Fontconfig Library
    Michal Srb OPTIMIZATION OF FONTCONFIG LIBRARY OPTIMIZATION OF FONTCONFIG LIBRARY Michal Srb Bachelor's Thesis Spring 2017 Information Technology Oulu University of Applied Sciences ABSTRACT Oulu University of Applied Sciences Degree Programme in Information Technology, Internet Services Author: Michal Srb Title of the bachelor’s thesis: Optimization of Fontconfig Library Supervisor: Teemu Korpela Term and year of completion: Spring 2017 Number of pages: 39 + 1 appendix Fontconfig is a library that manages a database of fonts on Linux systems. The aim of this Bachelor's thesis was to explore options for making it respond faster to application's queries. The library was identified as a bottleneck during the startup of graphical applications. The typical usage of the library by applications was analyzed and a set of standalone benchmarks were created. The library was profiled to identify hot spots and multiple optimizations were applied to it. It was determined that to achieve an optimal performance, a complete rewrite would be necessary. However, that could not be done while staying backward compatible. Nevertheless, the optimizations applied to the existing fontconfig yielded significant performance improvements, up to 98% speedups in benchmarks based on the real-world usage. Keywords: fontconfig, optimization, benchmarking, profiling 3 CONTENTS 1 INTRODUCTION 6 2 BACKGROUND 7 1.1 Motivation 7 1.2 Fontconfig 8 1.2.1 Function 9 1.2.2 Configuration 11 2 ANALYSIS 12 2.1 Main entry functions 12 2.1.1 FcFontMatch 12 2.1.2 FcFontSort 14 2.1.3
    [Show full text]
  • Asus Eee PC for Dummies
    Index journal, 101 • Symbols and Numerics • KCalc, 100 > (greater than), redirecting output, 311 KNotes, 105 >> (greater thans), appending to a fi le, 311 Kontact, 100–101 | (vertical bar), directing output to KSnapshot, 102–103 another command, 311–312 PIM (Personal Information Manager), 2G Surf, 14 100–101 4G, 14–15 PIM icon, 99 4G Surf, 14–15 pop-up notes, 101, 105 701SD, 15 Screen Capture icon, 99 900 series, 15–18 to-do list, 101 901 and Beyond icon, 6 Accessories icon, 92, 99 1000 series, 18–19 account name, personalizing, 149 Acrobat Reader, 184. See also PDF readers Acronis True Image, 284 • A • Ad-Aware Free, 231 Adblock Plus, 60 AbiWord, 219–220 add-ons accessories, hardware. See also Firefox, 59–60 personalization Thunderbird, 95–96 Bluetooth, 254–255 Add/Remove Software, 163. See also carrying case, 249–251 installing; uninstalling case graphics, 255–256 Add/Remove Software icon, 147, 163 GPS (Global Positioning System), 259–261 address books, Thunderbird, 96. See also keyboards, 252–253 contact lists mice, 251–252 administrative privileges, 309 modems, 256–257 Advanced Mode, 295–301. See also monitors, 257–259 Easy Mode projectors, 257–259 Advanced Packaging Tool (APT), 204–205 skins (themes), 255–256 advertisements, blocking, 60 USB powered work light, 254 adware, 231 accessories, software. See also AIM, 65 personalization COPYRIGHTEDAll About MATERIAL Eee, 343 accessing, 99 Amarok music player/organizer, 139–140 Calculator, 100 Amazon, 22 Calculator icon, 99 Andreesen, Marc, 58 calendar, 101 Andrew K’s XP Games, 228 capturing
    [Show full text]
  • Active@ Livecd User Guide Copyright © 1999-2015, LSOFT TECHNOLOGIES INC
    Active@ LiveCD User Guide Copyright © 1999-2015, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC. LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change. LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either, implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC. Other brand and product names may be registered trademarks or trademarks of their respective holders. 2 Active@ LiveCD User Guide Contents 1 Product Overview................................................................................................................ 4 1.1 About Active@ LiveCD .................................................................................................. 4 1.2 Requirements for Using Active@ Boot Disk .................................................................... 6 1.3 Downloading and Creating Active@ LiveCD.................................................................... 6 1.4 Booting from a CD, DVD or USB Media .........................................................................
    [Show full text]
  • Linux Mint - 2Nde Partie
    Linux Mint - 2nde partie - Mise à jour du 10.03.2017 1 Sommaire 1. Si vous avez raté l’épisode précédent… 2. Utiliser Linux Mint au quotidien a) Présentation de la suite logicielle par défaut b) Et si nous testions un peu ? c) Windows et Linux : d’une pratique logicielle à une autre d) L’installation de logiciels sous Linux 3. Vous n’êtes toujours pas convaincu(e)s par Linux ? a) Encore un argument : son prix ! b) L’installer sur une vieille ou une nouvelle machine, petite ou grande c) Par philosophie et/ou curiosité d) Pour apprendre l'informatique 4. À retenir Sources 2 1. Si vous avez raté l’épisode précédent… Linux, c’est quoi ? > Un système d’exploitation > Les principaux systèmes d'exploitation > Les distributions 3 1. Si vous avez raté l’épisode précédent… Premiers pas avec Linux Mint > Répertoire, dossier ou fichier ? > Le bureau > Gestion des fenêtres > Gestion des fichiers 4 1. Si vous avez raté l’épisode précédent… Installation > Méthode « je goûte ! » : le LiveUSB > Méthode « j’essaye ! » : le dual-boot > Méthode « je fonce ! » : l’installation complète 5 1. Si vous avez raté l’épisode précédent… Installation L'abréviation LTS signifie Long Term Support, ou support à long terme. 6 1. Si vous avez raté l’épisode précédent… http://www.linuxliveusb.com 7 1. Si vous avez raté l’épisode précédent… Installation 8 1. Si vous avez raté l’épisode précédent… Installation 9 1. Si vous avez raté l’épisode précédent… Installation 10 1. Si vous avez raté l’épisode précédent… Installation 11 2. Utiliser Linux Mint au quotidien a) Présentation de la suite logicielle par défaut Le fichier ISO Linux Mint est compressé et contient environ 1,6 GB de données.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Awoken Icon Theme - Installation & Customizing Instructions 1
    Awoken Icon Theme - Installation & Customizing Instructions 1 AWOKEN ICON THEME Installation & Customizing Instructions Alessandro Roncone mail: [email protected] homepage: http://alecive.deviantart.com/ Awoken homepage (GNOME Version): link kAwoken homepage (KDE Version): link Contents 1 Iconset Credits 3 2 Copyright 3 3 Installation 3 3.1 GNOME........................................................3 3.2 KDE..........................................................4 4 Customizing Instructions 4 4.1 GNOME........................................................4 4.2 KDE..........................................................5 5 Overview of the customization script6 5.1 How to customize a single iconset..........................................7 6 Customization options 8 6.1 Folder types......................................................8 6.2 Color-NoColor.................................................... 11 6.3 Distributor Logos................................................... 11 6.4 Trash types...................................................... 11 6.5 Other Options.................................................... 11 6.5.1 Gedit icon................................................... 11 6.5.2 Computer icon................................................ 11 6.5.3 Home icon................................................... 11 6.6 Deprecated...................................................... 12 7 How to colorize the iconset 13 8 Icons that don't want to change (but I've drawed) 14 9 Conclusions 15 9.1 Changelog......................................................
    [Show full text]
  • Red Hat Enterprise Linux 7 7.9 Release Notes
    Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Last Updated: 2021-08-17 Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Kubuntu Manual Documentation Release Bionic Beaver
    Kubuntu Manual Documentation Release Bionic Beaver Kubuntu Team Jul 29, 2018 CONTENTS 1 Welcome to Kubuntu 3 1.1 The Kubuntu Philosophy.........................................4 1.2 What is Linux?..............................................4 1.3 What is KDE?..............................................4 1.4 Thank You!................................................4 2 Installation 5 2.1 Why try Kubuntu?............................................5 2.2 Preparing the Installation media.....................................5 2.3 Install Process..............................................9 3 Installing NVIDIA Drivers 17 4 Basic 19 4.1 Launchers................................................ 19 4.2 Networking................................................ 21 4.3 Deskop Customization.......................................... 21 4.4 Updating................................................. 24 5 Advanced 25 5.1 Software Management.......................................... 25 5.2 Drivers.................................................. 27 6 Repositories 29 6.1 Managing Repositories.......................................... 29 6.2 Managing Personal Package Archives.................................. 31 7 Software 33 7.1 Graphics................................................. 33 7.2 Internet.................................................. 33 7.3 Multimedia................................................ 34 7.4 Office................................................... 35 7.5 System Settings............................................. 35
    [Show full text]
  • Installed Packages Gconf2.X86 64 3.2.6-8.El7 @Anaconda Geoip
    Installed Packages GConf2.x86_64 3.2.6-8.el7 @anaconda GeoIP.x86_64 1.5.0-11.el7 @anaconda ModemManager.x86_64 1.6.0-2.el7 @anaconda ModemManager-glib.x86_64 1.6.0-2.el7 @anaconda NetworkManager.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-adsl.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-glib.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-libnm.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-libreswan.x86_64 1.2.4-1.el7 @anaconda NetworkManager-libreswan-gnome.x86_64 1.2.4-1.el7 @anaconda NetworkManager-team.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-tui.x86_64 1:1.4.0-12.el7 @anaconda NetworkManager-wifi.x86_64 1:1.4.0-12.el7 @anaconda OpenEXR-libs.x86_64 1.7.1-7.el7 @anaconda PackageKit.x86_64 1.0.7-6.el7.centos @anaconda PackageKit-command-not-found.x86_64 1.0.7-6.el7.centos @anaconda PackageKit-glib.x86_64 1.0.7-6.el7.centos @anaconda PackageKit-gstreamer-plugin.x86_64 1.0.7-6.el7.centos @anaconda PackageKit-gtk3-module.x86_64 1.0.7-6.el7.centos @anaconda PackageKit-yum.x86_64 1.0.7-6.el7.centos @anaconda PyQt4.x86_64 4.10.1-13.el7 @anaconda PyYAML.x86_64 3.10-11.el7 @anaconda abattis-cantarell-fonts.noarch 0.0.16-3.el7 @anaconda abrt.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-ccpp.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-kerneloops.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-pstoreoops.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-python.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-vmcore.x86_64 2.1.11-45.el7.centos @anaconda abrt-addon-xorg.x86_64 2.1.11-45.el7.centos @anaconda abrt-cli.x86_64 2.1.11-45.el7.centos
    [Show full text]
  • TROGUARD: Context-Aware ProtecOn Against Web-Based Socially Engineered Trojans
    TROGUARD: Context-Aware Protec6on Against Web-Based Socially Engineered Trojans Rui Han, Alejandro Mesa, University of Miami Mihai Christodorescu, QualComm Research Saman Zonouz, Rutgers University Mo#va#on • Waterfall screen saver Trojan 2 Mac OS threats Rank Name Percentage 1 Trojan.OSX.FakeCo.a 52% 2 Trojan-DownloaDer.OSX.Jahlav.d 8% 3 Trojan-DownloaDer.OSX.Flashfake.aI 7% 4 Trojan-DownloaDer.OSX.FavDonw.c 5% 5 Trojan-DownloaDer.OSX.FavDonw.a 2% 6 Trojan-DownloaDer.OSX.Flashfake.ab 2% 7 Trojan-FakeAV.OSX.Defma.gen 2% 8 Trojan-FakeAV.OSX.Defma.f 1% 9 Exploit.OSX.Smid.b 1% 10 Trojan-DownloaDer.OSX.Flashfake.af 1% McAfee an6virus solu6on: hVp:www.securelist.com 3 Example Malwares Malware Descripons Plaorm TrojanClicker.VB Trojan socially Windows engineered as adobe .395 flash update and Mac OS X Trojan or Adware socially Windows, Mac Faked An6-Virus engineered as an6-virus so]ware OS X, and Linux Malware socially Android Opfake Browser engineered as Opera Browser Legi6mate applicaons Mac OS X and WireLuker socially engineered with ad-wares and Trojan iOS 4 ContribUons • Answer the ques6on: “Is this program doing what I expected it to do?” • Bridge the seman6c gap between func6onality classes and low level behaviors • Built on 100 Linux app profiles • High detec6on rate on 50 Trojan apps 5 TROGUARD ArchItectUre TROGUARD Offline Dynamic Application Functionality Application Functionality Functionality Class Profile Database Feature Tracing Generation Extraction Application Functionality Profile Database Online Inference of Download Perceived
    [Show full text]
  • Technical Notes All Changes in Fedora 18
    Fedora 18 Technical Notes All changes in Fedora 18 Edited by The Fedora Docs Team Copyright © 2012 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners.
    [Show full text]