Volume 63 April, 2012

Total Page:16

File Type:pdf, Size:1020Kb

Volume 63 April, 2012 Volume 63 April, 2012 Gnome 2.32: Say Cheese! Gnome 2.32: Graphics Extras Some PCLinuxOS Gnome Post Install Tips Linux Hardware In A Windows Landscape Linux Financial Apps: iFreeBudget 2011 LinuxQuestions.org Members Choice Awards Alternate OS: PC­BSD, Part 1 A Really Large Monitor Linux File System Heirarchy Explained Searching For Answers On The PCLinuxOS Forum Linux Liaison In New Zealand High Schools KMix Keyboard Volume Controls PCLinuxOS Magazine Plus More Inside! Page 1 Table Of Contents 3 Welcome From The Chief Editor 4 Keep Your System Up­To­Date With Update Notifier 6 Gnome 2.32: Say Cheese! The PCLinuxOS name, logo and colors are the trademark of Texstar. 8 Screenshot Showcase The PCLinuxOS Magazine is a monthly online publication 9 Forum Foibles: Crumbs Between The Keys containing PCLinuxOS­related materials. It is published primarily for members of the PCLinuxOS community. The 12 Mark's Quick Gimp Tip & Double Take magazine staff is comprised of volunteers from the 13 Linux Hardware In A Windows Landscape PCLinuxOS community. 17 Gnome 2.32: Graphics Extras Visit us online at http://www.pclosmag.com 19 Alternate OS: PC­BSD, Part 1 This release was made possible by the following volunteers: 24 Screenshot Showcase Chief Editor: Paul Arnote (parnote) Assistant Editor: Meemaw 25 Searching For Answers On The PCLinuxOS Forum Artwork: Sproggy, Timeth, ms_meme, Meemaw Magazine Layout: Paul Arnote, Meemaw, ms_meme 26 Linux Financial Apps: iFreeBudget HTML Layout: Rudge, Sproggy 29 Some PCLinuxOS Gnome Post Installation Tips Staff: Neal Brooks ms_meme 31 Screenshot Showcase Galen Seaman Mark Szorady Patrick Horneker Darrel Johnston 32 KMix Keyboard Volume Controls Guy Taylor Meemaw Andrew Huff Gary L. Ratliff, Sr. 32 Screenshot Showcase Pete Kelly Daniel Meiß­Wilhelm 33 2011 LinuxQuestions.org Members Choice Awards Archie Arevalo Contributors: 37 Screenshot Showcase Jim Wilkinson longtomjr 38 A Short Review: MuseScore Chuck Rice David Lally 39 Linux File System Heirarchy Explained 43 ms_meme's Nook: Linux River The PCLinuxOS Magazine is released under the Creative 44 A Really Large Monitor Commons Attribution­NonCommercial­Share­Alike 3.0 Unported license. Some rights are reserved. 45 Screenshot Showcase Copyright © 2012. 46 Linux Liaison In New Zealand High Schools 47 More Screenshot Showcase PCLinuxOS Magazine Page 2 Welcome From The Chief Editor Surprise! Welcome to the unveiling of the us using PCLinuxOS already magazine’s new layout. It is, after all, Spring in the knew that. Northern Hemisphere, and a time of rebirth and renewal. It seemed only fitting to reveal the new This month’s cover was layout with an edition of the magazine appearing in created by one of Timeth’s the Spring. students in Japan. Due to laws and customs over To be perfectly honest, it’s something that I’ve been there, I do not know the toying with for the past six months or so. I’d work on identity of the young lady it a bit, then step away, then come back to it, then who created the wonderful step away, then come back to it … until it was finally anime drawing we are using finished. At various stages, I’d run ideas and for our cover this month. So proposals past Meemaw, for her input. We’d discuss I’d like to express my sincere each item, making sure I hadn’t forgotten anything thanks to her, whomever she along the various steps of creating the templates may be. I hope Timeth will that her and I use to layout the magazine. convey my gratitude to her. The result is a layout that maximizes the amount of Until next month, I wish each space we can utilize on the page, while still and every one of you peace, appearing stylish and attractive. One key theme in happiness, prosperity and my thought process throughout making this new My father­in­law shot this picture of me working on the magazine, March 10, 2012, serenity. layout was to eliminate any unnecessary use of during a visit to my in­laws house. large blocks of color, to help those who may print pages from the magazine from having to bleed their scan to be completed, I was looking over the color inkjet cartridges dry. Another idea in creating shoulder of the MRI technician who was the layout templates was to streamline the magazine administering the scan. Lo and behold, if that screen layout process as much as possible. I can tell you didn’t look familiar. Yep! That’s it! The MRI scanner that after laying out articles this month, and putting was being controlled by software … ran on Linux! everything together into the final copy of the PDF for The screen was neatly laid out, using the Motif the April, 2012 issue, that I think I’ve managed to Window Manager. This MRI scanner – and the achieve that latter goal. software to run it – are just slightly over one year old. So no, this isn’t any old setup. Rather, this On another note, I recently had to accompany one of scanner and the special building built to hold it, was my patients at the hospital to the MRI (Magnetic a multi­million dollar expenditure by the hospital I Resonance Imaging) scanner in a different part of work for. I guess when you have mission­critical the building. While I was waiting for my patient’s data, Linux is what you turn to, huh? Of course, all of PCLinuxOS Magazine Page 3 Keep Your System Up-To-Date With Update-Notifier by Darrel Johnston (djohnston) The blue question mark is an indication that Update­ To show on screen notifications when Update­ Notifier is not configured. Left­click the icon to see Notifier is checking for updates, check the Enable According to the About Update­Notifier window, it the following configuration window. pop­up notifications box. If you don’t want apt­get to was created by maik3531 and has been updated by prompt for installation verification when updates are travisn000, rogaven and leiche. I believe leiche is available, check the Disable apt­get verification the current maintainer. The program has undergone prompt box. You can hide Synaptic’s main window extensive modifications since it was first written. when installing updates by checking the box for that option. All the previous choices are optional. The one thing you must do at this stage is select the update check frequency. The interval can be either days (1 through 40) or hours (1 through 18). This is the amount of time to go between checks for software updates. Once you are satisfied with your choices, click the Save button. The next window will pop up. Check for updates is highlighted by default. But, selecting that option will put the program in the same loop we just encountered. Highlight Change settings This program is designed to check for available and click OK, or simply double­click Change updates on a time interval selected by the user, and settings. This will bring up the configuration window. to notify the user of updates status via screen and system tray icon notifications. To install the program, open Synaptic and mark the update­notifier package We are instructed to exit and restart Update­Notifier for installation. Once the program has been in order to begin the software update checks. Click installed, you will find it in the main menu in the OK. Select Exit Update­Notifier and click OK in the Software Center section. next window. Before starting the program, be sure that Synaptic has been configured to connect to your selected repository and that your network connection is working. When the program is first launched, you will see a status window pop up on your desktop. Shortly thereafter, the following icon will appear in your system tray. PCLinuxOS Magazine Page 4 Keep Your System Up­To­Date With Update­Notifier At this point, Update­Notifier should no longer be Select one of the two Install updates choices. Mark the changes to be made and Synaptic will running. Start it from the main menu in the Software Personally, I prefer using Synaptic for its visual display the marked changes in the main window, Center section. You may receive an on screen indications. Either selection will bring up a prompt to unless you chose to hide it. message that Update­Notifier is already running. In enter user root’s password. that case, wait a couple of minutes and start it again. If you receive the same error message again, either find and terminate the Update­Notifier task or close all programs and reboot. The Update­Notifier will start automatically at each login. If you enabled popup notifications, the following on screen window will appear right after login. After the check, if there updates available and you enabled popup notifications, you will see something similar to the following on screen message. After entering the password, the package list will again be refreshed, with a visual indicator. Click the Apply button in the Synaptic window to install the updates. After closing Synaptic, update­ notifier will again check for new updates. In addition, the Update­Notifier status icon in the system tray will look like this. At this point, you should click the icon in the system tray, opening the Update­Notifier status window as Depending on whether you chose to use apt­get or shown below. Synaptic, either a terminal window or the Synaptic If there are no more updates, the on screen status main window will appear. If you chose Synaptic, a window will show none and the icon in the sub window will indicate the packages to be updated system tray will look like this.
Recommended publications
  • Tv Und Video
    COMMUNITY-EDITION Frei kopieren und beliebig weiter verteilen ! 01.2013 01.2013 viDeoS SChneiDen unD fernSehen unter linux eo D vi & tv unD viDeo tv Videoschnitt-Praxis S. 22, 28, DVD Linux Mint 14 Mit Openshot und Flowblade selbst gedrehte Clips Maté und Cinnamon für 32- und 64-Bit-PCs durch Effekte und Übergänge aufpeppen rive • g S. 14, DVD Auf dem Prüfstand Die sieben besten Video-Editoren für io • D DV- und HD-Material im direkten Vergleich Linux-Rechner statt Flimmerkiste S. 36, 42, DVD Analog, DVB und Web-TV auf PC und Notebook: Linux-kompatible Hardware finden, optimale Software zum Schauen und Aufnehmen SolusoS 1.2 S. 6 Wieselflinkes Debian mit aktuellen Tools Frischer Wind fürs Tonstudio Bitwig Studio: DAW mit neuen Konzepten, innovativen Tools und flexiblen Plugins S. 68 op & Co. • Bitwig Stu op & Co. t planetarium für den endlich Durchblick Schreibtisch S. 58, DVD im pDf-archiv S. 62, DVD la 12.1 S. 46 Fotorealistischer Blick in den Dokumente ablegen und Allrounder für zu Hause Nachthimmel mit Stellarium wiederfinden mit I-Librarian und das Schulnetz freier adapter für Systemdaten im google Drive S. 74, DVD Blick mit top & Co. Transparenter Zugriff auf den Kritische Zustände erkennen Gratisspeicher mit Grive und blitzschnell reagieren S. 82 Stellarium • Defrag • Stellarium • Defrag 4 196067 008502 01 www.linux-user.de EDITORIAL Zahlenspiele Sehr geehrte Leserinnen und Leser, mussten wir vor einem Monat Macht man sich jedoch die Mühe, haben. So lässt Microsoft jetzt noch darüber spekulieren, wie genauer hinzusehen, dann fällt statt geplanter vier nur noch zwei sich die jüngste Windows-Inkar- schnell auf, dass Windows-CFO Millionen Einheiten seines Sur- nation wohl im Markt machen Reller einige wichtige Details de- face-Tabletts fertigen [2].
    [Show full text]
  • Cross-Platform Analysis of Indirect File Leaks in Android and Ios Applications
    Cross-Platform Analysis of Indirect File Leaks in Android and iOS Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University fcsdwu, [email protected] This paper was published in IEEE Mobile Security Technologies 2015 [47] with the original title of “Indirect File Leaks in Mobile Applications”. Victim App Abstract—Today, much of our sensitive information is stored inside mobile applications (apps), such as the browsing histories and chatting logs. To safeguard these privacy files, modern mobile Other systems, notably Android and iOS, use sandboxes to isolate apps’ components file zones from one another. However, we show in this paper that these private files can still be leaked by indirectly exploiting components that are trusted by the victim apps. In particular, Adversary Deputy Trusted we devise new indirect file leak (IFL) attacks that exploit browser (a) (d) parties interfaces, command interpreters, and embedded app servers to leak data from very popular apps, such as Evernote and QQ. Unlike the previous attacks, we demonstrate that these IFLs can Private files affect both Android and iOS. Moreover, our IFL methods allow (s) an adversary to launch the attacks remotely, without implanting malicious apps in victim’s smartphones. We finally compare the impacts of four different types of IFL attacks on Android and Fig. 1. A high-level IFL model. iOS, and propose several mitigation methods. four IFL attacks affect both Android and iOS. We summarize these attacks below. I. INTRODUCTION • sopIFL attacks bypass the same-origin policy (SOP), Mobile applications (apps) are gaining significant popularity which is enforced to protect resources originating from in today’s mobile cloud computing era [3], [4].
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • UPLC™ Universal Power-Line Carrier
    UPLC™ Universal Power-Line Carrier CU4I-VER02 Installation Guide AMETEK Power Instruments 4050 N.W. 121st Avenue Coral Springs, FL 33065 1–800–785–7274 www.pulsartech.com THE BRIGHT STAR IN UTILITY COMMUNICATIONS March 2006 Trademarks All terms mentioned in this book that are known to be trademarks or service marks are listed below. In addition, terms suspected of being trademarks or service marks have been appropriately capital- ized. Ametek cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. This publication includes fonts and/or images from CorelDRAW which are protected by the copyright laws of the U.S., Canada and elsewhere. Used under license. IBM and PC are registered trademarks of the International Business Machines Corporation. ST is a registered trademark of AT&T Windows is a registered trademark of Microsoft Corp. Universal Power-Line Carrier Installation Guide ESD WARNING! YOU MUST BE PROPERLY GROUNDED, TO PREVENT DAMAGE FROM STATIC ELECTRICITY, BEFORE HANDLING ANY AND ALL MODULES OR EQUIPMENT FROM AMETEK. All semiconductor components used, are sensitive to and can be damaged by the discharge of static electricity. Be sure to observe all Electrostatic Discharge (ESD) precautions when handling modules or individual components. March 2006 Page i Important Change Notification This document supercedes the preliminary version of the UPLC Installation Guide. The following list shows the most recent publication date for the new information. A publication date in bold type indicates changes to that information since the previous publication.
    [Show full text]
  • Kde-Guide-De-Developpement.Web.Pdf
    KDE Published : 2017-06-26 License : GPLv2+ 1 KDE DU POINT DE VUE D'UN DÉVELOPPEUR 1. AVEZ-VOUS BESOIN DE CE LIVRE ? 2. LA PHILOSOPHIE DE KDE 3. COMMENT OBTENIR DE L'AIDE 2 1. AVEZ-VOUS BESOIN DE CE LIVRE ? Vous devriez lire ce livre si vous voulez développer pour KDE. Nous utilisons le terme développement très largement pour couvrir tout ce qui peut conduire à un changement dans le code source, ce qui inclut : Soumettre une correction de bogue Écrire une nouvelle application optimisée par la technologie KDE Contribuer à un projet existant Ajouter de la fonctionnalité aux bibliothèques de développement de KDE Dans ce livre, nous vous livrerons les bases dont vous avez besoin pour être un développeur productif. Nous décrirons les outils que vous devrez installer, montrer comment lire la documentation (et écrire la vôtre propre, une fois que vous aurez créé la nouvelle fonctionnalité !) et comment obtenir de l'aide par d'autres moyens. Nous vous présenterons la communauté KDE, qui est essentielle pour comprendre KDE parce que nous sommes un projet « open source », libre (gratuit). Les utilisateurs finaux du logiciel n'ont PAS besoin de ce livre ! Cependant, ils pourraient le trouver intéressant pour les aider à comprendre comment les logiciels complexes et riches en fonctionnalités qu'ils utilisent ont vu le jour. 3 2. LA PHILOSOPHIE DE KDE Le succès de KDE repose sur une vue globale, que nous avons trouvée à la fois pratique et motivante. Les éléments de cette philosophie de développement comprennent : L'utilisation des outils disponibles plutôt que de ré-inventer ceux existants : beaucoup des bases dont vous avez besoin pour travailler font déjà partie de KDE, comme les bibliothèques principales ou les « Kparts », et sont tout à fait au point.
    [Show full text]
  • Gestión De Respaldos En Debian
    Gestión de respaldos en Debian Los ordenadores en algún momento fallan o errores humanos causan daños al sistema y los datos. Las operaciones de copia de seguridad y recuperación son una parte esencial de la administración del sistema para que el mismo se recupere después de un fallo y siga funcionando correctamente. Para ello, existen tres puntos clave a tener en cuenta para determina la política del respaldo. 1. Saber qué debemos respaldar. 2. Saber cómo respaldar y recuperar en caso de fallo. 3. Evaluación de riesgos y costos involucrados. Debemos respaldar los siguientes archivos: Archivos de datos directamente creados por el usuario: datos en "~/". Archivos de datos creados por las aplicaciones utilizadas: datos en "/var/", exceptuando "/var/cache/", "/var/run/", y "/var/tmp/". Archivos de configuración del sistema: datos en “/etc/”. Softwares locales: datos en “/usr/local/” o “/opt/”. Información de instalación del sistema: un archivo de texto sin formato con los pasos claves (particiones, etc). Demostración del conjunto de datos: confirmado por las operaciones de recuperación experimentales realizadas con antelación. Al realizar el respaldo, debemos tener en cuenta los siguientes puntos: El almacenamiento seguro de datos: protección sobre los fallos de sistema y la sobreescritura. Realizar copias de seguridad frecuentes: de forma programada. La copia de seguridad debe ser redundante: duplicación de datos (data mirroring). El proceso debe ser fácil: en lo posible que requiera solo un comando para la copia de seguridad. Debemos realizar una evaluación del proceso a utilizar: Valor de los datos en caso de pérdidas. Los recursos necesarios para la copia de seguridad: usuario, hardware y software.
    [Show full text]
  • Metadata Track Akonadi the Independent Solution for PIM Data
    Akonadi – The independent solution for PIM GCDS 2009 data Metadata track Akonadi the independent solution for PIM data Will Stephenson Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Akonadi Topics Akona-what? Design Overview What we give you What you give us Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Akonadi The story so far Monolithic apps Own data storage Limited if any external interfaces E-D-S Data storage service Limited range of types supported Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Limitations of KDE3 KResource framework limitations: Data is not shared Designed for synchronous access Hard to extend to other data types Basically no shared common code KMail limitations: Only limited backend abstraction Designed for small amounts of local data Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Scalability with KDE 3 |Data| = small Contact applet KAddressBook l l KMail Kopete Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Scalability in KDE 3 |Data| = large Contact applet KAddressBook l l KMail Kopete Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Goals As much as possible shared, type independent functionality Easy to extend to new data types Unified API to access PIM data, independent of the actual data source Scalability Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Goals One synchronization point for mobile devices Reliable,
    [Show full text]
  • SMM Rootkits
    SMM Rootkits: A New Breed of OS Independent Malware Shawn Embleton Sherri Sparks Cliff Zou University of Central Florida University of Central Florida University of Central Florida [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION The emergence of hardware virtualization technology has led to A rootkit consists of a set of programs that work to subvert the development of OS independent malware such as the Virtual control of an Operating System from its legitimate users [16]. If Machine based rootkits (VMBRs). In this paper, we draw one were asked to classify viruses and worms by a single defining attention to a different but related threat that exists on many characteristic, the first word to come to mind would probably be commodity systems in operation today: The System Management replication. In contrast, the single defining characteristic of a Mode based rootkit (SMBR). System Management Mode (SMM) rootkit is stealth. Viruses reproduce, but rootkits hide. They hide is a relatively obscure mode on Intel processors used for low-level by compromising the communication conduit between an hardware control. It has its own private memory space and Operating System and its users. Secondary to hiding themselves, execution environment which is generally invisible to code rootkits are generally capable of gathering and manipulating running outside (e.g., the Operating System). Furthermore, SMM information on the target machine. They may, for example, log a code is completely non-preemptible, lacks any concept of victim user’s keystrokes to obtain passwords or manipulate the privilege level, and is immune to memory protection mechanisms.
    [Show full text]
  • Openbsd Gaming Resource
    OPENBSD GAMING RESOURCE A continually updated resource for playing video games on OpenBSD. Mr. Satterly Updated August 7, 2021 P11U17A3B8 III Title: OpenBSD Gaming Resource Author: Mr. Satterly Publisher: Mr. Satterly Date: Updated August 7, 2021 Copyright: Creative Commons Zero 1.0 Universal Email: [email protected] Website: https://MrSatterly.com/ Contents 1 Introduction1 2 Ways to play the games2 2.1 Base system........................ 2 2.2 Ports/Editors........................ 3 2.3 Ports/Emulators...................... 3 Arcade emulation..................... 4 Computer emulation................... 4 Game console emulation................. 4 Operating system emulation .............. 7 2.4 Ports/Games........................ 8 Game engines....................... 8 Interactive fiction..................... 9 2.5 Ports/Math......................... 10 2.6 Ports/Net.......................... 10 2.7 Ports/Shells ........................ 12 2.8 Ports/WWW ........................ 12 3 Notable games 14 3.1 Free games ........................ 14 A-I.............................. 14 J-R.............................. 22 S-Z.............................. 26 3.2 Non-free games...................... 31 4 Getting the games 33 4.1 Games............................ 33 5 Former ways to play games 37 6 What next? 38 Appendices 39 A Clones, models, and variants 39 Index 51 IV 1 Introduction I use this document to help organize my thoughts, files, and links on how to play games on OpenBSD. It helps me to remember what I have gone through while finding new games. The biggest reason to read or at least skim this document is because how can you search for something you do not know exists? I will show you ways to play games, what free and non-free games are available, and give links to help you get started on downloading them.
    [Show full text]
  • Cloud Accelerates Linux Adoption IDC ANALYZE the FUTURE
    IDC White Paper | Cloud Accelerates Linux Adoption IDC ANALYZE THE FUTURE Sponsored by: Cloud Accelerates Linux Adoption Oracle Corp. IDC OPINION Authors: Ashish Nadkarni Cloud has become a crucial foundation for digital transformation (DX) initiatives and Gary Chen is shaping the IT strategy of enterprises today. Companies are extending their IT February 2018 infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the adoption of open source operating systems, Linux being the chief among them. Over the past decade, Linux has evolved to be a versatile platform for current- and new-generation applications — a platform that can run in the cloud or on-premises and can include open source tools and frameworks used in modern application development. Enterprise platform functionality and
    [Show full text]