Automated Malware Analysis Report for Update.Js

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Update.Js ID: 57677 Sample Name: update.js Cookbook: default.jbs Time: 17:36:18 Date: 02/05/2018 Version: 22.0.0 Table of Contents Table of Contents 2 Analysis Report 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Signature Overview 5 Networking: 6 System Summary: 6 Anti Debugging: 6 Malware Analysis System Evasion: 6 Hooking and other Techniques for Hiding and Protection: 6 Language, Device and Operating System Detection: 6 Behavior Graph 6 Simulations 7 Behavior and APIs 7 Antivirus Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 Yara Overview 8 Initial Sample 8 PCAP (Network Traffic) 8 Dropped Files 8 Memory Dumps 8 Unpacked PEs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 Dropped Files 8 Screenshots 8 Startup 9 Created / dropped Files 9 Contacted Domains/Contacted IPs 9 Contacted Domains 9 Contacted IPs 9 Static File Info 10 General 10 File Icon 10 Network Behavior 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: wscript.exe PID: 3436 Parent PID: 3024 10 General 10 File Activities 11 Disassembly 11 Code Analysis 11 Copyright Joe Security LLC 2018 Page 2 of 13 JavaScript Code 11 Script: 11 Code 11 Copyright Joe Security LLC 2018 Page 3 of 13 Analysis Report Overview General Information Joe Sandbox Version: 22.0.0 Analysis ID: 57677 Start time: 17:36:18 Joe Sandbox Product: CloudBasic Start date: 02.05.2018 Overall analysis duration: 0h 2m 18s Hypervisor based Inspection enabled: false Report type: light Sample file name: update.js Cookbook file name: default.jbs Analysis system description: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java 8.0.1440.1) Number of analysed new started processes analysed: 2 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies HCA enabled EGA enabled HDC enabled GSI enabled (Javascript) Analysis stop reason: Timeout Detection: CLEAN Classification: clean1.winJS@1/0@0/0 HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 EGA Information: Failed HDC Information: Failed Cookbook Comments: Adjust boot time Correcting counters for adjusted boot time Found application associated with file extension: .js Stop behavior analysis, all processes terminated Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe Detection Strategy Score Range Reporting Detection Threshold 1 0 - 100 Report FP / FN Confidence Strategy Score Range Further Analysis Required? Confidence Copyright Joe Security LLC 2018 Page 4 of 13 Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Signature Overview Copyright Joe Security LLC 2018 Page 5 of 13 • Networking • System Summary • Anti Debugging • Malware Analysis System Evasion • Hooking and other Techniques for Hiding and Protection • Language, Device and Operating System Detection Click to jump to signature section Networking: Urls found in memory or binary data System Summary: Java / VBScript file with very long strings (likely obfuscated code) Classification label Reads software policies Sample is known by Antivirus (Virustotal or Metascan) Uses an in-process (OLE) Automation server This is likely a benign javascript web library Anti Debugging: Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) Malware Analysis System Evasion: Found WSH timer for Javascript or VBS script (likely evasive script) Hooking and other Techniques for Hiding and Protection: Disables application error messsages (SetErrorMode) Language, Device and Operating System Detection: Queries the cryptographic machine GUID Behavior Graph Copyright Joe Security LLC 2018 Page 6 of 13 Hide Legend Legend: Process Signature Created File DNS/IP Info Is Dropped Behavior Graph Is Windows Process Number of created Registry Values ID: 57677 Number of created Files Visual Basic Sample: update.js Delphi Startdate: 02/05/2018 Java Architecture: WINDOWS .Net C# or VB.NET Score: 1 C, C++ or other language Is malicious started wscript.exe Simulations Behavior and APIs Time Type Description 17:36:45 API Interceptor 2x Sleep call for process: wscript.exe modified Antivirus Detection Initial Sample Source Detection Scanner Label Link update.js 0% virustotal Browse Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches Copyright Joe Security LLC 2018 Page 7 of 13 Yara Overview Initial Sample No yara matches PCAP (Network Traffic) No yara matches Dropped Files No yara matches Memory Dumps No yara matches Unpacked PEs No yara matches Joe Sandbox View / Context IPs No context Domains No context ASN No context Dropped Files No context Screenshots Copyright Joe Security LLC 2018 Page 8 of 13 Startup System is w7 wscript.exe (PID: 3436 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\Desktop\update.js' MD5: 979D74799EA6C8B8167869A68DF5204A) cleanup Created / dropped Files No created / dropped files found Contacted Domains/Contacted IPs Contacted Domains No contacted domains info Contacted IPs No contacted IP infos Copyright Joe Security LLC 2018 Page 9 of 13 Static File Info General File type: ASCII text, with very long lines, with CRLF line t erminators Entropy (8bit): 5.430308436586633 TrID: Java Script (6500/0) 52.00% Digital Micrograph Script (4001/1) 32.01% Java Script embedded in Visual Basic Script (2000/0) 16.00% File name: update.js File size: 4754 MD5: ce5175ded9db1abe659162ed2382c235 SHA1: 8175fdb89af4b4f3555214cd5aa2d6f630dd773f SHA256: dc47fbd3274fa288baa643824a014b5be258ad686d008cb 768889c32911814b6 SHA512: 8e1cd010fff6c7d44b4da68784e2494099c97a5f5619dc7 d54e2d91201ac425e6e4a083e1a2d5d92a29bcec93af9c a6394dc78155773f51fde4b7d0b76e54cfa File Content Preview: //(c)2017, MIT Style License <browser-update.org/LICE NSE.txt>..//it is recommended to directly link to this file because we update the detection code..function $bu_ge tBrowser(ua_str){var n,t,ua=ua_str||navigator.userAgent ,donotnotify=false;var names={i:'I File Icon Network Behavior No network behavior found Code Manipulations Statistics System Behavior Analysis Process: wscript.exe PID: 3436 Parent PID: 3024 General Start time: 17:36:45 Start date: 02/05/2018 Path: C:\Windows\System32\wscript.exe Wow64 process (32bit): false Commandline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\Desktop\update.js' Imagebase: 0xcd0000 File size: 141824 bytes MD5 hash: 979D74799EA6C8B8167869A68DF5204A Has administrator privileges: true Copyright Joe Security LLC 2018 Page 10 of 13 Programmed in: C, C++ or other language Reputation: high File Activities Source File Path Offset Length Completion Count Address Symbol Disassembly Code Analysis JavaScript Code Script: Code 0 function $bu_getBrowser(ua_str) { 1 var n, t, ua = ua_str || navigator.userAgent, donotnotify = false; 2 var names = { 3 i : 'Internet Explorer', 4 e : "Edge", 5 f : 'Firefox', 6 o : 'Opera', 7 s : 'Safari', 8 n : 'Netscape', 9 c : "Chrome", 10 a : "Android Browser", 11 y : "Yandex Browser", 12 v : "Vivaldi", 13 x : "Other" 14 }; 15 function ignore(reason, pattern) { 16 if ( RegExp ( pattern, "i" ).test ( ua ) ) 17 return reason; 18 } 19 var ig = ignore ( "bot", "bot|spider|googlebot|facebook|slurp|bingbot|google web preview|mediapartnersadsbot|AOLBu ild|Baiduspider|DuckDuckBot|Teoma" ) || ignore ( "discontinued browser", "camino|flot|k-meleon|fennec|galeon|chrom eframe|coolnovo" ) || ignore ( "complicated device browser", "SMART-TV|SmartTV" ) || ignore ( "niche browser", "Dorad o|Whale|SamsungBrowser|MIDP|wii|UCBrowser|Chromium|Puffin|Opera Mini|maxthon|maxton|dolfin|dolphin|seamon key|opera mini|netfront|moblin|maemo|arora|kazehakase|epiphany|konqueror|rekonq|symbian|webos|PaleMoon|Qup Zilla|Otter|Midori|qutebrowser" ) || ignore ( "mobilew without upgrade path or landing page", "iphone|ipod|ipad|kindle|s ilk|blackberry|bb10|RIM|PlayBook|meego|nokia" ) || ignore ( "android(chrome) web view", "; wv" ); 20 if ( ig ) 21 return { 22 n : "x", 23 v : 0, 24 t : "other browser", 25 donotnotify : ig 26 }; 27 var mobile = ( /iphone|ipod|ipad|android|mobile|phone|ios|iemobile/i.test ( ua ) ); 28 var pats = [ [ "Trident.*rv:VV", "i" ], [ "Trident.VV", "io" ], [ "MSIE.VV", "i" ], [ "Edge.VV", "e" ], [ "Vivaldi.VV", "v" ], [ "OPR.VV" , "o" ], [ "YaBrowser.VV", "y" ], [ "Chrome.VV", "c" ], [ "Firefox.VV", "f" ], [ "Version.VV.{0,10}Safari", "s" ], [ "Safari.VV", "so" ], [ "Opera.*Version.VV", "o" ], [ "Opera.VV", "o" ], [ "Netscape.VV", "n" ] ]; 29 for ( var i = 0 ; i < pats.length ; i ++ ) 30 if ( ua.match ( new RegExp ( pats[i][0].replace ( "VV", "(\\d+\\.?\\d?)" ) ), "i" ) ) 31 { 32 n = pats[i][1]; 33 break ; 34 } 35 var v = parseFloat ( RegExp.$1 ); 36 if ( ! n ) 37 return { 38 n : "x", 39 v : 0, 40 t : names[n], 41 mobile : mobile 42 }; 43 if ( ua.indexOf ( 'Android' ) > - 1 ) 44 { 45 var ver = parseInt ( ( /WebKit\/([0-9]+)/i.exec ( ua ) || 0 )[1], 10 ) || 2000; 46 if ( ver <= 534 ) 47 return { 48 n : "a", 49 v : ver, 50 t : names.a, 51 mob : true, Copyright Joe Security LLC 2018 Page 11 of 13 Code 52 donotnotify : donotnotify, 53 mobile : mobile 54 }; 55 } 56 if ( /windows.nt.5.0|windows.nt.4.0|windows.95|windows.98|os x 10.2|os x 10.3|os x 10.4|os x 10.5|os x 10.6|os x 10.7/.test
Recommended publications
  • USA V Cottom Et Al 8:13-Cr-00108-JFB-TDT U.S. District Court District of Nebraska
    8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 1 of 29 - Page ID # 2406 NIT Forensic and Reverse Engineering Report, Continued from January 2015. USA v Cottom et al 8:13-cr-00108-JFB-TDT U.S. District Court District of Nebraska Investigators: Dr. Ashley Podhradsky, CHFI Dr. Matt Miller Mr. Josh Stroschein 06/05/2015 8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 2 of 29 - Page ID # 2407 Executive Summary: On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to serve as expert witnesses on USA v Cottom et al, 8:13-cr- 00108-JFB-TDT. The case is in federal court in Omaha and is centered on the viewing and possession of child pornography. The investigators were informed that the central issue of the case is the identification from the FBI’s “Network Investigative Technique” or NIT that was used to identify the IP address of users on The Onion Router (TOR) network. The investigators, Ashley, Matt and Josh, were informed that there were three servers containing contraband images that the FBI found and took offline in November of 2012. Shortly thereafter, the FBI placed the NIT on the servers and put the servers back online with the goal to identify the true IP address of end users accessing the servers through the TOR network. From there, several end users true IP addresses were identified which resulted in actual identification of the end users.
    [Show full text]
  • Znetlive SSL Compatible Applications, Platforms & Operating
    ZNetLive SSL Compatible Applications, Platforms & Operating Systems Certificate Authority Root Apple MAC OS 9.0+ (circa 2002), includes 10.5.X and 10.6.X Future proof at 2048 bit, embedded in all Microsoft Windows XP, Vista, 7 and 8 (all devices and browsers and capable of upgrading versions inc 32/64 bit) weak encryption to a strong one is the most reliable Certificate Authority Root-GlobalSign. It is very important to ensure a flawless interaction of your online solutions with Default API Support within Hosting Control customers making connection with your web Panels server, reading emails, trusting your e- Ubersmith documents or running your code. Every WHMCS standard machine that uses trust of Public Key Infrastructure (PKI), e.g. S/MIME, SSL/TLS, Document Signing and Code Signing, has GlobalSign’s Root Certification present in it. Email Clients (S/MIME) ZNetLive’s SSL Certificates authenticated by GlobalSign have 2048 bit strength throughout Mulberry Mail complete Digital Certificate portfolio and Microsoft Outlook 99+ comply with recommendations of National Microsoft Entourage (OS/X) Institute of Standards and Technology (NIST) Qualcomm Eudora 6.2+ according to which all cryptographic keys Mozilla Thunderbird 1.0+ should be 2048 bit strength from 2011 onwards. Mail.app Anything weaker than 2048 bit encryption is Lotus Notes (6+) considered insecure. Because of this, the Netscape Communicator 4.51+ Certification Authorities and Browsers insists The Bat that all the EV SSL Certificates should be 2048 Apple Mail bit encryption.
    [Show full text]
  • IFIP AICT 306, Pp
    Chapter 9 FORENSIC ANALYSIS OF THE SONY PLAYSTATION PORTABLE Scott Conrad, Carlos Rodriguez, Chris Marberry and Philip Craiger Abstract The Sony PlayStation Portable (PSP) is a popular portable gaming device with features such as wireless Internet access and image, music and movie playback. As with most systems built around a processor and storage, the PSP can be used for purposes other than it was originally intended – legal as well as illegal. This paper discusses the features of the PSP browser and suggests best practices for extracting digital evidence. Keywords: Sony PlayStation Portable, forensic analysis 1. Introduction The Sony PlayStation Portable (PSP) is a popular portable video game system that has additional multimedia and Internet-related capa- bilities. Originally released in 2004, the PSP features a 4.3” widescreen LCD with 480×272 pixel resolution. It comes with a dual core 222 MHz R4000 CPU, 32 MB RAM and 4 MB of embedded DRAM, which holds the operating system [6]. The PSP uses a proprietary Universal Me- dia Disk (UMD) as its primary read-only storage media for games and movies. The device also features 802.11b Wi-Fi connectivity for multi- player games and utilizes a Pro Duo memory stick for secondary storage. In September 2007, Sony released a new version of the PSP that is 33% lighter and 19% thinner, appropriately dubbed the PSP Slim & Lite. The Slim & Lite version caches UMD data in memory to decrease game loading time and provides additional features such as a brighter screen, composite TV output, charging via USB and double the onboard RAM (64 MB) [8].
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Mcafee Foundstone Fsl Update
    2018-JUL-25 FSL version 7.6.38 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 23889 - (HT208932) Apple iCloud Vulnerabilities Prior To 7.6 Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE-2018-4266, CVE-2018-4267, CVE- 2018-4270, CVE-2018-4271, CVE-2018-4272, CVE-2018-4273, CVE-2018-4278, CVE-2018-4284, CVE-2018-4293 Description Multiple vulnerabilities are present in some versions of Apple iCloud. Observation Apple iCloud is a manager for the Apple's cloud-based storage service. Multiple vulnerabilities are present in some versions of Apple iCloud. The flaws lie in multiple components. Successful exploitation could allow an attacker to obtain sensitive information, execute arbitrary code or cause a denial of service. 23893 - (HT208938) Apple iOS Multiple Vulnerabilities Prior To 11.4.1 Category: Wireless Assessment -> NonIntrusive -> iOS Risk Level: High CVE: CVE-2018-4248, CVE-2018-4260, CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE- 2018-4266, CVE-2018-4267, CVE-2018-4270, CVE-2018-4271, CVE-2018-4272, CVE-2018-4273, CVE-2018-4274, CVE-2018-4275, CVE-2018-4277, CVE-2018-4278, CVE-2018-4280, CVE-2018-4282, CVE-2018-4284, CVE-2018-4290, CVE-2018-4293 Description Multiple vulnerabilities are present in some versions of Apple iOS.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Internet Explorer
    U.T.E. Università della Terza Età Bollate, Garbagnate Milanese e Novate Milanese INTERNET Ing. Giovanni Pozzi Internet Definizione: Generalmente definita «la rete delle reti» o semplicemente «rete»; è una rete di computer mondiale ad accesso pubblico attualmente rappresentante anche uno dei principali mezzi di comunicazione di massa. Internet - Programma Cenni storici. Navigazione. Posta Elettronica. Sicurezza Telefonare via Internet. Altri servizi. Cenni Storici 1957: 4 ottobre Cosmodromo di Baikonur Lancio del satellite SPUTNIK 1958: Il dipartimento della difesa Statunitense crea ARPA (Advanced Research Projects Agency) Che, nel 1969, crea ARPANET. Cenni Storici 1971: La rete ARPANET connette tra loro 23 computer 1973: La Gran Bretagna e la Norvegia si uniscono alla rete con un computer ciascuna. 1981: Nasce in Francia la rete Minitel. In breve tempo diventa la più grande rete di computer al di fuori degli USA 1982: Definizione del protocollo TCP/IP e della parola "Internet“ 1984: La rete conta ormai mille computer collegati 1986: In aprile, da Pisa, sede del Centro Nazionale Universitario di Calcolo Elettronico (Cnuce) viene realizzata la prima connessione Internet dall'Italia con gli Stati Uniti. 1987: Sono connessi 10 000 computer. Il 23 dicembre viene registrato “cnr.it”, il primo dominio con la denominazione geografica dell'Italia; è il sito del Consiglio Nazionale delle Ricerche. 1989: Sono connessi 100mila computer. Cenni Storici 1990: Scomparsa di ARPANET; apparizione del linguaggio HTML 1991: Il CERN (Centro Europeo
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Hbbtv Services, Solutions and Devices at IBC 2016
    HbbTV services, solutions and devices at IBC 2016 Hall 14 / Booth J13 Contact: Akim Benamara ABOX42 is a leading provider of IPTV, OTT and Hybrid-DVB SmartSTB platforms and services for network operators and service providers. At IBC 2016 ABOX42 will introduce its latest Smart STB platform M50 (available as IPTV/OTT and Hybrid version) with support of 4K/UHD and HEVC/H.265 to freely mix DVB-C, S2, T/T2 services with IPTV and OTT video delivery, as well as HBBTV and other web based applications. With ABOX42 new OTT DVB technology it is the first time possible to use HbbTV with OTT streaming in a network environment, where HbbTV is not essential part of the DVB signal. The ABOX42 Total STB Solution approach supports fast application development, short project cycles, full software lifecycle management. The additional ABOX42 OPX TV application provides a solution to deliver all essential TV services with a modern TV UI. The ABOX42 OPX SaaS & Cloud TV services allow the operator to easily deploy, manage, operate und upgrade its services in the field during the entire lifecycle. Find more information about the ABOX42 Total STB Solution at: www.abox42.com Hall 14 / Booth D14 Contact: Robert Guest ACCESS showcases its industry-leading NetFront Browser family, providing a true choice of HbbTV solutions based on Chromium or Webkit engines. Embedded browser Software Development Kits (SDKs) are available for HbbTV 1.5 and HbbTV 2.0, enabling the provision of companion applications, second screen experiences and multiscreen solutions. The NetFront solutions portfolio also supports DLNA, remote user interface (RUI), and VidiPath for the provision of premium services, plus browser based encrypted media extensions (EME) for HTML5 based services.
    [Show full text]
  • Getting Started with Ubuntu and Kubuntu
    Getting Started With Ubuntu and Kubuntu IN THIS PART Chapter 1 The Ubuntu Linux Project Chapter 2 Installing Ubuntu and Kubuntu Chapter 3 Installing Ubuntu and Kubuntu on Special-Purpose Systems COPYRIGHTED MATERIAL 94208c01.indd 1 3/16/09 11:43:23 PM 94208c01.indd 2 3/16/09 11:43:24 PM The Ubuntu Linux Project ersonal computers and their operating systems have come a long way since the late 1970s, when the first home computer hit the market. At IN THIS cHAPTER that time, you could only toggle in a program by flipping switches on the P Introducing Ubuntu Linux front of the machine, and the machine could then run that program and only that program until you manually loaded another, at which time the first program Choosing Ubuntu was kicked off the system. Today’s personal computers provide powerful graph- ics and a rich user interface that make it easy to select and run a wide variety of Reviewing hardware and software concurrently. software requirements The first home computer users were a community of interested people who just Using Ubuntu CDs wanted to do something with these early machines. They formed computer clubs and published newsletters to share their interests and knowledge ​— ​and often the Getting help with Ubuntu Linux software that they wrote for and used on their machines. Sensing opportunities and a growing market, thousands of computer companies sprang up to write and Getting more information sell specific applications for the computer systems of the day. This software ranged about Ubuntu from applications such as word processors, spreadsheets, and games to operating systems that made it easier to manage, load, and execute different programs.
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]