Lista.Txt Thu Jan 01 10:19:02 2015 1 0Ad-Data 2Ping 2Vcard 389

Total Page:16

File Type:pdf, Size:1020Kb

Lista.Txt Thu Jan 01 10:19:02 2015 1 0Ad-Data 2Ping 2Vcard 389 lista.txt Thu Jan 01 10:19:02 2015 1 0ad-data 2ping 2vcard 389-console 3dchess 3depict 4digits 4g8 4store 6tunnel 7kaa-data 8086tiny 8086tiny-dev 9base 9menu 9wm a2jmidid a2ps a56 a7xpg a7xpg-data aa3d aajm aaphoto abacas abby abcde abcm2ps abcmidi abcmidi-yaps abe abe-data abgate abi-compliance-checker abicheck abinit abinit-doc abiword abiword-common abiword-dbg abiword-plugin-grammar abiword-plugin-mathview abntex abook abootimg abr2gbr abraca abs-guide abtransfers abuse abuse-lib abuse-sfx accerciser accessodf accountsservice acct ace-gperf ace-netsvcs ace-of-penguins acedb-other acedb-other-belvu acedb-other-dotter aces3 acetoneiso acfax lista.txt Thu Jan 01 10:19:02 2015 2 acgvision-agent acheck acheck-rules acheck-rules-fr achilles ack ack-grep acl acl2 acl2-books acl2-books-certs acl2-books-source acl2-doc acl2-emacs acl2-infix acl2-infix-source acl2-source aclock.app acm aconnectgui acorn-fdisk acoustid-fingerprinter acpi-support acpi-support-base acpid acpitool acpitool-dbg actionaz activemq activity-log-manager activiz.net-doc activiz.net-examples ada-reference-manual-2005 ada-reference-manual-2012 adabrowse adacgi1 adacontrol adanaxisgpl adanaxisgpl-data addresses-goodies-for-gnustep addresses.framework addressmanager.app addressview.framework adduser adept adjtimex adlint admesh adminer adns-tools adonthell-data adplay adplug-utils adun.app advancecomp advene advi advi-examples adzapper aegis aegis-doc aegis-tk aegis-web aegisub aegisub-l10n lista.txt Thu Jan 01 10:19:02 2015 3 aeolus aephea aes2501-wy aesfix aeskeyfind aeskulap aespipe aewan aewm aewm++ aewm++-goodies affiche.app afflib-dbg afflib-tools afnix afnix-doc afpfs-ng afpfs-ng-utils aft afterstep afterstep-data afterstep-dbg afuse agave agda agda-bin agda-mode agda-stdlib agda-stdlib-doc agedu agenda.app aggregate aghermann aglfn agtl aha ahcpd ahven-dbg aiccu aide aide-common aide-dynamic aide-xen aiksaurus airport-utils airstrike airstrike-common aisleriot aj-snapshot ajaxterm akonadi-backend-mysql akonadi-backend-postgresql akonadi-backend-sqlite akonadi-dbg akonadi-kde-resource-googledata akonadi-server akonadiconsole akregator alacarte alarm-clock alarm-clock-applet album album-data aldo ale lista.txt Thu Jan 01 10:19:02 2015 4 alembic alevt alevtd alex alex4 alex4-data algol68g algotutor alice alien alien-arena-data alien-hunter alienblaster alienblaster-data aliki aliki-dbg all-knowing-dns allegro-demo allegro-demo-data allegro-examples allegro4-doc alleyoop alliance alltray almanah alpine alpine-dbg alpine-doc alpine-pico alqalam alsa-base alsa-firmware-loaders alsa-oss alsa-source alsa-tools alsa-tools-gui alsa-utils alsamixergui alsaplayer-alsa alsaplayer-common alsaplayer-daemon alsaplayer-esd alsaplayer-gtk alsaplayer-jack alsaplayer-nas alsaplayer-oss alsaplayer-text alsaplayer-xosd alsoft-conf alt-ergo alt-key altermime altree altree-examples alure-doc alure-utils am-utils am-utils-doc amanda-client amanda-common amanda-server amap-align amarok amarok-common amarok-dbg lista.txt Thu Jan 01 10:19:02 2015 5 amarok-doc amarok-utils amavisd-milter amavisd-milter-dbg amavisd-new amb-plugins ambdec amide amideco amiga-fdisk-cross amispammer amoeba-data amoebax amoebax-data amor amora-applet amora-cli ampache ampache-common ampache-themes amphetamine amphetamine-data ample ampliconnoise amqp-tools ams amsynth amtterm amule amule-common amule-daemon amule-emc amule-gnome-support amule-utils amule-utils-gui an anacron analog anarchism and angband angband-data angband-doc angrydd animals animals-dbg anjuta anjuta-common anjuta-dbg anjuta-extras anki ann-tools anon-proxy ansel1 ant ant-contrib ant-contrib-cpptasks ant-doc ant-gcj ant-optional ant-optional-gcj ant-phone antennavis anthy anthy-common lista.txt Thu Jan 01 10:19:02 2015 6 anthy-el antigravitaattori antiword antlr antlr-doc antlr3 antlr3-doc antlr3-gunit-maven-plugin antlr3-maven-plugin ants anubis anypaper anyremote anyremote-data anyremote-doc anyremote2html anything-el anytun aoetools aoeui aolserver4-core aolserver4-daemon aolserver4-dev aolserver4-doc aolserver4-nsldap aolserver4-nsmysql aolserver4-nsopenssl aolserver4-nspostgres aolserver4-nssha1 aolserver4-nssqlite3 aolserver4-nsxml aolserver4-xotcl aosd-cat ap-utils apache2 apache2-dbg apache2-doc apache2-mpm-event apache2-mpm-itk apache2-mpm-prefork apache2-mpm-worker apache2-prefork-dev apache2-suexec apache2-suexec-custom apache2-threaded-dev apache2-utils apache2.2-bin apache2.2-common apachetop apbs apcalc apcalc-common apcalc-dev apcupsd apcupsd-cgi apcupsd-doc apel apertium apertium-dbus apertium-en-ca apertium-en-es apertium-eo-ca apertium-eo-es apertium-es-ca apertium-es-gl lista.txt Thu Jan 01 10:19:02 2015 7 apertium-es-pt apertium-es-ro apertium-eu-es apertium-fr-ca apertium-fr-es apertium-oc-ca apertium-oc-es apertium-pt-ca apertium-pt-gl apertium-tolk apf-client apf-firewall apf-server apg apgdiff apiextractor-doc aplus-fsf aplus-fsf-dev aplus-fsf-doc aplus-fsf-el apmd apng2gif apoo app-install-data apparix apparmor apparmor-docs apparmor-notify apparmor-profiles apparmor-utils apper apper-appsetup apper-data apper-dbg appmenu-qt approx aprsd aprsdigi apsfilter apt apt-build apt-cacher apt-cacher-ng apt-clone apt-cudf apt-dater apt-dater-dbg apt-dater-host apt-doc apt-dpkg-ref apt-file apt-forktracer apt-listbugs apt-listchanges apt-mirror apt-move apt-offline apt-offline-gui apt-p2p apt-rdepends apt-show-source apt-show-versions apt-spy apt-src apt-transport-debtorrent lista.txt Thu Jan 01 10:19:02 2015 8 apt-transport-https apt-transport-spacewalk apt-utils apt-watch apt-watch-backend apt-watch-gnome apt-xapian-index apt-zip aptdaemon aptdaemon-data aptfs apticron aptitude aptitude-common aptitude-dbg aptitude-doc-cs aptitude-doc-en aptitude-doc-es aptitude-doc-fi aptitude-doc-fr aptitude-doc-it aptitude-doc-ja aptoncd aptsh apvlv apwal aqbanking-tools aqemu aqsis aqsis-examples aqualung ara arandr aranym arbtt arc archivemail archivemount archmage archmbox arcjobtool ardentryst ardesia ardour arduino arduino-core arduino-mk arename argus-client argus-server argyll argyll-dbg aria2 aribas ario ario-common arista arj ark ark-dbg armagetronad armagetronad-common armagetronad-dedicated arno-iptables-firewall aroarfw-dev lista.txt Thu Jan 01 10:19:02 2015 9 aroarfw-doc arora arp-scan arpalert arping arpon arptables arpwatch array-info artha as31 asc asc-data asc-music ascd ascdc ascii ascii2binary asciidoc asciijump asciio asclock asclock-themes ash asis-doc asis-programs asmail asmix asmixer asmon asp asp.net-examples aspcud aspectc++ aspectj aspectj-doc aspell aspell-am aspell-ar aspell-ar-large aspell-bg aspell-bn aspell-br aspell-ca aspell-cs aspell-cy aspell-da aspell-de aspell-de-alt aspell-doc aspell-el aspell-en aspell-eo aspell-eo-cx7 aspell-es aspell-et aspell-eu-es aspell-fa aspell-fi aspell-fo aspell-fr aspell-ga aspell-gl-minimos aspell-gu aspell-he lista.txt Thu Jan 01 10:19:02 2015 10 aspell-hi aspell-hr aspell-hsb aspell-hu aspell-hy aspell-is aspell-it aspell-kk aspell-kn aspell-ku aspell-lt aspell-lv aspell-ml aspell-mr aspell-nl aspell-no aspell-or aspell-pa aspell-pl aspell-pt aspell-pt-br aspell-pt-pt aspell-ro aspell-ru aspell-sk aspell-sl aspell-sv aspell-ta aspell-te aspell-tl aspell-uk aspell-uz aspic asql asr-manpages assaultcube-data assimp-utils assogiate asterisk asterisk-config asterisk-core-sounds-en asterisk-core-sounds-en-g722 asterisk-core-sounds-en-gsm asterisk-core-sounds-en-wav asterisk-core-sounds-es asterisk-core-sounds-es-g722 asterisk-core-sounds-es-gsm asterisk-core-sounds-es-wav asterisk-core-sounds-fr asterisk-core-sounds-fr-g722 asterisk-core-sounds-fr-gsm asterisk-core-sounds-fr-wav asterisk-core-sounds-ru asterisk-core-sounds-ru-g722 asterisk-core-sounds-ru-gsm asterisk-core-sounds-ru-wav asterisk-dahdi asterisk-dbg asterisk-dev asterisk-doc asterisk-espeak asterisk-flite asterisk-mobile asterisk-modules asterisk-moh-opsound-g722 lista.txt Thu Jan 01 10:19:02 2015 11 asterisk-moh-opsound-gsm asterisk-moh-opsound-wav asterisk-mp3 asterisk-mysql asterisk-ooh323 asterisk-prompt-de asterisk-prompt-es asterisk-prompt-es-co asterisk-prompt-fr-armelle asterisk-prompt-fr-proformatique asterisk-prompt-it asterisk-prompt-it-menardi asterisk-prompt-it-menardi-alaw asterisk-prompt-it-menardi-gsm asterisk-prompt-it-menardi-wav asterisk-prompt-se asterisk-voicemail asterisk-voicemail-imapstorage asterisk-voicemail-odbcstorage astronomical-almanac astyle asunder asused aswiki asylum asylum-data asymptote asymptote-doc at at-spi at-spi-doc at-spi2-core at-spi2-core-dbg at-spi2-doc atanks atanks-data aterm aterm-ml atfs atfs-dev atftp atftpd atheist athena-jot atlc atlc-examples atm-tools atmel-firmware atom4 atomicparsley atomix atomix-data atool atop atp atris ats-lang-anairiats ats-lang-anairiats-doc ats-lang-anairiats-examples atsar attal attal-themes-medieval attr aubio-tools auctex lista.txt Thu Jan 01 10:19:02 2015 12 audacious audacious-analog-vumeter-plugin-data audacious-dbg audacious-dev audacious-dumb audacious-plugins audacious-plugins-data audacious-plugins-dbg audacity audacity-data audacity-dbg audex audiofile-tools audiolink audiopreview audispd-plugins auditd audtty augeas-dbg augeas-doc augeas-lenses augeas-tools aumix aumix-common aumix-gtk auralquiz auth2db auth2db-common auth2db-filters auth2db-frontend authbind auto-apt auto-complete-el auto-install-el auto-multiple-choice auto-multiple-choice-common auto-multiple-choice-doc auto-multiple-choice-doc-pdf autoclass autoconf autoconf-archive autoconf-dickey autoconf-doc autoconf-gl-macros autoconf2.13 autoconf2.59
Recommended publications
  • Formal Verification of Eccs for Memories Using ACL2
    Journal of Electronic Testing (2020) 36:643–663 https://doi.org/10.1007/s10836-020-05904-2 Formal Verification of ECCs for Memories Using ACL2 Mahum Naseer1 · Waqar Ahmad1 · Osman Hasan1 Received: 12 April 2020 / Accepted: 2 September 2020 / Published online: 26 September 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020 Abstract Due to the ever-increasing toll of soft errors in memories, Error Correction Codes (ECCs) like Hamming and Reed-Solomon Codes have been used to protect data in memories, in applications ranging from space to terresterial work stations. In past seven decades, most of the research has focused on providing better ECC strategies for data integrity in memories, but the same pace research efforts have not been made to develop better verification methodologies for the newer ECCs. As the memory sizes keep increasing, exhaustive simulation-based testing of ECCs is no longer practical. Hence, formal verification, particularly theorem proving, provides an efficient, yet scarcely explored, alternative for ECC verification. We propose a framework, with extensible libraries, for the formal verification of ECCs using the ACL2 theorem prover. The framework is easy to use and particularly targets the needs of formally verified ECCs in memories. We also demonstrate the usefulness of the proposed framework by verifying two of the most commonly used ECCs, i.e., Hamming and Convolutional codes. To illustrate that the ECCs verified using our formal framework are practically reliable, we utilized a formal record- based memory model to formally verify that the inherent properties of the ECCs like hamming distance, codeword decoding, and error detection/correction remain consistent even when the ECC is implemented on the memory.
    [Show full text]
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • Open Source Subtitle Editor Software Study for Section 508 Close Caption Applications
    https://ntrs.nasa.gov/search.jsp?R=20140002618 2019-08-29T14:44:57+00:00Z Open Source Subtitle Editor Software Study for Section 508 Close Caption Applications Brandon F. Murphy NASA. John F. Kennedy Space Center Major: Computer Science USRP Summer 2013 Session Date: July 30 2013 NASA USRP - Internship Final Report Open Source Subtitle Editor Software Study for Section 508 Close Caption Applications Brandon F. Murphy North Carolina Agricultural and Technical State University Greensboro, North Carolina. 27411 Nomenclature cc = Closed Captioning !TAW = IT Accessibility and Workforce GSA = General Services Administration EfT = Electronic and Information Technology .srt = the file extension for Sub Rip subtitle files oss = Open Source Software .ssa = SubStation Alpha .ass = Advanced SubStation Alpha Subtitle .sub = Subtitling file .txt = Text File .idx = Index file I. Introduction Government agencies are required by law under the Section 508 policy to provide any tools or services for their employees who may need them. For those who need special assistance these tools and services help them do their job to the best of their ability. With these tools and services a person with disabilities will have equal opportunities for advancing in their company, as others do. This research and implementation was used to find cost effective solutions to make information available to all Government employees as required by law, Section 508. II. Abstract This paper will focus on a specific item within the NASA Electronic Information Accessibility Policy - Multimedia Presentation shall have synchronized caption; thus making information accessible to a person with hearing impairment. This synchronized caption will assist a person with hearing or cognitive disability to access the same information as everyone else.
    [Show full text]
  • Creating Formally Verified Components for Layered
    Creating Formally Verified Components for Layered Assurance with an LLVM to ACL2 Translator∗ y z David S. Hardin Jedidiah R. McClurg Jennifer A. Davis Advanced Technology Center Department of Computer Advanced Technology Center Rockwell Collins Science Rockwell Collins Cedar Rapids, IA, USA University of Colorado Cedar Rapids, IA, USA [email protected] Boulder, CO, USA [email protected] [email protected] ABSTRACT Keywords In our current work, we need to create a library of formally Formal verification, Theorem proving, ACL2, LLVM verified software component models from code that has been compiled (or decompiled) using the Low-Level Virtual Ma- 1. INTRODUCTION chine (LLVM) intermediate form; these components, in turn, are to be assembled into subsystems whose top-level assur- ance relies on the assurance of the individual components. \Remember that all models are wrong; the Thus, we have undertaken a project to build a translator practical question is how wrong do they have to from LLVM to the applicative subset of Common Lisp ac- be to not be useful." [2] { George Box, British cepted by the ACL2 theorem prover. Our translator pro- Statistician duces executable ACL2 specifications featuring tail recur- sion, as well as in-place updates via ACL2's single-threaded Layered assurance for software often requires the creation object (stobj) mechanism. This allows us to efficiently sup- of a library of assured software component models, start- port validation of our models by executing production tests ing with code that lacks a formal pedigree. These assured for the original artifacts against those models. Unfortu- components can then be assembled into subsystems whose nately, features that make a formal model executable are of- top-level assurance relies on the assurance of the individual ten at odds with efficient reasoning.
    [Show full text]
  • Automated IT Service Fault Diagnosis Based on Event Correlation Techniques
    Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 Tag der m¨undlichen Pr¨ufung: 19. Juli 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Acknowledgments This thesis has been written as part of my work as a researcher at the Leib- niz Supercomputing Center (Leibniz-Rechenzentrum, LRZ) of the Bavarian Academy of Sciences and Humanities which was funded by the German Re- search Network (DFN-Verein) as well as in cooperation with the research group of Prof. Dr. Heinz-Gerd Hegering. Apart from the LRZ, this research group called MNM-Team (Munich Network Management Team) is located at the University of Munich (LMU), the Munich University of Technology (TUM) and the University of Federal Armed Forces in Munich. At first, I would like to thank my doctoral advisor Prof. Dr. Heinz-Gerd Hegering for his constant support and helpful advice during the whole prepa- ration time of this thesis. I would also like to express my special gratefulness to my second advisor, Prof.
    [Show full text]
  • QNAP Turbo NAS Software User Manual
    QNAP Turbo NAS Software User Manual (Version: 4.2.2) This manual is applicable to the following Turbo NAS models: TS-128, TS-131, TS-228, TS-231, TS-231+, TS-251, TS-251+, HS-251, HS-251+, TS-251C, TS-251A, TS-253 Pro, TS-253A, TS-269L, TS-269 Pro, IS-400 Pro, TS-431, TS-431U, TS-431+, TS-451, TS-451+, TS-451S, TS-451U, TS-451A, TBS-453A, IS-453S, TS-453S Pro, TS-453 Pro, TS-453A, TS-453U, TS-453U-RP, TS-453mini, TVS-463, TS-463U, TS-463U-RP, TS-469 Pro, TS-469L, TS-469U-RP, TS-469U-SP, TS-470, TVS-470, TS-470U-RP, TS-470U-SP, TS-470 Pro, TVS-471, TVS-471U, TVS-471U-RP, TS-563, TS-569 Pro, TS-569L, TS-651, TS-653 Pro, TS-653A, TVS-663, TS-669 Pro, TS-669L, TS-670 Pro, TS-670, TVS-670, TVS-671, TVS-682, TVS-682T, TS-831X, TS-851, TS-853 Pro, TS-853S Pro, TS-853U, TS-853U-RP, TS-853A, TS-863U, TVS-863, TVS-863+, TS-863U-RP, TS-869 Pro, TS-869L, TS-869U-RP, TS-870 Pro, TS-870, TVS-870, TS-870U-RP, TVS-871T, TVS-871, TVS-871U-RP, TS-879 Pro, TS-879U-RP, TS-EC879U-RP, TS-EC880U, TVS-EC880, TS-EC880U-RP, TS-EC880 Pro, TS-EC880U R2, TVS-882, TVS-882T, TS-1079 Pro, TVS-EC1080+, TVS-EC1080, TS-EC1080 Pro, TS-1253U, TS-1253U-RP, TS-1263U, TS-1263U-RP, TS-1269U-RP, TS-1270U-RP, TVS-1271U-RP, TS-1279U-RP, TS-EC1279U-RP, TS-EC1279U-SAS-RP, SS-EC1279U-SAS-RP, TS-EC1280U, TS-EC1280U-RP, TVS-EC1280U-SAS-RP, TS-EC1280U R2, TVS-EC1280U-SAS-RP R2, TVS-1282, TVS-1282T, TVS-EC1580U-SAS-RP, TVS-EC1580MU-SAS-RP, TVS-EC1580MU-SAS-RP R2, TS-1679U-RP, TS-EC1679U-RP, TS-EC1679U-SAS-RP, TS-EC1680U, TS-EC1680U R2, TS-EC1680U-RP, TVS-EC1680U-SAS-RP, TVS-EC1680U-SAS-RP R2, SS-EC1879U-SAS-RP, SS-EC2479U-SAS-RP, TS-EC2480U-RP, TS-EC2480U R2, TVS-EC2480U-SAS-RP, TVS-EC2480U-SAS-RP R2, TDS-16489U.
    [Show full text]
  • Linux Administrators Security Guide LASG - 0.1.1
    Linux Administrators Security Guide LASG - 0.1.1 By Kurt Seifried ([email protected]) copyright 1999, All rights reserved. Available at: https://www.seifried.org/lasg/. This document is free for most non commercial uses, the license follows the table of contents, please read it if you have any concerns. If you have any questions email [email protected]. A mailing list is available, send an email to [email protected], with "subscribe lasg-announce" in the body (no quotes) and you will be automatically added. 1 Table of contents License Preface Forward by the author Contributing What this guide is and isn't How to determine what to secure and how to secure it Safe installation of Linux Choosing your install media It ain't over 'til... General concepts, server verses workstations, etc Physical / Boot security Physical access The computer BIOS LILO The Linux kernel Upgrading and compiling the kernel Kernel versions Administrative tools Access Telnet SSH LSH REXEC NSH Slush SSL Telnet Fsh secsh Local YaST sudo Super Remote Webmin Linuxconf COAS 2 System Files /etc/passwd /etc/shadow /etc/groups /etc/gshadow /etc/login.defs /etc/shells /etc/securetty Log files and other forms of monitoring General log security sysklogd / klogd secure-syslog next generation syslog Log monitoring logcheck colorlogs WOTS swatch Kernel logging auditd Shell logging bash Shadow passwords Cracking passwords John the ripper Crack Saltine cracker VCU PAM Software Management RPM dpkg tarballs / tgz Checking file integrity RPM dpkg PGP MD5 Automatic
    [Show full text]
  • Release Notes for Fedora 15
    Fedora 15 Release Notes Release Notes for Fedora 15 Edited by The Fedora Docs Team Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Kde-Guide-De-Developpement.Web.Pdf
    KDE Published : 2017-06-26 License : GPLv2+ 1 KDE DU POINT DE VUE D'UN DÉVELOPPEUR 1. AVEZ-VOUS BESOIN DE CE LIVRE ? 2. LA PHILOSOPHIE DE KDE 3. COMMENT OBTENIR DE L'AIDE 2 1. AVEZ-VOUS BESOIN DE CE LIVRE ? Vous devriez lire ce livre si vous voulez développer pour KDE. Nous utilisons le terme développement très largement pour couvrir tout ce qui peut conduire à un changement dans le code source, ce qui inclut : Soumettre une correction de bogue Écrire une nouvelle application optimisée par la technologie KDE Contribuer à un projet existant Ajouter de la fonctionnalité aux bibliothèques de développement de KDE Dans ce livre, nous vous livrerons les bases dont vous avez besoin pour être un développeur productif. Nous décrirons les outils que vous devrez installer, montrer comment lire la documentation (et écrire la vôtre propre, une fois que vous aurez créé la nouvelle fonctionnalité !) et comment obtenir de l'aide par d'autres moyens. Nous vous présenterons la communauté KDE, qui est essentielle pour comprendre KDE parce que nous sommes un projet « open source », libre (gratuit). Les utilisateurs finaux du logiciel n'ont PAS besoin de ce livre ! Cependant, ils pourraient le trouver intéressant pour les aider à comprendre comment les logiciels complexes et riches en fonctionnalités qu'ils utilisent ont vu le jour. 3 2. LA PHILOSOPHIE DE KDE Le succès de KDE repose sur une vue globale, que nous avons trouvée à la fois pratique et motivante. Les éléments de cette philosophie de développement comprennent : L'utilisation des outils disponibles plutôt que de ré-inventer ceux existants : beaucoup des bases dont vous avez besoin pour travailler font déjà partie de KDE, comme les bibliothèques principales ou les « Kparts », et sont tout à fait au point.
    [Show full text]