Taking the Open Source Road

Total Page:16

File Type:pdf, Size:1020Kb

Taking the Open Source Road The National Security Agency’s Review of Emerging Technologies 6 £nn Ó£ U ÓääÓä Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with CLIP Open Source—Setting Software Free NSA’s Review of Emerging Technologies Letter from the Editor 2SHQ VRXUFH VRIWZDUH 266 LV D JURZLQJ SDUW RI WKH VRIWZDUH PDUNHW $OWKRXJK PXFK 266 LV ORZ FRVW HYHQ IUHH D JUHDW GHDO RI LWV JURZLQJ SRSXODULW\ LV EDVHG QRW RQ FRVW EXW RQ WKH DELOLW\ WR VHH DQG PDQLSXODWH WKH VRIWZDUH LQWHUQDOV 7KLV DELOLW\ HQDEOHV JUHDW ÁH[LELOLW\ DOORZLQJ SURJUDPPHUV WR HDVLO\ EXLOG XSRQ RU H[WHQG VRIWZDUH WR PHHW VSHFLÀF PLVVLRQ QHHGV ,QFUHDVLQJ LQWHUHVW LQ 266 LV QRW OLPLWHG WR FRPPHUFLDO PDUNHWV WKH 86 'HSDUWPHQW RI 'HIHQVH 'R' LV ORRNLQJ IRU ZD\V WR KDUQHVV WKH FRPPXQLW\ GHYHORSPHQW PRGHO ZLWKLQ LQWHUQDO SURMHFWV 'R' KDV HYHQ FUHDWHG LWV RZQ FRPPXQLW\ VRIWZDUH VLWH PLOIRUJHPLO WR PLPLF WKH SXEOLF RSHQ VRXUFH FRPPXQLW\ ,Q WKLV LVVXH RI 7KH 1H[W :DYH 71: ZH KDYH D VHULHV RI DUWLFOHV DERXW LPSRUWDQW SURMHFWV WKDW ZHUH HQDEOHG E\ RSHQ VRXUFH VRIWZDUH 7KH DUWLFOH ´5DLVLQJ WKH %DU LQ 2SHUDWLQJ 6\VWHP 6HFXULW\ 6(/LQX[ DQG 2SHQ6RODULV )0$&µ ZULWWHQ E\ 6WHYH 6PDOOH\ SUHVHQWV DQ XSGDWH RQ 6HFXULW\(QKDQFHG /LQX[ DQG LQWURGXFHV D SURMHFW WR EULQJ VLPLODU VHFXULW\ HQKDQFHPHQWV WR 6XQ·V 2SHQ6RODULV RSHUDWLQJ V\VWHP 7KH QH[W DUWLFOH ´3URYLGLQJ D 6HFXUH )RXQGDWLRQ IRU $SSOLFDWLRQV ZLWK WKH &HUWLÀDEOH /LQX[ ,QWHJUDWLRQ 3ODWIRUPµ E\ 7RGG 3DLVOH\ %UDQGRQ :KDOHQ DQG 6WHSKHQ /DZUHQFH LQWURGXFHV DQ 16$ SURMHFW WR HQDEOH TXLFNHU DQG FKHDSHU GHSOR\PHQW RI VHFXUH V\VWHP VROXWLRQV WR PHHW PLVVLRQ QHHGV 7KH DUWLFOH ´&U\SWRJUDSKLF %LQGLQJ RI 0HWDGDWDµ E\ &DOYLQ 0DVRQ FDOOV DWWHQWLRQ WR WKH LPSRUWDQFH RI WUXVWZRUWK\ PHWDGDWD DQG SUHVHQWV D VXPPDU\ RI WZR 16$ SURMHFWV WR SURWHFW PHWDGDWD )LQDOO\ RXU IRFXV DUWLFOH ´2SHQ 6RXUFH 6RIWZDUH³$ *URZLQJ 7UHQGµ E\ 5XVV 6XWFOLIIH DQG 5D\ <RXQJ H[SODLQV WKH LPSDFW RSHQ VRXUFH LV KDYLQJ RQ WKH JOREDO VRIWZDUH PDUNHW 7X[ WKH FUHDWLRQ RI /DUU\ (ZLQJ OHZLQJ#LVFWDPXHGX KDV UHSUHVHQWHG /LQX[ VLQFH 7KH RULJLQDO 7X[ ORJR ZDV FUHDWHG ZLWK *,03³WKH *18 ,PDJH 0DQLSXODWLRQ 3URJUDP &XVWRP YHUVLRQV RI 7X[ ZLOO VHUYH DV WKH JXLGH WKURXJK WKLV RSHQ VRXUFH HGLWLRQ RI 7KH 1H[W :DYH 7KH /LQX[ SHQJXLQ DQG *,03 DUH WZR H[DPSOHV RI RSHQ VRXUFH SURGXFWV DYDLODEOH IUHH WR WKH SXEOLF IRU XVH DQG PRGLÀFDWLRQ The Next Wave is published to disseminate technical advancements and research activities in telecommunications and information technologies. Mentions of company names or commercial products do not imply endorsement by the US Government. For more information, please contact us at [email protected] CONTENTS FEATURES 7DNLQJWKH2SHQ6RXUFH5RDG 5DLVLQJWKH%DULQ2SHUDWLQJ6\VWHP6HFXULW\ 6(/LQX[DQG2SHQ6RODULV)0$& 3URYLGLQJD6HFXUH)RXQGDWLRQIRU$SSOLFDWLRQV ZLWK WKH &HUWLÀDEOH /LQX[ ,QWHUJUDWLRQ 3ODWIRUP &U\SWRJUDSKLF%LQGLQJRI0HWDGDWD FOCUS 2SHQ6RXUFH³6HWWLQJ6RIWZDUH)UHH Taking the Open Source Road The direction is clear. Open-source software is paving a path to the information-centric future envisioned by the U.S. Department of Defense (DoD). In an address to Department personnel, the Pentagon’s deputy chief information offi cer (DCIO), David M. Wennergren, explained the reason for taking this new direction. “In today’s world we have to share information with people we never even dreamed of, using tools and means we never thought of before, [in] non-traditional ways with non-traditional organizations. And that’s the power of the information world.”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·V 5HVHDUFK SRSXODU :KLWH+RXVHJRY ZHE VLWH VZLWFKHG IURP 'LUHFWRUDWH 5' KDV EHHQ H[SORULQJ WKH UROH 266 DSURSULHWDU\FRQWHQWPDQDJHPHQWV\VWHPWRRSHQ FDQSOD\LQKHOSLQJWKH'R'DFKLHYHLWVPLVVLRQV VRXUFH 'UXSOH LQ 2FWREHU &LWLQJ WKH SRWHQWLDO (IIRUWV E\ 5' UHVHDUFKHUV OHG WR WKH SXEOLF UHOHDVH IRU HYHU\GD\ FLWL]HQV FRQWULEXWLQJ WR WKH HYROXWLRQ LQ 'HFHPEHU RI VHFXULW\HQKDQFHG 6( /LQX[ RI WKH ZHE VLWH :KLWH +RXVH PHGLD GLUHFWRU 0DFRQ 6LQFH WKHQ GHYHORSHUV IURP +3 +LWDFKL 6RIWZDUH 3KLOOLSV VDLG ´:H·UH ORRNLQJ IRUZDUG WR JHWWLQJ WKH ,%0 1(& 5HG +DW DQG RWKHU FRPPHUFLDO DV EHQHÀW RI WKHLU HQHUJ\ DQG LQQRYDWLRQµ ZHOO DV SULYDWH LQVWLWXWLRQV KDYH FRQWULEXWHG WR 7KH RSHQVRXUFH URDG DW WLPHV KDV EHHQ D H[WHQGLQJ WKH SURJUDP·V IHDWXUHV DQG PDWXULQJ LWV EXPS\ RQH QRW MXVW IRU WKH 'R' DV ,7 SODQQHUV IXQFWLRQDOLW\ )RU DQ LQGHSWK ORRN DW 6(/LQX[ VHH DWWHPSW WR VWHHU D FRXUVH VWUDGGOLQJ WKH EHQHÀWV ´5DLVLQJWKH%DULQ2SHUDWLQJ6\VWHP6HFXULW\µ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ÀFLDOO\ HQGRUVHG WKH XVH RI ,QIRUPDWLRQ 6\VWHPV $JHQF\ ',6$ ',6$ 266 VWDWLQJ DV PXFK LQ JXLGHOLQHV SXEOLVKHG LQ VSHQW DOPRVW D GHFDGH EXLOGLQJ WKH ZHEEDVHG $ PHPRUDQGXP UHOHDVHG 2FWREHU IHGHUDO ZRUNIRUFH PDQDJHPHQW ZRUNÁRZ DQG E\ WKH &,2 WHDP SURYLGHV ´FODULI\LQJ JXLGDQFHµ DGPLQLVWUDWLYH VRIWZDUH VXLWH IRU XVH E\ PRUH WKDQ LQWHQGHG WR RYHUFRPH ´PLVFRQFHSWLRQV DQG PLOLWDU\ SHUVRQQHO PLVLQWHUSUHWDWLRQV RI WKH H[LVWLQJ ODZV SROLFLHV :KHQ RWKHU JRYHUQPHQW GHSDUWPHQWV DQGUHJXODWLRQVWKDWGHDOZLWKVRIWZDUHDQGDSSO\ ZDQWHG WR DGRSW WKH &0,6 VXLWH RI PRUH WKDQ WR 266µ '&,2 :HQQHUJUHQ VWDWHV LQ WKH PHPR WKDW DSSOLFDWLRQV ',6$·V GLUHFWRU RI PDQSRZHU WKHVH PLVFRQFHSWLRQV DQG PLVLQWHUSUHWDWLRQV KDYH SHUVRQQHO DQG VHFXULW\ -DFN 3HQNRVNH DVNHG KDPSHUHG 'R' HIIRUWV WR HIIHFWLYHO\ GHYHORS DQG ´:K\ QRW OHW WKHP"µ $QG LI VKDULQJ &0,6 ZLWK XVH266 RWKHU IHGHUDO DJHQFLHV ZDV D JRRG LGHD ZK\ QRW 266 KDV DOUHDG\ EHHQ DGRSWHG E\ VHYHUDO LQFOXGH DFDGHPLD LQGXVWU\ DQG WKH HQWLUH 26 'R' DJHQFLHV ZLWK LWV H[WHQVLYH XVH FLWHG DV HDUO\ FRPPXQLW\" DV ,Q D VWXG\ SUHSDUHG IRU WKH 'R' ´8VH ',6$ GLG MXVW WKDW ,Q 0DUFK WKH RI)UHHDQG2SHQ6RXUFH6RIWZDUH )266 LQWKH 3HQWDJRQ·V LQIRUPDWLRQ WHFKQRORJ\ XQLW DQQRXQFHG 86 'HSDUWPHQW RI 'HIHQVHµ 0,75( &RUSRUDWLRQ DFRRSHUDWLYHUHVHDUFKDQGGHYHORSPHQWDJUHHPHQW IRXQGWKDW´)266VRIWZDUHSOD\VDIDUPRUHFULWLFDO &5$'$ ZLWK WKH 2SHQ 6RXUFH 6RIWZDUH ,QVWLWXWH UROH LQ WKH 'R' WKDQ KDV EHHQ JHQHUDOO\ UHFRJQL]HGµ WR PDNH DQ 26 YHUVLRQ RI &0,6 DYDLODEOH WR 1RZ WKH PHPRUDQGXP ZKLFK VXSHUVHGHV RWKHU IHGHUDO DJHQFLHV DFDGHPLD QRQSURÀW 'R' JXLGHOLQHV RI VHYHQ \HDUV DJR RSHQV WKH GRRU RUJDQL]DWLRQV DQG LQGXVWU\ WR UHXVH DQG LPSURYH WRHYHQJUHDWHUSUROLIHUDWLRQRI266SURGXFWVLQWKH ',6$ XVHG $GREH &ROG )XVLRQ DQG 0LFURVRIW 64/ IXWXUH 6HUYHU WR EXLOG 26&0,6 7KH GHSDUWPHQW·V 2QH IRUFH DFFHOHUDWLQJ WKH 'R'·V DGRSWLRQ RI HIIRUW ZDV UHFRJQL]HG E\ *RYHUQPHQW &RPSXWHU 266 PD\ FRPH IURP WKH PHPR·V DIÀUPDWLRQ WKDW 1HZV *&1 DV RQH RI WKH ´ JUHDW JRYHUQPHQW ,7 ´LQ DOPRVW DOO FDVHV 266 PHHWV WKH GHÀQLWLRQ RI SURMHFWVµ IRU ¶FRPPHUFLDO FRPSXWHU VRIWZDUH·µ DQG QHHGV WR EH The Next Wave Vol 18 No 2 2009 5 WUHDWHGDVVXFK&ODVVLI\LQJ266DVDFRPPHUFLDO ZRUNVµ ÀQDQFLDO JDLQ %\ DSSO\LQJ WKLV GHÀQLWLRQ LWHP JUDQWV LW VSHFLDO FRQWUDFWXDO FRQVLGHUDWLRQ WR 266 VLPSO\ LPSURYLQJ FRGH³VRPHWKLQJ 86 ODZ 86& FDOOV IRU JRYHUQPHQW HQFRXUDJHG E\ WKH RSHQVRXUFH FRPPXQLW\ DQG SURFXUHPHQW WR IDYRU FRPPHUFLDO VXSSOLHV DQG H[SUHVVHGLQWKH26'DQGWKH)6'³LVDIRUPRI VHUYLFHV 7KH ODZ UHTXLUHV KHDGV RI DJHQFLHV WR ÀQDQFLDO JDLQ PDNLQJ WKH VRIWZDUH FRPPHUFLDO HQVXUH WKDW SURFXUHPHQW RIÀFLDOV DUH WUDLQHG LQ 0RUH REYLRXV HIIRUWV WR FRPPHUFLDOL]H 266 WKHDFTXLVLWLRQRIFRPPHUFLDOSURGXFWV(YHU\RQH DUH JDLQLQJ PRPHQWXP DV ZHOO 5HVHDUFK ÀUP ,'& LQYROYHG LQ WKH SURFXUHPHQW SURFHVV PXVW E\ IRUHFDVWVDSHUFHQWFRPSRXQGDQQXDOJURZWK ODZ PDNH HYHU\ HIIRUW WR DFTXLUH FRPPHUFLDO UDWH &$*5 IRU 266 UHYHQXH ZRUOGZLGH RYHU SURGXFWV DQG UHTXLUH FRQWUDFWRUV WR LQFRUSRUDWH WKH QH[W ÀYH \HDUV 7KDW JDLQ ZRXOG SXVK UHYHQXH FRPPHUFLDO SURGXFWV ZKHQ SRVVLEOH $GGLWLRQDOO\ IURP 266 SDVW ELOOLRQ E\ ,Q DGGLWLRQ WR VSHFLÀFDWLRQV IRU FRQWUDFW UHTXLUHPHQWV VKRXOG EH HVWDEOLVKHG 266 YHQGRUV OLNH 5HG +DW DQG 1RYHOO VWDWHG LQ WHUPV WKDW HQFRXUDJH ELGGHUV WR VXSSO\ VHUYLFHEDVHG ,7 EXVLQHVVHV VXFK DV ,%0 DQG FRPPHUFLDO SURGXFWV DQG SURFXUHPHQW SROLFLHV 2UDFOH KDYH EHHQ WDSSLQJ WKH RSHQVRXUFH PDUNHW SUDFWLFHV DQG SURFHGXUHV DUH WR EH ZULWWHQ RU E\ RIIHULQJ 266 VXSSRUW *RRJOH·V 266 VWUDWHJ\ UHYLVHGWRUHGXFHLPSHGLPHQWVWRWKHLUDFTXLVLWLRQ KDV EHHQ WR VKLIW HPSKDVLV DZD\ IURP WKH FRGH LQ 3ROLFLHV VHW RXW LQ )HGHUDO $FTXLVLWLRQ IDYRURIWUDQVSDUHQF\DQGDSSOLFDWLRQSURJUDPPLQJ 5HJXODWLRQ )$5 DQG WKH 'R' VXSSOHPHQW LQWHUIDFHV $3,V (YHQ 0LFURVRIW LV SURPRWLQJ ')$56 VSHFLÀFDOO\ UHTXLUH HIIRUWV WR VXSSRUW LQWHURSHUDELOLW\ EHWZHHQ WKH H[HFXWLYHDJHQFLHVWRLQFOXGH266ZKHQFRQGXFWLQJ FRPSDQ\·V SURSULHWDU\ OLQH RI SURGXFWV DQG 266 PDUNHW UHVHDUFK IRU VRIWZDUH SURFXUHPHQWV
Recommended publications
  • Guida Per L'utente Delle Stampanti Laser Dell™ 2330D/Dn E 2350D/Dn
    Guida per l'utente delle stampanti laser Dell™ 2330d/dn e 2350d/dn Per ordinare inchiostro o materiali di consumo da Dell: 1. Fare doppio clic sull'icona sul desktop. 2. Visitare il sito Web Dell, oppure ordinare i materiali di consumo per la stampante Dell telefonicamente. www.dell.com/supplies Per ottenere un servizio ottimale, accertarsi di disporre dell'etichetta servizio della stampante Dell. Note, avvertenze e messaggi di attenzione NOTA: una NOTA identifica informazioni importanti che possono semplificare l'uso della stampante. AVVISO: un'AVVERTENZA può identificare potenziali danni all'hardware oppure perdita di dati e fornisce informazioni su come evitare il problema. ATTENZIONE: un messaggio di ATTENZIONE indica che le operazioni effettuate potrebbero provocare danni alle strutture, lesioni a persone o incidenti mortali. Le informazioni contenute in questo documento sono soggette a modifiche senza preavviso. © 2010 Dell Inc. Tutti i diritti riservati. È vietata qualsiasi forma di riproduzione del presente documento senza autorizzazione scritta da parte di Dell Inc. Marchi utilizzati in questo testo: Dell, il logo DELL e OpenManage sono marchi di Dell Inc. Microsoft e Windows sono marchi registrati di Microsoft Corporation negli Stati Uniti e/o in altri Paesi. Windows Vista è un marchio o un marchio registrato di Microsoft Corporation negli Stati Uniti e/o in altri Paesi. Linux è il marchio registrato di Linus Torvalds negli Stati Uniti e in altri Paesi. SuSE è un marchio di Novell, Inc. negli Stati Uniti e in altri Paesi. Red Hat è un marchio di Red Hat, Inc. Debian è un marchio registrato di Software in the Public Interest, Inc.
    [Show full text]
  • General Specs Copying Connectivity
    General Specs Part no. 27X0128 Packaged Size (mm - H x 24 x 178 x 191 mm W x D) Packaged Weight, kg 0.099 kg Copying Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectivity Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectors One USB port (Type B) for Configuration Network Protocol Support TCP/IP IPv6, TCP/IP IPv4, AppleTalk™, TCP, UDP Network Printing Methods LPR/LPD, Function may vary by printer or MFP., Direct IP (Port 9100), HTTP, Telnet, FTP, TFTP, Enhanced IP (Port 9400), ThinPrint .print integration, IPP 1.0, 1.1, 2.0 (Internet Printing Protocol) Network Management DHCP, APIPA (AutoIP), BOOTP, RARP, mDNS, IGMP, SLPv1, Bonjour, WINS, DDNS, SNMPv3, Function may Protocols vary by printer or MFP., SNMPv2c, Telnet, NTP, ICMP, DNS, ARP, HTTPs (SSL1 /TLS), Finger Network Security IPSec, SNMPv3, 802.1x Authentication: MD5, MSCHAPv2, LEAP, PEAP, TLS, TTLS Wireless Network WEP Encryption (64- and 128-bit key), 1x1 802.11i b/g/n 72Mbps, WPA2™ - Enterprise with Certificate Management, WPA2™ - Personal Supported Operating Systems Microsoft Windows Windows Server 2008 x64 running Terminal Services, Windows Server 2008 x64, Windows Server 2008 running Operating Systems Terminal Services, Windows 8.1, Windows Server 2008 R2 Supported running Terminal Services, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows 8 x64, Windows 7 x64, Windows Server 2012, Windows RT 8.1, Windows XP x64, Windows Server 2003 x64, Windows RT, Windows Server 2003, Windows Server 2012 R2, Windows XP, Windows Server 2003 x64 running
    [Show full text]
  • Ein Wilder Ritt Distributionen
    09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren.
    [Show full text]
  • Introduction to Linux
    Presentation to U3A - Linux Introduction 8 June 2019 – Terry Schuster - [email protected] What is Linux? https://en.wikipedia.org/wiki/Linux https://www.iotforall.com/linux-operating-system-iot-devices/ In simple terms, Linux is an operating system which was developed to be a home-built version of UNIX, one of the first operating systems which could be run on different brands of mainframe computers with quite different types of hardware. Linux has developed to the extent that it is the leading operating system on servers and other big iron systems such as mainframe computers, and the only OS used on TOP500 supercomputers (since November 2017, having gradually eliminated all competitors). It is used by around 2.3 percent of desktop computers. The Chromebook, which runs the Linux kernel-based Chrome OS, dominates the US K–12 education market. In the mid 2000’s, Linux was quickly seen as a good building block for smartphones, as it provided an out- of-the-box modern, full-featured Operating System with very good device driver support, and that was considered both scalable for the new generation of devices and had the added benefit of being royalty free. It is now becoming very common in IoT devices, such as smart watches/refrigerators, home controllers, etc. etc. BTW, Tux is a penguin character and the official brand character of the Linux kernel. Originally created as an entry to a Linux logo competition, Tux is the most commonly used icon for Linux, although different Linux distributions depict Tux in various styles. The character is used in many other Linux programs and as a general symbol of Linux.
    [Show full text]
  • Remote Desktop and Fedora
    Remote Desktop & Fedora Flock 2015 Presented by Mike DePaulo mikedep333 License: CC BY 3.0 What this talk is NOT about VDI Remote Desktop Server Integrated into hypervisor (SPICE/VNC in KVM, VMware View) Remote Desktop Server running in guest, but still tied to hypervisor (QVD, Citrix) What this talk IS about Remote Desktop = multiple solutions/protocols, not Microsoft RDP specifically Can run on physical desktop, server, cloud instance, even containers TigerVNC, X2Go and SPICE X11 itself provides “remote display”, but I do not consider it to be “remote desktop” because it lacks: session resume other needed desktop features like audio X2Go Server Quick-Start Install packages X2goserver X2goserver-xsession Install compatible DE such as: MATE, XFCE, LXDE, KDE4 Enable service: x2gocleansessions Enable service: sshd TigerVNC Quick Start Install package Tigervnc-server Install one of the DE's listed in /etc/X11/xinit/Xclients GNOME MATE KDE LXDE vncserver -autokill -SecurityTypes=VeNCrypt,TLSPlain -PlainUsers=$USER -pam_service login -desktop $HOSTNAME You will see a display number like :2 Today's Topics 1. Different Features 2. Demo 3. Integration 4. Penetrating the corporate desktop market 5.Future Different Features (1) Feature TigerVNC X2Go SPICE WAN Compression Compression & Compression & Performance Caching Caching Clipboard Yes Yes Yes Sharing Audio No Yes Yes File Transfers No Yes (Folder Yes (Drag & Drop) Sharing) Printer Sharing No Yes Yes (WIP) Client OSs Linux, Windows, Linux, Windows, Linux, Windows OS X, mobile Mac OS X (non-tiger)
    [Show full text]
  • Administration Manual of QVD 4.2 I
    MANUALS QVD 4.2 Administration QVD DOCUMENTATION <[email protected]> September 22, 2020 Administration Manual of QVD 4.2 i Contents 1 What is QVD? 1 1.1 Some notes about this manual............................................2 2 Administration of QVD 3 3 Basic configuration of QVD 4 3.1 Other parameters of configuration of QVD......................................5 3.1.1 Paths of the QVD system...........................................6 3.1.2 Logging....................................................7 3.1.3 Options of configuration of the L7R.....................................8 3.1.4 Options of configuration of the HKD....................................8 3.1.5 Options de VM................................................8 4 QVD-DB 10 4.1 Installation and configuration of QVD-DB...................................... 11 4.1.1 Creation of the user and the QVD database................................. 12 4.1.2 Configuration requirements of PostgreSQL................................. 13 4.2 Supply of QVD-DB.................................................. 13 4.3 Access test to QVD-DB................................................ 14 4.4 Backup copy and restoring QVD-DB......................................... 15 4.5 Relational model of QVD-DB data.......................................... 15 5 QVD server nodes 17 5.1 Installation of a QVD server node.......................................... 17 5.2 Basic configuration.................................................. 19 5.2.1 Establish dnsmasq to be controlled by QVD................................
    [Show full text]
  • Linux, Inc. a Survey on Open Source Software October 2002
    Linux, Inc. A Survey on Open Source Software October 2002 The Dravis Group San Francisco, CA [email protected] 415-665-8745 Linux, Inc.: A Survey on Open Source Software October 2002 Table of Contents Executive Summary 3 Introduction 4 Open Source 101: What is it about? 4 Open Source: More than the Linux Operating System 7 Commercial Use is Growing 9 Systems Hardware Providers Address the Market 10 The Linux Desktop: A Challenging Opportunity 11 Enterprise Software Firms Recognize the Trend 12 Embedded Linux Could Drive Consolidation 13 Grid Computing: The High-End of the Market 14 Governments Enter the Debate 15 About The Dravis Group 16 Tables Table 1: A Sampling of Linux Distributions 6 Table 2: Commercial Deployments of Linux 9 Table 3: Enterprise Software Support 12 Table 4: Examples of Embedded Linux Solutions 13 Table 5: Government Actions 15 Charts Chart 1: Linux can Provide Scalability 5 Chart 2: Apache: An Open Source Market Leader 7 Appendices Appendix 1: Terms to Know 17 Appendix 2: US National Security Agency Comments 18 Appendix 3: GNU General Public License 19 This document is copyrighted © by The Dravis Group LLC and is protected by U.S. and international copyright laws and conventions. This document was developed on the basis of materials and sources believed to be reliable. This document it to be used “as is”. Opinions reflect judgment at the time and are subject to change. 2 The Dravis Group Linux, Inc.: A Survey on Open Source Software October 2002 Executive Summary We believe both Linux and open source software are changing the agendas of technology providers and users alike.
    [Show full text]
  • Ubuntu 12.04)
    QVD Disk Image Creation (Ubuntu 12.04) QVD DOCUMENTATION <[email protected]> November 5, 2018 QVD Disk Image Creation (Ubuntu 12.04) i Contents 1 Building the Image 1 1.1 Install a Build System.................................................1 1.2 Create a KVM Disk Image.............................................. 11 1.2.1 Customize and Brand the Desktop...................................... 11 1.2.2 Tar and Zip the Image............................................ 11 1.3 Create an LXC Disk Image.............................................. 11 1.3.1 Install the LXC User Space Tools...................................... 11 1.3.2 Create a Basic LXC Configuration...................................... 12 1.3.3 Create and Run the LXC Container..................................... 12 1.3.4 Install the QVD Virtual Machine Agent................................... 12 1.3.5 Install and Configure Secure Shell and Serial Access............................ 14 1.3.6 Customize and Brand the Desktop...................................... 14 1.3.7 Tar and Zip the Image............................................ 15 2 Deploying the Image 15 2.1 Create an LXC Disk Image using Docker...................................... 16 2.1.1 Software................................................... 17 2.1.2 Create a custom image from the basicdesktop................................ 17 2.1.3 Create a custom image from the minimal image............................... 17 A Appendix 18 A.1 Resources....................................................... 18 A.2 Logging
    [Show full text]
  • 2. Operating System Case Study: Linux
    ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux 2.2. OperatingOperating SystemSystem CaseCase Study:Study: LinuxLinux 1 ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux Reference z S.M. Sarwar, R. Koretsky and S.A. Sarwar, Linux – The Textbook, Addison Wesley, 1st ed, 2002 2 ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux Features of modern OS z To facilitate easy, efficient, fair, orderly, and secure use of resources – Provide a user interface – Organize files on disk – Allocating resource to different users with security control – Co-ordinate programs to work with devices and other programs 3 ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux Case study: Linux A. Development of Linux 4 ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux z Before Linux – In 80’s, Microsoft’s DOS was the dominated OS for PC – single-user, single-process system – Apple MAC is better, but expensive – UNIX is much better, but much much expensive. Only for minicomputer for commercial applications – People was looking for a UNIX based system, which is cheaper and can run on PC – Both DOS, MAC and UNIX are proprietary, i.e., the source code of their kernel is protected – No modification is possible without paying high 5 license fees ENG224 INFORMATION TECHNOLOGY – Part I 2. Operating System Case Study: Linux z GNU project – Established in 1984 by Richard Stallman, who believes that software should be free from restrictions against copying or modification in order to make better and efficient computer programs – GNU is a recursive acronym for “GNU's Not Unix” – Aim at developing a complete Unix-like operating system which is free for copying and modification – Companies make their money by maintaining and distributing the software, e.g.
    [Show full text]
  • Pardus Göç Rehberi Versiyon 1 TUB˙ITAK ULAKB˙IM
    Pardus Göç Rehberi Versiyon 1 TUB˙ITAK ULAKB˙IM 21 ¸Sub2021 Içindekiler:˙ Kısaltmalar 1 Yönetici Özeti 3 1 Giri¸s 6 1.1 Göç Metodolojisi..........................................7 1.2 Ba¸slangıçve Planlama A¸saması..................................9 1.3 Göç Projelerinde Sıklıkla Kar¸sıla¸sılanSorunlar.......................... 10 2 Analiz ve Kavram Kanıtlama 11 2.1 Analiz................................................ 12 2.2 Kavram Kanıtlama Çalı¸sması.................................... 25 3 Pilot Çalı¸smaları 30 3.1 Kullanıcı farkındalıgı˘ yaratma................................... 30 3.2 Kullanıcı egitimleri˘ ......................................... 30 3.3 Pilot Çalı¸smalarındaBa¸sarıKriterlerinin Belirlenmesi....................... 31 3.4 Pilot A¸saması............................................ 31 4 Kurulum ve Yaygınla¸stırma 36 4.1 Yaygınla¸stırmayaHazırlık ve Planlama.............................. 36 4.2 Istemci˙ Dönü¸sümü......................................... 39 4.3 Uygulama Dönü¸sümü........................................ 40 5 Sunucu Dönü¸sümü 42 5.1 E-Posta Sistemi Dönü¸sümü..................................... 42 5.2 DHCP Hizmeti Dönü¸sümü..................................... 46 5.3 Dosya Sunucusu Hizmeti Dönü¸sümü................................ 48 5.4 Web Sunucusu Hizmeti Dönü¸sümü................................. 52 5.5 Veritabanı Hizmeti Göçü...................................... 53 i 5.6 Dizin Hizmetleri Dönü¸sümü.................................... 59 5.7 Ag˘ ve Sistem Izleme˙ .......................................
    [Show full text]
  • Linux Ylläpito 2012
    Linux-ylläpito, kevät 2014 Jani Jaakkola [email protected] https://www.cs.helsinki.fi/en/courses/582317/2014/k/k/1 Kurssin sisältö ja esittely Linux-ylläpito Luennot 15.1 – 21.2 ke, pe 14-16, Sali CK112 12.3 – 25.4 ke, pe 14-16, Sali D122 Luennoijat: Jani Jaakkola, Mikko Rauhala Esitietovaatimukset Tietokoneen toiminta Tietokantojen perusteet Tietokantasovellus Tietoliikenne I / Tietoliikenteen perusteet Suositeltavia kursseja: C-kielen ohjelmointikurssit, Käyttöjärjestelmät I ja Internet-protokollat Suoritus (max 60 pistettä): Tentti 30 pistettä, Harjoitustyöt x 3 á 10 pistettä Kurssi on erittäin työläs! Jani Jaakkola: Linux-ylläpito, kevät-14 3 Verkossa TKTL:n kurssisivu https://www.cs.helsinki.fi/en/courses/582317/2014/k/k/1 Vuoden 2014 kurssin kotisivu: http://wiki.helsinki.fi/pages/viewpage.action? pageId=127969149 Kurssikalenteri: tulossa Myös julkinen google-kalenteri Kurssin oppimistavoitematriisi http://www.cs.helsinki.fi/courses/582317/matriisi IRC-kanava #hy-linux-yp Aikaisempina vuosina kanava on ollut erittäin aktiivinen ja hyödyllinen Jani Jaakkola: Linux-ylläpito, kevät-14 4 System administrator Marcel Gagné: system administrator ”n. Part magician, part juggler, part technical support analyst, and part bartender/psychoanalyst, the system administrator performs the impossible job of keeping all members of his or her company satisfied by making sure that everything works. This usually includes such things that are completely outside the system administrator’s control, such as telephones, photocopiers, fax machines, heating, air conditioning, and paper shortages in the supply cabinet.” Jani Jaakkola: Linux-ylläpito, kevät-14 5 Yleisesittely ja tavoitteet Kurssilla käsitellään organisaation tietotekniikka- infrastruktuurin kannalta keskeisiä asioita Kurssin sisältö on jaettu kolmeen osaan: työaseman, verkkopalvelimien ja verkkoinfrastruktuurin asentaminen ja konfigurointi Hands on -kurssi Luennoilla ei vain kerrota, vaan myös näytetään Harjoitustöissä asiat tehdään itse Edellisellä kurssilla pystytettiin users.cs.
    [Show full text]
  • Bricscad Command Prefixes
    UPDATED FOR V16 BRICSCAD® FOR AUTOCAD® USERS Ralph Grabowski BRICSYS Payment Information This book is covered by copyright. As the owner of the copyright, upFront.eZine Publishing, Ltd. gives you permission to make one print copy. You may not make any electronic copies, and you may not claim authorship or ownership of the text or figures herein. By Email Acrobat PDF format: $31.40 Allow for a 15MB download. PayPal Check or Money Order To pay by PayPal, send payment to the account We can accept checks from the following of [email protected] at www.paypal.com. regions of the world: • US funds drawn on a bank with address in the USA. PayPal accepts funds in US, Euro, Yen, • Canadian funds drawn on a bank with a Canadian Canadian, and 100+ other currencies. address (includes GST). • British funds drawn on a bank in Great Britain. • Euro funds drawn on a bank located in the EU. Make cheque payable to ‘upFront.eZine Publishing’ Please mail your payment to: “BricsCAD for AutoCAD Users” upFront.eZine Publishing, Ltd. 34486 Donlyn Avenue Abbotsford BC V2S 4W7 Canada Visit the BricsCAD for AutoCAD Users Web site at www.worldcadaccess.com/ebooks. At this Web page, editions of this book are available for BricsCAD V8 through V15. Purchasing an ebook published by upFront.eZine Publishing, Ltd. entitles you to receive the upFront.eZine newsletter weekly. To subscribe to this “The Business of CAD” newsletter separately, send an email to [email protected]. Copyright Information Copyright © 2015 by upFront.eZine Publishing, Ltd. All rights reserved worldwide.
    [Show full text]