The Book of IRC: the Ultimate Guide to Internet Relay Chat

Total Page:16

File Type:pdf, Size:1020Kb

The Book of IRC: the Ultimate Guide to Internet Relay Chat THE BOOK of Alexander Charalabidis It No Starch Press San Francisco THE BOOK OF IRC. Copyright ©2000 By Alexander Charalabidis ir All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in the United States of America 123456789 10—02 01 00 Trademarks Trademarked names are used throughout this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Publisher: William Pollock Project Editor: Karol Jurado Technical Reviewer: M.D. Yesowitch Cover and Interior Design: Derek Yee Design Copyeditor: Gail Nelson Composition: Derek Yee Design Proofreader: John Carroll Indexer: Nancy Humphreys Distributed to the book trade in the United States and Canada by Publishers Group West, 1700 Fourth Street, Berkeley, California 94710, phone: 800-788-3123, fax: 510-528-3444. For information on translations or book distributors outside the United States, please contact No Starch Press directly: No Starch Press 555 De Haro Street, Suite 250, San Francisco, CA 94107-2365 phone: 415-863-9900; fax: 415-863-9950; [email protected]; www.nostarch.com The information in this book is distributed on an "As Is" basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the informa- tion contained in it. Library of Congress Cataloging-in-Pubtication Data Charalabidis, Alexander. The book of IRC / Alexander Charalabidis. p. cm. Includes index. ISBN 1-886411-29-8 1. Internet Relay Chat. I. Title. TK5105.886.C48 1999 005.7'l376-dc21 99-10403 BRIEF CONTENTS Chapter 0 Chapter 7 Instructions for Internet Dummies Channels 1 99 Chapter 1 Chapter 8 IRC? What's That? Communication 11 125 Chapter 2 Chapter 9 Your IRC Survival Kit Finding People on IRC 19 147 Chapter 3 Chapter 10 Windows IRC Clients Creating and Managing a Channel 33 157 Chapter 4 Chapter 11 Unix Clients Enhancing a Client with Scripts 41 187 Chapter 5 Chapter 12 IRCing on the Macintosh IRC Operators 55 201 Chapter 6 Chapter 13 Connecting to a Server CTCP 73 207 J Chapter 14 Appendix A DCC Network and Server Lists 217 307 Chapter 15 Appendix B Server and Network Commands Terminology 227 313 Chapter 16 Appendix C Odds and Ends Countries on IRC and Domain 239 Decoder 321 Chapter 17 Abuse and Security Issues Appendix D 253 Useful Addresses 327 Chapter 18 Installing, Running, and Appendix E Operating an IRC Server Server Numerics 265 331 Chapter 19 Appendix F IRC Robots Sample Server Configurations 289 339 Chapter 20 The Soapbox and More 295 CONTENTS IN DETAIL INSTRUCTIONS FOR INTERNET DUMMIES 0.1 Help! Where's the On Button? 2 0.2 Equipment 2 0.3 Computing and the Internet for Beginners 5 0.4 Internet Service Providers 6 0.4.1 Connecting to the Internet via a PPP Dial-Up 7 0.4.2 Connecting to the Internet via Dial-In 7 0.5 Starting Out on the Internet and Using Basic Services 8 0.5. / Using the World Wide Web 8 0.5.2 Using FTP 9 0.5.3 Using Telnet 9 1 IRC? WHAT'S THAT? 1.1 So... What's It All About? 12 1.2 Origin and History of IRC 13 1.3 Technical Concept 15 1.4 What IRC Has to Offer 16 1.5 IRC for Company Use 17 2 YOUR IRC SURVIVAL KIT 2.1 Saints and Sinners 19 2.2 Safety First 20 2.2.1 Trojan Horses 20 2.2.2 Nukes 22 2.2.3 Insert Card to Continue 22 2.3 The Virtual Tourist's Guide to IRC Networks 23 2.3. / Formation of IRC Networks 23 2.3.2 Bright Lights, Big City 25 2.3.3 Small-Town World 25 2.3.4 Foreign Exchange 26 \ 2.3.5 All Things Special 26 2.4 Somebody Asked Me to Meet Him ... Where? 27 2.5 IRC Clients and Servers 27 2.5. / Differences among Clients 28 2.5.2 Differences among Servers 29 2.5.3 Client Commands versus Server Commands . 29 2.6 Software Licensing 30 2.7 Basic Commands 31 WINDOWS IRC CLIENTS 3.1 mIRC 33 3.1.1 Setup and Use 34 3.2 Pirch 36 3.2.1 - Setup and Use . 37 3.3 Visual IRC 37 3.3. J Setup and Use 38 3.4 Other Windows Clients 39 4 UNIX CLIENTS 4.1 Getting a Client 42 4.2 ircll 43 4.3 sire 44 4.4 BitchX 44 4.5 Installation of ircll and Related Clients 45 4.5.1 tar, gzip, and Feather 45 4.5.2 Configuring ircll 48 4.5.3 Compile 50 4.5.4 Binaries 50 4.5.5 Setting the Environment 51 4.5.6 The .ircrc File 53 5 IRCING ON THE MACINTOSH 5.1 Mac Users Do IRC with Style 55 5.1.1 General Downloading Instructions 56 5.1.2 ' Choosing the Right Client 57 5.2 Ircle 58 5.2.1 Setup and Use 60 5.3 ShadowlRC 61 5.3.7 Setup and Use 63 5.4 Snak 64 5.4.1 Setup and Use 66 5.5 MaclRC 66 5.5. / Setup and Use 67 5.6 ChatNet 68 5.6.1 Setup and Use 70 5.7 Summary 71 6 CONNECTING TO A SERVER 6.1 Selecting a Network and Server, and Connecting 74 6.1.1 Internet Addressing 75 6.1.2 /re// 76 6.1.3 Graphical Clients and mIRC 76 6.2 Things That Can Go Wrong 78 6.2.1 K-lined, or You Are Not Welcome ... 78 6.2.2 Ping Timeout 79 6.2.3 No More Connections/Server Full 80 6.2.4 Connection Refused 80 6.2.5 Unable to Resolve Server Name 81 6.2.6 Illegal Nickname 82 6.2.7 Nickname or Channel Temporarily Unavailable 82 6.2.8 Ending Up on a Different Server 82 6.2.9 No Authorization 83 6.2.10 Ident Required/Install Identd/Bad Username 83 6.3 Welcome to the Internet Relay 85 6.3.1 The Message of the Day 86 6.3.2 Your Identity on IRC ,.. 87 6.3.3 Nickname Registration and Ownership 88 6.3.4 The Realname Field 88 6.4 User Modes (Umodes) 89 6.4.1 Umode i 89 6.4.2 Umode w 90 6.4.3 Umode s 90 6.4.4 Umode o 90 6.4.5 Umode d 90 6.4.6 Umode r 90 6.4.7 Other Umodes 91 6.5 Changing Servers: The SERVER Command 91 6.6 Disconnecting from a Server 92 6.6.1 Nickname Collisions 93 6.6.2 Operator Kill 94 6.6.3 Server Downtime 94 6.6.4 Ping Timeout 95 6.6.5 Connection Reset by Peer 95 6.6.6 Excess Flood 95 6.6.7 Kill Line Active 96 6.6.8 Other Types of Connection 96 CHANNELS 7.1 Obtaining a List of Available Channels 101 7.7.7 Disconnecting When Using LIST 103 7.1.2 Strange Channel Names 104 7.1.3 Argh! The List Keeps Scrolling Off and I Miss Most of It 104 7.1.4 I Give Up—Nothing Is Working 105 7.2 Selecting a Channel from the List and Finding the Right Channel 105 7.3 joining a Channel 106 7.3.1 No Such Channel 108 7.3.2 How Did I End Up on Channel #? 108 7.3.3 Banned from Channel 108 7.3.4 Bad Channel Key 109 7.3.5 Channel Is Full 110 7.3.6 Kick or Ban after Joining 110 7.3.7 I Joined a Channel on the List and It's Empty! 110 7.3.8 Nickname or Channel is Currently Unavailable 111 7.3.9 Invite-Only 111 7.4 Who Is on the Channel? 112 7.5 Channel Operators 113 7.5.1 Channel Bots 114 7.6 Moderated Channels and Woice 116 7.7 Channel Events 116 7.7.7 Mode Changes 117 7.7.2 Joins, Parts, and Quits 117 7.7.3 Nick Changes 118 7.7.4 Kicks 118 7.8 Leaving a Channel 118 7.9 Joining Multiple Channels 119 7.9.1 Switching between Multiple Channels 119 7.10 Channel 0 120 7.10.1 The Channel #2,000 Trick 120 7.11 Netsplits and Lag 121 7.11.1 Netsplits 121 7.11.2 Server-Server Lag 123 7.11.3 Client-Server Lag 124 8 COMMUNICATION 8.1 Types of Messages You May Receive 126 8.1.1 Public Messages on a Channel 126 8.1.2 Private Messages 126 8.1.3 Notices 127 8.1.4 CTCP Requests 127 8.1.5 DCC Requests 128 8.1.6 Wallops 128 8.1.7 Operator Notices 129 8.1.8 Local Machine Messages and Talk Requests 130 8.1.9 Actions , 131 8.1.10 Server Notices 131 8.1.11 I Joined a Channel and Nothing's Happening/ 131 8.2 Etiquette 132 8.3 Ignoring Messages 133 8.3.1 Ignoring with ircll 133 8.3.2 Ignoring with mIRC 134 8.3.3 The SILENCE Command 135 8.4 Sending to a Channel 135 8.4.1 Sending to a Channel While Not on It 136 8.4.2 Communicating with Multiple Channels 136 8.5 Sending Private Messages 137 8.5.
Recommended publications
  • Lithium Hosting, Llc
    Lithium Hosting, llc Acceptable Use Policy This Acceptable Use Policy ("AUP") governs your use of the Services and is incorporated by reference into Lithium Hosting, llc's Customer Master Agreement / Terms of Service. Unless otherwise stated, defined terms in this AUP have the meanings provided in the Terms of Service. Lithium Hosting, llc may modify this document at any time without notice. This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of Lithium Hosting, llc ("Company") governing the use by the Customer ("Customer") of the Company's products and services ("Products and Services"). The Purpose of the Lithium Hosting, llc Acceptable Use Policy, hereinafter referred to as the AUP, is to comply with all federal, state, and local laws coupled with protecting the network security, network availability, physical security, Customer privacy, and other factors affecting the services provided by Lithium Hosting, llc. Lithium Hosting, llc reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers and such rules and regulations are subject to change. Such rules and regulations are located on the Internet at https://lithiumhosting.com/acceptable-use-policy. The AUP is not an all inclusive exhaustive list and Lithium Hosting, llc reserves the right to modify the AUPs at any time as needed, effective upon either the posting of the modified AUPs to https://lithiumhosting.com/acceptable-use-policy or notification to the Customer via their client portal. Acceptance and execution of the Customer Master Agreement / Terms of Service binds all parties to Lithium Hosting, llc stated AUP at the time the contract is executed and as modified from time to time.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Machine Learning and Cybersecurity: Studying Network Behaviour to Detect Anomalies
    Machine Learning and Cybersecurity: Studying network behaviour to detect anomalies Jiawen Chen July 25, 2018 MSc in High Performance Computing with Data Science The University of Edinburgh Year of Presentation: 2018 Abstract Cybersecurity is an indispensable part of the Internet nowadays as almost everything can be connected by Internet. Individual privacy and property will face great danger if they are attacked by malware. This project aims to use the machine learning knowledge to build a classifier that can detect malware behaviour and avoid further damage to the network and its entity. The dataset used in this project is the CTU-13 dataset[1], which is NetFlow traffic from the normal, malware infected and background hosts. The classifier is built with the labelled normal and infected NetFlow, then applied to the unlabelled background NetFlow. This project follows the O’Neil & Schutt data science process[7] to process the data. The data is cleaned and processed, then aggregate based on time window to create a new dataset with the extracted features. This new dataset is the inputs of the following machine learning classification model: logistic regression, decision tree and random forest. Random forest model with an optimal threshold turns out to be the best model with an accuracy of 0.946 on the test dataset. Further application with this model is also implemented to the background traffic to detect potential malware. Keywords: Cybersecurity, NetFlow, Data science, Machine learning, Model building Contents Chapter 1 Introduction .......................................................................................................
    [Show full text]
  • Procurve Network Access Controller 800
    ProCurve Network Access Controller 800 The ProCurve Network Access Controller (NAC) 800 combines a RADIUS- based authentication server and the ability to validate the integrity of the systems connecting to the network, allowing network administrators to secure the network from unauthorized users and systems that pose a threat to the network resources. ProCurve Network Access Controller 800 (J9065A) ProCurve Network Access Controller 800 Features and benefits Resiliency and high availability Management • Enforcement server resiliency and redundancy: enable high network availability • Centralized endpoint policy management: for mission-critical LAN deployments; endpoint testing policies are centrally enforcement servers continue to provide managed by a single management server and authentication and endpoint testing services in shared by up to ten enforcement servers the absence of a management server and can be configured in clusters to provide • Administration console: a Web-based console redundancy and load-balancing for endpoint provides an easy-to-use interface for testing configuring endpoint policies and enforcement clusters as well as a dashboard-style interface Security for viewing the status of endpoint integrity testing • Built-in RADIUS server: can perform authentication services or act as a proxy server • Default testing policies: default testing for a remote RADIUS authentication service policies provide a great starting point for endpoint testing and can be easily utilized as • Supports standard-based or a local the basis
    [Show full text]
  • The Complete Solutions Guide for Every Linux/Windows System Administrator!
    Integrating Linux and Windows Integrating Linux and Windows By Mike McCune Publisher : Prentice Hall PTR Pub Date : December 19, 2000 ISBN : 0-13-030670-3 • Pages : 416 The complete solutions guide for every Linux/Windows system administrator! This complete Linux/Windows integration guide offers detailed coverage of dual- boot issues, data compatibility, and networking. It also handles topics such as implementing Samba file/print services for Windows workstations and providing cross-platform database access. Running Linux and Windows in the same environment? Here's the comprehensive, up-to-the-minute solutions guide you've been searching for! In Integrating Linux and Windows, top consultant Mike McCune brings together hundreds of solutions for the problems that Linux/Windows system administrators encounter most often. McCune focuses on the critical interoperability issues real businesses face: networking, program/data compatibility, dual-boot systems, and more. You'll discover exactly how to: Use Samba and Linux to deliver high-performance, low-cost file and print services to Windows workstations Compare and implement the best Linux/Windows connectivity techniques: NFS, FTP, remote commands, secure shell, telnet, and more Provide reliable data exchange between Microsoft Office and StarOffice for Linux Provide high-performance cross-platform database access via ODBC Make the most of platform-independent, browser-based applications Manage Linux and Windows on the same workstation: boot managers, partitioning, compressed drives, file systems, and more. For anyone running both Linux and Windows, McCune delivers honest and objective explanations of all your integration options, plus realistic, proven solutions you won't find anywhere else. Integrating Linux and Windows will help you keep your users happy, your costs under control, and your sanity intact! 1 Integrating Linux and Windows 2 Integrating Linux and Windows Library of Congress Cataloging-in-Publication Data McCune, Mike.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • DVD-Ofimática 2014-07
    (continuación 2) Calizo 0.2.5 - CamStudio 2.7.316 - CamStudio Codec 1.5 - CDex 1.70 - CDisplayEx 1.9.09 - cdrTools FrontEnd 1.5.2 - Classic Shell 3.6.8 - Clavier+ 10.6.7 - Clementine 1.2.1 - Cobian Backup 8.4.0.202 - Comical 0.8 - ComiX 0.2.1.24 - CoolReader 3.0.56.42 - CubicExplorer 0.95.1 - Daphne 2.03 - Data Crow 3.12.5 - DejaVu Fonts 2.34 - DeltaCopy 1.4 - DVD-Ofimática Deluge 1.3.6 - DeSmuME 0.9.10 - Dia 0.97.2.2 - Diashapes 0.2.2 - digiKam 4.1.0 - Disk Imager 1.4 - DiskCryptor 1.1.836 - Ditto 3.19.24.0 - DjVuLibre 3.5.25.4 - DocFetcher 1.1.11 - DoISO 2.0.0.6 - DOSBox 0.74 - DosZip Commander 3.21 - Double Commander 0.5.10 beta - DrawPile 2014-07 0.9.1 - DVD Flick 1.3.0.7 - DVDStyler 2.7.2 - Eagle Mode 0.85.0 - EasyTAG 2.2.3 - Ekiga 4.0.1 2013.08.20 - Electric Sheep 2.7.b35 - eLibrary 2.5.13 - emesene 2.12.9 2012.09.13 - eMule 0.50.a - Eraser 6.0.10 - eSpeak 1.48.04 - Eudora OSE 1.0 - eViacam 1.7.2 - Exodus 0.10.0.0 - Explore2fs 1.08 beta9 - Ext2Fsd 0.52 - FBReader 0.12.10 - ffDiaporama 2.1 - FileBot 4.1 - FileVerifier++ 0.6.3 DVD-Ofimática es una recopilación de programas libres para Windows - FileZilla 3.8.1 - Firefox 30.0 - FLAC 1.2.1.b - FocusWriter 1.5.1 - Folder Size 2.6 - fre:ac 1.0.21.a dirigidos a la ofimática en general (ofimática, sonido, gráficos y vídeo, - Free Download Manager 3.9.4.1472 - Free Manga Downloader 0.8.2.325 - Free1x2 0.70.2 - Internet y utilidades).
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • DVD-Libre 2007-12 DVD-Libre Diciembre De 2007 De Diciembre
    (continuación) Java Runtime Environment 6 update 3 - Java Software Development Kit 6 update 3 - JClic 0.1.2.2 - jEdit 4.2 - JkDefrag 3.32 - jMemorize 1.2.3 - Joomla! 1.0.13 - Juice Receiver 2.2 - K-Meleon 1.1.3 - Kana no quiz 1.9 - KDiff3 0.9.92 - KeePass 1.04 Catalán - KeePass 1.09 - KeePass 1.09 Castellano - KeyJnote 0.10.1 - KeyNote 1.6.5 - Kicad 2007.07.09 - Kitsune 2.0 - Kompozer 0.7.10 - Kompozer 0.7.10 Castellano - KVIrc 3.2.0 - Launchy 1.25 - Lazarus 0.9.24 - LenMus 3.6 - Liberation Fonts 2007.08.03 - lightTPD 1.4.18-1 - Lilypond 2.10.33-1 - Linux DVD-Libre Libertine 2.6.9 - LockNote 1.0.4 - Logisim 2.1.6 - LPSolve IDE 5.5.0.5 - Lynx 2.8.6 rel2 - LyX 1.5.2-1 - LyX 1.5.2-1 cdlibre.org Bundle - Macanova 5.05 R3 - MALTED 2.5 - Mambo 4.6.2 - Maxima 5.13.0 - MD5summer 1.2.0.05 - Media Player Classic 6.4.9.0 Windows 9X / Windows XP - MediaCoder 0.6.0.3996 - MediaInfo 0.7.5.6 - MediaPortal 0.2.3.0 - 2007-12 MediaWiki 1.11.0 - Memorize Words Flashcard System 2.1.1.0 - Mercurial 0.9.5 - Minimum Profit 5.0.0 - Miranda IM 0.7.3 Windows 9X / Windows XP - Miro 1.0 - Mixere 1.1.00 - Mixxx 1.5.0.1 - mod_python 3.3.1 (py 2.4 - ap 2.0 / py 2.4 - ap 2.2 / py 2.5 - ap 2.0 / py 2.5 - ap 2.2) - Mono 1.2.4 - MonoCalendar 0.7.2 - monotone 0.38 - Moodle DVD-Libre es una recopilación de programas libres para Windows.
    [Show full text]
  • DVD-Ofimática 2014-03
    (continuación 2) CamStudio 2.7.316 - CamStudio Codec 1.5 - CDex 1.70 beta 4 - CDisplayEx 1.9.09 - cdrTools FrontEnd 1.5.2 - Classic Shell 3.6.8 - Clavier+ 10.6.7 - Clementine 1.2.1 - Cobian Backup 8.4.0.202 - Comical 0.8 - ComiX 0.2.1.24 - CoolReader 3.0.56.42 - CubicExplorer 0.95.1 - Daphne 1.55 - Data Crow 3.12.5 - DejaVu Fonts 2.34 - DVD-Ofimática Deluge 1.3.6 - DeSmuME 0.9.10 - Dia 0.97.2.2 - Diashapes 0.2.2 - digiKam 3.4.0 - Disk Imager 1.4 - DiskCryptor 1.0.802.118 - Ditto 3.18.46.0 - DjVuLibre 3.5.25.4 - DocFetcher 1.1.10 - DoISO 2.0.0.6 - DOSBox 0.74 - DosZip Commander 3.21 - Double Commander 2014-03 0.5.8 beta - DrawPile 0.8.0 - DrawPile 0.8.5 actualización - DVD Flick 1.3.0.7 - DVDStyler 2.7 - DVDx 4.1.1.1 - Eagle Mode 0.84.0 - EasyTAG 2.1.10 - Ekiga 4.0.1 2013.08.20 - Electric Sheep 2.7.b35 - eLibrary 2.5.13 - emesene 2.12.9 2012.09.13 - eMule 0.50.a - Eraser 6.0.10 DVD-Ofimática es una recopilación de programas libres para Windows - eSpeak 1.48.02 - Eudora OSE 1.0 - eViacam 1.7.0 - Evince 2.32.0.145 - Exodus 0.10.0.0 - dirigidos a la ofimática en general (ofimática, sonido, gráficos y vídeo, Explore2fs 1.08 beta9 - Ext2Fsd 0.51 - FBReader 0.12.10 - FileBot 3.8 - FileVerifier++ 0.6.3 - Internet y utilidades).
    [Show full text]
  • Software Social Y Software Libre
    ¿Donde está TUX...? Software Social y Software Libre David Fernández Vaamonde <david_fv[en]gpul[punto]org> Guión ● Introducción ¿Qué es el software social? ● El software social más vetusto ● El milagro del jabber ● Sobre la tela de la araña ● Modelos de negocio ● Dándole a la tecla ● Conclusiones ¿Qué es el software social? Software que permite interactuar entre las personas de manera que se puedan establecer relaciones entre ellas. ● Para conocerse ● Para tratar temas comunes ● Para trabajar ● Para comunicarse ¿Qué es el software social? (II) ● Internet pone el “medio de transporte”, el software social modela la forma de interacción. ● Su auge aumenta con el auge de Internet – Si no hay gente, no se puede interaccionar – Comunicación barata – Internet como “commodity” accesible ● Tres tipos de interacción: – En tiempo real: IRC, Jabber – En tiempo “semi-real”: E-mail – En tiempo “diferido”: Weblogs, Wikis... (CMSs) ¿Qué es el software social? (IV) ● El software social sirve básicamente para: – La comunicación: ● Permite la deslocalización ● Permite la comunicación instantánea – La difusión de información: ● Todo el mundo puede ver la información ● Cualquiera puede opinar y expresarse ● Se ocupan “zonas” ocupadas antes por otros colectivos (por ejemplo, periodistas) ● La red actúa de “almacén” de información, los buscadores de índices ¿Qué es el software social? (V) El software social es dinámico, aporta novedades: ● ¡Uno nunca se cansa de él! ● Caen los sistemas estáticos (web clásico) por sistemas dinámicos (blogs, etc...) ● Se centran
    [Show full text]
  • Ubuntu 11.04 Niebiańska Nimfa
    Ubuntu 11.04 Niebiańska Nimfa Przewodnik Ubuntu 11.04 Niebiańska Nimfa - Przewodnik Spis treści 1. Wprowadzenie ............................................................................................................................4 1.1 Co właściwie umieszczone jest w tym przewodniku? ..................................................4 1.2 Filozofia Ubuntu ...............................................................................................................4 1.3 Dlaczego warto zmienić system na Ubuntu? ................................................................4 2. Rozpoczynamy przygodę! .......................................................................................................5 2.1 Wypróbuj Ubuntu .............................................................................................................5 2.2 Instalacja systemu ............................................................................................................6 2.2.1 Minimalne wymagania .............................................................................................6 2.2.2 Zalecane wymagania ................................................................................................6 2.2.3 Rozpoczęcie instalacji ..............................................................................................6 2.2.4 Wybór języka .............................................................................................................7 2.2.5 Informacje wstępne .................................................................................................7
    [Show full text]