CS/IT423 Hall Ticket Number

Total Page:16

File Type:pdf, Size:1020Kb

CS/IT423 Hall Ticket Number CS/IT423 Hall Ticket Number: IV/IV B.Tech (Regular) DEGREE EXAMINATION MARCH, 2017 Computer Science & Engineering Eighth Semester Cyber Security-II Time: Three Hours Maximum : 60 Marks Answer Question No.1 compulsorily. (1X12 = 12 Marks) Answer ONE question from each unit. (4X12=48 Marks) 1. Answer all questions (1X12=12 Marks) a What is metasploit Frame work? b Purpose of Information Gathering. c Types of password attacks? d Need for firewall? e Differentiate Virus & Worms? f Define Email-Spam? g Give some Examples of incidents? h What is the Command used for displaying current running processes in UNIX-based systems? i What is the use of FTK imager? j List out Types of Location based Data Backups? k What is 3-2-1 rule? l Define Log management? UNIT – I 2.a How to scan live hosts, active ports, types of Operating Systems with Zen map. 6 M 2.b What is Veil-evasion? Explain the procedure for how to bypass windows Anti-virus 6M with veil- evasion? (OR) 3.a Discuss the Procedure for how to hack the target system by using pass the hash 8M method. Write the purpose for key scan? 3.b Write short notes on Online password attacks with some examples. 4M UNIT – II 4.a State the purpose of snort tool? Explain Installation procedure for snort and parts of 8M rule? Write the rule for alerting incoming ping requests from any source to any destination IP Addresses and Ports? 4.b Differentiate ClamAv and Clamtk and write the commands for identifying & 4M removing virus files by using ClamAv? (OR) 5.a What is web application security? Explain Different types of web application attacks. 8M Write the procedure for detecting SQL injection attack by using mod-security tool? 5.b Explain the installation & Configuration procedure for mail scanner? 4 M UNIT – III 6.a Discuss IR Methodologies based on Procedures. 6M 6.b How to investigate the Unix based systems based on the Artifacts. 6M (OR) 7.a Why we need FTK imager? Explain the procedure for how to create the disk image 6M and recovering the permanent deleted files/images by using FTK imager. 7.b What is incident and incident Response? Explain the needs and goals of IR 6 M UNIT – IV 8.a What are the different types of storage devices? Give advantages and disadvantages? 6 M 8.b What is the need of rsync tool? Explain the options of rsync tool. Write the 6M commands for copying files to local systems and remote systems. (OR) 9.a What is Log.? Explain the uses of Logs and types of Logs? How to install and 6M configure Log watch Tool in to system? 9.b Explain about Log management Infrastructure Tiers and functionalities of Log 6M management Infrastructure. 1.Answer the following a. what is metasploit frame work? Metasploit is a frame and platform for vulnerability testing and exploitation. b. Purpose of information gathering? Information gathering is defined as gathering the details of system like ports, services, subdomains, domains and live systems. These details are used to hack the system. c. Types of password attacks? Passive online attacks Active online attacks Offline attack Nontechnical attacks d. need for fire wall? Firewall act as security for the system. When system is connected to network there is a chance for hackers to hack system. So fire wall prevent them by acting as security. e. differntiate virus and worms? Virus Virus does not have self-replicating capability Worms Worms have self-replicating capability f. Define email-spam? Email-spam is defined as electronic version of junk mail. g. Give some examples of incidents? User infected by downloading and running a malicious email attachment. A gateway router forwarding all network traffic to an attacker. A web server is crashed due to vast amount of incoming connections from compromised clients. h. what is command used for displaying current running process in unix-based system. Ps-elf is the command i. what is the use of FTK imager? Used for copying bit by bit data of the driver Used to retrieve deleted files Used for analysing the files in case of any modification based on the encrypted value. j. list out types of location data backups? Local Remote Online Offsite Cloud ftp k. what is 3-2-1 rule? 3- one primary and two backups 2- two types of media (hard drive and optical media) 1- one offsite storage l. Define log management? Log management is defined as collecting, aggregating and analysing the network data for a variety of purposes. Unit 1 2.a. How to scan live hosts, active ports, types of operating system with zenmap. Topology tab The “Topology” tab is an interactive view of the connections between hosts in a network. Hosts are arranged in concentric rings. Each ring represents an additional network hop from the center node. Clicking on a node brings it to the center. Because it shows a representation of the network paths between hosts, the “Topology” tab benefits from the use of the --traceroute option. Port/hosts tab The “Ports / Hosts” tab's display differs depending on whether a host or a service is currently selected. When a host is selected, it shows all the interesting ports on that host, along with version information when available Nmap output tab The “Nmap Output” tab is displayed by default when a scan is run. It shows the familiar Nmap terminal output. The display highlights parts of the output according to their meaning The “Host Details” tab Each host has an icon that provides a very rough “vulnerability” estimate, which is based solely on the number of open ports. The icons and the numbers of open ports they correspond to are 0–2 open ports, 3–4 open ports, 5–6 open ports, 7–8 open ports, and 9 or more open ports. OS icons FreeBSD Irix Linux Mac OS OpenBSD Red Hat Linux Solaris or OpenSolaris Ubuntu Linux Windows Other (no specific icon) OS detection not performed Scan Results Tabs Each scan window contains five tabs which each display different aspects of the scan results. They are: “Nmap Output”, “Ports / Hosts”, “Topology”, “Host Details”, and “Scans”. Scan specification Zenmap is packaged with default profiles Intense scan command = nmap -T4 -A -v An intense, comprehensive scan. The -A option enables OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute). Without root privileges only version detection and script scanning are run. This is considered an intrusive scan. Intense scan plus UDP command = nmap -sS -sU -T4 -A -v Does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) in addition to scanning TCP and UDP ports. Intense scan, all TCP ports command = nmap -p 1-65535 -T4 -A -v Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute). Intense scan, no ping command = nmap -T4 -A -v -Pn Does an intense scan without checking to see if targets are up first. This can be useful when a target seems to ignore the usual host discovery probes. Ping scan command = nmap -sn This scan only finds which targets are up and does not port scan them. Quick scan command = nmap -T4 -F This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports. Quick scan plus command = nmap -sV -T4 -O -F --version-light A quick scan plus OS and version detection. Slow comprehensive scan command = nmap -sS -sU -T4 -A -v -PE -PS80,443 -PA3389 -PP -PU40125 -PY -- source-port 53 --script all This is a comprehensive, slow scan. Every TCP and UDP port is scanned. OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) are all enabled. Many probes are sent for host discovery. This is a highly intensive scan. 2.b. What is veil evasion ? explain the procedure for how to bypass windows anti virus with vail evasion. Veil-evasion The antivirus and the fire walls are generally used for security purpose. But the truth is that we can bypass the antivirus and the fire wall by using the veil a remote shell payload generator that can bypass many current anti-virus programs. Many antivirus programs work by pattern or signature matching. If a program looks like malware that it has been programed to look for, it catches it. If the malicious file has a signature that AV has not seen before, many will dutifully say that the file is clean and not a threat. Veil , a new payload generator created by security expert and Blackhat USA class instructor chris truncer, does just that .It takes a standard metasploit payload and through a metasploit like program allows you to create multiple payloads that most likely will bypass anti-virus. Veil can be installed into the system by using the following command “install apt-get veil-evasion” The steps that are involved in the bypassing the anti virus or the firewall using the veil- evasion. i. install apt-get veil-evasion ii. Open terminal start veil-evasion iii. Picking the payload using ‘use’ command, ‘powershell/meterpreter/rev_tcp ‘ payload is used. iv. Set the lhost value using ‘set lhost #ipaddress’ command. v. Generate payload using ‘generate’ command. vi. Give name for the payload . vii. Go to path var/lib/veil-evasion/output/source copy the file to the target system, click on the file. How to bypass antivirus firewall using veil-evasion. a) Tools required ➢ VMware Workstation Pro 12.1.1 ➢ kali-linux-2016.2-amd64 ➢ windows (os with any version) b) Steps Step1: Open terminal start veil-evasion Step2: Picking the payload using ‘use’ command, ‘powershell/meterpreter/rev_tcp ‘ payload is used.
Recommended publications
  • Android Euskaraz Windows Euskaraz Android Erderaz Windows Erderaz GNU/LINUX Sistema Eragilea Euskeraz Ubuntu Euskaraz We
    Oharra: Android euskaraz Windows euskaraz Android erderaz Windows erderaz GNU/LINUX Sistema Eragilea euskeraz Ubuntu euskaraz Web euskaraz Ubuntu erderaz Web erderaz GNU/LINUX Sistema Eragilea erderaz APLIKAZIOA Bulegotika Adimen-mapak 1 c maps tools 2 free mind 3 mindmeister free 4 mindomo 5 plan 6 xmind Aurkezpenak 7 google slides 8 pow toon 9 prezi 10 sway Bulegotika-aplikazioak 11 andropen office 12 google docs 13 google drawing 14 google forms 15 google sheets 16 libreoffice 17 lyx 18 office online 19 office 2003 LIP 20 office 2007 LIP 21 office 2010 LIP 22 office 2013 LIP 23 office 2016 LIP 24 officesuite 25 wps office 26 writer plus 1/20 Harrobi Plaza, 4 Bilbo 48003 CAD 27 draftsight 28 librecad 29 qcad 30 sweet home 31 timkercad Datu-baseak 32 appserv 33 dbdesigner 34 emma 35 firebird 36 grubba 37 kexi 38 mysql server 39 mysql workbench 40 postgresql 41 tora Diagramak 42 dia 43 smartdraw Galdetegiak 44 kahoot Maketazioa 45 scribus PDF editoreak 46 master pdf editor 47 pdfedit pdf escape 48 xournal PDF irakurgailuak 49 adobe reader 50 evince 51 foxit reader 52 sumatraPDF 2/20 Harrobi Plaza, 4 Bilbo 48003 Hezkuntza Aditzak lantzeko 53 aditzariketak.wordpress 54 aditz laguntzailea 55 aditzak 56 aditzak.com 57 aditzapp 58 adizkitegia 59 deklinabidea 60 euskaljakintza 61 euskera! 62 hitano 63 ikusi eta ikasi 64 ikusi eta ikasi bi! Apunteak partekatu 65 flashcard machine 66 goconqr 67 quizlet 68 rincon del vago Diktaketak 69 dictation Entziklopediak 70 auñamendi eusko entziklopedia 71 elhuyar zth hiztegi entziklopedikoa 72 harluxet 73 lur entziklopedia tematikoa 74 lur hiztegi entziklopedikoa 75 wikipedia Esamoldeak 76 AEK euskara praktikoa 77 esamoldeapp 78 Ikapp-zaharrak berri Estatistikak 79 pspp 80 r 3/20 Harrobi Plaza, 4 Bilbo 48003 Euskara azterketak 81 ega app 82 egabai 83 euskal jakintza 84 euskara ikasiz 1.
    [Show full text]
  • Antivirus Software Before It Can Detect Them
    Computer virus A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[1][2] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
    [Show full text]
  • Linux Security Review 2015
    Linux Security Review 2015 www.av-comparatives.org AV-Comparatives Linux Security Review Language: English May 2015 Last revision: 26 th May 2015 www.av-comparatives.org -1- Linux Security Review 2015 www.av-comparatives.org Contents Introduction ....................................................................................................................... 3 Reviewed products ............................................................................................................... 4 Malware for Linux systems ..................................................................................................... 5 Linux security advice ............................................................................................................ 6 Items covered in the review .................................................................................................. 7 Avast File Server Security ...................................................................................................... 8 AVG Free Edition for Linux.................................................................................................... 11 Bitdefender Antivirus Scanner for Unices ................................................................................ 13 Clam Antivirus for Linux ....................................................................................................... 17 Comodo Antivirus for Linux .................................................................................................. 20 Dr.Web Anti-virus for
    [Show full text]
  • Technical Report RHUL–ISG–2021–3 10 March 2021
    Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers Giuseppe Raffa Technical Report RHUL–ISG–2021–3 10 March 2021 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom Student Number: 100907703 Giuseppe Raffa Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers Supervisor: Daniele Sgandurra Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Giuseppe Raffa Date: 24th August 2020 Table of Contents 1 Introduction.....................................................................................................................7 1.1 Motivation.......................................................................................................................................7 1.2 Objectives........................................................................................................................................8 1.3 Methodology...................................................................................................................................8
    [Show full text]
  • SAFETY GUIDE for JOURNALISTS a Handbook for Reporters in High-Risk Environments
    SAFETY GUIDE FOR JOURNALISTS A handbook for reporters in high-risk environments United Nations Educational, Scientific and Cultural Organization REPORTERS WITHOUT BORDERS 1 REPORTERS WITHOUT BORDERS 1 SAFETY GUIDE FOR JOURNALISTS A handbook for reporters in high-risk environments United Nations Educational, Scientific and Cultural Organization CONTENTS PREFACE...........................................................................................................................................4 INTRODUCTION: RSF and the protection of journalists...........................10 CHAPTER 1: The growing risks for journalists................................................13 CHAPTER 2: Planning and preparation..................................................................15 1. Local knowledge and risk assessment..................................................15 2. Health precautions.................................................................................................18 3. First aid and hostile environment training...........................................20 4. Finances, formalities, family: set off with peace of mind.......21 5. Preparing your kitbag: checklists...............................................................23 CHAPTER 3: Keeping safe on assignment........................................................30 1. Accommodation, travel and communications..................................30 2. Safety precautions in war zones.................................................................36 3. Mines and cluster munitions..........................................................................45
    [Show full text]
  • Clam Antivirus 0.88.2 User Manual Contents 1
    Clam AntiVirus 0.88.2 User Manual Contents 1 Contents 1 Introduction 6 1.1 Features.................................. 6 1.2 Mailinglists................................ 7 1.3 Virussubmitting.............................. 7 2 Base package 7 2.1 Supportedplatforms............................ 7 2.2 Binarypackages.............................. 8 2.3 Dailybuiltsnapshots ........................... 10 3 Installation 11 3.1 Requirements ............................... 11 3.2 Installingonashellaccount . 11 3.3 Addingnewsystemuserandgroup. 12 3.4 Compilationofbasepackage . 12 3.5 Compilationwithclamav-milterenabled . .... 12 4 Configuration 13 4.1 clamd ................................... 13 4.1.1 On-accessscanning. 13 4.2 clamav-milter ............................... 14 4.3 Testing................................... 14 4.4 Settingupauto-updating . 15 4.5 Closestmirrors .............................. 16 5 Usage 16 5.1 Clamdaemon ............................... 16 5.2 Clamdscan ................................ 17 5.3 Clamuko.................................. 17 5.4 Outputformat............................... 18 5.4.1 clamscan ............................. 18 5.4.2 clamd............................... 19 6 LibClamAV 20 6.1 Licence .................................. 20 6.2 Features.................................. 20 6.2.1 Archivesandcompressedfiles . 20 6.2.2 Mailfiles ............................. 21 Contents 2 6.3 API .................................... 21 6.3.1 Headerfile ............................ 21 6.3.2 Databaseloading . .. .. .. .. .. .
    [Show full text]
  • Hostscan 4.9.06037 Antimalware and Firewall Support Charts
    HostScan 4.9.06037 Antimalware and Firewall Support Charts 2/5/2021 © 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 92 [Type here] Contents HostScan Version 4.9.06037 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1634.0 for Windows .............................................. 50 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1634.0 for Windows ...................................................... 50 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1501.0 for macOS………………………….…..……80 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1501.0 for macOS…………….…….……………..………90 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1333.0 for Linux…………….……..…..…….………94 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1333.0 for Linux…………………………………..……….96 ©2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 92 [Type here] HostScan Version 4.9.06037 Antimalware and Firewall Support Charts The VPN Posture (HostScan) module provides the AnyConnect
    [Show full text]
  • License Information GNU General Public License
    ################################################################# ################################################################# ####### ####### ####### Open Icon Library ####### ####### License File ####### ####### ####### ################################################################# ################################################################# Table of Contents: * Description * Sources * Licenses * File List * Icons from Wikicommons * Icons under Creative Commons licenses * Icons under GPL and LGPL licenses * Icons under Public Domain * Icons under MIT license * Icons under BSD license * Icons from app-install-data ################################################################# ## Description: The Open Icon Library contains icons from various sources. This file list the license and source of each file in this package. In the rare occasion where there is two files with the same name, you will have to check the developers package. If you wish to use these icons in your project, include this file in your projects documentation. ################################################################# ## Sources: AEM Pictorial Database (aem) link: http://www.aem.org/Technical/PictorialDatabase/index.asp license: PD license link: http://en.wikipedia.org/wiki/Public_domain format: eps -> svg, png subdirectory: open_icon_library-devel/icons/aem app-install-data (app-install) link: http://packages.debian.org/lenny/app-install-data licenses: Various, see docs/AUTHORS_app-install license link: see docs/AUTHORS_app-install format: xpm, svg,
    [Show full text]
  • Antivirus Para Armar… O Más Bien, Hágalo Usted Mismo
    Antivirus para armar… o más bien, hágalo usted mismo M.Sc. Alberto García Fumero FLISOL 2014 Ciudad de La Habana ClamAV (Clam antivirus) El proyecto ClamAV Antivirus fue fundado en el año 2001 por Tomasz Kojm. Nació como un proyecto opensource que pretende identificar y bloquear virus en el sistema. Pero...¿y por qué? ¿qué sentido tiene? ¿Acaso hay virus en Linux o UNIX? (Porque todo el mundo me dice que a Linux no le entran los virus, y yo he visto que las máquinas Windows se infectan y esas no...) Una de las vulnerabilidades de GNU/Linux (en realidad, vulnerabilidad de sus usuarios) es que multitud de usuarios piensan que Linux no es vulnerable a los virus. Los virus y ataques malintencionados presentan una amenaza real a los sistemas Linux. Si un binario infectado contiene uno de esos virus, al ser ejecutado el binario, el sistema se infectaría. el nivel de infección dependerá de los privilegios del usuario que ejecutó el programa. Por eso se recomienda tanto no trabajar con nivel de root a no ser que resulte imprescindible. Normalmente uno no trabaja (no debería trabajar) con la cuenta root. Para eso existen sudo y las tantísimas cuentas que crean las aplicaciones que necesitan permisos especiales. Si el virus entra por la cuenta de superusuario podría llegar a infectar el sistema entero. En caso de un usuario normal, el sistema operativo estaría seguro aunque los datos del usuario no. El virus podría borrar e incluso enviar esos datos a otro equipo remoto. Por otro lado, las vulnerabilidades de escalada de privilegios pueden permitir que malware ejecutándose bajo una cuenta de acceso limitado también se propague por todo el sistema.
    [Show full text]
  • Computer Security 37 8.1 Vulnerabilities
    Contents 1 Antivirus software 1 1.1 History ................................................ 1 1.1.1 1949-1980 period (pre-antivirus days) ............................ 1 1.1.2 1980-1990 period (early days) ................................ 2 1.1.3 1990-2000 period (emergence of the antivirus industry) ................... 2 1.1.4 2000-2005 period ...................................... 3 1.1.5 2005 to present ........................................ 3 1.2 Identification methods ........................................ 4 1.2.1 Signature-based detection .................................. 4 1.2.2 Heuristics ........................................... 4 1.2.3 Rootkit detection ....................................... 5 1.2.4 Real-time protection ..................................... 5 1.3 Issues of concern ........................................... 5 1.3.1 Unexpected renewal costs ................................... 5 1.3.2 Rogue security applications .................................. 5 1.3.3 Problems caused by false positives .............................. 5 1.3.4 System and interoperability related issues ........................... 6 1.3.5 Effectiveness ......................................... 6 1.3.6 New viruses .......................................... 6 1.3.7 Rootkits ............................................ 6 1.3.8 Damaged files ......................................... 6 1.3.9 Firmware issues ........................................ 7 1.4 Performance and other drawbacks .................................. 7 1.5 Alternative solutions
    [Show full text]
  • Clam Antivirus Mac Free Download
    Clam Antivirus Mac Free Download Clam Antivirus Mac Free Download 1 / 3 Sadly, there is no version of ClamWin Antivirus for Mac available for download, but there are plenty other virus protection tools that you can use instead.. 0/10 0/11 0 (PowerPC/Intel), and many more programs ClamTk is an open source desktop application that provides users with a graphical front-end for the well known Clam AntiVirus virus scanner application that runs on Linux-based operating systems. 1. clam antivirus 2. clam antivirus mac 3. clam antivirus ubuntu Download ClamWin Free Antivirus and get free virus scanning and free virus definition updates.. ClamWin Antivirus by Alch is an open-source antivirus application that will help you protect your system against various types of viruses, spyware, trojans and other malware.. Thank you for choosing ClamXAV – your download will begin in a moment If nothing seems to be happening, try the direct download link.. Clamxav Antivirus Mac DownloadClam Antivirus Mac Free Download CnetClam Antivirus ReviewDownload ClamWin Free Antivirus - Antimalware solution that has a scheduler, virus database updater, standalone scanner, context menu integration, and more features. clam antivirus clam antivirus, clam antivirus windows, clam antivirus mac, clam antivirus review, clam antivirus ubuntu, clam antivirus for linux, clamwin antivirus free download, clam antivirus real time scanning, clam antivirus windows 10, clamav antivirus download Unduh Zombie Defense Escape Mod Apk Data File Host App name: clamav 0 99 2App description: Anti-virus softwareApp website: http://www.. 000 viruses, worms and trojans in order to protect your computer and email from security threats.
    [Show full text]
  • Linux Software Superstore APCUG Winter 2015 Virtual Technology
    Linux Software Superstore APCUG Winter 2015 Virtual Technology Conference February 21, 2015 Linux Software Superstore Presentation by: John Kennedy, Co-Leader Linux Help Desk/SIG East Central Ohio Technology Users Club Newark, Ohio Linux Software Superstore Aisle 1 Aisle 2 Internet Productivity Aisle 3 Aisle 4 Multimedia Graphics Aisle 5 Aisle 6 Desktop Tools Disk/File Tools Aisle 7 Aisle 8 Games Security What You'll See In my series of slides, I will share with you the different areas of computer tasks and some of the programs that are available to complete those tasks. In small print I will sometimes include the names for some of the Microsoft products that you might use. Then I will share with you some actual screen shots of the programs that I like to use with Linux to complete my routine computer tasks. Aisle 1: Internet lBrowsers (Internet Explorer) lFirefox, Chromium (Chrome), Opera, Midori lE-mail Clients (Outlook Express) lThunderbird, Evolution, kMail lRemote Access lTeamviewer lCommunications (VoIP) (chat) lSkype, Pidgin, Empathy, Ekiga lFile Transfer Protocol (FTP) Client lFilleZilla Aisle 2: Productivity lOffice Suite (MS Office) lLibreOffice, OpenOffice, Koffice lDesktop Publishing (MS Publisher) lScribus lWord Processor/Spreadsheet lAbiWord / Gnumeric lPDF Reader (Adobe Reader) lEvince, Okular lPersonal Finance (Quicken) lGnuCash, KMyMoney Aisle 3: Multimedia lPlayers (Media Player) lVLC, Rhythmbox, Banshee, SMPlayer lCD/DVD Burning (Roxio, Nero) lK3b, Brasero, Xfburn lAudio/Video Editing (Windows Movie Maker) lAudacity / Avidemux, OpenShot lDVD Authoring lDeVeDe, Kdenlive, Cinelerra Aisle 4: Graphics lViewers (Photo Viewer, Photo Gallery) lEye of Gnome, Gwenview, gThumb lManagers lDigiKam, F-Spot, lEditors lShotwell, F-Spot, Pinta, Fotoxx, DigiKam, Darktable, G.I.M.P.
    [Show full text]