Universal Desktop Linux V5

Total Page:16

File Type:pdf, Size:1020Kb

Universal Desktop Linux V5 Universal Desktop Linux v5 User Manual IGEL Technology GmbH Universal Desktop Linux v5 03.06.2016 Important Information Please note some important information before reading this documentation. Copyright This publication is protected under international copyright laws. All rights reserved. With the exception of documentation kept by the purchaser for backup purposes, no part of this manual – including the products and software described in it – may be reproduced, manipulated, transmitted, transcribed, copied, stored in a data retrieval system or translated in any form or by any means without the express written permission of IGEL Technology GmbH. Copyright © 2016 IGEL Technology GmbH. All rights reserved. Trademarks IGEL is a registered trademark of IGEL Technology GmbH. Any other names or products mentioned in this manual may be registered trademarks of the associated companies or protected by copyright through these companies. They are mentioned solely for explanatory or identification purposes, and to the advantage of the owner. Disclaimer The specifications and information contained in this manual are intended for information use only, are subject to change at any time without notice and should not be construed as constituting a commitment or obligation on the part of IGEL Technology GmbH. IGEL Technology GmbH assumes no responsibility or liability for any errors or inaccuracies that may appear in this manual, including any pertaining to the products and software described in it. IGEL Technology GmbH makes no representations or warranties with respect to the contents thereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. IGEL Support and Knowledge Base If you have any questions regarding an IGEL product and are already an IGEL customer, please contact your dedicated sales partner first. Er beantwortet gerne Ihre Fragen rund um alle IGEL-Produkte. If you are currently testing IGEL products or your sales partner is unable to provide the help you need, please fill in the support form after logging on at the members-area (https://www.igel.com/en/members-area/login-logout.html). We will then contact you as soon as possible. It will make things easier for our support staff if you provide us with all the information that is available. Please see also our notes regarding support and service information. Pealse visit our IGEL Knowledge Base http://edocs.igel.com/ to find additional Best Practice and How To documentation as well as FAQ. 2 IGEL Technology GmbH Universal Desktop Linux v5 5.10.100 Contents Important Information ...................................................................................................................................................2 1. IGEL Linux user manual .....................................................................................................................................6 2. IGEL Universal Desktop Firmware ......................................................................................................................8 2.1. Supported formats and codecs ...................................................................................................... 9 3. Quick Installation .............................................................................................................................................10 4. The IGEL Linux desktop ...................................................................................................................................11 4.1. Application Launcher ................................................................................................................... 13 5. Boot Procedure ................................................................................................................................................16 5.1. Boot Menu ................................................................................................................................... 16 5.2. Network Integration .................................................................................................................... 18 5.3. X-Server ........................................................................................................................................ 18 6. Setup Application ............................................................................................................................................19 6.1. Starting the Setup ........................................................................................................................ 19 6.2. Ending the Setup .......................................................................................................................... 19 6.3. Setup Areas .................................................................................................................................. 20 6.4. Enable setup pages for users ....................................................................................................... 21 6.5. Quick setup .................................................................................................................................. 22 6.6. Setup Search ................................................................................................................................ 22 7. Sessions ..........................................................................................................................................................23 7.1. Copy session ................................................................................................................................. 23 7.2. Desktop Integration ..................................................................................................................... 24 7.3. Citrix Receiver Selection............................................................................................................... 24 7.4. HDX / ICA Global .......................................................................................................................... 24 7.5. Legacy ICA Sessions ...................................................................................................................... 35 7.6. Citrix StoreFront / Web Interface ................................................................................................ 40 7.7. Citrix Self-Service ......................................................................................................................... 45 7.8. Citrix Access Gateway .................................................................................................................. 46 7.9. RDP Global ................................................................................................................................... 47 7.10. RDP Session .................................................................................................................................. 56 7.11. Remote Desktop Web Access ...................................................................................................... 60 7.12. Horizon Client Global ................................................................................................................... 66 7.13. Horizon Client session .................................................................................................................. 70 7.14. vWorkspace Client and AppPortal ............................................................................................... 75 7.15. Appliance Mode ........................................................................................................................... 76 7.16. Leostream Connection Broker ..................................................................................................... 82 7.17. Systancia AppliDis Client .............................................................................................................. 83 7.18. Evidian AuthMgr .......................................................................................................................... 83 7.19. NoMachine NX ............................................................................................................................. 83 7.20. X Session ...................................................................................................................................... 84 7.21. Parallels Client Global .................................................................................................................. 84 3 IGEL Technology GmbH Universal Desktop Linux v5 5.10.100 7.22. Parallels Client .............................................................................................................................. 85 7.23. PowerTerm WebConnect ............................................................................................................. 90 7.24. PowerTerm terminal emulation ................................................................................................... 91 7.25. IBM iSeries Access ........................................................................................................................ 92 7.26. ThinLinc ........................................................................................................................................ 93 7.27. SSH Session .................................................................................................................................. 99 7.28. VNC Viewer ...............................................................................................................................
Recommended publications
  • Embedded Linux for Thin Clients Next Generation (Elux® NG) Version 1.25
    Embedded Linux for Thin Clients Next Generation (eLux® NG) Version 1.25 Administrator’s Guide Build Nr.: 23 UniCon Software GmbH www.myelux.com eLux® NG Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express consent of UniCon Software GmbH. © by UniCon 2005 Software GmbH. All rights reserved eLux is a registered trademark of UniCon Software GmbH in Germany. Accelerated-X is a trademark of Xi Graphics, Inc. Adobe, Acrobat Reader and PostScript are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Broadcom is a registered trademark of Broadcom Corporation in the U.S. and/or other countries. CardOS is a registered trademark and CONNECT2AIR is a trademark of Siemens AG in Germany and/or other countries. Cisco and Aironet are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Citrix, Independent Computing Architecture (ICA), Program Neighborhood, MetaFrame, and MetaFrame XP are registered trademarks or trademarks of Citrix Systems, Inc. in the United States and other countries. CUPS and the Common UNIX Printing System are the trademark property of Easy Software Products. DivX is a trademark of Project Mayo. Ericom and PowerTerm are registered trademarks of Ericom Software in the United States and/or other countries. Gemplus is a registered trademark and GemSAFE a trademark of Gemplus.
    [Show full text]
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Ein Wilder Ritt Distributionen
    09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren.
    [Show full text]
  • Working from Home Efficiently, Ethically and Securely by Sharon D
    Working From Home Efficiently, Ethically and Securely by Sharon D. Nelson, Esq., John W. Simek and Michael C. Maschke © 2020 Sensei Enterprises, Inc. The world is trying to deal with the COVID-19 in a variety of ways. Controlling the spread of the deadly virus is at the top of the list. Travel is being restricted, and some countries have even closed their borders. The United States was slow to react, but eventually states imposed restrictions for business operations to reduce the coronavirus spread and then began re-opening in phases. Social distancing and maintaining clean hygiene practices are the normal mode of operation now. More and more businesses are allowing their employees to stay at home where possible. What does that mean for the practice of law? How will you meet with clients? Most firms have adopted a telework environment and allow their employees to work from home, even while some firms have begun re-opening. Working from home has different consequences depending on your current capabilities and whether a plan is already in place. While we can’t cover all the possibilities and capabilities of every law firm, we’ll attempt to attack some of the common considerations. Equipment Let’s start with a very basic item…the computer. Hopefully, everyone is already using a laptop as their main office machine. As expected, some popular models of laptops are still in short supply. Worst case, you may have to find a Best Buy, Target, Walmart, etc. and see if you can purchase a consumer-grade machine. If you planned properly, laptop users are already configured for remote access.
    [Show full text]
  • IGEL Universal Desktop Linux User Guide
    IGEL Thin Clients Universal Desktop User Guide For IGEL Thin Clients with IGEL Flash Linux Copyright © 2009 IGEL Technology Ver. UD-LX 4.02.100 12/2009 Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including the products and software described in it, may be reproduced, manipulated, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of IGEL Technology GmbH. Disclaimer The information in this document is subject to change without notice. IGEL Technology GmbH makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. Further, IGEL Technology GmbH reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of IGEL Technology GmbH to notify any person of such revision or changes. Trademark Recognition IGEL is a registered trademark of IGEL Technology GmbH. MicrosoftTM WindowsTM is a registered trademark of Microsoft Corporation. JavaTM is a registered trademark of Sun Microsystems, Inc. VMwareTM is a registered trademark of VMware, Inc. PowerTermTM WebConnectTM and PowerTermTM InterConnectTM are registered trademarks of Ericom Software. CUPSTM and the CUPS logo are trademarks of Apple Inc. All other products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owner’s benefit.
    [Show full text]
  • Hot Topics: Networking, Security, and Energy Share Session Boston
    Business Service Management for Performance Hot Topics: Networking, Security, and Energy Share Session Boston Laura Knapp WW Business Consultant [email protected] 650-617-2400 1 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance Network Security Energy 2 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing Types if Virtualization Server/machine Desktop/Session Application 3 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing? Server/machine Masking of server resources from server users Consolidation of multipppyle physical servers onto a single physical base AKA virtual private servers, guests, instances, containers Three popular approaches: virtual machine (VM) – host guest paravirtual machine – variation on VM where the guest OS is modified Operating system layer – all guests use same OS as the host – single OS kernel 4 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing? Desktop/Session (Aka server side virtualization - virtual desktop – client virtualization) Separates a personal computing desktop from a physical machine Uses client-serve computing and virtual desktop interface (VDI) The deskt op i s st ored on a remot e cent ral server Programs, applications, processes and data are run centrally’ Access from PC, notebook, smartphone, thin client Providers Cendio ThinLinc , Citrix XenDesktop , Ericom WebConnect , Iland Workforce Cloud , Leostream , Microsoft Remote ,Desktop Services , MokaFive Suite , NComputing , Security and other items controlled at central NX technology , Pano Logic , Parallels Virtual Desktop , Infrastructure , Red Hat, RingCube vDesk , Sun Virtual location Desktop Infrastructure , Systancia, ThinDesk , Userful , VMware View , Wyse 5 © Applied Expert Systems, Inc.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • In Windows Server 2008 R2 and Windows Server 2008 (The Former Containing the Later Release of Hyper-V)
    Hyper-V Microsoft Hyper-V Developer(s) Microsoft Initial release July 26, 2008 (KB950050)[1][2] R2 Service Pack 1 Stable release (KB976932)[3][4] / March 15, 2011; 15 months ago Windows 8 (both its server and client versions) (future) and Operating system Windows Server 2008 or standalone Type Virtual machine License Proprietary Hyper V Slide 1 of 21 Microsoft Hyper-V ■ Microsoft Hyper-V, ✦ codenamed Viridian ✦ and formerly known as Windows Server Virtualization, ✦ is a hypervisor-based virtualization system for x86-64 systems ■ A beta version of Hyper-V was shipped with certain x86-64 editions of Windows Server 2008, and the finalized version (automatically updated through Windows Update) was released on June 26, 2008 ■ Hyper-V has since been released in a free stand-alone version, and has been upgraded to Release 2 (R2) status Hyper V Slide 2 of 21 Versions and variants ■ Hyper-V exists in two variants: ✦ as a stand-alone product called Microsoft Hyper-V Server 2008 (Hyper-V Server 2008 R2 for the second release), ✦ and as an installable role in Windows Server 2008 R2 and Windows Server 2008 (the former containing the later release of Hyper-V). ■ The stand-alone version of Hyper-V is free, and was released on October 1, 2008. ■ It is a variant of the core installation of Windows Server 2008 that includes full Hyper-V functionality; other Windows Server 2008 roles are disabled, and there are limited Windows Services. ■ The free Hyper-V Server 2008 variant is limited to a command line interface (CLI), where configuration of the "Host" or "Parent" (Hyper-V Server 2008) OS, physical hardware and software is done using shell commands.
    [Show full text]
  • Distance Learningʼs Impact on Education IT
    Key Insights Distance Learningʼs Impact on Education IT The changes taking place in the education COVID-19 caused an acceleration of K-12 education’s technology landscape as a result of the digital roadmap in three key areas: coronavirus school closures are extensive — and many will be permanent or evolving. Closing the “homework gap” to enable digital However, the rapid speed of change is creating learning. Mobile hotspots are increasingly going home, with students, new challenges for IT teams. creating an "always-connected" online learning dynamic1 New research by Absolute examines the Enabling remote and hybrid learning models. effects of distance learning on endpoint 75% of schools intend to operate remote or hybrid models2 health, device usage, safety, and security as schools adapt to remote and hybrid learning Protecting students, staff, and schools from cyberattacks. 60% of all malware attacks (particularly ransomware) occur in models in the 2020/21 school year. education3 To better understand what is happening on the ground, Millions of Absolute- 10,000 Schools and 12 analyst reports and Absolute studied: enabled devices districts peer research This is what we discovered… Reliance on devices to drive IT teams are doing School devices are mainly learning outcomes has more with less. being used for learning. While federal stimulus packages may help increased. 40% in the short term, long-term budgets are 16% YouTube, Edgenuity®, uncertain: Google Docs™, and 5% Google Classrooms 61% 28% are where most 11% students are increase in
    [Show full text]
  • Endpoint Protection Platform for Virtual Desktop Infrastructure (VDI) Datasheet
    EPP VDI DATASHEET Endpoint Protection Platform for Virtual Desktop Infrastructure (VDI) Datasheet Introduction The SentinelOne Endpoint Protection Platform offers a lightweight and efcient solution to secure the growing need for virtual environments, including thin clients, layered applications, and other VDI scenarios. VDI solutions have been an underlying IT trend in some of the key business sectors for a number of reasons ranging from cost, compliance and seasonality of workers. And improvement storage performance improvements will only drive the adoption further. Securing VDI deployments is imperative to minimize the business risk and achieve regulatory compliance, especially in the face of increasing magnitude and complexity of cyber threats. VDI also presents some unique challenges for security along with some common issues seen in traditional endpoint deployments. Patching is not always rapid: Patching requires updating the golden image and need to be certified before rollout. Balancing cost and complexity: One of the biggest desired benefits of virtualization is cost savings with oversubscription. VDI implementations tend to be as light-weight as possible to optimize deployments and maximize resource utilization. Consequently, the layers of security controls are always deep. False sense of security: Given the temporal nature of VDI sessions, there is sometimes a false sense of security that drives user behavior. The threats to this environment however are as real – malware such as screen scrapers and key loggers put user credentials and business information at an equivalent risk as traditional endpoint because the virtual desktop is not isolated from corporate environment. VDI performance accentuates risk: Traditional AV scans that cause performance problems on traditional endpoints with dedicated CPU experience a more extreme resource crunch when running in shared virtual CPU environment resulting in AV storms.
    [Show full text]