Implementation of Proactive Spam Fighting Te Niques

Total Page:16

File Type:pdf, Size:1020Kb

Implementation of Proactive Spam Fighting Te Niques Implementation of Proactive Spam Fighting Teniques Masterarbeit von Martin Gräßlin Rupret-Karls-Universität Heidelberg Betreuer: Prof. Dr. Gerhard Reinelt Prof. Dr. Felix Freiling 03. März 2010 Ehrenwörtlie Erklärung I versiere, dass i diese Masterarbeit selbstständig verfasst, nur die angegebenen ellen und Hilfsmiel verwendet und die Grundsätze und Empfehlungen „Verantwortung in der Wissensa“ der Universität Heidelberg beatet habe. Ort, Datum Martin Gräßlin Abstract One of the biggest allenges in global communication is to overcome the problem of unwanted emails, commonly referred to as spam. In the last years many approaes to reduce the number of spam emails have been proposed. Most of them have in common that the end-user is still required to verify the filtering results. ese approaes are reactive: before mails can be classified as spam in a reliable way, a set of similar mails have to be received. Spam fighting has to become proactive. Unwanted mails have to be bloed before they are delivered to the end-user’s mailbox. In this thesis the implementation of two proactive spam fighting teniques is discussed. e first concept, called Mail-Shake, introduces an authentication step before a sender is allowed to send emails to a new contact. Computers are unable to authenticate themselves and so all spam messages are automatically bloed. e development of this concept is discussed in this thesis. e second concept, called Spam Templates, is motivated by the fact that spam messages are generated from a common template. If we gain access to the template we are able to identify spam messages by mating the message against the template. As the template is generated from currently sent spam messages, the template will never mat a legitimate mail. In this thesis mating a mail against a template is implemented. In the scope of this thesis an evaluation for the Mail-Shake concept is provided. is evaluation shows that Mail-Shake is able to reduce the number of received spam messages and mails containing malicious soware. V Acknowledgement First of all I want to thank Professor Gerhard Reinelt and Professor Felix Freiling for making it possible for me to write this thesis at the Laboratory for Dependable Distributed Systems at the University Mannheim. I also want to thank my supervisors Jan Göbel and Philipp Trinius. eir suggestions and feedba are very mu appreciated and helped to develop the system presented in this thesis. A special thanks to all my friends and my family for testing the system and providing valuable feedba on its usability. I especially want to thank Arthur Arlt who was always willing to discuss details about the implementation and this document. I want to thank the KDE community and Qt Development Frameworks for providing su a great and coherent development framework. e KDE community has helped me improve my C++ coding skills during the last years. is was useful during the implementation as many problems were already known and could be solved easily. In general I want to thank the complete Free and Open Source community. Without their ideas of free soware it would not have been possible to realize su a project. e complete project including this document has been implemented and wrien with the help of Free or Open Source soware. Last but not least I want to thank my parents for their financial support during my Master studies so that I could concentrate on my classes. VII Contents 1 Introduction 1 1.1 Motivation ........................................ 1 1.2 Proactive Spam Fighting Teniques .......................... 2 1.3 Notes About the Implementation ............................ 3 1.4 Structure of is esis ................................. 3 2 Proactive Spam Fighting 5 2.1 Related Work ....................................... 5 2.1.1 Bayesian Filtering ................................ 5 2.1.2 DNS Blalists .................................. 6 2.1.3 URI Blalist ................................... 7 2.1.4 Greylisting .................................... 7 2.1.5 Conclusion .................................... 8 2.2 e Mail-Shake Concept ................................. 9 2.2.1 Proactive Spam Fighting With Dynamic Whitelists .............. 9 2.2.2 Limitations of the Mail-Shake Concept .................... 11 2.2.3 Summary .................................... 17 2.3 e Spam Templates Concept .............................. 18 2.3.1 Template Based Spam Mails .......................... 18 2.3.2 Generation of Templates ............................ 19 2.3.3 Proactive Filtering ................................ 20 2.3.4 Summary .................................... 21 3 Background 23 3.1 Evaluation of Current CAPTCHA Teniques ..................... 23 3.1.1 Introduction ................................... 23 3.1.2 Simple Obfuscation ............................... 24 3.1.3 Image Based CAPTCHAs ............................ 25 3.1.4 Audio Based CAPTCHAs ............................ 26 3.1.5 Image Recognition CAPTCHAs ........................ 26 3.1.6 Riddle ...................................... 27 3.1.7 reCAPTCHA .................................. 29 3.1.8 Conclusion .................................... 30 3.2 Excursus: Breaking a CAPTCHA System ........................ 32 3.2.1 e Scr.im CAPTCHA System ......................... 32 3.2.2 Flaws in the Design of the Scr.im CAPTCHA System ............. 32 3.2.3 Aa on the CAPTCHA System ....................... 34 3.2.4 Lessons Learned ................................. 36 VIII Contents 3.3 Akonadi .......................................... 37 3.3.1 Client Plugins Compared to Central Storage .................. 37 3.3.2 Akonadi as the Central Storage Solution .................... 38 3.3.3 Design of Akonadi ............................... 38 3.3.4 Summary .................................... 40 4 Development of the Systems 41 4.1 Soware Requirements for Mail-Shake ......................... 41 4.1.1 Answering Spam Messages ........................... 41 4.1.2 Delivery Status Notifications .......................... 42 4.1.3 Public Mail Address ............................... 43 4.1.4 Sending Mails .................................. 44 4.1.5 Private Mail Address .............................. 45 4.1.6 Summary .................................... 46 4.2 Design of Mail-Shake .................................. 47 4.2.1 Client Independent Library ........................... 47 4.2.2 Akonadi Agent ................................. 50 4.2.3 Client Integration ................................ 52 4.2.4 Summary .................................... 52 4.3 Implementation of Mail-Shake ............................. 54 4.3.1 Mail-Shake Library ............................... 54 4.3.2 Mail-Shake Akonadi Agent ........................... 69 4.3.3 Mail-Shake Integration in Email Clients .................... 76 4.4 Implementation of Spam Templates ........................... 81 4.4.1 Generating the RSS Feed ............................ 81 4.4.2 Testing a Mail .................................. 83 4.4.3 Summary .................................... 87 5 Evaluation 89 5.1 Mail-Shake Evaluation Setup .............................. 89 5.2 Results of Mail-Shake Evaluation ............................ 90 5.3 Greylisting ........................................ 92 5.4 Results from January ................................... 94 5.5 Results from February .................................. 96 5.6 Summary ......................................... 97 6 Retrospection and Future Tasks 99 6.1 Problems caused by Akonadi .............................. 99 6.2 Future tasks for Spam Templates ............................ 101 6.3 Future Tasks for Mail-Shake ............................... 101 6.3.1 Handling of Delivery Status Notifications ................... 102 6.3.2 Mail-Shake for Several Addresses ....................... 102 6.3.3 Solving Mail-Shake Challenges in Email Clients ............... 103 6.3.4 Integrating Mail-Shake Directly Into Email Clients .............. 103 6.4 CAPTCHA Security ................................... 104 Contents IX 7 Conclusion 105 A Examples of Delivery Status Notifications 113 A.1 RFC Compliant ...................................... 113 A.2 Exim ........................................... 114 A.3 QMail ........................................... 115 A.3.1 MIME Mail ................................... 115 A.3.2 Plain Text Mail ................................. 116 A.4 Google Mail ....................................... 117 B Mails from Automated Systems 119 B.1 Review Board ....................................... 119 B.2 Bugzilla .......................................... 119 C Mail-Shake API Documentation 121 C.1 MailShake Namespace Reference ............................ 121 C.1.1 Detailed Description .............................. 121 C.1.2 Typedef Documentation ............................ 122 C.1.3 Enumeration Type Documentation ....................... 122 C.2 MailShake::DSN Class Reference ............................ 122 C.2.1 Detailed Description .............................. 122 C.2.2 Member Function Documentation ....................... 122 C.3 MailShake::DSNPrivate Class Reference ........................ 123 C.4 MailShake::EMail Class Reference ............................ 123 C.4.1 Detailed Description .............................. 123 C.4.2 Member Function Documentation ....................... 124 C.5 MailShake::EMailPrivate Class Reference ........................ 126 C.6 MailShake::Id Class Reference .............................. 126 C.6.1 Detailed Description .............................
Recommended publications
  • Metadata Track Akonadi the Independent Solution for PIM Data
    Akonadi – The independent solution for PIM GCDS 2009 data Metadata track Akonadi the independent solution for PIM data Will Stephenson Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Akonadi Topics Akona-what? Design Overview What we give you What you give us Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Akonadi The story so far Monolithic apps Own data storage Limited if any external interfaces E-D-S Data storage service Limited range of types supported Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Limitations of KDE3 KResource framework limitations: Data is not shared Designed for synchronous access Hard to extend to other data types Basically no shared common code KMail limitations: Only limited backend abstraction Designed for small amounts of local data Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Scalability with KDE 3 |Data| = small Contact applet KAddressBook l l KMail Kopete Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Scalability in KDE 3 |Data| = large Contact applet KAddressBook l l KMail Kopete Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Goals As much as possible shared, type independent functionality Easy to extend to new data types Unified API to access PIM data, independent of the actual data source Scalability Will Stephenson Akonadi – The independent solution for PIM GCDS 2009 data Why? Goals One synchronization point for mobile devices Reliable,
    [Show full text]
  • Brave Gnu World
    LINUXCOVERCOMMUNITY USERSTORY SchlagwortSchlagwortBrave GNU sollte Worldsollte hier hier stehen stehen Schlagwort sollte hier stehen COVER STORY The Monthly GNU Column BRAVE GNU WORLD This column looks into projects and current affairs in the world of free software from the perspective of the GNU Project and the FSF. In this issue, I’ll focus on Comspari and the EU decision on software patents. BY GEORG C.F. GREVE n the past, the German government the Kroupware project in 2002. The pub- principles back to front. For example, has often caused a (positive) stir due lic tender by the BSI was aimed to pro- many other solutions are based on the Ito its activities with free software. duce a groupware solution that would principle that the server is the king of The Federal Ministry of the Economy support strong cryptography and inte- the hill and the users have to bow down (BMWi) sponsored Gnupg [1], for exam- grate seamlessly into a heterogeneous and worship it. The Kolab server does ple. Add to this a number of accompany- environment. things differently. The program makes ing activities, such as a report by the The government office gave a consor- the user king, and gives the user power Bavarian Accounts Office, the KBST let- tium comprising Erfrakon, Klarälvdalens to do things. The software simply helps ter, and the highly acclaimed migration Datakonsult [2], and Intevation [3] the coordinate things as a central intermedi- guide by the Federal Ministry of the Inte- task of developing the software. Inter- ary. rior (BMI). nally, the design and the software was Kolab 1 combined so-called partial referred to as Kolab 1.
    [Show full text]
  • Nextcloud User Manual Release Latest
    Nextcloud User Manual Release latest The Nextcloud developers Oct 06, 2021 CONTENTS 1 Nextcloud latest user manual introduction1 2 What’s new for users in Nextcloud latest3 3 The Nextcloud Web interface7 3.1 Web browser requirements........................................7 3.2 Navigating the main user interface....................................8 4 Files & synchronization 11 4.1 Accessing your files using the Nextcloud Web interface......................... 11 4.2 Accessing Nextcloud files using WebDAV................................ 17 4.3 Managing deleted files.......................................... 28 4.4 Desktop and mobile synchronization.................................. 29 4.5 Encrypting your Nextcloud files on the server.............................. 30 4.6 File Sharing............................................... 33 4.7 Federated Shares............................................. 37 4.8 Making anonymous uploads....................................... 39 4.9 Large file uploads............................................ 41 4.10 Storage quota............................................... 42 4.11 Version control.............................................. 42 4.12 Projects.................................................. 43 4.13 Transfer Ownership........................................... 47 5 Groupware 49 5.1 Using the Contacts app.......................................... 49 5.2 Using the Calendar app......................................... 52 5.3 Synchronizing with Android....................................... 60 5.4
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Akonadi-Opensync2008.Pdf
    Why rewrite the foundation of KDE PIM? KResource ● Designed 10 years ago for small amounts of data ● Synchronous access ● No code sharing ● Hard to extend ● No change notifications ● No shared data ● (Ab-)Used way beyond its capabilities Goals ● Fix all of the above ● Provide a unified API to access PIM data, independent of the actual data source ● Provide flexible cache policies for remote data ● Fast virtual folders, representing search results ● Usable for the whole free desktop Chaos Design Server ● Fully type independent ● Caches remote data ● Change notifications ● Conflict detection ● Based on MySQL ● Depends only on Qt Protocol ● Data access – Based on IMAP – Optimized for high throuput – Data encoded using standard formats ● Change notification, control methods – D-Bus – Optimized for easy use ● Platform and toolkit independent Basic Objects ● Filesystem-like structure – Collections – Items ● Items consist of – A payload, consisting of one or more parts – Arbitrary attributes Client Library ● libakonadi: Qt/KDE based – C++ – Ruby – Python – C# ● Mostly type-independent ● Type-specific plugins API ● Low-level – Job based – Asynchronous ● High-level – Qt Model/View ● Change monitoring and recording/replay Resource Agents ● Connect Akonadi to external data sources – Local files (ical, vcard, maildir,...) – Mail or groupware servers – Web services (facebook, del.ico.us, ...) ● Translate data formats ● Replay offline changes Other Agents ● Implement functionalitry not limited to a single application ● Operate autonomously on PIM data ● Examples – Indexing – Mail threading – Filtering – ... Status ● Server and client library first released with KDE 4.1 ● First users: Mailody, KPilot ● Supported types: – Mail – Contacts – Calendar – RSS feeds – Bookmarks Roadmap for KDE 4.2 ● Use Akonadi for contacts and calendar data for all of KDE PIM ● Limit porting work by using KResource <-> Akonadi bridges – Allows to use KResource based backends with Akonadi – Transparent for old applications .
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • KDE E.V. Quarterly Report 2008Q1/Q2
    KDE e.V. Quarterly Report Q1/2008 & Q2/2008 .init() home for KDE e.V. to call its own but a tremendous asset in Claudia who Dear KDE e.V. member, has rapidly made herself at home in our community providing much needed logistical support and business The first two quarters of 2008 were very busy ones for development effort while diving head-first into the KDE participants. Both the technology project and KDE e.V. community by joining our events and tradeshow teams. We were bustling with activity. are happy to welcome Claudia into our community and our team. The obvious stand-out moment was when KDE 4.0 was released at an immensely successful release event held in In short, the first half of 2008 was busy and full of pleasant Mountain View, California - where Google served as our surprises and achievements. KDE e.V. found ways to be hosts and numerous locations around the world tuned in more efficient and increase our pace to keep up with the to join us live over the Internet. Besides creating new technology project's own escalation. Looking forward to community bonds and bringing together developers from the second half of the year with Akademy 2008 just around various projects and companies in and outside of the KDE the corner, it's safe to say that things aren't about to slow project, it also spawned what will be an annual KDE down, either. Americas event at the beginning of each year. To our membership and partners: thank you for helping Work to ensure Akademy 2008 went off successfully was making the start of 2008 such a positive and productive also in high gear as KDE 4.1 was being readied for release.
    [Show full text]
  • Kmail 2 Be Released?
    Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? KMail 2 The Road to Akonadi Thomas McGuire July 5th 2009 Thomas McGuire – KMail 2 – 1/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? Outline 1 Why do we need Akonadi in KMail? 2 What is Akonadi? 3 How will KMail be ported? 4 When will KMail 2 be released? Thomas McGuire – KMail 2 – 2/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? About Me About Me Student of computer science at the University of Siegen KDE developer since 2007 KMail Maintainer since 2008 KDAB employee Thomas McGuire – KMail 2 – 3/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? Outline 1 Why do we need Akonadi in KMail? 2 What is Akonadi? 3 How will KMail be ported? 4 When will KMail 2 be released? Thomas McGuire – KMail 2 – 4/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? About KMail About KMail Official KDE Mail Client, part of Kontact Now over 12 years old Geared towards power users Second highest bug count on bugs.kde.org High Bug Count? Many bugs caused by the aging storage layer Bug count also reflects popularity KMail works OK except for corner cases Thomas McGuire – KMail 2 – 5/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? History of KMail A look into
    [Show full text]
  • Destination Guide 2020 All Phone Numbers Are in (845) Area Code Unless Otherwise Indicated
    ELCOMEELCOME Dutchess County delivers the rugged, natural beauty of the Hudson Valley, world renowned dining, and a storied history of empire builders, visionaries and artists. Take a trip here to forge indelible memories, and discover that true wealth is actually the exceptional experiences one shares in life. Old Rhinebeck Aerodrome, Red Hook Table of Contents Events . 2 Eastern Dutchess . .. 30 Groups, Meetings Explore Dutchess by Community . 4 Where to Stay . 38 & Conferences . 46 Northern Dutchess . 6 Places to Eat . 42 Accessible and LGBTQ Travel . 47 Central Dutchess . 14 Colleges . 44 About Dutchess . 48 Southern Dutchess . 22 Weddings . 45 Transportation & Directions . 49 Dutchess Tourism, Inc. is On the cover: Main Street Beacon accredited by the Destination Marketing Accreditation Program (DMAP) of DutchessTourism.com #MyDutchessStory Destinations International. Notes: To the best of our knowledge, the information in this guide is correct as of March 1, 2020. Due to possible changes, we Custom publishing services provided by recommend that you contact a site before visiting. This guide lists only those facilities that wish to be included. Listings do not represent an endorsement. The programs provided by this agency are partially funded by monies received from the County of ChronogramMedia Dutchess. This travel guide is published by Dutchess Tourism, Inc., 3 Neptune Rd., Suite A11A, Poughkeepsie, NY 12601, the County of Dutchess, in cooperation with the New York State Department of Economic Development and the I Love New York 314 Wall Street, Kingston, NY 12401 campaign. ® I LOVE NEW YORK is a registered trademark and service mark of the New York State Department of Economic ChronogramMedia.com Development; used with permission.
    [Show full text]
  • BACHELOR THESIS Jan Kundrát IMAP E-Mail Client
    Charles University in Prague Faculty of Mathematics and Physics BACHELOR THESIS Jan Kundr´at IMAP E-mail Client Department of Software Engineering Supervisor: Mgr. Vlastimil Babka Study Program: Computer Science, Programming 2009 I’d like to thank my supervisor, Mgr. Vlastimil Babka, for his numerous advices during the writing of this thesis, Ms. Anna Adamcov´a for her great patience and support, and my parents for supporting my studies. I hereby declare that I wrote this thesis myself using the referenced sources only. I also agree with lending and publishing of this thesis. Prague, May 29, 2009 Jan Kundr´at 2 Contents 1 Introduction 7 1.1 Motivation............................ 7 1.2 Structureofthethesis ..................... 8 2 IMAP and Related Technologies 9 2.1 BasicConcepts ......................... 9 2.2 IMAP-specificAttributes. 10 2.3 MIME .............................. 12 2.3.1 MessageasaContainer. 12 2.3.2 International Characters in Messages . 13 2.3.3 MIMESupportinIMAP. 13 2.4 IMAPProtocolFlow ...................... 14 2.4.1 Commandsandresponses . 14 2.4.2 Mailbox Synchronization . 15 2.4.3 ChangestoMailbox . 16 2.4.4 Fetching and Manipulating Messages . 17 2.4.5 Queries Against Other Mailboxes . 18 2.4.6 Searching, Sorting and Threading . 18 2.4.7 Manipulating Mailboxes . 18 2.4.8 Sessiontermination. 19 2.4.9 IMAPExtensions. 19 2.5 OtherMethodsofMailStoreAccess . 20 2.5.1 POP3 .......................... 20 2.5.2 MAPI .......................... 20 2.5.3 Webmail......................... 20 2.5.4 IMAPCriticism..................... 21 3 3 Trojita Design 23 3.1 Overview............................. 23 3.2 Model-ViewArchitecture. 25 3.3 Parser .............................. 26 3.3.1 Low-levelParser . .. .. 26 3.3.2 Parser .........................
    [Show full text]
  • The Korganizer Handbook
    The KOrganizer Handbook Carlos Leonhard Woelz Milos Prudek Paul E. Ahlquist, Jr. Jürgen Nagel Michel Boyer de la Giroday Developer: Reinhold Kainhofer Developer: Cornelius Schumacher Developer: Preston Brown Reviewer: Lauri Watts The KOrganizer Handbook 2 Contents 1 Introduction 7 2 Five-minute Fly-over Course of KOrganizer9 2.1 Entering Events . .9 2.2 Entering To-dos . .9 2.3 Adding Journal Entries . 10 2.4 Rescheduling Events . 10 2.5 Rescheduling or Editing To-dos . 10 2.6 Conclusion . 10 3 Importing, Exporting, and Managing Calendars 11 3.1 Calendar Resources . 11 3.2 Importing, Exporting and Maintaining Calendars . 13 3.2.1 Importing Calendars . 13 3.2.2 Exporting Calendars . 13 3.2.3 Maintaining Your Calendars . 13 3.3 Downloading Using Get Hot New Stuff . 14 4 Views and Filters 15 4.1 KOrganizer Views . 15 4.1.1 What’s Next View . 16 4.1.2 Event List View . 16 4.1.3 Agenda View . 16 4.1.3.1 Day View . 17 4.1.3.2 Next X Days View . 17 4.1.3.3 Week View . 17 4.1.3.4 Work Week View . 17 4.1.4 Month View . 18 4.1.5 Timeline View . 18 4.1.6 To-do List . 18 4.1.7 Journal View . 19 4.2 Tags.............................................. 19 4.3 Filters . 19 4.4 Searching . 19 The KOrganizer Handbook 5 Entering Data 21 5.1 Events . 21 5.1.1 General Tab . 22 5.1.2 Attendees Tab . 23 5.1.3 Reminder Tab . 24 5.1.4 Recurrence tab .
    [Show full text]
  • * His Is the Original Ubuntuguide. You Are Free to Copy This Guide but Not to Sell It Or Any Derivative of It. Copyright Of
    * his is the original Ubuntuguide. You are free to copy this guide but not to sell it or any derivative of it. Copyright of the names Ubuntuguide and Ubuntu Guide reside solely with this site. This guide is neither sold nor distributed in any other medium. Beware of copies that are for sale or are similarly named; they are neither endorsed nor sanctioned by this guide. Ubuntuguide is not associated with Canonical Ltd nor with any commercial enterprise. * Ubuntu allows a user to accomplish tasks from either a menu-driven Graphical User Interface (GUI) or from a text-based command-line interface (CLI). In Ubuntu, the command-line-interface terminal is called Terminal, which is started: Applications -> Accessories -> Terminal. Text inside the grey dotted box like this should be put into the command-line Terminal. * Many changes to the operating system can only be done by a User with Administrative privileges. 'sudo' elevates a User's privileges to the Administrator level temporarily (i.e. when installing programs or making changes to the system). Example: sudo bash * 'gksudo' should be used instead of 'sudo' when opening a Graphical Application through the "Run Command" dialog box. Example: gksudo gedit /etc/apt/sources.list * "man" command can be used to find help manual for a command. For example, "man sudo" will display the manual page for the "sudo" command: man sudo * While "apt-get" and "aptitude" are fast ways of installing programs/packages, you can also use the Synaptic Package Manager, a GUI method for installing programs/packages. Most (but not all) programs/packages available with apt-get install will also be available from the Synaptic Package Manager.
    [Show full text]