Developer Guide(KAE Encryption & Decryption)

Total Page:16

File Type:pdf, Size:1020Kb

Developer Guide(KAE Encryption & Decryption) Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Issue 15 Date 2021-08-06 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2021. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Issue 15 (2021-08-06) Copyright © Huawei Technologies Co., Ltd. i Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Contents Contents 1 Overview....................................................................................................................................1 2 Logical Architecture................................................................................................................ 2 3 Installation, Upgrade, and Uninstallation.........................................................................4 3.1 Installing the KAE Software................................................................................................................................................. 4 3.1.1 Introduction........................................................................................................................................................................... 4 3.1.2 Preparing for Installation.................................................................................................................................................. 6 3.1.3 Installing OpenSSL............................................................................................................................................................ 10 3.1.4 Installing the KAE Software Using an RPM Package............................................................................................ 12 3.1.5 Installing the KAE Software Using a DEB Package................................................................................................15 3.1.6 Installing the KAE Software Using Source Code.....................................................................................................19 3.2 Operations After Installation............................................................................................................................................ 22 3.2.1 Testing the Performance of OpenSSL and the KAE............................................................................................... 22 3.3 Upgrading the KAE Software............................................................................................................................................ 25 3.3.1 Upgrading the KAE Software Using an RPM Package..........................................................................................25 3.3.2 Upgrading the KAE Software Using a DEB Package............................................................................................. 26 3.4 Uninstalling the KAE Software......................................................................................................................................... 28 3.4.1 Uninstalling the KAE Software Installed Using an RPM Package.....................................................................28 3.4.2 Uninstalling the KAE Software Installed Using a DEB Package........................................................................ 29 3.4.3 Uninstalling the KAE Software Installed Using Source Code............................................................................. 31 4 Application Cases.................................................................................................................. 32 4.1 KAE Applications................................................................................................................................................................... 32 4.1.1 KAE Usage Description.................................................................................................................................................... 32 4.1.2 Example Code for the KAE............................................................................................................................................. 33 4.1.3 Using KAE Through the OpenSSL Configuration File openssl.cnf.................................................................... 33 4.1.4 Nginx Applications Accelerated by KAE.....................................................................................................................35 4.1.5 dm-crypt-based Transparent Partition or Drive Encryption................................................................................35 4.1.6 Using the KAE on a KVM................................................................................................................................................ 38 4.1.7 Using the KAE on Docker............................................................................................................................................... 40 4.1.8 MD5 Hardware Acceleration Tuning...........................................................................................................................41 5 Common Operations............................................................................................................ 42 5.1 Querying KAE Log Information........................................................................................................................................ 42 Issue 15 (2021-08-06) Copyright © Huawei Technologies Co., Ltd. ii Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Contents 6 Troubleshooting.....................................................................................................................44 6.1 Initialization Failure..............................................................................................................................................................44 6.2 Failed to Identify Accelerator Devices After the KAE Installed............................................................................. 45 6.3 Failed to Upgrade the Accelerator Driver.....................................................................................................................46 6.4 Failed to Identify the Related Interface Symbols After the OpenSSL of a New Version Is Installed.......46 A Appendix................................................................................................................................. 48 A.1 Terms........................................................................................................................................................................................ 48 A.2 Acronyms and Abbreviations............................................................................................................................................ 49 A.3 Change History...................................................................................................................................................................... 50 Issue 15 (2021-08-06) Copyright © Huawei Technologies Co., Ltd. iii Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) 1 Overview 1 Overview Kunpeng accelerator engine (KAE) is a hardware acceleration solution based on the Kunpeng 920 processor. It includes KAE encryption and decryption as well as KAEzip, which are used to accelerate SSL/TLS applications and data compression, respectively. Therefore, it can significantly reduce processor consumption and improve the processor efficiency. In addition, the KAE shields the internal processing details from the application layer. Users can quickly migrate services through the standard OpenSSL and zlib interfaces. This document describes KAE encryption and decryption as well as its installation, test procedures, and use cases. KAE Encryption and Decryption The KAE encryption and decryption module uses the Kunpeng hardware acceleration engine to implement the RSA, SM3, SM4, DH, MD5, and AES algorithms. It provides high-performance symmetric and asymmetric encryption/ decryption algorithms based on the lossless user-mode driver framework. Compatible with OpenSSL 1.1.1a and later versions, it supports the synchronous and asynchronous mechanisms. Currently, KAE supports the following algorithms: ● Digest algorithms SM3 and MD5, supporting asynchronous models. ● Symmetric encryption algorithm SM4, supporting asynchronous models and CTR, XTS, CBC, ECB, and OFB modes. ● Symmetric encryption algorithm AES, supporting asynchronous models and ECB, CTR, XTS, and CBC modes. ● Asymmetric algorithm RSA,
Recommended publications
  • Oracle® Linux 7 Release Notes for Oracle Linux 7.2
    Oracle® Linux 7 Release Notes for Oracle Linux 7.2 E67200-22 March 2021 Oracle Legal Notices Copyright © 2015, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Netbackup ™ Enterprise Server and Server 8.0 - 8.X.X OS Software Compatibility List Created on September 08, 2021
    Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List Created on September 08, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046611/en_US/nbu_80_scl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List 2021-09-08 Introduction This Software Compatibility List (SCL) document contains information for Veritas NetBackup 8.0 through 8.x.x. It covers NetBackup Server (which includes Enterprise Server and Server), Client, Bare Metal Restore (BMR), Clustered Master Server Compatibility and Storage Stacks, Deduplication, File System Compatibility, NetBackup OpsCenter, NetBackup Access Control (NBAC), SAN Media Server/SAN Client/FT Media Server, Virtual System Compatibility and NetBackup Self Service Support. It is divided into bookmarks on the left that can be expanded. IPV6 and Dual Stack environments are supported from NetBackup 8.1.1 onwards with few limitations, refer technote for additional information <http://www.veritas.com/docs/100041420> For information about certain NetBackup features, functionality, 3rd-party product integration, Veritas product integration, applications, databases, and OS platforms that Veritas intends to replace with newer and improved functionality, or in some cases, discontinue without replacement, please see the widget titled "NetBackup Future Platform and Feature Plans" at <https://sort.veritas.com/netbackup> Reference Article <https://www.veritas.com/docs/100040093> for links to all other NetBackup compatibility lists.
    [Show full text]
  • Practical Migration from IBM X86 to Linux on IBM System Z
    Front cover Practical Migration from x86 to Linux on IBM System z A guide to migrating popular applications and services from Linux on x86 to Linux on System z Practical guidance on planning, analysis, and TCO Comprehensive hands-on migration case study Lydia Parziale Eduardo Simoes Franco Craig Gardner Berthold Gunreben Tito Ogando Serkan Sahin ibm.com/redbooks International Technical Support Organization Practical Migration from x86 to Linux on IBM System z September 2014 SG24-8217-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (September 2014) This edition applies to z/VM Version 6.3, DB2 Version 10.5, SUSE Linux Enterprise Server Version 11, and Red Hat Enterprise Linux Version 6. Versions of other software components are incident to the versions available from the respective distributions referenced above. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . xi Comments welcome. xii Stay connected to IBM Redbooks . xii Chapter 1. Benefits of migrating workloads to Linux on System z . 1 1.1 Benefits . 2 1.2 Reasons to select Linux on System z . 3 1.2.1 System z strengths . 3 1.3 A new type of information technology: Workload centric . 5 1.4 Workload-centric cloud . 7 1.5 Enterprise cloud computing blueprint for System z. 9 1.5.1 Empowered virtualization management: IBM Wave for z/VM.
    [Show full text]
  • Guest OS Compatibility Guide
    Guest OS Compatibility Guide Guest OS Compatibility Guide Last Updated: September 29, 2021 For more information go to vmware.com. Introduction VMware provides the widest virtualization support for guest operating systems in the industry to enable your environments and maximize your investments. The VMware Compatibility Guide shows the certification status of operating system releases for use as a Guest OS by the following VMware products: • VMware ESXi/ESX Server 3.0 and later • VMware Workstation 6.0 and later • VMware Fusion 2.0 and later • VMware ACE 2.0 and later • VMware Server 2.0 and later VMware Certification and Support Levels VMware product support for operating system releases can vary depending upon the specific VMware product release or update and can also be subject to: • Installation of specific patches to VMware products • Installation of specific operating system patches • Adherence to guidance and recommendations that are documented in knowledge base articles VMware attempts to provide timely support for new operating system update releases and where possible, certification of new update releases will be added to existing VMware product releases in the VMware Compatibility Guide based upon the results of compatibility testing. Tech Preview Operating system releases that are shown with the Tech Preview level of support are planned for future support by the VMware product but are not certified for use as a Guest OS for one or more of the of the following reasons: • The operating system vendor has not announced the general availability of the OS release. • Not all blocking issues have been resolved by the operating system vendor.
    [Show full text]
  • Full Circle Magazine #160 Contents ^ Full Circle Magazine Is Neither Affiliated With,1 Nor Endorsed By, Canonical Ltd
    Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #160 - August 2020 RREEVVIIEEWW OOFF GGAALLLLIIUUMMOOSS 33..11 LIGHTWEIGHT DISTRO FOR CHROMEOS DEVICES full circle magazine #160 contents ^ Full Circle Magazine is neither affiliated with,1 nor endorsed by, Canonical Ltd. HowTo Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Python p.18 Linux News p.04 Podcast Production p.23 Command & Conquer p.16 Linux Loopback p.39 Everyday Ubuntu p.40 Rawtherapee p.25 Ubuntu Devices p.XX The Daily Waddle p.42 My Opinion p.XX Krita For Old Photos p.34 My Story p.46 Letters p.XX Review p.50 Inkscape p.29 Q&A p.54 Review p.XX Ubuntu Games p.57 Graphics The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license. Full Circle magazine is entirely independent of Canonical, the sponsor of the Ubuntu projects, and the views and opinions in the magazine should in no way be assumed to have Canonical endorsement.
    [Show full text]
  • Considerations for the SDP Operating System
    DocuSign Envelope ID: E376CF60-053D-4FF0-8629-99235147B54B Considerations for the SDP Operating System Document Number .......SDP Memo 063 ………………………………………………………………… Document Type .. MEMO ……………………………………………………………………… ………… Revision . 01 ………………………………………………………………………… ………… ………… Author . N. Erdödy, R. O’Keefe ………………………………………………………………………… … Release Date ... .2018-08-31 …………………………………………………………………………… … Document Classification ... Unrestricted ………………………………………………………………… Status ... Draft ………………………………………………………………………………………… … Document No: 063 Unrestricted Revision: 01 Author: N. Erdödy ​ Release Date: 2018-08-31 Page 1 of 56 DocuSign Envelope ID: E376CF60-053D-4FF0-8629-99235147B54B Lead Author Designation Affiliation Nicolás Erdödy SDP Team Open Parallel Ltd. NZ SKA Alliance (NZA). Signature & Date: 10/21/2018 8:19:36 PM PDT With contributions and reviews Affiliation greatly appreciated from Dr. Richard O’Keefe SDP Team, NZA University of Otago - Open Parallel (NZA) Dr. Andrew Ensor Director, NZA AUT University (NZA) Piers Harding SDP Team, NZA Catalyst IT (NZA) Robert O’Brien Systems Engineer / Security Independent Anonymous Reviewer CEng (UK), CPEng (NZ) Manager, NZ Govt ORGANISATION DETAILS Name Science Data Processor Consortium Address Astrophysics Cavendish Laboratory JJ Thomson Avenue Cambridge CB3 0HE Website http://ska-sdp.org Email [email protected] Document No: 063 Unrestricted Revision: 01 Author: N. Erdödy ​ Release Date: 2018-08-31 Page 2 of 56 DocuSign Envelope ID: E376CF60-053D-4FF0-8629-99235147B54B 1. SDP Memo Disclaimer The SDP memos are designed to allow the quick recording of investigations and research done by members of the SDP. They are also designed to raise questions about parts of the SDP design or SDP process. The contents of a memo may be the opinion of the author, not the whole of the SDP. Acknowledgement: The authors wish to acknowledge the inputs, corrections and continuous support from the NZA Team Members Dr.
    [Show full text]
  • 2014 Graduates of Iowa State University!
    Dear Iowa State University Graduates and Guests: Congratulations to all of the Spring 2014 graduates of Iowa State University! We are very proud of you for the successful completion of your academic programs, and we are pleased to present you with a degree from Iowa State University recognizing this outstanding achievement. We also congratulate and thank everyone who has played a role in the graduates’ successful journey through this university, and we are delighted that many of you are here for this ceremony to share in their recognition and celebration. We have enjoyed having you as students at Iowa State, and we thank you for the many ways you have contributed to our university and community. I wish you the very best as you embark on the next part of your life, and I encourage you to continue your association with Iowa State as part of our worldwide alumni family. Iowa State University is now in its 156th year as one of the nation’s outstanding land-grant universities. We are very proud of the role this university has played in preparing the future leaders of our state, nation and world, and in meeting the needs of our society through excellence in education, research and outreach. As you graduate today, you are now a part of this great tradition, and we look forward to the many contributions you will make. I hope you enjoy today’s commencement ceremony. We wish you all continued success! Sincerely, Steven Leath President of the University TABLE OF CONTENTS The Official University Mace ...........................................................................................................................3
    [Show full text]
  • Oracle® Linux 7 Release Notes for Oracle Linux 7
    Oracle® Linux 7 Release Notes for Oracle Linux 7 E53499-20 March 2021 Oracle Legal Notices Copyright © 2011,2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Navigating Linux Systems
    Navigating Linux Systems Amit Jain, Luke Hindman, and John Rickerd Last Revised: August 6, 2018 c 2018 Amit Jain, Luke Hindman, and John Rickerd Acknowledgments This material is based upon work supported by the National Science Foundation under Award No. 1623189. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation The authors would especially like to thank Ariel Marvasti and Phil Gore for their proof reading and suggestions. 2 Contents 1 Departmental Computing Facilities 7 2 Whom to ask for help? 8 3 Beginner’s Guide 9 3.1 Getting started ....................................... 10 3.1.1 Logging in ...................................... 10 3.1.2 Changing your password .............................. 10 3.1.3 Logging out of the system ............................. 10 3.2 Some basics ......................................... 10 3.2.1 Correcting your typing ............................... 10 3.2.2 Special keys ..................................... 10 3.2.3 Case sensitivity ................................... 11 3.2.4 How to find information? ............................. 11 3.3 Files and directories .................................... 13 3.3.1 File names ..................................... 13 3.3.2 Creating files and directories ........................... 14 3.3.3 Your current directory ............................... 14 3.3.4 Changing directories ................................ 14 3.3.5 Your home directory ................................ 14 3.3.6 Special directories ................................. 14 3.3.7 Special files ..................................... 15 3.3.8 Viewing the contents of a text file ........................ 15 3.3.9 Listing files and directories ............................ 15 3.3.10 Wild-cards and file name completion ....................... 16 3.3.11 Copying files or directories ............................ 16 3.3.12 Renaming a file or directory: ..........................
    [Show full text]
  • Package Network Model: a Way to Capture Holistic Structural Features of Open-Source Operating Systems
    S S symmetry Article Package Network Model: A Way to Capture Holistic Structural Features of Open-Source Operating Systems Jing Wang *, Kedi Zhang, Xiaoli Sun, Yusong Tan, Qingbo Wu and Quanyuan Wu College of Computer, National University of Defense Technology, Changsha 410073, China; [email protected] (K.Z.); [email protected] (X.S.); [email protected] (Y.T.); [email protected] (Q.W.); [email protected] (Q.W.) * Correspondence: [email protected] Received: 11 December 2018; Accepted: 29 January 2019; Published: 1 February 2019 Abstract: Open-source software has become a powerful engine for the development of the software industry. Its production mode, which is based on large-scale group collaboration, allows for the rapid and continuous evolution of open-source software on demand. As an important branch of open-source software, open-source operating systems are commonly used in modern service industries such as finance, logistics, education, medical care, e-commerce and tourism, etc. The reliability of these systems is increasingly valued. However, a self-organizing and loosely coupled development approach complicates the structural analysis of open-source operating system software. Traditional methods focus on analysis at the local level. There is a lack of research on the relationship between internal attributes and external overall characteristics. Consequently, conventional methods are difficult to adapt to complex software systems, especially the structural analysis of open-source operating system software. It is therefore of great significance to capture the holistic structure and behavior of the software system. Complex network theory, which is adequate for this task, can make up for the deficiency of traditional software structure evaluation methods that focus only on local structure.
    [Show full text]
  • Developing Operating System and Basic Software by Open Source Model in China
    Developing Operating System and Basic Software by Open Source Model in China Chen Yue China OSS Promotion Union CSIP – OSS Center We are… China OSS Promotion union www.copu.org.cn 2 COPU Mission • International communication • standardization Technology Community • Project support • Open technology training • OSS IP service OSS • Community support Service • Media support • Business support Industry Training China OSS Promotion Promotion Union 3 COPU Mission 4 OSS Developing Status in China uIndustry environment for OSS become better in China u OSS Industry Scale is increasingly growing, Open Source technologies are applied in more and more area. u OSS policy for Chinese IT enterprises is clearer, and more active for OSS contribution. uMore international corporation in OSS industry uSome new OSS public service for companies and communities 5 OSS Projects from China Dorado7 OceanBase fastDFS 6 Industry Environment of Chinese Desktop Operating System and Basic Software u Government policy is beneficial to OS and basic software developing u OSS and open technology are applied, and convenient for Chinese developing OSS and basic software u Some Chinese companies have power to cover and developing OS Opportunities 7 Industry Environment of Chinese Desktop Operating System and Basic Software uMany OS products, but lack for key technologies and features u Lack for a long-term talent strategy for IT technology experts and developers uLack for business support from big companies uLack for robust industry ecosystem for OS development Challenges 8
    [Show full text]
  • Which Linux Distribution? Difficulty in Choosing?
    Which Linux distribution? Difficulty in choosing? Ver 190916 www.ubuntutor.com Twitter @LaoYa14 Contents Page Contents 3 That's enough 4 At first 5 At first little about Linux world 6 Quick start guide for choosing the right distro for beginners 7 Basic information 8 ”Linux tree” 9 Basic information 10 Questions on the web site 11 Distros 12 App store 13 Ubuntu 16.04 and 18.04 14 Ubuntu MATE 15 Lubuntu 16 Ubuntu Budgie 17 Kubuntu 18 Xubuntu 19 Linux Mint 20 Zorin 21 MX Linux 22 Pepermint 23 Deepin 24 Arch Linux 25 Manjaro 26 Ubuntu Kylin 27 Ubuntu Studio 28 Kali Linux 29 Edubuntu 30 Desktop environments for Linux 31 File manager NEMO 32 File manager NAUTILUS 33 Installing Ubuntu live USB (test drive) That's enough When laptop is old and there is Windows XP, what to do? You can install Ubuntu Mate on your old laptop and keep at the same time Windows XP too, if you like XP. Or you can buy a tiny new laptop about 200-300 €/$ and change Windows 10 to Ubuntu. It works! I have made both about three years ago, and I haven't used Windows since then. My own laptop is cheap HP Stream 4 MB/32 GB. When I was studying Ubuntu, I noticed that simple beginner's guide books were not available. So, I did a guide book. I also created a website and named it www.ubuntutor.com. It currently includes Ubuntu 16.04 and 18.04 tutorials. And this guide is third one.
    [Show full text]