UNIX – LINUX: Kernels, Distributions & Security Μάντζιος Παναγιώτης

Total Page:16

File Type:pdf, Size:1020Kb

UNIX – LINUX: Kernels, Distributions & Security Μάντζιος Παναγιώτης ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ ΣΧΟΛΗ ΘΕΤΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΔΙΑΤΜΗΜΑΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΜΕΤΑΠΤΥΧΙΑΚΩΝ ΣΠΟΥΔΩΝ «ΠΛΗΡΟΦΟΡΙΚΗ ΚΑΙ ΥΠΟΛΟΓΙΣΤΙΚΗ ΒΙΟΙΑΤΡΙΚΗ» UNIX – LINUX: Kernels, distributions & security Μάντζιος Παναγιώτης ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Υπεύθυνος Λάμψας Πέτρος Λαμία, 2016 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ 3 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ ΣΧΟΛΗ ΘΕΤΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΔΙΑΤΜΗΜΑΤΙΚΟ ΜΕΤΑΠΤΥΧΙΑΚΟ ΠΡΟΓΡΑΜΜΑ ΠΛΗΡΟΦΟΡΙΚΗ ΚΑΙ ΥΠΟΛΟΓΙΣΤΙΚΗ ΒΙΟΙΑΤΡΙΚΗ ΚΑΤΕΥΘΥΝΣΗ: «ΠΛΗΡΟΦΟΡΙΚΗ ΜΕ ΕΦΑΡΜΟΓΕΣ ΣΤΗΝ ΑΣΦΑΛΕΙΑ, ΔΙΑΧΕΙΡΙΣΗ ΜΕΓΑΛΟΥ ΟΓΚΟΥ ΔΕΔΟΜΕΝΩΝ ΚΑΙ ΠΡΟΣΟΜΟΙΩΣΗ» UNIX – LINUX: Kernels, distributions & security Μάντζιος Παναγιώτης ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Επιβλέπων Λάμψας Πέτρος Λαμία, 2016 4 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ «Υπεύθυνη ∆ήλωση µη λογοκλοπής και ανάληψης προσωπικής ευθύνης» Με πλήρη επίγνωση των συνεπειών του νόµου περί πνευµατικών δικαιωµάτων, και γνωρίζοντας τις συνέπειες της λογοκλοπής, δηλώνω υπεύθυνα και ενυπογράφως ότι η παρούσα εργασία µε τίτλο «UNIX – LINUX: Kernels, distributions & security» αποτελεί προϊόν αυστηρά προσωπικής εργασίας και όλες οι πηγές από τις οποίες χρησιµοποίησα δεδοµένα, ιδέες, φράσεις, προτάσεις ή λέξεις, είτε επακριβώς (όπως υπάρχουν στο πρωτότυπο ή µεταφρασµένες) είτε µε παράφραση, έχουν δηλωθεί κατάλληλα και ευδιάκριτα στο κείµενο µε την κατάλληλη παραποµπή και η σχετική αναφορά περιλαµβάνεται στο τµήµα των βιβλιογραφικών αναφορών µε πλήρη περιγραφή. Αναλαµβάνω πλήρως, ατοµικά και προσωπικά, όλες τις νοµικές και διοικητικές συνέπειες που δύναται να προκύψουν στην περίπτωση κατά την οποία αποδειχθεί, διαχρονικά, ότι η εργασία αυτή ή τµήµα της δεν µου ανήκει διότι είναι προϊόν λογοκλοπής. Ο ∆ΗΛΩΝ Μάντζιος Παναγιώτης Ηµεροµηνία 18/07/2016 Υπογραφή 5 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ UNIX – LINUX: Kernels, distributions & security Μάντζιος Παναγιώτης Τριμελής Επιτροπή: Λάμψας Πέτρος (επιβλέπων) Λουκόπουλος Θανάσης Αντωνής Κωνσταντίνος 6 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ “UNIX is simple. It just takes a genius to understand its simplicity.” Dennis Ritchie “The Linux philosophy is 'Laugh in the face of danger'. Oops. Wrong One. 'Do it yourself'. Yes, that's it.” Linus Torvalds Copyright © Μάντζιος Παναγιώτης 2016 Με επιφύλαξη παντός δικαιώµατος. All rights reserved. 7 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ Περίληψη Τα λειτουργικά συστήµατα του Linux και Unix χρησιµοποιούνται ευρέως από ένα µεγάλο αριθµό χρηστών, επιχειρήσεων αλλά και Server ανά τον κόσµο. Όµως πώς προέκυψαν τα συστήµατα αυτά έτσι όπως τα γνωρίζουµε σήµερα; Τελικά τι είναι ένα λειτουργικό σύστηµα; Είναι ο πυρήνας; Είναι τα προγράµµατα που έχουµε εγκαταστήσει; Είναι οι διάφορες συνιστώσες και διεργασίες; Είναι το γραφικό περιβάλλον ή µήπως η γραµµή εντολών; Θα λέγαµε ότι είναι όλα τα παραπάνω και πολύ περισσότερα. Είναι κάθε στοιχείο που είναι εγκατεστηµένο και αλληλεπιδρά µε τον πυρήνα. Είναι κάθε στοιχείο που µπορούµε να δούµε αλλά και κάθε στοιχείο το οποίο εκτελείται στο προσκήνιο. Είναι εκείνο που είναι υπεύθυνο για όλες τις εργασίες που του ανατίθενται και συνδυάζει πόρους, υλικό, εφαρµογές µε σκοπό την ευκολία της διεξαγωγής διαφόρων εργασιών. Μία από τις πιο σηµαντικές και καθοριστικές στιγµές στην ιστορία για την υλοποίηση των λειτουργικών συστηµάτων είναι εκείνη της δηµιουργίας της γλώσσας C. Αναπτύχθηκε στα εργαστήρια της Bell labs και αργότερα πάνω σε αυτή βασίστηκε το λειτουργικό σύστηµα Unix. Από εκεί και έπειτα έχουµε µία αλµατώδη ανάπτυξη των λειτουργικών συστηµάτων, τα οποία ουσιαστικά αποτελούνται από πολλές επιµέρους συνιστώσες έτσι ώστε να βοηθούν τον χρήστη στις εργασίες που θέλει να υλοποιήσει. Φτάσαµε όµως στο σηµείο όπου υπάρχουν τόσες πολλές εφαρµογές, τόσες πολλές διεργασίες, τόσοι πολλοί παράγοντες που επηρεάζουν την ασφάλεια των λειτουργικών συστηµάτων. Μπορούµε πράγµατι να είµαστε ασφαλείς κάτω από την οµπρέλα του λειτουργικού µας συστήµατος; Και αν όχι ποιες ενέργειες πρέπει να κάνουµε έτσι ώστε να έχουµε το επίπεδο ασφαλείας που χρειαζόµαστε; Υπάρχουν εργαλεία που µας παρέχουν προστασία; Ποιες εκδόσεις Linux και Unix είναι περισσότερο ασφαλείς και ποιες µπορούµε να παραµετροποιήσουµε; Μπορούµε να ελέγξουµε τον πυρήνα του Unix και του Linux έτσι ώστε να µας προστατεύει από ανεπιθύµητους εισβολείς; Σε όλα αυτά τα καίρια ερωτήµατα και σε πολύ περισσότερα, καλείται να απαντήσει η παρούσα διπλωµατική εργασία µέσα από µία διεξοδική έρευνα και αναζήτηση πληροφοριών. Αναλυτικότερα στην παρούσα διπλωµατική εργασία γίνονται αναφορές στα διάφορα στοιχεία και λειτουργίες των συστηµάτων καθώς και στην υποδοµή των πυρήνων που χρησιµοποιούν. Αναφερόµαστε στα στοιχεία που απαρτίζουν τα λειτουργικά συστήµατα και δίνονται λεπτοµέρειες σχετικά µε τις διάφορες διανοµές που υπάρχουν, ενώ παρουσιάζουµε διάφορες γνωστές ευπάθειες, όπως και τεχνικές αντιµετώπισης των διαφόρων κενών ασφαλείας. Συγκεκριµένα στο πρώτο κεφάλαιο παρατίθενται λεπτοµέρειες σχετικά µε την εξελικτική πορεία των λειτουργικών συστηµάτων, την γλώσσα προγραµµατισµού C η οποία αποτέλεσε και αποτελεί τον ακρογωνιαίο λίθο υλοποίησης των λειτουργικών συστηµάτων καθώς και την δοµή αυτών. Στο δεύτερο κεφάλαιο εµβαθύνουµε στο σύστηµα του Unix και των λειτουργιών του πυρήνα αλλά και στις διάφορες διανοµές που υπήρξαν και υπάρχουν. Ακόµη γίνεται σύγκριση των δύο λειτουργικών συστηµάτων (Linux – Unix) και παρουσιάζονται οι βασικές τους διαφορές. 8 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ Στο τρίτο κεφάλαιο ως επίκεντρο είναι το Linux, οι λόγοι δηµιουργίας του και οι διάφορες διανοµές. Επίσης γίνεται ανάλυση των διαφόρων ευπαθειών και των µέτρων προστασίας. Στο τέταρτο και τελευταίο κεφάλαιο εγκαθιστούµε την δηµοφιλή διανοµή slackware linux µε σκοπό την παραµετροποίησή της, έτσι ώστε να µας παρέχει ένα συγκεκριµένο επίπεδο ασφάλειας. Πραγµατοποιούµε ελέγχους µε συγκεκριµένα εργαλεία ανίχνευσης εισβολέων, εν προκειµένω να ανακαλύψουµε τυχόν κενά ασφαλείας, ανεπαρκείς ρυθµίσεις προστασίας του συστήµατος και τυχόν εισβολείς που έχουν καταφέρει να εισχωρήσουν στο σύστηµά µας. Με βάση τα αποτελέσµατα των εργαλείων ανίχνευσης γίνονται ενέργειες για την διασφάλιση της προστασίας του συστήµατος από ανεπιθύµητους εισβολείς. Τέλος γίνεται σύντοµη αναφορά στην νέα διανοµή Linux tales που παρουσιάζει ιδιαίτερο ενδιαφέρον σε θέµατα ασφαλείας και ανωνυµίας. 9 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ Abstract The operating systems of Linux and Unix are widely used by a large number of users, enterprises and Servers all over the world. Many questions are raised such as how these systems are emerged as we know them today? Eventually, what is an operating system? Is it the core? Are the programmes that have been installed? Are the various components and processes? Is the GUI or the command line? We would say that it is all these things and much more. It is each component installed that interacts with the kernel. Every element that we see and every element running in the foreground. It is the element which is responsible for all tasks assigned and it is combining resources, hardware, applications in order to carry out various tasks. One of the most important and defining moments in history for the implementation of operating systems is the creation of programming language C. This language is developed in Bell’s labs and later on it was the basis for Unix operating system. From later on there is a rapid development of operating systems, which essentially consists of many individual components so as to assist the user in the work he wants to implement. We have already reached the point where there are so many applications, so many processes, so many factors that affect the security of operating systems. Can we indeed be safe under the umbrella of our operating system? And if not what actions should we do so that we have the level of security we need? There are tools that provide us protection? What versions of Linux and Unix are more secure and which can we customize? Can we control the core of Unix and Linux so that it protects us from intruders? In all these critical questions and many more, this thesis is required to answer through an extensive research for further information. Specifically, in this thesis there are references to various components and functions of the systems and infrastructure of cores used. We make references to elements that make up the operating systems, and provide details on various distributions available, while
Recommended publications
  • Technical White Paper
    Uniform Driver Interface Introduction to UDI Version 1.0 Technical White Paper http://www.project-UDI.org Introduction to UDI Abstract The Uniform Driver Interface (UDI) allows device drivers to be portable across both hardware platforms and operating systems without any changes to the driver source. With the participation of multiple operating system (OS), platform and device hardware vendors, UDI is the first interface that is likely to achieve such portability on a wide scale. UDI provides an encapsulating environment for drivers with well-defined interfaces which isolate drivers from OS policies and from platform and I/O bus dependencies. This allows driver development to be totally independent of OS development. In addition, the UDI architecture insulates drivers from platform specifics such as byte-ordering, DMA implications, multi-processing, interrupt implementations and I/O bus topologies. The formal UDI specifications are currently available from the Project UDI web page (http://www.project-UDI.org). Introduction to UDI - Version 1.0 - 8/31/99 i Preface Copyright Notice Copyright © 1999 Adaptec, Inc; Compaq Computer Corporation; Hewlett-Packard Company; International Business Machines Corporation; Interphase Corporation; Lockheed Martin Corporation; The Santa Cruz Operation, Inc; SBS Technologies, Inc; Sun Microsystems (“copyright holders”). All Rights Reserved. This document and other documents on the Project UDI web site (www.project-UDI.org) are provided by the copyright holders under the following license. By obtaining, using and/or copying this document, or the Project UDI document from which this statement is linked, you agree that you have read, understood, and will comply with the following terms and conditions: Permission to use, copy, and distribute the contents of this document, or the Project UDI document from which this statement is linked, in any medium for any purpose and without fee or royalty is hereby granted, provided that you include all of the following on ALL copies of the document, or portions thereof, that you use: 1.
    [Show full text]
  • Oracle Solaris 11 Overview and Design Guide
    Oracle Solaris 11 Overview and Design Guide December 2016 (Edition 1.0) Fujitsu Limited Copyright 2012-2016 FUJITSU LIMITED Preface 1/2 Purpose - This document provides an overview of Oracle Solaris 11 and introduces the new functions. Audience - People who want to study Oracle Solaris 11 - People who already understand an overview of Oracle Solaris Notes - The contents of this document are based on Oracle Solaris 11.3. For the latest information on Oracle Solaris 11, see the manuals from Oracle. - Fujitsu M10 is sold as SPARC M10 Systems by Fujitsu in Japan. Fujitsu M10 and SPARC M10 Systems are identical products. Positioning of documents ⁃ Oracle Solaris 11 http://www.fujitsu.com/global/products/computing/servers/unix/sparc/downloads/documents/ Design Install Operate Oracle Solaris 11 Oracle Solaris 11 Implementation and Operations Guide Overview and Design Guide Oracle Solaris 11 Implementation and Operations Procedure Guide 1 Copyright 2012-2016 FUJITSU LIMITED Preface 2/2 Descriptions in this document - The section numbers of commands are omitted. Example: ⁃ ls(1) => ls command ⁃ shutdown(1M) => shutdown command - The following table lists terms that may be abbreviated. Abbreviation Formal Name Solaris Oracle Solaris Solaris zone Oracle Solaris zone Oracle VM Oracle VM Server for SPARC 2 Copyright 2012-2016 FUJITSU LIMITED Contents 1. Overview of Oracle Solaris 11 2. Installation of Oracle Solaris 11 3. Image Packaging System (IPS) - Oracle Solaris Package Management - 4. ZFS - Oracle Solaris File System - 5. Boot Environment (BE) - Oracle Solaris Boot Environment - 6. Virtualization of Oracle Solaris - Oracle Solaris Zones - 7. Security Appendix 3 Copyright 2012-2016 FUJITSU LIMITED 1.
    [Show full text]
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • An Introduction to the X Window System Introduction to X's Anatomy
    An Introduction to the X Window System Robert Lupton This is a limited and partisan introduction to ‘The X Window System’, which is widely but improperly known as X-windows, specifically to version 11 (‘X11’). The intention of the X-project has been to provide ‘tools not rules’, which allows their basic system to appear in a very large number of confusing guises. This document assumes that you are using the configuration that I set up at Peyton Hall † There are helpful manual entries under X and Xserver, as well as for individual utilities such as xterm. You may need to add /usr/princeton/X11/man to your MANPATH to read the X manpages. This is the first draft of this document, so I’d be very grateful for any comments or criticisms. Introduction to X’s Anatomy X consists of three parts: The server The part that knows about the hardware and how to draw lines and write characters. The Clients Such things as terminal emulators, dvi previewers, and clocks and The Window Manager A programme which handles negotiations between the different clients as they fight for screen space, colours, and sunlight. Another fundamental X-concept is that of resources, which is how X describes any- thing that a client might want to specify; common examples would be fonts, colours (both foreground and background), and position on the screen. Keys X can, and usually does, use a number of special keys. You are familiar with the way that <shift>a and <ctrl>a are different from a; in X this sensitivity extends to things like mouse buttons that you might not normally think of as case-sensitive.
    [Show full text]
  • SCO Openserver 6 Definitive 2018 – Release Notes – December 2017
    SCO OpenServer 6 Definitive 2018 – Release Notes – December 2017 SCO OpenServer® 6 Definitive 2018 RELEASE NOTES About this Release SCO OpenServer® 6 Definitive 2018 is a new release of the OpenServer 6 operating system from Xinuos, which includes OpenServer 6, its maintenance packs and all OpenServer 6.0.0V features as well as additional functionality and maintenance. SCO OpenServer 6 Definitive 2018, denoted as Definitive 2 Maintenance 1 (D2M1), is a successor release to OpenServer 6 as well as a successor release to OpenServer 6.0.0V. These Release Notes accompany the SCO OpenServer 6 Definitive 2018 GETTING STARTED GUIDE (December 2017) which is also available for free download at the Xinuos web site portal. Revisions Revision Date Description 00 12/2015 Initial document release – OpenServer6D2M0. 01 12/2017 Update document release – OpenServer6D2M1. Page 1 of 14 Xinuos, Inc. – All Rights Reserved – Copyright © 2017 SCO OpenServer 6 Definitive 2018 – Release Notes – December 2017 Contents of these Release Notes Media ..................................................................................................................................................... 2 Supported Platforms ........................................................................................................................... 2 What's New in this Release ................................................................................................................ 4 Highlights ........................................................................................................................................................
    [Show full text]
  • Tanium™ Client Deployment Guide
    Tanium™ Client Deployment Guide Version 6.0.314.XXXX February 05, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. Tanium is a trademark of Tanium, Inc. in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners. © 2018 Tanium Inc. All rights reserved. © 2018 Tanium Inc. All Rights Reserved Page 2 Table of contents Overview 8 What is the Tanium Client? 8 Registration 9 Client peering 9 File distribution 11 Prerequisites 14 Host system requirements 14 Admin account 15 Network connectivity and firewall 16 Host system security exceptions 16 Deployment options summary 18 Using the Tanium Client Deployment Tool 21 Methods 21 Before you begin 21 Install the Client Deployment Tool 23 Deploy the Tanium Client 25 Check for Tanium Client updates 32 Troubleshooting 33 Logs 34 Advanced settings 34 Deploying the Tanium Client to Windows endpoints 36 Step 1: Create the installer 36 Step 2: Execute the installer 37 © 2018 Tanium Inc.
    [Show full text]
  • When C2 Is on the PO
    In the Public Interest Doing Business with Governments When C2 is on the PO If you sell to the federal government, Orange Book was issued first in August 1983 and in December 1985 was reissued there is a good chance that your as a Department of Defense standard product will have to run on a (DOD 5200.28-STD). The Orange Book then became refer- trusted system. enced as a mandatory requirement for operating systems delivered to DOD. Once that happened, anyone who sold an operating system to DOD had to implement a trusted system. This forced firms, such as DEC, Hewlett-Packard, IBM onsider this scenario: Your firm’s Taken together, there are seven levels (in and others, to develop trusted versions of marketing efforts have finally suc- decreasing order of security): A1, B3, B2, their respective operating systems. This Cceeded in penetrating a large fed- B1, C2, C1 and D. The technical attribut- concept has moved beyond DOD, and eral agency. The potential for significant es of each are detailed in the Orange currently many civilian agencies, such as sales from this organization is large. Just Book, which is described below. the IRS, the Department of Agriculture, as you begin to count your revenue (or U.S. Customs and others, require a trust- your commission check if you’re the sales By the Book ed operating system on many if not all of person for this account), your prospect The National Computer Security Center their operating system purchases. While asks, “Your software does run on a C2 sys- (NCSC) evaluates the security features of this often does not include desktop oper- tem, doesn’t it?” trusted products against established tech- ating systems such as DOS and Windows, You answer, “Huh?” This might not be nical standards and criteria.
    [Show full text]
  • Modelsim SE Tutorial T-3
    ModelSim® SE Tutorial Version 5.6d Published: 6/Aug/02 The world’s most popular HDL simulator T-2 ModelSim /VHDL, ModelSim /VLOG, ModelSim /LNL, and ModelSim /PLUS are produced by Model Technology™ Incorporated. Unauthorized copying, duplication, or other reproduction is prohibited without the written consent of Model Technology. The information in this manual is subject to change without notice and does not represent a commitment on the part of Model Technology. The program described in this manual is furnished under a license agreement and may not be used or copied except in accordance with the terms of the agreement. The online documentation provided with this product may be printed by the end-user. The number of copies that may be printed is limited to the number of licenses purchased. ModelSim is a registered trademark and ChaseX and TraceX are trademarks of Model Technology Incorporated. Model Technology is a trademark of Mentor Graphics Corporation. PostScript is a registered trademark of Adobe Systems Incorporated. UNIX is a registered trademark of AT&T in the USA and other countries. FLEXlm is a trademark of Globetrotter Software, Inc. IBM, AT, and PC are registered trademarks, AIX and RISC System/6000 are trademarks of International Business Machines Corporation. Windows, Microsoft, and MS-DOS are registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of the Open Software Foundation, Inc. in the USA and other countries. SPARC is a registered trademark and SPARCstation is a trademark of SPARC International, Inc. Sun Microsystems is a registered trademark, and Sun, SunOS and OpenWindows are trademarks of Sun Microsystems, Inc.
    [Show full text]
  • Solaris 10 End of Life
    Solaris 10 end of life Continue Oracle Solaris 10 has had an amazing OS update, including ground features such as zones (Solaris containers), FSS, Services, Dynamic Tracking (against live production operating systems without impact), and logical domains. These features have been imitated in the market (imitation is the best form of flattery!) like all good things, they have to come to an end. Sun Microsystems was acquired by Oracle and eventually, the largest OS known to the industry, needs to be updated. Oracle has set a retirement date of January 2021. Oracle indicated that Solaris 10 systems would need to raise support costs. Oracle has never provided migratory tools to facilitate migration from Solaris 10 to Solaris 11, so migration to Solaris has been slow. In September 2019, Oracle decided that extended support for Solaris 10 without an additional financial penalty would be delayed until 2024! Well its March 1 is just a reminder that Oracle Solaris 10 is getting the end of life regarding support if you accept extended support from Oracle. Combined with the fact gdpR should take effect on May 25, 2018 you want to make sure that you are either upgraded to Solaris 11.3 or have taken extended support to obtain any patches for security issues. For more information on tanningix releases and support dates of old and new follow this link ×Sestive to abort the Unix Error Operating System originally developed by Sun Microsystems SolarisDeveloperSun Microsystems (acquired by Oracle Corporation in 2009)Written inC, C'OSUnixWorking StateCurrentSource ModelMixedInitial release1992; 28 years ago (1992-06)Last release11.4 / August 28, 2018; 2 years ago (2018-08-28)Marketing targetServer, PlatformsCurrent: SPARC, x86-64 Former: IA-32, PowerPCKernel typeMonolithic with dynamically downloadable modulesDefault user interface GNOME-2-LicenseVariousOfficial websitewww.oracle.com/solaris Solaris is the own operating system Of Unix, originally developed by Sunsystems.
    [Show full text]
  • Solaris 10 Install Manual.Pdf
    Solaris 10 Install Manual The Oracle Solaris Studio 12.4 Installation Guide provides instructions for It also provides instructions for installing the required Oracle Solaris 10 patches. User Manual. Version 5.0.4 Installing VirtualBox and extension packs. 12.9.2 VM aborts with out of memory errors on Solaris 10 hosts.... 243. The Solaris 10 OS is shipped with the CD and DVD media and documentation that you will need to install the Solaris OS for both SPARC and x86 platforms. Other product names mentioned in this manual may be trademarks or registered 10. Configure the 7820 for the appropriate interface configuration settings.*. Transitioning From Oracle Solaris 10 to Oracle Solaris 11.2 l Describes multiple Using the Oracle Solaris 11 Image Packaging System (IPS) to Install. Amanda client installation must be performed as super user (in other gunzip ZMANae-client-3.3.7-i386-pc-solaris2.10.pkg.gz. Solaris 10 Install Manual Read/Download Remove this template once cleanup is complete. For Solaris, one can do a native installation. Solaris 10 has "premier support" till January 2018 (OLSP p. 30). Solaris 10 and 11 Sparc distributions. pkgadd -d./TaniumClient-6.0.314.1321-SunOS-5.10-sparc.pkg. Solaris 10 and Solaris 11: pkgadd -d get.opencsw.org/now /opt/csw/bin/pkgutil -U /opt/csw/bin/pkgutil -a vim /opt/csw/bin/pkgutil -y -i vim /opt/csw/bin/vim. 3 FreeBSD, 4 MacOS, 5 Solaris, 6 Windows, 7 Alternative to manual installation Solaris 10: PostgreSQL 8.2.1 on Solaris 10 – Deployment Guidelines by Chris.
    [Show full text]
  • Tms320c3x Workstation Emulator Installation Guide
    TMS320C3x Workstation Emulator Installation Guide 1994 Microprocessor Development Systems Printed in U.S.A., December 1994 2617676-9741 revision A TMS320C3x Workstation Emulator Installation Guide SPRU130 December 1994 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or service without notice, and advises its customers to obtain the latest version of relevant information to verify, before placing orders, that the information being relied on is current. TI warrants performance of its semiconductor products and related software to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. Certain applications using semiconductor products may involve potential risks of death, personal injury, or severe property or environmental damage (“Critical Applications”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, INTENDED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT APPLICATIONS, DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. Inclusion of TI products in such applications is understood to be fully at the risk of the customer. Use of TI products in such applications requires the written approval of an appropriate TI officer. Questions concerning potential risk applications should be directed to TI through a local SC sales offices. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards should be provided by the customer to minimize inherent or procedural hazards.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]