Adu Software E-Mail Client

Total Page:16

File Type:pdf, Size:1020Kb

Adu Software E-Mail Client ADU SOFTWARE Berita | Ulasan | Adu Software | Utama | Bisnis | Apa Sih Sebenarnya... | Tutorial Perbandingan Enam E-mail Client Adu Software Noprianto [email protected] E-mail Client IINDENDEKKSS E-MAIL CLIENT Evolution 1.4.6 27 Kmail 1.6.2 27 Mozilla Mail 1.6 28 Mozilla Thunderbird 0.5 28 Sylpheed 0.9.10 claws 29 Balsa 2.0.16 29 Kriteria: Kami memiliki empat kriteria dalam “Adu Software” kali ini. Yang pertama-tama aman dahulu, pengirim surat dan pe- memperhatikan fungsi e-mail client-nya dan adalah fungsionalitas dengan porsi 40%. nyedia layanan mungkin tidak akan integrasi contact-nya. Kami berpendapat bahwa setiap e-mail cli- pernah membayangkan bahwa wak- Banyak hal menarik yang terjadi sela- ent harus mampu menyajikan fungsionalitas Z tu berhari-hari yang dibutuhkan dalam pe- ma pengujian. Kasus yang paling menarik yang baik kepada penggunanya. Mudah, in- ngiriman surat kini dapat dipersingkat men- barangkali adalah lahirnya Thunderbird. dah, dan banyak fitur aneh, kalau tidak bisa jadi beberapa detik, dengan kepastian sampai Thunderbird berada pada urutan ketiga, mengirim e-mail dan attachment dengan sangat besar dan dapat dienkrip. di bawah Evolution, sang pemenang dan baik, tentunya agak aneh. E-mail, suatu terobosan teknologi yang lu- Kmail. Skor yang didapat Thunderbird rupa- Kriteria kedua adalah UI. Tidak semua ar biasa. Beberapa negara bahkan sudah tidak nya hanya berbeda 0.01 poin dengan Kmail. pengguna e-mail client adalah peminat lagi menggunakan teknologi store and forward Bandingkan kenyataan ini dengan umur komputer. Dan, UI yang bagus menjadi pen- SMS dan menggantikannya dengan e-mail. Thunderbird yang masih begitu muda. ting karenanya. Kami memberikan porsi Dari sisi client, pengguna mengakses e- Thunderbird, suatu fenomena ajaib dalam 30% untuk UI. mail-nya, setidaknya kita mengenal: webmail peperangan di dunia software. Dengan su- Fitur tambahan (20%) menjadi kriteria dan e-mail yang diakses dengan e-mail cli- karela pengguna Mozilla merasa wajib untuk ketiga. Selain dari fungsionalitas utama, ent. Pada webmail, pengguna mengakses e- meninggalkan Mozilla Mail dan berpindah e-mail client yang memiliki fitur tambahan mail menggunakan web browser. Web brows- ke Thunderbird. Cerita ini bisa Anda temu- akan mendapat nilai tambah yang cukup er tersebut lalu menampilkan interface bagi kan di cukup banyak studi kasus di Internet. baik. Evolution menambahkan beberapa penggunanya untuk bekerja dengan e-mail. Lahirnya Thunderbird sendiri saja sudah poin ke dalam skor karena beberapa fitur Cara mengakses e-mail mempergunakan cukup mengagumkan. Mozilla Foundation tambahannya. e-mail client memiliki sejumlah kelebihan membuktikan fleksibilitasnya sebagai foun- Kriteria terakhir adalah dokumentasi. seperti fleksibel dan penggunanya dapat me- dation yang sudah cukup besar dan sukses. Tidak semua pengguna langsung memaha- nikmati sejumlah fitur, paling tidak interak- Bahwa pasar membutuhkan aplikasi yang le bih mi penggunaan suatu e-mail client. Dan, do- tivitas yang baik. Cara yang satu ini memang ramping dan fokus, bukan gemuk dan lamban kumentasi memiliki peran cukup penting di juga memiliki kekurangan, seperti cukup ter- seperti Mozilla, dimengerti dengan baik oleh sini. Kami memberikan porsi 10%. gantung dengan desktop yang digunakan. komunitas ini. Maka, lahirlah Firefox—seke- Dalam “Adu Software” kali ini, kita mem- jap berhasil meraup begitu banyak donasi dan perbandingkan berbagai e-mail client yang popularitas—dan Thunderbird. saat ini sangat, mulai, atau masih populer. Siapa saja sepertinya harus tanggap de- Dari sekian banyak pilihan, akhirnya kami ngan perubahan. Begitu juga dengan kantor mencomot Evolution, Kmail, Mozilla-Mail, pos, yang apabila tidak meningkatkan ser- Thunderbird, Sylpheed, dan Balsa. Evolution visnya dengan nilai tambah yang menggoda mungkin berlebihan apabila disebut hanya user, suatu saat pengiriman surat kertas akan sebagai e-mail client, namun, kami hanya menjadi hal yang sudah tidak populer. 26 INFOLINUX 04/2005 www.infolinux.web.id Berita | Ulasan | Adu Software | Utama | Bisnis | Apa Sih Sebenarnya... | Tutorial ADU SOFTWARE Perbandingan Enam E-mail Client EMAIL CLIENT EMAIL CLIENT Evolution 1.4.6 Kmail 1.6.2 Spesifikasi Software Spesifikasi Software Pembuat Ximian <http://www.ximian.com> Pembuat Tim Kmail <http://kmail.kde.org> Situs http://www.ximian.com/products/evolution/ Situs http://kmail.kde.org Lisensi GPL Lisensi GPL Harga Gratis Harga Gratis Dependensi X, GNOME Dependensi X, KDE System • CPU setara Pentium III System • CPU setara Pentium III Requirement • RAM sebesar 128 MB Requirement • RAM sebesar 128 MB • Ruang kosong harddisk sebesar 30 MB • Ruang kosong harddisk sebesar 25 MB ejak dahulu kala, Evolution, dapat dipenuhi dengan baik mail adalah juara kedua Fungsionalitas dasar dapat Stelah berusaha mengha- oleh Evolution. Begitu juga de- Kdalam “Adu Software” kali dipenuhi dengan baik. Kmail dirkan e-mail client kelas tinggi ngan pernak-pernik tambahan- ini. Kmail adalah e-mail client juga datang dengan berbagai yang bisa tampil dan memiliki nya. Semenjak Novell melepas yang luar biasa untuk desktop fitur yang jauh melebihi tugas- fungsi yang sama atau melebi- konektor ke Exchange di bawah KDE. Integrasinya dengan KDE nya sebagai e-mail client. Kami hi e-mail client populer seperti GPL, produk ini kian lengkap dan kehadirannya sebagai part te rus terang sangat bangga de- Outlook misalnya. Dan, saat ini, dan menggoda dengan hadirnya Kontact semakin mengukuhkan ngan fitur dan kelengkapan tahunan kemudian, Evolution konektor ini. posisinya sebagai e-mail client yang dimilikinya. benar-benar mewujudkan cita- Semua fungsionalitas dan fi- paling andal di dunia KDE. Bagi pengguna yang masih citanya. tur tambahannya disajikan dalam Permasalahan user inter- awam, Anda selalu bisa mengan- Dalam “Adu Software” interface yang ramah. Evolution face, tentunya sudah tidak per- dalkan dokumentasinya yang yang kami tampilkan kali ini, benar-benar luar biasa sebagai e- lu dipertanyakan lagi. KDE cukup lengkap dari e-mail cli- Evolution berhasil duduk se- mail client plus. mendapat skor cukup tinggi. ent ini. bagai juara pertama, menga- Dokumentasi 10% Hanya sayangnya, ada satu Dokumentasi 10% lahkan saingan terdekatnya, User interface kelemahan yang bagi sebagian User interface 30% Fitur 30% Fitur Kmail. Hal ini ditunjukkan tambahan 20% pengguna mungkin merupa- tambahan 20% dengan selisih poin kurang leb- kan kelebihan: menu yang ter- ih 0,9. lalu lengkap dan pernak-pernik Evolution datang dengan Fungsionalitas 40% window utama yang seharusnya Fungsionalitas 40% banyak fasilitas selain e-mail. Hasil Pengujian bisa dikurangi. Hasil Pengujian Untuk adilnya, kami mengang- User Interface 9,6 Apabila ingin merebut se- User Interface 9,5 gapnya sebagai fitur, kecuali ad- Fungsionalitas 9,5 dikit saja bagian kue sistem Fungsionalitas 9,5 Fitur Tambahan 9,8 Fitur Tambahan 9,5 dress book, yang kami anggap se- Dokumentasi 9,3 ope rasi desktop yang selama Dokumentasi 9,3 bagai fungsionalitas dasar. ini dikuasai oleh Windows, ke- Rating Rating Secara umum, fungsio- 9,6 sederhanaan harus senantiasa 9,5 nalitas dasar kegiatan e-mail diperhatikan. www.infolinux.web.id INFOLINUX 04/2005 27 ADU SOFTWARE Berita | Ulasan | Adu Software | Utama | Bisnis | Apa Sih Sebenarnya... | Tutorial Perbandingan Enam E-mail Client EMAIL CLIENT EMAIL CLIENT Mozilla Mail 1.6 Mozilla Thunderbird 0.5 Spesifikasi Software Spesifikasi Software Pembuat Mozilla Foundation <[email protected]> Pembuat Mozilla Foundation <[email protected]> Situs http://www.mozilla.org/ Situs http://www.mozilla.org/products/thunderbird/ Lisensi MPL, GPL Lisensi MPL, GPL Harga Gratis Harga gratis Dependensi X, Mozilla Dependensi X, pustaka-pustaka Mozilla System • CPU setara Pentium III System • CPU setara Pentium III Requirement • RAM sebesar 128 MB Requirement • RAM sebesar 128 MB • Ruang kosong harddisk sebesar 10 MB • Ruang kosong harddisk sebesar 50 MB ntuk masalah Internet dan Sayangnya, Mozilla Mail be- ozilla Foundation adalah fungsional. Hal ini terlihat dari Utetek bengeknya, Mozilla lum bisa menduduki posisi ti- Msalah satu contoh lem- fungsionalitas dan fitur yang di- adalah gudangnya. Semua ke- ga besar. Mozilla Mail (posisi baga yang peduli akan adanya tawarkan. Dan, semua hal terse- butuhan ada di gudang tersebut, keempat) harus kalah sedikit perubahan, mempelajari dan but dibungkus dengan sebuah termasuk e-mail client. Setiap (0,07) point dari saudara mu- menyikapinya. Tidak banyak user interface yang ramah dan komponen Mozilla datang danya, Thunderbird, yang be- lembaga yang bisa begitu saja mudah dimengerti pengguna e- dengan segala kelebihan dan rada pada posisi ketiga. menerima bahwa produknya mail. kekurangan Mozilla. Andal, con- Permasalahan utamanya terlalu besar dan gemuk. Agar Thunderbird dalam bebera- figurable, namun lambatnya adalah user interface. E-mail cli- laku dan mampu merebut pas- pa hal memang masih kalah dari minta ampun. ent ini bisa Anda andalkan apa- ar, harus lebih ramping, dan Evolution atau Kmail. Namun Dari sisi user interface, Mozilla bila Anda selalu bekerja dengan fokus. Lahirnya Firefox dan sebagai pemain baru, presta- Mail patut mendapatkan pujian, Mozilla suite dan malas berpin- Thunderbird memperlihat- si Thunderbird patut diacungi walaupun, dalam beberapa hal, dah-pindah aplikasi. kan betapa hebatnya Mozilla jempol. menjadi terlalu kompleks dan Dokumentasi 10% Foundation. Dokumentasi 10% bisa memusingkan pengguna User interface Thunderbird dalam wak- User interface 30% Fitur
Recommended publications
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Designing a User Interface for the Innovative E-Mail Client Semester Thesis
    Designing a User Interface for the Innovative E-mail Client Semester Thesis Student: Alexandra Burns Supervising Professor: Prof. Bertrand Meyer Supervising Assistants: Stephanie Balzer, Joseph N. Ruskiewicz December 2005 - April 2006 1 Abstract Email Clients have become a crucial application, both in business and for per- sonal use. The term information overload refers to the time consuming issue of keeping up with large amounts of incoming and stored email. Users face this problem on a daily basis and therefore benefit from an email client that allows them to efficiently search, display and store their email. The goal of this thesis is to build a graphical user interface for the innovative email client developed in a previous master thesis. It also explores the possibilities of designing a user interface outside of the business rules that apply for commercial solutions. 1 Contents 1 Introduction 4 2 Existing Work 6 2.1 ReMail ................................. 6 2.1.1 Methods ............................ 6 2.1.2 Problems Identified ...................... 7 2.1.3 Proposed Solutions ...................... 7 2.1.4 Assessment .......................... 8 2.2 Inner Circle .............................. 8 2.2.1 Methods ............................ 8 2.2.2 Problems Identified ...................... 9 2.2.3 Proposed Solutions ...................... 9 2.2.4 Assessment .......................... 10 2.3 TaskMaster .............................. 10 2.3.1 Methods ............................ 10 2.3.2 Problems Identified ...................... 11 2.3.3 Proposed Solution ...................... 11 2.3.4 Assessment .......................... 12 2.4 Email Overload ............................ 12 2.4.1 Methods ............................ 12 2.4.2 Problems Identified ...................... 13 2.4.3 Proposed Solutions ...................... 13 2.4.4 Assessment .......................... 14 3 Existing Solutions 16 3.1 Existing Email Clients .......................
    [Show full text]
  • Milax - Opensolaris Small Livecd Distro Alexander R
    USE IMPROVE EVANGELIZE MilaX - OpenSolaris small LiveCD distro Alexander R. Eremin MilaX Developer USE IMPROVE EVANGELIZE Can Solaris become as small as DSL? Solaris 2 USE IMPROVE EVANGELIZE DSS 0.1 Feb 2008 CDDL v.1 MilaX 0.1, 0.1.1 Feb 2008 MilaX 0.2 Mar 2008 Milax 0.3 May 2008 June 2008 MilaX 0.3.1 MilaX 0.3.1 server 3 USE IMPROVE EVANGELIZE Last version released June 10 2008 4 USE IMPROVE EVANGELIZE MilaX LiveCD, LiveUSB USE IMPROVE EVANGELIZE Virtualizing MilaX LiveCD,LiveUSB Qemu VirtualBox VMware USE IMPROVE EVANGELIZE MilaX advantages ● Small size ● Fast boot ● Loading live image from RAM ● Booting from various storage devices ● People can try small Solaris without installing on the harddisk. ● All Solaris features: dtrace,zfs, zones,e.t.c ● Latest drivers and bugfixes ● Two versions: desktop and server USE IMPROVE EVANGELIZE When MilaX is the best choice? ● Old PC's ● Not enough RAM ● Not enough free disk space ● Fast and small server (0.3.1 server) ● Fast developing (0.3.1 server) ● Virtual testing USE IMPROVE EVANGELIZE MilaX Filesystem Ramdisk 105mb, UFS Root FS /,/lib,/dev,/devices,/var Ramdisk Swap RAM /usr (RAM < 512mb) /usr, /alex, /root, /tmp Ram > 512MB HSFS Filesystem (/usr mount) LOFI Pseudo Device /.cdrom/usr.zlib HSFS Filesystem (/.cdrom mount) MilaX Live CD USE IMPROVE EVANGELIZE Milax 0.3.1 Apps Desktop version ● Gtk-Terminal, Beaver, Netsurf, Sylpheed, Midnight Commander, emelFM, XMMS, Xpdf, VNC viewer, Rdesktop, Nmap, gFTP, gPicview, Conky, XChat, Xpad. Server version ● Apache, PHP, Samba and NFS servers, GCC, GMake, Midnight Commander, Pine, Mutt, Elinks, Lynx.
    [Show full text]
  • Guidelines on Electronic Mail Security
    Special Publication 800-45 Version 2 Guidelines on Electronic Mail Security Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Jason Butterfield NIST Special Publication 800-45 Guidelines on Electronic Mail Security Version 2 Recommendations of the National Institute of Standards and Technology Miles Tracy, Wayne Jansen, Karen Scarfone, and Jason Butterfield C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2007 U .S. Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-45 Version 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-45 Version 2, 139 pages (Feb.
    [Show full text]
  • Aligning Intent and Behavior in Software Systems: How Programs Communicate & Their Distribution and Organization
    © 2020 William B. Dietz ALIGNING INTENT AND BEHAVIOR IN SOFTWARE SYSTEMS: HOW PROGRAMS COMMUNICATE & THEIR DISTRIBUTION AND ORGANIZATION BY WILLIAM B. DIETZ DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2020 Urbana, Illinois Doctoral Committee: Professor Vikram Adve, Chair Professor John Regehr, University of Utah Professor Tao Xie Assistant Professor Sasa Misailovic ABSTRACT Managing the overwhelming complexity of software is a fundamental challenge because complex- ity is the root cause of problems regarding software performance, size, and security. Complexity is what makes software hard to understand, and our ability to understand software in whole or in part is essential to being able to address these problems effectively. Attacking this overwhelming complexity is the fundamental challenge I seek to address by simplifying how we write, organize and think about programs. Within this dissertation I present a system of tools and a set of solutions for improving the nature of software by focusing on programmer’s desired outcome, i.e. their intent. At the program level, the conventional focus, it is impossible to identify complexity that, at the system level, is unnecessary. This “accidental complexity” includes everything from unused features to independent implementations of common algorithmic tasks. Software techniques driving innovation simultaneously increase the distance between what is intended by humans – developers, designers, and especially the users – and what the executing code does in practice. By preserving the declarative intent of the programmer, which is lost in the traditional process of compiling and linking and building software, it is easier to abstract away unnecessary details.
    [Show full text]
  • Indicators for Missing Maintainership in Collaborative Open Source Projects
    TECHNISCHE UNIVERSITÄT CAROLO-WILHELMINA ZU BRAUNSCHWEIG Studienarbeit Indicators for Missing Maintainership in Collaborative Open Source Projects Andre Klapper February 04, 2013 Institute of Software Engineering and Automotive Informatics Prof. Dr.-Ing. Ina Schaefer Supervisor: Michael Dukaczewski Affidavit Hereby I, Andre Klapper, declare that I wrote the present thesis without any assis- tance from third parties and without any sources than those indicated in the thesis itself. Braunschweig / Prague, February 04, 2013 Abstract The thesis provides an attempt to use freely accessible metadata in order to identify missing maintainership in free and open source software projects by querying various data sources and rating the gathered information. GNOME and Apache are used as case studies. License This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license. Keywords Maintenance, Activity, Open Source, Free Software, Metrics, Metadata, DOAP Contents List of Tablesx 1 Introduction1 1.1 Problem and Motivation.........................1 1.2 Objective.................................2 1.3 Outline...................................3 2 Theoretical Background4 2.1 Reasons for Inactivity..........................4 2.2 Problems Caused by Inactivity......................4 2.3 Ways to Pass Maintainership.......................5 3 Data Sources in Projects7 3.1 Identification and Accessibility......................7 3.2 Potential Sources and their Exploitability................7 3.2.1 Code Repositories.........................8 3.2.2 Mailing Lists...........................9 3.2.3 IRC Chat.............................9 3.2.4 Wikis............................... 10 3.2.5 Issue Tracking Systems...................... 11 3.2.6 Forums............................... 12 3.2.7 Releases.............................. 12 3.2.8 Patch Review........................... 13 3.2.9 Social Media............................ 13 3.2.10 Other Sources..........................
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • On the Security of Practical Mail User Agents Against Cache Side-Channel Attacks †
    applied sciences Article On the Security of Practical Mail User Agents against Cache Side-Channel Attacks † Hodong Kim 1 , Hyundo Yoon 1, Youngjoo Shin 2 and Junbeom Hur 1,* 1 Department of Computer Science and Engineering, Korea University, Seoul 02841, Korea; [email protected] (H.K.); [email protected] (H.Y.) 2 School of Computer and Information Engineering, Kwangwoon University, Seoul 01897, Korea; [email protected] * Correspondence: [email protected] † This paper is an extended version of our paper published in the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7–10 January 2020. Received: 30 April 2020; Accepted: 26 May 2020; Published: 29 May 2020 Abstract: Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04.
    [Show full text]
  • Maplewood Weekly Events October 14-18, 2019
    Maplewood Weekly Events October 14-18, 2019 MONDAY OCTOBER 14-WHITE 3:00PM MATH MEET @ MAPLEWOOD TUESDAY OCTOBER 15-BLUE 3:15-7:15PM PARENT/TEACHER CONFERENCES 4:30/5:45/7:00PM 6TH/7TH/8TH FB @ KIMBERLY WEDNESDAY OCTOBER 16-WHITE THURSDAY OCTOBER 17-BLUE FRIDAY OCTOBER 18-WHITE PICTURE RETAKE DAY Mark your Calendars!! Parent/Teacher Conferences Tuesday, October 15 3:15-7:15 For those new to Maplewood, the conferences are held in an arena-type setting. Sixth grade teachers will be in the community room. Seventh and eighth grade teachers will be in the large gym. There are no scheduled appointments. We hope that you are able to attend and meet your child’s teachers. GEMS Girls in Engineering, Math, and Science A half-day educational event for girls grades 6 through 8 featuring interactive GEMS-based workshops geared towards career exploration in engineering, math, and science Saturday, October 19 8:30 am – 12:00 pm Register today! Only $25 per student Call the Continuing Education Office at 920-832-2636 or go online to: https://ce.uwc.edu/menasha/catalog ​ What’s the Buzz on Electric Vehicles?! Students will get to inspect and actively engage with the various components and mechanisms of an electric basic utility vehicle (frame, suspension, motor, transmission, steering, brakes, etc.). Students will also learn how to work with Unistrut to build frames and scaffolds for a variety of applications. Instructor: Warren Vaz, Assistant Professor of Engineering Water Beneath Our Feet Where does our water come from? How does it move? And what happens if it is polluted? Learn all about groundwater and how we use it with Dr.
    [Show full text]
  • Bonanza Society
    MAY 2021 • VOLUME TWENTY-ONE • NUMBER 5 AMERICAN BONANZA SOCIETY The Official Publication for Bonanza, Debonair, Baron & Travel Air Operators and Enthusiasts We’d Just Like to Say… Thanks Falcon Insurance and the American Bonanza Society For over 20 years, Falcon Insurance and the American Bonanza Society have worked together toward a common goal of promoting the safe enjoyment of all Beechcraft airplanes. Your Beechcraft. Nothing brings us greater joy than working with such enthusiastic owner-pilots and finding the best prices for your aviation needs, and knowing that in doing so, we are encouraging safe flying by supporting ABS’ development of new and improved flight safety training programs. And for that, we say thanks. Thanks for letting us be a part of the for single engine aircraft – to major airports – and everything in between American Bonanza Society and the Air Safety Foundation… and thanks for trusting us with your insurance needs. Barry Dowlen Henry Abdullah President Vice President & ABS Program Director If you’d like to learn how Falcon Insurance can help you, Falcon Insurance Agency please call 1-800-259-4ABS, or visit http:/falcon.villagepress is the Insurance Program Manager for the ABS Insurance Program .com/promo/signup to obtain your free quote. When you do, we’ll make a $5 donation to ABS’ Air Safety Foundation. Falcon2 Insurance Agency • P.O. Box 291388, Kerrville,AMERICAN TX BONANZA 78029 SOCIETY • www.falconinsurance.com • Phone: 1-800-259-4227May 2021 We’d Just Like to Say… CONTENTS May 2021 AMERICA N Thanks BONANZA SOCIETY 2 President's Comments: Cultivating Passion Falcon Insurance and the American Bonanza Society May 2021 • Volume 21 • Number 5 By Paul Lilly For over 20 years, Falcon Insurance and the American Bonanza Society ABS Executive Director J.
    [Show full text]
  • OSS Alphabetical List and Software Identification
    Annex: OSS Alphabetical list and Software identification Software Short description Page A2ps a2ps formats files for printing on a PostScript printer. 149 AbiWord Open source word processor. 122 AIDE Advanced Intrusion Detection Environment. Free replacement for Tripwire(tm). It does the same 53 things are Tripwire(tm) and more. Alliance Complete set of CAD tools for the specification, design and validation of digital VLSI circuits. 114 Amanda Backup utility. 134 Apache Free HTTP (Web) server which is used by over 50% of all web servers worldwide. 106 Balsa Balsa is the official GNOME mail client. 96 Bash The Bourne Again Shell. It's compatible with the Unix `sh' and offers many extensions found in 147 `csh' and `ksh'. Bayonne Multi-line voice telephony server. 58 Bind BIND "Berkeley Internet Name Daemon", and is the Internet de-facto standard program for 95 turning host names into IP addresses. Bison General-purpose parser generator. 77 BSD operating FreeBSD is an advanced BSD UNIX operating system. 144 systems C Library The GNU C library is used as the C library in the GNU system and most newer systems with the 68 Linux kernel. CAPA Computer Aided Personal Approach. Network system for learning, teaching, assessment and 131 administration. CVS A version control system keeps a history of the changes made to a set of files. 78 DDD DDD is a graphical front-end for GDB and other command-line debuggers. 79 Diald Diald is an intelligent link management tool originally named for its ability to control dial-on- 50 demand network connections. Dosemu DOSEMU stands for DOS Emulation, and is a linux application that enables the Linux OS to run 138 many DOS programs - including some Electric Sophisticated electrical CAD system that can handle many forms of circuit design.
    [Show full text]
  • The Complete Reference Enterprise Linux & Fedora Edition
    Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Richard Petersen McGraw-Hill/Osborne New York Chicago San Francisco UlnLjo n Lisbon London Madrid Mexico City Milan NewDelhi San uan mmm* Se°ul Sinsapore Sydney Toront' ° Contents Acknowledgments i xxvii Introduction xxix Parti Getting Started 1 Introduction to Red Hat Linux 3 Red Hat and Fedora Linux 5 The Fedora Project 6 Red Hat Enterprise Linux 6 Red Hat Documentation 7 Red Hat Linux Fedora Core 8 Operating Systems and Linux 10 History of Linux and Unix 10 Unix 11 Linux .." 11 Linux Overview 12 Open Source Software 13 Linux Software 14 Linux Office and Database Software 15 Internet Servers 15 Development Resources ; 16 Online Information Sources 18 Documentation 19 2 Installing Red Hat and Fedora Core Linux ;. 21 Hardware, Software, and Information Requirements .'•. 22 Hardware Requirements '. 22 Hard Drive Configuration > 23 Information Requirements I 23 Creating the Boot Disks 25 VJ Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Installing Linux 27 Starting the Installation Program 27 Partitions, RAID, and Logical Volumes 28 Boot Loaders 30 Network Configuration 30 System Configuration 31 Software Installation 31 X Window System Configuration (Red Hat only) 32 Finishing Installation 33 Setup 33 Login and Logout 34 Boot Disks 35 3 Interface Basics 37 User Accounts 37 Accessing Your Linux System 38 The Display Manager: GDM 38 Accessing Linux from the Command Line Interface 39 Bluecurve: The GNOME and KDE Desktops 41 GNOME 41 KDE 42 Window Managers for Linux 43 Command Line Interface 43 Help 44 4 Red Hat System Configuration 47 Red Hat Administrative Tools 47 Configuring Users 48 Printer Configuration 50 X Window System Configuration: redhat-config-xfree86 52 Updating Red Hat and Fedora Linux with RHN, Yum and APT ..
    [Show full text]