Att Använda GNU/Linux Linus Walleij

Total Page:16

File Type:pdf, Size:1020Kb

Att Använda GNU/Linux Linus Walleij Att använda GNU/Linux Linus Walleij ONLINEVERSIONEN - TRYCKNING FÖRBJUDEN Jag har sålt rättigheterna att trycka den här boken till Studentlitter- atur, det betyder att du inte får trycka egna exemplar av boken från detta manuskript. Anledningen till att jag sålt rättigheterna är att jag vill att boken skall få spridning. Det finns mer information om detta för den som vill veta alla överväganden, se: http://www.df.lth.se/~triad/ gnulinux/20040514102823 Någon speciell licens finns inte för boken, inte än i varje fall, så det är vanlig sträng upphovsrätt som gäller. Det går däremot bra att sprida boken vidare i denna elektroniska form. Bokens hemsida: http://www.df.lth.se/~triad/gnulinux/ Innehåll 1 Inledning 3 1.1 Läsanvisning . 4 1.2 Läsarens förkunskaper . 4 1.3 Om formen . 6 1.4 Bäst-före-datum . 7 1.5 Datorvetenskaperna . 7 1.6 Något grundläggande om operativsystem . 8 1.6.1 Konstruktionshierarkier . 11 1.6.2 Operativsystemets hierarkier . 14 1.7 Tack . 16 2 POSIX 19 2.1 Historia . 21 2.2 Mach, MacOS X, GNU/Hurd . 23 2.3 POSIX innehåll . 25 2.3.1 Skal och kommandon . 25 2.3.2 Processer . 33 2.3.3 Demoner . 42 2.3.4 Användare . 44 2.3.5 Filsystemet . 51 2.3.6 Reguljära uttryck . 75 2.3.7 Texteditorer . 78 2.3.8 Datum och tid . 89 2.3.9 Rör, filter och skript . 90 2.3.10 Nätverket . 103 2.3.11 Terminalinloggning . 105 2.3.12 At- batch- och cronjobb . 107 Innehåll 3 De fria mjukvaruprojekten 111 3.1 Ekonomisk förklaring . 113 3.2 Antropologisk, sociologisk, eller psykologisk förklaring . 115 3.3 Att deltaga i fria mjukvaruprojekt . 117 3.4 Licenser . 119 3.4.1 GNU General Public License, GPL . 120 3.4.2 BSD-licensen . 122 3.4.3 MIT-licensen . 123 3.5 Versionsnummer . 124 4 Distributionerna 127 4.1 Hur distributionerna fungerar . 129 4.1.1 Installationsmedia . 131 4.1.2 Inventera din hårdvara . 133 4.1.3 Bootstrap loader och multiboot . 135 4.1.4 Partitionering . 138 4.2 Debian GNU/Linux . 142 4.2.1 Installation av Debian . 145 4.2.2 DEB, dpkg och APT-systemet . 146 4.2.3 Felrapportering . 151 4.3 Red Hat Linux / Fedora Core . 151 4.3.1 Installation av Red Hat & Fedora Core . 154 4.3.2 RPM-systemet . 156 4.3.3 Up2date, Red Carpet, YUM och APT för RedHat . 157 4.3.4 Felrapportering . 159 4.4 Linux From Scratch . 159 4.5 Alla de övriga . 160 4.6 Program utanför distributionen . 163 5 GNU/Linux-projekten 165 5.1 GNU-projektet . 165 5.2 Linuxprojektet . 169 5.3 BSD . 172 5.4 Arkitekturen i GNU/Linux-systemen . 173 5.4.1 Hantering av dynamiska kärnmoduler . 176 5.4.2 Hur kärnan startar . 178 5.4.3 Kärnkontroll — körnivåer . 183 5.4.4 Exkursion i körnivå 1 . 188 5.4.5 Dynamiska länkbibliotek . 189 5.4.6 Standardisering . 191 5.4.7 Filsystemets hierarki . 193 5.4.8 Enhetsfilerna i /dev . 194 5.4.9 Kärn- och processkontroll — /proc . 196 iv Innehåll 5.4.10 Filsystemstyper . 202 6 Fönstersystemet X 213 6.1 XFree86 . 214 6.2 Arkitekturen i X . 217 6.3 Konfiguration . 220 6.4 Programmen i X . 238 6.5 Teckenuppsättning . 245 6.6 X-terminaler . 248 6.7 Skrivbordsmiljöer . 249 6.7.1 Motif och CDE . 250 6.7.2 Qt och KDE . 252 6.7.3 GTK+ och GNOME . 254 6.8 VNC . 257 7 Kringutrustning 259 7.1 Skrivarhantering: CUPS och Foomatic . 259 7.2 Scanner . 262 7.3 USB-enheter . 264 7.3.1 USB-lagringsenheter, digitalkameror . 264 7.4 CD- och DVD-bränning . 266 7.4.1 Skapa en Data-CD/DVD . 268 7.4.2 Skapa en Audio-CD/DVD . 271 8 Kompilera själv 275 8.1 Kompileringsverktyg . 276 8.2 Beroenden . 277 8.3 GNU Autotools . 279 8.3.1 Utvecklarens perspektiv . 279 8.3.2 Användarens perspektiv . 281 8.4 Att kompilera Linuxkärnan . 284 9 Internet och andra nätverk 289 9.1 Allmänt om datornät . 290 9.2 TCP/IP-stacken: internetprotokollen . 292 9.2.1 Tillämpningssprotokoll . 293 9.2.2 Transportprotokoll: TCP . 295 9.2.3 Transportprotokoll: UDP . 296 9.2.4 Transportprotokoll: RTP . 297 9.2.5 Nätverksprotokoll: IP . 297 9.2.6 Nätverksprotokoll: ICMP . 300 9.2.7 Nätverksprotokoll: ARP . 301 9.2.8 Länkprotokoll: PPP . 301 v Innehåll 9.2.9 Svårdefinierat: DHCP . 303 9.3 Att ställa in nätverket . 303 9.3.1 Net-tools . 305 9.3.2 DNS-konfiguration . 311 9.3.3 PPP-anslutning . 312 9.3.4 ADSL-anslutning . 313 9.3.5 Inetutils . 314 9.4 Xinetd och TCPd . 318 9.5 SSH . 319 9.6 NTP . 324 10 Säkerhet 327 10.1 Fysisk säkerhet . 328 10.2 Uppdatering av systemet . 329 10.3 Säkerhetskopiering . 330 10.3.1 Vad? . 332 10.3.2 Hur ofta? . 333 10.3.3 Hdup . 334 10.3.4 Rsync . 335 10.4 Kryptering . 340 10.4.1 Kryptering av hårddisk . 341 10.5 Intrångsskydd . 345 10.5.1 Intrångsdetekteringssystem . 346 10.6 Brandvägg med netfilter . 347 10.6.1 Nätverksöversättning: maskerade nät . 352 10.6.2 Annan paketbearbetning . 353 10.7 Virus, maskar o.s.v. 355 11 Tillämpningsprogram 357 11.1 Kontorsprogram . 358 11.1.1 OpenOffice.org . 360 11.1.2 GNOME Office . 362 11.1.3 K Office . 363 11.2 World Wide Web-bläddring . 365 11.2.1 Mozilla . 367 11.2.2 Konqueror . 372 11.2.3 Webbredigeringsprogram . 373 11.3 Elektronisk post . 374 11.3.1 Skräppostfilter . 377 11.4 Chattprogram . 378 11.5 Peer-to-peer . 378 11.6 Ombrytningsprogram och typsättning . 379 11.7 Multimedia . 380 vi Innehåll 11.7.1 Ljudsystemet i kärnan . 382 11.7.2 Mediaspelare . 383 11.7.3 ”Rippning” . 384 11.8 Diverse . 385 A Att byta från Windows till GNU/Linux 389 A.1 Affärsmodellen och kundperspektivet . 390 A.2 Viktiga olikheter . 392 A.3 Skalet . 393 A.4 Lika för lika . 393 A.5 Windowsprogram i GNU/Linux . 397 A.6 Samba — blandad miljö ..
Recommended publications
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • ABC800-Manual-BASIC-II.Pdf
    Preface This manual describes the BASIC II programming language of ABC 800. The reader should have programming experience, since the manual is not meant to be a BASIC textbook. Chapter 1 introduces the BASIC programming language. Chapter 2 deals with the structure of BASIC II computer programs. Chapters 3, 4, and 5 describe the data that can be processed by a program. Chapter 6 describes how to operate BASIC II. This chapter contains plenty of advice and tips on how to type and edit a program Chapter 7 deals with the direct usage of instructions and commands, without any program. This method is particularely useful when a program is being debugged. Chapters 8, 9, and 1a contain detailed descriptions of all commands, functions, and instructions that are part of BASIC II. Most of the descriptions are completed by examples which show the structure of each program part. Chapters 11 and 12 deal with the ABC 800 graphics. Both the TELETEXTgraphics and the high resolution graphics with animation mode are described. Chapter 13 describes the use of the function keys. Chapter 14 describes the differences between ABC 800 and ABC 80. Chapter 15 contains a list of error messages with comments. Chapter 16, marked with grey edges, contains short descriptions of all instructions, functions, and commands arranged in alphabetical order.The list in chapter 16 is meant for use as an index register, where the syntax can be found together with references to the detailed descriptions earlier in the manual (chapters 8, 9, and 10). Chapter 17 is a list of literature references and chapter 18 contains a number of appendices.
    [Show full text]
  • A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues
    DOCUMENT RESUME ED 202 454 IR 009 300 AUTHOR Nilles, Jack M.; And Others TITLE A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues. INSTITUTION University of Southern California, Los Angeles. Office of Interdisciplinary Program Development. SPONS AGENCY National Science Foundation, Washington, D.C. DEPORT NO OIP/PCTA-80-3/3 PUB DATE Sep BO GRANT PRA-78-05647 NOTE 342p.; For related documents, see IR 909 298-300. Some small print marginally legible. EDRS PRICE MF01/PC14 Plus Postage. DESCRIPTORS Education; Employment; *Microcomputers; Prediction; *Public Policy; Questionnaires IDENTIFIERS *Delphi Technique; International Trade; *Technology Assessment ABSTRACT A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts. Four primary methods were used to develop the information for the policy analysis stages of the assessment:(1) search and analysis of the relevant literature, (2) development of a series of scenarios of alternative futures, (3) performance of two Delphi surveys and a cross-impact analysis based on these scenarios, and (4) interviews and/or surveys of the potentially affected stakeholders and decision makers. Tables of data are included as well as a list of references. Appendices include Delphi questionnaires with summaries of findings and an employment questionnaire used in the study. (LLS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made * from the original document. *********************************************************************** U S DEPARTMENT OF HEALTH.
    [Show full text]
  • Hungary: Computers Behind the Iron Curtain Written by Gábor Képes
    Hungary: Computers behind the Iron Curtain Written by Gábor Képes After the 1956 Revolution,in People’s Republic of Hungary Stalinist dictatorship was followed by a political system that was ready for consolidation and opened towards the West. For this reason Hungary was sometimes called the ’happiest barracks of the Soviet camp’. Hungarian computer technology was both connected to the initiatives of the Eastern bloc countries, and also hurriedly following the West at the same time. By 1989 there were approximately 100,000 computers working in the country, and its computer technology was typically colourful and full of unique solutions. Gábor Képes is 1. Heyday of Cybernetics in Hungary Head of the De- partment of Every modern digital computer in the world is set up on the Technological principles (principle of the stored program) described by the Museology. Since Hungarian-born American mathematician, John von Neumann 2004 he has been (1903-1957). Neumann made his own concept available for the a curator of the whole world.The history of modern computer science started in computer science the 1940s and 50s - while the Second World War was ending the collection of the Hungarian Mu- World War II and the Cold War was starting. Computer research seum for Science and Technol- began in the Soviet bloc as well, although in the era of Stalinism ogy, and then from 2009 in the cybernetics was considered a “dangerous civil pseudoscience”. successor institute: Hungarian This point of view slowly changed starting in the second half of Museum for Science, Technology the 50’s. and Transport.
    [Show full text]
  • Hungarian Scientists in Information Technology Gyözö Kovács
    Hungarian Scientists in Information Technology Gyözö Kovács To cite this version: Gyözö Kovács. Hungarian Scientists in Information Technology. Arthur Tatnall. Reflections on the History of Computing : Preserving Memories and Sharing Stories, AICT-387, Springer, pp.289-319, 2012, IFIP Advances in Information and Communication Technology (SURVEY), 10.1007/978-3-642- 33899-1_18. hal-01526814 HAL Id: hal-01526814 https://hal.inria.fr/hal-01526814 Submitted on 23 May 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Hungarian Scientists in Information Technology Dr. hc. Győző Kovács John von Neumann Computer Society, Hungary Abstract: Studying Information Technology, the History of Science and Technology was very rich in Hungarian talents; those who designed ‘clever’ machines at the very early times of calculators. These calculators are the ancestors of the present-time ones that were called later on, in the 20th century, computers. The computer historians may agree or disagree, but I think the first real-life, early ‘calculator-like’ machine was developed by Farkas Kempelen in the 18th century. It was a real output device, a talking machine.
    [Show full text]
  • Kshot: Live Kernel Patching with SMM and SGX
    KShot: Live Kernel Patching with SMM and SGX Lei Zhou∗y, Fengwei Zhang∗, Jinghui Liaoz, Zhengyu Ning∗, Jidong Xiaox Kevin Leach{, Westley Weimer{ and Guojun Wangk ∗Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China, zhoul2019,zhangfw,ningzy2019 @sustech.edu.cn f g ySchool of Computer Science and Engineering, Central South University, Changsha, China zDepartment of Computer Science, Wayne State University, Detroit, USA, [email protected] xDepartment of Computer Science, Boise State University, Boise, USA, [email protected] Department of Computer Science and Engineering, University of Michigan, Ann Arbor, USA, kjleach,weimerw @umich.edu { f g kSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China, [email protected] Abstract—Live kernel patching is an increasingly common kernel vulnerabilities also merit patching. Organizations often trend in operating system distributions, enabling dynamic up- use rolling upgrades [3], [6], in which patches are designed dates to include new features or to fix vulnerabilities without to affect small subsystems that minimize unplanned whole- having to reboot the system. Patching the kernel at runtime lowers downtime and reduces the loss of useful state from running system downtime, to update and patch whole server systems. applications. However, existing kernel live patching techniques However, rolling upgrades do not altogether obviate the need (1) rely on specific support from the target operating system, to restart software or reboot systems; instead, dynamic hot and (2) admit patch failures resulting from kernel faults. We patching (live patching) approaches [7]–[9] aim to apply present KSHOT, a kernel live patching mechanism based on patches to running software without having to restart it.
    [Show full text]
  • The 30 Year Horizon
    The 30 Year Horizon Manuel Bronstein W illiam Burge T imothy Daly James Davenport Michael Dewar Martin Dunstan Albrecht F ortenbacher P atrizia Gianni Johannes Grabmeier Jocelyn Guidry Richard Jenks Larry Lambe Michael Monagan Scott Morrison W illiam Sit Jonathan Steinbach Robert Sutor Barry T rager Stephen W att Jim W en Clifton W illiamson Volume 7: Axiom Hyperdoc i Portions Copyright (c) 2005 Timothy Daly The Blue Bayou image Copyright (c) 2004 Jocelyn Guidry Portions Copyright (c) 2004 Martin Dunstan Portions Copyright (c) 2007 Alfredo Portes Portions Copyright (c) 2007 Arthur Ralfs Portions Copyright (c) 2005 Timothy Daly Portions Copyright (c) 1991-2002, The Numerical ALgorithms Group Ltd. All rights reserved. This book and the Axiom software is licensed as follows: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of The Numerical ALgorithms Group Ltd. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
    [Show full text]
  • Latexsample-Thesis
    INTEGRAL ESTIMATION IN QUANTUM PHYSICS by Jane Doe A dissertation submitted to the faculty of The University of Utah in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Mathematics The University of Utah May 2016 Copyright c Jane Doe 2016 All Rights Reserved The University of Utah Graduate School STATEMENT OF DISSERTATION APPROVAL The dissertation of Jane Doe has been approved by the following supervisory committee members: Cornelius L´anczos , Chair(s) 17 Feb 2016 Date Approved Hans Bethe , Member 17 Feb 2016 Date Approved Niels Bohr , Member 17 Feb 2016 Date Approved Max Born , Member 17 Feb 2016 Date Approved Paul A. M. Dirac , Member 17 Feb 2016 Date Approved by Petrus Marcus Aurelius Featherstone-Hough , Chair/Dean of the Department/College/School of Mathematics and by Alice B. Toklas , Dean of The Graduate School. ABSTRACT Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah.
    [Show full text]
  • Identifying Exogenous Drivers and Evolutionary Stages in FLOSS Projects
    University of Groningen Quality Factors and Coding Standards - a Comparison Between Open Source Forges Capiluppi, Andrea; Boldyreff, Cornelia; Beecher, Karl; Adams, Paul J. Published in: Electronic Notes in Theoretical Computer Science DOI: 10.1016/j.entcs.2009.02.063 IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2009 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Capiluppi, A., Boldyreff, C., Beecher, K., & Adams, P. J. (2009). Quality Factors and Coding Standards - a Comparison Between Open Source Forges. Electronic Notes in Theoretical Computer Science, 233(C), 89- 103. https://doi.org/10.1016/j.entcs.2009.02.063 Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal.
    [Show full text]
  • April 2006 Volume 31 Number 2
    APRIL 2006 VOLUME 31 NUMBER 2 THE USENIX MAGAZINE OPINION Musings RIK FARROW OpenSolaris:The Model TOM HAYNES PROGRAMMING Code Testing and Its Role in Teaching BRIAN KERNIGHAN Modular System Programming in MINIX 3 JORRIT N. HERDER, HERBERT BOS, BEN GRAS, PHILIP HOMBURG, AND ANDREW S. TANENBAUM Some Types of Memory Are More Equal Than Others DIOMEDIS SPINELLIS Simple Software Flow Analysis Using GNU Cflow CHAOS GOLUBITSKY Why You Should Use Ruby LU KE KANIES SYSADMIN Unwanted HTTP:Who Has the Time? DAVI D MALONE Auditing Superuser Usage RANDOLPH LANGLEY C OLUMNS Practical Perl Tools:Programming, Ho Hum DAVID BLANK-EDELMAN VoIP Watch HEISON CHAK /dev/random ROBERT G. FERRELL STANDARDS USENIX Standards Activities NICHOLAS M. STOUGHTON B O OK REVIEWS Book Reviews ELIZABETH ZWICKY, WITH SAM STOVER AND RI K FARROW USENIX NOTES Letter to the Editor TED DOLOTTA Fund to Establish the John Lions Chair C ONFERENCES LISA ’05:The 19th Large Installation System Administration Conference WORLDS ’05: Second Workshop on Real, Large Distributed Systems FAST ’05: 4th USENIX Conference on File and Storage Technologies The Advanced Computing Systems Association Upcoming Events 3RD SYMPOSIUM ON NETWORKED SYSTEMS 2ND STEPS TO REDUCING UNWANTED TRAFFIC ON DESIGN AND IMPLEMENTATION (NSDI ’06) THE INTERNET WORKSHOP (SRUTI ’06) Sponsored by USENIX, in cooperation with ACM SIGCOMM JULY 6–7, 2006, SAN JOSE, CA, USA and ACM SIGOPS http://www.usenix.org/sruti06 MAY 8–10, 2006, SAN JOSE, CA, USA Paper submissions due: April 20, 2006 http://www.usenix.org/nsdi06 2006
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Spiele- Hardware
    260 SEITEN SONDERHEFT 2/16 Deutschland 14,95 Österreich 16,90 Schweiz SFR 25,80 ALT! Die beste Retro spiele- hardware Die wichtigsten Homecomputer, Konsolen & Handhelds von 1977 bis 2001 ALLE INFOS ZU Atari ● RCA Studio ● Apple II ● Microvision ● Atari 8-Bit ● Mattel Intellivision ● Commodore VC 20 ● BBC ● Sinclair Spectrum ● Commodore 64 ● ColecoVision ● MSX-Computer ● Schneider CPC ● NES ● Sega Master System ● Atari ST ● Amiga 500 ● Sega Mega Drive ● Nintendo Game Boy ● Atari Lynx ● Turbo Grafx 1 ● Sega Game Gear ● Neo Geo ● SNES ● 3DO ● Sony PlayStation ● Sega Saturn ● Nintendo 64 ● Bandai Wonderswan ● Sega Dreamcast ● Sony PlayStation 2 ● Nintendo Gamecube ● Xbox ● Nintendo GBA ● Retron 5 ... ARCADE | ATARI | COMMODORE | MSX | NEO GEO | NINTENDO | SCHNEIDER | SEGA | SINCLAIR | SONY powered by Die beste Retro Sonderheft 02/2016 spiele- hardware ie Retro-Liebe, und wir reden natürlich von der Liebe zu Retrospielen, ist teils pure Weißt- du-noch-Nostalgie, teils aktiv gelebtes Hobby: Dank Emulatoren und Download-Veröffentli- chungen auf modernen Plattformen war es wohl noch nie so einfach wie heute, die alten Klassiker zu spielen – noch nicht einmal „damals“! Am meisten aber machen Retro-Games Dnatürlich auf Retro-Plattformen Spaß. Denn selbst der beste Bildschirmfi lter schafft es nicht, Sprites, Farben und, ja, auch das Flimmern, so darzustellen, wie damals ein Röhren-Fernseher oder VGA- Monitor. Ganz zu schweigen von den Original-Eingabegeräten und -Speicherkarten. Oder dem rein haptisch befriedigenden Erlebnis, ein Modul in seinen Schacht zu wuchten. Oder der Vorfreude beim Installieren von Sechs-Disks-Spielen auf dem Home Computer... In diesem Sonderheft des deutschen Retro Gamer wollen wir euch die besten Spiele-Plattformen ausführlich vorstellen, mit einer liebevollen Auswahl bereits erschienener, aber auch ganz neuer Artikel.
    [Show full text]