Pymupdf Documentation Release 1.18.19

Total Page:16

File Type:pdf, Size:1020Kb

Pymupdf Documentation Release 1.18.19 PyMuPDF Documentation Release 1.18.19 Jorj X. McKie Sep 17, 2021 Contents 1 Introduction 1 1.1 Note on the Name fitz ..........................................2 1.2 License and Copyright..........................................2 1.3 Covered Version.............................................2 2 Installation 3 2.1 Step 1: Install MuPDF..........................................3 2.2 Step 2: Download and Generate PyMuPDF...............................3 3 Tutorial 5 3.1 Importing the Bindings..........................................5 3.2 Opening a Document...........................................5 3.3 Some Document Methods and Attributes................................6 3.4 Accessing Meta Data...........................................6 3.5 Working with Outlines..........................................6 3.6 Working with Pages...........................................7 3.6.1 Inspecting the Links, Annotations or Form Fields of a Page..................7 3.6.2 Rendering a Page........................................8 3.6.3 Saving the Page Image in a File................................8 3.6.4 Displaying the Image in GUIs.................................8 3.6.4.1 wxPython.......................................8 3.6.4.2 Tkinter.........................................9 3.6.4.3 PyQt4, PyQt5, PySide.................................9 3.6.5 Extracting Text and Images...................................9 3.6.6 Searching for Text....................................... 10 3.7 PDF Maintenance............................................ 10 3.7.1 Modifying, Creating, Re-arranging and Deleting Pages.................... 11 3.7.2 Joining and Splitting PDF Documents............................. 11 3.7.3 Embedding Data........................................ 11 3.7.4 Saving.............................................. 12 3.8 Closing.................................................. 12 3.9 Further Reading............................................. 12 4 Collection of Recipes 13 4.1 Images.................................................. 13 4.1.1 How to Make Images from Document Pages.......................... 13 4.1.2 How to Increase Image Resolution............................... 14 i 4.1.3 How to Create Partial Pixmaps (Clips)............................. 14 4.1.4 How to Zoom a Clip to a GUI Window............................. 15 4.1.5 How to Create or Suppress Annotation Images......................... 15 4.1.6 How to Extract Images: Non-PDF Documents......................... 15 4.1.7 How to Extract Images: PDF Documents........................... 16 4.1.8 How to Handle Image Masks.................................. 17 4.1.9 How to Make one PDF of all your Pictures (or Files)..................... 18 4.1.10 How to Create Vector Images.................................. 21 4.1.11 How to Convert Images..................................... 21 4.1.12 How to Use Pixmaps: Glueing Images............................. 22 4.1.13 How to Use Pixmaps: Making a Fractal............................ 23 4.1.14 How to Interface with NumPy................................. 25 4.1.15 How to Add Images to a PDF Page............................... 25 4.1.16 How to Control the Size of Inserted Images.......................... 27 4.2 Text.................................................... 27 4.2.1 How to Extract all Document Text............................... 27 4.2.2 How to Extract Text from within a Rectangle......................... 28 4.2.3 How to Extract Text in Natural Reading Order......................... 28 4.2.4 How to Extract Tables from Documents............................ 30 4.2.5 How to Mark Extracted Text.................................. 31 4.2.6 How to Mark Searched Text.................................. 32 4.2.7 How to Mark Non-horizontal Text............................... 33 4.2.8 How to Analyze Font Characteristics.............................. 34 4.2.9 How to Insert Text....................................... 35 4.2.9.1 How to Write Text Lines............................... 36 4.2.9.2 How to Fill a Text Box................................ 37 4.2.9.3 How to Use Non-Standard Encoding......................... 38 4.3 Annotations................................................ 39 4.3.1 How to Add and Modify Annotations............................. 40 4.3.2 How to Use FreeText...................................... 44 4.3.3 Using Buttons and JavaScript.................................. 45 4.3.4 How to Use Ink Annotations.................................. 46 4.4 Drawing and Graphics.......................................... 47 4.5 Extracting Drawings........................................... 49 4.6 Multiprocessing............................................. 52 4.7 General.................................................. 57 4.7.1 How to Open with a Wrong File Extension.......................... 57 4.7.2 How to Embed or Attach Files................................. 57 4.7.3 How to Delete and Re-Arrange Pages............................. 57 4.7.4 How to Join PDFs........................................ 58 4.7.5 How to Add Pages....................................... 59 4.7.6 How To Dynamically Clean Up Corrupt PDFs......................... 60 4.7.7 How to Split Single Pages................................... 61 4.7.8 How to Combine Single Pages................................. 62 4.7.9 How to Convert Any Document to PDF............................ 64 4.7.10 How to Deal with Messages Issued by MuPDF........................ 65 4.7.11 How to Deal with PDF Encryption............................... 66 4.8 Common Issues and their Solutions................................... 68 4.8.1 Changing Annotations: Unexpected Behaviour........................ 68 4.8.1.1 Problem........................................ 68 4.8.1.2 Cause......................................... 68 4.8.1.3 Solutions........................................ 68 4.8.2 Misplaced Item Insertions on PDF Pages............................ 69 4.8.2.1 Problem........................................ 69 ii 4.8.2.2 Cause......................................... 69 4.8.2.3 Solutions........................................ 70 4.8.3 Missing or Unreadable Extracted Text............................. 70 4.8.3.1 Problem: no text is extracted............................. 70 4.8.3.2 Cause......................................... 70 4.8.3.3 Solution........................................ 71 4.8.3.4 Problem: unreadable text............................... 71 4.8.3.5 Cause......................................... 71 4.8.3.6 Solution........................................ 71 4.9 Low-Level Interfaces........................................... 71 4.9.1 How to Iterate through the xref Table............................ 71 4.9.2 How to Handle Object Streams................................. 72 4.9.3 How to Handle Page Contents................................. 73 4.9.4 How to Access the PDF Catalog................................ 74 4.9.5 How to Access the PDF File Trailer.............................. 74 4.9.6 How to Access XML Metadata................................. 75 4.9.7 How to Extend PDF Metadata................................. 75 4.9.8 How to Read and Update PDF Objects............................. 77 5 Module fitz 81 5.1 Invocation................................................ 81 5.2 Cleaning and Copying.......................................... 82 5.3 Extracting Fonts and Images....................................... 83 5.4 Joining PDF Documents......................................... 83 5.5 Low Level Information.......................................... 84 5.6 Embedded Files Commands....................................... 85 5.6.1 Information........................................... 85 5.6.2 Extraction............................................ 86 5.6.3 Deletion............................................. 87 5.6.4 Insertion............................................. 87 5.6.5 Updates............................................. 87 5.6.6 Copying............................................. 88 5.7 Text Extraction.............................................. 88 6 Classes 91 6.1 Annot................................................... 91 6.1.1 Annotation Icons in MuPDF.................................. 101 6.1.2 Example............................................. 102 6.2 Colorspace................................................ 102 6.3 DisplayList................................................ 103 6.4 Document................................................ 104 6.4.1 set_metadata() Example................................. 140 6.4.2 set_toc() Demonstration.................................. 140 6.4.3 insert_pdf() Examples.................................. 141 6.4.4 Other Examples......................................... 141 6.5 Font.................................................... 142 6.6 Identity.................................................. 149 6.7 IRect................................................... 149 6.8 Link.................................................... 152 6.9 linkDest.................................................. 154 6.10 Matrix.................................................. 156 6.10.1 Examples............................................ 160 6.10.2 Shifting............................................. 160 6.10.3 Flipping............................................. 161 iii 6.10.4 Shearing............................................. 162 6.10.5 Rotating............................................. 163 6.11 Outline.................................................. 164
Recommended publications
  • Vulnerability Report Attacks Bypassing Confidentiality in Encrypted PDF
    Vulnerability Report Attacks bypassing confidentiality in encrypted PDF Jens M¨uller1, Fabian Ising2, Vladislav Mladenov1, Christian Mainka1, Sebastian Schinzel2, J¨orgSchwenk1 May 16, 2019 1Chair for Network and Data Security 2FH M¨unsterUniversity of Applied Sciences Abstract In this report, we analyze PDF encryption and show two novel techniques for breaking the confidentiality of encrypted documents. Firstly, we abuse the PDF feature of partially encrypted documents to wrap the encrypted part of the document within attacker-controlled content and therefore, exfiltrate the plaintext once the document is opened by a legitimate user. Secondly, we abuse a flaw in the PDF encryption specification allowing an attacker to arbitrarily manipulate encrypted content without knowing the cor- responding key/password. The only requirement is one single block of known plaintext, which we show is fulfilled by design. By using exfiltration channels our attacks allow the recovery of the entire plaintext or parts of it within an encrypted document. The attacks rely only on standard compliant PDF features. We evaluated our attacks on 27 widely used PDF viewers and found all of them vulnerable. 1 Contents 1 Background4 1.1 Portable Document Format (PDF) . .4 1.2 PDF Encryption . .6 1.3 PDF Interactive Features . .7 2 Attacker Model8 3 PDF Encryption: Security Analysis9 3.1 Partial Encryption . .9 3.2 CBC Malleability . 10 3.3 PDF Interactive Features . 12 4 How To Break PDF Encryption 14 4.1 Direct Exfiltration (Attack A) . 14 4.1.1 Requirements . 15 4.1.2 Direct Exfiltration through PDF Forms (A1) . 15 4.1.3 Direct Exfiltration via Hyperlinks (A2) .
    [Show full text]
  • Nitro Pdf Reader 2 1 0 13 Setup Keygen
    Nitro pdf reader 2 1 0 13 setup keygen Nitro pdf reaNitdro pedfr rea d2er 2 1 0 103 se tu1p k3ey gesn etup keygen DOWNLOAD! DIRECT DOWNLOAD! Nitro pdf reader 2 1 0 13 setup keygen Nitro PDF Reader allows you to make notes and edit PDFs as well as. The Product Key from key4vip.com is great. Reply by SusieSmith13 on April 19, 2015. Nitro PDF Pro 9 Full Version Including Crack Serial Number or Activation Key. The document directly into PDF, is able to perform merge multiple files into one. 8 with Keygen Download Free Mega. By Final Cut Pro X 10 Serial Number Free 2014 11, 253 views. 2: 27.Nitro PDF Reader 3. 14: Powerful PDF viewer with annotation tools. 14 160513 Last months downloads: 22, 131 Size: 1. Nitro PDF Reader is a handy PDF editor that covers all the basic. Improved installer has been optimized and completes the installation in two less stages1. Getting started with Nitro Reader 3. The Nitro Reader 3 user interface is divided into 10 key areas. 2010-повідомлень: 10-авторів: 2Installation error with NitroPDF Reader - Running Windows 7- 64 bit. I am trying to install Nitro. Logging stopped: 1052010 14: 29: 29. This may sound lame but Nitro PDF Reader nissan pathfinder 2000 manual pdf has quite the extensive help database. I got 61, 300, 000 hits, so possibly there is one or two others out there that can. February 13, 2013 at 10: 26 PM Reply to this comment 50. Has the Pro version ticked but has FREEVERSION in the Serial key textbox.
    [Show full text]
  • Designing and Packaging Printer and Scanner Drivers
    Designing and Packaging Printer and Scanner Drivers OpenPrinting MC on Linux Plumbers 2020 August 28, 2020 Till Kamppeter, OpenPrinting What we had ● Printer drivers – PPD files – Filters, perhaps also backends – All has to be in CUPS-specific directories ● Scanner drivers – Shared libraries with SANE ABI in SANE-specific directories ● Packaging – Binaries were built specific to destination distro and packaged in DEB or RPM packages – For each distro drivers need to be built, packaged, and tested separately – As files need to be in specific directories drivers cannot be installed with CUPS in a Snap or with scanning user applications in Snaps What we want ● Sandboxed packaging – Snaps – Distribution-independent: Install from Snap Store on any distro running snapd – More security: Every package with all its libraries and files in its own sandbox, fine-grained control for communication between packages – All-Snap distributions ● But – You cannot drop driver files into directories of a snapped CUPS or snapped user applications, Snaps do not see the system’s files – Snaps only communicate via IP or D-Bus, not by files ● Also – CUPS is deprecating support for PPD files, working by itself only in driverless IPP mode. The New Architecture ● Printer/Scanner Applications emulating an IPP device – Easily snappable: Communicates only via IP – Multi-function device support, Printing, Scanning, and Fax Out can be done in one Snap/Application – Web admin interface for vendor/device-specific GUI – Behaves like a network printer/scanner/multi-function
    [Show full text]
  • 4Typesetting, Viewing and Printing
    Typesetting, viewing 4and printing We’ve now got far enough to typeset what you’ve entered. I’m assuming at this stage that you have typed some sample text in the format specified in the previous chapter, and you’ve saved it in a plain•text file with a filetype of .tex and a name of your own choosing. Picking suitable filenames Never, ever use directories (folders) or file names which contain spaces. Although your op• erating system probably supports them, some don’t, and they will only cause grief and tears with TEX. Make filenames as short or as long as you wish, but strictly avoid spaces. Stick to upper• and lower•case letters without accents (A–Z and a–z), the digits 0–9, the hyphen (-), and the full point or period (.), (similar to the conventions for a Web URI): it will let you refer to TEX files over the Web more easily and make your files more portable. Formatting information ✄ 63 ✂ ✁ CHAPTER 4. TYPESETTING, VIEWING AND PRINTING Exercise 4.1: Saving your file If you haven’t already saved your file, do so now (some editors and interfaces let you type• set the document without saving it!). Pick a sensible filename in a sensible directory. Names should be short enough to display and search for, but descriptive enough to make sense. See the panel ‘Picking suitable file• names’ above for more details. 4.1 Typesetting Typesetting your document is usually done by clicking on a button in a toolbar or an entry in a menu. Which one you click on depends on what output you want — there are two formats available: A f The standard (default) LTEX program produces a device•independent (DVI) file which can be used with any TEX previewer or printer driver on any make or model of computer.
    [Show full text]
  • Using the GNU Compiler Collection (GCC)
    Using the GNU Compiler Collection (GCC) Using the GNU Compiler Collection by Richard M. Stallman and the GCC Developer Community Last updated 23 May 2004 for GCC 3.4.6 For GCC Version 3.4.6 Published by: GNU Press Website: www.gnupress.org a division of the General: [email protected] Free Software Foundation Orders: [email protected] 59 Temple Place Suite 330 Tel 617-542-5942 Boston, MA 02111-1307 USA Fax 617-542-2652 Last printed October 2003 for GCC 3.3.1. Printed copies are available for $45 each. Copyright c 1988, 1989, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being \GNU General Public License" and \Funding Free Software", the Front-Cover texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled \GNU Free Documentation License". (a) The FSF's Front-Cover Text is: A GNU Manual (b) The FSF's Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. i Short Contents Introduction ...................................... 1 1 Programming Languages Supported by GCC ............ 3 2 Language Standards Supported by GCC ............... 5 3 GCC Command Options .........................
    [Show full text]
  • Living Without Google on Android
    Alternative for Google Apps on Android - living without Google on Android Android without any Google App? What to use instead of Hangouts, Map, Gmail? Is that even possible? And why would anyone want to live without Google? I've been using a lot of different custom ROMs on my devices, so far the two best: plain Cyanogenmod 11 snapshot on the Nexus 4[^1], and MIUI 2.3.2 on the HTC Desire G7[^2]. All the others ( MUIU 5, MIUI 6 unofficial, AOKP, Kaos, Slim, etc ) were either ugly, unusable, too strange or exceptionally problematic on battery life. For a long time, the first step for me was to install the Google Apps, gapps packages for Plays Store, Maps, and so on, but lately they require so much rights on the phone that I started to have a bad taste about them. Then I started to look for alternatives. 1 of 5 So, what to replace with what? Play Store I've been using F-Droid[^3] as my primary app store for a while now, but since it's strictly Free Software[^4] store only, sometimes there's just no app present for your needs; aptoide[^5] comes very handy in that cases. Hangouts I never liked Hangouts since the move from Gtalk although for a little while it was exceptional for video - I guess it ended when the mass started to use it in replacement of Skype and its recent suckyness. For chat only, check out: ChatSecure[^6], Conversations[^7] or Xabber[^8]. All of them is good for Gtalk-like, oldschool client and though Facebook can be configured as XMPP as well, I'd recommend Xabber for that, the other two is a bit flaky with Facebook.
    [Show full text]
  • The Interplay of Compile-Time and Run-Time Options for Performance Prediction Luc Lesoil, Mathieu Acher, Xhevahire Tërnava, Arnaud Blouin, Jean-Marc Jézéquel
    The Interplay of Compile-time and Run-time Options for Performance Prediction Luc Lesoil, Mathieu Acher, Xhevahire Tërnava, Arnaud Blouin, Jean-Marc Jézéquel To cite this version: Luc Lesoil, Mathieu Acher, Xhevahire Tërnava, Arnaud Blouin, Jean-Marc Jézéquel. The Interplay of Compile-time and Run-time Options for Performance Prediction. SPLC 2021 - 25th ACM Inter- national Systems and Software Product Line Conference - Volume A, Sep 2021, Leicester, United Kingdom. pp.1-12, 10.1145/3461001.3471149. hal-03286127 HAL Id: hal-03286127 https://hal.archives-ouvertes.fr/hal-03286127 Submitted on 15 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The Interplay of Compile-time and Run-time Options for Performance Prediction Luc Lesoil, Mathieu Acher, Xhevahire Tërnava, Arnaud Blouin, Jean-Marc Jézéquel Univ Rennes, INSA Rennes, CNRS, Inria, IRISA Rennes, France [email protected] ABSTRACT Both compile-time and run-time options can be configured to reach Many software projects are configurable through compile-time op- specific functional and performance goals. tions (e.g., using ./configure) and also through run-time options (e.g., Existing studies consider either compile-time or run-time op- command-line parameters, fed to the software at execution time).
    [Show full text]
  • Forensic Identification of Unique Kali Systems Through the Use of File Hashes and Names
    Forensic Identification of Unique Kali Systems Through the Use of File Hashes and Names Troy Ward January 25, 2021 Troy Ward Table of Contents Introduction .................................................................................................................................................. 4 Kali Linux ....................................................................................................................................................... 4 Methodology ................................................................................................................................................. 4 Analysis ......................................................................................................................................................... 5 Unique Names ............................................................................................................................................... 6 Eth0.lease .................................................................................................................................................. 6 Font Config ................................................................................................................................................ 7 LightDM ..................................................................................................................................................... 8 System.Journal .........................................................................................................................................
    [Show full text]
  • Memory Tagging and How It Improves C/C++ Memory Safety Kostya Serebryany, Evgenii Stepanov, Aleksey Shlyapnikov, Vlad Tsyrklevich, Dmitry Vyukov Google February 2018
    Memory Tagging and how it improves C/C++ memory safety Kostya Serebryany, Evgenii Stepanov, Aleksey Shlyapnikov, Vlad Tsyrklevich, Dmitry Vyukov Google February 2018 Introduction 2 Memory Safety in C/C++ 2 AddressSanitizer 2 Memory Tagging 3 SPARC ADI 4 AArch64 HWASAN 4 Compiler And Run-time Support 5 Overhead 5 RAM 5 CPU 6 Code Size 8 Usage Modes 8 Testing 9 Always-on Bug Detection In Production 9 Sampling In Production 10 Security Hardening 11 Strengths 11 Weaknesses 12 Legacy Code 12 Kernel 12 Uninitialized Memory 13 Possible Improvements 13 Precision Of Buffer Overflow Detection 13 Probability Of Bug Detection 14 Conclusion 14 Introduction Memory safety in C and C++ remains largely unresolved. A technique usually called “memory tagging” may dramatically improve the situation if implemented in hardware with reasonable overhead. This paper describes two existing implementations of memory tagging: one is the full hardware implementation in SPARC; the other is a partially hardware-assisted compiler-based tool for AArch64. We describe the basic idea, evaluate the two implementations, and explain how they improve memory safety. This paper is intended to initiate a wider discussion of memory tagging and to motivate the CPU and OS vendors to add support for it in the near future. Memory Safety in C/C++ C and C++ are well known for their performance and flexibility, but perhaps even more for their extreme memory unsafety. This year we are celebrating the 30th anniversary of the Morris Worm, one of the first known exploitations of a memory safety bug, and the problem is still not solved.
    [Show full text]
  • Ghostscript and Mupdf Status Openprinting Summit April 2016
    Ghostscript and MuPDF Status OpenPrinting Summit April 2016 Michael Vrhel, Ph.D. Artifex Software Inc. San Rafael CA Outline Ghostscript overview What is new with Ghostscript MuPDF overview What is new with MuPDF MuPDF vs Ghostscript MuJS, GSView The Basics Ghostscript is a document conversion and rendering engine. Written in C ANSI 1989 standard (ANS X3.159-1989) Essential component of the Linux printing pipeline. Dual AGPL/Proprietary licensed. Artifex owns the copyright. Source and documentation available at www.ghostscript.com Graphical Overview PostScript PCL5e/c with PDF 1.7 XPS Level 3 GL/2 and RTL PCLXL Ghostscript Graphics Library High level Printer drivers: Raster output API: Output drivers: Inkjet TIFF PSwrite PDFwrite Laser JPEG XPSwrite Custom etc. CUPS Devices Understanding devices is a major key to understanding Ghostscript. Devices can have high-level functionality. e.g. pdfwrite can handle text, images, patterns, shading, fills, strokes and transparency directly. Graphics library has “default” operations. e.g. text turns into bitmaps, images decomposed into rectangles. In embedded environments, calls into hardware can be made. Raster devices require the graphics library to do all the rendering. Relevant Changes to GS since last meeting…. A substantial revision of the build system and GhostPDL directory structure (9.18) GhostPCL and GhostXPS "products" are now built by the Ghostscript build system "proper" rather than having their own builds (9.18) New method of internally inserting devices into the device chain developed. Allows easier implementation of “filter” devices (9.18) Implementation of "-dFirstPage"/"-dLastPage" with all input languages (9.18) Relevant Changes to GS since last meeting….
    [Show full text]
  • Statically Detecting Likely Buffer Overflow Vulnerabilities
    Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [email protected] University of Virginia, Department of Computer Science David Evans [email protected] University of Virginia, Department of Computer Science Abstract Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation of our approach that extends the LCLint annotation-assisted static checking tool. Our tool is as fast as a compiler and nearly as easy to use. We present experience using our approach to detect buffer overflow vulnerabilities in two security-sensitive programs. 1. Introduction ed a prototype tool that does this by extending LCLint [Evans96]. Our work differs from other work on static detection of buffer overflows in three key ways: (1) we Buffer overflow attacks are an important and persistent exploit semantic comments added to source code to security problem. Buffer overflows account for enable local checking of interprocedural properties; (2) approximately half of all security vulnerabilities we focus on lightweight static checking techniques that [CWPBW00, WFBA00]. Richard Pethia of CERT have good performance and scalability characteristics, identified buffer overflow attacks as the single most im- but sacrifice soundness and completeness; and (3) we portant security problem at a recent software introduce loop heuristics, a simple approach for engineering conference [Pethia00]; Brian Snow of the efficiently analyzing many loops found in typical NSA predicted that buffer overflow attacks would still programs.
    [Show full text]
  • The Journal of AUUG Inc. Volume 21 ¯ Number 1 March 2000
    The Journal of AUUG Inc. Volume 21 ¯ Number 1 March 2000 Features: Linux under Sail 8 Aegis and Distributed Development 18 News: It’s Election,Time 11 Sponsorship Opportunities AUUG2K 33 Regulars: Meet the Exec 29 My Home Network 31 Book Reviews 36 The Open Source Lucky Dip 39 Unix Traps and Tricks 45 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUG Membership and General Correspondence Editorial The AUUG Secretary G~nther Feuereisen PO Box 366 [email protected] Kensington NSW 2033 Telephone: 02 8824 9511 or 1800 625 655 (Toll-Free) Facsimile: 02 8824 9522 Welcome to Y2K. I hope all of you who were involved in the general Emaih [email protected] paranoia that gripped the world, got through unscathed. I spent my New Year watching things tick over - and for the first time at New AUUG Management Committee Year’s, I was glad to NOT see fireworks :-) Emaih [email protected] President: With the start of the year, we start to look to the Elections for the David Purdue AUUG Management Committee. [email protected] Tattersall’s 787 Dandenong Road The AUUG Management Committee (or AUUG Exec) is responsible for East Malvern VIC 3145 looking after your member interests. How AUUG serves you is Its’ primary function. This includes such things as organising the Winter Vice-President: Conference, Symposia around the country, coordinating efforts with Mark White Mark,[email protected] the Chapters, making sure we have enough money to do all these Red Hat Asia-Pacific things, and importantly, making sure that we give you, our Members, Suite 141/45 Cribb Street the best possible value for your Membership dollar.
    [Show full text]