Pdf Compiledsquare-Manual0109-Proof

Total Page:16

File Type:pdf, Size:1020Kb

Pdf Compiledsquare-Manual0109-Proof GNU Essentials GNU Linux Manual of Style for Technical Content Creators 2020 Copyright (c) GNU Essentials ISBN: 978-1-71683-468-4 Manufactured in the United States of America You may distribute the GNU Linux Manual of Style and/or modify the GNU Linux Manual of Style under the following terms: Code GNU General Public License (http://www.gnu.org/licenses/gpl.html), version 3 or later Content Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), version 4.0 or later (Other content used in the book was this license, so this became the preferred license) Trademarks: Respecting the choice to trademark by others, we do not have trademark rules for GNU Essentials, FAQ Linux, R00T magazine or A-Z Technical Writing. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Foreword About the Author Overview Dedication Revision History 1. Documentation Development Life Cycle 1.0 Basics of Technical Authoring...........................................................................................................11 1.1 Documentation Development Life Cycle............................................................................................11 1.2 Example: Get Started Guide..............................................................................................................29 Chapter 2. GNU Linux Style Guidelines 2.0 Headings...........................................................................................................................................35 2.1 Images.............................................................................................................................................. 36 2.2 Copy Code........................................................................................................................................38 2.3 General Content................................................................................................................................38 2.4 Capitalization.....................................................................................................................................45 2.5 Spelling............................................................................................................................................. 45 2.6 Dates................................................................................................................................................. 45 2.7 Lists................................................................................................................................................... 46 2.8 Numbers in text.................................................................................................................................46 2.9 Front Matter.......................................................................................................................................48 2.10 Back Matter.......................................................................................................................................48 2.11 Cross References..............................................................................................................................48 2.10 Table of Contents and Index.............................................................................................................48 2.11 Measurements...................................................................................................................................49 2.12 Versions............................................................................................................................................49 Chapter 3: Best Practices 3.0 Paths and Permissions..........................................................................................................................51 3.1 Dependencies........................................................................................................................................51 3.2 Links......................................................................................................................................................51 3.3 Code......................................................................................................................................................53 3.4 Audience and Tone................................................................................................................................60 3.5 Grammar................................................................................................................................................ 64 3.6 Punctuation............................................................................................................................................64 3.7 User (Normal User, Root User, End User).............................................................................................67 3.8 Naming (example: Pop OS! Greek translation)......................................................................................67 3.9 Communications and Contents..............................................................................................................68 Chapter 4. Developer Documentation Best Practices 4.0 Acronyms...............................................................................................................................................70 4.1 Internet of Things or IoT.........................................................................................................................71 4.2 Cultural issues.......................................................................................................................................72 4.3 Text Editors............................................................................................................................................73 4.4 Spacing.................................................................................................................................................. 74 4.5 Clear Communication.............................................................................................................................74 4.6 Multiple Operating Systems...................................................................................................................75 4.7 Website Images.....................................................................................................................................76 4.8 Infographics...........................................................................................................................................76 4.9 Key Commands ....................................................................................................................................77 4.10 FAQs or Troubleshooting Tips ............................................................................................................77 4.11 Command or brand 83 Chapter 5. Documentation Considerations 5.0 Management of Information...................................................................................................................79 5.1 Management of Information Plan...........................................................................................................79 5.2 Management of Information Plan Sample..............................................................................................79 5.3 Content Creator Toolbox........................................................................................................................80 5.4 Documentation Types............................................................................................................................81 5.5 Website Content....................................................................................................................................81 5.6 Accessibility...........................................................................................................................................81 5.7 Privacy and Privacy Template – Participant Testing..............................................................................82 5.8 Security.................................................................................................................................................. 85 Chapter 6. Legal and Licensing 6.0 General Trademark and Copyright information ......................................................................................87 6.1 Embargoed Content................................................................................................................................87 6.2 Free Content...........................................................................................................................................87 6.3 Non-Compete Agreements ....................................................................................................................87 6.4 Documentation Licensing.......................................................................................................................87 6.5 Debian Documentation Licensing (FREE)..............................................................................................88 6.6 RedHat Documentation Licensing (FREE)..............................................................................................89 6.7 Ubuntu Documentation Licensing (Copyright notice) .............................................................................89 Appendix Appendix A. man pages................................................................................................................................89
Recommended publications
  • When Memory Serves Not So Well Memory Errors 30 Years Later
    i i i i WHEN MEMORY SERVES NOT SO WELL MEMORY ERRORS 30 YEARS LATER PH.D. THESIS VICTOR VAN DER VEEN VRIJE UNIVERSITEIT AMSTERDAM, 2019 i i i i i i i i Faculty of Science The research reported in this dissertation was conducted at the Faculty of Science — at the Department of Computer Science — of the Vrije Universiteit Amsterdam This work is part of the research programme Cyber Security with project number 628.001.021, which is nanced by the Netherlands Organisation for Scientic Research (NWO) Copyright © 2019 by Victor van der Veen ISBN 978-94-6361-334-7 Cover design by Victor van der Veen Printed by Optima Grasche Communicatie This work was written in Vim, not Emacs i i i i i i i i VRIJE UNIVERSITEIT WHEN MEMORY SERVES NOT SO WELL MEMORY ERRORS 30 YEARS LATER ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnicus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Bètawetenschappen op donderdag 24 oktober 2019 om 13.45 uur in de aula van de universiteit, De Boelelaan 1105 door VICTOR VAN DER VEEN geboren te Hoorn i i i i i i i i promotor: prof.dr.ir. H. J. Bos copromotor: dr. C. Giurida i i i i i i i i Voor Marieke i i i i i i i i i i i i i i i i “First, it is slightly cheaper; and secondly it has the words DON’T PANIC inscribed in large friendly letters on its cover” Douglas Adams on The Hitchhiker’s Guide to the Galaxy i i i i i i i i i i i i i i i i Acknowledgements “Haha, het is echt het meest vage projectvoorstel dat ik ooit heb geschreven.” This is how Herbert pitched his open PhD position to me, back in 2013.
    [Show full text]
  • Proxylogon Is Just the Tip of the Iceberg, a New Attack Surface On
    ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server! Orange Tsai USA 2021 Orange Tsai • Orange Tsai, focusing on Web and Application 0-day research • Principal Security Researcher of DEVCORE • Captain of HITCON CTF Team • Speaker of Security Conferences • Black Hat USA & ASIA / DEFCON / HITB / HITCON … • Selected Awards and Honors: • 2017 - 1st place of Top 10 Web Hacking Techniques • 2018 - 1st place of Top 10 Web Hacking Techniques • 2019 - Winner of Pwnie Awards "Best Server-Side Bug" • 2021 - Champion and "Master of Pwn" of Pwn2Own Disclaimer All vulnerabilities disclosed today are reported responsibly and patched by Microsoft Why Target Exchange Server? 1. Mail servers always keep confidential secrets and Exchange Server is the most well-known mail solution for enterprises and governments worldwide 2. Has been the target for Nation-sponsored hackers for a long time (Equation Group) 3. More than 400,000 Exchange servers exposed on the Internet according to our survey Exchange Security in the Past Years • Most bugs are based on known attack vectors but there are still several notable bugs: 1. EnglishmansDentist from Equation Group: • Recap: A only practical and public pre-auth RCE in the Exchange history. Unfortunately, the arsenal only works on an ancient Exchange Server 2003 2. CVE-2020-0688 Hardcoded MachineKey from anonymous working with ZDI: • Recap: A classic .NET deserialization bug due to a hardcoded cryptography key. This is also a hint shows Microsoft Exchange is lacking of security reviews Our Works • We focus on the Exchange architecture and discover a new attack surface that no one proposed before.
    [Show full text]
  • Fantamag.Com & Storemags.Com
    A plan for Haiti Massachusetts stuns Obama New rules for banks Dark days for lawyers and consultants JANUARY 23RD–29TH 2010 Economist.com The psychology of power Stop! The backlash against big government www.storemags.com & www.fantamag.com Njetj{fcvtjofttftbsfuif fohjoftpgbtnbsufsqmbofu/ Xfbsfmjwjohpobwfszejggfsfouqmbofugspnuifpofxf JCNboepvsCvtjofttQbsuofstbsfxpsljohxjui mjwfepofwfobgfxzfbstbhp/Upebz-bmnptubozuijohjo uipvtboetpgnjetj{fdpnqbojftbspvoeuifxpsme uifxpsmedbocfjotusvnfoufe-joufsdpoofdufeboenbef upcvjmebtnbsufsqmbofu/XfÖsfqspwjejohuifjotjhiut joufmmjhfouÒuiftztufnt-qspdfttftboeefwjdftuibu boeuppmtuifzoffeupxpslnpsfqspevdujwfmzboe fobcmfqiztjdbmhppetupcfefwfmpqfe-nbovgbduvsfe- qspßubcmzÒqpxfsgvm-bggpsebcmftpmvujpotuibudbo cpvhiuboetpme<tfswjdftupcfefmjwfsfe<boecjmmjpot ifmqdpnqbojftjnqspwffgßdjfodz-epnpsfxjuimftt- pgqfpqmfupcpuixpslboemjwf/Jotipsu-pvsqmbofujt bddfmfsbufSPJboetfj{fofxpqqpsuvojujftgbtufs/ cfdpnjohtnbsufs/ XfÖsfbqqmzjohpvsdpmmfdujwfefquiboecsfbeuipg fyqfsjfodfxpsljohxjuijoopwbupstpgbmmtj{ft-bdsptt Uijtjtqpttjcmf-jombshfqbsu-cfdbvtfuifjoopwbujpo fwfszjoevtusz-upbeesfttkvtubcpvuboztj{fqspcmfn- esjwjohbtnbsufsqmbofujtpsjhjobujohboeqspmjgfsbujoh ubtlpsxpslmpbe/ gspnnpsfwbsjfetpvsdftuibofwfscfgpsf/Jogbdu-xifo zpvmpplbubmmuifofxpqqpsuvojujftfnfshjoh-zpvnjhiu Btpvsqmbofucfdpnfttnbsufs-njetj{fcvtjofttft uijoluibuuifzpomzbqqmzupmbshfsfoufsqsjtft/Cvu xjmmxjfmenpsfpguifjoàvfodfuibupodfcfmpohfeup josfbmjuz-njetj{fdpnqbojftibwfcffouiffohjoft pomzuifmbshftufoufsqsjtftÒ boeJCNboepvsCvtjoftt esjwjohfdpopnjdhspxuiboebtnbsufsqmbofugpstpnf
    [Show full text]
  • Technical Report RHUL–ISG–2019–1 27 March 2019
    20 years of Bleichenbacher attacks Gage Boyle Technical Report RHUL–ISG–2019–1 27 March 2019 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom Student Number: 100866673 Gage, Boyle 20 Years of Bleichenbacher Attacks Supervisor: Kenny Paterson Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Date: Acknowledgements I would first like to thank my project supervisor, Kenny Paterson. This project would not have been possible without his continuous encouragement to push the boundaries of my knowledge, and I am grateful for the commitment and expertise that he has provided throughout. Secondly, I would like to thank Nimrod Aviram for his invaluable advice, particularly with respect to algorithm implementation and understanding the finer details of this project. Further thanks should go to Raja Naeem Akram, Oliver Kunz and David Morrison for taking the time to teach me Python and how to run my source code on an Ubuntu server. I am grateful for the time that David Stranack, Thomas Bingham and James Boyle have spent proof reading this project, and for the continuous support from my part- ner, Lisa Moxham.
    [Show full text]
  • TLS Deep Dive
    12/9/17 TLS Deep Dive Website Security & More Joe Pranevich December 5, 2017 Today’s Session – Overview of TLS – Connection Establishment – Testing Tools – Recent Security Issues 1 12/9/17 What is SSL/TLS? – Core internet protocols (IP, TCP, HTTP) were designed without default security – SSL was invented in 1995 by Netscape to support encryption of web traffic for ecommerce and other uses. – SSL/TLS sits above TCP. It can be used to encrypt many protocols, but mostly used for HTTP. – Over two decades, SSL has been improved (with vulnerabilities discovered in older versions). The name was changed to TLS in 1999. SSL & TLS Timeline Protocol Released Notes SSLv2 1995 Vulnerable, depreciated in 2011 SSLv3 1996 Vulnerable, depreciated in 2015 TLS 1.0 1999 At risk, no longer permitted by PCI TLS 1.1 2006 TLS 1.2 2008 TLS 1.3 TBD Internet Draft 2 12/9/17 But Wait, There’s More! – TLS supports dozens of different encryption methods, compression methods, hashing functions, and other details. – Clients and servers select from a menu of these options to negotiate the best security (more on that later) – Most of these options have their own security histories, some have been deprecated, etc. Key Concepts – Shared Key Cryptography (Symmertric) – Public/Private Key Cryptography (Asymmetric) – Hashing 3 12/9/17 Connection Establishment – TLS Handshake – Cipher negotiation – Certificate Validation – Device Compatibility TLS Handshake – Part One – Client sends a “hello” message saying that they want TLS. – It includes TLS version, ciphers it supports, and other details – Server sends a “hello” message back. – It selects the most secure matching TLS version and ciphers – Connection will fail if client and server cannot agree on protocols and ciphers 4 12/9/17 Client Devices Have Different Capabilities As Do Servers & Load Balancers 5 12/9/17 We Care About The Intersection Backwards Compatibility Warning! – Web browsers and operating systems get updated frequently; you can usually rely on web users having a recent TLS stack when they connect to you.
    [Show full text]
  • TLS Attacks & DNS Security
    IAIK TLS Attacks & DNS Security Information Security 2019 Johannes Feichtner [email protected] IAIK Outline TCP / IP Model ● Browser Issues Application SSLStrip Transport MITM Attack revisited Network Link layer ● PKI Attacks (Ethernet, WLAN, LTE…) Weaknesses HTTP TLS / SSL FLAME FTP DNS Telnet SSH ● Implementation Attacks ... ● Protocol Attacks ● DNS Security IAIK Review: TLS Services All applications running TLS are provided with three essential services Authentication HTTPS FTPS Verify identity of client and server SMTPS ... Data Integrity Detect message tampering and forgery, TLS e.g. malicious Man-in-the-middle TCP IP Encryption Ensure privacy of exchanged communication Note: Technically, not all services are required to be used Can raise risk for security issues! IAIK Review: TLS Handshake RFC 5246 = Establish parameters for cryptographically secure data channel Full handshake Client Server scenario! Optional: ClientHello 1 Only with ServerHello Client TLS! Certificate 2 ServerKeyExchange Certificate CertificateRequest ClientKeyExchange ServerHelloDone CertificateVerify 3 ChangeCipherSpec Finished ChangeCipherSpec 4 Finished Application Data Application Data IAIK Review: Certificates Source: http://goo.gl/4qYsPz ● Certificate Authority (CA) = Third party, trusted by both the subject (owner) of the certificate and the party (site) relying upon the certificate ● Browsers ship with set of > 130 trust stores (root CAs) IAIK Browser Issues Overview Focus: Relationship between TLS and HTTP Problem? ● Attacker wants to access encrypted data ● Browsers also have to deal with legacy websites Enforcing max. security level would „break“ connectivity to many sites Attack Vectors ● SSLStrip ● MITM Attack …and somehow related: Cookie Stealing due to absent „Secure“ flag… IAIK Review: ARP Poisoning How? Attacker a) Join WLAN, ● Sniff data start ARP Poisoning ● Manipulate data b) Create own AP ● Attack HTTPS connections E.g.
    [Show full text]
  • RISKS Volume 18
    The Risks Digest Volume 18: Issue 1 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 18: Issue 1 Friday 5 April 1996 Contents Sixth Computers, Freedom and Privacy Shabbir J. Safdar A Wiretap Incident in New Orleans Shabbir J. Safdar Computer Error Costs MCI $Millions Scott Lucero Teen Accused of Hacking David M Kennedy Only Americans can contact the AT&T operator Tom Gardner Re: Wrong approach to Java security Frank Stuart Re: Risks of rewritable BIOSes Jeremy J Epstein Re: "This is not a bug" messages: MacsBug David A. Lyons Re: The Queen's Speech Allan Engelhardt Re: Notes on e-mail: Use of diaeresis Dan Hicks http://catless.ncl.ac.uk/Risks/18.01.html (1 of 21)2005-04-14 18:22:01 The Risks Digest Volume 18: Issue 1 Daan Sandee On the meaning of "email" Clive Feather Browser return e-mail addresses Walter Roberson Info on RISKS (comp.risks) Sixth Computers, Freedom and Privacy Shabbir J. Safdar <[email protected]> Thu, 04 Apr 1996 16:05:34 -0500 I attended last week's Sixth Computers, Freedom, and Privacy conference in Cambridge MA, where policy-makers, technical experts, and activists came together to hash out the intersection of the three elements of its title. CFP is an unusual place; the closest thing our community can get to "neutral ground" on many issues. This is best expressed by the fact that in the hallways of the hotel, it's not unusual to see those that supported and those that fought the Communications Decency Act hob-nobbing it up, trading friendly swipes about their take on the bill.
    [Show full text]
  • Ubuntu: Unleashed 2017 Edition
    Matthew Helmke with Andrew Hudson and Paul Hudson Ubuntu UNLEASHED 2017 Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Ubuntu Unleashed 2017 Edition Editor-in-Chief Copyright © 2017 by Pearson Education, Inc. Mark Taub All rights reserved. Printed in the United States of America. This publication is protected Acquisitions Editor by copyright, and permission must be obtained from the publisher prior to any prohib- Debra Williams ited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information Cauley regarding permissions, request forms and the appropriate contacts within the Pearson Managing Editor Education Global Rights & Permissions Department, please visit www.pearsoned.com/ permissions/. Sandra Schroeder Many of the designations used by manufacturers and sellers to distinguish their Project Editor products are claimed as trademarks. Where those designations appear in this book, and Lori Lyons the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. Production Manager The author and publisher have taken care in the preparation of this book, but make Dhayanidhi no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in Proofreader connection with or arising out of the use of the information or programs contained Sasirekha herein. Technical Editor For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content José Antonio Rey particular to your business, training goals, marketing focus, or branding interests), Editorial Assistant please contact our corporate sales department at [email protected] or (800) 382-3419.
    [Show full text]
  • Cryptographic Software: Vulnerabilities in Implementations 1
    Pobrane z czasopisma Annales AI- Informatica http://ai.annales.umcs.pl Data: 03/10/2021 00:10:27 Annales UMCS Informatica AI XI, 4 (2011) 1–10 DOI: 10.2478/v10065-011-0030-7 Cryptographic software: vulnerabilities in implementations Michał Łuczaj1∗ 1Institute of Telecommunications, Warsaw University of Technology Poland Abstract – Security and cryptographic applications or libraries, just as any other generic software products may be affected by flaws introduced during the implementation process. No matter how much scrutiny security protocols have undergone, it is — as always — the weakest link that holds everything together to makes products secure. In this paper I take a closer look at problems usually resulting from a simple human made mistakes, misunderstanding of algorithm details or a plain lack of experience with tools and environment. In other words: everything that can and will happen during software development but in the fragile context of cryptography. UMCS1 Introduction I begin with a brief introduction of typical mistakes and oversights that can be made during program implementation in one of the most popular programming languages, C[1]. I also explain the concept of exploitable memory corruption, how critical it is and where it leads from the attacker’s point of view. A set of real-world examples is given. Some well known previously disclosed vulner- abilities are brought to illustrate how a flaw (sometimes even an innocent looking) can fatally injune security of the whole protocol, algorithm. There is much to discuss as failed attempts at implementing cryptographic primitives — or making use of cryptog- raphy in general — range broadly.
    [Show full text]
  • It-Säkerhet - Examensarbete
    IT-SÄKERHET - EXAMENSARBETE Största IT-säkerhetshoten mot svenska företag och organisationer idag, samt kontemporära metoder och verktyg för bekämpning av dessa IT-säkerhetshot. DEN 29 MARS 2016 BENJAMIN LUNDSTRÖM Examensarbete i Nät- & kommunikationsteknik, Umeå universitet. Löpnummer EL1609. BENJAMIN LUNDSTRÖM 16-03-29 IT-SÄKERHET - EXAMENSARBETE Sammanfattning Olika former av IT-relaterade hot har förekommit sedan internets födelse. Inledningsvis var de harmlösa humoristiska program som över tiden utvecklades till kriminella verktyg med ekonomiska syften. Elakartad programkod benämns under samlingsnamnet Malware. En angripare besitter idag ett stort antal metoder för otillåten tillgång till system, neka legitima användare tillgång till system eller på ett stort antal sätt bedriva kriminell verksamhet av ekonomisk karaktär. Skydds- och bekämpningsmetoderna innefattar brandväggar, olika analys-, detektions- och preventionssystem (IDS/IPS) och kryptering. Men för att komma tillrätta med IT-hoten fullt ut krävs också säkerhetsutbildning och incidenthantering som sker via incidentplanering, rapporter, dokumentation, backup och informationsklassning. Kontemporära IT-säkerhetshot av betydande art belyses i rapporten. Stuxnet (2009), som angrep Irans kärnvapenforskning. Flamer (2011), ett cybervapen vars syfte är spårlös informationsinhämtning. BlackEnergy (2015) och angreppet mot elförsörjningen i Ukraina. DDoS- attacken mot Svenska medier behandlas liksom Petya (2016) som är nya generationens Ransomeware. Det är vitalt för företag och organisationer att skydda sin viktigaste tillgång, informationen. Både mot cyberkriminella element i rent finansiellt syfte men i tilltagande grad också mot olika cybervapen och möjligtvis också mot cyberterrorism. Abstract A number of IT-related threats have emerged since the birth of internet. In the beginning they were harmless but over time they developed into fearsome criminal tools for economic purposes.
    [Show full text]
  • What We Can Learn About China from Research Into Sina Weibo
    CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO by Jason Q. Ng English Literature, A.B., Brown University, 2006 Submitted to the Graduate Faculty of the Dietrich School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts of East Asian Studies University of Pittsburgh 2013 fcomfort UNIVERSITY OF PITTSBURGH THE DIETRICH SCHOOL OF ARTS AND SCIENCES This thesis was presented by Jason Q. Ng It was defended on April 9, 2013 and approved by Pierre F. Landry, Associate Professor, Political Science Ronald J. Zboray, Professor, Communication Mary Saracino Zboray, Visiting Scholar, Communication Thesis Director: Katherine Carlitz, Assistant Director, Asian Studies Center ii Copyright © by Jason Q. Ng 2013 iii CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO Jason Q. Ng, M.A. University of Pittsburgh, 2013 Like all nations, China has been profoundly affected by the emergence of the Internet, particularly new forms of social media—that is, media that relies less on mainstream sources to broadcast news and instead relies directly on individuals themselves to share information. I use mixed methods to examine how three different but intertwined groups—companies, the government, and Chinese Internet users themselves (so-called “netizens”)—have confronted social media in China. In chapter one, I outline how and why China’s most important social media company, Sina Weibo, censors its website. In addition, I describe my research into blocked search terms on Sina Weibo, and explain why particular keywords are sensitive.
    [Show full text]
  • By Sudodus Alias Nio-Wiklund at Launchpad
    mkusb version 11 quick start manual by sudodus alias nio-wiklund at launchpad 22 September 2016 mkusb - quick start manual 1 Overview ● Page 3 Prepare. install, run mkusb ● Page 8 Help text and more details ● Page 11 Slideshow ● Page 12 Standard installation ● Page 20 Persistent live system ● Page 24 ISO-testing ● Page 27 Wipe the first megabyte and wipe meny ● Page 31 References 22 September 2016 mkusb - quick start manual 2 Prepare for mkusb ● Drives alias mass storage devices – You need two drives or mass storage devices (pendrive, flash card, HDD, SSD). The minimum sizes are 1 GB and 4 GB, but obviously the final operating system will soon need more space for your personal files as well as for additional system files (program packages), ● a drive for the installer (minimum 1 GB for a CD size iso file, typically 4 GB USB pendrive for a live only system and 8 GB or more for a persistent live system), and ● a drive for the target, the final installed operating system (typically an internal drive, but it could also be connected via USB, eSATA or a card reader). Minimum 4 GB for Lubuntu but 8 GB or more is better, and will work with all desktop flavours of Ubuntu and many other linux operating systems. ● Backup – Backup all personal data before trying this method because the installer drive and maybe also the target drive will be completely overwritten Tough guys never backup their data, they do the work twice instead ;-) 22 September 2016 mkusb - quick start manual 3 Install or download mkusb ● Install (or download) the shell-script mkusb and ● download the operating system as a – hybrid iso file or compressed image file.
    [Show full text]