Status=Not/Inst/Cfg-Files/Unpacked

Total Page:16

File Type:pdf, Size:1020Kb

Status=Not/Inst/Cfg-Files/Unpacked Desired=Unknown/Install/Remove/Purge/Hold |Status=Not/Inst/Cfgfiles/Unpacked/Failedcfg/Halfinst/trigaWait/Trigpend |/Err?=(none)/Reinstrequired(Status,Err:uppercase=bad) ||/NameVersion Description +++=========================================================================== =============================================================================== ================================================================================ ===== ii0trace1.0bt4 0traceisatraceroutetoolthatcanberunwithinanexisting,open TCPconnectionthereforebypassingsometypesofstatefulpacketfilterswith ease. ii3proxy0.6.1bt2 3APA3A3proxytinyproxyserver iiace1.10bt2 ACE(AutomatedCorporateEnumerator)isasimpleyetpowerfulVoIPCo rporateDirectoryenumerationtoolthatmimicsthebehaviorofanIPPhoneinor dert iiadduser3.112ubuntu1 addandremoveusersandgroups iiadmsnmp0.1bt3 SNMPauditscanner. iiafflib3.6.10bt1 AnopensourceimplementationofAFFwritteninC. iiair2.0.0bt2 AIRisaGUIfrontendtodd/dc3dddesignedforeasilycreatingforen sicimages. iiaircrackng1.1bt9 Aircrackngwirelessexploitationandenumerationsuite iialacarte0.13.10ubuntu1 easyGNOMEmenueditingtool iialsabase1.0.22.1+dfsg0ubuntu3 ALSAdriverconfigurationfiles iialsatools1.0.220ubuntu1 ConsolebasedALSAutilitiesforspecifichardware iialsautils1.0.220ubuntu5 ALSAutilities iiamap5.2bt4 Amapisanextgenerationtoolforassistingnetworkpenetrationtesti ng.Itperformsfastandreliableapplicationprotocoldetection,independanton the iiapache22.2.145ubuntu8.4 ApacheHTTPServermetapackage iiapache2mpmprefork2.2.145ubuntu8.4 ApacheHTTPServertraditionalnonthreadedmodel iiapache2utils2.2.145ubuntu8.4 utilityprogramsforwebservers iiapache2.2bin2.2.145ubuntu8.4 ApacheHTTPServercommonbinaryfiles iiapache2.2common2.2.145ubuntu8.4 ApacheHTTPServercommonfiles iiappinstalldata0.10.04.7 Ubuntuapplications(datafiles) rcapparmor2.5.10ubuntu0.10.04.3 UserspaceparserutilityforAppArmor rcapparmorutils2.5.10ubuntu0.10.04.3 UtilitiesforcontrollingAppArmor iiapport1.13.30ubuntu2 automaticallygeneratecrashreportsfordebugging iiapportsymptoms0.9 symptomscriptsforapport iiapt0.7.25.3ubuntu9.4 Advancedfrontendfordpkg iiapttransporthttps0.7.25.3ubuntu9.4 APThttpstransport iiaptutils0.7.25.3ubuntu9.4 APTutilityprograms iiaptitude0.4.11.111ubuntu10 terminalbasedpackagemanager iiarpscan1.62 arpscanningandfingerprintingtool iiarping2.09bt0 BroadcastsawhohasARPpacketonthenetworkandprintsanswers. iiasleap2.2bt1 DemonstratesaseriousdeficiencyinproprietaryCiscoLEAPnetworks. iiaspauditor2.2bt2 LookforcommonmisconfigurationsandinformationleaksinASP.NETap plications. iiaspell0.60.63ubuntu1 GNUAspellspellchecker iiaspellen6.005.1ubuntu3 EnglishdictionaryforGNUAspell iiat3.1.111ubuntu5.1 Delayedjobexecutionandbatchprocessing iiautoconf2.653ubuntu1 automaticconfigurescriptbuilder iiautomake1:1.11.11 AtoolforgeneratingGNUStandardscompliantMakefiles iiautopsy2.24bt0 AgraphicalinterfacetoTSK. iiautoscan1.50bt0 Anetworkscanner(discoveringandmanagingapplication). iiautotoolsdev20090611.1 Updateinfrastructureforconfig.{guess,sub}files iiavahidaemon0.6.251ubuntu6.2 AvahimDNS/DNSSDdaemon iiaxel2.41 lightdownloadacceleratorconsoleversion iibacktrackbashprofile1.0bt2 bashprofileandbashrcfiles iibacktrackbootsplash1.0bt2 BackTrackbootsplash iibacktrackgnomeessential1.5bt3 GnomemenuandthemesforBackTrack iibacktrackmenuicons1.5bt3 BackTrackMenuIcons iibacktrackutils1.3bt2 Smallbashscriptsandutilities,aswellascoreappsthatneedtob einthebuild. iibacktrackwallpapers1.1bt0 BackTrackWallpapers iibasefiles5.0.0ubuntu20.10.04.3 Debianbasesystemmiscellaneousfiles iibasepasswd3.5.22 Debianbasesystemmasterpasswordandgroupfiles iibash4.12ubuntu3 TheGNUBourneAgainSHell iibashcompletion1:1.13ubuntu2 programmablecompletionforthebashshell iibc1.06.952 TheGNUbcarbitraryprecisioncalculatorlanguage iibed0.5bt1 BEDisaprogramwhichisdesignedtocheckdaemonsforpotentialbuf feroverflows,formatstringset.al. iibeef0.4.0.0bt1 BeEF,theBrowserExploitationFrameworkisaprofessionalsecurityt oolprovidedforlawfulresearchandtestingpurposes.Itallowstheexperienced pene iibeefng0.4.2.7bt1 TheBrowserExploitationFramework(BeEF)isapowerfulprofessional securitytool.BeEFispioneeringtechniquesthatprovidetheexperiencedpenetr ation iibind9host1:9.7.0.dfsg.P11ubuntu0.1 Versionof'host'bundledwithBIND9.X iibinfmtsupport1.2.18 Supportforextrabinaryformats iibinutils2.20.13ubuntu7.1 TheGNUassembler,linkerandbinaryutilities iibison1:2.4.1.dfsg3 AparsergeneratorthatiscompatiblewithYACC iibkhive1.1.11 DumpthesyskeybootkeyfromaWindowsNT/2K/XPsystemhive iiblindelephant1.0bt3 BlindElephantisanopensourcegenericwebapplicationfingerprinte rthatproducesresultsbyexaminingasmallsetofstaticfiles. iiblt2.4z4.2 theBLTextensionlibraryforTcl/Tkruntimepackage iibluediving0.9bt1 BluedivingisaBluetoothpenetrationtestingsuite. iibluemaho090417bt0 BlueMahoisGUIshell(interface)forsuiteoftoolsfortestingsecu rityofbluetoothdevices.Itisfreeware,opensource,writtenonpython,usesw xPyho iibluetooth4.600ubuntu8 Bluetoothsupport iibluez4.91bt0 BlueZisofficialLinuxBluetoothprotocolstack.ItisanOpenSourc eprojectdistributedunderGNUGeneralPublicLicense(GPL).BlueZkernelispa rtof iibluezalsa4.600ubuntu8 Bluetoothaudiosupport iibluezcups4.600ubuntu8 BluetoothprinterdriverforCUPS iibluezgstreamer4.600ubuntu8 BluetoothGStreamersupport iibluezhcidump1.421build1 AnalysesBluetoothHCIpackets iibluezutils4.600ubuntu8 Transitionalpackage iiboglbterm0.1.183ubuntu4 Ben'sOwnGraphicsLibrarygraphicalterminal iibraa0.82bt2 BraaisatoolformakingSNMPqueries. iibridgeutils1.45ubuntu2 UtilitiesforconfiguringtheLinuxEthernetbridge iibsdmainutils8.0.1ubuntu1 collectionofmoreutilitiesfromFreeBSD iibsdutils1:2.17.20ubuntu1.10.04.2 Basicutilitiesfrom4.4BSDLite iibtsystemmenuicons1.0bt1 BackTracksystemmenuicons iibtscanner2.1bt0 btscannerisatooldesignedspecificallytoextractasmuchinformat ionaspossiblefromaBluetoothdevicewithouttherequirementtopair.Adetai ledi iibuildessential11.4build1 Informationallistofbuildessentialpackages iibulkextractor0.7.18bt0 AC++programthatscansadiskimage(oranyotherfile)andextract susefulinformation. iiburpsuite1.4bt0 integratedplatformforperformingsecuritytestingofwebapplicatio ns iibusyboxinitramfs1:1.13.31ubuntu11 Standaloneshellsetupforinitramfs iibusyboxstatic1:1.13.31ubuntu11 Standalonerescueshellwithtonsofbuiltinutilities iibyobu2.680ubuntu1.1 asetofusefulprofilesandaprofileswitcherforGNUscreen iibzip21.0.54ubuntu0.1 highqualityblocksortingfilecompressorutilities iicacertificates20090814 CommonCAcertificates iicacertificatesjava20100406ubuntu1 CommonCAcertificates(JKSkeystore) iicabextract1.23+lenny1build0.10.04.1 aprogramtoextractMicrosoftCabinetfiles iicadaver0.23.31 commandlineWebDAVclient iicappletsdata1:2.30.10ubuntu1 configurationappletsforGNOMEdatafiles iicasper1.236.2 Runa"live"preinstalledsystemfromreadonlymedia iicewl3.0bt6 CeWL,theCustomWordListgenerator. iichkrootkit0.49bt0 Atooltolocallycheckforsignsofarootkit. iichntpw100627bt0 TheOfflineNTPasswordEditor iiciscoauditingtool1.0bt1 Perlscriptwhichscansciscoroutersforcommonvulnerabilities. iiciscoglobalexploiter13bt1 CiscoGlobalExploiter(CGE),isanadvanced,simpleandfastsecurit ytestingtool. iiciscoocs0.1bt3 Massciscoscanner iiciscotorch0.4bt1 CiscoScanner iiciscos1.3bt1 CiscoScannerwillscanarangeofIPaddressforCiscoroutersthat havn'tchangedtheirdefaultpasswordof"cisco". iicmospwd5.0bt0 DecryptspasswordstoredincmosusedtoaccessBIOSSETUP. iicmsexplorer1.0bt2 CMSExplorerisdesignedtorevealthethespecificmodules,plugins, componentsandthemesthatvariousCMSdrivenwebsitesarerunning. iicomerrdev2.11.41.111ubuntu2.1 commonerrordescriptionlibraryheadersandstaticlibraries iicommandnotfound0.2.40ubuntu5 Suggestinstallationofpackagesininteractivebashsessions iicommandnotfounddata0.2.40ubuntu5 Setofdatafilesforcommandnotfound. iicomplemento0.7.7bt0 Complementoisacollectionoftoolsforpentester:LetDownisapowe rful3wayhandshaketcpflooderReverseRaiderisadomainscannerthatuseword list iiconsolesetup1.34ubuntu15 consolefontandkeymapsetupprogram iiconsoleterminus4.302 FixedwidthfontsforfastreadingontheLinuxconsole iiconsolekit0.4.13ubuntu2 frameworkfordefiningandtrackingusers,sessionsandseats iicopyrouterconfig4.0bt3 CopyCiscoRouterconfigUsingSNMP. iicoreutils7.42ubuntu3 TheGNUcoreutilities iicowpatty4.3bt0 coWPAttyAttackingWPA/WPA2PSKExchanges iicpio2.101ubuntu2 GNUcpioaprogramtomanagearchivesoffiles iicpp4:4.4.31ubuntu1 TheGNUCpreprocessor(cpp) iicpp4.44.4.34ubuntu5 TheGNUCpreprocessor iicpuchecker0.10ubuntu2 toolstohelpevaluatecertainCPU(orBIOS)features iicreepy0.1.93bt1 creepyisanapplicationthatallowsyoutogathergeolocationrelate dinformationaboutusersfromsocialnetworkingplatformsandimagehostingser vices iicron3.0pl1106ubuntu5 processschedulingdaemon iicrunch3.0.1bt0 Crunchisawordlistgeneratorwhereyoucanspecifyastandardchara ctersetoracharactersetyouspecify.crunchcangenerateallpossiblecombin ation iicryptcat1.2.1bt2 Cryptcatisthestandardnetcatenhancedwithtwofishencryption. iicryptsetup2:1.1.0~rc21ubuntu13 configuresencryptedblockdevices iicupp3.1bt0 CommonUserPasswordsProfiler iicups1.4.31ubuntu1.4 CommonUNIXPrintingSystem(tm)server iicupsbsd1.4.31ubuntu1.4 CommonUNIXPrintingSystem(tm)BSDcommands iicupsclient1.4.31ubuntu1.4 CommonUNIXPrintingSystem(tm)clientprograms(SysV) iicupscommon1.4.31ubuntu1.4 CommonUNIXPrintingSystem(tm)commonfiles iicupsdrivergutenprint5.2.50ubuntu1.1 printerdriversforCUPS iicurl7.19.71ubuntu1 GetafilefromanHTTP,HTTPSorFTPserver iicve1.0bt1 FirefoxlinktoMitreCVE. iicvs1:1.12.1312ubuntu1 ConcurrentVersionsSystem iicymothoa1alphabt0 Cymothoaisastealthbackdooringtool,thatinjectbackdoor'sshellc odeintoanexistingprocess.
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Solaris 2.5 Software Developer Kit Introduction
    Solaris 2.5 Software Developer Kit Introduction 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. A Sun Microsystems, Inc. Business 1995 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX Systems Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party software, including font technology in this product, is protected by copyright and licensed from Sun’s Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, DeskSet, ONC, ONC+, NFS, SunExpress, ProCompiler, XView, ToolTalk, XGL, XIL, Solaris VISUAL, Solaris PEX, and AnswerBook are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. CatalystSM is a service mark of Sun Microsystems, Inc.
    [Show full text]
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • Annual Report in This Report
    GNOME FOUNDATION 2018–2019 ANNUAL REPORT IN THIS REPORT 3 Letter from the GNOME Foundation 4 About GNOME 5 Releases 6 Accessibility 6 GNOME Moves to Discourse 7 GitLab Statistics and Activity 8 Hackfests CREDITS 9 Conferences Thank you to everyone involved in the making of this report! We appreciate the authors, editors, and organizers that helped highlight 10 Finances at a Glance all the great work GNOME accomplished in the 2018‑2019 fiscal year. Gaurav Agrawal, Matthias Clasen, Emmanuele Bassi, Molly de Blanc, 12 Outreach Sebastian Dröge, Caroline Henriksen, Juanjo Marin, Neil McGovern, Bartłomiej Piotrowski, Kristi Progri, Oliver Propst, Andrea Veri, 13 Friends of GNOME Britt Yazel, and Rosanna Yuen. 2 2019 was an exciting year for us! We increased the Foundation‘s staff with three new employees—a GTK+ core developer, a Program LETTER FROM Coordinator, and a Strategic Initiatives Manager—expanded our efforts with new projects, and continued making great soware. We had three wildly successful conferences, several hackfests, and a number of newcomer events geared towards helping new contributors get THE GNOME involved in GNOME. We sponsored three amazing Outreachy interns and mentored nine students through Google Summer of Code. There were numerous technical successes: updates to GTK, two new releases of the desktop environment, and numerous infrastructure improvements, including both hardware and soware upgrades. We introduced an Inclusion and Diversity team in order to make the FOUNDATION GNOME community a more welcoming place. We announced the GNOME Community Engagement Challenge. We had speakers and booths at conferences in Asia, Europe, North America, and South America.
    [Show full text]
  • Accessing Windows Applications from Unix and Vice Versa
    50-20-42 DATA COMMUNICATIONS MANAGEMENT ACCESSING WINDOWS APPLICATIONS FROM UNIX AND VICE VERSA Raj Rajagopal INSIDE Accessing Windows Applications from an X-Station, Coexistence Options, Windows in an X-Station, Accessing Windows Applications, Accessing UNIX Applications from Windows Desktops, Emulators Migrating from one environment to another takes planning, resources and, most importantly, time (except in very trivial cases). This implies that even if eventually migrating to another environment, one still has to deal with coexistence among environments in the interim. In many com- panies it would make good business sense not to migrate legacy systems at all. Instead, it may be better to develop new systems in the desired en- vironment and phase out the legacy applications. The data created by the legacy applications is important and one must ensure that data can be ac- cessed from a new environment. Coexistence considerations are very im- portant in this case. Coexistence between Windows PAYOFF IDEA NT, UNIX, and NetWare deals with a Some users want applications they develop in number of related issues. One may one environment to execute in other environ- need to access Windows applications ments with very little change. With this approach, they can continue to develop applications with from a UNIX machine or need to ac- the confidence that they will execute in another cess UNIX applications from Win- environment even if the environments change in dows desktops. One may prefer to the future. In applications that can run in both have the same type of desktop (Òan Windows NT and UNIX, this can be accomplished enterprise desktopÓ) for all users and in several ways: be able to access different environ- •use APIs — there are three flavors of this ap- ments.
    [Show full text]
  • Behavior Based Software Theft Detection, CCS 2009
    Behavior Based Software Theft Detection 1Xinran Wang, 1Yoon-Chan Jhi, 1,2Sencun Zhu, and 2Peng Liu 1Department of Computer Science and Engineering 2College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 {xinrwang, szhu, jhi}@cse.psu.edu, [email protected] ABSTRACT (e.g., in SourceForge.net there were over 230,000 registered Along with the burst of open source projects, software open source projects as of Feb.2009), software theft has be- theft (or plagiarism) has become a very serious threat to the come a very serious concern to honest software companies healthiness of software industry. Software birthmark, which and open source communities. As one example, in 2005 it represents the unique characteristics of a program, can be was determined in a federal court trial that IBM should pay used for software theft detection. We propose a system call an independent software vendor Compuware $140 million dependence graph based software birthmark called SCDG to license its software and $260 million to purchase its ser- birthmark, and examine how well it reflects unique behav- vices [1] because it was discovered that certain IBM products ioral characteristics of a program. To our knowledge, our contained code from Compuware. detection system based on SCDG birthmark is the first one To protect software from theft, Collberg and Thoborson that is capable of detecting software component theft where [10] proposed software watermark techniques. Software wa- only partial code is stolen. We demonstrate the strength of termark is a unique identifier embedded in the protected our birthmark against various evasion techniques, including software, which is hard to remove but easy to verify.
    [Show full text]
  • Overview Work Experience Skills Contact Education
    OVERVIEW Have over 6 years experience in development E-Learning Tool, 1 year experience in development Search Engine website; 1 year in defect tracking tool, 6 months experience in development Task Management tool; 4 years experience in development Enterprise Social Network. Skill in C/C++, VC++, Java Springframework, C#, ASP.Net, Linq, WPF, WCF, JavaScript., .Net Framework 1.x, Net Framework 2.0, 3.5, 4.0, REST API. Good knowledge in Object Oriented Programming. Have years experience in C++, VC++, C#.Net, Java, Javascript and 6 years experience in Cross Platforms Programming, System Events Hook technique, Application Programming Interface Hook technique, Java Access Bridge, Microsoft Active Accessibility, and IHTML, Java, Spring MVC. CONTACT WORK EXPERIENCE 03 Apr, 1981 Senior Software Engineer January, 2014- Now Ho Chi Minh City PROJECT: ZILLABLE Project Description: Enterprise Social Network EDUCATION Industry: Social Network Project Team Size: 15+ Bachelor – Information Technology, Role(s): Developer, Component owner University of Sciences and Natural, Skill Set Utilized: Ho Chi Minh City, VietNam Languages: Java, AngularJS Middleware: MongoDB, Elasticsearch SKILLS Others: REST API, Integration: Google APIs, OneDrive API, DropBox, Interested in and researching: Box Auth2 AI Responsibilities: Programming Crypto, Smart Contract Number of People Managed: 0 FinTech Assignment Duration Algorithms High level programming: Senior Software Engineer January, 2013 - 2014 define data models and basic PROJECT: INTEGRIS relationships for code generation
    [Show full text]
  • Guile-GNOME: Atk Version 2.16.2, Updated 9 December 2011
    Guile-GNOME: Atk version 2.16.2, updated 9 December 2011 Bill Haneman Marc Mulcahy Padraig O'Briain This manual is for (gnome atk) (version 2.16.2, updated 9 December 2011) Copyright 2001-2007 Bill Haneman, Marc Mulcahy, Padraig O'Briain Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation. i Short Contents 1 Overview :::::::::::::::::::::::::::::::::::::::::::: 1 2 AtkAction ::::::::::::::::::::::::::::::::::::::::::: 2 3 AtkComponent ::::::::::::::::::::::::::::::::::::::: 4 4 AtkDocument :::::::::::::::::::::::::::::::::::::::: 8 5 AtkEditableText ::::::::::::::::::::::::::::::::::::: 10 6 AtkGObjectAccessible :::::::::::::::::::::::::::::::: 12 7 AtkHyperlinkImpl :::::::::::::::::::::::::::::::::::: 13 8 AtkHyperlink ::::::::::::::::::::::::::::::::::::::: 14 9 AtkHypertext ::::::::::::::::::::::::::::::::::::::: 17 10 AtkImage::::::::::::::::::::::::::::::::::::::::::: 18 11 AtkNoOpObjectFactory ::::::::::::::::::::::::::::::: 20 12 AtkNoOpObject ::::::::::::::::::::::::::::::::::::: 21 13 AtkObjectFactory :::::::::::::::::::::::::::::::::::: 22 14 AtkObject :::::::::::::::::::::::::::::::::::::::::: 23 15 AtkRegistry ::::::::::::::::::::::::::::::::::::::::: 29 16 AtkRelationSet :::::::::::::::::::::::::::::::::::::: 31 17 AtkRelation::::::::::::::::::::::::::::::::::::::::: 33 18 AtkSelection :::::::::::::::::::::::::::::::::::::::: 35 19 AtkStateSet :::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Direct Xlib User's Guide
    Direct Xlib User’s Guide 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. A Sun Microsystems, Inc. Business 1995 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX Systems Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party software, including font technology in this product, is protected by copyright and licensed from Sun’s Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, Direct Xlib, DeskSet, ONC, ONC+, and NFS are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd.
    [Show full text]
  • Release Notes for Xfree86® 4.8.0 the Xfree86 Project, Inc December 2008
    Release Notes for XFree86® 4.8.0 The XFree86 Project, Inc December 2008 Abstract This document contains information about the various features and their current sta- tus in the XFree86 4.8.0 release. 1. Introduction to the 4.x Release Series XFree86 4.0 was the first official release of the XFree86 4 series. The current release (4.8.0) is the latest in that series. The XFree86 4.x series represents a significant redesign of the XFree86 X server,with a strong focus on modularity and configurability. 2. Configuration: aQuickSynopsis Automatic configuration was introduced with XFree86 4.4.0 which makes it possible to start XFree86 without first creating a configuration file. This has been further improved in subsequent releases. If you experienced any problems with automatic configuration in a previous release, it is worth trying it again with this release. While the initial automatic configuration support was originally targeted just for Linux and the FreeBSD variants, as of 4.5.0 it also includes Solaris, NetBSD and OpenBSD support. Full support for automatic configuration is planned for other platforms in futurereleases. If you arerunning Linux, FreeBSD, NetBSD, OpenBSD, or Solaris, try Auto Configuration by run- ning: XFree86 -autoconfig If you want to customise some things afterwards, you can cut and paste the automatically gener- ated configuration from the /var/log/XFree86.0.log file into an XF86Config file and make your customisations there. If you need to customise some parts of the configuration while leav- ing others to be automatically detected, you can combine a partial static configuration with the automatically detected one by running: XFree86 -appendauto If you areusing a platform that is not currently supported, then you must try one of the older methods for getting started like "xf86cfg", which is our graphical configuration tool.
    [Show full text]
  • Multi Software Product Lines in the Wild
    AperTO - Archivio Istituzionale Open Access dell'Università di Torino Multi software product lines in the wild This is the author's manuscript Original Citation: Availability: This version is available http://hdl.handle.net/2318/1667454 since 2020-07-06T10:51:50Z Publisher: Association for Computing Machinery Published version: DOI:10.1145/3168365.3170425 Terms of use: Open Access Anyone can freely access the full text of works made available as "Open Access". Works made available under a Creative Commons license can be used according to the terms and conditions of said license. Use of all other works requires consent of the right holder (author or publisher) if not exempted from copyright protection by the applicable law. (Article begins on next page) 27 September 2021 Multi Software Product Lines in the Wild Michael Lienhardt Ferruccio Damiani [email protected] [email protected] Università di Torino Università di Torino Italy Italy Simone Donetti Luca Paolini [email protected] [email protected] Università di Torino Università di Torino Italy Italy ABSTRACT 1 INTRODUCTION Modern software systems are often built from customizable and A Software Product Line (SPL) is a set of similar programs, called inter-dependent components. Such customizations usually define variants, with a common code base and well documented variabil- which features are offered by the components, and may depend ity [1, 6, 19]. Modern software systems are often built as complex on backend components being configured in a specific way. As assemblages of customizable components that out-grow the expres- such system become very large, with a huge number of possible siveness of SPLs.
    [Show full text]
  • No Starch Press, Inc
    Table of Contents The Book of VMware—The Complete Guide to VMware Workstation.......................................................1 Chapter 1: Introduction.....................................................................................................................................3 Overview..................................................................................................................................................3 1.1 Who Should Read This Book............................................................................................................3 1.2 Terms and Conventions.....................................................................................................................4 1.3 Book Layout......................................................................................................................................4 1.4 VMware Applications........................................................................................................................6 1.4.1 Quality Assurance (QA)....................................................................................................6 1.4.2 Network Programming and Testing...................................................................................6 1.4.3 Operating System Development, Research, and Education..............................................7 1.4.4 Other VMware Products....................................................................................................7 Chapter 2: The VMware Virtual Machine.......................................................................................................8
    [Show full text]