Common Operations

Total Page:16

File Type:pdf, Size:1020Kb

Common Operations Kunpeng Porting Advisor 2.3.T10 Common Operations Date 2021-06-30 Kunpeng Porting Advisor Common Operations Contents Contents 1 Configuring the Installation Environment........................................................................ 1 1.1 Configuring the OS Yum, APT, or Zypper Source......................................................................................................... 1 1.2 Upgrading Dependency Components of an Earlier OS..............................................................................................4 2 Importing the Root Certificate for Kunpeng Porting Advisor...................................... 8 3 Disabling SELinux.................................................................................................................. 14 4 Common Container Operations......................................................................................... 15 5 Changing the IP Address and Port Number of the Kunpeng Porting Advisor........17 6 Starting, Stopping, or Restarting Services...................................................................... 19 7 Exception Scenarios and Common Syntax Errors in Inline Assembly....................... 20 7.1 Exception Scenarios..............................................................................................................................................................20 7.2 Common Syntax Errors....................................................................................................................................................... 22 8 Identifying Compile Commands Using the Build Tool Configuration File...............24 9 Querying OS Version Information.....................................................................................26 2021-06-30 ii Kunpeng Porting Advisor Common Operations 1 Configuring the Installation Environment 1 Configuring the Installation Environment 1.1 Configuring the OS Yum, APT, or Zypper Source 1.2 Upgrading Dependency Components of an Earlier OS 1.1 Configuring the OS Yum, APT, or Zypper Source NO TICE If the OS environment can access the Internet and the default Yum, APT, or Zypper source of the OS is available, skip this section. Configuring the OS Yum Source (for CentOS/EulerOS/openEuler/RHEL/ NeoKylin/Kylin) The following describes how to configure the Yum source on CentOS 7.6. The configuration procedure is the same for other OSs. Step 1 Download the CentOS image file CentOS-7-x86_64-Everything-1810.iso from the official CentOS website. Step 2 Use an SSH remote login tool to upload the CentOS 7.6 image to the /root directory. Step 3 Use the SSH remote login tool to log in to the CentOS CLI. Step 4 Run the following command to mount the CentOS 7.6 ISO image to a local directory: mount /root/CentOS-7-x86_64-Everything-1810.iso /media -o loop NO TICE If the OS is restarted, you need to mount the image file again. 2021-06-30 1 Kunpeng Porting Advisor Common Operations 1 Configuring the Installation Environment Step 5 Run the following commands to back up the original Yum source. In the mv command, path indicates the backup directory. Replace it with the actual backup directory. cd /etc/yum.repos.d/ //Go to the Yum source configuration directory. mv ./* path //Back up the original Yum source configuration. Step 6 Configure the Yum source. 1. Run the following command to open the media.repo file. vi /etc/yum.repos.d/media.repo 2. Press i to make the media.repo file editable and add the following information to the file: [InstallMedia] name=CentOS7.6 metadata_expire=-1 gpgcheck=0 cost=500 baseurl=file:///media enabled=1 3. Press Esc, type :wq and press Enter to save the settings and exit. Step 7 Update the local cache information of the Yum source. yum clean all yum makecache ----End Configuring the APT Source (for Ubuntu/Debian/Deepin/Linx/UOS) The following describes how to configure the APT source on Ubuntu 18.04.1. The configuration procedure is the same for other OSs. Step 1 Download the Ubuntu image file ubuntu-18.04.1-server-amd64.iso from the Ubuntu official website. Step 2 Use the SSH remote login tool to upload the Ubuntu 18.04.1 image to the /root directory. Step 3 Use the SSH remote login tool to log in to the Ubuntu CLI. Step 4 Run the following command to mount the Ubuntu 18.04.1 ISO image file to a local directory: mount /root/ubuntu-18.04.1-server-amd64.iso /media -o loop NO TICE ● If the OS is restarted, you need to mount the image file again. ● Some installation packages are missing in the local image sources of Debian OSs. Download the required installation packages from the Internet or using a proxy. The dependencies are listed as follows: expect GCC make zlib1g zlib1g-dev libpcre3 libpcre3-dev OpenSSL libssl-dev If the OS cannot access the Internet or have a proxy configured, check, download, and install the dependencies manually. You can run the following commands to query and install dependency packages: dpkg -l Installation package name dpkg -i Installation package name 2021-06-30 2 Kunpeng Porting Advisor Common Operations 1 Configuring the Installation Environment Step 5 Back up the original APT source: cd /etc/apt //Go to the APT source configuration directory. mv -v sources.list{,.bak} //Back up the original APT source configuration. Step 6 Configure the APT source. 1. Run the following command to open the source.list file. vim sources.list 2. Add the following information to the source.list file: deb file:///media wheezy main NO TE In the preceding command, wheezy main is the directory in which Packages is located. Replace it with the actual directory. 3. Press Esc, type :wq, and press Enter to save the settings and exit. Step 7 Update the local cache information of the APT source. apt update ----End Configuring the Zypper Source (for SUSE) Step 1 Download the SUSE image file SLE-15-SP1-Packages-x86_64-GM-DVD1.iso from the SUSE official website. Step 2 Use an SSH remote login tool to upload the SUSE image to the /root directory. Step 3 Use the SSH remote login tool to log in to the SUSE CLI. Step 4 Run the following command to mount the SUSE ISO image file to a local directory: mount /root/SLE-15-SP1-Packages-x86_64-GM-DVD1.iso /media -o loop NO TICE If the OS is restarted, you need to mount the image file again. Step 5 Run the following command to add the local Zypper source ("local" is the local source name in the following example): zypper ar file:///media/ local Step 6 Check whether the local source is configured successfully: zypper lr If command output is displayed, the local source is configured successfully. Repository priorities are without effect. All enabled repositories share the same priority. # | Alias | Name | Enabled | GPG Check | Refresh --+-------+-------+---------+-----------+-------- 1 | local | local | Yes | ( p) Yes | No Step 7 Clear the local cache and refresh the image source. zypper clean zypper ref ----End 2021-06-30 3 Kunpeng Porting Advisor Common Operations 1 Configuring the Installation Environment 1.2 Upgrading Dependency Components of an Earlier OS Upgrading glibc This procedure applies to the following OSs: ● CentOS 6.5/6.9/6.10 ● RHEL 6.5/6.9/6.10 ● Deepin 15.2 x86 Step 1 Download the following glibc-related RPM packages: ● glibc-common-2.17-55.el6.x86_64.rpm ● glibc-utils-2.17-55.el6.x86_64.rpm ● glibc-headers-2.17-55.el6.x86_64.rpm ● glibc-static-2.17-55.el6.x86_64.rpm ● glibc-devel-2.17-55.el6.x86_64.rpm ● glibc-2.17-55.el6.x86_64.rpm ● nscd-2.17-55.el6.x86_64.rpm URL: https://copr-be.cloud.fedoraproject.org/results/mosquito/myrepo-el6/ epel-6-x86_64/glibc-2.17-55.fc20/ Step 2 Upload the related RPM packages to a directory on the server and run the cd command to switch to the directory. Step 3 Run the following commands to install glibc: rpm -ivh glibc-common-2.17-55.el6.x86_64.rpm rpm -ivh glibc-utils-2.17-55.el6.x86_64.rpm rpm -ivh glibc-headers-2.17-55.el6.x86_64.rpm rpm -ivh glibc-static-2.17-55.el6.x86_64.rpm rpm -ivh glibc-devel-2.17-55.el6.x86_64.rpm rpm -ivh glibc-2.17-55.el6.x86_64.rpm rpm -ivh nscd-2.17-55.el6.x86_64.rpm NO TE If dependencies need to be installed, run the following command to install dependencies first: yum install After the dependencies are installed, run the following commands to install glibc: rpm -ivh glibc-common-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh glibc-utils-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh glibc-headers-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh glibc-static-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh glibc-devel-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh glibc-2.17-55.el6.x86_64.rpm --force --nodeps rpm -ivh nscd-2.17-55.el6.x86_64.rpm --force --nodeps Step 4 After the installation is complete, run the following command to check the glibc version: ldd --version 2021-06-30 4 Kunpeng Porting Advisor Common Operations 1 Configuring the Installation Environment If the displayed version is the same as the version you installed, glibc is upgraded successfully. ----End Upgrading glibcxx This procedure applies to the following OSs: ● CentOS 6.5/6.9/6.10 ● RHEL 6.5/6.9/6.10 ● Deepin 15.2 x86 Step 1 Download the following RPM packages related to glibcxx: ● libstdc++-4.8.2-16.3.el6.x86_64.rpm ● libstdc++-devel-4.8.2-16.3.el6.x86_64.rpm ● libstdc++-static-4.8.2-16.3.el6.x86_64.rpm URL: https://copr-be.cloud.fedoraproject.org/results/mosquito/myrepo-el6/ epel-6-x86_64/glibc-2.17-55.fc20/ Step 2 Upload the related RPM packages to a directory on the server and run the cd command to switch to the directory. Step 3 Run the following commands to install glibcxx:
Recommended publications
  • Image Management Service
    Image Management Service Service Overview Issue 14 Date 2021-08-17 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2021. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Issue 14 (2021-08-17) Copyright © Huawei Technologies Co., Ltd. i Image Management Service Service Overview Contents Contents 1 What Is Image Management Service?................................................................................1 2 Product Advantages...............................................................................................................
    [Show full text]
  • Confine: Automated System Call Policy Generation for Container
    Confine: Automated System Call Policy Generation for Container Attack Surface Reduction Seyedhamed Ghavamnia Tapti Palit Azzedine Benameur Stony Brook University Stony Brook University Cloudhawk.io Michalis Polychronakis Stony Brook University Abstract The performance gains of containers, however, come to the Reducing the attack surface of the OS kernel is a promising expense of weaker isolation compared to VMs. Isolation be- defense-in-depth approach for mitigating the fragile isola- tween containers running on the same host is enforced purely in tion guarantees of container environments. In contrast to software by the underlying OS kernel. Therefore, adversaries hypervisor-based systems, malicious containers can exploit who have access to a container on a third-party host can exploit vulnerabilities in the underlying kernel to fully compromise kernel vulnerabilities to escalate their privileges and fully com- the host and all other containers running on it. Previous con- promise the host (and all the other containers running on it). tainer attack surface reduction efforts have relied on dynamic The trusted computing base in container environments analysis and training using realistic workloads to limit the essentially comprises the entire kernel, and thus all its set of system calls exposed to containers. These approaches, entry points become part of the attack surface exposed to however, do not capture exhaustively all the code that can potentially malicious containers. Despite the use of strict potentially be needed by future workloads or rare runtime software isolation mechanisms provided by the OS, such as conditions, and are thus not appropriate as a generic solution. capabilities [1] and namespaces [18], a malicious tenant can Aiming to provide a practical solution for the protection leverage kernel vulnerabilities to bypass them.
    [Show full text]
  • Introduction to Fmxlinux Delphi's Firemonkey For
    Introduction to FmxLinux Delphi’s FireMonkey for Linux Solution Jim McKeeth Embarcadero Technologies [email protected] Chief Developer Advocate & Engineer For quality purposes, all lines except the presenter are muted IT’S OK TO ASK QUESTIONS! Use the Q&A Panel on the Right This webinar is being recorded for future playback. Recordings will be available on Embarcadero’s YouTube channel Your Presenter: Jim McKeeth Embarcadero Technologies [email protected] | @JimMcKeeth Chief Developer Advocate & Engineer Agenda • Overview • Installation • Supported platforms • PAServer • SDK & Packages • Usage • UI Elements • Samples • Database Access FireDAC • Migrating from Windows VCL • midaconverter.com • 3rd Party Support • Broadway Web Why FMX on Linux? • Education - Save money on Windows licenses • Kiosk or Point of Sale - Single purpose computers with locked down user interfaces • Security - Linux offers more security options • IoT & Industrial Automation - Add user interfaces for integrated systems • Federal Government - Many govt systems require Linux support • Choice - Now you can, so might as well! Delphi for Linux History • 1999 Kylix: aka Delphi for Linux, introduced • It was a port of the IDE to Linux • Linux x86 32-bit compiler • Used the Trolltech QT widget library • 2002 Kylix 3 was the last update to Kylix • 2017 Delphi 10.2 “Tokyo” introduced Delphi for x86 64-bit Linux • IDE runs on Windows, cross compiles to Linux via the PAServer • Designed for server side development - no desktop widget GUI library • 2017 Eugene
    [Show full text]
  • Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
    Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian
    [Show full text]
  • Euleros V2.0SP3 管理员指南
    EulerOS V2.0SP3 管理员指南 文档版本 01 发布日期 2019-08-12 华为技术有限公司 版权所有 © 华为技术有限公司 2019。 保留一切权利。 非经本公司书面许可,任何单位和个人不得擅自摘抄、复制本文档内容的部分或全部,并不得以任何形式传 播。 商标声明 和其他华为商标均为华为技术有限公司的商标。 本文档提及的其他所有商标或注册商标,由各自的所有人拥有。 注意 您购买的产品、服务或特性等应受华为公司商业合同和条款的约束,本文档中描述的全部或部分产品、服务或 特性可能不在您的购买或使用范围之内。除非合同另有约定,华为公司对本文档内容不做任何明示或默示的声 明或保证。 由于产品版本升级或其他原因,本文档内容会不定期进行更新。除非另有约定,本文档仅作为使用指导,本文 档中的所有陈述、信息和建议不构成任何明示或暗示的担保。 华为技术有限公司 地址: 深圳市龙岗区坂田华为总部办公楼 邮编:518129 网址: http://www.huawei.com 客户服务邮箱: [email protected] 客户服务电话: 4008302118 文档版本 01 (2019-08-12) 版权所有 © 华为技术有限公司 i EulerOS V2.0SP3 管理员指南 目 录 目 录 1 前言................................................................................................................................................... 1 2 基础配置........................................................................................................................................... 3 2.1 通过命令设置................................................................................................................................................................ 3 2.1.1 设置语言环境............................................................................................................................................................. 3 2.1.2 设置键盘..................................................................................................................................................................... 4 2.1.3 设置日期和时间......................................................................................................................................................... 5 2.1.3.1 使用
    [Show full text]
  • Ubuntu迁移到deepin的一些小心得
    Ubuntu迁移到Deepin的一些小心得 用Ubuntu系统也快半年了,最近因为Ubuntu系统出了些意外(我动内核搞 挂了又懒得修),于是就决定直接重装。然而手上又有一张刻录好的Deepin 光盘,索性体验下Deepin系统(上次安装似乎是在一年前),最终体验下 来,感觉Deepin真的很让人省心很多,人性化之处是方方面面的。就打算 正式使用Deepin系统,所以写这个文章也做以后备份使用。 一、基础性配置 1.安装 无论是刻录在光盘上还是U盘里,这一步都很简单,接下来就是安装Deepin系 统。 因为我是准备了彻底重装系统,所以事先是清空了整张硬盘删除了分区表。而使 用linux的习惯也是/home分区和/根分区分开,为了重装时节省同步数据的时间, 所以在默认的操作下安装硬盘这部分是自行选择的。 1/14 因为没有分区表,所以sd1先分成一个efi分区,至于大小deepin下默认的最小大 小是300M,我搜索了一些资料没有找到详细的,索性我就分了512MB。接着是 sd2挂载成根分区,sd3挂载成/home分区,具体大小视硬盘而定。因为我笔记本 16G内存,所以就不分swap分区了。接下来就是正常的安装过程。 这样做和win下的C、D盘,重装系统时删C保D一个道理。 2.卸载 这里的卸载是指在安装完成系统后,卸载一些系统里的软件,主要原因是为了节 省接下来更新系统时的下载量和一些用不到的软件也就卸载罢了。 对于我来说,我卸载了: QQ(个人习惯,我喜欢Tim,其实Deepin最终留住我的最大原因是这个,因为 Ubuntu花费些时间也能配置到类似Deepin的效果) Chrome(默认的这个版本无法登录浏览器的谷歌账号,我需要同步书签设置之 类,于是卸载掉它自己安装吧) 有道词典(没有离线翻译功能就只是个鸡肋了,有网络的情况下不如使用谷歌翻译) 此外还有:雷鸟邮件、远程协助、深度录音、深度云打印、深度云扫描、chm阅读 器、扫描易、深度用户反馈。 3.修改开机等待时间 我不需要双系统,所以不需要Grub那个选择界面。 # 终端输入: sudo gedit /etc/default/grub 修改并保存返回:GRUB_TIME=0 # 终端下更新: sudo update-grub 2/14 说起来,对双系统兴趣真的是不大了。曾经最疯狂的时候,仗着主板legacy和uefi 都能使用,一台电脑里装了四个系统:UEFI下Win10引导win7,Leagacy下Ubuntu 引导Kali。现在想想也是有毒。 4.修订Dock 在Deepin的官网里看到过,Deepin的Dock分可编辑区和不可编辑区,可是对我来 说不可编辑区的一些是没用处的,在搜索时发现了这些是以插件的形式存在的, 那解决方法就简单了。 以root身份打开一个文件管理器,定位到/usr/lib/dde-dock,首先整个备份此目 录下的plugins目录,然后进入plugins删除不需要的插件就行了。 我是删除了:时 间、磁盘挂载的、网络和声音(libsound.so) 5.安装GTK主题 就像Ubuntu下Flatabulous主题泛滥一样,有着类似MacOs样式的osx-arc- collection主题应该也有很多人安装吧。 首先,去Github下载deb安装包,地址是:LinxGem33/OSX-Arc-White。然后,打 开到安装包的目录,右键开启终端执行命令:sudo dpkg -i xxxx.deb安装主题。 Ubuntu下有个管理主题的unity-tweak-tool,同理Gtk桌面也有个gnome-tweak- tool,但是似乎deepin的设置里本就能进行主题之类的管理。 此外在Ubuntu下用惯了文泉驿微米黑,默认的Deepin字体不太适应而且11号也
    [Show full text]
  • Distro-Hopping Szempontok a Megfelelő Disztribúció Megtalálásához 1 / 13 Distro-Hopping
    Distro-hopping szempontok a megfelelő disztribúció megtalálásához 1 / 13 Distro-hopping 2 / 13 Probléma a gyakori distro-hoppal: Rengeteg elpazarolt idő ● Telepítési, beállítási folyamat: rendszer + szükséges csomagok: különböző distro, különböző csomagnév → általában nem kerülhető el, hogy egyesével mindent újra beállítsunk ● Tanulási folyamat: – különböző csomagkezelők, különböző alkalmazás telepítési módok, más beállítás fájlok (más elérhetőség, más szintaxis), más alapértelmezett alkalmazások, más workflow, … – de ez nem hasznos tudás (kivéve talán az adaptációs képesség fejlődése) ● Backup-restore folyamat: adatok átmentése, potenciális adatvesztés (bénázás miatt) 3 / 13 Distro-hop lényege: Megtalálni a megfelelő disztribúciót ● Akár hosszú évekre megtalálni egy olyan distrot, ami – a legtöbb munkafolyamatunknak megfelelő, jól kiismerhető – kellően stabil és folyamatos működést tud biztosítani – minimális a fenntartási / karbantartási költsége ● Nincs tökéletes választás. ● Ha van telepítés nélkül kipróbálható (Live USB) változat, érdemes néhány napig így kipróbálni a tényleges váltás előtt (a változások általában menthetőek) 4 / 13 Desktop Environment (DE) Awesome, Budgie, Cinnamon, Deepin, GNOME, i3, KDE, LXDE, LXQt, MATE, Pantheon, Openbox, Xfce, … ● DE váltási okok: – A megszokott felület és workflow jelentősen megváltozik (pl: gnome 2 → gnome 3) – Meglátunk egy jobban kinéző, vagy valami oknál fogva praktikusabbnak tűnő felületet ● Distro váltás DE váltás miatt? DE != distro ● Érdemes eleve olyan disztribúciót választani, ahol
    [Show full text]
  • Developing Operating System and Basic Software by Open Source Model in China
    Developing Operating System and Basic Software by Open Source Model in China Chen Yue China OSS Promotion Union CSIP – OSS Center We are… China OSS Promotion union www.copu.org.cn 2 COPU Mission • International communication • standardization Technology Community • Project support • Open technology training • OSS IP service OSS • Community support Service • Media support • Business support Industry Training China OSS Promotion Promotion Union 3 COPU Mission 4 OSS Developing Status in China uIndustry environment for OSS become better in China u OSS Industry Scale is increasingly growing, Open Source technologies are applied in more and more area. u OSS policy for Chinese IT enterprises is clearer, and more active for OSS contribution. uMore international corporation in OSS industry uSome new OSS public service for companies and communities 5 OSS Projects from China Dorado7 OceanBase fastDFS 6 Industry Environment of Chinese Desktop Operating System and Basic Software u Government policy is beneficial to OS and basic software developing u OSS and open technology are applied, and convenient for Chinese developing OSS and basic software u Some Chinese companies have power to cover and developing OS Opportunities 7 Industry Environment of Chinese Desktop Operating System and Basic Software uMany OS products, but lack for key technologies and features u Lack for a long-term talent strategy for IT technology experts and developers uLack for business support from big companies uLack for robust industry ecosystem for OS development Challenges 8
    [Show full text]
  • Certification Report
    Reference: 2018-2-INF-2787-v1 Created by: CERT10 Target: Público Revised by: CALIDAD Date: 28.05.2019 Approved by: TECNICO CERTIFICATION REPORT Dossier # 2018-2 TOE Huawei EulerOS v2.0 Applicant 440301192203821 - Huawei Technologies Co., Ltd. References [EXT-3741] 2018-02 Solicitud de Certificación Certification report of the product Huawei EulerOS v2.0, as requested in [EXT-3741] dated 15/01/2018, and evaluated by Epoche & Espri S.L.U., as detailed in the Evaluation Technical Report [EXT-3741] received on 16/05/2019. https://oc.ccn.cni.es 1/13 [email protected] CONTENTS EXECUTIVE SUMMARY ........................................................................................................................... 3 TOE SUMMARY ................................................................................................................................... 4 SECURITY ASSURANCE REQUIREMENTS ............................................................................................ 5 SECURITY FUNCTIONAL REQUIREMENTS ........................................................................................... 5 IDENTIFICATION ..................................................................................................................................... 7 SECURITY POLICIES ................................................................................................................................. 7 ASSUMPTIONS AND OPERATIONAL ENVIRONMENT ......................................................................... 7 CLARIFICATIONS
    [Show full text]
  • Miria 2020 R1
    Compatibility Guide Miria 2020 R1 Atempo Paris Headquarters |23 Avenue Carnot, 91300 MASSY|Tél: +33 164 868 300 |[email protected] N°1 EUROPEAN SOFTWARE VENDOR FOR DATA PROTECTION ATEMPO.COM Details of this document Title Miria 2020 R1 Type Compatibility Guide Date 30/11/2020 Author Louis-Frederic Laszlo Classification Public Status Released Versions 01/08/2019 Release Miria 3.9 SP2 11/02/2020 Release Miria 3.10 30/06/2020 Release Miria 3.10 SP1 30/11/2020 Release Miria 2020 R1 Atempo Paris Headquarters |23 Avenue Carnot, 91300 MASSY|Tél: +33 164 868 300 |[email protected] N°1 EUROPEAN SOFTWARE VENDOR FOR DATA PROTECTION ATEMPO.COM Compatibility Guide Author : Louis-Frederic Laszlo Miria 2020 R1 Diffusion : Public Date : 30/11/2020 Table of contents 01. General Information ........................................................................................................................... 4 02. Important Notices ............................................................................................................................... 4 03. Atempo-Miria – Server ....................................................................................................................... 5 04. Atempo-Miria – Agent ........................................................................................................................ 5 05. Atempo-Miria – Administration Console ......................................................................................... 7 06. Atempo-Miria – Native User Interface .............................................................................................
    [Show full text]
  • Which Linux Distribution? Difficulty in Choosing?
    Which Linux distribution? Difficulty in choosing? Ver 190916 www.ubuntutor.com Twitter @LaoYa14 Contents Page Contents 3 That's enough 4 At first 5 At first little about Linux world 6 Quick start guide for choosing the right distro for beginners 7 Basic information 8 ”Linux tree” 9 Basic information 10 Questions on the web site 11 Distros 12 App store 13 Ubuntu 16.04 and 18.04 14 Ubuntu MATE 15 Lubuntu 16 Ubuntu Budgie 17 Kubuntu 18 Xubuntu 19 Linux Mint 20 Zorin 21 MX Linux 22 Pepermint 23 Deepin 24 Arch Linux 25 Manjaro 26 Ubuntu Kylin 27 Ubuntu Studio 28 Kali Linux 29 Edubuntu 30 Desktop environments for Linux 31 File manager NEMO 32 File manager NAUTILUS 33 Installing Ubuntu live USB (test drive) That's enough When laptop is old and there is Windows XP, what to do? You can install Ubuntu Mate on your old laptop and keep at the same time Windows XP too, if you like XP. Or you can buy a tiny new laptop about 200-300 €/$ and change Windows 10 to Ubuntu. It works! I have made both about three years ago, and I haven't used Windows since then. My own laptop is cheap HP Stream 4 MB/32 GB. When I was studying Ubuntu, I noticed that simple beginner's guide books were not available. So, I did a guide book. I also created a website and named it www.ubuntutor.com. It currently includes Ubuntu 16.04 and 18.04 tutorials. And this guide is third one.
    [Show full text]
  • AEP Complete Datasheet Documentation PROOF Q3 2019
    ADVANCED ENDPOINT PROTECTION DATASHEET PROVEN SUCCESS IN PREVENTING BREACHES ADVANCED ENDPOINT PROTECTION DATASHEET TABLE OF CONTENTS The Solution and The Results 3 Key Capabilities 4 Minimum Hardware Requirements 5 Windows Operating Systems Supported 6 Android Operating Systems Supported 6 iOS and macOS Operating Systems Supported 6 Contacting Support 7 About Comodo 8 PROVEN SUCCESS IN PREVENTING BREACHES ADVANCED ENDPOINT PROTECTION DATASHEET THE SOLUTION THE RESULTS 100% Trust Verdict of every unknown file Eliminate the damage from unknown threats Comodo Advanced Endpoint Protection (AEP) delivers Good files can be safely run. Bad files can be blocked. But how do you patent-pending auto-containment, where unknown executables deal with unknown files? If you run them and they’re bad, you’ve put and other files that request runtime privileges are automatically run your company at risk. If you block them and they’re legit, you prevent in a virtual container that does not have access to the host system’s users from doing their jobs. resources or user data. They run just as well as they would on the host system, making it seamless from the end-user perspective, but they cannot damage or infect the native system. Comodo AEP offers the broadest array of tools to identify known good and While running in auto-containment, unknown files are uploaded to a “ known bad files. For all the unknown, global threat cloud for real-time analysis, which returns a verdict our auto-containment technology and within 45 seconds for 95% of the files submitted. The remaining 5% verdict decision engine deliver a of cases are sent to researchers for human analysis who make a determination within SLA timelines.
    [Show full text]