Tabla De Equivalencias De Programas Propietarios Y De Software Libre

Total Page:16

File Type:pdf, Size:1020Kb

Tabla De Equivalencias De Programas Propietarios Y De Software Libre ENTORNO PC: TABLA DE EQUIVALENCIAS DE PROGRAMAS PROPIETARIOS Y DE SOFTWARE LIBRE. *PRÓPOSITO. En este documento, se detallan en el momento actual, una tabla de equivalencia de software usado en Windows y software libre. Esta tabla no es estática y está en continuo cambio según se va produciendo software y pasándolo a las licencias libres. En cualquier caso, en la siguiente dirección web, se encuentra una exhaustiva lista de posibilidades: http://linuxshop.ru/linuxbegin/win-lin-soft-spanish/ Notas: · Por principio todos los programas de linux en esta tabla son libres y están liberados. Los programas propietarios para Linux están marcados con una señal [Prop]. Programa, tareas Windows Linux ejecutadas 1) Redes y Conectividad. 1) Netscape / Mozilla . 2) Galeon. 3) Konqueror. Internet Explorer, 4) Opera. [Prop] Netscape / Mozilla for Navegadores Web 5) Phoenix. Windows, Opera, 6) Nautilus. Phoenix for Windows, ... 7) Epiphany. 8) Links. (with "-g" key). 9) Dillo. (Parches lenguaje Ruso - aquí). 1) Links. Navegadores web para 2) Lynx. Lynx para Windows Consola 3) w3m. 4) Xemacs + w3. 1) Evolution. 2) Netscape / Mozilla messenger. 3) Sylpheed, Sylpheed-claws. 4) Kmail. 5) Gnus. Outlook Express, Mozilla 6) Balsa. Clientes de Email for Windows, Eudora, 7) Bynari Insight GroupWare Suite. Becky [Prop] 8) Arrow. 9) Gnumail. 10) Althea. 11) Liamail. 12) Aethera. 1 1) Evolution. Clientes de email al estilo 2) Bynari Insight GroupWare Suite. Outlook MS Outlook [Prop] 3) Aethera. 1) Sylpheed. 2) Sylpheed-claws. Clientes de email al estilo The Bat 3) Kmail. The Bat 4) Gnus. 5) Balsa. 1) Pine. 2) Mutt. Cliente de email en Mutt for Windows [de], 3) Gnus. Consola Pine para Windows 4) Elm. 5) Xemacs. 1) Knode. 2) Pan. 3) NewsReader. 4) Netscape / Mozilla . 5) Sylpheed / Sylpheed-claws. Xnews, Outlook, Console: News reader Netscape / Mozilla 6) Pine. 7) Mutt. 8) Gnus. 9) tin. 10) slrn. 11) Xemacs. 1) Downloader for X. 2) Caitoo (former Kget). 3) Prozilla . Flashget, Go!zilla, Reget, 4) Wget (console, standard). GUI: Gestor de Descargas Getright, Wget for Kmago, QTget, Xget, ... Windows, ... 5) Aria. 6) Axel. 7) Download Accelerator Plus. 1) Httrack. 2) WWW Offline Explorer. 3) Wget (console, standard). GUI: Descargador de Sites Kmago, QTget, Xget, ... Web Teleport Pro, ... 4) Downloader for X. 5) Pavuk. 6) Curl (console). 1) Gftp. 2) Dpsftp. 3) KBear. Bullet Proof FTP, 4) IglooFTP. Clientes FTP CuteFTP, WSFTP, ... 5) Nftp. 6) Wxftp. 7) axyFTP. 1) Ncftp. Clientes FTP para 2) Lftp. Consola FTP in Far, ftp.exe 3) mc. (cd ftp://...) 2 1) Xchat. 2) KVirc. Mirc, Klient, VIRC, 3) Irssi. Clientes IRC Xircon, Pirch, XChat for 4) BitchX. Windows 5) Ksirc. 6) Epic . 7) Sirc. Clientes Locales de Chat QuickChat Echat. sin Servidor Mensajería local con 1) LinPopUp. WinPopUp máquinas Windows 2) Kpopup. 1) Licq (ICQ). 2) Centericq (ICQ, consola ). 3) Alicq (ICQ). 4) Micq (ICQ). 5) GnomeICU (ICQ). 6) Gaim. (Supports nearly all IM protocols) ICQ, MSN, AIM, ... 7) Kopete. Clientes para Mensajería Trillian ICQ (freeware, 8) Everybuddy. Instantánea can replace all common 9) Simple Instant Messenger. IM clients), Miranda 10) Imici Messenger. 11) Ickle (ICQ). 12) aMSN (MSN). 13) Kmerlin (MSN). 14) Kicq (ICQ). 15) YSM. (ICQ, consola). 16) kxicq. JAJC, Tkabber (+activestate tcl), Psi, 1) Tkabber. Exodus , WinJab, 2) Gabber. Clientes Jabber IM myJabber, RhymBox, 3) Psi. Rival, Skabber, Tipic IM, 4) Gaim. Vista, Yabber Monitoreo de web Sites o 1) Web Secretary. Bandejas de Mail, 2) Knewsticker & korn. WatzNew muestran los titulares o 3) Mozilla (???). toda el artículo 4) watch -n seconds lynx -dump Conferencias en línea con NetMeeting GnomeMeeting. Video/audio 1) Speak Freely for Unix. Comunicación por voz Speak Freely 2) TeamSpeak. iptables or more outdated ipchains (console, standard). Front ends: 1) Kmyfirewall. BlackICE, ATGuard, 2) Easy Firewall Generator. Firewall (paquetes de ZoneAlarm, Agnitum 3) Firewall Builder. filtración) Outpost Firewall, 4) Shorewall. WinRoute Pro, ... 5) Guarddog. 6) FireStarter. 7) Smoothwall. 3 8) IPCop. IDS (Detección de BlackICE, Agnitum 1) Snort. intrusos en el Sistema) Outpost Firewall 2) Portsentry / Hostsentry / Logsentry. 1) Xtraceroute. 2) VisualRoute for Linux. Visual route VisualRoute 3) Mtr. 4) Geotrace. 1) Squid. 2) DansGuardian. Proxomitron, ATGuard, 3) Squidguard. Agnitum Outpost 4) Privoxy. Filtrando Contenido Firewall, Privoxy, MS 5) JunkBuster. ISA server, ... 6) Fork. 7) Mozilla (tiene una posibilidad de filtrar el contenido). Restricción de Tráfico ??? 1) IP Relay. 1) Tcp4me. 2) Getstatd. 3) Ipacct. 4) Ipac-ng. 5) Ipaudit. Contabilidad de tráfico Tmeter, ... 6) Lanbilling. 7) SARG (full Squid traffic). 8) Talinux. 9) NetUP UserTrafManager. 10) MTRG. 11) NetTop. 1) LimeWire for Linux. (Gnutella) 2) Lopster. (OpenNAP) 3) Gnapster. (OpenNAP) 4) Mldonkey. (eDonkey) 5) eDonkey for Linux. (eDonkey) 6) cDonkey. (eDonkey) Morpheus (Gnutella), 7) Gift client / server (Fasttrack) Compartiendo archivos WinMX, Napster, 8) ed2k_gui. clientes / servidor (redes KaZaA (Fasttrack), 9) Gtk-Gnutella . (Gnutella) punto a punto) eDonkey / eMule , 10) Qtella . (Gnutella) TheCircle , Bittorrent 11) Mutella . (Gnutella, consola) 12) TheCircle . 13) Freenet. 14) GNUnet. 15) Lmule . (eDonkey) 16) Bittorrent. Programas para trabajar sonido con modem y 1) Gfax. (???) muchas mas funciones - 2) PrimaFax for Linux. [Proprietary, 99$] Venta Fax, PrimaFax desde answerback and 3) mgetty + voice + sendfax. AON dispositivos para 4) vgetty. mandar por fax 1) HylaFax. Trabajando con Faxes WinFax 2) Fax2Send. 4 3) Efax. 1) Kppp. 2) X-isp. 3) wvdial. (Front ends: X-wvdial, kvdial, Dialup Vdialer, et? gtkdial). 4) Gppp. 5) Kinternet. 6) Rp3. 1) Golded. FTN editor Golded 2) Golded+. 3) Msged. 1) hpt. FTN tosser FastEcho, hpt 2) CrashEcho. 1) ifcico. FTN mailer SF-Mail, T-Mail 2) qico. 3) Bforce. VNC, Administrador 1) VNC. Remoto, Asistencia 2) ssh / openssh. Remota, Symantec 3) Remote management is built-in in Administración Remota pcAnywhere, Windows XFree86. Terminal Server, 4) Rdesktop Client. Rdesktop, Radmin 5) freeS/WAN (???). 1) Minicom + lrzcz + Kermit. Transmisión de archivos HyperTerminal, 2) Msterm. vía modem Terminate, etc 3) Xtel. 1) Kssh. Trabajando con ssh Putty, Irlex, cygwin + ssh 2) ssh / openssh. 3) GTelnet. (Telnet, SSH, Rlogin) 1) Gkrellm. 2) Big Brother. 3) Etherape. 4) Nagios. 5) Tkined. 6) MRTG. 7) Rrdtool. Herramientas de Dumeter, Netmedic 8) PIKT. Monitoreo de Redes 9) Autostatus. 10) bcnu. 11) mon. 12) Sysmon. 13) Spong. 14) SNIPS. 15) iptraf (console). 1) HP OpenView agents for Linux. [Prop] Herramientas de HP OpenView, MS SMS, 2) Big Brother. mantenimiento para Tivoli 3) Cheops. Redes 4) Tkined. Sniffer, EtherPeek 1) Ethereal. Analizando Protocolos, (TokenPeek, AiroPeek), 2) Tcpdump. sniffing Windump, Ethereal, MS 3) Etherape. 5 Network Monitor, Iris 4) ipxdump. (+ipxparse for parsing) 1) Nessus. ShadowScan, ISS, Escaneo de Redes 2) Nmap. Retina, Internet Scanner 3) Bastille (???). 1) Iproute2. Routing MS RRAS 2) iptables or more outdated ipchains (consola, standard). Utilerías y librerías para lcrzo lcrzo el testeo Ethernet/IP 1) GNU Bayonne. Telefonía IP Buddyphone [Prop] 2) Openh323. Compartiendo 1) Samba. Recursos compartidos. Datos/Archivos 2) Samba-TNG. 1) Samba. Windows Domain, ??? 2) Ldap. Active Directory 3) yp. 1) Samba. Visualizando redes- 2) KDE Lan Browser, lisa Entorno de red windows 3) LinNeighborhood. 4) xSMBrowser. ADSL - rp-pppoe. 2) Trabajando con Archivos. 1) Midnight Commander. Administrador de 2) X Northern Captain. FAR, Norton Archivos al estilo FAR y 3) Deco (Demos Commander) . Commander, etc NC 4) Portos Commander. 5) Konqueror in MC style . 1) Midnight Commander. 2) Krusader. 3) Kcommander. Administrador de Total Commander 4) FileRunner (written on TCL/TK). Archivos al estilo ( Windows Commander) 5) Linux Commander. Windows Commander 6) LinCommander. 7) Rox. 8) Emelfm. 1) Konqueror. Administrador de 2) Gnome-Commander. Archivos al estilo Windows Explorer 3) Nautilus. Windows 4) Endeavour Mark II. 5) XWC. 1) Dillo Inspección rápida de 2) Konqueror. documentos de HTML Internet Explorer 3) Nautilus. locales 4) Lynx / Links. Visualizador de todas las Operaciones con Filemon Filemon para Linux. Archivos Trabajando con UDF Roxio , UDF Reader, Linux-UDF. 6 Roxio Direct CD Trabjando con Multi Sesiones de CD+ recuperador de IsoBuster CDFS. informació n defectuosa del disco multi sesión 3) Sistemas de Software para Escritorio. 1) Kedit (KDE). 2) Gedit (Gnome). 3) Gnotepad. 4) Kate (KDE). Notepad, WordPad, 5) KWrite (KDE). Editor de Texto TextPad, ... 6) Nedit. 7) Vim. 8) Xemacs. 9) Xcoral. 10) Nvi. 1) Vim. 2) Emacs. Editor de Consola para 3) pico. FAR Editor, ... Texto 4) joe. 5) Fte. 6) Jed. 1) Kate (KDE). 2) Nedit. 3) CodeCommander. 4) SciTE. Editor de texto y código SciTE, UltraEdit, 5) Quanta Plus. multi finalidad MultiEdit, ... 6) Vim. 7) Xemacs. 8) Mcedit (como con mc). 9) Jed. 1) Kate (KDE). 2) Nedit. Editor de textos con 3) Fte (console). soporte codificación Bred, Rpad32, Aditor 4) Parche para la versión de Midnight cirílica Commander. 5) Vim. 6) Xemacs. 1) FileRoller. 2) Gnozip. 3) LinZip. Trabajando con 4) Ark (kdeutils). WinZip, WinRar compresores de archivos 5) KArchiveur. 6) Gnochive. 7) RAR for Linux. 8) CAB Extract. Visualizador de 1) GhostView. RoPS PostScript 2) Kghostview. 1) Acrobat Reader para Linux. Visualizador de PDF Adobe Acrobat Reader 2) Xpdf. 7 3) GV. 1) Muchos programas Linux WYSIWYG m -> imprimir el archivo -> ps2pdf. (Aquí esta el artículo about this). 2) Adobe Acrobat Distiller
Recommended publications
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • The Design of a Pascal Compiler Mohamed Sharaf, Devaun Mcfarland, Aspen Olmsted Part I
    The Design of A Pascal Compiler Mohamed Sharaf, Devaun McFarland, Aspen Olmsted Part I Mohamed Sharaf Introduction The Compiler is for the programming language PASCAL. The design decisions Concern the layout of program and data, syntax analyzer. The compiler is written in its own language. The compiler is intended for the CDC 6000 computer family. CDC 6000 is a family of mainframe computer manufactured by Control Data Corporation in the 1960s. It consisted of CDC 6400, CDC 6500, CDC 6600 and CDC 6700 computers, which all were extremely rapid and efficient for their time. It had a distributed architecture and was a reduced instruction set (RISC) machine many years before such a term was invented. Pascal Language Imperative Computer Programming Language, developed in 1971 by Niklaus Wirth. The primary unit in Pascal is the procedure. Each procedure is represented by a data segment and the program/code segment. The two segments are disjoint. Compiling Programs: Basic View Machine Pascal languag program Pascal e compile program filename . inpu r gp output a.out p t c Representation of Data Compute all the addresses at compile time to optimize certain index calculation. Entire variables always are assigned at least one full PSU “Physical Storage Unit” i.e CDC6000 has ‘wordlength’ of 60 bits. Scalar types Array types the first term is computed by the compiler w=a+(i-l)*s Record types: reside only within one PSU if it is represented as packed. If it is not packed its size will be the size of the largest possible variant. Data types … Powerset types The set operations of PASCAL are realized by the conventional bit-parallel logical instructions ‘and ‘ for intersection, ‘or’ for union File types The data transfer between the main store buffer and the secondary store is performed by a Peripheral Processor (PP).
    [Show full text]
  • Utgåvenoteringar För Fedora 11
    Fedora 11 Utgåvenoteringar Utgåvenoteringar för Fedora 11 Dale Bewley Paul Frields Chitlesh Goorah Kevin Kofler Rüdiger Landmann Ryan Lerch John McDonough Dominik Mierzejewski David Nalley Zachary Oglesby Jens Petersen Rahul Sundaram Miloslav Trmac Karsten Wade Copyright © 2009 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. 1 Utgåvenoteringar For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Proceedings Issn 2654-1823
    SAFEGREECE CONFERENCE PROCEEDINGS ISSN 2654-1823 14-17.10 proceedings SafeGreece 2020 – 7th International Conference on Civil Protection & New Technologies 14‐16 October, on‐line | www.safegreece.gr/safegreece2020 | [email protected] Publisher: SafeGreece [www.safegreece.org] Editing, paging: Katerina – Navsika Katsetsiadou Title: SafeGreece 2020 on‐line Proceedings Copyright © 2020 SafeGreece SafeGreece Proceedings ISSN 2654‐1823 SafeGreece 2020 on-line Proceedings | ISSN 2654-1823 index About 1 Committees 2 Topics 5 Thanks to 6 Agenda 7 Extended Abstracts (Oral Presentations) 21 New Challenges for Multi – Hazard Emergency Management in the COVID-19 Era in Greece Evi Georgiadou, Hellenic Institute for Occupational Health and Safety (ELINYAE) 23 An Innovative Emergency Medical Regulation Model in Natural and Manmade Disasters Chih-Long Pan, National Yunlin University of Science and technology, Taiwan 27 Fragility Analysis of Bridges in a Multiple Hazard Environment Sotiria Stefanidou, Aristotle University of Thessaloniki 31 Nature-Based Solutions: an Innovative (Though Not New) Approach to Deal with Immense Societal Challenges Thanos Giannakakis, WWF Hellas 35 Coastal Inundation due to Storm Surges on a Mediterranean Deltaic Area under the Effects of Climate Change Yannis Krestenitis, Aristotle University of Thessaloniki 39 Optimization Model of the Mountainous Forest Areas Opening up in Order to Prevent and Suppress Potential Forest Fires Georgios Tasionas, Democritus University of Thrace 43 We and the lightning Konstantinos Kokolakis,
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • GNU MP the GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020
    GNU MP The GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020 by Torbj¨ornGranlund and the GMP development team This manual describes how to install and use the GNU multiple precision arithmetic library, version 6.2.1. Copyright 1991, 1993-2016, 2018-2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being \A GNU Manual", and with the Back-Cover Texts being \You have freedom to copy and modify this GNU Manual, like GNU software". A copy of the license is included in Appendix C [GNU Free Documentation License], page 132. i Table of Contents GNU MP Copying Conditions :::::::::::::::::::::::::::::::::::: 1 1 Introduction to GNU MP ::::::::::::::::::::::::::::::::::::: 2 1.1 How to use this Manual :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Installing GMP ::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.1 Build Options:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 ABI and ISA :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.3 Notes for Package Builds:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 2.4 Notes for Particular Systems :::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 2.5 Known Build Problems ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 14 2.6 Performance
    [Show full text]
  • Translingual Obfuscation
    Translingual Obfuscation Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu College of Information Sciences and Technology The Pennsylvania State University fpxw172, szw175, jum310, yzj107, [email protected] Abstract—Program obfuscation is an important software pro- Currently the state-of-the-art obfuscation technique is to tection technique that prevents attackers from revealing the incorporate with process-level virtualization. For example, programming logic and design of the software. We introduce obfuscators such as VMProtect [10] and Code Virtualizer [4] translingual obfuscation, a new software obfuscation scheme replace the original binary code with new bytecode, and a which makes programs obscure by “misusing” the unique custom interpreter is attached to interpret and execute the features of certain programming languages. Translingual ob- bytecode. The result is that the original binary code does fuscation translates part of a program from its original lan- not exist anymore, leaving only the bytecode and interpreter, guage to another language which has a different program- making it difficult to directly reverse engineer [39]. How- ming paradigm and execution model, thus increasing program ever, recent work has shown that the decode-and-dispatch complexity and impeding reverse engineering. In this paper, execution pattern of virtualization-based obfuscation can we investigate the feasibility and effectiveness of translingual be a severe vulnerability leading to effective deobfusca- obfuscation with Prolog, a logic programming language. We tion [24], [66], implying that we are in need of obfuscation implement translingual obfuscation in a tool called BABEL, techniques based on new schemes. which can selectively translate C functions into Prolog pred- We propose a novel and practical obfuscation method icates.
    [Show full text]
  • Zvukový Formát Mp3
    UNIVERZITA PARDUBICE DOPRAVNÍ FAKULTA JANA PERNERA KATEDRA ELEKTROTECHNIKY, ELEKTRONIKY A ZABEZPEČOVACÍ TECHNIKY V DOPRAVĚ ZVUKOVÝ FORMÁT MP3 BAKALÁŘSKÁ PRÁCE AUTOR PRÁCE: Petr Gregar VEDOUCÍ PRÁCE: RNDr. Jan Hula 2007 UNIVERZITY OF PARDUBICE JAN PERNER TRAFFIC FACULTY DEPARTMENT OF ELECTRICAL AND ELECTRONICAL ENGINEERING AND SIGNALLING IN TRANSPORT SOUND FORMAT MP3 BACHELOR WORK AUTOR: Petr Gregar SUPERVIZOR: RNDr. Jan Hula 2007 PROHLÁŠENÍ Tuto práci jsem vypracoval samostatně. Veškeré literární prameny a informace, které jsem v práci využil, jsou uvedeny v seznamu použité literatury. Byl jsem seznámen s tím, že se na moji práci vztahují práva a povinnosti vyplývající ze zákona č. 121/2000 Sb., autorský zákon, zejména se skutečností, že Univerzita Pardubice má právo na uzavření licenční smlouvy o užití této práce jako školního díla podle § 60 odst. 1 autorského zákona, a s tím, že pokud dojde k užití této práce mnou nebo bude poskytnuta licence o užití jinému subjektu, je Univerzita Pardubice oprávněna ode mne požadovat přiměřený příspěvek na úhradu nákladů, které na vytvoření díla vynaložila, a to podle okolností až do jejich skutečné výše. Souhlasím s prezenčním zpřístupněním své práce v Univerzitní knihovně Univerzity Pardubice. V Pardubicích dne 8. 5. 2007 …..…………………………… Petr Grgear SOUHRN Bakalářská práce se zabývá popisem kódování digitálně uložených zvukových dat podle standardu MPEG – 1 Layer III (MP3) a strukturou takto vytvořeného souboru. V úvodní části jsou popsány základní pojmy jako zvuk, vnímání zvuků lidským uchem, způsob záznamu zvuku v číslicové formě či princip reprodukce zvuku. Druhá část se věnuje historii formátu od počátků jeho vývoje až do současnosti. Následuje vlastní popis standardu MP3. Významnou výhodou formátu MP3 jsou i tzv.
    [Show full text]
  • MODULA-2 TRANSLATOR USER's MANUAL First Edition May 1986
    LOGITECH SOFTWARE ENGINEERING LIBRARY PASCAL TO MODULA-2 TRANSLATOR USER'S MANUAL First Edition May 1986 Copyright (C) 1984, 1985, 1986, 1987 LOGITECH, Inc. All Rights Reserved. No part of this document may be copied or reproduced in any form or by any means without the prior written consent of LOGITECH, Inc. LOGITECH, MODULA-2186,and MODULA-2IVX86 are trademarks ofLOGITECH, Inc. Microsoft is a registered trademark of Microsoft Corporation. MS-DOS is a trademark of Microsoft Corporation. Intel is a registered trademark ofIntel Corporation. IBM is a registered trademark ofInternational Business Machines Corporation. Turbo Pascal is a registered trademark ofBorland International, Inc. LOGITECH, Inc. makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. The information in this document is subject to change without notice. LOGITECH, Inc. assumes no responsibility for any errors that may appear in this document. From time to time changes may occur in the filenames and in the files actually included on the distribution disks. LOGITECH, Inc. makes no warranties that such files or facilities as mentioned in this documentation exist on the distribution disks or as part of the materials distributed. LU-GUllO-1 Initial issue: May 1986 Reprinted: September 1987 This edition applies to Release 1.00 or later of the software. ii TRANSLATOR Preface LOGITECH'S POLICIES AND SERVICES Congratulations on the purchase of your LOGITECH Pascal To Modula-2 Translator. Please refer to the following infonnation for details about LOGITECH's policies and services. We feel that effective communication with our customers is the key to quality service.
    [Show full text]
  • Annex I: List of Internet Robots, Crawlers, Spiders, Etc. This Is A
    Annex I: List of internet robots, crawlers, spiders, etc. This is a revised list published on 15/04/2016. Please note it is rationalised, removing some previously redundant entries (e.g. the text ‘bot’ – msnbot, awbot, bbot, turnitinbot, etc. – which is now collapsed down to a single entry ‘bot’). COUNTER welcomes updates and suggestions for this list from our community of users. bot spider crawl ^.?$ [^a]fish ^IDA$ ^ruby$ ^voyager\/ ^@ozilla\/\d ^ÆƽâºóµÄ$ ^ÆƽâºóµÄ$ alexa Alexandria(\s|\+)prototype(\s|\+)project AllenTrack almaden appie Arachmo architext aria2\/\d arks ^Array$ asterias atomz BDFetch Betsie biadu biglotron BingPreview bjaaland Blackboard[\+\s]Safeassign blaiz\-bee bloglines blogpulse boitho\.com\-dc bookmark\-manager Brutus\/AET bwh3_user_agent CakePHP celestial cfnetwork checkprivacy China\sLocal\sBrowse\s2\.6 cloakDetect coccoc\/1\.0 Code\sSample\sWeb\sClient ColdFusion combine contentmatch ContentSmartz core CoverScout curl\/7 cursor custo DataCha0s\/2\.0 daumoa ^\%?default\%?$ Dispatch\/\d docomo Download\+Master DSurf easydl EBSCO\sEJS\sContent\sServer ELinks\/ EmailSiphon EmailWolf EndNote EThOS\+\(British\+Library\) facebookexternalhit\/ favorg FDM(\s|\+)\d feedburner FeedFetcher feedreader ferret Fetch(\s|\+)API(\s|\+)Request findlinks ^FileDown$ ^Filter$ ^firefox$ ^FOCA Fulltext Funnelback GetRight geturl GLMSLinkAnalysis Goldfire(\s|\+)Server google grub gulliver gvfs\/ harvest heritrix holmes htdig htmlparser HttpComponents\/1.1 HTTPFetcher http.?client httpget httrack ia_archiver ichiro iktomi ilse
    [Show full text]