PATACS Posts Copyright © 2013 Monthly Circulation: 100

Total Page:16

File Type:pdf, Size:1020Kb

PATACS Posts Copyright © 2013 Monthly Circulation: 100 NewPslettAer of tThe PAotomaCc AreaSTechnoloPgy anod ComsputtersSociety May 2013 www.patacs.org Page 1 Useful Bits & Pieces such as Verizon, AT&T, Sprint, etc. by by Lorrin R. Garson transferring traffic from their cellular circuits to Columnist, Potomac Area Technology and Computer WiFi. However, the carriers might revolt if they Society perceive they will lose revenue that is not made Open Garden up by lower capital investments. It is a complex business situation and no one knows at this time Open Garden has nothing to do with horticulture. how the cell phone companies will react or if It’s a technology that interconnects devices such consumers will adopt Open Garden. For more as smartphones, laptops and tablets to form a information see http://opengarden.com/, wireless peer-to-peer mesh network for access to http://opengarden.net/ and the Internet. For example, by installing Open http://opengarden.com/story.php. Garden on your cell phone and laptop (PC and Improving PC Performance by Adding Mac), your laptop has access to the Internet via Memory your phone when WiFi hot spots are not available. If others have Open Garden installed Increasing the amount of memory in your PC is on their devices you would all share connectivity the simplest and least expensive way to improve and bandwidth. It is the digital equivalent of performance. The procedure is quite simple even grazing on the commons. Open Garden provides for those who are hardware challenged. These an “automatic path choice.” When the software instructions pertain to desktop PCs, although detects multiple Internet connections, it will adding or changing memory in laptops is similar select the fastest one available and will switch to (see http://www.wikihow.com/Upgrade-Your- another connection if the original slows or goes Laptop%27s-RAM-Memory). off line. The advantage is that it can offload traffic from an overburdened access route to one 1. Determine how much memory is currently in less utilized, say from a 3G or 4G connection to an your computer (instructions for Windows 7) enabled WiFi connection. Currently Open Garden by: left-click on Start, right-click on Computer, is available for Android, Windows, and Macintosh then left-click on Properties. Under System will operating systems. An iOS version (for the be a line “Installed memory (RAM)”. iPhone) is planned for the future. In principal 2. Determine how many memory slots are widespread deployment of this technology could available in your computer. This can be done reduce capital expenditures for wireless carriers (Continued on page 2) Useful Bits & Pieces......................................................................................1 INSIDE Linux and Open Source News.....................................................................3 Phone Scam to Hijack Your Computer..................................................... 6 Outlook.com..................................................................................................8 Get Creative with Text Boxes..................................................................... 9 81 Apps Accessed My Personal Info Online............................................11 Searching for a Good - Cheap Bluetooth Keyboard.............................. 12 Jabra Supreme UC...................................................................................... 14 Meeting Information................................................................................. 16 Page 2 www.patacs.org May 2013 (Continued from page 1) antistatic wrist strap for this purpose (see by consulting your PC owner’s manual, http://en.wikipedia.org/wiki/Antistatic_wrist opening up your computer for inspection _strap). These devices are quite inexpensive. (more on this later), or using one of the tools c. Open up the computer’s case. This will be such as that available from Crucial.com (see somewhat different for every machine. below). Sometimes a screw driver will be needed. 3. Determine how much memory you need. This d.Locate the memory module(s) and carefully is rather subjective. Many will advise “you remove them, assuming they are being can’t have too much memory”, but 4-8 GB is replaced. Some memory cards have clips at the probably adequate for most people. 12-16 GB or ends while others tilt forward or backward to more may be advisable for those doing video or remove. Look carefully and go gently. photo editing. For those playing computer games or doing heavy duty processing, the e. Snap the new memory module(s) in place more the better. taking care to seat them correctly. Apply pressure evenly across the width of module. 4. Determine the correct memory needed for Often you will hear a “click” as the module is your computer. Again, this information should seated. be available in your PC owner’s manual. For example, for the HP Pavilion HPE h8xt the f. Close up the computer and reattach all the memory specified is SO-DIMM, 204-pin DDR3- peripherals. DIMM, PC3-10600 (1333 MHz) DDR3-SDRAM, g.Boot up the computer and check to verify (step Unbuffered, non-EC (64-bit) DIMMs, 1.5 V #1) that the computer “sees” all the memory memory only. It is crucial that you buy the you installed. correct memory; there are many kinds of memory (DDR, DDR2, DDR3, RDRAM, SDRAM, 6. See etc.) sold by numerous vendors (Amazon, http://www.microsoft.com/athome/setup/add Newegg, TigerDirect, Micro Center, etc.) memory.aspx#fbid=jzzxbLYldz7 for useful including some manufacturers. Companies information on this topic from Microsoft. that sell memory will sometimes provide a tool you can download that will tell you the type of memory your computer uses, the number of memory slots available on your machine, etc. For example see Crucial.com at http://www.crucial.com/store/drammemory.a spx. It is generally advisable to use exactly the Tell Us About It! same brand, model with the precise Got a new tech device? Tried a new App or have specifications for all memory rather than just one that you can’t live without? Found a solution add additional memory. to a tech problem? 5. Installing the memory. Help and inform your fellow members by writing a. Unplug everything from the computer, a few paragraphs about it for this newsletter! It although some recommend leaving the power doesn’t require a lot of writing or a degree in cord plugged in to ground the computer, but journalism, just a short description of why you be certain the computer is not running. wanted it, cost (if any), where you got it and b.Be sure to ground yourself to the computer whether or not it met your needs. case before working on the machine. Static Users helping users is what we are all about! electricity can seriously damage components of your computer. It is preferable to use an May 2013 www.patacs.org Page 3 Linux and Open Source News I decided I wanted a GNU/Linux distribution that by Geof Goodrum was more community-based, and preferably one Potomac Area Technology and Computer Society following a rolling release model (see linux(at)patacs.org http://en.wikipedia.org/wiki/Rolling_release), There and Back Again: Distro which basically means install it once and upgrade Hopping incrementally thereafter. I thought I found it in Linux Mint Debian Edition (LMDE, I started using the Ubuntu 12.04 GNU/Linux http://www.linuxmint.com/download_lmde.php distribution ). LMDE is based on the community-supported (http://en.wikipedia.org/wiki/Linux_distributio Debian GNU/Linux distribution “Testing” release n) on my then-new HP Pavilion g6 laptop while (unlike the more common Linux Mint based upon 12.04 was still in beta release. Ubuntu 12.04 was Ubuntu releases). At the time, the install image stable, worked well, and even supported the was dated April 2012 (a March 2013 release is 802.11n wireless network adapter on the laptop now available), so after installation it took some without any fuss. As a Ubuntu Long Term time to download and install many updates (an Support (LTS) release, the publisher Canonical automated process). LMDE includes the MATE Ltd will provide updates for five years. However, and Cinnamon user interfaces common with its in January I was tempted to try the newest Ubuntu-based releases, but I found these rather Ubuntu release, 12.10. Canonical received some old-school and wanted to try the new Gnome 3.x bad press with the 12.10 release because the shell interface. Unfortunately, I couldn’t enable desktop search application passes queries to the native Gnome shell interface, found other Amazon.com for online results by default, and software was rather old (Google prompted me to Canonical receives a monetary credit for any upgrade the Chromium browser), and LMDE did Amazon purchases made through the feature. not support the ecryptfs-encrypted home The privacy concerns with 12.10 and how to directory left over from my Ubuntu install address them are documented in the Electronic without some effort on my part. I lost patience Frontier Foundation article at with LMDE just as Canonical announced an https://www.eff.org/deeplinks/2012/10/privacy updated release of Ubuntu 12.04.2. -ubuntu-1210-amazon-ads-and-data-leaks. I installed Ubuntu 12.04.2, but encountered However, I wanted to keep up with the latest problems that I never had with the original 12.04 features, so I installed Ubuntu 12.10 and made release. The worst was my laptop would not the appropriate privacy settings, but suspend reliably when I closed the lid. The screen encountered chronic pop-up error messages with sometimes flashed between white and black but requests to submit bug reports to Canonical. I never resumed the session, requiring me to also realized that a couple of applications that I power off to recover. The Microsoft Windows liked on 12.04 were not available on 12.10. software compatibility layer, WINE Although relatively minor annoyances, I was (http://www.winehq.org/), also had an bothered more by Canonical taking Ubuntu more installation bug that broke the entire system. commercial and snubbing community projects. While I filed bug reports on these, I was not Similar to its development of the Unity interface happy.
Recommended publications
  • Wifi - Mobile BNG Offload Deployments SP-T07-I
    Toronto, Canada May 30th, 2013 WiFi - Mobile BNG Offload Deployments SP-T07-I Derick Linegar, [email protected] © 20112012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Agenda vSP Wi-Fi - Key drivers vIntelligent Broadband vSP Wi-Fi Deployments vSP WiFi Evolution with MPC Integration vCall Flow vReferences © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2 SP-WiFi Key Drivers © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 3 SP-WiFi Solutions © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 4 Why Should I Care About WiFi? The “New Normal” © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 5 Wi-Fi Subscribers, Wireline/Wi-Fi & Mobile Different Motivations Internet Mobile Operator Motivations • Data traffic growing exponentially Mobile Operators • Licensed spectrum limitations Mobile Mobile Operator1 Operator2 • Access – Trusted/Untrusted 3G/4G delivered Wireline / Wi-Fi Operator Gateway Peering via Mobile Motivation Backhaul Wireline Operator with • Increase Service Revenues Wi-Fi Access • Cater to multiple Mobile Operators • Provide a scalable peering model Wireline Wireline Operator 1 Operator 2 • Leverage existing infrastructure Subscriber Motivation • Always connected experience Wi-Fi Access • Seamless Authentication • Mobility/Roaming without Mobile Users disrupting apps © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 6 Terminology Primer Service Provider Wi-Fi Wireline Broadband Session Type IP Based Sessions PPP Based Sessions User type Mobile Users Fixed Residential Session Control Intelligent Services Gateway (ISG) – software component Place in Network Wireless Access Gateway Broadband Network Gateway (PIN) Designation (WAG) (BNG) © 2012 Cisco and/or its affiliates.
    [Show full text]
  • Pollinator Week Event Registration 2019 5 28 19.Xlsx
    POLLINATOR WEEK EVENTS 2019 Event Name Description Date Time Address City State Zip More Info Join Crescent Heights Community Garden and cath-earth-sis in the celebration of Pollinator Week! Wear your fave ‘bee friendly’ costumes to enjoy pollinator learning activities in the park! This family friendly event is open to all, with a suggested donation of $5 to Bee City Canada, Tree Canada or a conservation group of your For more information, please choice. contact Catherine Dowdell at garden (at) crescentheightsyyc Meet outside the Crescent Heights Community Association Hall by the (dot) ca or catherine.dowdell Building Bee Houses Community Garden from 1pm to 3pm. 6/22/2019 1:00 PM 1101 2 St NW Calgary AB T2M 2V7 (at) gmail (dot) com On June 19th, 2019, we plan to celebrate Pollinator Week by having a Pollinator Celebration at the University of Calgary community garden. The intention of this event is to educate attendees about the importance of pollinators and how to support and protect pollinators in our community. This event includes a campus BioBlitz, a bee box Registration Page: making workshop, and planting of native pollinator plants in the garden. https://www.eventbrite.ca/e/poll In addition, we will have experts provide information to attendees about inator-celebration-june-19th- bees and other pollinators through interactive displays following the 230pm-to-730pm-tickets- Pollinator Celebration above activities. 6/19/2019 2:30 PM Calgary AB T2N 4V5 60195492338 Employees at Arkansas Electric Cooperative Corporation will bring pollinator-dependent dishes to share at a potluck and learn about the AECC Pollinator Potluck importance of pollinators.
    [Show full text]
  • Improved Neural Network Based General-Purpose Lossless Compression Mohit Goyal, Kedar Tatwawadi, Shubham Chandak, Idoia Ochoa
    JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 DZip: improved neural network based general-purpose lossless compression Mohit Goyal, Kedar Tatwawadi, Shubham Chandak, Idoia Ochoa Abstract—We consider lossless compression based on statistical [4], [5] and generative modeling [6]). Neural network based data modeling followed by prediction-based encoding, where an models can typically learn highly complex patterns in the data accurate statistical model for the input data leads to substantial much better than traditional finite context and Markov models, improvements in compression. We propose DZip, a general- purpose compressor for sequential data that exploits the well- leading to significantly lower prediction error (measured as known modeling capabilities of neural networks (NNs) for pre- log-loss or perplexity [4]). This has led to the development of diction, followed by arithmetic coding. DZip uses a novel hybrid several compressors using neural networks as predictors [7]– architecture based on adaptive and semi-adaptive training. Unlike [9], including the recently proposed LSTM-Compress [10], most NN based compressors, DZip does not require additional NNCP [11] and DecMac [12]. Most of the previous works, training data and is not restricted to specific data types. The proposed compressor outperforms general-purpose compressors however, have been tailored for compression of certain data such as Gzip (29% size reduction on average) and 7zip (12% size types (e.g., text [12] [13] or images [14], [15]), where the reduction on average) on a variety of real datasets, achieves near- prediction model is trained in a supervised framework on optimal compression on synthetic datasets, and performs close to separate training data or the model architecture is tuned for specialized compressors for large sequence lengths, without any the specific data type.
    [Show full text]
  • Fresh Apps: an Empirical Study of Frequently-Updated Mobile Apps in the Google Play Store
    Empir Software Eng DOI 10.1007/s10664-015-9388-2 Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store Stuart McIlroy1 · Nasir Ali2 · Ahmed E. Hassan1 © Springer Science+Business Media New York 2015 Abstract Mobile app stores provide a unique platform for developers to rapidly deploy new updates of their apps. We studied the frequency of updates of 10,713 mobile apps (the top free 400 apps at the start of 2014 in each of the 30 categories in the Google Play store). We find that a small subset of these apps (98 apps representing ˜1 % of the studied apps) are updated at a very frequent rate — more than one update per week and 14 % of the studied apps are updated on a bi-weekly basis (or more frequently). We observed that 45 % of the frequently-updated apps do not provide the users with any information about the rationale for the new updates and updates exhibit a median growth in size of 6 %. This paper provides information regarding the update strategies employed by the top mobile apps. The results of our study show that 1) developers should not shy away from updating their apps very frequently, however the frequency varies across store categories. 2) Developers do not need to be too concerned about detailing the content of new updates. It appears that users are not too concerned about such information. 3) Users highly rank frequently-updated apps instead of being annoyed about the high update frequency. Communicated by: Andreas Zeller Stuart McIlroy [email protected] Nasir Ali [email protected] Ahmed E.
    [Show full text]
  • Arxiv:1908.10237V1 [Cs.NI] 27 Aug 2019 Network Node to Network Node in a Store-Carry-Forward Manner
    DTN7: An Open-Source Disruption-tolerant Networking Implementation of Bundle Protocol 7 Alvar Penning1, Lars Baumgärtner3, Jonas Höchst1;2, Artur Sterz1;2, Mira Mezini3, and Bernd Freisleben1;2 1 Dept. of Math. & Computer Science, Philipps-Universität Marburg, Germany {penning, hoechst, sterz, freisleb}@informatik.uni-marburg.de 2 Dept. of Electr. Engineering & Information Technology, TU Darmstadt, Germany {jonas.hoechst, artur.sterz}@maki.tu-darmstadt.de 3 Dept. of Computer Science, TU Darmstadt, Germany {baumgaertner, mezini}@cs.tu-darmstadt.de Abstract. In disruption-tolerant networking (DTN), data is transmit- ted in a store-carry-forward fashion from network node to network node. In this paper, we present an open source DTN implementation, called DTN7, of the recently released Bundle Protocol Version 7 (draft version 13). DTN7 is written in Go and provides features like memory safety and concurrent execution. With its modular design and interchangeable com- ponents, DTN7 facilitates DTN research and application development. Furthermore, we present results of a comparative experimental evalu- ation of DTN7 and other DTN systems including Serval, IBR-DTN, and Forban. Our results indicate that DTN7 is a flexible and efficient open-source multi-platform implementation of the most recent Bundle Protocol Version 7. Keywords: delay-tolerant networking · disruption-tolerant networking 1 Introduction Delay- or disruption-tolerant networking (DTN) is useful in situations where a reliable connection to a communication infrastructure cannot be established, e.g., during environmental monitoring in remote areas, if telecommunication networks are destroyed as a result of natural or man-made disasters, or if access is blocked due to political censorship. In DTN, messages are transmitted hop-to-hop from arXiv:1908.10237v1 [cs.NI] 27 Aug 2019 network node to network node in a store-carry-forward manner.
    [Show full text]
  • Share, Collaborate, Exploit ~ Defining Mobile Web 2.0
    WHITEPAPER Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 This whitepaper is an extract from: Mobile Web 2.0 Leveraging ‘Location, IM, Social Web & Search’ 2008-2013 . information you can do business with Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 Introduction The mercurial rise of social networking sites and user-generated content has rekindled users’ interest in accessing Web-based services on the move. That the mobile phone is an inherently personal device which is not only with us most of the time, but also contains a huge amount of personal data (contact lists of names and phone numbers, stored messages and emails etc.) makes it a logical extension for the social network and the host of other collaborative Web 2.0 applications gaining traction. Perhaps the major factors driving the shift in how the Internet operates – whether fixed or mobile – are those of user interaction and enhancement. The Web is no longer simply an online resource of information to be consulted, searched and acted upon. It has become a network of social communities and information databases that are constantly growing and improving as they continue to harness the collective intelligence of users. It could therefore be argued that whereas Web 1.0 served essentially as a broadcast medium (i.e. of information/knowledge) ‘Web 2.0’ takes the form of a platform whereby the creator of content, has become the focus. Defining Mobile Web 2.0 Difficulty in establishing a firm and accepted definition, plus the fact that many of Web 2.0’s core concepts cannot be replicated directly within the cellular environment, is paralleled in a similar debate on what exactly denotes Mobile Web 2.0.
    [Show full text]
  • West Lavington Manor Open Garden
    Market Lavington & Easterton Church & Community News June 2021 West Lavington Manor Open Garden This year we have a theme of “Fun for All” Our home, West Lavington Manor, is surrounded by a stunning five acre walled garden, designed by Sir John Danvers in the 17th C which we are opening to the public on Saturday 5th June, 2021, to raise money for charity as part of the National Garden Scheme! The open day is a great day out and will raise funds for NGS charities such as Marie Curie as well as our nominated local charities, the West Lavington Youth Club, and 1st Lavington Sea Scouts Executive Committee are starting a The Nestling Trust. public consultation on the future of the Scout Hall building - Half Term holiday entertainment! Face Painting, at 44 High Street. Treasure Hunt (to explore the garden, with bags of gold coins), Rowdey Ice Cream and other activities including mini golf! Artisan Market with garden accessories & homewares from No.59 Studio We would welcome local residents and other plants from Superior Plants , interested parties to visit us at the hall to give their Box Candles, Marlis Rawlins cards, on trend pyjamas P-J’s views: and local produce – Magnificent Seed Oil Strawberry Hill honey, th Saturday 12 June between 10.00 and 12.00 Andrew’s jams and apple juice, preserves from Susan West, Sunday 13 th June between 10.00 and 12.00 Wine Tasting and sales from a’Becketts Vineyard. Sunday 20 th June between 10.00 and 12.00 Delicious refreshments cakes to meet every child and adult’s fancy, scones with home made jam and cream, tea, coffee, quiche, sandwiches &delicious O’pork Pulled Pork, farm to table.
    [Show full text]
  • Bandizip Professional Enterprise V710 Patchserialszip
    1 / 2 Bandizip Professional Enterprise V7.10 Patch-Serials.zip Jun 17, 2021 — Bandizip Enterprise 7.17 Crack 2021 is strong archiver which gives you an ... Bandizip Professional 7.17 Crack + Keygen Free Download 2021 ... It also has support for split compression to certain sizes, such as 10MB or 700MB. ... all kinds of file compression software including WinZip, WinRAR, and 7-Zip.. Sep 8, 2020 — Bandizip Professional & Enterprise v7.10 + Patch-Serials ... BandiZip is an intuitive and fast archiving application that supports WinZip, 7-Zip, .... Mar 31, 2021 — IDM Crack 6.38 Build 19 Patch + Serial Key 2021 [Latest] Free ... VueScan Pro 9.7.51 Crack + Serial Number 2021 64/32Bit ... Torrent 2021: 1Password – Password Manager v7.7.4 Crack + Activation Code. ... [Latest-2021]: Bandizip Enterprise 7.15 Crack is managing zip files in multiple ZIP & 7Z formats.. Installing Windows OS components/upgrades/patches/fixes/drivers. /tools may ... SyncToy v2.1 64-bit for Windows XP Professional/Vista/7 64-bit. (x64) [3.46 MB] .... Bandizip Professional & Enterprise V7.10 + Patch-Serials [ha.. 6 months, Software, 9, 9.10 MB, 1, 0. Magnet Link · Secret Disk Professional V2020.03 Final + .... Apr 3, 2020 — Bandizip has a very fast Zip algorithm for compression & extraction with ... Supported OS: Windows Vista/7/8/10 (x86/x64/ARM64); License: ... Professional and Enterprise. ... Visible serial keys are not allowed even in images.. Mar 6, 2021 — Bandizip Crack is the name of a new, professional program, that ... Bandizip Enterprise 7.15 Crack with Serial Key Free Download: BandiZip Crack is an intuitive and fast archiving app that supports WinZip, 7-Zip, and WinRAR, as well as ..
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]
  • The Lzip Format Why a New Format and Tool?
    The lzip format Antonio Díaz Díaz [email protected] http://www.nongnu.org/lzip/lzip_talk_ghm_2019.html http://www.nongnu.org/lzip/lzip_talk_ghm_2019_es.html GNU Hackers Meeting Madrid, September 4th 2019 Introduction There are a lot of compression algorithms Most are just variations of a few basic algorithms The basic ideas of compression algorithms are well known Algorithms much better than those existing are not probable to appear in the foreseeable future Formats existing when lzip was designed in 2008 (gzip and bzip2) have limitations that aren’t easily fixable Therefore... It seemed adequate to pack a good algorithm like LZMA into a well designed format Lzip is an attempt at developing such a format 2 / 20 Antonio Díaz Díaz --- [email protected] The lzip format Why a new format and tool? Adding LZMA compression to gzip doesn't work The gzip format was designed long ago It has limitations ➔ 32-bit uncompressed size ➔ No index If extended it would impose those limitations to the new algorithm +=============+=====================+-+-+-+-+-+-+-+-+ | gzip header | compressed blocks | CRC32 | ISIZE | <-- no index +=============+=====================+-+-+-+-+-+-+-+-+ A new format with support for 64-bit file sizes is needed 3 / 20 Antonio Díaz Díaz --- [email protected] The lzip format LZMA algorithm Features (thanks to Igor Pavlov) Wide range of compression ratios and speeds Higher compression ratio than gzip and bzip2 Faster decompression speed than bzip2 LZMA variants used by lzip Fast (used by option ‘-0’) Normal (used by all other compression
    [Show full text]
  • Linux Package Management
    Welcome A Basic Overview and Introduction to Linux Package Management By Stan Reichardt [email protected] October 2009 Disclaimer ● ...like a locomotive ● Many (similar but different) ● Fast moving ● Complex parts ● Another one coming any minute ● I have ridden locomotives ● I am NOT a locomotive engineer 2 Begin The Train Wreck 3 Definitions ● A file archiver is a computer program that combines a number of files together into one archive file, or a series of archive files, for easier transportation or storage. ● Metadata is data (or information) about other data (or information). 4 File Archivers Front Ends Base Package Tool CLI GUI tar .tar, tar tar file roller .tar.gz, .tgz, .tar.Z, .taz, .tar.bz2,.tbz2, .tbz, .tb2, .tar.lzma,.tlz, .tar.xz, .txz, .tz zip .zip zip zip file roller gzip gzip gunzip gunzip ● Archive file http://en.wikipedia.org/wiki/Archive_file ● Comparison of file archivers http://en.wikipedia.org/wiki/Comparison_of_file_archivers 5 tar ● These files end with .tar suffix. ● Compressed tar files end with “.t” variations: .tar.gz, .tgz, .tar.Z, .taz, .tar.bz2, .tbz2, .tbz, .tb2, .tar.lzma, .tlz, .tar.xz, .txz, .tz ● Originally intended for transferring files to and from tape, it is still used on disk-based storage to combine files before they are compressed. ● tar (file format) http://en.wikipedia.org/wiki/.tar 6 tarball ● A tar file or compressed tar file is commonly referred to as a tarball. ● The "tarball" format combines tar archives with a file-based compression scheme (usually gzip). ● Commonly used for source and binary distribution on Unix-like platforms, widely available elsewhere.
    [Show full text]
  • Password-Based Encryption in ZIP Files
    Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of the file format itself and then describe three encryption schemes that can be used in ZIP files. Ultimately we will try to decide which scheme should be preferred. 1 Introduction The ZIP file format was created in 1989 by PKWARE Inc. [2] and was first implemented in the company’s PKZIP utility. The format has been documented in a specification document referred to as APPNOTE [1]. The earliest available version of APPNOTE (version 1.0) was written in 1990 [3]. The current version is 6.3.4, published in 2014. The ZIP file format is widely known and is one of the most popular formats used to compress files. It is in fact a container format that supports a variety of compression algorithms, with deflate being the most common one. 2 ZIP file format ZIP files are archives that store multiple files. Each file inside the archive is compressed individ- ually, making it possible to extract them or add new ones without compressing or decompressing the entire archive. This contrasts with the format of compressed TAR archives, for which such random access is not possible. Following is the structure of a ZIP archive containing n files. 1 Local file header 1 File data 1 Local file header 2 File data 2 . Local file header n File data n Central directory file header 1 Central directory file header 2 .
    [Show full text]