Baudwalking New Modes of Communication

Total Page:16

File Type:pdf, Size:1020Kb

Baudwalking New Modes of Communication Baudwalking New Modes of Communication By Tom Sundstrom, W2XQ appy New Year and belated Seasons The significant difference: IM is one-on-one, of your radio “career.” But how, you ask? Greetings to the Monitoring Times whereas IRC is a multi-user chat room. family of readers, subscribers, ad- How does all of this tie into the subjects Instant Messaging Hvertisers and gang behind the desks in North that interest Monitoring Times readers? Whereas These snappy little software programs Carolina. Baudwalking is a new occasional the printed word in MT provides the depth and were originally designed to do just one thing. column that takes a wide look at what’s new on background to current events, such as features on You could tell when another person signed onto the Internet as it pertains to radio, media and monitoring in the Middle East, the World Wide the Internet and could engage in a keyboard communications. Web cannot easily provide the details, depth and “chat” with that person. Feedback is immediate The listening and amateur radio hobbies analysis found in the MT articles. Rather, the ‘net and positive, without the delays of e-mail and radically changed beginning with the 1980-era is superb when it comes to breaking news. frustration of not knowing if the mail recipient telephone BBS systems and the Internet’s growth One example. As this column’s deadline had read the latest message sent. starting in 1994 or so.1 But this isn’t a history was looming, a window into the IRC chat chan- Marketing pressures and software designers lesson. There are several sources for looking at nel #swl came to life. It was late at night, and have added everything but the kitchen sink to the past.2 Let’s get going and communicate. listeners in Baltimore, New Hampshire, and Electronic mail is probably the largest ap- Ohio typed “the MW band is open... hearing plication of types of services available through trans-Atlantic signals.” I turned on the radio and the Internet. It is a blessing and it is a curse. listened to a very good signal from Croatia on Although e-mail is delivered quickly, unwanted, 1134 kHz, peaking at 30 db/s9. It was the best annoying and rude “spam” e-mail clutters the of the signals noted on 1062, 1215 and 1314 in inbox and is an expensive time-waster. What the southern New Jersey area, and I listened for can we do? a while continuing to work. What’s the point? Had I depended upon e-mail, I would have only found out about the Working around E-mail Junk Europeans the next day when picking e-mail Alternative communication methodologies from the server and only if someone thought to include instant messenger (IM) programs, blogs, write me. Weekly e-mail newsletters would be Internet relay chat (IRC) “channels” or “rooms,” slower yet. and headline news servers. Mention IM, and A second example. Are you a radio ama- some persons say “I would rather not be inter- teur but not a contester? You could tune into a rupted all the time.” The interruptions can be server posting callouts of foreign stations in the totally controlled. The IRC network of servers CQ WorldWide Contest. Data is instant, and around the world enable the creation of public includes the exact frequency and time. If you or private chat rooms, and there are software had the right transceiver and software, the data controls to fine tune each room’s characteris- could even tune the transmitter. tics. Blogs – writers’ web pages of comments A third example. The South Jersey Radio on the social or political scene, or on just about Association – http://sjra.net – have a swap net anything timely – and newsletters using special on K2AA-145.29 MHz at 8 p.m. Sunday nights. Web page coding are relatively new, but have The net control of the session opens an IM already become mainstream; “bloggers” (people program and other club members participating who write the blogs) were even invited to the on the net help with missed calls or questions Trillian, for Windows, offers a Basic and Pro USA 2004 national political conventions. on equipment. It makes for a more efficient net, version of their software that connects to mul- This month let us look at the two-way and there is less on-air confusion. tiple instant messaging services in one applica- communications: instant messaging and Internet In the business of communicating, these tion. Mac users have a similar product, Fire, relay chat. The common characteristic: imme- technologies are for more than just business and available to users of OS X 10.2 or higher. See diate communications, no delay, and no spam. personal use. It can be very useful in the pursuit the text for more details. 16 MONITORING TIMES January 2005 one were to ask, I would probably suggest look- ing at Trillian (Win) and Fire (Mac) as starting points. An aggregate program focuses on mes- saging and the extra features that bloat some of the individual programs disappear from view. A Matter of Control Some persons you ask to join you on an IM program will decline. Reasons offered include citing a nuisance value, opening the computer to virus attacks, and unwanted “visits” from persons unknown seeking to open a conversa- tion that may quickly dissolve into something tasteless. I contend that if a computer user perceives a need or want to communicate directly and quickly with a few friends, such as illustrated earlier, there is little or no reason to avoid using the “proper” IM application. A variant on two-way messaging in IRC is to use an automated program such as done here Consider these ideas to eliminate nuisances. by #exciteradio. Their Starchat chat room, shown in Chatzilla, shows the song being played Sign up for a Web mail-based e-mail account by Apple’s iTunes at the stated time. The Firefox browser, the plugin Chatzilla and iTunes are that can serve as a throwaway address. Use this available for the Windows platform as well. throwaway address when signing up for an IM account, and keep your home or personal e-mail the current generation IM programs. News and Odigo (Win) - http://www.odigo.org/ address close to the vest (family et al). sports headlines, weather, stock quotes, audio PeopleLink - http://www.peoplelink.com/ - and video messaging, conference or chat rooms, corporate product, for behind firewall. links to e-mail applications, advertisements... the What do you do when you have friends on Internet Relay Chat features are endless. different IM networks? The solution is an IM IRC stands for Internet Relay Chat. IRC IM programs typically do one-on-one short aggregator. Rather than launch up to four or five is a multi-user, multichannel chat system that messaging. Are you and a friend elsewhere do- different programs, taking up display screen real is run on a network of computers that may well ing some listening while sharing notes of what’s estate and memory resources, a single applica- be scattered all over the world. People can type heard on a frequency? Did the six-meter band tion “talks” to several networks. Generally, these messages to each other in real time. Each user open with Sporadic-E to a place far away? Is types of programs do messaging only. has a nickname (nick) and converses with other Fire (Mac) - http://epicware.com/ - AOL, ICQ, users in either public channels (chat rooms) or your friend busy working on the computer in MSN, Yahoo! and Jabber another software program and you want to attract Gaim (Win, Mac, Linux, BSD) - http://gaim. in private message areas. his or her attention amongst the pile of windows sourceforge.net/ - AIM, ICQ, MSN, Yahoo!, There are a number of different networks, on their screen? Perhaps you are in the same IRC, Jabber, Gadu-Gadu, and Zephyr but the radio-related chat rooms – the focus of community, and the scanner has come alive due Kopete (Linux) - http://kopete.kde.org/ - sup- this column – seem to settle on less than a hand- to some activity? What’s the phone number? Are ports AIM, ICQ, MSN, Yahoo, Jabber, IRC, ful of providers. Novell GroupWise Messenger, Lotus Same- you free for lunch? Time, and more The well-known radio-related chat rooms Virtually all IM programs can be set to PalTalk (Win) - http://www.paltalk.com/ - AOL, operate with a minimal set of rules established beep, squeak, honk, or play the national anthem Yahoo and MSN by the chat room organizers who keep order. (not really, I made up that last option...) when Pexit (Win, Mac, Linux and Unix) - http://www. Common sense and courtesy are the keys to a message arrives on station. For someone who pexit.com/ - “all the popular networks” the chat rooms. You will not find the chaos and Trillian (Win) - http://www.trillian.cc/ - AIM, mayhem that characterizes the chat areas on the cannot pay close attention to the IM window ICQ, MSN, Yahoo! and IRC for the occasional words of wisdom, the user- large Internet access providers (e.g., AOL, MSN selected noisemaker can be helpful to turn at- and others). tention to the computer screen. The programs identified as operating on the The most popular of the IM programs are Mac do so on OS X 10.2 and higher. IRC Software AOL’s AIM and ICQ, Yahoo! Messenger, and In all probability, in a hobby environment Software solutions for IRC are relatively Microsoft’s Messenger. But there are other IM you have friends and acquaintances on most of easy to use for Windows and Mac users, and are programs out there that are not so well known, the popular consumer-oriented IM programs.
Recommended publications
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Seamonkey Security Update (RHSA-2007-0980)
    seamonkey security update (RHSA-2007-0980) Original Release Date: November 8, 2007 Last Revised: November 8, 2007 Number: ASA-2007-459 Risk Level: None Advisory Version: 1.0 Advisory Status: Final 1. Overview: SeaMonkey is an open-source software suite from the Mozilla Foundation which provides a Web browser, Mail and Usenet client, an Internet Relay Chat (IRC) client and an HTML editing utility. Several flaws were found in the way in which SeaMonkey processed certain malformed web content. A web page containing malicious content could cause SeaMonkey to crash or potentially execute arbitrary code as the user running SeaMonkey. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007- 5338, CVE-2007-5339, and CVE-2007-5340 to these issues. Several flaws were found in the way in which SeaMonkey displayed malformed web content. A web page containing specially-crafted content could potentially trick a user into surrendering sensitive information. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-1095, CVE-2007-3844, CVE- 2007-3511, and CVE-2007-5334 to these issues. A flaw was found in the SeaMonkey sftp protocol handler. A malicious web page could access data from a remote sftp site, possibly stealing sensitive user data. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007- 5337 to this issue. A request-splitting flaw was found in the way in which SeaMonkey generates a digest authentication request. If a user opened a specially-crafted URL, it was possible to perform cross-site scripting attacks, web cache poisoning, or other, similar exploits.
    [Show full text]
  • There Are Two Dedicated Dspace IRC (Internet Relay Chat) Channels (I.E
    IRC Code of Conduct All DSpace support channels, mailing lists and meetings follow the LYRASIS Code of Conduct. We ask you to remain respectful in all discussions. We also encourage you to report any violations of the code of conduct to LYRASIS (see the Code of Conduct for more details). DSpace chat has moved to Slack Our old IRC channels are essentially unmonitored these days. Instead, we recommend joining our DSpace.org Slack for any chat-based support. You are also welcome to email your question to the dspace-tech Mailing List as an alternative, or choose one of the other DSpace Sup port options. There are two dedicated DSpace IRC (internet relay chat) channels (i.e. "rooms") on the irc.freenode.net server: #dspace (irc://irc.freenode.net/dspace) - all DSpace discussions and live Q & A. This channel is unlogged. #duraspace (irc://irc.freenode.net/duraspace) - Old duraspace community channel (no longer used). As of July 2018, this channel is unlogged. Pri or years logs are still available/archived. If you do not have access to an IRC client, or are new to IRC, the following web interfaces are very easy way to get started: Login to #dspace IRC at: http://webchat.freenode.net?channels=dspace Enter in a nickname of your choice (e.g. firstName_lastName) & click "Connect" Login to #duraspace IRC at: http://webchat.freenode.net?channels=duraspace Enter in a nickname of your choice (e.g. firstName_lastName) & click "Connect" Or you can login to both IRC channels at the same time: http://webchat.freenode.net?channels=duraspace,dspace For a list of IRC client software, see: http://en.wikipedia.org/wiki/Comparison_of_Internet_Relay_Chat_clients Many current Instant Messaging (IM) clients also support IRC.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • Internet Evidence Finder Report
    Patrick Leahy Center for Digital Investigation (LCDI) Internet Evidence Finder Report Written and Researched by Nick Murray 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu July 2013 IEF Report 6/28/2013 Page 1 of 33 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................. 5 Prior Work: .......................................................................................................................................................... 7 Purpose and Scope: ............................................................................................................................................
    [Show full text]
  • Belkasoft Evidence Center 2015 Scripting Api Reference
    Belkasoft Web: http://belkasoft.com Email: [email protected] Belkasoft Evidence Center 2015 Scripting Api Reference (C) Belkasoft 2015 BELKASOFT EVIDENCE CENTER 2015 SCRIPTING API REFERENCE Table of Contents API Namespace .................................................................................................................................. 12 Browser Class................................................................................................................................. 12 Browser.CacheItems Property ................................................................................................... 13 Browser.Cookies Property ......................................................................................................... 14 Browser.DownloadedFiles Property .......................................................................................... 14 Browser.Favorites Property ....................................................................................................... 14 Browser.FormValues Property .................................................................................................. 14 Browser.Passwords Property .................................................................................................... 15 Browser.TypedUrls Property ..................................................................................................... 15 Browser.Urls Property ............................................................................................................... 15
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Procurve Network Access Controller 800
    ProCurve Network Access Controller 800 The ProCurve Network Access Controller (NAC) 800 combines a RADIUS- based authentication server and the ability to validate the integrity of the systems connecting to the network, allowing network administrators to secure the network from unauthorized users and systems that pose a threat to the network resources. ProCurve Network Access Controller 800 (J9065A) ProCurve Network Access Controller 800 Features and benefits Resiliency and high availability Management • Enforcement server resiliency and redundancy: enable high network availability • Centralized endpoint policy management: for mission-critical LAN deployments; endpoint testing policies are centrally enforcement servers continue to provide managed by a single management server and authentication and endpoint testing services in shared by up to ten enforcement servers the absence of a management server and can be configured in clusters to provide • Administration console: a Web-based console redundancy and load-balancing for endpoint provides an easy-to-use interface for testing configuring endpoint policies and enforcement clusters as well as a dashboard-style interface Security for viewing the status of endpoint integrity testing • Built-in RADIUS server: can perform authentication services or act as a proxy server • Default testing policies: default testing for a remote RADIUS authentication service policies provide a great starting point for endpoint testing and can be easily utilized as • Supports standard-based or a local the basis
    [Show full text]
  • Introduction to Online Sexual Exploitation Curriculum 1 Safe Online Outreach Project Learning Objectives
    Introduction To Online Sexual Exploitation: Curriculum February 2003 Safe OnLine Outreach Project © M. Horton 2003 Safe OnLine Outreach Project Acknowledgements This document is the result of many hours of hard work and dedication. I'd like to thank Renata Karrys, Jaynne Aster, Nikki O'Halloran, Charlaine Avery, Lisa Ingvallsen and Elizabeth Nethery for their support and assistance in producing this document. Additionally the SOLO Advisory Committee, the Canadian National Crime Prevention - Community Mobilization Program, the Vancouver Foundation, Athabasca University/MediaCan and Parents Against Sexual Abuse have all been instrumental in turning this idea into a Project. Lastly, David and Conor have been silent contributors to this project since it began. Their support is woven into each page. Merlyn Horton SOLO Project Coordinator February 2003 Safe OnLine Outreach Project February 3, 2003 Introduction to the Curriculum Dear Reader, The curriculum you hold in your hands was produced in a former pottery studio in the middle of a coastal rain forest in British Columbia, Canada; the physical launch pad for this examination of a virtual issue. It is the result of three years of research. This introduction is intended to outline a context for the curriculum and to give you an overview of how to use this curriculum, who should present this curriculum and how appropriate audiences might be chosen. Context The philosophical foundation for this curriculum, and indeed for the Safe OnLine Outreach Project, is the United Nations Convention on the Rights of the Child (CRC)1. The CRC is one of four Conventions created by the United Nations to further the goal of recognizing the inherent dignity and rights of all members of the human family2.
    [Show full text]
  • The Complete Solutions Guide for Every Linux/Windows System Administrator!
    Integrating Linux and Windows Integrating Linux and Windows By Mike McCune Publisher : Prentice Hall PTR Pub Date : December 19, 2000 ISBN : 0-13-030670-3 • Pages : 416 The complete solutions guide for every Linux/Windows system administrator! This complete Linux/Windows integration guide offers detailed coverage of dual- boot issues, data compatibility, and networking. It also handles topics such as implementing Samba file/print services for Windows workstations and providing cross-platform database access. Running Linux and Windows in the same environment? Here's the comprehensive, up-to-the-minute solutions guide you've been searching for! In Integrating Linux and Windows, top consultant Mike McCune brings together hundreds of solutions for the problems that Linux/Windows system administrators encounter most often. McCune focuses on the critical interoperability issues real businesses face: networking, program/data compatibility, dual-boot systems, and more. You'll discover exactly how to: Use Samba and Linux to deliver high-performance, low-cost file and print services to Windows workstations Compare and implement the best Linux/Windows connectivity techniques: NFS, FTP, remote commands, secure shell, telnet, and more Provide reliable data exchange between Microsoft Office and StarOffice for Linux Provide high-performance cross-platform database access via ODBC Make the most of platform-independent, browser-based applications Manage Linux and Windows on the same workstation: boot managers, partitioning, compressed drives, file systems, and more. For anyone running both Linux and Windows, McCune delivers honest and objective explanations of all your integration options, plus realistic, proven solutions you won't find anywhere else. Integrating Linux and Windows will help you keep your users happy, your costs under control, and your sanity intact! 1 Integrating Linux and Windows 2 Integrating Linux and Windows Library of Congress Cataloging-in-Publication Data McCune, Mike.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]