MALICIOUS Threat Names: Gen:Variant.Razy.762033

Total Page:16

File Type:pdf, Size:1020Kb

MALICIOUS Threat Names: Gen:Variant.Razy.762033 DYNAMIC ANALYSIS REPORT #6972494 Classifications: Spyware Lokibot Gen:Trojan.Heur3.LPT.gmX@aSs4QPdab MALICIOUS Threat Names: Gen:Variant.Razy.762033 Verdict Reason: - Sample Type Windows Exe (x86-32) File Name 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe ID #2651322 MD5 bcd3e420575492db9ee58c42b2032094 SHA1 3d31aace807806cfe8652f07e695b881ba0876e1 SHA256 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b File Size 100.00 KB Report Created 2021-08-23 14:04 (UTC+2) Target Environment win7_64_sp1_en_mso2016 | exe X-Ray Vision for Malware - www.vmray.com 1 / 18 DYNAMIC ANALYSIS REPORT #6972494 OVERVIEW VMRay Threat Identifiers (20 rules, 38 matches) Score Category Operation Count Classification 5/5 YARA Malicious content matched by YARA rules 1 Spyware • Rule "Lokibot" from ruleset "Malware" has matched on a memory dump for (process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe. 5/5 Data Collection Tries to read cached credentials of various applications 1 Spyware • Tries to read sensitive data of: FileZilla, Internet Explorer, BlazeFTP, Total Commander, Pidgin, QtWeb Internet Browser, Internet Explorer / Edge, LinasFTP. 4/5 Antivirus Malicious content was detected by heuristic scan 2 - • Built-in AV detected a memory dump of (process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe as "Gen:Trojan.Heur3.LPT.gmX@aSs4QPdab". • Built-in AV detected a memory dump of (process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe as "Gen:Variant.Razy.762033". 3/5 Anti Analysis Tries to evade debugger 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe hides thread via API "NtSetInformationThread". 3/5 Discovery Reads installed applications 1 Spyware • Reads installed programs by enumerating the SOFTWARE registry key. 2/5 Anti Analysis Tries to detect debugger 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to detect a debugger via API "NtQueryInformationProcess". 2/5 Data Collection Reads sensitive browser data 3 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of web browser "QtWeb Internet Browser" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read credentials of web browser "Internet Explorer" by reading from the system's credential vault. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of web browser "Internet Explorer / Edge" by registry. 2/5 Data Collection Reads sensitive application data 1 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of application "Pidgin" by file. 2/5 Data Collection Reads sensitive ftp data 5 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of ftp application "LinasFTP" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of ftp application "FileZilla" by file. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of ftp application "BlazeFTP" by file. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of ftp application "BlazeFTP" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to read sensitive data of ftp application "Total Commander" by registry. 2/5 Injection Writes into the memory of a process started from a created or modified executable 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe modifies memory of (process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe. 2/5 Injection Modifies control flow of a process started from a created or modified executable 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe alters context of (process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe. 2/5 Anti Analysis Makes direct system call to possibly evade hooking based sandboxes 2 - X-Ray Vision for Malware - www.vmray.com 2 / 18 DYNAMIC ANALYSIS REPORT #6972494 Score Category Operation Count Classification • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe makes a direct system call to "NtAllocateVirtualMemory". • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe makes a direct system call to "NtAllocateVirtualMemory". 1/5 Hide Tracks Creates process with hidden window 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe starts (process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe with a hidden window. 1/5 Obfuscation Creates a page with write and execute permissions 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code. 1/5 Discovery Reads system data 1 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe reads the cryptographic machine GUID from registry. 1/5 Mutex Creates mutex 1 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe creates mutex with name "AC886C1380004474ED06FF77". 1/5 Discovery Possibly does reconnaissance 9 - • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Mozilla Firefox" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Comodo IceDragon" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Safari" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "K-Meleon" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Mozilla SeaMonkey" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Mozilla Flock" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Cyberfox" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "Total Commander" by registry. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe tries to gather information about application "NetScape" by registry. 1/5 Obfuscation Overwrites code 2 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe overwrites code to possibly hide behavior. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe overwrites code to possibly hide behavior. 1/5 Obfuscation Resolves API functions dynamically 2 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe resolves 72 API functions by name. • (Process #2) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe resolves 25 API functions by name. 1/5 Execution Executes itself 1 - • (Process #1) 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe executes a copy of the sample at C: \Users\kEecfMwgj\Desktop\38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe. X-Ray Vision for Malware - www.vmray.com 3 / 18 DYNAMIC ANALYSIS REPORT #6972494 Mitre ATT&CK Matrix Privilege Defense Credential Lateral Command Initial Access Execution Persistence Discovery Collection Exfiltration Impact Escalation Evasion Access Movement and Control #T1082 #T1214 #T1119 #T1143 Hidden System Credentials in Automated Window Information Registry Collection Discovery #T1045 #T1003 #T1005 Data #T1012 Query Software Credential from Local Registry Packing Dumping System #T1217 #T1081 Browser Credentials in Bookmark Files Discovery #T1083 File and Directory Discovery X-Ray Vision for Malware - www.vmray.com 4 / 18 DYNAMIC ANALYSIS REPORT #6972494 Sample Information ID #2651322 MD5 bcd3e420575492db9ee58c42b2032094 SHA1 3d31aace807806cfe8652f07e695b881ba0876e1 SHA256 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b SSDeep 1536:Y3AExAD534Dy5EqP6zW6X48mPTzJ5V0Le5xK:+xi4YmX48mP/+K5xK ImpHash 877d76f42120b733733986666dfbed46 File Name 38bc9d836ab63101c9eddcb9232e7c1ad227517701caf73f799ec07abdd4386b.exe File Size 100.00 KB Sample Type Windows Exe (x86-32) Has Macros Analysis Information Creation Time 2021-08-23 14:04 (UTC+2) Analysis Duration 00:04:00 Termination Reason Timeout Number of Monitored Processes 2 Execution Successful False Reputation Enabled WHOIS Enabled Built-in AV Enabled Built-in AV Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of AV Matches 41 YARA Enabled YARA Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of YARA Matches 40 X-Ray Vision for Malware - www.vmray.com 5 / 18
Recommended publications
  • IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta
    IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta-Psychology. Participate in open peer review by commenting through hypothes.is directly on this preprint. The full editorial process of all articles under review at Meta-Psychology can be found following this link: https://tinyurl.com/mp-submissions You will find this preprint by searching for the first author's name. Writing a Psychological Blitz Literature Review with Nothing but a Browser Bogdan Cocoş1 1Department of Psychology, University of Bucharest Author Note Correspondence regarding this article should be addressed to Bogdan Cocoş, 90 Panduri Road, Sector 5, 050663, Bucharest, Romania. E-mail: [email protected] https://orcid.org/0000-0003-4098-7551 IN-BROWSER BLITZ LITERATURE REVIEWS 2 Abstract The ways so far of writing literature reviews represent valid, but not sufficient, landmarks, connected to the current technological context. In this sense, this article proposes a research method called blitz literature review, as a way to quickly, transparently, and repeatably consult key references in a particular area of interest, seen as a network composed of elements that are indispensable to such a process. The tutorial consists of six steps explained in detail, easy to follow and reproduce, accompanied by publicly available supplementary material. Finally, the possible implications of this research method are discussed, being brought to the fore a general recommendation regarding the optimization of the citizens’ involvement in the efforts and approaches of open scientific research. Keywords: blitz literature review, open access, open science, research methods IN-BROWSER BLITZ LITERATURE REVIEWS 3 Writing a Psychological Blitz Literature Review with Nothing but a Browser Context The term “blitz literature review” refers to an adaptation of the concept of literature review.
    [Show full text]
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Cache Files Detect and Eliminate Privacy Threats
    Award-Winning Privacy Software for OS X Every time you surf the web or use your computer, bits of Recover Disk Space data containing sensitive information are left behind that Over time, the files generated by web browsers can start could compromise your privacy. PrivacyScan provides to take up a large amount of space on your hard drive, protection by scanning for these threats and offers negatively impacting your computer’s performance. multiple removal options to securely erase them from PrivacyScan can locate and removes these space hogs, your system. freeing up valuable disk space and giving your system a speed boost in the process. PrivacyScan can seek and destroy internet files used for tracking your online whereabouts, including browsing history, cache files, cookies, search history, and more. Secure File Shredding Additionally, PrivacyScan can eliminate Flash Cookies, PrivacyScan utilizes advanced secure delete algorithms which are normally hidden away on your system. that meet and exceed US Department of Defense recommendations to ensure complete removal of Privacy Threat: Cookies sensitive data. Cookies can be used to track your usage of websites, determining which pages you visited and the length Intuitive Interface of time you spent on each page. Advertisers can use PrivacyScan’s award-winning design makes it easy to cookies to track you across multiple sites, building up track down privacy threats that exist on your system and a “profile” of who you are based on your web browsing quickly eliminate them. An integrated setup assistant and habits. tip system provide help every step of the way to make file cleaning a breeze.
    [Show full text]
  • QUICK GUIDE How to Download a Digital Publication to View Offline from the BC Publications Subscription Library
    QUICK GUIDE how to download a digital publication to view offline from the BC Publications subscription library INTERNET EXPLORER, P2 FIREFOX, P4 GOOGLE CHROME, P6 INTERNET EXPLORER STEP 1 Begin with opening the publication from the “My Publications” page. Now select the “Save to browser” button in the top right corner Once completed the following message will appear. Select the “Close” button Quick Guide 2 To find out how to display the “favorites bar” go to Page 8 STEP 2: ADD TO FAVORITES Bookmark the URL by selecting the “Add to Favorites” option. The “Add to Favorite” dialogue box will From the top Menu select the “Favorites”, then from the drop down appear and users may change the favorite name within the Name field at this time. select the “Add to Favorites” option or select the Favorites icon. Next select the “Add” button. The “Add to Favorite” dialogue Anytime the workstation is offline (not connected to the internet) this link within the Favorites will provide the user access to the bookmarked offline copy. To access this link launch Internet Explorer, Open list of Favorites and select the title as originally saved. Quick Guide 3 STEP 1 FIREFOX Now select the “Save to browser” Begin with opening the publication from the “My Publications” page button in the top right corner The browser will begin saving and the following box will appear. Once completed the following message will appear. Select the “Close” button Quick Guide 4 To find out how to display the “favorites bar” go to Page 9 STEP 2: BOOKMARK THE URL Bookmark the URL by selecting the “Bookmark this page” button.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • THE POWER of CLOUD COMPUTING COMES to SMARTPHONES Neeraj B
    THE POWER OF CLOUD COMPUTING COMES TO SMARTPHONES Neeraj B. Bharwani B.E. Student (Information Science and Engineering) SJB Institute of Technology, Bangalore 60 Table of Contents Introduction ............................................................................................................................................3 Need for Clone Cloud ............................................................................................................................4 Augmented Execution ............................................................................................................................5 Primary functionality outsourcing ........................................................................................................5 Background augmentation..................................................................................................................5 Mainline augmentation .......................................................................................................................5 Hardware augmentation .....................................................................................................................6 Augmentation through multiplicity .......................................................................................................6 Architecture ...........................................................................................................................................7 Snow Flock: Rapid Virtual Machine Cloning for Cloud Computing ........................................................
    [Show full text]
  • FTP Instructions for Shtetlinks
    SFTP Instructions for KehilaLinks SFTP stands for Secure File Transfer Protocol and is a simple way of moving files from your computer to the KehilaLinks server. 1. SFTP Access a. Your KehilaLinks SFTP Username and Password will bring you directly into the folder assigned to your site. You will see an empty space when you enter the SFTP site; the folder is not visible. b. If you manage more than one KehilaLink site, you will be provided a single UserName and Password. This Logon will bring you to a listing of KehilaLinks site folders. Instructions for accessing multiple sites: i. When you logon, you will be on a site with multiple KehilaLink site folders. ii. Double click on the folder that you will be working with. You can then browse, download and upload as needed. Follow instructions in 2 below for downloading and uploading. iii. To go to another of the sites that you manage, return to the KehilaLinks site folders screen and select the next site that you will work on. iv. If you go to a site that you are not authorized for, you can browse the folder, but will get an error message when you try to upload. 2. You can use FTP software which can be downloaded free from such sites as www.download.com or www.cnet.com/ . I will not recommend one package over another. If you use FTP software, the URL to use to SFTP is Sftp.jewishgen.org You will be provided with a Login/Username and a Password. If the software requests a port number, this value is 22.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • INSIDE! Double-Sided DVD Double-Sided
    and lots of LINUX LINUX PRO MAGAZINE FREE USB PASSWORD SAFER BOOT DVD other timely Making Secure Boot MANAGER and useful tools work with Linux ISSUE ISSUE 206 Double-Sided DVD JANUARY 2018 JANUARY 2018 JANUARY INSIDE! SAFER Safer Boot Safer UEFI Shim TPM Backup Tools Stacer DDoS Attacks Pi FM Radio Volumio 2 Volumio Radio FM Pi Attacks DDoS Stacer Backup Tools TPM Shim UEFI BOOT Keeping control of the startup process UEFI Tricks Add a custom app that runs from the firmware Automated 5 Backup Tools Pi FM Radio DDoS Attack Stacer Build a stairway Avoiding a denial Clean up your to maker heaven of service nightmare Linux system Issue 206 Jan 2018 FOSSPicks US$ 15.99 CAN$ 17.99 FOSS • qutebrowser 1.0 0 74820 58049 Marke • Storyboarder t • CoreFreq ing • Marketing Free Software Audacity ffmpeg • Fragment synthesizer • Phipps: FOSS Communities Need Equal Rights Tutorials 3 • Digitize Your LPs with Audacity • ffmpeg 01 WWW.LINUXPROMAGAZINE.COM EDITORIAL Welcome TOMORROW’S NEWS Dear Reader, When I started working for this magazine, way back in 2004, of lobbyists and marketing professionals who keep chipping Linux was really picking up momentum. That was back in away at public opinion when everyone else has gone back to those years when every year was supposed to be “the year of their day jobs. the Linux desktop,” and the epic Linux vs. Windows battle Software has no shape or solid edges. The value of a software was revving to a full burn. product is simply what whoever owns it says they will charge One of the best examples of the Linux juggernaut was the city you for it.
    [Show full text]
  • Tutorial URL Manager Pro Tutorial
    Tutorial URL Manager Pro Tutorial Version 3.3 Summer 2004 WWW http://www.url-manager.com Email mailto:[email protected] Copyright © 2004 Alco Blom All Rights Reserved - 1 - Tutorial Installation Requirements URL Manager Pro 3.3 requires Mac OS X 10.2 or higher. On Mac OS X 10.1 you can use URL Manager Pro 3.1.1. URL Manager Pro 2.8 is still available for Mac OS 8 users. The bundle size of URL Manager Pro 3.3 is around 8 MB, including this user manual and localizations for English, Japanese, German, French, Spanish and Italian, which are all included in the default package. Installing Installation is very easy, just move URL Manager Pro into the Applications folder. To start using URL Manager Pro, simply double-click the application icon. Optional: You may want to install the Add Bookmark Contextual Menu Item plug-in. The Add Bookmark plug-in can be installed using the URLs tab of the Preferences Window of URL Manager Pro. The plug-in will then be copied to: ~/Library/Contextual Menu Items/ Where ~ is the customary Unix shorthand to indicate the user's home directory. For more information, go to the Add Bookmark Web page or the Contextual Menu Item section in the Special Features chapter. The Bookmark Menu Extra While URL Manager Pro is running, it automatically adds the Bookmark Menu Extra to the menu bar. With the Bookmark Menu Extra you have access to your bookmarks from within any application, including your web browser. The Bookmark Menu Extra is located in the right part of your menu bar (see below).
    [Show full text]
  • Extron SMP 111 User Guide
    User Guide Streaming AV Product SMP 111 Streaming Media Processor 68-2850-01 Rev. C 11 17 Safety Instructions Safety Instructions • English Istruzioni di sicurezza • Italiano WARNING: This symbol, , when used on the product, is intended to AVVERTENZA: Il simbolo, , se usato sul prodotto, serve ad alert the user of the presence of uninsulated dangerous voltage within avvertire l’utente della presenza di tensione non isolata pericolosa the product’s enclosure that may present a risk of electric shock. all’interno del contenitore del prodotto che può costituire un rischio di scosse elettriche. ATTENTION: This symbol, , when used on the product, is intended to alert the user of important operating and maintenance (servicing) ATTENTZIONE: Il simbolo, , se usato sul prodotto, serve ad instructions in the literature provided with the equipment. avvertire l’utente della presenza di importanti istruzioni di funzionamento e manutenzione nella documentazione fornita con l’apparecchio. For information on safety guidelines, regulatory compliances, EMI/EMF compatibility, accessibility, and related topics, see the Extron Safety and Per informazioni su parametri di sicurezza, conformità alle normative, Regulatory Compliance Guide, part number 68-290-01, on the Extron compatibilità EMI/EMF, accessibilità e argomenti simili, fare riferimento website, www.extron.com. alla Guida alla conformità normativa e di sicurezza di Extron, cod. articolo 68-290-01, sul sito web di Extron, www.extron.com. Sicherheitsanweisungen • Deutsch Instrukcje bezpieczeństwa • Polska WARNUNG: Dieses Symbol auf dem Produkt soll den Benutzer darauf aufmerksam machen, dass im Inneren des Gehäuses dieses OSTRZEŻENIE: Ten symbol, , gdy używany na produkt, ma na celu Produktes gefährliche Spannungen herrschen, die nicht isoliert sind und poinformować użytkownika o obecności izolowanego i niebezpiecznego die einen elektrischen Schlag verursachen können.
    [Show full text]
  • BAB VII Tip Dan Trik Ubuntu A. Backup Hasil Install Dari Repository Online
    BAB VII Tip dan Trik Ubuntu A. Backup Hasil Install dari Repository Online Menambahkan progrgram aplikasi di Ubuntu adalah hal yang sangat penting, apalagi kalauau memiliiliki koneksi internet. Mendownload filfile progrgram darii repository di internet maupun mengupdate/upgrade Ubuntu bisa dengan mudah dilakukan. Untuk menghindari download file yang sama dari repository online secara berulang-ulang, sebaiknya dilakukan backup file hasil download. Hal ini akan sangat menguntungkan jika anda dikemudian hari menginstall ulang Ubuntu karena Ubuntu menemukan kernel panic atau cuma sekedar berbagi filfile progrgram dengan teman-teman yang lain. Untuk melakukan hal itu diperlukan softaware APTonCD. sebagai infinformasi filfile yayang teltelahah didownload dari repository online disimpan di folfolder /var/cache/apt/archives. Jika aplikasisi APTonCD belum terinstall, lakukan hal berikut untuk menginstall aplikasinya. Buka terminal dan ketikkan perintah di bawah ini. $ sudo apt-get install aptoncd Setelah selesai aktifkan programnya dari menu System - Administration - APTOnCD. Window aplikasi APTOnCD akan terbuka seperti gambar PA.1 gambar PA.1 Selanjutnya klik tombol Create. Program secara otomatis menampilkan informasi paket-paket yang telah didownload dari repository online (gambar PA.2) gambar PA.2 Untuk menambahkan paket lainnya cukup dengan mengklik tombol Add (gambar PA.3). Jika data telah dikumpulkan oleh program, selanjutnya klik Burn... untuk memulai pembuatan ISO CD. gambar PA.3 Pada gambar PA.4 di bawah ini anda akan diminta untuk melakukan beberapa setting, jika file *.iso anda kurang dari 1 CD (<700MB) maka sebaiknya pilih opsi 1 CD, tapi jika melebihi 1 CD (>700MB) silahkan pilih opsi 1 DVD. Selanjutnya pilih lokasi di mana anda akan menyimpan filenya serta isi nama file untuk file iso yang akan dibuat dan klik Apply .
    [Show full text]