Ubuntu 12.04 Desktop Administration Duration: 40 Hrs

Total Page:16

File Type:pdf, Size:1020Kb

Ubuntu 12.04 Desktop Administration Duration: 40 Hrs Ubuntu 12.04 Desktop Administration Duration: 40 Hrs 1. Ubuntu 12.04 Introduction o Ubuntu 12.04 o Ubuntu 12.04 New Features o Desktop o Unity Features o System Tools o Applications o Kubuntu 12.04 o Ubuntu Editions o Ubuntu Live CD/DVD/USB o Ubuntu Desktop Live CD o Ubuntu Live USB drive o Ubuntu Software o Open source software 2. Installing Ubuntu o Install CD and DVDs o Installation choices o Installing Multiple-Boot Systems o Hardware Requirements o Installation Overview o Installation with the Ubuntu Desktop CD o Upgrade over network from Ubuntu 11.10 o Upgrade using a CD o Upgrading to new release with apt-get o Recovery, Rescue, and Boot loader re-install 3. Usage Basics: Login, Desktop,Network, and Help o Accessing Ubuntu System o GRUB Boot Loader o The Light Display Manager o The Session menu and user Switcher o Guest Login o Lock Screen o Shutdown and Logging Out o accessing Linux From the Command line. o Appearance (Backgrounds,Themes, and Launcher auto hide) o Details: system info, and default application and media o Clock: time and Date Indicator o Searching files o Help resources:- Ubuntu Desktop Guide, Context-sensitive Help, Head Office: #388,2nd Floor,8th Main,7th Cross, BTM Layout,2nd Stage,Bangalore-560076 Mobile No: 9844024424 Web: www.networkmasters.in 4. Installing and Updating Software o Installing Software Packages o Ubuntu Packages Management Software o Ubuntu Software Repositories o Repositories Components o Repositories o Updating Ubuntu with update Manager o Synaptic Package Manager o Installing Packages o Removing Packages o Ubuntu Software Center for Separate DEB packages o Source Code file o Software Packages Type o DEB software Packages o Using Packages with other software Formats 5. office Applications and Editors o LibreOffice o Calliga o GNOME Office Applications o Running Microsoft Office on Linux wine and Crossover o Document Viewer o FBreader o Calibre o Adobe Digital Editions o Kindle o PDA access o GNOME Text Editor 6. Graphics and Multimedia o Photo Management:Shot wall,F-Spot,and cheese o GNOME Graphics and Applications o KDE Graphics Applications o X window System Graphic Programs o Gstreamer o Music applications o Ubuntu One Music Store and Online Media o CD/DVD Burners o Video Applications 7. Mail and News o Mail Clients o Thunder bird o Evolution o The KDE mail Client o Squirrel Mail o mutt Head Office: #388,2nd Floor,8th Main,7th Cross, BTM Layout,2nd Stage,Bangalore-560076 Mobile No: 9844024424 Web: www.networkmasters.in o Mail o Usenet News o Newsreaders o binary Newsreaders and Grabbers o slrm o News Transport Agents 8. Internet Application o URl address o web browsers o FireFox, KDE Rekonq, Epiphany, Chromium o Lynx and Elinks o FileZilla, gFTP, wget, curl, ftp, lftp 9. Social Networking o the messaging menu o Broadcast Services o Instant Messenger:Empathy, Kopete, and Pidgin o VOIP Applications o Ekiga, Skype o KDE social Desktop o Ubuntu ONE 10. Ubuntu Desktop o Ubuntu Unity o Unity 2D o Keyboard and Mouse Shortcuts o Unity Launcher o Opening a launcher item o open application and launcher items o windows o windows Slides o minimizing, maximizing, and closing windows o workspace o Desktop menus and applications menu o Dash o dash search bar, dash lenses, Dash Home, o Nautilus File Manager o KDE o Shells 11. System Tools o GNOME system Monitor o Managing Process o System Testing o Scheduling Tasks o Log file Viewer o disk usages Analyzer Head Office: #388,2nd Floor,8th Main,7th Cross, BTM Layout,2nd Stage,Bangalore-560076 Mobile No: 9844024424 Web: www.networkmasters.in o plymouth 12. System Administration o Ubuntu Administration Tools o Controlled Administrative Access o Policy kit o sudo and gksu o sudo command o sudo configuration o gksu o sudo command o GRUB 2 o DKMS o Backup Management: Ubuntu One, rsync,Backup PC,and amanda 13. Network Connections o Network Connections: Dynamic and Static o Network Manager o Network Manager menu o Wired Network o Wireless network o DSL Configuration o Mobile Broadband o PPP Configuration o VPN o Firewalls 14. printing o Automatic Printer Detections o System-config-printer o Editing Printer Configuration o Default system wide Personal Printers o Printers Class o Remote Printers Head Office: #388,2nd Floor,8th Main,7th Cross, BTM Layout,2nd Stage,Bangalore-560076 Mobile No: 9844024424 Web: www.networkmasters.in .
Recommended publications
  • USA V Cottom Et Al 8:13-Cr-00108-JFB-TDT U.S. District Court District of Nebraska
    8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 1 of 29 - Page ID # 2406 NIT Forensic and Reverse Engineering Report, Continued from January 2015. USA v Cottom et al 8:13-cr-00108-JFB-TDT U.S. District Court District of Nebraska Investigators: Dr. Ashley Podhradsky, CHFI Dr. Matt Miller Mr. Josh Stroschein 06/05/2015 8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 2 of 29 - Page ID # 2407 Executive Summary: On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to serve as expert witnesses on USA v Cottom et al, 8:13-cr- 00108-JFB-TDT. The case is in federal court in Omaha and is centered on the viewing and possession of child pornography. The investigators were informed that the central issue of the case is the identification from the FBI’s “Network Investigative Technique” or NIT that was used to identify the IP address of users on The Onion Router (TOR) network. The investigators, Ashley, Matt and Josh, were informed that there were three servers containing contraband images that the FBI found and took offline in November of 2012. Shortly thereafter, the FBI placed the NIT on the servers and put the servers back online with the goal to identify the true IP address of end users accessing the servers through the TOR network. From there, several end users true IP addresses were identified which resulted in actual identification of the end users.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Computational Resource Abuse in Web Applications
    Computational Resource Abuse in Web Applications Juan David Parra Rodriguez Dissertation eingereicht an der Fakult¨atf¨ur Informatik und Mathematik der Universit¨at Passau zur Erlangung des Grades eines Doktors der Naturwissenschaften A dissertation submitted to the faculty of computer science and mathematics in partial fulfillment of the requirements for the degree of doctor of natural sciences Betreuer: Prof. Dr. rer. nat. Joachim Posegga Passau, Germany, April 2019 Abstract Internet browsers include Application Programming Interfaces (APIs) to support Web applications that require complex functionality, e.g., to let end users watch videos, make phone calls, and play video games. Meanwhile, many Web applications employ the browser APIs to rely on the user's hardware to execute intensive computation, access the Graphics Processing Unit (GPU), use persistent storage, and establish network connections. However, providing access to the system's computational resources, i.e., processing, storage, and networking, through the browser creates an opportunity for attackers to abuse resources. Principally, the problem occurs when an attacker compromises a Web site and includes malicious code to abuse its visitor's computational resources. For example, an attacker can abuse the user's system networking capabilities to perform a Denial of Service (DoS) attack against third parties. What is more, computational resource abuse has not received widespread attention from the Web security community because most of the current specifications are focused on content and session properties such as isolation, confidentiality, and integrity. Our primary goal is to study computational resource abuse and to advance the state of the art by providing a general attacker model, multiple case studies, a thorough anal- ysis of available security mechanisms, and a new detection mechanism.
    [Show full text]
  • Upgrade Issues
    Upgrade issues Graph of new conflicts libsiloh5-0 libhdf5-lam-1.8.4 (x 3) xul-ext-dispmua (x 2) liboss4-salsa-asound2 (x 2) why sysklogd console-cyrillic (x 9) libxqilla-dev libxerces-c2-dev iceape xul-ext-adblock-plus gnat-4.4 pcscada-dbg Explanations of conflicts pcscada-dbg libpcscada2-dev gnat-4.6 gnat-4.4 Similar to gnat-4.4: libpolyorb1-dev libapq-postgresql1-dev adacontrol libxmlada3.2-dev libapq1-dev libaws-bin libtexttools2-dev libpolyorb-dbg libnarval1-dev libgnat-4.4-dbg libapq-dbg libncursesada1-dev libtemplates-parser11.5-dev asis-programs libgnadeodbc1-dev libalog-base-dbg liblog4ada1-dev libgnomeada2.14.2-dbg libgnomeada2.14.2-dev adabrowse libgnadecommon1-dev libgnatvsn4.4-dbg libgnatvsn4.4-dev libflorist2009-dev libopentoken2-dev libgnadesqlite3-1-dev libnarval-dbg libalog1-full-dev adacgi0 libalog0.3-base libasis2008-dbg libxmlezout1-dev libasis2008-dev libgnatvsn-dev libalog0.3-full libaws2.7-dev libgmpada2-dev libgtkada2.14.2-dbg libgtkada2.14.2-dev libasis2008 ghdl libgnatprj-dev gnat libgnatprj4.4-dbg libgnatprj4.4-dev libaunit1-dev libadasockets3-dev libalog1-base-dev libapq-postgresql-dbg libalog-full-dbg Weight: 5 Problematic packages: pcscada-dbg hostapd initscripts sysklogd Weight: 993 Problematic packages: hostapd | initscripts initscripts sysklogd Similar to initscripts: conglomerate libnet-akamai-perl erlang-base screenlets xlbiff plasma-widget-yawp-dbg fso-config- general gforge-mta-courier libnet-jifty-perl bind9 libplack-middleware-session-perl libmail-listdetector-perl masqmail libcomedi0 taxbird ukopp
    [Show full text]
  • Opensuse 11.4 Release Party, Hackerspace Brmlab KDE Plasma Workspaces 4.6
    openSUSE 11.4 Release Party, hackerspace brmlab KDE Plasma Workspaces 4.6 ● Fire ox integration ● LibreO ice integration ● oxygen%"tk theme for GTK applications ● KUp(ate)pplet → KPackageKit ● PulseA*(io (can be remove(- KDE Plasma Desktop 4.6 KDE Plasma Desktop 4.6 KDE Plasma Netbook 4.6 KDE Plasma Netbook 4.6 &.$ME 2.30 &.$ME 3 Preview ● &.$ME 3.0 release in April 2311 ● “pre,iew4 in openSUSE 11.4 &.$ME 3 Preview &.$ME 3 Preview &.$ME 3 Preview 5 ce 4.8 ● new X ce 4.8 release ● moved a2ay from HAL and own VFS ● replace( by &9$, &8FS, *(ev, :onsoleKit, PolicyKit ● Th*nar ● SF'P, S/B, F'P, WebD)8 support ● Free(esktop.org menus ● 5 con settings e(itor 5 ce 4.8 5 ce 4.8 #XDE 3.5 ● smaller *sability and stability ixes #XDE 3.5 #XDE 3.5 Firefox 4.0 ● ma=or redesign of UI ● tabs above ad(ress bar ● signi icant improvements o the rendering engine ● can *se "raphics car( for ren(erin" ● S*pport or new 2ebstan(ar(s like WebM an( 7'/#< ● 4.3 ;eta 10, inal ,ia *p(ate Firefox 4.0 $ther Browsers ● Chromi*m in Contrib repository ● Konqueror uses WebKit now ● others in repositories (Rekonq, Arora, Epiphany) ● $pera 11, A(obe Flash Player 10.2 in Non%$SS repo ● Moonlight 2.4 ● $penJDK Ja,a 6 plugin #ibreOffice 3.3.1 ● ork of OpenO ice – end of 2010 ● import & e(it o S8G files ● 1 million rows in Calc ● easier slide layout han(ling in Impress #ibreOffice 3.3.1 zypp + YaST C WebDaS' ● Bypp ● /*lti:*rl backen( – Bsync + Metalink ● YaS' ● #8/ base( layout (*ring installation ● 8& group *lly encrypte( ● WebYaS' zypp + YaST C WebDaS' zypp + YaST C WebDaS' Under the hood ● Kernel 2.6.3E ● better har(2are support +e.".
    [Show full text]
  • TROGUARD: Context-Aware ProtecOn Against Web-Based Socially Engineered Trojans
    TROGUARD: Context-Aware Protec6on Against Web-Based Socially Engineered Trojans Rui Han, Alejandro Mesa, University of Miami Mihai Christodorescu, QualComm Research Saman Zonouz, Rutgers University Mo#va#on • Waterfall screen saver Trojan 2 Mac OS threats Rank Name Percentage 1 Trojan.OSX.FakeCo.a 52% 2 Trojan-DownloaDer.OSX.Jahlav.d 8% 3 Trojan-DownloaDer.OSX.Flashfake.aI 7% 4 Trojan-DownloaDer.OSX.FavDonw.c 5% 5 Trojan-DownloaDer.OSX.FavDonw.a 2% 6 Trojan-DownloaDer.OSX.Flashfake.ab 2% 7 Trojan-FakeAV.OSX.Defma.gen 2% 8 Trojan-FakeAV.OSX.Defma.f 1% 9 Exploit.OSX.Smid.b 1% 10 Trojan-DownloaDer.OSX.Flashfake.af 1% McAfee an6virus solu6on: hVp:www.securelist.com 3 Example Malwares Malware Descripons Plaorm TrojanClicker.VB Trojan socially Windows engineered as adobe .395 flash update and Mac OS X Trojan or Adware socially Windows, Mac Faked An6-Virus engineered as an6-virus so]ware OS X, and Linux Malware socially Android Opfake Browser engineered as Opera Browser Legi6mate applicaons Mac OS X and WireLuker socially engineered with ad-wares and Trojan iOS 4 ContribUons • Answer the ques6on: “Is this program doing what I expected it to do?” • Bridge the seman6c gap between func6onality classes and low level behaviors • Built on 100 Linux app profiles • High detec6on rate on 50 Trojan apps 5 TROGUARD ArchItectUre TROGUARD Offline Dynamic Application Functionality Application Functionality Functionality Class Profile Database Feature Tracing Generation Extraction Application Functionality Profile Database Online Inference of Download Perceived
    [Show full text]
  • Download the Latest Android Sdk How to Download the Latest Version of Android SDK for Visual Studio .NET 2017
    download the latest android sdk How to download the latest version of Android SDK for Visual Studio .NET 2017. I would like to make use of the latest version of Android SDK, but it doesn't show up in "Android SDKs and Tools". I'm using MS Visual Studio Professional 2017, and I have to use Google repository, because it doesn't work with Microsoft repository. Can you advise? 1 Answer 1. If you're using Microsoft Visual Studio , I assume that you are or planning to work with Xamarin , and since you're asking for advice, I'd recommend that you work with android sdk from Microsoft repository instead of Google's as its clearly shown in the screenshot "unsupported" . However, if you still want to get latest sdk tool, switch to tab "Tools" instead of "Platforms" you'll see all the version and from there you can update as needed. Download the latest android sdk. OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines . A smart contract is a decentralized application that executes business logic in response to events. Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting . Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, . Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt .
    [Show full text]
  • Third Quarterly Report of 2011
    3RD QUARTER 2011 ISSUE 19 d e s i g n e r 2011 developers s DESKTOP CONTENTS free users Welcome Message SUMMIT Page 2. software T Why and How KDE R Rocks at Mentoring This past year, KDE sent 150 people through their formal O mentoring program, helping them to become better software P developers and open source contributors. In this interview, E Lydia Pintscher explains how and why. Page 3. R Community Activites KDE e.V. sponsors developer Y sprints, meetings, and activities all over the world. T I In this edition of the report, we hear about KDE at the 2011 Desktop Summit, the N Plasma Active Meeting, the KDE Telepathy Sprint, the Calligra Mini-Sprint, and KDE e.V. U General Assembly. Pages 4-14. Systems Admin Report M Technical overview of the year. Page 15. M Financials Financial reports for the fiscal O year and for Quarter 3, 2011. C Attendees at the 2011 Berlin Desktop Summit. Izabel (upper left), Elizabeth (lower left), Ivan E (upper right), and Kimmo (lower right, photos taken by Claudio Saavedra). D K Developers WELCOME MESSAGE The Desktop Summit is 2011's third quarter brought the KDE community one of the largest together for its yearly flagship event. Similar to software gatherings 2009, when Gran Canaria hosted the first ever anywhere. Hundreds of Desktop Summit, KDE gathered again with its peers software developers from from the GNOME camp for the Desktop Summit. In dozens of projects came 2009, KDE and GNOME held separate, but co- to work with colleagues located events.
    [Show full text]
  • Search Engines by Andy Pepperdine
    2013-03-28 Searching and Browsers U3A in Bath How to get the best out of search engines by Andy Pepperdine Introduction This paper is about how to select search engines and search terms to answer questions on the net. It will also include comments about some of the search engines that are available, but it does not purport to be inclusive; I can cover only those I have experience of or have heard of. Finally, a comment will be made about the more popular browsers and how to customise the search bars on them where possible. Example of search In this example we want to find out why a newly purchased Lenovo laptop, running Ubuntu 12.10, cannot see its bluetooth, which it apparently has. The first step is to identify the key parts of the question, which in this case are bluetooth and lenovo and ubuntu, so we can start with those and see what turns up. One of the items might well be a blog entry somewhere describing how to get it working. In fact, in the particular case we studied, there were a few immediate entries of interest. Just those particular ones were enough to find a few things that pointed us in the right direction. This is general. If you can find the keywords that restrict the issue to the minimum yu will find what you are looking for. Of course, if one of the words has multiple meaning, then you may need further help by adding other words that might be associated with the question you have.
    [Show full text]
  • Kde Booklet Ver8.Pdf
    Table of Contents In the Internet era, KDE enables you to chat, Communicate blog, share, and exchange with your friends and Page 3 colleagues. KDE Applications connect you to the world. Learn & Play With KDE education applications and games, you can learn something new and have fun with Page 7 innovative software. Create When you need to put your thoughts and fee- lings in words and images, KDE applications are Page 11 there to help you do just that. Enjoy KDE has powerful applications that offer you new ways to enjoy your music, photos, and videos. Page 15 Whatever the devices you use, you can easily Workspaces start and manage applications within a Work- Page 18 space. Founded in 1996, KDE has become one of the Community largest Free Software communities, gathering ar- Page 22 tists, developers, translators, writers, and others from all over the world. The KDE community provides opportunities for Contribute new people eager to get involved. Come and Page 26 take a look! KDE technology is being deployed around the KDE in use world in a variety of situations. In schools, in Page 34 offices and libraries. We want to give you some examples! Experience Freedom KDE Introduction Dear reader! On the following pages, you can learn a bit about the KDE community and what we have created. This booklet was Our large and diverse community has built a com- written by (in no prehensive set of applications and tools to have particular order): fun, keep in touch, and get work done. We’ll pres- Luca Beltrame, ent some of these applications and give you some Stuart Jarvis, useful tips and hints.
    [Show full text]