Mumble/Murmur Und Teamspeak - Sicherheitsanalyse, Maßnahmen Und Angriffsszenarien

Total Page:16

File Type:pdf, Size:1020Kb

Mumble/Murmur Und Teamspeak - Sicherheitsanalyse, Maßnahmen Und Angriffsszenarien Hochschule fur¨ Technik, Wirtschaft und Kultur Leipzig Fakult¨at Informatik, Mathematik und Naturwissenschaften Projektarbeit Mumble/Murmur und Teamspeak - Sicherheitsanalyse, Maßnahmen und Angriffsszenarien Autoren: Marcel Graef Marco Franke Studiengang: Medieninformatik Master Lehrveranstaltung: IT-Sicherheit (Aufbaukurs) WS 2012/13 Verantwortlicher Professor: Prof. Dr. rer. nat. Uwe Petermann Inhaltsverzeichnis Inhaltsverzeichnis 1 Einleitung1 2 Vergleich von Mumble/Mumur und TeamSpeak 32 2.1 Anwendungsgebiete.............................2 2.2 Funktionsweise und Protokolle.......................2 2.3 Das Channel- und Rechtesystem......................4 2.4 Authentifizierung und Verwaltung der Clients..............5 2.5 Sprachcodecs................................6 2.5.1 CELP................................6 2.5.2 Speex................................7 2.5.3 CELT................................7 2.5.4 Opus.................................7 2.6 Unterstutzte¨ Betriebssysteme.......................8 2.7 Lizenzmodelle................................8 2.8 Weitere Besonderheiten...........................9 3 Sicherheitsanalyse und Ermittlung von Schwachstellen 10 3.1 Anforderungen und Schutzziele an Sprachkonferenzsysteme....... 10 3.1.1 Verfugbarkeit¨ ............................ 11 3.1.2 Vertraulichkeit........................... 11 3.1.3 Verbindlichkeit........................... 11 3.1.4 Weitere Anforderungen....................... 12 3.2 Typische Angriffsarten........................... 13 3.2.1 Computervirus........................... 13 3.2.2 Wurm................................ 13 3.2.3 Trojaner............................... 13 3.2.4 Exploit................................ 14 3.2.5 Backdoor.............................. 14 3.2.6 Rootkit............................... 15 3.2.7 Denial of Service.......................... 15 3.2.8 Spoofing............................... 15 3.2.9 Sniffing............................... 16 Marcel Graef & Marco Franke i Inhaltsverzeichnis 3.2.10 Port Scanning............................ 16 3.2.11 Brute-Force-Angriff......................... 16 3.2.12 Man-in-the-middle-Angriff..................... 17 3.2.13 Phishing............................... 17 3.2.14 Hijacking.............................. 17 3.3 Bedrohungen der Sprachkonferenzsysteme................ 18 3.3.1 M¨ogliche Angriffsziele....................... 18 3.3.2 Verursacher............................. 18 3.3.3 Verletzung der Schutzziele..................... 19 3.4 Ermittlung der Schwachstellen....................... 20 4 Realisierung einer Untersuchungsumgebung unter Betrachtung von Sicher- heitsmaßnahmen 22 4.1 Aufbau und Beschreibung der Untersuchungsumgebung......... 22 4.2 Installation und Inbetriebnahme der Spachkonferenzsoftware...... 23 4.2.1 TeamSpeak 3-Server........................ 23 4.2.2 TeamSpeak 3-Client........................ 24 4.2.3 Murmur-Server........................... 26 4.2.4 Clients Mumble........................... 27 4.3 Sicherheitsmaßnahmen........................... 29 4.3.1 Spachkonferenzsoftware....................... 29 4.3.2 Konfiguration der Server...................... 30 4.3.3 Sicherheitsrelevante Einstellungen des Betriebssystems..... 31 4.3.4 Router und lokale Firewall..................... 33 4.3.5 Nutzerverwaltung.......................... 37 4.3.6 Mensch als Schwachstelle...................... 38 5 Demonstration von Angriffsszenarien 40 5.1 Betrachtung des TeamSpeak 3-Server Query Interface.......... 40 5.1.1 Aufbau des Testprogramm..................... 40 5.1.2 Untersuchung der Anti-Flood-Protection............. 42 5.1.3 Brute-Force-Angriff auf das Query Interface........... 44 5.2 TeamSpeak 3-Server Query Interface Exploit............... 45 5.2.1 Funktionsweise von teamspeakrack................ 45 5.2.2 Einrichten einer Hintertur¨ ..................... 47 5.2.3 Null Pointer Dereferenzierung................... 49 5.2.4 Server mit Textnachrichten fluten................. 49 5.2.5 Weitere M¨oglichkeiten von teamspeakrack............ 50 5.3 Murmur Exploit fur¨ einen DoS-Angriff.................. 51 6 Resumee¨ und Ausblick 54 ii Marcel Graef & Marco Franke Inhaltsverzeichnis Literaturverzeichnis 56 Abbildungsverzeichnis 59 Tabellenverzeichnis 60 Abkurzungsverzeichnis¨ 61 Eigenst¨andigkeitserkl¨arung 63 Marcel Graef & Marco Franke iii 1 Einleitung Die Nutzung von Sprachkommunikationsdiensten hat im letzten Jahrzehnt drastisch zugenommen. Es gibt bereits zahlreiche Programme, die Sprachkonferenzen erm¨oglichen - beispielsweise TeamSpeak, Mumble/Murmur, Skype oder Ventrilo. Ein Grund fur¨ diese Entwicklung ist der Ausbau von DSL-Verbindungen sowie der Leitungskapazit¨at im Wide Area Network (WAN). Aber auch die Qualit¨at der Sprachubertragung¨ von Sprachkonferenzsystemen uber¨ IP-Netzwerke hat deutlich zugenommen. In dieser Arbeit werden zwei ausgew¨ahlte Sprachkonferenzsysteme untersucht. Dies ist zum Einen das propriet¨are TeamSpeak 3 und das quelloffene Mumble/Murmur. Die Ahnlichkeiten¨ und Unterschiede werden im Kapitel2 aufgezeigt. Dabei wird neben den grundlegenden technischen Details, Funktionsweisen und verwendeten Codecs auf die Lizenzmodelle eingegangen. Letzteres spielt gerade fur¨ Unternehmen eine wichtige Rolle. Neben den technischen Eigenschaften der Sprachkonferenzsysteme ist vor allem die Sicherheit von großem Interesse. Um diese in Kapitel3 zu analysieren, werden in Ab- schnitt 3.1 die Anforderungen und Schutzziele von Nutzern der Sprachkonferenzdienste aufgezeigt. Danach wird in Abschnitt 3.2 eine Ubersicht¨ typischer Angriffsarten gegeben. Mit Hilfe dieser Angriffsarten k¨onnen Angreifer Angriffsziele erreichen und stellen somit eine Bedrohung fur¨ das Sprachkonferenzsystem dar. Diese werden in Abschnitt 3.3 analysiert und klassifiziert. Durch diese systematische Betrachtung ist es m¨oglich, Schwachstellen von Sprachkonferenzsystemen zu identifizieren. Aufbauend auf diesen Erkenntnissen wird in Kapitel4 eine Untersuchungsumgebung aufgebaut und Maßnahmen zur Erh¨ohung der Sicherheit betrachtet und umgesetzt. Mit Hilfe dieser Untersuchungsumgebung wird in Kapitel5 aufgezeigt, dass die Sicherheit durch Sicherheitsmaßnahmen erh¨oht werden kann, aber durch kleine Fehler schnell betr¨achtliche Sicherheitsrisiken entstehen k¨onnen. Marcel Graef & Marco Franke 1 2 Vergleich von Mumble/Mumur und TeamSpeak 3 2 Vergleich von Mumble/Mumur und TeamSpeak 3 In diesem Kapitel werden die wesentlichen Merkmale von TeamSpeak 3 und Mum- ble/Murmur vorgestellt. Dabei wird auf den grundlegenden Aufbau, funktionale Eigen- schaften und vor allem auf die technischen Details wie Authentisierung, verwendete Codecs, Protokolle und Formate der Sprachkonferenzsoftware eingegangen. Auch werden die Lizenzmodelle von TeamSpeak 3 und Mumble/Murmur gegenubergestellt,¨ da diese eine wesentliche Rolle fur¨ Einrichtungen, Institutionen und Privatpersonen darstellen. 2.1 Anwendungsgebiete Das Hauptziel von TeamSpeak 3 als auch Mumble/Murmur ist es, einen Sprachkonfe- renzdienst bereit zu stellen, welcher eine m¨oglichst niedrige Latenzzeit besitzt und dabei trotzdem eine st¨orungsfreie und klare Audioqualit¨at bietet. Aber auch die Datenrate soll m¨oglichst gering (<25 kbit/s) gehalten werden. Gerade durch Erfullung¨ dieser Ziele wird die Software vor allem zur Kommunikation in Verbindung mit Online-Computerspielen verwendet. Aber auch in Netzwerken und Systemen mit beschr¨ankten Ressourcen wird TeamSpeak 3 oder Mumble/Murmur eingesetzt. [TSo12g], [MuM12a] 2.2 Funktionsweise und Protokolle Der Aufbau einer Kommunikationsverbindung wird mit einem klassischen Client-Server- Modell, wie in Abbildung 2.1 dargestellt, realisiert. Dabei wird bei TeamSpeak 3 zwischen dem so genannten TeamSpeak 3 Server und dem TeamSpeak 3 Client unterschieden. Analog dazu bezeichnet Mumble den Client und Murmur den Server. Jeder Client, der 2 Marcel Graef & Marco Franke 2.2 Funktionsweise und Protokolle sich auf einen Server verbindet, belegt einen so genannten Slot. Die Anzahl der Clients, die sich mit einem Server verbinden k¨onnen, ist damit auf die Anzahl der verfugbaren¨ Slots beschr¨ankt. Mit dem Server verbunden, k¨onnen sich die Clients gegenseitig sehen und untereinander kommunizieren. Dabei gibt es die M¨oglichkeit zur Sprach- oder Textkommunikation. [TSo12g], [MuM12c] Abbildung 2.1: Schematische Darstellung des Client-Server-Modells von TeamSpeak 3 und Mumble/Murmur Fur¨ den Verbindungsaufbau und zur Steuerung zwischen Client und Server verwenden beide Anwendungen das verbindungsorientierte Transmission Control Protocol (TCP), dies wird als Kontrollkanal bezeichnet. Fur¨ die Sprachubertragung¨ wird das User User Datagram Protocol (UDP) verwendet, da dies die Datenubertragung¨ nicht sichert und zu geringeren Verz¨ogerungen fuhrt.¨ Die Nutzung und Standard Ports dazu sind den Tabellen 2.1 und 2.2 zu zusammengefasst. TeamSpeak 3 Dienst Nutzung Standard-Port Sprachubertragung¨ TeamSpeak 3 Client 9987 UDP TCP Query telnet ip port 10011 TCP Tabelle 2.1: Ubersicht¨ uber¨ die genutzten Standard-Ports von TeamSpeak 3 zu den jeweiligen Diensten. Als IP-Telefonie-Protokoll verwendet TeamSpeak 3 das Softwareeigene, nicht offen Marcel Graef & Marco Franke 3 2 Vergleich von Mumble/Mumur und TeamSpeak 3 spezifizierte, TeamSpeak-Protokoll. Aus diesem Grund kann keine Aussage uber¨ die Verschlusselung¨ der Daten gemacht werden. Das TeamSpeak-Protokoll ist zu keinem anderen freien Protokoll wie SIP, H.323 und IAX kompatibel. Es existiert aber eine quelloffene Protokoll Alternative namens soliloque-server, welches kompatibel zum TeamSpeak-Protokoll ist. Das Mumble-Protokoll
Recommended publications
  • Mcafee Foundstone Fsl Update
    2016-AUG-18 FSL version 7.5.841 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 20369 - Splunk Enterprise Multiple Vulnerabilities (SP-CAAAPQM) Category: General Vulnerability Assessment -> NonIntrusive -> Web Server Risk Level: High CVE: CVE-2013-0211, CVE-2015-2304, CVE-2016-1541, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE- 2016-2109, CVE-2016-2176 Description Multiple vulnerabilities are present in some versions of Splunk Enterprise. Observation Splunk Enterprise is an operational intelligence solution Multiple vulnerabilities are present in some versions of Splunk Enterprise. The flaws lie in multiple components. Successful exploitation by a remote attacker could lead to the information disclosure of sensitive information, cause denial of service or execute arbitrary code. 20428 - (HT206899) Apple iCloud Multiple Vulnerabilities Prior To 5.2.1 Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-1684, CVE-2016-1836, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4607, CVE- 2016-4608, CVE-2016-4609, CVE-2016-4610, CVE-2016-4612, CVE-2016-4614, CVE-2016-4615, CVE-2016-4616, CVE-2016-4619 Description Multiple vulnerabilities are present in some versions of Apple iCloud. Observation Apple iCloud is a manager for the Apple's could based storage service. Multiple vulnerabilities are present in some versions of Apple iCloud. The flaws lie in several components. Successful exploitation could allow an attacker to retrieve sensitive data, cause a denial of service condition or have other unspecified impact on the target system.
    [Show full text]
  • Opus, a Free, High-Quality Speech and Audio Codec
    Opus, a free, high-quality speech and audio codec Jean-Marc Valin, Koen Vos, Timothy B. Terriberry, Gregory Maxwell 29 January 2014 Xiph.Org & Mozilla What is Opus? ● New highly-flexible speech and audio codec – Works for most audio applications ● Completely free – Royalty-free licensing – Open-source implementation ● IETF RFC 6716 (Sep. 2012) Xiph.Org & Mozilla Why a New Audio Codec? http://xkcd.com/927/ http://imgs.xkcd.com/comics/standards.png Xiph.Org & Mozilla Why Should You Care? ● Best-in-class performance within a wide range of bitrates and applications ● Adaptability to varying network conditions ● Will be deployed as part of WebRTC ● No licensing costs ● No incompatible flavours Xiph.Org & Mozilla History ● Jan. 2007: SILK project started at Skype ● Nov. 2007: CELT project started ● Mar. 2009: Skype asks IETF to create a WG ● Feb. 2010: WG created ● Jul. 2010: First prototype of SILK+CELT codec ● Dec 2011: Opus surpasses Vorbis and AAC ● Sep. 2012: Opus becomes RFC 6716 ● Dec. 2013: Version 1.1 of libopus released Xiph.Org & Mozilla Applications and Standards (2010) Application Codec VoIP with PSTN AMR-NB Wideband VoIP/videoconference AMR-WB High-quality videoconference G.719 Low-bitrate music streaming HE-AAC High-quality music streaming AAC-LC Low-delay broadcast AAC-ELD Network music performance Xiph.Org & Mozilla Applications and Standards (2013) Application Codec VoIP with PSTN Opus Wideband VoIP/videoconference Opus High-quality videoconference Opus Low-bitrate music streaming Opus High-quality music streaming Opus Low-delay
    [Show full text]
  • Voice in Virtual Worlds: the Design, Use and Influence of Voice Chat in Online Play
    Voice in virtual worlds: The design, use and influence of voice chat in online play Running Head: Voice in virtual worlds ABSTRACT Communication is a critical aspect of any collaborative system. In online multiplayer games and virtual worlds it is especially complex. Users are present over long periods and require both synchronous and asynchronous communication, but may prefer to be pseudonymous or engage in identity-play while simultaneously managing virtual and physical use contexts. Initially the only medium offered for player-to-player communication in virtual worlds was text, a medium well-suited to identity-play and asynchronous communication; less so to fast-paced coordination and sociability among friends. During the past decade vendors have introduced facilities for gamers to communicate by voice. Yet little research has been conducted to help us understand its influence on the experience of virtual space: where, when and for whom voice is beneficial, and how it might be configured. To address this gap we conducted empirical research across a range of online gaming environments. We analyzed our observations in the light of theory from human-computer interaction (HCI), computer-supported cooperative work (CSCW) and computer- mediated communication (CMC). We conclude that voice radically transforms the experience of online gaming, making virtual spaces more intensely social but turning them into maelstroms of impression management, identity play, and ambiguity over what is being transmitted to whom. CONTENTS 1. INTRODUCTION 1.1. Communication in play 1.2. Prior work 1.3. Our research program 2. CASE STUDIES 2.1. Study 1: Speaking with strangers in Xbox Live 2.2.
    [Show full text]
  • League of Legends Installation Packet
    League of Legends Installation Packet 02 Installing League of Legends Starting a Tournament Draft for Your 05 Students to Scrimmage System Requirements and IT 10 Considerations Riot Games Repair Tools for 20 Troubleshooting Additional Softwares Needed for 22 Competition Resources from One District’s Journey: 24 Key Considerations Games © Samueli Foundation | North America Scholastic Esports Federation Installing League of Legends © Samueli Foundation | North America Scholastic Esports Federation 2 How to Install League of Legends 1. Visit the League of Legends website, or paste the link below into your internet browser a. https://play.na.leagueoflegends.com/en_US → Select ‘Play for Free’ 2. After selecting ‘Play for Free,’ you will be prompted to create an account a. An account will need to be created to complete any patching* of the game. If you already have an account, move onto the next step (page 5) i. To create an account, you will need to submit an email, date of birth, username** and password 1. Note: You will also need to create a ‘Summoner Name’ when you log into the downloaded software a. What is the difference between username** and ‘Summoner Name’? i. Your ‘Summoner Name’ is what your friends will see in-game. This is the name that you will be known by on screen and on your friends' buddy lists. Unlike usernames, your summoner name can be changed whenever you like. This change will not affect your username or the way you log in. 2. What is patching? A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.
    [Show full text]
  • Gamespeak for N00bs a Linguistic and Pragmatic Analysis of Gamers‟ Language
    Gamespeak for n00bs A linguistic and pragmatic analysis of gamers‟ language Diplomarbeit zur Erlangung des akademischen Grades einer Magistra der Philosophie an der Karl-Franzens-Universität Graz vorgelegt von Jasmin FUCHS am Institut für Anglistik und Amerikanistik Begutachterin: Ao.Univ.-Prof. Mag. Dr. Phil. Hermine Penz Graz, 2013 Table of Contents 1. Introduction ........................................................................................................................ 5 2. The multiplayer game Counter-Strike: Source .................................................................. 7 2.1. Gameplay ................................................................................................................... 7 3. Language and the Internet .................................................................................................. 8 3.1. Computer-mediated communication .......................................................................... 9 3.2. Types of computer-mediated communication .......................................................... 10 3.3. Synchronous communication ................................................................................... 11 3.4. Asynchronous communication ................................................................................. 12 3.5. Computer-mediated communication tools used in games ........................................ 12 3.5.1. TeamSpeak ......................................................................................................... 13 3.5.2.
    [Show full text]
  • Download Talk 1.3
    Download talk 1.3 CLICK TO DOWNLOAD Talk to Siri Android latest APK Download and Install. Chat With Siri Artifial Intelligence. Talk Force is an Internet voice (VoIP) program that you can talk to people over the Internet from your PC. This program lets the user surf different channels and speak to multiple Talk Force users. 1/3 TeamTalk 4 is a conferencing system which enables a group of people to collaborate and share information. Every member of a group can communicate with other members in . Google Talk apk is also made available for rest of the android phones. If you have Android & above running and rooted phone then follow below steps to install Google Talk apk with Voice & Video chat feature. Download Google Talk apk. Connect phone to PC and run following commands on adb console. adb remount. Download our free update detector to keep your software up to date Mumble Thorvald Natvig - (Open-Source) Version: Size: Date People tend to simplify things, so when they talk about Mumble they either talk about "Mumble" the client application or about "Mumble & Murmur" the whole voice chat application suite. Advertisement. 1/3 Pidgin is a chat program which lets you log in to accounts on multiple chat networks simultaneously. This means that you can be chatting with friends on MSN, talking to a friend on Google Talk, and sitting in a Yahoo chat room all at the same time. Download Windows Client Version Windows Manually Install Zip File Download Mac OSX Client Version 64bit Download Linux Client Version By downloading Mumble you agree to the renuzap.podarokideal.ru Services Agreement.
    [Show full text]
  • Download Mumble Client
    Download mumble client Mumble is an open source, low-latency, high quality voice chat software primarily intended for use while gaming. You can download for free! The Mumble Client ​Download Mumble Free · ​Mumble Server Trial · ​Windows Manually. Download Mumble for free. Download mumblemsi Mumble setup on Windows 7 Mumble on Windows 7 Mumble Mumble is an open source, low-latency, high quality voice chat software primarily intended for use while gaming. Download Mumble If you are looking for a client for an operating system we do not officially support ourselves, or if you are. Download the Mumble client for free. Mumble is available for the PC, Mac and Linux. Mumble is a voice chat application for groups. It has low latency and superb voice quality, and features an in-game overlay. While it can be used for any kind. A description for this result is not available because of this site's Mumble VoIP Client/Server Clone or download . On Mac OS X, to install Mumble, drag the application from the downloaded disk. There are two modules in the Mumble package: the client (Mumble) and the server (Murmur). The superior audio quality comes in large parts from Speex, a high. Mumble is a free and open source audio chat software that has a goal to offer everyone ability to chat in a group environment. This includes. Mumble ist ein Open-Source-Client für Voice-Chat, der sich nicht nur schonend auf die für Onlinespiele so wichtige Latenz der Verbindung auswirkt, sondern mit. Mumble Deutsch: Mit der kostenlosen Telefon-Software Mumble Download .
    [Show full text]
  • Alliance Auth Documentation
    Alliance Auth Documentation R4stl1n Sep 14, 2021 CONTENTS 1 Installation 3 1.1 Alliance Auth...............................................3 1.2 NGINX..................................................9 1.3 Apache.................................................. 11 1.4 Gunicorn................................................. 13 1.5 Upgrading Python 3........................................... 15 2 Features 21 2.1 Overview................................................. 21 2.2 Core Features............................................... 21 2.3 Services.................................................. 29 2.4 Apps................................................... 60 2.5 Community Contributions........................................ 77 3 Maintenance 79 3.1 App Maintenance............................................. 79 3.2 Folder structure.............................................. 80 3.3 Troubleshooting............................................. 81 3.4 Tuning.................................................. 83 4 Support 87 5 Customizing 89 5.1 Site name................................................. 89 5.2 Custom Static and Templates...................................... 89 5.3 Custom URLs and Views........................................ 90 6 Development 91 6.1 Custom apps and services........................................ 91 6.2 Developing AA Core........................................... 102 6.3 Setup dev environment for AA...................................... 103 6.4 Developing apps............................................
    [Show full text]
  • Billy Sunsteel & Friends Battlefield Communications Where & How To
    How to connect to Billy Sunsteel & Friends Battlefield Communications Utilizing TeamSpeak 3 A voice... in the Battlefield Where & How to Download Teamspeak3 For your System What is needed beforehand First, Before, Downloading, Opening and Setting up the Teamspeak3, a few things will be necessary to have in order to complete that part, they are: A Privilege Key: Allows the player to Connect, and be a Member. Can be obtained through the Billy Sunsteel & Friends website. A Nickname: The name you want to be seen as on Billy Sunsteel & Friends' Battlefield Communications (It can be changed later too.) Note: “Privilege Key” can be obtained at the Billy Sunsteel & Friends website, when it is up. It can be obtained by emailing Billy Sunsteel & Friends. At the present, a “Privilege Key” is not necessary in order to connect, But if you have one, then use it. Next, One must know the “OS” Operating System of the computer or phone they wish to install the Teamspeak3 “Client” on in order to connect to Billy Sunsteel & Friends' Battlefield Communications server. Also, if the OS is Windows or Linux, then check to see if it is a 32-bit, or a 64-bit processor. This will determine which “Client” will be chosen to download. For phones, the OS will be either “Android” or an “iOS” for iPhone, iPad or iPod. Currently, This setup manual is for installation on a computer; However, “client” procedure for phone download and installation should be similar. The Computer OS “Client” download choices are: 1- Windows A) Client 32-bit B) Client 64-bit 2- Mac OS X Client OS X 3- Linux Client AMD 64-bit Client X86 (which is a 32-bit processor.
    [Show full text]
  • Font Awesome 5 Free's Cheatsheet Solid Icons
    Font Awesome 5 Free's Cheatsheet Solid Icons ad f641 address-book f2b9 address-card f2bb adjust f042 air-freshener f5d0 align-center f037 align-justify f039 align-left f036 american-sign- f2a3 align-right f038 allergies f461 ambulance f0f9 language-interpreting anchor f13d angle-double-down f103 angle-double-left f100 angle-double-right f101 angle-double-up f102 angle-down f107 angle-left f104 angle-right f105 angle-up f106 angry f556 ankh f644 apple-alt f5d1 archive f187 archway f557 arrow-alt-circle-down f358 arrow-alt-circle-left f359 arrow-alt-circle-right f35a arrow-alt-circle-up f35b arrow-circle-down f0ab arrow-circle-left f0a8 arrow-circle-right f0a9 arrow-circle-up f0aa arrow-down f063 arrow-left f060 arrow-right f061 arrow-up f062 arrows-alt f0b2 arrows-alt-h f337 assistive-listening- f2a2 arrows-alt-v f338 asterisk f069 at f1fa systems atlas f558 atom f5d2 audio-description f29e award f559 backspace f55a backward f04a balance-scale f24e ban f05e band-aid f462 barcode f02a bars f0c9 baseball-ball f433 basketball-ball f434 bath f2cd battery-empty f244 battery-full f240 battery-half f242 battery-quarter f243 battery-three-quarters f241 bed f236 beer f0fc bell f0f3 bell-slash f1f6 bezier-curve f55b bible f647 bicycle f206 binoculars f1e5 birthday-cake f1fd blender f517 blind f29d bold f032 bolt f0e7 bomb f1e2 bone f5d7 bong f55c book f02d book-open f518 book-reader f5da bookmark f02e bowling-ball f436 box f466 box-open f49e boxes f468 braille
    [Show full text]
  • Mumble-Server Pi – Student Worksheet
    Mumble-Server Pi – Student Worksheet Learning Outcomes • Learn the basics of IoT; • Understand the concepts of a Mumble-server; • Learn how to configure and use a Mumble-se6rver. Background Raspbian is a Debian-based computer operating system for the Raspberry Pi computer. There are several versions of Raspbian including: Raspbian Stretch and Raspbian Jessie. Raspbian was created by Mike Thompson and Peter Green as an independent project, with an initial build completed in June 2012. Since 2015, Raspbian has been officially provided by the Raspberry Pi Foundation as its primary operating system for the family of Raspberry Pi single-board computers and is highly optimized for the Raspberry Pi line's low-performance ARM CPUs. The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT devices could be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network. Increasingly, organisations in a variety of industries are using IoT to operate more efficiently, better understand customers to deliver enhanced customer service, improve decision-making and increase the value of the business. Mumble is a voice over IP (VoIP) application primarily designed for use by gamers and is similar to programs such as TeamSpeak.
    [Show full text]
  • Are Free Internet Technologies and Services the Future of Synchronous Distance Learning?
    Turkish Online Journal of Distance Education-TOJDE July 2018 ISSN 1302-6488 Volume: 19 Number: 3 Article 1 ARE FREE INTERNET TECHNOLOGIES AND SERVICES THE FUTURE OF SYNCHRONOUS DISTANCE LEARNING? Dr. Zoran KOTEVSKI Faculty of Information and Communication Technologies “St. Kliment Ohridski” University – Bitola Bitola, Republic of Macedonia Aleksandar MILENKOSKI Faculty of Information and Communication Technologies “St. Kliment Ohridski” University – Bitola Bitola, Republic of Macedonia ABSTRACT Distance education is not a new paradigm, but the latest ways it can be delivered certainly are. In the past couple of decades, the distance learning implementations were mostly realized using videoconferencing technologies and/or learning management systems. Recently, various Internet collaboration services have gained enormous popularity in all areas of human living, especially in distance learning, where many of them are offered free of charge. In this paper we elaborate the deployment of a synchronous distance lecturing solution based on free audioconferencing and screen sharing networking technologies, and we discuss the benefits gained in the context of cost, functionalities, effectiveness and users’ satisfaction. The experiences after three semesters of use indicate that this alternative approach provides quite valuable means for effective implementation of distance learning, where the students appeared to be highly satisfied by the possibilities and functionalities that the system offers. Keywords: Distance education, distance learning, Internet technologies, video conferencing, audioconferencing, learning management systems. INTRODUCTION Educational institutions employ an ongoing effort to enhance their educational processes and effectively deliver the required knowledge to their students. For many centuries of education, the only method for such tasks has been the traditional Face to Face (FtF) method.
    [Show full text]