Some Leftovers: Some Leftovers

Total Page:16

File Type:pdf, Size:1020Kb

Some Leftovers: Some Leftovers Published on Tux Machines (http://www.tuxmachines.org) Home > content > some leftovers: some leftovers: By srlinuxx Created 02/03/2013 - 6:28pm Submitted by srlinuxx on Saturday 2nd of March 2013 06:28:04 PM Filed under News [1] What's New in KDE 4.10, the Most Advanced Linux Desktop [2] GNOME Shell 3.8 Features: Ctrl will Never Escape Overview [3] Firefox plugins management guide [4] Paradigm Shifting Without A Clutch [5] Video on Linux [6] Top Features For The Linux 3.9 Kernel [7] Arguments Against Rolling Release Ubuntu [8] Rekonq 2.2 [9] One instance of make now for LibreOffice [10] How CRON Can Automate Your Tasks And Make Your Life Easier [11] Mutually Exclusive PulseAudio streams [12] Introducing Samba 4 Now, Even More Awesomeness [13] Borqs Joins Linux Foundation to Promote Android [14] Anomaly 2 invades PC, Mac and Linux this spring [15] How to shoot yourself in the foot: Software activism [16] Wargame: European Escalation now available for Linux [17] Gnome Boxes Virtual Machine Manager Introduction [18] Keynote Lineup Confirmed for Linux Foundation Collaboration Summit [19] Open Cubic Player: So much awesome all at once [20] OruxMaps Lets You Go as Far as Your Mapmaking Skill Takes You [21] Qt/GTK Speed On Unity/KDE/Xfce/LXDE/GNOME/Razor [22] How to: Rename multiple files with "rename" [23] Is Accessibility Menu gone from GNOME 3.8? [24] Embedded industrial Linux drives Mars Rover [25] News Source URL: http://www.tuxmachines.org/node/59749 Links: [1] http://www.tuxmachines.org/taxonomy/term/24 [2] https://www.linux.com/news/software/applications/705478-whats-new-in-kde-410-the-most-advanced-linux- desktop/ [3] http://worldofgnome.org/shell-3-8-features-ctrl-will-never-escape-overview/ [4] http://www.dedoimedo.com/computers/firefox-plugins.html [5] http://erielookingproductions.info/ubuntu/2013/03/30-paradigm-shifting-without-a-clutch/ [6] http://beginlinux.com/blog/2013/02/video-on-linux/ [7] http://www.phoronix.com/scan.php?page=news_item&px=MTMxNTA [8] http://thepcspy.com/read/arguments-against-rolling-release-ubuntu/ [9] http://adjamblog.wordpress.com/2013/02/28/rekonq-2-2/ [10] http://skyfromme.wordpress.com/2013/02/28/one/ [11] http://maketecheasier.com/manage-cron-jobs-linux/2013/02/28 [12] http://www.burtonini.com/wordpress/2013/02/28/mutually-exclusive-pulseaudio-streams/ [13] http://www.linuxforu.com/2013/03/introducing-samba-4-now-even-more-awesomeness/ [14] http://www.sacbee.com/2013/02/28/5224658/borqs-joins-linux-foundation-to.html [15] http://www.joystiq.com/2013/02/28/anomaly-2-invades-pc-mac-and-linux-this-spring/ [16] http://nicubunu.blogspot.com/2013/02/how-to-shoot-yourself-in-foot-story-on.html [17] http://www.linuxgames.com/archives/18711 [18] http://linuxlibrary.org/gnome-boxes-virtual-machine-manager-introduction/ [19] http://www.linuxfoundation.org/news-media/announcements/2013/02/keynote-lineup-confirmed-linux-foundation- collaboration-summit [20] http://inconsolation.wordpress.com/2013/03/01/open-cubic-player-so-much-awesome-all-at-once/ [21] http://www.linuxinsider.com/story/77398.html [22] http://www.phoronix.com/scan.php?page=news_item&px=MTMxNDk [23] http://www.linuxandlife.com/2013/02/how-to-rename-multiple-files-with-rename.html [24] http://worldofgnome.org/is-accessibility-menu-gone-from-gnome-3-8/ [25] http://www.computerweekly.com/blogs/open-source-insider/2013/03/embedded-industrial-linux-drives-mars- rover.html.
Recommended publications
  • USA V Cottom Et Al 8:13-Cr-00108-JFB-TDT U.S. District Court District of Nebraska
    8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 1 of 29 - Page ID # 2406 NIT Forensic and Reverse Engineering Report, Continued from January 2015. USA v Cottom et al 8:13-cr-00108-JFB-TDT U.S. District Court District of Nebraska Investigators: Dr. Ashley Podhradsky, CHFI Dr. Matt Miller Mr. Josh Stroschein 06/05/2015 8:13-cr-00108-JFB-TDT Doc # 227-1 Filed: 06/29/15 Page 2 of 29 - Page ID # 2407 Executive Summary: On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to serve as expert witnesses on USA v Cottom et al, 8:13-cr- 00108-JFB-TDT. The case is in federal court in Omaha and is centered on the viewing and possession of child pornography. The investigators were informed that the central issue of the case is the identification from the FBI’s “Network Investigative Technique” or NIT that was used to identify the IP address of users on The Onion Router (TOR) network. The investigators, Ashley, Matt and Josh, were informed that there were three servers containing contraband images that the FBI found and took offline in November of 2012. Shortly thereafter, the FBI placed the NIT on the servers and put the servers back online with the goal to identify the true IP address of end users accessing the servers through the TOR network. From there, several end users true IP addresses were identified which resulted in actual identification of the end users.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Computational Resource Abuse in Web Applications
    Computational Resource Abuse in Web Applications Juan David Parra Rodriguez Dissertation eingereicht an der Fakult¨atf¨ur Informatik und Mathematik der Universit¨at Passau zur Erlangung des Grades eines Doktors der Naturwissenschaften A dissertation submitted to the faculty of computer science and mathematics in partial fulfillment of the requirements for the degree of doctor of natural sciences Betreuer: Prof. Dr. rer. nat. Joachim Posegga Passau, Germany, April 2019 Abstract Internet browsers include Application Programming Interfaces (APIs) to support Web applications that require complex functionality, e.g., to let end users watch videos, make phone calls, and play video games. Meanwhile, many Web applications employ the browser APIs to rely on the user's hardware to execute intensive computation, access the Graphics Processing Unit (GPU), use persistent storage, and establish network connections. However, providing access to the system's computational resources, i.e., processing, storage, and networking, through the browser creates an opportunity for attackers to abuse resources. Principally, the problem occurs when an attacker compromises a Web site and includes malicious code to abuse its visitor's computational resources. For example, an attacker can abuse the user's system networking capabilities to perform a Denial of Service (DoS) attack against third parties. What is more, computational resource abuse has not received widespread attention from the Web security community because most of the current specifications are focused on content and session properties such as isolation, confidentiality, and integrity. Our primary goal is to study computational resource abuse and to advance the state of the art by providing a general attacker model, multiple case studies, a thorough anal- ysis of available security mechanisms, and a new detection mechanism.
    [Show full text]
  • Upgrade Issues
    Upgrade issues Graph of new conflicts libsiloh5-0 libhdf5-lam-1.8.4 (x 3) xul-ext-dispmua (x 2) liboss4-salsa-asound2 (x 2) why sysklogd console-cyrillic (x 9) libxqilla-dev libxerces-c2-dev iceape xul-ext-adblock-plus gnat-4.4 pcscada-dbg Explanations of conflicts pcscada-dbg libpcscada2-dev gnat-4.6 gnat-4.4 Similar to gnat-4.4: libpolyorb1-dev libapq-postgresql1-dev adacontrol libxmlada3.2-dev libapq1-dev libaws-bin libtexttools2-dev libpolyorb-dbg libnarval1-dev libgnat-4.4-dbg libapq-dbg libncursesada1-dev libtemplates-parser11.5-dev asis-programs libgnadeodbc1-dev libalog-base-dbg liblog4ada1-dev libgnomeada2.14.2-dbg libgnomeada2.14.2-dev adabrowse libgnadecommon1-dev libgnatvsn4.4-dbg libgnatvsn4.4-dev libflorist2009-dev libopentoken2-dev libgnadesqlite3-1-dev libnarval-dbg libalog1-full-dev adacgi0 libalog0.3-base libasis2008-dbg libxmlezout1-dev libasis2008-dev libgnatvsn-dev libalog0.3-full libaws2.7-dev libgmpada2-dev libgtkada2.14.2-dbg libgtkada2.14.2-dev libasis2008 ghdl libgnatprj-dev gnat libgnatprj4.4-dbg libgnatprj4.4-dev libaunit1-dev libadasockets3-dev libalog1-base-dev libapq-postgresql-dbg libalog-full-dbg Weight: 5 Problematic packages: pcscada-dbg hostapd initscripts sysklogd Weight: 993 Problematic packages: hostapd | initscripts initscripts sysklogd Similar to initscripts: conglomerate libnet-akamai-perl erlang-base screenlets xlbiff plasma-widget-yawp-dbg fso-config- general gforge-mta-courier libnet-jifty-perl bind9 libplack-middleware-session-perl libmail-listdetector-perl masqmail libcomedi0 taxbird ukopp
    [Show full text]
  • Opensuse 11.4 Release Party, Hackerspace Brmlab KDE Plasma Workspaces 4.6
    openSUSE 11.4 Release Party, hackerspace brmlab KDE Plasma Workspaces 4.6 ● Fire ox integration ● LibreO ice integration ● oxygen%"tk theme for GTK applications ● KUp(ate)pplet → KPackageKit ● PulseA*(io (can be remove(- KDE Plasma Desktop 4.6 KDE Plasma Desktop 4.6 KDE Plasma Netbook 4.6 KDE Plasma Netbook 4.6 &.$ME 2.30 &.$ME 3 Preview ● &.$ME 3.0 release in April 2311 ● “pre,iew4 in openSUSE 11.4 &.$ME 3 Preview &.$ME 3 Preview &.$ME 3 Preview 5 ce 4.8 ● new X ce 4.8 release ● moved a2ay from HAL and own VFS ● replace( by &9$, &8FS, *(ev, :onsoleKit, PolicyKit ● Th*nar ● SF'P, S/B, F'P, WebD)8 support ● Free(esktop.org menus ● 5 con settings e(itor 5 ce 4.8 5 ce 4.8 #XDE 3.5 ● smaller *sability and stability ixes #XDE 3.5 #XDE 3.5 Firefox 4.0 ● ma=or redesign of UI ● tabs above ad(ress bar ● signi icant improvements o the rendering engine ● can *se "raphics car( for ren(erin" ● S*pport or new 2ebstan(ar(s like WebM an( 7'/#< ● 4.3 ;eta 10, inal ,ia *p(ate Firefox 4.0 $ther Browsers ● Chromi*m in Contrib repository ● Konqueror uses WebKit now ● others in repositories (Rekonq, Arora, Epiphany) ● $pera 11, A(obe Flash Player 10.2 in Non%$SS repo ● Moonlight 2.4 ● $penJDK Ja,a 6 plugin #ibreOffice 3.3.1 ● ork of OpenO ice – end of 2010 ● import & e(it o S8G files ● 1 million rows in Calc ● easier slide layout han(ling in Impress #ibreOffice 3.3.1 zypp + YaST C WebDaS' ● Bypp ● /*lti:*rl backen( – Bsync + Metalink ● YaS' ● #8/ base( layout (*ring installation ● 8& group *lly encrypte( ● WebYaS' zypp + YaST C WebDaS' zypp + YaST C WebDaS' Under the hood ● Kernel 2.6.3E ● better har(2are support +e.".
    [Show full text]
  • TROGUARD: Context-Aware ProtecOn Against Web-Based Socially Engineered Trojans
    TROGUARD: Context-Aware Protec6on Against Web-Based Socially Engineered Trojans Rui Han, Alejandro Mesa, University of Miami Mihai Christodorescu, QualComm Research Saman Zonouz, Rutgers University Mo#va#on • Waterfall screen saver Trojan 2 Mac OS threats Rank Name Percentage 1 Trojan.OSX.FakeCo.a 52% 2 Trojan-DownloaDer.OSX.Jahlav.d 8% 3 Trojan-DownloaDer.OSX.Flashfake.aI 7% 4 Trojan-DownloaDer.OSX.FavDonw.c 5% 5 Trojan-DownloaDer.OSX.FavDonw.a 2% 6 Trojan-DownloaDer.OSX.Flashfake.ab 2% 7 Trojan-FakeAV.OSX.Defma.gen 2% 8 Trojan-FakeAV.OSX.Defma.f 1% 9 Exploit.OSX.Smid.b 1% 10 Trojan-DownloaDer.OSX.Flashfake.af 1% McAfee an6virus solu6on: hVp:www.securelist.com 3 Example Malwares Malware Descripons Plaorm TrojanClicker.VB Trojan socially Windows engineered as adobe .395 flash update and Mac OS X Trojan or Adware socially Windows, Mac Faked An6-Virus engineered as an6-virus so]ware OS X, and Linux Malware socially Android Opfake Browser engineered as Opera Browser Legi6mate applicaons Mac OS X and WireLuker socially engineered with ad-wares and Trojan iOS 4 ContribUons • Answer the ques6on: “Is this program doing what I expected it to do?” • Bridge the seman6c gap between func6onality classes and low level behaviors • Built on 100 Linux app profiles • High detec6on rate on 50 Trojan apps 5 TROGUARD ArchItectUre TROGUARD Offline Dynamic Application Functionality Application Functionality Functionality Class Profile Database Feature Tracing Generation Extraction Application Functionality Profile Database Online Inference of Download Perceived
    [Show full text]
  • Download the Latest Android Sdk How to Download the Latest Version of Android SDK for Visual Studio .NET 2017
    download the latest android sdk How to download the latest version of Android SDK for Visual Studio .NET 2017. I would like to make use of the latest version of Android SDK, but it doesn't show up in "Android SDKs and Tools". I'm using MS Visual Studio Professional 2017, and I have to use Google repository, because it doesn't work with Microsoft repository. Can you advise? 1 Answer 1. If you're using Microsoft Visual Studio , I assume that you are or planning to work with Xamarin , and since you're asking for advice, I'd recommend that you work with android sdk from Microsoft repository instead of Google's as its clearly shown in the screenshot "unsupported" . However, if you still want to get latest sdk tool, switch to tab "Tools" instead of "Platforms" you'll see all the version and from there you can update as needed. Download the latest android sdk. OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines . A smart contract is a decentralized application that executes business logic in response to events. Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting . Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, . Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt .
    [Show full text]
  • Third Quarterly Report of 2011
    3RD QUARTER 2011 ISSUE 19 d e s i g n e r 2011 developers s DESKTOP CONTENTS free users Welcome Message SUMMIT Page 2. software T Why and How KDE R Rocks at Mentoring This past year, KDE sent 150 people through their formal O mentoring program, helping them to become better software P developers and open source contributors. In this interview, E Lydia Pintscher explains how and why. Page 3. R Community Activites KDE e.V. sponsors developer Y sprints, meetings, and activities all over the world. T I In this edition of the report, we hear about KDE at the 2011 Desktop Summit, the N Plasma Active Meeting, the KDE Telepathy Sprint, the Calligra Mini-Sprint, and KDE e.V. U General Assembly. Pages 4-14. Systems Admin Report M Technical overview of the year. Page 15. M Financials Financial reports for the fiscal O year and for Quarter 3, 2011. C Attendees at the 2011 Berlin Desktop Summit. Izabel (upper left), Elizabeth (lower left), Ivan E (upper right), and Kimmo (lower right, photos taken by Claudio Saavedra). D K Developers WELCOME MESSAGE The Desktop Summit is 2011's third quarter brought the KDE community one of the largest together for its yearly flagship event. Similar to software gatherings 2009, when Gran Canaria hosted the first ever anywhere. Hundreds of Desktop Summit, KDE gathered again with its peers software developers from from the GNOME camp for the Desktop Summit. In dozens of projects came 2009, KDE and GNOME held separate, but co- to work with colleagues located events.
    [Show full text]
  • Search Engines by Andy Pepperdine
    2013-03-28 Searching and Browsers U3A in Bath How to get the best out of search engines by Andy Pepperdine Introduction This paper is about how to select search engines and search terms to answer questions on the net. It will also include comments about some of the search engines that are available, but it does not purport to be inclusive; I can cover only those I have experience of or have heard of. Finally, a comment will be made about the more popular browsers and how to customise the search bars on them where possible. Example of search In this example we want to find out why a newly purchased Lenovo laptop, running Ubuntu 12.10, cannot see its bluetooth, which it apparently has. The first step is to identify the key parts of the question, which in this case are bluetooth and lenovo and ubuntu, so we can start with those and see what turns up. One of the items might well be a blog entry somewhere describing how to get it working. In fact, in the particular case we studied, there were a few immediate entries of interest. Just those particular ones were enough to find a few things that pointed us in the right direction. This is general. If you can find the keywords that restrict the issue to the minimum yu will find what you are looking for. Of course, if one of the words has multiple meaning, then you may need further help by adding other words that might be associated with the question you have.
    [Show full text]
  • Kde Booklet Ver8.Pdf
    Table of Contents In the Internet era, KDE enables you to chat, Communicate blog, share, and exchange with your friends and Page 3 colleagues. KDE Applications connect you to the world. Learn & Play With KDE education applications and games, you can learn something new and have fun with Page 7 innovative software. Create When you need to put your thoughts and fee- lings in words and images, KDE applications are Page 11 there to help you do just that. Enjoy KDE has powerful applications that offer you new ways to enjoy your music, photos, and videos. Page 15 Whatever the devices you use, you can easily Workspaces start and manage applications within a Work- Page 18 space. Founded in 1996, KDE has become one of the Community largest Free Software communities, gathering ar- Page 22 tists, developers, translators, writers, and others from all over the world. The KDE community provides opportunities for Contribute new people eager to get involved. Come and Page 26 take a look! KDE technology is being deployed around the KDE in use world in a variety of situations. In schools, in Page 34 offices and libraries. We want to give you some examples! Experience Freedom KDE Introduction Dear reader! On the following pages, you can learn a bit about the KDE community and what we have created. This booklet was Our large and diverse community has built a com- written by (in no prehensive set of applications and tools to have particular order): fun, keep in touch, and get work done. We’ll pres- Luca Beltrame, ent some of these applications and give you some Stuart Jarvis, useful tips and hints.
    [Show full text]