Kubuntu:Precise Kubuntu 12.04 LTS (Precise Pangolin)

Total Page:16

File Type:pdf, Size:1020Kb

Kubuntu:Precise Kubuntu 12.04 LTS (Precise Pangolin) Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... Kubuntu:Precise From Kubuntu 12.04 LTS (Precise Pangolin) Introduction On April 26, 2012, Kubuntu (http://www.kubuntu.org/) 12.04 LTS was released. It is codenamed Precise Pangolin and is the successor to Oneiric Ocelot 11.10 (Oneiric+1). Precise Pangolin is an LTS (Long Term Support) release. It will be supported with security updates for both the desktop and server versions until April 2017. Contents 1 Kubuntu 12.04 LTS (Precise Pangolin) 1.1 Introduction 1.2 General Notes 1.2.1 General Notes 1.3 Other versions 1.3.1 How to determine which version of Kubuntu you're using 1.3.2 How to find out the version of your Kernel 1.3.3 Newer Versions of Kubuntu 1.3.4 Older Versions of Kubuntu 1.4 Other Resources 1.4.1 Kubuntu Resources 1.4.1.1 KDE Project 1.4.1.2 Kubuntu Screenshots and Screencasts 1.4.1.3 New Applications Resources 1.4.2 Other *buntu guides and help manuals 2 Installing Kubuntu 2.1 Hardware requirements 2.2 Fresh Installation 1 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... 2.2.1 Kubuntu Netbook Edition 2.2.2 Trinity Desktop (KDE 3 Remix) 2.2.3 Kubuntu Active 2.3 Dual-Booting Windows and Kubuntu 2.3.1 Installing multiple OS on a single computer 2.4 Upgrading from older versions 2.5 Add Extra Repositories 2.5.1 Types of Repositories 2.5.1.1 Third party repositories 2.5.1.2 PPA repositories 2.5.2 Add Repositories using the Package Manager 2.5.3 Manually add repositories 2.5.3.1 Edit the repository sources list 2.5.4 Add repository keys 2.6 Package Installation and Updates 2.6.1 Apt and Package Basics 2.6.1.1 Installing .deb packages 2.6.1.2 Handling (Tar/GZip) and (Tar/Bzip2) archives 2.6.1.3 Installing a package from source 2.6.1.3.1 Create a .deb package from source files 2.6.2 Muon Package Manager 2.6.3 Synaptic Package Manager 2.6.4 Manual Updates 2.6.5 Automatic Updates 2.6.6 Repair broken packages 3 File Managers 3.1 Dolphin 3.1.1 Add services to the Dolphin file manager 4 Desktop Add-ons 4.1 KDE Eye-Candy Resources 4.1.1 KDE Artwork 4.2 Kwin 4.3 Compiz Fusion 4.3.1 Fusion Icon 4.3.2 Rotate the Compiz Cube 4.4 Emerald 4.5 deKorator 4.6 Widgets 4.6.1 Add Plasma Widgets to the desktop 4.6.2 Add scripting for Plasma Widgets 4.7 Add Plasma Widget packages 4.7.1 SuperKaramba Desktop Widgets / Gadgets 4.8 Change Plymouth Splash Screen 4.9 Google Desktop 4.10 Dock applications 4.10.1 Icon-Only Taskbar Manager 4.10.2 Fancy Tasks 4.10.3 Cairo Dock 2 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... 4.10.4 Avant Window Navigator 4.11 Yakuake command-line terminal 5 Virtualization 5.1 VirtualBox 5.1.1 Proprietary versions of VirtualBox 5.2 VMWare 5.2.1 VMWare Player 5.2.2 Create an Ubuntu Appliance 5.2.3 VMWare Server 5.2.3.1 VMWare Package 5.2.4 Keyboard errors in VMware guest 5.3 KVM 5.4 Qemu (without KVM) 5.5 Xen 5.6 Virtual Machine Manager 5.7 Crossover for Linux 5.8 Wine 5.8.1 PlayOnLinux 5.8.1.1 Internet Explorer 7 5.8.2 Internet Explorer 6 & 7 5.8.3 Netflix in Wine package 5.9 Transgaming Cedega 5.10 Mono 5.10.1 Moonlight 5.11 Java 5.12 DosBox 5.13 ScummVM 5.14 Google Android 5.14.1 Android-x86 in VirtualBox 5.14.2 Android SDK emulator 5.14.3 F-Droid app repository for Android 6 Edutainment Applications 7 Games 7.1 Wing Commander Privateer 7.2 Vdrift 7.3 Action 7.3.1 UrbanTerror 7.3.2 Doom 7.3.2.1 Skulltag 7.3.2.2 PrBoom 7.4 MMORPG 7.4.1 Spring 7.4.2 Regnum Online 7.4.3 PlaneShift 7.5 Game Emulators 7.5.1 DosBox (DOS emulator) 7.5.2 Dolphin (Wii emulator) 7.5.3 Other Emulators 3 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... 8 Internet Applications 8.1 Web Browsers 8.1.1 Rekonq 8.1.2 Konqueror 8.1.2.1 Konqueror plug-ins 8.1.2.1.1 KGet (Download Manager) plug-in for Konqueror 8.1.3 Mozilla Firefox 8.1.3.1 Firefox Plug-ins 8.1.3.1.1 Adblock Plus plug-in (block ads in a web page) 8.1.3.1.2 NoScript plug-in (controls scripts) 8.1.3.1.3 Bookmark Favicon Changer plug-in 8.1.3.1.4 RefreshBlocker plug-in (prevents redirects) 8.1.3.1.5 Video DownloadHelper plug-in for Firefox 8.1.3.1.6 User Agent Switcher plug-in for Firefox 8.1.3.1.7 Unplug Download Management 8.1.3.1.8 Lucifox (eBook reader extension) 8.1.3.1.9 Adobe Acrobat Reader for Firefox Plug-in 8.1.3.1.10 Adobe Flash Player for Firefox Plug-in 8.1.3.1.11 Gnash Plug-in (Open source Flash Player replacement) 8.1.3.1.12 Java Runtime Environment (JRE) for Firefox plug-in 8.1.3.1.13 Kaffeine Plug-in for Firefox 8.1.3.1.14 MPlayer plug-in for Firefox 8.1.3.1.15 VLC plug-in for Firefox 8.1.3.1.16 Helix player plug-in for Firefox 8.1.3.1.17 Moonlight plugin for Firefox 8.1.3.2 FireFTP for Firefox 8.1.3.3 Firefox Widgets 8.1.3.4 Turn off browser bar drop-down list in Firefox 8.1.3.5 Turn off SSL certificate name in address bar 8.1.3.6 View Firefox cache 8.1.4 IceWeasel 8.1.5 GNUzilla IceCat 8.1.6 Opera 8.1.7 Chromium 8.1.8 Google Chrome 8.2 Download Managers 8.2.1 KGet 8.2.2 MultiGet 8.3 Usenet Clients 8.3.1 Pan 8.3.2 Kwooty 8.4 Email Clients 8.4.1 KMail 8.4.1.1 PGP and Kmail 8.4.2 Thunderbird 8.4.2.1 Lightning calendar extension 8.4.2.2 Enigmail 8.4.2.3 Miniminize to System Tray 4 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... 8.4.2.4 New Mail Icon for Thunderbird 8.4.3 Evolution 8.4.4 FetchYahoo 8.5 Newsreaders 8.5.1 Akregator 8.5.2 RSSOwl 8.6 Instant Messengers 8.6.1 Kopete 8.6.1.1 Plugins for Kopete 8.6.1.2 Kopete Styles 8.6.1.3 GoogleTalk on Kopete 8.6.1.4 Facebook Chat on Kopete 8.6.2 Konversation (IRC client) 8.6.3 Quassel (IRC client) 8.6.4 Pidgin 8.6.5 aMSN 8.6.6 Emesene 8.6.7 Kmess 8.6.8 KDEuBlog (Microblogging) 8.6.9 Choqok (Microblogging) 8.7 FTP Clients 8.7.1 Filezilla 8.8 Filesharing / P2P 8.8.1 KTorrent 8.8.1.1 Set Firefox to use KTorrent for magnet links 8.8.2 Azureus 8.8.3 QBitTorrent 8.8.4 Transmission (BitTorrent Client) 8.8.5 Deluge 8.8.6 Bittornado (BitTorrent Client) 8.8.7 Torrentflux (P2P client and server) 8.8.8 Apollon (P2P Filesharing) 8.8.9 KMLDonkey (P2P eMule/eDonkey2000 Client) 8.8.10 Opentracker (Torrent tracker) 9 Videoconferencing and VOIP 9.1 Ekiga 9.2 Skype 9.2.1 How to install Skype on a 64-bit system 9.2.2 Installing Skype repository 9.3 Wengophone 9.4 Gizmo5 9.5 Asterisk VOIP PBX system 9.5.1 Kiax 9.6 OpenSIPS / OpenSER (SIP server) 9.7 Telepathy 9.8 Web meetings 9.8.1 BigBlueButton 9.8.2 WebHuddle 5 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri... 9.8.3 TeamViewer 10 Privacy 10.1 PGP (Message Encryption) 10.1.1 Enigmail with Thunderbird 10.1.2 Kleopatra (Cryptography and Certificate Manager) 10.1.3 KGPG 10.1.4 PGP Troubleshooting 10.2 Web browsing 10.3 Tor (Network privacy) 10.3.1 Vidalia (Tor interface) 10.3.2 Tork (KDE Tor interface) 10.3.3 Using Tor with Firefox 10.3.3.1 Torbutton (Firefox plug-in) 10.4 DNS Servers and Search engines 10.5 Changing a MAC address 10.6 Certificate verification 10.7 File archival and encryption 10.7.1 Archives with Passwords 10.8 Disk and Storage Encryption 11 Proprietary Extras 11.1 Restricted Extras 11.1.1 Java environment 11.1.2 Playing DVDs 12 Photos and Graphics 12.1 Accessing a digital camera from the Dolphin file manager 12.2 GIMP (Image Manipulator) 12.3 Gwenview (Image Manipulator) 12.4 Krita (Painting and Drawing) 12.4.1 Adding Text to Images with Krita 12.5 Dia (Diagram editor) 12.6 Kivio (Diagram editor) 12.7 Inkscape Vector Illustrator 12.8 Digikam (Photo Organiser) 12.9 Google Picasa (Photo Organiser) 12.10 Tesseract (Optical Character Reader) 12.11 Cuneiform (Optical Character Reader) 12.11.1 YAGF (Cuneiform/Tesseract GUI) 12.12 Xsane (Scanning utility) 12.13 Gnome-Scan (Scanning Utility) 12.14 OpenClipart (ClipArt Library) 13 Screencasts and Desktop Recording 13.1 FFMPEG with x11grab 13.2 recordMyDesktop (Desktop Session Recording) 13.2.1 Using recordMyDesktop with PulseAudio 13.3 Istanbul (Desktop Session Recording) 13.4 xvidcap (Desktop Session Recording) 13.5 WebCamStudio 13.6 Wink (Presentation Editor) 6 of 255 04/09/2013 05:49 PM Kubuntu:Precise - http://ubuntuguide.org/index.php?title=Kubuntu:Precise&pri..
Recommended publications
  • Ultumix GNU/Linux 0.0.1.7 32 Bit!
    Welcome to Ultumix GNU/Linux 0.0.1.7 32 Bit! What is Ultumix GNU/Linux 0.0.1.7? Ultumix GNU/Linux 0.0.1.7 is a full replacement for Microsoft©s Windows and Macintosh©s Mac OS for any Intel based PC. Of course we recommend you check the system requirements first to make sure your computer meets our standards. The 64 bit version of Ultumix GNU/Linux 0.0.1.7 works faster than the 32 bit version on a 64 bit PC however the 32 bit version has support for Frets On Fire and a few other 32 bit applications that won©t run on 64 bit. We have worked hard to make sure that you can justify using 64 bit without sacrificing too much compatibility. I would say that Ultumix GNU/Linux 0.0.1.7 64 bit is compatible with 99.9% of all the GNU/Linux applications out there that will work with Ultumix GNU/Linux 0.0.1.7 32 bit. Ultumix GNU/Linux 0.0.1.7 is based on Ubuntu 8.04 but includes KDE 3.5 as the default interface and has the Mac4Lin Gnome interface for Mac users. What is Different Than Windows and Mac? You see with Microsoft©s Windows OS you have to defragment your computer, use an anti-virus, and run chkdsk or a check disk manually or automatically once every 3 months in order to maintain a normal Microsoft Windows environment. With Macintosh©s Mac OS you don©t have to worry about fragmentation but you do have to worry about some viruses and you still should do a check disk on your system every once in a while or whatever is equivalent to that in Microsoft©s Windows OS.
    [Show full text]
  • Full Circle Magazine #33 Contents ^ Full Circle Ubuntu Women P.28
    full circle ISSUE #33 - January 2010 CCRREEAATTEE AA MMEEDDIIAA CCEENNTTEERR WWIITTHH UUBBUUNNTTUU,, AANN AACCEERR RREEVVOO && BBOOXXEEEE full circle magazine #33 contents ^ full circle Ubuntu Women p.28 Program In Python - Pt7 p.08 Ubuntu Games p.31 My Story p.19 MOTU Interview p.24 Read how Ubuntu is used in public education, and why one man made the switch to Linux. Ubuntu, Revo & Boxee p.13 Command & Conquer p.05 The Perfect Server - Pt3 p.15 Review - Exaile p.23 Letters p.26 Top 5 - Sync. Clients p.35 The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: You must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('full circle magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license. full circle magazine #33 contents ^ EDITORIAL This magazine was created using : Welcome to another issue of Full Circle magazine. ast month, Andrew gave us his Top 5 Media Center applications. This month I've written a How-To on using Ubuntu on an Acer Aspire Revo to create the foundation for Boxee. For under £150 I've created a fantastic media center L which not only looks great, it's fully customizable! That's my media center story, but don't forget to read the My Story articles which this month focus on Ubuntu, Linux and open-source in public education, as well as how one man went from using old (modern at the time) computers, to using Ubuntu.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • PC-BSD Quick Guide.Pdf
    PC-BSD Quick Guide file:///E:/Documents%20and%20Settings/Owner/Desktop/PC-BSD%20Q... PC-BSD Quick Guide This quick start guide is aimed at users new to PC-BSD, FreeBSD and Unix in general. It is under constant development, and you will probably find mistakes in this guide. Whenever you find errors, feel free to report them on the documentation forum. For the latest and most up-to-date version please visit the Quick Guide online. Alternatively you can also download this file as PDF. We hope this guide is both simple and useful and make using PC-BSD an enjoyable experience. If you have suggestions for PC-BSD, you can either let us know on the forum, or send us an e-mail to: [email protected] , we value your opinion. Thank you for your support. Table of contents 1. Introduction 1.1. Welcome to PC-BSD 1.2. Differences between PC-BSD and FreeBSD 1.3. Microsoft Windows vs PC-BSD 1.4. PC-BSD's goals 1.5. Reasons for using PC-BSD 1.6. PC-BSD's cutting-edge features 1.7. Package Management 1.8. Summary of PC-BSD's features 1.9. More features (advanced/technical) 1.10. PC-BSD Releases 1.11. Where can I get help? 1.12. Additional resources 2. Installation 2.1. Requirements 2.2. Creation of the CD-ROM 2.3. Installation 2.4. Starting up PC-BSD 2.5. Network configuration 2.6. Post-installation 2.7. Windows Software 2.8. Troubleshooting 3. Workspace 3.1. Applications 3.2.
    [Show full text]
  • OPEN SOURCE Software Enter the World Of
    OPEN SOURCE Software http://www.bacula.org http://eraser.heidi.ie Eraser is a secure data Bacula is a set removal tool for Win- of computer programs that permit manag- dows. It completely removes sensitive data ing backup, recovery, and verification of from your hard drive by overwriting it several computer data across a network of com- times with carefully selected patterns. Eraser puters of different kinds. Based on Source is currently supported under Windows XP Forge downloads, Bacula is the most popu- lar Open Source backup program. (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Win- dows Server 2008, Windows 7 and Windows Server 2008 R2. http://www.emule-project.net e M u l e is a filesharing client which is based on http://shareaza.sourceforge.net/ the eDonkey2000 network but offers more features than the standard client. Shareaza is a very powerful multi-network eMule is one of the biggest and most peer-to-peer ( P2P ) file-sharing client sup- reliable peer-to-peer file sharing clients porting Gnutella² ( G2 ), Gnutella ( G1 ), around the world. eDonkey2000 ( eMule ), DC++, HTTP, FTP and BitTorrent protocols for Windows (or Wine). It allows you to download any file-type For more OSS, visit sourceforge found on several popular P2P networks. Shareaza is FREE & contains NO Spyware or third-party products. http://www.scintilla.org Scintilla is a free source code editing compo- nent which includes useful features such as syntax styling, error indicators, folding, code completion and call tips. The project includes SciTE (SCIntilla based Text Editor).
    [Show full text]
  • 18 Free Ways to Download Any Video Off the Internet Posted on October 2, 2007 by Aseem Kishore Ads by Google
    http://www.makeuseof.com/tag/18-free-ways-to-download-any-video-off-the-internet/ 18 Free Ways To Download Any Video off the Internet posted on October 2, 2007 by Aseem Kishore Ads by Google Download Videos Now download.cnet.com Get RealPlayer® & Download Videos from the web. 100% Secure Download. Full Movies For Free www.YouTube.com/BoxOffice Watch Full Length Movies on YouTube Box Office. Absolutely Free! HD Video Players from US www.20north.com/ Coby, TV, WD live, TiVo and more. Shipped from US to India Video Downloading www.VideoScavenger.com 100s of Video Clips with 1 Toolbar. Download Video Scavenger Today! It seems like everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos. There are basically two ways to download videos off the Internet and that’s how I’ll split up this post: either via a web app or via a desktop application. Personally, I like the web applications better simply because you don’t have to clutter up and slow down your computer with all kinds of software! UPDATE: MakeUseOf put together an excellent list of the best websites for watching movies, TV shows, documentaries and standups online.
    [Show full text]
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Volume 51 April, 2011
    Volume 51 April, 2011 e17: Create Your Own Custom Themes e17: Running Ecomorph, Part 2: Settings e17: Tips & Tricks Video: Part 3 ­ Converting Files With MyMencoder Video: Part 4 ­ MyMencoderDVD Removing A Logo With Avidemux Using Scribus, Part 4: Layers Game Zone: Pipewalker Plus Rudge's Rain: Making Music More With PCLinuxOS Inside! WindowMaker on PCLinuxOS: Working With Icons Burning CDs Over The Internet With Or Without An ISO Alternate OS: Icaros, Part 2 Firefox Add­on: Video DownloadHelper Learning rtmpdump Through Examples TTaabbllee OOff CCoonntteennttss by Paul Arnote (parnote) 3 Welcome From The Chief Editor 4 e17: Running Ecomorph, Part 2 ­ Settings The holidays have finally come and gone, the 6 Using Scribus, Part 4: Layers packages have all been unwrapped, the Christmas tree and other holiday decorations are coming down, 7 Screenshot Showcase and a new year is upon us. Texstar and the The PCLinuxOS name, logo and colors are the trademark of 8 Video: Part 3 ­ Converting Files With MyMencoder PTCexLsitnaru. xOS Packaging Crew are busy putting the 12 ms_meme's Nook: Top Of My Desktop new tool chain to good use, working on getting the PTChLeiNnEuWxOPSCL2in0u1x0OSreMleagaaszeinneeisaaremrotnothclyoomnlpinle tion. The 13 Double Take & Mark's Quick Gimp Tip upudbalicteatsiocnocnontitnaiuneingtoPCroLlilnuoxuOtSa­rtealanteadmmatzeirniagls.pIat icse, with 14 e17: Create Your Own Custom Themes litpeurbalisllhyehdupnrimdraeridlysfoorfmneemwbearsnodf tuhpedPaCtLeindupxOaSckages community. The Magazine staff is comprised of volunteers 20 Screenshot Showcase bferocmomtheinPgCaLvinauixlOabSlecoemvmeurnyityw. eek. 21 Video: Part 4 ­ MyMencoderDVD TVhisisit musoonntlihne'samt hattgp:a//zwiwnwe.pccolovsemrafge.caotmures snow covered 25 Screenshot Showcase photos from ms_meme. On the inside, the contents This release was made possible by the following volunteers: 26 Alternate OS: Icaros, Part 2 are hot enough to melt that snow.
    [Show full text]
  • UTEP Standard 20: Software Licensing 20.1 All Software Used On
    UTEP Standard 20: Software Licensing 20.1 All software used on University devices will be used in accordance with the applicable software license. Unauthorized or unlicensed use of software is regarded as a serious violation subject to disciplinary action and any such use is without the consent of the University. (a) UTEP Information Security Policies: UTEP provides a sufficient number of cost-effective, licensed copies of core business software to enable faculty members, staff, and students to perform their work in an expedient and effective manner. (b) Systems administrators have the right to remove software from University devices for cause. For example, if a user in unable to show proof of license, or if the software is not required for University business purpose, or causes problems on the University- owned device. (c) All departments/colleges are responsible for the accurate accounting of software purchased by their respective department/ college and must ensure that the installation of the software complies with the license agreement of the software. For audit purposes, departments/colleges must maintain proof of purchase and/or original installation media for each software package. Third- party software in the possession of UTEP must not be copied unless such copying is consistent with relevant license agreements and prior management approval of such copying has been obtained, or copies are being made for contingency planning purposes. (d) All software purchases shall go through the UTEP Purchasing Department. (e) All commercial software used on computing systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product and shall be purchased through the Purchasing Department.
    [Show full text]
  • The Perfect Desktop - Linux Mint 3.1 "Celena" FE
    The Perfect Desktop - Linux Mint 3.1 "Celena" FE Version 1.0 Author: Oliver Meyer <o [dot] meyer [at] projektfarm [dot] de> Last edited 10/15/2007 This document describes how to set up a Linux Mint 3.1 "full edition" desktop. The result is a fast, secure and extendable system that provides all you need for daily work and entertainment. Linux Mint 3.1 builds upon Ubuntu Feisty and is compatible to its repositories - about 22.000 packages are available. This howto is a practical guide without any warranty - it doesn't cover the theoretical backgrounds. There are many ways to set up such a system - this is the way I chose. 1 Installation 1.1 Get Linux Mint "Celena" 3.1 FE The cd-image is available at http://linuxmint.com/download.html . 1.2 Live Start/restart your computer and insert the live-cd - be sure that your bios is configured to boot from your cd/dvd drive first. If there are no special reasons to do something else, select "Start Linux Mint" in the first window to boot the live-cd. The live-cd is starting up. A few moments later you'll see the desktop. 1.3 Start The Installation Double-click on the "Install"-button on the desktop. The install wizard appears. Choose your preferred language and proceed. Select the timezone nearest to your location and proceed. Choose your keyboard layout and proceed. Select how you want to partition the disk and proceed. If you chose the manual partition in the window before, you'll see this window.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]