Red Hat Enterprise Linux 7 移行計画ガイド
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Freiesmagazin 12/2012
freiesMagazin Dezember 2012 Topthemen dieser Ausgabe Slackware 14.0 Seite 3 Die wohl älteste noch aktive Linux-Distribution hat nach überdurchschnittlich langer Entwick- lungszeit die neue Version 14.0 veröffentlicht. Der Artikel gibt eine Übersicht über Altes und Neues, was sich seit Version 9.0 so alles geändert hat – und was nicht. (weiterlesen) Video Disk Recoder auf Basis von easyVDR 1.0 Seite 10 Der Artikel erklärt den Aufbau eines MediaCenters auf Basis der Distribution easyVDR und stellt die Neuerungen der Version 1.0 sowie deren Installation und Konfiguration vor. Der Schwerpunkt des Artikels liegt dabei in der Hardwareauswahl und den neuen Features der jetzt auf der Linux-Distribution Ubuntu basierten Version 1.0 sowie der „easy“ Inbetriebnahme dieser. (weiterlesen) Softmaker Office 2012 Seite 25 Der Markt für Büroprogramme ist unübersichtlich: In der Windows-Welt gilt Microsoft Office trotz der saftigen Preise immer noch als Referenz. Unter Linux dürfte dagegen LibreOffice mitt- lerweile den Stand eines Standards erreicht haben. Hinzu kommen noch zahlreiche freie An- wendungen und diverse kommerzielle Alternativen. Eines der Programme mit professionellem Anspruch ist SoftMaker Office, das nicht nur Nischenmärkte unter verschiedenen Systemen besetzen, sondern eine Alternative zu den Platzhirschen sein will. (weiterlesen) © freiesMagazin CC-BY-SA 3.0 Ausgabe 12/2012 ISSN 1867-7991 MAGAZIN Editorial Sechster Programmierwettbewerb werden dann ebenfalls einige Meta-Daten zu der Inhalt Linux allgemein Im März 2012 gab es mit dem fünften Wett- jeweiligen Ausgabe angezeigt. Slackware 14.0 S. 3 bewerb ein kleines Zwischenspiel außer der Aber auch so haben wir weiter an der CSS-Datei Video Disk Recoder auf Basis von S. -
The Kdesvn Handbook
The kdesvn Handbook Rajko Albrecht The kdesvn Handbook 2 Contents 1 Introduction 7 1.1 Terms . .7 2 Using kdesvn 8 2.1 kdesvn features . .8 2.2 Beginning with subversion and kdesvn . .8 2.2.1 Creating a working copy . .9 2.2.2 Committing local changes . .9 2.2.3 Update working copy . .9 2.2.4 Adding and Deleting from working copy . .9 2.2.4.1 Add items . 10 2.2.4.2 Deleting items from working copy and unversion . 10 2.2.5 Displaying logs . 10 2.2.5.1 The log display dialog . 10 2.3 Working on repositories . 11 2.3.1 Restoring deleted items . 11 2.3.2 Importing folders . 11 2.3.2.1 With drag and drop . 11 2.3.2.2 Select folder to import with directory-browser . 11 2.4 Other Operations . 11 2.4.1 Merge . 11 2.4.1.1 Internal merge . 12 2.4.1.2 Using external program for merge . 12 2.4.2 Resolving conflicts . 12 2.5 Properties used by kdesvn for configuration . 13 2.5.1 Bugtracker integration . 13 2.6 The revision tree . 13 2.6.1 Requirements . 14 2.7 Internal log cache . 14 2.7.1 Offline mode . 14 2.7.2 Log cache and revision tree . 14 The kdesvn Handbook 2.8 Meaning of icon overlays . 14 2.9 kdesvn and passwords . 16 2.9.1 Not saving passwords . 16 2.9.2 Saving passwords in KWallet . 16 2.9.3 Saving to subversion’s own password storage . -
Active@ Livecd User Guide Copyright © 1999-2015, LSOFT TECHNOLOGIES INC
Active@ LiveCD User Guide Copyright © 1999-2015, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC. LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change. LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either, implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC. Other brand and product names may be registered trademarks or trademarks of their respective holders. 2 Active@ LiveCD User Guide Contents 1 Product Overview................................................................................................................ 4 1.1 About Active@ LiveCD .................................................................................................. 4 1.2 Requirements for Using Active@ Boot Disk .................................................................... 6 1.3 Downloading and Creating Active@ LiveCD.................................................................... 6 1.4 Booting from a CD, DVD or USB Media ......................................................................... -
Fedora 17 System Administrator's Guide
Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Jaromír Hradílek Douglas Silas Martin Prpič Stephen Wadeley Eliška Slobodová Tomáš Čapek Petr Kovář John Ha System Administrator's Guide David O'Brien Michael Hideo Don Domingo Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Stephen Wadeley [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2012 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. -
Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae -
Introduction to Unix / Linux
Introduction to Unix and GNU / Linux Introduction to Unix and GNU / Linux Michael Opdenacker Free Electrons http://free-electrons.com Introduction to Unix and GNU / Linux © Copyright 2004, Michael Opdenacker GNU Free Documentation License http://free-electrons.com 1 Thanks To the OpenOffice.org project, for their presentation and word processor tools which satisfied all my needs. To the Handhelds.org community, for giving me so much help and so many opportunities to help. To the members of the whole Free Software and Open Source community, for sharing the best of themselves: their work, their knowledge, their friendship. To people who sent comments and corrections: Jeff Ghislain Introduction to Unix and GNU / Linux © Copyright 2004, Michael Opdenacker GNU Free Documentation License http://free-electrons.com 2 Copying this document © 2004, Michael Opdenacker [email protected] This document is released under the GNU Free Documentation License, with no invariant sections. Permission is granted to copy and modify this document provided this license is kept. See http://www.gnu.org/licenses/fdl.html for details Document updates available on http://free-electrons.com/training/intro_unix_linux Corrections, suggestions and contributions are welcome! Introduction to Unix and GNU / Linux © Copyright 2004, Michael Opdenacker GNU Free Documentation License http://free-electrons.com 3 Document history Unless specified, contributions are from Michael Opdenacker Sep 28, 2004. First public release Sep 20-24, 2004. First session for Atmel, Rousset (France) Introduction to Unix and GNU / Linux © Copyright 2004, Michael Opdenacker GNU Free Documentation License http://free-electrons.com 4 About this document This document is first of all meant to be used as visuals aids by a speaker or a trainer. -
Awoken Icon Theme - Installation & Customizing Instructions 1
Awoken Icon Theme - Installation & Customizing Instructions 1 AWOKEN ICON THEME Installation & Customizing Instructions Alessandro Roncone mail: [email protected] homepage: http://alecive.deviantart.com/ Awoken homepage (GNOME Version): link kAwoken homepage (KDE Version): link Contents 1 Iconset Credits 3 2 Copyright 3 3 Installation 3 3.1 GNOME........................................................3 3.2 KDE..........................................................4 4 Customizing Instructions 4 4.1 GNOME........................................................4 4.2 KDE..........................................................5 5 Overview of the customization script6 5.1 How to customize a single iconset..........................................7 6 Customization options 8 6.1 Folder types......................................................8 6.2 Color-NoColor.................................................... 11 6.3 Distributor Logos................................................... 11 6.4 Trash types...................................................... 11 6.5 Other Options.................................................... 11 6.5.1 Gedit icon................................................... 11 6.5.2 Computer icon................................................ 11 6.5.3 Home icon................................................... 11 6.6 Deprecated...................................................... 12 7 How to colorize the iconset 13 8 Icons that don't want to change (but I've drawed) 14 9 Conclusions 15 9.1 Changelog...................................................... -
Red Hat Enterprise Linux 7 7.9 Release Notes
Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Last Updated: 2021-08-17 Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project. -
Towards Security Climate Forecasts1
Towards the Future Internet 41 G. Tselentis et al. (Eds.) IOS Press, 2010 © 2010 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-60750-539-6-41 Towards Security Climate Forecasts1 Stephan NEUHAUS 2 and Fabio MASSACCI Università degli Studi di Trento, Trento, Italy Abstract. The complexity and interdependencies of deployed software systems has grown to the point where we can no longer make confident predictions about the security properties of those systems from first principles alone. Also, it is very com- plex to state correctly all relevant assumptions that underlie proofs of security, so that attackers constantly seek to undermine these assumptions. Complexity metrics generally do not correlate with vulnerabilities and security best practices are usu- ally founded on anecdotes rather than empirical data. In this paper, we argue that we will therefore need to embrace empirical methods from other sciences that also face this problem, such as physics, meteorology, or medicine. Building on previous promising work, we suggest a system that can deliver security forecasts just like climate forecasts. Keywords. Large System Security, Empirical research, Climate forecasts Introduction Software systems have become so complex that we can no longer effectively understand the behaviour of the entire system from the behaviour of its smallest parts alone: in order to find out about the security of a complex system, it is no longer sufficient to know the precise semantics of an if or while statement. This is not because such knowledge is useless, but rather because the amount of interaction between program statements, interpreters, compilers, libraries, operating systems and the run-time environment creates an explosion in interconnection that makes predicting system behaviour uncertain at best and impossible at worst. -
Security Analysis of Truecrypt
Security Analysis of TrueCrypt November 16, 2015 Authors This study was executed by the Fraunhofer Institute for Secure Information Technology on behalf of the Federal Office for Information Security. This publication was authored by Mauro Baluda Andreas Fuchs Philipp Holzinger Lisa Nguyen Lotfi ben Othmane Andreas Poller Jürgen Repp Johannes Späth Jan Steffan Stefan Triller Eric Bodden Fraunhofer Institute for Secure Information Technology Rheinstraße 75 64295 Darmstadt Germany The authors wish to thank Andreas Junestam and Nicolas Guigo of the Open Crypto Audit Project for clarifications regarding their own security assessment of TrueCrypt. Thanks go also to Andreas Follner, Technische Universtät Darmstadt, who gave valueable input regarding the exploitability of buffer-overflow vulnerabilities that the OCAP-report mentions. Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: [email protected] Internet: https://www.bsi.bund.de © Federal Office for Information Security 2015 Security Analysis of TrueCrypt Contents 1 Summary 6 1.1 Aim ........................................... 6 1.2 Procedure........................................ 6 1.3 Results.......................................... 7 2 Analysis of the differences between versions 7.0a and 7.1a9 2.1 Procedure........................................ 9 2.2 Differences relevant to security ............................ 9 2.3 Other differences.................................... 10 2.4 Summary ........................................ 11 3 Evaluation of the OCAP Phase 1 Test Report 13 3.1 Comments on OCAP.................................. 13 3.1.1 Scope of the report............................... 13 3.1.2 Comments on the individual findings of the OCAP report......... 13 3.1.3 Detailed manual analysis of Finding 3 .................... 15 3.1.4 Checking the findings using Coverity.................... -
World Building
TRANSMEDIA Boni (ed.) Transmedia, Fans, Industries Fans, Transmedia, World Building World Edited by Marta Boni World Building Transmedia, Fans, Industries World Building Transmedia: Participatory Culture and Media Convergence The book series Transmedia: Participatory Culture and Media Convergence provides a platform for cutting-edge research in the field of media studies, with a strong focus on the impact of digitization, globalization, and fan culture. The series is dedicated to publishing the highest-quality monographs (and exceptional edited collections) on the developing social, cultural, and economic practices surrounding media convergence and audience participation. The term ‘media convergence’ relates to the complex ways in which the production, distribution, and consumption of contemporary media are affected by digitization, while ‘participatory culture’ refers to the changing relationship between media producers and their audiences. Interdisciplinary by its very definition, the series will provide a publishing platform for international scholars doing new and critical research in relevant fields. While the main focus will be on contemporary media culture, the series is also open to research that focuses on the historical forebears of digital convergence culture, including histories of fandom, cross- and transmedia franchises, reception studies and audience ethnographies, and critical approaches to the culture industry and commodity culture. Series editors Dan Hassler-Forest, Utrecht University, the Netherlands Matt Hills, University -
Engaging Developers in Open Source Software Projects: Harnessing Social
Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2015 Engaging developers in open source software projects: harnessing social and technical data mining to improve software development Patrick Eric Carlson Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Engineering Commons, Computer Sciences Commons, and the Library and Information Science Commons Recommended Citation Carlson, Patrick Eric, "Engaging developers in open source software projects: harnessing social and technical data mining to improve software development" (2015). Graduate Theses and Dissertations. 14663. https://lib.dr.iastate.edu/etd/14663 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Engaging developers in open source software projects: Harnessing social and technical data mining to improve software development by Patrick Eric Carlson A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Human-Computer Interaction Program of Study Committee: Judy M. Vance, Major Professor Tien Nguyen James Oliver Jon Kelly Stephen Gilbert Iowa State University Ames, Iowa 2015 Copyright c Patrick Eric Carlson, 2015. All rights reserved. ii DEDICATION This is dedicated to my parents who have always supported me. iii TABLE OF CONTENTS Page LIST OF TABLES . vi LIST OF FIGURES . vii ACKNOWLEDGEMENTS . ix ABSTRACT . x CHAPTER 1.