Thin Client Computing: Installation Manual 4

Total Page:16

File Type:pdf, Size:1020Kb

Thin Client Computing: Installation Manual 4 A HEMISPHERIC INITIATIVE Thin Client Computing Installation Manual Prepared by: Amos Becker Batto email: amosbatto AT yahoo DOT com web: http://www.ciber-runa.net/serendipity Managed by: The Center of Information and Communication Technology for Development CETIC.BO/Quipus Foundation of Bolivia www.quipusbolivia.org World Computer Exchange of North America www.worldcomputerexchange.org With Financial Support from: The International Development Research Center IDRC www.idrc.ca The Institute for Connectivity in the Americas - ICA www.icamericas.net License: This work is public domain and may be freely copied, modified, and redistributed. For more information, see: http://creativecommons.org/licenses/publicdomain/ La Paz – Bolivia August, 2007 Table of Contents 1. Introduction.................................................................................................................................... 4 2. Hardware to set up a thin client network.....................................................................................6 2.1. Buying the server..................................................................................................................... 6 2.1.1. Recommended requirements for a thin client server .................................................... 8 2.1.2. Example servers:..........................................................................................................10 2.2. Obtaining thin clients.............................................................................................................12 2.2.1. Dedicated thin clients...................................................................................................13 2.2.2. Miniature ITX computers............................................................................................ 14 2.2.3. Reusing old computers ................................................................................................15 2.2.4. Buying used computers................................................................................................15 2.2.4.1. RAM................................................................................................................... 16 2.2.4.2. Graphics cards and sound cards..........................................................................16 2.2.4.3. USB.................................................................................................................... 16 2.2.4.4. Network Interface Card (NIC)............................................................................17 2.2.5. Diskless thin clients..................................................................................................... 17 2.2.5.1. Thin clients which boot from local harddrive.................................................... 17 2.3. Networking hardware............................................................................................................ 18 2.3.1. Networking two computers..........................................................................................18 2.3.2. Networking three or more computers.......................................................................... 19 2.3.3. Network speed............................................................................................................. 19 2.3.4. Rules for using repeaters with 10BaseT and 100BaseTX ......................................... 20 2.3.5. Expanding an existing network....................................................................................21 2.3.6. Networking over the internet....................................................................................... 21 2.3.7. High bandwidth networks in the future....................................................................... 21 2.4. Scaling up your network........................................................................................................ 22 2.4.1. Checking CPU and memory usage.............................................................................. 23 2.4.2. Network load balancing............................................................................................... 24 3. Microsoft Windows thin clients...................................................................................................26 3.1. Windows Terminal Services..................................................................................................26 3.1.1. Windows Server 2003..................................................................................................26 3.1.2. RDP 6 in Windows Server 2008 and Windows Vista clients......................................27 3.1.3. Working with older Windows machines..................................................................... 27 3.2. Alternatives to Windows Server 2000/2003/2008.................................................................28 3.3. Installation Requirements for Windows 2000 Server and Windows Server 2003................ 29 3.4. Thin client requirements........................................................................................................ 32 3.5. Setting up Terminal Services in Windows Server 2003........................................................ 32 3.5.1. Licensing......................................................................................................................34 3.6. Configuring the Terminal Server...........................................................................................35 3.6.1. Terminal Services Manager......................................................................................... 35 2.6.1.1. Terminal Services Configuration........................................................................36 3.7. Using Terminal Services in the Client ..................................................................................39 3.7.1. Remote Desktop Connection (RDC)........................................................................... 39 3.7.2. Using the command line.............................................................................................. 40 3.7.3. Automatic logins..........................................................................................................40 3.7.4. Fixing Login Problems ............................................................................................... 41 3.7.5. Logging off.................................................................................................................. 43 3.8. Using Terminal Services from a Web Client.........................................................................43 3.8.1. Enabling ActiveX with Internet Explorer....................................................................44 3.8.2. Installing ActiveX in FireFox, SeaMonkey, Mozilla Suite, Netscape or Opera..........45 3.8.3. Logging in to a Windows Terminal with a web client................................................ 46 3.9. Windows Diskless Thin Clients.............................................................................................46 3.9.1. Installing Thinstation 2.2 in a Windows terminal server.............................................47 3.9.1.1. Installing Thinstation on the server.................................................................... 48 3.9.1.2. Configuring Thinstation..................................................................................... 48 3.9.1.3. Choosing different sessions................................................................................ 49 3.9.1.4. Creating configurations for individual thin clients.............................................50 3.9.1.5. Setting up the TFTP and DHCP server.............................................................. 50 3.9.2. Booting the thin client..................................................................................................51 3.9.2.1. Making an EtherBoot floppy for 30 different types of NICs in MS Windows.. 51 3.9.2.2. Creating an EtherBoot CD..................................................................................51 4. GNU/Linux thin clients................................................................................................................ 53 4.1. Linux Terminal Server Project (LTSP)................................................................................. 54 4.1.1. Edubuntu......................................................................................................................56 4.1.2. Xubuntu....................................................................................................................... 58 4.1.3. SkoleLinux...................................................................................................................59 4.1.4. K12LTSP..................................................................................................................... 60 4.1.5. AbulÉdu ..................................................................................................................... 60 4.2. Choosing the Windows Manager for GNU/Linux.................................................................60 4.2.1. Heavy windows managers........................................................................................... 61 4.2.2. Light windows managers............................................................................................. 61 4.2.3. Extremely light windows managers.............................................................................62 4.3 Getting support for LTSP......................................................................................................
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Prebrane Zo Stranky
    Manuál pre začiatočníkov a používateľov Microsoft Windows Galadriel 1.7.4 Manuál je primárne tvorený pre Ubuntu 7.04 Feisty Fawn. Dá sa však použiť aj pre Kubuntu, Xubuntu, Edubuntu, Ubuntu Studio a neoficiálne distribúcie založené na Ubuntu. Pokryté verzie: 7.10, 7.04, 6.10, 6.06 a 5.10 (čiastočne) Vypracoval Stanislav Hoferek (ICQ# 258126362) s komunitou ľudí na stránkach: linuxos.sk kubuntu.sk ubuntu.wz.cz debian.nfo.sk root.cz 1 Začíname! 5 Pracovné prostredie 9 Live CD 1.1 Postup pre začiatočníkov 5.1 Programové vybavenie 9.1 Vysvetlenie 1.2 Zoznámenie s manuálom 5.1.1 Prvé kroky v Ubuntu 9.2 Prístup k internetu 1.3 Zoznámenie s Ubuntu 5.1.2 Základné programy 9.3 Pripojenie pevných diskov 1.3.1 Ubuntu, teší ma! 5.1.3 Prídavné programy 9.4 Výhody a nevýhody Live CD 1.3.2 Čo tu nájdem? 5.2 Nastavenie jazyka 9.5 Live CD v prostredí Windows 1.3.3 Root 5.3 Multimédia 9.6 Ad-Aware pod Live CD 1.4. Užitočné informácie 5.3.1 Audio a Video Strana 48 1.4.1 Odkazy 5.3.2 Úprava fotografii 1.4.2 Slovníček 5.4 Kancelária 10 FAQ 1.4.3 Ako Linux funguje? 5.4.1 OpenOffice.org 10 FAQ 1.4.4 Spúšťanie programov 5.4.2 PDF z obrázku Strana 50 1.5 Licencia 5.4.3 Ostatné Strana 2 5.5 Hry 11 Tipy a triky 5.6 Estetika 11.1 Všeobecné rady 2 Linux a Windows 5.7 Zavádzanie systému 11.2 Pokročilé prispôsobenie systému 2.1 Porovnanie OS 5.7.1 Zavádzač 11.3 Spustenie pri štarte 2.2 Náhrada Windows Programov 5.7.2 Prihlasovacie okno 11.4 ALT+F2 2.3 Formáty 5.7.3 Automatické prihlásenie 11.5 Windows XP plocha 2.4 Rozdiely v ovládaní 5.8 Napaľovanie v Linuxe Strana 55 2.5 Spustenie programov pre Windows 5.9 Klávesové skratky 2.6 Disky 5.10 Gconf-editor 12 Konfigurácia 2.7 Klávesnica Strana 27 12.1 Nástroje na úpravu konfigurákov Strana 12 12.2 Najdôležitejšie konf.
    [Show full text]
  • Karelia-Ammattikorkeakoulu Työasemien Muuttaminen
    KARELIA-AMMATTIKORKEAKOULU Tietotekniikan koulutusohjelma Jouni Nevalainen TYÖASEMIEN MUUTTAMINEN LINUX-KEVYTPÄÄTTEIKSI OUNEVA GROUPISSA Opinnäytetyö Huhtikuu 2013 OPINNÄYTETYÖ Huhtikuu 2013 Tietotekniikan koulutusohjelma Karjalankatu 3 80200 JOENSUU p. (013) 260 6800 Tekijä Jouni Nevalainen Nimeke Työasemien muuttaminen Linux-kevytpäätteiksi Ouneva Groupissa Toimeksiantaja Ouneva Group Tiivistelmä Työpöytävirtualisointi on oikein toteutettuna tehokas keino säästää tietotekniikan ylläpito- ja laitekustannuksissa. Palvelimilla suoritettavat ohjelmat hyödyntävät laitteistoresursseja tehokkaasti ja työasemina voidaan käyttää iäkkäitäkin tietokoneita. Tässä opinnäytetyössä tutkittiin mahdollisuutta muuttaa tehdasympäristössä Windows XP -työasemat Linux-pohjaisiksi MS Remote Desktop Services -päätteiksi. Muutoksen tuli olla käyttäjille huomaamaton. Tärkeimpänä tavoitteena oli vähentää työasemien ylläpitoon kuluvaa aikaa. Tätä varten päätejärjestelmässä oli oltava mahdollisuus hallita työasemien asetuksia keskitetysti. Eri toteutustapoja arvioitiin näitä vaatimuksia vasten ja rakennettiin vaatimukset täyttävä päätejärjestelmä. Kutakin päätejärjestelmää testattiin ensin virtuaalisesti. Näin pyrittiin löytämään ja ratkaisemaan mahdolliset ongelmat ennen varsinaista koekäyttöä. Tehtaassa tapahtunutta koekäyttöä varten perustettiin tarpeelliset palvelimet ja otettiin päätejärjestelmät käyttöön yhdessä tai useammassa työasemassa. Saatujen kokemusten perusteella arvioitiin järjestelmien käyttökelpoisuutta. Työn lopputuloksena syntyi ohutpääteratkaisu,
    [Show full text]
  • Pysal Documentation Release 1.14.3
    pysal Documentation Release 1.14.3 PySAL Developers Oct 04, 2019 Contents 1 User Guide 3 2 Developer Guide 73 3 Library Reference 97 Bibliography 109 i ii pysal Documentation, Release 1.14.3 Releases • Stable 1.14.3 (Released 2017-11-2) • Development PySAL is an open source library of spatial analysis functions written in Python intended to support the development of high level applications. PySAL is open source under the BSD License. Contents 1 pysal Documentation, Release 1.14.3 2 Contents CHAPTER 1 User Guide 1.1 Introduction Contents • Introduction – History – Scope – Research Papers and Presentations 1.1.1 History PySAL grew out of a collaborative effort between Luc Anselin’s group previously located at the University of Illinois, Champaign-Urbana, and Serge Rey who was at San Diego State University. It was born out of a recognition that the respective projects at the two institutions, PySpace (now GeoDaSpace) and STARS - Space Time Analysis of Regional Systems, could benefit from a shared analytical core, since this would limit code duplication and free up additional developer time to focus on enhancements of the respective applications. This recognition also came at a time when Python was starting to make major inroads in geographic information systems as represented by projects such as the Python Cartographic Library, Shapely and ESRI’s adoption of Python as a scripting language, among others. At the same time there was a dearth of Python modules for spatial statistics, spatial econometrics, location modeling and other areas of spatial analysis, and the role for PySAL was then expanded beyond its support of STARS and GeoDaSpace to provide a library of core spatial analytical functions that could support the next generation of spatial analysis applications.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Credssp Required by Server – Solutions
    CredSSP required by server – Solutions https://www.syskit.com/blog/credssp-required-b... PRODUCTS COMPANY PARTNERS CUSTOMERS SUPPORT Home > Blog > SysKit Monitor > CredSSP required by server – Solutions CredSSP required by server – Solutions Published: May 16, 2017 Published in: SysKit Monitor Author: Silvio Rahle Failed to connect, CredSSP required by server is an error line returned when trying to connect remotely to a Windows machine using RDP version 6 or newer with the Rdesktop client. It represents a frequent problem for Windows and Linux administrators alike. Rdesktop client is UNIX based client software for Microsoft’s Remote Desktop Protocol. It is commonly used on ReactOS and Linux installations to connect to Windows machines running Remote Desktop Services, which often leads to the CredSSP required by server error. Why does it happen? All Windows clients have a credential cache used for authentication against services in a network called NTLM or Windows NT LAN Manager. RDP supports SSO (single sign-on) authentication enabling a user to log in with a single ID and password to gain access to a connected system. However, Linux clients do not support this type of authentication and they require that credentials are provided, either via a Rdesktop command line or via a login window when initiating the remote session. Linux has Kerberos, which is an authentication mechanism for requesting access to 1 of 5 9/26/17, 9:38 PM CredSSP required by server – Solutions https://www.syskit.com/blog/credssp-required-b... PRODUCTS COMPANY PARTNERS CUSTOMERS SUPPORT Granting Ticket), which is used to access other services, such as RDP.
    [Show full text]
  • Courtesy of SAMAG, 11-2005 ( Anton Borisov Тонкий Клиент
    Courtesy of SAMAG, 11-2005 (http://www.samag.ru) Anton Borisov Тонкий клиент - шаг к “мэйнфреймам”? Когда-то терминалы подключались к мощным серверам и обработка информации происходила на мэйнфреймах. Затем появились достаточно мощные ПЭВМ и информация стала обрабатываться на рабочих местах. Похоже история любит повторяться, но сегодня уже в зеркальном отражении - становится опять экономически выгодно использовать “мэйнфреймы” с подключением легких терминалов - тонких клиентов. Как показывает практика, чем сложнее становится система, тем больше усилий требуется на поддержание ее в рабочем состоянии. В то же время, становится очевидной специализация тех или иных бизнес-процессов. Можно уже четко определить, какие конкретно ресурсы требуются определенным пользователям для решения их бизнес-задач. Исходя из указанных предпосылок данным пользователям следует выделить необходимый конкретно им инструментарий, но не более того. Кроме этого, установку (а в дальнейшем и обновление) пакетов прикладных программ, хранение электронной документации также рациональнее вести в одином месте – на производительном терминальном сервере. Таким образом, проведя анализ потоков данных и выяснив структуру документооборота, предприятие может попробовать преобразовать структуру рабочих мест. Из названия следует, что ориентир сделан на создание тонких клиентов, т.е. создание ПЭВМ, которые отображают выполнение програмного обеспечения на серверной стороне, при этом, будучи клиентской частью, могут быть совершенно облегченными. Под облегченностью понимается как использование
    [Show full text]
  • Установка И Настройка Rtorrent+Rutorrent+Nginx+Php-Fpm В Arch Linux 1 / 9
    УСТАНОВКА И НАСТРОЙКА RTORRENT+RUTORRENT+NGINX+PHP-FPM В ARCH LINUX 1 / 9 Установка и настройка rtorrent+rutorrent+nginx+php-fpm в Arch Linux Предыстория Для работы с торрентами я достаточно долго использовал ktorrent. Сей клиент мои потребности в удобном управлении закачками удовлетворял полностью, пока я не заметил, что на популярных торрентах загрузка процессора доходила до 50% (а с uTP — ещё больше), а потребление памяти в и без того жирном KDE стало неприятно бросаться в глаза. Было решено сменить KDE на xfce (это отдельная история), а программу для торрентов подобрать с хорошим функционалом и удобным управлением. Перепробовав transmission, deluge и rtorrent, я остановлися на последнем. О том, как настроить rtorrent+rutorrent+nginx+php-fpm, и будет под катом. Почему так? Сразу хочу ответить, почему выбраны именно означенные инструменты. Arch Linux. Об этом дистрибутиве можно говорить достаточно долго, мне нравится его организация и философия в целом, и я могу его использовать для себя с максимальной эффективностью. Кому интересно более детально прочитать о нём, смотрите сюда и сюда. nginx. Я впечатлён тем, как эта маленькая штука выполняет свою работу, экономя память, гибко настраиваясь и предоставляя весь необходимый мне функционал. php-fpm. Можно настроить количество рабочих потоков, в связке с nginx даёт Linux для всех УСТАНОВКА И НАСТРОЙКА RTORRENT+RUTORRENT+NGINX+PHP-FPM В ARCH LINUX 2 / 9 замечательную производительность. rtorrent. Малое потребление ресурсов, хорошо настраивается. rutorrent. Активно развивается, имеет приятный интерфейс. Установка необходимого программного обеспечения Будем исходить из того, что Arch Linux на компьютере уже стоит, а пользователь знаком с его пакетной системой. Чтобы установить веб-часть связки, выполняем команду: sudo pacman -S nginx php-fpm rtorrent и librtorrent я рекомендую устанавливать с AUR'а, там есть замечательный PKGBUILD под названием rtorrent-color, делающий скучный консольный интерфейс более приятным (если будете им пользоваться), и libtorrent-extended, имеющий дополнительные патчи.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Kubuntu Desktop Guide
    Kubuntu Desktop Guide Ubuntu Documentation Project <[email protected]> Kubuntu Desktop Guide by Ubuntu Documentation Project <[email protected]> Copyright © 2004, 2005, 2006 Canonical Ltd. and members of the Ubuntu Documentation Project Abstract The Kubuntu Desktop Guide aims to explain to the reader how to configure and use the Kubuntu desktop. Credits and License The following Ubuntu Documentation Team authors maintain this document: • Venkat Raghavan The following people have also have contributed to this document: • Brian Burger • Naaman Campbell • Milo Casagrande • Matthew East • Korky Kathman • Francois LeBlanc • Ken Minardo • Robert Stoffers The Kubuntu Desktop Guide is based on the original work of: • Chua Wen Kiat • Tomas Zijdemans • Abdullah Ramazanoglu • Christoph Haas • Alexander Poslavsky • Enrico Zini • Johnathon Hornbeck • Nick Loeve • Kevin Muligan • Niel Tallim • Matt Galvin • Sean Wheller This document is made available under a dual license strategy that includes the GNU Free Documentation License (GFDL) and the Creative Commons ShareAlike 2.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of these licenses. All derivative works must be released under either or both of these licenses. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. Copies of these licenses are available in the appendices section of this book. Online versions can be found at the following URLs: • GNU Free Documentation License [http://www.gnu.org/copyleft/fdl.html] • Attribution-ShareAlike 2.0 [http://creativecommons.org/licenses/by-sa/2.0/] Disclaimer Every effort has been made to ensure that the information compiled in this publication is accurate and correct.
    [Show full text]
  • Sun Secure Global Desktop 4.5 Administration Guide
    Sun Secure Global Desktop 4.5 Administration Guide Sun Microsystems, Inc. www.sun.com Part No. 820-6689-10 April 2009, Revision 01 Submit comments about this document at: http://docs.sun.com/app/docs/form/comments Copyright 2008-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and in other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Solaris, OpenSolaris, Java, JavaScript, JDK, JavaServer Pages, JSP,JavaHelp, JavaBeans, JVM, JRE, Sun Ray, and StarOffice are trademarks or registered trademarks of Sun Microsystems, Inc. or its subsidiaries in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and in other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.
    [Show full text]
  • Bittorrent's Been Around for a Whopping Ten Years, but It Continues to Evolve and Remains One of the Best File-Sharing Tools Available
    BitTorrent's been around for a whopping ten years, but it continues to evolve and remains one of the best file-sharing tools available. If you really want to make your downloads soar—and keep Big Brother out of your business—this guide's for you. We showed you how to get started sharing and downloading files with BitTorrent a few years ago, and most of that still applies, but if you're looking to up your BitTorrent skills, things have changed a lot since then. In fact, some of you may find BitTorrent a bit old school for your tastes. Sure, the ISPs are cracking down and throttling peer-to-peer users, and you have other great file-sharing alternatives like Usenet, but that doesn't mean BitTorrent doesn't still have a place in your routine. It's pretty easy to ward off prying eyes with today's BitTorrent clients, and while Usenet is certainly great, BitTorrent is still more widespread. As such, it tends to have a better selection on certain things, and is at the very least a good fallback method for when you don't find what you're looking for elsewhere. After all, there's no reason you have to be loyal to only one file-sharing protocol. This intermediate guide to BitTorrent is designed to help you do three things: jack up your speeds (without consuming your bandwidth) and keep unwanted snoopers from seeing what you're doing. We've divided them up into three sections: * Increase Your Speed and Privacy with a Few Easy Settings * Keep That Newfound Speed from Hijacking All Your Bandwidth * Really Hide Your Traffic with External Solutions For the purposes of this guide, we're focusing on two BitTorrent clients: uTorrent for Windows and Transmission for Mac OS X.
    [Show full text]