Description and Licensing Terms

Total Page:16

File Type:pdf, Size:1020Kb

Description and Licensing Terms Internet Express Version 6.4 for Tru64 UNIX Software Description and Licensing Terms DESCRIPTION Internet Express for Tru64 UNIX® contains a collection of Open Source software products and other software products that have been compiled and configured for Tru64 UNIX AlphaServer systems brought together into a CD-ROM media kit. Open Source software is available for public use under the terms and conditions of the original authors. Open Source software is included as free, optionally installed components of Internet Express. Table 1 lists the Open Source software provided with Internet Express Version 6.4 for Tru64 UNIX. Table 1: Open Source Software for Internet Express Version 6.4 Subset Component Version Description URL for source download (IAE*) PostgreSQL 7.4.5 PostgreSQL Database Management System http://www.postgresql.org PSQL OpenLDAP 2.2.15 OpenLDAP Directory Server http://www.openldap.org OLDAP Mozilla LDAP SDK 5.0 Mozilla LDAP SDK http://www.mozilla.org/directory/csdk.html LDAPSDK BINDv9 9.2.3 ISC's BINDv9 Internet Name Server http://www.isc.org BIND wu-ftp 2.6.2 Advanced FTP Server http://www.wu-ftpd.org FTP Pure-FTPd 1.0.20 Pure-FTPd ftp server http://www.pureftpd.org PUREFTP IMP 3.2.6 IMP Internet Messaging Program http://www.horde.org IMP Horde 2.2.7 Horde Application Framework http://www.horde.org IMP Turba 1.2.2 Turba Contact Management Application http://www.horde.org IMP Apache 2.0.521 Apache HTTPD Server http://httpd.apache.org HTTPD Apache 1.3.322 Apache HTTPD Server http://httpd.apache.org APCH PHP 4.3.9 PHP Hypertext Processing Engine http://www.php.net APCH mod_ssl 2.8.21-1.3.32 SSL enabler module for Apache http://www.modssl.org APCH Analog 5.32 Analog logfile analyser http://www.analog.cx/ APCH auth_ldap 1.6.0 LDAP authentication module for Apache http://www.rudedog.org/auth_ldap/ APCH mod_fastcgi 2.4.2 FastCGI module for Apache http://www.FastCGI.com APCH Tomcat 5.0.283 Tomcat Java® Servlet and Java Server Pages Engine http://jakarta.apache.org TOMCAT IRC 2.10.3p6 Internet Relay Chat ftp://ftp.irc.org/irc/server/ CHAT Lynx 2.8.5 Web browser for terminals http://lynx.isc.org/release/ LYNX UW-IMAP 2004.352-IX (2004a)1 U. of Washington IMAP server http://www.washington.edu/imap/ IMAP Pine 4.611 Pine IMAP client http://www.washington.edu/pine/ UXCA Procmail 3.221 Procmail Mail Filter http://www.procmail.org PROC Cyrus-SASL 2.1.19 Cyrus SASL library http://ftp.andrew.cmu.edu/pub/cyrus-mail/ SASL Cyrus-IMAP 2.2.8 Cyrus IMAP server http://ftp.andrew.cmu.edu/pub/cyrus-mail/ CYRS popper 4.0.51 Qualcomm-derived POP server http://www.eudora.com/qpopper/ POP Majordomo 1.94.5 Majordomo Mailing List Manager http://www.greatcircle.com/majordomo MAJD Mozilla 1.7.3 Mozilla Application Suite http://www.mozilla.org MOZ INN 2.4.1 INN News Server http://www.isc.org/products/INN INN Tin 1.6.2 Tin News Reader http://www.tin.org UXCA OpenSLP 1.0.11 Service Location Prococol Services http://www.openslp.org SLP OpenSSL 0.9.7e (no source OpenSSL Library http://www.OpenSSL.org APCH included) Perl 5.8.5 Perl http://www.perl.com PERL SOCKS 1.1.14 Dante SOCKS server http://www.inet.no/dante/ DANTE Squid 2.5.STABLE7 Squid proxy/caching server http://www.squid-cache.org SQD calamaris 2.59 Calamaris Squid log file analysis tool http://cord.de/tools/squid/calamaris/ SQD Python 2.3.4 Python Programming Language http://www.python.org/ PYTHON Samba 3.0.10 Samba file and print server for Windows http://www.samba.org SMB ht://Dig 3.2.0b6 ht://Dig Web Search engine and indexer http://www.htdig.org HTDIG 1 TCP Wrappers 7.6 IPv6 1.12 Access control and security for Internet services ftp://ftp.porcupine.org/pub/security/index.html TCPW LIBPCAP 0.8.3 Packet Capture Library ftp://ftp.ee.lbl.gov/libpcap.tar.Z DOST 1 Sendmail 8.13.3 Sendmail SMTP Server http://www.sendmail.org/ SMTP gettext 0.10.40 gettext I18N support library ftp://ftp.gnu.org/gnu/gettext/ LIB zlib 1.2.2 zlib compression library http://www.gzip.org/zlib/ LIB Xerces-C 2.5.0 Xerces XML Parser in C++ http://xml.apache.org XMLCLIB Xerces-J 2.6.2 Xerces XML Parser in Java http://xml.apache.org XMLJLIB Xalan-J 2.6.0 Xalan XSLT Stylesheet Processor in Java http://xml.apache.org XMLJLIB Batik Java toolkit for Scalable Vector Graphics Batik 1.5.1 http://xml.apache.org XMLJLIB (SVG) FOP 0.20.5 FOP XSL Formatting Object Processor in Java http://xml.apache.org XMLJLIB Cocoon 2.1.5.1 Cocoon XML-Based Web Publishing Framework http://xml.apache.org XML Cocoon Library 2.1.5.1 Cocoon XML-Based Web Publishing Framework http://xml.apache.org XMLJLIB Xalan-C 1.8 Xalan XSLT Stylesheet Processor in C++ http://xml.apache.org XMLCLIB libxml2 2.6.14 XML C parser and toolkit http://www.xmlsoft.org XMLCLIB Axis Server 1.1 Axis SOAP Implementation http://xml.apache.org SOAP Axis Client 1.1 Axis SOAP Implementation http://xml.apache.org XMLJLIB UDDI4J 2.0.2 UDDI Client Libraries in Java http://oss.software.ibm.com/developerworks/oss/ XMLJLIB Bogofilter 0.92.8 Bogofilter Mail Filter http://www.bogofilter.org/ BOGO Mailman - The GNU Mailing List Management Mailman 2.1.5 http://www.gnu.org/software/mailman/index.html MAILMAN System Snort 2.2.0 Network Intrusion Detection System http://www.snort.org/ SNORT Table 2: Non-Open Source Software for Internet Express Version 6.4 Subset Component (IAE*) Internet Express Administration Utility (including FireScreen) (HP-developed) ADM Secure Web Server Administration Utility (HP-developed) APAD Internet Monitor (HP-developed)4 MON Includes some IBM alphaBeans code obtained from http://www.alphaworks.ibm.com/alphabeans Internet Express LDAP Module for System Authentication (HP-developed) LDAM LDAP browser (HP-developed) OLDAP SmartFilter 3.2.1 SmartFilter web filtering software http://www.securecomputing.com SQD Installation procedures all Delegated Administration (User self-administration) ADM Table 3: Evaluation Software Stryon iASP 2.1 1 ipv6sniff IPv6 porting tool Tripwire for Servers 3.0 CommuniGate Pro Internet messaging software HP Webmin-based Admin (Webmin 1.070) Notes on Tables: 1. Supports IPv6 2. Apache 1.3 does not support IPv6 but Apache 2.0 does. 3. Tomcat depends on Java® and Java 1.3 does not support IPv6. It is possible that Apache would handle enough of the request to allow Tomcat to handle requests, if used with Apache 2.0. It may be possible to configure the Tomcat stand-alone server to use IPv6 if used with Java 1.4 or later. 4. Depends on Java and Java does not yet support IPv6. OPEN SOURCE COMPONENT SOFTWARE TERMS AND CONDITIONS NOTE:Terms and conditions of the component open source software are those of the component software developers, and not those of Hewlett-Packard Company. Open source software included in Internet Express is available for use under the terms and conditions of the original authors. Open source software is provided "as is." HP disclaims all warranties with regard to open source software, including all implied warranties of merchantability and fitness. In no event shall HP be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data, or profits, whether in an action of contract, negligence, or other tortious action, arising out of or in connection with the use or performance of public software. analog -------------------------------- Analog is copyright (c) Stephen R. E. Turner and other authors 1995 - 2003. This copyright and licence apply to all source code, compiled code, documentation, graphics and auxiliary files. This licence describes the conditions under which you may use, modify and distribute version 5.32 of analog ("the program"). If you are unable or unwilling to accept these conditions in full, then, notwithstanding the conditions in the remainder of this licence, you may not use, modify or distribute the program at all. Text in square brackets is intended for guidance only and does not form part of the licence in any way. [Analog is free software. This licence is designed not to restrict your freedom except insofar as is necessary to ensure that the program remains free for all. If you want to do something that is against this licence, but within the spirit of free software, then let's talk about it.] Analog includes code from the gd, pcre, png & zlib libraries, and from FreeBSD and Apache. These portions of code are also subject to their own copyrights and licensing conditions, which can be found in the analog docs directory in files with names beginning with "Lic". 1) The program may be used free of charge by any person or organisation to whom it is made available, provided that that person accepts the conditions of this licence. [If you like analog, please consider making a donation towards its development at http://www.analog.cx/donations/ . Thank you.] 2) The program may be copied and distributed by any person or organisation in any way whatsoever, provided that any distribution is accompanied by a copy of all copyright notices and licences pertaining to the program. You may charge for distributing the program, but you must not do anything to suggest to the person to whom it is distributed that analog itself is anything other than free software.
Recommended publications
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Getting Started with Eudora 5.1 for Windows 95/98/ME/NT/2000 Author Teresa Sakata
    WIN9X003 July 2003 Getting Started with Eudora 5.1 For Windows 95/98/ME/NT/2000 Author Teresa Sakata Introduction ..............................................................................................................................................................1 POP and IMAP Servers ............................................................................................................................................2 Requirements ............................................................................................................................................................2 Changes From Version 4.3.x ....................................................................................................................................3 Issues ........................................................................................................................................................................3 Where do I get Eudora? ............................................................................................................................................4 Getting Started..........................................................................................................................................................4 Installation ................................................................................................................................................................4 Configuring Eudora ..................................................................................................................................................5
    [Show full text]
  • Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University
    Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University ABSTRACT The attack surface concept provides a means of discussing the susceptibility of software to as-yet-unknown attacks. A system’s attack surface encompasses the methods the system makes available to an attacker, and the system resources which can be used to further an attack. A measurement of the size of the attack surface could be used to compare the security of multiple systems which perform the same function. The Internet Message Access Protocol (IMAP) has been in existence for over a decade. Relative to HTTP or SMTP, IMAP is a niche protocol, but IMAP servers are widely deployed nonetheless. There are three popular open source UNIX IMAP servers – UW-IMAP, Cyrus, and Courier-IMAP – and there has not been a formal security comparison between them. In this paper, I use attack surfaces to compare the relative security risks posed by these three products. I undertake this evaluation in service of two complementary goals: to provide an honest examination of the security postures and risks of the three servers, and to advance the study of attack surfaces by performing an automated attack surface measurement using a methodology based on counting entry and exit points in the code. Introduction Contributions and Roadmap System administrators frequently confront the The paper makes two major contributions. First, problem of selecting a software package to perform a I undertake an in-depth discussion of the relative secu- desired function. Many considerations affect this deci- rity postures of the three major open source IMAP sion, including functionality, ease of installation, soft- servers in use today.
    [Show full text]
  • GNU Guix Cookbook Tutorials and Examples for Using the GNU Guix Functional Package Manager
    GNU Guix Cookbook Tutorials and examples for using the GNU Guix Functional Package Manager The GNU Guix Developers Copyright c 2019 Ricardo Wurmus Copyright c 2019 Efraim Flashner Copyright c 2019 Pierre Neidhardt Copyright c 2020 Oleg Pykhalov Copyright c 2020 Matthew Brooks Copyright c 2020 Marcin Karpezo Copyright c 2020 Brice Waegeneire Copyright c 2020 Andr´eBatista Copyright c 2020 Christine Lemmer-Webber Copyright c 2021 Joshua Branson Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents GNU Guix Cookbook ::::::::::::::::::::::::::::::: 1 1 Scheme tutorials ::::::::::::::::::::::::::::::::: 2 1.1 A Scheme Crash Course :::::::::::::::::::::::::::::::::::::::: 2 2 Packaging :::::::::::::::::::::::::::::::::::::::: 5 2.1 Packaging Tutorial:::::::::::::::::::::::::::::::::::::::::::::: 5 2.1.1 A \Hello World" package :::::::::::::::::::::::::::::::::: 5 2.1.2 Setup:::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.1 Local file ::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.2 `GUIX_PACKAGE_PATH' ::::::::::::::::::::::::::::::::: 9 2.1.2.3 Guix channels ::::::::::::::::::::::::::::::::::::::: 10 2.1.2.4 Direct checkout hacking:::::::::::::::::::::::::::::: 10 2.1.3 Extended example ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Proceedings Template
    0 - IMAP in 90 Days or How to Migrate 25,000 Users to IMAP in Three Months Jay Graham Computing Services and Systems Development University of Pittsburgh 419 South Bellefield Avenue Pittsburgh, PA 15217 (412) 624-5244 [email protected] ABSTRACT Pittsburgh campus. Extensive use of user logs, forwarding data and distribution was critical to the process. The final phase The University of Pittsburgh began the Internet Message Access involved the migration of 25,000 users from VMS Mail, Unix Protocol (IMAP) Project in the spring of 1997 as an evaluation Pine and POP mail to the new environment by April 1, 2000. project investigating the replacement options for the legacy e-mail systems and a POP3 service. The project was initially divided into two phases---Phase 1 to deploy an IMAP server for campus- Keywords wide use and Phase 2 to identify and provide a reliable, high quality, enterprise-wide IMAP client. A sub-group of the IMAP IMAP, e-mail, POP, legacy, client-server project team was formed to identify requirements and evaluate clients. Cyrusoft International's Mulberry was found to meet the ever changing requirements of the campus computing labs and 1. INTRODUCTION have sufficient features and functionality that users would be compelled to switch from their legacy clients to the new Electronic mail has become a primary tool used by many large environment. organizations to enhance daily communication. E-mail between managers, workers, customers, students, teachers or parents often A critical third phase was added to the IMAP project which serves as a more efficient, cost effective and convenient form of required a phase-out of the legacy e-mail systems by April 1, 2000 interaction.
    [Show full text]
  • Design and Management of Email Service
    Design and Management of Email Service Source : homepage.ntu.edu.tw/~jsc/2005-mail.ppt Outline Introduction to the architecture and operation of SMTP Design of a suitable email system – Webmail solutions Postfix and simple configuration samples Spam and virus filtering Conclusion 2 Overview Electronic mail service has already evolved into one of the major Internet applications. It is not only fundamental, but also a must. Users may become impatient when mails were delayed, not to mention failed to access their emails. – Imagine we meet the situation of power failure or cut of water supply 3 Architecture of a Simple Mail System Consists of the following components – MTA - Mail transfer agent Sending and forwarding emails Server end – MDA - Mail delivery agent Delivering emails to recipients’ mailbox Server end – Pop3/Imap4 Daemons For users to download their mailboxs Server end – MUA - Mail user agent Reading and composing emails 4 Client end Architecture of a Simple Mail System Protocols Used for Mail System Protocols – For computer programs to communicate with each other – Similar to languages that human beings speak SMTP – Simple Mail Transfer Protocol – Too simple to provide any “advanced features” Authentication Authorization POP3 – Post Office Protocol version 3 – Simple IMAP4 – Internet Message Access Protocol version 4 – Fully compatible with internet message standards, e.g. MIME. – Allow messages to be accessed from more than one computer. – Provide support for online, offline, and disconnected modes. 6 – Multiple and share folders. Mail Forwarding Between Servers How to Find the Way to the Destination? How do we find the way to [email protected]? 8 DNS: The Key to All Internet Services Query DNS server by the address part of email address.([email protected]) 1.
    [Show full text]
  • LIST of NOSQL DATABASES [Currently 150]
    Your Ultimate Guide to the Non - Relational Universe! [the best selected nosql link Archive in the web] ...never miss a conceptual article again... News Feed covering all changes here! NoSQL DEFINITION: Next Generation Databases mostly addressing some of the points: being non-relational, distributed, open-source and horizontally scalable. The original intention has been modern web-scale databases. The movement began early 2009 and is growing rapidly. Often more characteristics apply such as: schema-free, easy replication support, simple API, eventually consistent / BASE (not ACID), a huge amount of data and more. So the misleading term "nosql" (the community now translates it mostly with "not only sql") should be seen as an alias to something like the definition above. [based on 7 sources, 14 constructive feedback emails (thanks!) and 1 disliking comment . Agree / Disagree? Tell me so! By the way: this is a strong definition and it is out there here since 2009!] LIST OF NOSQL DATABASES [currently 150] Core NoSQL Systems: [Mostly originated out of a Web 2.0 need] Wide Column Store / Column Families Hadoop / HBase API: Java / any writer, Protocol: any write call, Query Method: MapReduce Java / any exec, Replication: HDFS Replication, Written in: Java, Concurrency: ?, Misc: Links: 3 Books [1, 2, 3] Cassandra massively scalable, partitioned row store, masterless architecture, linear scale performance, no single points of failure, read/write support across multiple data centers & cloud availability zones. API / Query Method: CQL and Thrift, replication: peer-to-peer, written in: Java, Concurrency: tunable consistency, Misc: built-in data compression, MapReduce support, primary/secondary indexes, security features.
    [Show full text]
  • Table of Contents
    Table of Contents Preface .................................................................................................... xiii Part I: The Web Environment Chapter 1—Designing for a Variety of Browsers ...................... 3 Browsers ................................................................................................. 3 Design Strategies .................................................................................... 9 Writing Good HTML ............................................................................. 11 Knowing Your Audience ..................................................................... 12 Considering Your Site’s Purpose ......................................................... 13 Test! Test! Test! ..................................................................................... 13 Chapter 2—Designing for a Variety of Displays .................... 14 Dealing with Unknown Monitor Resolutions ..................................... 14 Fixed versus Flexible Web Page Design ............................................. 19 Accessibility .......................................................................................... 23 Alternative Displays .............................................................................. 26 Chapter 3—Web Design Principles for Print Designers ...................................................................... 28 Color on the Web ................................................................................. 28 Graphics on the Web ..........................................................................
    [Show full text]
  • Designing a User Interface for the Innovative E-Mail Client Semester Thesis
    Designing a User Interface for the Innovative E-mail Client Semester Thesis Student: Alexandra Burns Supervising Professor: Prof. Bertrand Meyer Supervising Assistants: Stephanie Balzer, Joseph N. Ruskiewicz December 2005 - April 2006 1 Abstract Email Clients have become a crucial application, both in business and for per- sonal use. The term information overload refers to the time consuming issue of keeping up with large amounts of incoming and stored email. Users face this problem on a daily basis and therefore benefit from an email client that allows them to efficiently search, display and store their email. The goal of this thesis is to build a graphical user interface for the innovative email client developed in a previous master thesis. It also explores the possibilities of designing a user interface outside of the business rules that apply for commercial solutions. 1 Contents 1 Introduction 4 2 Existing Work 6 2.1 ReMail ................................. 6 2.1.1 Methods ............................ 6 2.1.2 Problems Identified ...................... 7 2.1.3 Proposed Solutions ...................... 7 2.1.4 Assessment .......................... 8 2.2 Inner Circle .............................. 8 2.2.1 Methods ............................ 8 2.2.2 Problems Identified ...................... 9 2.2.3 Proposed Solutions ...................... 9 2.2.4 Assessment .......................... 10 2.3 TaskMaster .............................. 10 2.3.1 Methods ............................ 10 2.3.2 Problems Identified ...................... 11 2.3.3 Proposed Solution ...................... 11 2.3.4 Assessment .......................... 12 2.4 Email Overload ............................ 12 2.4.1 Methods ............................ 12 2.4.2 Problems Identified ...................... 13 2.4.3 Proposed Solutions ...................... 13 2.4.4 Assessment .......................... 14 3 Existing Solutions 16 3.1 Existing Email Clients .......................
    [Show full text]
  • Informational Internet Relay
    Network Working Group C. Kalt Request for Comments: 2813 April 2000 Updates: 1459 Category: Informational Internet Relay Chat: Server Protocol Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2000). All Rights Reserved. Abstract While based on the client-server model, the IRC (Internet Relay Chat) protocol allows servers to connect to each other effectively forming a network. This document defines the protocol used by servers to talk to each other. It was originally a superset of the client protocol but has evolved differently. First formally documented in May 1993 as part of RFC 1459 [IRC], most of the changes brought since then can be found in this document as development was focused on making the protocol scale better. Better scalability has allowed existing world-wide networks to keep growing and reach sizes which defy the old specification. Kalt Informational [Page 1] RFC 2813 Internet Relay Chat: Server Protocol April 2000 Table of Contents 1. Introduction ............................................... 3 2. Global database ............................................ 3 2.1 Servers ................................................ 3 2.2 Clients ................................................ 4 2.2.1 Users ............................................. 4 2.2.2 Services .......................................... 4 2.3 Channels ..............................................
    [Show full text]
  • Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd
    Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................
    [Show full text]
  • Apache Geronimo Uncovered a View Through the Eyes of a Websphere Application Server Expert
    Apache Geronimo uncovered A view through the eyes of a WebSphere Application Server expert Skill Level: Intermediate Adam Neat ([email protected]) Author Freelance 16 Aug 2005 Discover the Apache Geronimo application server through the eyes of someone who's used IBM WebSphere® Application Server for many years (along with other commercial J2EE application servers). This tutorial explores the ins and outs of Geronimo, comparing its features and capabilities to those of WebSphere Application Server, and provides insight into how to conceptually architect sharing an application between WebSphere Application Server and Geronimo. Section 1. Before you start This tutorial is for you if you: • Use WebSphere Application Server daily and are interested in understanding more about Geronimo. • Want to gain a comparative groundwork understanding of Geronimo and WebSphere Application Server. • Are considering sharing applications between WebSphere Application Server and Geronimo. • Simply want to learn and understand what other technologies are out there (which I often do). Prerequisites Apache Geronimo uncovered © Copyright IBM Corporation 1994, 2008. All rights reserved. Page 1 of 23 developerWorks® ibm.com/developerWorks To get the most out of this tutorial, you should have a basic familiarity with the IBM WebSphere Application Server product family. You should also posses a general understanding of J2EE terminology and technologies and how they apply to the WebSphere Application Server technology stack. System requirements If you'd like to implement the two technologies included in this tutorial, you'll need the following software and components: • IBM WebSphere Application Server. The version I'm using as a base comparison is IBM WebSphere Application Server, Version 6.0.
    [Show full text]