Backup Com Ferramentas Livres

Total Page:16

File Type:pdf, Size:1020Kb

Backup Com Ferramentas Livres JerônimoJerônimo MedinaMedina MadrugaMadruga BackupBackup comcom ferramentasferramentas livreslivres TchelinuxTchelinux 20102010 -- BagéBagé SumárioSumário ● Apresentação ● Conceitos ● Ferramentas básicas ● Compressão ● Backup em mídias ● RAID e sistemas de arquivo ● Backup no Desktop ● Backup Online ● Clonagem de sistemas ● Sistemas avançado de backup ● Observações finais ● Referências ApresentaçãoApresentação ● JerônimoJerônimo MedinaMedina MadrugaMadruga ● TécnicoTécnico emem EletrônicaEletrônica pelopelo IFSULIFSUL ● BacharelandoBacharelando emem CiênciaCiência dada ComputaçãoComputação pelapela UFPelUFPel ● TrabalhaTrabalha comcom informáticainformática desdedesde 20032003 – Suporte a usuário – Administração de sistemas – Administração de redes – Gerência de ambientes de educação a distância ● AtualmenteAtualmente técnicotécnico dede laboratóriolaboratório dede informáticainformática dada FURGFURG ● ParticipanteParticipante dede listaslistas dede discussãodiscussão dede softwaresoftware livrelivre comocomo TchelinuxTchelinux ee GUSLPGUSLP desdedesde 20072007 ConceitosConceitos ● BackupBackup ● CópiaCópia dede dadosdados emem umum locallocal diferentediferente dada origemorigem dosdos mesmosmesmos ● Objetivos:Objetivos: – RecuperaçãoRecuperação dede desastredesastre ● Falha no processamento ● Corrupção da base de dados ● Eventos naturais – RecuperaçãoRecuperação dede arquivosarquivos deletadosdeletados ● Usuários mal instruídos ● Invasões e ataques ConceitosConceitos ● FatoresFatores relevantesrelevantes parapara implementaçãoimplementação ● CapacidadeCapacidade – Pensar no tamanho do armazenamento para o futuro ● VelocidadeVelocidade – Tempo de execução não deve ser grande demais ● CompressãoCompressão – Relação entre tempo de compressão e espaço economizado ● CustoCusto – Solução deve estar dentro do orçamento previsto ● PortabilidadePortabilidade – Capacidade de rodar nos mais diversos sistemas ConceitosConceitos ● BackupBackup completocompleto ● ConsisteConsiste nana cópiacópia dede todostodos osos dadosdados queque sese querquer preservarpreservar ● GeraGera oo maiormaior volumevolume ee trafegotrafego dede dadosdados ● MaisMais fácilfácil dede implementarimplementar ee restaurarrestaurar ● MaiorMaior resistênciaresistência aa corrupçãocorrupção dede dadosdados ConceitosConceitos ● BackupBackup diferencialdiferencial ● ComparaCompara asas alteraçõesalterações entreentre osos últimosúltimos backupsbackups ee copiacopia somentesomente osos arquivosarquivos alteradosalterados ● MenorMenor tamanho,tamanho, porémporém maiormaior complexidadecomplexidade ConceitosConceitos ● BackupBackup IncrementalIncremental ● ComparaCompara osos arquivosarquivos ee copiacopia somentesomente osos modificadosmodificados emem referênciareferência aa umum backupbackup basebase ● MeioMeio termotermo entreentre oo completocompleto ee oo diferencialdiferencial FerramentasFerramentas básicasbásicas ● CPCP ee MVMV ● DisponíveisDisponíveis emem qualquerqualquer sistemasistema unix-likeunix-like ● ImplementamImplementam asas funcionalidadesfuncionalidades dede copiarcopiar ee movermover arquivosarquivos ● PossibilitaPossibilita backupsbackups simplessimples ● LimitadoLimitado aa dispositivosdispositivos montadosmontados nono sistemasistema FerramentasFerramentas básicasbásicas ● FTPFTP ● FileFile transfertransfer protocolprotocol ● PermitePermite aa cópiacópia parapara servidoresservidores remotosremotos ● FácilFácil dede implementarimplementar ● PorémPorém comcom poucospoucos recursosrecursos dede segurançasegurança – TransferênciaTransferência plana,plana, dadosdados nãonão sãosão criptografadoscriptografados ● NoNo WindowsWindows umauma opçãoopção parapara usouso éé oo FilezillaFilezilla FerramentasFerramentas básicasbásicas ● SCPSCP ● SecureSecure CopyCopy ● PossibilitaPossibilita cópiacópia criptografadacriptografada usandousando sshssh atravésatravés dada rederede ● PermitePermite backupbackup emem dispositivosdispositivos remotosremotos ● GaranteGarante aa segurançasegurança dosdos dadosdados enviadosenviados ● DisponívelDisponível nono WindowsWindows atravésatravés dodo WINSCPWINSCP FerramentasFerramentas básicasbásicas ● RSYNCRSYNC ● ComparaCompara aa origemorigem comcom oo destinodestino ee copiacopia somentesomente blocosblocos dede arquivosarquivos queque apresentaramapresentaram mudançasmudanças ● PermitePermite aa execuçãoexecução dede backupsbackups incrementaisincrementais ● PodePode utilizarutilizar sshssh parapara criptografarcriptografar osos dadosdados ● PodePode utilizarutilizar compressãocompressão nosnos dadosdados aa seremserem enviadosenviados ● DisponívelDisponível nono WindowsWindows atravésatravés dodo CWRSYNCCWRSYNC FerramentasFerramentas básicasbásicas ● AlgoritmoAlgoritmo dodo RSYNCRSYNC FerramentasFerramentas básicasbásicas ● CRONCRON ● FerramentaFerramenta dede agendamentoagendamento dede tarefastarefas ● PossibilitaPossibilita criarcriar umauma rotinarotina automatizadaautomatizada dede execuçãoexecução dede scriptsscripts ee programasprogramas dede backupbackup ● AltamenteAltamente flexívelflexível ● PodePode serser replicadareplicada nono WindowsWindows atravésatravés dodo agendadoragendador dede tarefas,tarefas, poremporem semsem tantastantas funcionalidadesfuncionalidades ● PodePode serser utilizadautilizada nono WindowsWindows atravésatravés dodo CYGWINCYGWIN CompressãoCompressão ● ConsisteConsiste emem reduzirreduzir oo espaçoespaço ocupadoocupado pelospelos arquivosarquivos nono discodisco ● PossibilitaPossibilita oo armazenamentoarmazenamento dede grandesgrandes volumesvolumes dede dadosdados emem capacidadescapacidades menoresmenores ● AumentoAumento oo tempotempo dede processamentoprocessamento parapara criarcriar ouou restaurarrestaurar umum backupbackup ● PodePode amplificaramplificar osos danosdanos causadoscausados porpor corrupçãocorrupção dede dadosdados ● AlgumasAlgumas ferramentasferramentas dede compressãocompressão incluemincluem recursosrecursos dede criptografiacriptografia CompressãoCompressão ● TARTAR (Tape(Tape Archive)Archive) ● PodePode serser utilizadoutilizado parapara juntarjuntar váriosvários arquivosarquivos emem umum sósó ● TambémTambém podepode serser utilizadoutilizado parapara extrairextrair váriosvários arquivosarquivos dede umum únicoúnico ● NãoNão éé capazcapaz dede realizarrealizar aa compressão,compressão, porémporém podepode trabalhartrabalhar emem conjuntoconjunto comcom ferramentasferramentas queque aa fazemfazem ● GZIP,GZIP, BZIP2,BZIP2, LZMA,LZMA, XZXZ CompressãoCompressão ● UNPUNP ● FerramentaFerramenta queque podepode serser utilizadautilizada parapara descompressãodescompressão dede quasequase todostodos osos formatosformatos ● OutrasOutras ferramentasferramentas ● Ark,Ark, Arj,Arj, Rar,Rar, Unrar,Unrar, Dar,Dar, Ark,Ark, P7zip,P7zip, XarchiverXarchiver ● ParaPara WindowsWindows ● 7Zip7Zip ee PeaZipPeaZip BackupBackup emem mídiasmídias ● ReduçãoRedução dosdos custoscustos dede mídiasmídias atualmenteatualmente ● AltosAltos custocusto dede armazenamentoarmazenamento emem unidadesunidades dede discodisco ● GigabyteGigabyte XX RealReal ● MídiasMídias permitempermitem múltiplosmúltiplos backupsbackups ee armazenamentoarmazenamento porpor longoslongos períodosperíodos ● BackupsBackups emem discodisco ee mídiamídia permitepermite umum certacerta redundânciaredundância BackupBackup emem mídiasmídias ● FitasFitas DATDAT ● DispositivoDispositivo queque permitepermite reescritareescrita ● AltoAlto custocusto dada unidadeunidade dede operaçãooperação ● BaixoBaixo custocusto dasdas fitasfitas ● IndicadoIndicado parapara servidoresservidores ● AcessoAcesso SequencialSequencial ● UtilizaUtiliza oo MTMT parapara rebobinar,rebobinar, apagarapagar ee ejetarejetar aa fitafita ● UtilizaUtiliza oo TARTAR parapara enviarenviar ouou extrairextrair arquivosarquivos BackupBackup emem mídiasmídias ● CDCD ee DVDDVD ● UmaUma dasdas melhoresmelhores relaçõesrelações CustoCusto XX BeneficioBeneficio ● BaixaBaixa capacidadecapacidade dede armazenamentoarmazenamento ● BaixaBaixa confiabilidadeconfiabilidade ● IndicadoIndicado parapara backupsbackups caseiroscaseiros ouou backupsbackups permanentespermanentes ● PossibilidadePossibilidade dede reescritareescrita casocaso aa mídiamídia sejaseja RWRW ● MKISOFS,MKISOFS, CDRECORD,CDRECORD, GROWISOFS,GROWISOFS, CDRDAO,CDRDAO, DVD+RW-TOOLS,DVD+RW-TOOLS, WODIMWODIM BackupBackup emem mídiasmídias ● OutrasOutras opçõesopções ● DisquetesDisquetes (opção(opção ultrapassadaultrapassada atualmente)atualmente) ● ZIPZIP DriveDrive ● DiscosDiscos removíveisremovíveis ● MemóriasMemórias FlashFlash RAIDRAID ● RedundantRedundant ArrayArray ofof InexpensiveInexpensive DisksDisks ● RAIDRAID nãonão fornecefornece emem nenhumanenhuma configuraçãoconfiguração oo backupbackup dosdos dadosdados emem questãoquestão ● RAIDRAID garantegarante redundânciaredundância emem algumasalgumas configuraçõesconfigurações ● RAID 0 – Concatenação ou striping, aumenta velocidade e/ou tamanho ● RAID 1 – Redundância, aumenta confiabilidade do sistema ● Aconselhável:Aconselhável: ● RAID 1, RAID 0+1, RAID 1+0, RAID 100 ● Evitar:Evitar: ● RAID 2, RAID 3, RAID 4, RAID 5, RAID 6 RAIDRAID RAIDRAID RAIDRAID ● RAIDRAID viavia SistemaSistema OperacionalOperacional ● MelhorMelhor opçãoopção – RAIDTOOLSRAIDTOOLS ouou MDADMMDADM nono linuxlinux – TambémTambém podepode serser implementadoimplementado pelopelo LVMLVM ● RAIDRAID viavia softwaresoftware (alto(alto índiceíndice dede usouso dodo processador)processador) ● BaixoBaixo desempenhodesempenho ● BoaBoa confiabilidadeconfiabilidade ● FácilFácil
Recommended publications
  • Catalogo De Apliciones Para Gnu/Linux
    Universidad Luterana Salvadoreña SOFTWARE LIBRE SOFTWARE LIBRE CATALOGO DE APLICIONES PARA GNU/LINUX AUTORES: RUBEN ERNESTO MEJIA CORTEZ MARVIN FERNANDO RAMIREZ DAVID ARMANDO CORNEJO SOFTWARE LIBRE INDICE Contenido Pagina Introducción .........................................................................................1 Objetivos ...............................................................................................2 Que es software libre ? ..........................................................................3 Editores de texto ....................................................................................6 Exploradores ..........................................................................................17 Correo Electrónico .................................................................................28 Editores de audio ...................................................................................40 Reproductores de audio ........................................................................51 Ofimática .................................................................................................61 Reproductores multimedia ......................................................................67 Editores de video .....................................................................................76 Compresores ...........................................................................................87 Creadores de CD'S ..................................................................................96
    [Show full text]
  • Сжатие И Архивирование Файлов В ОС Linux На Примере Xarchiver И Ark (ПО Для Сжатия И Архивирования Файлов)
    Федеральное агентство по образованию В.Г. Буленок, Е.Г. Пьяных Сжатие и архивирование файлов в ОС Linux на примере Xarchiver и Ark (ПО для сжатия и архивирования файлов) Учебное пособие Москва 2008 Буленок В.Г., Пьяных Е.Г. Б 907 Сжатие и архивирование файлов в ОС Linux на примере Xarchiver и Ark (ПО для сжатия и архивирования файлов): Учебное пособие — Москва: 2008. — 40 с. Предлагаемое учебное пособие включает в себя теоретический и практический материал по вопросам архивирования данных. Предназначено для слушателей курсов повышения квалификации и переподготовки кадров, студентов, школьников, а также для самостоятельного изучения основных принципов работы архиваторов в Unix–системах. В.Г. Буленок, Е.Г. Пьяных. Сжатие и архивирование файлов в ОС Linux на примере Xarchiver и Ark Оглавление Предисловие.......................................................................................4 Введение.............................................................................................6 Глава 1. Архивирование информации..............................................8 1.1. Архивирование и восстановление информации.....................................................8 1.2. Средства архивирования в Unix‒системах...........................................................9 Контрольные вопросы..................................................................................................11 Глава 2. Менеджеры архивов..........................................................12 2.1. Менеджер архивов Ark..........................................................................................12
    [Show full text]
  • Kali Linux Penetration Testing Bible
    Telegram Channel : @IRFaraExam Table of Contents Cover Title Page Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Telegram Channel : @IRFaraExam Summary CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary CHAPTER 10: Linux Privilege Escalation Telegram Channel : @IRFaraExam Introduction to Kernel Exploits and Missing Configurations
    [Show full text]
  • Learn Raspberry Pi with Linux
    For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the Authors .............................................................................................................. xv About the Technical Reviewer .......................................................................................... xvii Acknowledgments ............................................................................................................. xix Introduction ....................................................................................................................... xxi ■ Chapter 1: Your First Bite of Raspberry Pi .........................................................................1 ■ Chapter 2: Surveying the Landscape ...............................................................................31 ■ Chapter 3: Getting Comfortable .......................................................................................53 ■ Chapter 4: The File-Paths to Success ..............................................................................69 ■ Chapter 5: Essential Commands ......................................................................................89 ■ Chapter 6: Editing Files on the Command Line ..............................................................109 ■ Chapter 7: Managing Your Pi .........................................................................................129 ■ Chapter 8: A
    [Show full text]
  • MXM-6410 Ubuntu Linux 9.04 (Jaunty Jackalope) User’S Manual V1.2
    MXM-6410/APC-6410 Linux User’s Manual v1.2 Computer on Module COM Ports Two USB Hosts LCD Ethernet SD MXM-6410 Ubuntu Linux 9.04 (Jaunty Jackalope) User’s Manual v1.2 1 MXM-6410/APC-6410 Linux User’s Manual v1.2 Table of Contents CHAPTER 1 MXM-6410/APC-6410 UBUNTU LINUX (JAUNTY JACKALOPE) FEATURES .. 5 1.1 BOARD SUPPORT PACKAGE (BSP) .................................................................................................. 5 1.2 DRIVERS ......................................................................................................................................... 5 1.3 DEFAULT SOFTWARE PACKAGES ..................................................................................................... 7 1.4 SPECIAL FEATURES ....................................................................................................................... 21 CHAPTER 2 SYSTEM INFORMATION .......................................................................................... 23 2.1 STARTING EVKM-MXM-6410 ..................................................................................................... 23 2.2 JUMPER SETTING .......................................................................................................................... 24 2.3 CONNECTORS ................................................................................................................................ 29 CHAPTER 3 USING UBUNTU JAUNTY JACKALOPE ................................................................ 33 3.1 BOOTING .....................................................................................................................................
    [Show full text]
  • Distro Notes This Document Was Revised on March 9, 2011
    Distro Notes This document was revised on March 9, 2011. Older versions can be discarded. 1. Overview. This document discusses a Linux distro that's under construction. Comments are welcome. The distro is portable; most versions run directly from pocket-size media (thumbdrives, 3" Mini-DVDs, etc.). It's useful for multimedia tasks, software development, Internet file or site downloads, office work, and system maintenance. Some versions also provide a large collection of games (including lightweight that even people who "don't play games" may find diverting). Target: This distro is aimed at UNIX and MS-Windows CLI developers, system administrators, multimedia hobbyists, and people with an interest in chess (there's 11 chess engines) and lightweight games in general. Desktop: There's a lightweight desktop. The desktop doesn't include GNOME or KDE eye candy (dancing icons, 3D workspaces, etc.) but it gets the job done and does support a few special features, including remote access and single-instance support. Windows clones: This distro resembles old versions of MS-Windows visually, it includes some MS-Windows work-alike programs, and it runs MS-Windows programs. However, it's not aimed at MS-Windows people. Former MS-Windows users should try PCLinuxOS and Ubuntu instead (these are polished Windows-style distros). That said, this distro offers somes advantages over Windows-style distros: it's faster, in some cases; it requires less memory (*); it includes tools, collections, and databases that are generally unavailable or poorly maintained elsewhere; and you can run it from a Flash device that fits on a keychain.
    [Show full text]
  • Training Bachelors in the Transition to the Use of Domestic Office Software
    SHS Web of Conferences 55, 03027 (2018) https://doi.org/10.1051/shsconf/20185503027 ICPSE 2018 Training bachelors in the transition to the use of domestic office software Natalia Manyukova1, Elena Nikonova1,*, and Maksim Sliva1 1Nizhnevartovsk State University, 628605, 56 Lenina str., Nizhnevartovsk, Russia Abstract. The article considers the requirements for the information competence of the students graduating with the bachelor degree in various areas of training. In particular, we analyze the software composition of the university and the possibility of its replacement with domestic or freely distributed programs. The modern stage in the development of society has received the name of “information age,” since its most important resource is information that determines the success of the development of science, economics, education, and other vital areas of activity. In this regard, there is a rapid development of information technology as a universal means of automating various information processes. Information technologies play an important role in production and economics, since they significantly improve the efficiency of the business processes of the enterprise, and, consequently, its competitiveness. In the management of any organization, information technology is used to implement a strictly defined process of collecting and processing information in order to make a managerial decision based on it. At the same time, the corporate information system, which takes into account all aspects of the company’s activities, from planning and monitoring to analyzing economic information, will provide the maximum managerial effect. An indispensable condition for the operation of such a system in an enterprise is the availability not only of the relevant software and work procedures, but also qualified personnel with the necessary competencies.
    [Show full text]
  • Linux Lite 1.0.2 – Basic Computer And
    computer literacy movement construction e - learning of a modern ITdesk.info – society project of computer e-education with an open access - digital literacy handbook human rights e - inclusion to education and information open access Linux Lite 1.0.2 – Basic computer and file managing HANDBOOK Author: Melani Max ITdesk.info – project of computer e-education with open access Original: Author: Gorana Čelebić Subtitle: Osnovno korištenje računala i upravljanje datotekama – Windows 7, priručnik ISBN: 978-953-56758-1-5 Publisher: Otvoreno društvo za razmjenu ideja (ODRAZI), Zagreb Expert review: EdukaCentar, ustanova za obrazovanje, Zagreb Proofreading: Ema Čišić Place and year of publication: Zagreb, 2011. Adjusted for the Linux Lite operating system by: Author: Melani Max Main title: ITdesk.info – projekt računalne e-edukacije sa slobodnim pristupom Subtitle: Linux Lite 1.0.2 - Basic computer and file managing, handbook Translation: Una Šijan Proof-reading: Manuela Sánchez Expert review: Kundan Singh Publisher: Otvoreno društvo za razmjenu ideja (ODRAZI), Zagreb ISBN: 978-953-56758-1-5 Place and year of publication: Zagreb, 2013. Copyright: Feel free to copy, print and re-distribute the whole or a part of this publication, including for the educational purposes, whether public or private educational organizations, but exclusively in non- commercial purposes (therefore, without charging the end users of publication) and with a reference to the source (source: www.ITdesk.info – computer e-education project with a free access). Derivative works without prior approval of the copywright holder (Open Society for the Exchange of Ideas-ODRAZI) are not permitted. Contact for permission for derivative works: [email protected]. ITdesk.info – project of computer e-education with open access PREFACE Today’s society is marked by a sudden growth and development of information technology (IT) field, which has resulted in society being greatly dependent, in a broader sense, on the knowledge and competence of the people working in the IT sector.
    [Show full text]
  • 1. Why POCS.Key
    Symptoms of Complexity Prof. George Candea School of Computer & Communication Sciences Building Bridges A RTlClES A COMPUTER SCIENCE PERSPECTIVE OF BRIDGE DESIGN What kinds of lessonsdoes a classical engineering discipline like bridge design have for an emerging engineering discipline like computer systems Observation design?Case-study editors Alfred Spector and David Gifford consider the • insight and experienceof bridge designer Gerard Fox to find out how strong the parallels are. • bridges are normally on-time, on-budget, and don’t fall ALFRED SPECTORand DAVID GIFFORD • software projects rarely ship on-time, are often over- AS Gerry, let’s begin with an overview of THE DESIGN PROCESS bridges. AS What is the procedure for designing and con- GF In the United States, most highway bridges are budget, and rarely work exactly as specified structing a bridge? mandated by a government agency. The great major- GF It breaks down into three phases: the prelimi- ity are small bridges (with spans of less than 150 nay design phase, the main design phase, and the feet) and are part of the public highway system. construction phase. For larger bridges, several alter- There are fewer large bridges, having spans of 600 native designs are usually considered during the Blueprints for bridges must be approved... feet or more, that carry roads over bodies of water, preliminary design phase, whereas simple calcula- • gorges, or other large obstacles. There are also a tions or experience usually suffices in determining small number of superlarge bridges with spans ap- the appropriate design for small bridges. There are a proaching a mile, like the Verrazzano Narrows lot more factors to take into account with a large Bridge in New Yor:k.
    [Show full text]
  • Ubuntu 11.04 Niebiańska Nimfa
    Ubuntu 11.04 Niebiańska Nimfa Przewodnik Ubuntu 11.04 Niebiańska Nimfa - Przewodnik Spis treści 1. Wprowadzenie ............................................................................................................................4 1.1 Co właściwie umieszczone jest w tym przewodniku? ..................................................4 1.2 Filozofia Ubuntu ...............................................................................................................4 1.3 Dlaczego warto zmienić system na Ubuntu? ................................................................4 2. Rozpoczynamy przygodę! .......................................................................................................5 2.1 Wypróbuj Ubuntu .............................................................................................................5 2.2 Instalacja systemu ............................................................................................................6 2.2.1 Minimalne wymagania .............................................................................................6 2.2.2 Zalecane wymagania ................................................................................................6 2.2.3 Rozpoczęcie instalacji ..............................................................................................6 2.2.4 Wybór języka .............................................................................................................7 2.2.5 Informacje wstępne .................................................................................................7
    [Show full text]
  • Cross-Compiling Praat Under Linux for Windows (XP, 7)
    Cross-compiling Praat under Linux for Windows (XP, 7) DISCLAIMER Following these instructions could render your computer unfunctional. It also might destroy data stored on your computer or make data inaccessible. THESE INSTRUCTIONS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE INSTRUCTIONS IS WITH YOU. SHOULD THE INSTRUCTIONS PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. Introduction This document describes how to compile the Praat source code under Linux in order to get an executable for Windows XP, 7 or higher. The instructions are tested for Lubuntu Linux (version 14.04 LTS), therefore they should work for Debian, Ubuntu (and relatives) and Mint as well. It is assumed that the reader is familiar with Linux. We wil use Praat 5.4.15 and and compile the source code by using mingw-w64 version 3.2.0-2 with gcc and g++ compilers version 4.8. We describe both the procedure for 32-bit and 64 bit. Where instructions differ, the 32-bit instructions are given in green, and the 64-bit instructions in red. The whole process consists of nine steps, which are described below one by one. 1. Install mingw-w64 Open a terminal and type: sudo apt-get install mingw-w64 It is also possible to install via the Synaptic Pacakge Manager. Search for mingw and check mingw- w64. Click on Apply.
    [Show full text]
  • Przewodnik Ubuntu 12.04 LTS Precise Pangolin
    Ubuntu 12.04 LTS Precise Pangolin Praktyczny przewodnik Ubuntu-pomoc.org - Przewodnik po Ubuntu 12.04 LTS Precise Pangolin Spis treści Spis treści............................................................................................................................................ 2 Wprowadzenie................................................................................................................................... 6 O przewodniku.............................................................................................................................. 6 Przypisy autora, czyli wskazówki dla Ciebie!...........................................................................6 Filozofia Ubuntu........................................................................................................................... 7 Dlaczego warto zmienić system na Ubuntu?...........................................................................7 Numery, nazwy kodowe oraz wersje LTS.................................................................................8 Rozpoczynamy przygodę z Ubuntu!...............................................................................................9 Skąd dostać płytę z Ubuntu?......................................................................................................9 Aktualizacja Ubuntu 11.10 Oneiric Ocelot do Ubuntu 12.04 LTS Precise Pangolin........10 Wypróbuj Ubuntu....................................................................................................................... 11
    [Show full text]