Omid Raha Mystack Documentation Release 0.1

Total Page:16

File Type:pdf, Size:1020Kb

Omid Raha Mystack Documentation Release 0.1 Omid Raha MyStack Documentation Release 0.1 Omid Raha Oct 28, 2019 Contents 1 Aircrack-ng 3 1.1 Install...................................................3 1.1.1 Install aircrack-ng 1.2-beta1 from source............................3 2 APPLE 5 2.1 Tips....................................................5 2.1.1 Apple ID............................................5 2.1.2 Hackintosh...........................................5 3 Astronomy 7 3.1 astronomical unit (AU, or au)......................................7 3.2 What Is the Distance Between Earth and Mars?.............................7 3.3 What is the Distance to the Moon?....................................7 3.4 What Is the Distance Between Earth and sun?..............................7 3.5 Software.................................................8 3.6 Galaxy..................................................8 4 Atlassian 9 4.1 Tips....................................................9 4.1.1 Atlassian installation approach.................................9 4.1.2 Atlassian license Prices..................................... 10 4.1.3 Run Jira with docker...................................... 11 4.1.4 Run Confluence with docker.................................. 12 4.1.5 Run Bitbucket Server with docker............................... 12 4.1.6 JIRA is Unable to Start due to Could not create necessary subdirectory............ 12 4.1.7 Atlassian Docker compose file................................. 13 4.1.8 Backup atlassian product.................................... 15 4.1.9 Bamboo............................................. 16 5 benchmark 17 5.1 Tips.................................................... 17 5.1.1 Using Apache Bench for Simple Load Testing......................... 17 6 Block Chain 19 6.1 Tips.................................................... 19 6.2 Ethereum................................................. 19 6.2.1 Solidity............................................. 21 i 6.2.2 Online solidity......................................... 21 6.2.3 Links.............................................. 21 7 Browser 23 7.1 Firefox.................................................. 23 7.1.1 Disable Dns Cache....................................... 23 7.1.2 Increase download them all maximum segments........................ 23 7.1.3 Set security tls.......................................... 24 7.1.4 Disable automatic loading of Images in Firefox........................ 24 7.1.5 Fix Firefox Phishing...................................... 24 7.2 Opera................................................... 24 8 Ceph 25 9 Citus 27 9.1 Tips.................................................... 27 9.1.1 Install citus on single machine with docker.......................... 27 9.1.2 Install citus on a single machine on ubuntu........................... 28 9.1.3 Install citus on multi-machine cluster on Ubuntu........................ 29 9.1.4 Have a unique constraint on one field of table......................... 30 9.1.5 Limitation of Citus Community................................ 30 9.1.6 Django............................................. 31 10 CockRoachDB 33 10.1 Tips.................................................... 33 10.1.1 NewSql............................................. 33 10.1.2 Support SQL and Postgres................................... 33 10.1.3 Support Django......................................... 33 10.1.4 Support k8s........................................... 34 10.1.5 Scale.............................................. 34 10.1.6 Performance........................................... 34 10.1.7 Deploy multi-node cluster using HAProxy load balancer................... 34 10.1.8 Adapting SQLAlchemy to CockroachDB........................... 34 11 Cothority 35 11.1 Tips.................................................... 35 11.1.1 Install.............................................. 35 11.1.2 Apps............................................... 37 12 Crypto currency 47 12.1 Tips.................................................... 47 12.1.1 Create your own block chain.................................. 47 12.1.2 Coins Analysis......................................... 47 12.1.3 Exchange coins......................................... 47 12.1.4 Buy/Sell coins.......................................... 48 12.1.5 Buy coins by Paypal...................................... 48 12.1.6 Tools.............................................. 48 12.1.7 Python.............................................. 48 12.1.8 Bitcoin............................................. 48 12.1.9 Universal JavaScript Client-Side Wallet Generator....................... 48 12.1.10 NXT............................................... 49 12.1.11 Dogecoin............................................ 49 12.1.12 Ripple XRP........................................... 50 12.1.13 Cloud Mining.......................................... 50 12.2 Mining.................................................. 50 ii 12.2.1 Mining software......................................... 50 12.2.2 Pool............................................... 51 12.2.3 Hash Rate............................................ 52 12.2.4 Best coin to mine........................................ 52 13 CTF 53 13.1 Tips.................................................... 53 13.1.1 Tools.............................................. 53 14 Deploy 55 14.1 Open shift................................................ 55 14.1.1 Installing the OpenShift Client Tools.............................. 55 14.1.2 Django admin pass....................................... 57 14.1.3 Openshift Environment Variables List............................. 57 14.1.4 Update rhc........................................... 57 14.1.5 How to create and unset environment variables on the server ?................ 57 14.1.6 Restart the application..................................... 57 14.1.7 Using redmine on openshift................................... 58 14.1.8 Payment............................................. 58 14.1.9 To see where an existing application is being hosting..................... 58 14.2 Amazon.................................................. 58 14.2.1 RDS............................................... 63 14.2.2 EC2 Container Service..................................... 64 14.3 Configuration management....................................... 65 14.3.1 Operating System configuration management......................... 65 14.4 Tips.................................................... 65 14.4.1 PaaS (platform as a service).................................. 65 14.4.2 VPS Provider.......................................... 65 14.4.3 Digital Ocean.......................................... 66 14.4.4 Amazon............................................. 66 14.4.5 Blue Green Deployment.................................... 67 14.4.6 Continuous Delivery...................................... 67 14.4.7 Continuous Integration..................................... 67 14.4.8 Feature toggle.......................................... 67 14.4.9 Log collection service...................................... 67 14.4.10 How to configure Google Client Id and Google Client Secret?................ 68 14.4.11 Kong with docker........................................ 68 14.4.12 Combine and minimize JavaScript, CSS and Images files................... 69 14.5 Vagrant.................................................. 69 14.5.1 Quick Guide to Vagrant on Amazon EC2........................... 69 14.5.2 How to use vagrant in a proxy enviroment?.......................... 69 14.5.3 Disable or remove the proxy.................................. 69 14.5.4 Install ubuntu.......................................... 70 14.5.5 Multi-Machine......................................... 70 14.5.6 CPU and Memory........................................ 70 14.5.7 Update plugin.......................................... 70 14.6 Monitoring Tools............................................. 70 14.6.1 New Relic............................................ 70 14.6.2 What is bam.nr-data.net..................................... 71 14.6.3 How to install Nginx New Relic plugin............................ 71 14.6.4 Real-time web log analyzer and interactive viewer....................... 72 14.7 Ansible.................................................. 72 14.7.1 Install.............................................. 73 14.8 Microservices.............................................. 73 iii 14.8.1 Multiple Services Per Host................................... 73 14.8.2 Single Service Per Host..................................... 74 14.8.3 Mantl.............................................. 74 14.8.4 lattice.............................................. 75 14.8.5 vamp.............................................. 75 14.8.6 calico.............................................. 75 14.8.7 marathon............................................ 75 14.8.8 terraform............................................ 75 14.9 Simple Storage Service (S3)....................................... 75 14.9.1 S3cmd configuration to use with Swift storage object..................... 75 14.9.2 Sync remote s3 objects to the local file system......................... 76 14.10 VPS services............................................... 76 14.10.1 VPS with more Storage..................................... 76 14.10.2 Cheap VPS........................................... 76 14.11 kubernetes................................................ 76 14.11.1 Monitoring........................................... 78 14.11.2
Recommended publications
  • Flutter Basics: the Good and the Bad
    Flutter Basics: The Good and The Bad Flutter has risen quickly as anapp development tool. Originally released by Google in May 2017, Flutter has been used by two million developers since. LinkedIn reports Flutter is the fastest-growing skill among software engineers. This excellent growth is fueled by users’ hopes that it’s an elixir to cure the coding experience of all maladies. Like anything, of course, Flutter has its shortcomings. Let’s take a look. What is Flutter? Flutter is built on the Dart programming language. Developed by Google, Dart was first unveiled in 2011. The language covers the major hot points that a modern language should: it is object-oriented, class-based, and has an added garbage- collector. It has the async, future options out-of-the-box. It has C-style syntax, so should look familiar to JavaScript devs—in fact, devs report they pick up the language quickly. Dart is intentionally simple. Ease comes with costs, so Dart can be executing extra, or less-refined, work in the background. Compared to writing the native code, Dart can be slower and less reliable than a native language. Dart is to JavaScript what Python is to C++. Flutter is an open-source tool for building UIs, particularly on mobile. An essential concept to Flutter is its widgets. Their motto, everything is a widget, is entirely true. All things are widgets. From building layouts with Scaffold and Material App widgets, to BLoC patterns and Provider Widgets, Flutter is built of widgets. Its layouts need to be hand- built, but a few developers created some layout playgrounds to let you build and print the code: mutisya.com flutterstudio.com In this code, you can see how a Text() widget is inside an AppBar() widget is inside a Scaffold() widget.
    [Show full text]
  • MASTERCLASS GNUPG MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS GNUPG MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! SECURE EMAIL WITH GNUPG AND ENIGMAIL Send encrypted emails from your favourite email client. our typical email is about as secure as a The first thing that you need to do is create a key to JOHN LANE postcard, which is good news if you’re a represent your identity in the OpenPGP world. You’d Ygovernment agency. But you wouldn’t use a typically create one key per identity that you have. postcard for most things sent in the post; you’d use a Most people would have one identity, being sealed envelope. Email is no different; you just need themselves as a person. However, some may find an envelope – and it’s called “Encryption”. having separate personal and professional identities Since the early 1990s, the main way to encrypt useful. It’s a personal choice, but starting with a single email has been PGP, which stands for “Pretty Good key will help while you’re learning. Privacy”. It’s a protocol for the secure encryption of Launch Seahorse and click on the large plus-sign email that has since evolved into an open standard icon that’s just below the menu. Select ‘PGP Key’ and called OpenPGP. work your way through the screens that follow to supply your name and email address and then My lovely horse generate the key. The GNU Privacy Guard (GnuPG), is a free, GPL-licensed You can, optionally, use the Advanced Key Options implementation of the OpenPGP standard (there are to add a comment that can help others identify your other implementations, both free and commercial – key and to select the cipher, its strength and set when the PGP name now refers to a commercial product the key should expire.
    [Show full text]
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Securing Email Through Online Social Networks
    SECURING EMAIL THROUGH ONLINE SOCIAL NETWORKS Atieh Saberi Pirouz A thesis in The Department of Concordia Institute for Information Systems Engineering (CIISE) Presented in Partial Fulfillment of the Requirements For the Degree of Master of Applied Science (Information Systems Security) at Concordia University Montreal,´ Quebec,´ Canada August 2013 © Atieh Saberi Pirouz, 2013 Concordia University School of Graduate Studies This is to certify that the thesis prepared By: Atieh Saberi Pirouz Entitled: Securing Email Through Online Social Networks and submitted in partial fulfillment of the requirements for the degree of Master of Applied Science (Information Systems Security) complies with the regulations of this University and meets the accepted standards with respect to originality and quality. Signed by the final examining commitee: Dr. Benjamin C. M. Fung Chair Dr. Lingyu Wang Examiner Dr. Zhenhua Zhu Examiner Dr. Mohammad Mannan Supervisor Approved Chair of Department or Graduate Program Director 20 Dr. Christopher Trueman, Dean Faculty of Engineering and Computer Science Abstract Securing Email Through Online Social Networks Atieh Saberi Pirouz Despite being one of the most basic and popular Internet applications, email still largely lacks user-to-user cryptographic protections. From a research perspective, designing privacy preserving techniques for email services is complicated by the re- quirement of balancing security and ease-of-use needs of everyday users. For example, users cannot be expected to manage long-term keys (e.g., PGP key-pair), or under- stand crypto primitives. To enable intuitive email protections for a large number of users, we design Friend- lyMail by leveraging existing pre-authenticated relationships between a sender and receiver on an Online Social Networking (OSN) site, so that users can send secure emails without requiring direct key exchange with the receiver in advance.
    [Show full text]
  • Empirical Study on Media Monitoring and Internationalisation Resources
    MULTISENSOR Mining and Understanding of multilinguaL contenT for Intelligent Sentiment Enriched coNtext and Social Oriented inteRpretation FP7-610411 D2.1 Empirical study on media monitoring and internationalisation resources Dissemination level: Public Contractual date of delivery: Month 6, 30 April 2014 Actual date of delivery: Month 6, 30 April 2014 Workpackage: WP2 Multilingual and multimedia content extraction Task: T2.1 Empirical study Type: Report Approval Status: Final Draft Version: 1.1 Number of pages: 172 Filename: D2.1_EmpiricalStudy_2014-04-30_v1.1.pdf Abstract This empirical study identifies the resources and the type of information that needs to be extracted in the project and their encoding types. In addition it reports information retrieval and crawling techniques that could be employed for the extraction of this information. The information in this document reflects only the author’s views and the European Community is not liable for any use that may be made of the information contained therein. The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Page 1 Co-funded by the European Union Page 2 D2.1 – V1.1 History Version Date Reason Revised by 0.1 20/03/2014 Draft V. Aleksić (LT) 0.2 03/04/2014 Comments S. Vrochidis (CERTH), I. Arapakis (BM-Y!) 0.3 15/04/2014 Update V.Aleksić (LT) 0.4 16/04/2014 Document for internal review V.Aleksić (LT) 0.5 24/04/2014 Review A.
    [Show full text]
  • Linux Foundation to Host Meego Workgroup
    Linux Foundation To Host MeeGo Workgroup New Open Source Software Platform Backed by Intel and Nokia will Power the Next Generation of Computing Devices SAN FRANCISCO, February 15, 2010 – The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, today announced it will host the MeeGo project, the open source software platform for the next generation of computing devices. MeeGo combines Intel’s Moblin™ and Nokia’s Maemo projects into one Linux-based platform. MeeGo, announced today in a joint release by Intel and Nokia, will be deployed across many computing device types - including pocketable mobile computers, netbooks, tablets, mediaphones, connected TVs and in-vehicle infotainment systems, and brings together the leaders in computing and mobile communications as the project’s backers. MeeGo is designed for cross-device, cross-architecture computing and is built from the ground up for a new class of powerful computing devices. The workgroup will be hosted by the Linux Foundation as a fully open source project, encouraging community contributions in line with the best practices of the open source development model. The Linux Foundation expects MeeGo to be adopted widely by device manufacturers, network operators, software vendors and developers across multiple device types and for many organizations and developers to participate in the workgroup. “With MeeGo, you have the world’s leader in computing – Intel – uniting with the world’s leader in communications – Nokia – in a true open source project hosted at the Linux Foundation,” said Jim Zemlin, executive director at the Linux Foundation. “MeeGo has been built from the ground up for rich, mobile devices and will deliver choice to consumers without lock-in.
    [Show full text]
  • A Study of Cryptographic File Systems in Userspace
    Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 4507-4513 Research Article A study of cryptographic file systems in userspace a b c d e f Sahil Naphade , Ajinkya Kulkarni Yash Kulkarni , Yash Patil , Kaushik Lathiya , Sachin Pande a Department of Information Technology PICT, Pune, India [email protected] b Department of Information Technology PICT, Pune, India [email protected] c Department of Information Technology PICT, Pune, India [email protected] d Department of Information Technology PICT, Pune, India [email protected] e Veritas Technologies Pune, India, [email protected] f Department of Information Technology PICT, Pune, India [email protected] Article History: Received: 10 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published online: 28 April 2021 Abstract: With the advancements in technology and digitization, the data storage needs are expanding; along with the data breaches which can expose sensitive data to the world. Thus, the security of the stored data is extremely important. Conventionally, there are two methods of storage of the data, the first being hiding the data and the second being encryption of the data. However, finding out hidden data is simple, and thus, is very unreliable. The second method, which is encryption, allows for accessing the data by only the person who encrypted the data using his passkey, thus allowing for higher security. Typically, a file system is implemented in the kernel of the operating systems. However, with an increase in the complexity of the traditional file systems like ext3 and ext4, the ones that are based in the userspace of the OS are now allowing for additional features on top of them, such as encryption-decryption and compression.
    [Show full text]
  • Creating a Custom Embedded Linux Distribution for Any Embedded
    Yocto Project Summit Intro to Yocto Project Creating a Custom Embedded Linux Distribution for Any Embedded Device Using the Yocto Project Behan Webster Tom King The Linux Foundation May 25, 2021 (CC BY-SA 4.0) 1 bit.ly/YPS202105Intro The URL for this presentation http://bit.ly/YPS202105Intro bit.ly/YPS202105Intro Yocto Project Overview ➢ Collection of tools and methods enabling ◆ Rapid evaluation of embedded Linux on many popular off-the-shelf boards ◆ Easy customization of distribution characteristics ➢ Supports x86, ARM, MIPS, Power, RISC-V ➢ Based on technology from the OpenEmbedded Project ➢ Layer architecture allows for other layers easy re-use of code meta-yocto-bsp meta-poky meta (oe-core) 3 bit.ly/YPS202105Intro What is the Yocto Project? ➢ Umbrella organization under Linux Foundation ➢ Backed by many companies interested in making Embedded Linux easier for the industry ➢ Co-maintains OpenEmbedded Core and other tools (including opkg) 4 bit.ly/YPS202105Intro Yocto Project Governance ➢ Organized under the Linux Foundation ➢ Split governance model ➢ Technical Leadership Team ➢ Advisory Board made up of participating organizations 5 bit.ly/YPS202105Intro Yocto Project Member Organizations bit.ly/YPS202105Intro Yocto Project Overview ➢ YP builds packages - then uses these packages to build bootable images ➢ Supports use of popular package formats including: ◆ rpm, deb, ipk ➢ Releases on a 6-month cadence ➢ Latest (stable) kernel, toolchain and packages, documentation ➢ App Development Tools including Eclipse plugin, SDK, toaster 7
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • State Management and Software Architecture Approaches in Cross-Platform Flutter Applications
    State Management and Software Architecture Approaches in Cross-platform Flutter Applications Michał Szczepanik a and Michał Kędziora b Faculty of Computer Science and Management, Wroclaw University of Science and Technology, Wroclaw, Poland Keywords: Mobile, Flutter, Software Architecture, State Management. Abstract: Flutter is an open-source cross-platform development framework. It is used to develop applications for Android, iOS, Windows, Mac, Linux, and web. This technology was released on December 4, 2018, and it is quite young technology with a lack of good architectural patterns and concepts. In this paper authors compared state management approaches used for Flutter applications development and architecture. They also proposed a combination of two approaches that solve the main problem of existing approaches related to global and local state management. The proposed solution can be used for development even complex and big Flutter applications. 1 INTRODUCTION the Java Script code runs in a separate thread and communicates with native modules through a bridge. Nowadays, almost all type of business needs a mobile Flutter, on the other hand, is ahead of time application to existing. The cost of its development compiled to a machine code (arm/x86) and provides depends on complexity and requirements according better performance and even security related to to market coverage. To reduce it usually hybrid or difficulties of reverse engineering (Kedziora, 2019). multiplatform (cross-platform) solutions are used. Not only the UI components are compiled, but the Unfortunately, this kind of solution usually uses whole logic also. Sometimes Flutter apps are even totally different patterns and architectural concepts faster than native Android application, but it depends compared to native Android or iOS applications.
    [Show full text]
  • How to Write a Scientific Report
    How to Write an EEI Contents: 1. Formatting your report………………………………………………………….page 3 Grammar v Tense………………………. page 5 Data V Crap………………………………… page 5 Googling ……………………………………. page 6 Referencing………………………………… page 8 Bibliography………………………………. page 12 2. Planning your investigation…………………………………………………..page 14 Variables……………………………………… page 16 Assumptions……………………………….. page 16 Experimental Replication……………. page 17 Checklist for Experimental Design page 17 3. Writing your Report……………………………………………………………….page 17 Title ……………………………………………… page 19 Abstract ………………………………………. page 20 Introduction…………………………………. page 21 Hypothesis ………………………………….. page 22 Risk Assessment………………………….. page 23 Variables………………………………………. Page 24/25 Method…………………………………………. Page 26 Results…………………………………………. page 27 Discussion ………………………………….. page 28, 29, 30 Conclusion ………………………………….. page 31 Literature Cited / Bibliography ….. page 33 Appendices………………………………….. page 34 APPENDICIES Appendix 1 – Data Analysis Appendix 3 – Scientific Drawings Appendix 4 – Literature Reviews Appendix 5 – Example/model reports Appendix 6 – False Positive Data Analysis FORMATTING YOUR REPORT Before you start Grammar and Tense FORMATTING Data v Crap! Qualitative v Quantitative data „Googling‟ How to search online Referencing How to cite reference within your text Bibliography How to write a scientific bibliography Use past tense, third person when writing your report…. e.g. “The research into the corrosion of metals was performed to see if …..” not “We did the experiment to see if….” FORMATTING “It
    [Show full text]
  • Documentation for Licenses
    Documentation for Licenses Table of Contents Page 2 of 41 Table of Contents Table of Contents 2 Licenses 5 EULA - OpenKM End User License Agreement 7 0. DEFINITIONS 7 1. SCOPE OF AGREEMENT 7 1.1 Software and Support 7 1.2. Business Partners. 8 2. REPORTING AND RECORDS 8 2.1 Reporting 8 2.2 Records Retention 8 3. LICENSE AND OWNERSHIP 8 3.1 Grant to User 8 3.2 Restrictions 9 3.3 Proprietary Rights 9 3.4 Company's responsibility for End Users 10 3.5 Fees and Payment 10 3.6 License fee 10 4. TERM AND TERMINATION 10 4.1 Term and Termination of Agreement 10 4.2 Survival 10 5. CONFIDENTIALITY 10 5.1 Confidential Information 11 6. REPRESENTATIONS AND WARRANTIES 11 6.1 General Representations and Warranties. 11 6.2 Disclaimer of Warranty 11 6.3 INFRINGEMENT 12 7. LIMITATION OF LIABILITY AND DISCLAIMER OF DAMAGES 12 7.1 Disclaimer of Damages 12 7.2 Limitation of Liability 12 7.3 Disclarimer of any warranty 13 8. INDEMNIFICATION 13 8.1 Defense 13 8.2 Injunctive Relief 14 8.3 Exclusions 14 9. GENERAL 14 9.1 Notices 14 9.2 Compliance with Applicable Laws 15 9.3 Entire Agreement. 15 9.4 Force Majeure 15 9.5 Severability/Waiver 15 9.6 Dispute Resolution. 15 9.7 Headings 15 9.8 Amendment. 15 10 COPYRIGHT 16 11 MERGER OR INTEGRATION 16 12 TRANSFER OF LICENSE 16 13 LIMITATIONS ON USING, COPYING, AND MODIFYING THE SOFTWARE 16 14 DECOMPILING, DISASSEMBLING, OR REVERSE ENGINEERING 16 15 SOFTWARE MAINTENANCE 17 16 PUBLICITY RIGHTS 17 17.
    [Show full text]