DP.10.0.16-Centos-6.4-RPM-List

Total Page:16

File Type:pdf, Size:1020Kb

DP.10.0.16-Centos-6.4-RPM-List Source RPM files for all components can be found at: http://vault.centos.org/6.4/ Name : gnome-packagekit Relocations: (not relocatable) Version : 2.28.3 Vendor: CentOS Release : 7.el6 Build Date: Thu 21 Feb 2013 02:41:04 PM EST Install Date: Tue 06 Aug 2013 05:22:54 PM EDT Build Host: c6b9.bsys.dev.centos.org Group : Applications/System Source RPM: gnome-packagekit-2.28.3-7.el6.src.rpm Size : 8250365 License: GPLv2+ Signature : RSA/SHA1, Sat 23 Feb 2013 12:41:53 PM EST, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.packagekit.org Summary : Session applications to manage packages Description : gnome-packagekit provides session applications for the PackageKit API. There are several utilities designed for installing, updating and removing packages on your system. Name : libXpm Relocations: (not relocatable) Version : 3.5.10 Vendor: CentOS Release : 2.el6 Build Date: Thu 21 Feb 2013 02:07:51 PM EST Install Date: Tue 06 Aug 2013 05:18:14 PM EDT Build Host: c6b9.bsys.dev.centos.org Group : System Environment/Libraries Source RPM: libXpm-3.5.10-2.el6.src.rpm Size : 104511 License: MIT Signature : RSA/SHA1, Sat 23 Feb 2013 12:38:01 PM EST, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.x.org Summary : X.Org X11 libXpm runtime library Description : X.Org X11 libXpm runtime library Name : pycairo Relocations: (not relocatable) Version : 1.8.6 Vendor: CentOS Release : 2.1.el6 Build Date: Wed 18 Aug 2010 10:51:19 PM EDT Install Date: Tue 06 Aug 2013 05:20:33 PM EDT Build Host: c6b1.bsys.dev.centos.org Group : Development/Languages Source RPM: pycairo-1.8.6-2.1.el6.src.rpm Size : 423809 License: MPLv1.1 or LGPLv2 Signature : RSA/8, Sun 03 Jul 2011 12:58:09 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://cairographics.org/pycairo Summary : Python bindings for the cairo library Description : Python bindings for the cairo library. Name : xml-common Relocations: (not relocatable) Version : 0.6.3 Vendor: CentOS Release : 32.el6 Build Date: Thu 11 Nov 2010 02:34:28 PM EST Install Date: Tue 06 Aug 2013 05:17:11 PM EDT Build Host: c6b4.bsys.dev.centos.org Group : Applications/Text Source RPM: sgml-common-0.6.3-32.el6.src.rpm Size : 1055 License: GPL+ Signature : RSA/8, Sun 03 Jul 2011 12:53:36 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.w3.org/2003/entities/ Summary : Common XML catalog and DTD files Page 1 Description : The xml-common is a subpackage of sgml-common which contains a collection XML catalogs that are useful for processing XML, but that don't need to be included in main package. Name : openssh-server Relocations: (not relocatable) Version : 5.3p1 Vendor: CentOS Release : 84.1.el6 Build Date: Thu 21 Feb 2013 10:51:49 PM EST Install Date: Tue 06 Aug 2013 05:23:01 PM EDT Build Host: c6b9.bsys.dev.centos.org Group : System Environment/Daemons Source RPM: openssh-5.3p1-84.1.el6.src.rpm Size : 667631 License: BSD Signature : RSA/SHA1, Sat 23 Feb 2013 12:40:05 PM EST, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.openssh.com/portable.html Summary : An open source SSH server daemon Description : OpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains the secure shell daemon (sshd). The sshd daemon allows SSH clients to securely connect to your SSH server. Name : libgphoto2 Relocations: (not relocatable) Version : 2.4.7 Vendor: CentOS Release : 4.el6 Build Date: Thu 11 Nov 2010 12:10:55 PM EST Install Date: Tue 06 Aug 2013 05:18:16 PM EDT Build Host: c6b5.bsys.dev.centos.org Group : Development/Libraries Source RPM: libgphoto2-2.4.7-4.el6.src.rpm Size : 4522998 License: GPLv2+ and GPLv2 and LGPLv2+ Signature : RSA/8, Sun 03 Jul 2011 12:34:49 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.gphoto.org/ Summary : Library for accessing digital cameras Description : libgphoto2 is a library that can be used by applications to access various digital cameras. libgphoto2 itself is not a GUI application, opposed to gphoto. There are GUI frontends for the gphoto2 library, however, such as gtkam for example. Name : python-slip Relocations: (not relocatable) Version : 0.2.20 Vendor: CentOS Release : 1.el6_2 Build Date: Mon 26 Mar 2012 09:03:16 AM EDT Install Date: Tue 06 Aug 2013 05:20:35 PM EDT Build Host: c6b5.bsys.dev.centos.org Group : System Environment/Libraries Source RPM: python-slip-0.2.20-1.el6_2.src.rpm Size : 56037 License: GPLv2+ Signature : RSA/SHA1, Mon 26 Mar 2012 09:36:32 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://fedorahosted.org/python-slip Summary : Miscellaneous convenience, extension and workaround code for Python Description : The Simple Library for Python packages contain miscellaneous code for convenience, extension and workaround purposes. This package provides the "slip" and the "slip.util" modules. Name : paktype-fonts-common Relocations: (not relocatable) Version : 2.0 Vendor: CentOS Page 2 Release : 8.el6 Build Date: Tue 24 Aug 2010 08:33:49 PM EDT Install Date: Tue 06 Aug 2013 05:17:13 PM EDT Build Host: c6b2.bsys.dev.centos.org Group : User Interface/X Source RPM: paktype-fonts-2.0-8.el6.src.rpm Size : 28567 License: GPLv2 with exceptions Signature : RSA/8, Sun 03 Jul 2011 12:36:22 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : https://sourceforge.net/projects/paktype/ Summary : Common files for paktype-fonts Description : The paktype-fonts package contains fonts for the display of Arabic from the PakType by Lateef Sagar. Name : b43-openfwwf Relocations: (not relocatable) Version : 5.2 Vendor: CentOS Release : 4.el6 Build Date: Wed 10 Nov 2010 08:00:52 PM EST Install Date: Tue 06 Aug 2013 05:23:03 PM EDT Build Host: c6b1.bsys.dev.centos.org Group : System Environment/Kernel Source RPM: b43-openfwwf-5.2-4.el6.src.rpm Size : 31549 License: GPLv2 Signature : RSA/8, Sun 03 Jul 2011 12:00:38 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.ing.unibs.it/openfwwf/ Summary : Open firmware for some Broadcom 43xx series WLAN chips Description : Open firmware for some Broadcom 43xx series WLAN chips. Currently supported models are 4306, 4311(rev1), 4318 and 4320. Name : m17n-db-bengali Relocations: (not relocatable) Version : 1.5.5 Vendor: CentOS Release : 1.1.el6 Build Date: Thu 19 Aug 2010 02:00:34 AM EDT Install Date: Tue 06 Aug 2013 05:18:17 PM EDT Build Host: c6b3.bsys.dev.centos.org Group : System Environment/Libraries Source RPM: m17n-db-1.5.5-1.1.el6.src.rpm Size : 6826 License: LGPLv2+ Signature : RSA/8, Sun 03 Jul 2011 12:29:01 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.m17n.org/m17n-lib/index.html Summary : m17n-db input maps for Bengali Description : This package contains m17n-db input maps for Bengali. Name : gnome-python2-extras Relocations: (not relocatable) Version : 2.25.3 Vendor: CentOS Release : 20.el6 Build Date: Thu 11 Nov 2010 06:53:06 AM EST Install Date: Tue 06 Aug 2013 05:20:37 PM EDT Build Host: c6b1.bsys.dev.centos.org Group : Development/Languages Source RPM: gnome-python2-extras-2.25.3-20.el6.src.rpm Size : 68392 License: GPLv2+ and LGPLv2+ Signature : RSA/8, Sun 03 Jul 2011 12:18:31 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.pygtk.org/ Summary : Additional PyGNOME Python extension modules Description : The gnome-python-extra package contains the source packages for additional Page 3 Python bindings for GNOME. It should be used together with gnome-python. Name : thai-scalable-fonts-common Relocations: (not relocatable) Version : 0.4.12 Vendor: CentOS Release : 2.1.el6 Build Date: Thu 11 Nov 2010 09:33:51 AM EST Install Date: Tue 06 Aug 2013 05:17:17 PM EDT Build Host: c6b1.bsys.dev.centos.org Group : User Interface/X Source RPM: thai-scalable-fonts-0.4.12-2.1.el6.src.rpm Size : 11671 License: GPLv2+ Signature : RSA/8, Sun 03 Jul 2011 12:50:38 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://linux.thai.net/projects/thaifonts-scalable Summary : Common files of <NAME> Description : thaifonts-scalable provides a collection of free scalable Thai fonts. This package consists of files used by other thai-scalable-fonts packages. Name : vsftpd Relocations: (not relocatable) Version : 2.2.2 Vendor: CentOS Release : 11.el6_3.1 Build Date: Tue 19 Feb 2013 02:46:34 AM EST Install Date: Tue 06 Aug 2013 05:23:06 PM EDT Build Host: c6b10.bsys.dev.centos.org Group : System Environment/Daemons Source RPM: vsftpd-2.2.2-11.el6_3.1.src.rpm Size : 339348 License: GPLv2 with exceptions Signature : RSA/SHA1, Tue 19 Feb 2013 06:07:00 AM EST, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://vsftpd.beasts.org/ Summary : Very Secure Ftp Daemon Description : vsftpd is a Very Secure FTP daemon. It was written completely from scratch. Name : m17n-db-kannada Relocations: (not relocatable) Version : 1.5.5 Vendor: CentOS Release : 1.1.el6 Build Date: Thu 19 Aug 2010 02:00:34 AM EDT Install Date: Tue 06 Aug 2013 05:18:17 PM EDT Build Host: c6b3.bsys.dev.centos.org Group : System Environment/Libraries Source RPM: m17n-db-1.5.5-1.1.el6.src.rpm Size : 7749 License: LGPLv2+ Signature : RSA/8, Sun 03 Jul 2011 12:29:13 AM EDT, Key ID 0946fca2c105b9de Packager : CentOS BuildSystem <http://bugs.centos.org> URL : http://www.m17n.org/m17n-lib/index.html Summary : m17n-db input maps for Kannada Description : This package contains m17n-db input maps for Kannada.
Recommended publications
  • Dockerdocker
    X86 Exagear Emulation • Android Gaming • Meta Package Installation Year Two Issue #14 Feb 2015 ODROIDMagazine DockerDocker OS Spotlight: Deploying ready-to-use Ubuntu Studio containers for running complex system environments • Interfacing ODROID-C1 with 16 Channel Relay Play with the Weather Board • ODROID-C1 Minimal Install • Device Configuration for Android Development • Remote Desktop using Guacamole What we stand for. We strive to symbolize the edge of technology, future, youth, humanity, and engineering. Our philosophy is based on Developers. And our efforts to keep close relationships with developers around the world. For that, you can always count on having the quality and sophistication that is the hallmark of our products. Simple, modern and distinctive. So you can have the best to accomplish everything you can dream of. We are now shipping the ODROID U3 devices to EU countries! Come and visit our online store to shop! Address: Max-Pollin-Straße 1 85104 Pförring Germany Telephone & Fax phone : +49 (0) 8403 / 920-920 email : [email protected] Our ODROID products can be found at http://bit.ly/1tXPXwe EDITORIAL ow that ODROID Magazine is in its second year, we’ve ex- panded into several social networks in order to make it Neasier for you to ask questions, suggest topics, send article submissions, and be notified whenever the latest issue has been posted. Check out our Google+ page at http://bit.ly/1D7ds9u, our Reddit forum at http://bit. ly/1DyClsP, and our Hardkernel subforum at http://bit.ly/1E66Tm6. If you’ve been following the recent Docker trends, you’ll be excited to find out about some of the pre-built Docker images available for the ODROID, detailed in the second part of our Docker series that began last month.
    [Show full text]
  • Using a Next Workstation As a Development Platform for Version 5 Sas Applications
    USING A NEXT WORKSTATION AS A DEVELOPMENT PLATFORM FOR VERSION 5 SAS APPLICATIONS Joseph E St Sauver, Office of University Computing, University of Oregon ABSTRACT Similarly. there is liUle sense in tieing up a PC for hours (or days) running a large statistical analysis when a sha.red SAS Institute has yet to announce any firm plans to port the mainframe will often have abundant horsepower to handle just SAS System* to NeXT* workstations. Nonetheless, a NeXT those sorts of CPU-intensive jobs. workstation can serve as an excellent platform for developing VAXNMS· (or other mainframe) SAS System code for remote The PC version of SAS atte~s to explott this philosophy by execution. giving the user the option of either processing SAS code locally using the SUBMIT command, or processing SAS code on a The combination of a strong windowing environment, display remote mainframe SAS host using the RSUBMIT command. In a PostScript support. a built-in athemet interlace and copious perfect world. this approach would allow the user to elect the slorage eapacny bundled on lOP of more-or-Iess BSD 4.3 UNIX" best mix of local and remote resources to achieve his or her make development of SAS System code on the NeXT for objectives in a timely and cost effective manner. remote execution on another mainframe quite easy. Unfortunately, in my experience, the happy symbiosis The author's experience with use of a NeXT as a remote code envisioned between the PC version of the SAS System and the development plaHorm for SAS and SAS/Graph" on a VAXNMS mainframe version of the SAS system often breaks down.
    [Show full text]
  • Sun Ultratm 5 Workstation Just the Facts
    Sun UltraTM 5 Workstation Just the Facts Copyrights 1999 Sun Microsystems, Inc. All Rights Reserved. Sun, Sun Microsystems, the Sun logo, Ultra, PGX, PGX24, Solaris, Sun Enterprise, SunClient, UltraComputing, Catalyst, SunPCi, OpenWindows, PGX32, VIS, Java, JDK, XGL, XIL, Java 3D, SunVTS, ShowMe, ShowMe TV, SunForum, Java WorkShop, Java Studio, AnswerBook, AnswerBook2, Sun Enterprise SyMON, Solstice, Solstice AutoClient, ShowMe How, SunCD, SunCD 2Plus, Sun StorEdge, SunButtons, SunDials, SunMicrophone, SunFDDI, SunLink, SunHSI, SunATM, SLC, ELC, IPC, IPX, SunSpectrum, JavaStation, SunSpectrum Platinum, SunSpectrum Gold, SunSpectrum Silver, SunSpectrum Bronze, SunVIP, SunSolve, and SunSolve EarlyNotifier are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. OpenGL is a registered trademark of Silicon Graphics, Inc. Display PostScript and PostScript are trademarks of Adobe Systems, Incorporated, which may be registered in certain jurisdictions. Netscape is a trademark of Netscape Communications Corporation. DLT is claimed as a trademark of Quantum Corporation in the United States and other countries. Just the Facts May 1999 Positioning The Sun UltraTM 5 Workstation Figure 1. The Ultra 5 workstation The Sun UltraTM 5 workstation is an entry-level workstation based upon the 333- and 360-MHz UltraSPARCTM-IIi processors. The Ultra 5 is Sun’s lowest-priced workstation, designed to meet the needs of price-sensitive and volume-purchase customers in the personal workstation market without sacrificing performance.
    [Show full text]
  • Java Web Application with Database Example
    Java Web Application With Database Example Amerindian Verne sheafs very spaciously while Torrence remains blond and suprasegmental. Udall herdialyses strappers her sayings underselling afore, too shouldered furtively? and disciplinal. Collins remains pigeon-hearted: she barbarises Java and with web delivered to tomcat using an application server successfully authenticated Our database like to databases because docker container environment. Service to mask the box Data JPA implementation. Here is one example application by all credits must create. Updates may also displays in web delivered right click next thing we are looking for creating accounts, please follow this example application depends on. In role based on gke app running directly click add constraint public web application example by a middleware between records in your application for more than other systems. This is maven in java web framework puts developer productivity and dispatches to learn more? Now we tie everything is web application example? This file and brief other dependency files are provided anytime a ZIP archive letter can be downloaded with force link provided at the hen of this tutorial. Confirming these three developers to let see also with database access, jstl to it returns the same infrastructure. What database web container takes care of java and examples. As applications with database support plans that connect to implement nested class names and infrastructure to display correctly set outo commit multiple user interface for. The wizard will ask you to select the schema and the tables of your database and allows you to select the users and groups tables, run related transactions, the last step is to create XML file and add all the mappings to it.
    [Show full text]
  • Monitoring Glacial Advance and Retreat of the Skaftafellsjökull Glacier, Iceland
    Monitoring Glacial Advance and Retreat of the Skaftafellsjökull Glacier, Iceland Bryce L. Carmichael Amber E. Smith Elizabeth City State University North Carolina Central University Abstract- Visual documentation of glaciers can provide package gPhoto2 was installed to the Linux board daily, seasonal, and yearly statistics concerning their [www.gphoto.org]. Next, we wrote a set of custom scripts advance and retreat, as well as contribute to historical that ran periodically to capture photographs and archive them. record. Recognizing how glaciers change will improve glacier models, which leads to a better understanding of An all-weather case for the camera had to be climate and ice-sheet interactions. Obtaining frequent constructed in order to provide the device with protection and images of glaciers can be difficult since they are often power when out in the field. The picture feedback was located in remote locations with rugged terrain and harsh required to have protection also, so silica packs were placed in weather conditions. Access can be arduous even during the case to prevent moisture build-up on the camera lens. warm weather months. To overcome this obstacle, we propose building an autonomous imaging device that is II. BACKGROUND powered by solar panels and can withstand the harsh weather. The imaging device will have the ability to The Center for Remote Sensing of Ice Sheets capture images of the glacier at specified times, store them (CReSIS) Science and Technology Center was established by for uploading, and send them over a radio link to an the National Science Foundation (NSF) in 2005. The Internet access point.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 Kernel Crypto
    FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 Kernel Crypto API Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-2.0.0 Date: December 7, 2018 Document Version 1.1 ©Oracle Corporation This document may be reproduced whole and intact including the Copyright notice. Title: Oracle Linux 7 Kernel Crypto API Cryptographic Module Security Policy December 07, 2018 Author: Atsec Information Security Contributing Authors: Oracle Linux Engineering Oracle Security Evaluations – Global Product Security Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright © 2018, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Oracle specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may reproduced or distributed whole and intact including this copyright notice. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Oracle Linux 7 Kernel Crypto API Cryptographic
    [Show full text]
  • Optical Character Recognition - a Combined ANN/HMM Approach
    Optical Character Recognition - A Combined ANN/HMM Approach Dissertation submitted to the Department of Computer Science Technical University of Kaiserslautern for the fulfillment of the requirements for the doctoral degree Doctor of Engineering (Dr.-Ing.) by Sheikh Faisal Rashid Dean: Prof. Dr. Klaus Schneider Thesis supervisors: Prof. Dr. Thomas Breuel, TU Kaiserslautern Prof. Dr. Andreas Dengel, TU Kaiserslautern Chair of supervisory committee: Prof. Dr. Karsten Berns, TU Kaiserslautern Kaiserslautern, 11 July, 2014 D 386 Abstract Optical character recognition (OCR) of machine printed text is ubiquitously considered as a solved problem. However, error free OCR of degraded (broken and merged) and noisy text is still challenging for modern OCR systems. OCR of degraded text with high accuracy is very important due to many applications in business, industry and large scale document digitization projects. This thesis presents a new OCR method for degraded text recognition by introducing a combined ANN/HMM OCR approach. The approach provides significantly better performance in comparison with state-of-the-art HMM based OCR methods and existing open source OCR systems. In addition, the thesis introduces novel applications of ANNs and HMMs for document image preprocessing and recognition of low resolution text. Furthermore, the thesis provides psychophysical experiments to determine the effect of letter permutation in visual word recognition of Latin and Cursive script languages. HMMs and ANNs are widely employed pattern recognition paradigms and have been used in numerous pattern classification problems. This work presents a simple and novel method for combining the HMMs and ANNs in application to segmentation free OCR of degraded text. HMMs and ANNs are powerful pattern recognition strategies and their combination is interesting to improve current state-of-the-art research in OCR.
    [Show full text]
  • Attacking AJAX Web Applications Vulns 2.0 for Web 2.0
    Attacking AJAX Web Applications Vulns 2.0 for Web 2.0 Alex Stamos Zane Lackey [email protected] [email protected] Blackhat Japan October 5, 2006 Information Security Partners, LLC iSECPartners.com Information Security Partners, LLC www.isecpartners.com Agenda • Introduction – Who are we? – Why care about AJAX? • How does AJAX change Web Attacks? • AJAX Background and Technologies • Attacks Against AJAX – Discovery and Method Manipulation – XSS – Cross-Site Request Forgery • Security of Popular Frameworks – Microsoft ATLAS – Google GWT –Java DWR • Q&A 2 Information Security Partners, LLC www.isecpartners.com Introduction • Who are we? – Consultants for iSEC Partners – Application security consultants and researchers – Based in San Francisco • Why listen to this talk? – New technologies are making web app security much more complicated • This is obvious to anybody who reads the paper – MySpace – Yahoo – Worming of XSS – Our Goals for what you should walk away with: • Basic understanding of AJAX and different AJAX technologies • Knowledge of how AJAX changes web attacks • In-depth knowledge on XSS and XSRF in AJAX • An opinion on whether you can trust your AJAX framework to “take care of security” 3 Information Security Partners, LLC www.isecpartners.com Shameless Plug Slide • Special Thanks to: – Scott Stender, Jesse Burns, and Brad Hill of iSEC Partners – Amit Klein and Jeremiah Grossman for doing great work in this area – Rich Cannings at Google • Books by iSECer Himanshu Dwivedi – Securing Storage – Hackers’ Challenge 3 • We are
    [Show full text]
  • Vnote Documentation Release 1.11.1
    VNote Documentation Release 1.11.1 Le Tan Feb 13, 2019 User Documentation 1 Why VNote 3 1.1 What is VNote..............................................3 1.2 Why Another Markdown Wheel.....................................3 2 Getting Started 5 2.1 Main Interface..............................................5 2.2 Ready To Go...............................................7 3 Build VNote 9 3.1 Get the Source Code of VNote......................................9 3.2 Get Qt 5.9................................................9 3.3 Windows.................................................9 3.4 Linux...................................................9 3.5 MacOS.................................................. 10 4 Notes Management 13 4.1 Notebook................................................. 13 4.2 Folders.................................................. 14 4.3 Notes................................................... 14 5 Snippet 15 5.1 Snippet Management........................................... 15 5.2 Define A Snippet............................................. 16 5.3 Apply A Snippet............................................. 16 5.4 Examples................................................. 16 6 Magic Word 19 6.1 Built-In Magic Words.......................................... 19 6.2 Custom Magic Words.......................................... 20 6.3 Magic Word In Snippet.......................................... 21 7 Template 23 8 Themes and Styles 25 8.1 Themes.................................................. 25 8.2 Editor Styles..............................................
    [Show full text]
  • IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011)
    IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Shangri-La Hotel Chiang Mai, Thailand IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Chiang Mai, Thailand We wish to thank our sponsors Gold Sponsors www.google.com www.baidu.com The Office of Naval Research (ONR) Department of Systems Engineering and The Asian Office of Aerospace Research and Devel- Engineering Managment, The Chinese Uni- opment (AOARD) versity of Hong Kong Silver Sponsors Microsoft Corporation Bronze Sponsors Chinese and Oriental Languages Information Processing Society (COLIPS) Supporter Thailand Convention and Exhibition Bureau (TCEB) We wish to thank our sponsors Organizers Asian Federation of Natural Language National Electronics and Computer Technolo- Processing (AFNLP) gy Center (NECTEC), Thailand Sirindhorn International Institute of Technology Rajamangala University of Technology Lanna (SIIT), Thailand (RMUTL), Thailand Chiang Mai University (CMU), Thailand Maejo University, Thailand c 2011 Asian Federation of Natural Language Proceesing vii Preface Welcome to the IJCNLP Workshop on Advances in Text Input Methods (WTIM 2011)! Methods of text input have entered a new era. The number of people who have access to computers and mobile devices is skyrocketing in regions where people do not have a convenient method of inputting their native language. It has also become commonplace to input text not through a keyboard but through different modes such as voice and handwriting recognition. Even when people input text using a keyboard, it is done differently from only a few years ago – adaptive software keyboards, word auto- completion and prediction, and spell correction are just a few examples of such recent changes in text input experience.
    [Show full text]
  • Namespacing in Selinux
    Namespacing in SELinux Linux.conf.au 2018 Sydney, Australia James Morris [email protected] Introduction ● Who am I? – Linux security subsystem maintainer ● Previously: Crypto API, Netfilter, SELinux, LSM, IPSec, MCS, sVirt ● Recovering manager ● blog.namei.org ● @xjamesmorris ● Overview – Briefly review technologies – Discuss requirements – SELinux namespace prototype – Current work: inode labeling – Future work SELinux ● Label-based mandatory access control (MAC) – Set security labels on: ● Subjects ● Objects – Define permissions – Centrally managed policy – Enforced by kernel ● Generalized ● Separation of policy and mechanism Linux Security Modules (LSM) ● Kernel API for access control ● Hooks – Located at security decision points – All security relevant information available – Race-free ● Kind of like Netfilter but for the whole kernel ● Pluggable: Smack, SELinux, AppArmor etc. Linux Namespaces ● Private views of global resources – mount, network, ipc, pid, user, uts, cgroup ● APIs: clone(2), setns(2), unshare(2) ● See also: pam_namespace(8) ● Uses: – Sandboxes – Containers – Multi-level security (!) ● No namespacing of LSM or other security APIs Containers ● Not a Thing ™ ● Actually namespaces + cgroups + magic – Docker, lxc, lxd etc. ● Very popular ● Kernel security APIs not containerized, e.g. – Limits functionality for OS-like containers – SELinux on Fedora-based distros pretends to be disabled inside container, and yet … ! Use Cases ● Enable SELinux confinement within a container – Currently runs as one global label and appears
    [Show full text]
  • Reference / Forgerock Identity Cloud 7.2
    Reference / ForgeRock Identity Cloud 7.2 Latest update: 7.1.0 ForgeRock AS. 201 Mission St., Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright © 2011-2021 ForgeRock AS. Abstract Reference documentation for ForgeRock® Identity Cloud (Identity Cloud). ForgeRock Identity Cloud provides intelligent authentication, authorization, federation, and single sign-on functionality. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. © Copyright 2010–2020 ForgeRock, Inc. All rights reserved. ForgeRock is a registered trademark of ForgeRock, Inc. Other marks appearing herein may be trademarks of their respective owners. This product or document is protected by copyright and distributed under licenses restricting its use, copying, and distribution. No part of this product or document may be reproduced in any form by any means without prior written authorization of ForgeRock and its licensors, if any. DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESSED OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. DejaVu Fonts Bitstream Vera Fonts Copyright Copyright (c) 2003 by Bitstream,
    [Show full text]