Amateur Computer Group of New Jersey NEWS Volume 34, Number 12 December 2009

Total Page:16

File Type:pdf, Size:1020Kb

Amateur Computer Group of New Jersey NEWS Volume 34, Number 12 December 2009 Amateur Computer Group of New Jersey NEWS Volume 34, Number 12 December 2009 It’s Election Time Again Here are the Nominating Committee’s candidates for the December elections: Officers President ························Paul Syers Vice-President················ Evan Williams Secretary ·······················Seery Syers Treasurer ················· Malthi Masurekar Directors (through 2011) ······················Gregg McCarthy ·······················Arnold Milstein Voting for Officers and Board Members will take place at the December Main Meeting on ····························John Raff December 4. ··························BobHawes Plan on being there to cast your vote! As usual, elections will be held at the Main Meeting on December 5. Nominations will be accepted from the floor until the actual voting begins, and yes, you can nominate yourself. : http://www.acgnj.org Founded 1975 In This Issue Wrap It Up, Bob Hawes ...................3 DealsGuy, Bob Click .....................8 The Best Things in Life are Free, Lou Torraca......10 TheComputer as Crime Scene, Michael Gemignani...12 Book: Speed It Up, Gordon Strickland ..........13 SIGNews, .........................14 Foxit Reader, Sharon Walbran ..............15 Guru Corner, ........................16 June 2008 ACGNJ News Page 1 The Egg and You, Charles W Evans............18 Officers, Directors and Leaders Officers Board of Directors President Mike Redlich (908) 246-0410 Director Emeritus Sol Libes (609) 520-9024 Vice President Paul Syers Through 2009 Gregg McCarthy Treasurer Malthi Masurekar (732) 560-1534 Arnold Milstein (908) 753-8036 Secretary Mark Douches (908) 889-2366 John Raff (973) 992-9002 Past President Evan Williams (908) 359-8070 Bob Hawes Through 2010 David McRitchie Special Interest Groups Don McBride (732) 560-0369 C Languages Bruce Arnold (908) 735-7898 Bill Farrell (732) 572-3481 Firefox Activity David McRitchie Lenny Thomas Genealogy Frank Warren (908) 756-1681 Standing Committees Investing Jim Cooper APCUG Rep. Frank Warren (908) 756-1681 Java Michael Redlich (908) 537-4915 Facilities John Raff (973) 992-9002 Layman’s Forum Matthew Skoda (908) 359-8842 Financial Mark Douches (908) 889-2366 LUNICS Andreas Meyer Historian Lenny Thomas NJ Gamers Gregg McCarthy Membership Mark Douches (908) 889-2366 VBA & Excel James Ditaranto (201) 986-1104 Newsletter Bob Hawes Web Dev Evan Williams (908) 359-8070 Trenton ComputerFest Mike Redlich (908) 246-0410 Window Pains John Raff (973) 992-9002 Vendor Liaison Arnold Milstein (908) 753-8036 Webmaster John Raff (973) 992-9002 ACGNJ News Editor E-Mail Addresses Barbara DeGroot 145 Gun Club Road Here are the e-mail addresses of ACGNJ Officers, Directors and SIG Leaders (and Palmerton PA 18071 the Newsletter Editor). This list is also at Tel: (570) 606-3596 (http://www.acgnj.org/officers.html). [email protected] Bruce Arnold [email protected] Jim Cooper [email protected] Barbara DeGroot [email protected] ACGNJ News is published by the Ama- Advertising: Non-commercial announce- Mark Douches [email protected] teur Computer Group of New Jersey, In- ments from members are free. Commercial David Eisen [email protected] corporated (ACGNJ), PO Box 135, Scotch ads 15 cents per word, $5 minimum. Camera Plains NJ 07076. ACGNJ, a non-profit ed- ready display ads: Full page (7 x 10 inches) Bill Farrell [email protected] ucational corporation, is an independent $150, two-thirds page (4½ x 10) $115, Manuel Goyenechea [email protected] computer user group. Opinions expressed half-page $85, one-third $57, quarter $50, herein are solely those of the individual au- eighth $30. Discount 10% on 3 or more con- Bob Hawes [email protected] thor or editor. This publication is Copy- secutive insertions. Enclose payment. Sol Libes [email protected] right © 2009 by the Amateur Computer Malthi Masurekar [email protected] Group of New Jersey, Inc., all rights re- Publication Exchange: Other computer served. Permission to reprint with ap- user groups are invited to send a subscription Don McBride [email protected] propriate credit is hereby given to to ACGNJ at the address below. We will re- Gregg McCarthy [email protected] spond in kind. non-profit organizations. David McRichie [email protected] Address Changes should be emailed to Andreas Meyer [email protected] Submissions: Articles, reviews, cartoons, [email protected] or sent to ACGNJ at illustrations. Most common formats are ac- Arnold Milstein [email protected] ceptable. Graphics embedded in the docu- the address below. ment must also be included as separate Membership, including subscription: 1 year John Raff [email protected] files. Fax or mail hard copy and/or disk to $25, 2 years $40, 3 years $55. Additional Mike Redlich [email protected] editor; OR e-mail to Editor. Always con- family members: $10 each per year. Student : Matt Skoda [email protected] firm. Date review and include name of 1 year $20. Senior citizen (over 65) 1 year word processor used, your name, address $20, 3 years $45. Send your name, address Keith Sproul [email protected] and phone and name, address and phone of and payment to ACGNJ, PO Box 135, Scotch Paul Syers [email protected] manufacturer, if available. Plains NJ 07076. Lenny Thomas lenny.thomas@acgnj. org Tips for reviewers: Why does anyone Typographic Note: The ACGNJ News is Scott Vincent [email protected] need it? Why did you like it or hate it? Ease produced using Corel Ventura 5. Font fami- (or difficulty) of installation, learning and lies used are Times New Roman (TT) for Frank Warren [email protected] use. Would you pay for it? body text, Arial (TT) for headlines. Evan Williams [email protected] Page 2 ACGNJ News December 2009 Wrap It Up Robert Hawes ([email protected]) I thought about using the title “Wrap It Up and Stick a Big Knowing how I feel about Microsoft, you might reasonably Red Bow on Top of It”; but that was a bit long, and it didn’t ask; “Why keep using Hotmail”? Well, inertia and familiar- “sound” quite right, either. Normally, this article would ity, mostly. I’ve had multiple Hotmail accounts for a long have been my “year-end wrap-up”. Indeed, 2009 was a par- time, and I know exactly how to use them. Even as we ticularly eventful year, full of recap-worthy stuff; but I’ve speak, though, a group of college students is designing a still got material that was postponed from my October and new, state-of-the-art Internet database for us. When it’s November articles. So we’ll cover those topics now, and done, I’ll be using it to generate my monthly e-mail address put off my annual wrap-up until next time. However, it is list, rather than my existing contact spreadsheet. Then, the Winter Solstice season; and what says “holiday cheer” Hotmail bites the dust. better than taking a dig at Microsoft? Instead of lowering FSArchiver our spirits by citing one of their numerous deeds of actual evil, though, I’ll just mention something that’s really, really Now, let’s get down to business. As Elmer Fudd might say; stupid. “Be vewwy, vewwy quiet. I’m testing dwive imaging pwogwams”. In Something Spooky? (two months ago, in the For the last year and a half, I’ve been sending out monthly October 2009 issue of ACGNJ News), I began this series by e-mail messages from one of my Hotmail accounts, an- testing the Linux programs Clonezilla and Partimage. Then, nouncing our two speakers for each month, and containing in New Blood (in our November issue), I tested Image for a link to our current newsletter. Those who read last DOS (IFD from now on) and Image for Linux. (All previ- month’s message all the way to the end would have seen ous results will be repeated in my conclusions below). this message: “Hotmail: Trusted email with Microsoft’s Usually, I’d tie up my leftover loose ends involving IFD powerful SPAM protection. Sign up now”. Now, I didn’t first; but this time, we’ll start out with the Linux program put that there. Microsoft did. That’s right! Microsoft sent FSArchiver (FSA from now on) instead. It’s been quietly out SPAM advertising their anti-SPAM feature. Obviously, and patiently “waiting in the wings” for the past two this feature just flat out doesn’t work. (If it did, it would months; and what’s more, it comes first alphabetically. In have erased that message). actuality, I tested both FSA and IFD two months ago, Continued above right Continued below left before I had to bump them. Last month, as mentioned in came up with a terminal window already open; but I wasn’t New Blood, IFD issued an upgrade, so I had to re-do all of quite ready to use it yet. First, from the graphic menu, I ran its tests. This month, both FSA and IFD posted updated GParted (the Gnome Partition Editor) to confirm that my versions on the web. Thus, I had to download those new re- source hard disk had come in as sda, and that my destina- leases, then re-do my tests for each program. (Luckily, all tion hard disk was sdb, with its single partition designated of my Image for Linux tests and the vast majority of my sdb1. (I just had a Halloween flashback. GParted, departed. IFD tests had already been published in our last issue, so I Get it? Well, I think it’s funny). Then, I entered the same only had to repeat the IFD test that was held over). commands as before; but in the terminal window this time: Before we begin, I’d like to make a note about re-booting: I mkdir /mnt/dest did it a lot! However, to save space and to be less boring, mount /dev/sdb1 /mnt/dest I’ve usually skipped saying so.
Recommended publications
  • Netinfo 2009-06-11 Netinfo 2009-06-11
    Netinfo 2009-06-11 Netinfo 2009-06-11 Microsoft släppte 2009-06-09 tio uppdateringar som täpper till 31 stycken säkerhetshål i bland annat Windows, Internet Explorer, Word, Excel, Windows Search. 18 av buggfixarna är märkta som kritiska och elva av dem är märkta som viktiga, uppdateringarna finns för både servrar och arbetsstationer. Säkerhetsuppdateringarna finns tillgängliga på Windows Update. Den viktigaste säkerhetsuppdateringen av de som släpptes är den för Internet Explorer 8. Netinfo 2009-06-11 Security Updates available for Adobe Reader and Acrobat Release date: June 9, 2009 Affected software versions Adobe Reader 9.1.1 and earlier versions Adobe Acrobat Standard, Pro, and Pro Extended 9.1.1 and earlier versions Severity rating Adobe categorizes this as a critical update and recommends that users apply the update for their product installations. These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Netinfo 2009-06-11 SystemRescueCd Description: SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your system and recovering your data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It contains a lot of system tools (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It is very easy to use: just boot the CDROM. The kernel supports most of the important file systems (ext2/ext3/ext4, reiserfs, reiser4, btrfs, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs).
    [Show full text]
  • System Rescue CD Als Rettungs-Stick
    PRAXIS SYSTEM-RESCUE-STICK System Rescue CD als Rettungs-Stick Die System Rescue CD 2.2.0 macht Ihren USB-Stick zum universellen Datenretter. Nach einem System-Crash sichert der Stick wichtige Dateien noch auf CD, USB-Festplatte oder einen FTP-Speicher. ie System Rescue CD 2.2.0 ist Das HP-Tool erkennt automatisch ei- D eine auf Linux basierende nen angesteckten USB-Stick und Notfall-CD (kos tenlos, www.sysresc zeigt ihn unter “Device“ an. Falls er cd.org und auf ). Das kompakte nicht automatisch erscheint, dann Rettungssystem lässt sich in wenigen wählen Sie ihn im Auswahlmenü ma- Minuten auf einem bootfähigen nuell aus. Anschliessend aktivieren USB-Stick installieren, enthält zahl- Sie bei “File system“ das Dateisystem reiche Rettungs-Tools und sichert “FAT32“. Deaktivieren Sie alle “For- wichtige Daten auf beliebigen mat options“ und beginnen Sie dann Speichermedien (Bild A). die Formatierung des Sticks mit “Start, Ja“. Rettungs-Stick erstellen Tipp: Wenn Sie einen U3-Stick ver- wenden wollen, dann entfernen Sie Ein komfortables Windows-Tool führt zuvor den U3-Launcher mit dem Tool Sie Schritt für Schritt durch die Konfi- U3 Launchpad Removal (kostenlos, guration und Installation Ihres Sys - http://u3.sandisk.com und auf ). tem-Rescue-Sticks. System Rescue CD 2.2.0: Die Rettungs-CD mit grafischer Oberfläche bootet auch USB-Installer starten USB-Stick vorbereiten vom USB-Stick (Bild A) Die Installation der System Rescue Sichern Sie zunächst alle Daten Ihres CD 2.2.0 auf einem USB-Stick über- USB-Sticks, da diese sonst während der For- Support/SoftwareDescription.jsp?swItem=ob- nimmt der System Rescue CD USB Installer matierung des Datenträgers verloren gehen.
    [Show full text]
  • Linux Shell Scripting Cookbook Second Edition
    Linux Shell Scripting Cookbook Second Edition Over 110 practical recipes to solve real-world shell problems, guaranteed to make you wonder how you ever lived without them Shantanu Tushar Sarath Lakshman BIRMINGHAM - MUMBAI Linux Shell Scripting Cookbook Second Edition Copyright © 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: January 2011 Second edition: May 2013 Production Reference: 1140513 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78216-274-2 www.packtpub.com Cover Image by Parag Kadam ([email protected]) Credits Authors Project Coordinator Shantanu Tushar Shiksha Chaturvedi Sarath Lakshman Proofreader Reviewers Linda Morris Rajeshwari K. John C. Kennedy Indexer Hemangini Bari Anil Kumar Sudhendu Kumar Production Coordinator Aravind SV Shantanu Zagade Acquisition Editor Cover Work Kartikey Pandey Shantanu Zagade Lead Technical Editor Ankita Shashi Technical Editors Jalasha D'costa Amit Ramadas Lubna Shaikh About the Authors Shantanu Tushar is an advanced GNU/Linux user since his college days.
    [Show full text]
  • Disk Imaging Technologies
    Disk Imaging Technologies Backup and Restoration Challenges Topics • Manufacture Firmware Changes • File System Landscape – UEFI – Introduction to GUID Partition Table (GPT) – Partitions & Limitations • Imaging Utilities Windows & Linux • Full Disk Encryption • Source Web-Links Manufacture Firmware Changes • Industry push to a new standard: – BIOS vs. UEFI • UEFI is to replace and extend the old BIOS firmware. • UEFI is not a new thing. Intel has been working in EFI/UEFI since mid 1990s, and there are vendors like HP or Apple that provided EFI machines since a long time ago. But it is when Microsoft announced Windows 8 that UEFI became the required way to boot the new certified machines. • Secure boot is an extension of UEFI. One of the key points of UEFI is that it can be extended. UEFI has an internal virtual machine that is independent of the architecture that it is using. The standard accepts special binary files compiled for this virtual machine (EFI binaries) that can be executed inside the environment. These binaries can be device drivers, applications or extensions to the UEFI standard. UEFI, in some sense, is like a small operative system that runs when the machine is powered on and whose main task is to find and load another operating system. Unified Extensible Firmware Interface Unified Extensible Firmware Interface (UEFI) is meant as a replacement for the Basic Input/Output System (BIOS) firmware interface ● Initially (1998) designed by Intel for Itanium processor ● Since 2005 managed by the Unified EFI Forum (uefi.org) Source: http://loadays.org/archives/2013/static/slides/Integrating-UEFI-into-rear.pdf Why UEFI? • BIOS has its (aging) limitations – 16-bit processes – max.
    [Show full text]
  • The Ultimate Guide to Hard Drive Partitioning
    Home SQL Server Cloud Computing Windows Server Cisco Exchange Windows 7 Active Directory Virtualization Forums IT Job Board Get Our FREE Newsletter! Search Site Gain access to white The Ultimate Guide to Hard Drive Partitioning papers, special offers and by Daniel Petri - March 11, 2009 the most recent IT tips! Printer Friendly Version Sponsors Email Address Disk partitioning divides the data storage space of a hard disk into separate areas referred to as Sign Up Now! Windows Application 'partitions'. Partitions are usually created when the hard disk is first being prepared for usage. Once a Monitoring Made Easy disk is divided into partitions, directories and files may be stored on them. Because of later changes on Quick Links the computer and operating system, often an administrator or power user will be faced with the need to Knowledge Base resize partitions, create new partitions in the unallocated space, and sometimes even undelete Take the guesswork out of Backup & Storage partitions that were previously removed or deleted. which WMI counters to use Security for apps like Microsoft® Active Directory Active Directory™ and Cisco and Routing Hard disk partitioning tools will allow you to create additional partitions from existing ones by resizing SharePoint™. SolarWinds Windows Networking FREE WMI Monitor makes it Exchange Server the existing partitions and creating empty, un-used space on which you can create new partitions. The easy! Download this FREE Virtualization desktop tool now! Windows Server 2008 most important aspect of such tools is their ability to do this without losing your data that is currently on Windows 7 your existing partitions.
    [Show full text]
  • Disk Cloning Image Cloning
    Disk Cloning Image Cloning Clone a disk or partition to a file Best image tools will backup only data sections of the disk Compression is a handy feature Live backups are available but I don't recommend this. Image Cloning FSArchiver 0.23 NTFS, EXT2/3/4, xfs, jfs filesystems support (FAT, HFS & UFS not supported). Compression is fast utilising multiple threads. corrupt image recovery Image Cloning FSArchiver Create a backup $ net-setup eth1 $ mount.cifs //server/public /mnt -o user=<my user> $ time fsarchiver savefs -z 1 -v /mnt/archive_name.fsa /dev/sda1 Restore a backup $ net-setup eth1 $ mount.cifs //server/public /mnt -o user=<my user> Use gparted to format beforehand. $ time fsarchiver restfs -v /mnt/archive_name.fsa id=0,dest=/dev/sda1 Image Cloning Image cloning is a bit of a multi step process Image Cloning FSArchiver Pros Fast Good compression Encryption options Good filesystem support Cons No support for UFS (BSD systems) Two step process to clone a drive. Partition Cloning Clone just part of the disk Partition Cloning Copy just a partition and only the data on that partition. This is the preferred cloning technique. This is what the popular proprietary software packages like 'Ghost' perform. Partition Cloning gparted - http://gparted.sourceforge.net/ Installed as default on Ubuntu & used in it's setup. To use this for cloning a system disk use a live cd. GUI driven Many other abilities. Partition Cloning gparted - http://gparted.sourceforge.net/ Pros Support for EXT4, UFS, HFS, NTFS and some more exotic filesystems like XFS Easy to use Can resize most partitions (no shrinking for UFS).
    [Show full text]
  • A Novel Massive Deployment Solution Based on the Peer-To-Peer Protocol
    applied sciences Article A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol Steven J. H. Shiau 1,2,*, Yu-Chiang Huang 3, Ching-Hsuan Yen 3, Yu-Chin Tsai 2, Chen-Kai Sun 2, Jer-Nan Juang 1, Chi-Yo Huang 4,*, Ching-Chun Huang 5 and Shih-Kun Huang 3 1 Department of Engineering Science, National Cheng Kung University, No.1, University Road, Tainan City 701, Taiwan; [email protected] 2 National Center for High-performance Computing, No. 7, R&D Rd. VI, Hsinchu 30076, Taiwan; [email protected] (Y.-C.T.); [email protected] (C.-K.S.) 3 Department of Computer Science, National Chiao Tung University, Hsinchu 300, Taiwan; [email protected] (Y.-C.H.); [email protected] (C.-H.Y.); [email protected] (S.-K.H.) 4 Department of Industrial Education, National Taiwan Normal University, Taipei 106, Taiwan 5 Department of Computer Science and Information Engineering, National Cheng Kung University, No.1, University Road, Tainan City 701, Taiwan; [email protected] * Correspondence: [email protected] (S.J.H.S.); [email protected] (C.-Y.H.); Tel.: +886-3-5776085 (ext. 335) (S.J.H.S) Received: 26 November 2018; Accepted: 10 January 2019; Published: 15 January 2019 Abstract: The BitTorrent (BT) is a peer-to-peer (P2P) file sharing protocol that was developed approximately 20 years ago, is becoming increasingly popular, and has been widely accepted. The BT-based mass deployment system can be used to improve performance and scalability that cannot be achieved by the unicasting, broadcasting, and multicasting protocols.
    [Show full text]
  • Efficient Bare Metal Backup and Restore in Openstack Based Cloud Infrastructure Design, Implementation and Testing of a Prototype Addishiwot Tadesse
    Thesis no: MSEE-2016:36 Efficient Bare Metal Backup and Restore in OpenStack Based Cloud Infrastructure Design, Implementation and Testing of a Prototype Addishiwot Tadesse Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden I This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Masters in Electrical Engineering with Emphasis on Telecommunication Systems. The thesis is equivalent to 20 weeks of full time studies. The master thesis research was carried out at Ericsson AB in Göteborg, Sweden. Contact Information: Author: Addishiwot Tadesse E-mail: [email protected] University Supervisor Dragos Ilie(Assistant Professor) [email protected] Department of Communication Systems School of Computing BTH, Karlskrona Ericssson’s Manager Lars Samuelsson [email protected] Göteborg, Sweden Ericssson’s Supervisors: Tony Borg Senior Packet Core Verification Engineer [email protected] Göteborg, Sweden Asgrimur Olafsson Senior Packet Core Solution Engineer [email protected] Göteborg, Sweden II Abstract Cloud computing has shown remarkable growth in recent years due to its concept of computing as a service, thereby, allowing users to offload the infrastructure management costs and tasks to a cloud provider. With the rapid development of these services, data has become the most crucial resource and hence companies start building disaster recovery (DR) systems that are more vital and essential to ensure the reliability and availability of data services in the event of IT infrastructure disasters. The occurrence of an unexpected calamity in a system leading to its disruption is a disaster.
    [Show full text]
  • Bare Metal Recover by Free Software
    Bare Metal Recover by Free Software Ceasar Sun, Steven Shiau, Jazz Wang, Thomas Tsai http://drbl.nchc.org.tw, http://drbl.org http://clonezilla.nchc.org.tw, http://clonezilla.org National Center for High-Performance Computing Q3, 2011 Outline Introduction to Bare Metal Recovery Bare Metal Recovery and the Available Software Comparisons Introduction to Clonezilla Feature/How to work/Limitation Introduction to Image architecture Demo Save/Restore A System by Clonezilla live Q&A 2 Bare Metal Recovery • The term “Bare Metal” refers to a computer that does not contain an operating system and data. • Bare Metal Recovery/Restore – It means to the process of restoring data to a "bare metal" component – Typically the process includes reinstalling the operating system and software applications and then, if possible, restoring data and configurations.. • When need to do ? – Mass deployment – Disaster recovery – Hardware replacement/crash – .... 3 Bare Metal Recovery (cont') • Available types: – Block-based (image) recovery (e.g. 'dd') – File-based recovery (e.g. 'cp', 'tar', 'rsync'...) – Mix both: combine file base with block information • Use different tool for different purpose – Save a lot of time if choose right toolkit 4 Terminology Raw copying* – A possibility to perform sector-by-sector copying of a whole partition Smart copying* – A possibility to distinguish which portions of the partition really contain data and to copy these only Live copying* – A drive or volume can be copied/imaged while it is in use, avoiding the need
    [Show full text]
  • A Next Generation Clone Solution for Cloud
    Clonezilla : A Next Generation Clone Solution for Cloud Ceasar Sun, Steven Shiau, Jazz Wang, Thomas Tsai http://clonezilla.org, http://drbl.org National Center for High-Performance Computing Taiwan Q3, 2012 OSC Fall Tokyo, 2012 Clonezilla.org Outline Introduction to Clonezilla A Quick Demo as a Begining Feature/How/Limitation/Image Architecture Comparison with Live and Sever Edition(SE) A Toolkit for Windows Mass Deployment : DRBL- Winroll A Possible Solution in Cloud : Cloudboot Cases of Usages Unattended Recovery CD or USB Mass Deployment with Multicast by SE One Image to Multi Devices Deployment Q&A OSC Fall Tokyo, 2012 Clonezilla.org 2 Outline Introduction to Clonezilla A Quick Demo as a Begining Feature/How/Limitation/Image Architecture Comparison with Live and Sever Edition(SE) A Toolkit for Windows Mass Deployment : DRBL- Winroll A Possible Solution in Cloud : Cloudboot Cases of Usages Unattended Recovery CD or USB Tool Mass Deployment with Multicast by SE One Image to Multi Devices Deployment Q&A OSC Fall Tokyo, 2012 Clonezilla.org 3 About us ● From Taiwan, working for the NPO NCHC (National Center for High- Performance Computing) ● Developers of free/open-source software: – DRBL, Clonezilla – DRBL-Winroll, Tux2live – Partclone, Tuxboot, Cloudboot – ... more Taiwan image source: wikipedia.org OSC Fall Tokyo, 2012 Clonezilla.org 4 What is Clonezilla? ● A partition and disk imaging/cloning utility similar to Ghost® and True image® ● A bare metal recovery tool for VMFSVMFS VMware ESX/ESXi *1 *2 *3 *4 *5 *Logo source: (1) Larry Ewing, Simon Budig and Anja Gerwinski, (2) Apple ,(3) Microsoft, (4) Marshall Kirk McKusick, (5) VMWare OSC Fall Tokyo, 2012 Clonezilla.org 5 A Quick Demo as a Begining ● Restore a bare hard disk by Clonezilla Live – http://clonezilla.org/clonezilla-live.php ● A pre-saving image Ubuntu 12.04 system – Text mode only.
    [Show full text]
  • WDS Server for Hybrid Delivery of Windows and Linux Operating Systems Number of Pages 37 Pages + 1 Appendixes Date 21 Nov 2017
    Mike Vainio WDS Server for Hybrid Delivery of Windows and Linux Operating Systems Helsinki Metropolia University of Applied Sciences Engineer Communication Networks and Applications Bachelor’s Thesis 21 Nov 2017 Tiivistelmä Author(s) Mike Vainio Title WDS Server for Hybrid Delivery of Windows and Linux Operating Systems Number of Pages 37 pages + 1 appendixes Date 21 Nov 2017 Degree Engineer Degree Programme Information Technology Specialisation option Communication Networks and Applications Instructor(s) Tapio Wikström, Senior Lecturer The objective of the thesis was to build a standalone server capable of delivering boot media to client computers using the Preboot Execution Environment protocol. The server was de- livered for the case company Varian Medical Systems Finland to increase the efficiency of the system administrators. Microsoft Windows was the primary operating system used in the case company’s environ- ment thus the Windows Deployment Services role was used to deliver the boot medias over the network. In addition to the Windows image a variety of Linux kernel based tools were added for troubleshooting and recovering systems. To deliver the Linux systems, the PXEL- INUX boot loader from the Syslinux Project was added to the Windows Deployment Ser- vices. The implementation provides clearly documented steps for deploying the solution and in- cludes a PowerShell script for automating most of the workflow of updating the solution for the use of system administrators. The implementation was thoroughly tested and verified that it matches the specifications and is reliable. Network traffic was inspected thoroughly, and the ports and protocols used by the solution were documented. The results of the study show that the solution matches the specifications and needs of the case company and future improvements are suggested for the case company to implement in the future.
    [Show full text]
  • Onrisc User Manual 2 Contents
    www.vscom.de OnRISCOnRISCOnRISC UserUserUser Manual Manual Manual Edition:Edition: May May 2014 2014 Vision Systems GmbH Tel: +49 40 528 401 0 Fax: +49 40 528 401 99 Web: www.visionsystems.de Support: faq.visionsystems.de The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice Copyright © 2009-2014 Vision Systems. All rights reserved. Reproduction without permission is prohibited. Trademarks VScom is a registered trademark of Vision Systems GmbH. All other trademarks and brands are property of their rightful owners. Disclaimer Vision Systems reserves the right to make changes and improvements to its product without pro- viding notice. Vision Systems provides this document “as is”, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Vision Systems reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Vision Systems assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are period- ically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. May 2014 OnRISC User Manual 2 Contents Contents 1. Introduction 9 1.1. OnRISC Family.......................................9 1.2. How to Read the Manual?.................................9 2.
    [Show full text]