Академический Документы
Профессиональный Документы
Культура Документы
13. ޯށތ
ް ރަކ
ަ ވ
ަ ހ
ާ ނ ިކ
ީ ވ
ަ އ
ި ފ
ަ ވ
ެ ރ
ި ތ
ެ ނ
ް ލ
ު ހ
ޭ ނ
ް ހ
ި ވ
ެ ދ
ި ރ
ު އ
ި ރ
ާ ފ ުކ
ް ރ
ަ ޢ
ާ ތ
ަ އ
ް އ
ެ ޯ ޓލ
ް އ
ި ރ
ަ ޕ
ީ ޮކ
MOSS Magazine is not only about the Free
Software movement, it is also about 14. DIGIKAM
finding real world solutions to simple and 16. CAN YOUR SYSTEM BE A BOT-NET?
basic needs. Of course all with Free Libre
17. KDE EDUCATIONAL APPLICATIONS
Open Source Software (FLOSS).
20. ENABLING PROJECTS
With this edition of MOSS: Your Monthly 23. HOW TO ADD DHIVEHI FONTS ON UBUNTU
FLOSS Magazine, we wish to redesign and
give a face lift to this magazine: we make
free magazines LOOK GOOD!
contact us
.................................................................
Real world solutions require multi-
discipline that combines a range of
different competencies, including those Maldives Open Source Society Website
brought by brilliant coders, designers and http://moss.org.mv
With the development of free knowledge Launch Pad Dhivehi Translators Mailing List
sharing societies, the software that we use http://groups.google.com/group/divtranslators
STEERING COMMITTEE
President
INASH Zubair
Vice President
SOFWATHULLA Mohamed
Secretary
Mohamed VISHAH
Public Relations
Ibrahim SOBAH
Program Coordinator
Yusuf Abdulla SHUNAN
COVER April 2010, ISSUE #04
designer: Yusuf Abdulla SHUNAN
Treasurer
HUSSAIN Sharaah
Magazine Editors
SIMON Shareef
Mohamed MALIK
Ahmed SHUJAAU Mohamed
IHSAN Sadiq
SOUL
MOSS is all about Software Freedom. If you think you could be part of MOSS
or you know someone who could, please let us know, we want our magazine
to be interactive. We want to progress with you. The common use of free
software is not as far off as you think, so let's open our minds to the
world and the future. Let's make it happen!
SECURING UBUNTU
The following article is about computer security and hacking, under the right of free and independent
expression, the author is free to write and you are free to continue reading or to stop there. Therefore, if
you feel offended by the themes treated and/or the way information is presented, immediately stop
reading. Continuing on reading, you take any kind of responsibility for the use you make of the
information in this MOSS Magazine article.
Due to the open nature of FLOSS it is rather easier and you can reliably secure your Linux box.
In fact even in Linux Kernel there are many low-level and networking protective services, which
can be enabled and disabled at will. I will specifically take Ubuntu as the Linux box here, but
most of the ideas will work well in other distributions too.
Before jumping into the how-to's let me clarify few of the terms used in the world of security.
In the good old days, the term hacker is a person who have enough knowledge to use
information technology in creative and unique ways, mostly to learn and see weaknesses in a
network. However, today a hacker is used to refer to both forms of security experts to
abusers, commonly referred to as white-hat and black-hat hackers respectively. The proper
term to use on someone who exploit a network for abuse is cracker. So in this article I will
stick to the old meanings of these terms.
Coming back to the topic, types of of the local attacks, this is more like a
attacks may be categorized by a hacker trusted friend or a staff stealing from
into many different and creative ways, you, this is more of an ethical issue than
however to simplify things let us break technological. Anyways, we can look into
it down to two. One the local attacks some well known best practices that can
and the other foreign attacks. Local make all types of attacks to a minimal.
attacks are when someone on the same
network try to attack your computer. First of all know the programs and
Most probably someone who want to services that you are using or need along
harm you or spy on you, who is living with a sound knowledge of access
side by side. The foreign attacks are distributions. In an office environment
from those who are outside your when sharing folders, services or
network, almost always, via the privileges, make sure to document it. If
Internet. you have a server, lock it down as much
as you can, including physical access.
We have a need to prevent both type of Remove or do not install any
attacks, but the foreign attacks, given unnecessary/unwanted services or
the shear number of people and programs. Patch all known
possibilities are rather more demanding vulnerabilities on a regular basis, and
and dangerous. Though this is the case, keep yourself updated on the security
it would be near insanity to think of issues.
this as people are waiting to get into
your network as soon as you connect to In an office environment it is always
the Internet. In most cases a cracker good practice to create security policies
will need to know a good amount of based on the worst that can happen, so
knowledge and information to break you are prepared for the worst that you
into any network. In the world of can imagine. The best security policy is
Microsoft Windows, which is more to customize your box, notably your
forgiving when it comes to Viruses, firewall to your own needs. Installing a
Trojans and Worms, are a result of firewall does not necessarily make your
automated scripts that make use of network secure, but a customized
well known vulnerabilities that only firewall will be harder for a cracker to
very few knows that exist, a result of learn. With FLOSS, ways in which
very few talented crackers attacking customizations can be done is limitless.
many. The issue is further escalated by So let us drill down on someways on how
the fact that Microsoft is late in we can do it.
producing effective security patches. As
Nmap
Once the firewall is in place, access
distributions are documented, physical
access localized and security policies up in
the place, it is time to hack, scan the
network or computer for vulnerabilities
and spot them. I will recommend you look
into three products: Nessus, SARA and
Nmap. Nessus is powerful but report a lot
of false alarms, so can make a novice user
lost. SARA is good too, but it's
development is discontinued. So I will
recommend that you go with Nmap. Nmap
is in the Ubuntu repository, so you can
install directly from Ubuntu Software
Center. In addition Nmap do have a GUI
interface nmapfe or zenmap which you
can use if you are not too comfortable
with the terminal. After installing, just
open a terminal and shoot the command
“sudo nmapfe” or “sudo zenmap”.
Virus Scanner
Next when all you have is those services that you only want/need and all unwanted ports
blocked install a virus scanner. If you prefer a commercial Anti-Virus you can go for NOD32, F-
prot or Kespersky, but if you don't want to buy a virus scanner you can give a try with AVG, Avast
or Avira AntiVir. Last there is the FLOSS favorite virus scanner ClamAV which is again in the
Ubuntu Repository so you can use Ubuntu Software Center to install it, just search for Virus
Scanner or you can use the terminal
After installing you will need to update the Virus Signature, just issue the command
sudo freshclam
and select
While you are there you can schedule a daily virus scan and signature update by selecting
choose the Hour and Minutes and clicking 'Add' for each.
ps ax | grep [c]lamd
Hack to Learn
http://www.backtrack-linux.org
Samurai
http://samurai.inguardians.com
Hacking Tools
Using hacking tools at times can be considered as a script kiddie, but you got to start
somewhere. So below find few of the hacking tools that can make you occupied for
months, if not for years (in no particular order).
ކ ހ ް
ނ ވ ި
ދ ެ
ރ ި
އ ު
ރ ި
ފ ުކ ާ
ރ ް
ޢ ަ
ތ ާ
އ ަ
އ ް
ޓލ ޯ ެ
އ ް
ރ ި
ނ ިކާހަވަރަކްށތޯ ?
ޕ ަ
ވ ީ
ކޮ ީ
އ ަ
ފ ި
ވ ަ
ރ ެ
ތ ި
ނ ެ
ލ ް
ހ ު
ޭ
ރ ކ ު ރ ު ވ ު މ ުގ ެ
ނތ ެ ި
ނ ޭހލު ް
ނ މު ް
ނ އޮްތިއރު ާއ ް
ނިމހެ ް
ަކ ް ނާވ ސޮްފްޓވެައރ ަގތުަމ ް
ށ ބނ ު ް
ޔއެްއ ޭ
ސރުިފ ާ
ާހ ް ލިއރު
ލ ާ
ބ ާ
ށ ަ
ރަހ ް
ޝ ަ
ސ ަމ ް
ޔ ީ
ސ ާ
ރްއޭޖގެ ި
ދވެިހ ާ
ި
ދކ ުރ ެ ވ ެ ީ
ނ ދޢުރެްއ ައ ާ
ނ މު ަ
ނމެ މުިހ ް
ނ އެ ް
ގޮތު ް ރދުަތކެްއ ކުރުަމީކ
ދ ަހ ަ
ނ ޖެހުމެވެި .މަފ ަ
ރ ް
ރ ދ ުކ ު ަ
ަހ ަ ރިއްޓލޯއެްއ ައަވ ް
ސ ށ ކޮީޕ ަ
ރްއޖެައ ް
ދވެިހ ާ
ި
ދ ަކމެކެވެ.
ށތޯ ؟ ިމީއ ސުާވލު އުފެ ޭ
ޔަކ ް
ބ ަ
ނ ަ
ކޮ ް ށ ޖެޭހނެ
ޔަކ ް
ބ ަ
ދ ަ
ނ ާ
ރއުޅުމެްއ އުޅެމު ް
ދ ި
ނ ި
ދިއގެ ް
ާއ ަ ނާވ ަކމެކެވެ.
ށގ ެ ް
ބލެްއަގިއ ައއުަމީކ އެަކ ީ
ސަތްޤ ަ
މު ް
ނތ ެ ި
ރ ނ ޭހލު ް
ނ މު ް
ނަޒރުަގިއ ާއ ް
ައޅުަގ ނޑުގެ ަ ނޖެޭހނެ ިއތުރު
ރ ް
ލފ ެ ކ ެ ވ ެ .ކ ު ަ
ިއތުރު ަތކު ީ ލިއރު 2011
ލ ާ
ބ ާ
ށ ަ
ދ ާވަހަކަތަކ ް
ނ ާ
ނ ިއވެމު ް
ދަމިތ ް
ދ ޫ
ޫ
ދކުރެޭވ ީ
ނ ދޢުރެްއ ައ ާ
ނ މު ަ
ނމެ މުިހ ް
ކުރުވުމުަގިއ އެ ް ރާއ ދެކޮޅު
ނ ިކ ި
ޗކ ު ް
ބއެްއ ަ
ލ ޭ
ރދުަތކެކެވެި .
ަހ ަ ރިއްޓލޯއެްއ ާޤިއމު
ރްއޭޖަގިއ ކޮީޕ ަ
ދވެިހ ާ
ނ ައަހރު ި
ަވ ަ
ސަމަޖްއ ާ
ލ ނ ް
ދ ޫ
ރީޑޔޯ ައ ި
ޔައށެވެާ .އދެ ީޓީވޭ ،
ީމީޑ ާ ރނެ ސޮްފްޓވެައރ
ނކ ު ާ
ބނ ު ް
ނ އުޭޅނެ ޭ
ޖެިހގެ ް ސ ިމަކާމިއ މެދު
ނަމވެ ް
ލާފކުރެވެއެވެަ .
ށ ަ
ރނެ ަކަމ ް
ކު ާ
ނ ސޮްޕްޓވެައރ
ނ ަ
ނ ހު ް
ލބެ ް
ލ ި
ޗށެވެި .ހ ޭ
ދަތކެްއ ަ
ަފ ަ ރދު ކުރުަމީކ ިއތުރު ކެކުޅުމެކެވެ.
ށ ަހ ަ
ނ ް
ނ ަ
ދ ަގ ް
ށތޯއެވެ ؟ ައ ި
ރަކ ް
ނ ިކާހަވ ަ
ރ ވެަފިއަވ ީ
ނތ ެ ި
ނ ޭހލު ް
ނ މު ް
ާއ ް
ނ ިއ ް
ނ ނިގ ަ
ލާމތު ިގ ަ
ސ" ާއިއ ބެޭހ ަމޢު ޫ
ނސ ޯ ް
"އޯަޕ ް ނ ަކާމިއ
ރ ކ ު ރ ު ވ ު މ ުގ ެ ގ ޮ ތ ު ް
ނތ ެ ި
ނ ޭހލު ް
ނ މު ް
ށ ާޢ ް
ިމަކަމ ް
ނީވއެވެ .އެިއގެ ް
ނ ދ ް
ސ ޭ
ނ ގ ެނ ެ ް
ރީޑޔޯިއ ް
ނިއ ޭ
ނ ާ
ީޓީވ ް ރިއ
ނީފޒުކު ާ
ނނެްއ ަތ ް
ދ ާޤ ޫ
ވުާމިއ އެކު ިމަފ ަ ސްއަކތެްއތޯއެވެ ؟
ނަމ ަ
ނ ކޮ ް
ދ ީ
ނ ަ
ރ މު ް
ނ ކު ަ
ރްތަތކު ް
ބެޭހަފ ާ
ނއެްއޗެްއ
ދ އެީއ ކޮ ް
ނާފާއިއ ައ ި
ދ ާއިއ ަމ ް
ބަފިއ ާ
ލ ޭ
ި ނޖެިހްއޖެއެވެ.
ރ ް
ނ ިއތުރު ކު ަ
ރަކ ް
ނތ ެ ި
ނގެ ޭހލު ް
ނ މު ް
ާއ ް ބަވތެްއގެ
ސ ާ
ނަމ އެްއވެ ް
ށިފ ަ
ރިއްޓލޯއެްއ ާޤިއްމ ކޮ ް
ކޮީޕ ަ
ނީވއެވެ .އެީއ ިމީއ
ދ ް
ނަގިއ ޭ
ށ ައ ް
ނ ް
ނ ަ
ނ މު ް
ނ ާއ ް
ަކ ް ލާމތު
ބ ސޮްފވެައރ ާއިއ ބެޭހ ަމޢު ޫ
ލ ޭ
ލ ި
ިހ ޭ ލމެްއ ައ ި
ދ ސިޑއެްއ ިފ ް
ލަވ ީ
ސޮްފްޓވެައރ އެްއަ ،
ނަވ ީ
ނ ނ ަ
ދ ް
ށ ަ
ލަކ ް
ސ ަ
ނާވނެަކމެކެވެި .މ ާ
ބނ ު ް
ަވގުތު ޭ ބރު ަކމެްއގެ
ދނުަމީކ ަމޖު ޫ
ށ ި
ށ ފޯރު ކޮ ް
ނ ް
ނ ަ
ނ މު ް
ާއ ް ބނ ު ް
ނ ނ އެްއޗެްއ ނުަގނެ ޭ
ބަވތުގެ އެހެ ް
ސ ިމ ާ
ނވެ ް
ނ ް
ިމ ޫ
ނ "ަވގު" ސޮްޕްޓވެައރ
ނ ގޮތު ް
ނ ީ
ނަމާ ،ޤ ޫ
ަ ދ ަހަމިމާއިއ އެކު
ގޮތުަގިއ ައޅުަގ ނޑުދެކެމެވެަ .އ ި ނ ީ
ނ ނައީކ ިމީއ ާޤ ޫ
ނަކމެކެވެި .މީއގެ ާމ ަ
ކުރުަމީކ ަމ ާ
ސ"
ނސ ޯ ް
ނ "އޯަޕ ް
ރ ް
ނ ކ ު ރ ު މ ުގ ެ ކ ު ި
ނ ަމ ާ
ނކ ުރ ު ް
ބނ ު ް
ޭ ނޖެިހަފިއާވ
ނ ް
ސ ަ
ނ ިވ ް
ނކ ޮ ް
ސ ފު ް
ނވެ ް
ސރުާކރު ް
ިމީއ ަ ދޔު މ ެ ވ ެ .
ނ ި
ށ ވ ެގ ެ ް
ށަކ ް
ބނ ެ ކ ު ަ
ލ ޭ
ދ ބު ި
ނ ައ ަ
ގޮތު ް
ށދެިވަފިއާވ
ށ ފ ޯރ ުކ ޮ ް
ނ ް
ނ ަ
ނ މު ް
ލާމތު ާއ ް
ާއިއ ބެޭހ ަމޢު ޫ ދ ައޑުަތާކިއ
ނ ާ
ށ ައޅުަގ ނޑުދެކެވެި .އވެމު ް
ަކމެްއ ަކަމ ް ރިއ
ނީފޒުކު ާ
ނާކިއ ަޤަވިއދެްއ ަތ ް
ނ ަ
ދ ާޤ ޫ
ސ ިމަފ ަ
ނަމވެ ް
ަ
ށ ލު ް
ނ ދ ލ ުކ ޮ ް
ބ ަ
ޗްއ ަ
ނ އެަތކެްއ ަ
ނ ް
ނ ަ
ނަމ ީމހު ް
ަ ލްތ
ދ ޢު ަ
ލިއރު ަ
ލ ާ
ބ ާ
ށ ަ
ނަޒރުަތަކ ް
ދ ަމ ް
ނ ާ
ނ މު ް
ނ ަ
ފެ ް ނ މު
ރ ކުރުވުަމީކ މުިހ ް
ނތ ެ ި
ށ ޭހލު ް
ނ ިމަކަމ ް
ދވެިހ ް
ި
ސަހ ަކަމަކށެވެީ .ޓީވ ް
ނ ށ ަފ ޭ
ރ ް
ނ ަވ ަ
ދ ީ
ނ ާ
ވ ެގ ެ ް ރ ވެަފިއާވ
ނވެ ި
ރ ި
ދ ަ
ނ ަ
ދ ީ
ނ ަ
ނގ ެ ް
ނަގމު ް
ސ ިހ ް
ިމާހރުވެ ް ަކމެކެވެ.
ނޭހ ިވ ް
ދ ރާމަމކުނު" ޝޯައާކިއ "ިކޔުއެ ް
ާފޑުާފޫޑގެ " ާ ލތު ިމހެ ް
ނ ނާހ ަ
ނނެވެާ .އދެ ައޅުަގ ނޑުމެ ް
ބޖެަޓކު ް
ަ
ނނ ެ ވ ެ .
ނީކ ޫ
ދ އ ެފ ު ދ ު ީ
ސ ައ ި
ނ ް
ދ ަ
ނ ި
ރ" ައާކިއ ގެނެ ް
ަޤޫފ ް ނނ ު
ރ ނުކުރުާވ ިމާޤ ޫ
ނތ ެ ި
ނގެ ޭހލު ް
އޮްތިއރު ީމހު ް ރަގޅު
ރނ ެ ަ
ނކ ު ާ
ބނ ު ް
ރަގިއ ޭ
ނމުގޮތެްއަގިއ ޭގތެ ޭ
ާއ ް
ނނެްއ
ނޖެިހަފިއާވ ާޤ ޫ
ޔރު ާވ ް
ލަތްއ ާ
ރ ާ
ނީކ ދު ާ
ނ ަ
ިމާޤ ޫ ނ ހެްއޔެވެ.
ނކ ު ް
ނ ިކިހ ަ
ރ ީ
ނީފޒު ކު ާ
ަތ ް ނ 90 0 0ރ
ބ ީ
ލ ޭ
ނ ި
ނ ް
ނ ަ
ސަޓމެްއ ަގ ް
ސ ް
ނިޕއުަޓރ ި
ކޮ ް
ދ ް
ނ ށ ޭ
ލާމތު ފޯރުކޮ ް
ށ ަމޢު ޫ
ނ ް
ނ ަ
ނިއ ިމީއ ީމހު ް
ނ ާ
ަކމު ް ދ ާ
ރ ސރުާކރުގެ އެިކ އެިކ ިއ ާ
ސަ ،
ނވެ ް
ޔީޤނު ް
ަހަމ ަ ނިޕއުަޓރ
ނަމ ،އެކޮ ް
ރިއްޓލޯ ައތުވެްއޖެ ަ
ައށެވެ .ކޮީޕ ަ
ނމ ެ
ނ ައޅުަގ ނޑު ދެޭކގޮތުަގިއ ކޮ ް
ޖެޭހ ަކމެްއ ަކމު ް ނިޕއުަޓރ ަތކުގެ
ދ ކޮ ް
ނ ާ
ރ މު ް
ނ ކު ަ
ބނ ު ް
ަތކުަގިއ ޭ ރިޓ ް
ނ ނޖެޭހ އޮްޕ ޭ
ށ ައަޅ ް
ށ އެައ ް
ނކުރުަމ ް
ބނ ު ް
ޭ
ލާމތު
ބޭހ ަމޢު ޫ
ޗިއ ޭ
ސ ިމަތކެްއ ާ
ަހްފާތައކުވެ ް ރިއްޓލޯއެްއ
ނލެޭވިއރު ކޮީޕ ަ
ނ ގު ާ
ދދު ާހހު ް
ައ ަ ސ އެްކީޕ
ނޑޯ ް
ރްއޭޖަގިއ ިވ ް
ށ ޖެހެއެވެ ާ .
ނ ް
ނ ަ
ސަޓްމަގ ް
ސ ް
ި
ސކުިޅ
ނމު ަކމެކެވެ .މު ް
ދނުަމީކ މުިހ ް
ނ ި
ގެ ް ރދު
ރ ސޮްފްޓވެައރގެ ަހ ަ
ނކ ު ާ
ބނ ު ް
ނަމ ޭ
ައތުވެްއޖެ ަ ށ 2500ރ ައށެވެ.
ނ ާގްތަގ ނަޑަކ ް
ލބެ ީ
ށ ި
ނ ް
ނ ަ
ަގ ް
ބްއ ާ
ޔ ރްއާކވެ ިތ ި
ބހެްއަގިއ އޮވެއެވެަ “ .
ަހރު ަ ނ އެަތކެްއ
ނ ޖެޭހ ީ
ލ ް
ނ ަ
ރދު ގު ާ
ބ ަ
ަ ލބެ ީ
ނ ށ ި
ނ ް
ނ ަ
ސ ަ 7ގ ް
ނޑޯ ް
ދ ިވ ް
ސާޓައ ި
ސ ިވ ް
ނޑޯ ް
ިވ ް
ދ ތުރ ެ ވ ެ "
ަ ލތު
ލ ާހ ަ
ނނެވެަ .ޤއުމުގެ ާމ ީ
ޔިއ ް
ނރުިފ ާ
ޔ ް
ލ ަ
ިމ ި ނނ ެ ވ ެ .
ނއެްއ ޫ
ނ މު ީ
ދ ި
ނ ައ ި
3000ރ ައށެވެި .މަވރު ް
ލަތްއ
ދ ޢު ަ
ސ ަވރެްއަގިއ ިމީއ ަ
ށވެަފިއާވ ދުަވ ް
ދ ް
ިމާހ ަ ރ ް
ސ ނިޓަވިއ ަ
ސ ސޮްފވެައރ ަތާކިއ އެ ް
ނާވނެ އޮީފ ް
ބނ ު ް
ޭ
މުަހްއަމދު ާމިލްކ ދރެްއ ަކާމިއ މެދު ައޅުަގ ނޑު
ދނެ ަހ ަ ރދުަތކެއް ކުރެިވ ާ
ށ ަހ ަ ނ ް
ނ ަ
ނހެން ސޮްފްޓވެައރ ަގ ް ދ އެހެ ި
ާއިއ ައ ި
ރމ ެ ވ ެ .
ސްއކުކު ަ
ަ ނައީކ ިއތުރު އެަތކެްއިހނާގނެއެވެި .މއީގެ ާމ ަ
Features
Digikam provides functions for organizing,
previewing, downloading and/or deleting
images from digital cameras. Basic auto-
transformations can also be deployed on the fly
during picture downloading. In addition,
Digikam offers image enhancement tools
through its KIPI (KDE Image Plugins Interface)
framework and its own plugins, like red-eye
removal, color management, image filters, or
special effects. Digikam is the only free photo
management application on Linux that can
handle 16 bit/channel images. Digital Asset
Management is the mainstay of DigiKam.
Digikam2
BOTNET?
In the world of the Internet, the
use of Botnets is common — most
of the spam that you receive are
sent by botnets — and for cyber
criminals they are normal day to
day toys. Hence in cyberspace DOS
attacks are common. In addition,
Yusuf Abdulla SHUNAN > shunan@gmail.com
even attacks on servers and Web
sites, like MSN, Facebook or
Twitter, with botnets, hacks, and
graffiti do occur.
We all know of the Dhiraagu and ROL targeted
DOS attacks are a less destructive
series of cyber attacks on August 2009. They were
form of attack, a more destructive
"denial of service" (DOS) or "distributed denial of attack would have been when a
service" (DDOS) attacks, where the attacker cyber criminal penetrated
overflow the network with fake messages, causing computers and databases and
the servers (computers that serve as a core in a scrambled or erased the data. If
network) to over burden to a slow or crash status. data like records and accounts
were deleted, it would have been
really destructive.
The attacks got a lot of media attention, basically
because today we all are so dependent on the Can your system become a Botnet?
Internet and it's services with only two service Illegal pirated software is one
providers. However, it was funny how easily people major cause, as nobody has
anyway of knowing what it contain
were ready to start a blame game and pin pointing,
or what additional codes are in it
some even wanted to take credit (funny way to get and some are known to have back
famous!). Like many things that happen on the doors that cyber criminals can
Internet, it is hard to tell who could have been in come in to take control of your
the other end of the Internet, as most DOS attacks system. Other ways include
use "botnets". Botnets - short for robot networks - installing untrusted software from
unknown sources, un-patches
are the toys of the cyber criminals. A cyber vulnerabilities, virus, Trojans and
criminal takes control of a computer via the worms.
Internet by secretly installing software on it. This
is usually done without the slightest knowledge of With such a high volume of pirated
the computer user. There are known cases of huge software usage in the Maldives,
many computers are insecure. We
botnets, with tens of thousands of computers from
are left in the dark with no way to
all corners of the globe. Cyber criminals take know which is infected or not. All
control of all these computers as a network to send will be made clear when it is
thousands of fake messages at a chosen interval another turn to be attacked, but it
overloading servers and causing them to crash. This might be better to find and fix
is kind of the same thing that happens when we all vulnerable systems before this
occurs. Free Libre Open Source
try sending greeting text messages at the same Software is a cost effective choice
time but DOS attacks take place in a bigger scale for such freedom. Do you want
and for a longer duration. your system to be a botnet?
KAlgebra is a
mathematical calculator
based on content markup
MathML language, capable
to make simple MathML
operations (arithmetic and
logical) and to represent
2D and 3D graphs.
KmPlot is a program to
draw graphs, their integrals
or derivatives. It supports
different systems of
coordinates like the
Cartesian or the polar
coordinate system. The
graphs can be colorized and
the view is scalable, so that
you are able to zoom to the
level you need.
Features
Support for many different training lectures
Support for many languages including language specific text fonts
Comfortable lecture editor
Support for different keyboard layouts, with the ability to use user-defined layouts
During training sessions comprehensive statistical informations are shown to help you analyze your progress
Features
Different test types
Mixed Letters (order the letters, anagram like) to get to know new words
Multiple choice
Written tests - type the words (including clever correction mechanisms)
Example sentences can be used to create 'fill in the gap' tests
Article training
Comparison forms (adjectives and/or adverbs)
Conjugations
Synonym/Antonym/Paraphrase
Fast test setup with all options in one dialog
More than two languages (for example English, Chinese Traditional and Chinese Simplified)
Find words (also by word type) quickly
Easy lesson management
Premade vocabulary files ready to use
Share and download vocabulary using Get Hot New Stuff
Open XML file format (shared with KWordQuiz, Kanagram and KHangMan) that can be edited by hand and is
easily usable with scripts
These are only some of the applications that the KDE community has to offer. For more information on the KDE
Educational project visit http://kde.org/applications/education/
/dev/null
Enabling Pojects INASH Zubair
On one fine Friday, during mid February, this writing, there are 62 registered members on
me and Hussain got together to discuss the website, and we're assuming most of them
about planning and organizing work and have a direct relationship with free and open
resources within MOSS. It's very pleasant source software, and that figure is not small if
to know that there are people who're we're looking at people with technical skills and
concerned with a steady health of the knowledge and who have experience working in
organization as well as the community at corporate environments.
the same time who think that the way to
get to a level where everything is well We set out to plan and design the basics for a
managed and overseen is through small function that would allow the creation and
planning. Hussain is one of those people management of projects on the website. We
who're very into organizing and planning would build it gradually phase by phase outlining
things ahead of time so that things won't the features for each milestone along the way.
fall out of place without a sign. Although we didn't brainstorm little, at some
point the whole component bloated to be a full
The evening was mostly spent on the topic stack project management system with Gantt
of community growth and engagement. charts and fully fledged reporting, etc.
We assumed that if tasks and projects
were an aspect of the website which can Below is a picture of the initial components and
be interactive and managed by the their ERD diagram. As you can see it is very
community, it would engage the simple and we have removed most of the high
community a little more. At the time of level extra ideas for the time being.
Enabling Projects2
I'm hoping that if at the least this will help and enhance
the level of coordination and the quality of work here
amongst the members at present, it certainly will come
as a major hand in connecting with the community and
accounting for most of the things that happen in and
around our society.
Enabling Projects3
Phase 1
• Creating and listing Open projects
• Set it's basic information such as the start and end dates and description.
• Set it's status manually through phases from On Going, Completed and Closed.
Phase 2
• Members can participate in Open projects, Coordinators can manage membership.
• Actions can be set and either assigned to or assigned by one self.
• Actions can also be managed by coordinators as well as participants by setting it's
properties along with the progress of it.
Phase 3
• Comment on projects.
So if you would like to share your ideas, join our mailing list at
http://groups.google.com/group/mlugmv and start discussing
about it. I would love ideas and early feedback. Cheers.
INASH Zubair
9 March, 2010 12:52 AM
HOW TO
ADD DHIVEHI FONTS
on ubuntu
http://mlugmv.googlegroups.com/web/dv-mv-fonts_1.0-1_i386.deb
Next you should tell your system to pull down the latest
list of software from each archive it knows about,
including the ttf-thaana-fonts PPA you just added. To do
so issue the following command in a terminal.
Now you are ready to install the fonts from the PPA either
by using the following terminal command or Ubuntu
Software Center.
http://www.gimp.org/
http://scribus.net/
http://www.openoffice.org/
http://www.ubuntu.com/
http://www.creativecommons.org/