Eve Online: Edge of Apocalypse

Screenshot from 2015-05-12 10:11:45Eve Online: how a virtual world went to the edge of apocalypse and back. The video game Eve Online is one of Iceland’s biggest exports and has become the world’s largest living work of science fiction. While rival games have come and gone, it has survived – thanks to a unique experiment in democracy.

Read Simon Parkin in the Guardian’s “The Long Read” on Eve Online. www.theguardian.com/technology/2015/may/12/how-virtual-world-edge-of-apocalypse-and-back-again

22 Things for Ubuntu 15.04

Screenshot from 2015-05-11 16:26:36The latest edition of the free and open-source operating system Ubuntu, version 15.04 “Vivid Vervet”, is available from www.ubuntu.com to download and install; or to try as a live-CD or virtual machine. OMGUbuntu.co.uk have compiled a helpful lists of next steps to make it your own at:

Just so you know, version number 15.04 is really just April 2015 in disguise and a vervet is kind of African monkey.

Digital Mallow

Screenshot from 2015-05-08 11:36:06Explore Mallow online: we’re compiling a list of online resources about Mallow town and locality.

About

Apps

Astronomy

Civic Life

Entertainment

Maps

Photos

Social Media

Transport

  • Live bus departures.
  • Live train information at Mallow station.

Video

  • Watch videos about Mallow on YouTube.

WiFi

Professor Messer

Screenshot from 2015-05-11 10:19:31Explore the world of computing and teach yourself networking and computer hardware with Professor James Messer – online and for free. Based on a very simple formula of well-structured slides and clear voice-over presentation, his range of free online tutorial videos come highly recommended (although the jury is out on his corny introductions for each video). Use them as a quick reference, a gentle introduction to a topic, or as a very handy revision tool to play over and over at your own pace for students of CompTIA A+, Security+, and Networks+, Microsoft Certification, and QQI Level 5 and 6 networking, systems software, and computer hardware.

Red Star OS 3.0

Red Star OS 2.0 Bookmarks

Red Star OS 2.0 Bookmarks

We’re big fans of the North Korean (DPRK) Internet “Kwangmyong” and Red Star OS Linux.

Kwangmyong

Korean for “bright” Kwangmyong is fascinating as an enclave of Internet technology inaccessible to the rest of the world and also blocked from accessing the Internet from the inside of the notoriously reclusive state. As evidenced by the Naenara (“My Country”), Firefox clone, browser every address in North Korea is within the 10.0.0.0 address range: a range reserved by the rest of the world for private internal networks only and never used on the Internet – something which makes routing in and out of the DPRK impossible.

Red Star OS 2.0

Red Star OS 2.0

Red Star OS 2.0

In development since 2002 at the Korea Computer Center (KCC), a copy of the Red Star 2.0 CD was purchased by a Russian student in North Korea in 2010 and subsequently uploaded to the Internet.

Based on Linux with a KDE 3.0 desktop it has a familiar WindowsXP-like look and feel.

Red Star OS 3.0

Red Star OS 3.0

Red Star OS 3.0

In 2013 a student visiting Pyongyang University of Science and Technology released screenshots of a copy of Red Star 3.0 bought from a KCC outlet in southern Pyongyang.

Similarly based on Linux and KDE 3.0, unlike its predecessor version 3.0 has a distinctly Apple OS X based look and feel – reportedly as per the personal preferences of the new leader Kim Jong-un who is known to use an iMac.

Both version 2.0 and 3.0 are notable for using the North Korean Juche calendar which begins with the year of Kim Il-sung’s birth at year 1. 2015 is the year 104.

Badly photoshoped militaristic background views of North Korea let down the otherwise slick OS X like interface of version 3.0 (sound was disabled in our VM installation so we weren’t able to confirm the existence of a nationalistic opening jingle).

Unlike in every other normal Linux OS, version 3.0 is also of interest in that the root password is not known to the installer/user; as the firewall has blocked all returning DNS requests, it is not possible to leave the North Korean intranet and browse the web, even when installed outside of North Korea; and, it is reported, Red Star OS 3.0 routinely leaks information on the browsing habits of users back to the DPRK government.

However, and perhaps as a by-product of government spying interests, the system is also remarkably easy to hack.

Install Notes

Red Star OS 3.0

Red Star OS 3.0

  • Install as a virtual machine in either VirtualBox or VMWare.
  • To access the command-prompt use alt-F2 and run konsole.
  • Root access is disabled by default. To root install redstarroot.rpm which can be coped into a Red Star 3.0 virtual machine via the local network since Public is already shared by default. The package exploits a root flaw in the Red Star 3.0 package manager which allows installation of anything, and thus including root access. Once installed run rootsh to root.
  • IPTables in Red Star 3.0 have blocked pings and DNS information from returning (even though requests are able to get out). Sites can still be accessed by IP address alone; but to fix Internet access run rm /etc/sysconfig/iptables. (If it now stalls on reboot – disable the VM network connection until the interface is up during reboot.)
  • For routine editing use vi. At the bare minimum you need to remember i for insert mode, ESC to stop insert mode, and : x to exit. For more on learning vi see http://www.cs.colostate.edu/helpdocs/vi.html.
  • To switch to English in the browser go to the second-last menu, select the third option, go to the fourth tab, select the “(ko-KP)” add-on, click the first button to disable it, and click the button on the yellow bar to restart the browser. At the command prompt run:
    • sed -i ‘s/ko_KP/en_US/g’ /etc/sysconfig/i18n
    • sed -i ‘s/ko_KP/en_US/g’ /usr/share/config/kdeglobals
  • To enable software installation run:
    • mv /etc/yum/repos.d/rs-03000.repo /etc/yum/repos.d/rs-03000.off (causes yum errors)
    • Download fedora-upgrade-21.2-1.fc21.noarch.rpm, fedora-release-21-2.noarch.rpm, and fedora-repos-21-2.noarch.rpm from http://ftp.heanet.ie/pub/fedora/linux/releases/21/Everything/i386/os/Packages/f/ and run:
      • yum install fedora-upgrade-21.2-1.fc21.noarch.rpm
      • yum install fedora-release-21-2.noarch.rpm
      • yum install fedora-repos-21-2.noarch.rpm
      • yum update
      • In case of error: yum clean all
      • For example, to install Wireshark: yum install wireshark

Screenshots

Links

Ninite.com

Screenshot from 2015-05-08 15:02:08Looking for the latest, best, free and open-source software for Windows?

As recommended and tested by Level 6 Networks and Software Development students at Mallow College, you won’t find easier and better than Ninite.com: the fastest way to get a new computer or a friend’s computer up to grade with essential legal software for free. Simply select the programs you want. Download the automatic installer and let it run. It will automatically install your complete selection while ensuring that there are no toolbars or other extra junk software installed.

Ninite.com will “start working as soon as you run it; not bother you with any choices or options; install apps in their default location; say no to toolbars or extra junk; install 64-bit apps on 64-bit machines; install apps in your PC’s language or one you choose; do all its work in the background; install the latest stable version of an app; skip up-to-date apps; skip any reboot requests from installers; use your proxy settings from Internet Explorer; download apps from each publisher’s official site; verify digital signatures or hashes before running anything; work best if you turn off any web filters or firewalls; save you a lot of time!”.

Web Browsers

  •  Fast Browser by Google
  •   Alternative Browser
  •   Extensible Browser

Messaging

  •   Internet Telephone
  •   Multi-IM Client
  •   Email Reader by Mozilla
  •   Trillian IM
  •   AOL Instant Messenger
  •   Yahoo! IM Client

Media

  •   Music/Media Manager
  • Great Video Player
  • Video Player
  • Music Player
  • Music Player
  • Music Player
  • Audio Editor
  • Video decoders plus Media Player Classic
  • Video Player
  • Online Music Service
  • Video decoders plus MPC
  • Music Organizer
  • Video Player

Runtimes

  •   Java Runtime Environment (JRE)
  •   Microsoft .NET
  •   Microsoft Silverlight
  •   Adobe Air
  •   Shockwave Player

Imaging

  • Image Editor
  • Photo Manager by Google
  • Open Source Image Editor
  • Image Viewer
  • Image Viewer
  • Vector Graphics Editor
  • FastStone Image Viewer
  • Screenshot Tool

Documents

  • Free Office Suite
  • Adobe PDF Reader
  • Lightweight PDF Reader
  • Alternative PDF Reader
  • Print Documents as PDF Files
  • Free Office Suite
  • Print Documents as PDF Files

Security

  • Great Antivirus by Microsoft
  • Avast Free Antivirus
  • AVG Free Antivirus 2015
  • Malware Remover
  • Antivirus Free Trial
  • Spyware Remover
  • Avira Free Antivirus
  • SUPERAntiSpyware Free

File Sharing

  • Free Bittorrent Client
  • File Sharing Client

Online Storage

  • Great Online Backup/File Sync
  • Online Backup/File Sync
  • MozyHome Online Backup
  • Online File Sync by Microsoft
  • Online Backup/File Sync
  • File Synchronization

Other

  • Online Notes
  • Online Atlas by Google
  • App Store for Games
  • Password Manager
  • Local File Search Engine
  • Screen Reader

Utilities

  • Remote Access Tool
  • Disc Burner
  • Great Disk Defrag
  • Free Remote PC Access
  • Better File Copy
  • Disc Burner
  • App Uninstaller/Reverse Ninite
  • Hotkey Launcher
  • Directory Statistics
  • System Utilities
  • Disc Burner
  • Classic Shell Win8 Start Menu

Compression

  • Great Compression App
  • File Compression Tool
  • Another Compression Tool

Developer Tools

  • Great Programming Language
  • FTP Client
  • Programmer’s Editor
  • Java Development Kit
  • Java Development Kit
  • SCP Client
  • SSH client
  • Compare and Merge Files
  • IDE for Java

Colour Me Flat

The Internet has its fashions. The current must-have look is flat design. Ideal for simplified displays on tablets and phones, and on the newer desktop PC interfaces, it is a move away from skeuomorphism (mimicking real world objects on computer screens) and the desktop metaphor of folders, files and recycle bins on PCs. The emphasis today is on a strong bright compatible colour palette that works with strong white text, simple clear touch-screen buttons and text boxes.  Windows 8 and Apple’s iOS 7 have been prime (though not always popular) examples of the shift.

flatuicolors.com offers a simple but effective colour palette for keeping up to trend.

More:

The Cyberwar is Live

More often a map of cyber-attacks streaking across the globe, like missile strikes, makes an appearance on the news each time there’s a large cyber-attack. Once the realm of science-fiction or conspiracy-theory, today the cyberwar is real and live on the Internet at http://map.ipviking.com.

Screenshot from 2015-05-07 00:19:30Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see whichcountries are aggressors or targets at the moment, using which type of attacks (services-ports).

Hovering over the Attack Origins, Attack Targets, or Attack Types will highlight just the attacks emanating from that country or over that service-port respectively. Hovering over any bubble on the map, will highlight only the attacks from that location and type. Press s to toggle table sizes.

Norse exposes its threat intelligence via high-performance, machine-readable APIs in a variety of forms. Norse also provides products and solutions that assist organizations in protecting and mitigating cyber attacks.

For more information, please contact: inquiry@norse-corp.com