Robolinux 8.1 發布,用戶友好的、直觀的操作系統
Robolinux是基于Debian
GNU/Linux最新穩定發行的用戶友好的、直觀的操作系統。該項目非常有趣的特性之一是預配置好的VirtualBox虛擬機支持套件,可運行
Windows XP或Windows 7,從而允許用戶在Robolinux中無縫安裝和運行Windows操作系統。
Robolinux
is pleased and excited to announce its brand new Robolinux "Cinnamon
Raptor" V8.1 LTS 2020 OS which is based on the rock solid Debian 8
stable source code sporting the 3.16 Linux kernel. It has far better
graphics and audio quality, boots up and runs much faster than Debian 7
and is also compatible with newer hardware, drivers and most notably the
Intel Haswell chipset. The Robolinux "Cinnamon Raptor" user interface
is extremely fast, beautiful and very easy to use. An enormous amount of
time and effort went into optimizing and tweaking Robolinux "Cinnamon
Raptor" v8.1 so that Linux Beginners and Advanced Users will be very
pleased. For example we fixed the Debian 8.1 Update Notifier issue. As
usual both the 32 & 64 bit versions come with dozens of one click
Wifi, Video & Printer Driver installers. A completely new Stealth VM
was written capable of running Windows 10 virus free inside Robolinux.
All 12 Robolinux privacy & security apps like the newest i2P
Invisible Internet Project, Tor browser, Tor Chat, UFW Firewall, Clam AV
plus many popular User applications such as PopcornTime, Netflix,
Firefox, Thunderbird, Kazam screencaster, Google Chrome, Google Earth,
Skype, VLC, Plex Media Server, Kdenlive Video Editor and VirtualBox. We
also added a brand new Cinnamon FAQ section to our website as well.
Robolinux 7 series users can migrate with ease by using the built in
Lucky Backup application in all Robolinux 7 versions.
Here are the 12 Privacy & Security apps in Robolinux Cinnamon Raptor v8.1
1. Private Internet Access V*N (Added to all Robolinux versions in 2014)
No saved log files for the NSA to snoop!
Dozens of Gateways all over the World!
Up to 190 Gigabit speeds per Gateway!
Stops ISP Torrent Throttling!
No Bandwidth Limits!
One account protects your PC, laptop, Phone, Tablet and TV too.
2. Invisible Internet Project (I2P)
i2p is an implementation of an anonymous, de-centralized network. Over a
single layer, applications transmit anonymous and secure messages to
one other. All communications are encrypted end-to-end, and 4 layers of
encryption surround the sending and receiving of messages. Every client
application uses its own i2p router to establish a number of in-bound
and out-bound tunnels to other applications, and these peers pass
messages to/from the client. Each peer on the i2p network selects the
length of his tunnels; The longer the tunnel, the greater the anonymity
but the higher the latency and the lower the throughput. Hence, there is
a trade-off between anonymity and high(er) latency AND low(er)
throughput. Initially - when a client attempts to contact its peers, a
distributed hash table (DHT) containing the details of connected peers,
is queried, but no further queries are required to establish subsequent
connections. So, the i2p queries - for bringing about connections -
differ both from Tor's hidden services and clearnet DNS.
i2p is rumored to have a higher network latency but to be more capable
of preserving a user's anonymity than Tor's hidden services. However -
regarding the latter point, there is fierce dispute. On i2p, peers
communicate over many protocols, including http, IRC and BitTorrent.
Finally, i2p domains are assigned the pseudo (non-routable) Top Level
Domain (TLD) of .i2p, and to connect to them, a proxy is required.
3. RootKit Check
The chkrootkit security scanner searches the local system for signs that
it is infected with a 'rootkit'. Rootkits are set of programs and hacks
designed to take control of a target machine by using known security
flaws.
4. Tor Anonymous Browser
Tor protects privacy in communications via a distributed network of
relays run by volunteers all around the world: it prevents anybody
watching Internet connections from learning what sites you visit, and it
prevents the visited sites from learning your physical location. Tor
works with web browsers, instant messaging programs, remote login
clients, and many other TCP-based applications.
5. Tor Anonymous Chat
TorChat is a peer to peer instant messenger with a completely
decentralized design, built on top of Tor's location hidden services,
providing strong anonymity while being very easy to use Top most
relevant feature TorChat claims, above from text messaging and file
sending, rest on the difficulty someone would experiment trying to find
out where you are communicating from In the condition someone might be
observing you and sniff your internet traffic connection, the person
will have a high degree of difficulty in finding out: - Where your
contacts are located - To whom you are sending or receiving from - What
you send or receive, as everything is end-to-end encrypted
6. The Robolinux Stealth Text Vault
The Robolinux Stealth Text Vault app uses steghide a steganography
program which hides bits of a data file in some of the least significant
bits of another file in such a way that the existence of the data file
is not visible and cannot be proven. It features hiding text file data
in jpg files, blowfish encryption, MD5 hashing of passphrases to
blowfish keys, and pseudo-random distribution of hidden bits in the
container data.
7. BleachBit
BleachBit deletes unnecessary files to free valuable disk space,
maintain privacy, and remove junk. It removes cache, Internet history,
temporary files, cookies, and broken shortcuts. It handles cleaning of
Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google
Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer, rpmbuild, Second
Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files,
BleachBit wipes free disk space (to hide previously deleted files for
privacy and to improve compression of images), vacuums Firefox databases
(to improve performance without deleting data), and securely shreds
arbitrary files.
8. PGP eMail Encryption for Thunderbird
The OpenPGP extension for Thunderbird called Enigmail allows users to
access the features provided by the popular GnuPG software from within
Thunderbird. Enigmail is capable of signing, authenticating, encrypting
and decrypting email. Additionally, it supports both the inline PGP
format, as well as the PGP/MIME format as described in RFC 3156.
9. UFW Firewall
gufw is an easy and intuitive way to manage your Linux firewall. It
supports common tasks such as allowing or blocking pre-configured,
common p2p, or individual port(s), and many others!
The Uncomplicated FireWall is a front-end for iptables, to make managing
a Netfilter firewall easier. It provides a command line interface with
syntax similar to OpenBSD's Packet Filter. It is particularly
well-suited as a host-based firewall.
10. Clam AV
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of
this software is the integration with mail servers (attachment
scanning). The package provides a flexible and scalable multi-threaded
daemon in the clamav-daemon package, a command-line scanner in the
clamav package, and a tool for automatic updating via the Internet in
the clamav-freshclam package. The programs are based on libclamav6,
which can be used by other software.
This package contains the command line interface. Features:
- built-in support for various archive formats, including Zip, Tar,
Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in
support for almost all mail file formats; - built-in support for ELF
executables and Portable Executable files compressed with UPX, FSG,
Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da
Cryptor and others; - built-in support for popular document formats
including Microsoft Office and Mac Office files, HTML, RTF and PDF.
For scanning to work, a virus database is needed. There are two options for getting it:
- clamav-freshclam: updates the database from Internet. This is
recommended with Internet access. - clamav-data: for users without
Internet access. The package is not updated once installed. The
clamav-getfiles package allows creating custom packages from an
Internet-connected computer.
11. Keepass2
KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily.
KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files.
12. JonDo
JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components:
- Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users.
- Mix Cascades: Chains of Mixes run by various independent operators.
They typically consist of three Mixes: one first Mix (IN) which receives
requests from the users, one middle Mix (MIDDLE) which only forwards
traffic to other Mixes, and a last Mix (OUT) which sends the real
outgoing requests to internet resources.
- InfoService: A separate service which provides information about the
available mixes and mix cascades, thenumber of users currently using the
mix cascades, and their current workload.
- JonDo: Client program installed on the user's computer. Its primary
use is to establish encrypted connections to anonymising Mix Cascades.
In this form, the system protects from observation by
- the visited web server
- your internet access provider (internet cafe, WLAN, AOL, T-Online, ...)
- other eavesdroppers on the connections (ECHELON,...)
- any data retention (by international distribution)
- the JonDonym service itself.</span>
Download the live DVD image from here: robolinux64-live-cinnamon-v8.1.iso (1,993MB).