mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-01-25 23:11:02 +08:00
20121128-2 选题
This commit is contained in:
parent
4e46e9d2ac
commit
39dd0edf89
@ -0,0 +1,89 @@
|
||||
Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA
|
||||
================================================================================
|
||||
**Question**: How can I install Oracle Java 7 in Elemetary OS Luna?
|
||||
|
||||
**Answer**: To install Java 7 in Elementary OS Luna follow the steps below:
|
||||
|
||||
Since Elementary OS is Ubuntu based we are at liberty to use **WEPUD8 PPA** which has various Java packages in it.
|
||||
|
||||
1. Open Terminal.
|
||||
|
||||
2. Run the command below to add Java PPA to your repository:
|
||||
|
||||
$ sudo add-apt-repository ppa:webupd8team/java
|
||||
|
||||
You are about to add the following PPA to your system:
|
||||
Oracle Java (JDK) Installer (automatically downloads and installs Oracle JDK6 / JDK7 / JDK8). There are no actual Java files in this PPA. More info: http://www.webupd8.org/2012/01/install-oracle-java-jdk-7-in-ubuntu-via.html
|
||||
Debian installation instructions: http://www.webupd8.org/2012/06/how-to-install-oracle-java-7-in-debian.html
|
||||
More info: https://launchpad.net/~webupd8team/+archive/java
|
||||
Press [ENTER] to continue or ctrl-c to cancel adding it
|
||||
|
||||
3. Press ENTER to continue
|
||||
|
||||
gpg: keyring `/tmp/tmpB5WwDG/secring.gpg' created
|
||||
gpg: keyring `/tmp/tmpB5WwDG/pubring.gpg' created
|
||||
gpg: requesting key EEA14886 from hkp server keyserver.ubuntu.com
|
||||
gpg: /tmp/tmpB5WwDG/trustdb.gpg: trustdb created
|
||||
gpg: key EEA14886: public key "Launchpad VLC" imported
|
||||
gpg: Total number processed: 1
|
||||
gpg: imported: 1 (RSA: 1)
|
||||
OK
|
||||
|
||||
4. Now update your system
|
||||
|
||||
$ sudo apt-get update
|
||||
|
||||
5. Install Java 7 by running the command below:
|
||||
|
||||
$ sudo apt-get install oracle-java7-installer
|
||||
|
||||
[sudo] password for enock:
|
||||
Reading package lists... Done
|
||||
Building dependency tree
|
||||
Reading state information... Done
|
||||
The following packages were automatically installed and are no longer required:
|
||||
gir1.2-gstreamer-0.10 libilmbase6 libmagickcore4 libmagickwand4 libcdt4
|
||||
libmagickcore4-extra liblqr-1-0 imagemagick-common libpathplan4 libopenexr6
|
||||
rsync netpbm libgvc5 libnetpbm10 libgraph4
|
||||
Use 'apt-get autoremove' to remove them.
|
||||
The following extra packages will be installed:
|
||||
gsfonts-x11 java-common
|
||||
Suggested packages:
|
||||
default-jre equivs binfmt-support visualvm ttf-baekmuk ttf-unfonts
|
||||
ttf-unfonts-core ttf-kochi-gothic ttf-sazanami-gothic ttf-kochi-mincho
|
||||
ttf-sazanami-mincho ttf-arphic-uming
|
||||
The following NEW packages will be installed:
|
||||
gsfonts-x11 java-common oracle-java7-installer
|
||||
0 upgraded, 3 newly installed, 0 to remove and 196 not upgraded.
|
||||
Need to get 88.5 kB of archives.
|
||||
After this operation, 473 kB of additional disk space will be used.
|
||||
Do you want to continue [Y/n]?
|
||||
|
||||
6. Type **Y** for Yes and Press enter to continue installation.
|
||||
|
||||
7. During the installation, you need to agree to the license to continue. Select **OK**.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-ask1.png)
|
||||
|
||||
8. Then Select **Yes** to continue.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-ask2.png)
|
||||
|
||||
9. Now relax for the packages to be downloaded and installed automatically:
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-Downloading.png)
|
||||
|
||||
7. Installation has been completed successfully. You can now check the version of Java from the Terminal:
|
||||
|
||||
$ java -version
|
||||
java version "1.7.0_45"
|
||||
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
|
||||
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.unixmen.com/install-oracle-java-7-elementary-os-luna-via-ppa/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,39 @@
|
||||
This new worm targets Linux PCs and embedded devices
|
||||
================================================================================
|
||||
**The malware spreads by exploiting a 2012 vulnerability in PHP, Symantec researchers said**
|
||||
|
||||
IDG News Service - A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
|
||||
|
||||
According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP to run in the Common Gateway Interface (CGI) configuration. The vulnerability is tracked as CVE-2012-1823 and was patched in PHP 5.4.3 and PHP 5.3.13 in May 2012.
|
||||
|
||||
The new worm, which was named Linux.Darlloz, is based on proof-of-concept code released in late October, the Symantec researchers said Wednesday in a [blog post][1].
|
||||
|
||||
"Upon execution, the worm generates IP [Internet Protocol] addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability," the Symantec researchers explained. "If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."
|
||||
|
||||
The only variant seen to be spreading so far targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures.
|
||||
|
||||
However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL.
|
||||
|
||||
These architectures are used in embedded devices like home routers, IP cameras, set-top boxes and many others.
|
||||
|
||||
"The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux," the Symantec researchers said. "However, we have not confirmed attacks against non-PC devices yet."
|
||||
|
||||
The firmware of many embedded devices is based on some type of Linux and includes a Web server with PHP for the Web-based administration interface. These kinds of devices might be easier to compromise than Linux PCs or servers because they don't receive updates very often.
|
||||
|
||||
Patching vulnerabilities in embedded devices has never been an easy task. Many vendors don't issue regular updates and when they do, users are often not properly informed about the security issues fixed in those updates.
|
||||
|
||||
In addition, installing an update on embedded devices requires more work and technical knowledge than updating regular software installed on a computer. Users have to know where the updates are published, download them manually and then upload them to their devices through a Web-based administration interface.
|
||||
|
||||
"Many users may not be aware that they are using vulnerable devices in their homes or offices," the Symantec researchers said. "Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software."
|
||||
|
||||
To protect their devices from the worm, users are advised to verify if those devices run the latest available firmware version, update the firmware if needed, set up strong administration passwords and block HTTP POST requests to -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4, either from the gateway firewall or on each individual device if possible, the Symantec researchers said.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices
|
Loading…
Reference in New Issue
Block a user