From e611ef592c779bfecd5c6bc8c5a23a641527199c Mon Sep 17 00:00:00 2001 From: icybreaker Date: Mon, 2 Dec 2013 20:13:10 +0800 Subject: [PATCH 1/7] translating --- .../Insights into top 3 IT skill groups in highest demand.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/sources/Insights into top 3 IT skill groups in highest demand.md b/sources/Insights into top 3 IT skill groups in highest demand.md index e4842bcb5c..feae96977c 100644 --- a/sources/Insights into top 3 IT skill groups in highest demand.md +++ b/sources/Insights into top 3 IT skill groups in highest demand.md @@ -1,3 +1,4 @@ +icybreaker translating Insights into top 3 IT skill groups in highest demand ================================================================================ ![](http://www.linuxcareer.com/images/linux_it_skills_watch.png) @@ -58,4 +59,4 @@ via: http://www.linuxcareer.com/insights-into-top-3-it-skills-groups-in-highest- [1]:http://www.linuxcareer.com/it-skill-sets [2]:http://www.linuxcareer.com/images/Linux_jobs_classification_jul_oct_2013.png -[3]:http://www.r-project.org/ \ No newline at end of file +[3]:http://www.r-project.org/ From 18007783e6411074af431f9581a6bdaa0a986f7e Mon Sep 17 00:00:00 2001 From: whatever1992 <799758730@qq.com> Date: Mon, 2 Dec 2013 20:20:41 +0800 Subject: [PATCH 2/7] translating by whatever1992 --- sources/Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA.md | 1 + 1 file changed, 1 insertion(+) diff --git a/sources/Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA.md b/sources/Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA.md index b64725a9ff..0142fdb86f 100644 --- a/sources/Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA.md +++ b/sources/Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA.md @@ -1,3 +1,4 @@ +(translating by whatever1992) Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA ================================================================================ **Question**: How can I install Oracle Java 7 in Elemetary OS Luna? From bdd38686063777c55a10eb486753c909ee836373 Mon Sep 17 00:00:00 2001 From: chenjintao_ii Date: Mon, 2 Dec 2013 20:24:20 +0800 Subject: [PATCH 3/7] [work complete]This new worm targets Linux PCs and embedded devices --- ... targets Linux PCs and embedded devices.md | 40 ------------------- ... targets Linux PCs and embedded devices.md | 39 ++++++++++++++++++ 2 files changed, 39 insertions(+), 40 deletions(-) delete mode 100644 sources/This new worm targets Linux PCs and embedded devices.md create mode 100644 translated/This new worm targets Linux PCs and embedded devices.md diff --git a/sources/This new worm targets Linux PCs and embedded devices.md b/sources/This new worm targets Linux PCs and embedded devices.md deleted file mode 100644 index d35b70a947..0000000000 --- a/sources/This new worm targets Linux PCs and embedded devices.md +++ /dev/null @@ -1,40 +0,0 @@ -[this is bazz2, if you wanna translate this article, no way :P] -This new worm targets Linux PCs and embedded devices -================================================================================ -**The malware spreads by exploiting a 2012 vulnerability in PHP, Symantec researchers said** - -IDG News Service - A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures. - -According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP to run in the Common Gateway Interface (CGI) configuration. The vulnerability is tracked as CVE-2012-1823 and was patched in PHP 5.4.3 and PHP 5.3.13 in May 2012. - -The new worm, which was named Linux.Darlloz, is based on proof-of-concept code released in late October, the Symantec researchers said Wednesday in a [blog post][1]. - -"Upon execution, the worm generates IP [Internet Protocol] addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability," the Symantec researchers explained. "If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target." - -The only variant seen to be spreading so far targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures. - -However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL. - -These architectures are used in embedded devices like home routers, IP cameras, set-top boxes and many others. - -"The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux," the Symantec researchers said. "However, we have not confirmed attacks against non-PC devices yet." - -The firmware of many embedded devices is based on some type of Linux and includes a Web server with PHP for the Web-based administration interface. These kinds of devices might be easier to compromise than Linux PCs or servers because they don't receive updates very often. - -Patching vulnerabilities in embedded devices has never been an easy task. Many vendors don't issue regular updates and when they do, users are often not properly informed about the security issues fixed in those updates. - -In addition, installing an update on embedded devices requires more work and technical knowledge than updating regular software installed on a computer. Users have to know where the updates are published, download them manually and then upload them to their devices through a Web-based administration interface. - -"Many users may not be aware that they are using vulnerable devices in their homes or offices," the Symantec researchers said. "Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software." - -To protect their devices from the worm, users are advised to verify if those devices run the latest available firmware version, update the firmware if needed, set up strong administration passwords and block HTTP POST requests to -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4, either from the gateway firewall or on each individual device if possible, the Symantec researchers said. - --------------------------------------------------------------------------------- - -via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122 - -译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID) - -本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 - -[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices diff --git a/translated/This new worm targets Linux PCs and embedded devices.md b/translated/This new worm targets Linux PCs and embedded devices.md new file mode 100644 index 0000000000..d4676cf316 --- /dev/null +++ b/translated/This new worm targets Linux PCs and embedded devices.md @@ -0,0 +1,39 @@ +新蠕虫能感染 Linux 系统和嵌入式设备! +================================================================================ +**来自𧶼门铁克研究员的消息,这个病毒通过2012年出现的 PHP 漏洞传播** + +据美国国际数据集团(IDG)的新闻 —— 一个新的蠕虫病毒将目标指向那些运行了 Linux 和 PHP 的 x86 架构计算机,其变种还会对运行在其他芯片架构上的设备(诸如家用路由器和机顶盒)造成威胁。 + +根据𧶼门铁克研究员的介绍,这种病毒利用 php-cgi 上的一个漏洞进行传播,这个 php-cgi 组件的功能是允许 PHP 代码在通用网关接口(CGI)的配置环境下被执行。此漏洞的代号为 CVE-2012-1823(通过这个漏洞,攻击者可以远程执行任意代码,所以这个漏洞又叫“程任意代码执行漏洞” —— 译者注)。2012年5月份,PHP 5.4.3 和 PHP 5.3.13 这两个版本被打上补丁,修复了这个漏洞。 + +这个𧶼门铁克的研究员在[博客][1]中写道:这个名为“Linux.Darlloz”的新蠕虫病毒基于去年10月份放出的 PoC 代码(PoC:proof of concept,概念验证。利用目标计算机的漏洞,为对其进行攻击而设计的代码称为 exploit,而一个没有充分利用漏洞的 exploit,就是 PoC —— 译者注)。 + +“在传播过程中,这段蠕虫代码会随机产生 IP 地址,通过特殊途径,利用普通的用户名密码发送 HTTP POST 请求,探测漏洞”,研究员解释道:“如果一个目标没有打上 CVE-2012-1823 的补丁,这台机器就会从病毒服务器下载蠕虫病毒,之后寻找下一个目标。” + +这个唯一的蠕虫变种目前为止只感染了 x86 系统,这是因为这个病毒的二进制格式为 Intel 架构下的 ELF (Executable and Linkable Format)格式。 + +然而这个研究员警告说,黑客也为其他架构开发了病毒,包括 ARM,PPC,MIPS 和 MIPSEL。 + +这些计算机架构主要用于诸如家用路由器、网络监视器、机顶盒以及其他嵌入式设备。 + +“攻击者显然试图在最大范围内感染运行 Linux 的设备”,研究员又说:“然而我们还没有证实他们有没有攻击非 PC 设备。” + +很多嵌入式设备的固件都使用 Linux 作为操作系统,并且使用 PHP 作为 Web 服务管理界面。这些设备比 PC 机 或服务器更容易被攻陷,因为它们不会经常更新软件。 + +在嵌入式设备为一个漏洞打上补丁,从来都不是件容易的事。很多厂商都不会定期公布更新信息,而当他们公布时,用户也不会被告知说这些更新解决了哪些安全问题。 + +并且,在嵌入式设备上更新软件比在计算机上需要更多的工作,以及更多的技术知识。用户需要知道哪些网站能提供这些更新,然后下载下来,通过 Web 界面更新到他们的设备中。 + +“很多用户也许压根就不知道他们家里或办公室的设备存在漏洞,”啰嗦的研究员说:“我们面临的另一个问题是,即使用户注意到他们用的是有漏洞的设备,这些设备的供应商却没有提供补丁,原因是技术落后,或者完全就是硬件的限制:内存不足,或 CPU 太慢,不足以支持这些软件的新版本。” + +“为了保护他们的设备免受蠕虫感染,用户需要确认这些设备是否运行在最新的固件版本上,必要的话,升级固件,设置高强度的管理员密码,在防火墙那儿,或任何独立的设备那儿,屏蔽任何对 -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4 的 HTTP POST 请求。”没完没了的𧶼门铁克研究员说道。 + +-------------------------------------------------------------------------------- + +via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122 + +译者:[bazz2](https://github.com/bazz2) 校对:[校对者ID](https://github.com/校对者ID) + +本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 + +[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices From ddd4395cff2a4af342078283d85199688082c868 Mon Sep 17 00:00:00 2001 From: NearTan Date: Mon, 2 Dec 2013 20:41:35 +0800 Subject: [PATCH 4/7] translated by NearTan --- ... setup EPEL repository on CentOS 5 or 6.md | 96 ----------------- ... setup EPEL repository on CentOS 5 or 6.md | 101 ++++++++++++++++++ 2 files changed, 101 insertions(+), 96 deletions(-) delete mode 100644 sources/How to setup EPEL repository on CentOS 5 or 6.md create mode 100644 translated/How to setup EPEL repository on CentOS 5 or 6.md diff --git a/sources/How to setup EPEL repository on CentOS 5 or 6.md b/sources/How to setup EPEL repository on CentOS 5 or 6.md deleted file mode 100644 index 7308f79ec2..0000000000 --- a/sources/How to setup EPEL repository on CentOS 5 or 6.md +++ /dev/null @@ -1,96 +0,0 @@ - NearTan 选题 -How to setup EPEL repository on CentOS 5/6 -================================================================================ -What is EPEL repository - -EPEL (Extra Packages for Enterprise Linux) is a project from the Fedora group that maintains a repository of software packages that are not already present on RHEL/CentOS. The repository is compatible with RHEL and all close derivates like CentOS and Scientific Linux. - -By using epel we can easily install many packages (around 10,000) with yum command, that are not already present in the centos repositories. EPEL packages are usually based on their Fedora counterparts and will never conflict with or replace packages in the base Enterprise Linux distributions. - -Further details about the epel project are available at - -[https://fedoraproject.org/wiki/EPEL][1] - -So in this tutorial I am going show you how to setup the epel repositories on CentOS - -> Note - There are many different 3rd party repositories that provide software packages for RHEL/CentOS systems. Some of the most popular ones are RpmForge, RpmFusion, EPEL, Remi etc. -> -> However it should be always kept in mind, that if multiple such third party repositories are added to a system, then it can lead of conflicts. The same package can come from multiple repositories, and some repositories can replace base packages of a system leading to unexpected troubles. Rpmforge and Epel are known to have conflicts. -> -> There are advanced techniques to tackle this like setting up priorities, or selectively installing packages from repositories, but ofcourse these require a lot of effort and so if you are not sure about all this, it is recommended to only use 1 such external repository. - -### Install EPEL on CentOS ### - -To setup epel on centos, we need to download the epel installation rpm and install it. -The downloads pages for version 6.x and 5.x of CentOS/RHEL are the following - -[http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html][2] -[http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html][3] - -The above urls would probably redirect to country specific mirrors for faster download. The page would contain a download link to download the rpm directly. The direct download links are - -[http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm][4] -[http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm][5] - -Select the correct url depending on your centos version. -Note that the EPEL installer package is architecture independant, so can be installed on both x86 and x64 systems. - -### 1. Check your CentOS version ### - -First check your centos version with the following command - - $ cat /etc/redhat-release - CentOS release 6.4 (Final) - -### 2. Download EPEL rpm ### - -Now download the epel rpm file for the corresponding centos version from one of the urls given above. - - $ wget http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm - -### 3. Install the EPEL rpm ### - -Now install the epel package with the rpm command - - $ sudo rpm -ivh epel-release-6-8.noarch.rpm - or - $ sudo rpm -ivh epel-release* - -### 5. Check EPEL repository ### - -After installing the epel repository, check that it has been added to the repository list with the yum command - - # yum repolist - Loaded plugins: fastestmirror - Loading mirror speeds from cached hostfile - * base: mirrors.vonline.vn - * epel: buaya.klas.or.id - * extras: centos-hn.viettelidc.com.vn - * updates: mirrors.fibo.vn - repo id repo name status - base CentOS-6 - Base 6,381 - epel Extra Packages for Enterprise Linux 6 - x86_64 10,023 - extras CentOS-6 - Extras 13 - nginx nginx repo 47 - updates CentOS-6 - Updates 1,555 - repolist: 18,019 - -The epel is listed after base repo and provides around 10K packages. So epel is now setup on CentOS. -The epel repository is setup in the **/etc/yum.repos.d/epel.repo** file. - -Now install something from the epel repository - - $ sudo yum install htop - --------------------------------------------------------------------------------- - -via: http://www.binarytides.com/setup-epel-repository-centos/ - -译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID) - -本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 - -[1]:https://fedoraproject.org/wiki/EPEL -[2]:http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html -[3]:http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html -[4]:http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm \ No newline at end of file diff --git a/translated/How to setup EPEL repository on CentOS 5 or 6.md b/translated/How to setup EPEL repository on CentOS 5 or 6.md new file mode 100644 index 0000000000..ce884293f8 --- /dev/null +++ b/translated/How to setup EPEL repository on CentOS 5 or 6.md @@ -0,0 +1,101 @@ + +如何在CentOS 5/6上安装EPEL 源 +================================================================================ +(ps:这篇翻得很吃力,麻烦校对大人了 ToT) +(ps2:原文第五个链接失效,已修正) +EPEL 是什么? + +EPEL (Extra Packages for Enterprise Linux) 是Fedora 小组维护的一个项目。这个项目是一个软件仓库,为RHEL/CentOS 提供他们所不默认提供的软件包。这个源兼容RHEL 和像CentOS 和Scientific Linux 这样所有由其衍生出来的版本。 + +我们可以轻易地通过yum 命令从EPEL 源上获取上万个在CentOS 自带源上没有的软件。EPEL 提供的软件包大多基于Fedora ,不会与企业版Linux 发行版本的软件发生冲突或互相替换文件。 + +更多关于EPEL 项目的细节可以到以下网站获取。 + +[https://fedoraproject.org/wiki/EPEL][1] + +在文本中,我将展示在CentOS 下如何安装EPEL 源 + +> 提示 - RHEL/CentOS 系统有着太多的第三方源,比较流行的比如RpmForge, RpmFusion, EPEL, Remi等等。 +> +> 然而需要时刻注意的是,如果系统添加了多个第三方源,可能会因此产生冲突——一个软件包从多个源获取,一些源会替换系统的基础软件包可能会产生意想不到的错误。已知的就有Rpmforge 与EPEL 会产生冲突。 +> +> +> 对于这些问题我们建议,调整源的优先权或者有选择性的安装源,但是这需要复杂的操作,如果你不确定如何操作,我们推荐你只安装一个第三方源。 + +### 在CentOS 上安装EPEL ### + +要想安装EPEL,我们先要下载EPEL 的rpm安装包。 +CentOS/RHEL 下的6.x 和5.x 版本下载页面如下 + +[http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html][2] +[http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html][3] + +以上网址可能会为了获取更快的下载速度,被重定向到特地的镜像站。这页面包含可以直接获取到rpm 包的下载链接。直接的下载链接如下 + +[http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm][4] +[http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm][5] + +根据你的CentOS 版本来选择正确的下载地址。 +请注意EPEL 的安装包是独立编译的,所以它可以安装在32位和64位系统中。 + +### 1. 确认你的CentOS 的版本 ### + +首先通过以下命令确认你的CentOS 版本 + + + $ cat /etc/redhat-release + CentOS release 6.4 (Final) + +### 2. 下载EPEL 的rpm 安装包 ### + +现在从上面的地址下载CentOS 版本所对应的EPEL 的版本 + + $ wget http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm + +### 3. 安装EPEL ### + +通过以下命令安装EPEL 软件包 + + $ sudo rpm -ivh epel-release-6-8.noarch.rpm + or + $ sudo rpm -ivh epel-release* + +### 5. 检查EPEL 源 ### + +安装好EPEL 源后,用yum 命令来检查是否添加到源列表 + + # yum repolist + Loaded plugins: fastestmirror + Loading mirror speeds from cached hostfile + * base: mirrors.vonline.vn + * epel: buaya.klas.or.id + * extras: centos-hn.viettelidc.com.vn + * updates: mirrors.fibo.vn + repo id repo name status + base CentOS-6 - Base 6,381 + epel Extra Packages for Enterprise Linux 6 - x86_64 10,023 + extras CentOS-6 - Extras 13 + nginx nginx repo 47 + updates CentOS-6 - Updates 1,555 + repolist: 18,019 + +EPEL 已经在repo 后列出,并且显示提供了上万个软件包,所以EPEL 已经安装到你的CentOS了。 +EPEL 源已经安装到**/etc/yum.repos.d/epel.repo** 文件。 + +现在来试一下从EPEL 获取软件包 + + $ sudo yum install htop + +-------------------------------------------------------------------------------- + +via: http://www.binarytides.com/setup-epel-repository-centos/ + +译者:[NearTan](https://github.com/NearTan) 校对:[校对者ID](https://github.com/校对者ID) + +本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 + +[1]:https://fedoraproject.org/wiki/EPEL +[2]:http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html +[3]:http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html +[4]:http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm +[5]:http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm \ No newline at end of file From 4954aad2a7e323b3b0f8608e10d299fb49f73e7b Mon Sep 17 00:00:00 2001 From: Luoxcat Date: Mon, 2 Dec 2013 22:05:12 +0800 Subject: [PATCH 5/7] =?UTF-8?q?=E5=B7=B2=E7=BF=BB=E8=AF=91=E3=80=80by=20Lu?= =?UTF-8?q?ox?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...lexes with Briquolo, fast breakout game.md | 25 ------------------ ...lexes with Briquolo, fast breakout game.md | 26 +++++++++++++++++++ 2 files changed, 26 insertions(+), 25 deletions(-) delete mode 100644 sources/Test your reflexes with Briquolo, fast breakout game.md create mode 100644 translated/Test your reflexes with Briquolo, fast breakout game.md diff --git a/sources/Test your reflexes with Briquolo, fast breakout game.md b/sources/Test your reflexes with Briquolo, fast breakout game.md deleted file mode 100644 index 0770027d9c..0000000000 --- a/sources/Test your reflexes with Briquolo, fast breakout game.md +++ /dev/null @@ -1,25 +0,0 @@ - 这个不错  我要占坑 -Test your reflexes with Briquolo, fast breakout game -================================================================================ -[Briquolo][2] is a fast captivating breakout game that adopts the classic enjoyable game of dealing with a ball, in order to destroy various objects. - -Briquolo comes with an agile nature, therefore, the gamer is to be attentive while reflecting back the ball, a second of inattention and the ball is lost. - -Launching the game, the user is to notice its 3D look, the brave board is moved on top of a colorful environment featuring 3D objects, game arena where power-ups prove themselves vital, not succeeding to get the board-increasing goodies, the gamer decreases one's ability to complete the stage against the sprint-like attribute of the ball. - -Pleasant effects, according-to music and tweakable options (including the ability to set the game in fullscreen mode with high resolutions,--including 1920x1080--) present Briquolo as entertaining and challenging. - -![](http://iloveubuntu.net/pictures_me/Briquolo%20usc.jpg) - -Briquolo 0.5.7 is freely [available][2] for installation via Ubuntu Software Center (Ubuntu 12.04, Ubuntu 12.10, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04). - --------------------------------------------------------------------------------- - -via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game - -译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID) - -本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 - -[1]:http://briquolo.free.fr/en/ -[2]:apt://briquolo diff --git a/translated/Test your reflexes with Briquolo, fast breakout game.md b/translated/Test your reflexes with Briquolo, fast breakout game.md new file mode 100644 index 0000000000..1173cd42f0 --- /dev/null +++ b/translated/Test your reflexes with Briquolo, fast breakout game.md @@ -0,0 +1,26 @@ +用Briquolo,打砖块游戏,测试你的反应速度 + +================================================================================ + +[Briquolo][2]是一款快速而又迷人的游戏,处理一个球来破坏不同的物体,经典而又令人愉悦。 + +Briquolo十分考验敏捷,因此,游戏玩家必需时刻注意球的走向,一不留神就可能让球掉落。 + +启动游戏后,玩家会意识到这是一款3D游戏,以3D对象展现的华丽木块浮动在一个多彩的环境里,当击破木块时有机率掉落特殊物体,毫无疑问获取它们是至关重要的,会改变球或滑板的状态,比如球会加速,但有时候也会给你带来麻烦。 + +通过音乐和其他选项的修改,到达精致的效果(包括游戏全屏,高分辨率,--可调至1920×1080--)呈现一个有趣而又富有挑战性的Briquolo。 + +![](http://iloveubuntu.net/pictures_me/Briquolo%20usc.jpg) + +Briquolo 0.5.7是[可靠的][2]自由软件,可通过Ubuntu软件中心安装(Ubuntu 12.04, Ubuntu 12.04, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04)。 + +-------------------------------------------------------------------------------- + +via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game + +译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID) + +本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 + +[1]:http://briquolo.free.fr/en/ +[2]:apt://briquolo From afdf5381d311d5073bf3301471abc074e67d7955 Mon Sep 17 00:00:00 2001 From: Luoxcat Date: Mon, 2 Dec 2013 22:06:49 +0800 Subject: [PATCH 6/7] Update Test your reflexes with Briquolo, fast breakout game.md --- .../Test your reflexes with Briquolo, fast breakout game.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/translated/Test your reflexes with Briquolo, fast breakout game.md b/translated/Test your reflexes with Briquolo, fast breakout game.md index 1173cd42f0..e794f060e8 100644 --- a/translated/Test your reflexes with Briquolo, fast breakout game.md +++ b/translated/Test your reflexes with Briquolo, fast breakout game.md @@ -18,7 +18,7 @@ Briquolo 0.5.7是[可靠的][2]自由软件,可通过Ubuntu软件中心安装( via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game -译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID) +译者:[Luoxcat](https://github.com/Luoxcat) 校对:[校对者ID](https://github.com/校对者ID) 本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出 From 838230a4311edf03a4d63f6140ab4af11eb7576c Mon Sep 17 00:00:00 2001 From: Luoxcat Date: Mon, 2 Dec 2013 22:10:00 +0800 Subject: [PATCH 7/7] =?UTF-8?q?Luox=E7=BF=BB=E8=AF=91?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- sources/Setup a jailed shell with jailkit on ubuntu.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/sources/Setup a jailed shell with jailkit on ubuntu.md b/sources/Setup a jailed shell with jailkit on ubuntu.md index 181caa20e1..806d293e9f 100644 --- a/sources/Setup a jailed shell with jailkit on ubuntu.md +++ b/sources/Setup a jailed shell with jailkit on ubuntu.md @@ -1,3 +1,5 @@ + 我不入监狱  谁入监狱 + Setup a jailed shell with jailkit on ubuntu ================================================================================ ### Jailed Shell and Jailkit ### @@ -216,4 +218,4 @@ via: http://www.binarytides.com/setup-jailed-shell-jailkit-ubuntu/ [9]: [10]: [11]: -[12]: \ No newline at end of file +[12]: