Announcing Robolinux Mate Raptor
V8.1 LTS Runs Windows Virus Free!

Robolinux is very pleased and excited to announce its brand new lightning fast Robolinux "Mate Raptor" V8.1 LTS 2020 OS which is based on the rock solid Debian 8 stable source code with the 3.16 Linux kernel. It uses 210 MB less RAM than our Cinnamon version. Custom scripts can be added to the Caja file Manager to speed up your productivity. It has far better graphics quality, boots up and runs much faster than our Debian 7 versions and is also compatible with newer hardware, drivers and most notably the Intel Haswell chipset.

The Robolinux "Mate Raptor" user interface is extremely fast, quite beautiful and very easy to use. A tremendous amount of time and effort went into optimizing and tweaking Robolinux "Mate Raptor" v8.1 so that Linux Beginners and Advanced Users will be very pleased.

As usual both the 32 & 64 bit versions come with dozens of one click Wifi, Video & Printer Driver installers. The built in Stealth VM supports both Windows 10 (32 & 64 bit) versions. which run virus free inside Robolinux. All 12 Robolinux privacy & security apps like the newest i2P Invisible Internet Project, Tor browser, Tor Chat, UFW Firewall, Clam AV plus many popular User applications such as PopcornTime, Netflix, Firefox, Thunderbird, Kazam screencaster, Google Chrome, Google Earth, Skype, VLC, Plex Media Server, Kdenlive Video Editor and VirtualBox. We also added a brand new Mate FAQ section to our website as well.

Please note: Robolinux 7 series users can migrate with ease by using the built in Lucky Backup application in all Robolinux 7 versions.

Important Note: PC's & Laptops manufactured before 2008 Video cards in some of these old machines are no longer supported in the Robolinux 8 Raptor series LTS 2020 (i.e. Debian 8). However the Robolinux series 7 Operating Systems LTS 2018 do still support these old video cards.

WARNING! Oracle VirtualBox 5.0 cannot be used with C Drive to VM as it is missing critical binaries. Until they fix it you must download VirtualBox 4.30. However if you do not plan to use C Drive to VM then you can download VirtualBox version 5.0

Here are the 12 Privacy & Security apps in Robolinux Mate Raptor v8.1

1. Private Internet Access VPN (Added to all Robolinux versions in 2014) No saved log files for the NSA to snoop! Dozens of Gateways all over the World! Up to 190 Gigabit speeds per Gateway! Stops ISP Torrent Throttling! No Bandwidth Limits!

One account protects your PC, laptop, Phone, Tablet and TV too.

2. Invisible Internet Project (I2P)

i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially - when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries - for bringing about connections - differ both from Tor's hidden services and clearnet DNS.

i2p is rumored to have a higher network latency but to be more capable of preserving a user's anonymity than Tor's hidden services. However - regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required.

3. RootKit Check

The chkrootkit security scanner searches the local system for signs that it is infected with a 'rootkit'. Rootkits are set of programs and hacks designed to take control of a target machine by using known security flaws.

4. Tor Anonymous Browser

Tor protects privacy in communications via a distributed network of relays run by volunteers all around the world: it prevents anybody watching Internet connections from learning what sites you visit, and it prevents the visited sites from learning your physical location. Tor works with web browsers, instant messaging programs, remote login clients, and many other TCP-based applications.

5. Tor Anonymous Chat

TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, providing strong anonymity while being very easy to use Top most relevant feature TorChat claims, above from text messaging and file sending, rest on the difficulty someone would experiment trying to find out where you are communicating from In the condition someone might be observing you and sniff your internet traffic connection, the person will have a high degree of difficulty in finding out: - Where your contacts are located - To whom you are sending or receiving from - What you send or receive, as everything is end-to-end encrypted

6. The Robolinux Stealth Text Vault

The Robolinux Stealth Text Vault app uses steghide a steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. It features hiding text file data in jpg files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.

7. BleachBit

BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary files, cookies, and broken shortcuts. It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE,, Opera, RealPlayer, rpmbuild, Second Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images), vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files.

8. PGP eMail Encryption for Thunderbird

The OpenPGP extension for Thunderbird called Enigmail allows users to access the features provided by the popular GnuPG software from within Thunderbird. Enigmail is capable of signing, authenticating, encrypting and decrypting email. Additionally, it supports both the inline PGP format, as well as the PGP/MIME format as described in RFC 3156.

9. UFW Firewall

gufw is an easy and intuitive way to manage your Linux firewall. It supports common tasks such as allowing or blocking pre-configured, common p2p, or individual port(s), and many others!

The Uncomplicated FireWall is a front-end for iptables, to make managing a Netfilter firewall easier. It provides a command line interface with syntax similar to OpenBSD's Packet Filter. It is particularly well-suited as a host-based firewall.

10. Clam AV

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon in the clamav-daemon package, a command-line scanner in the clamav package, and a tool for automatic updating via the Internet in the clamav-freshclam package. The programs are based on libclamav6, which can be used by other software.

This package contains the command line interface. Features: - built-in support for various archive formats, including Zip, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in support for almost all mail file formats; - built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others; - built-in support for popular document formats including Microsoft Office and Mac Office files, HTML, RTF and PDF.

For scanning to work, a virus database is needed. There are two options for getting it:

- clamav-freshclam: updates the database from Internet. This is recommended with Internet access. - clamav-data: for users without Internet access. The package is not updated once installed. The clamav-getfiles package allows creating custom packages from an Internet-connected computer.

11. Keepass2

KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily.

KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files.

12. JonDo

JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components:

* Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users.

* Mix Cascades: Chains of Mixes run by various independent operators. They typically consist of three Mixes: one first Mix (IN) which receives requests from the users, one middle Mix (MIDDLE) which only forwards traffic to other Mixes, and a last Mix (OUT) which sends the real outgoing requests to internet resources.

* InfoService: A separate service which provides information about the available mixes and mix cascades, thenumber of users currently using the mix cascades, and their current workload.

* JonDo: Client program installed on the user's computer. Its primary use is to establish encrypted connections to anonymising Mix Cascades.

In this form, the system protects from observation by

* the visited web server * your internet access provider (internet cafe, WLAN, AOL, T-Online, ...) * other eavesdroppers on the connections (ECHELON,...) * any data retention (by international distribution) * the JonDonym service itself.

© 2011-2016 All Rights Reserved