As the Christmas and Holiday Season was approaching Robolinux polled its User Base extensively asking "What hot new Apps do you want in Robolinux Cinnamon, Mate, Xfce & LXDE Raptors?"
An overwhelming number of Users responded with "We want more Multimedia
and privacy Apps in Robolinux". Interestingly many Users asked
for a packet sniffer to monitor their privacy amongst other things.
So we listened carefully and delivered just in time for Christmas.
Here's what we added to all four Robolinux Raptor versions 8.3
1. Spotify: Music streaming, podcast and video service
2. Photo Filmstrip: Makes movies out of your pictures
3. Scribus: Powerful Desktop Publishing
4. Privoxy: Removes ads, banners, pop-ups & other Internet junk
5. OpenShot: An easy to use Video editor
6. gThumb: An advanced image viewer and browser
7. Pinta: An easy to use drawing/editing program
8. specto: Unobtrusive update notification program
9. Wireshark: A powerful network packet analyzer & sniffer
10. Blender: Very fast and versatile 3D modeller/renderer
Please don't forget that all current Robolinux 8 Raptor series users can
upgrade in just one click by using the built in Robolinux Auto Upgrade button in the main menu.
We also added more wifi and printer drivers plus all upstream security
updates too. Popcorntime was removed as it is history as you may know.
All 32 & 64 bit Robolinux Raptor Operating Systems are loaded with many
other popular User applications such the newest Tor browser, i2P, Firefox, Thunderbird, Kazam screencaster, Google Chrome, Google Earth, Skype & VirtualBox plus 12 incredibly powerful Security and Privacy apps to keep our Users safe!
Please Note: Some PC's & Laptops with video cards manufactured before 2008 are no longer supported in the Robolinux 8 Raptor series LTS 2020 (i.e. Debian 8). However the Robolinux series 7 Operating Systems LTS 2018 do still support these old video cards.
The New Multimedia Apps Plus 13 *Privacy Apps in all 8.3 Raptor Versions
Is a Swedish commercial music streaming, podcast and video service that provides digital rights management-restricted content from record labels and media companies. It is available in most of the Americas, Western Europe and Oceania.
2. Photo Filmstrip:
This creates movies out of your pictures in just three steps. First select
your photos, customize the motion path and render the video. There are
several output possibilities for VCD, SVCD, DVD up to FULL-HD.
The effect of the slideshow is known as "Ken Burns". Comments of the
pictures are generated into a subtitle file. Furthermore an audio file can
be specified to setup the background music for the slide show.
Is an open source desktop page layout program with the aim of
producing commercial grade output in PDF and Postscript, primarily, though
not exclusively for Linux.
Scribus can be used for many tasks; from brochure design to newspapers,
magazines, newsletters and posters to technical documentation. It has
sophisticated page layout features like precision placing and rotating of text and/or images on a page, manual kerning of type, bezier curves polygons, precision placement of objects, layering with RGB and CMYK custom colors. The Scribus document file format is XML-based. Unlike proprietary binary file formats, even damaged documents, can be recovered with a simple text editor.
Scribus supports professional DTP features, such as CMYK color and a
color management system to soft proof images for high quality color printing, flexible PDF creation options, Encapsulated PostScript import/export and creation of 4 color separations, import of EPS/PS and SVG as native vector graphics, Unicode text including right to left scripts such as Arabic and Hebrew via freetype. Graphic formats which can be placed in Scribus as images include PDF, Encapsulated Post Script (eps), TIFF, JPEG, PNG and XPixMap(xpm), and any bitmap type supported by QT4.
Printing, PDF and SVG creation are done via custom driver libraries and
plug-ins, giving Scribus inventive features: the abilities to include
presentation effects with PDF output, fully scriptable interactive PDF
forms, SVG vector file output. The internal printer drivers fully support
Level 2 and Level 3/PDF 1.4 postscript features including transparency and
Is a web proxy with advanced filtering capabilities for
protecting privacy, filtering web page content, managing cookies,
controlling access, and removing ads, banners, pop-ups and other
obnoxious Internet junk. Privoxy has a very flexible configuration
and can be customized to suit individual needs and tastes. Privoxy
has application for both stand-alone systems and multi-user networks.
An easy to use Video editor
Create and edit videos and movies.
OpenShot Video Editor is a free, open-source, non-linear video editor. It
can create and edit videos and movies using many popular video, audio, and
image formats. Create videos for YouTube, Flickr, Vimeo, Metacafe, iPod,
Xbox, and many more common formats!
* Multiple tracks (layers)
* Compositing, image overlays, and watermarks
* Support for image sequences (rotoscoping)
* Key-frame animation
* Video and audio effects (chroma-key)
* Transitions (lumas and masks)
* 3D animation (titles and physics simulations)
* Chroma key (green screen & blue screen)
* Transcode (convert video encodings)
* Upload videos (YouTube and Vimeo supported)
Is an advanced image viewer and browser. It has many useful
features, such as filesystem browsing, slide show, image catalogs, web
album creation, camera import, image CD burning, batch file operations and
quick image editing features like transformation and color manipulation.
Is an easy to use drawing/editing program. Its goal is to
provide a simplified experience for casual users.
- Adjustments (Auto level, Black and White, Sepia
- Effects (Motion blur, Glow, Warp
- Multiple layers
- Unlimited undo/redo
- Drawing tools Paintbrush, Pencil, Shapes
Is a desktop application that will watch any user-specified events
(web, folder, ...). This will allow users, for instance, to specify a website to watch, and Specto will automatically check for updates on the web page.
It will then notify the user when there is activity. This will allow the user to be informed of new updates/events instead of having to look out for them.
A powerful network packet analyzer & sniffer tool that captures and analyzes packets off the wire. Wireshark can decode many protocols.
Is an integrated 3d suite for modelling, animation, rendering,
post-production, interactive creation and playback (games). Blender has its
own particular user interface, which is implemented entirely in OpenGL and
designed with speed in mind. Python bindings are available for scripting;
import/export features for popular file formats like 3D Studio and Wavefront
Obj are implemented as scripts by the community. Stills, animations, models
for games or other third party engines and interactive content in the form of
a standalone binary are common products of Blender use.
12 More *Privacy & Security apps in all V8.3 Robolinux Raptors
1. Private Internet Access VPN
(Added to all Robolinux versions in 2014)
No saved log files for the NSA to snoop!
Dozens of Gateways all over the World!
Up to 190 Gigabit speeds per Gateway!
Stops ISP Torrent Throttling!
No Bandwidth Limits!
One account protects your PC, laptop, Phone, Tablet and TV too.
2. Invisible Internet Project (I2P)
i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially - when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries - for bringing about connections - differ both from Tor's hidden services and clearnet DNS.
i2p is rumored to have a higher network latency but to be more capable of preserving a user's anonymity than Tor's hidden services. However - regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required.
3. RootKit Check
The chkrootkit security scanner searches the local system for signs that it is infected with a 'rootkit'. Rootkits are set of programs and hacks designed to take control of a target machine by using known security flaws.
4. Tor Anonymous Browser
Tor protects privacy in communications via a distributed network of relays run by volunteers all around the world: it prevents anybody watching Internet connections from learning what sites you visit, and it prevents the visited sites from learning your physical location. Tor works with web browsers, instant messaging programs, remote login clients, and many other TCP-based applications.
5. Tor Anonymous Chat
TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, providing strong anonymity while being very easy to use Top most relevant feature TorChat claims, above from text messaging and file sending, rest on the difficulty someone would experiment trying to find out where you are communicating from In the condition someone might be observing you and sniff your internet traffic connection, the person will have a high degree of difficulty in finding out: - Where your contacts are located - To whom you are sending or receiving from - What you send or receive, as everything is end-to-end encrypted
6. The Robolinux Stealth Text Vault
The Robolinux Stealth Text Vault app uses steghide a steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. It features hiding text file data in jpg files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.
BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary files, cookies, and broken shortcuts. It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer, rpmbuild, Second Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images), vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files.
8. PGP eMail Encryption for Thunderbird
The OpenPGP extension for Thunderbird called Enigmail allows users to access the features provided by the popular GnuPG software from within Thunderbird. Enigmail is capable of signing, authenticating, encrypting and decrypting email. Additionally, it supports both the inline PGP format, as well as the PGP/MIME format as described in RFC 3156.
9. UFW Firewall
gufw is an easy and intuitive way to manage your Linux firewall. It supports common tasks such as allowing or blocking pre-configured, common p2p, or individual port(s), and many others!
The Uncomplicated FireWall is a front-end for iptables, to make managing a Netfilter firewall easier. It provides a command line interface with syntax similar to OpenBSD's Packet Filter. It is particularly well-suited as a host-based firewall.
10. Clam AV
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon in the clamav-daemon package, a command-line scanner in the clamav package, and a tool for automatic updating via the Internet in the clamav-freshclam package. The programs are based on libclamav6, which can be used by other software.
This package contains the command line interface. Features:
- built-in support for various archive formats, including Zip, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in support for almost all mail file formats; - built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others; - built-in support for popular document formats including Microsoft Office and Mac Office files, HTML, RTF and PDF.
For scanning to work, a virus database is needed.
There are two options for getting it:
- clamav-freshclam: updates the database from Internet. This is recommended with Internet access. - clamav-data: for users without Internet access. The package is not updated once installed. The clamav-getfiles package allows creating custom packages from an Internet-connected computer.
KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily.
KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files.
JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components:
* Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users.
* Mix Cascades: Chains of Mixes run by various independent operators. They typically consist of three Mixes: one first Mix (IN) which receives requests from the users, one middle Mix (MIDDLE) which only forwards traffic to other Mixes, and a last Mix (OUT) which sends the real outgoing requests to internet resources.
* InfoService: A separate service which provides information about the available mixes and mix cascades, thenumber of users currently using the mix cascades, and their current workload.
* JonDo: Client program installed on the user's computer. Its primary use is to establish encrypted connections to anonymising Mix Cascades.
In this form, the system protects from observation by
* the visited web server
* your internet access provider (internet cafe, WLAN, AOL, T-Online, ...)
* other eavesdroppers on the connections (ECHELON,...)
* any data retention (by international distribution)
* the JonDonym service itself.