Home
Name Modified Size Downloads / Week Status
Totals: 9 Items   12.5 GB 1,939
Robolinux-7.9.2-Versions 2015-07-15 250250 weekly downloads
Readme.txt 2015-09-03 13.9 kB 5757 weekly downloads
robolinux64-live-xfce-v8.1.iso 2015-09-03 2.1 GB 543543 weekly downloads
robolinux32-live-xfce-v8.1.iso 2015-09-03 2.1 GB 175175 weekly downloads
robolinux64-live-mate-v8.1.iso 2015-08-12 2.0 GB 750750 weekly downloads
robolinux32-live-mate-v8.1.iso 2015-08-12 2.1 GB 124124 weekly downloads
robolinux64-live-cinnamon-v8.1.iso 2015-08-01 2.1 GB 125125 weekly downloads
robolinux32-live-cinnamon-v8.1.iso 2015-08-01 2.2 GB 129129 weekly downloads
compress-windows-vm.zip 2014-05-04 77.4 kB 3636 weekly downloads
Announcing a Brand New Robolinux OS "Xfce Raptor" V8.1 LTS 2020 Robolinux is very pleased and excited to announce its absolutley brand new "Fast as greased lightning!" Robolinux "Xfce Raptor" V8.1 LTS 2020 OS based on 100% rock solid Debian 8 stable source code with the 3.16 Linux kernel. It is loaded with many popular User applications such the newest Tor browser, i2P, Firefox, Thunderbird, Kazam screencaster, Google Chrome, Google Earth, Skype & VirtualBox 4.30 plus 12 incredibly powerful Security and Privacy apps to keep our Users safe! The 32 bit version uses only 185 MB of RAM. It has far better graphics and audio quality, boots up and runs much faster than our Debian 7 based Xfce version and is also compatible with newer hardware, drivers and most notably the Intel Haswell chipset. The Robolinux "Xfce Raptor" user interface is extremely fast, quite beautiful and very easy to use. A collossal amount of time and effort went into optimizing and tweaking Robolinux "Xfce Raptor" v8.1 so that Linux Beginners and Advanced Users will be very pleased. As usual both the 32 & 64 bit versions come with dozens of one click Wifi, Video & Printer Driver installers. The built in Stealth VM supports both Windows 10 (32 & 64 bit) versions which run virus free inside Robolinux. We also added a brand new Xfce FAQ section to our website as well. Robolinux 7 series users can migrate with ease by using the built in Lucky Backup application in all Robolinux 7 versions. Please Note: Some PC's & Laptops with video cards manufactured before 2008 are no longer supported in the Robolinux 8 Raptor series LTS 2020 (i.e. Debian 8). However the Robolinux series 7 Operating Systems LTS 2018 do still support these old video cards. ------------------------------------------------------------------------------- Here are the 12 Privacy & Security apps in Robolinux "Xfce Raptor" v8.1 1. Private Internet Access VPN No saved log files for the NSA to snoop! Dozens of Gateways all over the World! Up to 190 Gigabit speeds per Gateway! Stops ISP Torrent Throttling! No Bandwidth Limits! One account protects your PC, laptop, Phone, Tablet and TV too. 2. Invisible Internet Project (I2P) i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially - when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries - for bringing about connections - differ both from Tor's hidden services and clearnet DNS. i2p is rumored to have a higher network latency but to be more capable of preserving a user's anonymity than Tor's hidden services. However - regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required. 3. RootKit Check The chkrootkit security scanner searches the local system for signs that it is infected with a 'rootkit'. Rootkits are set of programs and hacks designed to take control of a target machine by using known security flaws. 4. Tor Anonymous Browser Tor protects privacy in communications via a distributed network of relays run by volunteers all around the world: it prevents anybody watching Internet connections from learning what sites you visit, and it prevents the visited sites from learning your physical location. Tor works with web browsers, instant messaging programs, remote login clients, and many other TCP-based applications. 5. Tor Anonymous Chat TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, providing strong anonymity while being very easy to use Top most relevant feature TorChat claims, above from text messaging and file sending, rest on the difficulty someone would experiment trying to find out where you are communicating from In the condition someone might be observing you and sniff your internet traffic connection, the person will have a high degree of difficulty in finding out: - Where your contacts are located - To whom you are sending or receiving from - What you send or receive, as everything is end-to-end encrypted 6. The Robolinux Stealth Text Vault The Robolinux Stealth Text Vault app uses steghide a steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. It features hiding text file data in jpg files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. 7. BleachBit BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary files, cookies, and broken shortcuts. It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer, rpmbuild, Second Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images), vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files. 8. PGP eMail Encryption for Thunderbird The OpenPGP extension for Thunderbird called Enigmail allows users to access the features provided by the popular GnuPG software from within Thunderbird. Enigmail is capable of signing, authenticating, encrypting and decrypting email. Additionally, it supports both the inline PGP format, as well as the PGP/MIME format as described in RFC 3156. 9. UFW Firewall gufw is an easy and intuitive way to manage your Linux firewall. It supports common tasks such as allowing or blocking pre-configured, common p2p, or individual port(s), and many others! The Uncomplicated FireWall is a front-end for iptables, to make managing a Netfilter firewall easier. It provides a command line interface with syntax similar to OpenBSD's Packet Filter. It is particularly well-suited as a host-based firewall. 10. Clam AV Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon in the clamav-daemon package, a command-line scanner in the clamav package, and a tool for automatic updating via the Internet in the clamav-freshclam package. The programs are based on libclamav6, which can be used by other software. This package contains the command line interface. Features: - built-in support for various archive formats, including Zip, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in support for almost all mail file formats; - built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others; - built-in support for popular document formats including Microsoft Office and Mac Office files, HTML, RTF and PDF. For scanning to work, a virus database is needed. There are two options for getting it: - clamav-freshclam: updates the database from Internet. This is recommended with Internet access. - clamav-data: for users without Internet access. The package is not updated once installed. The clamav-getfiles package allows creating custom packages from an Internet-connected computer. 11. Keepass2 KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily. KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files. 12. JonDo JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components: * Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users. * Mix Cascades: Chains of Mixes run by various independent operators. They typically consist of three Mixes: one first Mix (IN) which receives requests from the users, one middle Mix (MIDDLE) which only forwards traffic to other Mixes, and a last Mix (OUT) which sends the real outgoing requests to internet resources. * InfoService: A separate service which provides information about the available mixes and mix cascades, thenumber of users currently using the mix cascades, and their current workload. * JonDo: Client program installed on the user's computer. Its primary use is to establish encrypted connections to anonymising Mix Cascades. In this form, the system protects from observation by * the visited web server * your internet access provider (internet cafe, WLAN, AOL, T-Online, ...) * other eavesdroppers on the connections (ECHELON,...) * any data retention (by international distribution) * the JonDonym service itself. ------------------------------------------ Robolinux provides its Users with optional expert Tech Support with a 1-2 hour response time. This is far more efficient than Forum based support. Be sure to check out the Robolinux Revolutionary C Drive to VM Software which supports all 500 Linux Operating Systems: http://robolinux.org/c-drive-to-vm Since support for XP has expired many Windows XP Users around the world are migrating from Windows XP to Linux because they don't want to to be forced to spend hundreds of dollars or throw away their PC or laptop that is in perfectly good working condition. Since Robolinux invented "Revolutionary Stealth VM" inside our Debian Operating System we decided to create specific versions that work on all Linux Operating Systems so now anyone can run Windows XP or 7 inside Linux Mint, all Ubuntu versions & derivaives and all RPM based operating systems virus Free! In a few clicks the Windows XP or 7 virtual machine is instantly built & fully configured and ready to go. Then you simply load your Windows disk and programs. Robolinux has incredibly easy how to screens & videos to make sure anyone can do it. Now you can run Windows XP & 7 Virus Free inside all Linux Operating Systems with The Robolinux Stealth VM Sofware. Please visit http://robolinux.org/lm Stealth VM designed for Linux Mint Please visit http://robolinux.org/ubuntu Stealth VM designed for Ubuntu Please visit http://robolinux.org/opensuse Stealth VM designed for all RPM Linux Distros Please visit http://robolinux.org Robolinux OS with Stealth VM built inside The Robolinux Stealth VM Software will significantly increase the number of successful and permanent Windows to Linux User migrations which is estimated by ZD Net to be 11% of the 670 million existing Windows XP User Base. One Windows User explains the problem with migrating to Linux in this succinct blog on ZD Net: "So from my point it really is an application thing not an OS thing. I confess I have never tried Wine. But your average user doesn't want to mess with that". Most if not all Windows XP Users who are just switching to Linux are worried about being able to run their Windows applications. Indeed that is a problem they are looking to solve as quickly as possible, otherwise they will give up and not switch to Linux. Wine is too complicated and does not support all of their software. Users who have already switched to Linux Mint or Ubuntu most likely had to install Linux Mint or Ubuntu as a dual boot system, otherwise they would have had no access to several Windows programs they really need to run on a daily basis. The problem with dual booting is that it takes a lot of time to reboot from Linux to Windows and back again all day long, plus running Windows XP or 7 on it's own is not virus Free. Sadly dual booting also stops you from being able to run your new favorite OS Linux Mint or Ubuntu all the time. What Windows XP Users want to do is run Windows applications inside Linux Mint or Ubuntu. Robolinux also offers Global Private Internet Access For All of Your Internet Devices! Protect Your Privacy & Say Goodbye to the NSA! No saved log files for the NSA to snoop! Dozens of Gateways all over the World! Up to 190 Gigabit speeds per Gateway! Stops ISP Torrent Throttling! No Bandwidth Limits! Now you can protect Your PC, laptop, Phone, Tablet, TV & Gaming console too! In fact anything you own that is connected to the internet can now be protected with just one VPN Account! The Robolinux VPN is fully integrated to a Global Private Internet Access Provider and takes less than 30 seconds to set up! ------------------------------------------ http://www.robolinux.org/contact Welcome to a virus free life! roboinux.org
Source: Readme.txt, updated 2015-09-03