Home
Name Modified Size Downloads / Week Status
Totals: 10 Items   16.0 GB 2,436
robolinux32-live-gnome-v7.9.2.iso 2015-06-19 2.2 GB 193193 weekly downloads
robolinux32-live-lxde-v7.9.2.iso 2015-06-19 1.8 GB 102102 weekly downloads
robolinux64-live-lxde-v7.9.2.iso 2015-06-19 1.7 GB 200200 weekly downloads
robolinux32-live-xfce-v7.9.2.iso 2015-06-19 2.0 GB 6666 weekly downloads
robolinux64-live-xfce-v7.9.2.iso 2015-06-19 1.9 GB 1,0541,054 weekly downloads
robolinux32-live-kde-v7.9.2.iso 2015-06-19 2.1 GB 6565 weekly downloads
robolinux64-live-kde-v7.9.2.iso 2015-06-19 2.1 GB 271271 weekly downloads
readme.txt 2015-06-19 16.7 kB 6868 weekly downloads
robolinux64-live-gnome-v7.9.2.iso 2015-06-19 2.1 GB 384384 weekly downloads
compress-windows-vm.zip 2014-05-04 77.4 kB 3333 weekly downloads
Robolinux is pleased to announce V7.9.2 LTS (Until 2018) X12+ Privacy & Security which has many enhancements, plus maintenance and upstream security updates, the newest VirtualBox, Firefox and Thunderbird versions as well as three exceptional new apps. After releasing "Apex X12 Privacy & Security" in version 7.9.1 May 1st, 2015, We asked our Users what enhancements and new apps would you like added to Robolinux? They said: "We would like the Robolinux 7 series to have "LTS" Long Term Support" and we want 1. A Download Manager 2. A better text editor and 3. A better screen capture program. The result is Version 7.9.2 will now be supported through 2018 and we added the following applications: Uget Downloader Manager, Shutter Screen capture & Medit. All existing users & ROSSF Premium Members can upgrade right now by simply clicking on our "Robolinux Auto Upgrade" System Menu Option. Please be aware that the Robolinux series 7 versions do not support the Intel Haswell chipset but future Robolinux series 8 versions will support it. Robolinux LTS X12+ Privacy & Security v7.9.2 details: Robolinux V7.9.2 LTS (Until 2018) X12+ has many important enhancements, plus maintenance and upstream security updates, the newest VirtualBox, Firefox and Thunderbird versions as well as three exceptional new apps which are: 1. Uget 2. Sometimes you can’t download everything from torrents, and you don’t want to keep your browser running all the time. Then you need a download manager, and uget is a fantastic one that works on Linux, Android and Windows. It lets you queue, schedule and categorize downloads, and most importantly, supports download resuming. Uget offers even more than that, but it manages to stay lightweight and simple to use, which is really commendable. It provides the following features: * Resume downloads. * Queue downloads. * Classify downloads in categories. * Mozilla Firefox integration (through Flashgot plugin). * Clipboard monitoring. * Import downloads import from HTML files. * Batch download. 2. Shutter Screen capture This is tne most powerful and complete Linux screen capture app available today! Shutter is a feature-rich screenshot program. You can take a screenshot of a specific area, window, your whole screen, or even of a website - apply different effects to it, draw on it to highlight points, and then upload to an image hosting site, all within one window. It's absolutely awesome! 3. Medit Please note that we did not include this app in our KDE versions. You can install it in seconds if you want to via Synaptic. It can cut and paste without having to type Control C and V, instead you can use the mousewheel which speeds up your work significantly. It is also feature rich. It has: * Configurable syntax highlighting. * Configurable keyboard accelerators. * Multiplatform - works both on Linux and windows. * Plugins: can be written in C or Python. * Configurable tools available from the main and context menus. They can be written in Python, or it can be a shell script, or in MooScript - simple builtin scripting lanugage. * Regular expression search/replace, grep and find frontends, and a builtin file selector. Here are the LTS X12+ Privacy & Security apps in Robolinux v7.9.2 1. Private Internet Access VPN (Added to all Robolinux versions in 2014) No saved log files for the NSA to snoop! Dozens of Gateways all over the World! Up to 190 Gigabit speeds per Gateway! Stops ISP Torrent Throttling! No Bandwidth Limits! One account protects your PC, laptop, Phone, Tablet and TV too. Apex X12 V7.9.1 Details below 1. Invisible Internet Project (I2P) i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially - when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries - for bringing about connections - differ both from Tor's hidden services and clearnet DNS. i2p is rumored to have a higher network latency but to be more capable of preserving a user's anonymity than Tor's hidden services. However - regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required. 2. RootKit Check The chkrootkit security scanner searches the local system for signs that it is infected with a 'rootkit'. Rootkits are set of programs and hacks designed to take control of a target machine by using known security flaws. Ultra X10 v7.8.3 Details below 1. Tor Anonymous Browser Tor protects privacy in communications via a distributed network of relays run by volunteers all around the world: it prevents anybody watching Internet connections from learning what sites you visit, and it prevents the visited sites from learning your physical location. Tor works with web browsers, instant messaging programs, remote login clients, and many other TCP-based applications. 2. Tor Anonymous Chat TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, providing strong anonymity while being very easy to use Top most relevant feature TorChat claims, above from text messaging and file sending, rest on the difficulty someone would experiment trying to find out where you are communicating from In the condition someone might be observing you and sniff your internet traffic connection, the person will have a high degree of difficulty in finding out: - Where your contacts are located - To whom you are sending or receiving from - What you send or receive, as everything is end-to-end encrypted 3. The Robolinux Stealth Text Vault The Robolinux Stealth Text Vault app uses steghide a steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. It features hiding text file data in jpg files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. 4. BleachBit BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary files, cookies, and broken shortcuts. It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer, rpmbuild, Second Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images), vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files. 5. PGP eMail Encryption for Thunderbird The OpenPGP extension for Thunderbird called Enigmail allows users to access the features provided by the popular GnuPG software from within Thunderbird. Enigmail is capable of signing, authenticating, encrypting and decrypting email. Additionally, it supports both the inline PGP format, as well as the PGP/MIME format as described in RFC 3156. Full Scale X4 V7.8.2 Details below 1. UFW Firewall gufw is an easy and intuitive way to manage your Linux firewall. It supports common tasks such as allowing or blocking pre-configured, common p2p, or individual port(s), and many others! The Uncomplicated FireWall is a front-end for iptables, to make managing a Netfilter firewall easier. It provides a command line interface with syntax similar to OpenBSD's Packet Filter. It is particularly well-suited as a host-based firewall. 2. Clam AV Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon in the clamav-daemon package, a command-line scanner in the clamav package, and a tool for automatic updating via the Internet in the clamav-freshclam package. The programs are based on libclamav6, which can be used by other software. This package contains the command line interface. Features: - built-in support for various archive formats, including Zip, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in support for almost all mail file formats; - built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others; - built-in support for popular document formats including Microsoft Office and Mac Office files, HTML, RTF and PDF. For scanning to work, a virus database is needed. There are two options for getting it: - clamav-freshclam: updates the database from Internet. This is recommended with Internet access. - clamav-data: for users without Internet access. The package is not updated once installed. The clamav-getfiles package allows creating custom packages from an Internet-connected computer. 3. Keepass2 KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily. KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files. 4. JonDo JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components: * Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users. * Mix Cascades: Chains of Mixes run by various independent operators. They typically consist of three Mixes: one first Mix (IN) which receives requests from the users, one middle Mix (MIDDLE) which only forwards traffic to other Mixes, and a last Mix (OUT) which sends the real outgoing requests to internet resources. * InfoService: A separate service which provides information about the available mixes and mix cascades, thenumber of users currently using the mix cascades, and their current workload. * JonDo: Client program installed on the user's computer. Its primary use is to establish encrypted connections to anonymising Mix Cascades. In this form, the system protects from observation by * the visited web server * your internet access provider (internet cafe, WLAN, AOL, T-Online, ...) * other eavesdroppers on the connections (ECHELON,...) * any data retention (by international distribution) * the JonDonym service itself. Robolinux.org © 2011-2015 Robolinux.org All Rights Reserved --------------------- Robolinux provides its Users with optional expert Tech Support with a 1-2 hour response time. This is far more efficient than Forum based support. Be sure to check out the Robolinux Revolutionary C Drive to VM Software which supports all 500 Linux Operating Systems: http://robolinux.org/c-drive-to-vm Since support for XP has expired many Windows XP Users around the world are migrating from Windows XP to Linux because they don't want to to be forced to spend hundreds of dollars or throw away their PC or laptop that is in perfectly good working condition. Since Robolinux invented "Revolutionary Stealth VM" inside our Debian Operating System we decided to create specific versions that work on all Linux Operating Systems so now anyone can run Windows XP or 7 inside Linux Mint, all Ubuntu versions & derivaives and all RPM based operating systems virus Free! In a few clicks the Windows XP or 7 virtual machine is instantly built & fully configured and ready to go. Then you simply load your Windows disk and programs. Robolinux has incredibly easy how to screens & videos to make sure anyone can do it. Now you can run Windows XP & 7 Virus Free inside all Linux Operating Systems with The Robolinux Stealth VM Sofware. Please visit http://robolinux.org/lm Stealth VM designed for Linux Mint Please visit http://robolinux.org/ubuntu Stealth VM designed for Ubuntu Please visit http://robolinux.org/opensuse Stealth VM designed for all RPM Linux Distros Please visit http://robolinux.org Robolinux OS with Stealth VM built inside The Robolinux Stealth VM Software will significantly increase the number of successful and permanent Windows to Linux User migrations which is estimated by ZD Net to be 11% of the 670 million existing Windows XP User Base. One Windows User explains the problem with migrating to Linux in this succinct blog on ZD Net: "So from my point it really is an application thing not an OS thing. I confess I have never tried Wine. But your average user doesn't want to mess with that". Most if not all Windows XP Users who are just switching to Linux are worried about being able to run their Windows applications. Indeed that is a problem they are looking to solve as quickly as possible, otherwise they will give up and not switch to Linux. Wine is too complicated and does not support all of their software. Users who have already switched to Linux Mint or Ubuntu most likely had to install Linux Mint or Ubuntu as a dual boot system, otherwise they would have had no access to several Windows programs they really need to run on a daily basis. The problem with dual booting is that it takes a lot of time to reboot from Linux to Windows and back again all day long, plus running Windows XP or 7 on it's own is not virus Free. Sadly dual booting also stops you from being able to run your new favorite OS Linux Mint or Ubuntu all the time. What Windows XP Users want to do is run Windows applications inside Linux Mint or Ubuntu. Robolinux also offers Global Private Internet Access For All of Your Internet Devices! Protect Your Privacy & Say Goodbye to the NSA! No saved log files for the NSA to snoop! Dozens of Gateways all over the World! Up to 190 Gigabit speeds per Gateway! Stops ISP Torrent Throttling! No Bandwidth Limits! Now you can protect Your PC, laptop, Phone, Tablet, TV & Gaming console too! In fact anything you own that is connected to the internet can now be protected with just one VPN Account! The Robolinux VPN is fully integrated to a Global Private Internet Access Provider and takes less than 30 seconds to set up! ---------------------------------------------------------------- For the Robolinux 32 & 64 Bit Gnome, Xfce & LXDE versions here are the Download Instructions for you: Step #1: To install any of the four Robolinux operating systems, simply click and download robolinux32-kde-v7.9.2.iso robolinux32-lxde-v7.9.2.iso robolinux32-gnome-v7.9.2.iso or robolinux32-xfce-v7.9.2.iso here on Sourceforge if you are running a 32 bit pc or laptop. If you don't know which one, just pick the 32 bit version as it runs on every pc or laptop. That was easy huh? Or if you do know if your machine is a 64 bit box: Then just click on one of the 64 bit files: robolinux64-kde-v7.9.2.iso robolinux64-gnome-v7.9.2.iso robolinux64-lxde-v7.9.2.iso robolinux32-xfce-v7.9.2.iso and download it. Step #2: Burn the Robolinux.iso you downloaded to a DVD. Please note: If you need DVD burning instructions feel free to visit this link on our website: http://robolinux.org/burn-iso Step #3 [Be sure you are plugged into the internet and not on wifi please] Now insert your new Robolinux.iso DVD into your Windows machine and reboot it. Your PC or laptop will load the Robolinux boot menu screen in less than 12 seconds. Simply press your down arrow key which will install Robolinux on to your hard drive. http://www.robolinux.org/contact Welcome to a virus free life! roboinux.org
Source: readme.txt, updated 2015-06-19