When I say ‘virus,’ you know exactly what I mean


 

By

 

http://www.zdnet.com

 

Summary: Discussions of malware have their own equivalent to Godwin’s Law: As the conversation grows longer, the probability that someone will derail the discussion by arguing over the meaning of ‘virus’ approaches near-certainty.

Every time I write about the issue of malware on PCs and Macs, it is only a matter of time before someone shows up in the comments to get pedantic over the correct usage of the word virus.

In the Talkback section of a post I published last week, a commenter told me I “blew it” with an illustration I used, which contained Apple’s reference to the Mac having no “PC viruses.” He (it’s always a “he”) went on at excruciating length to explain all the different types of viruses. It was a trip to a world of strange creatures that would have made Tolkien proud. It was erudite, in a 15th Century way. He closed by reminding me that I need to “pay more attention” to facts.

In response, I want to reprint something I wrote a year ago, updated to reference current events:

The hardest part of talking about computer security is getting everyone to agree on the nature of the problem. It’s especially frustrating when you’re trying to weigh the pros and cons of different strategies with someone whose view of the PC security landscape is outdated and inaccurate.

Case in point: What’s the best way to deal with malicious software on PCs and Macs?

You can’t answer that question—you can’t even start talking about it—until you know how malware gets installed in the first place. And there’s where the disconnect begins.

Much of the discussion I read comes down to shorthand, like this: “There’s malware [on Macs], yes. No viruses though.”

I have read variations on this theme over and over again in the Talkback section of this blog over time. This was from last year:

Mac Defender is NOT a virus. … Mac OS X has ALWAYS been free of viruses… as opposed to Windows which has hundreds of thousands of viruses and new ones coming each day.

(Don’t even get me started on that “hundreds of thousands of viruses” nonsense. It’s a numbers game, and if you say “hundreds of thousands” or millions you’re way off.)

Anyway, that obsession with the word virus is a recurring theme in Apple’s support forums. Search for the phrase “there are no viruses” at discussions.apple.com and you’ll find plenty of examples, like this one from January 2011:

There are no viruses that run on OSX. None. Zip. Zero.

There is some “malware,” such as Trojans, for Macs, though. But (unlike viruses that can get onto your system without your knowledge), you must approve their installation (via your Admin password) and/or operation (via the “This application was downloaded from the internet …” prompt).

Sorry, but that’s not true. There are already plenty of examples of successful social engineering for PCs and Macs. This year the Flashback gang moved the ball forward impressively, proving that the drive-by downloads that worked with unpatched third-party software on Windows can be just as wildly successful against third-party vulnerabilities in Macs.

Here’s a more recent example from the Apple support forums, from February 2012.

Repeat after me:

There are no viruses for Mac OS X. There are no viruses for Mac OS X. There are no…

That Level 4 Apple forum member went on to repeat the phrase more than 70 times.

Two months later, after Flashback had become well known, a Level 5 member added this comment to the thread:

Strictly speaking there are no OS X viruses. Viruses are self-replicating and, so far, none have been found “in the wild” for Macs. Not to say it couldn’t happen. The term ‘virus” is being used as a catch-all for any kind of malware or exploit. The Flashback Trojan, at least in one of its forms, is considered a “drive-by download.”

That level of pedantry over the names of categories, while perhaps technically accurate and even nitpickingly correct, is like arguing over the motivations of characters in Star Trek (and specify whether you mean TNG or TOS, dammit) or debating the origin of ideas in a William Gibson novel or being able to repeat more than one XKCD verbatim and cite its number without searching. It is cyber-wanking.

To deal with the pedantry briefly:

These days, actual viruses are almost unheard of. Melissa, back in the late 1990s, was a real virus, the kind that copied itself to documents and spread via e-mail it sent automatically. Today, security professionals are more interested in what a particular family of malicious code does. The delivery mechanism is usually separate.

If this were simply a matter of semantics, I would let it slide. But it’s not. The obsession with these labels reflects a dangerously outdated view of computer security. If you’re quibbling about meaningless distinctions for pseudo-technical terms coined in the previous century, you are not concentrating on the actual threats that modern computer networks face, which often defy categorization.

Different families of malware have common behaviors. Knowing that some types of malware inject code into executable files and others attempt to spread through network connections and still others try to autorun from USB flash drives moves the conversation along. Arguing over whether one of those things should be called a worm or a virus or a rogue derails the conversation.

If you can’t see past those labels and get an accurate view of the current threat landscape, you won’t be able to make smart, informed decisions for yourself or for others.

Oh, and virii? That’s not a word, and using it makes you sound like Kevin Kline’s Otto West in A Fish Called Wanda. (“Don’t call me stupid.”)

The plural of virus is viruses. Not virii. And if you hear someone talking about viruses on PCs and Macs you know exactly what they mean.

I’m just sayin’.

Angry Birds


 

Download Game Angry Birds :

 

http://download.angrybirds.com/

 

http://www.mediafire.com/?203gw842kb1jbod

 

http://www.mediafire.com/?yc7kik8aikymaya

 

http://www.mediafire.com/?d9cvmed353rjbvo

 

http://www.kythuatvien.com/download/s/29194/Games/Angry-Birds-for-PC-Tro-choi-chim-dien-ban-dung-cho-may-tinh.aspx

 

Game siêu “hot” Angry Birds không còn xa lạ gì với teen chúng mình, nhưng đó chỉ là những nhân vật ảo tưởng trong game. Vậy ngoài đời thực, chim Angry Birds trông ra sao nhỉ?

Màn “phù phép” của nghệ sỹ Mohamed Raoof sẽ cho chúng ta kết quả ngay đây thôi. Chụp lại hình ảnh của một vài loài chim có thân hình hao hao chim Angry Birds, rồi sử dụng kỹ xảo xử lý hình ảnh, nghệ sỹ này đã tạo phiên bản thực tế của Angry Birds mà chưa ai biết đến trước đó.

Ngạc nhiên hơn, những bức ảnh Angry Birds này chân thực đến mức mà ai cũng ngỡ chim Angry Birds có tồn tại.

Nghía qua loạt nhân vật Angry Birds bằng xương bằng thịt này nhé.

Papai

 

 

 

 

 

 

 

 

Bách khoa toàn thư mở Wikipedia

 

Angry Birds

Hãng phát triển Rovio Mobile
Hãng phát hành Chillingo/Clickgamer (iOS, PSP/PlayStation 3)
Rovio Mobile (Maemo, Symbian^3, Android)
Phiên bản mới nhất 1.6.2 (iOS, Android, Microsoft Windows)
1.6.0[1] (Symbian)
1.5.3 (Windows Phone)
1.5.2 (Maemo, Mac OS X)
1.5.0 (PlayStation Portable, PlayStation 3)
1.1.3 (WebGL)
Hệ máy iOS, Maemo, Palm webOS, Android, Symbian^3, PSP/PlayStation 3, Mac OS X, Windows, WebGL, Windows Phone 7
Ngày phát hành 10 tháng 12, 2009[2]
Thể loại Trò chơi điện tử giải đố
Kiểu chơi Chơi đơn
Đánh giá

Apple: 4+

 

Angry Birds là một trò chơi đố được phát triển bởi nhà phát triển có trụ sở tại Phần LanRovio Mobile. Phát hành lần đầu trên nền iOS của Apple vào tháng 12 năm 2009,[2] trò chơi này đã được tải về khoảng 12 triệu lần từ App Store.[3] Thành công này đã khiến công ty mở rộng trò chơi trên các thiết bị điện thoại thông minh khác, chẳng hạn như các thiết bị trên nền tảng Android.

Angry Birds nhận được rất nhiều lời khen cho những sự kết hợp giữa cách chơi mới lạ, phong phú, phong cách truyện tranh và giá thành rẻ. Sự phổ biến của nó đã đưa trò chơi này lên nền tảng PCconsole. Với khoảng 300 triệu lần tải về trên tất cả các nền tảng và tất cả các phiên bản,[4] Angry Birds được coi là “một trong những trò chơi có xu hướng chi phối mạnh mẽ nhất hiện nay”,[5] “một trò chơi thành công tuyệt vời của năm 2010”[6] và “ứng dụng trên nền tảng di động thành công nhất mà thế giới từng được chứng kiến”.[7]

 

Mục lục

 

Cách chơi

Angry Birds được mở đầu bằng đoạn kể về việc những con heo màu lục độc ác đã ăn cắp những quả trứng của các con chim nhiều màu,[8] và vì vậy những con chim quyết định tấn công để lấy lại trứng. Trong từng màn chơi, người chơi sẽ được cung cấp và sử dụng một số con chim nhất định. Người chơi sẽ dùng súng cao su để bắn từng con chim vào những con heo hoặc bắn vào công trình được xây bằng gỗ, băng hoặc đá[9] nơi mà những con heo màu xanh đang trú ngụ trong đó. Mục tiêu là tiêu diệt các con heo bằng cách bắn trực tiếp hay phá vỡ các công trình, gây ra các va chạm cho chúng.[10] Nếu người chơi tiêu diệt tất cả các con heo trước khi số chim bị hết thì sẽ thắng màn chơi đó.

Trò chơi bao gồm nhiều loại chim khác nhau với những màu sắc và khả năng khác nhau. Ban đầu sẽ là chim màu đỏ,[8] có sức va chạm mạnh nhưng không có khả năng đặc biệt. Dần dần những loại chim khác sẽ xuất hiện với những khả năng mạnh mẽ[10] như chim màu đen có thể nổ hoặc chim màu trắng có thể thả trứng nổ. Ngoài ra những con heo cũng có các kích thước khác nhau.

Từng màn chơi sẽ chỉ có một vài con chim nhất định. Nếu người chơi tiêu diệt tất cả các con heo trước khi số chim bị hết thì sẽ thắng màn chơi. Điểm số sẽ được cộng nếu người chơi tiêu diệt được một con heo, phá vỡ các phần của công trình hoặc còn lại ít nhất một con chim khi những con heo đã bị tiêu diệt hết (1 con chim là 10 000 điểm). Sau mỗi màn chơi thắng, người chơi sẽ nhận được một, hai, hoặc ba ngôi sao tùy thuộc vào số điểm giành được.

Điểm nổi bật ở trò chơi là phông nền tươi sáng và sinh động. Bên cạnh đó là tiếng kêu của các con chim cùng với tiếng cười khiêu khích của các con heo độc ác làm cho trò chơi trở nên vô cùng thú vị và hấp dẫn.

 

Đón nhận

 

 Đánh giá

Tổng số điểm

Tổng hợp

Điểm số

Metacritic

iOS: 80% (13 đánh giá)[11]
PSP: 77% (13 đánh giá)[12]

Điểm đánh giá

Nơi đánh giá

Điểm số

GameZone

iOS: 8.0/10[13]

IGN

iOS: 8.0/10[2]
PSP: 7.5/10[14]
Android: 8.0/10[15]

Official PlayStation Magazine (UK)

PSP: 90/100[12][16]

MacWorld

iOS: [8]

Pocket Gamer

iOS: 8.0/10[10]

Paradox Reviews

WP7: 8.8/10 [17]

 

Những đánh giá về Angry Birds nói chung là rất tích cực. Chris Holt của Macworld gọi trò chơi này là “một trò chơi đố phong phú, thông minh và đầy thử thách”.[8] Keith Andrew của Pocket Gamer thì nói Angry Birds là “một mỏ vàng của trò chơi giải đố được dọn ra với sự đậm đà của gia vị”.[10]

Angry Birds trở thành ứng dụng trả tiền bán chạy nhất của App Store UK vào tháng 2 năm 2010, và nhanh chóng chiếm lĩnh vị trí này tại App Store Hoa Kỳ vài tuần sau đó. Còn phiên bản Android của trò chơi đã được tải về 1 triệu lần trong 24 giờ phát hành đầu tiên.[18]

Theo Rovio, người chơi bỏ ra khoảng 1 triệu giờ mỗi ngày để chơi Angry Birds trên nền iOS[19] và 3,3 triệu giờ mỗi ngày trên tất cả các nền tảng.[20] Tháng 12 năm 2010, trong lễ kỷ niệm 1 năm phát hành trò chơi, Rovio Mobile thông báo rằng trò chơi đã được tải về tổng cộng khoảng 50 triệu lần, với 12 triệu trên iOS[3] và 10 triệu trên Android.[21] Tháng 6, 2011, 3 trò chơi Angry Birds, Angry Birds SeasonsAngry Birds Rio đã được tải về khoảng 250 triệu lần.[22]

 

Giải thưởng

 

Tháng 12 năm 2010, IGN xếp Angry Birds ở vị trí thứ 4 trong những trò chơi iPhone hay nhất mọi thời đại.[23] Tháng 4 năm 2011, Angry Birds chiến thắng ở cả hai giải là Ứng dụng trò chơi hay nhấtỨng dụng của năm của Appy Awards.[24]

Phiên bản đặc biệt

 

Angry Birds Seasons

Tháng 10 năm 2010, Rovio phát hành bản đặc biệt là Angry Birds Halloween trên nền iOS. Tháng 12 năm 2010, họ phát hành Angry Birds Seasons trên nền iOS, Android và Symbian^3. Người chơi Angry Birds Halloween có thể tải về các phần chơi của Angry Birds Seasons thông qua các nâng cấp.

Angry Birds Rio

Angry Birds Rio là phiên bản được là dựa theo phim hoạt hình Rio của hãng 20th Century Fox, được phát hành trên nền tảng iOS, Android và Mac OS X vào tháng 3 năm 2011. Lấy bối cảnh tại Rio de Janeiro, trò chơi này thay thế những con heo bằng những chiếc lồng nhốt các con chim, và nhiệm vụ của người chơi là giải thoát những con chim ra khỏi lồng. Từ khi được phát hành, trò chơi này đã được tải về khoảng 10 triệu lần.

Angry Birds Magic

Một phiên bản đặc biệt có tên là Angry Birds Magic sẽ được phát hành trên các thiết bị chạy Symbian có chức năng NFC của Nokia.

Tham khảo

  1. ^ http://store.ovi.com/content/61009?clickSource=search ^ a b c “Angry Birds Review” . IGN.com (11 tháng 2 năm 2010). Truy cập 6 tháng 8 năm 2011.
  1. ^ a b “The Supremely Addicting Angry Birds Hits 42 Million Free and Paid Downloads” , SymbianFreak.com, 22 tháng 10 năm 2010. Truy cập 6 tháng 8 năm 2011.
  1. ^ BBC News (22 tháng 7 năm 2011). “Angry Birds maker Rovio sued over app patents”

. Truy cập 6 tháng 8 năm 2011.

  1. ^ Van Camp, Jeffrey. “Israeli Angry Birds satire goes viral”

, digitaltrends.com, 23 tháng 11 năm 2010. Truy cập 6 tháng 8 năm 2011.

  1. ^ Shaer, Matthew. “Angry Birds bound for Xbox, PlayStation” , 29 tháng 11 năm 2010. Truy cập 6 tháng 8 năm 2011.
  1. ^ “Angry Birds will be bigger than Mickey Mouse and Mario. Is there a success formula for apps?” . MIT Entrepreneurship review (18 tháng 2 năm 2011). Truy cập 27 tháng 3 năm 2011.
  1. ^ a b c d Chris Holt, “Angry Birds Review” , Macworld. Truy cập 6 tháng 8 năm 2011.
  1. ^ Rovio Mobile. Angry Birds. (bằng English). “Icepicker: 5000 ice blocks smashed”
  2. ^ a b c d Keith Andrew, “Angry Birds (iPhone) review” , Pocket Gamer, 21 tháng 12 năm 2009. Truy cập 6 tháng 8 năm 2011.
  1. ^ “Angry Birds (iOS)” . Truy cập 6 tháng 8 năm 2011.
  1. ^ a b “Angry Birds (PSP)” . Truy cập 6 tháng 8 năm 2011.
  1. ^ James Pikover (12 tháng 5 năm 2010). “Angry Birds review” . GameZone.com. Truy cập 6 tháng 8 năm 2011.
  1. ^ Greg Miller (10 tháng 1 năm 2011). “Angry Birds Review” . PCMag.com. Truy cập 6 tháng 8 năm 2011.
  1. ^ John Mundy (13 tháng 10 năm 2010). “Angry Birds: Winging endorsement” . PocketGamer.co.uk. Truy cập 6 tháng 8 năm 2011.
  1. ^PlayStation Official Magazine (Spring 2011): 113.
  2. ^ Paradox Reviews, Chris McAulay (26 tháng 7 năm 2011). “Angry Birds WP7 review” . ParadoxReviews.com. Truy cập 26 tháng 7 năm 2011.
  1. ^ Quentyn Kennemer, “Angry Birds is Free & It’s Out”, phandroid.com, 15 tháng 10 năm 2010. Truy cập 6 tháng 8 năm 2011.
  1. ^ Jon Mundy (13 tháng 10 năm 2010). “Interview: Rovio on the origin of Angry Birds, being inspired by swine flu, and why you may never see an Angry Birds 2”. Pocket Gamer. Truy cập 6 tháng 8 năm 2011.
  1. ^ Leigh Alexander (14 tháng 3 năm 2011). “Angry Birds sees 100 Million Downloads” . Gamasutra.com. Truy cập 6 tháng 8 năm 2011.
  1. ^ Mike Butcher, “Angry Birds hits 50 million downloads, creates simple in-app purchases on Android” , TechCenter Europe, 10 tháng 12 năm 2010. Truy cập 6 tháng 8 năm 2011.
  1. ^ Brad Nicholson (15 tháng 6 năm 2011). “Angry Birds Reaches 250 Million Downloads”. Touch Arcade. Truy cập 6 tháng 8 năm 2011.
  1. ^ “The Top 25 iPhone Games”(10 tháng 9 năm 2010). Truy cập 6 tháng 8 năm 2011.
  1. ^ Whitworth, Dan (12 tháng 4 năm 2011). “Angry Birds triumphs at Appy Awards”. BBC Newsbeat. Truy cập 6 tháng 8 năm 2011.

Một số trang web để trải nghiệm với Angry Birds Online: http://www.playangrybirdsonline.biz/

 

—————————————-

 

 

Hành trình ra đời game “bom tấn” Angry Birds

 

Mỗi ngày, hàng triệu người tham gia chơi trò chim bắn lợn trên iPhone và Android, thậm chí có ý kiến cho rằng game này đang có sức lan tỏa hơn cả nhân vật hoạt hình biểu tượng Mickey Mouse.

Một tối cách đây 2 năm, Jaakko Iisalo ở nhà một mình vì vợ có việc phải ra ngoài. Như thường lệ, khi không có việc gì làm, chuyên gia thiết kế người Phần Lan 30 tuổi này lại giết thời gian bên máy chơi game.

Iisalo vẩn vơ nghĩ đến công ty Rovio của mình. Khi đó, công ty này đang thiếu vốn đầu tư và ban lãnh đạo đã vạch ra một kế hoạch “được ăn cả, ngã về không”: phát triển game trên Apple iPhone. Anh và nhiều nhân viên khác đã đưa ra không biết bao nhiêu là ý tưởng nhưng đều bị giám đốc gạt đi với những lý do muôn thuở: quá phức tạp, hoặc quá đơn giản, hoặc quá nhàm chán.

Jaakko Iisalo – cha đẻ của những con chim Angry Birds hiếu chiến. Ảnh: Cartina.

Iisalo hiểu anh cần tạo ra một cái gì đó thật vui vẻ, nhẹ nhàng nhưng nhân vật trung tâm phải gây ấn tượng ngay từ khi mới tiếp xúc. Một ý tưởng lóe lên và Iisalo bật Photoshop, bắt đầu phác thảo ra một đàn chim béo ú với mỏ vàng, lông mày dày và đậm cùng nét mặt khó hiểu. Chúng tròn quay, không chân, không cánh.

“Tôi không nghĩ nó quá đặc biệt nên cũng không kể với vợ khi cô ấy về”, Iisalo chia sẻ. Nhưng ban lãnh đạo thích thú ngay khi nhìn thấy tác phẩm của anh. Tuy nhiên, nhân vật game lại ra đời trước cả cốt truyện và không ai biết những con chim ấy sẽ có sứ mệnh gì.

“Ngay khi nhìn thấy tôi đã mê rồi”, Niklas Hed, đồng sáng lập Rovio, nói. “Lập tức, tôi cảm thấy tôi muốn chơi game có nhân vật như thế”.

Chưa đầy 2 năm sau (từ tháng 12/2009), hàng triệu người dùng smartphone cũng có cảm giác như vậy. Angry Birds trở thành ứng dụng phổ biến nhất trên iPhone. Đây là thành công đáng nể bởi nó chỉ là một trong số 425.000 ứng dụng xuất hiện trên App Store, và nhanh chóng lan sang iPad cũng như nhiều dòng điện thoại di động khác.

Game đã được tải hơn 140 triệu lần và Thủ tướng Anh David Cameron, nằm trong số rất nhiều nhân vật tiếng tăm và bận rộn khác, đã thừa nhận nghiện trò chơi này. Nhiều bà mẹ trẻ làm bánh trang trí hình Angry Birds, những trang phục in các con chim tròn xoe được ưa chuộng toàn cầu. Trung bình mỗi ngày, người dùng dành ra tổng cộng 200 triệu phút để chơi game.

“Có nhiều game dành cho iPhone khác đã thành công nhưng đây là lần đầu tiên có một trò chơi hấp dẫn đến mức người ta liên tục nói về nó. Nó giống như hình khối lập phương Rubik. Có thời đi đâu bạn cũng thấy người ta loay hoay với nó”, James Binns thuộc công ty Edge International, nhận xét.

Một trong những điểm quan trọng giúp Angry Birds phổ biến là sự đơn giản. Tận dụng lợi thế công nghệ màn hình cảm ứng đa điểm của Apple, Angry Birds không đòi hỏi người chơi bấm bất cứ phím điều khiển nào và cũng không có bước hướng dẫn nào. Sau khi mở ra, một đứa trẻ cũng biết mình cần phải làm gì.

Bên trái màn hình là đàn chim hiếu chiến với cặp lông mày xếch. Bên phải là những con lợn xanh với vẻ mặt ngạo nghễ và đang cười khẩy nằm trong chỗ trú ẩn được tạo từ gỗ, bê tông, đá và sắt. Sử dụng súng cao su, người chơi bắn chim vào đàn lợn để kiếm điểm. Thao tác duy nhất họ cần là lấy ngón tay kéo dây chun. Nhưng để có điểm cao, người dùng phải xác định chính xác đường bay để bắn trúng mục tiêu và mỗi con chim (7 loại) có sức mạnh khác nhau.

Tuy nhiên, Angry Birds không phải game thành công kiểu ăn may, mà đây là sản phẩm của một chiến lược rõ ràng. Rovio đã sản xuất hàng chục game trước đó và cần một giải pháp đột phá. Apple đã mang đến điều đó. Khi iPhone xuất hiện năm 2007, Rovio nhận thấy ngành công nghiệp di động sớm muộn sẽ phải chuyển mình. Họ cũng nhận thấy một lợi thế đặc biệt: Lần đầu tiên, người dùng trên toàn thế giới tập trung tải game từ một địa chỉ là App Store, giúp nhà sản xuất giảm chi phí đáng kể trong việc phát hành.

Từ 63 level (độ khó) khi xuất hiện vào tháng 12/2009, Rovio tăng thêm trung bình khoảng 15 level mỗi tháng và hiện game đã có hơn 200 level cùng các phiên bản khác nhau cho Giáng sinh, Halloween hay Valentine… Họ cũng hợp tác cho ra đời bộ phim ăn khách Rio vào tháng 4/2011.

Tuần này, Rovio cho hay họ đang phát triển phiên bản 3D của Angry Birds trên điện thoại LG Optimus 3D và dự kiến sẽ trình làng trong tháng 10.

Theo Châu An (VNE)

———————————————

10 bài học từ Angry Birds cho các CIO

Bất kì khi nào chơi trò này, chúng tôi lại nghĩ tới CIO (các giám đốc thông tin). Dưới đây là kết quả ban đầu của nghiên cứu: 10 bài học từ Angry Birds có thể giúp ích cho các CIO.

 

1. Bạn sẽ phải chơi để biết được luật

Cách duy nhất để học cách vượt qua một cấp độ trong Angry Birds là chơi trò chơi này. Điều tương tự cũng đúng với công nghệ. Chúng tôi vẫn chứng kiến thấy có rất nhiều CIO không sử dụng các dịch vụ truyền thông trợ giúp hoặc thực hiện rất nhiều cuộc gọi. Điều này là bởi họ cho rằng công nghệ hiện nay không phù hợp với cấu trúc của doanh nghiệp hoặc bởi chúng ẩn chứa quá nhiều nguy hiểm về vấn đề sở hữu trí tuệ hoặc thông tin cá nhân của khách hàng. CIO nên nhớ rằng nếu họ không áp dụng các công nghệ hiện có và không cho phép mọi người sử dụng chúng trong công việc hàng ngày thì chẳng ai có thể biết được những hạn chế, nguy cơ tiềm ẩn của chúng hay những thuận lợi mà chúng có.

2. Một người chỉ thành công hơn tất cả khi tài năng đặc biệt được công nhận

Bất kì con chim nào trong Angry Birds đều sở hữu một tập hợp tài năng đặc biệt. Những con chim béo màu đen trắng có khả năng thả trứng và bắn lia lịa vào tường; những con màu vàng có khả năng tăng tốc khi bạn chạm hoặc nhấn vào, trong khi một con nhỏ màu xanh lại có khả năng tách thành ba khi được nhấn vào màn hình lúc còn bay trong không trung. Các CIO cũng phải là một nhà lãnh đạo tài ba (CTM, hoặc Chief Talent Manager), bằng cách giúp mọi người tìm thấy cân bằng giữa niềm đam mê với nhu cầu của tổ chức. Bên cạnh đó, CIO cũng cần phải hiểu, và đoán trước được các khả năng trong tương lai để có thể xây dựng một chiến lược thông minh sẵn sàng cho bất kì thử thách nào.

3. Bạn không thể khôi phục từ một khởi đầu quá tệ

Dừng lại những lần thua, khởi động và chơi lại. Người chơi Angry Birds có kinh nghiệm có thể biết được liệu rằng lần bắn của họ có được điểm cao hay chỉ là lần bắn tốn thời gian. Nếu họ biết được khả năng chỉ là tốn thời gian, họ thường không chơi tiếp và chơi lại trò chơi. CIO chia sẻ trực quan này về những gì đang và không được thực hiện trong thời điểm hiện tại. Tuy nhiên, họ vẫn để mọi người “mò mẫm” với các dự án không có nổi một chút đam mê nào, cố gắng triển khai công nghệ sai địa điểm và sai thời điểm, vẫn để mặc cho công nghệ tự vượt qua các khó khăn. Thay vì thế, CIO cần phải can đảm và loại bỏ sớm những lần thua của mình hơn là sau này phải nói rằng mình đã không có đội ngũ chuẩn hoặc phương pháp thực hiện không chính xác. Sau đó, hãy suy nghĩ lại về chiến lược và chiến thuật rồi bắt đầu lại từ đầu.

4. Mỗi một vấn đề đều có chuyên gia giải quyết riêng

Các nhà lập trình của Angry Birds xây dựng các cảnh cho trò chơi này từ các vật ảo, ví như những đám mây, gỗ, bê tông và gương kính. Bất kì vật chất nào cũng đều phản ánh các thuộc tính vật lý riêng, và mỗi một vật đều phản ứng theo cách riêng đối với mỗi loại chim được dùng trong trò chơi. Chính điều này khiến trò chơi trở lên phức tạp hơn và thú vị hơn. Tuy nhiên, trở thành một CIO đôi khi lại phức tạp và nhiều thú vị hơn bởi công nghệ thường đi theo một mô hình giống nhau. Đã hết rồi những ngày bạn có thể có một “lập trình viên” giải quyết một vấn đề. Giao diện người dùng, mạng, chữa lỗi và một số quy tắc khác bên trong môi trường lập trình, đều yêu cầu các kỹ năng, kiến thức và tài năng đặc biệt. Trong Angry Birds bạn không thể thuê hỗ trợ ngoài, nhưng trong kỷ nguyên ngày nay, CIO thì có thể.

5. Loại bỏ những gì không cần thiết

Angry Birds có chứa một phiên bản “thuốc giải” rất độc đáo, nhưng trải nghiệm thực tế vẫn tốt hơn cả: Nếu bạn thả một quả bom quá xa, hoặc trong một khu vực có quá nhiều bảo vệ, bạn sẽ khó có thể đánh trúng mục tiêu. Đối với CIO, hãy nghĩ sáng suốt hơn. Nếu bạn muốn tạo ra một thay đổi lớn, bạn sẽ phải nghĩ về công việc và môi trường IT như một hệ sinh thái tổng thể. Bạn không thể chỉ đưa ra một giải pháp và hy vọng rằng nó sẽ phù hợp với toàn bộ công ty mình. Chắc chắn, tổ chức của bạn phải hiểu rõ được giải pháp là gì rồi mới có thể tạo nên thay đổi.

6. Cải tiến tăng dần

Kiếm điểm cao trong Angry Birds rất khó. Hầu hết mọi lúc, khi bạn vượt qua một bàn, điểm số có thể làm bạn không hài lòng. Thậm chí, có khi bạn còn chẳng vượt qua được một bàn. Nếu muốn có điểm cao, bạn sẽ phải kiên nhẫn và đón nhận những khó khăn gia tăng bằng cách áp dụng những bài học đã học được từ các bàn trước. Có thể một lúc nào đó, bạn thay đổi chiến thuật hoặc tự nhiên phát hiện ra một phương pháp mới có thể giúp kiếm được nhiều điểm hơn. Tuy nhiên, những trường hợp như vậy rất hiếm. Và khi lặp lại bàn, việc kiếm điểm cao rất khó, vượt qua bàn thậm chí còn khó hơn.

CIO cần nhận ra rằng rất khó cải thiện những đội có khả năng thực hiện cao. Nếu đội không có những người có khả năng cao, họ chỉ có thể cải thiện từng chút một, thay vì tạo một bước chuyển lớn. Điều tương tự cũng đúng với sự hài lòng của khách hàng hoặc độ tin cậy của hệ thống. Không thể chỉ vì những cải thiện tích cực đang có mà lại quên đi việc tìm kiếm các phương pháp mới. Một “bước nhảy” cơ bản sẽ làm thay đổi tất cả. Hãy tập trung vào chiến thuật, nhưng không nên bỏ qua chiến lược – và cũng đừng “chậm chân” trong việc nhận ra đổi mới mỗi khi nó xuất hiện.

7. Chuyên gia trong một lĩnh vực không đồng nghĩa với việc bạn là chuyên gia trong tất cả các mặt

Tất cả các cảnh của Angry Birds đều được sắp xếp khác nhau, nhưng hầu hết chúng đều có khá nhiều điểm chung. Cấu hình bên trong mỗi cấp độ, từ cấu trúc liên hệ giữa các vật liệu bên trong cho tới sắp xếp cảnh, tất cả đều yêu cầu chiến lược. Như đã đề cập ở trên, IT được nuôi dưỡng từ rất nhiều chuyên môn. Làm tốt ở một lĩnh vực của IT không có nghĩa là bạn tốt ở mọi mặt.

Đối với CIO, điều này có nghĩa là họ phải nhận ra được ưu và nhược điểm cá nhân cũng như chắc chắn rằng bạn có một đội ngũ nhân viên có khả năng bù trừ vào những điểm yếu mình có. Đối với các tổ chức, điều này có nghĩa là cần phải thú nhận về những gì bạn không biết, và sau đó có thể sử dụng một trong 2 cách: bỏ thời gian ra để thí nghiệm và học hỏi, hoặc tìm kiếm một người nào đó đáng tin cậy để hợp tác. Không nên chắc chắn rằng thành công trong một dự án sẽ dẫn tới thành công ở những dự án tiếp theo. Hãy đảm bảo rằng tổ chức của bạn đã có câu hỏi cùng lời giải đáp cho câu: “Lần này sự khác biệt là gì, và chúng ta sẽ lên kế hoạch ra sao cho những thay đổi này?” trước khi thực hiện bất kì điều gì.

8. Không thể thực hiện thành công một công việc nhiều lần chỉ với một phương pháp

Tương tự với bài học số 7. Ngay cả khi thực hiện một việc cùng với một phương pháp là một câu trả lời đúng, bạn vẫn không thể có cùng một kết quả. Trong Angry Birds, bạn sẽ phải tính toán về áp lực mỗi lần bắn cùng với mục tiêu. Trong một số trường hợp, hành động bắn lần thứ 2 có thể khiến một con chim thả bom hoặc kích hoạt chúng. Việc phải tính thời gian cho tất cả các yếu tố và qua rất nhiều lượt bắn, chuyện chính xác hoàn toàn dường như là điều không thể.

Hãy nghĩ về các dự án IT thông thường, ví như triển khai máy tính. Lặp lại sẽ không còn là lặp lại nữa. CIO cần phải khuyên khích nhân viên mở rộng học hỏi và trải nghiệm để mọi người có thể chấp nhận thay đổi. Bên cạnh đó, CIO cũng nên tránh việc đặt áp lực không cần thiết lên nhân viên của mình, bắt nguồn từ suy nghĩ “ngây thơ” rằng “ngày mai chỉ là một ngày khác của ngày hôm nay”.

9. Một số mục tiêu cần nhiều chim hơn

Một số cấp độ trong Angry Birds có thể chỉ phải sử dụng một loại chim cũng có thể mang lại hiệu quả không ngờ. Những bàn khác, bạn sẽ phải sử dụng tất cả số chim mình có chỉ để qua bàn. CIO cần phải hiểu được độ khó của một dự án trước khi chọn đội thực hiện, hoặc họ cũng cần phải biết sẵn sàng học hỏi nhanh chóng. Một dự án tưởng chừng như đơn giản nhưng vẫn có thể ẩn chứa rất nhiều khó khăn, phức tạp. Nếu xảy ra vấn đề, CIO cần phải khởi động lại và đầu tư thêm nhân lực mới (hoặc cũng như bài học số 3 ở trên, làm lại tất cả). Thành công của IT xoay quanh thực tế, hơn là những sự phức tạp khó hiểu.

Kinh nghiệm cho thấy sự thực thi, triển khai và khả năng chấp nhận của các dự án IT thường là mặt phức tạp nhất và cũng là mặt thiếu nhân lực nhất. CIO với hệ thống có sẵn để triển khai hoặc hệ thống mới cần được triển khai ngay thường gặp khó khăn lớn mỗi khi nhận ra giá trị của công việc. Đó là bởi họ đã không thừa nhận rằng mình đang thiếu nhân lực để có thể đẩy nhanh tốc độ công việc.

10. Có nhiều cách để chiến thắng

Một cú câu cầu vồng hoặc bắn thẳng. Đánh từ đằng trước hoặc đằng sau. Mỗi một phương pháp trong Angry Birds đều có thể giúp bạn kiếm được điểm. Nếu chỉ “trung thành” với một phương pháp nào đó, có thể chẳng bao giờ bạn biết cách kiếm được số điểm cao nhất. CIO cũng nên cởi mở với các ý tưởng mới về cách sử dụng các công nghệ hiện tại, cũng như tiếp nhận gợi ý về những công nghệ đang xuất hiện có thể mang lợi nhận cho công ty mình.

Luôn chọn một con đường an toàn không phải lúc nào cũng hay. Nếu thực sự muốn có được chiến thắng, bạn cần phải chấp nhận nguy hiểm. IT có thể là một lĩnh vực đầy cạnh tranh, hoặc nó có thể cũng chỉ là một form mà bạn chỉ việc áp dụng. CIO có khả năng phân biệt được 2 yếu tố này và chọn yếu tố ban đầu, sẽ thấy họ và tổ chức của mình ở vị trí hàng đầu.

——————————————-

7 lời khuyên giúp chinh phục angry birds !!!

“”Mặc dù tôi yêu thích trò chơi máy tính, nhưng có một lý do khiến tại sao tôi không muốn thử những trò chơi mới. Đó là bởi vì tôi rất yêu thích trò hiện tại và khó để có thể dừng một khi tôi bắt đầu chơi.
Nhưng nếu có một trò chơi mà có thể thu hút tôi đến mức muốn chơi thì đó chính là Angry Birds. Bắt đầu ra như là một trò chơi dành iPhone, nó đã đưa làm mưa làm gió trên toàn thế giới với các phiên bản cho PC, trình duyệt Chrome và ba phiên bản dành cho Android. Sức hút đến lạ lùng!!!! “”

1. Thời gian

Đây là một trong những điều mà tôi biết chắc chắn bạn cần rất nhiều thời gian rảnh rỗi để chơi. Tôi biết những người cần hàng giờ liền cố gắng để vượt qua một mức độ khó khăn. Tôi cũng biết có những người tuyên bố họ đã lặp đi lặp lại một mức độ hàng trăm lần chỉ để có được ba ngôi sao và điểm số cao nhất có thể.

Vì vậy, hãy chắc chắn rằng bạn có thời gian rảnh rỗi trước khi bạn chơi, hoặc đừng chơi. Việc phải dừng lại trước khi có thể kết thúc một cấp độ sẽ chỉ làm cho bạn thậm chí còn thất vọng hơn.

2. Hiểu rõ loài chim

Chúng ta đều biết rằng tất cả các nhân vật trong trò chơi là duy nhất, và biết tính cách của mỗi một trong số họ sẽ giúp bạn rất nhiều trong suốt trò chơi. Điều này không có nghĩa chỉ là cách di chuyển mà còn là điểm mạnh và yếu của nhân vật.

Ví dụ, chúng ta có thể đẩy nhanh tốc độ Bird vàng bằng cách chạm vào màn hình trong khi nó vẫn còn trong không khí. Chúng ta có thể sử dụng khả năng này để tiếp cận những nơi khó khăn và xa. Các loài chim vàng cũng mạnh mẽ khi chống lại gỗ, vì vậy nên sử dụng chúng để phá vỡ cấu trúc gỗ. Chim đen là những quả bom bay. Vì vậy hãy sử dụng chúng để đập vỡ thông qua các kết cấu bê tông.

Một ví dụ khác, chúng ta biết rằng chim trắng có thể thả một quả bom trứng, và chúng ta có thể sử dụng nó để phá hủy một cái gì đó. Nhưng bạn cũng nhận thấy rằng chim trắng sẽ tăng tốc độ lên sau khi thả quả bom? Chúng ta có thể sử dụng việc tăng tốc để hạ gục một phần khác của cơ cấu chăn nuôi lợn.

3. Thử những góc khác nhau

Nếu những nỗ lực của bạn để đẩy lùi các cấu trúc từ một góc độ nhất kết thúc trong thất bại, hãy thử góc độ khác nhau. Đừng sợ nhấn nút lặp lại. Lặp lại các nỗ lực và học hỏi từ những sai lầm. Đừng để những sai lầm làm bạn nản lòng.

4. Quan sát cẩn thận

Tiếp tục từ các điểm trước đó, bạn có thể sử dụng môi trường để giúp xác định vị trí “điểm hành động” hoàn hảo.

Ví dụ, lưu ý vị trí của ngón tay của bạn (hoặc con trỏ chuột) khi bạn khởi động con chim. Nếu tấn công thành công, hãy nhớ vị trí và di chuyển trên con chim tiếp theo. Hoặc lưu ý vị trí con chim trong không khí khi bạn chạm vào màn hình để kích hoạt di chuyển đặc biệt của nó, vì vậy bạn có thể lặp lại nếu cần thiết. Bước này thực sự giúp tôi mỗi khi tôi sử dụng gia cầm Boomerang.

5. Sáng tạo

Một trong những điều thú vị tôi tìm thấy trong trò chơi là sự sáng tạo của nó. Bạn không phải lúc nào cũng phải làm tất cả mọi thứ một cách máy móc. Ví dụ, có lần khi bạn chỉ cần sử dụng chim trắng để đạt một phần của cấu trúc mà không cần phải thả quả bom. Hoặc tình huống khi bạn phải bắn chim Boomerang lạc hậu và để cho nó đường cong để đạt được mục tiêu nếu không không thể kết nối.

6. Tìm kiếm


Khi bạn đang mắc kẹt, đừng ngại yêu cầu giúp đỡ. Hãy gọi cho bạn bè của bạn. Chia sẻ luôn là cách tốt để không lãng phí thời gian. Internet cũng là một nơi tốt để tìm thấy các cuộc thảo luận, hướng dẫn, và walkthroughs để giúp bạn vượt qua mức độ khó khăn. Một tìm kiếm nhanh sẽ cung cấp cho bạn rất nhiều các liên kết đến thăm, nhưng những nơi yêu thích của tôi khi chơi Angry Birds là Rovio’s YouTube Channel and AngryBirdsNest.

7. Chủ động

May mắn đóng vai trò khá lớn trong Angry Bird. Có thể bạn sẽ thiếu may mắn trong một lần bắn và khiến điểm số không cao.

Nhưng đôi khi, may mắn là tất cả những gì cần thiết để đưa nụ cười trở lại khuôn mặt căng thẳng và thất vọng của bạn. Vì vậy, luôn luôn giữ cho ngón tay của bạn vượt qua trong suốt trò chơi.

Đừng tức giận, hãy thưởng thức trò chơi

Cuối cùng, hãy nhớ rằng đây chỉ là một trò chơi. Đừng quá nghiêm túc,hãy thả lỏng và thưởng thức nó. Bạn sẽ không phải thất vọng!!!

 

Nguồn: makeuseof.com

 

———————————————

 

From Wikipedia, the free encyclopedia

Angry Birds

 

It has been suggested that List of Angry Birds games be merged into this article or section. (Discuss) Proposed since January 2012.
This is a good article. Click here for more information.
Angry Birds
Angry Birds promo art.png
Angry Birds app logo
Developer(s) Rovio Mobile
Publisher(s) Chillingo/Clickgamer (iOS, PSP/PlayStation 3)
Rovio Mobile (Maemo, Symbian^3, Android, Microsoft Windows, Mac OS X)
Producer(s) Raine Mäki, Harro Grönberg, Mikko Häkkinen
Designer(s) Jaakko Iisalo (lead designer)
Programmer(s) Tuomo Lehtinen (lead programmer), Miika Virtanen, Antti Laitinen, Atte Järvinen, Mika Rahko, Marco Rapino, Kari Kuvaja
Artist(s) Tuomas Erikoinen (lead artist), Miisa Lopperi, Joonas Mäkilä
Composer(s) Ari Pulkkinen
Engine SDL,[1] Box2D
Version 2.0.2 (iOS, Microsoft Windows, Symbian)
2.0.1 (Mac OS X)
2.0.0 (Android)
1.6.3 (BlackBerry Tablet OS)
1.5.3 (Windows Phone, WebOS)
1.5.2 (Maemo)
1.5.0 (PlayStation Portable, PlayStation 3)
1.1.4 (WebGL)
1.3.2.0[2] (Google Chrome)
Platform(s) iOS, Maemo, MeeGo, HP webOS, Android, Symbian^3, Series 40, PSP/PlayStation 3, Mac OS X, Windows, WebGL, Windows Phone 7, Google Plus, Google Chrome (Chrome Web Store), BlackBerry Tablet OS, Bada
Release date(s) December 11, 2009[3]
Genre(s) Puzzle
Mode(s) Single player
Rating(s)

Apple: 4+

 

Angry Birds is a strategy game developed by Finnish computer game developer Rovio Mobile. Inspired primarily by a sketch of stylized wingless birds, the game was first released for Apple’s iOS in December 2009.[3] Since that time, over 12 million copies of the game have been purchased from Apple’s App Store,[4] which has prompted the company to design versions for other touchscreen-based smartphones, such as those using the Android operating system, among others.

In the game, players use a slingshot to launch birds at pigs stationed on or within various structures, with the intent of destroying all the pigs on the playfield. As players advance through the game, new birds appear, some with special abilities that can be activated by the player. Rovio Mobile has supported Angry Birds with numerous free updates that add additional game content, and the company has even released stand-alone holiday and promotional versions of the game.

Angry Birds has been praised for its successful combination of addictive gameplay, comical style, and low price. Its popularity led to versions of Angry Birds being created for personal computers and gaming consoles, a market for merchandise featuring its characters and even long-term plans for a feature film or television series. With a combined 500 million downloads across all platforms and including both regular and special editions,[5] the game has been called “one of the most mainstream games out right now”,[6] “one of the great runaway hits of 2010”,[7] and “the largest mobile app success the world has seen so far”.[8]

 

Contents

Gameplay

A yellow bird collapses a structure onto several pigs.

In Angry Birds, players control a flock of multi-colored birds that are attempting to retrieve eggs that have been taken by a group of hungry green pigs.[9] On each level, the pigs are sheltered by structures made of various materials such as wood, ice[10] and stone, and the objective of the game is to eliminate all the pigs in the level. Using a slingshot, players launch the birds with the intent of either hitting the pigs directly or damaging the structures, causing them to collapse and eliminate the pigs.[11] In various stages of the game, additional objects such as explosive crates and rocks are found in the structures, and may be used in conjunction with the birds to destroy hard-to-reach pigs.

There are several different types of birds used in the game. In the earliest levels, the basic red bird is the only one available.[9] As the player advances through the game, additional types of birds become available with specific birds being effective against particular materials. Some birds have special abilities that may be activated by the player after the bird has been launched.[11] For example, a blue bird can separate into three small birds,[9] a black bird explodes,[11] and a white bird can drop explosive eggs.[9] The pigs themselves also appear in different sizes. While small pigs are relatively weak and are easily destroyed either by direct hits or by debris from the damaged structures, larger pigs are able to sustain more damage. In addition, some pigs wear helmets as armor, making them even more resistant to damage, while pigs with crowns can take the most damage.

Each level starts with the number, types, and order of birds pre-determined.[9][11] If all of the pigs are defeated by the time the last bird is used, the level is completed and the next level is unlocked.[9] Points are scored for each pig defeated as well as for damage to, or destruction of, structures, and bonus points are awarded for any unused birds. Upon completing each level, players receive one, two, or three stars, depending on the score received. Players may re-attempt unlocked levels as many times as they wish in order to complete them successfully or to earn additional points or stars.

Development

 

Senior game designer of Angry Birds Jaakko Iisalo at Game Design Expo 2011

In early 2009, Rovio staff began reviewing proposals for potential games. One such proposal came from senior game designer Jaakko Iisalo[12] in the form of a simulated screenshot featuring some angry-looking birds with no visible legs or wings.[13] While the picture gave no clue as to what type of game was being played, the staff liked the characters,[13] and the team elected to design a game around them.[14] As the concept of Angry Birds was developed, the staff realized the birds needed an enemy.[12] At the time, the “swine flu” epidemic was in the news, so the staff made the birds’ enemies pigs.[12] The game’s mechanics were inspired by other petrary physics games that have been released over the years, including another 2009 release, Crush the Castle.[15][16] The initial cost to develop Angry Birds was estimated to exceed 100,000, not including money spent on the subsequent updates.[13] For the iOS version, Rovio partnered with distributor Chillingo to publish the game to the App Store.[17] Since then Rovio has self-published almost all of the later ports of the game, with the exception of the PlayStation Portable version, which was produced under license by Abstraction Games and then distributed by Chillingo.[18]

Prior to this meeting we had set up strict criteria to determine which game we would go with, but we threw that out for the angry bird character.

–Mikael Hed, CEO of Rovio Mobile[14]

When Rovio began writing new versions of the game for other devices, new issues came to light. As the team began working on a version for Android systems, they observed the large number of configurations of device types and versions of the Android software.[12] The number of combinations of software version, processor speed and even user interfaces was significantly larger than that for the earlier iOS version.[19] Ultimately, the team settled on a minimum set of requirements,[12] although that left nearly 30 types of Android phones unable to run the game, including some newly released phones.[19] One month after the initial release on Android, Rovio Mobile began designing a simpler version of the game for these other devices.[19]

In early 2010, Rovio began developing a variant of Angry Birds for Facebook.[20] The project became one of the company’s largest, with development taking over a year.[20] The company understood the challenges of transplanting a game concept between social platforms and mobile/gaming systems. In a March 2011 interview, Rovio’s Peter Vesterbacka said, “you can’t take an experience that works in one environment and one ecosystem and force-feed it onto another. It’s like Zynga. They can’t just take FarmVille and throw it on mobile and see what sticks. The titles that have been successful for them on mobile are the ones they’ve built from the ground up for the platform.”[20] The Facebook version is expected to incorporate social-gaming concepts and in-game purchases and was scheduled to enter beta-testing in April 2011.[20]

Future improvements planned for the game include the ability to synchronize the player’s progress across multiple devices; for example, a player who completes a level on an iOS device could log into their copy of the game on an Android device and see the same statistics and level of progress.[21]

 

Release

 

The initial iOS version of the game included a single episode entitled “Poached Eggs”, which contained three themed chapters, each with 21 levels. From time to time, Rovio has released free upgrades that include additional content, such as new levels, new in-game objects and even new birds. As updates have been released, they have been incorporated into the game’s full version offered for download from each platform’s application store.[22]

The first update, released in February 2010, added a new episode called “Mighty Hoax”, containing two new chapters with 21 levels each. Updates released in April 2010 added the “Golden Eggs” feature, which placed hidden golden eggs throughout the game that would unlock bonus content when found, and a new episode called “Danger Above”, which initially contained a single chapter of 15 levels. Two later updates added two more chapters to “Danger Above”, each with 15 levels. “The Big Setup” episode, released in June 2010, added a new chapter with 15 levels and additional Golden Egg levels.[23] “The Big Setup” was later given two more chapters of 15 levels each.

A fifth episode, called “Ham ‘Em High”, launched in December 2010, in celebration of the game’s first year in the iOS App Store.[22][24] “Ham ‘Em High” contained 15 Wild West-themed levels in a single chapter;[25] updates in February 2011 and March 2011 each added one new 15-level chapter.[26][27] “Ham ‘Em High” also introduced the Mighty Eagle, a new bird that may be used once per hour to clear any uncompleted levels.[25] The Mighty Eagle can also be used in previously completed levels, without the once-per-hour limit, to play a mini-game called “Total Destruction” in which the player attempts to destroy as much of the scenery as possible, both with the standard birds and the Mighty Eagle; achieving 100% destruction earns the player a Mighty Eagle feather for the level.[25]

The Mighty Eagle is offered as a one-time, in-game purchase,[22] and was initially only available for iOS, as its App Store customers have iTunes accounts with pre-linked credit cards.[28] In late 2011, Rovio also added the Mighty Eagle to the Chrome App version of the game. Rovio has begun testing an Android update called the “Bad Piggy Bank” with the Elisa wireless service in Finland and T-Mobile, which allows users to charge in-app purchases, such as the Mighty Eagle, to their mobile phone bills; the service is expected to become available to other Android users in the second quarter of 2011.[28]

The sixth episode, “Mine and Dine”, was released on June 16, 2011 with 15 new mining-themed levels and a new Golden Egg.[29] An August 2011 update expanded “Mine and Dine” with two more 15-level chapters.[30]

The seventh update, “Birdday Party”, was released on December 11, 2011 to commemorate the second anniversary of the first release of the iOS version into the iTunes App Store.[31] It included 15 new birthday cake-theme levels, as well as updated graphics and the addition of elements from the spin-off games, such as the scoring graphic seen in Angry Birds Rio and the introduction of the orange bird that first appeared in Angry Bird Seasons.[32] The update was later released for Android and Microsoft Windows.

 

Reception

 

Reception
Aggregate scores
Aggregator Score
Metacritic iOS: 80% (based on 13 reviews)[33]
PSP: 77% (based on 13 reviews)[34]
Review scores
Publication Score
GameZone iOS: 8.0/10[35]
IGN iOS: 8.0/10[3]
PSP: 7.5/10[36]
Android: 8.0/10[37]
Official PlayStation Magazine (UK) PSP: 90/100[34][38]
MacWorld iOS: 3.5/5 stars[9]
Pocket Gamer iOS: 8.0/10[11]

 

Reviews of Angry Birds have been highly positive. Chris Holt of Macworld called the game “an addictive, clever, and challenging puzzler”,[9] and Pocket Gamer‘s Keith Andrew said Angry Birds is “a nugget of puzzling purity dished out with relish aplenty”.[11] Jonathan Liu of Wired News wrote that “going for the maximum number of stars certainly adds a lot of replay value to a fairly extensive game”.[39]

Reviews for the first versions of the game that did not use a touch-screen, the PlayStation 3/PSP version and the Windows version, have also been positive, but with some disagreement over the different interfaces. Will Greenwald of PC Magazine, in his review of the PlayStation Network version, said that the control scheme on these platforms is good, “but they’re not nearly as satisfying as the touch-screen controls found on smartphone versions”, and that the PlayStation 3 version appeared “blocky and unpleasant, like a smartphone screen blown up to HDTV size”.[40] Conversely, Greg Miller of IGN preferred the analog control setup of the PSP version, saying it “offered me tiny variances in control that I don’t feel like I get with my fat finger on a screen”.[36] While giving the game a positive review, Miller concluded, “There’s no denying that Angry Birds is fun, but it could use polish – such as sharper visuals, a better price and smoother action.”[36] Damien McFerrin of British website Electric Pig reviewed the PC version, saying “the mouse-driven control method showcases many distinct advantages over its finger-focused counterpart”.[41]

Angry Birds became the top-selling paid application on Apple’s UK App Store in February 2010, and reached the top spot on the US App Store a few weeks later,[42] where it remained until October 2010.[43] Since release, the free, limited version of Angry Birds has been downloaded more than 11 million times for Apple’s iOS, and the full-featured paid version has been downloaded nearly 7 million times as of September 2010.[13] The Android version of the game was downloaded more than 1 million times within the first 24 hours of release,[44] even though the site crashed at one point due to the load,[45] and over 2 million downloads in its first weekend.[46] Rovio receives approximately US$1 million per month in revenue from the advertising that appears in the free Android version.[4]

According to Rovio, players log more than 1 million hours of game time each day on the iOS version of the game,[12] 3.33 million hours per day across all platforms[47] and 40 million monthly active users.[48] In November 2010, digitaltrends.com stated that “with 36 million downloads, Angry Birds is one of the most mainstream games out right now”.[6] MSNBC‘s video game news blog has written that “[n]o other game app comes close” to having such a following.[49] The Christian Science Monitor has remarked, “Angry Birds has been one of the great runaway hits of 2010″.[7] In December 2010, in honor of the one-year anniversary of the release of Angry Birds, Rovio Mobile announced that the game had been downloaded 50 million times, with more than 12 million on iOS devices[4] and 10 million on Android.[50] By November 2011, the game had reached 500 million downloads, including Angry Birds, Angry Birds Seasons and Angry Birds Rio.[5] On Christmas Day 2011 alone, 6.5 million copies of the various Angry Birds games were downloaded across all supported platforms.[51]

In the history of the Apple App Store, Angry Birds holds the record for most days at the top of the Paid Apps chart, having spent a total of 275 days at the No.1 position; Angry Birds Rio has been No.1 for a total of 23 days, ranking ninth on the list.[52] In Apple’s “iTunes Rewind” list of the most popular iTunes Store media for 2011, Angry Birds was the top-selling paid iPhone/iPod app on the App Store and its free version was the fourth-most downloaded.[53] The game’s two special-edition versions, Angry Birds Seasons and Angry Birds Rio, were also ranked in the top 10 for paid iPhone/iPod apps, while its iPad-exclusive Angry Birds HD versions were the top-selling and top-downloaded iPad apps for the year.[53]

Awards

 

In February 2010, Angry Birds was a nominee for the “Best Casual Game” award at the 6th annual International Mobile Gaming Awards in Barcelona, Spain.[54] In September 2010, IGN named Angry Birds as the fourth best iPhone game of all time.[55] In April 2011, Angry Birds won both the “Best Game App” and “App of the Year” at the UK Appy Awards.[56] At the 15th edition of the Webby Awards, Angry Birds was awarded “Best Game for Handheld Devices”.[57] And it is proven to be one of best iPhone game apps on the market as of 2011.[58]

 

Ports

Since its initial release for the Apple iPhone and iPod Touch, Rovio has released versions of Angry Birds for a number of additional devices. One of the first was for Nokia’s N900 handset,[42] through its Ovi Store. An iPad-exclusive version, Angry Birds HD, was released at the same time the iPad itself was released in April 2010.[59] In August 2010, Angry Birds was made available to the Palm Pre phone running Palm’s webOS operating system through its App Catalog online store.[60] Symbian^3 phones received a version of the game in October 2010,[61] which initially includes only the “Poached Eggs” and “Mighty Hoax” episodes.[62]

In May 2010, Rovio announced plans for a version for devices using Google’s Android operating system,[63] with a beta version being released through the Android Market in September 2010.[64] The full Android version of the game was first released instead on GetJar in October 2010,[43] though it was subsequently released on Android Market within days.[44] Rovio officials noted that GetJar had a more global reach than Android Market, and GetJar’s availability on other smartphone platforms (including Symbian and Windows Phone 7) would make cross-platform promotion of the game easier.[43] Unlike the previous versions, Angry Birds for Android is a free, ad-supported application, as paid applications aren’t available on Android in some nations.[44] An update called “Bad Piggy Bank” enabled players to buy out the in-game ads.[50]

Near the end of 2010, Rovio stated that it was developing new ports of the game, this time for devices outside of the mobile phone market. In January 2011, three of those ports launched. First, Sony announced the release of Angry Birds for its PlayStation Portable handheld system in the form of a PlayStation mini game that includes nearly 200 levels from the original game; the version is also playable on the PlayStation 3.[36][65] Next, Rovio announced the release of a Windows version of the game[66] on January 4, 2011, available for sale exclusively from the Intel AppUp center, which included 195 levels at launch and plans for exclusive features not available on the smartphone versions.[67] One day after the Windows version was released, the Mac App Store launched, with one of the first offerings being its own version of Angry Birds.[68] Ports of Angry Birds are also proposed for the Xbox 360,[4] Wii,[4] Nintendo DS[69] and Nintendo 3DS[70] systems, as is a version for Facebook,[71] which was expected to launch in May 2011.[20]

In October 2010, Microsoft suggested on one of its websites that a Windows Phone 7 version of Angry Birds was in development. Rovio complained that Microsoft had not asked permission to make such a statement, noting that at that time it had not committed to design a Windows Phone version. Although Rovio asked Microsoft to revise its site to remove references to the game,[43][72] a Windows Phone 7 version was ultimately released in June 2011.[73]

The popularity of Angry Birds has helped spread the game to other devices that were not initially designed as gaming machines. Barnes & Noble announced that a future update for its Nook Color e-reader will let the Android-based device run applications, including a port of Angry Birds.[74] In June 2011, Rovio announced plans to partner with Roku to include a version of Angry Birds on a new model of its Internet-connected set-top box, the Roku 2 XS.[75]

In May 2011, an in-browser version of Angry Birds was released in beta form. The game uses WebGL or Canvas and is distributed through the Chrome Web Store for use with Google’s Chrome web browser. It runs on any WebGL- or Canvas-enabled browser, and features exclusive content when played on Chrome, such as exclusive levels[76] and the so-called “Chrome Bombs”. The version includes offline playability and features 60 FPS gameplay with a selection of graphics settings to accommodate a variety of hardware capabilities.[77]

On October 2011, during Nokia World 2011, it was announced that Angry Birds would come preloaded in Nokia’s Asha series of Series 40 touch handsets, aimed at emerging markets such as India, China and South Africa.[78] In December 2011, Rovio released Angry Birds HD, Angry Birds Seasons HD and Angry Birds Rio HD on the BlackBerry PlayBook tablet from Research In Motion.[79] In January 2012, Angry Birds was released for devices using Bada OS.[80]

 

Special editions

 

Angry Birds Seasons

 

Angry Birds Seasons
ABS-YotD.png
Logo for the Year of the Dragon update
Developer(s) Rovio Mobile
Publisher(s) Rovio Mobile
Version 2.2.0 (iOS, Android, Microsoft Windows)
2.1.0 (Mac OS X, Symbian)
2.0.0 (BlackBerry Tablet OS)
1.6.0 (webOS)
Platform(s) iOS, Android, Symbian^3, webOS, Microsoft Windows, Mac OS X, BlackBerry Tablet OS
Release date(s) October 21, 2010[81]

 

 

In October 2010, Rovio released a special Halloween edition of game.[81] Angry Birds Halloween, exclusive to iOS at the time and a separate application from the main game, included new levels with Halloween-themed music and graphics.[81] In December 2010, Rovio released Angry Birds Seasons to iOS, Android and Symbian^3 devices.[82][83] Seasons introduced 25 Christmas-themed levels, one for each day leading to the holiday, similar to an Advent calendar.[82][83] All versions include the previously-exclusive Halloween levels and are offered as separate, stand-alone paid applications, with the exception of the free, ad-supported Android version;[84] Angry Birds Halloween users on iOS received the Seasons levels as a free upgrade.[82] The Halloween version was given the episode title “Trick or Treat”, while the Christmas episode was entitled “Season’s Greedings”. In February 2011, Rovio released a new Valentine’s Day update to Angry Birds Seasons, entitled “Hogs and Kisses”, complete with new themed levels and graphics, as well as the option to send Angry Birds-themed Valentine’s Day messages through Facebook.[85] In March 2011, Rovio released a new St. Patrick’s Day update, entitled “Go Green, Get Lucky”,[86] followed by an Easter update, entitled “Easter Eggs”, in April 2011[87] and a summer update, “Summer Pignic”, in June 2011.[88] In September 2011, “Mooncake Festival” was released in conjunction with the Chinese Mid-Autumn Festival.[89] In October 2011, “Ham’O’Ween” was released and introduced a new orange bird, known as the globe bird.[90] In December 2011, “Wreck the Halls” was released with 25 Christmas-theme levels also arranged in an Advent calendar setting. “Year of the Dragon,” a Chinese New Year-themed update, was released on January 20, 2012 (around midnight China Standard Time or January 19, 4:00 p.m. GMT).[91] The update includes an episode-exclusive Mighty Dragon. Its function is the same as the Mighty Eagle, but it can be used even by iOS users who have not purchased the Mighty Eagle, as well as Android and Symbian^3 users, whose versions do not carry the Mighty Eagle. [92]

Angry Birds Rio

Main article: Angry Birds Rio

Rovio launched Angry Birds Rio in March 2011.[93] In this version, based on the 20th Century Fox animated film Rio, the Angry Birds characters appear in Rio de Janeiro and interact with characters from the film.[93] Angry Birds Rio initially included two chapters including a warehouse chapter entitled “Smuggler’s Den” and a jungle chapter entitled “Jungle Escape”, but it has been updated with additional chapters and levels including a beach chapter entitled “Beach Volley”, a carnival chapter entitled “Carnival Upheaval”, an airfield chapter entitled “Airfield Chase”, and one more chapter as “Smuggler’s Plane.” Since release, Angry Birds Rio has been downloaded more than 10 million times.[94]

Angry Birds Magic

 

A special version of the game, called Angry Birds Magic, will be developed exclusively for Nokia‘s NFC-enabled Symbian devices. This version of the game will include functionality that will unlock game levels upon contact with another NFC-enabled phone running the game. A free version of Angry Birds Magic came preinstalled with all NFC Symbian devices to be sold in 2011, starting with the Nokia C7. [95]

Other media

 

The Angry Birds characters have been referenced in television programs throughout the world. The Israeli comedy show Eretz Nehederet (in English: a Wonderful Country), one of the nation’s most popular TV programs, satirized recent failed Israeli-Palestinian peace attempts by featuring the Angry Birds in peace negotiations with the pigs. Clips of the segment went viral, getting viewers from all around the world. The sketch received favorable coverage from a variety of independent blogs such as digitaltrends.com,[6] hotair.com[96] and intomobile.com,[97] as well as from online news media agencies such as Haaretz,[98] The Christian Science Monitor,[7] The Guardian,[99] and MSNBC.[49] American television hosts Conan O’ Brien, Jon Stewart and Daniel Tosh have referenced the game in comedy sketches on their respective series, Conan, The Daily Show, and Tosh.0.[100][101][102] In the 30 Rock episode “Plan B”, guest star Aaron Sorkin laments to Liz Lemon, “Our craft is dying while people are playing Angry Birds and poking each other on Facebook”. He then provides a tip for Liz to improve her score in the game. In February 2011, American journalist Jake Tapper mockingly introduced U.S. Senator Chris Coons as the “Angry Birds champion of the Senate” during the National Press Club’s annual dinner.[103] Some of the game’s more notable fans include Prime Minister David Cameron of the United Kingdom, who plays the iPad version of the game, and author Salman Rushdie, who claims he is “something of a master at Angry Birds“.[104] Basketball star Kevin Durant is a huge fan of Angry Birds, and regularly plays other NBA stars in matches, although he is weary of cheating. [105

A screenshot from the T-Mobile Advert

Angry Birds and its characters have been featured in advertisements for other products. In March 2011, the characters began appearing in a series of advertisements for Microsoft’s Bing search engine.[106] At the 2011 South by Southwest festival in Austin, Texas, Nokia used scrims on a downtown building to project an advertisement for its new N8 handset that included the game’s characters.[107] A June 2011 T-Mobile advertisement filmed in Barcelona, Spain included a real-life mock-up of the game in a city plaza,[108] while Nokia used the game in Kuala Lumpur, Malaysia to promote an attempt to set a world record for the largest number of people playing a single mobile game.[109] Finnair has also used Angry Birds in their advertising, including taping an Airbus A340 airliner with the Angry Birds figures and holding an Angry Birds tournament on board a flight to Singapore. [110]

In September 2011, the Window of the World theme park in Changsha, China opened an unlicensed Angry Birds attraction.[111] Visitors to the park use a large slingshot to launch stuffed versions of the bird characters at green balloons representing the pigs.[111] Upon learning of the attraction, Rovio Mobile was reported to be considering working with the theme park to officially license it.[112]

The game’s popularity has spawned knock-off and parody games that utilize the same basic mechanics as Angry Birds. For example, Angry Turds features monkeys hurling feces and other objects at hunters who have stolen their babies.[113] Another game, entitled Chicks’n’Vixens and released in beta form on Windows Phone 7 devices, replaces the birds and pigs with chickens and foxes, respectively.[114] The developer of Chicks’n’Vixens intended the game as a challenge to Rovio Mobile, which stated at the time that a Windows Phone port of Angry Birds wouldn’t be ready until later in 2011.[114]

Angry Birds has inspired works of religious analogy. A five-part essay entitled “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life” was written by Giridhari Dasa of the International Society for Krishna Consciousness (i.e. Hare Krishna) of Brazil, utilizing the characters and gameplay mechanics to explain various concepts of yoga in Gaudiya Vaishnavism as understood and interpreted by the Hare Krishna.[115][116][117][118][119] The piece attracted much media attention, in Brazil and abroad, for its unique method of philosophico-religious presentation.[120][121][122][123] The piece was also recognized and appreciated by Rovio Mobile’s Peter Vesterbacka, who was prompted to comment on Twitter, “Very cool! I can see Angry Birds Yoga becoming a worldwide craze;-)”.[115]

Rovio is investigating ways to expand the Angry Birds brand, including merchandise, television shows and movies.[124] The game’s official website offers plush versions of the birds and pigs for sale, along with T-shirts featuring the game’s logo and characters.[125] In May 2011, Mattel released an Angry Birds board game, entitled “Angry Birds: Knock on Wood”.[126] Over 10 million Angry Birds toys have been sold thus far.[127] Rovio opened the first official Angry Birds retail store in Helsinki on November 11, 2011 at 11:11am local time.[112] It expects to open its next retail store somewhere in China, considered the game’s fastest-growing market.[112]

Mikael Hed, CEO of Rovio Mobile, has envisioned a feature film in the stop-motion animation style of Aardman Animation.[124] To that end, Rovio has purchased a Helsinki-based animation studio to prepare Angry Birds short cartoons on Nickelodeon,[127] the first of which was a Christmas special named “Wreck the Halls” that debuted on Nickelodeon in December 2011.[128] Rovio also hired David Maisel, former executive producer of Marvel Studios films such as Iron Man and Thor, to head up production of feature-length films.[127] Hed acknowledges that such a film would be years away, and that Rovio must keep the characters relevant until then, by producing sequels or new ports of the original game.[124] Rovio officials have hinted that one such “sequel” will be told from the pigs’ point of view.[129]

 

References

 

  1. ^ “SDL Testimonials”. Galaxygameworks.com. Retrieved 2012-02-01.
  2. ^ “Angry Birds Chrome”. Chrome.angrybirds.com. Retrieved 2012-02-01.
  3. ^ a b c “Angry Birds Review”. IGN.com. February 11, 2010. Retrieved March 24, 2011.
  4. ^ a b c d e “The Supremely Addicting Angry Birds Hits 42 Million Free and Paid Downloads”. SymbianFreak.com. October 22, 2010. Retrieved December 11, 2010.
  5. ^ a b Tarmo Virki (November 2, 2011). “Angry Birds tops 500 million downloads”. Yahoo.com. Retrieved November 2, 2011.
  6. ^ a b c Van Camp, Jeffrey (November 23, 2010). “Israeli Angry Birds satire goes viral”. digitaltrends.com. Retrieved November 26, 2010.
  7. ^ a b c Shaer, Matthew (November 29, 2010). “Angry Birds bound for Xbox, PlayStation”. Retrieved November 29, 2010.
  8. ^ “Angry Birds will be bigger than Mickey Mouse and Mario. Is there a success formula for apps?”. MIT Entrepreneurship review. February 18, 2011. Retrieved March 27, 2011.
  9. ^ a b c d e f g h Chris Holt. “Angry Birds Review”. Macworld. Retrieved June 23, 2010.
  10. ^ Rovio Mobile. Angry Birds (in English). Scene: Achievements screen. “Icepicker: 5000 ice blocks smashed”
  11. ^ a b c d e f Keith Andrew (December 21, 2009). “Angry Birds (iPhone) review”. Pocket Gamer. Retrieved June 23, 2010.
  12. ^ a b c d e f Jon Mundy (October 13, 2010). “Interview: Rovio on the origin of Angry Birds, being inspired by swine flu, and why you may never see an Angry Birds 2”. Pocket Gamer. Retrieved November 30, 2010.
  13. ^ a b c d MobileWebGo (September 8, 2010). “How Did Angry Birds Become a BlockBuster? Rovio video interview and transcript”. MobileWebGo. Retrieved September 8, 2010.
  14. ^ a b Ryan Rigney (October 2, 2010). “The Origins of Angry Birds”. PCWorld.com. Retrieved December 7, 2010.
  15. ^ Alan Henry (March 3, 2011). “Is ‘Angry Farm’ for BlackBerry a Rovio Ripoff?”. PC Magazine. Retrieved March 6, 2011.
  16. ^ Rob Hearn (February 24, 2011). “iPhone hit Tiny Wings is probably based on indie game Wavespark”. Pocket Gamer. Retrieved March 6, 2011.
  17. ^ “Angry Birds IP”. TechCrunch. Retrieved May 15, 2011.
  18. ^ “Abstraction Games News”. AbstractionGames.com. Retrieved May 16, 2011.
  19. ^ a b c Daniel Ionescu (November 19, 2010). “Angry Birds Devs Angry At Android Fragmentation”. PCWorld.com. Retrieved December 7, 2010.
  20. ^ a b c d e Kim-Mai Cutler (March 13, 2011). “Rovio Has Been Working On The Facebook Version of Angry Birds For A Year”. InsideMobileApps.com. Retrieved March 25, 2011.
  21. ^ “Angry Birds to Sync Your Progress Across All Platforms Soon; New Easter Update Screenshots”. Phandroid.com. 2011-04-13. Retrieved 2012-02-01.
  22. ^ a b c “iOS Angry Birds Mighty Eagle On Its Way: Video”. phonesreview.co.uk. November 25, 2010. Retrieved November 30, 2010.
  23. ^ Joe White (June 22, 2010). “Angry Birds Receives Major Update”. AppAdvice.com. Retrieved November 29, 2010.
  24. ^ Rob Hearn (December 23, 2010). “Angry Birds iPhone Ham ‘Em High update introduces the 59p Mighty Eagle”. PhonesReview.co.uk. Retrieved December 24, 2010.
  25. ^ a b c Shawn Wagnon (November 25, 2010). “Angry Birds Ham ‘Em High with 15 new levels & the Mighty Eagle coming out to give you a new bird flinging high: Rovio gives you level busting can of sardines!”. Device. Retrieved November 30, 2010.
  26. ^ Doug Smith (February 4, 2011). “Angry Birds updated for iOS version 1.5.1”. MobilityDigest.com. Retrieved March 25, 2011.
  27. ^ Samuel Gibbs (March 18, 2011). “Angry Birds iOS update ends their Frontier Badlands adventure with 15 new levels, a Golden Egg and ads”. Switched.com. Retrieved March 25, 2011.
  28. ^ a b Brian X Chen (February 8, 2011). “Android in-app payments begin with Angry Birds”. Wired UK. Retrieved February 17, 2011.
  29. ^ “Angry birds version 1.6.0 gets you 15 new levels”.
  30. ^ “iTunes Preview: Angry Birds”. itunes.apple.com. August 25, 2011. Retrieved November 3, 2011.
  31. ^ Owen Good (December 11, 2011). “Angry Birds Second Birthday Invites a New Bird to the Party”. Kotaku.com. Retrieved December 12, 2011.
  32. ^ “Happy Birdday! – Rovio Entertainment Ltd”. Rovio.com. Retrieved 2012-02-01.
  33. ^ “Angry Birds (iOS)”. Retrieved March 24, 2011.
  34. ^ a b “Angry Birds (PSP)”. Retrieved March 24, 2011.
  35. ^ James Pikover (May 12, 2010). “Angry Birds review”. GameZone.com. Retrieved March 24, 2011.
  36. ^ a b c d Greg Miller (January 10, 2011). “Angry Birds Review”. PCMag.com. Retrieved February 4, 2011.
  37. ^ John Mundy (October 13, 2010). “Angry Birds: Winging endorsement”. PocketGamer.co.uk. Retrieved March 27, 2011.
  38. ^ PlayStation Official Magazine (Spring 2011):
  39. 113.^ “iPhone Review: Angry Birds Make Great Projectiles”. Wired. March 5, 2010. Retrieved July 28, 2010.
  40. ^ Will Greenwald (January 12, 2011). “Angry Birds (for PlayStation 3, PSP)”. PCMag.com. Retrieved February 4, 2011.
  41. ^ Damien McFerrin (January 19, 2011). “Angry Birds PC review”. ElectricPig.co.uk. Retrieved February 4, 2011.
  42. ^ a b Gustav Sandstrom (May 12, 2010). “Angry Birds Smartphone App Takes Off For Rovio”. Wall Street Journal. Retrieved June 23, 2010.
  43. ^ a b c d Leslie Horn (October 15, 2010). “Angry Birds for Android Launches as Free GetJar App”. PC Magazine. Retrieved October 18, 2010.
  44. ^ a b c Quentyn Kennemer (October 15, 2010). “Angry Birds is Free & It’s Out”. phandroid.com. Retrieved October 18, 2010.
  45. ^ Keith Dsouza (October 15, 2010). “GetJar Taken Down By Angry Birds”. Techie Buzz. Retrieved November 8, 2010.
  46. ^ Patrick Goss. “Angry Birds Android passes 2m mark”. techradar.com. Retrieved October 18, 2010.
  47. ^ Leigh Alexander (March 14, 2011). “Angry Birds sees 100 Million Downloads”. Gamasutra.com. Retrieved March 21, 2011.
  48. ^ Conrad Egusa (March 10, 2011). “Skype founder, others catapult $42M to Angry Birds”. venturebeat.com. Retrieved March 17, 2011.
  49. ^ a b Popkin, Helen A.S. (November 22, 2010). “‘Angry Birds’ fail to negotiate peace treaty”. MSNBC. Retrieved November 29, 2010.
  50. ^ a b Mike Butcher (December 10, 2010). “Angry Birds hits 50 million downloads, creates simple in-app purchases on Android”. TechCenter Europe. Retrieved December 11, 2010.
  51. ^ Eddie Makuch (January 4, 2012). “Angry Birds downloaded 6.5M times on Christmas Day”. GameSpot.com. CNet. Retrieved January 5, 2012.
  52. ^ Mike Wehner (May 24, 2011). “Apple approves its 500,000th app, but do you care?”. Yahoo! News. Retrieved May 24, 2011.
  53. ^ a b “iTunes top ten downloads of 2011”. KSAT.com. Associated Press. December 8, 2011. Retrieved December 9, 2011.
  54. ^ “The 6th Annual IMGA Winners”. IMGAwards.com. February 16, 2010. Retrieved June 23, 2010.
  55. ^ “The Top 25 iPhone Games”. September 10, 2010. Retrieved December 27, 2010.
  56. ^ Whitworth, Dan (April 12, 2011). “Angry Birds triumphs at Appy Awards”. BBC Newsbeat. Retrieved April 12, 2011.
  57. ^ “Webby Nominees”. Webbyawards.com. Retrieved 2012-02-01.
  58. ^ initclock() (2011-09-30). “Top 10 iPhone Game Apps In The World”. Worldtenz.net. Retrieved 2012-02-01.
  59. ^ “Angry Birds HD for iPad”. iTunes.apple.com. Retrieved June 23, 2010.
  60. ^ Dew Alam (August 25, 2010). “iPhone Game Angry Birds now on Palm webOS”. Top10.com. Retrieved August 25, 2010.
  61. ^ “Nokia Symbian^3 Angry Birds Available in Ovi Store”. Phones Review. October 22, 2010. Retrieved October 22, 2010.
  62. ^ Padmini Harchandrai (October 22, 2010). “Angry Birds Arrives for Symbian^3”. tech2.0. Retrieved November 29, 2010.
  63. ^ Mark Brown (May 18, 2010). “Angry Birds coming to Android this summer”. Pocket Gamer. Retrieved June 23, 2010.
  64. ^ Phil Nickinson (September 3, 2010). “Angry Birds for Android is here!!!”. Android Central.
  65. ^ Rey Gutierrez (January 3, 2011). “The Drop: Week of January 3rd 2011 New Releases”. PlayStation.com. Retrieved January 4, 2011.
  66. ^ Saket Narayan (January 27, 2011). “How to Download Angry Birds PC Game from Intel Appup Store”. TechSplurge. Retrieved February 21, 2011.
  67. ^ Chloe Albanesius (January 5, 2011). Intel’s AppUp center will only run on Windows XP or Windows 7, the platforms of Intel NetBooks, thereby excluding Vista users from the group of potential Windows players. /0,2817,2375200,00.asp “Rovio Releases Angry Birds for PCs, Netbooks”. PC Magazine. Retrieved January 6, 2011.
  68. ^ Jason D. O’Grady (January 6, 2011). “Mac OS 10.6.6 brings Mac App Store, Angry Birds to OS X (updated)”. ZDNet.com. Retrieved January 6, 2011.
  69. ^ Daemon Hatfield (August 2, 2010). “Angry Birds Migrating to PSP, Nintendo Platforms”. IGN.com. Retrieved September 9, 2010.
  70. ^ “Angry Birds confirmed for Nintendo 3DS”. 3DS Focus. February 5, 2011. Retrieved February 6, 2011.
  71. ^ “Angry Birds Game Coming to Facebook”. Mashable. March 7, 2011.
  72. ^ “Angry Birds is Coming to Windows Phone 7”. Esphoneblog.com. 2010-10-10. Retrieved 2012-02-01.
  73. ^ Erica Ogg (May 18, 2011). “Angry Birds for Windows Phone 7 delayed”. CNet.com. Retrieved 2011-05-18.
  74. ^ Chloe Albanesius (March 25, 2011). “Barnes & Noble Nook Update Will Bring Email, Apps Like ‘Angry Birds'”. PCMag.com. Retrieved April 20, 2011.
  75. ^ Michael Liedtke (June 1, 2011). “‘Angry Birds’ game migrating to TV on Roku player”. Atlanta Journal-Constitution (Cox Enterprises). Retrieved June 1, 2011.
  76. ^ Darren Murph (May 11, 2011). “Live from Google I/O 2011’s day 2 keynote!”. Engadget.com. Retrieved May 11, 2011.
  77. ^ Vlad Savov (May 11, 2011). “Angry Birds gets a web version, coming to Chrome Web Store”. Engadget.com. Retrieved May 11, 2011.
  78. ^ “Nokia Asha brings Angry Birds to the developing world, Mighty Eagle soars”. 2011-10-26. Retrieved 2011-10-26.
  79. ^ “Angry Birds for BlackBerry PlayBook Now Available!”. 2011-12-21. Retrieved 2011-12-21.
  80. ^ “Angry Birds making its way to to bada OS for free – only for Wave III for now”. GSMArena.com. January 4, 2012. Retrieved January 5, 2012.
  81. ^ a b c Richard Mitchell (October 21, 2010). “Angry Birds Halloween edition spooks iPad, iPhone”. Joystiq.com. Retrieved October 28, 2010.
  82. ^ a b c Jeff Cormier (December 1, 2010). “Angry Birds Seasons goes live and free for iOS and Android”. The Next Web. Retrieved December 1, 2010.
  83. ^ a b Ewan Spence (December 17, 2010). “Review: Angry Birds Seasons”. AllAboutSymbian.com. Retrieved December 17, 2010.
  84. ^ Vlad Bobleanta (December 1, 2010). “Angry Birds Seasons out for Android and iOS today, free to Halloween users”. switched.com. Retrieved December 1, 2010.
  85. ^ Christina Warren (February 7, 2011). “Angry Birds Gets Facebook-Infused Valentine’s Day Edition”. Mashable.com. Retrieved February 8, 2011.
  86. ^ “Angry Birds Seasons Go Green, Get Lucky Update is Here!”. March 9, 2011. Retrieved March 10, 2011.
  87. ^ Chloe Albanesius (April 18, 2011). “Angry Birds Seasons Gets Easter Update”. PCMag.com. Retrieved April 20, 2011.
  88. ^ Rob Hearn (June 22, 2011). “Angry Birds Seasons Summer Pignic update hits the App Store, adds 30 levels”. PocketGamer.co.uk. Retrieved June 22, 2011.
  89. ^ Angry Birds Seasons Moon Festival Episode Released, IGN, 1 September 2011. Accessed on 2 September 2011.
  90. ^ Official Promo for Ham’O’Ween. Accessed on 21 October 2011.
  91. ^ Rovio Mobile‘s official YouTube channel (December 30, 2012). “Happy New Year 2012 from the Angry Birds!”. youtube.com. Retrieved January 3, 2012.
  92. ^ “Year of the Dragon update for Angry Birds Seasons! – Rovio Entertainment Ltd”. Rovio.com. 2012-01-20. Retrieved 2012-02-01.
  93. ^ a b Paul Suarez (January 29, 2011). “‘Angry Birds Rio’ Release Teams With Hollywood”. PCWorld.com. Retrieved February 4, 2011.
  94. ^ Chloe Albanesius (April 4, 2011). “Angry Birds Rio Downloaded 10M Times”. PCMag.com. Retrieved April 20, 2011.
  95. ^ “NFC Enabled Angry Birds Magic Game To Be Exclusively Available For Nokia C7”. Symbian-Freak.com. April 19, 2011. Retrieved April 25, 2011.
  96. ^ “Breakthrough: Peace talks begin to settle bitter longstanding conflict”. hotair.com. November 25, 2010. Retrieved November 26, 2010.
  97. ^ “The Angry Birds Peace Treaty didn’t turn out so well”. intomobile.com. November 23, 2010. Retrieved November 26, 2010.
  98. ^ “Israeli satire show goes viral with Angry Bird take on peace talks”. Haaretz. November 22, 2010. Retrieved November 26, 2010.
  99. ^ Stewart, Keith (November 23, 2010). “Angry Birds Treaty brings casual gaming into the world of satire”. The Guardian (UK). Retrieved November 29, 2010.
  100. ^ Conan O’Brien (host) (December 15, 2010) (in English). Conan’s Message to Finland(Television production). TBS. Event occurs at 1:38. Retrieved December 21, 2010.
  101. ^ Jon Stewart (host) (February 16, 2011) (in English). Intro – Watson Competes on Jeopardy(Television production).
  102. ^ Daniel Tosh (January 11, 2011) (in English). Tosh.0: Angry Birds(Television production).
  103. ^ Mirkinson, Jack (February 10, 2011). “Chris Coons Mocks Jake Tapper”. Huffington Post (USA). Retrieved February 17, 2011.
  104. ^ Nick Wingfield (November 30, 2010). “Why We Can’t Stop Playing”. The Wall Street Journal (Dow Jones & Company, Inc.). Retrieved March 27, 2011.
  105. ^ [1][dead link]
  106. ^ Angry Birds Bing Video – Episode 1. Rovio Mobile. Retrieved March 7, 2011.
  107. ^ Angry Birds On A 15 Storey Building At SXSW. March 12, 2011. Retrieved June 9, 2011.
  108. ^ T-Mobile Angry Birds Live. Retrieved June 9, 2011.
  109. ^ Lim Yung Hui (June 11, 2011). “Guinness World Record at Nokia World’s Biggest Angry Birds Playground in Kuala Lumpur”. greyreview.com. Retrieved December 14, 2011.
  110. ^ Matt Molnar (September 21, 2011). “Angry Birds Take Over Finnair Flight to Singapore – NYCAviation”. Retrieved January 22, 2012.
  111. ^ a b Charles Cooper (September 16, 2011). “China steals “Angry Birds” for theme park”. CBS News. Retrieved November 12, 2011.
  112. ^ a b c “Angry Birds Opens First Store”. Yahoo.com. November 11, 2011. Retrieved November 12, 2011.
  113. ^ Marc Flores (January 31, 2011). “Bored with Angry Birds? Try Angry Turds”. IntoMobile.com. Retrieved February 5, 2011.
  114. ^ a b Chris Davies (February 2, 2011). “Chicks’n’Vixens brings Angry Birds clone to WP7 as Rovio protest”. Slashgear.com. Retrieved February 5, 2011.
  115. ^ a b “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life, Part I”. Giridhari Dasa. Retrieved June 26, 2011.
  116. ^ “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life, Part II”. Giridhari Dasa. Retrieved June 26, 2011.
  117. ^ “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life, Part III”. Giridhari Dasa. Retrieved June 26, 2011.
  118. ^ “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life, Part IV”. Giridhari Dasa. Retrieved June 26, 2011.
  119. ^ “Angry Birds™ Yoga – How to Eliminate the Green Pigs in Your Life, Final Part”. Giridhari Dasa. Retrieved June 26, 2011.
  120. ^ Kendall, Paul (February 7, 2011). “Angry Birds: the story behind iPhone’s gaming phenomenon”. London: telegraph.co.uk. Retrieved June 26, 2011.
  121. ^ Name (required) (2011-06-15). “Angry Birds Yoga Making a Splash in Brazil | Giridhari’s Blog”. Pandavas.wordpress.com. Retrieved 2012-02-01.
  122. ^ “topics”. Dzai.com.br. Retrieved 2012-02-01.
  123. ^ Smullen, Madhava (June 25, 2011). “Is ISKCON Devotee’s “Angry Birds Yoga” Set To Go Viral?”. news.iskcon.com. Retrieved June 26, 2011.
  124. ^ a b c Marc Graser (August 24, 2010). Angry Birds flies with Hollywood”. Variety. Retrieved November 29, 2010.
  125. ^ “Angry Birds Shop”. Rovio.com. Retrieved November 30, 2010.
  126. ^ Brian Stetler (January 7, 2011). “Angry Birds at C.E.S.”. New York Times. Retrieved January 8, 2011.
  127. ^ a b c “Angry Birds Aim For World Domination”. FoxNews.com. 2011-10-19. Retrieved 2011-10-20.
  128. ^ Eric Goldman (December 16, 2011). “Angry Birds Short Film Airing on Nickelodeon”. IGN.com. Retrieved December 19, 2011.
  129. ^ Bosker, Bianca (November 17, 2010). “Angry Birds sequel will reveal pigs’ point of view”. Huffington Post (USA). Retrieved January 6, 2011.

External links

Official website

Comparison of platform virtual machines


 

Platform virtual machines are software packages which emulate the whole physical computer machine, often giving multiple virtual machines on one physical platform. The table below compares basic information about platform virtual machine (VM) packages.

Contents

General

This section may require cleanup to meet Wikipedia’s quality standards. (Consider using more specific cleanup instructions.) Please help improve this section if you can. The talk page may contain suggestions. (November 2008)
Name Creator Host CPU Guest CPU Host OS(s) Guest OS(s) License
Bochs Kevin Lawton Any x86, x86-64 Windows, Linux, Unix/X11, Mac OS 9, Mac OS X, BeOS, MorphOS, OS/2[1][2] Windows, Linux, DOS, BSD, OS/2 LGPL
Containers, or Zones Sun Microsystems x86, x86-64, SPARC (portable: not tied to hardware) Same as host Solaris 10, Solaris 11 Express, OpenSolaris 2009.06 Solaris (8, 9, 10, 11), Linux (BrandZ) CDDL
Cooperative Linux (coLinux) Dan Aloni, other developers x86[3] Same as host Windows 2000, XP, 2003, Vista[3] Linux GPL version 2
Denali University of Washington x86 x86 Denali Ilwaco, NetBSD ?
DOSBox Peter Veenstra, Sjoerd, community help Any x86 Linux, Windows, Mac OS classic, Mac OS X, BeOS, FreeBSD, OpenBSD, Solaris, QNX, IRIX, MorphOS, AmigaOS, Maemo, Symbian Internally emulated DOS shell; classic PC booter games, unofficially Windows 1.0 to 3.11 GPL
DOSEMU Community project x86, x86-64 x86 Linux DOS GPL version 2
FreeBSD Jail FreeBSD Any running FreeBSD Any running FreeBSD FreeBSD FreeBSD, Linux ABI BSD
GXemul Anders Gavare Any ARM, MIPS, M88K, PowerPC, SuperH Unix-like NetBSD, OpenBSD, Linux, Ultrix, Sprite BSD
Hercules Begun by Roger Bowler, as of 2011 maintained by Jay Maynard Any z/Architecture Unix-like Linux on zSeries, z/OS, z/VM, z/VSE, OS/360, DOS/360, DOS/VS, MVS, VM/370, TSS/370 QPL
Hyper-V Server 2008 R2 Microsoft x86-64 + hardware-assisted virtualization (Intel VT-x or AMD-V) x86-64, x86 (up to 8 physical CPUs) Windows 2008 w/Hyper-V Role, Windows Hyper-V Server supported drivers for Windows 2000, Windows 2003, Windows 2008, Windows XP, Windows Vista, Linux (SUSE 10 released, more announced) Proprietary
iCore Virtual Accounts iCore Software x86 x86 Windows XP Windows XP Proprietary
Integrity Virtual Machines Hewlett-Packard IA-64 IA-64 HP-UX HP-UX, Windows, Linux (OpenVMS announced) Proprietary
JPC (Virtual Machine) Oxford University Any running the Java Virtual Machine x86 Java Virtual Machine DOS, Linux, Windows up to 3.0 GPL version 2
KVM Qumranet [7]

x86, x86-64, IA-64, with x86 virtualization, s390, PowerPC (see restrictions, e.g., no PowerPC 970 support

)

Same as host Linux, illumos FreeBSD, Linux, Solaris, Windows, Plan 9 GPL version 2
Linux-VServer Community Project x86, x86-64, IA-64, Alpha, PowerPC 64, PA-RISC 64, SPARC64, ARM, S/390, SH/66, MIPS Compatible Linux Linux variants GPL version 2
LynxSecure LynuxWorks x86, Intel VT-x, Intel VT-d x86 No host OS LynxOS, Linux, Windows Proprietary
lxc Community project lxc.sourceforge.net

x86, x86-64, IA-64, PowerPC 64, SPARC64 Same as host Linux Linux variants GPL version 2
Mac-on-Linux Mac-on-Linux

PowerPC PowerPC Linux Mac OS X, Mac OS 7.5.2 to 9.2.2, Linux GPL
Mac-on-Mac Sebastian Gregorzyk PowerPC PowerPC Mac OS X, up to Tiger excluded Mac OS X, Mac OS 7.5.2 to 9.2.2, Linux GPL
OpenVZ Community project, supported by SWsoft, now Parallels, Inc. x86, x86-64, IA-64, PowerPC 64, SPARC64 Same as host Linux Linux variants GPL
Oracle VM for x86 Oracle Corporation x86, x86-64, Intel VT-x, AMD-V x86, x86-64, Intel VT-x, AMD-V No host OS Microsoft Windows, Oracle Enterprise Linux, Red Hat Enterprise Linux, Solaris Oracle VM Server GPL; Manager proprietary
Oracle VM Server for SPARC (LDoms) Oracle Corporation UltraSPARC T1, UltraSPARC T2, UltraSPARC T2+, SPARC T3 Compatible Solaris 10 Solaris, Linux, FreeBSD Proprietary
OVPsim OVP [8]

x86 OR1K, MIPS32, ARC600/700, ARM; and public API which enables users to write custom processor models, RISC, CISC, DSP, VLIW all possible Microsoft Windows, Linux Depends on target machine, for example includes MIPS Malta that runs Linux or SMP-Linux; and includes public API which enables users to write custom peripheral and system models Proprietary, Apache 2.0 for models
Parallels Desktop for Mac Parallels, Inc. x86, Intel VT-x x86 Mac OS X x86 DOS, Windows, Linux, Mac OS X Server, FreeBSD, OS/2, eComStation, Solaris Proprietary
Parallels Workstation Parallels, Inc. x86, Intel VT-x x86 Windows, Linux Windows, Linux, FreeBSD, OS/2, eComStation, DOS, Solaris Proprietary
PearPC Sebastian Biallas x86, x86-64, PowerPC PowerPC Windows, Linux, Mac OS X, FreeBSD, NetBSD Mac OS X, Darwin, Linux GPL
PikeOS SYSGO AG PowerPC, x86, ARM, MIPS, SPARC, SuperH Same as host PikeOS PikeOS native, Linux, RTEMS, OSEK, ARINC 653 APEX, ITRON Proprietary
PowerVM IBM POWER4, POWER5, POWER6, PowerPC 970 POWER4/5/6, PowerPC 970, X86 (PowerVM-Lx86) No host OS Linux PowerPC, x86; AIX, i5/OS, IBM i Proprietary
QEMU Fabrice Bellard, other developers x86, x86-64, IA-64, PowerPC, Alpha, SPARC 32/64, ARM, S/390, M68k x86, x86-64, ARM, CRIS, LM32, MicroBlaze, MIPS, SPARC 32/64, PowerPC Windows, Linux, Mac OS X, Solaris, FreeBSD, OpenBSD, BeOS Changes regularly[4] GPL/LGPL
QEMU w/ kqemu module Fabrice Bellard x86, x86-64 Same as host Linux, FreeBSD, OpenBSD, Solaris, Windows Changes regularly[4] GPL/LGPL
QEMU w/ qvm86 module Paul Brook x86 x86 Linux, NetBSD

, Windows

Changes regularly GPL
QuickTransit Transitive Corp. x86, x86-64, IA-64, POWER MIPS, PowerPC, SPARC, x86 Linux, Mac OS X, Solaris Linux, Mac OS X, Irix, Solaris Proprietary
RTS Hypervisor Real-Time Systems x86 x86 No host OS Windows 7, Windows XP, Windows Embedded, Windows CE, Linux, Android, VxWorks, OS-9, RTOS-32, QNX, RTEMS, T-Kernel, proprietary Proprietary
ScaleMP vSMP Foundation ScaleMP x86, x86-64 Same as host, up to 8,192 CPUs and 64 TB per VM No host OS Linux Proprietary
vNUMA Matthew Chapman ia64 ia64, combines CPUs and memory from independent nodes into a virtual NUMA machine No host OS Linux Open source/research
Safe Virtual Machine, SVM Altreonic, www.altreonic.com Any Any OpenComRTOS or any other (RT)OS N.A. Binary, Open Technology License
SIMH Bob Supnik, The Computer History Simulation Project

Alpha, ARM, HPPA, x86, IA-64, x86-64, M68K, MIPS, MIPSel, POWER, s390, SPARC Data General Nova, Eclipse; Digital Equipment Corporation PDP-1, PDP-4, PDP-7, PDP-8, PDP-9, PDP-10, PDP-11, PDP-15, VAX; GRI Corporation GRI-909, IBM 1401, 1620, 1130, 7090/7094, System 3; Interdata (Perkin-Elmer) 16b/32b systems; Hewlett-Packard 2114, 2115, 2116, 2100, 21MX; Honeywell H316/H516; MITS Altair 8800 with 8080 and Z80; Royal-Mcbee LGP-30, LGP-21; Scientific Data Systems SDS 940 BSD, Linux, Solaris, VMS, Windows Depends on target machine, includes NetBSD/VAX, OpenBSD/VAX, VAX/VMS, Unix v6, Unix v7, TOPS-10, TOPS-20, ITS BSD-like, unique
Simics Virtutech

x86, x86-64, SPARC v9 Alpha, ARM, IA-64, MIPS 32/64, MSP430, POWER, PowerPC 32/64, SPARC v8/v9, x86, x86-64, TI TMS320C64xx Windows, Linux, Solaris Depends on target machine, VxWorks, OSE, QNX, Linux, Solaris, Windows, FreeBSD, RTEMS, TinyOS, many others Proprietary
Sun xVM Server Sun Microsystems x86-64, SPARC Same as host No host OS Windows XP, 2003 Server (x86-64 only), Linux, Solaris GPL version 3
SVISTA 2004 Serenity Systems International

x86 x86 Windows, OS/2, Linux Windows, Linux, OS/2, BSD Proprietary
TRANGO TRANGO Virtual Processors, Grenoble, France

ARM, XScale, MIPS, PowerPC Paravirtualized ARM, MIPS, PowerPC No host OS, Linux or Windows as dev. hosts Linux, eCos, µC/OS-II, WindowsCE, Nucleus, VxWorks Proprietary
User Mode Linux Jeff Dike, other developers x86, x86-64, PowerPC Same as host Linux Linux GPL version 2
VirtualBox Innotek, acquired by Oracle Corporation x86, x86-64 x86, (x86-64 only on VirtualBox 2 and later with hardware virtualization) Windows, Linux, Mac OS X x86, Solaris, FreeBSD, eComStation DOS, Linux, Mac OS X Server,[5] FreeBSD, Haiku, OS/2, Solaris, Syllable, Windows GPL version 2; full version with extra enterprise features is proprietary
Virtual Iron 3.1 Virtual Iron Software, Inc., acquired by Oracle x86 VT-x, x86-64 AMD-V x86, x86-64 No host OS Windows, Linux Full product is proprietary, a few components are GPL version 2[6]
Virtual PC 2007 Connectix x86, x86-64 x86 Windows Vista (Business, Enterprise, Ultimate), XP Pro, XP Tablet PC Edition DOS, Windows, OS/2, Linux (SUSE, Xubuntu), OpenSolaris (Belenix) Proprietary
Windows Virtual PC Connectix x86, x86-64 with Intel VT-x or AMD-V x86 Windows 7 Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008 Proprietary
Virtual PC 7 for Mac Connectix PowerPC x86 Mac OS X Windows, OS/2, Linux Proprietary
VirtualLogix VLX VirtualLogix ARM, TI DSP C6000, x86, Intel VT-x, Intel VT-d, PowerPC Same as host No host OS Linux, Windows XP, C5, VxWorks, Nucleus, DSP/BIOS, proprietary Proprietary
Virtual Server 2005 R2 Connectix x86, x86-64 x86 Windows 2003, XP Windows NT, 2000, 2003, Linux (Red Hat, SUSE) Proprietary
CoWare Virtual Platform CoWare x86, x86-64, SPARC v9 Devices including (multi) cores from ARM, MIPS, PowerPC, Toshiba MeP, Renesas SH, TI, Tensilica, ZSP Windows, Linux, Solaris Depends on guest CPU; includes: Linux (various flavors), mITRON (various flavors), Windows CE, Symbian, more Proprietary
Virtuozzo SWsoft, now Parallels, Inc. x86, IA-64, x86-64 x86, IA-64, x86-64 Linux, Windows Linux, Windows Proprietary
VMware ESX Server VMware x86, x86-64 x86, x86-64 No host OS Windows, Linux, Solaris, FreeBSD, OSx86 (as FreeBSD), virtual appliances, Netware, OS/2, SCO, BeOS, Darwin, others: runs arbitrary OS[7] Proprietary
VMware ESXi VMware x86, x86-64 x86, x86-64 No host OS Same as VMware ESX Server Proprietary
VMware Fusion VMware x86, x86-64 x86, x86-64 Mac OS X x86 Same as VMware ESX Server Proprietary
VMware Server VMware x86, x86-64 x86, x86-64 Windows, Linux Same as VMware ESX Server Proprietary
VMware Workstation 7.1 VMware x86, x86-64 x86, x86-64 Windows, Linux Same as VMware ESX Server Proprietary
VMware Player 3.1 VMware x86, x86-64 x86, x86-64 Windows, Linux Same as VMware ESX Server Proprietary, free of charge for personal non-commercial use[8][9]
Wind River hypervisor Wind River x86, PowerPC Same as host No host OS Linux, VxWorks, unmodified guests (including MS Windows and RTOSes such ach OSE, QNX and others), bare metal virtual board Proprietary
Wind River VxWorks MILS Platform Wind River PowerPC Same as host No host OS VxWorks, bare metal virtual board Proprietary
Xen Xensource x86, x86-64, IA-64 Same as host NetBSD, Linux, Solaris FreeBSD, NetBSD, Linux, Solaris, Windows XP & 2003 Server (needs vers. 3.0 and an Intel VT-x (Vanderpool) or AMD-V (Pacifica)-capable CPU), Plan 9 GPL
XtratuM Universidad Politecnica de Valencia x86, x86; SPARC v8 LEON2/3 Same as host No host OS GPOS: Linux, RTOS: PartiKle, RTEMS GPL
z/VM IBM z/Architecture z/Architecture, z/VM does not run on predecessor mainframes No host OS, itself (single or multiple levels/versions deep, e.g. VM/ESA running in z/VM 4.4 in z/VM 5.2 in z/VM 5.1.) Linux on zSeries, z/OS, z/VSE, z/TPF, z/VM, VM/CMS, MUSIC/SP, OpenSolaris for System z, predecessors Proprietary
z LPARs IBM z/Architecture z/Architecture Integrated in firmware of System z mainframes Linux on zSeries, z/OS, z/VSE, z/TPF, z/VM, MUSIC/SP, and predecessors Integrated in firmware of System z mainframes
Name Creator Host CPU Guest CPU Host OS(s) Guest OS(s) License

Features

Name Guest OS SMP available Runs arbitrary OS Supported guest OS drivers Method of operation Typical use Speed relative to host OS Commercial support available
Containers, or Zones Yes, over 500-way on current systems No Uses native device drivers Operating system-level virtualization Server consolidation with workload isolation, single workload containment, hosting, dev/test/prod Native Yes
Hyper-V Server 2008 R2 Yes, up to 4 VCPUs per VM Yes Yes Virtualization Server consolidation, service continuity, dev/test, desktop virtualization, could computing Near native Yes
OpenVZ Yes No Compatible Operating system-level virtualization Virtualized server isolation Native[9]  ?
KVM Yes[10], up to 16 VCPUs per VM Yes Yes AMD-V and Intel-VT-x  ?  ? Yes, Look at RedHat

or Novell

for details

Linux-VServer Yes No Compatible Operating system-level virtualization Virtualized server isolation Native[10] Yes
Oracle VM Server for x86 Yes Yes Yes Paravirtualization and hardware virtualization Server consolidation and security, enterprise and business deployment Near native Yes
Oracle VM Server for SPARC Yes Yes Yes Paravirtualization and hardware virtualization Server consolidation and security, enterprise and business deployment Near native Yes
OVPsim Yes Yes Yes, but most of the time unmodified is the goal Full system simulation with optional component virtualization Software development (early, embedded), advanced debug for single and multicore software, compiler and other tool development, computer architecture research, hobbyist Depends on target, up to 500% faster than embedded target, runs over 1,000 MIPS on desktop Yes, with commercial license from Imperas[11]
PikeOS Yes Yes, but modifications required as paravirtualization is used Yes Paravirtualization Safety and security critical embedded systems. Near native Yes
RTS Hypervisor Yes Yes Compatible. OS drivers run unmodified, no special drivers required Two modes: full virtualization and paravirtualization; both modes may be used for different operating systems concurrently x86 based devices: vertical markets include robotics, industrial automation, medical, telecom, test and measurement; focus is on real-time uses Native Yes
ScaleMP vSMP Foundation Yes, up to 8,192 CPUs and 64 TB per VM Yes Yes Virtualization Server scaling (large workloads), Server consolidation, Cloud computing Near Native Yes
Safe Virtual Machine Altreonic Not applicable Runs on any OS OpenComRTOS all services Interpreter Executes binary code on any embedded processor, diagnostics, dynamic code loading, 3KB code size Depends on application Yes
Sun xVM Server Yes Yes Yes Paravirtualization and porting or hardware virtualization Servers Up to near native speed[11] Yes
SVISTA 2004 No ? ? ? Hobbyist, Developer, Business workstation ? ?
TRANGO Yes Yes[12] Yes Paravirtualization and porting or hardware virtualization Mob. phone, STB, routers, etc. Native[13] ?
User Mode Linux ??? No special guest kernel+modules required Porting used as a separate machine for a server or with X11 networking near Native [14] (Runs slow as all calls are proxied) ?
Oracle VirtualBox Yes Yes Yes Virtualization Business workstation, server consolidation, service continuity, developer, hobbyist Near native Yes (with commercial license)
Virtual Iron 3.1 Yes, up to 8 way Yes Yes Native virtualization Server consolidation, service continuity, dev/test Near Native Yes
Virtual PC 2007 No Yes Yes Virtualization, guest calls trapping where supported Hobbyist, Developer, Business workstation Near native with virtual machine additions ?
Windows Virtual PC Yes Yes Yes Hardware virtualization Developer, Business workstation, support for Compatibility with Windows XP applications Near native with virtual machine additions No
Virtual PC 7 for Mac No Yes Yes dynamic recompilation (guest calls trapping where supported) Hobbyist, Developer, Business workstation Slow ?
Virtual Server 2005 R2 No Yes Yes Virtualization (guest calls trapping where supported) Server, server farm Near native with virtual machine additions ?
CoWare Virtual Platform Yes Yes Yes ( Same compiled Software image as for the real device) Full-system virtualization (Processor Core ISA + Hardware + External connections) Early embedded software development and integration (from driver to application), Multi-core software debugging and optimization Depending on the system characteristics and the software itself, ranges from faster than real time to slow. Yes
Virtuozzo Yes No Compatible Operating system-level virtualization Server consolidation, service continuity, disaster recovery, service providers Native [15] Yes
VMware ESX Server 4.0 (vSphere) Yes, add-on, up to 8 way Yes Yes Virtualization Server consolidation, service continuity, dev/test, cloud computing Up to near native[citation needed] Yes
VMware ESX Server 3.0 Yes, add-on, up to 4 way Yes Yes Virtualization Server consolidation, service continuity, dev/test Up to near native[citation needed] Yes
VMware ESX Server 2.5.3 Yes, add-on, 2 way Yes Yes Virtualization Server consolidation, service continuity, dev/test Up to near native[citation needed] Yes
VMware Fusion Yes Yes Yes Virtualization Hobbyist, Developer, Tester, Business workstation Near native[citation needed] Yes
VMware Server Yes (2-way) Yes Yes Virtualization Server/desktop consolidation, dev/test Up to near native[citation needed] Yes
VMware Workstation 6.0 Yes (2-way) Yes Yes Paravirtualization (VMI) and virtualization Technical professional, advanced dev/test, trainer Up to near native[citation needed] Yes
VMware Player 2.0 Yes (2-way

)

Yes Yes Virtualization Technical professional, advanced dev/test, trainer, end user on prebuilt machines Up to near native[citation needed] Yes
Wind River hypervisor No Yes Yes Paravirtualization, hardware assisted virtualization Embedded, safety critical, secure Native Yes
Wind River VxWorks MILS Platform No Yes Yes Paravirtualization, hardware assisted virtualization Embedded, safety critical, secure Native Yes
Xen Yes, v4.0.0: up to 128 VCPUs per VM Yes Not required with the exception of the networking drivers where a NAT is required. A modified guest kernel or special hardware level abstraction is required for guest OSs. Paravirtualization and porting or hardware virtualization Server/desktop consolidation, dev/test Up to near native speed,[16] substantial performance loss on some workloads (network and disk intensive especially)[citation needed] Yes
XtratuM Yes No Yes, but not required. Paravirtualization Embedded, safety critical, secure Native (overhead lower than 1%) Yes
z/VM Yes, both real and virtual (guest perceives more CPUs than installed), incl. dynamic CPU provisioning and reassignment Yes Yes, but not required Virtualization (among first systems to provide hardware assists) Servers Near Native[17] Yes
z LPARs Yes, both real and virtual (guest perceives more CPUs than installed), incl. dynamic CPU provisioning and reassignment; up to 64 real cores Yes Yes, but not required Microcode and hardware hypervisor Servers Native: System z machines always run with at least one LPAR Yes
Name Guest OS SMP available Runs arbitrary OS Supported guest OS drivers Method of operation Typical use Speed relative to host OS Commercial support available
  • ^ Providing any virtual environment usually requires some overhead of some type or another. Native usually means that the virtualization technique does not do any CPU level virtualization (like Bochs), which executes code more slowly than when it is directly executed by a CPU. Some other products such as VMWare and Virtual PC use similar approaches to Bochs and QEMU, however they use a number of advanced techniques to shortcut most of the calls directly to the CPU (similar to the process that JIT compiler uses) to bring the speed to near native in most cases. However, some products such as coLinux, Xen, z/VM (in real mode) do not suffer the cost of CPU-level slowdowns as the CPU-level instructions are not proxied or executing against an emulated architecture since the guest OS or hardware is providing the environment for the applications to run under. However access to many of the other resources on the system, such as devices and memory may be proxied or emulated in order to broker those shared services out to all the guests, which may cause some slow downs as compared to running outside of virtualization.
  • ^ OS-level virtualization is described as “native” speed, however some groups have found overhead as high as 3% for some operations, but generally figures come under 1%, so long as secondary effects do not appear.
  • ^ See[12] for a paper comparing performance of paravirtualization approaches (e.g. Xen) with OS-level virtualization
  • ^ Requires patches/recompiling.
  • ^ Exceptional for lightweight, paravirtualized, single-user VM/CMS interactive shell: largest customers run several thousand users on even single prior models. For multiprogramming OSes like Linux on zSeries and z/OS that make heavy use of native supervisor state instructions, performance will vary depending on nature of workload but is near native. Hundreds into the low thousands of Linux guests are possible on a single machine for certain workloads.

Other features

Name Can boot an OS on another disk partition as guest USB support GUI Live memory allocation 3D acceleration Snapshots per VM Snapshot of running system Live migration Shared folders Shared clipboard
KVM Yes Yes Yes[13] Yes Yes (via AIGLX) Yes Yes[14] Yes[15]
User Mode Linux Yes No No No No No Yes N/A
Oracle VirtualBox-OSE (GPLv2) Partial (since version 1.4, but unsupported) [18] USB 1.1 Yes Yes OpenGL 2.0[16] DirectX 3D[17] Yes branched[18] Yes Yes Yes Yes
Oracle VirtualBox-PUEL (pre-compiled, not free) Partial (since version 1.4, but unsupported) [19] USB 2.0 Yes Yes OpenGL 2.0[16] Yes branched[18] Yes Yes Yes Yes
Oracle VM Server for SPARC Yes USB 2.0 Yes Yes No Yes No Yes Yes No
Virtual Iron 4.2 Yes
Virtual PC 2007 No No Yes No No No Yes Yes
Windows Virtual PC No partially Yes
VirtualPC 7 for Mac Yes Yes Yes Yes No No
Microsoft Virtual Server 2005 R2 No Yes No No  ? Yes No
Microsoft Hyper-V Server 2008 R2 Yes Partial support over remote desktop connections [20] Yes Yes DirectX 9.0c [21] branched Yes Yes
Virtuozzo Yes Yes Yes Yes No Yes
VMware ESX Server 3.0 atp Yes No  ? Yes Yes
VMware ESX Server 2.5.3 Yes No
VMware ESX Server 4.0 (vSphere) Yes Yes Yes Yes Yes  ? Yes Yes
VMware Fusion 2.0 Yes Yes Yes No DirectX 9 Shader model 2 No
VMware Server Yes Yes Yes Yes No 1 Yes No Yes Yes
VMware Workstation 5.5 Yes Yes Yes Yes Experimental support for DirectX 8; also supported with VMGL[19] Yes branched Yes No Yes Yes
VMware Workstation 6.0 Yes Yes Yes Yes Experimental support for DirectX 8; Also supported with VMGL[19] Yes branched Yes No Yes Yes
VMware Workstation 7.0 Yes Yes Yes Yes Support for DirectX 9.0c Shader Model 3 and OpenGL 2.13D.[20] Yes branched Yes No Yes Yes
VMware Player No Yes Yes Yes supported with VMGL[19] No No No Yes
Wind River hypervisor Yes Yes Yes Yes Yes No
Wind River VxWorks MILS Platform Yes
Xen Yes Yes[13] Yes Supported with VMGL[19]  ? Yes Yes
z/VM Yes Not applicable with add-ons Yes No No
z LPARs Yes Not applicable Yes Yes No No
Zones Yes Yes Yes Yes No
Name Can boot an OS on another disk partition as guest USB GUI Live memory allocation 3D acceleration Snapshots per VM Snapshot of running system Live migration Shared folders Shared clipboard
  • ^ VirtualBox User Manual, Chapter 9.9; requires usage of VBoxManage internalcommands createrawvmdk which says:This is a development tool and shall only be used to analyse problems. It is completely unsupported and will change in incompatible ways without warning.
  • ^ Windows Server 2008 R2 SP1 and Windows 7 SP1 have limited support for redirecting the USB protocol over RDP using RemoteFX.[21]
  • ^ Windows Server 2008 R2 SP1 adds accelerated graphics support for certain editions of Windows Server 2008 R2 SP1 and Windows 7 SP1 using RemoteFX.[22][23]

Restrictions

This table is meant to outline restrictions in the software dictated by licensing or capabilities.

Name Maximum host physical processors (sockets) Maximum host cores per processor Maximum host memory Maximum host disk volume size Maximum number of guest VM running Maximum number of logical CPU per VM guest Maximum amount of memory per VM guest, 32/64 bit Maximum number of SCSI + IDE disks per VM guest Maximum disk size per VM guest
Containers, or Zones 72 No limit 4TB No limit 8191 No limit No limit No limit No limit
VMware Player 3.1[24]  ?  ? No limit N/A  ? 8 8/32 GB  ? 2 TB
VMware Server 2.0[25] 16 16 No limit N/A 64 2 8/8 GB 4 IDE; 60 SCSI 950 GB
VMware vSphere Hypervisor (ESXi) 4.1[26] 160 160 1 TB 2 TB minus 512 bytes 320 8 255/255 GB 4 IDE; 60 SCSI 2 TB minus 512 bytes
VMware vSphere ESXi 5.0[27] 160 160 2 TB 64 TB 512 32 1 TB 4 IDE; 60 SCSI 2 TB minus 512 bytes
VirtualBox 4.0.x No limit ? No limit ? No limit ? No limit No limit[28] 16 No limit 4 IDE; no limit SATA, SCSI, SAS 2 TB
Hyper-V 2008 R2[29] 64 64 1 TB No limit 384 4 64 GB 4 IDE; 256 SCSI 2 TB

Note: No limit means no enforced limit. For example, a VM with 1 TB of memory cannot fit in a host with only 8 GB memory and no memory swap disk, so it will have a limit of 8 GB physically.

See also

References

  1. ^ The list of platforms supported by Bochs

    . Retrieved on 2011-07-27.

  2. ^ Instructions on compiling Bochs

    . Retrieved on 2011-07-27.

  3. ^ a b Cooperative Linux FAQ

    . Retrieved on 2009-01-27.

  4. ^ a b QEMU Official OS Support List
  5. ^ Oracle VM VirtualBox® User Manual, Chapter 3: Configuring virtual machines | Mac OS X Server guests
  6. ^ Oracle and Virtual Iron
  7. ^ Can run a guest OS without modifying it, and hence is generally able to run any OS that could run on a physical machine the VM simulates
  8. ^ VMware Player FAQ

    . Retrieved on 2011-07-27.

  9. ^ VMware Player 3.1 EULA

    . Retrieved on 2011-07-27.

  10. ^ http://www.linux-kvm.com/content/running-windows-smp-guests
  11. ^ Imperas
  12. ^ http://www.cs.princeton.edu/~mef/research/vserver/paper.pdf
  13. ^ a b “Virtual Machine Manager”

    . Retrieved 2010-02-20.

  14. ^ “Sheepdog is a distributed storage system for KVM”

    . Retrieved 2010-05-20.

  15. ^ “KVM Migration”

    . Retrieved 2010-05-20.

  16. ^ a b “VirtualBox Changelog”

    . Retrieved 2009-06-30.

  17. ^ “VirtualBox Changelog”

    . Retrieved 2009-06-30.

  18. ^ a b “VirtualBox Changelog 3.1”

    . Retrieved 2010-10-01.

  19. ^ a b c d

    VMGL (formerly Xen-GL)”.

  20. ^ http://www.vmware.com/products/workstation/new.html
  21. ^ http://technet.microsoft.com/en-us/library/ff817581(WS.10).aspx
  22. ^ http://technet.microsoft.com/en-us/library/ff817578(WS.10).aspx
  23. ^ http://technet.microsoft.com/en-us/library/ff817602(WS.10).aspx
  24. ^ [1]

    Getting Started Guide VMware Player 3.1

  25. ^ [2]

    VMware Server User’s Guide VMware Server 2.0

  26. ^ [3]

    Configuration Maximums VMware® vSphere 4.1

  27. ^ [4]

    Configuration Maximums VMware® vSphere 5.0

  28. ^ [5]

    Oracle VM VirtualBox User Manual. Accessed 2011-04-07

  29. ^ [6]

    Requirements and Limits for Virtual Machines and Hyper-V in Windows Server 2008 R2

External links

 

From Wikipedia, the free encyclopedia

http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines

 

Theo dấu cùng ứng dụng “chống trộm” Prey


Với gói mã nguồn mở Prey, bạn có thể để mắt được tới thiết bị bị đánh mất của mình bất cứ nơi nào, và theo dõi cách tên trộm sử dụng thiết bị của bạn, nắm trong tay thông tin để báo các nhà chức trách.

Gói nguồn mở Prey giúp theo bạn theo dấu các thiết bị thất lạc hoặc bị đánh cắp như laptop, PC, smartphone Android. Prey hoạt động trên Windows (bản mới ra mắt), Mac OS X, Linux. Prey cũng chạy được trên các thiết bị Android, bản cho iPhone đang được phát triển. Bạn có thể dùng Prey để theo dấu 3 thiết bị cùng lúc.

Prey được theo dõi thông qua trang web, bao quát mọi thiết bị. Khi một trong số chúng biến mất, bạn có thể đánh dấu chúng trong bảng điều khiển từ bất kì máy tính nào, sau đó, Prey sẽ “để mắt” đến thiết bị đó. Bất cứ khi nào thiết bị trực tuyến, Prey sẽ gửi cho bạn nhiều thông tin về thiết bị, và quan trọng hơn là địa điểm của nó.

Dưới đây là hướng dẫn cài đặt và cấu hình Prey:

1. Tải phần mềm

Phần mềm chống trộm Prey hiện có các bản cho Linux, Windows, Mac và Android. Bước đầu tiên là tải về từ website của Prey ( link ), hoặc từ Android Market và chạy cài đặt (yêu cầu quyền quản trị).

2. Đăng kí

Khi cài đặt Prey lần đầu tiên, bạn sẽ được yêu cầu cài đặt tài khoản người dùng mới. Nếu có ý định cài đặt Prey cho các thiết bị về sau, bạn chỉ cần lựa chọn đăng kí mới thiết bị với tài khoản đã mở.

Bạn nên đặt mật khẩu truy cập đủ mạnh, đề phòng tên trộm hiểu ra điều gì đang xảy ra trên thiết bị đánh cắp, và gỡ bỏ chương trình này khỏi hệ thống. Prey chạy trên nền tảng mà tên trộm không hề biết tới, và “đánh lạc hướng” chúng bằng tài khoản Windows không có quyền quản trị cũng như mật khẩu. Ngay sau khi đăng nhập, chúng đã nằm gọn trong tay bạn.

3. Khởi động kép

Nếu đang chạy Prey trong nhiều hệ điều hành trên cùng một máy, đầu tiên đăng kí như người dùng đã tồn tại. Tiếp theo, sao chép dãy số thiết bị tạo ra từ lần cài đặt trước đó, và thay thế ô “device_key” trong tệp tin cấu hình ở hệ điều hành thứ 2.

4. Cấu hình hành vi

Với thiết bị đã đăng kí, bạn có thể đăng nhập bảng điều khiển trên nền web. Tại đây, cấu hình thiết bị thực hiện các hành vi đặc trưng và thu thập thông tin nếu thiết bị thất lạc. Làm theo hướng dẫn tại mỗi tùy chọn khác nhau.

Bạn nên lựa chọn “Manage Prey Settings”. Tùy chọn này kích hoạt tài khoản khách (không có mật khẩu) trong Windows để đánh lừa tên trộm sử dụng. Bạn cũng nên kích hoạt “Wi-Fi auto connection” (tự động kết nối wi-fi), tùy chọn này sẽ bí mật kết nối điểm wi-fi gần nhất và bắt đầu gửi báo cáo cho bạn.

Ngoài ra, còn có mục phần cứng Hardware, đưa ra thông tin chi tiết về phần cứng trên thiết bị, bao gồm số seri và bo mạch chủ. Bạn cũng có thể yêu cầu Prey thông báo bằng email khi “đánh hơi” được bất cứ thay đổi nào liên quan tới phần cứng. Điều này vô cùng hữu dụng với máy tính bàn ở nơi công cộng như quán café hay thư viện. Cơ hội người nào đó đánh cắp con chip nhớ từ máy tính bàn không tốn quá nhiều công sức và ít bị phát hiện. Các tùy chọn ở mục “Main” chia thành 2 nhóm: “Action to perform” liệt kê thao tác Prey thực hiện trên thiết bị của bạn, tốt nhất nên tắt chúng cho tới khi thiết bi thực sự bị mất.

Có vài tùy chọn để ngăn cản tên trộm: tùy chọn báo động, phát ra âm thanh lớn từ thiết bị bị mất giúp bạn tìm ra nếu nó vẫn ở gần đó; tùy chọn Tin nhắn báo động, thay đổi hình nền thiết bị và hiện thông báo cảnh báo tên trộm thiết bị đang bị theo dõi bởi Prey.

5. Kích hoạt Prey

Khi thiết bị mất, bạn sẽ sử dụng bảng điều khiển, đánh dấu thiết bị mất. Prey sau đó thu thập thông tin dựa trên tệp tin cấu hình, và gửi báo cáo định kì (hoặc liên tiếp nếu có tài khoản Prey Pro).

Bạn có thể dùng tính năng Lock (khóa), ngăn chặn sử dụng máy tính cho tới khi có mật khẩu chính xác. Các thao tác kích hoạt, đặt mật khẩu và khóa thiết bị với mật khẩu được thực hiện từ xa sau khi bị đánh cắp.

Ngoài ra, thay vì khóa máy tính, có thể cài đặt Prey kín đáo thu thập thông tin về tên trộm. Ngay khi kết nối mạng, Prey sẽ từ các điểm wi-fi lân cận để suy vị trí thiết bị và đánh dấu trên bản đồ Google. Đồng thời, Prey thu thập thông tin mạng liên quan như địa chỉ IP mật và công cộng của mạng lưới thiết bị đẫ kết nối.

Prey cũng có thể lập bản đồ đường đi từ thiết bị bị mất thông qua bộ định tuyến của tên trộm. Nếu bạn quan tâm, hãy yêu cầu Prey thu thập thông tin về máy tính – danh sách các ứng dụng đang chạy, các tệp tin đã bị sửa đổi trong thư mục cụ thể, và ảnh chụp màn hình. Theo thời gian, bạn đã xây dựng kho lưu trữ trang web kẻ trộm hay truy cập, ứng dụng chạy thường xuyên, và tệp tin chúng tạo trên máy của bạn.

Sớm hay muộn, bạn sẽ có được ảnh chụp màn hình tài khoản đăng nhập webmail hay trang web khác của tên trộm. Dù không có được mật khẩu, bạn cũng nhìn thấy rõ ràng tên người dùng, và liên lạc với chúng.

Nếu thiết bị có webcam, Prey sẽ bí mật chụp hình bất cứ thứ gì webcam thấy. Và vì thế, bạn không mất nhiều thời gian để tóm gọn kẻ trộm.

6. Prey giúp tóm gọn tên trộm

Khi báo thiết bị mất trộm, bạn cần cung cấp nhiều tính năng xác định danh tính, bao gồm cả số seri và khóa định danh UUID. Nhờ vào Prey, bạn cũng có thể thu thập các ảnh chụp màn hình và bản đồ hành trình của tên trộm, tăng cơ hội tóm gọn tên trộm và đòi lại tài sản của mình.

 

Du Lam-ICTnews

Theo TechRadar

Top 100 Network Security Tools


Reference: http://sectools.org/

After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don’t know where to start”.

Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.

Each tool is described by one ore more attributes:

new Did not appear on the 2003 list
/ Popularity ranking rose / fell the given number since the 2003 survey
  TITLE= Generally costs money. A free limited/demo/trial version may be available.
Linux Works natively on Linux
*BSD Works natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
OS X Works natively on Apple Mac OS X
Windows Works natively on Microsoft Windows
Command-line interface Features a command-line interface
GUI Interface Offers a GUI (point and click) interface
Source code Source code available for inspection.

Please send updates and suggestions (or better tool logos) to Fyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome to use our link banners. Here is the list, starting with the most popular:

#1
  TITLE=
Linux
*BSD
OS X
Windows
GUI Interface
Nessus : Premier UNIX vulnerability assessment tool
Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free “registered feed” version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.See all vulnerability scanners


#2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Wireshark : Sniffing the glue that holds the Internet together
Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).See all packet sniffers


#3
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Snort : Everyone’s favorite open source IDS
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort.See all intrusion detection systems


#4
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Netcat : The network Swiss army knife
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn’t been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations – often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson’s Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD’s ncCryptcatNetcat6PNetcatSBD, and so-calledGNU Netcat.See all Netcats


#5
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Metasploit Framework : Hack the Planet
Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impactand Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.See all vulnerability exploitation tools


#6
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Hping2 : A network probing utility like ping on steroids
This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols.See all packet crafting tools


#7
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used forwardriving. Oh, and also warwalkingwarflying, and warskating, …See all wireless tools, and packet sniffers


#8
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Tcpdump : The classic sniffer for network monitoring and data acquisition
Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn’t receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools.See all packet sniffers


#9
23
Windows
GUI Interface
Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.See all password crackers, and packet sniffers


#10
1
Linux
*BSD
OS X
Windows
Command-line interface
Source code
John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here,here, or here.See all password crackers


#11
2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Ettercap : In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.See all packet sniffers


#12
4
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Nikto : A more comprehensive web scanner
Nikto is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It usesWhisker/libwhisker for much of its underlying functionality. It is a great tool, but the value is limited by its infrequent updates. The newest and most critical vulnerabilities are often not detected.See all web vulnerability scanners


#13
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ping/telnet/dig/traceroute/whois/netstat : The basics
While there are many whiz-bang high-tech tools out there to assist in security auditing, don’t forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although for more advanced usage you may be better off with Hping2 and Netcat.


#14
2
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OpenSSH / PuTTY / SSH : A secure way to access remote computers
SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Dozens of other free and proprietary clients exist. You can explore them here or here.


#15
35
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
THC Hydra : A Fast network authentication cracker which supports many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.See all password crackers


#16
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Paros proxy : A web application vulnerability assessment proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.See all web vulnerability scanners


#17
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Dsniff : A suite of powerful network auditing and penetration-testing tools
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.See all packet sniffers


#18
7
Windows
GUI Interface
NetStumbler : Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless access points (“wardriving”). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC.See all wireless tools, and packet sniffers


#19
18
Linux
*BSD
OS X
Windows
Command-line interface
Source code
THC Amap : An application fingerprinting scanner
Amap is a great tool for determining what application is listening on a given port. Their database isn’t as large as what Nmap uses for its version detection feature, but it is definitely worth trying for a 2nd opinion or if Nmap fails to detect a service. Amap even knows how to parse Nmap output files. This is yet another valuable tool from the great guys at THC.See all application-specific scanners


#20
12
  TITLE=
Windows
GUI Interface
GFI LANguard : A commercial network security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. It also tries to collect Windows machine’s service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches. A free trial version is available, though it only works for up to 30 days.See all vulnerability scanners


#21
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).See all wireless tools, and password crackers


#22
4
Windows
GUI Interface
Superscan : A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.See all port scanners


#23
2
Linux
Command-line interface
Source code
Netfilter : The current Linux kernel packet filter/firewall
Netfilter is a powerful packet filter implemented in the standard Linux kernel. The userspace iptables tool is used for configuration. It now supports packet filtering (stateless or stateful), all kinds of network address and port translation (NAT/NAPT), and multiple API layers for 3rd party extensions. It includes many different modules for handling unruly protocols such as FTP. For other UNIX platforms, see Openbsd PF (OpenBSD specific), or IP Filter. Many personal firewalls are available for Windows (Tiny,Zone AlarmNortonKerio, …), though none made this list. Microsoft included a very basic firewall in Windows XP SP2, and will nag you incessantly until you install it.See all firewalls


#24
new
Windows
Command-line interface
GUI Interface
Sysinternals : An extensive collection of powerful windows utilities
Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking. Some are free of cost and/or include source code, while others are proprietary. Survey respondents were most enamored with:

  • ProcessExplorer for keeping an eye on the files and directories open by any process (like LSoF on UNIX).
  • PsTools for managing (executing, suspending, killing, detailing) local and remote processes.
  • Autoruns for discovering what executables are set to run during system boot up or login.
  • RootkitRevealer for detecting registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.
  • TCPView, for viewing TCP and UDP traffic endpoints used by each process (like Netstat on UNIX).

Update: Microsoft acquired Sysinternals in July 2006, promising that “Customers will be able to continue building on Sysinternals’ advanced utilities, technical information and source code”. Less than four months later, Microsoft removed most of that source code. Future product direction is uncertain.See all rootkit detectors


#25
5
  TITLE=
Windows
GUI Interface
Retina : Commercial vulnerability assessment scanner by eEye
Like Nessus, Retina’s function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for theirsecurity research.See all vulnerability scanners

#26
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Perl / Python / Ruby : Portable, general-purpose scripting languages
While many canned security tools are available on this site for handling common tasks, scripting languages allow you to write your own (or modify existing ones) when you need something more custom. Quick, portable scripts can test, exploit, or even fix systems. Archives like CPAN are filled with modules such as Net::RawIP and protocol implementations to make your tasks even easier.


#27
8
  TITLE=
Windows
GUI Interface
L0phtcrack : Windows password auditing and recovery application
L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009. For free alternatives, consider OphcrackCain and Abel, or John the Ripper.See all password crackers


#28
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Scapy : Interactive packet manipulation tool
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make.See all packet crafting tools


#29
16
Windows
GUI Interface
Sam Spade : Freeware Windows network query tool
Sam Spade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more. Non-Windows users can enjoy online versions of many of their tools.


#30
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
GnuPG / PGP : Secure your files and communication w/advanced encryption
PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses.See all encryption tools


#31
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.See all wireless tools, and password crackers


#32
new
Linux
Command-line interface
GUI Interface
Source code
BackTrack : An Innovative Penetration Testing live Linux distribution
This excellent bootable live-CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernels, etc.See all security-oriented operating systems


#33
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
P0f : A versatile passive OS fingerprinting tool
P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. In the hands of advanced users, P0f can detect firewall presence, NAT use, existence of load balancers, and more!See all OS detection tools


#34
new
Linux
*BSD
OS X
Windows
GUI Interface
Google : Everyone’s Favorite Search Engine
While it is far more than a security tool, Google’s massive database is a good mind for security researchers and penetration testers. You can use it to dig up information about a target company by using directives such as “site:target-domain.com” and find employee names, sensitive information that they wrongly thought was hidden, vulnerable software installations, and more. Similarly, when a bug is found in yet another popular webapp, Google can often provide a list of vulnerable servers worldwide within seconds. The master of Google hacking is Johny Long. Check out his Google Hacking Database or his excellent book: Google Hacking for Penetration Testers.


#35
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
WebScarab : A framework for analyzing applications that communicate using the HTTP and HTTPS protocols
In its simplest form, WebScarab records the conversations (requests and responses) that it observes, and allows the operator to review them in various ways. WebScarab is designed to be a tool for anyone who needs to expose the workings of an HTTP(S) based application, whether to allow the developer to debug otherwise difficult problems, or to allow a security specialist to identify vulnerabilities in the way that the application has been designed or implemented.See all web vulnerability scanners


#36
3
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Ntop : A network traffic usage monitor
Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user’s terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.See all packet sniffers, and traffic monitoring tools


#37
22
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Tripwire : The grand-daddy of file integrity checkers
A file and directory integrity checker. Tripwire is a tool that aids system administrators and users in monitoring a designated set of files for any changes. Used with system files on a regular (e.g., daily) basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner. Traditionally an open souce tool, Tripwire Corp is now focused on their commercial enterprise configuration control offerings. An open source Linux version can still be found at SourceForge. UNIX users may also want to consider AIDE, which has been designed to be a free Tripwire replacement. Or you may wish to investigate RadmindRKHunter, or chkrootkit. Windows users may like RootkitRevealer from Sysinternals.See all rootkit detectors


#38
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ngrep : Convenient packet matching & display
ngrep strives to provide most of GNU grep’s common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.See all packet sniffers, and traffic monitoring tools


#39
10
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Nbtscan : Gathers NetBIOS info from Windows networks
NBTscan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address. The original nbtscan was written by Alla Bezroutchko. Steve Friedl has written an alternate implementation.See all application-specific scanners


#40
new
  TITLE=
Windows
GUI Interface
WebInspect : A Powerful Web Application Scanner
SPI Dynamics’ WebInspect application security assessment tool helps identify known and unknown vulnerabilities within the Web application layer. WebInspect can also help check that a Web server is configured properly, and attempts common web attacks such as parameter injection, cross-site scripting, directory traversal, and more.See all web vulnerability scanners


#41
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OpenSSL : The premier SSL/TLS encryption library
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.See all encryption tools


#42
9
Linux
*BSD
OS X
Command-line interface
Source code
Xprobe2 : Active OS fingerprinting tool
XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as some of their own ideas. Xprobe has always emphasized the ICMP protocol in its fingerprinting approach.See all OS detection tools


#43
21
Linux
*BSD
OS X
GUI Interface
Source code
EtherApe : EtherApe is a graphical network monitor for Unix modeled after etherman
Featuring link layer, IP and TCP modes, EtherApe displays network activity graphically with a color coded protocols display. Hosts and links change in size with traffic. It supports Ethernet, FDDI, Token Ring, ISDN, PPP and SLIP devices. It can filter traffic to be shown, and can read traffic from a file as well as live from the network.See all packet sniffers, and traffic monitoring tools


#44
new
  TITLE=
Windows
GUI Interface
Core Impact : An automated, comprehensive penetration testing product
Core Impact isn’t cheap (be prepared to spend tens of thousands of dollars), but it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. If you can’t afford Impact, take a look at the cheaper Canvas or the excellent and free Metasploit Framework. Your best bet is to use all three.See all vulnerability scanners, and vulnerability exploitation tools


#45
new
  TITLE=
Linux
Windows
GUI Interface
Source code
IDA Pro : A Windows or Linux disassembler and debugger
Disassembly is a big part of security research. It will help you dissect that Microsoft patch to discover the silently fixed bugs they don’t tell you about, or more closely examine a server binary to determine why your exploit isn’t working. Many disassemblers are available, but IDA Pro has become the de-facto standard for the analysis of hostile code and vulnerability research. This interactive, programmable, extensible, multi-processor disassembler now supports Linux (console mode) as well as Windows.See all disassemblers


#46
12
  TITLE=
Windows
GUI Interface
SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.See all traffic monitoring tools, and password crackers


#47
6
Windows
Command-line interface
Source code
Pwdump : A window password recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.See all password crackers


#48
7
Linux
*BSD
OS X
Command-line interface
Source code
LSoF : LiSt Open Files
This Unix-specific diagnostic and forensics tool lists information about any files that are open by processes currently running on the system. It can also list communications sockets open by each process. For a Windows equivalent, check out Process Explorer from Sysinternals.


#49
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called “rainbow tables”. It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.See all password crackers


#50
19
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Firewalk : Advanced traceroute
Firewalk employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. This classic tool was rewritten from scratch in October 2002. Note that much or all of this functionality can also be performed by the Hping2 –traceroute option.See all traceroute tools

#51
new
Linux
OS X
Windows
Command-line interface
GUI Interface
Source code
Angry IP Scanner : IP address and port scanner
Angry IP Scanner is a small open source Java application which performs host discovery (“ping scan”) and port scans. The old 2.x release was Windows-only, but the new 3.X series runs on Linux, Mac, or Windows as long as Java is installed. Version 3.X omits the vampire zebra logo. As with all connect()-based scanners, performance on Windows XP SP2 and Vista can be poor due to limitations added to tcpip.sys. The Angry FAQ provides details and workarounds. A short review was posted to nmap-dev.See all port scanners


#52
new
Linux
*BSD
Command-line interface
Source code
RKHunter : An Unix Rootkit Detector
RKHunter is scanning tool that checks for signs of various pieces of nasty software on your system like rootkits, backdoors and local exploits. It runs many tests, including MD5 hash comparisons, default filenames used by rootkits, wrong file permissions for binaries, and suspicious strings in LKM and KLD modules.See all rootkit detectors


#53
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ike-scan : VPN detector/scanner
Ike-scan exploits transport characteristics in the Internet Key Exchange (IKE) service, the mechanism used by VPNs to establish a connection between a server and a remote client. It scans IP addresses for VPN servers by sending a specially crafted IKE packet to each host within a network. Most hosts running IKE will respond, identifying their presence. The tool then remains silent and monitors retransmission packets. These retransmission responses are recorded, displayed and matched against a known set of VPN product fingerprints. Ike-scan can VPNs from manufacturers including Checkpoint, Cisco, Microsoft, Nortel, and Watchguard.See all application-specific scanners


#54
21
Linux
*BSD
OS X
Command-line interface
Source code
Arpwatch : Keeps track of ethernet/IP address pairings and can detect certain monkey business
Arpwatch is the classic ARP man-in-the-middle attack detector from LBNL’s Network Research Group. It syslogs activity and reports certain changes via email. Arpwatch uses LibPcap to listen for ARP packets on a local ethernet interface.


#55
new
OS X
GUI Interface
Source code
KisMAC : A A GUI passive wireless stumbler for Mac OS X
This popular stumbler for Mac OS X offers many of the features of its namesake Kismet, though the codebase is entirely different. Unlike console-based Kismet, KisMAC offers a pretty GUI and was around before Kismet was ported to OS X. It also offers mapping, Pcap-format import and logging, and even some decryption and deauthentication attacks.See all wireless tools, and packet sniffers


#56
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OSSEC HIDS : An Open Source Host-based Intrusion Detection System
OSSEC HIDS performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. In addition to its IDS functionality, it is commonly used as a SEM/SIM solution. Because of its powerful log analysis engine, ISPs, universities and data centers are running OSSEC HIDS to monitor and analyze their firewalls, IDSs, web servers and authentication logs.See all intrusion detection systems


#57
4
*BSD
Command-line interface
Source code
Openbsd PF : The OpenBSD Packet Filter
Like Netfilter and IP Filter on other platforms, OpenBSD users love PF, their firewall tool. It handles network address translation, normalizing TCP/IP traffic, providing bandwidth control, and packet prioritization. It also offers some eccentric features, such as passive OS detection. Coming from the same guys who created OpenBSD, you can trust that it has been well audited and coded to avoid the sort of security holes we have seen in other  packet  filters.See all firewalls


#58
18
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Nemesis : Packet injection simplified
The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux (and now Windows!). The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts. If you enjoy Nemesis, you might also want to look at Hping2 as they complement each other well.See all packet crafting tools


#59
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Tor : An anonymous Internet communication system
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. For a free cross-platform GUI, users recommend VidaliaSee all encryption tools


#60
new
Linux
Command-line interface
GUI Interface
Source code
Knoppix : A general-purpose bootable live system on CD or DVD
Knoppix consists of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, rescue system, or as many nmap survey takers attest, a portable security tool. For a security-specific Linux distribution see BackTrack.See all security-oriented operating systems


#61
47
  TITLE=
Windows
GUI Interface
ISS Internet Scanner : Application-level vulnerability assessment
Internet Scanner started off in ’92 as a tiny open source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products.See all vulnerability scanners


#62
39
Windows
Command-line interface
Fport : Foundstone’s enhanced netstat
Fport reports all open TCP/IP and UDP ports on the machine you run it on and shows what application opened each port. So it can be used to quickly identify unknown open ports and their associated applications. It only runs on Windows, but many UNIX systems now provided this information via netstat (try ‘netstat -pan’ on Linux). Here is a PDF-Format SANS article on using Fport and analyzing the results.


#63
new
Linux
*BSD
OS X
Command-line interface
Source code
chkrootkit : Locally checks for signs of a rootkit
chkrootkit is a flexible, portable tool that can check for many signs of rootkit intrusion on Unix-based systems. Its features include detecting binary modification, utmp/wtmp/lastlog modifications, promiscuous interfaces, and malicious kernel modules.See all rootkit detectors


#64
15
Linux
*BSD
OS X
Windows
Command-line interface
Source code
SPIKE Proxy : HTTP Hacking
Spike Proxy is an open source HTTP proxy for finding security flaws in web sites. It is part of the Spike Application Testing Suite and supports automated SQL injection detection, web site crawling, login form brute forcing, overflow detection, and directory traversal detection.See all application-specific scanners


#65
14
*BSD
Command-line interface
GUI Interface
Source code
OpenBSD : The Proactively Secure Operating System
OpenBSD is one of the only operating systems to treat security as their very highest priority. Even higher than usability in some cases. But their enviable security record speaks for itself. They also focus on stability and fight to obtain documentation for the hardware they wish to support. Perhaps their greatest achievement was creating OpenSSH. OpenBSD users also love [pf], their firewall tool.See all security-oriented operating systems


#66
new
Linux
*BSD
OS X
Command-line interface
GUI Interface
Source code
Yersinia : A multi-protocol low-level attack tool
Yersinia is a low-level protocol attack tool useful for penetration testing. It is capable of many diverse attacks over multiple protocols, such as becoming the root role in the Spanning Tree (Spanning Tree Protocol), creating virtual CDP (Cisco Discovery Protocol) neighbors, becoming the active router in a HSRP (Hot Standby Router Protocol) scenario, faking DHCP replies, and other low-level attacks.See all packet crafting tools


#67
new
Linux
*BSD
Command-line interface
GUI Interface
Source code
Nagios : An open source host, service and network monitoring program
Nagios is a system and network monitoring application. It watches hosts and services that you specify, alerting you when things go bad and when they get better. Some of its many features include monitoring of network services (smtp, pop3, http, nntp, ping, etc.), monitoring of host resources (processor load, disk usage, etc.), and contact notifications when service or host problems occur and get resolved (via email, pager, or user-defined method).See all traffic monitoring tools


#68
20
Linux
*BSD
Command-line interface
Source code
Fragroute/Fragrouter : A network intrusion detection evasion toolkit
Fragrouter is a one-way fragmenting router – IP packets get sent from the attacker to the Fragrouter, which transforms them into a fragmented data stream to forward to the victim. Many network IDS are unable or simply don’t bother to reconstruct a coherent view of the network data (via IP fragmentation and TCP stream reassembly), as discussed in this classic paper. Fragrouter helps an attacker launch IP-based attacks while avoiding detection. It is part of the NIDSbench suite of tools by Dug Song. Fragroute is a similar tool which is also by Dug Song.See all intrusion detection systems


#69
new
Windows
GUI Interface
X-scan : A general scanner for scanning network vulnerabilities
A multi-threaded, plug-in-supported vulnerability scanner. X-Scan includes many features, including full NASL support, detecting service types, remote OS type/version detection, weak user/password pairs, and more. You may be able to find newer versions available here if you can deal with most of the page being written in Chinese.See all vulnerability scanners


#70
60
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Whisker/libwhisker : Rain.Forest.Puppy’s CGI vulnerability scanner and library
Libwhisker is a Perl module geared geared towards HTTP testing. It provides functions for testing HTTP servers for many known security holes, particularly the presence of dangerous CGIs. Whisker is a scanner that used libwhisker but is now deprecated in favor of Nikto which also uses libwhisker.See all web vulnerability scanners


#71
new
Linux
*BSD
OS X
Command-line interface
Source code
Socat : A relay for bidirectional data transfer
A utility similar to the venerable Netcat that works over a number of protocols and through a files, pipes, devices (terminal or modem, etc.), sockets (Unix, IP4, IP6 – raw, UDP, TCP), a client for SOCKS4, proxy CONNECT, or SSL, etc. It provides forking, logging, and dumping, different modes for interprocess communication, and many more options. It can be used, for example, as a TCP relay (one-shot or daemon), as a daemon-based socksifier, as a shell interface to Unix sockets, as an IP6 relay, for redirecting TCP-oriented programs to a serial line, or to establish a relatively secure environment (su and chroot) for running client or server shell scripts with network connections.See all Netcats


#72
46
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Sara : Security Auditor’s Research Assistant
SARA is a vulnerability assessment tool derived from the infamous (at least in 1995) SATAN scanner. They ceased development after releasing version 7.9.1 in June 2009.See all vulnerability scanners


#73
new
  TITLE=
GUI Interface
QualysGuard : A web-based vulnerability scanner
Delivered as a service over the Web, QualysGuard eliminates the burden of deploying, maintaining, and updating vulnerability management software or implementing ad-hoc security applications. Clients securely access QualysGuard through an easy-to-use Web interface. QualysGuard features 5,000+ unique vulnerability checks, an Inference-based scanning engine, and automated daily updates to the QualysGuard vulnerability KnowledgeBase.See all vulnerability scanners


#74
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
ClamAV : A GPL anti-virus toolkit for UNIX
ClamAV is a powerful AntiVirus scanner focused towards integration with mail servers for attachment scanning. It provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via the Internet. Clam AntiVirus is based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. Most importantly, the virus database is kept up to date.


#75
8
Linux
*BSD
OS X
GUI Interface
Source code
cheops / cheops-ng : Gives a simple interface to many network utilities, maps local or remote networks and identifies OS of machines
Cheops provides the functionality of many network utilities through a comfortable, powerful GUI. It has host/network discovery functionality as well as OS detection of hosts. Cheops-ng has the ability to probe hosts to see what services they are running. On some services, cheops-ng is actually able to see what program is running for a service and the version number of that program. The original Cheops program is currently not being developed or maintained so users are advised to use cheops-ng.

#76
new
Linux
OS X
Windows
GUI Interface
Burpsuite : An integrated platform for attacking web applications
Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyze, attack and exploit web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.See all web vulnerability scanners


#77
32
Windows
GUI Interface
Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.See all password crackers

#78
new
Linux
*BSD
Command-line interface
Source code
Unicornscan : Not your mother’s port scanner
Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses. Like Scanrand, it isn’t for the faint of heart.See all port scanners

#79
33
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Stunnel : A general-purpose SSL cryptographic wrapper
The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs’ code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries.See all encryption tools

#80
37
Linux
*BSD
Command-line interface
Source code
Honeyd : Your own personal honeynet
Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. It is also possible to proxy services to another machine rather than simulating them. It has many library dependencies, which can make compiling/installing Honeyd difficult.

#81
25
Linux
*BSD
OS X
Command-line interface
Source code
Fping : A parallel ping scanning program
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

#82
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
BASE : The Basic Analysis and Security Engine
BASE is a PHP-based analysis engine to search and process a database of security events generated by various IDSs, firewalls, and network monitoring tools. Its features include a query-builder and search interface for finding alerts matching different patterns, a packet viewer/decoder, and charts and statistics based on time, sensor, signature, protocol, IP address, etc.See all intrusion detection systems

#83
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Argus : A generic IP network transaction auditing tool
Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. Argus provides a common data format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis. The record format that Argus uses is flexible and extensible, supporting generic flow identifiers and metrics, as well as application/protocol specific information.See all traffic monitoring tools

#84
new
Windows
GUI Interface
Source code
Wikto : Web Server Assessment Tool
Wikto is a tool that checks for flaws in webservers. It provides much the same functionality as Nikto but adds various interesting pieces of functionality, such as a Back-End miner and close Googleintegration. Wikto is written for the MS .NET environment and registration is required to download the binary and/or source code.See all web vulnerability scanners

#85
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
Sguil : The Analyst Console for Network Security Monitoring
Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides realtime events from Snort/barnyard. It also includes other components which facilitate the practice of Network Security Monitoring and event driven analysis of IDS alerts.See all intrusion detection systems

#86
39
Linux
*BSD
Command-line interface
Source code
Scanrand : An unusually fast stateless network service and topology discovery system
Scanrand is a stateless host-discovery and port-scanner similar in design to Unicornscan. It trades off reliability for amazingly fast speeds and uses cryptographic techniques to prevent attackers from manipulating scan results. This utility is a part of a software package called Paketto Keiretsu, which was written by Dan Kaminsky. Scanrand and Paketto are no longer actively maintained, but the latest released version can still be found at DoxPara.Com.See all port scanners

#87
new
Linux
*BSD
Command-line interface
Source code
IP Filter : Portable UNIX Packet Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services. It can either be used as a loadable kernel module or incorporated into your UNIX kernel; use as a loadable kernel module where possible is highly recommended. Scripts are provided to install and patch system files, as required. IP Filter is distributed with FreeBSD, NetBSD, and Solaris. OpenBSD users should see Openbsd PF and Linux users Netfilter.See all firewalls

#88
new
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Canvas : A Comprehensive Exploitation Framework
Canvas is a commercial vulnerability exploitation tool from Dave Aitel’s ImmunitySec. It includes more than 150 exploits and is less expensive than Core Impact, though it still costs thousands of dollars. You can also buy the optional VisualSploit Plugin for drag and drop GUI exploit creation. Zero-day exploits can occasionally be found within Canvas.See all vulnerability exploitation tools

#89
new
  TITLE=
Linux
Windows
GUI Interface
VMware : Multi-platform Virtualization Software
VMware virtualization software lets you run one operating system within another. This is quite useful for security researchers who commonly need to test code, exploits, etc on multiple platforms. It only runs on Windows and Linux as the host OS, but pretty much any x86 OS will run inside the virtualized environment. It is also useful for setting up sandboxes. You can browse from within a VMware window so the even if you are infected with malware, it cannot reach your host OS. And recovering the guest OS is as simple as loading a “snapshot” from prior to the infection. VMware player(executes, but can’t create OS images) and VMWare Server (partitions a physical server machine into multiple virtual machines) were recently released for free. Another interesting virtualization system (Linux focused) is Xen.

#90
31
Linux
*BSD
OS X
Command-line interface
Source code
Tcptraceroute : A traceroute implementation using TCP packets
The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that the conventional traceroute(8) sends out (ICMP echo or UDP) end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.See all traceroute tools

#91
67
  TITLE=
Linux
*BSD
OS X
GUI Interface
Source code
SAINT : Security Administrator’s Integrated Network Tool
SAINT is another commercial vulnerability assessment tool (like NessusISS Internet Scanner, or Retina). It runs on UNIX and used to be free and open source, but is now a commercial product.See all vulnerability scanners

#92
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
OpenVPN : A full-featured SSL VPN solution
OpenVPN is an open-source SSL VPN package which can accommodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN uses OpenSSL as its primary cryptographic library.See all encryption tools

#93
new
Windows
GUI Interface
OllyDbg : An assembly level Windows debugger
OllyDbg is a 32-bit assembler level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg features an intuitive user interface, advanced code analysis capable of recognizing procedures, loops, API calls, switches, tables, constants and strings, an ability to attach to a running program, and good multi-thread support. OllyDbg is free to download and use but no source code is provided.See all disassemblers

#94
new
Linux
Command-line interface
GUI Interface
Source code
Helix : A Linux Distribution with Computer Forensics in Mind
Helix is a customized distribution of the Knoppix Live Linux CD. Helix is more than just a bootable live CD. You can still boot into a customized Linux environment that includes customized Linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics. Helix has been designed very carefully to NOT touch the host computer in any way and it is forensically sound. Helix will not auto mount swap space, or auto mount any attached devices. Helix also has a special Windows autorun side for Incident Response and Forensics.See all security-oriented operating systems

#95
38
Linux
OS X
Command-line interface
Source code
Bastille : Security hardening script for Linux, Mac OS X, and HP-UX
The Bastille Hardening program “locks down” an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system’s current state of hardening, granularly reporting on each of the security settings with which it works. Bastille currently supports the Red Hat (Fedora Core, Enterprise, and Numbered/Classic), SUSE, Debian, Gentoo, and Mandrake distributions, along with HP-UX and Mac OS X. Bastille’s focuses on letting the system’s user/administrator choose exactly how to harden the operating system. In its default hardening mode, it interactively asks the user questions, explains the topics of those questions, and builds a policy based on the user’s answers. It then applies the policy to the system. In its assessment mode, it builds a report intended to teach the user about available security settings as well as inform the user as to which settings have been tightened.See all security-oriented operating systems

#96
new
  TITLE=
Windows
Command-line interface
GUI Interface
Acunetix WVS : Commercial Web Vulnerability Scanner
Acunetix WVS automatically checks web applications for vulnerabilities such as SQL Injections, cross site scripting, arbitrary file creation/deletion, weak password strength on authentication pages. AcuSensor technology detects vulnerabilities which typical black box scanners miss. Acunetix WVS boasts a comfortable GUI, an ability to create professional security audit and compliance reports, and tools for advanced manual webapp testing.See all web vulnerability scanners

#97
new
Linux
Windows
Command-line interface
GUI Interface
Source code
TrueCrypt : Open-Source Disk Encryption Software for Windows and Linux
TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists.See all encryption tools

#98
new
  TITLE=
Windows
GUI Interface
Rational AppScan : Commercial Web Vulnerability Scanner
AppScan provides security testing throughout the application development lifecycle, easing unit testing and security assurance early in the development phase. Appscan scans for many common vulnerabilities, such as cross site scripting, HTTP response splitting, parameter tampering, hidden field manipulation, backdoors/debug options, buffer overflows and more. Appscan was merged into IBM’s Rational division after IBM purchased it’s original developer (Watchfire) in 2007.See all web vulnerability scanners

#99
72
  TITLE=
Windows
GUI Interface
N-Stealth : Web server scanner
N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as Whisker/libwhisker and Nikto, but do take their web site with a grain of salt. The claims of “30,000 vulnerabilities and exploits” and “Dozens of vulnerability checks are added every day” are highly questionable. Also note that essentially all general VA tools such as NessusISS Internet ScannerRetinaSAINT, and Sara include web scanning components. They may not all be as up-to-date or flexible though. N-Stealth is Windows only and no source code is provided.See all web vulnerability scanners

#100
37
Windows
GUI Interface
MBSA : Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM). Apparently MBSA on average scans over 3 million computers each week.See all vulnerability scanners

Credits

First, I would like to thank the 3,243 Nmap users who shared their favorite tools to make this all possible. Many of these descriptions were taken from the application home page or the Debian or Freshmeatpackage descriptions, with marketing fluff removed. I would also like to thank Doug Hoyte for helping me compile all of this data. Also thanks to Catherine Tornabene and Mark Brewis for early reviews.