The desktop of Red Star OS 3.0, localized with North Korean terminology and spelling | |
Developer | Korea Computer Center, North Korea |
---|---|
OS family | Unix-like (desktop and server), Android (on Woolim, Ariang, Samjiyon, and Manbang) |
Working state | Current |
Source model | Closed source with open source components |
Latest release | 4.0 |
Marketing target | General Public |
Available in | Korean (North) |
Platforms | i386 (x86), ARM |
Kernel type | Monolithic (Linux) |
Default user interface | KDE 3[1] |
License | GPL (Linux kernel and other GNU software only), Proprietary |
Preceded by | Fedora 11[2] |
In this video I take a look at the OS that North Korea uses which very closely resembles older versions of MacOS. And does a pretty good job of it. QAnon (/ ˌ k j uː ə ˈ n ɒ n /), or simply Q, is a disproven and discredited American far-right conspiracy theory alleging that a secret cabal of Satan-worshipping, cannibalistic pedophiles was running a global child sex-trafficking ring and plotted against former U.S. President Donald Trump while he was in office. QAnon is commonly called a cult. Kingdom of procreation mac os. QAnon commonly asserts that Trump has. It seems North Korea doesn't like the traditional Windows-look anymore. The latest version of the country's home-grown operating system, Red Star Linux, has been restyled and ships with a desktop that closely resembles Apple's Mac OSX.
Red Star OS (Korean: 붉은별; MR: Pulgŭnbyŏl) is a North KoreanLinux distribution, with development first starting in 1998 at the Korea Computer Center (KCC). Prior to its release, computers in North Korea typically used Red Hat Linux[3] and Windows XP.[4]
Version 3.0 was released in the summer of 2013, but as of 2014, version 1.0 continues to be more widely used. It is offered only in a Korean language edition, localized with North Korean terminology and spelling.[5]
Specifications[edit]
Red Star OS features a modified Mozilla Firefox browser called Naenara ('My country' in Korean), which is used for browsing the Naenara web portal on the North Korean internet network known as Kwangmyong. Naenara comes with two search engines. Other software includes a text editor, an office suite, an e-mail client, audio and video players, and video games.[6] Version 3, like its predecessors, runs Wine, a piece of software that allows Windows programs to be run under Linux.[7]
Red Star OS 3.0, unlike its predecessors, uses a KDE 3 desktop. However, version 3.0 closely resembles Apple's macOS, whereas previous versions more closely resembled Windows XP;[8][9] current North Korean leader Kim Jong-un was seen with an iMac on his desk in a 2013 photo, indicating a possible connection to the redesign.[6][10][11]
Media attention[edit]
The Japan-based North Korea-affiliated newspaper Choson Sinbo interviewed two Red Star OS programmers in June 2006.[3] In February 2010, a Russian international student at the Kim Il-sung University in Pyongyang purchased a copy and posted about it on his LiveJournal account; Russian television station RT picked up his LiveJournal post and translated it into English.[6] English-language technology blogs, including Engadget and OSnews, as well as South Korean wire services such as Yonhap, went on to repost the content.[5][12][13] In late 2013, Will Scott, who was visiting the Pyongyang University of Science and Technology, purchased a copy of version 3 from a KCC retailer in southern Pyongyang, and uploaded screenshots to the internet.[7]
In 2015, two German researchers speaking at the Chaos Communication Congress[14] described the internal operation of the OS.[15] The North Korean government wants to track the underground market of USB flash drives used to exchange foreign films, music and writing,[16] so the system watermarks all files on portable media attached to computers.[17]
System requirements | ||||||||
---|---|---|---|---|---|---|---|---|
|
History[edit]
Version 1.0[edit]
The first version appeared in 2008. It is very reminiscent of the Windows XP operating system.
It featured the 'Naenara' web browser, based on Mozilla Firefox, and an Office suite based on Open Office, called 'Uri 2.0'. Wine is also included.
So far, no copies have been leaked online. The screenshots of the operating system were officially published by KCNA and discovered by South Korean news sites.[20]
Version 2.0[edit]
The development of version 2.0 began in March 2008, and was completed on 3 June 2009. Like its predecessor, it is based on the appearance of Windows XP, and was priced at 2000 North Korean won (approx. US$15).
The 'Naenara' internet browser is also included in this version. The browser was released on 6 August 2009, as part of the operating system, and was priced at 4000 North Korean won (approx. US$28).
The operating system uses a special keyboard layout that differs greatly from the South Korean standard layout.[citation needed]
Version 3.0[edit]
Version 3.0 was introduced on 15 April 2012, and appears heavily based on macOS operating systems of various versions.[21] The new version supports both IPv4 and IPv6 addresses.
The operating system comes pre-installed with a number of applications that monitor its users - if a user tries to disable security functions, the operating system often restarts in continuous loops or destroys itself. In addition, a watermarking tool integrated into the system marks all media content with the hard drive's serial number, allowing the North Korean authorities to trace the spread of files. The system also has hidden 'anti-virus' software that is capable of removing censored files that are remotely stored by the North Korean secret service. There is a user group called 'administrator' in the operating system. Users do not have root access by default, but are able to elevate their privileges to root by running a built-in utility called 'rootsetting'. However, provisions are made in kernel modules to deny even root users access to certain files, and extensive system integrity checks are done at boot time to ensure these files have not been modified.[14]
Red Star OS 3 comes with a customized version of OpenOffice called Sogwang Office.[14]
Version 4.0[edit]
Very little information is available on version 4.0.
As of late 2017 it is known that a Red Star 4.0 exists and is being field tested.[22]A server variation of version 4.0 appears to be currently used on the website of North Korea's national airline Air Koryo, Voice of Korea, and The Pyongyang Times according to the HTTP server header.[23][24]
According to The Pyongyang Times, an official version of Red Star OS 4.0 has been developed as of January 2019, with full network support as well as system and service management tools.[25]
In June and July 2020, South Korea's NKEconomy (NK경제) obtained Red Star 4.0 and published articles about it.[26][27][28][29]
Vulnerabilities[edit]
In 2016, the security company Hackerhouse found a security vulnerability in the integrated web browser Naenara. This vulnerability makes it possible to execute commands on the computer if the user clicks on a correspondingly crafted link.[30][31]
References[edit]
- ^'Red Star OS'. ArchiveOS. Retrieved 2017-08-31.
- ^'Inside North Korea's Totalitarian Operating System'. Motherboard. Retrieved 2017-08-31.
- ^ abKim, Chi-yong (2006-06-21), '〈민족정보산업의 부흥 -상-〉 《우리식 콤퓨터조작체계(OS) 》의 개발과 도입', Choson Sinbo (in Korean), archived from the original on 2007-12-23
- ^'North Korea's 'paranoid' computer operating system revealed'. The Guardian. 27 December 2015. Retrieved 4 May 2018.
- ^ abNam, Hyeon-ho (2010-03-03), 北, 독자적 컴퓨터 운영체제 '붉은별' 개발, Yonhap News (in Korean), retrieved 2013-01-23
- ^ abc'North Korea's 'secret cyber-weapon': brand new Red Star OS', RT, 2010-03-01, retrieved 2013-01-23
- ^ abWilliams, Martyn (January 31, 2014). 'North Korea's Red Star OS Goes Mac'. North Korea Tech. Martyn Williams. Retrieved July 23, 2014.
- ^'Apple's Mac OSX imitated in latest North Korea system'. BBC News. 2014-02-05. Retrieved 2017-08-31.
- ^'North Korean computers get 'Apple' makeover'. Telegraph.co.uk. Retrieved 2017-08-31.
- ^'Apple's Mac OS X imitated in latest North Korea system'. BBC News. 2014-02-05.
- ^'North Korean computers get 'Apple' makeover'. The Daily Telegraph. Retrieved 6 February 2014.
- ^Holwerda, Thom (2009-03-04), 'North Korea Develops Its Own Linux Distribution', OSNews, retrieved 2013-01-23
- ^Flatley, Joseph L. (2009-03-04), 'North Korea's Red Star OS takes the 'open' out of 'open source'', Engadget, retrieved 2013-01-23
- ^ abcFlorian Grunow; Niklaus Schiess (2015-12-28). Lifting the Fog on Red Star OS - A deep dive into the surveillance features of North Korea's operating system. Chaos Communication Congress 32.
- ^Jeremy Wagstaff and James Pearson (27 December 2015). 'Paranoid: North Korea's computer operating system mirrors its political one'. Reuters.
- ^James Pearson (27 March 2015). 'The $50 device that symbolizes a shift in North Korea'. Reuters.
- ^'RedStar OS Watermarking'. Insinuator.
- ^'A Visual Guide To North Korea's Totalitarian Operating System'. Fast Company. 2014-09-23. Retrieved 2017-08-31.
- ^'North Korea's Red Star OS takes the 'open' out of 'open source''. Engadget. Retrieved 2017-08-31.
- ^Kim Tong-hyung (5 April 2010). 'NK Goes for Linux-Based Operating System'. Korea Times.
- ^Williams, Martyn (2014-12-30). 'Red Star 3.0 Desktop finally becomes public'. North Korea Tech - 노스코리아테크. Retrieved 2017-08-31.
- ^'Electronic Weapons: Two Lines, No Waiting'. Retrieved 2017-12-27.
- ^'Air Koryo'. Retrieved 2018-11-18.
- ^'The Pyongyang Times'. Retrieved 2018-12-27.
- ^'The Pyongyang Times'(PDF).
- ^'북한 붉은별4.0에 오라클 버추얼박스를 탑재하고 있다' [Oracle Virtualbox is installed in DPRK's Red Star 4.0]. NK경제 (NKEconomy). 2020-06-15.
- ^'붉은별4.0 서광 오피스에서 MS워드 파일 편집 가능하다' [Sogwang Office in Red Star 4.0 can edit Microsoft Word files]. NK경제 (NKEconomy). 2020-06-23.
- ^'북한 붉은별 4.0의 기본 브라우저는? 파이어폭스' [The default web browser in Red Star 4.0 is Firefox]. NK경제 (NKEconomy). 2020-07-06.
- ^'붉은별4.0의 비밀번호 관리는 키체인으로?' [Password management in Red Star 4.0 is done by keychain?]. NK경제 (NKEconomy). 2020-07-21.
- ^'RedStar OS 3.0: Remote Arbitrary Command Injection'. Archived from the original on December 5, 2016. Retrieved August 31, 2020.
- ^Wei, Wang. 'North Korea's Linux-based Red Star OS can be Hacked Remotely with just a Link'. The Hacker News. Retrieved 2017-08-31.
External links[edit]
Wikimedia Commons has media related to Red Star OS. |
- 'OS 'Red Star' - линуксоиды всех стран, соединяйтесь!' (in Russian). 2010-02-27. Archived from the original on 2011-07-26.
- 'North Korean Red Star operating system details emerge'. BBC News. 2010-04-06.
- 北 컴퓨터운영체제 붉은별 첫 분석 (in Korean).
- redstar-tools: A tool used for analyzing the system.
Pong Usa V Dprk Mac Os X
The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Concealed intent mac os. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. Infinity challenge mac os. For example, the second variation of the Sobig worm was initially called 'Palyh' but later renamed 'Sobig.b'. Again, depending on how quickly this happens, the old name may persist.
Scope[edit]
Pong Usa V Dprk Mac Os 11
In terms of scope, there are two major variants: the list of 'in-the-wild' viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called 'zoo viruses'). The sizes are vastly different: in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.
Comparison of viruses and related programs[edit]
Virus | Alias(es) | Types | Subtype | Isolation Date | Isolation | Origin | Author | Notes |
---|---|---|---|---|---|---|---|---|
1260 | V2Px | DOS | Polymorphic[1] | 1990 | First virus to use polymorphic encryption | |||
4K | 4096 | DOS | 1990-01 | The first virus to use stealth | ||||
5lo | DOS | 1992-10 | Infects .EXE files only | |||||
Abraxas | Abraxas5 | DOS, Windows 95, 98 | [1] | 1993-04 | Europe | ARCV group | Infects COM file. Disk directory listing will be set to the system date and time when infection occurred. | |
Acid | Acid.670, Acid.670a, Avatar.Acid.670, Keeper.Acid.670 | DOS, Windows 95, 98 | 1992 | Corp-$MZU | Infects COM file. Disk directory listing will not be altered. | |||
Acme | DOS, Windows 95 DOS | 1992 | Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name. | |||||
ABC | ABC-2378, ABC.2378, ABC.2905 | DOS | 1992-10 | ABC causes keystrokes on the compromised machine to be repeated. | ||||
Actifed | DOS | |||||||
Ada | DOS | 1991-10 | Argentina | The Ada virus mainly targets .COM files, specifically COMMAND.COM. | ||||
AGI-Plan | Month 4-6 | DOS | Mülheim | AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release. | ||||
AI | DOS | |||||||
AIDS | AIDSB, Hahaha, Taunt | DOS | 1990 | Dr. Joseph Popp | AIDS is the first virus known to exploit the DOS 'corresponding file' vulnerability. | |||
AIDS II | DOS | circa 1990 | ||||||
Alabama | Alabama.B | DOS | 1989-10 | Hebrew University, Jerusalem | Files infected by Alabama increase in size by 1,560 bytes. | |||
Alcon[1] | RSY, Kendesm, Ken&Desmond, Ether | DOS | 1997-12 | Overwrites random information on disk causing damage over time. | ||||
Ambulance | DOS | June,1990 | ||||||
Anna Kournikova | E-Mail VBScript | 2001-02-11 | Sneek, Netherlands | Jan de Wit | A Dutch court stated that US$166,000 in damages was caused by the worm. | |||
ANTI | ANTI-A, ANTI-ANGE, ANTI-B, Anti-Variant | Classic Mac OS | 1989-02 | France | The first Mac OS virus not to create additional resources; instead, it patches existing CODE resources. | |||
AntiCMOS | DOS | January 1994 – 1995 | Due to a bug in the virus code, the virus fails to erase CMOS information as intended. | |||||
ARCV-n | DOS | 1992-10/1992-11 | England, United Kingdom | ARCV Group | ARCV-n is a term for a large family of viruses written by the ARCV group. | |||
Alureon | TDL-4, TDL-1, TDL-2, TDL-3, TDL-TDSS | Windows | Botnet | 2007 | Estonia | JD virus | ||
Autostart | Autostart.A—D | Classic Mac OS | 1998 | Hong Kong | China | |||
Bomber | CommanderBomber | DOS | Bulgaria | Polymorphic virus which infects systems by inserting fragments of its code randomly into executable files. | ||||
Brain | Pakistani flu | DOS | Boot sector virus | 1986-01 | Lahore, Pakistan | Basit and Amjad Farooq Alvi | Considered to be the first computer virus for the PC | |
Byte Bandit | Amiga | Boot sector virus | 1988-01 | Swiss Cracking Association | It was one of the most feared Amiga viruses until the infamous Lamer Exterminator. | |||
CDEF | Classic Mac OS | 1990.08 | Ithaca, New York | Cdef arrives on a system from an infected Desktop file on removable media. It does not infect any Macintosh systems beyond OS6. | ||||
Christmas Tree | Worm | 1987-12 | Germany | |||||
CIH | Chernobyl, Spacefiller | Windows 95, 98, Me | 1998-06 | Taiwan | Taiwan | Chen ing-Hau | Activates on April 26, in which it destroys partition tables, and tries to overwrite the BIOS. | |
Commwarrior | SymbianBluetooth worm | Famous for being the first worm to spread via MMS and Bluetooth. | ||||||
Creeper | TENEX operating system | Worm | 1971 | Bob Thomas | An experimental self-replicating program which gained access via the ARPANET and copied itself to the remote system. | |||
Eliza | DOS | 1991-12 | ||||||
Elk Cloner | Apple II | 1982 | Mt. Lebanon, Pennsylvania | Mt. Lebanon, Pennsylvania | Rich Skrenta | The first virus observed 'in the wild' | ||
Esperanto | DOS, MS Windows, Classic Mac OS | 1997.11 | Spain | Spain | Mister Sandman | First multi-processor virus. The virus is capable of infecting files on computers running Microsoft Windows and DOS on the x86 processor and MacOS, whether they are on a Motorola or PowerPC processor. | ||
Form | DOS | 1990 | Switzerland | A very common boot virus, triggers on the 18th of any month. | ||||
Fun | Windows | 2008 | It registers itself as a Windows system process then periodically sends mail with spreading attachments as a response to any unopened emails in Outlook Express | |||||
Graybird | Backdoor.GrayBird, BackDoor-ARR | Windows | Trojan Horse | 2003-02-04 | ||||
Hare | DOS, Windows 95, Windows 98 | 1996-08 | Famous for press coverage which blew its destructiveness out of proportion | |||||
ILOVEYOU | Microsoft | Worm | 2000-05-05 | Manila, Philippines | Michael Buen, Onel de Guzman | Computer worm that attacked tens of millions of Windows personal computers | ||
INIT 1984 | Classic Mac OS | 1992-03-13 | Ireland | Malicious, triggered on Friday the 13th. Init1984 works on Classic Mac OS System 6 and 7. | ||||
Jerusalem | DOS | 1987-10 | Jerusalem was initially very common and spawned a large number of variants. | |||||
Kama Sutra | Blackworm, Nyxem, and Blackmal | 2006-01-16 | Designed to destroy common files such as Microsoft Word, Excel, and PowerPoint documents. | |||||
Koko | DOS | 1991-03 | The payload of this virus activates on July 29 and February 15 and may erase data on the users hard drive | |||||
Lamer Exterminator | Amiga | Boot sector virus | 1989-10 | Germany | Random encryption, fills random sector with 'LAMER' | |||
MacMag | Drew, Bradow, Aldus, Peace | Classic Mac OS | 1987-12 | United States | Products (not necessarily the Classic Mac OS) were infected with the first actual virus. | |||
MDEF | Garfield, Top Cat | Classic Mac OS | 1990-05-15 | Ithaca, New York | Infects menu definition resource fork files. Mdef infects all Classic Mac OS versions from 4.1 to 6. | |||
Melissa | Mailissa, Simpsons, Kwyjibo, Kwejeebo | Microsoft Word macro virus | 1999-03-26 | New Jersey | David L. Smith | Part macro virus and part worm. Melissa, a MS Word-based macro that replicates itself through e-mail. | ||
Mirai | Internet of Things | DDoS | 2016 | |||||
Michelangelo | DOS | 1991-02-04 | Australia | Ran March 6 (Michelangelo's birthday) | ||||
Mydoom | Novarg, Mimail, Shimgapi | Windows | Worm | 2004-01-26 | World | Russia | Mydoom was the world's fastest spreading computer worm to date, surpassing Sobig, and the ILOVEYOU computer worms, yet it was used to DDoS servers. | |
Navidad | Windows | Mass-mailer worm | 2000-12 | South America | ||||
Natas | Natas.4740, Natas.4744, Natas.4774, Natas.4988 | DOS | Multipartite, stealth, polymorphic | 1994.06 | Mexico City | United States | Priest (AKA Little Loc) | |
nVIR | MODM, nCAM, nFLU, kOOL, Hpat, Jude, Mev#, nVIR.B | Classic Mac OS | 1987-12 | United States | nVIR has been known to 'hybridize' with different variants of nVIR on the same machine. | |||
Oompa | Leap | Mac OSX | Worm | 2006.02.10 | First worm for Mac OSX. It propagates through iChat, an instant message client for Macintosh operating systems. Whether Oompa is a worm has been controversial. Some believe it is a trojan. | |||
OneHalf | Slovak Bomber, Freelove or Explosion-II | DOS | 1994 | Slovakia | Vyvojar | It is also known as one of the first viruses to implement a technique of 'patchy infection' | ||
Ontario.1024 | ||||||||
Ontario.2048 | ||||||||
Ontario | SBC | DOS | 1990-07 | Ontario | 'Death Angel' | |||
Petya | GoldenEye, NotPetya | Windows | Trojan horse | 2016 | Ukraine | Russia | Total damages brought about by NotPetya to more than $10 billion. | |
Pikachu virus | 2000-06-28 | Asia | The Pikachu virus is believed to be the first computer virus geared at children. | |||||
Ping-pong | Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruz | DOS | Boot sector virus | 1988-03 | Turin | Harmless to most computers | ||
RavMonE.exe | RJump.A, Rajump, Jisx | Worm | 2006-06-20 | Once distributed in Apple iPods, but a Windows-only virus | ||||
SCA | Amiga | Boot sector virus | 1987-11 | Switzerland | Swiss Cracking Association | Puts a message on screen. Harmless except it might destroy a legitimate non-standard boot block. | ||
Scores | Eric, Vult, NASA, San Jose Flu | Classic Mac OS | 1988.04 | United States | Fort Worth, Texas | Donald D. Burleson | Designed to attack two specific applications which were never released. | |
Scott's Valley | DOS | 1990-09 | Scotts Valley, California | Infected files will contain the seemingly meaningless hex string 5E8BDE909081C63200B912082E. | ||||
SevenDust | 666, MDEF, 9806, Graphics Accelerator, SevenD, SevenDust.B—G | Classic Mac OS | Polymorphic | 1989-06 | ||||
Marker | Shankar's Virus, Marker.C, Marker.O, Marker.Q, Marker.X, Marker.AQ, Marker.BN, Marker.BO, Marker.DD, Marker.GR, W97M.Marker | MS Word | Polymorphic, Macro virus | 1999-06-03 | Sam Rogers | Infects Word Documents | ||
Simile | Etap, MetaPHOR | Windows | Polymorphic | The Mental Driller | The metamorphic code accounts for around 90% of the virus' code | |||
SMEG engine | DOS | Polymorphic | 1994 | United Kingdom | The Black Baron | Two viruses were created using the engine: Pathogen and Queeg. | ||
Stoned | DOS | Boot sector virus | 1987 | Wellington | One of the earliest and most prevalent boot sector viruses | |||
Jerusalem | Sunday, Jerusalem-113, Jeruspain, Suriv, Sat13, FuManchu | DOS | File virus | 1987-10 | Seattle | Virus coders created many variants of the virus, making Jerusalem one of the largest families of viruses ever created. It even includes many sub-variants and a few sub-sub-variants. | ||
WannaCry | Wanna, Cryptor | Windows | Ransomware Cryptoworm | 2017-12 | World | North Korea | ||
WDEF | WDEF A | Classic Mac OS | 1989.12.15 | Given the unique nature of the virus, its origin is uncertain. | ||||
Whale | DOS | Polymorphic | 1990-07-01 | Hamburg | R Homer | At 9216 bytes, was for its time the largest virus ever discovered. | ||
ZMist | ZMistfall, Zombie.Mistfall | Windows | 2001 | Russia | Z0mbie | It was the first virus to use a technique known as 'code integration'. | ||
Xafecopy | Android | Trojan | 2017 | |||||
Zuc | Zuc.A., Zuc.B, Zuc.C | Classic Mac OS | 1990.03 | Italy | Italy |
Related lists[edit]
Unusual subtypes[edit]
Notable instances[edit]
Pong Usa V Dprk Mac Os Download
- Creeper virus - The first malware that ran on ARPANET
- Leap - Mac OS X Trojan horse
- Shamoon a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by Saudi Aramco.
- Storm Worm - A Windows trojan horse that forms the Storm botnet
- Stuxnet First destructive ICS-targeting Trojan which destroyed part of Iran's nuclear program. The virus destroyed the centrifuge components making it impossible to enrich uranium to weapons grade.
Similar software[edit]
Security topics[edit]
See also[edit]
References[edit]
- ^ abcVincentas (11 July 2013). 'Computer Viruses in SpyWareLoop.com'. Spyware Loop. Retrieved 28 July 2013.
External links[edit]
- The WildList, by WildList Organization International
- List of Computer Viruses[permanent dead link] - listing of the Latest Viruses by Symantec.
- List of all viruses All viruses cataloged in Panda Security's Collective Intelligence servers.