iTalc classroom management software
Various issues kept on cropping up during the software configuration. The most common source of error is an incorrect key configuration – that is, the file permissions are not set correctly. To troubleshoot this, first check to see whether you can access the private key. Also ensure that the account on which the ICA is running can access the public key. If this does not solve the problem, you might want to check out the logfiles (/tmp/italc_client.log on the students' machines and /tmp/italc_master.log on the teacher's machine).
Besides incorrectly set permissions for the keys, firewalls often prevent connections being set up. Make sure that the /usr/bin/ica and /usr/bin/italc programs have inward- and outward-bound access to ports 5900 and 5858, respectively. See the iTalc Wiki for additional tips .
The developers have put in some good work to make iTalc a nicely rounded package for deployment in classroom situations. Critical functions are available intuitively via buttons and drop-down menus. If you select a distribution that has iTalc in its repository, the installation and configuration should also be fairly trivial. With budgets in education as tight as ever, the software really does seem to be a worthwhile alternative.
- iTalc: http://italc.sourceforge.net
- Mandrake packages: http://www.edumandriva.ru/download/Pac2008.1/
- openSUSE packages: http://www.opensuse-education.org/download/repo/1.0/10.3/
- iTalc Wiki: http://italc.sourceforge.net/wiki/index.php?title=Troubleshooting
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.