Language Selection

English French German Italian Portuguese Spanish

5 assistive technology open source programs

Filed under
OSS

Assistive technology software is any program or operating system feature designed to let a user with cognitive, sensory, or physical impairments use a computer system. Innovations in assistive technology software can make a huge difference in the daily lives of these people.

Most assistive technology software is not cross platform because it is often closely integrated with the operating system and screen display sub-systems. Commercial developers also face the challenge that the potential user base is not large, so prices can be high, which restricts the user base even more. Open source and freeware developers have more freedom in developing assistive technology projects, but to be successful they still need to achieve a critical mass of users. One way to tackle this problem is to expand the user base to include communities across the world that cannot afford the high prices of commercial assistive technology software.

Read more

More in Tux Machines

GNU News

Project Releases

Security Leftovers

  • Krebs Goes Down, Opera Gets a VPN & More…
    Krebs on Security in record DDOS attack: Everybody’s go-to site for news and views of security issues, has been temporarily knocked offline in a DDOS attack for the record books. We first heard about the attack on Thursday morning after Brian Krebs reported that his site was being hit by as much as 620 Gbs, more than double the previous record which was considered to be a mind-blower back in 2013 when the anti-spam site Spamhaus was brought to its knees. Security sites such as Krebs’ that perform investigative research into security issues are often targets of the bad guys. In this latest case, Ars Technica reported the attack came after Krebs published the identity of people connected with vDOS, Israeli black hats who launched DDOS attacks for pay and took in $600,000 in two years doing so. Akamai had been donating DDoS mitigation services to Krebs, but by 4 p.m. on the day the attack began they withdrew the service, motivated by the high cost of defending against such a massive attack. At this point, Krebs decided to shut down his site.
  • Upgrade your SSH keys!
    When generating the keypair, you're asked for a passphrase to encrypt the private key with. If you will ever lose your private key it should protect others from impersonating you because it will be encrypted with the passphrase. To actually prevent this, one should make sure to prevent easy brute-forcing of the passphrase. OpenSSH key generator offers two options to resistance to brute-force password cracking: using the new OpenSSH key format and increasing the amount of key derivation function rounds. It slows down the process of unlocking the key, but this is what prevents efficient brute-forcing by a malicious user too. I'd say experiment with the amount of rounds on your system. Start at about 100 rounds. On my system it takes about one second to decrypt and load the key once per day using an agent. Very much acceptable, imo.
  • Irssi 0.8.20 Released
  • What It Costs to Run Let's Encrypt
    Today we’d like to explain what it costs to run Let’s Encrypt. We’re doing this because we strive to be a transparent organization, we want people to have some context for their contributions to the project, and because it’s interesting. Let’s Encrypt will require about $2.9M USD to operate in 2017. We believe this is an incredible value for a secure and reliable service that is capable of issuing certificates globally, to every server on the Web free of charge. We’re currently working to raise the money we need to operate through the next year. Please consider donating or becoming a sponsor if you’re able to do so! In the event that we end up being able to raise more money than we need to just keep Let’s Encrypt running we can look into adding other services to improve access to a more secure and privacy-respecting Web.
  • North Korean DNS Leak reveals North Korean websites
    One of North Korea’s top level DNS servers was mis-configured today (20th September 2016) accidentally allowing global DNS zone transfers. This allowed anyone who makes a zone transfer request (AXFR) to retrieve a copy of the nation’s top level DNS data. [...] This data showed there are 28 domains configured inside North Korea, here is the list: airkoryo.com.kp cooks.org.kp friend.com.kp gnu.rep.kp kass.org.kp kcna.kp kiyctc.com.kp knic.com.kp koredufund.org.kp korelcfund.org.kp korfilm.com.kp ma.gov.kp masikryong.com.kp naenara.com.kp nta.gov.kp portal.net.kp rcc.net.kp rep.kp rodong.rep.kp ryongnamsan.edu.kp sdprk.org.kp silibank.net.kp star-co.net.kp star-di.net.kp star.co.kp star.edu.kp star.net.kp vok.rep.kp
  • Yahoo’s Three Hacks
    As a number of outlets have reported, Yahoo has announced that 500 million of its users’ accounts got hacked in 2014 by a suspected state actor. But that massive hack is actually one of three interesting hacks of Yahoo in recent years.

Italian Military's LibreOffice Migration Underway; 100,000+ PCs To Be Migrated

As we reported exactly an year ago, Italian Military's plans to migrate its entire fleet of desktop PCs to LibreOffice is well underway and has reached its first milestone. Since the project got started about an year ago, the Italian military have switched over 8000 PC workstations to LibreOffice. Read more