This release also features an in-browser updater, and a completely reorganized bundle directory structure to make this updater possible. This means that simply extracting a 4.0 Tor Browser over a 3.6.6 Tor Browser will not work. Please also be aware that the security of the updater depends on the specific CA that issued the www.torproject.org HTTPS certificate (Digicert), and so it still must be activated manually through the Help ("?") "about browser" menu option. Very soon, we will support both strong HTTPS site-specific certificate pinning (ticket #11955) and update package signatures (ticket #13379). Until then, we do not recommend using this updater if you need stronger security and normally verify GPG signatures.
Pica8 kicked off a busy week in the increasingly competitive software-defined networking space, making moves that officials say will help fuel the adoption of Linux-based OSes on bare-metal switches.
ONIE has been accepted by the Open Compute Project, and enables businesses to run a range of operating systems—such as Pica8's PicOS or Cumulus Networks' operating system—on the same switch hardware. Vendors like Pica8 and Cumulus Networks are championing the use of standards-based operating systems running on low-cost bare-metal switches as an alternative in the software-defined network (SDN) space to more expensive and complex hardware from the likes of Cisco Systems and Juniper Networks.
Using the Raspberry Pi for around the past two years has generally been pretty fantastic. It took us a year or so to stop being surprised by just how much it was able to do in the various projects we saw or made ourselves. One thing that we always struggled with was web browsing though; Midori was slow and laggy and it would take up all the Raspberry Pi’s system resources as well.
It seems the Raspberry Pi Foundation has noticed this too and has been busy creating a new browser for Raspbian that’s lighter and faster while still being a useable piece of software. Epiphany, the GNOME Web browser, is the result and is now replacing Midori in the latest versions of Raspbian.
The DDOS attack that has rendered the popular Linux site Tux Machines virtually unreachable for nearly two weeks, now seems to be affecting sister site TechRights. Roy Schestowitz, publisher of both sites, told FOSS Force that the attack on TechRights began at about one o’clock Friday afternoon GMT.
Exactly 15 years ago I uploaded to Debian the first release of my whois client.
At the end of 1999 the United States Government forced Network Solutions, at the time the only registrar for the .com, .net and .org top level domains, to split their functions in a registry and a registrar and to and allow competing registrars to operate.
Since then, two whois queries are needed to access the data for a domain in a TLD operating with a thin registry model: first one to the registry to find out which registrar was used to register the domain, and then one the registrar to actually get the data.
Since sometime last week the popular Linux site Tux Machines has been under an apparent distributed denial-of-service (DDOS) attack. For the last several days, those trying to visit the site have been redirected to Tech Rights, another site operated by Roy Schestowitz, the owner of Tux Machines, to a post dated Saturday by Schestowitz which reads:
Open source platforms like Drupal and WordPress provide a backend framework that small businesses can use to build and customize their websites while managing key functions like registration, system administration, layout and RSS. Users can also create their own modules to enable new functions or change the website's look and feel.
Smaller companies can use open source content management systems (CMS) to reduce or eliminate the need for coding while delivering rich media online, including text, graphics, video and audio. They can use open source assets to create responsive design sites that optimize content for viewing across multiple device types, including smartphones, tablets and laptops, while eliminating the need to scroll from side to side.
With open source tools available to help small businesses establish an online presence with robust front and backend functions quickly and affordably, there's never been a better time to focus on content excellence. And the best way to do that is to concentrate on the customer. Engage with your target customers and find out what they value the most. Use that information to develop your content, and speak directly to your customers' needs.
For Linux users, there are plenty of Dropbox alternatives, MEGAsync being the latest entrant. The service was the brain child of Kim Dotcom, founder of now defunct Megaupload, and it was launched on 19 January 2013 to coincide with the one-year anniversary of the seizure of his previous enterprise. MEGAsync now has a dedicated Linux client as well (unlike Google Drive).
Developing across multiple browsers and devices is the main issue developers have when building applications. Wouldn’t it be great to debug your app across desktop, Android and iOS with one tool? We believe the Web is powerful enough to offer a Mobile Web development solution that meets these needs!
Enter an experimental Firefox add-on called the Firefox Tools Adaptor that connects the Firefox Developer Tools to other major browser engines. This add-on is taking the awesome tools we’ve built to debug Firefox OS and Firefox on Android to the other major mobile browsers starting with Chrome on Android and Safari on iOS. So far these tools include our Inspector, Debugger and Console.
The disclosure by NSA contractor Edward Snowden has exposed the ‘out-of-control’ surveillance system of the US and the UK. The more stories we are getting from Guardian and NYTimes, the more people are losing trust in the proprietary solutions offered by the companies which operate from the US and seemingly work closely with the spy agencies.
This is a category of people who don’t yet understand the dangers of breach of privacy, but the more we are moving our lives into the digital world, the more important it is becoming to take control of our communication and privacy from the prying hands of those for whom we are the product.
Then there are those need this privacy, due to the profession they are in or for purely sensible reasons that our privacy should be respected.