Language Selection

English French German Italian Portuguese Spanish

Web

Sweet! Computing is ready to go

Filed under
Web

We've gotten http://sweetcomputing.com to a point where we're ready for visitors. This site is designed to help you find out what can work on your computer...be it an older model or brand spanking new.

Quake cuts off much of Asia Internet

Filed under
Web

Internet and phone services have been disrupted across much of Asia on Wednesday after an earthquake damaged undersea cables, leaving one of the world's most tech-savvy regions in a virtual blackout.

Stop calling everything blogs!

Filed under
Web

ENOUGH WITH CALLING every site on the (#*&$ing net a blog, people! I know the mass media is filled with dumb sheep that need to spread fear about anacondas in toilets to get ratings, but this has gone too far. What am I talking about? It seems every site that puts up content that is not owned by a major media outlet that has a TV channel is now blogging.

The redesigned Open Addict is now back online!

Filed under
Web

Open Addict v3.0 is now back online, just in time for the Christmas holiday. Millions of Linux and BSD nerds undoubtedly need a place to point their new computers' web browsers and Open Addict v3.0 is back online for their viewing pleasure.

Jono Bacon: Sensationalism takes a choke-hold

Filed under
Web

Oh dear. I used to like reading Groklaw and admired it for its accuracy and straight-down-the-line reporting. Recently though, I have felt it has become too much of a pulpit, and this post is just sensationalist clutching at straws.

RIAA wants the Internet shut down

Filed under
Web

ONE OF THE lawyers involved in defending cases bought against people by the RIAA claims that if the music industry wins a crucial case, the Internet will have to be switched off.

Behind the scenes at GNOME's Web site revision

Filed under
Web

Like any large organisation, the GNOME Project faces a formidable challenge in maintaining an effective Web site. Trying the balance the demands of promotion, documentation, and community coordination is made all the more difficult when you only have volunteers to do the work. But over the past year the GNOME community has developed and begun to execute a well-defined process to refocus and rejuvenate its much-neglected Web presence.

Open Source Turncoats Must Not Be Supported: boycottnovell.com online

Filed under
Web
SUSE

The way to communicate with a corporation is economically. It is unacceptable behavior on Novell’s part to legitimize and participate in MS FUD campaign, and to violate the very license that allows them to distribute the community’s work in the first place. I say let the big MS lump payment be their severance from the community.

And with these words, www.boycottnovell.com is born.

Blizzard banned all Linux users from WoW yesterday

Filed under
Web

"This account has been found to have employed third party software designed to automate many aspects of the World of Warcraft game play experience. Such software runs contrary to the essence of World of Warcraft and provides an advantage over other players."

FSF Compliance Lab Announces New Web Site

Filed under
Web

Yesterday the Free Software Foundation (FSF) Compliance Lab unveiled its updated web site, @ http://www.fsf.org/licensing/. The site aims to help people find the information they need about licenses published by the FSF, such as the GNU General Public License (GPL), and to provide more information about the Lab's work.

Syndicate content

More in Tux Machines

Intel invests $60 million in drone venture

Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers. Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below). Read more

today's howtos

Security Leftovers

  • London Calling: Two-Factor Authentication Phishing From Iran
    This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi. The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
  • Ins0mnia: Unlimited Background Time and Covert Execution on Non-Jailbroken iOS Devices
    FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
  • Why is the smart home insecure? Because almost nobody cares
    It's easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right? Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there's a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it's all the same.
  • Critical PayPal XSS vulnerability left accounts open to attack
    PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.
  • Important Notice Regarding Public Availability of Stable Patches
    Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we've created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
  • Finland detains Russian accused of U.S. malware crimes
    Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
  • Finland confirms arrest of Russian citizen accused of crimes in the US
    Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
  • More than 80% of healthcare IT leaders say their systems have been compromised
    Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG. The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said. The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
  • Removal of SSLv3 from LibreSSL
  • Kansas seeks to block release of voting machine paper tapes
    The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.

Firefox 40.0.3 Arrives in All Ubuntu OSes

Canonical have announced that the latest Firefox 40.0.3 version has been made available in the repositories for the users of Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS. Read more