Language Selection

English French German Italian Portuguese Spanish

Humor

Microsoft loves Microsoft Linux

Filed under
Humor

Microsoft loves Microsoft

Summary: A very old cartoon/column (half a century old) rewritten to explain where Microsoft stands when it comes to "loving" Linux

The Microsoft Commandments

Filed under
Humor

Microsoft B0rg

  1. Thou shalt not host a FOSS project outside GitHub (otherwise it won’t ‘count’)
  2. Thou shalt not edit code without Visual Studio (which now has an “open” — albeit spying and malicious — component for openwashing purposes)
  3. Thou shalt not code without .NET (or Mono)
  4. Thou shalt not use a voting machine without Windows (we have just announced some openwashing component to make up for the NSA back doors that compromise elections worldwide)
  5. Thou shalt not boot GNU/Linux as a standalone operating system (UEFI might not permit this anyway, unless we sign for approval)
  6. Thou shalt not get get a GNU/Linux distribution outside our Store
  7. Thou shalt not buy a computer without Windows preinstalled; those are “naked PCs” and everyone who buys such PCs is a “pirate”
  8. Thou shalt not disparage or even publicly criticise our staff (that would be in violation of GitHub rules, a Code of Conduct, T&C and so on)
  9. Thou shalt not report back doors in our software or leak NSA tools that take advantage of these (there’s a prison sentence for doing so)
  10. Thou shalt not write in mass media things that refute our narrative (proving that we are chronic liars); we would bribe the publication using advertising money and have you sacked
  11. Thou shalt not use open formats such as OpenDocument except inside Microsoft Office, which is incompatible with all other software (by design)
  12. Thou shalt not distribute Linux without paying Microsoft for patents; we’re still suing companies (in 2019) for having the audacity to do so
  13. Thou shalt not host a site or a service outside Azure; we'd sic patent trolls at you
  14. Thou shalt not oppose Microsoft’s lock-in and proprietary software shims inside Linux; we’d send our media partners (Condé Nast) to oust you, at least for a month if not permanently
  15. Thou shalt not report our crimes to the authorities; doing so would make you a “toxic”, “intolerant” person
  16. Thou shalt not use the GPL unless all other options have been exhausted
  17. Thou shalt not adopt a Web browser other than MSIE or our rebranded Chrome, also known as Edge; we’d occasionally tinker with your computer’s settings to remind you to quit using other browsers or refuse the download of such “malware”

Observations of a Egotistical Technical Elitist

Filed under
Humor

Lets be honest, the title alone sets the tone of this post, so please no comments stating i'm an elitist snob, because this i'm am keenly aware of. However a touch of honesty now and again does tend to go a long way.

So what's the problem? Well there are more than one and they grind me down on a daily basis, so it's time to air them here and these are all tech issues..

So lets start with...

2012 Year of the Linux Desktop

Filed under
Humor

I declare 2012 the Year of the Linux Desktop! At least on my computer. Smile

Happy Birthday Susan aka srlinuxx

Filed under
Humor

Happy Birthday Susan aka srlinuxx!!! I can't believe you are 39 yet again! Big Grin Hope you have a great day and a prosperous New Year.

Big oops! Leo Laporte posts love affair online.

Filed under
Humor

Big oops!!! Leo Laporte delivers technology advice to millions managed to broadcast an explicit Google chat with his lover, exposing the affair he's apparently been carrying on with his CEO.

http://gawker.com/5870610/how-the-voice-of-tech-leaked-his-own-sex-chat

Looks like someone has been very very naughty! LOL

Find His Porn: Evil Website of the Week

Filed under
Humor

Just found this on Read Write Web...

Here's our nominee for most evil Web service of the week:FindHisPorn.com. For a one-time low price of $49.99 only $19.95! Limited time offer!, you can allow a dubious piece of Java voodoo onto your PC (Windows only) and let it scrape the contents of your hard drive and show you all the porn it finds. It's just perfect for spying on that special someone in your life.

Find His Porn is cynically exploiting the paranoid and freaked-out, violating privacy, jeopardizing security and taking people's money. It has been created under a total veil of secrecy. Oh, it's also "perfect for ✓ Boyfriends, ✓ Husbands and ✓ Kids" with the "goal of empowering women everywhere." With its marketing finely tuned, Find His Porn profits off of people's engrained norms, broken trust and technical ignorance

Read more...

*A Cow based Economics Lesson;

Filed under
Humor

SOCIALISM
You have 2 cows.
You give one to your neighbor.

COMMUNISM
You have 2 cows.
The State takes both and gives you some milk.

FASCISM
You have 2 cows.
The State takes both and sells you some milk.

There are more...

Mozilla forms partnership with Tylenol

Filed under
Humor

Firefox product manager Asa Dotzler said today that Mozilla has formed a partnership with Tylenol. This is in response to the business community after complaints that Mozilla's new "Rapid Release" development cycle will cause headaches for IT managers. So starting today all users who download Firefox 5.0 will also get a coupon for a discount off of Tylenol's "Rapid Release" Gel tablets.

Truths

Filed under
Humor

My sister forwarded this to me and since things are so dismal in the world these days, I thought a few chuckles might be the order of the day.

Syndicate content

More in Tux Machines

Antitrust Laws and Open Collaboration

If you participate in standards development organizations, open source foundations, trade associations, or the like (Organizations), you already know that you’re required to comply with antitrust laws. The risks of noncompliance are not theoretical – violations can result in severe criminal and civil penalties, both for your organization and the individuals involved. The U.S. Department of Justice (DOJ) has in fact opened investigations into several standards organizations in recent years. Maybe you’ve had a training session at your company, or at least are aware that there’s an antitrust policy you’re supposed to read and comply with. But what if you’re a working group chair, or even an executive director, and therefore responsible for actually making sure nothing happens that’s not supposed to? Beyond paying attention, posting or reviewing an antitrust statement at meetings, and perhaps calling your attorney when member discussions drift into grey zones, what do you actually do to keep antitrust risk in check? Well, the good news is that regulators recognize that standards and other collaboration deliverables are good for consumers. The challenge is knowing where the boundaries of appropriate conduct can be found, whether you’re hosting, leading or just participating in activity involving competitors. Once you know the rules, you can forge ahead, expecting to navigate those risks, and knowing the benefits of collaboration can be powerful and procompetitive. We don’t often get glimpses into the specific criteria regulators use to evaluate potential antitrust violations, particularly as applicable to collaborative organizations. But when we do, it can help consortia and other collaborative foundations focus their efforts and take concrete steps to ensure compliance. In July 2019, the DOJ Antitrust Division (Division) provided a new glimpse, in its Evaluation of Corporate Compliance Programs in Criminal Antitrust Investigations (Guidance). Although the Guidance is specifically intended to assist Division prosecutors evaluating corporate compliance programs when charging and sentencing, it provides valuable insights for building or improving an Organization’s antitrust compliance program (Program). At a high level, the Guidance suggests that an effective Program will be one that is well designed, is applied earnestly and in good faith by management, and includes adequate procedures to maximize effectiveness through efficiency, leadership, training, education, information and due diligence. This is important because organizations that detect violations and self-report to the Division’s Corporate Leniency program may receive credit (e.g. lower charges or penalties) for having an effective antitrust compliance program in place. Read more

today's howtos

Events: SUSECON, OpenShift Troubleshooting Workshop and Kubernetes Contributor Summit Amsterdam

  • Get Expert Guided Hands-On Experience at the SUSECON 2020 Pre-Conference Workshops

    Are you ready for SUSECON 2020? It’s coming up fast! Join us in Dublin Ireland from March 23 – 27 for a week packed with learning and networking.

  • Get Certified During SUSECON 2020

    Working in IT is not for the feint of heart; the work is demanding, and change is constant. Right now, your organization is undoubtedly seeking new ways to extend the value of their investment in IT and get more done faster.

  • The OpenShift Troubleshooting Workshop

    The first workshop in our Customer Empathy Workshop series was held October 28, 2019 during the AI/ML (Artificial Intelligence and Machine Learning) OpenShift Commons event in San Francisco. We collaborated with 5 Red Hat OpenShift customers for 2 hours on the topic of troubleshooting. We learned about the challenges faced by operations and development teams in the field and together brainstormed ways to reduce blockers and increase efficiency for users. The open source spirit was very much alive in this workshop. We came together with customers to work as a team so that we can better understand their unique challenges with troubleshooting. Here are some highlights from the experience.

  • [Kubernetes] Contributor Summit Amsterdam Schedule Announced

Security: Patches, Bugs, RMS Talk and NG Firewall 15.0

  • Security updates for Wednesday

    Security updates have been issued by CentOS (firefox, java-1.7.0-openjdk, ksh, and sudo), Debian (php7.0 and python-django), Fedora (cacti, cacti-spine, mbedtls, and thunderbird), openSUSE (chromium, re2), Oracle (firefox, java-1.7.0-openjdk, and sudo), Red Hat (openjpeg2 and sudo), Scientific Linux (java-1.7.0-openjdk and sudo), SUSE (dbus-1, dpdk, enigmail, fontforge, gcc9, ImageMagick, ipmitool, php72, sudo, and wicked), and Ubuntu (clamav, linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-oracle-5.0, linux-azure, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3, linux-lts-xenial, linux-aws, and qemu).

  • Certificate validity and a y2k20 bug

    One of the standard fields of an SSL certificate is the validity period. This field includes notBefore and notAfter dates which, according to RFC5280 section 4.1.2.5, indicates the interval "during which the CA warrants that it will maintain information about the status of the certificate" This is one of the fields that should be inspected when accepting new or unknown certificates. When creating certificates, there are a number of theories on how long to set that period of validity. A short period reduces risk if a private key is compromised. The certificate expires soon after and can no longer be used. On the other hand, if the keys are well protected, then there is a need to regularly renew those short-lived certificates.

  • Free Software is protecting your data – 2014 TEDx Richard Stallman Free Software Windows and the NSA

    Libre booted (BIOS with Linux overwritten) Thinkpad T400s running Trisquel GNU/Linux OS. (src: https://stallman.org/stallman-computing.html) LibreBooting the BIOS? Yes! It is possible to overwrite the BIOS of some Lenovo laptops (why only some?) with a minimal version of Linux.

  • NG Firewall 15.0 is here with better protection for SMB assets

    Here comes the release of NG Firewall 15.0 by Untangle with the creators claiming top-notch security for SMB assets. Let’s thoroughly discuss the latest NG Firewall update. With that being said, it only makes sense to first introduce this software to the readers who aren’t familiar with it. As the name ‘NG Firewall’ suggests, it is indeed a firewall but a very powerful one. It is a Debian-based and network gateway designed for small to medium-sized enterprises. If you want to be up-to-date with the latest firewall technology, your best bet would be to opt for this third-generation firewall. Another factor that distinguishes the NG Firewall from other such products in the market is that it combines network device filtering functions and traditional firewall technology.