Language Selection

English French German Italian Portuguese Spanish

Humor

The Microsoft Commandments

Filed under
Humor

Microsoft B0rg

  1. Thou shalt not host a FOSS project outside GitHub (otherwise it won’t ‘count’)
  2. Thou shalt not edit code without Visual Studio (which now has an “open” — albeit spying and malicious — component for openwashing purposes)
  3. Thou shalt not code without .NET (or Mono)
  4. Thou shalt not use a voting machine without Windows (we have just announced some openwashing component to make up for the NSA back doors that compromise elections worldwide)
  5. Thou shalt not boot GNU/Linux as a standalone operating system (UEFI might not permit this anyway, unless we sign for approval)
  6. Thou shalt not get get a GNU/Linux distribution outside our Store
  7. Thou shalt not buy a computer without Windows preinstalled; those are “naked PCs” and everyone who buys such PCs is a “pirate”
  8. Thou shalt not disparage or even publicly criticise our staff (that would be in violation of GitHub rules, a Code of Conduct, T&C and so on)
  9. Thou shalt not report back doors in our software or leak NSA tools that take advantage of these (there’s a prison sentence for doing so)
  10. Thou shalt not write in mass media things that refute our narrative (proving that we are chronic liars); we would bribe the publication using advertising money and have you sacked
  11. Thou shalt not use open formats such as OpenDocument except inside Microsoft Office, which is incompatible with all other software (by design)
  12. Thou shalt not distribute Linux without paying Microsoft for patents; we’re still suing companies (in 2019) for having the audacity to do so
  13. Thou shalt not host a site or a service outside Azure; we'd sic patent trolls at you
  14. Thou shalt not oppose Microsoft’s lock-in and proprietary software shims inside Linux; we’d send our media partners (Condé Nast) to oust you, at least for a month if not permanently
  15. Thou shalt not report our crimes to the authorities; doing so would make you a “toxic”, “intolerant” person
  16. Thou shalt not use the GPL unless all other options have been exhausted
  17. Thou shalt not adopt a Web browser other than MSIE or our rebranded Chrome, also known as Edge; we’d occasionally tinker with your computer’s settings to remind you to quit using other browsers or refuse the download of such “malware”

Observations of a Egotistical Technical Elitist

Filed under
Humor

Lets be honest, the title alone sets the tone of this post, so please no comments stating i'm an elitist snob, because this i'm am keenly aware of. However a touch of honesty now and again does tend to go a long way.

So what's the problem? Well there are more than one and they grind me down on a daily basis, so it's time to air them here and these are all tech issues..

So lets start with...

2012 Year of the Linux Desktop

Filed under
Humor

I declare 2012 the Year of the Linux Desktop! At least on my computer. Smile

Happy Birthday Susan aka srlinuxx

Filed under
Humor

Happy Birthday Susan aka srlinuxx!!! I can't believe you are 39 yet again! Big Grin Hope you have a great day and a prosperous New Year.

Big oops! Leo Laporte posts love affair online.

Filed under
Humor

Big oops!!! Leo Laporte delivers technology advice to millions managed to broadcast an explicit Google chat with his lover, exposing the affair he's apparently been carrying on with his CEO.

http://gawker.com/5870610/how-the-voice-of-tech-leaked-his-own-sex-chat

Looks like someone has been very very naughty! LOL

Find His Porn: Evil Website of the Week

Filed under
Humor

Just found this on Read Write Web...

Here's our nominee for most evil Web service of the week:FindHisPorn.com. For a one-time low price of $49.99 only $19.95! Limited time offer!, you can allow a dubious piece of Java voodoo onto your PC (Windows only) and let it scrape the contents of your hard drive and show you all the porn it finds. It's just perfect for spying on that special someone in your life.

Find His Porn is cynically exploiting the paranoid and freaked-out, violating privacy, jeopardizing security and taking people's money. It has been created under a total veil of secrecy. Oh, it's also "perfect for ✓ Boyfriends, ✓ Husbands and ✓ Kids" with the "goal of empowering women everywhere." With its marketing finely tuned, Find His Porn profits off of people's engrained norms, broken trust and technical ignorance

Read more...

*A Cow based Economics Lesson;

Filed under
Humor

SOCIALISM
You have 2 cows.
You give one to your neighbor.

COMMUNISM
You have 2 cows.
The State takes both and gives you some milk.

FASCISM
You have 2 cows.
The State takes both and sells you some milk.

There are more...

Mozilla forms partnership with Tylenol

Filed under
Humor

Firefox product manager Asa Dotzler said today that Mozilla has formed a partnership with Tylenol. This is in response to the business community after complaints that Mozilla's new "Rapid Release" development cycle will cause headaches for IT managers. So starting today all users who download Firefox 5.0 will also get a coupon for a discount off of Tylenol's "Rapid Release" Gel tablets.

Truths

Filed under
Humor

My sister forwarded this to me and since things are so dismal in the world these days, I thought a few chuckles might be the order of the day.

Happy Holidays

Filed under
Humor

To All My Democrat Friends:

Please accept with no obligation, implied or implicit, my best wishes for an environmentally conscious, socially responsible, low-stress, non-addictive, gender-neutral celebration of the winter solstice holiday, practiced within the most enjoyable traditions of the religious persuasion of your choice, or secular practices of your choice, with respect for the religious/secular persuasion and/or traditions of others, or their choice not to practice religious or secular traditions at all. I also wish you a fiscally successful, personally fulfilling and medically uncomplicated recognition of the onset of the generally accepted calendar year 2011, but not without due respect for the calendars of choice of other cultures whose contributions to society have helped make America great. Not to imply that America is necessarily greater than any other country nor the only America in the Western Hemisphere . Also, this wish is made without regard to the race, creed, color, age, physical ability, religious faith or sexual preference of the wishee.

To My Republican Friends:

Merry Christmas and a Happy New Year!

Syndicate content

More in Tux Machines

Database News on YugaByte Going for Apache 2.0 Licence

  • YugaByte Becomes 100% Open Source Under Apache 2.0 License

    YugaByte, a provider of open source distributed SQL databases, announced that YugaByte DB is now 100% open source under the Apache 2.0 license, bringing previously commercial features into the open source core. The transition breaks the boundaries between YugaByte’s Community and Enterprise editions by bringing previously commercial-only, closed-source features such as Distributed Backups, Data Encryption, and Read Replicas into the open source core project distributed under the permissive Apache 2.0 license. Starting immediately, there is only one edition of YugaByte DB for developers to build their business-critical, cloud-native applications.

  • YugaByte's Apache 2.0 License Delivers 100% Open Source Distributed SQL Database

    YugaByte, the open source distributed SQL databases comapny, announced that YugaByte DB is now 100 percent open source under the Apache 2.0 license, bringing previously commercial features into the open source core. The move, in addition to other updates available now through YugaByte DB 1.3, allows users to more openly collaborate across what is now the world’s most powerful open source distributed SQL database.

  • SD Times Open-Source Project of the Week: YugaByte DB

    This week’s SD Times Open Source Project of the Week is the newly open-sourced YugaByte DB, which allows users to better collaborate on the distributed SQL database. The move to the open-source core project distributed under the Apache 2.0 license makes previously closed-sourced features such as distributed backups, data encryption and read replicas more accessible, according to the team. By doing this, YugaByte plans to break the boundaries between YugaByte’s Community and Enterprise editions. “YugaByte DB combines PostgreSQL’s language breadth with Oracle-like reliability, but on modern cloud infrastructure. With our licensing changes, we have removed every barrier that developers face in adopting a business-critical database and operations engineers face in running a fleet of database clusters, with extreme ease,” said Kannan Muthukkaruppan, co-founder and CEO of YugaByte.

Programming: Ruby, NativeScript, Python, Rust/C/C++ FUD From Microsoft

Security Leftovers

  • Alas, Poor PGP

    The first is an assertion that email is inherently insecure and can’t be made secure. There are some fairly convincing arguments to be made on that score; as it currently stands, there is little ability to hide metadata from prying eyes. And any format that is capable of talking on the network — as HTML is — is just begging for vulnerabilities like EFAIL. But PGP isn’t used just for this. In fact, one could argue that sending a binary PGP message as an attachment gets around a lot of that email clunkiness — and would be right, at the expense of potentially more clunkiness (and forgetfulness). What about the web-of-trust issues? I’m in agreement. I have never really used WoT to authenticate a key, only in rare instances trusting an introducer I know personally and from personal experience understand how stringent they are in signing keys. But this is hardly a problem for PGP alone. Every encryption tool mentioned has the problem of validating keys. The author suggests Signal. Signal has some very strong encryption, but you have to have a phone number and a smartphone to use it. Signal’s strength when setting up a remote contact is as strong as SMS. Let that disheartening reality sink in for a bit. (A little social engineering could probably get many contacts to accept a hijacked SIM in Signal as well.) How about forward secrecy? This is protection against a private key that gets compromised in the future, because an ephemeral session key (or more than one) is negotiated on each communication, and the secret key is never stored. This is a great plan, but it really requires synchronous communication (or something approaching it) between the sender and the recipient. It can’t be used if I want to, for instance, burn a backup onto a Bluray and give it to a friend for offsite storage without giving the friend access to its contents. There are many, many situations where synchronous key negotiation is impossible, so although forward secrecy is great and a nice enhancement, we should assume it to be always applicable. [...] My current estimate is that there’s no magic solution right now. The Sequoia PGP folks seem to have a good thing going, as does Saltpack. Both projects are early in development, so as a privacy-concerned person, should you trust them more than GPG with appropriate options? That’s really hard to say.

  • Armadillo Is An Open-Source “USB Firewall” Device To Protect You Against USB Attacks

    Exchanging data using USB devices is something that we do on a daily basis. But how often do you think that the next USB device that you’ll plug into your PC’s port could be malicious? In the past, researchers have unveiled 29 types of USB attacks that could compromise your sensitive data by simply plugging in a USB device. Globotron’s Armadillo is a device that you could use to protect yourself from USB attacks.

  • Open source solutions in autonomous driving: safety is more than an afterthought [Ed: A lot less likely to contain back doors, unlike proprietary software where this has become rather 'standard' a 'feature']

    In the automotive industry, in-vehicle infotainment (IVI) systems were one of the early adopters of open source operating systems, namely Linux. Today’s innovation and success with IVIs can largely be attributed to this approach. Collaborative efforts such as the GENIVI Alliance and Automotive Grade Linux—where automakers, suppliers, and their competitors agree to share common elements of the IVI software stack—are enabling rapid development in this area.

  • New open source solution reduces the risks associated with cloud deployments [Ed: This is an inherently flawed kind of logic because if you handed over control to AWS, then the Pentagon already controls everything and thus you have zero security, you're 'pwned' by definition]

    The Galahad software will be deployed to AWS and provides a nested hypervisor on AWS instances. There, it will monitor role-based virtual machines virtually across all levels of the application stack including the docker container: the basic unit of software that packages an application to run quickly between computing environments.

  • Open-Source Exploit: Private Keys in MyDashWallet Exposed for Two Months- Users Should Move Funds Immediately [Ed: Highly misleading headline. This has nothing to do with "Open Source"; it's about some fool who uploaded private keys]

    The private keys of Dash crypto coins being held in online software “hot wallet” called MyDashWallet have been exposed to hackers for two months, and anyone using the wallet should immediately move funds out. A “hot wallet” is any cryptocurrency software “wallet” connected to the Internet.

Devices: 'IoT', SparkFun and Beelink L55

  • Top 20 Best Internet of Things Projects (IoT Projects) That You can Make Right Now

    Internet of Things (IoT) is a new predominant technology for this advanced world. This technology can change the lifestyle people lead. Question is what the Internet of Things is? IoT can be described as a network of physical objects connected through the internet. Physical objects could be anything that contains embedded electronics, software, sensor, etc. with the internet. Using the IP addresses, those smart objects can exchange data among the network and can make a decision. A significant number of researches is going on over the IoT trends and projects. In this article, we will talk about a few IoT project ideas based on standard IoT protocols, so that readers get the basic knowledge about the Internet of Things. These internet of things example are keen, useful, and interesting to build.

  • Open-Source SparkFun Module Supports Low-Power TensorFlow Machine Learning

    SparkFun has released the SparkFun Artemis, Engineering Version, an open-source embedded development kit that supports the TensorFlow machine learning environment. Designed for toolchain-agnostic, low-power machine learning development, the 15.5 mm x 10.5 mm Artemis board includes... [...] In addition to a secure firmware update system, flexible, serial peripherals, a suite of clock sources, and camera compatibility, the Artemis board features large SMD pads that support carrier board implementations. SparkFun has launched three carrier boards in conjunction with the release of the Artemis, Engineering version board: the BlackBoard Artemis (Arduino Uno footprint); BlackBoard Artemis Nano (smallest form factor); and BlackBoard Artemis ATP (with 48 GPIO pins).

  • Beelink L55 Review – An Intel Core i3-5005U Mini PC Tested with Windows 10 & Ubuntu 18.04

    With the shortage of Gemini Lake processors, some manufacturers have taken to releasing new mini PCs using older CPUs