Language Selection

English French German Italian Portuguese Spanish


How long has open source been part of your life?

Filed under

FSF, other groups join EFF to sue NSA over unconstitutional surveillance

Filed under
Legal The Free Software Foundation (FSF) today joined eighteen other activist and advocacy organizations in challenging the National Security Agency's (NSA) mass surveillance of telecommunications in the United States with a lawsuit filed by the Electronic Frontier Foundation (EFF).

Bill Gates Thanks God for Free Software

Filed under
  • Bill Gates Thanks God for Free Software
  • Annual OSS World Challenge
  • Getting the Maximum Benefit from Free and Open Source Software
  • FLOSS Works. It’s The Right Way To Do IT
  • GitHub Gets Smart Over Open Source Licences

Cancel Netflix if you value freedom

Filed under
Web For the last few months, we've been raising an outcry against Encrypted Media Extensions (EME), a plan by Netflix and a block of other media and software companies to squeeze support for Digital Restrictions Management (DRM) into the HTML standard.

open source news this week: july 8 - 12

Filed under
OSS Open source news this week: July 8 - 12, 2013: * Farm it. Build it. Manufacture it. The folks at Open Source Ecology are embarking on an open source project to develop 50 industrial machines ranging from a backhoe to a bakery oven.

Open source downloads are an endangered species

Filed under
OSS With recent news that GitHub is banning storage of any file over 100Mb and discouraging files larger than 50Mb, their retreat from offering download services is complete. It's not a surprising trend; dealing with downloads is unrewarding and costly.

With any luck, you don’t have an open source policy!

Filed under
OSS With component usage skyrocketing, shouldn't every organization have an open source governance policy? My experience shows this is not the case. And as a developer, if you don't have a policy, consider yourself lucky!

Top open source network management tools

Filed under
OSS As networking continues to expand and diversify, encompassing a growing number of wired and wireless devices, the demand for network monitoring tools remains high. While feature-packed commercial products abound, the growing market for monitoring tools has also fueled robust offerings from the open source community.

Stallman on Operating System Security and Web Anonymity

Filed under
OSS The latest Stallman interview, which deals with NSA involvement in Microsoft Windows and how to use search engines anonymously

Syndicate content

More in Tux Machines

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)