Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

Archive for January, 2011

Dual-booting Windows 7 and Ubuntu 10.10

Dual-booting Windows 7 and Ubuntu 10.10

This is the second article on dual-booting Windows 7 and Ubuntu 10.10 on a computer with one hard disk. The first, how to dual-boot Ubuntu 10.10 and Windows 7, showed how to accomplish the task with GRUB 2, the boot loader used by Ubuntu, installed on the Master Boot Record (MBR) of the hard disk. That is, GRUB is responsible […]

Who’s watching you?

Who’s watching you?

Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and becoming a victim of Internet fraud. Coinciding with global Data Privacy Day today, new survey research by Opera Software in the United States, Japan and Russia pulls back the curtain and looks under the bed at what […]

LibreOffice Portable, a Full-Featured Office Suite For USB, Removable and Cloud Drives

PortableApps.com and The Document Foundation are proud to announce the immediate availability of LibreOffice Portable 3.3, a portable version of the free productivity suite for Windows. LibreOffice Portable runs right from a USB flash drive or cloud drive and allows users to use a full-featured word processor, spreadsheet, presentation tool, database and drawing program on every PC with no installation […]

MasterCard’s Support for COICA Threatens A Free And Open Internet

In the last months of 2010, the WikiLeaks wars reminded transparency activists of something copyright and trademark lawyers know all too well – online speech is only as strong as the many service providers on which it depends. All too often web hosts, domain name registrars and other service providers cave at the slightest legal or government pressure, with disastrous […]

Google Starts Censoring BitTorrent, RapidShare and More

It’s taken a while, but Google has finally caved in to pressure from the entertainment industries including the MPAA and RIAA. The search engine now actively censors terms including BitTorrent, torrent, utorrent, RapidShare and Megaupload from its instant and autocomplete services. The reactions from affected companies and services are not mild, with BitTorrent Inc., RapidShare and Vodo all speaking out […]

Hardware, Software Advances Help Protect Operating Systems from Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer — or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked. At issue are security attacks in which an outside party […]

LibreOffice 3.3 released

The first stable release of the free office suite is available for download The Document Foundation launches LibreOffice 3.3, the first stable release of the free office suite developed by the community. In less than four months, the number of developers hacking LibreOffice has grown from less than twenty in late September 2010, to well over one hundred today. This […]

Search leakage is not FUD

Lately I’ve been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to the sites they click on. I hope to address those concerns in this post. For those of you who have no idea what I’m talking about: when you click on a link on the […]

Mozilla Leads the Way on Do Not Track

Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new privacy extension today, but we believe that Mozilla is now taking a clear lead and building a practical way forward for people who want privacy when they browse the web. Why We Need Do Not Track […]

Pardus 2011 review

Pardus 2011 review

Pardus is a desktop-oriented Linux distribution with roots in the National Research Institute of Electronics and Cryptology (UEKAE), Turkey. This article is a review of Pardus 2011, the latest stable release, which was made available for download on January 20, 2011. Installation: Pardus 2011 is the first stable release (of Pardus) to feature the newly redesigned YALI, the Pardus installation […]

Ten Billion Bits of Entanglement Achieved in Silicon

Scientists from Oxford University have made a significant step towards an ultrafast quantum computer by successfully generating 10 billion bits of quantum entanglement in silicon for the first time — entanglement is the key ingredient that promises to make quantum computers far more powerful than conventional computing devices. The researchers used high magnetic fields and low temperatures to produce entanglement […]

Neuroprivilogy: The New Frontier of Cyber Crime

The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Neuroprivilogy is constructed from the words neural (network) and privileged (access), and can be defined as the science of privileged access points’ networks. Using the neural network metaphor, an organization’s infrastructure is not flat, but instead, […]

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks […]

No double standards: supporting Google’s push for WebM

We’ve signed up as a supporter of the WebM Project, and we encourage other foundations and organizations to join us—write to webmaster @@@ webmproject.org to learn how. Today, we’re also urging Web site operators to distribute videos in the WebM format, and abandon H.264 Last week, Google announced that it plans to remove support for the H.264 video codec from […]

The Next Net

The moment the “net neutrality” debate began was the moment the net neutrality debate was lost. For once the fate of a network – its fairness, its rule set, its capacity for social or economic reformation – is in the hands of policymakers and the corporations funding them – that network loses its power to effect change. The mere fact […]

Zentyal Disaster Recovery service published

We’re excited to announce that today we are releasing a brand new service: Zentyal Disaster Recovery! This new subscription add-on allows you to store critical data safely in a remote location by using a very easy backup process. And in case you lose your Zentyal server due to a disaster, your data along with your system configuration is ready to […]

Researchers Identify ‘Facebook Neurons’

Carnegie Mellon University researchers have found that within the brain’s neocortex lies a subnetwork of highly active neurons that behave much like people in social networks. Like Facebook, these neuronal networks have a small population of highly active members who give and receive more information than the majority of other members, says Alison Barth, associate professor of biological sciences at […]

Open Source community building: a guide to getting it right

Community development in open source software is not just for geeks in sandals nor for niche Linux companies any more. It’s mainstream and it’s here to stay. The recent analysis of companies contributing code to the Linux kernel shows that large companies including Novell, IBM, Intel, Nokia and Texas Instruments are getting serious about engaging in community development. Organisations such […]

How to install Linux Mint Debian Edition on an encrypted LVM file system

How to install Linux Mint Debian Edition on an encrypted LVM file system

Linux Mint Debian Edition (LMDE) is the edition of Linux Mint that is based on Debian Testing. Like the edition of Linux Mint based on Ubuntu, the installer of LMDE lacks support for LVM, and disk encryption. This tutorial presents a detailed guide on how to install LMDE on an encrypted LVM file system. But how is that possible if […]