Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

Category: Commentary

BitMate: A BitTorrent Client for Poor Bandwidth People

itTorrent is an excellent tool for sharing large files online, which is why millions of people use it every day. In developing third world countries, however, BitTorrent usage falls far behind, mainly because the transfer speeds are not that great on low bandwidth connections. Thanks to a new BitTorrent client, funded by a grant from the U.S. State Department, this […]

Android Malware DroidDream: How it Works

Yesterday, Google pulled more than 50 apps from the Android Market after they were found to contain the Android malware dubbed DroidDream. Similar to previous instances of Android malware that have been found on alternative Android app markets, the authors of DroidDream hid the malware in seemingly legitimate applications to trick unsuspecting users into downloading the malware—a growing trend in […]

Animation in Honeycomb

One of the new features ushered in with the Honeycomb release is a new animation system, a set of APIs in a whole new package (android.animation) that makes animating objects and properties much easier than it was before. “But wait!” you blurt out, nearly projecting a mouthful of coffee onto your keyboard while reading this article, “Isn’t there already an […]

Is Microsoft buying Nokia? An analysis of the acquisition endgame

The Elop and Ballmer duo on stage on February 11th was the main topic of discussion at this year’s Mobile World Congress. The reverberations of the Microsoft-Nokia announcement were felt even by the huge green robot tucked away at Google’s stand in Hall 8. Following the news of the Nokia and Microsoft tie-up, Stephen Elop’s appointment to the helm of […]

Controlling a Computer With Thoughts?

Researchers at the University of Pittsburgh have been awarded funding for two projects that will place brain-computer interfaces (BCI) in patients with spinal cord injuries to test if it is possible for them to control external devices, such as a computer cursor or a prosthetic limb, with their thoughts. The projects build upon ongoing research conducted in epilepsy patients who […]

Some File-Sharers Leave Trails To Their Front Door

Following the publication of a paper which investigates how using the same username across multiple web sites may expose Internet users to scammers, TorrentFreak decided to apply the same research idea to a random sampling of file-sharers, with some eye-opening results. A team of researchers from the French National Institute of Computer Science (INRIA) has just published their study of […]

The Android Monopoly and how to harness it

From an underdog to ubiquitous manufacturer support, the Android platform has come a long way since its introduction in 2008. Almost every single device vendor (except for Apple and Nokia) has launched Android devices, while Sony Ericsson and Motorola are betting their margins and future on it. The phenomenal rally behind Android is – in a nutshell – due to […]

How To Stop Domain Names Being Seized By The US Government

As the United States authorities continue with their domain name seizure policy, file-sharing, streaming and link site operators around the world are looking for ways to mitigate this aggressive action. To this end, an Internet engineer and website operator has put together a guide that might just help site owners avoid a whole heap of inconvenience in the future. This […]

Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals

The Egyptian regime’s shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked power over our Internet infrastructure, and puts a fine point on the risks to democracy posed by recent Congressional proposals to give the President a broad mandate to dictate how our internet service providers respond to cyber-emergencies. […]

Extend the Enterprise into the Cloud with Single Sign-On to Cloud-Based services

In this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage Cloud services. In fact, an organization accessing Cloud-based services without Single Sign-On risks increased exposure to security risks and the potential for increased IT Help Desk costs, as well the danger […]

Who’s watching you?

Who’s watching you?

Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and becoming a victim of Internet fraud. Coinciding with global Data Privacy Day today, new survey research by Opera Software in the United States, Japan and Russia pulls back the curtain and looks under the bed at what […]

MasterCard’s Support for COICA Threatens A Free And Open Internet

In the last months of 2010, the WikiLeaks wars reminded transparency activists of something copyright and trademark lawyers know all too well – online speech is only as strong as the many service providers on which it depends. All too often web hosts, domain name registrars and other service providers cave at the slightest legal or government pressure, with disastrous […]

Google Starts Censoring BitTorrent, RapidShare and More

It’s taken a while, but Google has finally caved in to pressure from the entertainment industries including the MPAA and RIAA. The search engine now actively censors terms including BitTorrent, torrent, utorrent, RapidShare and Megaupload from its instant and autocomplete services. The reactions from affected companies and services are not mild, with BitTorrent Inc., RapidShare and Vodo all speaking out […]

Search leakage is not FUD

Lately I’ve been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to the sites they click on. I hope to address those concerns in this post. For those of you who have no idea what I’m talking about: when you click on a link on the […]

Mozilla Leads the Way on Do Not Track

Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new privacy extension today, but we believe that Mozilla is now taking a clear lead and building a practical way forward for people who want privacy when they browse the web. Why We Need Do Not Track […]

Neuroprivilogy: The New Frontier of Cyber Crime

The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Neuroprivilogy is constructed from the words neural (network) and privileged (access), and can be defined as the science of privileged access points’ networks. Using the neural network metaphor, an organization’s infrastructure is not flat, but instead, […]

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks […]

No double standards: supporting Google’s push for WebM

We’ve signed up as a supporter of the WebM Project, and we encourage other foundations and organizations to join us—write to webmaster @@@ webmproject.org to learn how. Today, we’re also urging Web site operators to distribute videos in the WebM format, and abandon H.264 Last week, Google announced that it plans to remove support for the H.264 video codec from […]

The Next Net

The moment the “net neutrality” debate began was the moment the net neutrality debate was lost. For once the fate of a network – its fairness, its rule set, its capacity for social or economic reformation – is in the hands of policymakers and the corporations funding them – that network loses its power to effect change. The mere fact […]

Open Source community building: a guide to getting it right

Community development in open source software is not just for geeks in sandals nor for niche Linux companies any more. It’s mainstream and it’s here to stay. The recent analysis of companies contributing code to the Linux kernel shows that large companies including Novell, IBM, Intel, Nokia and Texas Instruments are getting serious about engaging in community development. Organisations such […]