Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Cases Against Thousands of Alleged BitTorrent Pirates Dismissed

Last year, Larry Flynt Publications filed lawsuits against several thousand “John Does” the company accused of illegally sharing its movie “This Ain’t Avatar XXX”. Now, following on from problems it had gaining identities of Does from ISP Time Warner, thousands of cases have been dismissed by a senior judge. The road to gaining settlements from allegedly infringing individuals has just […]

Manual LVM configuration guide for Debian 6

Manual LVM configuration guide for Debian 6

Debian is one of a handful of Linux distributions with support for setting up LVM, the Linux Logical Volume Manager. LVM brings a level of flexibility to disk management on Linux that is not possible with the traditional disk partitioning scheme. If your favorite Linux distribution supports LVM, I’ll always recommend that you use it instead of the traditional disk […]

Ministry saves millions by using open source office

The Estonian ministry of the Environment has save millions of Euro over the past ten years by using the open source suite of office application, OpenOffice, says Meelis Merilo, the head of the IT department at the ministry. Using the open source cost the ministry no more than 64.000 Euro over the past ten years, being simply the annual budget […]

Debian 6 installation and disk partitioning guide

Debian 6 installation and disk partitioning guide

Debian 6.0, aka Squeeze, is the latest release of Debian, a multi-purpose, GNU/Linux distribution. Like previous releases, Debian 6 (Debian 6 review) offers several installation methods and multiple disk partitioning schemes. Which installation method and disk partitioning scheme should you choose? It all depends on how you want to install your system. This article will help you evaluate the available […]

Some File-Sharers Leave Trails To Their Front Door

Following the publication of a paper which investigates how using the same username across multiple web sites may expose Internet users to scammers, TorrentFreak decided to apply the same research idea to a random sampling of file-sharers, with some eye-opening results. A team of researchers from the French National Institute of Computer Science (INRIA) has just published their study of […]

The Android Monopoly and how to harness it

From an underdog to ubiquitous manufacturer support, the Android platform has come a long way since its introduction in 2008. Almost every single device vendor (except for Apple and Nokia) has launched Android devices, while Sony Ericsson and Motorola are betting their margins and future on it. The phenomenal rally behind Android is – in a nutshell – due to […]

Qualcomm to Demonstrate New Peer-to-Peer Technology

Reflecting its continuing research and development into new connectivity models, Qualcomm Incorporated will demonstrate its newest advancement in peer-to-peer wireless technology at the GSMA Mobile World Congress, Feb. 14-17 in Barcelona. The Company’s technology innovation, called FlashLinq™, enables devices to discover each other automatically and continuously, and to communicate, peer-to-peer, at broadband speeds without the need for intermediary infrastructure. FlashLinq […]

European Parliament starts free software user group

One member of the European Parliament and a handful of their advisors and assistants started a free software group last Saturday, aiming to increase the use of free and open source software in the European Parliament’s IT infrastructure. The user group is open to all who works in the European Parliament, including staff and assistants working in political groups. The […]

Debian 6.0 “Squeeze” released

After 24 months of constant development, the Debian Project is proud to present its new stable version 6.0 (code name “Squeeze”). Debian 6.0 is a free operating system, coming for the first time in two flavours. Alongside Debian GNU/Linux, Debian GNU/kFreeBSD is introduced with this version as a “technology preview”. Debian 6.0 includes the KDE Plasma Desktop and Applications, the […]

How To Stop Domain Names Being Seized By The US Government

As the United States authorities continue with their domain name seizure policy, file-sharing, streaming and link site operators around the world are looking for ways to mitigate this aggressive action. To this end, an Internet engineer and website operator has put together a guide that might just help site owners avoid a whole heap of inconvenience in the future. This […]

How to secure your Wi-Fi devices and personal data

Here are a few key things that Wi-Fi users can do to secure their Wi-Fi devices and personal data: Set home Wi-Fi networks for WPA2™ security – Wi-Fi Protected Access® 2 (WPA2) is the latest in network security technology. It controls who connects to the network and encrypts data for privacy. It is important to note that the security level […]

Introducing Project Bretzn

Apart from being a tasty Bavarian bread-snack, Bretzn is the code-name for a collection of technology aimed at solving a problem which has existed in software development for a very long time: How do you get your applications to your users? This is particularly a question for the many developers of KDE applications that are not part of KDE’s six […]

Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals

The Egyptian regime’s shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked power over our Internet infrastructure, and puts a fine point on the risks to democracy posed by recent Congressional proposals to give the President a broad mandate to dictate how our internet service providers respond to cyber-emergencies. […]

Extend the Enterprise into the Cloud with Single Sign-On to Cloud-Based services

In this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage Cloud services. In fact, an organization accessing Cloud-based services without Single Sign-On risks increased exposure to security risks and the potential for increased IT Help Desk costs, as well the danger […]

Dual-booting Windows 7 and Ubuntu 10.10

Dual-booting Windows 7 and Ubuntu 10.10

This is the second article on dual-booting Windows 7 and Ubuntu 10.10 on a computer with one hard disk. The first, how to dual-boot Ubuntu 10.10 and Windows 7, showed how to accomplish the task with GRUB 2, the boot loader used by Ubuntu, installed on the Master Boot Record (MBR) of the hard disk. That is, GRUB is responsible […]

Who’s watching you?

Who’s watching you?

Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and becoming a victim of Internet fraud. Coinciding with global Data Privacy Day today, new survey research by Opera Software in the United States, Japan and Russia pulls back the curtain and looks under the bed at what […]

LibreOffice Portable, a Full-Featured Office Suite For USB, Removable and Cloud Drives

PortableApps.com and The Document Foundation are proud to announce the immediate availability of LibreOffice Portable 3.3, a portable version of the free productivity suite for Windows. LibreOffice Portable runs right from a USB flash drive or cloud drive and allows users to use a full-featured word processor, spreadsheet, presentation tool, database and drawing program on every PC with no installation […]

MasterCard’s Support for COICA Threatens A Free And Open Internet

In the last months of 2010, the WikiLeaks wars reminded transparency activists of something copyright and trademark lawyers know all too well – online speech is only as strong as the many service providers on which it depends. All too often web hosts, domain name registrars and other service providers cave at the slightest legal or government pressure, with disastrous […]

Google Starts Censoring BitTorrent, RapidShare and More

It’s taken a while, but Google has finally caved in to pressure from the entertainment industries including the MPAA and RIAA. The search engine now actively censors terms including BitTorrent, torrent, utorrent, RapidShare and Megaupload from its instant and autocomplete services. The reactions from affected companies and services are not mild, with BitTorrent Inc., RapidShare and Vodo all speaking out […]

Hardware, Software Advances Help Protect Operating Systems from Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer — or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked. At issue are security attacks in which an outside party […]