Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

LibreOffice 3.3 released

The first stable release of the free office suite is available for download The Document Foundation launches LibreOffice 3.3, the first stable release of the free office suite developed by the community. In less than four months, the number of developers hacking LibreOffice has grown from less than twenty in late September 2010, to well over one hundred today. This […]

Search leakage is not FUD

Lately I’ve been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to the sites they click on. I hope to address those concerns in this post. For those of you who have no idea what I’m talking about: when you click on a link on the […]

Mozilla Leads the Way on Do Not Track

Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new privacy extension today, but we believe that Mozilla is now taking a clear lead and building a practical way forward for people who want privacy when they browse the web. Why We Need Do Not Track […]

Ten Billion Bits of Entanglement Achieved in Silicon

Scientists from Oxford University have made a significant step towards an ultrafast quantum computer by successfully generating 10 billion bits of quantum entanglement in silicon for the first time — entanglement is the key ingredient that promises to make quantum computers far more powerful than conventional computing devices. The researchers used high magnetic fields and low temperatures to produce entanglement […]

Neuroprivilogy: The New Frontier of Cyber Crime

The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Neuroprivilogy is constructed from the words neural (network) and privileged (access), and can be defined as the science of privileged access points’ networks. Using the neural network metaphor, an organization’s infrastructure is not flat, but instead, […]

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks […]

No double standards: supporting Google’s push for WebM

We’ve signed up as a supporter of the WebM Project, and we encourage other foundations and organizations to join us—write to webmaster @@@ webmproject.org to learn how. Today, we’re also urging Web site operators to distribute videos in the WebM format, and abandon H.264 Last week, Google announced that it plans to remove support for the H.264 video codec from […]

The Next Net

The moment the “net neutrality” debate began was the moment the net neutrality debate was lost. For once the fate of a network – its fairness, its rule set, its capacity for social or economic reformation – is in the hands of policymakers and the corporations funding them – that network loses its power to effect change. The mere fact […]

Zentyal Disaster Recovery service published

We’re excited to announce that today we are releasing a brand new service: Zentyal Disaster Recovery! This new subscription add-on allows you to store critical data safely in a remote location by using a very easy backup process. And in case you lose your Zentyal server due to a disaster, your data along with your system configuration is ready to […]

Researchers Identify ‘Facebook Neurons’

Carnegie Mellon University researchers have found that within the brain’s neocortex lies a subnetwork of highly active neurons that behave much like people in social networks. Like Facebook, these neuronal networks have a small population of highly active members who give and receive more information than the majority of other members, says Alison Barth, associate professor of biological sciences at […]

Open Source community building: a guide to getting it right

Community development in open source software is not just for geeks in sandals nor for niche Linux companies any more. It’s mainstream and it’s here to stay. The recent analysis of companies contributing code to the Linux kernel shows that large companies including Novell, IBM, Intel, Nokia and Texas Instruments are getting serious about engaging in community development. Organisations such […]

How to install Linux Mint Debian Edition on an encrypted LVM file system

How to install Linux Mint Debian Edition on an encrypted LVM file system

Linux Mint Debian Edition (LMDE) is the edition of Linux Mint that is based on Debian Testing. Like the edition of Linux Mint based on Ubuntu, the installer of LMDE lacks support for LVM, and disk encryption. This tutorial presents a detailed guide on how to install LMDE on an encrypted LVM file system. But how is that possible if […]

Technique Turns Computer Chip Defects Into an Advantage

Physicists at Ohio State University have discovered that tiny defects inside a computer chip can be used to tune the properties of key atoms in the chip. The technique, which they describe in the journal Science, involves rearranging the holes left by missing atoms to tune the properties of dopants — the chemical impurities that give the semiconductors in computer […]

The most important work for freedom that this culture has seen in generations

“The Free Software Foundation and Richard Stallman’s work represents the most important work for freedom that this culture, the American culture, has seen in many many generations because it takes the ideas of freedom and it removes it from the ivory tower, and it removes it from lawyers, and places it in a community—a technology community—that is one of the […]

Geinimi, Sophisticated New Android Trojan Found in Wild

The Threat: A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild […]

The top 10 best Android games of 2010

The history books will doubtless look back on 2010 as the year the whole Google mobile platform idea really took off. As the year closes out, the quality of handsets from the likes of HTC, Samsung, Motorola, and even LG is uniformly strong. The Android OS itself, too, has benefited from the (occasionally maddening) iterative approach Google has adopted. The […]

Manual disk partitioning guide for Linux Mint Debian Edition

Manual disk partitioning guide for Linux Mint Debian Edition

Linux Mint Debian Edition, or LMDE, is the edition of Linux Mint based on Debian Testing. The latest release was made available for download on December 24, 2010. The installation program on this edition is similar to the Ubiquity installation program, which is used on the main edition, the one based on Ubuntu. But while the Ubiquity installation program incorporates […]

Wikileaks Mirror Taken Down: Host Buckles Under Demands from Upstream Provider

Wikileaks isn’t the only site struggling to stay up these days because service providers are pulling their support. It appears that at least one person who wants to provide mirror access to Wikileaks documents is having the same trouble. Recently we heard from a user who mirrored the Cablegate documents on his website. His hosting provider SiteGround suspended his account, […]

Feed-forward clock synchronization algorithms project

The FreeBSD Foundation is pleased to announce that Julien Ridoux and Darryl Veitch at the University of Melbourne have been awarded a grant to implement support of feed-forward clock synchronization algorithms. The Network Time Protocol (NTP) is widely used for synchronization over the network and the ntpd daemon is the current reference synchronization algorithm. The system clock in FreeBSD is […]

Catching Video Pirates: Invisible DNA-Like Fingerprint on Video Assist Law Enforcement

You know when you’re watching a pirated film downloaded from the Internet — there’s no mistaking the fuzzy footage, or the guy in the front row getting up for popcorn. Despite the poor quality, pirated video is a serious problem around the world. Criminal copyright infringement occurs on a massive scale over the Internet, costing the film industry — and […]