Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality
Manual disk partitioning guide for Linux Mint Debian Edition

Manual disk partitioning guide for Linux Mint Debian Edition

Linux Mint Debian Edition, or LMDE, is the edition of Linux Mint based on Debian Testing. The latest release was made available for download on December 24, 2010. The installation program on this edition is similar to the Ubiquity installation program, which is used on the main edition, the one based on Ubuntu. But while the Ubiquity installation program incorporates […]

Wikileaks Mirror Taken Down: Host Buckles Under Demands from Upstream Provider

Wikileaks isn’t the only site struggling to stay up these days because service providers are pulling their support. It appears that at least one person who wants to provide mirror access to Wikileaks documents is having the same trouble. Recently we heard from a user who mirrored the Cablegate documents on his website. His hosting provider SiteGround suspended his account, […]

Feed-forward clock synchronization algorithms project

The FreeBSD Foundation is pleased to announce that Julien Ridoux and Darryl Veitch at the University of Melbourne have been awarded a grant to implement support of feed-forward clock synchronization algorithms. The Network Time Protocol (NTP) is widely used for synchronization over the network and the ntpd daemon is the current reference synchronization algorithm. The system clock in FreeBSD is […]

Catching Video Pirates: Invisible DNA-Like Fingerprint on Video Assist Law Enforcement

You know when you’re watching a pirated film downloaded from the Internet — there’s no mistaking the fuzzy footage, or the guy in the front row getting up for popcorn. Despite the poor quality, pirated video is a serious problem around the world. Criminal copyright infringement occurs on a massive scale over the Internet, costing the film industry — and […]

Online Access With a Fingerprint

A new service developed by a researcher at the University of Southampton makes it possible for users to maintain multiple online accounts using a scan of their fingerprint as a password. The new service, FingerID , has been developed by Sara Alotaibi, who has just completed a Masters degree in Web Technology at the University’s School of Electronics and Computer […]

Backdoor in OpenBSD’s IPSEC stack?

This following is the email exchange between Theo de Raadt and Gregory Perry. Theo is the lead coder of OpenBSD, and Gregory was a former contributor to the project. This segment is Theo’s alarm to the community: I have received a mail regarding the early development of the OpenBSD IPSEC stack. It is alleged that some ex-developers (and the company […]

Puglia region makes open source and standards mandatory

The Italian region Puglia will make the use of open source software and open standards mandatory for its public administrations. A law, adopted on 2 December by the regional administration, instructs regional and local public administrations to use open formats for the electronic disseminations of documents, and wherever possible use free and open source software. According to the law, public […]

Biological Computers: Genetically Modified Cells Communicate Like Electronic Circuits

Genetically modified cells can be made to communicate with each other as if they were electronic circuits. Using yeast cells, a group of researchers at the University of Gothenburg, Sweden, has taken a groundbreaking step towards being able to build complex systems in the future where the body’s own cells help to keep us healthy. The study was presented recently […]

Why I will not buy Google’s Cr-48 Chrome Notebook

The Cr-48 is Google’s cloud-based notebook computer. It was announced just this week, and is being made available to a select few. In computer-speak, it is still in beta status, with the stable version expected sometime next year. Other than through screenshots from other bloggers and from the official website, I have not actually seen the Cr-48. However, handling the […]

Android Touch-Event Hijacking

With the recent release of Android 2.3 (Gingerbread), developers can now protect themselves from a new twist on an old bug: TapJacking. Like ClickJacking on the web, TapJacking occurs when a malicious application displays a fake user interface that seems like it can be interacted with, but actually passes interaction events such as finger taps to a hidden user interface […]

How to dual-boot Linux Mint 10 and Windows 7

How to dual-boot Linux Mint 10 and Windows 7

This is the latest in a series of tutorials that has been published on this site on how to dual-boot Windows 7 and Linux distributions. Previous articles published on this subject are how to dual-boot Fedora 14 and Windows 7 and how to dual-boot Ubuntu 10.10 and Windows 7. This article presents a step by step guide on how to […]

Join EFF in Standing up Against Internet Censorship

Over the past few weeks, we here at EFF have watched as whistleblowing website WikiLeaks has fueled an emotionally charged debate about the secrecy of government information and the people’s right to know. We have welcomed this debate, and the fact that there have been myriad views is the embodiment of the freedom of expression upon which this country was […]

The Internet Society on the Wikileaks issue

Recently, we have witnessed the effective disappearance from the Internet of a website made infamous through international press coverage and political intrigue. The Internet Society is founded upon key principles of free expression and non discrimination that are essential to preserve the openness and utility of the Internet. We believe that this incident dramatically illustrates that those principles are currently […]

ISPs Free To Continue Deleting Evidence Against File-Sharers

Sweden’s highest court has rejected an application by an anti-piracy group which would force an ISP to hand over the identity of a file-sharing site operator. Antipiratbyrån wants TeliaSonera to reveal who is behind the SweTorrents BitTorrent tracker but the ISP has refused and taken its case all the way to the Supreme Court. That Court has now decided that […]

E-Book Buyer’s Guide to E-Book Privacy

With the 2010 holidays upon us, it’s time to update EFF’s E-Book Buyer’s Guide to E-Book Privacy, which summarizes and comments on the privacy-related policies of several e-readers. What’s new. We’ve added in the iPad and also added in the software used by many libraries and devices for e-book access, made by Adobe called Adobe Content Server. Adobe doesn’t keep […]

Profiling Based on Mobile, Online Behavior: A Privacy Issue

It’s illegal for businesses and law enforcement to profile a person based on their race, gender, or ethnicity, yet millions of Americans are being profiled every day based on their online consumer behavior and demographics. Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated. The result, according to two recent articles in the journal […]

Android 2.3 Platform and Updated SDK Tools

Today we’re announcing a new version of the Android platform — Android 2.3 (Gingerbread). It includes many new platform technologies and APIs to help developers create great apps. Some of the highlights include: Enhancements for game development: To improve overall responsiveness, we’ve added a new concurrent garbage collector and optimized the platform’s overall event handling. We’ve also given developers native […]

Bringing the ‘social’ out of the operator walled gardens

A ‘walled garden’ is the term aptly applied to the last decade of mobile operator services. And Facebook is the generic name aptly applied to the social network revolution of our times. Wikipedia defines ‘walled gardens’ as referring “to a carrier’s or service provider’s control over applications, content, and media on platforms … and restriction of convenient access to non-approved […]

5 netbook-optimized desktop interfaces for Linux and BSD distributions

5 netbook-optimized desktop interfaces for Linux and BSD distributions

This article provides some information on five netbook-optimized desktop interfaces available for Linux and BSD desktop distributions. They are presented here in alphabetical order. Jolicloud: Jolicloud is the interface on the cloud-based Linux distribution that goes by the same name. Jolicloud 1.0, the first stable release, is based on the desktop edition of Ubuntu 9.04. The next stable release, Jolicloud […]

Amazon and WikiLeaks – Online Speech is Only as Strong as the Weakest Intermediary

The First Amendment to the Constitution guarantees freedom of expression against government encroachment – but that doesn’t help if the censorship doesn’t come from the government. The controversial whistle-blower website WikiLeaks, which has begun to publish a trove of over 250,000 classified diplomatic cables, found itself kicked off of Amazon’s servers earlier this week. WikiLeaks had apparently moved from a […]