News & Tutorials

Qualcomm to Demonstrate New Peer-to-Peer Technology

Reflecting its continuing research and development into new connectivity models, Qualcomm Incorporated will demonstrate its newest advancement in peer-to-peer wireless technology at the GSMA Mobile World Congress, Feb. 14-17 in Barcelona. The Company’s technology innovation, called FlashLinq™, enables devices to discover each other automatically and continuously, and to communicate, peer-to-peer, at broadband speeds without the need for intermediary infrastructure. FlashLinq […]

European Parliament starts free software user group

One member of the European Parliament and a handful of their advisors and assistants started a free software group last Saturday, aiming to increase the use of free and open source software in the European Parliament’s IT infrastructure. The user group is open to all who works in the European Parliament, including staff and assistants working in political groups. The […]

Debian 6.0 “Squeeze” released

After 24 months of constant development, the Debian Project is proud to present its new stable version 6.0 (code name “Squeeze”). Debian 6.0 is a free operating system, coming for the first time in two flavours. Alongside Debian GNU/Linux, Debian GNU/kFreeBSD is introduced with this version as a “technology preview”. Debian 6.0 includes the KDE Plasma Desktop and Applications, the […]

How To Stop Domain Names Being Seized By The US Government

As the United States authorities continue with their domain name seizure policy, file-sharing, streaming and link site operators around the world are looking for ways to mitigate this aggressive action. To this end, an Internet engineer and website operator has put together a guide that might just help site owners avoid a whole heap of inconvenience in the future. This […]

How to secure your Wi-Fi devices and personal data

Here are a few key things that Wi-Fi users can do to secure their Wi-Fi devices and personal data: Set home Wi-Fi networks for WPA2™ security – Wi-Fi Protected Access® 2 (WPA2) is the latest in network security technology. It controls who connects to the network and encrypts data for privacy. It is important to note that the security level […]

Introducing Project Bretzn

Apart from being a tasty Bavarian bread-snack, Bretzn is the code-name for a collection of technology aimed at solving a problem which has existed in software development for a very long time: How do you get your applications to your users? This is particularly a question for the many developers of KDE applications that are not part of KDE’s six […]

Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals

The Egyptian regime’s shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked power over our Internet infrastructure, and puts a fine point on the risks to democracy posed by recent Congressional proposals to give the President a broad mandate to dictate how our internet service providers respond to cyber-emergencies. […]

Extend the Enterprise into the Cloud with Single Sign-On to Cloud-Based services

In this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage Cloud services. In fact, an organization accessing Cloud-based services without Single Sign-On risks increased exposure to security risks and the potential for increased IT Help Desk costs, as well the danger […]

Dual-booting Windows 7 and Ubuntu 10.10

Dual-booting Windows 7 and Ubuntu 10.10

This is the second article on dual-booting Windows 7 and Ubuntu 10.10 on a computer with one hard disk. The first, how to dual-boot Ubuntu 10.10 and Windows 7, showed how to accomplish the task with GRUB 2, the boot loader used by Ubuntu, installed on the Master Boot Record (MBR) of the hard disk. That is, GRUB is responsible […]

Who’s watching you?

Who’s watching you?

Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and becoming a victim of Internet fraud. Coinciding with global Data Privacy Day today, new survey research by Opera Software in the United States, Japan and Russia pulls back the curtain and looks under the bed at what […]

LibreOffice Portable, a Full-Featured Office Suite For USB, Removable and Cloud Drives

PortableApps.com and The Document Foundation are proud to announce the immediate availability of LibreOffice Portable 3.3, a portable version of the free productivity suite for Windows. LibreOffice Portable runs right from a USB flash drive or cloud drive and allows users to use a full-featured word processor, spreadsheet, presentation tool, database and drawing program on every PC with no installation […]

MasterCard’s Support for COICA Threatens A Free And Open Internet

In the last months of 2010, the WikiLeaks wars reminded transparency activists of something copyright and trademark lawyers know all too well – online speech is only as strong as the many service providers on which it depends. All too often web hosts, domain name registrars and other service providers cave at the slightest legal or government pressure, with disastrous […]

Google Starts Censoring BitTorrent, RapidShare and More

It’s taken a while, but Google has finally caved in to pressure from the entertainment industries including the MPAA and RIAA. The search engine now actively censors terms including BitTorrent, torrent, utorrent, RapidShare and Megaupload from its instant and autocomplete services. The reactions from affected companies and services are not mild, with BitTorrent Inc., RapidShare and Vodo all speaking out […]

Hardware, Software Advances Help Protect Operating Systems from Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer — or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked. At issue are security attacks in which an outside party […]

LibreOffice 3.3 released

The first stable release of the free office suite is available for download The Document Foundation launches LibreOffice 3.3, the first stable release of the free office suite developed by the community. In less than four months, the number of developers hacking LibreOffice has grown from less than twenty in late September 2010, to well over one hundred today. This […]

Search leakage is not FUD

Lately I’ve been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to the sites they click on. I hope to address those concerns in this post. For those of you who have no idea what I’m talking about: when you click on a link on the […]

Mozilla Leads the Way on Do Not Track

Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new privacy extension today, but we believe that Mozilla is now taking a clear lead and building a practical way forward for people who want privacy when they browse the web. Why We Need Do Not Track […]

Ten Billion Bits of Entanglement Achieved in Silicon

Scientists from Oxford University have made a significant step towards an ultrafast quantum computer by successfully generating 10 billion bits of quantum entanglement in silicon for the first time — entanglement is the key ingredient that promises to make quantum computers far more powerful than conventional computing devices. The researchers used high magnetic fields and low temperatures to produce entanglement […]

Neuroprivilogy: The New Frontier of Cyber Crime

The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Neuroprivilogy is constructed from the words neural (network) and privileged (access), and can be defined as the science of privileged access points’ networks. Using the neural network metaphor, an organization’s infrastructure is not flat, but instead, […]

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks […]