News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality

The Internet Society on the Wikileaks issue

Recently, we have witnessed the effective disappearance from the Internet of a website made infamous through international press coverage and political intrigue. The Internet Society is founded upon key principles of free expression and non discrimination that are essential to preserve the openness and utility of the Internet. We believe that this incident dramatically illustrates that those principles are currently […]

ISPs Free To Continue Deleting Evidence Against File-Sharers

Sweden’s highest court has rejected an application by an anti-piracy group which would force an ISP to hand over the identity of a file-sharing site operator. Antipiratbyrån wants TeliaSonera to reveal who is behind the SweTorrents BitTorrent tracker but the ISP has refused and taken its case all the way to the Supreme Court. That Court has now decided that […]

E-Book Buyer’s Guide to E-Book Privacy

With the 2010 holidays upon us, it’s time to update EFF’s E-Book Buyer’s Guide to E-Book Privacy, which summarizes and comments on the privacy-related policies of several e-readers. What’s new. We’ve added in the iPad and also added in the software used by many libraries and devices for e-book access, made by Adobe called Adobe Content Server. Adobe doesn’t keep […]

Profiling Based on Mobile, Online Behavior: A Privacy Issue

It’s illegal for businesses and law enforcement to profile a person based on their race, gender, or ethnicity, yet millions of Americans are being profiled every day based on their online consumer behavior and demographics. Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated. The result, according to two recent articles in the journal […]

Android 2.3 Platform and Updated SDK Tools

Today we’re announcing a new version of the Android platform — Android 2.3 (Gingerbread). It includes many new platform technologies and APIs to help developers create great apps. Some of the highlights include: Enhancements for game development: To improve overall responsiveness, we’ve added a new concurrent garbage collector and optimized the platform’s overall event handling. We’ve also given developers native […]

Bringing the ‘social’ out of the operator walled gardens

A ‘walled garden’ is the term aptly applied to the last decade of mobile operator services. And Facebook is the generic name aptly applied to the social network revolution of our times. Wikipedia defines ‘walled gardens’ as referring “to a carrier’s or service provider’s control over applications, content, and media on platforms … and restriction of convenient access to non-approved […]

5 netbook-optimized desktop interfaces for Linux and BSD distributions

5 netbook-optimized desktop interfaces for Linux and BSD distributions

This article provides some information on five netbook-optimized desktop interfaces available for Linux and BSD desktop distributions. They are presented here in alphabetical order. Jolicloud: Jolicloud is the interface on the cloud-based Linux distribution that goes by the same name. Jolicloud 1.0, the first stable release, is based on the desktop edition of Ubuntu 9.04. The next stable release, Jolicloud […]

Amazon and WikiLeaks – Online Speech is Only as Strong as the Weakest Intermediary

The First Amendment to the Constitution guarantees freedom of expression against government encroachment – but that doesn’t help if the censorship doesn’t come from the government. The controversial whistle-blower website WikiLeaks, which has begun to publish a trove of over 250,000 classified diplomatic cables, found itself kicked off of Amazon’s servers earlier this week. WikiLeaks had apparently moved from a […]

Your Web Surfing History Is Accessible Without Your Permission

The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advertising providers use browser vulnerabilities to determine which sites you have and have not visited, according to new research from computer scientists at the University of California, San Diego. “JavaScript is a great thing, it allows things […]

Humanitarian Free and Open Source Software

The Relevance of IT for Humanitarian Response The humanitarian response domain aims to help save lives and alleviate human suffering in responding to: i) rapid-onset natural disasters, such as tsunamis, earthquakes, and pandemics; ii) slow-onset natural disasters, such as global warming, droughts, and famine; and iii) human-instigated disasters, such as civil wars. The humanitarian response domain consists of an ecosystem […]

FTC’s New Privacy Report Endorses “Do Not Track” Mechanism to Empower Online Consumers

This morning, the Federal Trade Commission released its long-anticipated privacy report. The report is the final result of a series of FTC privacy roundtables held earlier this year that solicited comments from leading scholars, industry figures and nonprofits including EFF about the consumer privacy challenges posed by new technologies. One of the main focuses of the FTC’s report is online […]

Location, Location, Location: Three Recent Court Controversies on Cell Phone & GPS Tracking

Welcome to the 21st century, where we all carry tracking devices in our pockets and where one morning you might find an FBI-installed GPS tracking device on your car. In this age of location-based-everything, the legal question of whether or not the government has to get a search warrant based on probable cause before secretly tracking you becomes all the […]

How to dual-boot Linux Mint 10 or Ubuntu 10.10 and Windows 7 on a computer with two hard drives

How to dual-boot Linux Mint 10 or Ubuntu 10.10 and Windows 7 on a computer with two hard drives

The first two articles on dual-booting Windows 7 and Linux distributions published here involved installation on a computer with a single hard drive. Those articles on dual-booting Fedora 14 and Ubuntu 10.10 with Windows 7 are available here and here. This article will cover a different use-case, dual-booting Windows 7 and Ubuntu 10.10 or Linux Mint 10 on a computer […]

How to install and configure a parental control system on Linux Mint 10

How to install and configure a parental control system on Linux Mint 10

Linux Mint 10 comes pre-installed with a very simple application that could be considered a parental control tool. Other than being a basic, uni-directional domain blocker, it is does not provide any other feature. So, if you want a parental control tool, one that provides all the features you expect in an application of that sort, you will have to […]

How to create and manage a guest user account on Linux Mint 10

How to create and manage a guest user account on Linux Mint 10

Say, you have a Linux Mint 10-powered computer that you share with a friend or family member you do not completely trust. How do you continue to give this friend or family member access to your computer and still keep your data private? You have two options. The first is to let your guest use the built-in guest session. The […]

Wikileaks: Lessons For Consumer Privacy

The website Wikileaks recently published hundreds of thousands of confidential State Department cables. These communications apparently reveal the details of conversations with, and personal impressions and assessments of, foreign leaders and diplomats. Many fear that the leak will undermine international relations in profound and unknowable ways. One of the unintended consequence of the leak, however, may be to strengthen the […]

U.S. Government Seizes 82 Websites: A Glimpse at the Draconian Future of Copyright Enforcement?

Over the past few days, the U.S. Justice Department, the Department of Homeland Security and nine U.S. Attorneys’ Offices seized 82 domain names of websites they claim were engaged in the sale and distribution of counterfeit goods and illegal copyrighted works. Setting aside the due process concerns inherent in seizing any website without notice or appropriate recourse for the owner, […]

Supreme Court to Decide Standard for Proving Invalidity of a Patent

Today the U.S. Supreme Court agreed to hear Microsoft’s appeal in a case that could make it easier to invalidate a patent. If successful, Microsoft’s challenge should help in the fight against bad patents by leveling the playing field for showing that a patent is invalid. A Microsoft win in the case would benefit not only Microsoft, but also the […]

Cloud Computing: New Way to Patch Holes in the ‘Cloud’

Researchers from North Carolina State University and IBM have invented a way to update computer systems packaged in virtual machines in a computer “cloud” — even when those programs are offline. The new cloud computing patch tool developed by NC State and IBM is called Nuwa and protects virtual machines (VMs) from cyber-attacks by ensuring that they always receive important […]

ownCloud 1.1 released

ownCloud 1.1 has been released. I´m really happy with this release. Not only because we have a lot of new features and bugfixes but also because the ownCloud development team is growing and more and more people are contributing to ownCloud. I gave several presentation about ownCloud in the last few month and I´m trilled by the positive reactions I […]