Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality

How essential is anonymity to peer to peer relationality?

How essential is anonymity to peer to peer relationality? I believe answering that question becomes easier if we look at the historical development of relationality and that such a review may lead us to challenge any simplistic identification of peer to peer relationality with anonymity. For starters, let us broadly define peer to peer relationality, as that type of relationality […]

Open Source Education

Open source or software freedom isn’t simply another way of procuring software, it’s more a state of mind, a particular attitude to technology. Of course, you can just treat it as a cheap way of getting high quality, robust code, and there’s certainly no requirement to grow a beard, wear sandals or drink real ale in order to install open […]

In Networks We Trust

European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that exist in the current state of the art. Trusted computing (TC) is a hot topic in computer science. Major software and hardware providers are planning to include TC components in the next generation of computers, and the US […]

Bio-Inspired Computer Networks Self-Organise and Learn

Powerful computers made up of physically separate modules, self-organising networks, and computing inspired by biological systems are three hot research topics coming together in one European project. European researchers have developed an innovative computing platform. At the heart of the system are many small modules, each made from chips with an inbuilt ability to learn. A self-configuring wireless network connects […]

iPad: The Disneyland of Computers

iPad: The Disneyland of Computers

Tech commentators have a love/hate relationship with Apple’s new iPad. Those who try it tend to like it, but many dislike its locked-down App Store which only allows Apple-approved apps. Some people even see the iPad as the dawn of a new relationship between people and computers. To me, the iPad is Disneyland. I like Disneyland. It’s clean, safe, and […]

Open Source and Computer Science Education

In his March 2006 column in the Communications of the ACM, ACM President David Patterson urged Computer Science (CS) educators to “Join the open source movement.” Despite the widespread use of the open source development model in the software industry, Patterson observed that “most schools still teach ‘write programs from a blank piece of paper’ programming.” Patterson noted that students […]

Privacy Risks from Geographic Information

In today’s world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their users. This location information makes it easier to identify individuals, which can raise privacy concerns when location is coupled with basic demographics and […]

Using OpenCL with Qt

Using OpenCL with Qt

Recently we have been experimenting with OpenCL and Qt, to see what Qt needs to make it easier to use OpenCL and to see what Qt could use it for internally.  In this post we are going to give an introduction to OpenCL, the QtOpenCL wrapper library, show how to write your first QtOpenCL program, and tell you where to […]

Removing the RSA Security 1024 V3 Root

There’s been confusion today about the work we’re doing on our root store, the set of trusted certificate authorities shipped with Mozilla products. The short story is this: we’re removing the “RSA Security 1024 V3″ root from that list. Its owners have confirmed that it is not in use, and not covered by current audits. We regularly check for roots […]

Enforcement of the GNU GPL in Germany and Europe

A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the fact that many manufacturers use […]

Opening up the MeeGo development

Opening up the MeeGo development

Today is the culmination of a huge effort by the worldwide Nokia and Intel teams to share the MeeGo operating system code with the open source community. This is the latest step in the full merger of Maemo and Moblin, and we are happy to open the repositories and move the ongoing development work into the open – as we […]

Google Squeezes Flash into Chrome

Google Squeezes Flash into Chrome

Adobe’s Flash Player has come under fire from developers and companies who question its necessity, but the plug-in has just received a big vote of confidence from Google. This week, Google announced that its Chrome browser will come with Flash built in. And Google, Adobe, and another browser maker, Mozilla, have revealed plans to improve the way plug-ins interface with […]

How Android Security Stacks Up

How Android Security Stacks Up

Today’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security. What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, […]

A Comfortable and Secure Login Method

As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one’s different online accounts. Dr. Bernd Borchert, together with students at the Computer Science Department of Tübingen University, has tackled this issue. They developed a new method that saves the users not only the trouble of memorizing the passwords […]

A Portable Security Risk

More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job. This explosion of personal devices with built in […]

What If All Software Was Open Source? A Code to Unlock the Desktop

What if all software was open source? Anybody would then be able to add custom features to Microsoft Word, Adobe Photoshop, Apple iTunes or any other program. A University of Washington project may make this possible. “Microsoft and Apple aren’t going to open up all their stuff. But they all create programs that put pixels on the screen. And if […]

Soft Spots in Hardened Software

Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to make it harder for attackers to find and exploit vulnerabilities. Apple and many other software makers have followed suit, introducing similar additional security measures to their operating systems. Yet last week, during the “Pwn2Own contest” at CanSecWest, a […]

Free Software: Phase Two

Free software is ubiquitous. It runs everywhere on (almost) everything. The question that dominated most of the discussions at the Libre Planet Conference in Boston about a week ago is what now? How can the community capitalize on its achievements to make the movement more inclusive and reconceive the relationship between free software and privacy? Most attendees seem to agree […]

Governments May Fake SSL Certificates

Governments May Fake SSL Certificates

Today two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to help them spy undetected on “secure” encrypted communications. (EFF sometimes advises Soghoian on responsible disclosure issues, including for this paper.) More details and reporting are available […]

All Your Browsing History Are Belong to Us

For several years, it has been a poorly kept secret that any Web site you went to could secretly search your browser’s history file to see what sites you had previously visited.  All the site owner had to do was ask.  And while browser history “sniffing” has been around for a long time, companies are finally starting to actively take […]