Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality

Privacy Risks from Geographic Information

In today’s world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their users. This location information makes it easier to identify individuals, which can raise privacy concerns when location is coupled with basic demographics and […]

Using OpenCL with Qt

Using OpenCL with Qt

Recently we have been experimenting with OpenCL and Qt, to see what Qt needs to make it easier to use OpenCL and to see what Qt could use it for internally.  In this post we are going to give an introduction to OpenCL, the QtOpenCL wrapper library, show how to write your first QtOpenCL program, and tell you where to […]

Removing the RSA Security 1024 V3 Root

There’s been confusion today about the work we’re doing on our root store, the set of trusted certificate authorities shipped with Mozilla products. The short story is this: we’re removing the “RSA Security 1024 V3″ root from that list. Its owners have confirmed that it is not in use, and not covered by current audits. We regularly check for roots […]

Enforcement of the GNU GPL in Germany and Europe

A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the fact that many manufacturers use […]

Opening up the MeeGo development

Opening up the MeeGo development

Today is the culmination of a huge effort by the worldwide Nokia and Intel teams to share the MeeGo operating system code with the open source community. This is the latest step in the full merger of Maemo and Moblin, and we are happy to open the repositories and move the ongoing development work into the open – as we […]

Google Squeezes Flash into Chrome

Google Squeezes Flash into Chrome

Adobe’s Flash Player has come under fire from developers and companies who question its necessity, but the plug-in has just received a big vote of confidence from Google. This week, Google announced that its Chrome browser will come with Flash built in. And Google, Adobe, and another browser maker, Mozilla, have revealed plans to improve the way plug-ins interface with […]

How Android Security Stacks Up

How Android Security Stacks Up

Today’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security. What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, […]

A Comfortable and Secure Login Method

As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one’s different online accounts. Dr. Bernd Borchert, together with students at the Computer Science Department of Tübingen University, has tackled this issue. They developed a new method that saves the users not only the trouble of memorizing the passwords […]

A Portable Security Risk

More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job. This explosion of personal devices with built in […]

What If All Software Was Open Source? A Code to Unlock the Desktop

What if all software was open source? Anybody would then be able to add custom features to Microsoft Word, Adobe Photoshop, Apple iTunes or any other program. A University of Washington project may make this possible. “Microsoft and Apple aren’t going to open up all their stuff. But they all create programs that put pixels on the screen. And if […]

Soft Spots in Hardened Software

Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to make it harder for attackers to find and exploit vulnerabilities. Apple and many other software makers have followed suit, introducing similar additional security measures to their operating systems. Yet last week, during the “Pwn2Own contest” at CanSecWest, a […]

Free Software: Phase Two

Free software is ubiquitous. It runs everywhere on (almost) everything. The question that dominated most of the discussions at the Libre Planet Conference in Boston about a week ago is what now? How can the community capitalize on its achievements to make the movement more inclusive and reconceive the relationship between free software and privacy? Most attendees seem to agree […]

Governments May Fake SSL Certificates

Governments May Fake SSL Certificates

Today two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to help them spy undetected on “secure” encrypted communications. (EFF sometimes advises Soghoian on responsible disclosure issues, including for this paper.) More details and reporting are available […]

All Your Browsing History Are Belong to Us

For several years, it has been a poorly kept secret that any Web site you went to could secretly search your browser’s history file to see what sites you had previously visited.  All the site owner had to do was ask.  And while browser history “sniffing” has been around for a long time, companies are finally starting to actively take […]

Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You

A British computer hacker equipped with a “Dummies” guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and national security is put at risk. The same goes for your own personal and financial information transmitted by phone, on the Internet or through bank machines. Now a new invention developed by Dr. Jacob Scheuer of Tel […]

Why I Am Against Software Patents

The surprise to most people isn’t that I do not believe that software should be patentable. Given my long term interest in and coverage of free and open source software, I’m supposed to be at least mildly anti-establishment. It is also statistically unlikely that I would be in favor of patents, because industry sentiment is overwhelmingly against them at the […]

Who does that server really serve?

Who does that server really serve?

On the Internet, proprietary software isn’t the only way to lose your freedom. Software as a Service is another way to let someone else have power over your computing. Background: How Proprietary Software Takes Away Your Freedom Digital technology can give you freedom; it can also take your freedom away. The first threat to our control over our computing came […]

Web 2.0 versus Control 2.0

The fight for free access to information is being played out to an ever greater extent on the Internet. The emerging general trend is that a growing number of countries are attemptimg to tighten their control of the Net, but at the same time, increasingly inventive netizens demonstrate mutual solidarity by mobilizing when necessary. The Internet: a space for information-sharing […]

Is Microsoft About to Declare Patent War on Linux?

Microsoft’s comments on happenings outside its immediate product portfolio are rare, and all the more valuable when they do appear. Here’s one from Horacio Gutierrez, “Corporate Vice President and Deputy General Counsel”, entitled “Apple v. HTC: A Step Along the Path of Addressing IP Rights in Smartphones.” By now, all the alarm bells should be going off: this is from […]

Net Neutrality: Opening the Doors of Opportunity

Federal Communications Commission Chairman Julius Genachowski and FCC Commissioners Michael Copps and Mignon Clyburn made a direct appeal to the civil rights community to support Net Neutrality rules during an appearance at a forum hosted by the Joint Center for Economic and Political Studies in Washington earlier this month. They argued that Network Neutrality offers the unique opportunity for people […]