Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality

Software sniffs out criminals by the shape of their nose

Forget iris and fingerprint scans — scanning noses could be a quicker and easier way to verify a person’s identity, according to scientists at the University of Bath. With worries about illegal immigration and identity theft, authorities are increasingly looking to using an individual’s physical characteristics, known as biometrics, to confirm their identity.

File-Sharing Software Potential Threat to Health Privacy

The personal health and financial information stored in thousands of North American home computers may be vulnerable to theft through file-sharing software, according to a research study published online in the Journal of the American Medical Informatics Association. Healthcare professionals who take patient information home to personal computers containing peer-to-peer file-sharing software are jeopardizing patient confidentiality, note the authors of […]

Vine Linux

Vine Linux

Vine Linux is a Japanese, RPM-based, multi-purpose distribution. It is developed and maintained by Vinecaves, and it’s based on an earlier version of Fedora. It is one of those distributions that excludes non-free (proprietary) applications from its default installation. Unlike similar distributions, however, it has developed a smart method to make installing non-free applications very easy.

Printer configuration and management on PC-BSD 8

Printer configuration and management on PC-BSD 8

PC-BSD is a desktop-centric distribution based on FreeBSD. The latest stable version, released just this week, is PC-BSD 8. On most Linux, desktop distributions, a connected printer is automatically configured. On PC-BSD 8, however, getting a printer to work requires manual configuration. To simplify that task, a number of printer management utilities are available. You may access the main printer […]

New Security Threat Against ‘Smart Phone’ Users

Computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart mobile phones, with the potential to cause more serious consequences. The researchers, who are presenting their findings at a mobile computing workshop this week in Maryland, demonstrated how such a software attack could cause a smart phone […]

Malicious Software: Hiding the Honeypots

Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to […]

Qt + Box2D is easy!

Qt + Box2D is easy!

Box2D is an Open Source rigid body 2D physics engine for C++. It’s currently (2.0.1) released under the MIT license, which is quite permissive. Box2D is used by, among other things, Gluon (http://gluon.tuxfamily.org/), which is a game library from KDE in-the-making. Integrating Box2D into your Qt application is quite easy, and this blog shows you how to get started. First […]

3 Problems Cloud Security Certification Can Solve

What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers? The basic promise of cloud computing is undeniably appealing: Increase efficiency and reduce cost by taking advantage of flexibly pooled computing resources managed by somebody else. Indeed, as Bill Brenner of CSO put it, “Given how expensive it is […]

Intellectual Property and Risks to the Public

Hi, I am Victoria Espinel, the U.S. Intellectual Property Enforcement Coordinator. I am honored to have been appointed by President Barack Obama and confirmed by the U.S. Senate to serve in this new position created by Congress in the Prioritizing Resources and Organization for Intellectual Property Act of 2008.  Given the unique nature of this job, I’d like to describe […]

PC-BSD 8 installation guide

PC-BSD 8 installation guide

PC-BSD 8 is the latest edition of PC-BSD, a desktop distribution based on FreeBSD, with KDE as its default desktop environment. It features a graphical installation program that should be easy enough for anybody to use. However, some sections of the installer could pose some difficulty to those new to the this distribution (and to the BSDs). If you belong […]

Built to last

Built to last

It has now been almost exactly five years since kernel development community tentatively started using the git source code management system with the 2.6.12-rc2 commit. That was an uncertain time; nobody really knew how long it would take the development process to get back up to speed after an abrupt core-tool change. As it turned out, git was almost immediately […]

Why I Will Not Sign the Public Domain Manifesto

Why I Will Not Sign the Public Domain Manifesto

By Richard M. Stallman: The Public Domain Manifesto (http://www.publicdomainmanifesto.org/node/8) has its heart in the right place as it objects to some of the unjust extensions of copyright power, so I wish I could support it. However, it falls far short of what is needed. Some flaws are at the level of implicit assumptions. The manifesto frequently uses propaganda terms of […]

Open letter to Google: free VP8, and use it on YouTube

Open letter to Google: free VP8, and use it on YouTube

With its purchase of the On2 video compression technology company having been completed on Wednesday February 16, 2010, Google now has the opportunity to make free video formats the standard, freeing the web from both Flash and the proprietary H.264 codec. Dear Google, With your purchase of On2, you now own both the world’s largest video site (YouTube) and all […]

The Toyota recall and the case for open, auditable source code

Public Safety is not a matter of Private Concern In a recent article, Slate’s Farhad Manjoo attempts to play down fears of faulty software in car braking systems as a potential cause of traffic accidents. Citing numerous studies which conclude that “the overwhelming reason we get in crashes is driver error,” Manjoo reasons that “the less driving people do, the […]

Add cloud storage to OpenOffice.org with SMECloud

Add cloud storage to OpenOffice.org with SMECloud

Cloud computing is all the rage these days. But while the idea of using your browser to access your applications and documents sounds like a great idea on paper, in practice there are all kinds of reasons to stick to your desktop software. Take OpenOffice.org, for example. None of the available Web-based word processors can compete with Writer when it […]

OpenOffice.org: The Need for Style

OpenOffice.org: The Need for Style

Office applications like OpenOffice.org can bring out the worst in people. The same people who wouldn’t dream of driving a car without a few lessons will start pounding away in a word processor as though it were a typewriter, ignoring basic features like styles and templates. In the end, they may produce the documents they want, but only with far […]

FreeBSD and the GPL

Linus Torvalds has said Linux wouldn’t have happened if 386BSD had been around when he started up. We trace the history of FreeBSD and how it’s affected the open source world. The first free Unix-like operating system available on the IBM PC was 386BSD, of which Linus Torvalds said in 1993: “If 386BSD had been available when I started on […]

Proposed guidelines for open government plans

Proposed guidelines for open government plans

Open Source for America (OSFA) represents more than 1,600 businesses, associations, non-governmental organizations, communities, and academic/research institutions who have come together to support and guide federal efforts to make the U.S. Government more open through the use of free and open source software. We applaud the Obama Administration’s Open Government Initiative and the December 8th Directive requiring all federal agencies […]

No Warrant Necessary to Seize Your Laptop

The U.S. Customs may search your laptop and copy your hard drive when you cross the border, according to their policy. They may do this even if they have no particularized suspicion of wrongdoing on your part. They claim that the Fourth Amendment protection against warrantless search and seizure does not apply. The Customs justifies this policy on the grounds […]

The Traceability of an Anonymous Online Comment

Yesterday, I described a simple scenario where a plaintiff, who is having difficulty identifying an alleged online defamer, could benefit from subpoenaing data held by a third party web service provider. Some third parties—like Facebook in yesterday’s example—know exactly who I am and know whenever I visit or post on other sites. But even when no third party has the […]