News & Tutorials

The Beginning of the End of Data Retention

Last week, the German Constitutional Court issued a much-anticipated decision, striking down its data retention law as violating human rights. It was an important victory for Europe’s Freedom Not Fear movement, which was formed to oppose the EU Data Retention Directive. But it was also a reminder of the political work which remains to be done to defeat it. When […]

Blue Skies Thinking for Cloud Security?

As cloud computing moves data and services from local systems to remote centres, the question of security for organisations must be addressed. A research paper published in the International Journal of Services and Standards suggests that a cloud-free security model is the best way forward and will circumvent the fact that cloud service providers are not yet meeting regulations and […]

Testing Fedora 13 alpha with BFO

Testing Fedora 13 alpha with BFO

Fedora 13 alpha has been released, and the faithful are encouraged to download, test and report. The traditional method of testing is to download a full CD iso image (about 700 MB), but if you read the recent post about Network booting with boot.fedoraproject.org, you’d have learned that all you now need to do to install any version of Fedora […]

Good Artists Copy, Great Artists Steal

In 2003, after I unveiled a prototype Linux desktop called Project Looking Glass*, Steve called my office to let me know the graphical effects were “stepping all over Apple’s IP.” (IP = Intellectual Property = patents, trademarks and copyrights.) If we moved forward to commercialize it, “I’ll just sue you.” My response was simple. “Steve, I was just watching your […]

Future of Broadband: Where Data Is Broadcast Using Desk Lamps

In the future, getting a broadband connection might be as simple as flipping on a light switch. In fact, according to a group of researchers from Germany, the light coming from the lamps in your home could one day encode a wireless broadband signal. As of now, the majority of wireless in homes and businesses is achieved through a radio-frequency […]

Network booting with boot.fedoraproject.org

Network booting with boot.fedoraproject.org

Boot.fedoraproject.org (BFO) is Fedora’s implementation of boot.kernel.org, a project designed to give computers the capability to boot from a network. The actual program that provides this capability is gPXE, which evolved from the Etherboot project. Fedora’s twist on gPXE allows you to network-boot current, past and future (Rawhide) releases of Fedora. All you need to do is download a small […]

Federal Intellectual Property Enforcement Gears Up

Federal Intellectual Property Enforcement Gears Up

The Obama Administration has been slowly ramping up its attention to intellectual property issues. Over the past few months, we’ve seen an IP “summit” at the White House. We’ve seen the successful nomination of a new cabinet-level “IP Czar” position. We’ve seen the announcement of a new DOJ task force for IP issues. What does it all portend? Unfortunately, many […]

BSD Magazine: March 2010

BSD Magazine: March 2010

The March 2010 issue of BSD Magazine, a free, online magazine for the BSD community, is now available for download. The theme for this edition is “BSD as a Desktop.” The following are some of the articles you’ll find inside: Build Your Own FreeBSD Update Server – Experienced users or administrators responsible for several machines or environments, know the difficult […]

Search your Android phone with written gestures

Search your Android phone with written gestures

As mobile phones become increasingly powerful and can store more data, we’ve introduced new methods of search to get you to your content faster, such as search suggestions or search by voice. But sometimes, typing to get to the right search suggestion takes too long, and you may be in a quiet environment where speaking a query is inappropriate. Today […]

Unintended Consequences: Twelve Years Under the DMCA

Unintended Consequences: Twelve Years Under the DMCA

Twelve years after the passage of the controversial Digital Millennium Copyright Act (DMCA), the law continues to stymie fair use, free speech, scientific research, and legitimate competition. A new report from the Electronic Frontier Foundation (EFF) collects reported examples of abuses of the DMCA and the ongoing harm the law continues to inflict on consumers, scientists, and small businesses. The […]

Software sniffs out criminals by the shape of their nose

Forget iris and fingerprint scans — scanning noses could be a quicker and easier way to verify a person’s identity, according to scientists at the University of Bath. With worries about illegal immigration and identity theft, authorities are increasingly looking to using an individual’s physical characteristics, known as biometrics, to confirm their identity.

File-Sharing Software Potential Threat to Health Privacy

The personal health and financial information stored in thousands of North American home computers may be vulnerable to theft through file-sharing software, according to a research study published online in the Journal of the American Medical Informatics Association. Healthcare professionals who take patient information home to personal computers containing peer-to-peer file-sharing software are jeopardizing patient confidentiality, note the authors of […]

Vine Linux

Vine Linux

Vine Linux is a Japanese, RPM-based, multi-purpose distribution. It is developed and maintained by Vinecaves, and it’s based on an earlier version of Fedora. It is one of those distributions that excludes non-free (proprietary) applications from its default installation. Unlike similar distributions, however, it has developed a smart method to make installing non-free applications very easy.

Printer configuration and management on PC-BSD 8

Printer configuration and management on PC-BSD 8

PC-BSD is a desktop-centric distribution based on FreeBSD. The latest stable version, released just this week, is PC-BSD 8. On most Linux, desktop distributions, a connected printer is automatically configured. On PC-BSD 8, however, getting a printer to work requires manual configuration. To simplify that task, a number of printer management utilities are available. You may access the main printer […]

New Security Threat Against ‘Smart Phone’ Users

Computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart mobile phones, with the potential to cause more serious consequences. The researchers, who are presenting their findings at a mobile computing workshop this week in Maryland, demonstrated how such a software attack could cause a smart phone […]

Malicious Software: Hiding the Honeypots

Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to […]

Qt + Box2D is easy!

Qt + Box2D is easy!

Box2D is an Open Source rigid body 2D physics engine for C++. It’s currently (2.0.1) released under the MIT license, which is quite permissive. Box2D is used by, among other things, Gluon (http://gluon.tuxfamily.org/), which is a game library from KDE in-the-making. Integrating Box2D into your Qt application is quite easy, and this blog shows you how to get started. First […]

3 Problems Cloud Security Certification Can Solve

What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers? The basic promise of cloud computing is undeniably appealing: Increase efficiency and reduce cost by taking advantage of flexibly pooled computing resources managed by somebody else. Indeed, as Bill Brenner of CSO put it, “Given how expensive it is […]

Intellectual Property and Risks to the Public

Hi, I am Victoria Espinel, the U.S. Intellectual Property Enforcement Coordinator. I am honored to have been appointed by President Barack Obama and confirmed by the U.S. Senate to serve in this new position created by Congress in the Prioritizing Resources and Organization for Intellectual Property Act of 2008.  Given the unique nature of this job, I’d like to describe […]

PC-BSD 8 installation guide

PC-BSD 8 installation guide

PC-BSD 8 is the latest edition of PC-BSD, a desktop distribution based on FreeBSD, with KDE as its default desktop environment. It features a graphical installation program that should be easy enough for anybody to use. However, some sections of the installer could pose some difficulty to those new to the this distribution (and to the BSDs). If you belong […]