Skip to main content

Home/ Future of the Web/ Group items tagged GNU-linux

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Richard Stallman 'basically' has no problem with the NSA using GNU/Linux | ITworld - 0 views

  •  
    " It's Stallman's philosophy that 'a program must not restrict what jobs its users do with it' -- and that includes the NSA."
Gonzalo San Gil, PhD.

Los cajeros dejarán de tener WIndows XP pronto... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! #Linux, sin duda. Cuestión de #Seguridad.
  •  
    [La industria ATM (ATMIA por sus siglas en inglés) está dudosa para decidir cuál será el futuro de todos los cajeros a nivel mundial, los cuales utilizan para operar como sistema operativo base Windows XP de Microsoft, con un riesgo tremendo por esa retirada del soporte y que a pesar de ser un sistema capado, podría presentar problemas de seguridad ...]
Gonzalo San Gil, PhD.

How to Create Virtual Machines in Linux Using KVM (Kernel-based Virtual Machine) - Part 1 - 0 views

  •  
    "This tutorial discusses KVM introduction, deployment and how to use it to create virtual machines under RedHat based-distributions such as RHEL/CentOS7 and Fedora 21."
  •  
    "This tutorial discusses KVM introduction, deployment and how to use it to create virtual machines under RedHat based-distributions such as RHEL/CentOS7 and Fedora 21."
Gonzalo San Gil, PhD.

State of VoIP in Linux - Datamation - 0 views

  •  
    "Like most people, I find myself using the same VoIP options everyone else is using. Thankfully, these days there are far more options available than what we might think. Today, I'll look at these options and also explore up-and-coming alternatives as well."
  •  
    "Like most people, I find myself using the same VoIP options everyone else is using. Thankfully, these days there are far more options available than what we might think. Today, I'll look at these options and also explore up-and-coming alternatives as well."
Gonzalo San Gil, PhD.

Schedule your social media marketing with CampaignChain | Linux User & Developer - the ... - 0 views

  •  
    "Posted by Oliver Hill CampaignChain, an open source tool for social media marketing, makes every campaign easier "
Gonzalo San Gil, PhD.

Great Open Source Collaborative Editing Tools - Linux Links - The Linux Portal Site - 0 views

  •  
    "by Frazer Kline In a nutshell, collaborative writing is writing done by more than one person. There are benefits and risks of collaborative working. Some of the benefits include a more integrated / co-ordinated approach, better use of existing resources, and a stronger, united voice. "
  •  
    "by Frazer Kline In a nutshell, collaborative writing is writing done by more than one person. There are benefits and risks of collaborative working. Some of the benefits include a more integrated / co-ordinated approach, better use of existing resources, and a stronger, united voice. "
Gonzalo San Gil, PhD.

Configuring WINE with Winetricks - 0 views

  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
Gonzalo San Gil, PhD.

voip-info.org - voip-info.org - 0 views

  •  
    "This Wiki covers everything related to VOIP, software, hardware, VoIP service providers, reviews, configurations, standards, tips and tricks and everything else related to voice over IP networks, IP telephony and Internet Telephony. Your contributions are welcome, please read the How to add information to this wiki page and the Posting Guidelines before you post."
Gonzalo San Gil, PhD.

Total security part 1: online | Linux User & Developer - the Linux and FOSS mag for a G... - 0 views

  •  
    "Get rock-solid defences on your systems and networks Follow @LinuxUserMag This article is a companion piece to our Total Privacy article"
  •  
    "Get rock-solid defences on your systems and networks Follow @LinuxUserMag This article is a companion piece to our Total Privacy article"
Gonzalo San Gil, PhD.

Home - FirewallD - 0 views

  •  
    "Welcome to the FirewallD project homepage! FirewallD provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It has support for IPv4, IPv6 firewall settings and for ethernet bridges and has a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
Gonzalo San Gil, PhD.

Los ficheros de registro o logs del sistema operativo GNU/Linux - Software Libre - 0 views

  •  
    "Puedes acceder a ellos con tan solo dirigirte al directorio /var/log del sistema, y allí encontrarás una serie de subdirectorios y ficheros muy interesantes con una información muy valiosa, desde errores para detectar y corregir problemas del sistema o con el hardware, hasta otra información como los accesos que ha tenido tu sistema para detectar, por ejemplo, intrusos que han entrado sin tu consentimiento."
  •  
    "Puedes acceder a ellos con tan solo dirigirte al directorio /var/log del sistema, y allí encontrarás una serie de subdirectorios y ficheros muy interesantes con una información muy valiosa, desde errores para detectar y corregir problemas del sistema o con el hardware, hasta otra información como los accesos que ha tenido tu sistema para detectar, por ejemplo, intrusos que han entrado sin tu consentimiento."
Gonzalo San Gil, PhD.

How Fedora monitors upstream releases - Fedora Magazine - 0 views

  •  
    "Have you updated your Fedora system recently? Hopefully you do this regularly. Updates fix various bugs and even add new features to your most loved applications. An update, to our users, is generally a notification from the Software application. If you're an advanced user and prefer the command line, the process is simple:"
  •  
    "Have you updated your Fedora system recently? Hopefully you do this regularly. Updates fix various bugs and even add new features to your most loved applications. An update, to our users, is generally a notification from the Software application. If you're an advanced user and prefer the command line, the process is simple:"
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Gonzalo San Gil, PhD.

Top Android Phone Troubleshooting Tips - Datamation [# ! Alternative ;) Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! ...until You decide to migrate to a Real Open Source Free Software Mobile OS... as the (GNU/Linux Based, too) Tizen... [https://www.tizen.org/]
  •  
    "Essential techniques to improve the performance of your Android phone, including avoiding Android slowdown and data overages."
  •  
    "Essential techniques to improve the performance of your Android phone, including avoiding Android slowdown and data overages." [# ! While you migrate to a real open source Tizen powered phone...]
Gonzalo San Gil, PhD.

Review: Graylog delivers open source log management for the dedicated do-it-yourselfer ... - 0 views

  •  
    "By Joel Snyder Network World | Nov 9, 2015 3:06 AM PT RELATED TOPICS Open Source Subnet Network Management System Management Comments In most big security breaches, there's a familiar thread: something funny was going on, but no one noticed. The information was in the logs, but no one was looking for it. Logs from the hundreds or thousands of network devices are the secret sauce to problem solving, security alerting, and performance and capacity management. Gathering logs together, analyzing them, "
Gonzalo San Gil, PhD.

Review: Graylog delivers open source log management for the dedicated do-it-yourselfer ... - 0 views

  •  
    [... "Graylog is an open-source log management tool, complete with a three-tier architecture, super-scalable storage (based on Elasticsearch), an easy-to-use web interface, and a powerful toolkit to parse messages, build ad-hoc dashboards, and set alerts on logs. ...]
Gonzalo San Gil, PhD.

Getting started with SaltStack - 0 views

  •  
    "I came across Salt while searching for an alternative to Puppet. I like puppet, but I am falling in love with Salt :). This maybe a personal opinion but I found Salt easier to configure and get started with as compared to Puppet. Another reason I like Salt is that it let's you manage your server configurations from the command line, for example:"
Gonzalo San Gil, PhD.

Setup A Centralized Media Server Using Emby Server | Unixmen - 0 views

  •  
    "Yes, you read it right. Meet Emby, a free and open source application that let your personal media library, such as home videos, audios and photos, to be accessible from anywhere using any device."
Gonzalo San Gil, PhD.

Home - DRLM Project - 0 views

  •  
    "Centralized Management Open Source solution for small-to-large Disaster Recovery implementations using ReaR."
« First ‹ Previous 61 - 79 of 79
Showing 20 items per page