Skip to main content

Home/ Future of the Web/ Group items tagged version

Rss Feed Group items tagged

Paul Merrell

Publicly Available Standards - 0 views

    • Paul Merrell
       
      This is the download page for ISO/IEC information technology standards available at no charge. The same standards are available on other ISO, IEC, and other standards organizations' web pages for a fee. If you need an ISO/IEC information technology standard, check here before you pay money for what's also given away for free. Notice that standards are arranged on the page in numerical order.
  •  
    Most ISO and IEC standards are only available for purchase. However, a few are publicly available at no charge. ISO/IEC:26300-2006 is one of the latter and can be downloaded from this page in XHTML format. Note that the standards listed on the page are arranged numerically and the OpenDocument standard is very near the bottom of the page. This version of ODF is the only version that has the legal status of an international standard, making it eligible as a government procurement specification throughout all Member nations of the Agreement on Government Procurement.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Gonzalo San Gil, PhD.

Sustainable Models for Creativity | FCF - 1 views

  •  
    Version 1.0 Free/Libre Culture Forum Declaration [For details, see the extended version] We can no longer put off re-thinking the economic structures that have been producing, financing, and funding culture up until now. Many of the old models have become anachronistic and detrimental to civil society. The aim of this document is to promote innovative strategies capable of defending and extending the sphere in which human creativity and knowledge can prosper freely and sustainably. This document is addressed to policy reformers, citizens and free/libre culture activists and aims to provide practical tools to actively bring about this change.
Gonzalo San Gil, PhD.

Copyright Reform: The European Parliament Must Follow the Reda Report! | La Quadrature ... - 0 views

  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
Gonzalo San Gil, PhD.

Worried about GHOST? Don't be, on supported Fedora versions. | Fedora Magazine - 0 views

  •  
    "That means that Fedora 20 and Fedora 21 are not vulnerable to this problem, because they shipped with newer versions than that"
Gonzalo San Gil, PhD.

A cloud office suite alternative to Microsoft and Google - CSC Blogs - 0 views

  •  
    "Like the idea of having a cloud office suite, but not crazy about being locked into Microsoft Office 365 or Google Docs software-as-a-service (SaaS) ? Two open-source companies, ownCloud and Kolab Systems, are working on enabling an office suite for your own private cloud. Kolab, like ownCloud, is using Collabora's cloud version of the open-source LibreOffice office suite, Collabora CloudSuite. The desktop version of LibreOffice is my favorite office suite."
Gary Edwards

Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turne... - 0 views

  •  
    "The ultimate code breakers" If you know anything about encryption, you probably also realize that quantum computers are the secret KEY to unlocking all encrypted files. As I wrote about last year here on Natural News, once quantum computers go into widespread use by the NSA, the CIA, Google, etc., there will be no more secrets kept from the government. All your files - even encrypted files - will be easily opened and read. Until now, most people believed this day was far away. Quantum computing is an "impractical pipe dream," we've been told by scowling scientists and "flat Earth" computer engineers. "It's not possible to build a 512-qubit quantum computer that actually works," they insisted. Don't tell that to Eric Ladizinsky, co-founder and chief scientist of a company called D-Wave. Because Ladizinsky's team has already built a 512-qubit quantum computer. And they're already selling them to wealthy corporations, too. DARPA, Northrup Grumman and Goldman Sachs In case you're wondering where Ladizinsky came from, he's a former employee of Northrup Grumman Space Technology (yes, a weapons manufacturer) where he ran a multi-million-dollar quantum computing research project for none other than DARPA - the same group working on AI-driven armed assault vehicles and battlefield robots to replace human soldiers. .... When groundbreaking new technology is developed by smart people, it almost immediately gets turned into a weapon. Quantum computing will be no different. This technology grants God-like powers to police state governments that seek to dominate and oppress the People.  ..... Google acquires "Skynet" quantum computers from D-Wave According to an article published in Scientific American, Google and NASA have now teamed up to purchase a 512-qubit quantum computer from D-Wave. The computer is called "D-Wave Two" because it's the second generation of the system. The first system was a 128-qubit computer. Gen two
  •  
    Normally, I'd be suspicious of anything published by Infowars because its editors are willing to publish really over the top stuff, but: [i] this is subject matter I've maintained an interest in over the years and I was aware that working quantum computers were imminent; and [ii] the pedigree on this particular information does not trace to Scientific American, as stated in the article. I've known Scientific American to publish at least one soothing and lengthy article on the subject of chlorinated dioxin hazard -- my specialty as a lawyer was litigating against chemical companies that generated dioxin pollution -- that was generated by known closet chemical industry advocates long since discredited and was totally lacking in scientific validity and contrary to established scientific knowledge. So publication in Scientific American doesn't pack a lot of weight with me. But checking the Scientific American linked article, notes that it was reprinted by permission from Nature, a peer-reviewed scientific journal and news organization that I trust much more. That said, the InfoWars version is a rewrite that contains lots of information not in the Nature/Scientific American version of a sensationalist nature, so heightened caution is still in order. Check the reprinted Nature version before getting too excited: "The D-Wave computer is not a 'universal' computer that can be programmed to tackle any kind of problem. But scientists have found they can usefully frame questions in machine-learning research as optimisation problems. "D-Wave has battled to prove that its computer really operates on a quantum level, and that it is better or faster than a conventional computer. Before striking the latest deal, the prospective customers set a series of tests for the quantum computer. D-Wave hired an outside expert in algorithm-racing, who concluded that the speed of the D-Wave Two was above average overall, and that it was 3,600 times faster than a leading conventional comput
Alexandra IcecreamApps

Features of Icecream Screen Recorder 3.0 - Icecream Tech Digest - 2 views

  •  
    With the recent update of Icecream Screen Recorder to version 3.0, we managed to add new awesome features to make the screen capture process more advanced in its options yet still simple in use. Our intention was to create a … Continue reading →
  •  
    With the recent update of Icecream Screen Recorder to version 3.0, we managed to add new awesome features to make the screen capture process more advanced in its options yet still simple in use. Our intention was to create a … Continue reading →
Gonzalo San Gil, PhD.

Software Should Be Free: The FSF's first Annual Report - Free Software Foundation - wor... - 1 views

  •  
    "by Georgia Young - Published on Aug 11, 2016 03:58 PM The Free Software Foundation has been fighting for user freedom for more than thirty years with your support. FY2015 Annual Report cover - Software should be free as in freedom Now we are publishing our first Annual Report, which covers the 2015 fiscal year of October 1, 2014 through September 30, 2015. The report offers a look at the Foundation's activities, accomplishments, and financial picture. You will also read about the impact of our programs and FY2015's major events, including LibrePlanet and our thirtieth anniversary. A high resolution version is also available."
  •  
    "by Georgia Young - Published on Aug 11, 2016 03:58 PM The Free Software Foundation has been fighting for user freedom for more than thirty years with your support. FY2015 Annual Report cover - Software should be free as in freedom Now we are publishing our first Annual Report, which covers the 2015 fiscal year of October 1, 2014 through September 30, 2015. The report offers a look at the Foundation's activities, accomplishments, and financial picture. You will also read about the impact of our programs and FY2015's major events, including LibrePlanet and our thirtieth anniversary. A high resolution version is also available."
Gonzalo San Gil, PhD.

HandyLinux Is a Great Toolbox for Linux Newbies | Reviews | LinuxInsider - 0 views

  •  
    " HandyLinux is a distro that offers a simplified approach to using the Linux desktop operating system. HandyLinux first appeared about three years ago. The latest version, 2.5, was released in early June."
  •  
    " HandyLinux is a distro that offers a simplified approach to using the Linux desktop operating system. HandyLinux first appeared about three years ago. The latest version, 2.5, was released in early June."
Alexandra IcecreamApps

How to Record and Share a Video on YouTube - Icecream Tech Digest - 0 views

  •  
    One of the most frequently asked questions from our users is how to upload a video recorded with Icecream Screen Recorder to YouTube. The videos made with our program (both with Free and PRO versions) are perfectly compatible with this … Continue reading →
  •  
    One of the most frequently asked questions from our users is how to upload a video recorded with Icecream Screen Recorder to YouTube. The videos made with our program (both with Free and PRO versions) are perfectly compatible with this … Continue reading →
Gonzalo San Gil, PhD.

International Principles on the Application of Human Rights to Communications Surveilla... - 1 views

  •  
    "Final version 10 July 2013 As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. This document attempts to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights."
Gonzalo San Gil, PhD.

A Memory Comparison of Light Linux Desktops | l3net - a layer 3 networking blog - 0 views

  •  
    "After I install a new version of Linux, I usually take a good look at the screen. Does it have a task bar? Can I find my window after it was minimized? The direction some desktops are going is not clear. Making it easier for current users or for the people coming from Windows or Mac is not a goal anymore. User complains are dismissed, chalking it up to the fact that people don't like change."
  •  
    "After I install a new version of Linux, I usually take a good look at the screen. Does it have a task bar? Can I find my window after it was minimized? The direction some desktops are going is not clear. Making it easier for current users or for the people coming from Windows or Mac is not a goal anymore. User complains are dismissed, chalking it up to the fact that people don't like change."
Gonzalo San Gil, PhD.

Will the Italian Presidency of the EU Council Support Net Neutrality? | La Quadrature d... - 0 views

  •  
    "Submitted on 9 May 2014 - 16:11 Kroes Telecoms Package Net neutrality press release Printer-friendly version Send by email Français Paris, 9 May 2014 - The voice of the Italian presidency of the Council of the European Union could mark a real departure from the usual government talk chastising the vote on Net Neutrality adopted by the European Parliament! According to the information portal Euractiv, the Italian presidency could support the text voted by the Members of the European Parliament and be ready to defend it in front of the European governments and telecommunications industry. As the publication of the guidance report of the Council of the European Union about the Net Neutrality (scheduled for 5 or 6 of June) nears, La Quadrature du Net welcomes this encouraging position and asks European citizens to invite their governments to follow this example."
  •  
    "Submitted on 9 May 2014 - 16:11 Kroes Telecoms Package Net neutrality press release Printer-friendly version Send by email Français Paris, 9 May 2014 - The voice of the Italian presidency of the Council of the European Union could mark a real departure from the usual government talk chastising the vote on Net Neutrality adopted by the European Parliament! According to the information portal Euractiv, the Italian presidency could support the text voted by the Members of the European Parliament and be ready to defend it in front of the European governments and telecommunications industry. As the publication of the guidance report of the Council of the European Union about the Net Neutrality (scheduled for 5 or 6 of June) nears, La Quadrature du Net welcomes this encouraging position and asks European citizens to invite their governments to follow this example."
Gonzalo San Gil, PhD.

Who Does That Server Really Serve? - GNU Project - Free Software Foundation - 0 views

  •  
    "by Richard Stallman (The first version was published in Boston Review.) On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing."
  •  
    "by Richard Stallman (The first version was published in Boston Review.) On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing."
Gonzalo San Gil, PhD.

A cautious welcome to the EC's new Free Software strategy [April 1, 2015] - 0 views

  •  
    "The European Commission has published a new version of its strategy for the internal use of Free Software. The strategy now covers the 2014-2017 timeframe. FSFE has provided extensive input to the Commission during the update process."
  •  
    "The European Commission has published a new version of its strategy for the internal use of Free Software. The strategy now covers the 2014-2017 timeframe. FSFE has provided extensive input to the Commission during the update process."
Gonzalo San Gil, PhD.

Just-released WordPress 0day makes it easy to hijack millions of websites [Updated] | A... - 0 views

  •  
    "Update: About two hours after this post went live, WordPress released a critical security update that fixes the 0day vulnerability described below. The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server. Attack code has been released that targets one of the latest versions of WordPress, making it a zero-day exploit that could touch off a series of site hijackings throughout the Internet."
  •  
    "Update: About two hours after this post went live, WordPress released a critical security update that fixes the 0day vulnerability described below. The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server. Attack code has been released that targets one of the latest versions of WordPress, making it a zero-day exploit that could touch off a series of site hijackings throughout the Internet."
Gonzalo San Gil, PhD.

Voltage Pictures Sued For Copyright Infringement | TorrentFreak [# Note] - 1 views

    • Gonzalo San Gil, PhD.
       
      # ! The Media Industry Hypocrisy. Once more...
  •  
    [ Andy on May 20, 2015 C: 0 Breaking Voltage Pictures, a movie company with a reputation for chasing down alleged Internet pirates, is being sued for "blatant" breaches of copyright. After promoting its own version of a Godzilla movie without first obtaining permission from its Japanese owner, Voltage is now being called out as "outrageous in the extreme."]
  •  
    [ Andy on May 20, 2015 C: 0 Breaking Voltage Pictures, a movie company with a reputation for chasing down alleged Internet pirates, is being sued for "blatant" breaches of copyright. After promoting its own version of a Godzilla movie without first obtaining permission from its Japanese owner, Voltage is now being called out as "outrageous in the extreme."]
Gonzalo San Gil, PhD.

Git 2.4.5 Out Now with Lots of Under-the-Hood Improvements - Softpedia - 0 views

  •  
    "Now available for Linux, Windows, and Mac OS X The wonderful developers behind Git, the world's most popular open-source distributed version control system, were more than happy to announce the immediate availability for download of Git 2.4.5."
  •  
    "Now available for Linux, Windows, and Mac OS X The wonderful developers behind Git, the world's most popular open-source distributed version control system, were more than happy to announce the immediate availability for download of Git 2.4.5."
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Gonzalo San Gil, PhD.

BetterPrivacy 1.68 :: Add-ons for Firefox - 0 views

  •  
    "by IKRG Remove or manage a new and uncommon kind of cookies, better known as LSO's.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others... Latest updates: See bottom link 'version history'!"
  •  
    "by IKRG Remove or manage a new and uncommon kind of cookies, better known as LSO's.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others... Latest updates: See bottom link 'version history'!"
‹ Previous 21 - 40 of 194 Next › Last »
Showing 20 items per page