Skip to main content

Home/ Future of the Web/ Group items matching "Linux-like" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gonzalo San Gil, PhD.

YEAR of the PENGUIN: A Linux mobile in 2015? * The Register - 0 views

  •  
    "It's nearly impossible to sum up an entire year of developments in something as large and nebulous as the world of desktop Linux, especially in a year like this one which has seen some the best releases that projects like Mint, Fedora and openSUSE have put out to date."
  •  
    "It's nearly impossible to sum up an entire year of developments in something as large and nebulous as the world of desktop Linux, especially in a year like this one which has seen some the best releases that projects like Mint, Fedora and openSUSE have put out to date."
Gonzalo San Gil, PhD.

Cracking Linux with the backspace key? [LWN.net] - 0 views

  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

Linux 4.2 Released Improving Cryptography Options - 0 views

  •  
    "After eight release candidates, Linux 4.2 is now available, marking one of the longer development cycles in the last few years. The longer cycle was likely only the result of an abundance of caution on Linus Torvalds' part and some travel (Linuxcon) too."
Gonzalo San Gil, PhD.

Dropbox Alternatives for Linux Users - Datamation - 1 views

  •  
    "Like many of you, I too have found myself wooed by the convenience of using Dropbox. It's cross platform, simple to setup and provides a cloud storage option for those who might otherwise be less inclined to store files off-site. In this article I'll explore alternatives to Dropbox for Linux users."
Gonzalo San Gil, PhD.

The Best Linux Distros for First Time Switchers from Windows and Mac - 1 views

  •  
    Linux has an intimidating image, making it seem like it would be difficult to start using it. But the switch from Windows and Mac is actually pretty easy, if you can ease yourself into it.
Gonzalo San Gil, PhD.

How to get started with Korora | Opensource.com - 0 views

  •  
    "Korora is Linux distribution that aims to make it easier to install and use for new Linux users, while still providing power-users with the tools and openness that they want. Originally, Korora was built on Gentoo, but in 2010, the team redid the whole thing as a Fedora Remix, with the goal of making the system "just work," from first boot. As a Remix, ..."
Gonzalo San Gil, PhD.

Finjan, Cisco, JDate and Other Companies Acting Like Patent Trolls; New Threats to Linux | Techrights - 1 views

  •  
    "Summary: News about patents from all across the Web, placing special emphasis on software patents and how these affect Free software projects, including Linux and Android"
Gary Edwards

Cisco buys PostPath: WebEx to compete with Exchange, Outlook, Office? | Between the Lines | ZDNet.com - 0 views

  •  
    Once you add in better email and calendar support WebEx could become more appealing to the enterprise. PostPath has a Linux based collaboration system built on an AJAX client that doesn't need a browser. Cisco added that the company's strategy is to develop "an integrated collaboration platform designed for how we work today and into the future. And better yet: PostPath's pitch is that it is an Exchange alternative and a "Linux-based corporate email server." Let's read between the lines: Doesn't this sound a lot like an end-run around Microsoft Office, Outlook and Exchange just like Google is trying to do with Google Apps? Cisco probably has no desire to compete head on with Microsoft (or at least admit it), but the company obviously sees something here and coupling PostPath with WebEx could be a threat to Redmond. In fact, Cisco could be a bigger threat to Microsoft in the enterprise than Google. Why? Cisco already sells enterprises a lot of stuff. Isn't a collaboration suite really just an extension of the network?
Gonzalo San Gil, PhD.

Q4OS Is the Perfect Distro for People Who Want a Windows OS, Only Safer - Gallery - Softpedia - 1 views

  •  
    "There are many ways to make a Linux system look like its Windows counterpart. It's usually done with the help of themes and icons, and most of the times the resemblance is uncanny, but it's still not all that far away from the original base."
  •  
    "There are many ways to make a Linux system look like its Windows counterpart. It's usually done with the help of themes and icons, and most of the times the resemblance is uncanny, but it's still not all that far away from the original base."
Gonzalo San Gil, PhD.

Results of the 2012 /r/Linux Distro Survey - 3 views

  •  
    [Introduction After seeing an attempted comment thread survey on /r/Linux I thought it'd be neat to conduct a real survey using Google Docs. I created the survey and posted it as this thread. I definitely got a better reaction than I expected! Overall I'd like to thank those who took the time to respond to the survey. You guys did a pretty good job of giving me only good data. There were surprisingly few garbage responses that I had to filter out. Stay classy guys & gals.]
Gonzalo San Gil, PhD.

Microsoft joins the Linux Foundation | It runs on Linux - 0 views

  •  
    "The founding members of the R Consortium include other major corporations like Google, HP and Oracle. R is a rapidly evolving language for statistical data analysis that's driving innovation in the field of data sciences."
Gonzalo San Gil, PhD.

LinuxCon 2015: Interview with Susan Lauber on SELinux | Opensource.com - 0 views

  •  
    "Few things in the Linux world evoke a strong reaction like SELinux, the security enhancement for Linux. At LinuxCon, Susan Lauber hopes to soften that response and show people the light. In her talk, SELinux-it's all about the labels, Lauber will teach SELinux basics and describe why it's a must-run on your systems. In this interview, she tells us more."
Gary Edwards

Palm Pre in-depth impressions, video, and huge hands-on gallery - Engadget - 0 views

  •  
    the Palm Pre WebOS is based on Linux, and is in some way an extension of what they've been crafting for a while now, but on top of that Linux core is a display layer that is basically WebKit: all of the apps, including Palms own, are built in HTML, CSS and Javascript, and can make calls deeper into the OS for certain functionalities. That means almost any web developer can build an app for the phone, but there are limitations; like no 3D in this first release. .... excellent review! The Palm Pre is a huge win for the WebKit layout and sugarplum document model (highly advanced, graphical and interactive HTML-CSS-SVG-JS)
Gary Edwards

10 important tips for living a multi-platform life | CITEworld - 0 views

  •  
    "With the rise of different mobile platforms and content ecosystems over the past decade, the technology world is becoming increasingly fragmented. Fifteen years ago, there were only a handful of platforms that mattered -- Windows PCs, Macs, and perhaps Linux on the desktop, and primarily BlackBerry in the mobile space. Today, the number is far greater -- Windows (further divided into the pre- and post-Windows 8 offerings), OS X, Linux, Chrome OS, Android (in many varying incarnations), iOS, Windows Phone, BlackBerry, Amazon's Kindle and Fire products, to name the most common. Each of these platforms has become increasingly insular, making lock-in to a specific vendor, device, or OS much more common.  Featured Resource Presented by Citrix Systems 10 essential elements for a secure enterprise mobility strategy Best practices for protecting sensitive business information while making people productive from LEARN MORE Although it is possible to switch from an iPhone to Android, or from Windows to Mac, there is often a trade-off in making the switch. Apps, music, ebooks, and other content may need to be re-purchased. There will likely be some learning curve. The offerings in the new ecosystem -- apps or content -- may not match the experience to which we've become accustomed, and some may not be available at all.  Here's some guidance on how to switch platforms."
Gonzalo San Gil, PhD.

Command Line Tool to Monitor Linux Containers Performance - 0 views

  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
Gonzalo San Gil, PhD.

State of VoIP in Linux - Datamation - 0 views

  •  
    "Like most people, I find myself using the same VoIP options everyone else is using. Thankfully, these days there are far more options available than what we might think. Today, I'll look at these options and also explore up-and-coming alternatives as well."
  •  
    "Like most people, I find myself using the same VoIP options everyone else is using. Thankfully, these days there are far more options available than what we might think. Today, I'll look at these options and also explore up-and-coming alternatives as well."
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Gary Edwards

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED - 0 views

  •  
    TAILS anonymous Operating System- excerpt: "When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you're pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user's internet traffic by routing it through a network of computers run by volunteers around the world. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally. This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources. "The installation and verification has a learning curve to make sure it is installed correctly," Poitras told WIRED by e-mail. "But once the set up is done, I think it is very easy to use." An Operating System for Anonymity Originally developed as a research project by the U.S. Naval Research Laboratory, Tor has been used by a wide range of people who care about online anonymity: everyone from Silk Road drug dealers, to activists, whistleblowers, stalking victims and people who simply like their online privacy. Tails makes it much easier to use Tor and other privacy tools. Once you boot into Tails - which requires no special setup - Tor runs automatically. When you're done using it, you can boot back into your PC's normal operating
Gonzalo San Gil, PhD.

Save Wifi :the FCC is attempting to criminalize freedom via new regulations | ThinkPenguin.com - 1 views

  •  
    "Will you help us save wifi? The FCC is attempting to force new rules on manufacturers that will require everybody to lock down computing devices. Anything with a modern wireless chip is likely to be affected (software defined radio). This includes routers, cell phones, computers, bluetooth adapters, and similar devices. This means that users won't be able to install free software operating systems such as GNU/Linux or other third party firmwares/operating systems without the cooperation of the manufacturer. "
‹ Previous 21 - 40 of 63 Next › Last »
Showing 20 items per page