| Thursday May 26th 2016

Linux phone to Debut upgrade at CES


OpenMoko has announced an upgrade to its Linux-powered mobile phone and plans to present the device at CES. That’s a slap in the face for open source competitor Google Android, which is still in development.In its announcement, OpenMoko writes “. . . at CES we will formally preview GTA02 to the public. We are doing this at an invitation-only media event, and not the general show floor.”The GTA02 model was renamed FreeRunner and according to OpenMoko will be “previewed at CES and ship later this spring– first to developers and then to end users as software for the new hardware features becomes available.”

OpenMoko may be looking to build a larger community of Linux software developers as it begins to to make its phone consumer-friendly.

Though Google recently announced the launch of its Android Developer Challenge, the company has not given any indication of when any Android-powered hardware may appear.

That gives OpenMoko a head start in developing additional Linux software for its phone and claiming marketshare.

Read the rest of this entry »

The Most Hated Company In the PC Industry


Who in the hell is Asustek, and why does Microsoft hate them more than any other company in the industry? Why does Apple, Dell and Palm Computing hate them?

And why does Intel love them?

Taiwan’s Asustek — better known as ASUS — is one of the most interesting, innovative and fastest-growing companies in technology.

At its core, Asustek makes motherboards — more than any other company. Asustek motherboards are the heart of Sony’s PlayStation 2 consoles, Apple MacBooks, Alienware PCs, and some HP computers.

But that’s not why they’re hated. The source of ire is a tiny laptop called the ASUS Eee PC. This open, flexible, relatively powerful, and very small laptop is notable for one feature above all: Its price. The Eee PC can be had for as little as $299. (Go here to read the reviews — they’re all positive.)

Let’s take a moment to ponder how cheap that is. This full-featured laptop costs $69 less than the 16 GB Apple iPod Touch. It’s $100 less than an Amazon Kindle e-book reader. The most expensive configuration for the ASUS Eee PC on Amazon.com is $499.

Read the rest of this entry »

Why We Should Still Vote for Ron Paul Even if He Isn’t Expected to Win


This might seem as common sense to many, but I have had a few conversations over the course of the past few weeks with friends of mine regarding Ron Paul, and this issue has come up a lot. Many people tell me that they love Ron Paul and want him to be our president, but shortly thereafter explain that it would be a wasted vote because he certainly will not win. All of the people who have told me this have got me thinking about the issue. If everyone who wants Ron Paul to become president decides that their vote might be better spent somewhere else, that might very well end up being the momentous he needs to win the election, and the reason he might lose!

So if you have thought about using your precious vote elsewhere, don’t! We all must unite, hold our ground, and vote for who we think is best no matter what. If Ron Paul follows through with his commitments, he will redeem this nation, bring it out of debt, and make me proud to be an American. Think about it this way, if you don’t vote for Paul, then when Giuliani takes over and starts WWIII you won’t have any excuse to bitch and moan.

See Everything Your Friends And Neighbors Have Ever Bought At Sears


Want to see all the major appliances and repair services that your friends and neighbors… (and anyone else who you can look up in the phone book) have ever purchased at Sears?Want to know what your mom might have purchased for your birthday? Want to know which houses in your neighborhood have really nice expensive TVs?

Sears provides a website, www.ManageMyHome.com where anyone can look up anyone elses’ entire purchase history at Sears—using only their name and address. This is especially convenient because these strange men keep dropping off huge lists of names and addresses on our door every year (we think they’re called “phone books”) and we never really knew what to do with them.

Apparently, all you need to do is create an account at www.managemyhome.com, click “Find Sears Products” and enter a name, address and phone number.

Read the rest of this entry »

Is Sears Engaging in Criminal Hacking Behavior?


Join “My SHC Community” on Sears.com, and the company will install some pretty impressive spyware on your computer:

Read the rest of this entry »

Questions to Consider in the Coming Privacy Wars


It seems obvious that privacy is going to be a major point of contention in the near-term future. It’s only going to get hotter as major online services compile huge amounts of data about us, as Open Data advocates push for that data to be freed up for reuse and as more cluster[fudge] incidents like the Facebook Beacon and the AOL search data release hit the public consciousness.

The story in the news this week is about Sears getting caught installing ComScore tracking spyware surreptitiously on customer’s computers. Who knows what it will be next week? Who knows what lurks in the shadows, set to make the news in the coming year or not at all?

Read the rest of this entry »

Time for another Fear Drill!



Top 10 Secure Coding Practices

I like this photograph because it illustrates how the easiest way to break system security is often to circumvent it rather than defeat it (as is the case with most software vulnerabilities related to insecure coding practices).

Top 10 Secure Coding Practices:

Read the rest of this entry »

CNN hides Ron Paul’s results

CNN had two different pie charts up at the same time during the Iowa caucuses.

Here’s the pie chart they put up for the Democrats.


Notice how CNN went out of its way to squeeze Bill Richardson’s two percent piece into the pie?

Now, look at the Republican pie chart.


Notice the giant void between McCain and Huckabee on the chart? At this point, Ron Paul had 10 percent of the vote. Why isn’t he listed when Bill Richardson’s two percent makes the Democratic pie? This wouldn’t be so obvious if it hadn’t been preceded by months and months of CNN shunning Ron Paul.

Ugh… That’s some poor (READ: biased) journalism.

VoIP For iPod Touch is Here

The Touchmods team have released version 1.0 of SIP-VoIP for the iPod Touch. This hack will allow the Touch to make phone calls over its WiFi connection. Although named version 1.0, it is most certainly still a beta, and will take some special magic on your part to get things going.


The Five Coolest Hacks of 2007


Nothing was sacred – not cars, not truckers, not even the stock exchange. Hackers are creative folk, for sure. But some researchers are more imaginative and crafty than others. We’re talking the kind of guys who aren’t content with finding the next bug in Windows or a Cisco router. Instead, they go after the everyday things we take for granted even more than our PCs — our cars, our wireless connections, and (gulp) the electronic financial trading systems that record our stock purchases and other online transactions.

Not that there’s anything wrong with a new Windows or Vista flaw. But you can’t help but secretly admire the ingenuity and persistence it takes to hack something that we hadn’t thought of as hackable — or that maybe that we just didn’t want to think was. These are the kinds of hacks that pierce the mainsteam consciousness: Your mom’s eyes may glaze over when you warn her about the risk of her PC becoming a bot, but you can bet you’ll have her full attention when you show how a hacker could redirect her brand-new car navigation system to a deserted dead end street far from her intended destination.

Read the rest of this entry »

HOWTO: Use md5sum to Verify Data Integrity


First of all, what’s a hash?
A hash is the output of a one-way, reproducible function for creating a small fingerprint from a chunk of data. For example, when the popular hash function MD5 is given the word “cat”, it produces the following output every time:

If “cat” is changed to “cats” the resulting hash is completely different:

No matter how much data the hash function is given, the fingerprint stays the same size. No matter how small the change to the data, the fingerprint will be totally different.

What’s md5sum?
A simple tool called md5sum is used for working with hashes in Linux. It allows hashes to be created and compared using the MD5 hash function. md5sum comes installed by default in Ubuntu and virtually every other Linux distribution. (It’s part of the GNU core utilities.)

Read the rest of this entry »

Have a safe New Years!


HOWTO: Protect chmod 777 folders

Sometimes linux hosting users need to change the permissions on a folder to use upload scripts or other applications that need this permissions.

With chmod 777 their folder gain the rights: writing / reading and execute for everyone. Malicious hackers like these kind of folders.

php_snow.gifHow can you protect that folders?
You can turn PHP off on that folder and disable php / html / perl files.

How can it be done?
Create this .htaccess in the folder:

php_flag engine off
<Files ~ “\.(php*|s?p?html|cgi|pl)$”>
deny from all

Thats it, you just increased the security level on this folders.

AOL, Netflix, and the end of open access to research data


Correction: The authors of the Netflix de-anonymization study contacted me to point out that they originally published a draft of their results a mere two weeks after Netflix released its dataset. Netflix has known about their study for over a year.

Over the past year, there have been a number of high-profile incidents in which sensitive user data was accidentally revealed to the Internet at large. As a result, I believe that high-tech companies will never again share anonymized data on their users with academic researchers, at least not without requiring contracts and nondisclosure agreements. For the users and privacy advocates, this is probably a good thing. However, for researchers, the scientific community, and Internet users who want cool new technologies, this is almost certainly a change for the worse.

In 2006, Netflix released over 100 million movie ratings made by 500,000 subscribers to their online DVD rental service. The company then offered $1 million to anyone who could improve the company’s system of DVD recommendation. In order to protect its customers’ privacy, Netflix anonymized the data set by removing any personal details.

Researchers announced this week that they were able to de-anonymize the data, by comparing the Netflix data against publicly available ratings on the Internet Movie Database (IMDB). Whoops.

For Internet privacy geeks, this Netflix incident is just another version of an all-too-familiar tale: A well-meaning company releases a large data set of user data, which it has scrubbed to remove any identifying information. Armed with this data set, researchers are able to trace backwards, and match names to the profiles and their online behavior.

Read the rest of this entry »

HOWTO: Install Win32 Codecs in Linux


Installing libxine-extracodecs will get you the most wide-spread codecs installed, but not all of them. MPlayer, a movie player program for Linux, has support for a big bunch of video and audio formats. Installing them in Linux ( Ubuntu / Fedora / SUSE ) should be as easy as sudo yum (or aptitude) install w32codecs but for some reason it says “No candidate version found for w32codecs.” So here’s 2 methods on how to install them manually:

Method 1:

  1. Go to the MPlayer Download Page. Scroll down to the Binary Codec Packages section. From the table, select the download link corresponding to your architecture (x86 in my case) and the mirror closest to you. Click on the link to download the codec bundle.
  2. Unpack the essential-XXXXXXXX.tar.bz2 file you have downloaded and copy the contents to /usr/lib/win32/ (You may need to create the directory first)

Method 2:
$ wget http://www1.mplayerhq.hu/MPlayer/releases/codecs/all-20071007.tar.bz2
$ tar -jxf all-20071007.tar.bz2
$ sudo mkdir -p /usr/local/lib/codecs
$ sudo cp all-20071007/* /usr/local/lib/codecs
$ sudo ln -sf /usr/local/lib/codecs /usr/lib/codecs
$ sudo ln -sf /usr/local/lib/codecs /usr/local/lib/win32
$ sudo ln -sf /usr/local/lib/codecs /usr/lib/win32
$ rm -rf all-20071007

Now MPlayer can play about anything on Earth, as long as it’s not DRM’ed.

HOWTO: Convert A Friend To Linux


Warning: You should proceed with caution using this Howto, if you do not know what you are doing you could damage your relationship with Friend 2.0 or totally break it. Also, using this Howto extensively with multiple Friend 2.0’s may damage Life 4.5, and end up as a sorrow lonely geek.

Prerequisites :

Before attempting to convert Friend to Linux, there are some major tweaks you need to do. If you already done these tweaks and living by them then good for you, if not then doing this is a MUST:

Read the rest of this entry »

WARNING: Do NOT calculate Pi in binary


WARNING: Do NOT calculate Pi in binary. It is conjectured that this number is normal, meaning that it contains ALL finite bit strings. If you compute it, you will be guilty of: 1. Copyright infringement (of all books, all short stories, all newspapers, all magazines, all web sites, all music, all movies, and all software, including the complete Windows source code)
2. Trademark infringement
3. Possession of child pornography
4. Espionage (unauthorized possession of top secret information)
5. Possession of DVD-cracking software
6. Possession of threats to the President
7. Possession of everyone’s SSN, everyone’s credit card numbers, everyone’s PIN numbers, everyone’s unlisted phone numbers, and everyone’s passwords
8. Defaming Islam. Not technically illegal, but you’ll have to go into hiding along with Salman Rushdie.
9. Defaming Scientology. Which IS illegal — just ask Keith Henson.Also, your computer will contain all of the nastiest known computer viruses. In fact, all of the nastiest possible computer viruses. Some of the files on my PC are intensely personal, and I for one don’t want you snooping through a copy of them.
You might get away with computing just a few digits, but why risk it? There’s no telling how far into Pi you can go without finding the secret documents about the JFK assassination, a photograph of your neighbor’s six year old daughter doing the nasty with the family dog, or a complete copy of the not-yet-released Star wars movie. So just don’t do it.
The same warning applies to e, the square root of 2, Euler’s constant, Phi, the cosine of any non-zero algebraic number, and the vast majority of all other real numbers.
There’s a reason why these numbers are always computed and shown in decimal, after all.

That is actually kind of funny. But there is a gross assumption that pi is infinite and we can calculate it.

Source: alt.math.recreational

Let’s Take America Back

Great video. This made my day.

Read the rest of this entry »

Top 25 Linux 3D Games


Who says Linux sucks for gaming? Here’s a great list of 25 3D games for Linux. Feel free to add more games and help another Linux users find those great time wasters you love.


 Page 147 of 152  « First  ... « 145  146  147  148  149 » ...  Last »