Linux A Future
6.2K views | +0 today
Follow
Linux A Future
Linux The Rosetta Stone
Curated by Jan Bergmans
Your new post is loading...
Your new post is loading...
Scooped by Jan Bergmans
Scoop.it!

I couldn't have imagined | openmedianow.net

I couldn't have imagined | openmedianow.net | Linux A Future | Scoop.it

I couldn't have imagined

Posted by Steve Anderson on Wed, 12/05/2012 - 03:14

The OpenMedia team works hard to amplify your voices—and I think we’re getting good at it—but I need your help if OpenMedia is to continue to play this role. Please join us now.

In just a few days, I’m making a presentation that will amplify your pro-Internet voices and bring them directly to officials behind the most powerful trade block in history. It’s honestly pretty intimidating.

That is why I’m writing you today: I’m asking that you please stand with me by becoming an Ally – a monthly contributor to OpenMedia.

My life has been a whirlwind as of late. When I started OpenMedia, I couldn’t have imagined that our community would stop big telecom companies in their tracks, force politicians to change course and respect the open Internet, and pressure international bureaucrats to listen to Internet users.

The OpenMedia team travels far and works hard to amplify your voices – and I think we’re getting good at it. Yet I’m humble enough to know that I need your help if we are to continue to play this role.

This is the moment for you to join us. Generous supporters have pledged to match your contribution every single month if you become a monthly contributor during our December Allies Drive – starting now.

Anti-Internet forces see that we’re winning, and they’re coming back at us with a vengeance, taking the fight to control the Internet to an international scale. I need you to help us stay strong. Please don’t let them take away all that we have accomplished together.

With hope for our connected future,

Steve Anderson, on behalf of your OpenMedia team

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Linux System Administration and Configuration

Linux System Administration and Configuration | Linux A Future | Scoop.it
YoLinux: Linux systems administration and configuration for server and desktop computers. Linux Information Portal includes informative tutorials and links to many Linux sites.
more...
Avatarpoint Security's comment, December 3, 2012 8:24 PM
Linux Rocks!,
Scooped by Jan Bergmans
Scoop.it!

The Best Graphics Cards: Nvidia vs. AMD Current-Gen Comparison - TechSpot

The Best Graphics Cards: Nvidia vs. AMD Current-Gen Comparison - TechSpot | Linux A Future | Scoop.it
The Best Graphics Cards: Nvidia vs. AMD Current-Gen ComparisonTechSpotAMD kick-started 2012 with the release of the Radeon HD 7970, the first member of the Radeon HD 7000 GPU series.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Andrea Veri: The Linux’s perception of my neighbours

Andrea Veri: The Linux’s perception of my neighbours | Linux A Future | Scoop.it
I live in a little village close to the city and one of the houses close to my property is for rent since more than ten years.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

system76 Ubuntu gaming laptop - yeah it's happening

For your steaming eyeballs viewing pleasure I forward the following link from slashgear The system76 ubuntu powered laptop - an i7 quad core 2.6ghz, 8gb DDR3 ram, NVidia GTX 670MX with a 17.3 inch 1920X1080 rez, HDMI, Display Port, Ethernet, media...
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Nouveau Work On Kepler. Optimus, Gets A Falcon

Phoronix: Nouveau Work On Kepler. Optimus, Gets A Falcon
More code was pushed to Nouveau's Linux kernel repository for their open-source DRM graphics driver.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Google says ITU is 'the wrong place to make decisions about the future of the Internet'

Google says ITU is 'the wrong place to make decisions about the future of the Internet' | Linux A Future | Scoop.it
The International Telecommunication Union has been in the news a fair bit as of late, tackling everything from patents to the future of HDTV, and it's now set to be at the center of a particularly contentious issue.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Open Source Insider: Search Results

Open Source Insider: Search Results | Linux A Future | Scoop.it

Identity management specialist ForgeRock has launched a 100% open source software stack intended to secure applications and services across enterprise, cloud, social and mobile environments.

Boasting claims of more than 250,000 downloads in less than 24 months, the ForgeRock Open Identity Stack is positioned (in theory) as a community of global companies working to deploy identity management infrastructures more economically via the open model.

The firm asserts that [proprietary and traditional] identity management is typically "overly complex" with high barriers to adoption.

The company rests its argument on the fact that we now have to manage a greater number of ...

users,
devices,
and identities

... as enterprise security expands to include:

cloud,
social,
and mobile environments

 

more...
No comment yet.
Rescooped by Jan Bergmans from DIGITAL EDUCATION
Scoop.it!

10 Things Your Students Should Know About Their Digital Footprints

10 Things Your Students Should Know About Their Digital Footprints | Linux A Future | Scoop.it
This real teacher blog presents 10 things students should know about their digital footprint.

Via Elena Elliniadou, GSeremetakis
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

ITU proposals threaten Internet freedom and access | openmedianow.net

ITU proposals threaten Internet freedom and access | openmedianow.net | Linux A Future | Scoop.it

ITU proposals threaten Internet freedom and access

Posted by Catherine Hart on Mon, 10/08/2012 - 10:22

Image from Jer Thorp on Creative Commons

As the International Telecommunication Union’s December negotiations move closer, more worrying developments are coming to light. We recently posted about some of the main concerns raised by the secretive negotiations, which threaten to change the Internet as we know it.

This week a report by Rohan Samarajiva at LIRNEasia confirmed these concerns. Looking at the ‘ETNO’ proposals, and the more complex and insidious shift in definitions proposed by Egypt on behalf of the Africa Region, Samarajiva explains the potential impact on Internet freedom and on developing countries.

As we mentioned in our previous post, the European Telecommunications Network Operators Association (ETNO) are concerned about the success of online content providers, and are trying make sure they can cash in on that success. Samarajiva explains that the ETNO proposals would designate content providers as “call originators” who would have to pay Big Telecom a rate based on how much bandwidth the content uses.

Content providers like YouTube or Hulu already commercially negotiate the leasing of network capacity from Internet service providers and pay for quality control. However giving this the force of law as the ETNO proposals require “turns the concept into a government-sanctioned leveraging tool operators can use to extract high sums from content providers with no room for negotiation”.

 

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Unix / Linux Bourne / Bash Shell Scripting Tutorial [ steve-parker.org ]

Unix / Linux Bourne / Bash Shell Scripting Tutorial [ steve-parker.org ] | Linux A Future | Scoop.it

A Bourne Shell Programming/Scripting Tutorial for learning about using the Unix shell. Learn Linux / Unix shell scripting by example along with the theory. I'll have you mastering Unix shell scripting in no time! Available right here on the World Wide Web.
Version: 1.2d © 2000 - 2012 Steve Parker.
Mail To: steve at steve-parker.org

 

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

25 More – Sick Linux Commands « UrFix's Blog

25 More – Sick Linux Commands « UrFix's Blog | Linux A Future | Scoop.it

1) Like top, but for files

watch -d -n 2 ‘df; ls -FlAt;’

2) Download an entire website

wget –random-wait -r -p -e robots=off -U mozilla http://www.example.com

-p parameter tells wget to include all files, including images.

-e robots=off you don’t want wget to obey by the robots.txt file

-U mozilla as your browsers identity.

–random-wait to let wget chose a random number of seconds to wait, avoid get into black list.

Other Useful wget Parameters:

–limit-rate=20k limits the rate at which it downloads files.

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Fluxbuntu Home

Fluxbuntu Home | Linux A Future | Scoop.it

What is Fluxbuntu?

Fluxbuntu is a modern operating system based upon the extremely successful and powerful Linux and GNU technology base.

Why Fluxbuntu?

Although there are a plethora of options available to an individual who wishes to harness a Linux / GNU environment, we believe Fluxbuntu fills an extremely important niche. Fluxbuntu was created for the user who wishes to utilize the massively popular and versatile Ubuntu distribution base while minimizing the impact on their system's resources. To this end, we firmly believe that Fluxbuntu is the wisest choice for anyone seeking a low profile operating system -- from performance enthusiasts to people who need a lightweight operating system to breathe new life into an old computer.

We know you have exceptionally high standards for your computing environment. So does Fluxbuntu.

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Speaking UNIX: The best-kept secrets of UNIX power users

Speaking UNIX: The best-kept secrets of UNIX power users | Linux A Future | Scoop.it
You don't have to break into a Watergate office to uncover the secrets of UNIX power users. There's an informant, and this month he's spilling the beans.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Microsoft continues to make life difficult for Linux

Because of the fact that all versions of 64-bit PCs with Windows Certification Program, certified by Windows, use UEFI instead of BIOS, Microsoft intended to impose a way that hardware manufacturers have the Secure Boot functionality active and...
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

NVIDIA: The Opportunities Ahead - Motley Fool

NVIDIA: The Opportunities Ahead - Motley Fool | Linux A Future | Scoop.it
NVIDIA: The Opportunities AheadMotley FoolNVIDIA (NASDAQ: NVDA ) has struggled in recent months largely thanks to a continuous drumbeat of bad news in the PC space.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Latest Firefox, Thunderbird & Skype Releases Arrive in Ubuntu

Latest Firefox, Thunderbird & Skype Releases Arrive in Ubuntu | Linux A Future | Scoop.it
Updated versions of several popular desktop applications are ready to install in Ubuntu 12.04 and 12.10.
Skype has been bumped up from version 4.0 to the new ‘Windows Account-toting’ 4.1.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Steam Linux Beta Opens Up To More Gamers

Phoronix: Steam Linux Beta Opens Up To More Gamers
Prior to going on their Thanksgiving holiday, Valve's Linux cabal opened up the Steam Linux Beta program to an additional five-thousand applicants...
more...
No comment yet.
Suggested by Mary E. Berens-Oney
Scoop.it!

Attacking hardened Linux systems with kernel JIT spraying

Intel's new Ivy Bridge CPUs support a security feature called Supervisor Mode Execution Protection (SMEP). It's supposed to thwart privilege escalation attacks, by preventing the kernel from executing a payload provided by ...
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Freevo | About Freevo & Current Status

Freevo | About Freevo & Current Status | Linux A Future | Scoop.it

Freevo is an open-source home theatre PC platform based on Linux and a number of open-source audio/video tools. MPlayer and/or Xine can be used to play audio and video files in most popular formats. Freevo can be used both for a standalone PVR computer with a TV+remote, as well as on a regular desktop computer using the monitor and keyboard.

Freevo is easy to download and install for new users. Most hardware is supported (graphic boards, sound cards and video capture devices).

The Freevo core is under heavy development. It is mostly written in the Python programming language which is very well suited for high-level control applications like Freevo.

Technical Information

A project like Freevo leverages a wealth of powerful free software tools. The main projects used include:

SDLPygamePython Imaging LibraryMplayerPythonPython TwistedXine

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Linux News: Community: Nvidia's Ginormous Gift to Linux Gamers

Linux News: Community: Nvidia's Ginormous Gift to Linux Gamers | Linux A Future | Scoop.it
What a difference a year makes. It used to be that gaming was Linux's "Achilles' heel" of sorts, cited by more than a few enthusiasts as justification for their reluctance to switch away from Windows.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Rosetta Stone for Unix

Rosetta Stone for Unix | Linux A Future | Scoop.it

A Sysadmin's Unixersal Translator (ROSETTA STONE) OR What do they call that in this world?
Contributions and corrections gratefully accepted. Please help us fill in the blanks. New "tasks" are welcome, too!
PDF version (for best results print US legal size, landscape orientation. If your browser plug-in has trouble with the PDF, then download it and load it in stand-alone acroread).
Framed version.
OS versions in parentheses; e.g. 10+ means version 10 and greater; 9- means version 9 and previous. $=extra cost. (obs) = obsolete
If not specified, commands are in one of the following directories: /usr/bin, /usr/sbin, /bin, /sbin
Files referenced may be either commands, configuration files, or directly-referenced text files. Use the man command to read the man pages for details such as command options.
Categories:
hardware, firmware, devices disks kernel, boot, swap files, volumes
networking security, backup software, patching, tracing, logging

 

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

I2P - Anonymity for the Masses

I2P - Anonymity for the Masses | Linux A Future | Scoop.it

1. Introduction

For many years people have wanted to protect their right to privacy. As technology changes, it seems that privacy evolves away more and more. I2P is a protocol used for an encrypted multi-proxy on the Internet. While, this sounds simple, there is actually a lot of work going on with I2P to achieve this. Unlike some multi-proxies, I2P will allow you to tunnel many more applications through it than just web browsing, making it a very robust protocol.

I2P is available for all platforms, not just Linux. For this example I have used Debian Sid to perform the installation. With the exception of 'apt-get', these instructions should work fine with any Linux distribution. But if you experience problems, please seek documentation for your distro or visit our new Linux Forum.

2. Legal Disclaimer

As I explain this to help you maintain priviacy, there will always be a few bad apples in the crowd. I do not condone this use of this article for anything illegal. Even if you are not passing illegal information on I2P, please check your country's laws on encryption and it's exportation before you begin.

3. The Problem with Tor

One would probably see I2P as an overkill without knowing the downfalls of its predicessor. Tor was once a wonderful multi-proxy used for hiding ip addresses and bouncing off servers all over the world. At one time, it was even trusted by most governments for strong anonymity. All of that seemed to change after an article was posted in 2600 Hacker Quartley. One author exposed how becoming an exit node for Tor allowed all the traffic on the Tor network to pass right through your machine. Becoming an exit node was the same as performing a Man-In-The-Middle attack. All one had to do was open up a packet sniffer and see all the traffic going through encrypted. Tor is still used by people trying to protect their privacy. But at the same time it has become a playground for hackers and governments monitoring what they consider suspicious. I2P has secured this problem while adding more functionality.

4. How it Works

I2P uses bundeled encryption over a multi-proxy like Tor. The packets are bounced all over the globe with anyone using I2P. However, the packets are encrypted with ElGamal and AES encryption. Using bundled encryption like this allows a packet to only decrypt the next hop as it passes through various nodes on its path. I2P is end-to-end encryption. Nothing is else is decrypted along its path including the sender and recipient. Once inside the network ip addresses are not even used. Your node is assigned an address of garbled text to use as an identifier. I2P is also a decentralized network. Every client is also a server on the network. This allows no single point of failure and more anonymity. There are tons of documents in the I2P control panel explaining this more in depth. For now, that should give you a good overview on how I2P works.

5. Beyond Web Surfing

There are many applications for the I2P protocol. I2P is used to tunnel just like SSH. Because of this, you can do many things with it. You can use it to tunnel SMTP and POP3 for anonymous email. You can use it for chat clients and P2P. What I found most interesting was anonymous hosting. I2P allows you to host what is referred to as an Eepsite. While some of these are indexed by Google, no one can connect to the site without using I2P. Blocking yourself from robots and spiders can allow you to host a complete darknet site. No one would know your site exists except you and the people you tell your domain. These are all things that other multi-proxies can't or won't let you do.

 

more...
No comment yet.