Language Selection

English French German Italian Portuguese Spanish

What the Flock - the Social Browser Revolution

Filed under
Software

At first, Flock appealed to me in a purely superficial way. As you may have noticed, I’m a sucker for style, good design and pretty textures, and Flock certainly unites all of these features.

Fortunately, that’s not all there is to tell. Flock is based on Mozilla Firefox and was first released in 2005. Back then it may have been a little bit ahead of its time since social web was only in its beginnings. Recently however, Flock has enjoyed very positive media coverage and its popularity virtually exploded in the beginning of this year, reaching close to three million downloads and increasing the number of active users by 135%.

As the name suggests, Flock is a community tool, rather than a ordinary browser. It comes with a lot of built in features, tailored to instantly connect you to your Web 2.0 addictions.

Personally, I’m not a member of each and every social community. I refuse to set up half a dozen profiles and indulge in fake popularity, if any. It’s simply not my thing. If you’re like me, you’ll probably not feel tempted to try Flock in the first place, but you may change your mind, just as I did.

So let’s look at it in a bit more detail.




More in Tux Machines

Windows, Mac or Linux... Which operating system best suits your business?

Linux is a free alternative. Apart from the zero-cost factor, it's still less prone to viruses than Windows. Most Linux machines start out as Windows computers that are reformatted. Linux is also adaptable -- Linux is an OS kernel, not a full system, but is the heart of software distributions such as Ubuntu or Fedora. As for cons, Linux is more complex to learn and use. There are also far fewer programs written for Linux systems. Of course, someone with an advanced online computer science master’s degree will help you make the most of a Linux system by supplying the skills needed to innovate and implement custom solutions for your business environment. Read more

LinuxCon, Linux at 25, and Linux Development

5 Ways to Solve the Open Source Industry's Biggest Problems

Over the last decade, open source software and its audience of end users have greatly matured. Once only used by a small subset of tech-savvy early adopters, the convenience, effectiveness and cost savings of open source solutions are now driving enterprise IT to explore more ways to take advantage of the power of open source in their daily business operations. In today's economy, enterprise IT has less to gain from developing and licensing software and more to gain from actively working with existing open source technology. However, the march toward open source still faces major obstacles before it becomes mainstream. In this slideshow, Travis Oliphant, CEO and founder of Continuum Analytics, outlines five challenges preventing enterprise IT from shifting to open source and tips for tackling them to keep the future of open source heading in the right direction. The road may be winding, but it will eventually lead companies to open source to help them innovate and as the way of the future. Read more Also: Latest attacks on privacy...

Security News

  • Jay Beale: Linux Security and Remembering Bastille Linux
    Security expert and co-creator of the Linux-hardening (and now Unix-hardening) project Bastille Linux. That’s Jay Beale. He’s been working with Linux, and specifically on security, since the late 1980s. The greatest threat to Linux these days? According to Beale, the thing you really need to watch out for is your Android phone, which your handset manufacturer and wireless carrier may or may not be good about updating with the latest security patches. Even worse? Applications you get outside of the controlled Google Play and Amazon environments, where who-knows-what malware may lurk. On your regular desktop or laptop Linux installation, Beale says the best security precaution you can take is encrypting your hard drive — which isn’t at all hard to do. He and I also talked a bit, toward the end, about how “the Linux community” was so tiny, once upon a time, that it wasn’t hard to know most of its major players. He also has some words of encouragement for those of you who are new to Linux and possibly a bit confused now and then. We were all new and confused once upon a time, and got less confused as we learned. Guess what? You can learn, too, and you never know where that knowledge can take you.
  • Automotive security: How safe is a next-generation car?
    The vehicles we drive are becoming increasingly connected through a variety of technologies. Features such as keyless entry and self-diagnostics are becoming commonplace. Unfortunately, they can also introduce IT security issues.
  • Let's Encrypt: Every Server on the Internet Should Have a Certificate
    The web is not secure. As of August 2016, only 45.5 percent of Firefox page loads are HTTPS, according to Josh Aas, co-founder and executive director of Internet Security Research Group. This number should be 100 percent, he said in his talk called “Let’s Encrypt: A Free, Automated, and Open Certificate Authority” at LinuxCon North America. Why is HTTPS so important? Because without security, users are not in control of their data and unencrypted traffic can be modified. The web is wonderfully complex and, Aas said, it’s a fool’s errand to try to protect this certain thing or that. Instead, we need to protect everything. That’s why, in the summer of 2012, Aas and his friend and co-worker Eric Rescorla decided to address the problem and began working on what would become the Let’s Encrypt project.
  • OpenSSL 1.1 Released With Many Changes
    OpenSSL 1.1.0 was released today as a major update to this free software cryptography and SSL/TLS toolkit. In addition to OpenSSL 1.1 rolling out a new build system and new security levels and support for pipelining and a new threading API, security additions to OpenSSL 1.1 include adding the AFALG engine, support for ChaChao20 in libcrypto/libssl, scrypto algorithm support, and support for X25519, among many other additions.
  • Is Windows ​10’s ‘Hidden Administrator Account’ a security risk? [Ed: Damage control from Microsoft Jack (Jack Schofield) because Microsoft Windows is vulnerable by design]