Language Selection

English French German Italian Portuguese Spanish

Web

An open source success: EFF ‘awed’ by response to project for easily contacting Congress

Filed under
OSS
Web

On Tuesday, the Electronic Frontier Foundation called on hackers to revolutionize how everyday people contact Congress — and it’s been absolutely floored by the response.

The digital rights advocate is building a free, public domain tool that makes it simple to contact any member of Congress from one central location. The EFF and project partner Sunlight Foundation finished the backend themselves, but they needed help from web developers to test all the different forms for each member of Congress.

Read more

IoT dev kit includes Linux-based multiprocol router

Filed under
Linux
Hardware
Web

Echelon introduced its IzoT Industrial Internet of Things (IIoT) framework for peer-to-peer networking of embedded controllers last October. At that time, the building automation and smart grid networking vendor released the IzoT multi-protocol stack in an ARM-ready beta version and reference implementation optimized for the Linux-based Raspberry Pi SBC. Since then, support has extended to the BeagleBone Black.

Read more ►

Open source project builds mobile networks without big carriers

Filed under
OSS
Web

Open source projects garner the attention of the tech community because the passionate people behind these developments occasionally cause major disruption and create opportunities to change industries, as Android and Linux did.

Read more ►

HostGator, Linux and The Dukes of Hazzard

Filed under
Linux
Web

linux-blog.org: Many times in IT job settings, you’ll find that you need to become one of ‘the good ole boys’ in order to accomplish your job. You have to like the things others’ like (or pretend to), you have to laugh at the things others’ laugh at. In other words, you may have to become all things to all people. It’s stupid that things are this way…

Ode to Groklaw: A Requiem for What Was Lost

Filed under
OSS
Web

linuxinsider.com (blog safari): Groklaw is "truly the canary in the coal mine," suggested blogger Martin Espinoza. "When it is no longer possible to tell the truth online sufficiently for it to exist, none of us have the freedom of speech.

Forced Exposure ~pj (Groklaw shuts down)

Filed under
Web

groklaw.net: The owner of Lavabit tells us that he's stopped using email and if we knew what he knew, we'd stop too. There is no way to do Groklaw without email. Therein lies the conundrum. What to do? And the conclusion I've reached is that there is no way to continue doing Groklaw.

Oracle's Unbreakable Linux website takes a break

Filed under
Linux
Software
Web

theregister.co.uk: It might be dubbed "unbreakable", but Oracle’s Unbreakable Linux website is certainly stoppable.

OpenMandriva.org Suffers Outage, Restored Now

Filed under
MDV
Web

ostatic.com: I'd been wondering when some news was going to come out of the OpenMandriva camp, but today's tidbit wasn't what I hoped. Instead of a developmental release to test, Anurag Bhandari posted to announce that the OpenMandriva network was back up and running.

NSA Exposes Cloud Computing’s Weakness

Filed under
Linux
Web

fossforce.com: Cloud computing was always a bad idea. Ask Richard Stallman; he’ll tell you. Or ask me. We’ve learned that while we’ve been busy wearing tinfoil hats to keep the government from picking our brains, they’ve been doing it anyway, through our computers.

Ubuntu forums hacked; 1.82M logins, email addresses stolen

Filed under
Web
Ubuntu

zdnet.com: Canonical, the company behind the Ubuntu operating system, has suffered a massive data breach on its forums. All usernames, passwords, and email addresses were stolen.

Syndicate content

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud