EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.01.12

Links 01/01/2012: Alien Arena 7.53, Calculate Linux 11.12

Posted in News Roundup at 5:21 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Think Penguin’s “Penguin Air” Review.

    It wasn’t that long ago when we were forced to buy Windows machines, only to uninstall it and install Linux. But for most everyone, things are still the same. We shamelessly hand over our hard-earned money to Microsoft for something that we never wanted, nor planned to ever use. Most laptops are more than powerful enough for us to get by on, and those of us who know a thing or two about system requirements will gladly take a bargain system if it suits our needs. Sometimes it’s just about freedom, though many don’t know what it is as it regards to computing. You can certainly liberate any laptop (or desktop for that matter) from its shackles and regain freedom, but it goes a little deeper than that.

  • No Rants Just Sincere Concerns for Linux at Home

    Gone are the days of dirty commands on a text console. In 2012 99% users are going to use computers as just other electronic appliances. They are not going to worry what’s going under the hood as long as it works. I’m using Linux more than a decade (two of my home PCs are linux – Debian and PCLinuxOS, 100′s of my office workstations are linux – CentOS and Fedora), even administered some desktops for sometime. Here are my list of basics that go wrong in Linux, always.

  • Softpedia Linux Weekly, Issue 180, Happy New Year!
  • Kernel Space

    • Host storage devices vulnerable with KVM Linux virtualisation

      According to a kernel update advisory by Red Hat, root users in a guest system that is virtualised with KVM (Kernel-based Virtual Machine) can, in certain circumstances, gain read and write access to the Linux host’s storage devices. The advisory says that the hole exists when a host makes available partitions or LVM volumes to the guest as “raw disks” via virtio. Privileged guest users can send SCSI requests to such volumes that the host will execute on the underlying storage device – which allows the guest system to access all areas of the device rather than just the permitted partitions or volumes.

    • Graphics Stack

  • Applications

  • Desktop Environments

  • Distributions

    • Best Desktop Distributions

      A few days ago a friend, being new to Linux, asked me about different distributions and that led to a long talk about their merits and failings. So, being new to blog-sphere, I decided to play it safe and write about best desktop distributions. But I also thought that I could do this a little differently. Best as in best for the Linux Desktop. First let us find some criteria for choosing distributions:

      1. Considering an usual desktop user uses around 1000-2000 package, the distribution must have over 10000 packages. Let’s just say over 9000.
      2. It must not be a cosmetic derivative, or a derivative of a derivative of a derivative of a…
      3. It must be up-to-date. My criteria for this is two important packages: linux (* > 3.0.6) and libreoffice (* > 3.3). This packages manage to give a good sense of up-to-dateness for the desktop.
      4. It must have an active community.
      5. It must support both KDE and Gnome 3.
      6. It must not be a testing variant.

    • That’s my name, don’t wear it out

      Linux Mint: I particularly like the naming convention Clement Lefevbre has come up with for Linux Mint. It’s alphabetically a woman’s name ending in “a.” We’re at Julia now. I asked Clement once what he’d do when he got to “Zelda” (or whatever the “Z” name will be for Linux Mint when they get that far . . . and they will), and he said that it was simple: Start with a name beginning with “A” and end the name in “e.”

    • New Releases

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Firefox 9 Is 30% Faster Than Firefox 8 | Install Firefox 9 On Ubuntu 11.10 and Earlier Releases
          • Search YouTube videos on Ubuntu with the YouTube Lens
          • What I Love About Ubuntu Unity

            I think the most important thing to understand about Unity is that it is not primarily a program or a desktop. It is primarily a set of specifications which are implemented in different ways. The two most prominent implementations are Unity and Unity 2D, but there are already several others. Since Unity is a set of specifications, it is possible to implement parts of it without that being considered an incomplete implementation. For instance, the indicators are supported on LXDE, Xfce, Windows, KDE and others. This is very important. For instance, people are complaining about not all Gnome Panel applets being ported to Gnome Panel 3 yet. This is because the applets become part of the panel itself, meaning that it has to be completely compatible or it won’t work. This is not the case with indicators, which is why all indicators are already supported on Gnome Panel 3. The panel just needs to support the indicator specification and then all indicators automatically work. It is also an uncomplicated specification, so it’s easy and quick to do.

          • Ubuntu rolling out the new

            If you’ve been thinking about giving Linux a run on your computer, Ubuntu’s next major release could be the one for you.

            Ubuntu 12.04, otherwise known as Precise Pangolin, will be released in April 2012 and promises to be one of the better releases of the past year from Canonical as the Ubuntu developers finally get to grips with the major desktop changes the OS has been going through.

          • Flavours and Variants

  • Devices/Embedded

Free Software/Open Source

Leftovers

  • Verizon Does A GoDaddy Drops $2 Bill Charge Plan

    It appeared to be a GoDaddy like day for Verizon and the customer broke the hell. The next day Verizon was forced to drop the plan.

  • Security

    • Researchers publish open-source tool for hacking WiFi Protected Setup

      On December 27, the Department of Homeland Security’s Computer Emergency Readiness Team issued a warning about a vulnerability in wireless routers that use WiFi Protected Setup (WPS) to allow new devices to be connected to them. Within a day of the discovery, researchers at a Maryland-based computer security firm developed a tool that exploits that vulnerability, and has made a version available as open source.

  • Finance

  • PR/AstroTurf/Lobbying

  • Civil Rights

    • Go Daddy really and truly opposes SOPA now

      Now, after the Reddit Go Daddy protest gathered steam; Wikipedia’s Jimmy Wales announced that he would be moving Wikipedia’s domain names from Go Daddy; and, last but not least, aggressive ads from competiting Internet domain registry and hosting companies such as Namecheap, Adelman has had a real change of heart.

  • Copyrights

    • Actual damages for single unauthorized download of software program held to be cost of single license fee
    • Goodwill And Hospitality Theft Continue To Drive Up The Cost Of The Holiday Season

      This holiday season many lawyers, executives, lobbyists, and politicians will have their relatives, friends, and family members stay in their households. With the economy slumping, some out-of-town visitors can’t afford to stay at hotels. When money is tight, these visitors know they can count on the hospitality of family and friends, who will welcome them in with open arms and good cheer.

      However, these hosts need to remain vigilant and avoid being swept up in the general goodwill of the holiday season. In the rose-colored fog of the Christmas-to-New Year’s festivities, it’s easy for these situations to get out of hand. Guests have a tendency to get too comfortable very quickly and before you realize it, it’s nearly February and a variety of house guests have begun to refer to you as “Dad” or “Grandpa” and you’re on the hook for video rentals, dry cleaning bills and dental appointments. Your vehicle is now referred to as the “family car” (often by non-family members), your house has become a combination day care/animal shelter and your walk-in closet is now home to a family of Guatemalan refugees.

      What starts as selfless “giving” swiftly becomes one-sided “taking.” These interlopers are not only stealing the relatively priceless* time of their hosts, but also their unbillable goodwill. While “goodwill” would seem to be in infinite supply during the latter part of December, the available supply dwindles at a rate inversely proportionate to the number of hours the “family car” has been missing.

      *Not actually “priceless.” Billing for used time runs anywhere from $400/hr. [lawyers] to $55,000/hr. [executives] to $20+ billion/hr. [politicians].

      The result of this goodwill “piracy” is nothing short of tragic. As time and goodwill are swiftly “stolen” by house guests, the host’s direct family often finds itself having to do without. At best, they can only hope to have a few moments between meals and Immigration raids to angrily discuss efforts to block the rogue infringers, perhaps by seizing the guest bedroom and posting a sternly-worded warning on the door.

    • EA, Sony, Nintendo pull support from SOPA (but their industry association still supports it)
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 28/8/2014: Many New Games, CTO of Red Hat Steps Down

    Links for the day



  2. We Are Gradually Winning the Battle Against Software Patents

    The once-elusive war on software patents is finally leading to some breakthrough and even the Federal Circuit reinforces the trend of software patents' demise



  3. Free/Open Source Software (FOSS) Companies Versus FOSS Moles (VMware, Sonatype, Xamarin)

    A look at three entities which pretend to be pro-FOSS but are actually FOSS-hostile and very much determined to replace FOSS with proprietary software



  4. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  5. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  6. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  7. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  8. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  9. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  10. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  11. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  12. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  13. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  14. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  15. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  16. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  17. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  18. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  19. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  20. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  21. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  22. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  23. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  24. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day



  25. BlackBerry -- Like Microsoft Nokia -- Could be the Next Patent Proxy Troll

    BlackBerry is restructuring for patent assertion (i.e. trolling) in the wake of some alliances with Microsoft



  26. After Microsoft's Soft Bribe Some Non-Technical Deputy Does Not Like Free Software, Microsoft-Linked Media Responds to This Non-News by Making Bogus Claims of Munich Leaving GNU/Linux (Updated)

    The subversive forces that have secretly been attacking Munich over its migration to GNU/Linux (Microsoft press, Gartner, and even HP) are back to doing it while China and Russia follow Munich's lead



  27. Gates Foundation CFO Quits and Debate About Revolving Doors Recalled Amid Systematic and Shrewd Bribery of Public Officials

    More officials step out of the Gates Foundation and their destination is not known yet; Gates continues to corrupt the public sector with his money so as to increase personal gain at taxpayers' expense



  28. Links 19/8/2014: GNU/Linux Raves and Alternative to Proprietary Voice Chat

    Links for the day



  29. Links 18/8/2014: Linux 3.17 RC1, Escalation in Ferguson

    Links for the day



  30. Gartner Group Advocates Using Defective Software With Back Doors

    Despite strong evidence that Microsoft has been complicit in illegal surveillance, Gartner continues to recommend the use of Windows and other espionage-ready Microsoft software


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts