EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.08.15

Microsoft-Connected Anti-Google AstroTurfing Group Tries to Push Google to Web Censorship, With IDG’s Help (Plus an Attack on Free/Libre Software)

Posted in Free/Libre Software, FUD, Google, Microsoft at 8:33 am by Dr. Roy Schestowitz

IDG/CIO

Summary: CIO, a Web site of IDG, smears Microsoft’s competition by quoting sources that are closely aligned with and/or subservient to Microsoft

AN old ‘friend’, a branch of Microsoft AstroTurfing ‘Consumer’ ‘Watchdog’, has just reared its ugly head again with help from IDG‘s “CIO” (a misleading site name). Consumer Watchdog is not a watchdog and it’s not for consumers. IDG should know better than that by now. Consumer Watchdog is an attack dog and a front group against Google. Right now it complains that Google is not censoring enough (as if censorship is a good thing). Remember that censorship is not privacy and “Consumer Watchdog” cares only about making Google look bad, it never cared about privacy at all.

To quote the nonsense from IDG’s “CIO” site (neglecting to correctly identify the messenger): “Consumer Watchdog will file a complaint against Google with the U.S. Federal Trade Commission Tuesday, said John Simpson, director of the group’s Privacy Project. The complaint will ask the FTC to rule that Google, by declining to delete search engine links on request from U.S. residents, is an unfair business practice that violates the U.S. FTC Act.”

‘Consumer’ ‘Watchdog’ has a Privacy Project? That’s just hilarious. That’s would be like BP forming a “green group”. Moreover, it is hilarious that IDG covers “privacy” and pretends that it cares about the concept because CIO, for example, based on NoScript, want to run a massive number of scripts on my machine from just about thirty different domains! Holy cow! The reader is the product and browsing habits are up for sale to so many entities at the same time. The same is true for other sites of IDG (there are many of them).

“The original source of that really bad scraper site is a CIO trash opinion piece,” wrote someone to us. IDG has become complicit in lobbying and AstroTurfing, whether it realises this or not.

Another new piece of garbage came from IDG only a short while ago, quoting XenSource (Microsoft-friendly as we have shown many times in past years) as some kind of authority on FOSS. This is again mischaracterising the messenger to give the messenger undeserved credibility. That’s like calling Richard Stallman an “open core” proponent. The headline boldly states that “open source business model is a failure” and the body belatedly adds vital context to this headline: “That’s the conclusion of Peter Levine, a partner at Andreessen Horowitz, the Silicon Valley venture capital firm that backed Facebook, Skype, Twitter and Box as startups. Levine is also former CEO of XenSource, a company that commercialized products based on the open source Xen hypervisor.”

“…sites that pretend to offer ‘news’ often just treat readers (audience) as the product, selling the audience to the real client (the advertiser or agenda setter).”Levine is not a truly technical person and he ignores plenty of evidence that open source as a business model works, and often works very well. A lot of people can easily claim that the proprietary software business model is inherently flawed because very few proprietary software companies sell stuff (only a few giants do). A lot of those claiming that no open source business model can work also say FOSS is sexist, racist, not secure, brings licence/liceinsing risk, etc. — the very same things that can be said about proprietary software. If only 10% of Free/libre software companies manage to survive in the long term (based on level of sustainable income) it might not be any different, statistically, from their proprietary counterparts. The company my wife and I work for does manage to make income from Free/libre software development and maintenance. This company is far from the only one in Europe and many are doing very well. Proprietary software is not a business model. Free/libre software development is not a business model either. It’s modality of distribution/development. People buy services, not zeros and ones. For IDG to publish and republish misleading headlines like “Why the open source business model is a failure” is merely to provoke. For IDG to call ‘Consumer’ ‘Watchdog’ a “privacy group” (even in the headline) and to label censorship “right to be forgotten” is to reveal sheer bias. Remember that Microsoft is a huge client of IDG (advertising, IDC contracts and so on), so maybe we oughtn’t be very shocked by that. Here is a great new example of proprietary software advertment disguised as an article. It bashes Free/libre software as a whole, too, while promoting one particular piece of proprietary software in Computer Weekly.

Watch out what you read because there is plenty of agenda on sale everywhere. Moreover, sites that pretend to offer ‘news’ often just treat readers (audience) as the product, selling the audience to the real client (the advertiser or agenda setter). That’s their business model. Very unethical.

Openwashing of Proprietary Software With Back Doors

Posted in Microsoft, Security, Windows at 7:43 am by Dr. Roy Schestowitz

A game of perception alternation

“Well, it’s in the brand. The image you create around the brand. That’s why I need you in this company. Because nobody in this company, or in this industry, really understands that. And if we can have the perception, I can create the reality. With the combination of the reality and the perception, nobody will ever beat us.”

Bill Gates

Summary: More AstroTurfing for Vista 10, including shameless promotion of the mere perception of it being ‘open’ and ‘secure’

THINGS must be working out pretty well for Microsoft’s PR agencies when/if even some Linux sites are willing to promote the NSA-friendly (hyper-visor runs only on Windows) Hyper-V. This is a little frustrating because it is not hard to see what it’s all about for Microsoft, whose software is made insecure by design. As FOSS Force put it the other day:

I assume that most enterprise users of Microsoft products already know not to trust Redmond to handle Windows’ security. I worry, however, about the poor consumer who plops a thousand dollars down for a laptop, and thinks it’s just fine to stop in to use the free Wi-Fi at Mickey Dee’s for a quick check of the bank account while being protected by nothing more than the best Redmond has to offer.

It looks like Vista 10 will remain as flawed and inherently insecure and its predecessors, no matter how much AstroTurfing Microsoft does (it gets worse by the day, as perception changing is the goal with official release day imminent) and how much openwashing Microsoft constantly does. It’s hard to keep up with the propaganda and refute it quickly enough.

Yesterday we spotted Microsoft’s propaganda channel (Channel 9) brainwashing Microsoft staff and readers of Channel 9, implicitly telling them that Visual Studio “open source”. Openwashing of SAP [1] and Apple [2] (below) could also be found in the news yesterday, so not only Microsoft does this. Remember that both companies were asked (if not demanded) by Russia to reveal their source code last year, for fear of back doors. We don’t know if SAP and Apple ever complied.

Related/contextual items from the news:

  1. SAP’s commitment to open source is paying off

    SAP SE is dedicated to helping businesses respond to market demands around the clock, according to Steve Lucas, president of Platform Solutions at SAP. Its partnership with Red Hat, Inc. is a key part of its strategy. In an interview with theCUBE at RedHat Summit, Lucas explained further.

  2. More Big Name Technology Corporations Are Going Open Source

    Recently, Apple released its programming language, Swift 2, to the public. By releasing Swift to the open source community, Apple is giving software developers more access to and control over the programming language. This release opens up a myriad of exciting possibilities for application development, software advancements and increased functionality.

Europe Goes Down a Dark Route When It Comes to Patent Scope and Centralisation

Posted in Apple, Europe, Patents at 7:19 am by Dr. Roy Schestowitz

Who’s copying who?

Bush visits Brussels

Summary: Europe is being drained by the patent industry (lawyers, judges, etc.) while the US gradually takes on the problem

“So Software isn’t Patentable in the EU but the EPO is ignoring the Law?”

That’s a comment made the other day by “AntiSoftwarePat” over at Twitter. Well, we have already shown many other instances where the EPO ignores the lawknowingly too — including the extension of patent scope (in order to artificially elevate patents count).

The Unitary Patent will take expansion of patent scope even further, transcending borders. “UK Unitary Patent ratification before Brexit referendum, Mr Cameron is taking risks by giving EU super patent powers,” wrote the FFII’s President regarding this new article about UK-IPO. “In a statement sent to Out-Law.com,” said the author, “the IPO ruled out ratification of the Agreement this year but said that it intends to complete the “domestic preparations” for ratification ahead of the UK referendum on whether the country should remain in the EU, which is scheduled for some time in 2017.”

So they are jumping the gun. The public isn’t even taken into account.

“Hey, let’s patent life,” some folks may think (they can make a lot of money from that). According to this article from a London-based blog of lawyers, “Life sciences come to life again, this time in Berlin”. To quote: “Arrangements are now being made for the training of judges, the provision of court facilities and the projecting of existing patenting and dispute resolution techniques on to a fresh canvas. This is a scenario in which the accumulated experience, knowledge and wisdom of the life science sector cannot be relied upon in the absence of rigorous double-checking against a new framework for patenting, new litigation rules and — this is going to hurt the most — a set of complex transitional provisions.”

This shows that Europe is rushing (even fast-tracking) these expansions without public consent. While the US is narrowing down patent scope, Europe seems to be expanding patent scope.

A new article from the US (CBS) asks: “What would ‘real’ patent reform look like?”

The author correctly points out that “last year, the US Supreme Court issued a number of patent-related decisions that drew modest limits around both the process and substance of newly created categories of patents, including for software and business methods. Courts and the Patent Office became more aggressive about rejecting or overturning applications that should never have been granted. As a result, the overheated market for low-quality patents collapsed.”

The whole patent system in its current form is so utterly corrupt, biased and inherently protectionist (that’s just its goal, not publication). Too few people are willing to say that. Watch what Apple is patenting right now [1, 2]. It’s computer vision, i.e. software patents, on selfies! Will Europe go down the same abyss? hopefully not. European citizens need to educate themselves about what today’s patent system really is and who it benefits.

Red Hat and NSA: This is Not News

Posted in GNU/Linux, Red Hat, Security at 6:47 am by Dr. Roy Schestowitz

Red Hat and back doors: poll from FOSS Force

Red Hat poll

Summary: The return of XKEYSCORE to some media outlets (not news anymore) brings us back to debating Red Hat’s role (also not really news)

QUITE a few sites (see [1-3] below) seem to be talking about Red Hat’s special (but no longer secret) relationship with the NSA, which is not at all news. The NSA uses a lot of RHEL (and also Fedora) on some malicious spying equipment, based on various NSA leaks. We already wrote a great deal about this back in 2013 [1, 2, 3, 4]. The only new thing we learn from the latest articles is that Red Hat continues to refuse to remark on the subject, even when asked by journalists (see the first article below).

Related/contextual items from the news:

  1. NSA runs its spying activities on Red Hat Linux

    A little over two years ago, the first disclosures about the massive surveillance operation being carried out by the NSA were made in the Guardian, thanks to an intrepid contractor named Edward Snowden.

    Now comes the rather disturbing information that the NSA runs its XKEYSCORE program — an application that the Intercept, the website run by journalist Glenn Greenwald, describes as NSA’s Google for private communications — for the most part on Red Hat Linux servers.

  2. Evil NSA runs on saintly Linux, Apache, MySQL

    If report is correct, Red Hat’s marketing department has a very tricky customer reference

  3. Red Hat Used by NSA Spies, SELinux Possibly Bypassed

    SELinux is a product of the NSA and some worried when it was added to Red Hat, Fedora, and later many other distributions. Even before Snowden revealed the massive government spying, having the NSA anywhere near Linux activated certain Spidey-senses. Now we learn that SELinux may have had an exploit for bypassing the security enforcements. Italian software company Hacking Team, who admits to providing “technology to the worldwide law enforcement and intelligence communities,” has been selling technology to governments (most with bad human rights records) to assist in gathering surveillance data on citizens, groups, journalists, and other governments. Recently Hacking Team was hacked and their information has been leaked onto the Internet. Besides the SELinux exploit, it’s been reported that the FBI, U.S. Army, and the Drug Enforcement Agency are or were customers of Hacking Team’s services.

Links 8/7/2015: Kali Linux 2.0, Canonical and Lenovo

Posted in News Roundup at 6:44 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 10 compelling reasons to consider open source for your enterprise storage needs

    Enterprise needs are a different beast from those of SMBs. Few areas define this as clearly as storage. Instead of storing a few hundred gigabytes, you’re looking at terabytes and maybe even petabytes. Failover, redundancy, security, backups—all essential when it comes to enterprise storage.

    You might think the only viable solutions for such tasks are proprietary solutions. Fortunately, for businesses and those working within them, that assumption is incorrect. Open source has come a long way and now powers the backbone of enterprise computing—and that includes storage. Don’t believe me? Take a look at the following 10 reasons why open source could be the right storage solution for your organization.

  • How designers can contribute to open source

    We all know that open source software isn’t always pretty. Una Kravets, a front end developer at IBM, will be speaking at OSCON this year about getting more designers involved in our projects. While it’s easy for developers to see that working together produces better software, it’s not always that way for designers who are trained to work alone. I had the chance to interview Una about open source, design, and her upcoming talk.

  • Interview with Roberto Galoppini of SourceForge

    I’ve been involved with open source software since 1994. At that time I was working for a solution provider, and a customer asked us to implement a seamless authentication system for mobile users. Neither RADIUS or TACACS met our needs, and we had to build a custom solution. Luckily enough, we didn’t need to start from scratch, as we were able to borrow some open source code.

  • Google Open Sources Deep Learning AI Tool
  • Events

    • Open source event planning is work, fun, and good for business

      In addition to picking up technical skills, networking, and learning about products and services in the expo, OSCON attendees can learn practical community-building tricks. In this interview, Kara Sowles (community initiatives manager at Puppet Labs) and Francesca Krihely give advice for hosting a community event. They’ll be teaching a half-day tutorial on planning and running tech events at OSCON 2015 in Portland.

  • Web Browsers

    • Mozilla

      • Education is crucial to building an open web

        Emma Irwin is a participation designer at Mozilla who dedicates a lot of volunteer time to educating and empowering adults and youth on the web through making. She has a background as web developer and lives in a small Vancouver Island town with her husband and three daughters.

      • Firefox 40.0 Beta 1 Brings Linux Specific Improvements

        As you may already know, Firefox is being developed on three separate channels. First, the features are implemented in the developer branch, they reach the beta channel when enough tests have been performed and finally, some of the new features from the betas get included in the stable version of Firefox.

        Recently, Firefox 40.0 Beta 1 has been released, bringing improved scrolling, graphics and video playback performance for Linux. And Mozilla claims that this improvements are Linux specific.

      • Mozilla Plans To Rewrite Its XUL-Written UI In HTML, CSS And JavaScript
      • Big changes are coming to Firefox to win back users and developers

        Firefox is about to undergo some dramatic changes, according to Mozilla. Most notably, it sounds like future versions of Firefox will focus on Firefox-esque features such as Private Browsing Mode, while features that are unpolished or otherwise not very useful will be stripped out of the browser entirely. Furthermore, it looks like Mozilla is finally getting serious about moving Firefox away from XUL and XBL, though it isn’t clear if they will be replaced with open Web technologies (HTML, CSS, JS) or native UI.

      • Will Firefox changes win back users and developers?

        Firefox has gone through a rough time over the last couple of years, with increased competition from Chrome and other browsers. Now the browser’s developers are planning big changes to Firefox. Will these changes win back users and developers who have abandoned Firefox?

  • SaaS/Big Data

    • OpenStack Meiji 明治 Set to Succeed Liberty

      The next major OpenStack cloud platform release is set to debut in October and is codenamed : Liberty but what follows Liberty? OpenStack Foundation members have voted and the winning name is Meiji.

  • Databases

    • Open-Source Databases Pose a Threat to Oracle’s Dominance

      In June, Bloomberg conducted a survey of 20 startups valued at $1 billion or more, reporting, “None of the companies surveyed indicated they had a large Oracle database deployment for their main services though many used bits of Oracle software to run aspects of their organizations.”

Leftovers

  • Security

    • OpenSSL tells users to prepare for a high severity flaw

      Server admins and developers beware: The OpenSSL Project plans to release security updates Thursday for its widely used cryptographic library that will fix a high severity vulnerability.

      OpenSSL implements multiple cryptographic protocols and algorithms including TLS (Transport Layer Security), which underpins encryption on the Web as part of protocols like HTTPS (HTTP Secure), IMAPS (Internet Message Access Protocol Secure) and SMTPS (Simple Mail Transfer Protocol Secure).

    • The Mob’s IT Department

      A few days earlier, small USB drives had been inserted into the company’s computers. They were programmed to intercept the nine-digit PINs that controlled access to DP World’s shipping containers. Besides fruit, metals, and other legitimate cargo, some of these containers carried millions of euros in heroin and cocaine. To get their drugs out of the port, often traffickers use low-tech methods: They hire runners to jump fences, break open containers, and sprint away before guards can catch them, earning as much as €10,000 ($11,200) a trip. Stealing PIN codes is more elegant and less risky. Whoever has the codes can pull into the terminal, enter the PIN into a keypad, wait as robot-controlled loaders put the container on their truck, and drive off—sometimes minutes ahead of the cargo’s legitimate owner.

      [...]

      There was only one condition of the release: Van De Moere had to give Okul an intensive training session on Linux, the operating system on which Metasploit, the hacking software, is based. A few weeks later, according to police and interviews, he did so over one weekend at a Holiday Inn in Ghent. In November, Van De Moere returned two antennas and had a couple of beers with Okul. That was the last either man would see of the Turks.

    • Anti Evil Maid 2 Turbo Edition

      Joanna Rutkowska came up with the idea of Anti Evil Maid. This can take two slightly different forms. In both, a secret phrase is generated and encrypted with the TPM. In the first form, this is then stored on a USB stick. If the user suspects that their system has been tampered with, they boot from the USB stick. If the PCR values are good, the secret will be successfully decrypted and printed on the screen. The user verifies that the secret phrase is correct and reboots, satisfied that their system hasn’t been tampered with. The downside to this approach is that most boots will not perform this verification, and so you rely on the user being able to make a reasonable judgement about whether it’s necessary on a specific boot.

  • Defence/Police/Secrecy/Aggression

    • Israeli Soldiers Break Their Silence on the Gaza Conflict

      Of all the voices challenging the Israeli military’s occupation of the Palestinian Territories, those of Israeli soldiers stand out as powerful insights from within the military establishment.

      Avner Gvaryahu is director of public outreach for Breaking the Silence, a group of Israeli veterans who are working to dismantle the traditional narrative put forth by their own military establishment. The former soldiers founded the organization in 2004 after realizing they shared deep misgivings about what they had seen and done while serving in the Occupied Palestinian Territories. They felt a moral obligation to present the truth, and over the past decade, they have collected, fact-checked, and published over a thousand testimonies from soldiers of ranks high and low. These testimonies reflect a deterioration of moral standards and worrying shifting of the rules of engagement. Through lectures, reports, and other public events, Breaking the Silence has brought to light what so many try to ignore: the grim reality of what it takes to sustain a military occupation of an entire population.

    • The Spiral of Despair

      We have companies that recruit and control active armies of mercenaries, which are responsible for thousands of deaths overseas. I detest the violence of “ISIS” but it is not morally different from Executive Outcomes machine gunning villages from helicopters in Angola or from Aegis killing random vehicle occupants in Iraq who happened to be near their convoys. Yet Tony Buckingham and Tim Spicer became extremely rich after founding their careers on the latter killings, and now are respected figures in the London establishment. Apparently killing for money is good; only killing for religion is bad.

  • Finance

    • Greek banks prepare plan to raid deposits to avert collapse [scare tactics before the referendum]

      Greek banks are preparing contingency plans for a possible “bail-in” of depositors amid fears the country is heading for financial collapse, bankers and businesspeople with knowledge of the measures said on Friday.

    • Slavoj Žižek on Greece: This is a chance for Europe to awaken

      The unexpectedly strong No in the Greek referendum was a historical vote, cast in a desperate situation. In my work I often use the well-known joke from the last decade of the Soviet Union about Rabinovitch, a Jew who wants to emigrate. The bureaucrat at the emigration office asks him why, and Rabinovitch answers: “There are two reasons why. The first is that I’m afraid that in the Soviet Union the Communists will lose power, and the new power will put all the blame for the Communist crimes on us, Jews – there will again be anti-Jewish pogroms . . .”

    • “A Europe of Equals”: Report from Athens as Greek Voters Seek Alternatives to Austerity

      Greek Prime Minister Alexis Tsipras has arrived in Brussels for an emergency eurozone summit two days after Greek voters overwhelmingly turned down the terms of an international bailout in a historic rejection of austerity. On Sunday, Greeks, by a 61-to-39-percent margin, voted against further budget cuts and tax hikes in exchange for a rescue package from European creditors. Tsipras is scrambling to present a new bailout proposal as Greek banks remain shut down. If Greek banks run out of money and the country has to print its own currency, it could mean a state leaving the euro for the first time since it was launched in 1999. Euclid Tsakalotos was sworn in Monday as Greece’s new finance minister, replacing Yanis Varoufakis, who resigned following Sunday’s referendum. Tsakalotos, who has called for a “Europe of equals,” had served as Greece’s main bailout negotiator and has been a member of Syriza for nearly a decade. Like Varoufakis, Tsakalotos has been a vocal opponent of fiscal austerity imposed by the core of the eurozone, saying it has unnecessarily impoverished Greece. We go to Athens to speak with Paul Mason, economics editor at Channel 4 News, and economics professor Richard Wolff.

    • How the media discredit Greek democracy

      The EU elites, referred to as “creditors” but actually representing Europe’s large financial institutions, are repeatedly described as “mainstream”. That is presumably supposed to confer legitimacy on them and suggest they represent Europe and Europeans. But there is nothing “mainstream” about these unaccountable elites trying to bring about “regime change” in Greece by bleeding the country of hope. If they succeed and Syriza goes down, Greece will end up with real extremists – either the neo-Nazis of Golden Dawn or the country’s crony elites who got Greece into this mess, with the aid of the wider European elites, in the first place. What “mainstream” opinion in the rest of Europe thinks about Greece, Syriza or the European project is impossible to gauge because most European countries are too terrified to put such questions to their electorates in the way Syriza has done. – See more at: http://www.jonathan-cook.net/blog/2015-07-06/how-the-media-discredit-greek-democracy/#sthash.XwlWGfHp.dpuf

  • PR/AstroTurf/Lobbying

    • Lobbying’s ex-files

      Several former commissioners are making the most of their status to gain access to EU policymakers.

  • Censorship

    • Appeals judges hear about Prince’s takedown of “Dancing Baby” YouTube vid

      A long-running copyright fight between the Electronic Frontier Foundation and Universal Music over fair use in the digital age was considered by an appeals court today, a full eight years after the lawsuit began.

      EFF and its client Stephanie Lenz sued Universal Music Group back in 2007, saying that the music giant should have realized Lenz’s home video of her son Holden dancing to Prince’s “Let’s Go Crazy” was clearly fair use. Under EFF’s view of the Digital Millennium Copyright Act, Universal should have to pay damages for a wrongful takedown.

  • Privacy

    • New Dutch law would allow bulk surveillance, compelled decryption

      The Netherlands has launched a public consultation (in Dutch) on a draft bill (Google Translate) that updates the country’s existing Intelligence & Security Act of 2002. The proposed bill is wide-ranging, covering things like the use of DNA samples and the opening of letters, but a key part concerns the regulation of bulk surveillance online. As Matthijs R. Koot explains in a blog post, under the new law, mandatory cooperation will be required from “not only providers of public electronic communications networks and services, but also providers to closed user groups, including telcos, access providers, hosting providers and website operators.”

      Importantly, domestic interception is explicitly allowed: “The services are authorized to, using a technical aid, wiretap, receive, record and listen to any form of telecommunications or data transfer via an automated work [a computerised system] regardless of location.” However, a new constraint on bulk collection is introduced: all such interceptions must be conducted in a “purpose-oriented manner.” As Koot notes, this aims to “limit the hay stack created using non-specific interception to relevant information,” although it is not yet clear how broad those “purposes” can be.

    • UK and US demands to access encrypted data are ‘unprincipled and unworkable’

      Influential group of international cryptographers and computer scientists says proposals will open door to criminals and malicious nation states

    • Hacking Team Asks Customers to Stop Using Its Software After Hack

      After suffering a massive hack, the controversial surveillance tech company Hacking Team is scrambling to limit the damage as well as trying to figure out exactly how the attackers hacked their systems.

    • Eric Holder: The Justice Department could strike deal with Edward Snowden

      Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow.

    • Wetware: The Most Important Trend in Malware

      The number of vulnerabilities in the wild is growing. The number of exploits, as well as the speed of those exploits — in the case of Heartbleed, only four hours from the publication of the vulnerability to a circulating exploit — is somewhat disheartening, if not all that surprising.

  • Internet/Net Neutrality

    • The Long Slow Death of IPv4

      Last week my inbox got flooded by PR comments about how the Internet was running out of addresses, as ARIN (American Registry of Internet Numbers) and its public relations people were warning about IPv4 address availability.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts