Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: Easy-To-Use Alternative To MS Access For a Charity's Database?

quantic_oscillation7 Kexi (281 comments)

Kexi

about 4 months ago
top

Eric Schmidt, Jared Cohen Say Google Data Now Protected From Gov't Spying

quantic_oscillation7 right...because the easter bunny is the new admin (155 comments)

right! and we are supposed to believe that just because they're saying so? is google going to break the law to support what they're saying?

and who protects us from google?
if they are so interested in protecting their users why not encrypt every user data with a key that only the user controls?

about 6 months ago
top

Open Source, Open World

quantic_oscillation7 CFR and FLOSS (76 comments)

BE AFRAID....

1 year,2 days
top

Ask Slashdot: What Distros Have You Used, In What Order?

quantic_oscillation7 SuSE (867 comments)

i started with SuSE in 1998, then Red Hat -> Mandrake/Mandriva -> Mepis-> kubuntu -> Debian and #!CB

about 2 years ago
top

Following FEMA's Zombie Preparedness Plan Could Land You On Terrorist List

quantic_oscillation7 Re:Did he disappear? Was he tortured? (527 comments)

well the NDAA and before that just executive orders enabled Bush and now mr Nobel Peace prize to make you disappear, be tortured and now killed withou any court intervention....

well i guess there's not much of a difference between that and Gestapo!

about 2 years ago
top

Ask Slashdot: Options For FOSS Remote Support Software?

quantic_oscillation7 you need GITSO (247 comments)

http://code.google.com/p/gitso/
.
.
.
.
"Gitso is a frontend to reverse VNC connections. It is meant to be a simple two-step process that connects one person to another's screen. First, the support person offers to give support. Second, the person who needs help connects and has their screen remotely visible. Because Gitso is cross-platform (Linux, OS X and Windows) and uses a reverse VNC connection, it greatly simplifies the process of getting support. "

about 2 years ago
top

Kasparov Arrested By Russian Police

quantic_oscillation7 Re:the bilderberg boy was arrested? (374 comments)

well color revolutions are associated with the CIA criminals, so i would say that are very dangerous things that have nothing to do with freedom or democracy....

about 2 years ago
top

Bill Gates Wants To Reinvent the Toilet

quantic_oscillation7 patents? open source? (338 comments)

does it have some patents? will it be open sourced so everyone could extend it?

or as usual it's just another way to make a buck by selling it to 3rd world countries?

more than 2 years ago
top

Why Intel Should Buy Nokia

quantic_oscillation7 powered by Maemo (200 comments)

that would be cool!
linux+qt nice!

more than 2 years ago
top

KWin Adds Support for QML Decorations

quantic_oscillation7 go KDE (30 comments)

is gnome dying? staring into the abyss — Swfblag http://goo.gl/6EZra

more than 2 years ago

Submissions

top

What Is Red Hat Doing To Linux?

quantic_oscillation7 quantic_oscillation7 writes  |  about 2 years ago

quantic_oscillation7 (973678) writes ""I’ve seen what to me are disturbing patterns in what’s happening with Red Hat’s influence on core components used by Linux distributions. The latest came just after I discovered that some Flash-based DRM schemes are now using HAL for enforcement. As consolekit has always behaved like a broken DRM scheme, denying the user permission to use their own system, I wondered what was next now that HAL is deprecated – consolekit?

Then I read that udev is now being added to the systemd code, and Red Hat is sounding like they won’t support it unless you integrate it with systemd. Next, I read that systemd is now being expanded to replace consolekit/policykit!"

-- other slashdot articles that show this could be quite true, Red Hat's having to much control over technologies present in the GNU/Linux system:

http://bsd.slashdot.org/story/11/07/16/0020243/lennart-poettering-bsd-isnt-relevant-anymore

http://linux.slashdot.org/story/11/11/23/1733236/secure-syslog-replacement-proposed"

Link to Original Source
top

Eben Moglen: Time To Apply The First Law Of Robotics To Our Smartphones

quantic_oscillation7 quantic_oscillation7 writes  |  more than 2 years ago

quantic_oscillation7 (973678) writes "" We imagined that robots would be designed so that they could never hurt a human being. These robots have no such commitments. These robots hurt us every day.

        They work for other people. They’re designed, built and managed to provide leverage and control to people other than their owners. Unless we retrofit the first law of robotics onto them immediately, we’re cooked.

        They take our money. They take our autonomy. They spy on us. And around the world, they result in our arrest, beating, torture.""

Link to Original Source
top

"PGP founder, Navy SEALs uncloak encrypted comms biz"

quantic_oscillation7 quantic_oscillation7 writes  |  about 2 years ago

quantic_oscillation7 (973678) writes ""Phil Zimmermann and some of the original PGP team have joined up with former US Navy SEALs to build an encrypted communications platform that should be proof against any surveillance.

The company, called Silent Circle, will launch later this year, when $20 a month will buy you encrypted email, text messages, phone calls, and videoconferencing in a package that looks to be strong enough to have the NSA seriously worried."

(...)
"While software can handle most of the work, there still needs to be a small backend of servers to handle traffic. The company surveyed the state of privacy laws around the world and found that the top three choices were Switzerland, Iceland, and Canada, so they went for the one within driving distance.""

Link to Original Source
top

"Oracle v Google Judge Is A Programmer!"

quantic_oscillation7 quantic_oscillation7 writes  |  more than 2 years ago

quantic_oscillation7 (973678) writes ""I have done, and still do, a significant amount of programming in other languages. I've written blocks of code like rangeCheck a hundred times before. I could do it, you could do it. The idea that someone would copy that when they could do it themselves just as fast, it was an accident. There's no way you could say that was speeding them along to the marketplace. You're one of the best lawyers in America, how could you even make that kind of argument?...rangeCheck! All it does is make sure the numbers you're inputting are within a range, and gives them some sort of exceptional treatment." — Judge Alsup "who has a mathematics degree, really does understands the technical issues at the heart of this case. He has written code and over the period of his involvement of this case has extended his knowledge of programming languages to include Java.""
Link to Original Source
top

One in 10 second-hand hard drives contain personal data

quantic_oscillation7 quantic_oscillation7 writes  |  more than 2 years ago

quantic_oscillation7 (973678) writes ""The Information Commissioner’s Office has published a report revealing that one in ten second-hand hard drives sold online contains residual personal data, with some containing scanned bank statements, passports, information on previous driving offences, and medical details.

The report is based on a “mystery shopper” exercise carried out by NCC Group on behalf of the ICO. The organisation sourced 200 hard drives from a mixture of internet auction sites and computer trade fairs. The devices were initially searched without any additional software, and then interrogated using forensic tools freely available on the internet."

To fix this problem just go to http://www.dban.org/"

Link to Original Source
top

"Open source code libraries seen as rife with vulnerabilities"

quantic_oscillation7 quantic_oscillation7 writes  |  more than 2 years ago

quantic_oscillation7 (973678) writes ""A study of how 31 popular open-source code libraries were downloaded over the past 12 months found that more than a third of the 1,261 versions of these libraries had a known vulnerability and about a quarter of the downloads were tainted.

The study was undertaken by Aspect Security, which evaluates software for vulnerabilities, with Sonatype, a firm that provides a Central Repository housing more than 300,000 libraries for downloading open-source components and gets 4 billion requests per year. "

Also here: https://www.net-security.org/secworld.php?id=12660"

Link to Original Source
top

"Extremadura CIO plans Linux rollout on 40,000 des

quantic_oscillation7 quantic_oscillation7 writes  |  more than 2 years ago

quantic_oscillation7 (973678) writes ""The CIO of Spanish autonomous region Extremadura says it is planning to move the administration's 40,000 desktop systems to a Debian distribution. According to a report on the European Commission's "Joinup", CIO Teodomiro Cayetano López says that the project is "really advanced" and deployment will begin in the spring and be completed around the end of the year. "

More info on a previous article from a spanish newspaper http://www.publico.es/ciencias/414698/extremadura-abandona-linex"

Link to Original Source
top

Homeless Man Has Three Degrees and Can't Find a Jo

quantic_oscillation7 quantic_oscillation7 writes  |  about 3 years ago

quantic_oscillation7 writes "In normal economic times, we might be calling him Professor Maurice Johnson. But during this economic malaise, he's just been that guy on the street. Luckily, he's got a YouTube following.

Johnson, 55, has a masters in Plasma Physics from Dartmouth College and a masters in Electrical Engineering and Acoustics from Purdue University. Yet he's living in a homeless shelter in Boston, Mass. and has been out of work since November.

"It's just simply bad luck," Johnson said in a YouTube video interview.
(...)
Johnson has been sending out his résumé to various places looking for a job. He hopes to get back into science or education. "I just want a chance. Science would be great, teaching would be great. There's nothing greater than teaching. Teaching physics would be a blast," he said."

Link to Original Source
top

2010 smashes vulnerability records

quantic_oscillation7 quantic_oscillation7 writes  |  about 4 years ago

quantic_oscillation7 (973678) writes ""As for operating system vulnerabilities, Microsoft had the lion’s share of critical flaws disclosed so far this year, with Linux, Apple and HP-UX all seeing significant falls. However, if all types of vulnerability are taken into account, Apple has had the worst year so far, with Linux following closely behind.""
Link to Original Source
top

Can we trust Truecrypt?

quantic_oscillation7 quantic_oscillation7 writes  |  more than 4 years ago

quantic_oscillation7 (973678) writes ""The domain name “truecrypt.org” was originally registered to a false address (“NAVAS Station, Antarctica”), and was later concealed behind a Network Solutions private registration." (...) "The TrueCrypt developers used the aliases “ennead” and “syncon”, but later replaced all references to these aliases on their website with “The TrueCrypt Foundation” in 2010. The TrueCrypt trademark was registered in the Czech Republic under name of “David Tesak”.

Nobody knows anything about the developers, they do not want to identify themselves."

Has anyone ever reviewd their code?"

Link to Original Source
top

Apple spying it's users with help from AT&T

quantic_oscillation7 quantic_oscillation7 writes  |  more than 4 years ago

quantic_oscillation7 (973678) writes ""AddictiveTips is reporting in detail that a trusted source inside of Apple Inc. has told them that Apple is not only checking for jailbroken iPhones in conjunction with AT&T through OTA (over-the-air) updates every 7-14 days – and then relocking them and putting users on a blacklist – but is also storing Facetime location data, and that the un-encrypted WiFi chats can be snooped on. Beyond all of this, the source claims that Apple/AT&T shipped some iPhone 4’s early in order to test the OTA updates.""
Link to Original Source
top

Is there a manual, howto for online privacy?

quantic_oscillation7 quantic_oscillation7 writes  |  more than 4 years ago

quantic_oscillation7 (973678) writes ""hello to all,

since all around the world the supposed democratic elected governments are becoming true tyrants, with massive surveillance projects like the NSA/Telcos wiretapping, EU adabts and indect, Australian blacklists, DNA data bases, CCTV's, etc.

http://arstechnica.com/tech-policy/news/2009/12/aussie-content-filters-work-if-you-dont-count-im-p2p-ftp.ars
http://en.wikinews.org/wiki/Listening_to_you_at_last:_EU_plans_to_tap_cell_phones
http://www.wired.com/threatlevel/2008/10/kinne/

And of course the chinese 'great firewall', 'deep packet inspeccion' supported by the big names, as cisco (in China), nokia siemens networks "Lawful Intercept capability" (in Iran) etc

http://www.wired.com/threatlevel/2009/06/wsj-nokia-and-siemens-help-iran-spy-on-internet-users/
http://www.nokiasiemensnetworks.com/press/press-releases/provision-lawful-intercept-capability-iran

I would like to ask all of you, something.
Since all of you have a huge expertise in this issues, security, networking, etc, have you thought about writing a book or an online howto or manual about how to a ‘normal’ citizen protect himself from the goverment surveillance as well as how to protect our privacy online?

There are already some tips, but i guess some more would be very interesting.

http://www.schneier.com/blog/archives/2004/12/safe_personal_c.html
https://ssd.eff.org/book/export/html/14

I know that we can use Free/Libre Software technologies like Tor, GnuPG, Truecrypt (some issues about being FLOSS?!), distros like the Gentoo based Incognito, AnonymOS BSD based livecd, ubuntu based UPR, some Mozilla Firefox, GNU Icecat and Debian Iceweasel as well Swiftweasel privacy/security extensions like Betterprivacy, Noscript, adblock, Phproxy, Ghostery etc etc.

But since i'm not of this areas of knowledge, IT, i really like to you guys give some tips, some advices how a 'normal' but savvy computer person can keep it's privacy from the government spooks.

This as nothing to do with breaking the law, it's just the desire of keep us all humans, since privacy is one of the basic human rights.

Let me finished quoting from a Bruce Schneier article about this issues "Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.""

http://www.browseanonymouslyanywhere.com/incognito/index.php?option=com_content&task=view&id=28&Itemid=41
http://kaos.to/blog/downloads/
https://www.privacy-cd.org/index.php?option=com_content&view=category&id=19&Itemid=35&lang=en

P.S. forgive my english""
top

What about a Privacy anti-surveillance HOWTO?

quantic_oscillation7 quantic_oscillation7 writes  |  more than 4 years ago

quantic_oscillation7 (973678) writes "hello to all,

since all around the world the supposed democratic elected governments are becoming true tyrants, with massive surveillance projects like the NSA/Telcos wiretapping, EU adabts and indect, Australian blacklists, DNA data bases, CCTV's, etc.

http://arstechnica.com/tech-policy/news/2009/12/aussie-content-filters-work-if-you-dont-count-im-p2p-ftp.ars
http://en.wikinews.org/wiki/Listening_to_you_at_last:_EU_plans_to_tap_cell_phones
http://www.wired.com/threatlevel/2008/10/kinne/

And of course the chinese 'great firewall', 'deep packet inspeccion' supported by the big names, as cisco (in China), nokia siemens networks "Lawful Intercept capability" (in Iran) etc

http://www.wired.com/threatlevel/2009/06/wsj-nokia-and-siemens-help-iran-spy-on-internet-users/
http://www.nokiasiemensnetworks.com/press/press-releases/provision-lawful-intercept-capability-iran

I would like to ask all of you, something.
Since all of you have a huge expertise in this issues, security, networking, etc, have you thought about writing a book or an online howto or manual about how to a ‘normal’ citizen protect himself from the goverment surveillance as well as how to protect our privacy online?

There are already some tips, but i guess some more would be very interesting.

http://www.schneier.com/blog/archives/2004/12/safe_personal_c.html
https://ssd.eff.org/book/export/html/14

I know that we can use Free/Libre Software technologies like Tor, GnuPG, Truecrypt (some issues about being FLOSS?!), distros like the Gentoo based Incognito, AnonymOS BSD based livecd, ubuntu based UPR, some Mozilla Firefox, GNU Icecat and Debian Iceweasel as well Swiftweasel privacy/security extensions like Betterprivacy, Noscript, adblock, Phproxy, Ghostery etc etc.

But since i'm not of this areas of knowledge, IT, i really like to you guys give some tips, some advices how a 'normal' but savvy computer person can keep it's privacy from the government spooks.

This as nothing to do with breaking the law, it's just the desire of keep us all humans, since privacy is one of the basic human rights.

Let me finished quoting from a Bruce Schneier article about this issues "Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.""

http://www.browseanonymouslyanywhere.com/incognito/index.php?option=com_content&task=view&id=28&Itemid=41
http://kaos.to/blog/downloads/
https://www.privacy-cd.org/index.php?option=com_content&view=category&id=19&Itemid=35&lang=en

P.S. forgive my english"

Link to Original Source

Journals

quantic_oscillation7 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>