Press "Enter" to skip to content

Posts published by “Christine Hall”

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Atlanta Meets Open Source at ‘Great Wide Open’

There’s good news and bad news on the Linux and open source conference scene in the deep south.

First the bad news. For the first time since it started six years ago, there’ll be no POSSCON in Columbia, South Carolina this year. For six years, POSSCON has been an annual open source conference hosted by IT-oLogy, the folks behind All Things Open, the Raleigh, North Carolina based conference which made its debut in October. Not to worry, however, as I’ve been assured by Todd Lewis, Executive Director of IT-oLogy in Columbia, that POSSCON will return in 2015.

The good news is that in lieu of POSSCON, IT-oLogy is throwing what promises to be a big shindig of an enterprise level open source conference in Atlanta. Called Great Wide Open, the conference is less than a month away, scheduled to get cranked-up on April 2nd and 3rd at the 200 Peachtree Special Events & Conference Center in downtown Atlanta.

Is Microsoft Considering Windroid?

Tom Warren reported on The Verge yesterday that he’s been hearing some skinny that Microsoft is considering making some changes to Windows Phone to allow it to run Android apps. The same plan didn’t worked very well for Blackberry, but that was a company already on the ropes and the marketplace had pretty much already turned its back on the once coveted “Crackberry.”

Microsoft also has a phone nobody wants, but it still has high hopes.

HTC & Nokia Windows phones

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

KDE Tops Desktop Poll

KDEAccording to the results of our FOSS Force Desktop Poll, our readers prefer KDE over any other desktop environment by a wide margin. In fact, all other desktops were practically left at the gate.

The poll accompanied Ken Starks’ article Those Krazy Kids & KDE, which talked about the preference his Reglue kids express for the KDE desktop. Because Starks’ article focused on KDE, GNOME 3 and Cinnamon, we focused our poll on those same three desktops. However, we included an “Other” category, under which another desktop could be entered. The poll asked the question, “Which desktop environment do you prefer?”

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

5 Questions for Microsoft’s New CEO

Right now it’s too soon to tell what kind of CEO Satya Nadella will be for Microsoft. He may be a good guy who understands just how much his company has erred ethically, almost since day one, and who has plans to realign the company he now guides to a position where it can become a positive force in the tech arena. I’m not expecting that. I’ve learned over the years to not expect anything sane or ethical from the Redmond company, no matter who’s in charge or doing the talking.

As a FOSS proponent, there are a few questions I’d like to ask Mr. Nadella if I had the chance. His answers would tell me much of what I’d like to know about the new boss at Microsoft and his plans for the company.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Brute Force Attacks on WordPress Sites Underway

At about 1 p.m. this afternoon the security company behind the WordFence plugin for WordPress issued a security advisory via email informing users of their plugin that WordPress sites are currently under a brute force attack.

“As of 11am eastern time this morning we are monitoring the largest distributed brute force attack on WordPress installations that we’ve seen to date. The real-time attack map on www.wordfence.com became so busy that we’ve had to throttle the amount of traffic we show down to 4% of actual traffic.

“A brute force attack is when an attacker tries many times to guess your username password combination by repeatedly sending login attempts. A distributed brute force attack is when an attacker uses a large number of machines spread around the internet to do this in order to circumvent any blocking mechanisms you have in place.”

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

The People Vs the NSA

There is a tablet in my house that blinks whenever my roommate has a message. I know this because for some reason it’s my job to keep it charged for her. It has front and back cameras. The built-in microphone and speakers are capable of holding a conversation in English–probably other languages as well. With what we know now, I must assume that the NSA has the ability to activate the cameras and microphone to run silently in the background, bypassing the light that indicates when the camera is in use.

The same is true of the other computers in my home, but to a lesser degree.

The Day We Fight Back banner
The Day We Fight Back banner.

The desktop I’m using to write this article doesn’t have a camera or a microphone. Nor does the old Dell laptop that gets used occasionally around the house. My other laptop, a newer Gateway, is equipped with a built-in camera and microphone, but I’ve never managed to get the microphone to work under Bodhi Linux. Not that I’ve tried very hard. I don’t Skype or anything, so a microphone is of very little use to me.

This is probably a good thing as it means the NSA can’t watch or listen to me as I use my desktop or Dell and they can’t eavesdrop when I’m on the Gateway. They can only steal my bank passwords, learn where I store data online and what social networking accounts are connected with me.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Microsoft: The King Is Dead; Long Live the King

Satya Nadella
Satya Nadella, new CEO of Microsoft
So we don’t have Steve Ballmer to kick around anymore. The buffoon is gone. He’s out the door, replaced by Satya Nadella, a 46 or 47 year old geek from India who spent 22 years rising through the ranks at Microsoft to capture Redmond’s top prize as CEO. His starting salary in his new position will be $1.2 million. Nice work if you can get it, eh?

The fact that we don’t know Mr. Nadella’s exact age is telling, revealing a man who has spent his career keeping a low profile and evidently keeping his private life private. We do know that he was born in 1967, the year of the “Summer of Love” to us aging hippies, the same year the Beatles released the Sgt.Pepper’s album. After earning a bachelor’s degree in India, he came to the U.S. where he earned an MS in Computer Science from the University of Wisconsin–Milwaukee and an MBA from the University of Chicago Booth School of Business. He spent a brief period working for Sun before joining the staff at Microsoft in 1992.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Results for Our ‘Red Hat & the NSA’ Poll

It looks as if Red Hat has some work cut out for them if they care what impression folks in the FOSS community have about them. If the results of our Red Hat &the NSA poll are any indication, some people aren’t convinced that the most commercially successful Linux distro on the planet has clean hands when it comes to the whole NSA mess.

A few weeks back, in response to what I thought (and still think) were unfounded allegations that Red Hat has been working with the NSA spying efforts by doing things like building back doors into RHEL, we ran a poll that asked the simple question, “Do you think Red Hat is cooperating with the NSA by building back doors into RHEL?” The poll went up on January 23rd and was ended this afternoon.

Red Hat logo

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Google Passes Motorola to Lenovo

Today it was announced that Google is selling handset maker Motorola Mobility to Lenovo for $2.91 billion. The move comes less than a week after the Chinese electronics company also agreed to acquire IBM’s low-end server business for $2.3 billion. Google purchased Motorola Mobility for $12.5 billion in 2012.

Although the move is not necessarily a surprise, it is somewhat unexpected.

When Google purchased the consumer electronics end of Motorola, media pundits were quick to point out that the search company was primarily interested in attaining Motorola’s valuable patent portfolio. At the time, Google’s patent holdings were somewhere between slim to none and they desperately needed patents to defend themselves against legal actions, as Android had become a magnet for attracting patent trolls. Since then, Google has been actively adding patents to their portfolio.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

February 11, 2014: The Day We Fight Back Against the NSA

It only makes sense that the NSA be confronted online. After all, it’s the Internet the agency uses to spy on us. They’re not following us down dark streets or steaming open our snail mail. Instead, they’re monitoring our emails to discover who is in our circle and stalking us on Facebook and Google Plus. Especially if we use Windows, there’s no need for them to dirty their hands sifting through our garbage when they can enter through a virtual trap door on our computer to rifle through our word processor and spreadsheet files. Phone tapping? How old school in a world where every call we make, even from a land line, becomes VoIP somewhere along the line. When we use VoIP or Skype, they can easily listen. If we visit a website located in a country on their hit list, they sit-up and take notice.

The Day We Fight Back banner
The Day We Fight Back banner.

The people at the NSA don’t care about our right to liberty, happiness or even life itself. They are obsessed with what they see as their mission and are convinced, as zealots are always convinced, that the ends justify the means. They embody the worst of Stalin, Mussolini, Franco and Pol Pot. They do so with an American twist, maintaining an illusion of freedom which keeps us pacified.

February 11th will be The Day We Fight Back.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Is Red Hat Working for the NSA?

On Friday, Roy Schestowitz posted an article on Techrights which seems to accuse Red Hat of being in cahoots with the NSA. According to the article, the company has been building back doors into RHEL for the spy agency. However, the article appears to be long on accusations and short on proof.

I like both Techrights and Schestowitz. Both are controversial and that’s part of what I like about them. However, before making accusations it’s nice to have at least a few facts to back them up.

Red Hat logoThe article attempts to make the case for using CentOS over RHEL. Indeed, many of us who’re short on bucks and can’t afford Red Hat’s expensive support subscriptions are already using CentOS in server environments. We use it here at FOSS Force to serve web pages? Why? Because not only does CentOS have an extremely capable development team, the distro is in most ways a clone of Red Hat, which means the CentOS development team is able to leverage Red Hat’s research and development and incorporate it into their distro.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Latest Articles