Press "Enter" to skip to content

Posts published in “Hardware”

Video: Ken Starks’ & Ruth Suehle’s Keynotes at OLF

Here at FOSS Force we’re proud to be associated with Ken Starks. We’re proud because of the great articles he writes advocating Linux. We’re also extremely proud that he was chosen to be a keynote speaker at this year’s Ohio LinuxFest. But most of all, we’re proud because of his big heart, which he expresses through his work through Reglue, the nonprofit he founded in 2005 to give Linux computers, and training on how to use them, to financially disadvantaged school children in and around the Austin, Texas area where he lives.

Indeed, it’s this last aspect that was honored at Ohio LinuxFest, and the work Ken does with his “Reglue kids” was his focus during his time spent behind the podium. He called his presentation “Deleting The Digital Divide One Computer at a Time.”

Lucky for us, his friend Randy Noseworthy put together a video of the presentation, which we’re happy to be able to offer here. We’re certain you’ll find it as inspiring as we do.

Ubuntu Turns 10 & systemd Is Not Contagious

FOSS Week in Review

Everyone is either at Seattle GNU/Linux Conference, Ohio LinuxFest or All Things Open, so there’s no one around to bounce off some ideas regarding what’s happening this week. Besides, if you were at any of those three events –- and if not, why not? — you probably know more than I do at this point.

In any case, besides two great stories this week by my colleagues, FOSS Force editor Christine Hall’s ATO coverage and Ken Starks’ pre-OLF piece, there were a few things of note that happened this week, like…

Ubuntu turns ten, releases 14.10: Many accolades were made, toasts were proposed and Ubuntu turns ten while releasing Ubuntu 14.10 –- all the way up to the letter U with Utopic Unicorn –- on Thursday.

Larry Cafiero

Larry Cafiero is a journalist and a Free/Open Source Software advocate and is involved in several FOSS projects. Follow him on Twitter: @lcafiero

Open Source Women, Preinstalled Linux & the SF Giants

FOSS Week in Review

With another week coming to an end, let’s wrap it up on a somewhat balanced note.

Get out the Vote: Our friends at Red Hat are now taking votes for the Women in Open Source Awards. The first award of its kind, the prize shines a spotlight on women making important contributions to an open source project, to the open source community, or through the use of open source methodology.

Red Hat logoNominations are open through Nov. 21. Qualified judges from Red Hat will narrow down the nominees to a subset of finalists for both the Academic and Community awards. The public will vote to determine the winner from the finalists selected. Winners will be announced in June during an awards ceremony at next year’s Red Hat Summit in Boston.

Larry Cafiero

Larry Cafiero is a journalist and a Free/Open Source Software advocate and is involved in several FOSS projects. Follow him on Twitter: @lcafiero

One Week: Three FOSS Expos

The week after next the FOSS world will be brimming with opportunities to find out more about what’s going on in three separate shows around the country. If you are within a day’s drive of any of them — or if you are not adverse to flying — making it to one of them would be well worth the effort.

In the South, there’s All Things Open, which is being held midweek — Oct. 22-23 — in Raleigh, N.C. ATO is a conference exploring open source, open tech and the open web in the enterprise. Featuring 90 speakers and 100 sessions, ATO brings a lot of heavy hitters to the Research Triangle area. The price for admission might be considered steep by regular Linux show denizens — ranging from $25 for the Women in Tech/OS panel presentation to $229 for a two-day pass. Those who wish to check out the menu of options can go to the ATO registration page.

Larry Cafiero

Larry Cafiero is a journalist and a Free/Open Source Software advocate and is involved in several FOSS projects. Follow him on Twitter: @lcafiero

Researchers Release USB Exploit & Incomplete Fix on GitHub

Now that a working exploit of the USB vulnerability that’s baked-in to the USB standard has been released, it might be a prudent move to no longer employ any USB devices that aren’t already under your control until this situation has been fixed.

The exploit was first made public two months ago at the Black Hat conference in Las Vegas when Karsten Nohl and Jakob Lell of Berlin based Security Research Labs (SRL) demonstrated an attack they called BadUSB to a standing-room-only crowd.

Breakthrough in Wireless Technology…Or Not

Exactly three weeks ago today I caught myself before hitting the “share” button on my Google Plus stream. My intent was to complain about some thing or another. I believe it was an out loud groan about a USB wireless device not working out of the box with Linux. I think I was going to triangulate on Broadcom’s insistence on making wireless a real headache.

And yeah, it doesn’t take that much to get a Broadcom chip working in most cases. Unless you are installing Linux at a friend’s house or another place that doesn’t have a wired connection. Then you’re pretty much sunk. The popup says that the wireless will work once you connect to the package manager. Uh, what if I am not located near a wired connection? That’s kinda why I wanted to connect to the web anyway you friggin’ ijit.

Let’s say it together…you’re pretty much sunk. Still. In 2014. Sunk.

There are a lot of other things that are deserving of our collective ire. Wireless shouldn’t have been one of them for me. I chastised myself for throwing my own little private snit concerning something so trivial. If you count back the years with me, the kernel update to 2.27 saw wireless go from “wireless sucks in Linux” to “holy crap, wireless works in Linux.” Or it did for the most part anyway. It was an important mile marker for desktop Linux.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Linux Tech Support & Time Warner

I’ve spent my time in the tech support trenches…and someone else’s time as well. Please mark my dues paid in full. I’ve worked from the script-reader doing basic trouble-shooting, up to floor supervisor and level three support. My point? Not everybody who works support at a call center is an idiot, but some certainly are…

Since 2005, I have helped financially-disadvantaged kids get computers in their homes. While it’s become a cliché in the past few years, the “digital divide” most certainly exists. Since our early days of Komputers4Kids, The HeliOS Project and now Reglue, the gap between the tech haves and have-nots remains a problem.

Linux Tech SupportWay more than many of us would think.

With that being established, I want to take a walk down memory lane…to let’s say 2005.

Back then, getting a Linux computer bolted-up to broadband internet was straight forward. Even nine years ago, the biggest challenge to getting Time Warner or eternal-hell-and-damnation Comcast routers online might have been to reboot the router.

Maybe. The majority of the time, not even that.

So imagine my surprise when I wasn’t able to get one of our established Reglue kids online. The oldest boy, Rex, had been using his Reglue computer for four years and it was time for an upgrade. I was working with a brand new Time Warner modem and wireless router, out of the box. I even went back in and made sure I was accessing the modem properly. I was. This task shouldn’t have taken ten minutes and I was now on minute thirty.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

When the Police Can Brick Your Phone

“Tyranny. Pure and simple. If it is software, somebody will find a way to hack it. If it is hardware, ‘old’ smartphones will be worth their weight in platinum.”

My friend Ross from Toronto made this comment with a link he posted on Facebook to The Free Thought Project’s article on a new about-to-be law in California. The law mandates a kill switch on all new smartphones, allowing the owner of a stolen phone to disable it until it’s recovered. The bill, CA SB 962, now only needs the expected signature of governor Jerry Brown to become law. In July, a similar law went into effect in Minnesota.

Organized using smartphones.
Photo by Jonas Naimark – Licensed under Creative Commons Attribution 3.0
On the surface, a law with the purpose of protecting expensive smartphones from theft might seem to be a no-brainer good thing. Just render the device inoperable, while activating a homing program to locate it. Presto! In no time at all the phone is back in the hands of its rightful owner and made operable again. Supporters also hope the kill switch becomes a deterrent that greatly reduces the number of phone thefts.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

USB Ports Are No Longer Your Friend (If They Ever Were)

Just because the good guys have discovered a new security risk doesn’t mean the bad guys haven’t known about it forever. The risk is only new to us. It’s actually been there for a long time, maybe forever. Who knows how long everyone from the black hats in Moscow to the NSA in bucolic Maryland have been taking advantage of what appears to us to be a “new” exploit?

The USB security hole recently unveiled by Berlin based Security Research Labs (SRL) seems to be of those that’s been around “forever.”

USB exploit infecting Linux
A slide used by Security Research Labs at the Black Hat USA security conference explaining how a USB device can be infected by a Windows computer in order to gain root access on Linux.
(click to enlarge)
While it shouldn’t be news to anybody that caution should be exercised when using USB devices, the new exploit would seem to indicate that even the most draconian security measures, short of doing away with USB devices entirely, might not be enough. The recently revealed problem has to do with the USB controller chip found in most, if not all, USB devices. The chip basically identifies the device type to the computer.

The trouble is, most of these chips are relatively easy to reprogram.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

ATMs Might Go Linux, MS DOS Source Released & More…

FOSS Week in Review

Is Microsoft reading your Hotmail?

Last week we learned of the arrest of Alex Kibkalo, a Microsoft employee who’s charged with leaking an unreleased version of Windows 8 to a French blogger. According to Wired, during the course of an internal investigation in Redmond, an unidentified source approached Steven Sinofsky, who was then president of Microsoft’s Windows Division.

“The source gave Sinofsky a Hotmail address that belonged to the French blogger (also not named) and said that the blogger was the person who had received the leaked software. Microsoft had already been interested in the blogger, but apparently, after the tip-off, the company’s security team did something that raised alarm bells with privacy advocates. Instead of taking their evidence to law enforcement, they decided to search through the blogger’s private messages themselves. Four days after Sinofsky’s tip-off, Microsoft lawyers ‘approved content pulls of the blogger’s Hotmail account,’ the court filings state.

“By trolling through the Hotmail email messages and MSN Messenger instant message logs, Microsoft learnt how Kibkalo and the blogger pulled off the leak, says Federal Bureau of Investigation special agent Armando Ramirez III, in an affidavit filed in connection with the case. Microsoft handed over the results of its investigation to the FBI in 2013, and Kibkalo was arrested on Wednesday.”

This, of course, created quite a stir among privacy advocates. So much so that the folks in Redmond on Thrusday announced a change of policy when it comes to riffling through people’s Hotmail accounts. They’re still going to do it, but in the future the company will publish stats regarding its breaking into people’s free Hotmail accounts. In other words, we’ll know just how much they do it.