Press "Enter" to skip to content

Posts published in “News”

Open Source Project Brings 11th Century Kannada Verses Online

Vachana sahitya is a form of rhythmic writing in Kannada poetry that evolved in the 11th century C.E. and flourished in the 12th century as a part of the Lingayatha movement. More than 259 Vachanakaras (Vachana writers) have compiled over 11,000 vachanas. 21,000 of these verses which were published in a 15 volume set, “Samagra Vachana Samputa,” by the Government of Karnataka, a state in South West India, have been digitized. Two Wikimedians along with Kannada linguist and author O. L. Nagabhushana Swamy are involved in the Unicode conversions, corrections and writing the preface for these verses. The entire work is now available as a standalone project called Vachana Sanchaya and ready to enrich Kannada WikiSource.

Palm Leaf Vachanas
Palm leaf of 11th and 12th Century with Vachana poems in Kannada language

This project was started a year ago when Kannada Wikimedian Omshivaprakash was trying to help Professor O. L. Naghabhushana Swamy and Kannada author and publisher Vasudhendra to easily access the vachana (verses) of Vachana Sanchaya. Swamy had challenges in using publicly available content on Vachanas since the data was in ASCII and searching text was a huge problem. Pavithra Hanchagaiah started helping to collect information about about vachanas and document them into Unicode by writing scripts to customize open source software to convert the Kannada fonts from ASCII into Unicode.

ATMs Might Go Linux, MS DOS Source Released & More…

FOSS Week in Review

Is Microsoft reading your Hotmail?

Last week we learned of the arrest of Alex Kibkalo, a Microsoft employee who’s charged with leaking an unreleased version of Windows 8 to a French blogger. According to Wired, during the course of an internal investigation in Redmond, an unidentified source approached Steven Sinofsky, who was then president of Microsoft’s Windows Division.

“The source gave Sinofsky a Hotmail address that belonged to the French blogger (also not named) and said that the blogger was the person who had received the leaked software. Microsoft had already been interested in the blogger, but apparently, after the tip-off, the company’s security team did something that raised alarm bells with privacy advocates. Instead of taking their evidence to law enforcement, they decided to search through the blogger’s private messages themselves. Four days after Sinofsky’s tip-off, Microsoft lawyers ‘approved content pulls of the blogger’s Hotmail account,’ the court filings state.

“By trolling through the Hotmail email messages and MSN Messenger instant message logs, Microsoft learnt how Kibkalo and the blogger pulled off the leak, says Federal Bureau of Investigation special agent Armando Ramirez III, in an affidavit filed in connection with the case. Microsoft handed over the results of its investigation to the FBI in 2013, and Kibkalo was arrested on Wednesday.”

This, of course, created quite a stir among privacy advocates. So much so that the folks in Redmond on Thrusday announced a change of policy when it comes to riffling through people’s Hotmail accounts. They’re still going to do it, but in the future the company will publish stats regarding its breaking into people’s free Hotmail accounts. In other words, we’ll know just how much they do it.

Galaxy Backdoor, RIT Offers Open Source Minor & More…

FOSS Week in Review

Java is the target for half of all exploits

We’ve been saying for a couple of years now that Java isn’t safe and have been urging everyone who will listen to disable Java in the browser. As we’ve been saying this, comments to our articles on Java security have filled with folks wagging a finger and “reminding” us that Java is only a threat in the browser, that otherwise Java is safe.

That is wrong. The only time Java is safe is when it’s in a cup. According to an article published on IT World, researchers say that Java is now responsible for fully half of the exploits discovered in December.

Ubuntu Keeps MySQL, Why XP Won’t Go Away & More…

FOSS Week in Review

Cops tracking phones sans warrants

Tallahassee PoliceIt appears that the police in Tallahassee, Florida have been busy tracking folks by their cell phones without bothering to show up before a judge and ask for a warrant. Why would they violate the constitutional rights of their citizens this way? Evidently because they were using technology on loan and had signed a non-disclosure agreement.

According to Wired, this information came to light in an appeal of a sexual battery case dating back to 2008 in which a suspect was tracked using the technology to locate a phone that had been stolen from the victim. The police have admitted using the device 200 times, with no judge or warrant involved, since 2010. In a blog post made Monday, the ACLU said the device is “likely a Stingray made by the Florida-based Harris Corporation.” Evidently, the ACLU has long suspected that Harris has been loaning the devices to Florida police departments.

Atlanta Meets Open Source at ‘Great Wide Open’

There’s good news and bad news on the Linux and open source conference scene in the deep south.

First the bad news. For the first time since it started six years ago, there’ll be no POSSCON in Columbia, South Carolina this year. For six years, POSSCON has been an annual open source conference hosted by IT-oLogy, the folks behind All Things Open, the Raleigh, North Carolina based conference which made its debut in October. Not to worry, however, as I’ve been assured by Todd Lewis, Executive Director of IT-oLogy in Columbia, that POSSCON will return in 2015.

The good news is that in lieu of POSSCON, IT-oLogy is throwing what promises to be a big shindig of an enterprise level open source conference in Atlanta. Called Great Wide Open, the conference is less than a month away, scheduled to get cranked-up on April 2nd and 3rd at the 200 Peachtree Special Events & Conference Center in downtown Atlanta.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Redmond FUDs FOSS While Forking Android & More…

FOSS Week in Review

Botnet steals bitcoins

We figure that any currency that can’t be safely tucked into a mattress isn’t secure, so we haven’t been too quick to jump on the bitcoin bandwagon. Needless to say, we weren’t surprised on Monday when Reuters reported that there’s a botnet on the loose with the aim of stealing the virtual currency.

According to the Chicago based security firm Trustwave, hundreds of thousands of computers have been infected with “Pony” malware to form a botnet going after bitcoin and other virtual currencies. So far, at least 85 virtual wallets have been stolen.

Russia’s Olympic Spying, Comcast Weds Time Warner & More…

FOSS Week in Review

The day we fought back

Tuesday, February 11th, The Day We Fight Back, has come and gone. Whether the event was a success, failure or fell somewhere in between depends on whom you read.

Surprisingly, the biggest naysayer was probably the New York Times, which started an article. “The Day the Internet Didn’t Fight Back,” with the line, “So much for mass protest.” It appears as if the Times’ metric for this judgement was the lack of participation by some sites which took part in the online SOPA protest a couple of years back.

Brute Force Attacks on WordPress Sites Underway

At about 1 p.m. this afternoon the security company behind the WordFence plugin for WordPress issued a security advisory via email informing users of their plugin that WordPress sites are currently under a brute force attack.

“As of 11am eastern time this morning we are monitoring the largest distributed brute force attack on WordPress installations that we’ve seen to date. The real-time attack map on www.wordfence.com became so busy that we’ve had to throttle the amount of traffic we show down to 4% of actual traffic.

“A brute force attack is when an attacker tries many times to guess your username password combination by repeatedly sending login attempts. A distributed brute force attack is when an attacker uses a large number of machines spread around the internet to do this in order to circumvent any blocking mechanisms you have in place.”

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Torvald’s Thumbs Up, Gates’ Computer Skills & More…

FOSS Week in Review

Canadians spy at airports

The more we see of the Snowden revelations the more we wonder, when did the English speaking world become a police state?

The latest news was reported January 30th by the Canadian Broadcasting Corporation (CBC), from which we learned that all the electronics eavesdropping hasn’t been being conducted solely by the U.S. and the Brits. The Canadians have had their hand in it too.

It seems that Communications Security Establishment Canada (CSEC), a Canadian spy agency, has been using the free Wi-Fi at “a major Canadian airport” to track wireless devices, which presumably would include laptops as well as phones and tablets. The surveillance would continue for days after visitors passed through the airport.

Latest Articles