Press "Enter" to skip to content

Posts published in “News”

eBay Hacked – Will Ask Users to Change Passwords

eBay announced this morning that they’ve been hacked and that “encrypted passwords and other non-financial data” have been compromised. They’re expected to begin notifying their customer base later today, which will include a suggestion for users to change their passwords. The company says that PayPal, an eBay subsidiary, uses its own servers and was not affected by the attack.

According to CNET, the first public news of the compromise came by way of a cryptic blog posting by PayPal:

Ikey Doherty Talks Evolve OS & Budgie Desktop

Ikey Doherty is probably one of the most tech-smart people I know. Fact is, Ikey is much like that guy you hear about on the news, the guy that can hear a string of four digit numbers and tell you the sum of them in a couple of seconds. Now, I don’t know if Ikey is capable of that feat, but I do know what he can do.

Ikey Doherty can code. Ikey Doherty can code in a number of languages.

Ikey Doherty
Ikey Doherty, Linux programmer.
So you might say to me, “Well Ken, I can code too. Anyone who goes to college to study Computer Science can code something.”

OK, I’ll give you that. But let’s back up a bit. How much could you code before you went to college? A little bit? Was it a hobby until you decided you were interested in doing it professionally? The last time I did the calculations in my head, Doherty writes extensive and complex code in at least four languages.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Open Source Project Brings 11th Century Kannada Verses Online

Vachana sahitya is a form of rhythmic writing in Kannada poetry that evolved in the 11th century C.E. and flourished in the 12th century as a part of the Lingayatha movement. More than 259 Vachanakaras (Vachana writers) have compiled over 11,000 vachanas. 21,000 of these verses which were published in a 15 volume set, “Samagra Vachana Samputa,” by the Government of Karnataka, a state in South West India, have been digitized. Two Wikimedians along with Kannada linguist and author O. L. Nagabhushana Swamy are involved in the Unicode conversions, corrections and writing the preface for these verses. The entire work is now available as a standalone project called Vachana Sanchaya and ready to enrich Kannada WikiSource.

Palm Leaf Vachanas
Palm leaf of 11th and 12th Century with Vachana poems in Kannada language

This project was started a year ago when Kannada Wikimedian Omshivaprakash was trying to help Professor O. L. Naghabhushana Swamy and Kannada author and publisher Vasudhendra to easily access the vachana (verses) of Vachana Sanchaya. Swamy had challenges in using publicly available content on Vachanas since the data was in ASCII and searching text was a huge problem. Pavithra Hanchagaiah started helping to collect information about about vachanas and document them into Unicode by writing scripts to customize open source software to convert the Kannada fonts from ASCII into Unicode.

ATMs Might Go Linux, MS DOS Source Released & More…

FOSS Week in Review

Is Microsoft reading your Hotmail?

Last week we learned of the arrest of Alex Kibkalo, a Microsoft employee who’s charged with leaking an unreleased version of Windows 8 to a French blogger. According to Wired, during the course of an internal investigation in Redmond, an unidentified source approached Steven Sinofsky, who was then president of Microsoft’s Windows Division.

“The source gave Sinofsky a Hotmail address that belonged to the French blogger (also not named) and said that the blogger was the person who had received the leaked software. Microsoft had already been interested in the blogger, but apparently, after the tip-off, the company’s security team did something that raised alarm bells with privacy advocates. Instead of taking their evidence to law enforcement, they decided to search through the blogger’s private messages themselves. Four days after Sinofsky’s tip-off, Microsoft lawyers ‘approved content pulls of the blogger’s Hotmail account,’ the court filings state.

“By trolling through the Hotmail email messages and MSN Messenger instant message logs, Microsoft learnt how Kibkalo and the blogger pulled off the leak, says Federal Bureau of Investigation special agent Armando Ramirez III, in an affidavit filed in connection with the case. Microsoft handed over the results of its investigation to the FBI in 2013, and Kibkalo was arrested on Wednesday.”

This, of course, created quite a stir among privacy advocates. So much so that the folks in Redmond on Thrusday announced a change of policy when it comes to riffling through people’s Hotmail accounts. They’re still going to do it, but in the future the company will publish stats regarding its breaking into people’s free Hotmail accounts. In other words, we’ll know just how much they do it.

Galaxy Backdoor, RIT Offers Open Source Minor & More…

FOSS Week in Review

Java is the target for half of all exploits

We’ve been saying for a couple of years now that Java isn’t safe and have been urging everyone who will listen to disable Java in the browser. As we’ve been saying this, comments to our articles on Java security have filled with folks wagging a finger and “reminding” us that Java is only a threat in the browser, that otherwise Java is safe.

That is wrong. The only time Java is safe is when it’s in a cup. According to an article published on IT World, researchers say that Java is now responsible for fully half of the exploits discovered in December.

Ubuntu Keeps MySQL, Why XP Won’t Go Away & More…

FOSS Week in Review

Cops tracking phones sans warrants

Tallahassee PoliceIt appears that the police in Tallahassee, Florida have been busy tracking folks by their cell phones without bothering to show up before a judge and ask for a warrant. Why would they violate the constitutional rights of their citizens this way? Evidently because they were using technology on loan and had signed a non-disclosure agreement.

According to Wired, this information came to light in an appeal of a sexual battery case dating back to 2008 in which a suspect was tracked using the technology to locate a phone that had been stolen from the victim. The police have admitted using the device 200 times, with no judge or warrant involved, since 2010. In a blog post made Monday, the ACLU said the device is “likely a Stingray made by the Florida-based Harris Corporation.” Evidently, the ACLU has long suspected that Harris has been loaning the devices to Florida police departments.

Atlanta Meets Open Source at ‘Great Wide Open’

There’s good news and bad news on the Linux and open source conference scene in the deep south.

First the bad news. For the first time since it started six years ago, there’ll be no POSSCON in Columbia, South Carolina this year. For six years, POSSCON has been an annual open source conference hosted by IT-oLogy, the folks behind All Things Open, the Raleigh, North Carolina based conference which made its debut in October. Not to worry, however, as I’ve been assured by Todd Lewis, Executive Director of IT-oLogy in Columbia, that POSSCON will return in 2015.

The good news is that in lieu of POSSCON, IT-oLogy is throwing what promises to be a big shindig of an enterprise level open source conference in Atlanta. Called Great Wide Open, the conference is less than a month away, scheduled to get cranked-up on April 2nd and 3rd at the 200 Peachtree Special Events & Conference Center in downtown Atlanta.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Redmond FUDs FOSS While Forking Android & More…

FOSS Week in Review

Botnet steals bitcoins

We figure that any currency that can’t be safely tucked into a mattress isn’t secure, so we haven’t been too quick to jump on the bitcoin bandwagon. Needless to say, we weren’t surprised on Monday when Reuters reported that there’s a botnet on the loose with the aim of stealing the virtual currency.

According to the Chicago based security firm Trustwave, hundreds of thousands of computers have been infected with “Pony” malware to form a botnet going after bitcoin and other virtual currencies. So far, at least 85 virtual wallets have been stolen.