Press "Enter" to skip to content

Posts published in “Security”

All Things Open: On Vendor Mistrust, Containerization & Profiting From Open Source

The first ever All Things Open conference in Raleigh, North Carolina is now history–but it’s history that will repeat itself. At the sendoff after the last workshops had finished, Conference Chair Todd Lewis announced that the event had been a bigger success than expected, with something like 800 in attendance, and that the event would definitely be returning to the Old North State’s capital city in 2014.

The three presentations I was able to attend at the afternoon session started with “Open Source Communities in a For Profit World” led by John Mertic, a Solutions Architect for SugarCRM. Although Mr. Mertic is a personable enough person and his presentation was well thought out, his ideas were a bit disturbing to this dyed-in-the-wool open sourcer. I’ll save the whys and wherefores for next week’s in depth look at this workshop. Suffice it to say, right now I’m hoping that when I review his presentation I’ll find I misunderstood some of his ideas.

Windows Becomes Freeware, Adobe Cracked & More…

FOSS Week in Review

Adobe hacked

We’ve known for years that Adobe doesn’t seem to have a knack for keeping their products secure. New vulnerabilities are found almost daily in Reader and Flash, so much so that Windows users grow used to the constant updates required of them by the fine folks at Adobe. Now it appears as if the San Jose based company can’t keep their servers secure either.

Last Friday, The Australian reported that black hats had managed to steal source code and sensitive customer information:

Torvald’s Diplomacy, Elop’s Riches & More…

FOSS Week in Review

Redmond Ups the Ante on Its Buyback Program

No sooner had we told you last Friday of Microsoft’s offer to buy certain “gently used” iPads for up to $200 in credit vouchers, good at your friendly neighborhood Microsoft store, than they went and upped the ante. What they’ve done is something of a reverse interpretation of a line from the old Proctor and Bergman comedy album from the early 70’s, TV or Not TV. To paraphrase, “What was once two hundred is now three hundred fifty.”

Yup. You heard us right. On Friday your old iPad was worth two hundred smackers to the Microsoft folk–which had to be taken in store credit. By Sunday morning, it was three fifty as cash loaded on a Visa card. Talk about inflation. Not only that, Redmond’s buyback offer now extends beyond a limited range of iPads to include many more devices. Now they’ll take Android devices, both phones and tablets, from Samsung, Lenovo and others, as well as iPhones and iPads. We understand they’re even offering to buyback BlackBerrys.

Votes Tallied on the GPL and the NSA’s Spying

Yikes! We got behind in looking at the results of the polls we run here on FOSS Force, which means we’ve got some catching up to do.

What was your opinion on the GPL?

Back on June 30th we asked you, “Which of the following best describes your thoughts about the GPL?” The poll’s been active since, though for most of that time it’s been buried in the article What’s Your Take on the GPL? back in our archives. We took it down just this morning.

In this poll we offered the following options as answers:

Phishing Scam Masquerades As LinkedIn Connection Request

We’ve noticed in the last week there’s a new email phishing campaign that uses emails masquerading as LinkedIn connection requests.

Although most tech savvy users long ago learned email best security practices (don’t click on links in emails unless you’re absolutely sure you know the source of the email), sometimes we get lulled into complacency and automatically click on links from trusted sources.

TOR Case Appears to Be Infringement of Rights

I shouldn’t have to say this, but child pornographers and users of child porn are scum and deserve just about any sentence meted out to them. This absolutely doesn’t mean, however, that we willy-nilly throw their rights out the window in order to catch them. Remember, in the United States we still claim to believe in the concept of “innocent until proven guilty.” If they forgot to teach you that in school, Google it. Try “Bill of Rights” as your search term.

With that out of the way, let’s get into our story…

Tor LogoIt appears more and more that the malware caper discovered this weekend on the TOR network was all about harvesting MAC (media access control) addresses. We’ll probably never know the whole story of who’s behind this, but we’re getting enough pieces so that we can hobble together a broad picture of what happened.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

MIT Reviews Aaron Swartz, Google’s 100 Million Takedowns & More…

FOSS Week in Review

USPTO shoots down Apple patent

There seems to be more than enough tit-for-tat to go around in the ongoing patent battle between Apple and Samsung. If we wanted to be snarky, we’d say we haven’t seen this much legal maneuvering since the last days of the Beatles and the “sue me, sue you blues.”

NSA Exposes Cloud Computing’s Weakness

Cloud computing was always a bad idea.

Not totally bad, mind you. It has its place. I use Google Docs/Drive or whatever they’re calling it this week sometimes so I can work on articles on the computer at my day job without leaving a mess behind on the bosses hard drive. But mostly cloud computing has always been a bad idea.

Ask Richard Stallman; he’ll tell you. Or ask me.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

NSA/PRISM Mess–Yahoo Wins & Microsoft Loses

I’m beginning to rethink Yahoo, just as I reappraised my feelings on the old Novel after they went to bat against SCO for the benefit of IBM and Linux.

On Monday, the Sunnyvale, California company pulled a honest-to-goodness rabbit out of the hat when they managed to persuade a FISA court to order the Obama administration to declassify as much as possible of a 2008 court decision justifying Prism before releasing it to the public.

Yahoo’s victory came one day before Microsoft went into damage control mode by denying allegations revealed by the publication last Thursday of documents leaked to the Guardian newspaper and website.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Welcome to Microsoft Trustworthy Computing

It used to be you only had to worry about the accidental insecurities in Windows. Now Redmond’s giving away the keys to everything they sell. Microsoft is beginning to surprise even me and I thought I was beyond surprise.

I get it. I understand patriotism. I also understand legal obligation. The guys and gals in Redmond would want you to believe that their cooperation with the feds is based mostly on the later. Their story is they were forced to give access to their customer’s data by a loaded court order being held to their collective head.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Latest Articles