Press "Enter" to skip to content

FOSS Force

The Day the Light Came On for Eddie…

Eddie Baker is a 16 year old high school student and his family was one of our Reglue 12 Geeks of Christmas program recipients. Not only did he qualify for a computer, his family was qualified for help with Internet via our Prometheus Project. Eddie is a big guy. He’s well over six feet tall and goes a good 230 pounds. The stuff football linebackers are made of. Football is of no interest to Eddie. When he says so, he’s almost apologetic in the way he says it. Here in Texas, high school football is darned near a religion.

ReglueHe wants to study and work in the field of geology. Specifically, the archaeological wing of geology. Eddie wants to study things like the Cretaceous-Tertiary extinction. He wants to know more about what really happened in that time period. He wants to know how the molten rock and metals at our core generate a magnetic field that prevents us from being destroyed in a micro-second by a heartless, murderous universe.

Football is of no interest to Eddie. Eddie doesn’t care about games. He cares about contributing to the human condition in a positive way.

Google Beats Troll, Ellison’s Oracle ‘Unbreakable’ & More…

FOSS Week in Review

NSA involved in industrial espionage

Another big non-surprise this week in the continuing saga of the NSA. It appears that our beloved spy agency has been using their secret powers for the purpose of uncovering industrial secrets from foreign companies. So much for the separation of business and state. Reuters reported that in a television interview with a German TV network, Edward Snowden said the agency doesn’t confine its intelligence gathering to items of national security.

“‘If there’s information at Siemens that’s beneficial to U.S. national interests – even if it doesn’t have anything to do with national security – then they’ll take that information nevertheless,’ Snowden said…”

Even the Republicans are jumping on the stop-the-NSA bandwagon, which is rather surprising.

Maintenance–The Achilles Heel of Linux

I grew up in a farming and ranching environment. It’s not the easiest life and it can beat you down if you let it. There’s always something broken, something that needs to be fixed, and if you let it get away from you it can become an overwhelming task trying to set it right.

When my Dad decided to retire from the business, we set about the task of getting things ready for prospective buyers or their agents. One of my jobs was to make sure that the tack shed was in order and all of the tack was wiped with linseed oil and evened up on the wall racks. I was already way behind in my chores and getting to the tack shed was low on my priorities.

Linux Old BarnThe very first prospect took the tour with me and my dad. We were showing him some of the out buildings of which the tack shed was one. When the buyer pulled out one of the trace harnesses, it had a broken coupler and the leather was cracked up and down the trace.

Google Passes Motorola to Lenovo

Today it was announced that Google is selling handset maker Motorola Mobility to Lenovo for $2.91 billion. The move comes less than a week after the Chinese electronics company also agreed to acquire IBM’s low-end server business for $2.3 billion. Google purchased Motorola Mobility for $12.5 billion in 2012.

Although the move is not necessarily a surprise, it is somewhat unexpected.

When Google purchased the consumer electronics end of Motorola, media pundits were quick to point out that the search company was primarily interested in attaining Motorola’s valuable patent portfolio. At the time, Google’s patent holdings were somewhere between slim to none and they desperately needed patents to defend themselves against legal actions, as Android had become a magnet for attracting patent trolls. Since then, Google has been actively adding patents to their portfolio.

You Say NSA Has Hurt U.S. Tech Sector

Back in the early days of the Snowden affair, when it first became obvious that Microsoft and others had co-operated with the NSA’s agenda to spy on every living human being on the planet who owned a computer, we said this wouldn’t bode well for those who make their living from tech in the U.S. We thought that proprietary software vendors would be most vulnerable due to their lack of transparency, i.e., the lack of available source code, especially after Redmond was exposed for building secret access into Windows.

Back in December, we asked for your opinion in our NSA in the USA Poll.

February 11, 2014: The Day We Fight Back Against the NSA

It only makes sense that the NSA be confronted online. After all, it’s the Internet the agency uses to spy on us. They’re not following us down dark streets or steaming open our snail mail. Instead, they’re monitoring our emails to discover who is in our circle and stalking us on Facebook and Google Plus. Especially if we use Windows, there’s no need for them to dirty their hands sifting through our garbage when they can enter through a virtual trap door on our computer to rifle through our word processor and spreadsheet files. Phone tapping? How old school in a world where every call we make, even from a land line, becomes VoIP somewhere along the line. When we use VoIP or Skype, they can easily listen. If we visit a website located in a country on their hit list, they sit-up and take notice.

The Day We Fight Back banner
The Day We Fight Back banner.

The people at the NSA don’t care about our right to liberty, happiness or even life itself. They are obsessed with what they see as their mission and are convinced, as zealots are always convinced, that the ends justify the means. They embody the worst of Stalin, Mussolini, Franco and Pol Pot. They do so with an American twist, maintaining an illusion of freedom which keeps us pacified.

February 11th will be The Day We Fight Back.

Chrome Eavesdropping, Balkanized Internet & More…

FOSS Week in Review

Sixteen-year-old wrote the code for Target breach

TargetMiamiThe press calls him a “nearly seventeen-year-old” and he’s reported to be one of the people behind the malware used to compromise credit card data at Target and other locations. By our way of counting, “nearly seventeen” means he is sixteen or, like the show tune says, “sixteen going on seventeen.” He lives in Russia and is said to be the author of the BlackPOS malware that was used against Target and might have been used against Neiman Marcus.

This info comes from Los Angeles based cyber-intelligence firm IntelCrawler, which says it’s also traced six additional breaches to BlackPOS. As noted on MarketWatch, despite authoring the malware, the kid is just a small fry in this affair.

Is Red Hat Working for the NSA?

On Friday, Roy Schestowitz posted an article on Techrights which seems to accuse Red Hat of being in cahoots with the NSA. According to the article, the company has been building back doors into RHEL for the spy agency. However, the article appears to be long on accusations and short on proof.

I like both Techrights and Schestowitz. Both are controversial and that’s part of what I like about them. However, before making accusations it’s nice to have at least a few facts to back them up.

Red Hat logoThe article attempts to make the case for using CentOS over RHEL. Indeed, many of us who’re short on bucks and can’t afford Red Hat’s expensive support subscriptions are already using CentOS in server environments. We use it here at FOSS Force to serve web pages? Why? Because not only does CentOS have an extremely capable development team, the distro is in most ways a clone of Red Hat, which means the CentOS development team is able to leverage Red Hat’s research and development and incorporate it into their distro.

You Say GIMP Was Right

GIMP logoBack in November, the popular open source image editing program GIMP ended their association with SourceForge and dropped the site as its host. Since that time, downloads of GIMP have no longer been available on the site but have been moved to the GIMP’s website.

The split was the result of GIMP’s concern over policies at SourceForge, primarily SourceForge’s use of DevShare, an installer for Windows that bundles third party software offers with FOSS downloads. In addition, the GIMP folks had reservations about potentially deceptive “download here” buttons on ads being served by the likes of Google’s AdSense.

There were two sides to this story, of course.

Latest Articles