Press "Enter" to skip to content

FOSS Force

Phishing Scam Masquerades As LinkedIn Connection Request

We’ve noticed in the last week there’s a new email phishing campaign that uses emails masquerading as LinkedIn connection requests.

Although most tech savvy users long ago learned email best security practices (don’t click on links in emails unless you’re absolutely sure you know the source of the email), sometimes we get lulled into complacency and automatically click on links from trusted sources.

Social Fixer’s Facebook Page Removed

Beginning yesterday, users of Social Fixer have been greeted by an announcement when they log onto Facebook, informing them that the popular browser extension’s Facebook page has been removed without warning.

Social Fixer, a plugin that works with most browsers, allows users to change how their Facebook newsfeed and other pages are displayed and how they operate. Although very popular, the extension has always been a thorn in Facebook’s side. It’s not surprising that Zuckerberg and his minions would now find even less to like about the plugin, since Wall Street has been prodding them to get serious about monetizing the massive amount of traffic that flows through the social network.

Are There Too Many Linux Distros?

Since I’ve been following Linux and FOSS (thirteen years or so by my estimation), questions regarding choice, or too much of it, have been bandied about in Linux circles. Some penguinistas point proudly to the long list of GNU/Linux distros, proclaiming choice to be wonderful and a positive aspect of life in the land of Linux. Others bemoan the sheer number of distros, saying having so many of them has made Linux confusing for newcomers and is otherwise inefficient.

I’ve always considered this to be a rather nonsensical discussion. To begin with, it is what it is. There are a gazillian distros out there, whether we like it or not, and complaining there are too many accomplishes absolutely nothing but to make the complainers out to be whiners–but that’s just my humble opinion.

And the Best FOSS or Linux Blog Is…

In this competition there’s a winner but no losers.

Although only one site gets to call themselves the “FOSS Force Best FOSS or Linux Blog–2013” winner, in reality everybody in the competition has won.

Today we are announcing the winner from a field of ten great blogs, all of which have already won our elimination round. Before that there were 19 truly great blogs in our competition, nine of which had been chosen by visitors to our site, the other ten being hand-picked by us here at FOSS Force as a way of getting things going. They are all winners just by dint of being in the running.

Our Email, Down for 18 Hours, Now Back Up

About 8 pm last night the email accounts we use here at FOSS Force went down. The problem was a server located at a datacenter in Pennsylvania that suddenly disappeared from the Internet. The server was used by us to host our oldest website, Alternative Approaches, a site we made unavailable to the public a few months ago as we’ve worked to reboot the site with a new look and feel. However, we have continued to utilize the domain as our main email domain. The site is our only web property that doesn’t reside on the server we use to host FOSS Force our other web properties.

Second Round of Our Best Personal Linux or FOSS Blog Competition

We were hoping to have 20 to 25 blogs for you to choose from here in round two of our competition to see who wins the honors as FOSS Force Best Personal Linux or FOSS Blog–2013. We end up offering you a total of 19.

Voters in our qualifying poll that finished at noon today wrote-in plenty of web sites for us to consider. The trouble was, most of them didn’t meet the criteria we set-out in the article titled What’s Your Favorite FOSS or Linux Blog? which was published on July 29th when we began this competition.

To a degree, we expected that. We knew some voters would write-in names of great Linux sites that in no way qualify as personal blogs. That they did, placing votes for many of our favorite sites and for some we think downright silly. So we first cleared out votes for sites that obviously don’t qualify, such as Omg! Ubuntu!, phoronix and OStatic.

After taking care of that task we were left with a long list of sites. As most were unknown to us, we had

Are You Ready For Round Two?

The first round of voting in our quest to see whom our visitors will vote “Best Personal FOSS or Linux Blog–2013” has ended. Right now we’re busy checking out all of the blogs that received write-in votes to see which qualify for round two and which do not. We’re estimating that by late afternoon or early evening eastern time in the United States we’ll be ready to announce our line-up for round two.

Round two will be an elimination round from a field of 20 to 25 blogs taken from the results of the poll that just ended. There will be no write-in votes, but voters will still be allowed to vote for up to two blogs.

TOR Case Appears to Be Infringement of Rights

I shouldn’t have to say this, but child pornographers and users of child porn are scum and deserve just about any sentence meted out to them. This absolutely doesn’t mean, however, that we willy-nilly throw their rights out the window in order to catch them. Remember, in the United States we still claim to believe in the concept of “innocent until proven guilty.” If they forgot to teach you that in school, Google it. Try “Bill of Rights” as your search term.

With that out of the way, let’s get into our story…

Tor LogoIt appears more and more that the malware caper discovered this weekend on the TOR network was all about harvesting MAC (media access control) addresses. We’ll probably never know the whole story of who’s behind this, but we’re getting enough pieces so that we can hobble together a broad picture of what happened.

Is the NSA Targeting TOR?

I like the expression, “Just when you thought it was safe to get back in the water.” I almost used it to open this article, but I didn’t. It would be inaccurate. Nobody in his right mind would consider the Internet waters safe at this junction in time.

Today while surfing tech sites looking for items for our news feed, I ran across an item on the Beeb titled Users of hidden net advised to ditch Windows, with the “hidden net” being TOR. Since it always brightens my day to discover some security geek has found yet more vulnerabilities in Redmond’s finest, I checked out the news item.

It wasn’t what I thought. TOR was singling-out Windows not because of any newfound security issues with Redmond’s operating system, but because TOR had been compromised with malware that was specifically designed to infect Windows machines.

Latest Articles