Press "Enter" to skip to content

Posts tagged as “Linux”

Tentative Schedule Meets Tentative Schedule For ATO

If last year’s inaugural All Things Open (ATO) conference in Raleigh was primarily an event for developers and admins, that’ll be even more true when ATO II cranks up on October 22 at the Raleigh Convention Center. At least that’s how it appears when scanning the tentative schedule posted on the ATO website. There’s also much on tap for management types, but the main focus is on developers and system administrators.

At first glance, it might look as if there’s very little for what blogger Gary Newell calls the Everyday Linux User, those who have adopted free software at home or in a mom and pop business. To my eyes, there is barely enough — but that still qualifies as enough.

That might change. The schedule is still tentative and very much in flux. There are no descriptions of the presentations posted yet and there were still a few slots that remain unfilled, presumably waiting on schedule confirmations. However, the presentations’ names are usually descriptive enough and there are bios of all speakers, making it easy enough to get some sort of idea of what to expect.

USB Ports Are No Longer Your Friend (If They Ever Were)

Just because the good guys have discovered a new security risk doesn’t mean the bad guys haven’t known about it forever. The risk is only new to us. It’s actually been there for a long time, maybe forever. Who knows how long everyone from the black hats in Moscow to the NSA in bucolic Maryland have been taking advantage of what appears to us to be a “new” exploit?

The USB security hole recently unveiled by Berlin based Security Research Labs (SRL) seems to be of those that’s been around “forever.”

USB exploit infecting Linux
A slide used by Security Research Labs at the Black Hat USA security conference explaining how a USB device can be infected by a Windows computer in order to gain root access on Linux.
(click to enlarge)
While it shouldn’t be news to anybody that caution should be exercised when using USB devices, the new exploit would seem to indicate that even the most draconian security measures, short of doing away with USB devices entirely, might not be enough. The recently revealed problem has to do with the USB controller chip found in most, if not all, USB devices. The chip basically identifies the device type to the computer.

The trouble is, most of these chips are relatively easy to reprogram.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Computer Dating, Linux Style

Look…let’s face this together. Dating can suck.

When you’re young, it’s an adventure. One has relatively little baggage, the emotional scars are few and you haven’t even begun to think about dating’s therapeutic value yet. In other words, the dating world is your oyster.

Then you find yourself at midlife, when you’ve accumulated a large pool of of crises. You know, stuff like that divorce or two under your belt, some strong political or religious beliefs that are deeply ingrained and…oh yeah…that messy conviction for hacking that’s still on your record. These are things that tend to narrow down the potential list of candidates for life-long bliss.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

When Linux Was Perfect Enough

The other day my colleague, friend and sometimes partner-in-crime, Ken Starks, published an article here on FOSS Force on one of his favorite gripes: things that don’t work right in Linux. This time he was complaining about a font issue in Mint when using KDE. This is nothing new from Ken. In the past he’s written other articles about broken aspects of various Linux distros that never seem to get fixed. It’s his contention that these “small” bugs, which remain unfixed release after release after release, are largely responsible for desktop Linux’s failure to take hold with the general public.

He might be right.

For Christmas I bought my roommate a new second generation Nexus 7 tablet running Android, an OS built around the Linux kernel. It “just worked,” out of the box, with no tweaking necessary. During the last seven months she’s used it for hours daily. As far as I know, she’s found no glitches that require fixing. I’m reasonably certain I’d know if she did, since the main reason I gave her the Nexus to begin with was because I had tired of trying to keep her Windows laptop running to her satisfaction. She has no trouble telling me when her computer goes kaput, and she always wants it fixed right now. Facebook waits for no one, you know.

I point this out because Linux has all but taken over the tablet and phone end of the computing spectrum. Apple makes plenty of money with the iPhone and iPad, but that’s due to their high prices. In market share, they lag far behind Android devices. And Microsoft has proven that Windows isn’t the unbeatable giant it was once thought to be. Even with massive money spent on television ads and conspicuous product placement in nearly every scripted drama on CBS, mobile devices running Windows remain a mere asterisk when looking at market share.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Linux Advocates in the Wild

Every now and then, you get the opportunity to show others what your Linux computer looks like. Some of those people will want to give Linux a shot on their computers as well. I can’t think of anything as gratifying as teaching someone how to use desktop Linux. On a personal level, I do it because I am sick of fixing friends’ and family’s Windows problems. On a professional level, well…that’s my job.

I want to tell you a story about one of those Linux conversions and the amazing ripple effect that one person caused. You just never know how far your kindness can spread.

tux_linux_inside_512Jaimee is a bright young lady. She attends a magnet school for the gifted and accelerated students in the Dallas/Fort Worth area. She lives with her aunt during the school year and comes home to her family during the summer months. She will be a senior this coming school year and she is focusing on a career in physics. The entrance exam for this magnet school is brutal.Think of it as SATs on steroids. And this is just the high school.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Where Loyalty and Trust Still Matter

It was in 2010 when Skip Guenter began winding his way through friends and contacts, finally succeeding in finding our organization a place to call home.

That place is Taylor, Texas.

Since 2005, HeliOS/Reglue has operated from any place we could find. We’ve worked from garages, work sheds, tack rooms, barns, the back of pickup trucks and even in monthly storage places.

But we are home now.

Taylor a small town of 15.5K or so. Big enough to have a Walmart but small enough for the checkout clerk to know you by your first name, as well as the names of your spouse and kids. That’s also true of the people at the post office, the bank, the grocery store, the vehicle registration place…. And that’s kind of nice.

Reglue loyality

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Ikey Doherty Talks Evolve OS & Budgie Desktop

Ikey Doherty is probably one of the most tech-smart people I know. Fact is, Ikey is much like that guy you hear about on the news, the guy that can hear a string of four digit numbers and tell you the sum of them in a couple of seconds. Now, I don’t know if Ikey is capable of that feat, but I do know what he can do.

Ikey Doherty can code. Ikey Doherty can code in a number of languages.

Ikey Doherty
Ikey Doherty, Linux programmer.
So you might say to me, “Well Ken, I can code too. Anyone who goes to college to study Computer Science can code something.”

OK, I’ll give you that. But let’s back up a bit. How much could you code before you went to college? A little bit? Was it a hobby until you decided you were interested in doing it professionally? The last time I did the calculations in my head, Doherty writes extensive and complex code in at least four languages.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Latest Articles