Archive for the ‘Free Software’ Category

Bitdefender Business Security – Video


Bitdefender Business Security
Download full and free 100% click here to this link http://freesoftwaredc.com/bitdefender-business-security/ Download full and free software http://freesoftwaredc.com http://softwareforsale.info...

By: Mary B. Sanderson

Visit link:
Bitdefender Business Security - Video

The new struggles facing open source

The religious wars have faded, as new conflicts around control, code 'sharecropping,' 'fauxpen source,' and n00b-sniping arise

The early days of open source were fraught with religious animosities we feared would tear apart the movement: free software fundamentalists haggling with open source pragmatists over how many Apache licenses would fit on the head of a pin. But once commercial interests moved in to plunder for profit, the challenges faced by open source pivoted toward issues of control.

While those fractious battles are largely over, giving way to an era of relative peace, this seeming tranquility may prove more dangerous to the open source movement than squabbling ever did.

Indeed, underneath this superficial calm, plenty of tensions simmer. Some are the legacy of the past decade of open source warfare. Others, however, break new ground and arguably threaten open source far more than the GPL-vs.-Apache battle ever did.

How we got here: From purity to profit

The different sides used to be clear. Richard Stallman chaired the committee on free software purity while Eric S. Raymond inspired the open source movement.

Both sides rigidly held to their cause. And both sides draped themselves in a different licensing flag: GPL for the free software purists, BSD/Apache for the open sourcerors.

Not surprising, the increasing popularity of both camps stirred significant financial interest; thus, the profit motive came to open source. VCs prowled for projects with enough downloads to justify a support-and-service business model. Companies like Alfresco, JBoss, XenSource, and Zimbra sprang up to capitalize on the industry's interest in open source, with developers increasingly wary of their be-suited new neighbors.

As these startups grew toward IPOs, however, the support-and-service model ran out of gas, as 451 Research analyst Matt Aslett warned. Then began the "open source plus proprietary add-ons" era of open source, with companies building "enterprise versions" of open source projects, withholding features for paid subscribers. The dreaded Open Core model was born, and the industry set out to tear itself apart over accusations of bait-and-switch and proprietization of open source.

The era of milquetoast open source

More here:
The new struggles facing open source

Linux Australia breached, personal details leaked

The open-source and free software user group Linux Australia said personal information for attendees of two conferences it hosts may have been leaked after malware was found on one of its servers.

The information may have included first and last names, postal and email addresses, phone numbers and hashed passwords, wrote Joshua Hesketh, Linux Australias president, on a message board. Financial data was not affected, he wrote.

The breach affects those who registered for the groups Linux conference over the last three years and for python programming conference Pycon Australia in 2013 and 2014, he wrote. Attendee data for those conferences was held on the compromised server.

Although there arent indications that information was removed from the server, those affected are advised to change the password they used to register, especially if the same one is used on other websites.

Linux Australia discovered the breach on March 24 after it noticed conference management software it uses called Zookeepr started sending a large number of error reporting emails, Hesketh wrote. A server had been attacked two days prior.

It is the assessment of Linux Australia that the individual utilized a currently unknown vulnerability to trigger a remote buffer overflow and gain root level access to the server, Hesketh wrote.

The attacker installed a remote access tool and then botnet command and control software.

Linux Australia has decommissioned the infected server and strengthened security on the new one. Hesketh wrote that the new server will have a far more rigorous operating schedule applied to it. A log analysis tool has also been installed.

Websites for the conferences will in the future be archived six months after a conference concludes and then kept on a separate server and deleted from Zookeepr, Hesketh wrote.

Jeremy reports on security and regional news for the IDG News Service. More by Jeremy Kirk

Excerpt from:
Linux Australia breached, personal details leaked

Chay Tron Tinh Yeu tap 10 – Video


Chay Tron Tinh Yeu tap 10
Choose from a wide variety of article links on Free Bible Studies. Written from a Christian perspective, the links below are one hundred percent original content with an impressive range of...

By: PhimTraChanh

Follow this link:
Chay Tron Tinh Yeu tap 10 - Video

Chay tron Tinh Yeu Tap 19 – Video


Chay tron Tinh Yeu Tap 19
Choose from a wide variety of article links on Free Bible Studies. Written from a Christian perspective, the links below are one hundred percent original content with an impressive range of...

By: PhimTraChanh

See more here:
Chay tron Tinh Yeu Tap 19 - Video