Here’s What Happens When You Install the Top 10 Download.com Apps

Found on How-to Geek on Tuesday, 13 January 2015
Browse Software

For the purpose of this experiment, we’re going to just click through all regular installation screens with the default options using a fresh virtual machine. And we’re going to install ten applications from the most popular downloads list. And we’re going to assume the persona of a regular non-geek user.

Each time we ran through this experiment over the last few months, different software would end up being bundled in a rotation, but every single software that bundles itself ends up bundling the same culprits: browser hijackers that redirect your search engine, home page, and put extra ads everywhere.

Always test new software in a virtual machine. Sometimes you need the program only once to fix something anyway and don't want it permanently installed. You see what happens and can try everything without ruining your real machine; and if you really need it more often, consider isolating it: tools like Cameyo or ThinApp can bundle it. Also, don't blindly download the first result you find; get it from the website of the developers directly and avoid sites like download.com and SourceForge.

The FBI's Desired Encryption Back Doors Could Harm Intelligence Gathering, Military Operations

Found on Techdirt on Thursday, 27 November 2014
Browse Software

Silent Circle's Blackphone already has customers in the military and its promise of encrypted communications has seen it put into service by other governments around the world.

The company says that legislation making encryption unavailable to the public could also hurt intelligence collection. The intelligence community today is a great deal larger and more diverse than it was 50 years ago.

Silent Circle wants to make this for the masses, but if the legislative landscape shifts now that midterm elections are over, it could mean that the government will only allow encrypted communications if it can pick and choose who gets to enjoy this "privilege."

Funny how governments still think they can control what's going on. If there are legal issues which make it impossible to market a product that's useful, like encryption, just release it in another part of the world.

Firefox users, get ready for ads in your browser

Found on CNet News on Thursday, 13 November 2014
Browse Software

The Firefox browser, lagging its well-heeled rivals, will soon be serving up an array of ads to one and all.

"We are only collecting minimal viable data" related to sponsored tiles, Herman said. Mozilla will collect a user's location but no more specific than the country the user is from, how many impressions the tile received, and how many times users pinned the tile to their New Tab page or removed it.

Mozilla, get ready to lose more users. Thanks to annoying ads, collecting data and all the other problems people connect with online advertising, this probably isn't a smart move and makes more people switch browsers. Or there will be a fork without this "feature".

OpenBSD 5.6 Released

Found on Slashdot on Saturday, 01 November 2014
Browse Software

Just as per the schedule, OpenBSD 5.6 was released today, November 1, 2014.

If you already have an OpenBSD 5.5 system, and do not want to reinstall, upgrade instructions and advice can be found in the Upgrade Guide.

Another big feature is the lack of systemd.

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Found on Net Security on Wednesday, 22 October 2014
Browse Software

The vulnerability is currently being exploited via PowerPoint files. These specially crafted files contain a malicious OLE (Object Linking and Embedding) object.

Microsoft is still investigating the matter and deciding whether they will issue an out-of-band patch or wait for the next Patch Tuesday to plug the hole.

It's 2014 and people are still using Powerpoint?

Debian's Systemd Adoption Inspires Threat of Fork

Found on Slashdot on Monday, 20 October 2014
Browse Software

They claim that "systemd betrays the UNIX philosophy"; it makes things more complex, thus breaking the "do one thing and do it well" principle.

"We contemplate adopting more recent alternatives to sysvinit, but not those undermining the basic design principles of "do one thing and do it well" with a complex collection of dozens of tightly coupled binaries and opaque logs."

Systemd is the worst that can happen to Linux; coming from "developers" who are well known for ignoring bugs in their code and calling on others to fix it on their side instead. If Lennart and Kay want systemd, they can just fork a distro, implement it and see who wants to use that mess. Unfortunately, thanks to their ties to Redhat, they can instead shove their horrendous bloatware down the throats of everybody.

Lennart Poettering: Open Source Community "Quite a Sick Place To Be In"

Found on Slashdot on Monday, 06 October 2014
Browse Software

Free software programmer Lennart Poettering has been part of his fair share of controversy in the open source community, and his latest essay may raise the most eyebrows yet.

He says in part: "I don't usually talk about this too much, and hence I figure that people are really not aware of this, but yes, the Open Source community is full of a#@&oles, and I probably more than most others am one of their most favourite targets."

Where there's smoke, there's fire. Lennart has his own, rather undiplomatic ways to deal with those who are not blindly following his ideas. That, and most notably his systemd project which gets shoved down the throats of admins, causes the backlash. He says he likes Linux, but ignores basic Unix principles: keeping things simple. Not to mention that a tool should only do one thing, but good. Instead, cramming everything into a single blob from which your entire OS depends is not a solution. He just asked for all the hate that's thrown at him.

Cyanogen Inc. Turns Down Acquisition Attempt by Google, Seeks $1 Billion Valuation

Found on Droidlife on Saturday, 04 October 2014
Browse Software

Ultimately, in theory, a buyout by Google would protect the company’s control of the Android ecosystem, as Cyanogen’s home-brewed version of Android is potentially the first real threat to ship on phones that Google has encountered.

With this news, Cyanogen is now discussing a Series C round of funding with a few major tech firms and late-stage investors, seeking a valuation close to $1 billion.

Recently, it feels like another dotcom bubble is growing again. Companies, no matter if they are good or bad, seek (and receive) ridiculous huge funds.

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Found on Wired on Sunday, 21 September 2014
Browse Software

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties.

The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the “to” and “from” headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs.

“There is no way you could find my IP address or anything about who I am or where I am. [A]nd the rendezvous point in the middle can’t find out anything about either of us.”

It is important to keep the client as easy to use as possible. The majority of people does not want to deal with hassles and freely gives up privacy as an exchange for being lazy.

TrueCrypt Getting a New Life

Found on eSecurity Planet on Friday, 19 September 2014
Browse Software

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

"But we are not thinking of adding functionality," he said. "It will be more about stripping functionality - removing old crypto modules that are not sound and so on. But when newer crypto algorithms come along, we will integrate them into the product."

The name might not be the best, but nevertheless it's good to see that this project provides the masses with an easy to use encryption solution.