Peter Grasch, under the KDE umbrella, is building up a team of developers and researchers looking to bring first class speech processing to the world of free software.
Read more »Open Speech Initiative announced
- Login to post comments
WPA2 is vulnerable (hole196)
Do you think your wireless communications are secure? Think again. There is a vulnerability built into the WPA2 protocol itself! It's based on abusing the GTK (Group Temporal Key) and can be used to create man-in-the-middle and denial-of-service attacks. Too few people know this.
Read more »Category: High End Tags:
- Login to post comments
A call to arms for obfuscated bridges
Fresh obfuscated Tor bridges are needed more than ever, since they are the only way for people to access Tor in some areas of the world (like China, Iran and Syria). But it is not the same as an exit node.
Read more »Category: High End Tags:
- Login to post comments
Atheros open sources firmware for two wireless chips
Qualcomm Atheros has released the source code of firmware for two of its 802.11n wireless chips on GitHub.
Read more »Category: High End Tags:
- Login to post comments
Host your own document storage service with ownCloud
If you don't want to lose control of your data, yet enjoy all the benefits of an always-available and synchronized online repository, you can turn to ownCloud, an application that lets users share and sync files within the confines of your enterprise firewall on servers you control.
Read more »Category: High End Tags:
- Login to post comments
KDevelop 4.4.0 Released
The KDevelop team is happy to announce the immediate availability of KDevelop 4.4. As usual, this feature release comes packed with new features, bug fixes and improved performance. New in this release is a shiny welcome screen for improved usability and an easier entry into the KDevelop world.
Read more »- Login to post comments
Smart Access Control with Apache
Learn how to employ some of Apache’s most useful and effective modules to restrict access to your Apache-powered website.
Read more »Category: High End Tags:
- Login to post comments
Drush: Managing Drupal from the Command Line
Learn how to use Drush, a Drupal command-line shell, which makes a Drupal administrator’s job easy. It lets you perform internal cleanup, do a fresh Drupal install, install and enable modules, or create users, without the aid of a GUI.
Read more »Category: High End Tags:
- Login to post comments
Linux 3.2 Released
An enhanced Ext4 filesystem, an optimised TCP stack and support for thin provisioning in the Device Mapper are some of the most important new features of the freshly released Linux 3.2. The latest kernel version also brings with it a host of new and improved drivers which, among other things, address graphics hardware from Intel and NVIDIA and wireless devices from Atheros and Broadcom.
Read more »Category: High End Tags:
- Login to post comments
How to edit commited subversion logs
When you put a mistake into some of your comments in subversion repository it's no need to cry. There are simple ways to correct your mistakes. I will show you two most common possibilities.
Read more »Category: High End Tags:
- Login to post comments
Web Search By The People, For The People: YaCy 1.0
The YaCy project is releasing version 1.0 of its peer-to-peer Free Software search engine. The software takes a radically new approach to search. YaCy does not use a central server. Instead, its search results come from a network of currently over 600 independent peers. In such a distributed network, no single entity decides what gets listed, or in which order results appear.
Read more »- Login to post comments
Writing standalone programs with EGL and KMS
Both on dri-devel and at the most recent Kernel Summit, the idea of a KMS based console program came up yet again. So in the interest of facilitating the lazyweb to write one, I thought I’d provide a review of what it takes to write a simple KMS program that ties in with GL, just in case anyone wants to port the VTE widget and give me my VTs on a cube. :
Read more »- Login to post comments
Get Professional Security Testing with BackTrack
Penetration testing involves deliberately attacking your system to determine vulnerabilities. Using a variety of tools designed for specific tasks, you attempt to break into your own system. Exhaustive pen testing helps you assess potential breach points, which you should then plug before anyone attempts to exploit them.
Read more »Category: High End Tags:
- Login to post comments
ISPmail tutorial for Debian Squeeze
You are interested in learning all the basics about running your own mail server using Debian Squeeze? Be my guest. All you need is a computer running Debian (Squeeze) and an internet connection. This tutorial explains step-by-step how to set up such a server and give you lots of background information in the process.
Read more »Category: High End Tags:
Implementation Qemu-kvm 0.15.0,SpiceServer and Spice-Gtk-0.7 on Ubuntu 11.10 KVM Server
Following bellow seems to be the best way to implement Qemu-kvm 0.15.0 spice enabled, Spice Server 0.8.2 and Spice-Gtk-0.7 with GObject-introspection enabled on Ubuntu 11.10 in meantime close to Beta 1.
Read more »Category: High End Tags:
- Login to post comments