Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread tomlukeywood

i think his views are stupid
but i will still wait for his reply 


Re: [Trisquel-users] Reddit will be giving 10% of their ad revenue to charities based on user voting. Make sure you vote!

2015-03-06 Thread dooleyn

http://www.redditblog.com/2015/02/announcing-winners-of-reddit-donate.html



Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread tomlukeywood

i don’t think you should just ignore someone if you disagree with them
you should challenge there views

This only gives him more reasons to keep posting off-topic messages.

this discussion should of been made in a off topic forum
true


Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread tomlukeywood

if you must have windows
another option is to use a external hard-drive or usb stick
to run trisquel
and then keep the windows install on your hdd
and then you just boot to the harddrive whenever you use windows


Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread adw . email


Thank you for your responses so far.

Yes, you are right, I notice it too. It does that sort of thing deliberately.  
But I don't destroy a possession of mine, why it isn't evil and commonly used  
too. I think the manufacturer should be sued for this. Personally I wouldn't  
do this alone at this time but would find others for it first. Possibly that  
company would be undone of all profit it has ever made. Possibly a big debt  
and not even breaking even with the costs it had so far. I'm serious.


If I choose the option: Install alongside Windows 7, where will it get  
harddisk space?


Something was about that, that is why I ask.
To keep this post simple, not too complicated I only ask where it gets  
harddisk space. If you are interested and ask I will say too why this is  
important.


Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread tomlukeywood
 I only ask where it gets harddisk space. If you are interested and ask I  
will say too why this is important.


if you installed them along side each other then you could chose how much  
space each of them get from the hardrive


[Trisquel-users] Re : Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread lcerf
The installer automatically reduces the Windows partition to get some free  
space (where it creates its own partitions).


Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread maestro
onpon is right - I didn't consider the possibility of you having the 14.10  
version!!

Don't do that - fresh install is required!


Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread onpon4
I don't believe for a moment that chaosesqueteam actually believes men not  
being able to marry young girls (and women not being able to marry young  
boys, and women not being able to marry young girls, and men not being able  
to marry young boys) is some kind of conspiracy by women to enslave men. I've  
seen some pretty insane views, sure, but none as blatantly stupid as that.  
Support of a right to having sexual relations with children is something I'd  
believe to be genuine (it's probably the position of some people; I'm not  
sure). Belief in sexual relations with children being the norm which is  
actively suppressed by a conspiracy? No. He's just making stuff up hoping to  
get a response. That's what a troll is.


Re: [Trisquel-users] Gitorious is dead - acquired by GitLab

2015-03-06 Thread dooleyn

Thanks for the correction. That's good news.


Re: [Trisquel-users] free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)

2015-03-06 Thread davidvargas1

Broadcom BCM4313 802.11bgn Wireless Network Adapter Wireless

First of all, some of the original drivers of that modem are not compatible  
to GNU-LINUX libre programs.


 The close drivers are proprietary, but the other Open drivers are under the  
GPL license, for everyone to download and study. but those GPL drivers will  
sometime, disable some of the functionality of the modem itself. Because the  
firmware demand the proprietary drivers own by the manufactures.


 When I encounter issues like this, the first step is, What are the GPL  
firmwares supporting this product?
I'll be polite to you, but you need to do your homework first AND RESEARCH  
THEIR WEB SITE for the GPL drivers THEY ARE USING! and take it from there.  
Wrong web site to teach others How to flash firmwares.


 Why don't you buy a compatible  Mini WIFI card from Think Penguin? I had  
purchased 1 mini PCI for my laptop and still working without issues so far. 


Re: [Trisquel-users] Gitorious is dead - acquired by GitLab

2015-03-06 Thread blade . vp2020

hay
I wonte make fork from GitLab to making it GPL. v3



[Trisquel-users] Re : free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)

2015-03-06 Thread lcerf
This adapter cannot be driven by free software only. You can replace it with  
hardware from ThinkPenguin or from Tehnoetic (the only two vendors I know  
that guarantee that Linux-libre can drive their hardware):


http://libre.thinkpenguin.com
http://tehnoetic.com


You can also trust somebody who reports that she recently bought a Wifi  
adapter that works with Linux-libre. I bought several of this adpater in  
December and Linux-libre could drive them:  
http://www.tp-link.com/en/products/details/?categoryid=243model=TL-WN722N


It is possible (maybe not probable) that the chipset on that adapter has been  
changed since then. The chipset is what matters... and it is never indicated  
on the package (so that the manufacturer can change it).


Re: [Trisquel-users] offline encrypted address book

2015-03-06 Thread arimanuel

Thanks for your answers guys,
in the end I just used GNUmeric because:
- The files are really small
- The files are readable from any computer or mobile phone, in case of need
- Easy to encrypt

I just had to overcome the little learning process for some functions in  
GNUmeric, done that is perfect, so far.





Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread tomlukeywood

Because when women have rights life is much less fun.

this is selfish
just because you might have less fun
is not a excuse for doing harm to others

the idea that you must abuse others to have a happy life
rely is wrong
lots(i say lots as i cant know for certain about everyone)
 of pepole i know are perfectly happy without abusing others
and they do good to others they don’t abuse them.

what is your specific reason for believing women should not
be equal to men?

I hate feminism and feminists and am happy when they are killed.

i am a feminist
you would be happy if i were killed as i believe in equal rights
for men and women?

i highly disagree with your views but i would not be happy if you were dead.



[Trisquel-users] free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)

2015-03-06 Thread jd . 2012abc1231
As n the topic, I tried to find it, but not luck. IF anyone knows of a free  
driver for:


Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727]  
(rev 01)


It's for the Gateway NV56R14u laptop (Intel Core i3-2328M, 64-bit).


Re: [Trisquel-users] offline encrypted address book

2015-03-06 Thread marioxcc . MT
“mobile phones” are computers too. They just have a different form factor  
than desktop computers, usually use an ARM SoC instead of x86, and are among  
the worst offenders regarding how abuse their users' computing rights.




Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers

2015-03-06 Thread davidvargas1

 more updates from the Electronic Frontier Foundation


Russian Researchers Uncover Sophisticated NSA Malware

Defending your rights in the digital world

February 19, 2015 | By Eva Galperin and Cooper Quintin
Russian Researchers Uncover Sophisticated NSA Malware

Over the weekend Russian IT security vendor Kaspersky Lab released a report  
about a new family of malware dubbed The Equation Family. The software  
appears, from Kaspersky's description, to be some of the most advanced  
malware ever seen. It is composed of several different pieces of software,  
which Kaspersky Lab reports work together and have been infecting computer  
users around the world for over a decade.  It appears that specific  
techniques and exploits developed by the Equation Group were later used by  
the authors of Stuxnet, Flame, and Regin. The report alleges that the malware  
has significant commonalities with other programs that have been attributed  
to Western intelligence agencies; Reuters subsequently released an article  
about the report in which an anonymous former NSA employee claims that the  
malware was directly developed by the NSA.


Among the most interesting and advanced features of the malware is its  
ability to compromise and rewrite hard drive firmware. Reprogramming the hard  
drive itself in this way is a deeper level of compromise than infecting an  
operating system, and can let the malware re-install itself from a hidden  
sector of the hard drive even if the drive is securely wiped and reformatted  
and the OS is reinstalled from scratch. Conventional wisdom about  
reinstalling operating systems in response to suspected infections may  
therefore not be enough for the victims of attacks like Equation's.


Antivirus companies regularly try to improve their products by doing malware  
research—trying to find and analyze new malicious software in the wild.  
They are in a very good position to see the entire landscape of malicious  
software and attacks, which today increasingly includes government-sponsored  
malware. Some observers found it significant that Kaspersky—a Russian  
firm—was the only company to release a report about the Equation Group,  
Kaspersky's shorthand name for the anonymous authors of the malware. Many  
antivirus companies are based in, or have important business interests in,  
countries that develop government malware, such as the Five Eyes (the U.S.,  
United Kingdom, Australia, New Zealand, and Canada), and these companies may  
come under pressure to conceal government malware. Having antivirus  
companies, security companies, and malware researchers in a variety of  
different jurisdictions is valuable in that they can collaborate on their  
research and resist this sort of pressure.


The hard drive firmware capabilities of the Equation Group malware and code  
names that are described in the report match up closely with NSA capabilities  
and code names previously disclosed in Der Spiegel. That lends credibility to  
the hypothesis that Equation Group is part of or affiliated with the NSA,  
which would mark one of the first times that programs or capabilities exposed  
by journalists were specifically found in the wild. This is a very exciting  
development; it will be interesting to see if researchers continue to succeed  
in publicly documenting samples of other nation-state malware and attack  
tools whose existence has been reported or conjectured.


The report also mentions that the Equation Group used several different 0-day  
exploits to spread their malware. Some of these exploits were later used by  
Stuxnet. One of the exploits used was originally used in the 2009 Aurora  
attack; it was later repurposed by the Equation Group to be used against  
government officials in Afghanistan. This raises some interesting  
questions—is the NSA stockpiling 0-day vulnerabilities? Is it doing any  
reporting of 0-days to the affected companies? How does NSA decide whether or  
for how long to stockpile such knowledge? EFF filed a lawsuit last year  
demanding that the NSA answer these questions.


Another important question was promptly raised in the press: given that the  
Equation Group's software can infect a broad range of hard drives, replacing  
their firmware with maliciously customized versions, did the hard drive  
companies collaborate with governments to develop this firmware? Based on the  
information we have now, it's hard to draw a reliable conclusion one way or  
the other. A Kaspersky researcher claimed that there is “no way that hard  
drive firmware could be reverse engineered using public information.” Yet  
at least two published projects from years past have demonstrated otherwise:  
a team of researchers in 2013 created a full-fledged hard drive firmware  
backdoor akin to that used by Equation Group, using only publicly available  
information and reverse engineering; and that same year an individual  
researcher achieved a comparable level of 

Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers

2015-03-06 Thread davidvargas1


updates


(Reuters) - The U.S. National Security Agency has figured out how to hide  
spying software deep within hard drives made by Western Digital, Seagate,  
Toshiba and other top manufacturers, giving the agency the means to eavesdrop  
on the majority of the world's computers, according to cyber researchers and  
former operatives.


That long-sought and closely guarded ability was part of a cluster of spying  
programs discovered by Kaspersky Lab, the Moscow-based security software  
maker that has exposed a series of Western cyberespionage operations.


Kaspersky said it found personal computers in 30 countries infected with one  
or more of the spying programs, with the most infections seen in Iran,  
followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and  
Algeria. The targets included government and military institutions,  
telecommunication companies, banks, energy companies, nuclear researchers,  
media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0)


The firm declined to publicly name the country behind the spying campaign,  
but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was  
used to attack Iran's uranium enrichment facility. The NSA is the agency  
responsible for gathering electronic intelligence on behalf of the United  
States.


A former NSA employee told Reuters that Kaspersky's analysis was correct, and  
that people still in the intelligence agency valued these spying programs as  
highly as Stuxnet. Another former intelligence operative confirmed that the  
NSA had developed the prized technique of concealing spyware in hard drives,  
but said he did not know which spy efforts relied on it.


NSA spokeswoman Vanee Vines declined to comment.

Kaspersky published the technical details of its research on Monday, which  
should help infected institutions detect the spying programs, some of which  
trace back as far as 2001.


The disclosure could further hurt the NSA's surveillance abilities, already  
damaged by massive leaks by former contractor Edward Snowden. Snowden's  
revelations have hurt the United States' relations with some allies and  
slowed the sales of U.S. technology products abroad.


The exposure of these new spying tools could lead to greater backlash against  
Western technology, particularly in countries such as China, which is already  
drafting regulations that would require most bank technology suppliers to  
proffer copies of their software code for inspection.


Peter Swire, one of five members of U.S. President Barack Obama's Review  
Group on Intelligence and Communications Technology, said the Kaspersky  
report showed that it is essential for the country to consider the possible  
impact on trade and diplomatic relations before deciding to use its knowledge  
of software flaws for intelligence gathering.


There can be serious negative effects on other U.S. interests, Swire said.

TECHNOLOGICAL BREAKTHROUGH

According to Kaspersky, the spies made a technological breakthrough by  
figuring out how to lodge malicious software in the obscure code called  
firmware that launches every time a computer is turned on.


Disk drive firmware is viewed by spies and cybersecurity experts as the  
second-most valuable real estate on a PC for a hacker, second only to the  
BIOS code invoked automatically as a computer boots up.


The hardware will be able to infect the computer over and over, lead  
Kaspersky researcher Costin Raiu said in an interview.


Though the leaders of the still-active espionage campaign could have taken  
control of thousands of PCs, giving them the ability to steal files or  
eavesdrop on anything they wanted, the spies were selective and only  
established full remote control over machines belonging to the most desirable  
foreign targets, according to Raiu. He said Kaspersky found only a few  
especially high-value computers with the hard-drive infections.


Kaspersky's reconstructions of the spying programs show that they could work  
in disk drives sold by more than a dozen companies, comprising essentially  
the entire market. They include Western Digital Corp, Seagate Technology Plc,  
Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.


Western Digital, Seagate and Micron said they had no knowledge of these  
spying programs. Toshiba and Samsung declined to comment. IBM did not respond  
to requests for comment.


GETTING THE SOURCE CODE

Raiu said the authors of the spying programs must have had access to the  
proprietary source code that directs the actions of the hard drives. That  
code can serve as a roadmap to vulnerabilities, allowing those who study it  
to launch attacks much more easily.


There is zero chance that someone could rewrite the [hard drive] operating  
system using public information, Raiu said.


Concerns about access to source code flared after a series of high-profile  
cyberattacks on Google Inc and other U.S. companies in 2009 

[Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread cinnamon
Hi I Want to migrate to trisquel from ubuntu, could someone help me with  
this?


Also, is Trisquel now still based off of ubuntu?

Does this work without a  trisquel counterpart?

https://trisquel.info/en/wiki/migrate-ubuntu-trisquel-without-reinstalling


[Trisquel-users] Antwort: Gitorious is dead - acquired by GitLab

2015-03-06 Thread tobias
The software running on the server is nonfree, but there is still the  
possibility to host your own server using free software. First I cloned all  
my repositories to my own laptop using a python script that automates the  
cloning of many repositories. In the long term a decentralized git hosting is  
needed, some kind of gittorrent sync. Maybe using gnunet and psyc.


Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread danigaritarojas

What part of

Just ignore the troll.

you don't understand?

This only gives him more reasons to keep posting off-topic messages.


Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread cinnamon

I am using Ubuntu 14.10 what variables would I change in the script?

and will it not work because 14.04 is the counterpart unless i downgrade


Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers

2015-03-06 Thread davidvargas1

old news but it is real.

 SPIEGEL ONLINE
12/29/2013 09:19 AM
Shopping for Spy Gear
Catalog Advertises NSA Toolbox

By Jacob Appelbaum, Judith Horchert and Christian Stöcker

After years of speculation that electronics can be accessed by intelligence  
agencies through a back door, an internal NSA catalog reveals that such  
methods already exist for numerous end-user devices.


Editor's note: This article accompanies our main feature story on the NSA's  
Tailored Access Operations unit. You can read it here.


When it comes to modern firewalls for corporate computer networks, the  
world's second largest network equipment manufacturer doesn't skimp on  
praising its own work. According to Juniper Networks' online PR copy, the  
company's products are ideal for protecting large companies and computing  
centers from unwanted access from outside. They claim the performance of the  
company's special computers is unmatched and their firewalls are the  
best-in-class. Despite these assurances, though, there is one attacker none  
of these products can fend off -- the United States' National Security  
Agency.


Specialists at the intelligence organization succeeded years ago in  
penetrating the company's digital firewalls. A document viewed by SPIEGEL  
resembling a product catalog reveals that an NSA division called ANT has  
burrowed its way into nearly all the security architecture made by the major  
players in the industry -- including American global market leader Cisco and  
its Chinese competitor Huawei, but also producers of mass-market goods, such  
as US computer-maker Dell.


A 50-Page Catalog

These NSA agents, who specialize in secret back doors, are able to keep an  
eye on all levels of our digital lives -- from computing centers to  
individual computers, and from laptops to mobile phones. For nearly every  
lock, ANT seems to have a key in its toolbox. And no matter what walls  
companies erect, the NSA's specialists seem already to have gotten past them.


This, at least, is the impression gained from flipping through the 50-page  
document. The list reads like a mail-order catalog, one from which other NSA  
employees can order technologies from the ANT division for tapping their  
targets' data. The catalog even lists the prices for these electronic  
break-in tools, with costs ranging from free to $250,000.


In the case of Juniper, the name of this particular digital lock pick is  
FEEDTROUGH. This malware burrows into Juniper firewalls and makes it  
possible to smuggle other NSA programs into mainframe computers. Thanks to  
FEEDTROUGH, these implants can, by design, even survive across reboots and  
software upgrades. In this way, US government spies can secure themselves a  
permanent presence in computer networks. The catalog states that FEEDTROUGH  
has been deployed on many target platforms.


Master Carpenters

The specialists at ANT, which presumably stands for Advanced or Access  
Network Technology, could be described as master carpenters for the NSA's  
department for Tailored Access Operations (TAO). In cases where TAO's usual  
hacking and data-skimming methods don't suffice, ANT workers step in with  
their special tools, penetrating networking equipment, monitoring mobile  
phones and computers and diverting or even modifying data. Such implants,  
as they are referred to in NSA parlance, have played a considerable role in  
the intelligence agency's ability to establish a global covert network that  
operates alongside the Internet.


Some of the equipment available is quite inexpensive. A rigged monitor cable  
that allows TAO personnel to see what is displayed on the targeted monitor,  
for example, is available for just $30. But an active GSM base station -- a  
tool that makes it possible to mimic a mobile phone tower and thus monitor  
cell phones -- costs a full $40,000. Computer bugging devices disguised as  
normal USB plugs, capable of sending and receiving data via radio undetected,  
are available in packs of 50 for over $1 million.


'Persistence'

The ANT division doesn't just manufacture surveillance hardware. It also  
develops software for special tasks. The ANT developers have a clear  
preference for planting their malicious code in so-called BIOS, software  
located on a computer's motherboard that is the first thing to load when a  
computer is turned on.


This has a number of valuable advantages: an infected PC or server appears to  
be functioning normally, so the infection remains invisible to virus  
protection and other security programs. And even if the hard drive of an  
infected computer has been completely erased and a new operating system is  
installed, the ANT malware can continue to function and ensures that new  
spyware can once again be loaded onto what is presumed to be a clean  
computer. The ANT developers call this Persistence and believe this  
approach has provided them with the possibility of permanent access.


Another 

Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread cinnamon

so thats a total conversion to trisquel?




Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread cinnamon

Thanks! wish me luck


Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread maestro
Hi! welcome! fresh install is always the best thing to do if you have time  
and patience.
that being said, the answers are yes and yes. BACKUP your data before running  
the script!!!

cheers!


Re: [Trisquel-users] offline encrypted address book

2015-03-06 Thread maestro

well said!


Re: [Trisquel-users] Migrate from Ubuntu to Trisquel

2015-03-06 Thread onpon4
If it works, it will break your system and/or put it at risk. You'll end up  
with newer versions of packages than will ever be in the Trisquel repo  
(preventing you from getting security updates), dependencies will be broken,  
etc. As the wiki page mentions, you should only use that script on a system  
that actually has a Trisquel counterpart (so, the LTS releases; 12.04 for  
Trisquel 6, 14.04 for Trisquel 7).


Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers

2015-03-06 Thread lovexdrew
So until the  OpenSSD people finish their work, what can we do about this?  
What can be done to stop these things until then?


Re: [Trisquel-users] I'm getting pops from my speakers every I start an application that uses sound on my Libreboot X60.

2015-03-06 Thread amenex
Chances are that there is a DC offset in the amp that drives the speakers, so  
that the speaker coils get yanked one way or the other when the amp gets  
turned on. In the old days there was a zero offset pot. Nowadays one thing to  
try is to repeatedly plug 'em in and out to clean up the dirty contacts. If  
the speakers are accessible, a high pass filter network could be used - a  
non-polarized capacitor and a resistor to ground on each speaker so no DC can  
pass through the coils.


Re: [Trisquel-users] I'm getting pops from my speakers every I start an application that uses sound on my Libreboot X60.

2015-03-06 Thread lovexdrew

I'll try this and come back!


Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers

2015-03-06 Thread davidvargas1

northernarcher

Excellent question! Stay libre, be libre, eat libre, have sex with  
protection, respect the law. know your constitutional laws and what they  
stand for. Read libre, breath libre and run libre.


 I will tell you tomorrow, right know I'm beat!!


Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread adw . email
So what are the basic steps to install W7, XP and Trisquel without a problem  
with Grub that usually causes a boot problem. Windows versions are no longer  
available. 


Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)

2015-03-06 Thread gnufreeme

Chris:

Will the chip require linking with someone outside to work at all or is it  
just available for some shadow agency to access?


Can we just buy the desktop version and put it into a foil or lead-lined  
tower?  I'll not wear the hat, though.  :-)


[Trisquel-users] Re : Installing Trisquel: Boot and wXP and w7

2015-03-06 Thread lcerf

The best answer is:

Destroy the Windows installation media;
Install Trisquel taking the whole disk


If you insist on having evil operating systems on your computer, try  
installing Trisquel last. The problem is Windows not tolerating GRUB.