Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
i think his views are stupid but i will still wait for his reply
Re: [Trisquel-users] Reddit will be giving 10% of their ad revenue to charities based on user voting. Make sure you vote!
http://www.redditblog.com/2015/02/announcing-winners-of-reddit-donate.html
Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
i don’t think you should just ignore someone if you disagree with them you should challenge there views This only gives him more reasons to keep posting off-topic messages. this discussion should of been made in a off topic forum true
Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7
if you must have windows another option is to use a external hard-drive or usb stick to run trisquel and then keep the windows install on your hdd and then you just boot to the harddrive whenever you use windows
Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7
Thank you for your responses so far. Yes, you are right, I notice it too. It does that sort of thing deliberately. But I don't destroy a possession of mine, why it isn't evil and commonly used too. I think the manufacturer should be sued for this. Personally I wouldn't do this alone at this time but would find others for it first. Possibly that company would be undone of all profit it has ever made. Possibly a big debt and not even breaking even with the costs it had so far. I'm serious. If I choose the option: Install alongside Windows 7, where will it get harddisk space? Something was about that, that is why I ask. To keep this post simple, not too complicated I only ask where it gets harddisk space. If you are interested and ask I will say too why this is important.
Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7
I only ask where it gets harddisk space. If you are interested and ask I will say too why this is important. if you installed them along side each other then you could chose how much space each of them get from the hardrive
[Trisquel-users] Re : Installing Trisquel: Boot and wXP and w7
The installer automatically reduces the Windows partition to get some free space (where it creates its own partitions).
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
onpon is right - I didn't consider the possibility of you having the 14.10 version!! Don't do that - fresh install is required!
Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
I don't believe for a moment that chaosesqueteam actually believes men not being able to marry young girls (and women not being able to marry young boys, and women not being able to marry young girls, and men not being able to marry young boys) is some kind of conspiracy by women to enslave men. I've seen some pretty insane views, sure, but none as blatantly stupid as that. Support of a right to having sexual relations with children is something I'd believe to be genuine (it's probably the position of some people; I'm not sure). Belief in sexual relations with children being the norm which is actively suppressed by a conspiracy? No. He's just making stuff up hoping to get a response. That's what a troll is.
Re: [Trisquel-users] Gitorious is dead - acquired by GitLab
Thanks for the correction. That's good news.
Re: [Trisquel-users] free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
Broadcom BCM4313 802.11bgn Wireless Network Adapter Wireless First of all, some of the original drivers of that modem are not compatible to GNU-LINUX libre programs. The close drivers are proprietary, but the other Open drivers are under the GPL license, for everyone to download and study. but those GPL drivers will sometime, disable some of the functionality of the modem itself. Because the firmware demand the proprietary drivers own by the manufactures. When I encounter issues like this, the first step is, What are the GPL firmwares supporting this product? I'll be polite to you, but you need to do your homework first AND RESEARCH THEIR WEB SITE for the GPL drivers THEY ARE USING! and take it from there. Wrong web site to teach others How to flash firmwares. Why don't you buy a compatible Mini WIFI card from Think Penguin? I had purchased 1 mini PCI for my laptop and still working without issues so far.
Re: [Trisquel-users] Gitorious is dead - acquired by GitLab
hay I wonte make fork from GitLab to making it GPL. v3
[Trisquel-users] Re : free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
This adapter cannot be driven by free software only. You can replace it with hardware from ThinkPenguin or from Tehnoetic (the only two vendors I know that guarantee that Linux-libre can drive their hardware): http://libre.thinkpenguin.com http://tehnoetic.com You can also trust somebody who reports that she recently bought a Wifi adapter that works with Linux-libre. I bought several of this adpater in December and Linux-libre could drive them: http://www.tp-link.com/en/products/details/?categoryid=243model=TL-WN722N It is possible (maybe not probable) that the chipset on that adapter has been changed since then. The chipset is what matters... and it is never indicated on the package (so that the manufacturer can change it).
Re: [Trisquel-users] offline encrypted address book
Thanks for your answers guys, in the end I just used GNUmeric because: - The files are really small - The files are readable from any computer or mobile phone, in case of need - Easy to encrypt I just had to overcome the little learning process for some functions in GNUmeric, done that is perfect, so far.
Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
Because when women have rights life is much less fun. this is selfish just because you might have less fun is not a excuse for doing harm to others the idea that you must abuse others to have a happy life rely is wrong lots(i say lots as i cant know for certain about everyone) of pepole i know are perfectly happy without abusing others and they do good to others they don’t abuse them. what is your specific reason for believing women should not be equal to men? I hate feminism and feminists and am happy when they are killed. i am a feminist you would be happy if i were killed as i believe in equal rights for men and women? i highly disagree with your views but i would not be happy if you were dead.
[Trisquel-users] free drivers for Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
As n the topic, I tried to find it, but not luck. IF anyone knows of a free driver for: Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01) It's for the Gateway NV56R14u laptop (Intel Core i3-2328M, 64-bit).
Re: [Trisquel-users] offline encrypted address book
“mobile phones” are computers too. They just have a different form factor than desktop computers, usually use an ARM SoC instead of x86, and are among the worst offenders regarding how abuse their users' computing rights.
Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers
more updates from the Electronic Frontier Foundation Russian Researchers Uncover Sophisticated NSA Malware Defending your rights in the digital world February 19, 2015 | By Eva Galperin and Cooper Quintin Russian Researchers Uncover Sophisticated NSA Malware Over the weekend Russian IT security vendor Kaspersky Lab released a report about a new family of malware dubbed The Equation Family. The software appears, from Kaspersky's description, to be some of the most advanced malware ever seen. It is composed of several different pieces of software, which Kaspersky Lab reports work together and have been infecting computer users around the world for over a decade. It appears that specific techniques and exploits developed by the Equation Group were later used by the authors of Stuxnet, Flame, and Regin. The report alleges that the malware has significant commonalities with other programs that have been attributed to Western intelligence agencies; Reuters subsequently released an article about the report in which an anonymous former NSA employee claims that the malware was directly developed by the NSA. Among the most interesting and advanced features of the malware is its ability to compromise and rewrite hard drive firmware. Reprogramming the hard drive itself in this way is a deeper level of compromise than infecting an operating system, and can let the malware re-install itself from a hidden sector of the hard drive even if the drive is securely wiped and reformatted and the OS is reinstalled from scratch. Conventional wisdom about reinstalling operating systems in response to suspected infections may therefore not be enough for the victims of attacks like Equation's. Antivirus companies regularly try to improve their products by doing malware research—trying to find and analyze new malicious software in the wild. They are in a very good position to see the entire landscape of malicious software and attacks, which today increasingly includes government-sponsored malware. Some observers found it significant that Kaspersky—a Russian firm—was the only company to release a report about the Equation Group, Kaspersky's shorthand name for the anonymous authors of the malware. Many antivirus companies are based in, or have important business interests in, countries that develop government malware, such as the Five Eyes (the U.S., United Kingdom, Australia, New Zealand, and Canada), and these companies may come under pressure to conceal government malware. Having antivirus companies, security companies, and malware researchers in a variety of different jurisdictions is valuable in that they can collaborate on their research and resist this sort of pressure. The hard drive firmware capabilities of the Equation Group malware and code names that are described in the report match up closely with NSA capabilities and code names previously disclosed in Der Spiegel. That lends credibility to the hypothesis that Equation Group is part of or affiliated with the NSA, which would mark one of the first times that programs or capabilities exposed by journalists were specifically found in the wild. This is a very exciting development; it will be interesting to see if researchers continue to succeed in publicly documenting samples of other nation-state malware and attack tools whose existence has been reported or conjectured. The report also mentions that the Equation Group used several different 0-day exploits to spread their malware. Some of these exploits were later used by Stuxnet. One of the exploits used was originally used in the 2009 Aurora attack; it was later repurposed by the Equation Group to be used against government officials in Afghanistan. This raises some interesting questions—is the NSA stockpiling 0-day vulnerabilities? Is it doing any reporting of 0-days to the affected companies? How does NSA decide whether or for how long to stockpile such knowledge? EFF filed a lawsuit last year demanding that the NSA answer these questions. Another important question was promptly raised in the press: given that the Equation Group's software can infect a broad range of hard drives, replacing their firmware with maliciously customized versions, did the hard drive companies collaborate with governments to develop this firmware? Based on the information we have now, it's hard to draw a reliable conclusion one way or the other. A Kaspersky researcher claimed that there is “no way that hard drive firmware could be reverse engineered using public information.” Yet at least two published projects from years past have demonstrated otherwise: a team of researchers in 2013 created a full-fledged hard drive firmware backdoor akin to that used by Equation Group, using only publicly available information and reverse engineering; and that same year an individual researcher achieved a comparable level of
Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers
updates (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives. That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations. Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0) The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran's uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States. A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it. NSA spokeswoman Vanee Vines declined to comment. Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001. The disclosure could further hurt the NSA's surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden's revelations have hurt the United States' relations with some allies and slowed the sales of U.S. technology products abroad. The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China, which is already drafting regulations that would require most bank technology suppliers to proffer copies of their software code for inspection. Peter Swire, one of five members of U.S. President Barack Obama's Review Group on Intelligence and Communications Technology, said the Kaspersky report showed that it is essential for the country to consider the possible impact on trade and diplomatic relations before deciding to use its knowledge of software flaws for intelligence gathering. There can be serious negative effects on other U.S. interests, Swire said. TECHNOLOGICAL BREAKTHROUGH According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on. Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up. The hardware will be able to infect the computer over and over, lead Kaspersky researcher Costin Raiu said in an interview. Though the leaders of the still-active espionage campaign could have taken control of thousands of PCs, giving them the ability to steal files or eavesdrop on anything they wanted, the spies were selective and only established full remote control over machines belonging to the most desirable foreign targets, according to Raiu. He said Kaspersky found only a few especially high-value computers with the hard-drive infections. Kaspersky's reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd. Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment. GETTING THE SOURCE CODE Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily. There is zero chance that someone could rewrite the [hard drive] operating system using public information, Raiu said. Concerns about access to source code flared after a series of high-profile cyberattacks on Google Inc and other U.S. companies in 2009
[Trisquel-users] Migrate from Ubuntu to Trisquel
Hi I Want to migrate to trisquel from ubuntu, could someone help me with this? Also, is Trisquel now still based off of ubuntu? Does this work without a trisquel counterpart? https://trisquel.info/en/wiki/migrate-ubuntu-trisquel-without-reinstalling
[Trisquel-users] Antwort: Gitorious is dead - acquired by GitLab
The software running on the server is nonfree, but there is still the possibility to host your own server using free software. First I cloned all my repositories to my own laptop using a python script that automates the cloning of many repositories. In the long term a decentralized git hosting is needed, some kind of gittorrent sync. Maybe using gnunet and psyc.
Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
What part of Just ignore the troll. you don't understand? This only gives him more reasons to keep posting off-topic messages.
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
I am using Ubuntu 14.10 what variables would I change in the script? and will it not work because 14.04 is the counterpart unless i downgrade
Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers
old news but it is real. SPIEGEL ONLINE 12/29/2013 09:19 AM Shopping for Spy Gear Catalog Advertises NSA Toolbox By Jacob Appelbaum, Judith Horchert and Christian Stöcker After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Editor's note: This article accompanies our main feature story on the NSA's Tailored Access Operations unit. You can read it here. When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are ideal for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is unmatched and their firewalls are the best-in-class. Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency. Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell. A 50-Page Catalog These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is FEEDTROUGH. This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive across reboots and software upgrades. In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH has been deployed on many target platforms. Master Carpenters The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such implants, as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows TAO personnel to see what is displayed on the targeted monitor, for example, is available for just $30. But an active GSM base station -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million. 'Persistence' The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this Persistence and believe this approach has provided them with the possibility of permanent access. Another
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
so thats a total conversion to trisquel?
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
Thanks! wish me luck
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
Hi! welcome! fresh install is always the best thing to do if you have time and patience. that being said, the answers are yes and yes. BACKUP your data before running the script!!! cheers!
Re: [Trisquel-users] offline encrypted address book
well said!
Re: [Trisquel-users] Migrate from Ubuntu to Trisquel
If it works, it will break your system and/or put it at risk. You'll end up with newer versions of packages than will ever be in the Trisquel repo (preventing you from getting security updates), dependencies will be broken, etc. As the wiki page mentions, you should only use that script on a system that actually has a Trisquel counterpart (so, the LTS releases; 12.04 for Trisquel 6, 14.04 for Trisquel 7).
Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers
So until the OpenSSD people finish their work, what can we do about this? What can be done to stop these things until then?
Re: [Trisquel-users] I'm getting pops from my speakers every I start an application that uses sound on my Libreboot X60.
Chances are that there is a DC offset in the amp that drives the speakers, so that the speaker coils get yanked one way or the other when the amp gets turned on. In the old days there was a zero offset pot. Nowadays one thing to try is to repeatedly plug 'em in and out to clean up the dirty contacts. If the speakers are accessible, a high pass filter network could be used - a non-polarized capacitor and a resistor to ground on each speaker so no DC can pass through the coils.
Re: [Trisquel-users] I'm getting pops from my speakers every I start an application that uses sound on my Libreboot X60.
I'll try this and come back!
Re: [Trisquel-users] Spying software hidden deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers
northernarcher Excellent question! Stay libre, be libre, eat libre, have sex with protection, respect the law. know your constitutional laws and what they stand for. Read libre, breath libre and run libre. I will tell you tomorrow, right know I'm beat!!
Re: [Trisquel-users] Installing Trisquel: Boot and wXP and w7
So what are the basic steps to install W7, XP and Trisquel without a problem with Grub that usually causes a boot problem. Windows versions are no longer available.
Re: [Trisquel-users] 3G modems coming integrated with Next Gen Intel Atom (for real this time)
Chris: Will the chip require linking with someone outside to work at all or is it just available for some shadow agency to access? Can we just buy the desktop version and put it into a foil or lead-lined tower? I'll not wear the hat, though. :-)
[Trisquel-users] Re : Installing Trisquel: Boot and wXP and w7
The best answer is: Destroy the Windows installation media; Install Trisquel taking the whole disk If you insist on having evil operating systems on your computer, try installing Trisquel last. The problem is Windows not tolerating GRUB.