background preloader

Software

Facebook Twitter

EasyLife | Fedora software management tool. Receta para evitar el espionaje: software libre y cifrado. A no ser que acabes de salir de una cueva, tienes que saber si o si qué es PRISM, el programa de ciberespionaje masivo que estaría llevando a cabo la Agencia Nacional de Seguridad estadounidense (NSA por sus siglas en inglés) en colaboración con las principales tecnológicas patrias. Eso es al menos a lo que apuntan todos los indicios, ya que tanto Google, Microsoft, Facebook, Apple y el resto de firmas involucradas niegan tajantemente tal participación. De hecho, Google ha pedido al FBI “tirar de la manta” para que se aclare todo, y es que el daño a la imagen de la compañía es evidente.

Sin embargo, no vamos a entrar ahora a valorar la situación, ni mucho menos a volver a contarla, pues a buen seguro que estáis saturados de información sobre este tema. Así, a lo que se reduce esta entrada es a un alegato a favor del software libre como única herramienta de confianza para con el ciudadano frente a los abusos del poder (abusos “cibernéticos”, claro). ISODisk, free software for mount and create ISO disk image. BitTorrent Sync 2.0, sincronización segura de archivos sin nube. Disponible LibreOffice 5, más potente que nunca. Los lenguajes de programación abiertos copan GitHub. Los responsables de la forja de software más popular del momento han publicado una gráfica que muestra las tendencias en cuanto a los lenguajes de programación utilizados.

Una gráfica que contempla desde el lanzamiento del sitio en 2008 hasta este 2015 y cuyo denominador común es el Open Source. Como se sabe, GitHub se basa en el software de control de versiones Git, creado por Linus Torvalds para gestionar mejor las actualizaciones del kernel Linux y extendido al mundo en forma de plataforma para desarrolladores que triunfa como ninguna otra: en 2010 ya albergaba mas de un millón de proyectos, en 2013 superó los diez millones y el pasado junio la compañía salía a buscar financiación con una valoración de mercado de 2.000 millones de dólares.

Una buena estampa de cómo ha discurrido el mundillo de la programación en los últimos tiempos. ¿Qué tal se comporta realmente Btrfs? Released darktable 1.6.8. We are happy to announce that darktable 1.6.8 has been released. The release notes and relevant downloads can be found attached to this git tag: Please only use our provided packages ("darktable-1.6.8.

*" tar.xz and dmg) not the auto-created tarballs from github ("Source code", zip and tar.gz). The latter are just git snapshots and will not work! Here are the direct links to tar.xz and dmg: this is a point release in the stable series. the sha256sum is sha256sum darktable-1.6.8.tar.xz b676f81bd8cc661a8f76e03ad449da4444f770b6bec3e9accf013c636f690905 sha256sum darktable-1.6.8.dmg ec4b1ad797ea7a483d7fc94724de99a1d18da7d7f75071220e1d313e0a4d8a53 and as always, please don't use the tarballs provided by github (marked as "Source code"). Docker knows how to win over developers and sysadmins. The use of Docker as an application container management system has become standard practice for developers and systems engineers in the space of just two years. Some like to say that haven’t seen such a technological advance since OpenSSH. Docker is now a major player and is widely used in cloud systems architectures.

But more than just that: Docker knows how to win developers over. Let's take a look at an overview of what we’ve done with Docker, as well as an assessment of the future and of the competition that is appearing on the horizon. So what is Docker again? Docker is a microcontainer management tool that uses libcontainer. Developed in Go by Solomon Hykes, Docker became open source in 2013 and was quickly adopted by key accounts. Before its arrival, creating an application container required a mastery of relatively advanced concepts. Let’s be clear: Docker is not a replacement for LXC, OpenVZ or Xen.

Today, Docker is flooding the IT world. But competition is coming! Cloud scaling. 5 videos to help you learn about Docker. When you're interested in learning a new technology, sometimes the best way is to watch it in action—or at the very least, to have someone explain it one-on-one. Unfortunately, we don't all have a personal technology coach for every new thing out there, so we turn to the next best thing: a great video. With that in mind, if you're interested in Docker (and these days, who isn't?) , here are five great videos to get you started with the basics you should know. First up, if you've only got five minutes (well, technically seven and a half), watch this.

At Opensource.com's lightning talk series last fall, Docker contributor Vincent Batts of Red Hat gave a great overview of what Docker is, what containers are, and how these technologies are changing the way system administrators and developers are working together to deploy applications in a modern datacenter. Now, you understand the concept, so let's take a slightly deeper dive. Got it? That's it. Success of Vagrant, Docker, and Ansible. The complexity of application stacks keeps going up. Way, way up. Application stacks have always been complicated, but never like this. There are so many services, so many tools, so much more compute power available, so many new techniques to try, and always the desire, and the pressure, to solve problems in newer and cooler and more elegant ways.

With so many toys to play with, and more coming every day, the toy chest struggles to contain them all. If you're not familiar with stackshare.io, have a look at it. It's a great resource to see which pieces companies are using to build their applications. Spend a few minutes browsing through some of the stacks out there and you'll see that some of the technology collections people have assembled are fascinating. So that's web server, web application server, caching proxy server, discovery service, a few services-as-a-service, and six "databases" of various flavors and functions. It's often said that DevOps, at its heart, is a conversation. View the installed drivers list on Windows operating system. Description InstalledDriversList is a simple tool for Windows that lists all device drivers that are currently installed on your system.

For every device driver, the following information is displayed: Driver Name, Display Name, Description, Startup Type, Driver type, Driver Group, Filename, File Size, Modified/Created Time of the driver file, and version information of the driver file. If the driver is currently running on Windows kernel, the following information is also displayed: Base Memory Address, End Address, Memory Size, and Load Count. System Requirements This utility works on any version of Windows, starting from Windows 2000 and up to Windows 10. On 64-bit systems, you must use the 64-bit version of InstalledDriversList. Versions History Version 1.05: Added 'Open In RegEdit' option, which opens the Registry key of the driver in RegEdit. Start Using InstalledDriversList InstalledDriversList doesn't require any installation process or additional dll files.

Command-Line Options. Disponible darktable 1.6.8. Desde hace unos días tenemos con nosotros darktable 1.6.8, la última edición de este software especializado en el procesamiento y gestión de imágenes digitales, que se encuentra disponible en sistemas GNU/Linux, Solaris y Mac OS X, como excelente alternativa a opciones privativas tipo Lightroom. Darktable destaca por su capacidad a la hora de hacer procesado RAW y trabajo de edición no destructiva del archivo original, lo que le convierte en una especie de cuarto oscuro de fotografía digital.

Además es un eficaz organizador de colecciones, incluye soporte para disparar y controlar cámaras digitales y al tener carácter modular se pueden ampliar sus capacidades de corrección o efectos digitales. Darktable 1.6.8 es capaz de extraer información sobre el modelo de lente desde un archivo xmp y mejora el soporte de varios modelos de cámaras a la hora de decodificar imágenes en formato RAW: También nuevas matrices de color para modelos: Preajustes de balance de blancos en cámaras: Debian openSUSE. Distros de seguridad [Aporte] : Seguridad. Virtual Appliances Quick Start Guide - Bitnami documentation. Bitnami Virtual Machine Images, also known as virtual appliances, contain a minimal Linux operating system and a fully installed and configured Bitnami application Stack. This allows you to run the application without actually installing it on your computer’s operating system. Using a virtualization platform, you can simply start and stop the Bitnami Virtual Machine Image whenever you want to use the application.

This allows you to keep it completely isolated from software installed on your machine. After you download and extract a Bitnami Virtual Machine Image (the file is compressed to reduce the download size), it will be ready to be deployed in your virtualization infrastructure. If you don’t already have a virtualization platform, or ‘hypervisor’, installed, you can download either VMware Player or VirtualBox free of charge. Once you have one installed, you’ll be able to run a Bitnami Virtual Machine Image.

How to start your Bitnami Virtual Appliance? VMware ESX or ESXi Virtual Box. How to Find The Best Wi-Fi Channel For Your Router on Any Operating System. Choosing the best Wi-Fi channel on your router helps to reduce interference and improve your WI-Fi signal. These tools will help you identify the least congested Wi-Fi channel in your area. Wi-Fi channels overlap with nearby channels. Channels 1, 6, and 11 are the most frequently used for 2.4 GHz Wi-Fi. These three channels are the only ones that don’t overlap with each other. Android – Wifi Analyzer The easiest-to-use application we’ve found for this is Wifi Analyzer on Android.

Tap the View menu and select Channel rating. iOS – Jailbreakers Only This isn’t possible on iPhones and iPads. If you jailbreak, you can install an app like WiFi Explorer or WiFiFoFum from Cydia to get this functionality on your iPhone or iPad. You probably wouldn’t want to go through the trouble of jailbreaking just for this, so use one of the other tools here instead. Windows – NirSoft WifiInfoView We previously recommended inSSIDer for this on Windows, but it’s become paid software. Linux – The iwlist Command. How to Access FTP and WebDAV Sites in Any Operating System’s File Manager. You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box. You can also access files stored on servers using the NFS, Windows file sharing (SMB), and SSH protocols. Different operating systems support different protocols.

Windows Windows Explorer has built-in FTP support — in fact, this was the centerpiece of our guide to downloading Firefox without ever opening Internet Explorer on a new Windows installation. To access a remote server, you can simply plug its address into the location box using the appropriate protocol. If a username or password is necessary, you’ll be asked for it and you can provide it when prompted. You can also use the Add a Network Location wizard for this. The wizard shows you how to properly enter the path to a WebDAV server, FTP site, or Windows network share. Mac OS X You can do this directly from the Finder on a Mac. Linux. Nginx - Bitnami documentation. NGinx is a free, open-source, high-performance HTTP server and reverse proxy, as well as an IMAP/POP3 proxy server.

Currently Ruby Stack includes this server already configured. Quick reference card How to start the Nginx server? You can find the Nginx server in your installation directory. If you are using the Virtual Machine or the Cloud Image check the /opt/bitnami folder. This server is disabled by default. If you want to start it, you can simply rename the "ctl.sh.disabled" script: $ cd installdir $ mv nginx/scripts/ctl.sh.disabled nginx/scripts/ctl.sh By default, Nginx will be started at the 1234 port. How to configure Nginx? The default configuration file for Nginx is the installdir/nginx/conf/nginx.conf file. Listen 1234; Nginx was compiled to include most popular extensions: compression options, Passenger module for Ruby applications and PageSpeed module.

How to debug errors? Check the exact error in the Nginx log file: "installdir/nginx/log/error.log". Mapping URLs to Filesystem Locations - Apache HTTP Server Version 2.2. This document explains how Apache uses the URL of a request to determine the filesystem location from which to serve a file. DocumentRoot In deciding what file to serve for a given request, Apache's default behavior is to take the URL-Path for the request (the part of the URL following the hostname and port) and add it to the end of the DocumentRoot specified in your configuration files.

Therefore, the files and directories underneath the DocumentRoot make up the basic document tree which will be visible from the web. For example, if DocumentRoot were set to /var/www/html then a request for would result in the file /var/www/html/fish/guppies.html being served to the requesting client. Apache is also capable of Virtual Hosting, where the server receives requests for more than one host. The DocumentRoot directive is set in your main server configuration file (httpd.conf) and, possibly, once per additional Virtual Host you create.

User Directories. Abuso de permisos: Caso Tigo Shop ¿Spyware de la telefónica? Hace un buen tiempo que estaba queriendo retomar el blog con artículos referentes a seguridad de la información, sobre todo con algunos sucesos de suplantación de identidad ocurridos la semana pasada (Mal llamado "hackeos" por la prensa) pero ese tema prefiero dejarlo para otro post debido a algo que surgió el día de ayer. Hace varios meses la telefónica Tigo lanzó una app de consulta y carga de saldo (Paquetes de sms, datos, etc...) llamada Tigo Shop la cual aparte ofrece beneficios por instalarla. Como muchos usuarios tampoco me fijé en los permisos que requería la app (Craso error), ya sea por desatento o por la confianza que uno suele tener tenía a una empresa conocida, y la instalé. Recientemente no se si por curiosidad o por costumbre revisé los permisos que pide Tigo Shop y encontré que pide mucho más de lo que realmente necesita para funcionar correctamente (Obs: Usé la app varios meses antes de percatarme de esto).

Conversando/denunciando con Tigo.