background preloader

Find Open Source Alternatives to commercial software

Find Open Source Alternatives to commercial software
Related:  open source

CodeProject - For those who code Free Software on the final frontier: GNU Radio controls the ISEE-3 Spacecraft The International Sun-Earth Explorer-3, or ISEE-3, was launched in 1978 by NASA to monitor activity on the sun. After three years of observation, NASA repurposed the satellite, which soon became the first spacecraft to visit a comet. The mission ended in 1999, when NASA abandoned ISEE-3 to orbit the Sun, despite the fact that twelve of the satellite's thirteen instruments were still working. In 2008, when it was discovered that the satellite was still transmitting a signal and would fly close to Earth, NASA realized that they no longer had the funding or equipment to reinitiate contact. To do this, the group turned to GNU Radio, a free software toolkit for implementing software-defined radios and signal processing systems. You can support GNU Radio by making a donation through the FSF's Working Together for Free Software Fund. The successes of the ISEE-3 Reboot project demonstrate the importance of developing, maintaining, and promoting free software.

As Technology Gets Better, Will Society Get Worse? - The New Yorker Imagine that two people are carving a six-foot slab of wood at the same time. One is using a hand-chisel, the other, a chainsaw. If you are interested in the future of that slab, whom would you watch? This chainsaw/chisel logic has led some to suggest that technological evolution is more important to humanity’s near future than biological evolution; nowadays, it is not the biological chisel but the technological chainsaw that is most quickly redefining what it means to be human. The devices we use change the way we live much faster than any contest among genes. Assuming that we really are evolving as we wear or inhabit more technological prosthetics—like ever-smarter phones, helpful glasses, and brainy cars—here’s the big question: Will that type of evolution take us in desirable directions, as we usually assume biological evolution does? Some, like the Wired founder Kevin Kelly, believe that the answer is a resounding “yes.” But, in the main, the Oji-Cree story is not a happy one.

Find Out How - Mac Basics CodePlex - Open Source Project Hosting TrueCrypt, the final release, archive   Yes . . . TrueCrypt is still safe to use. Google is generating a false-positive alert Recent attempts to download the TrueCrypt files here, using Chrome or Firefox (Mozilla uses Google's technology), have been generating false-positive malware infection warnings. They must be false-positives because no change has been made to the files since this page was put up nearly a year ago (May 29th, 2014) and many people have confirmed that the downloaded binaries have not changed and that their cryptographic hashes still match. Also, the well-known and respected “VirusTotal” site, which scans files through all virus scanners reports ZERO hits out of 57 separate virus scan tests: VirusTotal scan results. We have no idea where or why Google got the idea that there was anything wrong with these files. The mistake these developers made was in believing thatthey still “owned” TrueCrypt, and that it was theirs to kill. But that's not the way the Internet works. TrueCrypt's creators may well be correct.

Stanford researchers outsmart captcha codes (PhysOrg.com) -- Stanford researchers say that captcha security codes, asking Internet sign-up users to repeat a string of letters to prove the users are human, can be thwarted, and they have successfully defeated captcha at big name sites such as Visa, CNN, and eBay as proof. In fact, they found that thirteen out of 15 high-profile sites were vulnerable to automated attacks. Captcha stands for Completely Automated Public Turing Test to tell Computers and Humans Apart. This is a test that a Carnegie Mellon University computer science graduate student and his advisor created in 2000 as a security tool to safeguard web sites from automated bot attacks and spammers. Simply put, the test was supposed to be passable by humans, not machines. The researchers Elie Bursztein, a postdoctoral researcher at the Stanford Security Laboratory, Matthieu Martin, and John C. “As we substantiate by thorough study, many popular websites still rely on schemes that are vulnerable to automated attacks.

7 Things You Should Know About ... Campus-Wide IT 7 Things You Should Know About Information Security Metrics January 17, 2014 An information security metric is an ongoing collection of measurements to assess security performance , based on data collected from various sources . Information security metrics … 7 Things You Should Know About VDI June 24, 2011 Virtual desktop infrastructure (VDI) separates the operating system and applications from the client device, providing a model of desktop computing that is much more flexible and efficie… 7 Things You Should Know About IPv6 April 20, 2011 The rapid expansion in the use of the Internet, coupled with explosive growth in the number of devices that access it, has prompted development of a new protocol, IPv6. 7 Things You Should Know About Mobile App Development April 19, 2011 Users increasingly expect to be able to do virtually everything on a mobile device that they can do on a laptop (if not more ). 7 Things You Should Know About Mobile Security March 17, 2011 December 1, 2010 October 5, 2010

Welcome to Freecode – Freecode

Related: