tech

  • 2 weeks to Document Freedom Day

    logo for Document Freedom Day 2014Document Freedom Day is a day for celebrating and raising awareness of open standards and formats; it takes place on the last Wednesday in March each year. On this day people who believe in fair access to communications technology teach, perform and demonstrate.

    Document freedom means documents that are free can be used in any way that the author intends. They can be read, transmitted, edited, and transformed using a variety of tools. Documents that aren’t free – like Microsoft Office’s .docx, .xlsx, .pptx, etc. – are locked to some particular software or company. Their author cannot choose how to use them because they are controlled by technical restrictions. This is akin to having a racehorse and never letting get above a trot.

    However, document freedom is about more than spreadsheets, presentations and word processing documents. Document freedom embraces all forms of data, including artwork, sheet and recorded music, emails and statistics. These can all be stored in ways which empower users, but they can also be stored in formats which constrain and manipulate us at enormous cost.

    Open standards are formats which everybody can use free of charge and restriction. They come with compatibility “built-in” – the way they work is shared publicly and any organisation can use them in their products and services without asking for permission. Open Standards are the foundation of cooperation and modern society. Today we celebrate the 25th anniversary of the world wide web – a vital resource that relies on open standards to work. Read more on open standards.

    You can get involved in Document Freedom Day by organising local activities, distributing fliers, adding a banner on your blog, donating money, and much more. See the Document Freedom Day site for more ideas and information.

  • Applications open for new round of Gnome OPW internships

    OPW logoThe Gnome Outreach Program* for Women (OPW) helps women get involved in free and open source software and has just announced the opening of a new round of internship applications. Women can apply for an internship to contribute to an open source project from May to August; and OPW is not just asking for applications from programmers.

    Successful applicants can obtain a Gnome Foundation internship from 19th May until 18th August 2014 under the aegis of the OPW. The outreach programme is intended to increase the proportion of women in open source projects and twice a year promotes the contribution of women to projects such as Gnome, Wikimedia and OpenStack. The deadline for applications for the next round is 19th May 2014.

    As previously stated, the programme is not restricted to women with programming skills; those with design, documentation or marketing skills can also apply. All participants will be supported by a mentor in the participating organisations. Details on how to apply are on the Gnome Foundation’s dedicated OPW site.

    * = It’s an American institution, hence the US spelling.

  • Powerful virus targets Ukraine

    malware symbolFrance’s Le Monde reports that a very powerful computer virus has infected computers in Ukraine, where 22 instances of infection has been recorded since 2013, the year that country’s political crisis started, according to a report from BAE Systems.

    This virus, baptised Snake, but also known as Ouroboros after the serpent in Greek mythology, is “one of the most sophisticated and persistent threats that we track,” states BAE Systems Applied Intelligence, in a report published on Friday, 7th March.

    Although it appeared as early as 2006, Snake appears to have been deployed more aggressively since 2013, according to the same source: of the 56 instances identified since 2010 throughout the world, 44 have been recorded since last year. Ukraine is the main target with 22 instances since 2013, of which 14 alone have been confirmed since the start of 2014 when that country’s political crisis accelerated with the fall of its pro-Russian president at the end of February.

    Lithuania, Britain and Georgia are amongst the other countries where Snake has also shown up.

    Snake’s operators act on weekdays and operate mainly from a time zone corresponding to Moscow, BAE Systems states. “Our report shows that a technically sophisticated and well-organised group has been developing and using these tools for the last eight years,” said David Garfield, the managing director of cyber security at BAE Systems Applied Intelligence.

    “There is some evidence that links these tools to previous breaches connected to Russian threat actors but it is not possible to say exactly who is behind this campaign.”

    Snake’s controllers can access all of the computer systems they have infiltrated, in addition to which the virus’ capacity to hibernate by remaining completely inactive for many days makes its detection complex.

    According to Saturday’s Financial Times (paywall), the virus has in particular infiltrated the Kiev government’s computer systems and those of major Ukrainian organisations.

  • Tor network used to hide botnets and darknets

    According to IT security vendors Kaspersky Lab, the Tor anonymity network is under threat of being swamped by criminals abusing the anonymity it provides for hiding zombie networks, malicious command and control servers and ‘darknets’, Le Monde Informatique reports.

    How to works diagram

    Tor – otherwise known as The Onion Router – has always had its dark side, but last year the network’s use by criminals seems to have grown appreciably. According to researcher Sergey Lozhkin, “Kaspersky Lab had uncovered evidence of 900 services using Tor, equivalent to 5,500 nodes (server relays) and 1,000 exit nodes (servers from which traffic emerges) in total.”

    “It all started from the notorious Silk Road market and evolved into dozens of specialist markets: drugs, arms and, of course, malware.

    “Carding shops are firmly established in the Darknet. Stolen personal info is for sale with a wide variety of search attributes like country, bank, etc. Offers for customers of this kind are not limited to credit cards. Dumps, skimmers and carding equipment are for sale too”, he added.

    “In addition, command and control (C&C) servers hosted by Tor are more difficult to flush out, blacklist or eliminate,” Lozhkin continued. “Although creating a Tor communication module within a malware sample means extra work for the malware developers. We expect there will be a rise in new Tor-based malware, as well as Tor support for existing malware.”

    Experts from Kaspersky Lab have so far found Zeus with Tor capabilities and then detected ChewBacca and finally analysed the first Tor Trojan for Android.

  • Addio XP

    It’s not just the Bristol & Bath Linux User Group (LUG) that’s organising an event to mark the end support for Microsoft’s superannuated Windows XP operating system (posts passim).

    In Italy a consortium of the Perugia GNU/Linux User Group, LibreUmbria, the Perugia Centro di Competenza Open Source and Girl Geek Life is also organising a half-day event to inform people that they don’t need to buy a new computer to have a modern, secure operating system again; all that’s needed is a change to a free and open source Linux operating system and its vast range of software.

    publicity for Perugia GNU/LUG's XP event
    Addio XP, ciao software libero!

    The Perugia event takes place at Perugia University on Saturday, 5th April 2014 from 9.00 am to 1.00 pm. Full details can be found at http://xpaddio.perugiagnulug.org/.

    Windows XP Zombie Edition
    Install Linux: don’t end up with an operating system that should died years ago!

    Support for XP (and MS Office 2003 too. Ed.) ends on 8th April 2014.

  • Upgrading Debian from stable to testing

    Debian logoI’ve been using Debian GNU/Linux for many years and have been very pleased with its stability, reliability and security.

    Yesterday I decided to do something I’ve never done before: upgrade a production machine from Debian stable (codename ‘wheezy’) to Debian testing (codename ‘jessie’). See this guide for an explanation of Debian versions and releases.

    Anyway, after installing the apt-listbugs package which a Bristol Wireless colleague recommended, I then proceeded with the upgrade via the command line.

    The sequence of commands to perform the upgrade itself is very easy.

    # cp /etc/apt/sources.list{,.bak}
    # sed -i -e ‘s/ \(stable\|wheezy\)/ testing/ig’ /etc/apt/sources.list
    # apt-get update
    # apt-get –download-only dist-upgrade
    # apt-get dist-upgrade

    The first command backs up the software sources list, whilst the second edits the sources list to replace release versions. After that, the actual fun begins, downloading updated package information, downloading the packages themselves and then installing them.

    All told, it went very smoothly. The laptop rebooted normally after the upgrade and brought up the GUI. The only major problem was that I lost the functionality of the Broadcom wireless network card; this was resolved by reinstalling the card’s firmware – a 2 minute job. The upgrade also resulted in 2 packages being broken. The command (as root) for fixing this problem is apt-get -f install.

    In total, the upgrade took about 2 hours and I now have a machine running a more modern version of Debian on the same machine and have kept all my previous personal settings, which is a definite plus compared with a clean install where one has to spend hours reinstalling software packages not included in the ISO disc image and tweaking.

  • LibreUmbria taking free software into schools

    LibreUmbria free software in schools promotional flyerThe first of three free seminars organised by LibreUmbria – the organisation promoting free and open source software in Italy’s Umbria region – aimed at parents and teachers is being organised at the Giovanni Cena primary school in Perugia at 3.30 pm on Monday 10th March, the LibreUmbria blog reports.

    For some months the LibreUmbria working group has been making contact with a number of Umbrian schools in order to take free software into classrooms. They wish to start with primary schools where it is easy to raise children on open source (and there’s some great free and open source education software available at primary level. Ed). LibreUmbria’s wave of training is being heralded in with the arrival of spring thanks to collaboration with Perugia’s Terzo Circolo Didattico, which helped get this LibreUmbria experiment off the ground.

    The LibreUmbria@Scuola programme will include three seminars on the subjects of awareness, freedom and security. Each word will address one aspect of new technology and open up a debate with attendees.

    The seminars will be followed by two courses on the LibreOffice productivity suite in multimedia classrooms: one aimed at parents and another at teachers, who will in turn act as mentors and recommend them to colleagues and then to children in accordance with the cascade training approach.

    Just to emphasize the need for a digital culture that generates awareness, the title of the events being arranged by LibreUmbria is “Digital natives do not exist”. That awareness is currently lacking and there are as yet no “natives”.

  • Canaries save money with open source

    Canary Islands coat of armsCanary Islands news site La Provincia reports that the autonomous government of the Canaries is saving €400,000 per year by backing the use of free and open source operating systems and software and avoiding paying licences to multinational companies for the use of programs and their updates. Apparently the autonomous government annual IT costs have reduced from €1,006,500 to €750,000. Roberto Moreno, the general director for telecommunications and new technologies explains that the migration from proprietary to free and open source software means the government is ridding itself of dependency on one vendor because, in this case “the owner is the one who buys it and can make the changes and modifications needed with his own resources and personnel, which is always much cheaper” than being beholden to an outside company.

    Moreno, who is a professor of Computer Science and Artificial Intelligence at the University of Las Palmas de Gran Canaria (ULPGC), states that the objective is shown by the current legislature’s wishes to introduce these changes to reduce expenditure, given the current economic crisis and the lack of funds in the region’s coffers.

    The next step planned by the Canaries government is to replace the ubiquitous MS Office suite currently used with a free and open source alternative, which is most likely to be Apache OpenOffice. That change will involve some 30,000 desktops and will save the public purse a fair few euros more.

  • Cabinet Office’s open standards consultation extended

    Cabinet Office logoThe Cabinet Office’s consultation on open standards for document exchange with government departments (posts passim), which was due to end yesterday, 26th February 2014, has now been extended until 5.00 pm on Friday, 28th February 2014.

    According to a Cabinet Office spokesman, the reason for the extension is as follows:

    This is because the Standards Hub server went down last night at about 10pm, as a result of which some people were unable to submit their comments to the proposals.

    The file formats being proposed as standards by the Cabinet Office are:

    • HTML (4.01 or higher, e.g. HTML5);
    • ODF 1.1 (or higher, e.g. ODF 1.2);
    • Plain text (TXT); and
    • Comma-separated values (CSV).

    So far it would appear that most respondents to the consultation are supporting this welcome move to openness by the UK government and Microsoft’s shills are thin on the ground.

    Comment on the consultation.

Posts navigation