Home Blog Page 9140

Ximian ships desktop productivity software packages

Author: JT Smith

Posted at Ximian: “Ximian, Inc., the leading open source
desktop company, today announced the availability of Ximian[tm] Desktop, a complete desktop productivity solution for Linux
and UNIX systems. Ximian Desktop includes Ximian GNOME, the intuitive graphical user interface for a broad range of
popular Linux distributions, and a full suite of Ximian and third-party applications to enhance productivity, speed
communication and simplify software management. Available for purchase from Ximian at www.ximian.com, the software is
offered in two versions, Ximian Desktop Standard Edition and Ximian Desktop Professional Edition.”

Ximian announces Red Carpet services

Author: JT Smith

Posted at Ximian: “Ximian, Inc., the leading
open source desktop company, today announced new Ximian[tm] Red Carpet[tm] services that simplify Linux and UNIX
software updating and management processes for companies, while providing a far-reaching distribution channel for software
vendors. The services include Red Carpet Express, which gives subscribers priority, high-bandwidth access to Internet
software downloads and Red Carpet CorporateConnect, which provides customers a centralized method for managing
software version control and installation on end-user systems. For software vendors, Ximian introduced the Red Carpet
Partner Program, which allows software vendors to create and manage channels to distribute their Linux or UNIX software.”

James Henstridge and libglade

Author: JT Smith

Perkypants.org interviews James Henstridge. Some background: “James is a long standing member of the GNOME community, contributing great software such as dia, gnorpm and
the much-loved GNOME and GTK+ Python bindings. He has also been dispensing sagely advice on #gnome
amongst all this hacking.

libglade is already being used in some of GNOME’s core applications and major projects such as Evolution and
Gnumeric.”

Category:

  • Linux

Fight the GNU/future

Author: JT Smith

Commentary from Linux.com: “The FSF needs Open
Source as an ally to defend the GPL against marketing attacks by Microsoft and its puppets, and Open
Source clearly needs the long-established GNU software base to continue the spectacular progress that its
relatively new projects have enjoyed. But at the end of the day, the harsh reality is that these two clans
are working with very different and conflicting objectives, and in time, as these groups mature and gain
strength, these differences only become more pronounced.”

Study shows developers save money using Embedded Linux

Author: JT Smith

Anonymous Reader writes “LinuxDevices.com reports that Venture Development Corp. polled 13,000 embedded developers and managers and concluded that developers are saving money by using Embedded Linux. Not a big surprise! Another interesting result of VDC’s study was that developers do not fear that taking advantage of open source software represents a threat to their intellectual property, contrary to what some companies claim ;)”

Category:

  • Linux

Product strips PDF files of nasty attachments, even for Linux systems

Author: JT Smith

By Grant Gross
Appligent Inc., a PDF-related applications provider, has released a free utility that protects some Linux and Unix users from PDF attachments, such as the recent Code Red worm.

Now, wait a second, wasn’t Code Red a plague on Windows servers? Yes, but Appligent’s utility makes more sense when you think about all the companies that use Linux or Unix mail servers in back of desktop networks that run other operating systems, says Mark Gavin, CTO of the Lansdowne, Pa., company.

Appligent’s APStripFiles for Red Hat Linux, AIX, HP-UX, Sun Solaris, and Windows was released last week. From the accompanying press release: “Recent events, such as the Code Red Worm virus, have required the industry to rethink the safety of daily information transfer. One of
the mechanisms which has come under scrutiny has been the accepted
standard for document exchange, the PDF, or Portable Document Format
file. While this format is virtually immune to viruses, Adobe Acrobat
does allow the attachment of files to PDFs. This feature, if misused,
allows system vulnerability. Using our high-performance technology,
we produced a utility which will automatically strip any attachments
from PDFs without damage to the PDF itself.”

Gavin adds that PDF files are universal containers. “You can really put anything into a PDF file,” he says. “We’ve know for years that somebody could use a PDF file as a Trojan horse.”

Appligent gives away APStripFiles and other small PDF-related utilities as a way to promote itself and several larger programs, such as SecurSign, which allows users to encrypt PDF documents on the server.

The APStripFiles utility took him about an hour to write using his company’s SPDF library, Gavin says. “It’s very easy for us to create small little utilities that do specific things,” he says. “The problem is, if we actually sold it, that would be another (item) on our product list, and we have 10 already. It’s actually easier for us to give it away for free than make a product and sell it.”

The company offers for free several PDF-related utilities that Gavin doesn’t think are feature-rich enough to be full products, but are useful nonetheless. In the case of APStripFiles, it’s a little command-line utility that strips the attachments on PDFs and gives a report on what files they were, and who attached them. “It’s a fairly simple utility that does what it’s supposed to do and does it quickly,” he says. “It strips the attachments from PDFs whether they’re nefarious or not.”

So does Gavin have Digital Millennium Copyright Act concerns about any of his products, especially since Adobe was involved initially in the Dmitry Sklyarov arrest? Gavin says Appligent has a relationship with Adobe, although it’s not a very structured relationship.

Gavin admits, however, that he has some concern about updating the PDF encryption program SecurSign, which builds on Adobe security, because some of Adobe’s 128-bit RC4 encryption code in its newest releases, Acrobat 5.0 and PDF 1.4, are not made public due to U.S. Commerce Department rules.

“We would very much like to take our SecurSign product and make it support standard Acrobat security at 128 bits,” he says. “But to do that, we would need to reverse engineer what they’ve obfuscated. If we reserve-engineered their stuff … and even though we’re not decyrpting, in this case we’re encrypting, it looks like we’d still be in violation of the DMCA.”

Adobe, which first participated with the FBI in the Skylarov arrest, handled the situation badly, Gavin says, and would have been better served by fixing its security issues.

“Personally, I do not particularly think it’s ethical to be producing a piece of software to basically go break other people’s security, not matter how poorly implemented,” he says of Skylarov’s company Elcomsoft. “Whether that’s illegal, I tend to think not.”

Category:

  • Linux

Vietnam introduces new Internet regulations

Author: JT Smith

Associated Press (via CNN) report that Vietnam will introduce new fines for illegal use of the Internet. Effective September 7, creating or distributing viruses, spreading prohibited information, pornography, passwords, or private information will be punishable by fines ranging from 10 million to 50 million dong ($666 to $3,330USD). The decree also allows private companies to offer Internet services in the country; currently there are five providers, all operated by state-owned enterprises. The new ISPs will have to be licensed, and the fine for providing unlicensed access is 70 million dong ($4,666USD).

Review: Pentium 4 races to 2GHz

Author: JT Smith

Reviewed at PC World: ”
Intel took nearly 29 years to produce its first 1-GHz processor, but
just 18 months more to push its Pentium 4 to the 2-GHz mark,
further increasing the P4’s speed advantage (on paper) over
AMD’s current crown jewel, the 1.4-GHz Athlon.

But our tests show that despite the new chip’s extra megahertz, the
Athlon still performs better on some applications.”

Category:

  • Unix

Qpopper on a Redhat Linux 7.x issue

Author: JT Smith

At Help Net Security, contributor Charles Chear compared two sessions with Qpopper on his Red Hat Linux 7.x box, and uncovered a security issue that occurs with PAM integration: “If you take a look carefully between the two sessions, both give different auth fail
responses. Using this, you can brute force and verify an account exists or not. The
problem, I’m assuming, is the intrusion of pam.d in the whole authentication process.I
also tested this on an FreeBSD 4.3 box with qpopper 4.0.3. There, the same fail
response was given whether or not the username really did exist. I’ve also tested an
install of qpopper on Redhat straight from a tarball that compiled without PAM
support. It responded securely and as it should.. with the same response whether or
not the account really exists.”

Category:

  • Linux

Transparent/open/free entrepreneurialism

Author: JT Smith

Advogato: “Is it possible to set up an economic endeavor that fairly rewards a community for collective stewardship of the commons and creation of further
value that is then also placed in the commons?

I think it is. Others do too.”

Category:

  • Open Source