Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

Chocolatey Gallery | Jitsi 2.8.5426

 Jitsi  Comments Off on Chocolatey Gallery | Jitsi 2.8.5426
May 282016
 

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more…

This package was approved by moderator ferventcoder on 4/24/2015.

Jitsi (formerly SIP Communicator) is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the LGPL.

To install Jitsi, run the following command from the command line or from PowerShell:

To upgrade Jitsi, run the following command from the command line or from PowerShell:

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

This package has no dependencies.

20042012 Emil Ivov

https://jitsi.org/Main/News

Excerpt from:
Chocolatey Gallery | Jitsi 2.8.5426

Jitsi – OSTN – Guardian Project Open Dev

 Jitsi  Comments Off on Jitsi – OSTN – Guardian Project Open Dev
May 212016
 

Jitsi Setup

Go to http://jitsi.org/ in your browser. Download the program onto your computer. Jitsi is an audio/video and chat application that supports protocols such as SIP, XMPP/Jabber, AIM/ICQ, Windows Live, Yahoo! and many other useful features.

When Jitsi is installed, go to the applications folder and open it.

Select the SIP account type in the Network pull down in the new account window. It should look like this

In the Sip id box, add the username & server detail we sent to you in the email (for example foo@ostel.co).

In the Password box, Add the password we sent to you in the email.

Click the Advanced box

Click the Connection tab. Fill out the form fields to match this screenshot

Click the Next button. Confirm the settings are correct on the next screen. Click Sign In

You should see it read “Registering” for a few seconds until the bar to the right of your account name turns Green and reads SIP ON Online.

Congratulations! You’ve successfully signed in.

You can fetch a package or subscribe to the repository.

For details on the current status with the official Debian packaging, please refer to Debian Bug report logs.

Known issues making a ZRTP initiation between clients.

Current successes for ZRTP: Jitsi OSX -> Groundwire / Ostel -> Jitsi OSX

Current failings for ZRTP: Groundwire -> Jitsi OSX / Jitsi OSX -> Ostel

Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi – the most complete and advanced open source communicator.

The ever growing use of Voice over IP (VoIP) and other media applications triggered a more widespread use of the Real-time Transfer Protocol (RTP). Thise protocols is the workhorse for VoIP applications. Many VoIP applications send RTP data over the public Internet in clear, thus the data is not protected from eavesdropping or modification. Therefore most VoIP applications are regarded insecure today. During the last years several activities started to enhance the security of RTP.

The Secure Real-time Transfer Protocol (SRTP) enhances security for RTP and provides integrity and confidentiality for RTP media connections. To use SRTP in an efficient way VoIP applications should be able to negotiate keys and other parameters in an automatic fashion.

ZRTP is a protocol that negotiates the keys and other information required to setup a SRTP audio and video session

While it is important to look at the technology, the protocols and alike, it is also important to look at the implications a specific technology may have on its implementation, deployment, and usability. Usability is of major importance for VoIP peer-to-peer applications: these applications are mainly used by non-IT persons. Therefore the handling must be simple, easy to use, and shall not require special infrastructure or registration.

http://jitsi.org/index.php/Documentation/ZrtpFAQ

Original post:
Jitsi – OSTN – Guardian Project Open Dev

The NSA – The Super Secret National Security Agency

 NSA  Comments Off on The NSA – The Super Secret National Security Agency
May 072016
 

– A Tale of Two Countries – New Zealand Apologizes for Illegal Domestic Spying, While U.S. Still Refuses to Acknowledge NSAs…

– Attacking Tor – How the NSA Targets Users’ Online Anonymity

– Citizens Against Unidentified Flying Objects Secrecy v. National Security Agency

– Clapper Reveals Bush-Era Docs Showing NSA Spying Dragnet Started 2001

– Covert Operations of the U.S. National Security Agency

– Creation of The NSA – from ‘The Secret Government – Origin, Identity and Purpose of MJ-12’

– DARPA – Defense Advanced Research Projects Agency – Main File

– Did the NSA Kill Hugo Chavez?

– Exposed The Covert, Real-Time Spying on Youtube, Facebook and Blogs

– Foiling Computer Hackers Top Priority With FBI, CIA, Pentagon, NSA

– ‘Follow the Money’ – NSA Spies on International Payments

– Foreign Officials in the Dark About their Own Spy Agencies’ Cooperation with NSA

– Google and The NSA Connection

– Google and The NSA – Whos Holding The ‘Shit-Bag’ Now?

– Google Asks NSA to Help Secure Its Network

– Google, CIA and the NSA – Inside the Secret Network behind Mass Surveillance, Endless War and Skynet

– Google to Enlist NSA to Help It Ward Off Cyber-Attacks

– Hidden Government Scanners Will Instantly Know Everything About You from 164 Feet Away

– High-Level U.S. Government Officials Have Warned for 40 Years that Mass Surveillance Would Lead to Tyranny…

– How Google, Facebook, Skype, Yahoo and AOL are All Blatantly Lying to Their Own Users in Denying NSA Spy Grid…

– How International Treaties Gave NSA Back-Door Access for Surveillance

– How NSA Access Was Built into Windows

– How the NSA Plans to Infect ‘Millions’ of Computers with Malware

– How the NSA Spies on Your Google and Yahoo Accounts

– Inside TAO – Documents Reveal Top NSA Hacking Unit

– Inside The NSAs Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah – Exposed

– It’s Not Just Spying – How the NSA Has Turned Into a Giant Profit Center for Corrupt Insiders

– Key to The Extraterrestrial Messages – NSA Technical Journal Vol XIV No 1

– La NSA Particip en El Desarrollo de Windows 7

– La Red Echelon – Main File

– Lawless NSA Global Spying

-Mat la NSA a Hugo Chvez?

– NSA Able to Target Offline Computers Using Radio-Waves for Surveillance, Cyber-Attacks

– NSA Boss Wants More Control Over The Internet

– NSA Built Back Door in All Windows Software by 1999

– NSA Claims Massive New Surveillance Powers

– NSA Director Defends Plan to Maintain ‘Backdoors’ Into Technology Companies

– NSA Gathers Data on Social Connections of U.S. Citizens

– NSA, GCHQ Using Data from ‘Leaky’ Smartphone Apps to Spy

– NSA has Built its Own, Secret, Warrantless, Shadow Social Network, and You’ve Already Joined It

– NSA Helped With Windows 7 Development – Privacy Expert Voices ‘Backdoor’ Concerns – Security Researchers Dismiss Idea

– NSA ‘Helping’ Microsoft With Windows 7 ‘Security’

– NSA Infiltrates Links to Yahoo and Google Data Centers Worldwide – Snowden Documents Say

– NSA – National Security Agency – Extrapolate Postmodum Prosum – Updated

– NSA Offering ‘Billions’ for Skype Eavesdrop Solution – Business Model for P2P Firm at Last?

– NSA Recent UFO Document Release More Interesting for What It “Could” Not Find

– NSA Refuses to Declassify Obamas Cybersecurity Directive – Exceptionally Grave Damage

– NSAs Computer and Mobile Spying – An Interview with Professor Tung Yin

– NSA’s Domestic Surveillance is Motivated by Fears that Environmental Disasters Could Fuel Anti-Government Activism

– NSA Secretly Exploited Devastating Heartbleed Bug for Years – Report

– NSA Security Running Amok to Plug Leaks About 9/11

– NSA Spying Did Not Result in a SINGLE Foiled Terrorist Plot

– NSA’s Top Hacking Unit

– NSA Top-Secret Document from 2012 – FOXACID – SECONDDATE – WILLOWVIXEN

– NSA Surveillance Goes Beyond Orwell’s Imagination – Says Alan Rusbridger

– NSA Took Part in The Development of Windows 7

– NSA Wants EZ Pass Control for Internet

-“Obese Intelligence” – The NSA Search Engine

– Quantum Insert

– Radio Mensajes Provenientes del Espacio Exterior – Documento Desclasificado de La NSA

– Russian Researchers Expose Breakthrough U.S. Spying Program

– Secret Archives – National Security & Privacy

View post:
The NSA – The Super Secret National Security Agency

 Posted by at 3:47 am  Tagged with:

Jitsi – WOW.com

 Jitsi  Comments Off on Jitsi – WOW.com
Apr 112016
 

Jitsi Original author(s) Emil Ivov Developer(s) Jitsi Team and Contributors Initial release 2003(2003) Stable release 2.8 (build.5426) (March19, 2015; 11 months ago(2015-03-19)) [] Preview release 2.9 (nightly) [] Development status Active Written in Java Operating system Linux, Mac OS X, Windows (all Java supported) Size 52.4 MB Windows (bundles its own private JRE)[1] 78.8MB Mac OS X (includes private JRE)[2] 22MB Linux 65MB source code[3] Available in Asturian, English, French, German, Bulgarian, Japanese, Spanish, Italian, Romanian, Greek and 25 more Type Voice over Internet Protocol / instant messaging / videoconferencing License Apache Website jitsi.org

Jitsi (formerly SIP Communicator) is a free and open source multiplatform[4]voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android. It supports several popular instant-messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the Apache Software Licence.[5]

Work on Jitsi (then SIP Communicator) started in 2003 in the context of a student project by Emil Ivov at the University of Strasbourg.[6] It was originally released as an example video phone in the JAIN-SIP stack and later spun off as a standalone project.[7]

Originally the project was mostly used as an experimentation tool because of its support for IPv6.[8][9] Through the years, as the project gathered members, it also added support for protocols other than SIP.

Jitsi has received support from various institutions such as the NLnet Foundation,[10][11] the University of Strasbourg and the Region of Alsace[12] and it has also had multiple participations in the Google Summer of Code program.[13][14]

In 2009, Emil Ivov founded the BlueJimp company which has employed some of Jitsi’s main contributors[15][16] in order to offer professional support and development services[17] related to the project.

In 2011, after successfully adding support for audio/video communication over XMPPs Jingle extensions, the project was renamed to Jitsi since it was no longer “a SIP only Communicator”.[18][19] This name originates from the Bulgarian “” (wires).[20]

On November 4, 2014, “Jitsi + Ostel” scored 6 out of 7 points on the Electronic Frontier Foundation’s secure messaging scorecard. They lost a point because there has not been a recent independent code audit.[21]

On February 1, 2015, Hristo Terezov, Ingo Bauersachs and the rest of the team released [22] version 2.6 from their stand at the Free and Open Source Software Developers’ European Meeting 2015 event in Brussels. This release includes security fixes, removes support of the deprecated MSN protocol, along with SSLv3 in XMPP. Among other notable improvements, the OS X version bundles a Java 8 runtime, enables echo cancelling by default, and uses the CoreAudio subsystem. The Linux build addresses font issues with the GTK+ native LookAndFeel, and fixes some long standing issues about microphone level on call setup when using the PulseAudio sound system. This release also adds the embedded Java database Hyper SQL Database to improve performance for users with huge configuration files, a feature which is disabled by default. A full list of changes is [23] available on the project web site.

Jitsi supports multiple operating systems, including Windows as well as Unix-like systems such as Linux, Mac OS X and BSD. “Beta” packages built for Android are available[24] but the project’s roadmap describes the porting to Android as “on hold”.[25] It also includes:[26]

The following protocols are currently supported by Jitsi:[4]

Jitsi is mostly written in Java[31] which helps reuse most of the same code over the various operating systems it works on. Its GUI is based upon Swing. The project also uses native code for the implementation of platform specific tasks such as audio/video capture and rendering, IP address selection, and access to native popup notification systems such as Growl.

The project uses the Apache Felix OSGi implementation[32] for modularity.

Among others Jitsi uses the JAIN-SIP protocol stack for SIP support and the Jive Software Smack library [33] for XMPP.[34]

As Jitsi can handle IPv6 it is especially interesting for direct PC-to-PC (peer-to-peer) communication, for instance, if both sides were ‘trapped’ behind NAT routers, but could obtain a reachable IPv6 address via a tunnel-broker.[citation needed]

The Jitsi community has also completed an ICE implementation called ice4j.org, which it uses to provide NAT traversal capabilities, and assist IPv4 to IPv6 transition.[35]

Audio systems supported are PortAudio, PulseAudio and WASAPI (Windows Audio Session API).

Read more:
Jitsi – WOW.com

 Posted by at 4:48 am  Tagged with:

Test automation – Wikipedia, the free encyclopedia

 Automation  Comments Off on Test automation – Wikipedia, the free encyclopedia
Mar 272016
 

In software testing, test automation is the use of special software (separate from the software being tested) to control the execution of tests and the comparison of actual outcomes with predicted outcomes.[1] Test automation can automate some repetitive but necessary tasks in a formalized testing process already in place, or add additional testing that would be difficult to perform manually. Test automation is critical for continuous delivery and continuous testing.

Some software testing tasks, such as extensive low-level interface regression testing, can be laborious and time consuming to do manually. In addition, a manual approach might not always be effective in finding certain classes of defects. Test automation offers a possibility to perform these types of testing effectively. Once automated tests have been developed, they can be run quickly and repeatedly. Many times, this can be a cost-effective method for regression testing of software products that have a long maintenance life. Even minor patches over the lifetime of the application can cause existing features to break which were working at an earlier point in time.

There are many approaches to test automation, however below are the general approaches used widely:

Test automation tools can be expensive, and are usually employed in combination with manual testing. Test automation can be made cost-effective in the long term, especially when used repeatedly in regression testing.[citation needed]

In automated testing the Test Engineer or Software quality assurance person must have software coding ability, since the test cases are written in the form of source code which, when run, produce output according to the assertions that are a part of it.

One way to generate test cases automatically is model-based testing through use of a model of the system for test case generation, but research continues into a variety of alternative methodologies for doing so.[citation needed] In some cases, the model-based approach enables non-technical users to create automated business test cases in plain English so that no programming of any kind is needed in order to configure them for multiple operating systems, browsers, and smart devices.[2]

What to automate, when to automate, or even whether one really needs automation are crucial decisions which the testing (or development) team must make. Selecting the correct features of the product for automation largely determines the success of the automation. Automating unstable features or features that are undergoing changes should be avoided.[3]

A growing trend in software development is the use of testing frameworks such as the xUnit frameworks (for example, JUnit and NUnit) that allow the execution of unit tests to determine whether various sections of the code are acting as expected under various circumstances. Test cases describe tests that need to be run on the program to verify that the program runs as expected.

Test automation mostly using unit testing is a key feature of agile software development, where it is known as test-driven development (TDD). Unit tests are written to define the functionality before the code is written. However, these unit tests evolve and are extended as coding progresses, issues are discovered and the code is subjected to refactoring .[4] Only when all the tests for all the demanded features pass is the code considered complete. Proponents argue that it produces software that is both more reliable and less costly than code that is tested by manual exploration.[citation needed] It is considered more reliable because the code coverage is better, and because it is run constantly during development rather than once at the end of a waterfall development cycle. The developer discovers defects immediately upon making a change, when it is least expensive to fix. Finally, code refactoring is safer; transforming the code into a simpler form with less code duplication, but equivalent behavior, is much less likely to introduce new defects.

Many test automation tools provide record and playback features that allow users to interactively record user actions and replay them back any number of times, comparing actual results to those expected. The advantage of this approach is that it requires little or no software development. This approach can be applied to any application that has a graphical user interface. However, reliance on these features poses major reliability and maintainability problems. Relabelling a button or moving it to another part of the window may require the test to be re-recorded. Record and playback also often adds irrelevant activities or incorrectly records some activities.[citation needed]

A variation on this type of tool is for testing of web sites. Here, the “interface” is the web page. However, such a framework utilizes entirely different techniques because it is rendering HTML and listening to DOM Events instead of Windows API events. Headless browsers or solutions based on Selenium Web Driver are normally used for this purpose.[5][6][7]

Another variation of this type of test automation tool is for testing mobile applications. This is very useful given the number of different sizes, resolutions, and operating systems used on mobile phones. For this variation, a framework (e.g. Calabash) is used in order to instantiate actions on the mobile device and to gather results of the actions.[8][bettersourceneeded]

Another variation is script-less test automation that does not use record and playback, but instead builds a model of the Application Under Test (AUT) and then enables the tester to create test cases by simply editing in test parameters and conditions. This requires no scripting skills, but has all the power and flexibility of a scripted approach.[citation needed] Test-case maintenance seems to be easy, as there is no code to maintain and as the AUT changes the software objects can simply be re-learned or added. It can be applied to any GUI-based software application.[citation needed] The problem is the model of the AUT is actually implemented using test scripts, which have to be constantly maintained whenever there’s change to the AUT.[citation needed]

API testing is also being widely used by software testers due to the difficulty of creating and maintaining GUI-based automation testing. It involves directly testing APIs as part of integration testing, to determine if they meet expectations for functionality, reliability, performance, and security.[9] Since APIs lack a GUI, API testing is performed at the message layer.[10] API testing is considered critical when an API serves as the primary interface to application logic since GUI tests can be difficult to maintain with the short release cycles and frequent changes commonly used with agile software development and DevOps.[11][12]

Continuous testing is the process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate.[13][14] For Continuous Testing, the scope of testing extends from validating bottom-up requirements or user stories to assessing the system requirements associated with overarching business goals.[15]

Testing tools can help automate tasks such as product installation, test data creation, GUI interaction, problem detection (consider parsing or polling agents equipped with oracles[further explanation needed]), defect logging, etc., without necessarily automating tests in an end-to-end fashion.

One must keep satisfying popular requirements when thinking of test automation:

A test automation framework is an integrated system that sets the rules of automation of a specific product. This system integrates the function libraries, test data sources, object details and various reusable modules. These components act as small building blocks which need to be assembled to represent a business process. The framework provides the basis of test automation and simplifies the automation effort.

The main advantage of a framework of assumptions, concepts and tools that provide support for automated software testing is the low cost for maintenance. If there is change to any test case then only the test case file needs to be updated and the driver Script and startup script will remain the same. Ideally, there is no need to update the scripts in case of changes to the application.

Choosing the right framework/scripting technique helps in maintaining lower costs. The costs associated with test scripting are due to development and maintenance efforts. The approach of scripting used during test automation has effect on costs.

Various framework/scripting techniques are generally used:

The Testing framework is responsible for:[16]

Test automation interface are platforms that provide a single workspace for incorporating multiple testing tools and frameworks for System/Integration testing of application under test. The goal of Test Automation Interface is to simplify the process of mapping tests to business criteria without coding coming in the way of the process. Test automation interface are expected to improve the efficiency and flexibility of maintaining test scripts.[17]

Test Automation Interface consists of the following core modules:

Interface engines are built on top of Interface Environment. Interface engine consists of a parser and a test runner. The parser is present to parse the object files coming from the object repository into the test specific scripting language. The test runner executes the test scripts using a test harness.[17]

Object repositories are a collection of UI/Application object data recorded by the testing tool while exploring the application under test.[17]

Tools are specifically designed to target some particular test environment, such as Windows and web automation tools, etc. Tools serve as a driving agent for an automation process. However, an automation framework is not a tool to perform a specific task, but rather an infrastructure that provides the solution where different tools can do their job in a unified manner. This provides a common platform for the automation engineer.

There are various types of frameworks. They are categorized on the basis of the automation component they leverage. These are:

Read the rest here:

Test automation – Wikipedia, the free encyclopedia

 Posted by at 1:47 am  Tagged with:

Technology | Define Technology at Dictionary.com

 Technology  Comments Off on Technology | Define Technology at Dictionary.com
Mar 262016
 

Contemporary Examples

And it finishes second, behind New York, for technology Innovation.

But Shawn and Craig, 47, are accused of being interested in technology as well.

Her reveals the sometimes blind, unsettling way love and technology merge.

Yet equal access to education and technology still remains a challenge.

The second feature is how to translate the technology efficiently: how to harness the power of this device for practical use.

British Dictionary definitions for technology Expand

the application of practical sciences to industry or commerce

the methods, theory, and practices governing such application: a highly developed technology

the total knowledge and skills available to any human society for industry, art, science, etc

Derived Forms

technological (tknldkl) adjectivetechnologically, adverbtechnologist, noun

Word Origin

C17: from Greek tekhnologia systematic treatment, from tekhn art, skill

Word Origin and History for technology Expand

1610s, “discourse or treatise on an art or the arts,” from Greek tekhnologia “systematic treatment of an art, craft, or technique,” originally referring to grammar, from tekhno- (see techno-) + -logy. The meaning “science of the mechanical and industrial arts” is first recorded 1859. High technology attested from 1964; short form high-tech is from 1972.

technology in Science Expand

The use of scientific knowledge to solve practical problems, especially in industry and commerce.

The specific methods, materials, and devices used to solve practical problems.

technology in Technology Expand

jargon Marketroid jargon for “software”, “hardware”, “protocol” or something else too technical to name. The most flagrant abuse of this word has to be “Windows NT” (New Technology) – Microsoft’s attempt to make the incorporation of some ancient concepts into their OS sound like real progress. The irony, and even the meaning, of this seems to be utterly lost on Microsoft whose Windows 2000 start-up screen proclaims “Based on NT Technology”, (meaning yet another version of NT, including some Windows 95 features at last). See also: solution. (2001-06-28)

See the original post here:

Technology | Define Technology at Dictionary.com

OpenFire Jitsi as Skype(desktop sharing) and Temviewer …

 Jitsi  Comments Off on OpenFire Jitsi as Skype(desktop sharing) and Temviewer …
Mar 182016
 

Openfire Jabber/XMPP is a server written in JAVA. This is free software and is also official support. Management has a WEB panel and it works on 9090 (http) and 9091 (https) ports.It supports Plugins(extensions), SSL/TLS, can connect to the database(Oracle, MSSQL, PostgreSQL, DB2, Sybase ASE, MySQL or internal database HSQLDB) via JDBC, can connect LDAP groups and filter by groups, has the ability of users registration based on to different sources and supporting different languages. Most of the management is done via the web interface. The official website is http://www.igniterealtime.org/.

Features:

Supported client programs:

Add SRV records in your DNS server as follows: openfire IN A 94.20.81.149 _jabber._tcp.jabber.unixmen.com. IN SRV 0 0 5269 jabber.unixmen.com. _xmpp-client._tcp.jabber.unixmen.com. IN SRV 0 0 5222 jabber.unixmen.com. _xmpp-server._tcp.jabber.unixmen.com. IN SRV 0 0 5269 jabber.unixmen.com.

Before all configuration we will create MySQL database, user and password because we will use this in next configurations: mysql -uroot -p mysql> CREATE DATABASE openfire; mysql> GRANT ALL PRIVILEGES ON openfire.* TO [emailprotected] IDENTIFIED BY 0penfire0bepassword; mysql> FLUSH PRIVILEGES;

Before the installation absolutely update the ports. cd /usr/ports/net-im/openfire Go to the port folder make config choose the modules make install install

echo openfire_enable=YES >> /etc/rc.conf Add to the startup /usr/local/etc/rc.d/openfire start Start the daemon

sockstat -l | grep openfire Check for listen openfire java 56187 26 tcp4 *:9090 *:* openfire java 56187 29 stream (not connected)

Then go to the http://openfire.unixmen.com:9090 page. You will get the following page (select English and click the continue button):

Write domain name and click the Continue button:

To select different type of database select the Standart Database Connection and click the Continue button:

The selection MySQL database. Write username, password and database URL as the following syntax and click the Continue button: jdbc:mysql://localhost:3306/openfire?rewriteBatchedStatements=true:

Select Default and click Continue button:

In the opened page add the email for administrator account, type password twice and click the continue button. Administrator login name will be admin:

Last configuration page will be as below. Go to the Login to the admin console for login:

Write admin user name and password for this user:

At the end the opened page will be as below:

Create some users as the following template:

Add group:

Then go to this group and add created users to this group:

Now configuration for client program. Download Spark client program from http://www.igniterealtime.org/downloads/download-landing.jsp?file=spark/spark_2_7_0.exe link and install.

As the following screen configuring user faxri.iskandarov:

Check monitoring service plugin (Must be installed):

Then go to the Server -> Archiving -> Archiving Settings section and select logging between our XMPP clients (as the following screen):

Even you are able to get meetings through web. For this go to the http://openfire.unixmen.com:7070/jitsi/apps/ofmeet link. This channel will not be crypted. For crypted channel go to the http://openfire.unixmen.com:7443/jitsi/apps/ofmeet link.

Note: If you are using Jitsi client program you dont need any plugin for call and any SIP number. Because Jitsi client can call with audio/video over XMPP like as Microsoft Lync and you can share your desktop like as Skype. You can download jitsi client program via https://jitsi.org/Main/Download official page. We will configure jitsi program at next sections.

In general plugin configurations under the Server tab. Also go to the Server -> Jitsi Videobridge section. Add the SIP username, password and SIP registration server and click save button:

In the Sessions -> Tools -> Send Message section you can send broadcast message to all users. As the following screen:

If we want to set SIP number for each user, before this we must add XMPP users to our system and then go to the Server -> Phone -> Add new Phone Mapping section and create SIP users(SIP and XMMP on the same server). For example we will add SIP number for existing namaz.bayramli XMPP user.

Then download Jitsi XMPP/SIP client program to your Windows machine and configure as follows (The official page: https://jitsi.org/Main/Download : File -> Add new account > XMPP -> XMPP Username Password -> Add

As you see XMPP user namaz.bayramli is ready:

Then click File -> Add contact and add the credentials as the screen, click Add button (Of course, user exists in our system):

The previous configuration we did for [emailprotected] and added to his user list [emailprotected]. At the end call from one client to another with audio/video and share your desktop:

This is desktop sharing:

And if you want to control other point from jitsi client, just select Enable desktop remote control checkbox. After that you can control other point as teamviewer.

For example if you want to use SIP configuration together XMPP, choose again Tools -> Options -> Add -> SIP and write SIP username and password (As the follows page). Just change domain name to yours:

As you see XMPP and SIP accounts is together:

Link:
OpenFire Jitsi as Skype(desktop sharing) and Temviewer …

 Posted by at 12:43 pm  Tagged with:

HobbySpace – Astronomy

 Astronomy  Comments Off on HobbySpace – Astronomy
Mar 152016
 

Astronomy is obviously the oldest and most popular of space hobbies. Even the occasional backyard skywatching by unaided eye or a small telescope can be a marvelous experience.

There are innumerable web sites already devoted to general astronomy and so we start below with just a guide to some introductory sites and a few of the major astronomy link lists.

We will focus here more on sites related to astronomy projects where amateurs can make significant contributions.

One of the most wonderful aspects of astronomy is that amateurs still make significant contributions. Comets, for example, are often discovered by non-professional astronomers.

We put many topics involving near-earth and solar system based phenomena, e.g. meteor show observation, aurora investigation, etc., into the Space Science section. (This is an arbitrary division but is consistent with the HobbySpace emphasis on our solar system.)

Note that the Satellite Watching section also includes astronomy related information and links such as tracking programs, utilities and references. In addition, the offline and online software sections include some star chart program links.

Astronomy related sections at HobbySpace

ASTRONET Carl Koppeschaar’s ASTRONET provides links to astronomy and space sites. Also, daily news reports available. Sections include

Astronomy Cafe Sten Odenwald’s cafe offers you some exploration with your coffee:

“Have you ever wondered what it might be like to be an astronomer? Do you have any questions that you would like an astronomer to answer? Would you like to hear the latest about hyperspace, black holes, time travel and quantum cosmology? Well, at the Astronomy Cafe you’ve come to the right place! Sit down, grab a cup of coffee, and have a far-out adventure at the outer frontier of space and time.” – web site.

Astronomical Society of the Pacific A very large and active organization with members worldwide. Their Mercury Magazine is a bi-monthly with articles accessible by a wide audience. A selection of the articles are online. There is also an online shop for posters, software, globes, etc.

Cloudy Nights Telescope Reviews Great site with lots of resources such as:

An astronomy addition to Google Earth.

Griffith Observatory This observatory & planetarium is dedicated to public education in astronomy and space exploration. Sky Information

Guide to the Universe Annemie Maertens takes you on trips through our galaxy and on out into the universe. Beautiful images and descriptions of the sights along the way. (In both Dutch and English)

Inconstant Moon Beautifully designed site that offers multimedia tours of the lunar surface. Includes “maps, photos, explanations, animations, selected links and even music”.

Que tal in the Current Skies An entertaining and readable monthly newsletter for the casual backyard astronomer. Gives the highlights of night skys for the coming month.

Rose Center for Earth & Space New York’s famous Hayden Planetarium at the American Museum of Natural History has been replaced with the $210 million Rose Center. The center includes a new Planetarium and much more. The web site describes the new facility and also offers many online activities and resources.

SEDS Galaxy The website for the Students for Exploration and Development of Space (SEDS) provides a broad array of astronomical related links. Also, see the astronomy images in their archive.

Stig’s Sky Calendar Stig Ottosen’s site is dedicated to his Java astronomy and space events calendar program that provides info on happenings both celestial and on the ground (e.g. upcoming conferences.)

“Use the Sky Calendar to keep yourself up to date on local and global sky events. It will display sunrise/sunset, twilight and lunar phase and visibility at a glance, and also includes a Planisphere, Planet Finder and Planet Round-up display. You can even customize your sky calendar setup with My Sky Calendar.”

There is both an online and offline version.

SkyLights Professor Jim Kaler provides this site for amateur astronomers. Includes weekly updates and astronomy news.

StarDate The University of Texas McDonald Observatory presents the popular StarDate radio show about skywatching. This web site provides lots of astronomy links and useful tips, especially for the backyard astronomer.

The Starpages An enormous searchable database for space and astronomy web resources. Called the “astronomy yellow pages”. Sections nclude:

The Telson Spur — The Snark Hunter’s Page Link list site with an enormous number of astronomy and space & astronautics links, arranged in an innovative classification scheme. See, for example, sections on Amateur Astronomy, Sky&Weather.

John Walker’s Fourmilab Programs John Walker offers several online and offline (freeware) astronomy programs, as well as interesting information. See, for example,

Microsoft will release this tool in the spring of 2008. It sounds like it will be a powerful competitor to Google Sky

Astronomy Magazines The websites for astronomy magazines typically provide lots of information and resources for astronomers ranging from the beginner to the pro.

Astronomy Day (April 16th) + Globe at Night April 16th each year is the time to celebrate our cosmos and the hobby of astronomy and to participate in astronomical observations.

They developed a very elaborate website with many resources that are still available.

to go outside, look skywards after dark, count the stars they see in certain constellations, and report what they see online. This Windows to the Universe Citizen Science Event is designed to encourage learning in astronomy!

It is part of the Citizen Science program at Windows to the Universe.

Dark Sky Preservation Light pollution has caused most of the cosmos to fade from view for people who live in urban/suburban areas. Extraneous night time illumination, e.g. streetlights that send wasted light upward rather than reflecting it downward, reduces the sensitivity of not only scientific telescopes but of our own eyes to see the dimmer stars and Milky Way from your back yard.

Here are resources that discuss the problem and efforts to combat it.

Organizations for amateurs and students

Astronomy Tourism – Eclipses, Northern Lights, Meteor Showers, etc. It is becoming more and more popular to travel to some exotic location to observe an astronomy related event. The most common such trips are to areas where eclipses will be visible, but now these also include expeditions to view aurora and meteor showers.

Orrery (Solar System Simulator) An Orrery shows the planets and their orbit around the sun. Mechanical Orreries have been around for centuries, typically as beautiful, clockwork-like devices in brass and wood.

Here’s a big orrey project meant to run for a long, long time: Long Now > Projects > Clock > Orrery

Now one can find them simulated in software but there are still mechanical versions around. The software versions offer a lot more options but a mechanical Orrery offer a more tangible, intuitive and esthetic experience.

Miscellaneous lunar info and resources:

Science Topics Here are some miscellaneous astronomy related science topics of interest

Read this article:
HobbySpace – Astronomy

The Tor Browser: Tor Browser – au.pcmag.com

 Tor Browser  Comments Off on The Tor Browser: Tor Browser – au.pcmag.com
Jan 282016
 

The Tor Browser makes the tricky work of surfing the Web anonymously as easy as using any other browser, but with a significant performance hit.

Jan. 26, 2016

Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer. Tor, which stands for “The Onion Router” is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. Accessing Tor has long been beyond the ability of the average user. Tor Browser manages to simplify the process of protecting your identity onlinebut at the price of performance.

What Is Tor? Ifyou’re thinking that Tor comes from a sketchy group of hackers, know that its core technology was developed by the U.S. Naval Research Lab and D.A.R.P.A.. The Tor Project non-profit receives sizeable donations from various federal entities such as The National Science Foundation. The Tor Project has a page listing many examples of legitimate types of Tor users, such as political dissidents in countries with tight control over the Internet and individuals concerned about personal privacy.

Tor won’t encrypt your datafor that, you’ll need a Virtual Private Network (VPN). Instead, Tor routes your Internet traffic through a series of intermediary nodes. This makes it very difficult for government snoops or aggressive advertisers to track you online. Using Tor affords far more privacy than other browsers’ private (or Incognito) modes, since it obscures your IP address so that you can’t be trackedwith it. Standard browsers’ private browsing modes discard your cached pages and browsing history afteryour browsing session.Even Firefox’s new, enhanced private browsing mode doesn’t hide your identifiable IP address from the sites you visit, though it does prevent them tracking you based on cookies.

We tested a standard Windows installer, with choices to create desktop icons and run the browser immediately. The browser itself is a heavily modified version of Firefox 38.5 (as of this writing), and includes several security plug-ins as well as security tweaks such as not caching any website data. For a full rundown of the PCMag Editors’ Choice browser’s many features, read our full review of Firefox.

Before merrily browsing along anonymously, you need to inform Tor about your Webconnection. If your Internet connection is censored, you configure one way, if not, you can connect directly to the network. Since we live in a free societyand work for benevolent corporate overlords, we connected directly for testing. After connecting to the Tor relay system (a dialog with a progress bar appears at this stage), the browser launches, and you see theTor project’s page.

The browser interface is identical with Firefox, except with some necessary add-ons installed. NoScript, a commonly used Firefox add-on, is preinstalled and can be used to block most non-HTML content on the Web. The green onion button to the left of the address bar is the Torbutton add-on. It lets you see your Tor network settings, but also the circuit you’re using: Ourcircuit started in Germany and passed through two different addresses in the Netherlands before reaching the good old Internet. If that doesn’t suit you, you can request a new circuit, either for the current session or for the current site. This was one of our favorite features.

One thing we really like about the Tor Browser is how it makes existing security and privacy tools easier to use. NoScript, for example, can be a harsh mistress, who can bedifficult to configure, and can break websites. But a security panel in the Torbutton presents you with a simple security slide. At the lowest, default setting, all browser features are enabled. At the highest setting, all JavaScript and even some image types are blocked, among other settings. This makes it easy to raise or lower the level of protection you need, without having to muck around in multiple settings windows.

Everything you do in the browser is tested for anonymity: When we tried full-screening the browser window, a message told us that that could provide sites a way to track us, and recommended leaving the window at the default size. And the project’s site specifically states that using Tor alone doesn’t guarantee anonymity, but rather that you have to abide by safe browsing guidelines: don’t use BitTorrent, don’t install additionalbrowser add-ons, don’t open documents or media while online. The recommendation to only visit secure HTTPS sites is optionally enforced by a plug-in called HTTPS Everywhere.

Even if you follow these recommendations, though, someone could detect the simple fact that you’re using Tor, unless you set it up to use a Tor bridge relay. Those are not listed in the Tor directory, so hackers (and governments) would have more trouble finding them.

One thing we noticed while browsing the standard Web through Tor was the need to enter a CAPTCHA to access many sites. This is because your cloaked URL looks suspicious to website security services such as CloudFlare, used by millions of sites to protect themselves. It’s just one more price you pay for anonymity.

We also had trouble finding the correct version of websites we wished to visit. Directing the Tor Browser to PCMag.com, for example, took us to the Netherlands localization of our website. We could not find any way to direct us back to the main URL, which lets you access the U.S. site.

Tor hidden sites have URLs that end in .onion, preceded by 16 alphanumeric characters. You can find directories of these hidden sites with categories resembling the good old days of Yahoo. There’s even a Tor Links Directory page (on the regular Web) that’s a directory of these directories. There are many chat and message boards, but you even find directories of things like lossless audio files, video game hacks, and financial services such as anonymous bitcoin, and even a Tor version of Facebook. Many onion sites are very slow or completely downkeep in mind that they’re not run by deep-pocketed Web companies. Very often we clicked an onion link only to be greeted with an “Unable to Connect” error. Sinbad helpfully displays a red “Offline on last crawl” bullet to let you know that a site is probably nonfunctional.

As for browser benchmarks, the results hew to Firefox’s own performance, with near-leading performance on all the major JavaScript tests, JetStream and Octane, for example. Onourtest laptop, the Tor Browser scored 20,195 on Octane, compared with 22,297 for standard Firefoxnot a huge difference. The Tor network routing is a far more significant factor in browsing performance than browser JavaScript speed. That is, unless you’ve blocked all JavaScript.

Keep in mind, though, that the Tor Browser is based on the Firefox Extended Support Release versions, which updates less frequently so that large organizations have time to maintain their custom code. That means you don’t get quite the latest in Firefox performance and features, but security updates are delivered at the same time as new main versions.

There’s a similar story when it comes to standards compatibility: On the HTML5Test.com site, which quantifies the number of new Web standards supported by a browser, the Tor Browser gets a score of 412, compared with 468 for the latest Firefox version. You may run into incompatible sites, though. For example, none of the Internet speed connection test sites performed correctly in the Tor Browser.

Of course, you pay a price of extra setup and slower performance with the Tor Browser, but it’s less onerous than you may think. And the included support for fine-grain privacy and security protection is excellent. If you take your online privacy seriously, you owe it to yourself to check out the Tor Browser. For standard, full-speed Web browsing, however, check out PCMag Editors’ Choice Web browser, Firefox.

Go here to read the rest:
The Tor Browser: Tor Browser – au.pcmag.com

A Skype alternative worth its salt: Jitsi | usability …

 Jitsi  Comments Off on A Skype alternative worth its salt: Jitsi | usability …
Sep 052015
 

Ive been using Skype, Google Talk and Facebook chat for years to communicate with friends and family. Theyre all convenient, reliable and easy to use. But there is a big problem: They are all very easy to record and monitor by 3rd parties. We now know that:

So if you happen to live in a surveillance state (think countries of the Arab Spring, think UK with their repeated attempts to introduce surveillance of their citizens, think USA with their record-breaking demands for your personal data from all of the above service providers (Microsoft, Google and Facebook)) then you can expect that all your online communications with your loved ones (voice calls, video calls, text chats) are recorded and stored, or at least eavesdropped upon. Theyre all great free services that allow you to keep in touch with people, with one caveat: the government is listening in.

If you have no problem with that, perhaps because you subscribe to the flawed I have nothing to hide school of thought, read no further.

If you feel that being spied upon constantly, and having no reasonable expectation of privacy for your online life is not cool, read on.

The work of thousands of visionaries (starting with people like Richard Stallman in the 70s) has today given us the free tools to protect our online communications to a reasonable degree. These are not tools to stop a police investigation against you from succeeding these are tools that empower you to opt-out from the surveillance-by-default communications channels most of us use, and instead keep your private thoughts and words only between yourself and your loved ones.

The easiest one to get us started is Jitsi.

Jitsi gives you voice calls, video calls, instant text messages and group chats. It therefore covers 100% of the communication capabilities of Microsofts Skype, Google Talk, Facebook Chat, IRC channels and the like. Use Jitsi, and you dont need to use any of these again.

Why switch to Jitsi?

Because it protects your privacy as much as possible. If you and your loved ones use Jitsi, you can:

As an additional benefit, its great to have all of your instant messaging contacts in one window, and Jitsi gives you that. It also runs on Windows, MacOSX and GNU/Linux.

Start using Jitsi instead of Skype, Google Talk and Facebook Chat and stop corporations and governments collecting, storing and analyzing the thoughts you share with your loved ones.

PS: You can only have private communications if both ends of the chat/voice/video call support this. If both you and your loved ones use Jitsi, voice & video calls are private by default. For text chats, you will have to click the lock icon in your chat window (as shown below) until it displays a closed lock state.

PPS: No lock icon? That probably means that the person you are chatting with is not using Jitsi or a similar program that can protect your chats with OTR. You can only have a private conversation if both ends support OTR.

PPPS: Looking for something like Jitsi for your smartphone? For private text messaging (using the Off The Record protocol) look at ChatSecure for iPhones or GibberBot for Android phones. For private voice calls on the Android, look into csipsimple and Moxie Marlinspikes RedPhone. Remember, both ends of the conversation need the same technology to create a private channel.

Like Loading…

.

Go here to read the rest:
A Skype alternative worth its salt: Jitsi | usability …

 Posted by at 7:43 pm  Tagged with:

Jitsi Configuration and Review – Callcentric

 Jitsi  Comments Off on Jitsi Configuration and Review – Callcentric
Aug 302015
 

This setup guide is based on the Jitsi stable version 1.0-beta1-nightly.build.3593 on the Windows platform. Other platforms should have a similar infterface. This setup guide assumes you have properly installed the application on your operating system of choice and have gotten any audio issues resolved before attempting to configure Jitsi for use with Callcentric.

Help / Support: Jitsi documentation

***If this is not the first time running Jiitsi then on the main interface, please click on Tools > Options (on Mac OSX, please click on Jitsi > Preferences):

Then choose Add to add a new account. Select SIP from the dropdown list and continue to Step 2.

Username: This is either the default extension 1777MYCCID OR 1777MYCCIDEXT, where 1777MYCCID is the 1777 number assigned to you by Callcentric and EXT is the three digit extension you are trying to register this UA to.

For example: 17770001234101 would register to extension 101 on account 17770001234.

You cannot register to your account using only the extension number.

Password: Enter your extension SIP Password here. Your extension SIP password is the password you created for the extension you are trying to use. You may edit the SIP password you wish to use in by logging into your My Callcentric account and clicking on the Extension menu link and then modifying the appropriate extension.

After specifying your username/ password, click on the Sign in button on the bottom of the Sign in screen.

On the main interface, please click on Tools > Options (on Mac OSX, please click on Jitsi > Preferences). From there, please select your Callcentric profile and click on the EDIT button on the bottom of the Options page:

Keep alive method: REGISTER Keep alive interval: 60 Disable/uncheck: Enable support to encrypt calls

Click on the Next button, which should bring you to the Summary window.

Click on the Sign in button to finish.

PCMU/8000 telephone-event/8000

Once you have made these changes, please click on the Video tab and disable all video codecs.

After making the above changes, please close out the Options window, and go back to the main interface.

Go here to read the rest:
Jitsi Configuration and Review – Callcentric

Jitsi SIP Softphone Review – About.com Tech

 Jitsi  Comments Off on Jitsi SIP Softphone Review – About.com Tech
Aug 302015
 

jitsi.org/http://jitsi.org/logo/jitsi_logo.svg/Wikimedia Commons

About.com Rating

Visit Their Website

Jitsi is a Java-based communication tool that offers a lot of features and allows SIP-based calls. Jitsi supports voice and video calls and gives all the functionalities of an Instant Messaging software. It offers a nice interface and runs on many platforms. It also offers conference calls over SIP and allows you to connect to many other networks including Facebook, Google Talk, Windows Live, Yahoo!, AIM and ICQ.

Jitsi is a nice tool for integrating all your communication needs into one application. Jitsi is open source and is therefore free.

Pros

Review

Jitsi offers a very simple but nice-looking interface, with basic features and easy controls for configuring the tool and communication. Download and installation are straightforward and easy, and it is also easy to configure your SIP settings. You can use Jitsi with any SIP account.

Jitsi supports many IM protocols and works with many other networks, including Facebook, Google Talk, Windows Live, Yahoo!, AIM and ICQ. This makes it possible to call and contact your friends without having to change tool.

Jitsi is free and open source. Having a look the source code of tools like this is an interesting adventure for programmers who want to work on VoIP applications. Being Java-based, the application works on most operating systems.

Jitsi offers privacy and encryption for calls. It uses the ZRTP encryption, and is one of the rare SIP clients to offer something for security.

With Jitsi, you can use your computer and Internet connection to make free voice and video calls through SIP. Just get a SIP address and register with Jitsi. You can then communicate with your other friends using SIP or with people on the other networks mentioned above. You can also use Jitsi with Google Voice to call regular landline and mobile numbers.

Jitsi supports voice communication, video conferencing, chat, IM network, file transfer and desktop sharing.

The application is a little bit slow compared to others of the kind, due to it being Java-based and therefore interpreted. But if you have a powerful computer, you wont notice it. Also, you dont get to more detailed options where you can select codecs and other technical things. But you will be happy if you are not geeky enough for that.

Visit Their Website

Go here to see the original:
Jitsi SIP Softphone Review – About.com Tech

Jitsi | Tiki Suite

 Jitsi  Comments Off on Jitsi | Tiki Suite
Aug 302015
 

See also Jitsi provisioning via Tiki

Jitsi (previously SIP Communicator) is a cross-platform VOIP, videoconference, desktop sharing and chat client.

Jitsi is a core part of the Tiki Suite.

Protocols supported include SIP, XMPP/Jabber/Google Talk/Facebook chat, AIM/ICQ, Windows Live, Yahoo! Messenger and Bonjour.

Other features include: Call recording, Call & chat encryption, Noise suppression, Echo cancellation, File transfer, multi-user chat, Desktop streaming, Presence, Conference calls, Integration with Microsoft Outlook and Apple Address Book, Support for LDAP directories, Support for Google Contacts, On-line provisioning, Systray notifications, IPv6 support, Spell checker and many more.

License: LGPL http://jitsi.org/

Usage

To try out Jitsi via XMPP (with VOIP, videoconference, desktop sharing, etc.) you can use a Gmail account (which is also a XMPP account) or the jit.si service. Juts create an account and use that username at jit.si as jabber account in the Jitsi application.

If you are using Gmail, or Google for domains, use the Google Talk option in Jitsi. If you are using jit.si or a generic XMPP server, use the Jabber option in Jitsi.

A port for Android is in alpha

Jitsi is focused on a rich feature set, standards compliance and security.

There is the base package and 2 options. Many organizations will only need the base package, and they can add one or both options as they need them.

Advanced features (such as ZRTP encryption) require the client to support, but basic communication can be achieved by any XMPP client, including via a web interface.

This adds a web interface for Audio-Video-Chat collaboration with folks outside the team, by sending them a URL and using WebRTC

Alternatively, you can use BigBlueButton for this use case. BigBlueButton is more mature, very well integrated in Tiki and more focused towards online Learning. It is very easy to install, but it requires another server.

http://www.rtcquickstart.org/ICE-STUN-TURN-server-installation https://github.com/mozilla/togetherjs/issues/327

See the original post:
Jitsi | Tiki Suite

 Posted by at 7:46 pm  Tagged with:

Bitcoin Charts

 Bitcoin  Comments Off on Bitcoin Charts
Aug 252015
 

Major Magazine Publisher to Accept Bitcoin Payments

Time Inc., publisher of e. g. for People, Sports Illustrated, InStyle and Time, now accepts bitcoin as a payment.

read more

It can be used to buy apps, games, and other digital content from Windows, Windows Phone, Xbox Games, Xbox Music, or Xbox Video stores. Be aware, that Money added to the Microsoft account using Bitcoin cannot be refunded.

read more

Mozilla, the community behind Firefox and Thunderbird, now accepts Bitcoin donations.

read more

PayPal does first steps for a integration of bitcoin.

read more

The Wikimedia Foundation now accepts Bitcoin. They will work together with coinbase.

read more

The German Newspaper “taz”, also called “die tageszeitung”, now accepts Bitcoins as donations. All the content on taz.de/ is available for free, based on their model of donations. So far, more then 10 BTC got donated, which is a lot, compared to the approx. 10 000 donations (in German), received in June.

read more

Latvian airline airBaltic has become the worlds first airline to accept Bitcoin as payment for its tickets to 60 destinations in Europe, Middle East, Russia and the CIS.

read more

Dell is now accepting bitcoin payments from consumers and small business shoppers across the U.S. for all items available on Dell.com, including the Alienware line of products.

read more (via http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2014/07/18/we-re-now-accepting-bitcoin-on-dell-com.aspx)

next page page 1 of 111

Visit link:
Bitcoin Charts

Singularity HUB – News and Insights on Technology, Science …

 The Singularity  Comments Off on Singularity HUB – News and Insights on Technology, Science …
Aug 152015
 

First 3D-Printed Drug Ushers in Era of Downloadable Medicine

by Shelly Fan

by Sveta McShane

by Jason Dorrier

by Sveta McShane

by Shelly Fan

by David J. Hill

by Howie Leibach

Categories

Latest

Popular

Editor’s Picks

Should We Redesign Capitalism to Address Our Jobless Future?

Think Your Conscious Brain Directs Your Actions? Think Again

Future of Virtual Reality Series Launches Today

Why Reorganizing Google Is Essential for Its Survival

When Machines Can Do Most JobsPassion, Creativity, and Reinvention Rule

Forget Rocket Fuel: This Spaceplane Will Use Microwave Beams to Reach Orbit

3D Computer Interfaces Will AmazeLike Going From DOS to Windows

Is It Really So Bad If We Prefer Virtual Reality to Reality?

Combating Scarcity With Abundance: New Impact Challenge to Tackle Californias Drought

Should You Buy the Hype? An Inside Look at the Virtual Reality Landscape

How Technology Is Crash Landing in Our Public Schools

How Can Virtual Reality Improve the Quality of Life for People Around the World?

Animal Brains Networked Into Organic Computer Brainet

How Stem Cells May Save Your Lifeand Even Extend It

You Have a Notification: Welcome to the 24/7 Work Culture

Which Way Next? A New Singularity Hub Channel to (Re)Imagine the Future

How Virtual Reality Can Unleash the Greatest Wave of Creativity in Human History

What the Next Generation Needs to Thrive in Exponential Times

How Tiny Lab-Grown Human Brains Are Giving Big Insights Into Autism

Your Doctor Can Now Examine an Exact 3D Replica of Your Heart in Virtual Reality

Singularity University, Singularity Hub, Singularity University Summits, SU Labs, Singularity Labs, Exponential Medicine and all associated logos and design elements are trademarks and/or service marks of Singularity Education Group. 2014 Singularity Education Group. All Rights Reserved.

Go here to read the rest:

Singularity HUB – News and Insights on Technology, Science …

 Posted by at 3:09 pm  Tagged with:

Tor Browser Attacked, Users Should Update Software …

 Tor Browser  Comments Off on Tor Browser Attacked, Users Should Update Software …
Aug 132015
 

An attack against Tor Browser users on Windows machines was discovered this Sunday, and there is speculation that the uncovered malware was used by a law enforcement agency to harvest the IP addresses of users of several hidden services hosted by Freedom Hosting. The malware exploits a serious JavaScript security vulnerability affecting Firefox and other products that share the same code base, including the Tor Browser.

If you are using software based on Firefox major version 21 or earlier, Thunderbird 17.06 or earlier, or SeaMonkey 2.18 or earlier, please update your software immediately. Tor Browser Bundle users who have not updated to the most recent version are also at risk, and so we’ve provided a screenshot tutorial for how to update the Tor Browser Bundle below.

Tor and the Tor Browser: Security and the Importance of Updating

Tor is a powerful anonymity tool that allows human rights activists, dissidents and whistleblowers to use web services anonymously to avoid harassment, imprisonment and in some cases death. Tor also allows users to circumvent several forms of surveillance and censorship. The Tor Browser is a modified version of Firefox that ships with the Tor Browser Bundle to provide users with an easy way to browse with Tor without any configuration required.

Given the importance of Tor to users around the world, the security of both Tor and the Tor Browser are absolutely critical. This type of attack cannot be narrowly focused on particular Tor or Tor Browser users suspected of breaking the law, and leaves vulnerable the multitude of other users worldwide who depend on these tools for anonymity. In this case, all users of older versions of the Tor Browser Bundle are potentially vulnerable and the issue requires immediate attention.

What Can Users Do?

Tor does not provide automatic security updates. Instead, the Tor Browser currently requires users to manually download and install the update of the Tor Browser Bundle. The Tor Project is working on a fix for this, and this attack highlights the importance of allowing users to auto-update. For now, if you are using an outdated version of the Tor Browser, you should update your Tor Browser Bundle software immediately. Here are detailed instructions for Windows users:

1. Open your current Tor browser, and determine what version of Firefox is running by clicking the “TorBrowser” button:

2. Click on “Help” -> “About TorBrowser” to determine your version. If it below 17.07, then you are vulnerable:

Excerpt from:
Tor Browser Attacked, Users Should Update Software …

 Posted by at 3:56 am  Tagged with:

Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …

 Jitsi  Comments Off on Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …
Jul 242015
 

Whether you are using Mac, Windows or Linux, I am sure you have your own favorite chat client that you use on a daily basis. For some of you, you might even have a audio/video call client that you use to make free call to your friends. Wouldnt it be great if you have these two applications combined into one and it works regardless which OS you are using? Jitsi is the one for you. Jitsi is a java-based desktop client that supports multiple chat and audio/video call protocols. You can use it to connect to the various instant messaging service like MSN, Facebook, Google Talk, Yahoo, ICQ, and also make audio/video call with SIP and XMPP. It doesnt support Skype though, but other than that, this seems to be the most complete app I have ever come across.

The installation is pretty simple. Since it is java-based, it will work on every OS that has java enabled. It does come with an installer package for each OS, so you dont need to run the jar file manually in the terminal. Head over to the Download page and download the version for your system. For Linux Debian/Ubuntu users, you can head over to its deb download page and download the version for your system.

On the first run, it will prompt you to setup your accounts by entering your username and password to the various IM and XMPP/SIP accounts.

Once you have set it up, it will run like any other SIP/XMPP/IM client.

On Windows and Mac, it integrates quite well with the system theme, but on my Ubuntu machine, the java GUI sucks. In addition, this application will cause an invisible JavaEmbeddedFrame window to appear in the menu bar and cant be removed until you quit the app. This doesnt affect the functionalities of Jitsi, but still, it can be rather annoying.

For the chat, there is one feature that I like best: the ability to encrypt your chat session. During a chat, you can click the padlock button to encrypt the conversation. However, this works only when both parties are using Jitsi, else it wont work.

To make a audio/video call, you can easily click the Phone or Video icon below your friends name. You can also click the Screen Sharing icon to share your screen, though I cant get it to work, perhaps due to my firewall configuration.

Go here to see the original:
Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …

 Posted by at 8:08 pm  Tagged with:

Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …

 Tor Browser  Comments Off on Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …
Jul 242015
 

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser called Aurora, and is self-contained.

Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says “Tor Enabled” in the bottom right corner before using it. To reduce the risk of confusion, don’t run Firefox while using the Tor Browser Bundle, and close existing Firefox windows before starting.

The rest is here:
Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …

Freedom Takes Another Blow From Apple, Microsoft

 Freedom  Comments Off on Freedom Takes Another Blow From Apple, Microsoft
Mar 242015
 

Both are reducing OS choices for PC owners, pushing PCs further towards becoming disposable appliances.

Call it another blow against OS freedom, part of the slow creep towards turning PCs into consumer appliances. Call it the choice of security over liberty, one our society has made so many times since 2001. Call it annoying. But in the wake of both Apple and Microsoft cracking down on what OSes can be installed on their PCs, I’d like to call it unnecessary.

This weekend, two irritating stories came out about OS vendors potentially locking popular alternatives out of their platforms. Apple, which happens to make gorgeous Windows-compatible laptops, said its new round of PCs won’t support Windows 7. And Microsoft is giving PC manufacturers the option to lock down their hardware and prevent Linux installationsor for that matter any experimental OS.

Security clearly has something to do with these arguments. As ExtremeTech explains, Microsoft’s move is designed to protect PCs from particularly sneaky malware. And Apple is just following Microsoft’s guidelines on Windows 7, as Microsoft signalled in January that it would like to start dialing back support for Windows 7 in general.

But still, I don’t like the precedent. If you build your own desktop PC, none of this will affect you, as motherboard manufacturers will almost certainly leave the security switch that lets you install alternative OSes intact. But more and more people are turning to laptops as their primary machines, and it’s very difficult to build your own (adequate) laptop. Having the potential freedom to install other OSes doesn’t make a computer more difficult to use in its default mode, and having a security switch which can be disabled by knowledgable users doesn’t make a PC, by default, less secure.

Operating system freedom has always been a big difference between desktop and mobile platforms, too. Mobile OS vendors typically forbid end-users from installing any other OS on their hardware. Without built-in restrictions, it’s completely possible to do this. Microsoft last year showed off how the same hardware can run Android and Windows Phone, and we’ve seen both HTC and Alcatel devices offered with different OS options on the same hardware. The CEO of ZTE USA has told me twice how he’d love to sell multi-OS devices. But if there’s one thing Google, Apple, and Microsoft agree upon, it’s that end-users shouldn’t have the freedom to try out alternatives.

And if you have a problem with my wanting to run both Mac OS and the superior Windows 7 versions of both Microsoft Excel and utilities like FastStone Image Viewer, then you need to check your fanboy/girlism.

It’s About Planned Obsolescence Locking out competing OSes and “old” OSes is all part of the decade-long shift towards making computing devices less upgradeable, to advance planned obsolescence and force you to buy new machines more often. One of the things about Linux is that it runs really well on older, lower-power machines which might otherwise be sent to the recycle bin. I’m considering installing Linux on a dying old laptop I have around, to use it as a Web terminal.

Yes, you’ll be able to run Windows 7 in a virtual machine such as Parallels on a Mac. But Apple’s decision to withdraw Boot Camp support just highlights the total consumer failure of Windows 8. (I just checked, and thank goodness, I was never on the Windows 8 bandwagon.) Windows 7 was awesome. I’m still running it on two machines. We all want to pretend Windows 8 never happened. Would it have hurt Apple so much to support the version of Windows that people actually like, until Windows 10 comes out?

The answer for the truly geeky among us is, of course, to build your own desktop. But that’s becoming a smaller and smaller group of people, and it leaves out the growing crowd who want mobile, portable or handheld computing experiences. For themfor us, because I’m of course one of those peoplewe’re seeing our freedoms sadly, and slowly, erode.

More here:
Freedom Takes Another Blow From Apple, Microsoft

 Posted by at 1:46 am  Tagged with:



Pierre Teilhard De Chardin | Designer Children | Prometheism | Euvolution