Is Linux Mint the best distro to replace Windows XP?

March 31, 2014, 11:37 AM Windows XP users are in a tough situation as that operating system draws close to its end of life. But there are many alternatives to Windows XP, and ZDNet thinks that Linux Mint might a very good one indeed.

I get it though. You know XP like the back of your hand and Windows 8.x has left you as cold as a penguin in the Antarctica ocean. You may also have considered switching to a Mac and gotten hives from just the thought, or contemplated a Chromebook but couldn't get past the idea of relying so much on the Internet and Software-as-a-Service (SaaS). I suggest an alternative you may not have considered: Linux Mint.

Yes, I'm serious, and not just because I tend to use Linux desktops a lot and Mint in particular. I'm suggesting it for XP users for several specific reasons.

More at ZDNet

Image credit: ZDNet

There's also a gallery of Linux Mint and Windows XP images that show some similarities between the two desktop environments.

A basic primer on open source software Sci-Tech Today has a useful primer on the basics of open source software. It could be helpful if you ever need to explain to someone what open source means.

Open source software is software that is freely distributed. In other words, it is software that is free to acquire. Everyone can access it and modify the code if they wish. The opposite of open source is proprietary software that is closely held and controlled.

For example, Microsoft Office is proprietary software. Most open source software is community based, meaning many developers in different places work independently on the software. Open source may sound really "techie" oriented (and it is), but you may be surprised to find open source software all around you and how much it is affecting innovation.

More at Sci-Tech Today

Go here to see the original:
Is Linux Mint the best distro to replace Windows XP?

An Overview of Cryptography – GaryKessler.net Home Page

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered in this chapter only describe the first of many steps necessary for better security in any number of situations.

This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today.

I would like to say at the outset that this paper is very focused on terms, concepts, and schemes in current use and is not a treatise of the whole field. No mention is made here about pre-computerized crypto schemes, the difference between a substitution and transposition cipher, cryptanalysis, or other history. Interested readers should check out some of the books in the references section below for detailed and interesting! background information.

Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

Within the context of any application-to-application communication, there are some specific security requirements, including:

Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext.

In many of the descriptions below, two communicating parties will be referred to as Alice and Bob; this is the common nomenclature in the crypto field and literature to make it easier to identify the communicating parties. If there is a third or fourth party to the communication, they will be referred to as Carol and Dave. Mallory is a malicious party, Eve is an eavesdropper, and Trent is a trusted third party.

There are several ways of classifying cryptographic algorithms. For purposes of this paper, they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are (Figure 1):

With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Excerpt from:
An Overview of Cryptography - GaryKessler.net Home Page

McGovern To Deliver Speech At Drury University

CREATED 5:17 AM

Edward Snowden will be the topic of a speech by former CIA analyst and senior national security advisor Ray McGovern.

Edited from a press release from Drury University:

SPRINGFIELD, Mo., March 26, 2014 Former CIA analyst and senior national security advisor Ray McGovern will speak at Drury University at 11 a.m. on Monday, March 31 in Lay Hall Auditorium. The event is free and open to the public. McGoverns speech is titled, Edward Snowden: Patriot or Villain? McGovern met with Snowden last fall in Russia, where Snowden has been granted temporary asylum.

Ray McGovern served as a CIA analyst from the early 1960s through the administration of George H.W. Bush. During the 1980s, his duties included working on the classified National Intelligence Estimate document, and preparing the Presidents Daily Brief for senior advisors to Ronald Reagan.

Following his service in the government, McGovern became a political activist protesting abuses of government power, especially the manipulation of intelligence data. In January 2003, he helped form Veteran Intelligence Professionals for Sanity (VIPS) to expose what its members called the falsification of intelligence to justify war on Iraq. More recently, McGovern has criticized the sweeping surveillance programs of the NSA, and U.S. policy regarding Syria and Ukraine.

The lecture is sponsored and paid for by a group of Springfield citizens who are organizing a speaking tour for McGovern throughout the Midwest, and is co-hosted by Drurys Department of Political Science & Geography. Lay Hall is located on Benton Avenue, between Central and Calhoun Streets. Public parking is available along Benton and in Lot 6, across Benton just north of Central High School.

For more information about the lecture, contact: Jeffery A. VanDenBerg, chair, Political Science & Geography Department, at (417) 873-6947.

View original post here:
McGovern To Deliver Speech At Drury University