30 Cool Open Source Software I Discovered in 2013 – nixCraft

These are full-featured open source software products, free as in beer and speech that I started to use recently. Vivek Gite picks his best open source software of 2013.

Replicant is entirely free and open source distributions of Android on several devices including both phones and tablets. I have installed it on an older Nexus S. You can install apps from F-Droid store a GPLv2 client app that comes configured with a repository hosting only free as in freedom applications.

This is an open source, cross-platform application to convert videos from and to various formats, including formats suitable for devices such as Android/iOS phones. It is simple and easy to use software to convert almost any video to MP4, WebM (vp8), Ogg Theora format. Miro Video Converter is based on FFMPEG and act as a front end to FFMPEG command line tools.

I was looking for an alternative to Dropbox to run cloud on my own server at home and office. This software is open source software, and it is self hosted. I dont have to trust third party with my data. I found this software easy to install and quite useful. I started to use it for syncing files and other data. I have been using for couple of months and it has been proven reliable alternative to Dropbox. There are clients available for MS-Windows, OS X, Linux, and mobile apps for iOS and Android devices (or simply access data using the ownCloud web frontend).

The FreeBSD jail provides an operating system-level virtualization partition a FreeBSD-based serve into several independent mini-systems. You can do the same with Linux using OpenVZ. Linux Containers (LXC) is a virtualization method for running multiple isolated Linux systems. Docker extends LXC. It uses LXC, cgroups, Linux kernel and other parts to automate the deployment of applications inside software containers. It comes with API to runs processes in isolation. With docker I can pack WordPress (or any other app written in Python/Ruby/Php & friends) and its dependencies in a lightweight, portable, self-sufficient container. I can deploy and test such container on any Linux based server.

Adminer is a full-featured database management tool written in PHP. Conversely to phpMyAdmin, it consists of a single file ready to deploy to the target server. Adminer is available for MySQL, PostgreSQL, SQLite, MS SQL and Oracle. I usually install this for clients who are new to PostgreSQL/MySQL. The software acts as a drop-in-replacement for phpMyAdmin with a better user interface, better support for MySQL features, higher performance and more security.

MariaDB is a community-developed fork of the MySQL server. MariaDB is going to be default in many popular Linux distro and open source project. Red Hat will switch the default database in its enterprise distribution, RHEL (including its clones such as CentOS), from MySQL to MariaDB, when version 7 is released in 2014. I started testing MariaDB and found no problems at all. The speed is same or better in some cases.

I wish I discovered RackTables earlier. It is is a datacenter asset management system. With this software one can document hardware assets (such as server, workstations, routers, switches and more), network addresses, space in racks, networks configuration and more:

Apache Cordova is a free and open source framework that allows you to create mobile apps using standardized web APIs. You can create apps that work on iOS, Andriod, BlackBerry, Windows, Ubuntu and other phone based operating systems. You write code once and run on selected mobile platforms with little or no change at all. PhoneGap uses Apache Cordova.

Nmap is an open source security tool for network exploration, security scanning and auditing. ipscan (Angry IP Scanner) is an alternative to nmap command. It is also an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.

Drupal, Typo3, WordPress and many other content management system (CMS)/blogging software dynamically create feature rich content. However, you may not need all the all features and complexity offered by modern CMS based systems. For example, a WordPress based blog like nixCraft requires multiple VMs, CDN for static assets, caching engine such as memcached, PHP, mysql database, comment moderation, and on going updates. A growing trend is to keep your blog simple by avoiding CMS and use static HTML generators that offers the following benefits:

You can setup a open source software such as WordPress, Drupal, ZenCart, and over 100+ other software easily with TurnKey Linux. It is a virtual appliance library that integrates and polishes the very best open source software into ready to use solutions. Each virtual appliance is optimized for ease of use and can be deployed in just a few minutes on bare metal, a virtual machine and in the cloud/in physical server. TurnKey Linux is based on Debian 7.2 with automatic security updates for all packages. It also includes a web management interface, web shell, and simple configuration console. I often use this to deploy development server in the cloud.

DokuWiki is a simple to use and highly versatile open source wiki software that doesnt require a database. Easy to install on Linux or Unix-like operating systems with the following features:

I use this on my laptop to keep notes about various projects.

GNU MediaGoblin is free software, decentralized media publishing platform. You can host and share videos, music, and images using MediaGoblin. It is an alternative to major media-publishing services such as Flickr, deviantArt, YouTube, Soundcloud, etc. It is written in Python and SQL.

Scrollout F1 is easy to use and setup email firewall gateway system. It includes anti-spam and anti-virus protection for Microsoft Exchange, Postfix, Exim, Sendmail, Qmail and others. It runs on Debian and Ubuntu Linux operating systems. This is perfect software for filtering incoming messages and other features are as follows:

Observium is free and open source software written in PHP/MySQL. It collects data from devices using SNMP and presents it via a web interface. It includes support for a wide range of network hardware and operating systems including Cisco, Windows, Linux, HP, Dell, FreeBSD, Juniper, Brocade, Netscaler, NetApp and many more. I use this software along with Nagios to get better understanding of certain devices and technologies. It provides historical and current performance statistics, configuration visualization and syslog capture.

It is a web based invoicing system. It helps me to create quick and nice looking invoices without having to set up too much services on server. All you have to do is install the SimpleInvoices software, enter a biller, a customer details and go creating invoices. You can easily track your finances; send invoices as PDFs and more. It is the best invoicing set up for my independent IT consultancy business.

I sometime use and recommend the following software for MS-Windows/Linux users due to simplicity and ease of use features. Here is the list of the other best and FOSS apps of 2013:

This is a perfect open-source FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer Protocol (SFTP) client for Windows, Mac OS X and GNU/Linux. It has the following features that new users might find useful:

It is an open source free SFTP client and FTP client for Windows. Its main function is the secure file transfer between local and server under your control. Most new MS-Windows user find WinSCP an easier to use as compare to putty and friends.

I give this software to many developers. They can easily setup Apache, MySQL, PHP/Perl to deploy and write an application on their own desktop. No need to install virtual machine and Linux server. Just focus on development and skip real server management job to pros.

Many users only use 2% of the features of a program like Microsoft Word. No need to spend money or time on Microsoft Word. I personally use Abiword due to:

LESS extends CSS with dynamic behavior such as variables, mixins, operations and functions. LESS can run on the client-side and server-side or can be compiled into plain CSS.

Cinnamon is a GTK+ based desktop environment and a fork of the GNOME Shell. It was initially developed by Linux Mint. It offers a user interface with the following features that I needed most:

Tmux is terminal multiplexers for Unix-like platforms. tmux offers several advantages over GNU/screen:

It is a simple and straightforward software that offers the following features:

Zentyal is a full-featured Linux server for small and medium businesses that you can set up in less than 30 minutes. It is a drop-in replacement for Microsoft Small Business Server and Microsoft Exchange Server. It is easy to use software. Zentyal is based on Ubuntu and it can be installed either from Ubuntu repositories or from Zentyals own installer.

ack-grep is a grep like tool, optimized for programmers. This tool isnt aimed to search all text files. It is specifically created to search source code trees, not trees of text files. It searches entire trees by default while ignoring Subversion, Git and other VCS directories and other files that arent your source code.

ditaa is a small command-line utility, that can convert diagrams drawn using ascii art, into proper bitmap graphics. I use this tool all the time to draw diagrams and forwarding them via email or chat session.

GNU parallel is a shell tool for executing jobs in parallel using one or more computers. If you like xargs command, try GNU/parallel utility. It can run command/script/job on all available CPUs or on multiple computers.

luckyBackup is an application for data back-up and synchronization powered by the rsync tool. It is simple to use, fast, safe, reliable and fully customizable backup software. I often set and recommend this too for new Ubuntu/Fedora desktop users to backup their own files.

OpenShot Video Editor is a free and open-source non-linear video editing software package for Linux. I use this tool to create videos for my youtube channel. It is a stable, free, and friendly to use video editor on Linux.

This is my personal FOSS software list and it is not absolutely definitive, so if youve got your own software, share in the comments below. Also dont forget to check out our previous years 15 greatest open source terminal applications of 2012.

[ Happy New Year to all nixCraft visitors. I hope that 2014 proves to be just as awesome for Linux & FOSS enthusiast everywhere. ]

View original post here:
30 Cool Open Source Software I Discovered in 2013 - nixCraft

Netflix Open Source Software Center

Providing Actionable Insight at Massive Scale

Telemetry and metrics play a critical role in the operations of any company, and at more than a billion metrics per minute flowing into Atlas, our time-series telemetry platform, they play a critical role at Netflix. However, Operational Insight is considered a higher-order family of products at Netflix, including the ability to understand the current components of our cloud ecosystem via Edda, and the easy integration of Java application code with Atlas via the Spectator library.

Effective performance instrumentation allows engineers to drill quickly on a massive volume of metrics, making critical decisions quickly and efficiently. Vector exposes high-resolution host-level metrics with minimal overhead.

Outside of the operational domain, cost management and visibility into where our resources are used in the cloud is a multi-million question to be answered; we've built Ice as a way to expose ongoing cost and and cloud utilization trends to engineers so they can have a better understanding of the footprint of their applications in our environment.

Finally to validate reliability, we have the Simian Army which tests our instances for random failures.

See original here:
Netflix Open Source Software Center

What Is Open Source – O’Reilly Media – ONLamp.com

Answering the question What is open source? used to be a lot simpler than it is today.

Open source began as, and for the most part still is, software created by a community of people who are dedicated to working together in a highly collaborative and evolutionary way.

The most important difference between software created by the open source communities and commercial software sold by vendors is that open source software is published under licenses that ensure that the source code is available to everyone to inspect, change, download, and explore as they wish. This is the essential meaning of open source: the source code--the language in which the software is written and the key to understanding how the software works--can be obtained and improved by anyone with the right skills.

More precise definitions extend this basic concept by adding provisions concerning derivative works, the rights to use the software for any purpose, the rights of the original author, and prohibitions against discrimination.

For those new to the idea of open source or unfamiliar with the way software gets developed, here's how it works most of the time:

One or more developers--meaning people who have the skills to create software--get an idea about creating software to solve a problem.

The developers start writing code to create a solution. This is frequently called "scratching an itch."

The developers put this code where other developers can find out about it, download it, and play with it. There are many locations, such as SourceForge.com, where people post their projects.

Usually the source code is published under one of several popular open source licenses that ensure that the source code and any derivative works remain open source.

Through an informal process of sharing ideas, fiddling with each others' code, and trial and error, the software gets better and better, sometimes changing direction to solve new problems as new people discover the software.

At some point, the software gets finished or doesn't. It becomes popular, stays obscure, or fades away. Programs like Linux and Apache have had thousands of contributors. Other projects have been created by one or two people.

As time goes on, developers come and go, and projects become active or dormant.

A huge amount of amazing software has been created through this loose process. While much of open source development has focused on creating tools for software developers, an increasing amount of effort is being put into creating programs to solve less technical problems like publishing blogs or keeping track of skydiving activity.

While this explanation is sufficient for most purposes, such a simple answer is really no longer accurate. The right answer today depends on your perspective. To really understand the question What is open source? in a complete and useful way, we must know who is asking the question. For example, if we asked Linus Torvalds, Richard Stallman, or Bill Gates, we might get very different answers. Here's what open source means to a variety of different groups.

For users of software who have the skills to download and install software, open source means choice and freedom.

The choice comes from the huge amount of programs available. Some programs like Firefox (the smoking-hot browser from Mozilla.org) or OpenOffice.org (a suite of word processing, spreadsheet, and related programs) can be downloaded and used by just about anybody. Other open source projects such as Babeldoc or Axkit are mostly useful for software developers.

None of this open source software costs money. Some programs charge subscriptions for support, updates, documentation, or premium versions, but most of those are usable without paying a fee.

The freedom comes from the fact that the source code is available. If you want to change something, then you can, if you have the right skills. Only a handful of the people who download and use open source ever actually change it. Most use it as intended, but they have the freedom to modify it if they want.

For developers and engineers, open source has many additional meanings. To those who found a successful project, open source can mean fame, recognition, and sometimes even money from consulting or other sources.

Other developers see in open source a masterful software development methodology founded on the virtues of collaboration, incremental evolution, and working code.

For most developers, open source is a both a source of tools to help solve problems and a constant source of exciting new things to learn.

Pages: 1, 2

Next Page

See the article here:
What Is Open Source - O'Reilly Media - ONLamp.com

Intel Security-McAfeeAntivirus, Encryption, Firewall …

Backed by an award-winning research team, security technologies from Intel Security use a unique, predictive capability that is powered by McAfee Global Threat Intelligenceenabling home users and businesses to stay one step ahead of online threats.

Intel Security enables users to safely connect to the Internet, and securely surf and shop the web. With McAfee All Access, McAfee Total Protection, McAfee Internet Security, and McAfee AntiVirus Plus, consumers get complete antimalware and antispyware protection, along with an integrated firewall to ensure their computer systems remain virus-free. Additionally, McAfees virus removal service helps you easily clean viruses and spyware from your PCall from the comfort of your home. Try out McAfee software by downloading our free antivirus trials.

McAfee Mobile Security provides comprehensive mobile device protection with antivirus, anti-theft, and web and app protection for smartphones and Android tablets.

Intel Security solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, endpoint detection and response, and data protection. Our complete security solutions extend beyond virus software and antimalware protection to server security, SIEM, and intrusion prevention systems (IPS). Backed by McAfee Global Threat Intelligence, our solutions help companies enhance visibility into their security postures, allowing business to embrace virtualization, cloud services, and mobile devices, while protecting critical assets and sensitive data, and improving incident response.

Our industry-leading security offerings include:

Originally posted here:
Intel Security-McAfeeAntivirus, Encryption, Firewall ...

WhatsApp Rolls Out End-To-End Encryption to its Over One …

End-to-end encryption has just gone massively mainstream. In an update on March 31st, the Facebook-owned messaging platform WhatsApp quietly pushed an update adding end-to-end encryption enabled by default to its chat and call functionality. They announced the change publicly on Tuesday, allowing the app's over 1 billion monthly active users to message each other with the guarantee of strong encryptionwhether they're exchanging messages, sending files, participating in group chats, or calling each other directly. Let us be clear: this means that WhatsApp has in one fell swoop moved the user base of end-to-end encryption from those protecting trade secrets, enthused crypto-hobbyists, and whistleblowers to an actually significant portion of the world population. It is difficult to overstate the importance of this move for the security and privacy of ordinary users. As of this week, there are hundreds of millions of users communicating with each other using end-to-end encryption for the very first time.

Not only are the app's users protected by encryption, but it's strong encryption. In a technical white paper released on April 4, WhatsApp describes in detail the underlying cryptographic exchange that occurs when users message each other. It's based on The Signal Protocol (ne Axolotl) developed at Open Whisper Systems, and utilizes double ratcheting to provide forward secrecy even if session keys are compromised. This means that if an adversary is able to uncover the cryptographic keys being used by the app, this will not compromise communications made with contacts in the pastthese will still be protected. The Signal Protocol uses strong and well-vetted cryptographic building blocks (or 'primitives') to construct and transmit messages, including ECDH using Curve25519. In addition to the service's strong end-to-end offerings, all communications between the client app and the WhatsApp server are encrypted using Noise Pipes from the Noise Protocol Framework.

Those familiar with using Signal will find the encryption workflow on WhatsApp similar. Both apps aim for ease of use, hiding the underlying cryptographic functionality away from the end user and integrating it as seamlessly as possible into the normal, intuitive app user interface. There are a few differences, though. The main differences have to do with how authenticity is established.

Traditionally, end-to-end applications have relied on manually verifying fingerprints. If Alice wants to verify Bob's identity, Alice would have Bob read off (or display the QR code for) his 'fingerprint'the digest form of his public encryption key. If Alice has the same fingerprint for Bob, she can be assured that when she retrieved Bob's key from the Internet it wasn't tampered with or replaced by the key of someone else, perhaps someone with malicious intent. Bob would then have Alice read her key as well.

WhatsApp has made the interesting decision not to repeat this workflow in its app. Instead, it presents a distinct QR code per interaction that is shared so that both Alice and Bob will be scanning the same QR code on each other's devices. Presumably, their reasoning is that it is more intuitive for both parties to be verifying the same exact image (which actually just consists of both Alice and Bob's fingerprints concatenated together.) What's interesting about this decision is that it indicates some consideration was given to introducing the concept of key verification to millions of people. In contrast, Apple's iMessage platform, which gained notoriety last year for its own use of end-to-end encryption, does not allow users to verify each others keys at all. WhatsApp is showing the world that you don't need to sacrifice usability in order to provide meaningful features such as ways to verify contact authenticity.

In order to verify the identity of a contact, first you'll want to ensure that your contact is using the latest update of WhatsApp that actually supports the new security features. You can do this on Android by viewing the contact's details:

You'll see a green lock to indicate your communications are encrypted. Then, you can tap the lock to verify a security code as described above:

From this screen, you can have your contact scan your code, and you can scan your contact's code.

One of the settings the security-conscious should be sure to change is enabling security notifications. This ensures that if the encryption key for your contact changes, you will be notified of this change so that you'll know you have to verify security codes again. With Signal these notifications are always shown, but with WhatsApp they are optional and are switched off by default. To change this in Android, go into Settings Account Security, and slide 'Show security notifications' to the right:

We've updated our Secure Messaging Scorecard to give WhatsApp 6 out of 7 stars. Unfortunately, WhatsApp remains closed source, which means that an independent reviewer can not review the code and its security. For this reason, if you're using Signal to communicate with contacts already, keep it. It's better to use a fully free and open source product. But because of the wide adoption of WhatsApp, you may have contacts you would have never expected using end-to-end encryption already. For the sake of their and your privacy and security, install WhatsApp and use it when communicating with them. You'll be glad you did.

Follow this link:
WhatsApp Rolls Out End-To-End Encryption to its Over One ...

Whistleblower Edward Snowden and artist Jean-Michel Jarre …

The GuardianEdward Snowden talking to Jean-Michel Jarre via video link.

In 2016, he's releasing a dance track.

The 32-year-old whistleblower is teaming up with legendary electronic artist Jean-Michel Jarre to produce a "techno" song for the musician's upcoming album, after newspaper The Guardian put them in touch at Jarre's request.

The song, called "Exit," will appear on "Electronica Volume II: The Heart of Noise," due out on May 6.

I've always appreciated electronic music," Snowden, who currently lives at an undisclosed location in Russia, says in a video produced by The Guardian. "The melodies I remember with the most fondness are from video games where they generate 8-bit music, and those kind of chip tunes have really made a resurgence in modern musical culture today, and I thinkpeople like Jean-Michel are the ones that really popularised that, made it possible for us to appreciate it as more than just background but as actual culture."

Jarre is a pioneering French electronic music producer. 67 years old, he has released more than two dozen album and racked up more than 80 million album sales. He says he is inspired by Snowden's decision to speak out against US government surveillance, and is dedicating the new entire album to him. "The first time I heart about Edward Snowden, I thought about my Mum," the artist says. "She was a great figure about the French Resistance and she went into the Resistance [at] more or less the same age."

The song itself which you can listen to a preview of in the video below is a "speedy techno track evoking the constant and hectic production of data, this obsessive quest for more information on everything and everybody," Jarre says.

It also includes vocal samples of Snowden talking about rights and privacy.

Snowden signs off the Guardian's video with an ode to the power of music. "Music works across language, Music works across borders. Music works across culture. Music, as with all arts, is one of the only ways that we can create bonds and bridges between human hearts that are beyond semantic understanding and that is reason more than anything else why we need music."

Rave on, Ed.

Visit link:
Whistleblower Edward Snowden and artist Jean-Michel Jarre ...

Edward Snowden’s New Job: Electronic Music Vocalist | Rolling …

French composer Jean Michel Jarre and whistleblower Edward Snowden, two enigmatic figures for starkly contrasting reasons, have collaborated on "Exit," a track off the electronic music pioneer's upcoming new LP Electronica 2: The Heart of Noise. For the pulse-racing cut, the composer travelled to Russia to work with the former NSA analyst, who remains in exile after leaking classified documents detailing how the United States and other countries are spying on their citizens.

In this exclusive video to Rolling Stone, Snowden discusses his love of electronic music, Jarre's influence on the genre and why he collaborated with the Oxygne composer.

"I've always appreciated electronic music. The melodies that I remember with most fondness are actually from video games where they generate 8-bit music, and those kinds of chiptunes have really made a resurgence in modern musical culture today," Snowden says in the video. "And I think people like Jean Michel are the ones who really popularized that and made that possible for us to appreciate it as more than just sounds, as more than just background, but as actual culture."

Speaking to Rolling Stone, Jarre says he reached out to a journalist and mutual acquaintance he sharedwith Snowden who eventually put them in contact. "We connected quite easily through a trusted friend of Edwards," Jarre said. "I think that Edward was surprised to receive my invitation to collaborate on a musical composition, to voice his message via another media."

For Jarre, Snowden's refusal to turn a blind eye toward the U.S.' spying program reminded the composer of his mother France Pejot, a key figure in the French Resistance during World War II. "I thought a lot about what she told me when I was a kid, saying that when society is generically something that you can not accept, you have to stand up against it," Jarre said. "Edward Snowden became a modern hero, not by saying 'stop,' but to be careful regarding the (ab)use of technology."

Over the course of a few videoconference conversations, Jarre and Snowden laid the foundation for their collaborative track, including its frenzied, anxious tone and Snowden's message within the song."Obviously the spectre of surveillance heavily looms as soon as you find yourself in direct contact with Edward," Jarre told Rolling Stone. The collaborators eventually met up in Russia, where Snowden has been seeking asylum, to complete work on "Exit.""I was surprised, " Snowden admits in the video. "It was certainly not something I was expecting, as a engineer [and] someone who's not really cool."

Jarre added that itwas Snowden who gave "Exit" its name."You have a choice and 'Exit,' whether it's used as a noun or a verb, is something which we pursue," Snowden said of the track. "It's something where we direct ourselves. Its about an action which may change everything from where we are to another direction, a departure to somewhere else."

On the musical side, Jarre said of composing "Exit" at his Paris studio, "I wrote a speedy techno track evoking the constant and hectic production of data and the obsessive quest for more information. I then linked the music with this mad hunt and chase in order to get hold of people like Edward Snowden. One of the recurrent themes of Electronica 1 & 2 is the ambiguous relationship we have with technology. On one side we have the world in our pocket and on the other side, the world is spying on us constantly."

The double-edged sword that technology presents is a centraltheme and the "core message" throughout"Exit.""Technology can actually increase privacy," Snowden, with his voice subtly and eerily modulated, sayson "Exit." "The question is: Why are our private details that are transmitted online, or why are private details that are stored on our personal devices, any different than the details and the private record of our lives that are stored in our private journals."

Later on the track, Snowden warns over an icy drone, "Saying that you don't care about the right to privacy because you have nothing to hide is no different that saying you don't care about freedom of speech because you have nothing to say. It's a deeply antisocial principle because rights are not justindividual, they're collective. What may not have value to you today may have value to an entire population... If you don't stand up for it, then who will?" After alayered, frantic interlude by Jarre, Snowden concludes by again asking, "If you don't stand up for it, then who will?"

Snowden is one of a "dream team" of collaborators and guests that Jarre assembled for Electronica 2: The Heart of Noise: Primal Scream, Gary Numan, Hans Zimmer, Cyndi Lauper, the Orb, the Pet Shop Boys, Peaches, Julia Holter and more contribute to the album, the follow-up to 2015's similarly all-starElectronica 1: The Time Machine. (When Electronica 2's track list was first announced, a mysterious "E.S." was listed as the guest on "Exit.")

Electronica 2: The Heart of Noise is out May 6th. Thosewho pre-orderthe album will receive an instant download of "Exit" as well as the Peaches-featuring "What You Want" and opening track "The Heart of Noise, Part 1" with Rone. After a summer performing at a handful of European music festivals, Jarre will embark on an international tour starting October 4th in Cardiff, Wales.

"Music works across language, music works across borders, music works across all cultures," Snowden says in the video. "Music, as with all art, is one of the only ways that we can create bonds and bridges between human hearts that are beyond semantic understanding, and that is reason, more than anything else, why we need music."

Read more:
Edward Snowden's New Job: Electronic Music Vocalist | Rolling ...

Source Code for Open Source Software Components

For third party technology that you receive from Oracle in binary form which is licensed under an open source license that gives you the right to receive the source code for that binary, you can obtain a copy of the applicable source code from this page. If the source code for the technology was not provided to you with the binary, you can also receive a copy of the source code on physical media by submitting a written request to:

Oracle America, Inc. Attn: Associate General Counsel Development and Engineering Legal 500 Oracle Parkway, 10th Floor Redwood Shores, CA 94065

Or, you may send an email to Oracle using this form. Your request should include:

We may charge you a fee to cover the cost of physical media and processing. Your request must be sent (i) within three (3) years of the date you received the Oracle product that included the component or binary file(s) that are the subject of your request, or (ii) in the case of code licensed under the GPL v3, for as long as Oracle offers spare parts or customer support for that product model.

Read this article:
Source Code for Open Source Software Components

Encryption | Information Systems & Technology

Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.

Available To

Students, Faculty, Staff, Affiliates

Whole disk encryption protects everything on a disk drive including the operating system. Even files you may not know about that keep exact copies of data that you've been working on, such as temporary files are encrypted.

Windows 7, 8 or 10 Mac OS X 10.9 or later

Note: ReadEncryption at MITto learn about the options and recommendations. If you are unsure whether you should be using whole disk encryption for compliance with data security regulations, contact IS&T.

Note: PGP is no longer being offered on the software grid. Support is being phased out and will discontinue at the end of 2016.

Contact the IS&T Service Desk for assistance with any of the above-listed options.

Read the original here:
Encryption | Information Systems & Technology

NSA whistleblower Edward Snowden reinvents himself as an …

He opened eyes around the world with his exposure of surveillance by the NSA.

But Edward Snowden's next venture will target the world's ears, with the whistleblower set to release a techno tune as he makes his debut as an electronic dance music artist.

The fugitiveintelligence contractor is releasing a track with acclaimed electronica star Jean-Michel Jarre,the Columbia record company announced on Friday.

Scroll down for snippet of Edward Snowden's song

Edward Snowden (right) set to release a techno tune as he makes his debut as an electronic dance music artist withJean-Michel Jarre

The song - called Exit - is set to hit the charts on May 6 and featuresSnowden discussing digital surveillance to the backdrop of a lively electronic soundscape created by Jarre.

It is available to stream online and will appear on Jarre's forthcoming album Electronica Vol. 2: The Heart of Noise.

The pair were brought together by the Guardianafter Jarre gave an interview and asked to be put in touch with the former National Security Agency (NSA) contractor, who is now wanted on espionage charges in the United States.

'Edward is an absolute hero of our times. When I first read about him, it made me think of my mother,' Jarre saud,

'She joined the French resistance in 1941, when people in France still thought they were just troublemakers, and she always told me that when society is generating things you can't stand, you have to stand up against it.'

After being put in touch, Jarre, 67, travelled to Moscow to meet Snowden, 32, who lives in Russia in exile, and record the samples that feature on the track.

The song - called Exit - is set to hit the charts on May 6 and features Snowden (right) discussing digital surveillance to the backdrop of a lively electronic soundscape created by Jarre (left)

Other guest contributors on the album will include Gary Numan and the Pet Shop Boys.

Snowden became one of the worlds most wanted men in 2013 when stole classified documents from the NSA.

Snowden, who was a computer specialist at an intelligence centre in Hawaii, tricked colleagues into handing over passwords so he could copy up to 1.7million documents in one of the biggest leaks in US history.

He also leaked details of attempts by state spy agencies including Britains GCHQ to view citizens private information.

Snowden claimed internet history, emails, text messages, calls and passwords were harvested by spies.

And he made the highly damaging claim revelation that the U.S. had hacked Chinese computers and the communications of allies such as Germany and France.

The defence contractor claims he had to act because the US governments policies were a threat to democracy - but America consider him a traitor and he would face decades in jail if he ever returned.

He fled justice in the US to Hong Kong, then Russia, where he was granted asylum. Snowden is now stranded in Moscow as a fugitive after America took away his passport.

Intelligence chiefs believe he is now a puppet' passing details of military capabilities, operations and tactics to Putin's henchmen, although he denies taking any classified material to Russia.

Continue reading here:
NSA whistleblower Edward Snowden reinvents himself as an ...