Classic Shell is a collection of features that were available in older versions of Windows but were later removed. It has a customizable Start menu and Start button for Windows 7 and Windows 8, it adds a toolbar for Windows Explorer and supports a variety of smaller features. Look here for the full list.
European Commission’s Low Attack on Open Source
This secrecy allowed the organisers to cherry pick participants to tilt the discussion in favour of software patents in Europe which shouldn’t even exist, of course, according to the European Patent Convention, FRAND supporters and proprietary software companies, even though the latter are overwhelmingly American so much for loyalty to the European ideal. The plan was clearly to produce the desired result that open source was perfectly compatible with FRAND, because enough people at this conference said so.
via European Commission’s Low Attack on Open Source – Open Enterprise.
Also worth noting in the above statement from the report is the claim that “the distinction between software and hardware is increasingly artificial”. I think if we decode this, what it means is that in the old world of hardware – for example, in telecommunications or codecs – FRAND standards were common, and that’s perfectly true. But in the world of software, the key modern forums for standards such as W3C or OASIS require RF, not FRAND. So this is a crude attempt to force old-fashioned hardware approaches on modern software, because once again the convenient result is that open source is excluded.
Build a Skype Server for Your Home Phone System
Configure Linux to Work with Skype
I’ll assume that because you’re a Linux Journal reader, getting Fedora Core 3 up and running on your Skype server is a no-brainer. The only important thing to remember is that Skype is a Qt application (though it’s also available in a version with Qt statically linked), and the Skype API uses D-BUS. Also, disable the screensaver (after all, there won’t be any screen to “save”) and power standby features as these may interfere with Skype.
Here’s a step-by-step guide to setting up Linux to work with Skype (it assumes you have set up a Linux user account named skype for the purpose):
via Build a Skype Server for Your Home Phone System | Linux Journal.
Microsoft investigating new IE vulnerability used in targeted attacks, IE9 and IE10 users are safe
The malicious JavaScript in question only served the exploit code to browsers whose language was either English (U.S.), Chinese (China), Chinese (Taiwan), Japanese, Korean, or Russian. Once the initial checks passed, the JavaScript proceeded to load an Adobe Flash file named “today.swf.” This file ultimately triggered a heap spray in IE and downloaded a file named “xsainfo.jpg.”
More details of the vulnerability are available at the CERT Knowledgebase ( VU#154201). Here’s the full technical description:
Mass-blocking IP addresses with ipset
It has been shown, the hash approach as implemented by ipset clearly beats traditional mass-rule-blocking. It extends netfilter in a very useful way by decreasing the average response time. In the average over all samples made, IP sets are over 11 times faster. To conclude, let me show you another plot, this time I compared the ipset and iptables approaches within the same graph. The yellow bar shows ipset delays, the red bar does so for iptables.
via Mass-blocking IP addresses with ipset » daemonkeeper’s purgatory.
MK802 II Mini PC Now Costs as Much as Raspberry Pi Model B. Let’s Compare Them!
If you just look at the hardware specs, there’s no comparison, and MK802 II provides much better value than the Raspberry Pi with a much faster CPU, more RAM, internal storage and more. Only the GPU processing power may be subject to debate, but I don’t really have data to make a proper comparison. So if you just want to run the device as a media player for example, I’d just go with MK802 II since you’ll get a smoother experience and more video codecs are supported. The only caveat is that you’ll have to use Android (and see the status bar during video playback), as although Linux video support is available, it’s not ready for prime time, and never will.
via MK802 II Mini PC Now Costs as Much as Raspberry Pi Model B. Let’s Compare Them!.
China Says It Now Has 1.104B Mobile Users, While Mobile Communications Revenue Totaled $116.26B Over First 11 Months of 2012
The rapid growth of the Chinese smartphone market means that it is set to top the U.S. iOS and Android install base next year. According to a research report by Flurry released last month, China currently has 167 million iOS or Android devices, compared to 181 million in the U.S.
Google Apps Moving Onto Microsoft’s Business Turf
One big reason is price. Google charges $50 a year for each person using its product, a price that has not changed since it made its commercial debut, even though Google has added features. In 2012, for example, Google added the ability to work on a computer not connected to the Internet, as well as security and data management that comply with more stringent European standards. That made it much easier to sell the product to multinationals and companies in Europe.
via Google Apps Moving Onto Microsoft’s Business Turf – NYTimes.com.
World’s longest high-speed rail line opens connecting Beijing with southern China
The opening of the new line brings the total distance covered by China’s high-speed railway system to more than 9,300 km (5,800 miles) — about half its 2015 target of 18,000 km.
Germanys first Spam protection database
Here are 4 things that we recommend in order to stay off the UCEPROTECT-Blacklists and the Backscatterer List:
1. Do not use abusive techniques on your systems, and also tell your customers with their own servers not to do so.
The following techniques are considered abusive, even though some seem to have become very popular.
Sender callouts (also known as Sender Verify or SAV) or any other kind of Backscatter.
via UCEPROTECT®-Network – Germanys first Spam protection database.
2. Ensure that large amounts of garbage cannot be sent through your mailservers / smarthosts.
3. Ensure that your dynamic / dialups / homeusers cannot be abused as spam zombies.
4. Get clue about new customers, secure your servers and prevent open relays and open proxies at your dedicated line customers and at customers with static IP addresses.