Wednesday, June 28, 2006

High School Musical Tooth Brush

Stallman invites young French people to go out against DRM law that favors

June 27, 2006 (IDG News Service) -

http://computerworld.com/

The Free Software advocate Richard Stallman invite young French people to protest against the draft law on copyright is being discussed in parliament this Friday.

This law threatens their freedom to watch DVDs (CDs with movies, music and other information) using free software and is designed to make French citizens to surrender to the will of media companies, he said, opening the conference Paris Capitale du Libre ", on Monday night.

When asked what could stop the law, Stallman said, "Young Miles French in the street. "

These young people, however, have little time to organize their protests, since Friday is the last day parliamentary session before the long summer vacation. Both houses of the French parliament will vote on the law that day: The Senate in the morning, the National Assembly in the afternoon. The law, officially called "Copyright and Related Rights in the Information Society", is also known by its initials in French, DADVSI.

Stallman, president of the Free Software Foundation, Inc., won over his audience in Paris to address them in French.

"I can tell the software free in three words: "liberté, égalité and fraternité," he said. Freedom, because free software gives everyone 4 freedoms that do not have with proprietary software, Equality, because it gives everyone the same freedoms, and brotherhood, because they all belong to the same community of interests, he added.

other hand, also said the slogan of (some) users of open source Linux operating system could be "gain, reliability and efficiency."

Faced with a choice between reliability and freedom, Stallman said that he would choose freedom, because free software, one of the freedoms that a user has the freedom to fix errors source code to make it more reliable.

"Those who do not recognize freedom are on track to lose," he added. "What we see here with this Act DADVSI."

"It will be illegal to watch DVDs using free software," he said, because of the provisions of the law about the software that implements DRM (digital rights management, digital rights management).


Stallman mocked those who rely on the requirements that companies using DRM technology provide the information necessary for others to develop interoperable DRM systems.

"Many people say that DRM, wives (such as those used by the police) digital are acceptable always operating at full steam. 'We can go everywhere in handcuffs. All computers use the same wives' (say those people). It is clear that this is not the solution. "

The law allows citizens to ask a court or tribunal that ordered him to companies that can provide information about their DRM systems, but does not say whether they should do so under a no confidentiality agreement, ANC, he said. "If they are allowed to provide such information at an ANC, then it is not possible to develop free software using the information," he added, given that the ANC would prohibit the release of source code.

"The Just because you do not have an application for watching DVDs could pose a major obstacle to the progress of GNU / Linux. If they are forbidden to provide that application, people who do not appreciate freedom itself, not want to use GNU / Linux for that reason, "he said.

" To defend freedom, you have to appreciate it. To appreciate it, you have to recognize it. But in our community, many people have not learned to recognize freedom. In the open source world is not about freedom. So I talk about it whenever I can, "he concluded Stallman.

Saturday, June 24, 2006

Create Your Own Wwe Belt Online

Quiet please!. Seven ways to avoid distractions

· Place a clear warning DO NOT DISTURB, or any obvious sign that you are busy. Insist that your colleagues respect you.

· Arrange office furniture so that your desk does not look at the flow of people, so that no one can catch the eye.

· always stand up to speak to someone who is interrupting, so they know what they are doing.

· Put a big clock in view of visitors and review it while speaking.

· Stay alert: If an interruption is seen as more than 2 minutes, add it to your list of things to do and then do what he was doing.

· Keep a notebook open in front of you and write down what you are doing as soon interrupted.

· If you cut 2 cm to the front legs of a chair, that makes it uncomfortable enough for visitors to make short visits.

Sources: New Scientist and Guardian Newspapers Limited 2006.

Baby Phat Silver Bracelet

me alone! ... Computer

The average worker spends 2 hours a day answering calls, emails and pointless questions. We asked Tim Dowling, in The Guardian, to write about it - and then we are dedicated to stopping.

Tim Dowling
Friday, June 23, 2006.

Freely translated by Jacinto Dávila.

The morning starts with a black screen. In fact, begins with a warning saying my computer that is - we - in great danger because we do not have antivirus installed, but if we have it. Then comes the announcement of AOL that I put up with me every morning since I bought this computer, but I checked the box that says "Do not show me this again" every morning since I bought this computer.

According to a study reported by New Scientist, this type of distraction naive - emails, calls from colleagues and friends, people dropping by, messages generated by the computer - it takes away more than two hours in a typical workday. Researchers at the University of California found that drizzle Interrupt workers leaves them less than ...

heck, I have 6 mail messages, most Web sites comes from those whose daily summaries I've never subscribed. It's just that my attempts to unsubscribe have not been sufficiently rigorous. One of the first post is one of many "how are you?, Of the person who commissioned this article. I do not want to say that I've spent almost 30 minutes weighing several offers online access to the New Scientist, before my fill and decide it would be easier to go out and buy a copy (NT: lucky ones who can make that.) Then someone from the newspaper called me to talk other things. Where was I?.

Ah, yes. Workers on the culture "always online" today are so hard to concentrate on their main task that many believe they are suffering from attention deficit disorder. I think that's true. At least, that's the impression I left after the pre-trial speed reading the article, but when I returned a little later to find that part of the comment like that .. Wait, is your phone.

I apologize. Fortunately, I detected the instant the sound of an unsolicited sales call like that buy it now, and hung in one blow. I got rid of them before they could say "hello." Meanwhile, anti-virus my computer does not know you have, it has to download some updates. But back to my theme, the complaints of these workers are not very consistent. In fact, the study showed that due to these various distractions, their periods of sustained, uninterrupted, lasting on average only 3 minutes. Another study, produced by the Institute of Psychiatry last year found that the constant interruption of emails and phone calls had a greater effect on IQ than smoking marijuana.

The effect of all this distraction can be severe. Once your attention is interrupted, it takes time for re-adopting its previous line of thought. If you are interrupted while trying to remember what it was supposed to be doing, it is best to leave it off. The University of California found that over 20% of interrupted tasks would not be resumed the same day. The doorbell rang. I'll be back.

was the photographer who came to take my picture for this article, looking distracted while I'm in my letter writing nonsense, some of which will be here anyway. The phone rings while I pretend to talk about it. The guy says, "Is this the ULA FM?". Just when the photographer leaves, I get an email from my wife, who is on the ground floor. It says "Can you print this?". So I called and of course reply, screams me. So let me print what it is and I promise I will return to this topic with a new idea .. I, I - my wife comes up the stairs ..

Before our daily life interrupted our work. Now our work interrupts our work. We have become slaves of the communications technology that was supposed free us of the desire for office, travel, and meeting face to face with those nasty co-workers. There is hope, however, that technology to the rescue again. Communications software designed to prioritize and assess your "interruptibility" is currently being tested by Microsoft (NT: Ja, Ja, Ja, Ja, Ja, Ja!). Could become the electronic equivalent of an executive secretary, isolated from unnecessary or unwanted intrusions.

But the real question is not how we prioritize these interruptions. The real question is .. What am I doing standing here in the garden?. Remember someone knocked on the door with a package and then I talked to someone on my cellphone. I received the first "When you think you can go through here?" Call in the afternoon. Then the dog wanted to go out and refused to accept my pledge later. I also see that I have a bit of thread wound on my finger, recordarde of .... What?

Ultimately, blame technology for all these interruptions or, indeed, ask Him to save us, may be all wrong. Although it is certainly easier to interrupt someone with e-mail than in person, the study by the University of California, found half of the distractions we experience on a typical day of work, are self-inflicted: sending emails, calling, playing with the trash, bothering busy colleagues, or in my case, watching every program from my house, your house , complete.

Back in my office, there are several emails from various companies who have ordered several products, all telling me that I have come to some intermediate stage of the transaction negligible. I get the second "When you think you can go through here?" Call in the afternoon. I looked around for the bit of paper on which half garabatié that brilliant idea I had for the last paragraph. My wife calls me from a shop to ask if I want a new shirt what point did that woman?. You may leave the slip below.

not find it anywhere. But for some reason, I'm back in the garden, listening to the distant ringing of my phone in the office and watching the matica tomato is like hanging on one side. I think he wants to fix it. Ah .. for it must be the bit of wire that was carrying while.

Car Counter Offer Sample

"confident"

LinuxUser
www.linuxuser.co.uk - June 2006.

Written by Jeremy Allison

One of the most disturbing news of recent days was to see the Chinese president, Hu Jintao, meeting with Mr. Bill Gates at the Gates mansion, even before the President Bush. A smiling Jintao mentioned as the operating system used by Mr. Gates every day, while Bill promised to help with technical support. But apparently, Bill Redmond and people could be helping more than simple technical support, and not just to help the Chinese government. Let

a small diversion to 1982.

The largest non-nuclear explosion ever recorded by satellite took place in Russia in 1982. It was a blast in a pipeline in Siberia. The disturbs and little known truth about this disaster was that it was caused directly by the CIA after having deliberately modified software to the Soviet Union (in binary form only, of course). Software that was designed to destroy the aqueduct.

you may think it's another paranoid fantasy (and certainly sounds like I know), but this was documented in the book "At the Abyss: An Insider's History of the Cold War", by Thomas C. Reed, former Secretary of the Air Force, who served on the National Security Council, and was also reported by the Washington Post in 2004, and even mentioned in a magazine article CIA's "Studies in Intelligence."

This was not simply an attack on the Soviet Union, but also affected gas prices in Western Europe (the pipeline was designed to transport gas to Europe), all as a side effect of attempts to disrupt U.S. Soviet foreign exchange earnings.

I wonder if the Chinese consider this part of history. Judging by his inclination to run Windows on their infrastructure, and the recent promises of PC makers in China to include "Windows Genuine" on PCs shipped from China, seems not.

This single incident of a software only in binary, causing enormous economic damage study should be mandatory for the decision makers of any nation that might have conflicts of interest with the U.S.. That's all the rest of the world, in case you were wondering. Furthermore, this normally very docile pet Americana, the United Kingdom, has rejected the control software only in binary, for the new joint fighter manufacturing, and have threatened to cancel the order if you do not access the source code.

Perhaps it is that the UK is not as docile as it sounds, since the British militarres seems to understand the need to control the software in at least some critical parts of their infrastructure.


So, who can you trust in computing? and Why?.

I love to say that open source companies are reliable because you get the source code, whereas proprietary source companies are not trusted because the source code is unavailable. But not so simple. Microsoft announces widely

that will give the source code for Windows to China and any country that complains about the possibility of such threats by way of binary code only.

Are you hoping for a Linux distributor will say NO to the U.S. government if asked (nicely, desde luego) que colocaran una puerta-trasera a las imágenes binarias de Linux que se entregan como parte de su producto?

¿Quienes de nosotros, de hecho, usan el código fuente, tan gentilmente incluido en los CD adicionales, para compilar su propia versión?.

Con Windows, desde luego, ya hay tantas puertas traseras, conocidas y desconocidas, que el gobierno de los EE UU quizás ni se molestará de pedirle nada a Microsoft. Puede que ya hayan conseguido una, lista para ser aprovechada a su antojo.
¿Qué hay de Intel o AMD y el microcódigo que viene en el propio procesador?.

Aún con acceso al código fuente de Windows, todavía no es digno de confianza, unless you compile it yourself and you just install the binary versions that you create on your own machine.

have a source claiming to be the one corresponding to a software product does not prove anything about the binary version of the product you are using, unless you have created you by yourself. How many versions of Windows, installed on computers from the Chinese Government were in fact compiled by the Chinese themselves?. No, it's my bet.

The same applies, of course, for the United Kingdom.

What this means is that many governments around the world that accept binary packaged software for software companies in the United States, are at the mercy of intelligence services of the U.S. who might have decided to add "little something extra" to the code. If you think I'm getting paranoid, talk to the Russians.

For completeness, however, for the truly paranoid, you even compile the code itself is NOT sufficient to ensure that you get "trusted" computing. In his article
fundamental
1984, "Reflections on Trusting Trust" (Reflections on trusting trust) Ken Thompson, one of the original authors of Unix, tells the story of how he hack the system C compiler Unix, the software used to create the new binary from source code, add a completely undetectable backdoor to Unix. Once assembled, there was no trace of the back door that said none of the source code available for Unix públicamentes. It was cleverly hidden in the binary and was designed to reproduce and spread itself in any new binary created in the system.

That was a theoretical attack. It is not something that actually did, but something that could have done. At least that's what I expect, but I am inclined to trust him.

The only way to get reliable code you are designing the processor itself (Yes, there may be backdoors in the microcode of the processor as well as in binary code) write their own compiler and audit all open source code you created it for use in their command and control systems. Anything else is to trust in untrustworthy.


I leave you with some words from the article by Ken Thompson that are as true today in 1984 com. "The moral is obvious. You can not trust code that you did not create it yourself (especially code companies that employ people like me). No amount of source code verification or scrutiny will protect you from using untrusted code. To prove the possibility of these kinds of attacks, I chose the C compiler I could have chosen any programs that manipulate other programs, such as an assembler, un cargador o incluso el hardware del micródigo. En la medida en que el nivel de los programas baje, esos gazapos serán más y más difíciles de detectar. Un gazapo instalado en el micródigo será casi imposible de detectar".

Jeremy Allison es desarrollador líder del Equipo Samba.

Traducido libremente por Jacinto Dávila.

Tuesday, June 20, 2006

Brent Corrigan And Everett

The June 21: Day for a GE Free Latin America

Por Lorna Haynes
CENTINELA

Red por América Latina Libre de Transgénicos

Latin America is the largest area of \u200b\u200bagricultural biodiversity of the planet and the center of origin of many crops fundamental rights for human consumption, such as corn and potatoes. However, it is also the second region of the world in area planted to GM crops. The introduction of transgenic organisms is a serious threat to agricultural biodiversity that reservoir because it can cause an irreversible genetic pollution, and loss of this heritage of humanity, which is essential for sustainable food production. In addition, food sovereignty means subordinate to the commercial interests of large corporations.



genetically modified organisms, also called "transgenic" are new bodies created in the laboratory, whose characteristics have been altered by inserting genes from other species. Could not occur in nature and can not predict how people interact with ecosystems and what the consequences will be all over time and space. Scientific studies and field experiences show that GM crops have higher yields than natural crops, are more polluting and introduce new risks to health and the environment.

Inspired by the need for joint efforts to cope with the introduction of transgenic organisms and prevent new introductions in the region, peasant organizations, indigenous, environmental and other Latin American civil society, gathered in Quito, Ecuador, in January 1999 in Latin American Seminar on Transgenic Organisms and Biosafety "created the Network for a GM free Latin America.

June 21 was chosen as the Day for a GE Free Latin America because it coincides with the June solstice, the day of great importance among American cultures, which are held a number of practices related to the harvest of maize, potato and other crops.

Recently, in March, at the Eighth Meeting of the Parties to the Convention on Biological Diversity (COP8) held in Curitiba, Brazil, the Vice-Minister of Environment claimed on behalf of Venezuela, "the government has a firm stance against GMOs. "

However, it remains to demonstrate that strength. 4 years have passed since it was handed to Environment Minister a draft decree to ban GMOs in the country supported by over 8000 signatures. Meanwhile, despite the high-level speeches and in violation of national laws and rights in Venezuela is importing GM foods which are then placed on the nation's supermarkets. Therefore, application of the precautionary principle, and in order to protect health and the environment and defend the right and option to a GM-free food, we asked President Chavez decreed a ban on environmental release Genetically Engineered Organisms (GMOs) and the use of GMOs and their products and products containing the food and agriculture.

Monday, June 19, 2006

Tomos Nitro 150 Scooter Gear Oil Changes

The Wellcome Trust welcomes

The Wellcome Trust is a charitable organization created in the UK from the legacy of Sir Henry Wellcome to seek resources to improve human and animal health. It is a private organization with its own means of funding, but that mobilizes significant resources
http://www.wellcome.ac.uk/node7130.html
This charitable foundation is promoting the creation of a repository medical research open access to the UK. UKPMC call him to reflect that worked next to the PMC (www.pubmedcentral.gov) in the U.S., and say their goal is to create a almace'n stable, permanent and free access to digital via to the full text, refereed publications were funded by the Wellcome Trust.

One of his spokesmen said: "Ensuring that esta'n research results freely available to all is the best way to maximize their usefulness. The open access is good for science, research community and humanity."

The foundation also explains that "open access is a new model of publication in which the costs of peer review and self-publication are paid by subvensiones and research grants, rather than by subscription to magazines. We will provide (our) Fellows of the additional funds to cover the costs of processing fees their texts that require publishers of supporting the open access model. All articles published in this way estar'an freely available to all for the Web. "

http://www.wellcome.ac.uk/openaccess For more information

Monday, June 12, 2006

Where To By Fake Contacts

Open Access Website for free content definition

Taken www.linuxuser.co.uk

just been launched the new website to discuss and publish a definition for the term "free content" or free content.

" A group of advocates of free culture has created a new website to promote 'the definition of free content', parallel the definition of free software, which aims to fill the void and establish a clear definition of freedom for the artistic and literary content are not software.

founder Wikinews and Wikimedia projects, Eric Moller, and Debian developer Benjamin Mako Hill, come together in this project with Mia Garlick, known for his role as general consultant of Creative Commons and Angela Beesley, co-founder of Wikia , Inc.

respect to the goals of the project, Moller said "We believe that the highest standards of freedom should be sought for as many jobs as possible. We define this standard of freedom clearly. We will call the definition of content and free expression and the work that covers content will be free or free expression. "

More info on freecontentdefinition.org Link


Friday, June 9, 2006

Good Mid Range Receiver

Free Report. Thursday, June 8, 2006

With the radio program yesterday is available at link:
ftp://ftp.ula.ve/nux/memoria_libre/jacinto% 20080606.mp3 Continuing