Cutting The Cable

In Today’s Market You Can Cut The Cable Easily With The Open Capabilities Of The Internet. Which Is Replacing The Overpriced Cable And Satellite Subscriptions That Have Dominated The Market For Many Decades. There Are Many Digital Media Players Which Cost Very Little Money And Can Even Be Built From Scratch. Which Can Do A Lot More Than What Your Current Cable Or Satellite TV Provider Has To Offer.

There Are Many Examples Of Digital Media Players Some Are More Common Than Others. But Most Of These Common Devices Are Proprietary. Which Don’t Allow You To Tinker With The Hardware Or Software. But If You Do Than You’ll Void The Product Warranty And Won’t Be Able To Return It For A Full Refund If It’s Been Broken For Whatever Reason. Also Their Are Non Proprietary Digital Media Players Some Of Which Are Manufactured And Other Devices Require Some Do It Yourself Manufacturing. But With The Non Proprietary Devices You Can Fuck With Them One Way Or Another And Comes With No Product Warranties.

Digital Media Players (Proprietary)

Roku

Amazon Fire TV

WD TV

Apple TV

Google Chromecast

Digital Media Players (Non Proprietary)

CuBox TV

Vero TV

There Aren’t Very Many Pre Manufactured Open Source Digital Media Players On The Market. The Majority Of Them Are Found On Auction Websites Like EBay Or Amazon Sold By People Who Are Mainly Computer Hobbyists Or Small Companies. Who Have Taken Ordinary Common Computing Devices And Turn Them Into Digital Media Players.

Do It Yourself

There’s Plenty Of Dedicated Open Source Media Streaming Software On The Internet, Some Of Which I’ll List Below And Is Currently Up To Date. From Their You Can Either Modify An Existing Computer To Run Any Media Streaming Software Or You Can Buy Yourself A Raspberry PI Computer Board For Roughly $35 American And Make Your Own Device.

openelecrasplex     xbian   osmc

All You Need To Do

Purchase A Raspberry PI 2 Model B With Either 512 MB Or 1 GB Of Memory From The Links Below Or Do A Web Search To Find Out If You Can Buy One In Your Area. Make Sure To Get The Proper Accessories In Order For The Raspberry PI To Be Fully Functional. This Includes An SD Card, Power Cord, Two USB WIFI Dongles, USB Keyboard/Mouse And A Case So That It’s Not Exposed To The Elements. This Can Be Purchased Separately Or In A Bundle From The Suppliers Listed Below.

Video Tutorials

Enjoy

Linux Distributions For Beginners

Whenever You Decide To Switch Over To Linux At Some Point. Just Remember That Ubuntu And It’s Clone Distributions Are Very Unsecure And Contains Malware, Spyware & Software Backdoors.

There Are Many Linux Distributions For Beginners Out There On The Open Internet But In This Case I’ve Narrowed Down Some Reasonable Easy To Use Distributions. For People Who Want To Transition From Windows 8.1 Or OSX Yosemite And For Those Who Want General Purpose Computing But Don’t Have The Financial Resources To Afford It (Aka Students Etc).

korora linuxrobolinux

sabayonkwheezyhandy

Tesla Cars, Space Technology, And BitTorrent: Why Monopolies Suck

By Rick Falkvinge | June 16, 2014 | Torrent Freak

This Week’s Most Exciting News In Technology Was Undoubtedly That Tesla Cars Declares That All Their Patent Monopolies Are Free For Anyone To Use. What Does It Mean? Let’s Compare To BitTorrent.

When Bram Cohen Created The BitTorrent Protocol, He Had The Legal Option Of Filing For A Patent Monopoly On Any Computer Program That Used This Protocol. (The Mere Existence Of Such An Option Is A Very Bad Thing, But We’ll Be Returning To That.) Mr. Cohen Chose To Not Monopolize The BitTorrent Protocol In That Way. Let’s Examine What Implications That Would Have Had For The Technology.

If The BitTorrent Technology Would Have Been Protected By Patent Monopolies, It Would Have Been Effectively Limited To Mr. Cohen’s Original BitTorrent Client. Have You Used That Client? Do You Know Anybody Who Has Used It? Didn’t Think So, And Neither Do I. Instead, There Is An Enormous Plethora Of Clients And Servers That Use The Protocol Today, And Mr. Cohen’s BitTorrent Inc. Is Valued At Eight-Digit Dollars. Not To Mention The Fact That BitTorrent Inc. Was Subsequently Able To Buy One Of The Most Prolific BitTorrent Clients Out There, µTorrent, Which Would Not Have Existed Had The Technology Been Monopolized In The First Place. I Think Most Of Us Have Used µTorrent – I Know I Have.

This Shows Exactly Why It Makes So Much Sense For Tesla Cars To Release All Of Their Patent Monopolies Into The Wild, And Why The Patent Monopoly System As Such Is Enormously Harmful (The Only Industry To Make A Net Profit From It Is The Pharma Industry, And That’s Because They’re Heavily Subsidized With Taxpayer Money). Tesla Cars Relinquishing Their Monopolies Means They See This Mechanism, And That They Realize They Need An Ecosystem To Flourish Around Their Technology – The Electric Car Technology – In Order To Remain Viable Themselves. Put Another Way, It’s Not About The Size Of The Pie Slice: Monopolies Are Preventing The Pie Itself From Growing Exponentially, As They Do With Any New Technology Poised To Disrupt The Old Ways.

Just Like BitTorrent

Patent Monopolies Are Far Worse Than The Copyright Monopolies We Deal With (And All Break) On A Daily Basis. Imagine For A Moment If Copyright Monopoly Vultures Didn’t Care If You Had Made An Actual Copy, That You Would Be Just As Guilty Of Infringement Even If You Had Never Seen Or Heard Of The Original? That’s How Patent Monopolies Work, And That’s The Key Difference Between Patent Monopolies And Copyright Monopolies: The Latter Protect A Specific Expression Against Copying, The Former Protect An Idea Or A Form From Being Utilized Anywhere, Even Independently. It’s Also Why Patent Monopolies Are Much, Much More Harmful Than Copyright Monopolies (And That’s Saying A Lot).

But As The Tesla Example Shows, Patent Monopolies Don’t Stop At Not Making Sense As A Whole. They Also Don’t Make Sense To A Single Company In Isolation, As They Prevent An Ecosystem Taking Shape. It’s One Of The Worst Cancers In The Economy, As Investors Describe Them Today.

It’s Easy To Argue That Patent Monopolies Don’t Hit Ordinary Families In The Same Way About To Change With 3D Printing, Where Rapid Fabrication Becomes Available To The Masses. It Is – Unfortunately – A Safe Prediction That People Will Soon Be Sued Out Of Their Homes Merely For Manufacturing Their Own Pair Of Slippers, Because It Violated A Design Patent Monopoly Somewhere. Such A Notion May Seem Ridiculous Today. Then Again, So Did Everything Else We’ve Seen With The Copyright Monopoly So Far, And Patent Monopolies Are Guarded Far More Harshly.

The BitTorrent Legacy Doesn’t Just Show Us How To Break The Copyright Monopoly In A Specific Case. It Gives Us A Blueprint For How To Disrupt The Old Ways In General By Ditching Legal Monopolies, A Blueprint That Tesla Cars Is Now Choosing To Follow.

The Patent Monopoly Wars Are Coming, Right On The Heels Of The Copyright Monopoly Wars, As Were They Merely A Logical Extension. That’s Why It’s So Encouraging To See Our Tip-Of-The-Spear Entrepreneurs Denouncing And Releasing Their Own Monopolies Right Ahead Of These Battles With Corporate Lawyers.

As A Final Note, It’s Noteworthy That Tesla Cars Isn’t The Only Company That Elon Musk Is Running. He’s Also At The Helm Of SpaceX. Space Technology Has Been Ridiculously Proprietary Up Until Now, Nothing Cooperating With Anything Else And Everything Being Custom-Built Single-Use. That’s Why It Makes Me Enormously Excited To See An Entrepreneur Who Understands The Damages Of Monopolies At The Forefront Of Space Technology Today.

It Holds A Promise Of Standardized, Interoperable Space Technology. As In, “For All Of Us”. Like BitTorrent.


Economics, As A Branch Of The More General Theory Of Human Action, Deals With All Human Action, i.e., With Mans Purposive Aiming At The Attainment Of Ends Chosen, Whatever These Ends May Be. ~ Ludwig Von Mises

Mans Striving After An Improvement Of The Conditions Of His Existence Impels Him To Action. Action Requires Planning And The Decision Which Of Various Plans Is The Most Advantageous. ~ Ludwig Von Mises

Underlying Most Arguments Against The Free Market Is A Lack Of Belief In Freedom Itself. ~ Milton Friedman


Linux & BSD Desktop Operating Systems With Support For Hard Disk Encryption

Disk Encryption Is Not Something Most Personal Computer Users Think Of When They Consider Ways To Boost The Security Profile Of Their Computer. A Firewall? Yes, That In The Minds Of Most Is What Computer Security Is All About. However, A Firewall Is A Network Security Tool, And It Is Useless If Your Computer Is Lost Or Stolen. That Is When Disk Encryption Comes Into Play. And If You Truly Care About Guarding Access To Your Data, Encrypting The Hard Drive Holding Your Data It Is Just As Important As A Firewall.

So, How Does Encrypting A Hard Drive, Protect Your Data?

Well, If A Hard Drive (Or The Most Important Part Of It) Is Encrypted, The Computer Will Not Boot Completely Until The Passphrase Or Encryption Key Used To Encrypt The Hard Drive Is Specified Correctly. Even If The Hard Drive Is Removed From The Original Computer, The System Will Not Boot If The Encryption Key Is Not Specified. That Is How It Protects Your Computer (And Data) From Unauthorized Physical Access.

The First Two Images Show What Happens When A Computer With An Encrypted Disk Boots Up. This One Is From Mandriva, One Of Seven Distributions Listed In This Article.

manslvm21-550x412

And This One Is From Sabayon, Also One Of The Seven. Whether The Interface Presented Is Graphical Or Full Of A Bunch Of Text, The Effect Is The Same. Without Specifying The Encryption Key, You Cannot Login. And If Your Lose The Computer, Or Someone Steals It, Or If An Agent Of Your Government Seizes It, They Will Need The Passphrase From You To Log In. That Depends On Whether Or Not You Want To Give To Them Or Not, Is Whole Other Matter In Itself.

The Focus Of This Article Is On Distributions With Graphical Installation Programs. When Installing Such Distributions, The Installer Only Allows You To Specify One Passphrase Or Encryption Key. However, You May Configure Seven More (For A Total Of eight) After Installation. How To Manage Disk Encryption Passphrases And Key Slots, Explains How.

1. CentOS: Community ENTprise Operating System, Is A Multi-Purpose Distribution Based On Red Hat Enterprise Linux. It Uses The Anaconda Installer, Also Used On Fedora And Sabayon. It Uses LVM, The Linux Logical Volume Manager, As The Default Disk Partitioning Scheme And To Install It On An Encrypted Disk, All That Is Required Is To Select The “Encrypt System” Option At The Disk Partitioning Methods Step.

2. Debian: Is A Grand Daddy Of Linux Distributions. It Has An Automated Partitioning Mode That Encrypts A Disk When Setting Up LVM. And, Of Course, You Can Also Encrypt The Disk Without LVM.

3. Fedora: LVM Is The Default Disk Partitioning Scheme On Fedora, And Like Debian, Fedora Makes It Very Easy To Encrypt A Disk. Just Select The “Encrypt System” Option At The Disk Partitioning Methods Step And The Installer Will Encrypt The Physical Volume.

Even With The Physical Volume Encrypted, You May Also Encrypt The Logical Volumes. And Like Debian, If You Choose To Not Use LVM, You Can Still Encrypt The Target Disk.

4. Mageia: Is A Fork Of Mandriva, And Uses The Same Installation Program. Unlike Debian And Fedora, It Does Not Have An Automated Encrypted LVM Option, But You Can Still Configure Encrypted LVM Manually.

And Without LVM, You Can Still Encrypt The Disk Or Disk Partitions.

5. Mandriva: The Installation Program On Mandriva Is The Same One Used On Mageia. LVM And Non LVM Encryption Schemes Can Be Configured. Just As The Other Listed Distributions (Which May Require Root Access In Order To Be Configured)

6. PC-BSD: The Most Popular BSD Desktop Distribution, Based On Free BSD. In The Last Stable Release (PC-BSD 9.1), Individual Partitions Or Slices Can Be Configured For Encryption.

In Snapshot Releases Of PC-BSD 9, An Option At The Disk Configuration Step Provides An Automated Encryption Mode For The Configured Partitions. Unlike The Linux Distributions In This Article, PC-BSD’s Installer Can Auto Generate The Encryption Key, Besides The Option To Specify One Manually. If You Are New To PC-BSD, How To Install PC-BSD On An Encrypted ZFS File System Is A Good Article To Read.

7. Sabayon: Is A Multi Purpose Linux Distribution Based On Gentoo, But Uses A Slightly Modified Version Of Anaconda, The Installation Program On Fedora.

Sabayon

Bitmessage – Decentralized Email Networking

Bitmessage Is A P2P Communications Protocol (Similar To That Of Bitcoin Or Bittorrent) Which Sends Encrypted Messages To Another Person Or To Many Subscribers. It Is Decentralized And Trustless, Meaning That You Need Not Inherently Trust Any Entities Like Root Certificate Authorities. It Uses Strong Authentication Which Means That The Sender Of A Message Cannot Be Spoofed, And It Aims To Hide “Non-Content” Data, Like The Sender And Receiver Of Messages, From Passive Eavesdroppers Like Those Running Warrantless Wiretapping Programs.

It Sends Messages Like A Typical Email System. Except It Doesn't Allow For Sending Photo's Or Images To Other Users

Bitmessage 4

Bitmessage 7

Bitmessage 8

Compiling Instructions Can Be Found Here Via The Bitmessage Project Page: https://bitmessage.org/wiki/Compiling_instructions

Please Note That Bitmessage Is Only Available For Linux And Windows Users At The Present Moment. However It Maybe Possible In The Coming Months That The Code Could Be Ported To For Mac OS X Users.

Eight Speciality Purpose Linux Distributions

The Beauty Of A Linux Distribution Is That It Can Be Customized To Do Almost Anything You Want. As Long As You Have The Time And The Desire To Do It. Many Popular Linux Distributions Today Was A Result Of Individuals Or Group Of People Who Were Dissatisfied With The Current Options Available (People Like Myself). Lets Look At Some Of Those More Popular Special Purpose Linux Distributions Out There.

1. Parted Magic OS Is A Disk Partition/Repair Distribution That Supports More Than A Dozen File Systems And Utilities To “Move, Copy, Create, Delete, Expand & Shrink Hard Drive Partitions. Clone Your Hard Drive, To Create A Full Backup. Test Hard Drives For Impending Failure. Test Memory For Bad Sectors. Benchmark Your Computer For A Performance Rating. Securely Erase Your Entire Hard Drive, Wiping It Clean From All Data. Gives Access To Non Booting Systems Allowing You To Rescue Important Data.

Parted Magic OS

2. SystemRescueCd Is Similar To Parted Magic But It Goes A Few Steps Further And Allows To Repair And Recover A System After It Crashes. Sys Admin Tools Include File Recovering, Antivirus/Rootkit Scanner, Resetting Windows Admin Password, Compressing And Backing Up Existing System (To Name A Few).

System Rescue CD

3. Kali Linux Is A Penetration Testing Distribution That Tests Network And Computer Security Using Different Type Of Tools Including: Information Gathering, Vulnerability Assessment, Exploitation Tools, Privilege Escalation, Maintaining Access, Reverse Engineering, RFID Tools, Stress Testing, Forensics, Reporting Tools.

Backtrack Linux

 

4. Scientific Linux Is Based On Red Hat Enterprise Linux And A Collaboration Between Fermi National Accelerator Laboratory And The European Organization For Nuclear Research (CERN). As The Name Suggest, The Distribution Is Geared Towards Scientists And The Projects They Engage In.

Scientific Linux

5. Tails A Debian Based Live Distro That Includes TOR, Crypto And Secure Deletion Tools For The Paranoid Amongst Us.

Tails Linux

6. LinuxCNC Is A Software System For Computer Control Of Machines Such As Milling Machines, Lathes, Plasma Cutters, Cutting Machines, Robots, Hexapods.

Linux CNC

 

7. VortexBox A Fedora Based Distro Can Be Used As A Music Server/Jukebox. It Can Rip CDs To FLAC And MP3 files, ID3 Tag The Files , And Download The Cover Art. Vortexbox Will Then Serve The Files To Network Media Players Such As Logitech Squeezebox, Sonos, Or Linn. The Music Files Can Also Be Streamed To A Windows Or Mac OS X System.

Vortex Box

8. Jondo Live-CD/DVD Offers A Secure, Pre Configured Environment For Anonymous Surfing And More. It Is Based On Debian GNU/Linux And Developed Much Like Tails, With A Few Minor Differences. The Live System Contains Proxy Clients For JonDonym, Tor Onion Router And The Remailer Mixmaster. The Built In JonDoBrowser Is Pre Configured For Anonymous Web Surfing, Thunderbird With Enigmail For E-mails, Pidgin For Anonymous Instant Messaging And Chat, Parole Media Player, Metadata Anonymisation Toolkit For Cleaning Documents And Images And More Application Are Part Of The Live CD.

japmain