Tuesday, November 14, 2006
Open sourcing is not a new move for Sun. Sun has been in open source for a long time now.
Its Java IDE NetBeans is open source for past 6-7 years.
OpenOffice has been open source for 5-6 years now.
Its Java application server, code name Glassfish is open source for over 1 year.
Solaris operating system is now open source as well (known as OpenSolaris). You can download OpenSolaris live CD (known as Belenix) and run it from your Laptop.
Sun was not releasing its Java Virtual Machine as open source for the longest time. The reason of this was that Sun wanted to avoid multiple forks of incompatible JVM implementations.
Since now Sun has released JVM implementation under open source, one has to pass compatibility to be called Java. But still I don't think that is enough and will stop companies/people from making their own JVM that is incompatible.
I am afraid that the fate of Java can be same as Linux.
People in on internet kept saying that IBM has won the battle in open-source and I disagree with that. IBM has just embraced Linux operating system and now cashing on that. They didn't donate their own patents or major technologies (except eclipse which is named such to indicate that it will fade the Sun's glory) to open source world. AIX operating system, the WebSphere suite, Rational Rose Suite and DB2 are still closed source products.
While Sun has donated its Solaris operating system to open source. It has given revolutioning technologies such as DTrace, containers and ZFS to open-source world. it has even open-sourced its Sparc chip architecture (known as OpenSparc).
Sun is not into Software business and they are not into Services business either. They want to make money by selling boxes (hardware).
Sun has always been a big promoter of open source ideas but its problem is that it does not yet know how to translate the open-source model into cash flow for its business.
Monday, May 08, 2006
Few days ago I came to know that Sun Engineering has released a OpenSolaris live CD/DVD called "Belenix". So I decided to give it a try.
Since OpenSolaris platform is not targeted for personal computing use, there is no point in installing it on a laptop. But for enthusiast developers, Belonix Live CD should give an opportunity to try and learn new features of Solaris.
As of today Belonix comes with following applications/tools
# Xorg 6.9
# Supports KDE and Gnome2.14 desktops
# DTrace Toolkit Guide
# Mozilla Firefox Browser v1.5
# Thunderbird EMail client v 1.5
# ImageMagick and Gimp
# Supports ZFS
I will post more information after I try the Belonix.
Sunday, May 07, 2006
OpenDocument Format Alliance is a coalition of more than 35 organizations from across the world whose goal is to enable governments and organizations to have direct management and greater control over their documents. The alliance—whose supporters include many of Microsoft's Linux and open-source foes such as Corel, IBM, Novell, OpenOffice.org, Opera Software, Oracle, Red Hat and Sun Microsystems—is essentially positioning the XML-based ODF (OpenDocument Format) as the alternative to other document formats like Microsoft's OpenXML, which is the new file format that will be used in Office 2007 when it ships later this year.
Industry should thank to Sun Microsystems for giving up control of the format and allowing it to evolve in a real community way in OASIS under an open process.
The standard will give vendors a baseline for file format and allow them to compete on implementations rather than competing on incompatible standards. This will give customer options to choose from different products without worrying about incompatibility of files.
This event is an important step in the effort to help customers to find a better way to preserve, access and control their documents now and in the future without having to depend on a single vendor.
For more information about this event, please read eweek article.http://www.eweek.com/article2/0,1895,1957321,00.asp
Tuesday, May 02, 2006
Monday, April 24, 2006
Whenever you connect your computer to Internet, your computer is exposed to millions of different attacks. The result of these attacks could be infection with new viruses, adwares / spywares, stealing your personal information, stealing your identity, sending spam, using your machine as source of attack on other machines on Internet and worse.
If your have broadband Internet connection, you are even more vulnerable to all those attacks as your computer is connected to Internet all the times.
What are these attacks?
The attacks to computer are done in several different ways.
Malicious small programs that easily replicate themselves, infect your computer, and often spread to others' computers via email attachments or network traffic.
Virus programs can delete files, format disks, attack other computers or just make your system run slowly. They can also create a "back door" that allows a hacker to run programs on your computer or to access into your files.
A computer infected with a virus may suddenly act in unexpected ways. For example, it may take longer to access files or to start up programs, or it may lock up often. You may also notice uncommon sounds being played from your speakers, a variety of images popping up on the screen, or problems starting your computer. These are all signs that your computer could be infected with a virus.
The term "phishing" (pronounced "fishing") refers to a form of fraud that uses e-mail messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information. The e-mail message typically includes a link to a fake Web site that appears identical to a legitimate page. The fake Web page is used to collect the requested information. This information is then used for fraudulent purposes.
Once personal or account information is obtained, "phishers" may access your bank or credit card accounts, open new accounts in your name, or cash counterfeit checks on your account. For more information, see Identity Theft.
Spyware is software that gathers information about your Web-surfing habits for marketing purposes. Spyware "piggybacks" on programs you choose to download. Tucked away in the fine print of user agreements for many "free" downloads and services is a stipulation that the company will use spyware to monitor your web habits for business research purposes.
Spyware takes up memory and space on your computer. It can slow down your machine, transmit information without your knowledge, and lead to general computer malfunction. One of the most widely-used Web browsers, Internet Explorer is especially susceptible to spyware-related problems. You may choose to keep certain spyware programs on your computer in exchange for the free services that accompany them, but you should be aware of how that might affect your computer.
Adware is a component in software applications that displays ads while the program is running. For example, adware is included with web-based email programs that give you free email in exchange for viewing ads. Adware "piggybacks" on programs you download from the Internet. Tucked away in the fine print of user agreements for many "free" downloads and services is a stipulation that the company will use adware to post advertisements on your computer.
Adware takes up memory and space on your computer. It can slow down your machine, transmit information without your knowledge, and lead to general computer malfunction. You may choose to keep certain adware programs on your computer in exchange for the free services that accompany them, but you should be aware of how that might affect your computer.
Spam is unsolicited commercial email (from legitimate or illegitimate sources), recognizable by its suspicious subject lines and unexpected or unknown sender.
For the most part, spam is an annoyance. Spam often contains questionable content and may include attachments that contain viruses.
Identity theft occurs when someone uses your personal information (i.e., your name, Social Security Number, credit card number or other identifying information) without your permission, usually to commit fraud or other crimes.
Daily activities such as writing checks, charging an item to your credit card, and forgetting to log off your computer system can increase your risk of identity theft. Victims of identity theft often have to spend lots of time and money cleaning up their personal and financial records. In the meantime, they may be refused loans, housing or cars, or even get arrested for crimes they didn't commit.
How to protect your computer
Use secure and more stable operating system
You should pick operating systems based on the priority sequence as shown in following list. Note Macintosh is not mentioned in following list because it installs only on Apple machines.
- Secure Linux: If possible use Linux (with enhanced security) OS.
- Windows XP: If you can not use Linux, then use Windows XP with internal firewall enabled.
- Windows 2000: Use Windows 2000 as last resort. Always install firewall and antivirus software before connecting your machine on Internet for first time.
- Absolutely no to Windows ME, Windows 98 or any predecessors.
Use antivirus software
Anti-virus software protects email, instant messages, and other files by removing viruses and worms. Anti-virus software downloads new virus protection updates to protect against new threats. It also quarantines infected files to keep a virus from spreading on your computer and can repair infected files so you can use them without fear of damaging your computer or spreading a virus to others. If you use windows based operating system, you should always install good antivirus software. Following are options of good antivirus softwares
- Norton antivirus
- McAfee antivirus
Keep antivirus software updated
New viruses are born and spread through Internet everyday. If your antivirus software's virus database is old, it will not be able to protect you from new viruses. You should regularly update virus definition for your antivirus software.
Regardless of operating system, you should have firewall enabled on your machine. Linux already comes with firewall, so you don't need to install any additional software but you should make sure that your firewall is enabled and configured correctly. Windows XP also comes with firewall but might not be enough to protect you from all attacks from Internet. You should always get additional firewall software for windows and install it on you machine. Following are the options of good firewall software
- Symantec/Norton Personal Firewall (commercial)
- McAfee personal firewall (commercial)
- ZoneAlarm (Free but very restrictive)
Install OS patches and updates
Always keeps your operating system updated. This applies to both Linux and Windows based operating systems.
Use Mozilla FireFox as alternative to Internet Explorer for browsing Internet. The FireFox provides several features (e.g. popup blocker) and extensions (e.g. adblock, spoofstick etc.) to block unwanted contents from Internet. It has less security holes compared to Internet Explorer. Firefox is also available for Linux and other operating systems.
Use Mozilla Thunderbird as alternative to Outlook or Outlook Express for receiving or sending emails. The Thunderbird provides several features (e.g. popup blocker) and extensions (e.g. adblock, spoofstick etc.) to block unwanted contents in email. It has automatic SPAM filter. It support PGP plugin to encrypt your emails. It has less security holes compared to Outlook Express. Thunderbird is also available for Linux and other operating systems.
Use PGP (Pretty Good Privacy) to encrypt your outgoing emails. GPG (Gnu PG) is open source implementation of PGP and can be easily integrated with Thunderbird email client.