Best File Search

1 de mar. de 2015

LOS USUARIOS DE CORREO DEMANDAMOS LA LIBERACIÓN DE TODAS LAS ENCOMIENDAS



Hola,
Acabo de firmar esta petición -- ¿te animas a firmarla?
AFIP - ARGENTINA: LOS USUARIOS DE CORREO DEMANDAMOS LA LIBERACIÓN DE TODAS LAS ENCOMIENDAS
Para: AFIP - ARGENTINA, http://www.afip.gov.ar/home/index.html, mayuda@afip.gov.ar, mecono@ec.gba.gov.ar, asoclegi@asoclegi.org.ar, consultas@pjn.gov.ar, http://www.aduanaargentina.com/, contacto.siace@siace.com.ar
Esta petición es muy importante, y sería estupendo contar con tu ayuda. Haz clic aquí para saber más sobre la petición y para firmarla:
https://secure.avaaz.org/es/petition/AFIP_ARGENTINA_LOS_USUARIOS_DE_CORREO_DEMANDAMOS_LA_LIBERACION_DE_TODAS_LAS_ENCOMIENDAS/?kufoqcb
Muchas gracias,

22 de feb. de 2015

Fwd: Tell Lenovo: respect user freedom and prevent future Superfishes


Free Software Foundation

Dear

Security experts have discovered a highly threatening vulnerability in software preinstalled on some Windows computers manufactured by Lenovo through January 2015. Extreme negligence on the part of Lenovo and unscrupulous programming by its adware partner Superfish seem to have caused the vulnerability.

The basis of the problem is a program by Superfish that is designed to interject advertisements into users' Web browsing. That's irritating, but it gets worse. Superfish also installs a certificate that intercepts Web traffic and cripples the host computer's ability to use HTTPS to validate the authenticity of Web sites. This leaves an open door for attackers to use fake versions of sites that should be secure -- like bank Web sites -- to steal personal information. You can read more about the vulnerability at Ars Technica.

Whenever you use proprietary software like Windows or Superfish, true, trustable, verifiable security is always out of reach. Because proprietary code can't be publicly inspected, there's no way to validate its security. Users have to trust that the code is safe and works as advertised. Since proprietary code can only be modified by the developers who claim to own it, users are powerless to choose the manner in which security bugs are fixed. With proprietary software, user security is secondary to developer control.

Recent high-profile security vulnerabilities in free software, like Heartbleed and POODLE, were created when well-intentioned developers made mistakes that were difficult to detect. But this is different -- Lenovo and Superfish caused a massive security breach for the sake of expedience in generating ad revenue.

These companies have shown such blatant disregard for the public trust that they will have to work hard to restore it. Lenovo should work with a third party committed to the public interest -- like the Free Software Foundation -- to create and sell laptops that are certified to respect user freedom and come with a preinstalled free operating system. Join us in calling for this change on social media (see our recommendations for social media platforms).

Microblog about Lenovo's Superfish vulnerability/

Regardless of what Lenovo does, you can minimize your risk of exposure to Superfish and similar threats by uninstalling proprietary operating systems and using a free GNU/Linux distribution signed by a source you trust. If you are interested in a new computer, the FSF currently certifies two retail laptops that come with no proprietary software through our Respects Your Freedom program, and you can build your own free software-friendly computer with guidance from the community-maintained hardware database h-node.

If you have used a Lenovo computer running Superfish, make sure to reset any passwords you use on the Web, as they may have been intercepted.

Zak Rogoff
Campaigns Manager

Read this online: https://www.fsf.org/blogs/community/tell-lenovo-respect-user-freedom-and-prevent-future-superfishes.

Follow us on GNU social | Subscribe to our blogs via RSS | Join us as an associate member


15 de feb. de 2015

Tribler o crear una Internet libre de censura

crear una Internet libre de censura

Tribler ofrece un servicio de estilo Youtube. Transmisión compatible con Bittorrent, búsqueda rápida, vistas previas en miniatura y comentarios.

Durante los últimos 9 años hemos estado construyendo un sistema muy robusto Peer-to-Peer. Hoy Tribler es robusto. y lo recomiendo si quieren privacidad y streaming juntos :D 





visto en: https://discuss.popcorntime.io/t/can-pt-be-able-to-use-the-tor-network/1658

This program called Tribler is much like PT as it can stream torrents but its now using the Tor Network to protect its users.
http://www.tribler.org/


mientras tanto en reddit :P una lista de clones de popcorn-time http://www.reddit.com/r/PopCornTime/comments/232xmf/a_list_of_popcorn_time_clones_and_android/

22 de ene. de 2015

Fwd: PyDay Formosa


Hola a todos allí afuera, mi nombre es Ariel y estoy en la organización del evento "PyDay Formosa". El PyDay es una jornada sobre el lenguaje Python de 1 día, con el formato de mini-conferencia pero un poco más simplificado y desestructurado, incluyendo en general charlas y talleres introductorios.
La fecha es el Sábado 14 de Febero de 09 hs. a 18 hs y el lugar es el Centro Cultural Municipal, Pringles y Rivadavia.
Quería invitarlos a todos a participar ya sea asistiendo al evento, proponiendo una charla o simplemente dando difusión del encuentro.

La entrada es libre y gratuita :)

Desde ya muchas gracias!!

Sitio
http://pyday.forsol.org.ar (under construction :)

Pueden unirse a la organización en nuestro grupo de Google

Proponer una Charla o Taller
https://docs.google.com/forms/d/1yko_NFuXdSed24gfI-Qqtk3LjxCqdad36CTOIH5vfFo/viewform?usp=send_form

Inscribirse