We’ve got some exciting news for BlackBerry 10 customers out there— today your favorite smartphone is getting even better with the release of BlackBerry 10.2 OS, which will available for download starting this week.
During the recent collapse in popularity of GNOME, the Free Software community's most popular graphical desktop environment, it's hard to understand why more users didn't turn to the GNU System's other desktop, GNUstep -- or is it?
Although GNUstep implements most of the functionality of a desktop with native apps -- like Workspace Manager and Preferences -- or by including apps built outside the project -- like its window manager, WindowMaker, GNUstep is not a desktop. Its a framework. For most, the distinction is nebulous. It's developers tell us, GNUstep is:
Security firm Malwarebytes has designed a USB stick that can plug into any PC to automate the process of finding, logging, and cleaning up a range of malware.
Called Techbench, the product is a key-shaped USB flash drive designed to get around the need to install software on every system being inspected for malware. Simply plugging in the drive starts the scanning process which can be left to complete on its own before a log file is saved.
Apple has been criticized by the developer of a Chinese app designed to bypass China's Internet censorship protocols after the company removed the title from the App Store in China because its functionality is illegal in that country.
Open Door was sold in the Chinese App Store until July of this year, when Apple pulled the program, saying that it contained content that was illegal within China. The app saw roughly 2,000 daily downloads in China, according to the Daily Mail, and it is still available in the App Stores of other countries, including the U.S. App Store.
This week, as revelations about the extent of National Security Agency (NSA) spying continued to unfold, Ryan Gallagher brought us an article about the types of hardware that agencies outside of the NSA use to gather information from mobile devices. These agencies, which include local law enforcement as well as federal groups like the FBI and the DEA, use highly specialized equipment to gain information about a target. Still, the details about that hardware is largely kept secret from the public.