5/28/08

Save the Internet! Fight For Net Neutrality




Some of the nations giant network companies want to be Internet gatekeepers, deciding which Web sites go fast or slow and which won't load at all. There have been reports that ISP's like Cox Cable, have intentionally throttled bandwidth (gave priority to different connections, like limiting BitTorrent and P2P traffic) and even denied connections or slowed down certain web sites, unknowingly from the customer. This is un-ethical, as the Internet is supposed to be free for all; Where you can use any service, any speed, any hardware or view any website and download or stream anything you want. But, the big ISP's or network companies are trying to change that. They want to be the Internet's gatekeepers, by telling the customer what he/she may download or what speeds they are entitled to. Read the wiki on the definition of Net Neutrality here. Since the beginning of the Internet, it has always been free and neutral, but recently the mega-corporations are trying to change that. So what is at stake is your freedom - your freedom on the Internet.

To learn more about fighting for Net Neutrality and how to become active and help, one can visit savetheinternet.com. It is a coalition of non-profit users, businesses and bloggers "who are coming together to protect internet freedom." I have signed the petition on the site to protect Internet Freedom and so should you! Another site, openinternetcoalition.org, states it's goal is "keeping the Internet fast, open and accessible to all Americans." Publicknowledge.org is a Washington, D.C.-based public interest group "working to defend citizens’ rights in the emerging digital culture." Below I have added the Frequently Asked Questions from savetheinternet.com:

What is this about?

When we log onto the Internet, we take a lot for granted. We assume we'll be able to access any Web site we want, whenever we want, at the fastest speed, whether it's a corporate or mom-and-pop site. We assume that we can use any service we like -- watching online video, listening to podcasts, sending instant messages -- anytime we choose.

What makes all these assumptions possible is Network Neutrality.

What is Network Neutrality?

Network Neutrality -- or "Net Neutrality" for short -- is the guiding principle that preserves the free and open Internet.

Put simply, Net Neutrality means no discrimination. Net Neutrality prevents Internet providers from speeding up or slowing down Web content based on its source, ownership or destination.

Net Neutrality is the reason why the Internet has driven economic innovation, democratic participation, and free speech online. It protects the consumer's right to use any equipment, content, application or service on a non-discriminatory basis without interference from the network provider. With Net Neutrality, the network's only job is to move data -- not choose which data to privilege with higher quality service.

Learn more in Net Neutrality 101.

Who wants to get rid of Net Neutrality?

The nation's largest telephone and cable companies -- including AT&T, Verizon, Comcast and Time Warner -- want to be Internet gatekeepers, deciding which Web sites go fast or slow and which won't load at all.

They want to tax content providers to guarantee speedy delivery of their data. They want to discriminate in favor of their own search engines, Internet phone services, and streaming video -- while slowing down or blocking their competitors.

These companies have a new vision for the Internet. Instead of an even playing field, they want to reserve express lanes for their own content and services -- or those from big corporations that can afford the steep tolls -- and leave the rest of us on a winding dirt road.

The big phone and cable companies are spending hundreds of millions of dollars lobbying Congress and the Federal Communications Commission to gut Net Neutrality, putting the future of the Internet at risk.

Is Net Neutrality a new regulation?

Absolutely not. Net Neutrality has been part of the Internet since its inception. Pioneers like Vinton Cerf and Sir Tim Berners-Lee, the inventor of the World Wide Web, always intended the Internet to be a neutral network. And "non-discrimination" provisions like Net Neutrality have governed the nation's communications networks since the 1930s.

But as a consequence of a 2005 decision by the Federal Communications Commission, Net Neutrality -- the foundation of the free and open Internet -- was put in jeopardy. Now cable and phone company lobbyists are pushing to block legislation that would reinstate Net Neutrality.

Writing Net Neutrality into law would preserve the freedoms we currently enjoy on the Internet. For all their talk about "deregulation," the cable and telephone giants don't want real competition. They want special rules written in their favor.

Isn't the threat to Net Neutrality just hypothetical?

No. By far the most significant evidence regarding the network owners' plans to discriminate is their stated intent to do so.

The CEOs of all the largest telecom companies have made clear their intent to build a tiered Internet with faster service for the select few companies willing or able to pay the exorbitant tolls. Network Neutrality advocates are not imagining a doomsday scenario. We are taking the telecom execs at their word.

So far, we've only seen the tip of the iceberg. But numerous examples show that without network neutrality requirements, Internet service providers will discriminate against content and competing services they don't like. This type of censorship will become the norm unless we act now. Given the chance, these gatekeepers will consistently put their own interests before the public good.

The cable and telephone companies already dominate 98 percent of the broadband access market. And when the network owners start abusing their control of the pipes, there will be nowhere else for consumers to turn.

Isn't this just a battle between giant corporations?

No. Our opponents would like to paint this debate as a clash of corporate titans. But the real story is the millions of everyday people fighting for their Internet freedom.

Small business owners benefit from an Internet that allows them to compete directly -- not one where they can't afford the price of entry. Net Neutrality ensures that innovators can start small and dream big about being the next EBay or Google without facing insurmountable hurdles. Without Net Neutrality, startups and entrepreneurs will be muscled out of the marketplace by big corporations that pay for a top spot on the Web.

If Congress turns the Internet over to the telephone and cable giants, everyone who uses the Internet will be affected. Connecting to your office could take longer if you don't purchase your carrier's preferred applications. Sending family photos and videos could slow to a crawl. Web pages you always use for online banking, access to health care information, planning a trip, or communicating with friends and family could fall victim to pay-for-speed schemes.

Independent voices and political groups are especially vulnerable. Costs will skyrocket to post and share video and audio clips, silencing bloggers and amplifying the big media companies. Political organizing could be slowed by the handful of dominant Internet providers who ask advocacy groups or candidates to pay a fee to join the "fast lane."

What else are the phone and cable companies not telling the truth about?

AT&T and others have funded a massive misinformation campaign, filled with deceptive advertising and "Astroturf" groups like Hands Off the Internet and NetCompetition.org.

Learn how to tell apart the myths from the realities in our report, Network Neutrality: Fact vs. Fiction.

What's at stake if we lose Net Neutrality?

The consequences of a world without Net Neutrality would be devastating. Innovation would be stifled, competition limited, and access to information restricted. Consumer choice and the free market would be sacrificed to the interests of a few corporate executives.

On the Internet, consumers are in ultimate control -- deciding between content, applications and services available anywhere, no matter who owns the network. There's no middleman. But without Net Neutrality, the Internet will look more like cable TV. Network owners will decide which channels, content and applications are available; consumers will have to choose from their menu.

The free and open Internet brings with it the revolutionary possibility that any Internet site could have the reach of a TV or radio station. The loss of Net Neutrality would end this unparalleled opportunity for freedom of expression.

The Internet has always been driven by innovation. Web sites and services succeeded or failed on their own merit. Without Net Neutrality, decisions now made collectively by millions of users will be made in corporate boardrooms. The choice we face now is whether we can choose the content and services we want, or whether the broadband barons will choose for us.

What's happening in Congress?

The SavetheInternet.com Coalition applauds the recent introduction of the bipartisan “Internet Freedom Preservation Act 2008” (HR 5353). Introduced on Feb. 12, 2008 by Reps. Ed Markey (D-Mass.) and Chip Pickering (R-Miss.), this landmark bill would protect Net Neutrality and spark a much-needed public conversation about the future of the Internet.

The new bill would enshrine Net Neutrality -- the longstanding principle that Internet service providers cannot discriminate against Web sites or services based on their source, ownership or destination -- into the Communications Act. It also requires the Federal Communications Commission to convene at least eight “broadband summits” to collect public input on policies to “promote openness, competition, innovation, and affordable, ubiquitous broadband service for all individuals in the United States.”

Big phone and cable companies like AT&T, Verizon, Comcast and Time Warner have been lobbying furiously to kill Net Neutrality. They want to exploit their gatekeeper power to decide what you can do on the Web.

But Markey and Pickering’s bill deals a blow to the gatekeepers by ensuring that the public -- not phone or cable companies -- control the fate of the Internet.

Contact Congress today. Tell your representative to support the "Internet Freedom Preservation Act 2008” (HR 5353) to make Net Neutrality the law of the land.

Who's part of the SavetheInternet.com Coalition?

The SavetheInternet.com coalition is made up of hundreds of groups from across the political spectrum that are concerned about maintaining a free and open Internet. No corporation or political party funds our efforts. We simply agree to a statement of principles in support of Internet freedom.

The coalition is being coordinated by Free Press, a national, nonpartisan organization focused on media reform and Internet policy issues. Please complete this brief survey if your group would like to join this broad, bipartisan effort to save the Internet.

Who else supports Net Neutrality?

The supporters of Net Neutrality include leading high-tech companies such as Amazon.com, Earthlink, EBay, Google, Intel, Microsoft, Facebook, Skype and Yahoo. Prominent national figures such as Internet pioneer Vint Cerf, Stanford law professor Lawrence Lessig, every major Democratic presidential candidate, and FCC Commissioners Michael Copps and Jonathan Adelstein have called for stronger Net Neutrality protections.

Editorial boards at the New York Times, Los Angeles Times, San Francisco Chronicle, San Jose Mercury News, Seattle Times, St. Petersburg Times and Christian Science Monitor all have urged congress to save the Internet.

What can I do to help?

Sign the SavetheInternet.com petition>.

Call your members of Congress today and demand that Net Neutrality be protected.

Encourage groups you're part of to sign the "Internet Freedom Declaration of 2007".

Show your support for Internet freedom on your Web site or blog.

Tell your friends about this crucial issue before it's too late.


Baby Sloth




Three baby sloths.


You can learn more about the Central and South American tree-dwelling somnolent mammal called Sloth here.

5/25/08

Wi-Fi Detection T-Shirt

The image “http://www.thinkgeek.com/images/products/zoom/wifi_shirt_anim.gif” cannot be displayed, because it contains errors.
I found this cool T-Shirt at ThinkGeek. The shirt will actually display the current WiFi signal strength around you, just like the keychain WiFi detectors or network cards. The glowing bars on the front of the shirt will change as depending on the signal strength of the WiFi hotspot around you. The shirt runs off 3 AAA batteries (don't forget to take off before throwing in washing machine!). The current price of the shirt is $29.99.

5/23/08

The Empire Strikes Barack

Linux Filesystem Demystified

There is only a single hierarchal directory structure. Everything starts from the root directory, represented by '/', and then expands into sub-directories. Where DOS/Windows had various partitions and then directories under those partitions, Linux places all the partitions
under the root directory by 'mounting' them under specific directories. Closest to root under Windows would be c:.

For best system performance, it is best to put /home, / (root) and file swap on it's own partition. Other users have gone as far as putting more than three partitions on their Linux install; Making a partition for /boot, /var and others.

Under Windows, the various partitions are detected at boot and assigned a drive letter. Under Linux, unless you mount a partition or a device, the system does not know of the existence of that partition or device. This might not seem to be the easiest way to provide access to your partitions or devices but it offers great flexibility.

This kind of layout, known as the unified filesystem, does offer several advantages over the approach that Windows uses. Let's take the example of the /usr directory. This directory off the root directory contains most of the system executables. With the Linux filesystem, you can choose to mount it off another partition or even off another machine over the network. The underlying system will not know the difference because /usr appears to be a local directory that is part of the local directory structure! How many times have you wished to move around executables and data under Windows, only to run into registry and system errors (Note: Linux doesn't have a registry like Windows)? Try moving c:windowssystem to another partition or drive.

Another thing to point out is the use of the frontslash '/' instead of the backslash '' as in DOS/Windows. So c:windowssystem would be /c/windows/system. Well, Linux is not going against convention here. Unix has been around a lot longer than Windows and was the standard a lot before Windows was. Rather, DOS took the different path, using '/' for command-line options and '' as the directory separator.

Linux also chooses to be case sensitive. What this means that the case, whether in capitals or not, of the characters becomes very important. So this is not the same as THIS or ThIs for that matter. This one feature probably causes the most problems for people just starting out on command line.

Below is a detailed summary of the Linux Filesystem Hierarchy:

/sbin - This directory contains all the binaries that are essential to the working of the system. These include system administration as well as maintenance and hardware configuration programs. Find lilo, fdisk, init, ifconfig etc here. These are the essential programs that are required by all the users. Another directory that contains system binaries is /usr/sbin. This directory contains other binaries of use to the system administrator. This is where you will find the network daemons for your system along with other binaries that only the system administrator has access to, but which are not required for system maintenance, repair etc.

/bin - In contrast to /sbin, the bin directory contains several useful commands that are used by both the system administrator as well as non-privileged users. This directory usually contains the shells like bash, csh etc. as well as much used commands like cp, mv, rm, cat, ls. There also is /usr/bin, which contains other user binaries. These binaries on the other hand are not essential for the user. The binaries in /bin however, a user cannot do without.

/boot - This directory contains the system.map file as well as the Linux kernel. Lilo or GRUB places the boot sector backups in this directory.

/dev - This is a very interesting directory that highlights one important characteristic of the Linux filesystem - everything is a file or a directory. Look through this directory and you should see hda1, hda2 etc, which represent the various partitions on the first master drive of the system. /dev/cdrom and /dev/fd0 represent your CDROM drive and your floppy drive. This may seem strange but it will make sense if you compare the characteristics of files to that of your hardware. Both can be read from and written to. Take /dev/dsp, for instance. This file represents your speaker device. So any data written to this file will be re-directed to your speaker. Try 'cat /etc/lilo.conf > /dev/dsp' and you should hear some sound on the speaker. That's the sound of your lilo.conf file! Similarly, sending data to and reading from /dev/tty. S0 (COM 1 ) will allow you to communicate with a device attached there - your modem.

/etc - This directory contains all the configuration files for your system. Your lilo.conf file lies in this directory as does hosts, resolv.conf and fstab. Under this directory will be X11 sub-directory which contains the configuration files for X. More importantly, the /etc/rc.d directory contains the system startup scripts. This is a good directory to backup often. It will definitely save you a lot of re-configuration later if you re-install or lose your current installation.

/home - Linux is a multi-user environment so each user is also assigned a specific directory which is accessible only to them and the system administrator. These are the user home directories, which can be found under /home/username. This directory also contains the user specific settings for programs like IRC, X, etc.

/lib - This contains all the shared libraries that are required by system programs. Windows equivalent to a shared library (lib) would be a DLL file.

/lost+found - Linux should always go through a proper shutdown. Sometimes your system might crash or a power failure might take the machine down. Either way, at the next boot, a lengthy filesystem check using fsck will be done. Fsck will go through the system and try to recover any corrupt files that it finds. The result of this recovery operation will be placed in this directory. The files recovered are not likely to be complete or make much sense but there always is a chance that something worthwhile is recovered.

/mnt - This is a generic mount point under which you mount your filesystems or devices. Mounting is the process by which you make a filesystem available to the system. After mounting your files will be accessible under the mount-point. This directory usually contains mount points or sub-directories where you mount your floppy, CD or USB Hard Drive. You can also create additional mount-points here if you want. There is no limitation to creating a mount-point anywhere on your system but convention says that you do not litter your file system with mount-points.

/media - This is also a generic mount for your removable media. Depending on the Linux distro, you may/may not see this. Usually, removable media, mounted partitions, DVD, etc mounted in /media will only show up in your menu such as 'Places'. Otherwise, if mounted in /mnt, it will more than likely show up on your Desktop as well too.

/opt - This directory contains all the software and add-on packages that are not part of the default installation. Generally you will find KDE and StarOffice here. Again, this directory is not used very often as it's mostly a standard in Unix installations.

/proc - This is a special directory on your system. The /proc File System is a pseudo file system residing in the virtual memory and maintains highly dynamic data on the state of your operating system. Most of the information in the /proc file system is updated to match the
current state of the operating system. The contents of the /proc file system can be read by anyone who has the requisite permissions

/root - This one is the home directory of the user root. This is not to be confused with the system root, which is directory at the highest level in the filesystem.

/tmp - This directory contains mostly files that are required temporarily. Many programs use this to create lock files and for temporary storage of data. On some systems, this directory is cleared out at boot or at shutdown.

/usr - This is one of the most important directories in the system as it contains all the user binaries. X and its supporting libraries can be found here. User programs like telnet, ftp etc are also placed here. /usr/doc contains useful system documentation. /usr/src/linux contains the
source code for the Linux kernel.

/var - This directory contains spooling data like mail and also the output from the printer daemon. The system logs are also kept here in /var/log/messages. You will also find the database for BIND in /var/named and for NIS in /var/yp.


Filesystem Commands to point out (with reference examples from the picture above):

1. When you are working within a shell terminal, you are always operating in a particular directory. To determine which directory you are in, use the pwd command:

student@linuxgym$ pwd
/home/student
student@linuxgym$


2. Your home directory is the directory you are in when you first open the terminal. To go to your home directory from anywhere, just type "cd":

student@linuxgym:$ pwd
/usr/local/bin
student@linuxgym:$ cd
student@linuxgym:$ pwd
/home/student
student@linuxgym:$

3. An absolute path name is one beginning with the "/" character, which signifies the root of the file system tree. Therefore, another way of going to your home directory is:

student@linuxgym:/etc$ cd /home/student
student@linuxgym:$ pwd
/home/student
student@linuxgym:$

4. A relative path is one which starts with the name of a directory connected to the current directory. For example, if you are in the /usr directory, then typing only "cd bin" (without preceding "bin" with "/") has the following effect:

student@linuxgym:$ pwd
/usr
student@linuxgym:$ cd bin
student@linuxgym:$ pwd
/usr/bin
student@linuxgym:$

and you go to /usr/bin rather than /usr/local/bin or /bin.

5. To go to the directory containing the current working directory (also called the parent directory) type:

student@linuxgym:$ pwd
/usr/bin
student@linuxgym:$ cd ..
student@linuxgym:$ pwd
/usr
student@linuxgym:$

6. The relative pathname of the current working directory is called "." (the full stop). Therefore typing:

student@linuxgym:$ pwd
/usr/bin
student@linuxgym:$ cd .
student@linuxgym:$ pwd
/usr/bin
student@linuxgym:$

does not change the current working directory.


You can also find a nice Index of Linux Commands and what they do -here. There is also a great directory guide for Unix/BSD/Linux commands for IT work or advanced users called Unix Toolbox.You can get the PDF version of it here.

5/21/08

Border Patrol HighJinks

Don't Give Microsoft the Remote Control! - Get MythTV!



Don't Give Microsoft the Remote Control!

by josh posted on 2008-05-20 16:15 @ http://badvista.fsf.org/

"If you put Microsoft at the center of your home entertainment system, be prepared to hand them the remote control, literally.

Following reports that digital television viewers were blocked from recording the new season of NBC's "Gladiators", Microsoft confirmed that it is preventing users from recording the show. They claim they were acting on behalf of NBC, and are in line with regulations set by the Federal Communications Commission (FCC), in disrupting computer usage based upon the so-called "broadcast flag" that was transmitted alongside the show.

A Microsoft spokesperson told CNET News, "...Windows Media Center fully adheres to the flags used by broadcasters and content owners to determine how their content is distributed and consumed."

What is the Broadcast Flag?

The broadcast flag is a sequence of information transmitted alongside television programs as a kind of digital order telling viewers to not do certain things, such as record the show or share it with a friend.

Many of the large media companies and the FCC tried to make obeying the broadcast flag a law. However, the Electronic Frontier Foundation took the FCC to court, and US Court of Appeals ruled that the FCC had exceeded its authority, and that no such law could exist. Despite this ruling, it appears that Microsoft has decided to work directly with media companies to implement these rules anyway, restricting how and when you watch television.

Building such a system is no trivial task. To do this, Microsoft has gone to great lengths to restrict users from saving a television program to their computers, we call this kind of functionality an "antifeature," because it takes more work for Microsoft to prevent the user from saving the program, than if they were to leave just the default behavior alone. So instead of letting you record programs as you normally would, it locks you out and deletes the show before you can save it.

However, Microsoft hasn't just made a little tweak to their software to do this -- they have compiled an entire system built upon antifeatures. This antifeature platform is integrated into their Windows Media software and forms the basis of their Windows Vista operating system, and they are working hard to convince companies like NBC, that Microsoft can be in control of how and when you get to watch television. As creepy and as ridiculous as it may sound, this is their business strategy, and by getting this control, both the television and movie industry and computer users will be tied to Microsoft software.

Don't be fooled into their claims that they are following regulations by the FCC -- the court ruled that the FCC has no power to make such regulations. This is also claimed as a measure just to stop unauthorized file sharing, yet what Microsoft is doing is trying to make sure that they are on every end of the market, from how it is delivered, to how you watch it. As Ars Technica reporter Jacqui Cheng puts it, this is not about Microsoft preventing people from sharing files without permission, "It's about the ability to strictly control how we consume content"[2].

Microsoft wants to have that control, and this software is the way they are trying to get it. Software that is designed in this way is known as 'DRM', which stands for 'Digital Rights Management', and yet it is really just another way to restrict how consumers interact with things on their own computers and devices. Because of this restriction, we refer to DRM as 'Digital Restrictions Management'.

The Alternative to DRM: Free Software

By far the best way to avoid DRM, is to refuse to use software that is infected with it. Better yet, you should choose software that tries to do the opposite of DRM -- software that gives you complete control. This kind of software is called "free software," and it is based upon the idea that software carries certain freedoms to you:

  • The freedom to use the software for any reason you wish -- including to the ability to hit the save button when you* wish.

  • The freedom to examine how the software works and make changes, similar to a car engine -- you can remove the bugs or soup it up.

  • The freedom to share the software with your neighbor, like photocopying a newspaper article or sharing class notes with a classmate.

  • The freedom to share your modified software with other people, similar to how mathematics and science have worked for centuries.

Now you may not be a computer programmer, or know how to understand or change computer programs, but there are plenty of people out there who do, and they are likely already making the kinds of fixes and changes you'd like to see, or are often part of a community willing to make those changes for you.

There are thousands of free software programmers, and many thousands of free software programs, and even complete free software operating systems. You usually won't find annoying antifeatures in a program, and if there were one, you can rest assured that other programmers will have removed it by the time you get to use it.

Conversely, software that doesn't give you these freedoms is software you cannot control, and we think that kind of software doesn't belong on your computer. We say, 'free software, free society' -- with free software, if we are each in control of our machines, then we are all in control of how we use them and what we use them for.

And, don't let Apple fool you into thinking that they are the alternative to DRM and Microsoft, they, too have their own DRM schemes, and seek to control the world in their own way, from branding their DRM music player, to entrenching the world in their proprietary formats and DRM music purchasing programs.

The alternative to Windows and Apple is software that you control, software that is guaranteed to give you all of the freedoms you need to be in control. Free software.

There is a good chance you are already using free software, directly, such as using the Firefox web browser, or indirectly, by visiting a Web site that is sending you web pages with the Apache web-server. However, there are also entire, user-friendly operating systems that you can install on almost any laptop or desktop computer. So, if you are running Windows or Mac OS, consider replacing these with a free software based GNU/Linux operating system, such as gNewSense[3].

Using free software will take the control out of Microsoft's hands. With free software, you are in control."

[1]: You can read Mako Hill's article on antifeatures, here: http://www.fsf.org/bulletin/2007/fall/antifeatures/

[2]: It should be noted that this writer refers to a person that shares files as a "pirate," we think this is a bit of an extreme description that should be avoided. http://arstechnica.com/news.ars/post/20080514-nbc-vista-copy-protection-snafu-reminds-us-why-drm-stinks.html

[3]: gNewSense, a free software distribution of GNU/Linux http://www.gnewsense.org/


Get MythTV Instead!

A practical alternative to Windows Media Center, for those wanting a Home Media PC with PVR function, DRM free....should get MythTV.

MythTV is an open source software Personal Video Recorder (PVR). It lets you build a box similar to a TiVo or ReplayTV, but much more powerful - and more easily modified.

MythTV's robust PVR functions allow you to do the following:

  • You may pause, fast-forward and rewind live Television.

  • You may install multiple video capture cards to record more than one program at a time or use for picture-in-picture functions.

  • You may watch and record SDTV and HDTV via firewire if you have a firewire-enabled cable tuner or satellite tuner.

  • You can have multiple servers (called "backends" in MythTV parlance), each with multiple capture cards in them. All servers are centrally managed and all programs are scheduled by the Master backend.

  • You can have multiple clients (called "frontends" in MythTV parlance), each with a common view of all available programs. Each client can watch all programs recorded by any of the servers, assuming that they have the hardware capabilities to view the content; a low-powered frontend, for example, will not be able to watch HDTV. Clients can be diskless and controlled entirely by a remote control.

  • You may use combinations of standard analog capture cards, MPEG-2, MJPEG, DVB, HDTV, USB and firewire capture devices. With a firewire capable backend, MythTV can control a variety of set top boxes often found in digital cable and satellite TV systems.

  • Program Guide Data in North America is downloaded from www.schedulesdirect.org (a non profit orgainization) for a fee. This service directly replaces Zap2it's DataDirect service (which is no longer available), and provides MythTV almost two weeks of scheduling information. Program Guide Data in other countries is obtained using XMLTV. MythTV uses this information to create a schedule that maximizes the number of programs that can be recorded if you don't have enough tuners.

  • MythTV implements a UPNP server, so a UPNP client may automatically see content from your MythTV system. N.B.: this feature has not been verified to work on every available UPNP client.

  • Plugins from the MythTV community provide functionality for: DVDs, Personal Video Collection, Music, Weather, News, Netflix and much, much more.

MythTV will run on Ubuntu. So you can build a PC from scratch (or use an older computer) to be used as your MythTV server. Move into your living room, hook up to HDTV, record live TV to your Hard Drive and there you have your personal TV PVR for a fraction of the price. There is a How-To for building a MythTV Ubuntu box. You can also buy pre-built MythTV boxes at Monolith.There are also some MythTV linux distributions to choose from.


Wubi - Ubuntu Installer for Windows


I found a very cool Ubuntu installer for Windows. Seems great for someone wanting to install Ubuntu without getting overwhelmed with disk partitioning and such. Wubi is an actual EXE file that will install Ubuntu inside Windows without the need of a CD. Ubuntu is installed as a application inside windows, so if you want to uninstall you can do so within Add/Remove Programs. When you restart your computer, you are given a choice to boot into Windows or Ubuntu. Look like it still keeps your Windows MBR instead of using GRUB Boot Loader. I still think if you are serious about using Ubuntu Linux, then you should install the original way and make partitions for Ubuntu to reside on. Otherwise, with Wubi, Ubuntu is installed on your Windows partition, which is fine, but may not have as fast performance as if it was installed on it's own partition (which is explained in the FAQ below). Also it looks like it is shipped by default within the LiveCD of Ubuntu 8.04. I haven't tried it yet, but it is officially supported by Ubuntu and users have had great success. Below I have posted the FAQ from the Wubi site from http://wubi-installer.org/
You can find the Wubi Guide at the Ubuntu Wiki here.

Download Now

How do I install Ubuntu?

Run Wubi, insert a password for the new account, and click "install". The installation process from this point is fully automatic. The installation files (700MB) will be downloaded and checked, after which you will be asked to reboot. Do so and select Ubuntu at the boot screen. The installation will continue for another 10-15 minutes and the machine will reboot again. This is it. Now you can select Ubuntu at the boot screen and start using it.


Wubi Installation

How do I uninstall it?

You uninstall it as any other applications. In Windows go to the control panel and select "Add or Remove Programs", then select Wubi/Ubuntu and uninstall it. You can also use the uninstaller that you find in the installation folder.


Wubi Uninstallation

How do I select whether to run Windows or Ubuntu?

When you reboot you can choose to run Windows or Ubuntu.


Boot Screen

Can I access my Windows files from a Wubi installation?

Yes, the Windows partitions will be available within the directories /host and /media.

Can I use an existing ISO/CD instead of letting Wubi download a new one?

Yes, physical CDs will be detected automatically, pre-downloaded ISOs should be placed in the same folder as Wubi.exe. You can find the latest ISOs here

Why is the AMD64 version of Ubuntu getting downloaded and installed?

You probably have a 64 bit machine, the 64AMD installation is appropriate for all 64 bit architectures whether AMD or Intel

Can I force Wubi to download and install a 32 bit version of Ubuntu?

Yes, either pre-download the appropriate 32 bit ISO manually and place it in the same folder as Wubi.exe or start Wubi with the "--32bit" argument.

Can I move my virtual disk file to a dedicated partition?

For Wubi 7.04 and 7.10, you can use LVPM to transfer your install. A guide and support forum for LVPM is available here. 8.04 is not yet supported by LVPM.

Where can I find older Wubi versions?

Here

Where can I find additional information and resources about Wubi?

Please see the Wubi Guide for additional tips and more detailed documentation and troubleshooting.

What are the system requirements?

256 MB RAM and an 1 GHz or faster Intel/AMD processor is recommended for optimal performance, though Xubuntu might work on less. As for disk space, the installation requires a minimum of 5GB free. This space is mostly used by the virtual hard disk file. Most computers purchased within the last 3 years should be able to run Ubuntu fine, and Xubuntu is suitable for older computers. Software raids (aka fakeraid) are not supported. Encrypted disks are not supported.

What platforms are supported?

Wubi will run on on all Windows versions from Windows 98 to Windows Vista except Windows ME. More platforms to come soon. Linux/*nix/*BSD are supported through Lubi (download location and guide), and Mac OSX will eventually be supported through Mubi (developers still needed).

What is the performance?

The performance is identical to a standard installation, except for hard-disk access which is slightly slower than an installation to a dedicated partition. If your hard disk is very fragmented the performance will degenerate.

Any gotcha?

Hibernation is not supported under Wubi, moreover Wubi filesystem is more vulnerable to hard-reboots (turning off the power) and power outages than a normal filesystem, so try to avoid unplugging the power. An Ubuntu installation to a dedicated partition provides a filesystem that is more robust and can better tolerate such events.

How does Wubi work?

Wubi adds an entry to the Windows boot menu which allows you to run Linux. Ubuntu is installed within a file in the Windows file system (c:\ubuntu\disks\root.disk), this file is seen by Linux as a real hard disk.

Is this running Ubuntu within a virtual environment or something similar?

No. This is a real installation, the only difference is that Ubuntu is installed within a file as opposed to being installed within its own partition. Thus we spare you the trouble of creating a free partition for Ubuntu. And we spare you the trouble to have of having to burn a CD-Rom.

What is the relationship between Linux and Ubuntu?

Ubuntu is an operating system that includes a lot of free and open source applications and uses Linux as its core. Linux is like this amazing solar-powered engine that can be used in a street car, in a F1 or it can be daisy chained to drive a truck or an airplane. Ubuntu is like a car using the Linux engine, a zero emission, fully accessorised and easy to drive all-terrain, with power, acceleration and looks matching far more expensive supercars... Imagine something like that... ...for free.

Why Ubuntu?

We think that today Ubuntu is the best Linux-based operating system for desktop use. We also like its philosophy.You can see some Ubuntu screenshots here, for more information visit the Ubuntu website.

Is Wubi officially supported by Ubuntu?

Wubi was born as an independent project, as such 7.04 and 7.10 are unoffical releases. But since 8.04 the code has been merged within Ubuntu and Wubi is now fully supported. Wubi can also be found in the Ubuntu 8.04 Live CD.

What flavor of Ubuntu will I get?

Most flavors, including Ubuntu (default, with GNOME), Kubuntu (with KDE), Xubuntu (with XFCE for older computers). Contact us if you would like your own flavor to be available for installation via Wubi.

What is the difference among the different Ubuntu flavors?

Mostly the graphical user interface is different, and the bundled applications may change so that they better integrate with the installed interface. More information can be found at the homepages for GNOME, KDE, and XFCE.

Can I install multiple flavors?

You can select the desktop environment within Wubi. But since each desktop environment is also available as an application package, it is recommended to install Ubuntu (default option) and from there install the other desktop environments. When you login you can choose the desktop environment to use.

What applications come with Ubuntu?

Ubuntu comes fully loaded with most commonly used applications, including a full office suite compatible with MS Office, image editing software, picture management software, media player, games, browser, email client, IM and video conferencing software... On top of all of this, you can easily install additional software, from a list of over 20,000 applications.

All this is installed by Wubi?

Yes (well... not all of the 20,000 applications, but Ubuntu and everything that comes with it, yes).

All for free?

Yes. Wubi is free/open-source software, licensed under the GNU GPL-v2 or above.

What warranty do I get?

None whatsoever. This is free software, and you are free to modify it, use it and redistribute it as you see fit, provided you also allow others the same freedom. Since we do not make any money out of it, it would not be fair for us to be liable if something goes wrong. We think that the technology is safe, but you run it at your own risk. See the GNU GPL license for more details.

Is there any spyware/virus?

The software is free/open-source, which means that anybody can check the code, therefore it would be pretty difficult for someone to hide a spyware/virus within the software, but you should always run all your usual security checks. As explained above, there is no warranty.

How can I help you guys?

You can help us by filing/fixing bugs, writing code, or translating the project... ...or simply spreading the word!

Show me the code

The main development happens in 4 separate launchpad projects:

  • Lupin, the loop-installer, used to be the core of the insaller, but now most of the old functionality has been ported within Ubuntu
  • Wubi, the Windows front-end, handles everything that happens before you reboot
  • Lubi, the Linux front-end, does basically the same thing as Wubi
  • LVPM, Loopmounted Virtual Partition Manager, handles the migration of virtual disks to real partitions for Wubi 7.04 and 7.10

Our code is licensed under the GPL-v2 and above.

History

The original idea was drafted by Agostino Russo taking inspiration from topologilinux, which provided a loopmounted installation, and instlux, that provided a simple Windows frontend. The idea was to merge the two concepts having a Windows installer that would loopmount an image of Ubuntu. Geza Kovacs later refined the spec and provided the first prototypes to show that the concept was sound. Oliver Mattos wrote the original user interface in nsis. Agostino then refined the loopinstallation concept, moving from a simple loopmounted pre-made image file, to an image created on the fly using a dynamically patched version of the debian installer, thus providing an experience much closer to a real installation and addressing several other issues. The Lupin project was thus born. Incidentally the name "Lupin" comes from "loop-installation", which is the technique that makes Wubi tick. Later on Agostino and Ecology2007 have redesigned and rewritten the Windows frontend, which is what people see today. Hampus Wessman contributed the new downloader and the translation scripts. Bean123 and Tinybit also helped a lot to debug and fix bootloader issues. Lubi and LVPM were subsequently created by Geza Kovacs. Agostino Russo, Colin J Watson and Evan Dandrea have ported Lupin/Wubi into Ubuntu. Since Ubuntu 8.04, Wubi ships within the Live CD.


5/20/08

25 Reasons to Convert to Linux

LINFO

25 Reasons to Convert to Linux



Businesses, educational institutions, governmental agencies and other organizations around the world are converting1 their computer operating systems from Microsoft Windows to Linux at an increasing pace. They are likewise converting their application programs from commercial software to free software (also referred to as open source software). There are at least 25 reasons for this situation, including:

(1) Because it is licensed under a free software license2, Linux (as well as other free software) is available at no cost. It can be downloaded from the Internet for free, and it can be purchased in disk or box form at trivial cost. One copy can be used on as many computers as desired with no restrictions. This is in sharp contrast to Microsoft Windows, which can easily cost US$100 or more per computer.

(2) Because it is free software, Linux is also free in the sense that anybody is permitted to modify it, including its source code, in any way desired. If modified versions are not redistributed (i.e., given away or sold outside of an organization), they can be kept secret. This is also in sharp contrast to Microsoft Windows, for which modification of the software is generally not permitted. Source code is the original version of a program as it is written by a programmer using a programming language and before being converted by a compiler into a form such that its instructions can be understood directly by a computer's CPU (central processing unit); it is generally necessary to have the source code in order to be able to make changes to a program. This ability to freely experiment with and modify the source code, and to do so without disclosing the modifications to outsiders, has been a very important consideration for a number of large organizations3.

(3) High quality support for Linux is available for free on the Internet, including in newsgroups and other forums. Some people claim that this support is at least as good as that provided for proprietary (i.e., commercial) operating systems for a fee. Linux support can also be purchased on a commercial basis if desired. Among the types of support that can be required for operating systems are help with customization, assistance in installing new programs, patches to cope with new security threats and patches to fix newly discovered bugs (i.e., defects). Fortunately, the need for the last two types is relatively infrequent for Linux.

(4) There is little possibility that support for Linux will be discontinued at some future date due to planned obsolescence or for any other reason. This is because the source code will always be available to anyone who wants it, including individuals who provide support for free over the Internet and businesses which provide it for a fee. In contrast, with Microsoft Windows and other proprietary software for which the source code is usually kept secret, obtaining support becomes difficult (from both a technical and a legal point of view) if the developer decides to withdraw it (for example in order to try to force users to pay for upgrades to newer versions).

(5) There is little or no fear of major obsolescence, planned or otherwise, with Linux. This is because the UNIX architecture on which it is based has been exhaustively tested and refined for more than 35 years and has proven to be extremely efficient, robust and secure. Improvements continue at a rapid pace, but new versions remain basically compatible with the underlying UNIX architecture.

(6) There are no forced upgrades4 for Linux users. This because older versions continue to be supported (e.g., with the development of new security patches and device drivers) and because newer versions, if desired, are available for free (as is all free software) and are typically highly compatible with older versions. The developers of proprietary software, however, have strong financial incentives to engage in planned obsolescence, namely, in order to induce users of earlier versions to spend money to buy or lease new versions.

(7) Should a user decide to upgrade to a newer version of Linux, there are no licensing fees or other software costs if the user selects a free distribution (i.e., version). Moreover, the training, program modification/conversion, hardware acquisition and other costs associated with upgrading to a new version are also relatively low due to the compatibility with earlier versions.

(8) Linux has no onerous requirements for keeping track of licenses. In a company with hundreds or thousands of computers, a number of full time personnel can be required just to make sure that all of the computers in use are in compliance with the complex licensing terms of the EULAs (end user license agreements) for Microsoft Windows, Microsoft Office and other proprietary software. And for Linux users there is no fear of surprise audits by the BSA (Business Software Alliance)5, with possible severe penalties for minor license violations.

(9) Linux features superior security, including a very low rate of infection by viruses, trojans, worms, spyware and other malware. This is because UNIX and all of its descendants (including Linux) been designed from the ground up with security in mind, rather than having attempts at security tacked on as an afterthought. For example, users do not routinely use the system as the root (i.e., administrative) user, thereby protecting key system files even in the event of a break-in by a malicious intruder. Also, a robust firewall is included in major distributions and it is enabled by default. Another important factor is the free availability of the source code, which allows thousands of people around the globe to search for security vulnerabilities in it6.

(10) Linux is highly resistant to system crashes and rarely needs rebooting (i.e., restarting). This can be very important for large organizations for which even a few minutes of down time can result in a substantial cost. The reason is that Linux has been designed from the ground up to be an extremely stable and robust operating system, incorporating all that has been learned about attaining these goals from the more than 35 years of history of Unix-like operating systems.

(11) Although the number and variety of application programs for Linux are not yet as large as those available for the Microsoft Windows operating systems, an extensive selection already exists and it is continuing to increase rapidly as more and more developers start creating programs for Linux. Most Linux applications are also free software (including nearly all of the most popular ones), and many have features and performance equal or superior to those of comparable applications for use with Microsoft Windows. In fact, users often find that all the applications that they want are freely available on the Internet and that it is no longer necessary to purchase any commercial software.

(12) There is a choice of numerous distributions (several hundred) of Linux, each with its own unique set of characteristics but all basically compatible with each other. This allows users to select the versions which best meet their specific requirements. It also means that if one provider of Linux were to go out of business, there would still be many others from which to choose. Moreover, it fosters a healthy competition among them, thereby contributing to the continuous improvements in Linux's quality and performance. If the choice seems overwhelming, it is usually difficult to make a mistake by selecting one of the most popular distributions, such as Red Hat or SuSE.

(13) Linux features a high degree of flexibility of configuration, and a great deal of customization can be accomplished very easily and without having to modify the source code. For example, it is a simple matter to configure Linux during installation so that it will be optimized for use as a workstation, desktop computer, notebook computer, web server, database server or a router. Likewise, the appearance and behavior of the desktop, including icons and menus, can be configured in an almost infinite number of ways, according to user tastes or requirements. They can even be made to resemble Microsoft Windows. Should this not be enough, the ability to freely access, revise and recompile the source code allows virtually unlimited flexibility of configuration.

(14) Linux and other free software uses open format file formats. These are formats for word processing, spreadsheet and other file types that conform to industry-wide standards and which can be used by any developer of software to create compatible programs, in contrast to the closed formats commonly used by some proprietary software. This eliminates the problem of lock-in to proprietary standards, with the consequent difficulty and expense of switching to other software in the future. It allows the user to have complete control of its data, particularly in the event that at some future date the developer who originally created the software goes out of business or stops supporting its earlier software.

(15) Linux is generally faster for a given set of hardware specifications. This is due to greater optimization of the source code, including far less code bloat.

(16) Linux features a high degree of compatibility with other operating systems. For example, it can read, write, copy, erase and otherwise manipulate data that resides on Microsoft Windows partitions on the same hard disk drive (HDD), act as a Windows server for a network containing Windows clients, format disks for use with Windows, and even run Windows programs directly if necessary. In contrast, the Microsoft Windows operating systems cannot access HDD partitions that contain other operating systems, cannot format disks for other operating systems, etc.

(17) Very high ethical standards are maintained for Linux and other free software, in large part due to the very openness of their development process and the free availability of the source code. Linux has never been convicted in a Federal court of violation of U.S. antitrust laws or other crimes, nor has it had to pay penalties for the unauthorized copying of technology developed by other companies. Antitrust refers to government policy to regulate or break up monopolies in order to promote free competition and attain the benefits that such competition can provide to the economy and to society as a whole.

(18) Linux reduces the need to upgrade or replace hardware when upgrading to newer versions. This is because its code is very efficient and compact, thus allowing it to work effectively on older computers that are not suitable for the newest versions of Microsoft Windows.

(19) Linux is capable of operating on a wide variety of platforms (i.e., processor and system types), rather than just being limited to Intel-compatible processors and computers. It scales well and is well suited for use on a diverse array of equipment ranging from supercomputers to industrial robots to electronic medical equipment to cell phones (and can even run on a wristwatch).

(20) Linux is a superior choice for use in academic institutions for a number of reasons. Among them is the fact that there are no secrets (in sharp contrast to proprietary software), thereby providing students the opportunity to study how computers really work rather than to just learn how to use them. Many educators are convinced that it is far more important for students to study computer science fundamentals than to practice specific applications (such as Microsoft Word or Microsoft PowerPoint). One reason is that computer science fundamentals will still be valid many years from now, whereas the specific application programs, especially the proprietary ones that do not conform to industry-wide standards, are constantly changing and those currently in use will likely become obsolete in a few years7.

(21) For governmental agencies, Linux and other free software allows for transparency of data because it stores the data in formats consistent with industry-wide standards. This is in contrast to the proprietary, closed formats characteristic of commercial software. Such transparency is important for maintaining an effective democracy. Keeping non-secret data in standards-compliant formats allows anyone to access it without having to purchase expensive proprietary software. Also, storing secret data in standards-compliant formats is widely regarding as being more secure than keeping it in proprietary formats.

(22) With Linux and other free software there is little reason to fear the existence of backdoors, in large part because all of the source code is available for inspection. A backdoor is a secret method for obtaining remote access to a computer. There is a (not unjustified) concern by many foreign governments and corporations that back doors have been covertly inserted into proprietary software that could allow the software developer and agencies of other governments to snoop into their most confidential data.

(23) Using and advocating Linux helps foster a healthy diversity and increased competition throughout the software industry. Such competition can promote technological advance, improve performance and lower costs for open source software and proprietary software alike. Both economic theory and hundreds of years of real-world experience clearly show that monopolies have little incentive to innovate, tend to produce shoddy products, charge inflated prices and tend to corrupt the political system.

(24) Linux and other free software have not only caught up with, or some cases surpassed, their proprietary counterparts, but they are also developing at a faster pace8. This trend will accelerate as demand for such software continues to grow and more and more individuals and organizations become actively involved it its development.

(25) Linux and other free software provide the opportunity for users to contribute to the advance of software technology because the source code is freely available to study, improve, extend and redistribute. This has been fairly common, and the most notable corporate example has been IBM. In addition to giving back to the software community and being a virtue in itself, such contributions can have great public relations value.

(26) There are actually more than 25 reasons that organizations around the world are converting to Linux and other free software. A twenty-sixth reason is that with Linux, in contrast to the Microsoft Windows operating systems, there is no need to defragment HDDs. Fragmentation, which is the spreading of data into non-contiguous locations on a hard disk drive, can reduce the efficiency of data storage and slow down computer operation. Defragmentation is not difficult, but it can be an annoyance to have to do it periodically, and it is unnecessary with a well designed operating system.


There are also several situations in which businesses and other organizations might benefit from converting their operating systems from Linux to Microsoft Windows:

(1) An organization that is downsizing its operation and already has valid but unused licenses for Microsoft Windows might be able to reduce personnel costs by replacing its Linux experts with Windows administrators, as the latter can generally be hired for significantly less than Linux administrators.

(2) Were Microsoft to offer an organization an extremely low cost incentive package, including providing long-term licenses (and upgrades) at nominal cost, paying for new hardware and providing free training and support, this could be a very attractive proposition. In fact, it could be a win-win situation because of the great publicity value that could accrue to Microsoft from a company or other organization converting from Linux to Windows.


________
1For links to articles about some recent conversions to Linux, see Linux Success Stories, The Linux Information Project, December 2005.

2Linux and most other free software is licensed under the GNU General Public License (GPL). This highly successful license has been specifically designed to provide as much freedom as possible for users, both in a monetary sense and with regard to use. The GPL allows anyone to freely access the source code for software licensed under it in order to study, use, modify, extend and redistribute it as desired with only the very minimal requirements of always making the source code for redistributions of modified versions freely available and including a copy of the GPL text with the software.

It should be pointed out in this context that there are also compiled versions of Linux that are not free in a monetary sense, which is also permitted by the GPL. However, they are not necessarily any better than the free versions. Businesses and other organizations have the option of selecting whether they want a free or non-free version, and if they select the former, they have many distributions from which to choose.

3This is a major reason that Google selected Linux, according to industry sources.

4Forced upgrades occur when the developer stops supporting an earlier version of its software, and thus security patches for the newest viruses and other malware become unavailable and drivers are no longer developed for new hardware. Thus, many users have little choice but to purchase or lease the newest version. This can be very costly because of the licensing fees or other payments that must be made to the software developer or vendor. Further adding to the cost is the frequent need to purchase new hardware to accommodate the bloated code in the new versions of the software. In addition, installing the new software and troubleshooting it can be very time-consuming for system administrators and disruptive for business operations.

5 The highly controversial BSA is an international organization that was set up by major developers of proprietary software. It is empowered by the mandatory EULAs accompanying such software to make surprise audits on users and to levy heavy fines in the event of violation.

6 The is the same principle that is employed by public key cryptography (PKC), which is the most secure form of data encryption. And it is the opposite of the approach used with proprietary software, for which an attempt is made to keep the source code secret as a means of hiding security vulnerabilities.

7 For a more detailed look at the reasons that Linux is the best choice for use in educational institutions, see Linux and Education, The Linux Information Project, March 2004.

8Numerous examples could be cited. For example, Apache is the dominant web server, hosting far more web sites than any of its proprietary counterparts. Likewise, it is widely agreed that the free Firefox web browser is far more advanced (in terms of security, usability, etc.) than Microsoft's Internet Explorer. Internet Explorer is free in a monetary sense, but it is not free software because the source code is not made available and users are prohibited from modifying it.






Created January 10, 2006. Updated January 13, 2006.
Copyright © 2004 - 2006 The Linux Information Project. All Rights Reserved.


WoW - Rogues Do It From Behind



Any World Of Warcraft fans will love this video, especially Rogue fans. WoW is only going to become more popular with the release of the World of Warcraft Motion Picture Movie (Produced by Thomas Tull of 300) and the new game expansion: Wrath of the Lich King. When I played WoW, (haven't played in a couple months, let my account expire) I leveled my Night Elf Rogue from level 1-70. (My Armory Profile) and my Undead Warlock (which was the most fun to play). I must say I devoted allot of time in doing that. Too much time. I also got WoW working in Ubuntu and worked very well! Nevertheless, it is a fun game. I don't play anymore, but what is cool about the game is you can pick up where you left off when your account has been inactive; They won't delete your account for inactivity (of course there is ways to play for free on private servers). So I may pick back up sometime when I get more time play.

5/7/08

Who Kicks More Ass: Batman or Iron Man?



In the light of the new movie Iron Man, I stumbled upon a site apparently intended to strike up a war between people who thought Batman would win in a fight with Iron Man or Iron Man would win a fight between Batman. Now, if you haven't seen the new Iron Man movie yet, it is Awesome! I didn't think I would be in for such a treat but I was pleasantly surprised. Anyway, on the site, it is definitely pro-Iron Man, saying things like, "Who would you like to be? A tortured soul who lives a miserable life having flashbacks about pearls falling on a dirty street, lives with another man, and fights crime in rubber pants and a cape, or a brilliant inventor who builds his own gadgets, dates—for real, not as a facade, you know, with actual sex—the hottest girls on the planet, and can fly in a hot rod red and gold armor? Hello?" But some of the user comments think differently, saying things like, "Batman would kick Iron Man's ass any day. Batman is to too damn resourceful and smart. Sure Tony Stark has great technical skills and is no idiot, but Batman is a highly trained ninja/detective/ass-kicker. They both have the money and intelligence to make any of the weapons and gadgets they want, but Batman's ninja skills won't be impaired by alcohol. Bruce Wayne has Alfred, Tony Stark has Penny Potts. And I bet you Alfred is smarter than Penny. The clear winner here is Batman. It's not even a competition." Most of the user comments seem to lean more towards Batman being the victor and why they think so.

Personally, I think it would be a very close fight. They both have similar traits, both are millionaire playboys who rely on their gadgets to fight, But with that said they are both very different as well. Also, when comparing the two as to which one would win a ass-kicking, we have to take into account which Batman and Iron Man we are talking about: the movie heroes, comic book, etc. So anyways...I always get a kick out of threads like these where you have all the geeks arguing over what comic book character could kick whose ass in an all out brawl. The site again is http://gizmodo.com/387583/who-kicks-more-ass-batman-or-iron-man