Since the fight for Net Neutrality in India hasn’t received the attention and seriousness it needs/deserves; I’ve gone ahead to create media for use as Profile Pictures, Cover Pictures that can be used for free everywhere.
TAKE A STAND For #NetNeutralityIndia before its too late.
All content created by bull500 in Inkscape; CC licensed.
Incase you want to credit me – @bull500 mention or linking to this blog would be nice! 🙂 Use Linux and OSS too 🙂 Thanks!
Please don’t just sit there. Every bit of awareness helps.
The future of Indian Internet Usage/Cost/Access is in your hands.
Please be a responsible citizen!
Free Media Content for Net Neutrality India #NetNeutralityIndia by bull500 is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The ordinary way to setup a proxy under GNOME 3 would be to go to Network->Network Proxy and chose the type of proxy option you want – Automatic/Manual.
If you do specify Manual proxy you will be surprised to know that there is no place to provide authentication details such as username and password. The Previous version did support such feature but for some unknown reason its not present in GNOME 3.
A useful work around is to use gsettings in the terminal. Steps as follows:
“gsettings list-recursively org.gnome.system.proxy” – It states the current proxy configuration details.
“gsettings set org.gnome.system.proxy.http authentication-user USERNAME” – Assign the username for proxy.(replace word in caps with your choice)
“gsettings set org.gnome.system.proxy.http authentication-password PASSWORD” – Assign the password for the proxy.(replace word in caps with your choice)
“gsettings set org.gnome.system.proxy.http use-authentication true” – Finally activate the authentication.
And Viola! Its Done 🙂
Ever bought a device with high end specifications and getting upset by the features it provides?
Well you not alone. That I can assure you. There are millions with you. So what’s the hook up. Why do manufacturers limit their hardware to such limited use where it is possible to exploit the device in n number of ways. Why set up boundaries and limitations to a particular device.
Companies should start to understand that locking down consumers by their terms of usage is not very wise these days. Doing so will eventually lead to a loss for the company itself and not the consumer. The internet is an infinite space where people from all walks of life share their knowledge. Custom firmware(software) have been booming on the internet for a long time. Consider Android as example – there are n no. Of variants of the same os for n no of devices. Cyanogen and his group of developers have been spearheading custom Android version which very well out do the ones made the the manufacturer variants in a number of ways.
The popular iPhone has been jail-broken a hundred time because people don’t want to be controlled by Apple Inc.
Sony recently filed a suit against a person named George Hotz aka Geohot for publishing tools that enable a person to run other operating systems like Linux on their PS3 gaming console. This attracted massive attention from people all over the world and the notorious Anonymous group which performed a DDos operation against various Sony websites. I personally feel that George has done nothing wrong by allowing people to break free from the locks of Sony. (Initially Sony shipped PS3’s with the option for “Other OS” before disabling it with a firmware upgrade.)
I love the iPod and always wanted one but then due to the locking mechanism of Apple Inc. and iTunes I gave up.
A manufacturer should be only bothered about making a product and selling it. The way people use it or for what purpose is none of their business. Go against people and your end is very near. Nobody likes being controlled by another especially a company.