Sunday, December 4, 2016

How to Join Anonymous?

You cannot join Anonymous [1]

Anonymous is not an organization, club or a movement, there are no manifest of charters or membership fees.  For a short period of time Anons have common goal, purpose or dislike. So they simply communicate through their alias names in any secure medium possible(whether it be IRC, encrypted mails, etc.). If they find threat or vulnerability they disappear like ghost and find another medium for communicating. They never stick together as a family, but whenever any laws tries to move their claws in their freedom, Anons are united and take the hell out of the sinner.
Neither you can join nor you can quit. Nobody can say you are in or you are out. 

If you wanna know how to contact other anonymous yet again that is also not possible. Because Anonymous does not have a centralized database for Communication.

How to be save your Digital Identity? 

But you need to follow some smart and safe measures to be Anonymous. You need to protect your identity in the internet, otherwise you are always being watched by the known as well as unknowns.
Following are few ways to  use during a anonymous browsing:
  • Choose an Alias
    Choose an alias which is unique and which is not related to you at all. Make sure that it is noway traceable backwards  to your identity. Don't keep this alias related with your important events or your best persons name or any dates important to you in your life time. Make it different.
  • Join an email account with your alias.
    With this alias name you thought of, create an email from any email provider. You can find free email providers which won't give your encrypted message sending facilities. Or there are also some of the free email providers which provide you secure email services.
  • Join Social Networking site with a Guy Fawkes Mask
    This is one way that separates you in the social networking sites as anonymous. As all of us communicate in social networking site as anonymous with our alias, you are welcome too.
  • Use Secure Browsers
    Incognito mode which you use in any browser  and think safe is also not private as your ISPs can trace your HTTP request and henceforth your IP. So we highly recommend you to use Browsers that provide Anonymity Online. Tor Browser  is one of such promising  browser which is open source project and can be configured as per your knowledge . 
  • User Secure Search Engines
    Search engines like Google, Bing stores information about your hardware and your IP in cookies which is a vulnerable approach of searching. Also these browsers set a search tag cloud for you based upon which they run their ad providing business. Also they know many information about us, what we search what place we choose for holidays, what foods we like, etc. Therefore we highly recommend you to use duckduckgo. This browser doesn't sae any information about you and your searches. 
Few things to be sure about:
Do not forget to clear your history, cookies while you set up these for the first time and every other time you begin to browse anonymously or end from a anonymous conversation. There are also more tools like Telegram, IRCs, Gitter, protonmail etc. which can promise your identity and privacy sage.


References:

Saturday, August 13, 2016

What is AI Winter?

Research in "Artificial Intelligence" a unique and curious field of Computer Science has begun to existence even before John McCarthy proposed term "Artificial Intelligence"  at DartMouth Conference in year 1956. But the one month long Conference united a scattered group of individual researchers who were playing with their individual ideas inside their private labs.
This was the Founding Statement Quoted by McCarthy
"We propose that a 2 month, 10 man study of artificial intelligence be carried out during the summer of 1956 at Dartmouth College in Hanover, New Hampshire. The study is to proceed on the basis of the conjecture that every aspect of learning or any other feature of intelligence can in principle be so precisely described that a machine can be made to simulate it. An attempt will be made to find how to make machines use language, form abstractions and concepts, solve kinds of problems now reserved for humans, and improve themselves. We think that a significant advance can be made in one or more of these problems if a carefully selected group of scientists work on it together for a summer."
This conference was actually fruitful for a various society of AI enthusiasts. If we drill down back to the origin of  achievement in AI , we will find someone quoted similar idea back then. in 60's. 


So how did the term AI Winter  appeared?
Back in 80's  Researchers faced a series of  surreal situation in their research. Funding were not available anymore and neither any of the investors of  Think Tank were interested in Artificial Intelligence Research. Researchers of this field faced  several criticism and disappointments.  AI Winter was named with resemblance of Nuclear Winter  .
Lacking the efficient tools to coin their Theory into a practical application and prove it, they needed to face mean critic and disappointments. As a outcome many of the researchers step back to their private labs and kept working on it on their own investments as much as they can. 
I've listed some Researchers who faced a hard time during the AI Winter here. They have great contributions in Artificial Neural Networks and are also knows as the backbone behind the Google's Deep Dream

Canadian Mafias Who made AI Dream alive with their contribution in Artificial Neural Network


An Artile was published on July 2015 at RECODE [1] which introcuded some of the AI Pioneers of Silicon Valley. The article called them as the “Canadian Mafias “ of Silicon Valley, which was fascinating. 
Based on the story I am highlighting the players in Today’s AI a.k.a CANADIAN MAFIA'S. They may be already listed in some answers but this answer happens to be a profile sharing in curiosity.

  1. Tomi Poutanen [2] 
    CoFounder and CTO of Milq.Inc, Tomi Graduated did his Dissertation on Neural Network from University of Toronto.
  2. Geoffrey Hinton [3]Insctuctor of Tomi Poutanen and also known as the Godfather of neural network is one of the first researchers who demonstrated the use of generalized backpropagation algorithm for training multi-layer neural nets. He is an important figure in the deep learning community.
  3. Yann LeCun [4] and Yoshua Bengio [5] and Hinton were three visionary Researchers who continiued their research on Netral Netowrks in their own labs even in the demoralizing AI WINTER was going on.
  4. Rob Fergus [6] Associate Professor at NYU former LeCun colleague is working as Research Scientis at Facebook AI Research.
  5. Juergen Schmidhuber [7], a Swiss AI researcher also know as vocal critic of the Canadian Mafias has generated many Researchers in the field of AI.
The effects and advancement in the field of AI will soon be realized all over the world
Footnotes

Sunday, August 7, 2016

TOP 5 BIGGEST CHALLENGES ON ARTIFICIAL INTELLIGENCE

Sanjog SigdelSomewhere between Skepticism and Optimism


I don’t have enough experience in Artificial Intelligence to provide you sufficient and promising answer buy as per my understanding:
  • An Artificially Intelligent Machine has achieved some level of accuracy in Image Processing, machine learning is already 97% accurate in comparison to Human, sound recognizition is also on its hipe, Deep Learning has increased the performance of many tech giants, Internet of Things today is all about being of service with some intelligence.

    But:
    Artificially Intelligent Machine can watch a music video process each image frame and at the same time can recognize the voice and the stanzas. But it fails to perceive the sensation of the music and also lacks the knowledge about what message is the song trying to give.

    Computer Science still needs much work in combining the existing achievement and make them a composite intelligence first before moving further.
  • Defining AI: May be there is still not a concrete vision about AI and what sort of Intelligence are we expecting from a machine. Everyone seems to be applying intelligence in their machine. But I would love to call most of such machine are just solving problems by fetching the solutions(patters) stored in their memory by their programmer).
  • We also fail to feed the knowledge about cognitive science in a machine.
  • Human Brain is a mystery box to lean into and dig deep for understanding how it performs the computation in fraction of second. And having understood in detail about human brain scientists replicate neural networks. It works very efficiently than anything better, but still solving the mystery of human brain could lead the breakthrough in AI
  • The architectural design of the microprocessor limits the computation speed when it comes to the billions of information processing to answer a basic query.
    (Read this point here somewhere in Quora)

Will advances in Artificial Intelligence lead to technological unemployment?


Some weekends are well spent exploring new ideas and news about something you love. This weekend I again read some of my bookmarked answers on +Quora all of them were about Artificial Intelligence, Artificial general intelligence , Cognitive thinking, human psychology etc. Link provided below is my answer on quora about "If Artificially Intelligent technologies will lead to technological Unemployment". Also there are some more interesting answers by rest of the enthusiasts. Do provide your feedback.
Read Sanjog Sigdel's answer to "Will advances in Artificial Intelligence lead to technological unemployment?" on Quora

PS:
  1. Sharing the link about my own answer might seem unlikely. But I wanna mention that this sharing is done just in Curiosity to add new node to my Network of like minded people who like to share their comments about Artificial Intelligence. 
  2. If sharing the links violates any legal terms of Quora, I will immediately delete this article.




Saturday, July 30, 2016

How to Clone Ethernet Card MAC Address in Windows 10 OS


Vlog is all about sharing and creating video blogs of my own or from other contributors. 
Sharing tips and tricks about technologies has always been my passion. As I keep my interest in sharing tips and ideas about Open Source Philosophies, My Friend Rabindra Lamsal  keeps interest in both Open Source Technologies as well as Proprietary. He has been a Microsoft Student Partner last year. Therefore having enough experience about Products from Microsoft and as a Network Enthusiast Rabindra has prepared a video blog about  How to Clone Ethernet Card MAC Address in Windows 10 OS.
Description about the video is mentioned below:"In Windows, you don't need to install any sorts of third party applications or software to clone our Ethernet Card MAC address. Within few steps, using inbuilt options, you can change (it's better to say clone) the MAC address.Hope this will be of some help to all Networking Enthusiast."

PS: Rabindra also said"Sharing ideas about high tech tools and technologies doesn't necessarily mean that we are contributing to the online community. Not every one is intelligent and knows about the world about. Sometimes you need to roll back and think how happy you were when for the first time you created your yahoo id, or downloaded a movie via netscape, etc. Those are true learning as well. So whatever may be the complexity level of any technology, my contribution will be to share it in an easy way over internet.

Thursday, February 25, 2016

Set Default and Startup Applications in Ubuntu

This blog will cover two basic things which can be done in Ubuntu. We don't even need to use terminal, this can be done with user interface only:

  • How to change the default applications of your system ?
  • How to add any application in startup ?

Change Default Applications

In order to change the default application, we can set change the default applications for Web Browser, Mail Calendar, Music player, Video Player and Photo Viewer. Applications to open these six types of applications can be set from the settings. To change the settings: 
  • Goto System Settings
  • Details
  • Default Appliation
    Here, on your right you can set the default applications and manipulate them as you want to.

Startup Appliations Preferences

Suppose you want your terminal application to open on startup(as your system
is on). Or you may want to enable you server right from the beginning ,or you may want to open the web browser. All those applications which run from the beginning are startup applications.You can set your desired application as a startup application. To do show:
  • On your dash screen type startup
  • Click Startup Applications
    This will lead you to the Startup Applications Preferences
  • Click Add
    Here we will add the application we want to run as startup
  • In Add Startup Program
  • Enter a name: say Guake Terminal
    Guake Terminal is also a terminal but customised. First you need to install this application. To install type sudo apt-get install guake in terminal.
  • Command Section
    In this section you will need to set the path of your application which you want to run. So you must know where the application is located. Either you can browse it(Generally most of the executables are stored in /usr/bin) or in terminal you can find the location of your application with which command. In terminal type which guake you will get the ouptut: /usr/bin/guake which is the path for executing your application. paste it in the command section.
  • Keep any description if you want and press enter
  • Next time you start your system your startup application is all set.

Wednesday, February 24, 2016

Best Mirror Server Selection for Ubuntu

In Ubuntu every packages are installed on-line only. Installing packages off-line needs more exercise but installing packages off-line is also possible. As the community of Ubuntu is strong, there are its mirror servers in 83 countries. And all together there are hundreds of mirror servers from where we can download packages anytime.
In this blog, two general tips will be illustrated:
  1. How to change the server from main server to country  image server.
  2. How to select the best server for your region.
Generally the best mirror server for us will be the server available in our own country. In my country, Nepal its hosted by Nepal Telecommunications. So right after the installation I'll have to change the server from to Nepal. To do so:
  1. In System Settings
  2.  Software and Updates
  3.  Ubuntu Software : Download From
    Initially the download server is set to the main server. Here we will need to select our country server. To do so:
      Select Download from Other Now you can see all the 83 country servers(Mirror Servers). Select one server from your country. This will change the server and from now onwards your download speed will be fast.
Sometimes your country servers can have problems in downloading packages.  You will be facing unable to fetch some archives... error as shown below:

root@techjhola:/home/techjhola# apt-get install guake
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following extra packages will be installed:
libglade2-0 libvte-common libvte9 python-glade2 python-vte
Suggested packages:
python-gtk2-doc
The following NEW packages will be installed:
guake libglade2-0 libvte-common libvte9 python-glade2 python-vte
0 upgraded, 6 newly installed, 0 to remove and 137 not upgraded.
Need to get 472 kB/643 kB of archives.
After this operation, 3,118 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Err http://np.archive.ubuntu.com/ubuntu/ trusty/main libglade2-0 amd64 1:2.6.4-2
  403  Forbidden
Err http://np.archive.ubuntu.com/ubuntu/ trusty/main libvte-common all 1:0.28.2-5ubuntu1
  403  Forbidden
Err http://np.archive.ubuntu.com/ubuntu/ trusty/main libvte9 amd64 1:0.28.2-5ubuntu1
  403  Forbidden
Err http://np.archive.ubuntu.com/ubuntu/ trusty/main python-vte amd64 1:0.28.2-5ubuntu1
  403  Forbidden
Err http://np.archive.ubuntu.com/ubuntu/ trusty/main python-glade2 amd64 2.24.0-3ubuntu3
  403  Forbidden
E: Failed to fetch http://np.archive.ubuntu.com/ubuntu/pool/main/libg/libglade2/libglade2-0_2.6.4-2_amd64.deb  403  Forbidden

E: Failed to fetch http://np.archive.ubuntu.com/ubuntu/pool/main/v/vte/libvte-common_0.28.2-5ubuntu1_all.deb  403  Forbidden

E: Failed to fetch http://np.archive.ubuntu.com/ubuntu/pool/main/v/vte/libvte9_0.28.2-5ubuntu1_amd64.deb  403  Forbidden

E: Failed to fetch http://np.archive.ubuntu.com/ubuntu/pool/main/v/vte/python-vte_0.28.2-5ubuntu1_amd64.deb  403  Forbidden

E: Failed to fetch http://np.archive.ubuntu.com/ubuntu/pool/main/p/pygtk/python-glade2_2.24.0-3ubuntu3_amd64.deb  403  Forbidden

E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?  

In such case you need to either try the last option displayed in the error panel:
E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?

If this doesn't work as well, you will need to select the best server for you. To do so, after you see the list of mirror server with country names . On its right top corner you can see:
  • Select Best Server This will run a short diagnostics and within a short time will find the best mirror server for you.
  • Select that server and keep downloading from that server.
You country server will again come to operation in a few days. In my case I had same error displayed above. I changed the server from country server to Best Server assigned by my system. And again after two days the downloading was okey. 

Sunday, February 21, 2016

Linux Mint Website Hacked. ISO Compromised

LINUX MINT WAS HACKED

Well you can trust no one, as everything is vulnerable although it seems safe from the outside. One of the best Linux Based Distribution Linux Mint was hacked, as mentioned by the Linux Mint Blog.

How was it hacked?

Blog mentions that hackers built a customized ISO of Linux Mint which had a bug within it and managed to hack Linux Mint Official Website through the backdoor they prepared.

What was affected?

The Linux Mint 17.3 Cinnamon was affected so far. Server of Linux Mint is recently down, for monitoring. SO all other ISO are still safe.

Does that harm you?

If you have downloaded any ISO except Cinnamon version, then you are not affected. You are not affected even you have downloaded them from torrents or from HTTP link.

Who did the atack ?

Those ISOs which got hacked were hosted on  5.104.175.212 and the hosted ISO leads to this website absentvodka,com through the backdoor. This connectd from country Bulgaria.Name of three people were available in the webiste. The motivation behind the hack is still unknown.

How to be safe?

To check if you are harmed check the valid MD5 signatures  of unaffected Cinnamon version below:


6e7f7e03500747c6c3bfece2c9c8394f linuxmint-17.3-cinnamon-32bit.iso
e71a2aad8b58605e906dbea444dc4983 linuxmint-17.3-cinnamon-64bit.iso
30fef1aa1134c5f3778c77c4417f7238 linuxmint-17.3-cinnamon-nocodecs-32bit.iso
3406350a87c201cdca0927b1bc7c2ccd linuxmint-17.3-cinnamon-nocodecs-64bit.iso
df38af96e99726bb0a1ef3e5cd47563d linuxmint-17.3-cinnamon-oem-64bit.iso

If your signature is different, Delete the ISO and use another one. This makes you safe.

The information of this attack was received from Official Blog Linux Mint. For further information and inquiry follow the RSS link available in the Linux Mint Blog

Friday, February 19, 2016

Make your Data, Applications safe in Ubuntu Live Boot

Wouldn't it be fantastic if you could install your necessary applications in a Live Boot and use it wherever you get a computer. Well you can do it. This blog will somehow try to provide a way to store all your data and applications from Live Boot.
Generally running an operating system from an external device like USB is like using guest session. While running the system we have root privileges to download any application and install them. Also we can browse the Internet and download files, make files, folder, etc. But all the data will be erased and your system will be fresh for next time you boot it.

In order to store files, folders and installed applications in your live boot you need to:
  1. Create a user.
  2. Provide that user administrative privilege.
  3. Reboot
Creating a user in Ubuntu is an easy task. There is a GUI "User Accounts" in your dashboard.
 In Dash Menu type: Users. 
  • There you will see one application User Accounts.
  • Add a Account:

    Set the account type to administrator. Enter full name: "test".
    Then you will see the details about the new user.

    Now click the password : Account disabled section , set a password and reboot your system. This type even though you are running your system from live boot you will get a login panel with user name test, login. After login you can add folders and install some applications save them. And reboot the system again. Now you can see the changes all your data is safe. Now you have a portable operating system all the time which you can operate anywhere.

Thursday, February 18, 2016

How to resolve Infinite Login Loop in Ubuntu?

What is a Infinite Login Loop Error?

Trying to login in your account from login panel of Ubuntu, you are again redirected to the same login interface after you enter your password. Again after you enter your password, same screen will be displayed again and again infinitely. We call this error as Infinite Login Loop Error.

There are few possible reasons for causing this Infinite Login Loop. They are:

  • Possible damage of some packages.
    Infinite Login Loop can occur if the last operation you performed in your system was updating various packages, but they got interrupted while downloading. There are some steps which can fix the infinite login loop.
    • Go to runlevel 1: Ctl Alt F1
    • login with user-name and password.
    • Run updates "sudo apt-get update"
    • Check all applications "sudo apt-get upgrade"
    • Check all packages "sudo apt-get -f install"
    • Update grub "sudo update-grub"
    • Remove all old applications and packages "sudo apt-get autoremove"
    • Reboot "sudo reboot" 

  • .Xauthority file chown (change owner) error.
    Sometimes if there are different users in your system and your system assigns the .Xauthority file to root users ( By default the permission is allowed to root only ) then  the users except root may face this Infinite Login Loop Error. .Xauthority file saves cookies and information realted to the login session and various applications after the user is logged in. So now in order to get rid of this error you need to change the owner of the system to your username.
    1. At the login screen enter runlevel 3 by pressing CTRL+ALT+F3
    2.  type ls -lah to look for the .Xauthority file and its privileges.
      You will see thir kind of ourput in the list:
      -rw------- 1 root root 53 Nov 29 10:19 .Xauthority
    3. then type sudo chown 'username':'username' .Xauthority, replacing the username with your username. Now you are able to access the .Xauthority file and all your login information after you login to your system will be stored in this file.
    4. Then reboot your system.
      sudo reboot

Thursday, February 11, 2016

GOOGLE GIVES AWAY 2GB STORAGE ON SAFER INTERNET DAY

Like previous year, Google is giving away 2GB Storage to celebrate Safer Internet Day. Annually Google offers free storage to all of its users. All you need to do is update your security settings. Click here to update your Security Settings.
Google Security Update consists of four security checks:
  • Recovery information
  • Connected dveices
  • Access for less secure apps
  • Account permissions
Updating these checks you will get 2GB of free Drive Storage.The offer has not ended yet. I got 2GB free space on third day.
GRAB YOUR FREE SPACE NOW


Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. This year SID was celebrated on 7th of
 

Friday, January 29, 2016

Ubuntu Xenial Upgrade Crash Troubleshoot

While migrating to Ubuntu Xenial 16.04 (development distribution), the distribution upgrade was interrupted. Due to inconsistent network while downliading the packages some were corrupted. Hence it resulted in crash of Xenial. The upgrade was successful but the display manager didn't work perfectly. 
Main problem is that screen was redirected to the login screen after entering the password. Maybe that specific package was corrupted and it needs to  br reconfigured. So do few things from virtual terminal, Ctrl+Alt+F3

First to confirm that your device is upgraded check the distribution specific information. Click Here.

Now you need to type:
sudo dpkg --configure -a
With parameter --configure -a, dpkg configures  a package which has been unpacked but not yet configured.  If -a or --pending is given instead of package, all unpacked but unconfigured packages are configured. Now all the downloaded packages will be configured and the corrupted / damaged packages while downloading will create error.
To configure these errors and download them again you will be displayed a information in console which says:
gdk-pixbuf-query-loaders > /usrlib/i386-linux-gnu/gdk-pixbuf-2.0/2.10.0/loaders.cache
Make sure you have an internet connection, because you will need to install libgdk-pixbuf2.0-dev in order to run above command. To install this package again type:
sudo apt-get install libgdk-pixbuf2.0-dev

Now installing this package will automatically download the missing downloads and configure the packages and your upgrade is finally successful after a restart.

Thursday, January 28, 2016

How to display Distribution Specific Information in Ubuntu?

Here in this blog Linux commands which displays all the information about your operating system(Ubuntu) is shown.The commands are uname & lsb_release.
uname prints the system information like:  kernel name, network node hostname, kernel-version, machine, operating system etc.
While connamd lsb_release prints the distribution specific information. Well you can see the version of distribution during the first boot but this commands has all the information regarding distribution like distributor's id, release number and codename of the recently installed distribution.

To display all information about your system type:
uname -a or uname -all
And your output is like this:
Linux oracle 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:02 UTC 2015 i686 i686 i686 GNU/Linux

 To display the distribution specific information type:

lsb_release -all
This will display distribution specific information like this:
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty
 

To display specific information about your system use following parameters with command uname:

-s, --kernel-name
        print the kernel name

-n, --nodename
       print the network node hostname

-r, --kernel-release
        print the kernel release

-v, --kernel-version
        print the kernel version

-m, --machine
       print the machine hardware name

-p, --processor
        print the processor type or "unknown"

-i, --hardware-platform
        print the hardware platform or "unknown"

-o, --operating-system
        print the operating system

--help
       display this help and exit

--version
        output version information and exit

To display distribution specific information about your system use following parameters with command lsb_release:

-v, --version
       Show version of LSB against which your current installation is compliant.  Version is expressed as colon separated list of LSB module descriptions.
-i, --id
        Display the distributor's ID.
 
-d, --description
        Display a description of the currently installed distribution.

-r, --release
         Display the release number of the currently installed distribution.

-c, --codename
         Display the code name of the currently installed distribution.

-a, --all
        Display all of the above information.

Wednesday, January 27, 2016

Non-Code Contributions to promote Open Source

Contribute to open source! It’ll look great on your resume! It’s gratifying work!
You may have heard people make these statements, or ones similar to them, numerous times throughout your career. They’re not wrong contributing to open source is a rewarding endeavour in multiple dimensions but, when software engineers advise other software engineers to contribute to open source they usually mean code contributions. This is a fair assumption to make, but the reality is that there are numerous opportunities to contribute to open source without writing a single line of code. How? Let’s run through some of the non-code opportunities to contribute to open source.

This particular paragraph that I read made me to write about the way I am contributing in open source. You can read the article written by Safia Abdalla [Here]

Evangelize

It is not that your friends will be impressed seeing Linux installed on your system and they will instantly want to install Linux and use it. Open source is not that catchy to everyone. But its your role to evangelize them about the bright side of open source. If you are using open source software then spread the word about it among your circle. The guy who is doesn't know about open source is always using it unknowingly (android phones and various servers online which are hosted by Linux). If you are using any project related to open source then just share it: it will make a good impression.
Last semester I used an open source model (open sunbrust model) for data visualization. It helped me to get through my project.
  

Report bugs

 You don't need to be a geek to use any open source software. Best part as well as the worst part about linux is errors and troubleshooting them. So a non-code contribution to open source can be error reports or bug reports. For and error you face you can report it to its website or community support website. So that someone who have gone through the same error can give you the solution. If it is some new error than the core developer team will be happy to help you out to make their open source project efficient for many number of users.

Mentor

Solving any error is not always about revising the code. So while troubleshooting your problems you will find that adding the missing links in the source code or installing some missing plugins will solve the problem of a software. In that case you can share those ideas through support communities. It certainly takes a long time for the core developers team to get to your error and solve it. So community support site is the best way of mentoring and flourishing open source software.

Write

You can just write a sentence as a comment in any support communities which helps someone to solve their system. Your can ask questions or answer someone's in a descriptive way so that it will help all the people. You can answer the solution in stackoverflow, askubuntu or through social networking sites.

Host a meetup

Here in our university we volunteers from KUOSC  and FOSS NEPAL organize Open Source meetups and workshops like Linux Talks, FOSS KA KURA, E-Library Project, LTSP Workshops, Trainig of Trainee. Organizing such events is directly helping many students of the university to harness their skills about Open Source Softwares.

Localize

This activity is purely non-code and not-technical way of contributing in the open source projects. As the open source community extends all over the globe its you responsibility to make its use in your country. So language is the only way to communicate. Here in Nepal, we volunteers of FOSS NEPAL are localizing the Ubuntu Xenial 16.04 LTS in our official language Nepali. This will boost non-tech users as well as the government officials to be motivated towards open source software easily. You can contribute and localize it in your official language. It makes you feel special when you will see your contribution makes an effect , and your name in the contributors' list.

Improve security

You are not an expert in programming but your interest in security aspects may be so keen. If so is the case, you can  contribute some time in doint the application vulnerability resting or locating the loop holes in a project which can be threat to a open source project.

Conclusion

Open source projects are secured and trusted all over the globe by a combined effort of all tech and non-tech support communities overseas. So whoever or wherever you are you are always welcome to contribute in open source projects.
Now I totally rely on open source as it is secures, extensible, stable and every open source projects have a huge community support which makes me out of any problem within minutes. And open source projects are customizable and they allow us to shape it the way we want.

Lastly I would like to thank Sagia Abdalla for I wrote my viewpoints about ways of promoting Open Source reading hear article  [Here].

About Me

authorHello, my name is Jack Sparrow. I'm a 50 year old self-employed Pirate from the Caribbean.
Learn More →