When you create a new file on your Linux computer, a certain amount of disk space is allocated to the file. Adding new content to this file increases the file size and accordingly, Linux allocates more space to the file. Alternatively, you can use the fallocate command in Linux to preallocate data blocks, which involves allocating the data blocks and marking these data blocks as uninitialized.
In this tutorial, we’re going to show you how to zip files and directories/folders on Linux. This tutorial will work on most major distros, like Ubuntu, Linux Mint, Fedora, Debian, CentOS, etc.
ZIP is a utility used to compress/archive files and directories on Linux. It’s available for most major distros.
This tutorial is for the CLI/terminal. All you need is access to the command line and the root/sudo user.
If you want to zip/compress something via the GUI (graphical user interface), then just right-click on the files or folders and click on Compress or Archive.
MySQL is a relational database management system based on SQL (Structured Query Language). It is one of the most widely used database software for several well-known applications. MySQL is used for data warehousing, e-commerce, and logging applications, but its most used feature is a web database storage and management.
The following tutorial will teach you how to install MySQL Community on Debian 11 Bullseye using the MySQL official APT repository, which will give you the latest version available on your system using the command line terminal.
Learn a simple command to install Rocket Chat Server on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal.
Rocket.Chat is an open-source platform for team collaboration and communication with live chat, video and audio conferences, file sharing, message translation, and more. With Rocket.Chat, users can use the native iOS apps and Android apps from any device with Internet access, including Windows, Mac, mobile devices, or tablet devices. People widely compare it with Slack and consider it one of the Best Alternatives of it.
With the communication platform, employees in the company can chat, exchange files and meet in group chats. This saves mass e-mails to many addressees, as everyone can read along in the group chat and trace the communication. In addition, there is security through end-to-end encryption to keep communication confidential.
In addition to pure text messages, video calls are also possible. Facebook, WhatsApp, SMS, and CRM can also be integrated into Rocket.Chat. From the Advanced package, the Rocket chat app even includes video conferencing and helpdesk chat. Users can go their business with the helpdesk chat for customer inquiries on their homepage with the help of omnichannel.
Sysdig is open source, system-level exploration: capture system state and activity from a running Linux-based system such as Debian 11, then save, filter, and analyze that is particularly useful for system analysis, inspection, and debugging, amongst other uses. Sysdig is scriptable in Lua and includes a command-line interface and a powerful interactive UI using the command csysdig that runs in your terminal.
The following tutorial will teach you how to install Sysdig on Debian 11 Bullseye using the command line terminal and basic commands for using Sysdig.
Another free game for you to add to your collection. GOG are now giving away the sci-fi point and click adventure VirtuaVerse as part of their Summer Sale. This is the finale, so don't expect any more to come through.
Dead Cells is a great game. Not only does it look great but the action is awesome. However, it is rather difficult and for some nearly impossible so the developers have put out a huge free upgrade to help more people play it.
Valve has released a fresh update to Counter-Strike: Global Offensive and they continue focusing on Steam Input improvements, to make playing it with a controller and the Steam Deck a better experience.
Following on from their successful Kickstarter campaign, Tyrant's Blessing now has a release date and a brand new trailer and it's looking rather good. Seems like a fun blending of styles from Final Fantasy Tactics and Into the Breach! It's confirmed to be launching on August 8th with Native Linux support and there's a demo available on Steam.
Grim Horde is a game that released into Early Access with Native Linux support and it's another fast-paced rogue-lite hell in a slightly similar way to the chaos found in Vampire Survivors only you control a horde of minions.
Subset Games have recently announced that they're upgrading Into the Breach with a big free update in Into the Breach: Advanced Edition that releases on July 19th. Just like they did with their previous game FTL!
 Steam Deck is making news for all the right reasons. It is a fantastic piece of tech, powered by a variant of Arch Linux (SteamOS 3.0) developed by Valve.
While you can install any other operating system in it, it is best to have it as it is for convenience.
Unfortunately, Steam Deck or anything similar is not available everywhere. So, what if you can convert your system to a Linux-powered retro gaming console using a distribution?
This week I mainly worked on the pomodoro and lorem ipsum apps. I also fixed some bugs on general KDE stuff.
The EndeavourOS team brings the June 22.06 release ("Artemis") with much-better ARM support, the latest Kernel and more. We round up the release in this post.
As of Fedora 36, Fedora changed their default fonts from DejaVu to Noto. This changes what the standard names 'serif', 'sans', and especially 'monospace'. When I upgraded my desktops to Fedora 36, I had a very bad reaction to the 'monospace' change, because the result looks really bad. It turns out that part of the reason that the result looks bad (although not all of it) is specific to xterm, and that is where the mystery comes in.
Ubuntu 22.10 (Kinetic Kudu) is now available on the download page as an alpha/beta release. In addition, there are other flavors, such as Kubuntu XFCE Netbook Edition, which features a KDE desktop environment instead of GNOME preinstalled on this version; however, if that’s not what suits your taste, then go ahead with the standard edition.
The download links below allow you to try out different flavors of Ubuntu. The desktop environment installed in each flavor varies, but all are up-to-date with the latest software from this distribution’s stable release schedule and daily sync process!
 3D printing can be time-consuming and challenging, and even today, it’s still not as easy as using a photocopier, but the team at Bambu Lab has taken it upon itself to make a better, easier-to-use 3D printer with the X1 color 3D printer combining LIDAR and AI technology to level the bed, calibrate the prints, and detect anomalies.
The Bambu Lab X1 3D printer supports up to 16 colors, is making removing support easier with snap-away material or dissolvable filament, can handle PC and PA-CF filaments beyond the traditional PLA and PETG filaments, manage up to 500 mm/s prints, and provides better prints with features such as active vibration compensation. Oh, and you don’t need to assemble it, since it comes fully assembled and ready to use out of the box.
This is the second post in a series about doing device firmware updates (DFU) over the air (OTA) and continuous deployment of firmware for embedded devices. We'll explore the different parts of a complete end-to-end system with this capability.
This post will be about the different networks and how you can manage firmware updates using them.
Although there are numerous programming languages available in the market to work upon, but C++ has never lost its charm since its inception and still has a strong impact in the development world. As per the reports, C++ comes under a few top programming languages across the world. Alike the C programming language, C++ also makes it easier for you to understand the underlying architecture of programming, although it also supports other additional features such as object-oriented programming, exception handling, etc. Moreover, various IT giants Google, Amazon, Microsoft, etc. offer numerous career opportunities to C++ professionals, hence you’re strongly recommended to give it a try and start to learn C++ Programming.
This is the first in a series of blog posts on Security by Diversity. Here we'll focus on the scaling properties of reliability through diversity. Later blog posts will introduce the business and economic aspects of security through diversity and discuss not only technical security but also how to secure coordination and similar organisational aspects.
I think most of us have experienced how hard it is to find personal and human made content on the internet these days. Bot generated content runs galore and SEO weights search results in favour of enterprise pages.
But some of us intentionally make some of our stuff a little harder to find. It's a way to cater to specific interest groups, I guess. Or participating in smaller communities. Sometimes it's about making a statement or just trying out something new.
The irony of this introduction sounding like a corporate "best X of 2022" blog is not lost on me. Maybe I meant it to, or maybe I'm damaged by the common pages I'm served on a daily basis. I don't really know.
Anyways! I dug a little bit (really not much, since these things are already within or adjacent to my social circles) to find semi hidden communities that most people probably haven't heard of.
Let's discuss the humble thermostat. You probably have one in your house, and it probably connects to a set of wires. If you've ever replaced your thermostat, you've probably found those wires a little irritating due to the lack of well standardized nomenclature for identifying them. This is particularly clear in the new generation of smart thermostats which attempt to be "consumer-friendly" to install, and thus must have sort of complex install wizards (InstallShield (R) for Thermostats) just to generate your hookup instructions. So what's up with that?
Well, let's take a step back.
Apple and Google have twisted their decade-old rules for their app stores like a pretzel to the point where they may no longer make sense. This has made buying digital stuff in apps convoluted as heck.
One example: In theory, although not yet in reality, you can use your Amazon account to buy an e-book from Kindle’s iPhone app. You cannot buy an e-book in the Android version of the app. Until recently, Kindle purchases were effectively a no-go under Apple’s rules but fine under Google’s. Now it’s the opposite.
Confusing? Yep. Apple and Google have written long, complicated guidelines for apps and have frequently revised those rules to protect their own interests. (I’ve noted before that Apple’s app rules are much longer than the United States Constitution.)
Established in 2001, Hikvision was perfectly placed to capitalize on the trend toward upgrading security in the aftermath of 9/11. It started by selling video capture cards that are used in surveillance systems, but it introduced its own video cameras in 2007. Today, it sells everything from software to hardware, usually at prices much cheaper than international competitors’.
Its founding team consisted mostly of engineers at China Electronics Technology Group Corporation, a state-owned company that makes electronic products for both civilian and military uses. In 2008, Hikvision transferred 48% of its shares to CETC, making Hikvision officially a subsidiary of a state-owned firm.
The identification app will work for both in-person and online interactions.
[...]
The legislative proposals concerning both digital identity and personal identity codes are expected to reach Parliament this autumn.
Khastar’s statement came approximately 19 months after the first in an ongoing series of nationwide uprisings which revealed the depth of popular support for regime change in Tehran. At the end of 2017, a protest began in the city of Mashhad over the state of the Iranian economy, then began spreading rapidly while also taking on an increasingly political tone. By early January 2018, the movement encompassed well over 100 cities and towns, with each of them providing an outlet for unusually provocative slogans including “death to the dictator”. At the height of that uprising, Khamenei delivered a speech which acknowledged that the MEK had played a leading role in promoting those slogans and facilitating the constituent protests.
The headlines and stories that have emerged are clear-cut. "Trump knew plan was illegal," The Washington Post told readers atop its paper after one hearing. "Jan. 6 committee leaders say Trump broke the law by trying to pressure Pence," said NPR. "Trump, Told It Was Illegal, Still Pressured Pence to Overturn His Loss," The New York Times reported.
To achieve that, the hearings relied on subtle television news techniques and choices, rather than sensationalism. And they did so in two ways.
The first involves how the material is shaped.
Donoghue, who took contemporaneous notes on that conversation, and several others with the former president, emphasized that it was an "exact" quote. Trump made the remarks in the transition period between the 2020 presidential election he lost and the Jan. 6 insurrection.
The report was commissioned by the Defense Advanced Research Projects Agency, or DARPA, and the work was done by the software security research company Trail of Bits.
Trail of Bits CEO Dan Guido says blockchain — the public ledgers that keep track of cryptocurrencies, which are replicated on computers around the world — isn't the egalitarian tech its advocates claim.
Surprisingly, we also found that men with a monk brother had more children than men with non-celibate brothers; and their wives tended to have children at an earlier age. Grandparents with a monk son also had more grandchildren, as their non-celibate sons faced less or no competition with their brothers. The practice of sending a son to the monastery, far from being costly to a parent, is therefore in line with a parent’s reproductive interests.
In the old fable of the Emperor’s New Clothes, people denied the emperor’s nakedness because they wanted to be seen as smart. Today people deny overpopulation because they want to be seen as moral. It is a form of virtue signaling: are you for justice and equity and families and being nice to refugees, or are you one of “The People Who Hate People”? Few look at the data to see whether their position actually favours those goals, or whether, indeed, they are having the opposite effect, obstructing progress toward a fairer, more peaceful and sustainable world. How did it come about that so many people became so passionately misinformed?
Safeguarding elections is no longer Mr. Zuckerberg’s top concern, said four Meta employees with knowledge of the situation. Instead, he is focused on transforming his company into a provider of the immersive world of the metaverse, which he sees as the next frontier of growth, said the people, who were not authorized to speak publicly.
The shift in emphasis at Meta, which also owns Instagram and WhatsApp, could have far-reaching consequences as faith in the U.S. electoral system reaches a brittle point. The hearings on the Jan. 6 Capitol riot have underlined how precarious elections can be. And dozens of political candidates are running this November on the false premise that former President Donald J. Trump was robbed of the 2020 election, with social media platforms continuing to be a key way to reach American voters.
The National Telecommunications Commission (NTC) has ordered internet service providers to immediately block access to websites linked to the Communist Party of the Philippines-New People's Army-National Democratic Front (CPP-NPA-NDF) and its alleged affiliates following the request of National Security Adviser Hermogenes Esperon.
Esperon's request, dated June 6 and publicized on Wednesday, sought to prohibit access to websites that are directly linked to the CPP-NPA-NDF. These are the National Democratic Front of the Philippines site, the official publication of NDF; and the website of CPP founder Jose Maria Sison, who is a designated terrorist under Anti-Terrorism Council Resolution No. 17 issued in 2021.
Hong Kong passed a censorship law last year to bar films that "endorse, support, glorify, encourage and incite activities that might endanger national security".
The censorship law followed a national security law that Beijing imposed on the former British colony in 2020 that sets out punishment for anything deemed subversion, secession, colluding with foreign forces and terrorism, ending pro-democracy protests that rocked the city for months.
Since the dissolution of the Motion Picture Production Code, also known as the Hays Code, in the late 1960s, film censorship has been relatively uncommon in the United States. However, several other countries still actively ban films. Though science fiction is less of a target than other genres, there are still many notable examples of sci-fi films that ran afoul of censors, and behind each case lies a deeper story. Ironically, these bans end up revealing more about the perpetrators and their politics than any sci-fi film ever could. Aliens may be wacky, but they aren't as real as the skeletons in your closet.
In a now-deleted post, the Holywings bar offered a free bottle of gin for men named Muhammad and women named Maria every Thursday if they showed their ID cards
The group also plans to file a formal blasphemy complaint against Holywings with the Jakarta Metro Police. Under Indonesian law, religious blasphemy is punishable by up to five years in prison.
In the now-deleted post, Holywings promised a bottle of Gordon’s dry gin for men named Muhammad while women who are named Maria would get a bottle of Gordon’s Pink Gin every Thursday, reported Coconuts Jakarta.
According to a joint survey conducted by media watchdog, Reporters Without Borders (RSF), and the Afghan Independent Journalists Association in December 2021, 84 percent of women journalists and media workers had lost their jobs since August 2021. Another survey carried out by the Afghan National Journalists’ Union in March 2022, found that 79 percent of Afghan women journalists claimed to be insulted and threatened under the Taliban rule, which includes physical and verbal threats by the Taliban representatives. Afghan female broadcasters have also reported being “blacklisted” by the Taliban officials.
On June 7, Afghan vlogger Ajmal Haqiqi – well known for his YouTube channel and modeling shows – appeared in a very different kind of broadcast. Taliban officials arrested Haqiqi and his three colleagues and released a video showing the men, with bruised faces and clearly under duress, apologizing for encouraging “prostitution” and “insulting verses of the Quran.”
On May 28, the four had posted a YouTube video in which they recited Quranic verses in Arabic in a comical tone. Within a week, the Taliban’s General Directorate of Intelligence (GDI) had detained them.
Well-known Belarusian philosopher Uladzimer Matskevich has been sentenced to five years in prison over his active participation in public events questioning the official results of the August 2020 presidential poll that handed victory to authoritarian ruler Alyaksandr Lukashenka.
The Minsk regional court sentenced Matskevich on June 23 after finding him guilty of participating in unsanctioned events that disrupt social order, creating an extremist group, and insulting Lukashenka online.
Matskevich was arrested in August last year.
The press freedom group, known by its initials in French as RSF, sent two investigators to Ukraine to gather evidence about Levin’s death on the northern outskirts of Kyiv.
The probe, including at the site of Levin’s charred car, indicated the two men “were executed in cold blood by Russian forces, probably after being interrogated and tortured,” RSF said Wednesday, citing photos, testimonies, bullets it collected from the site and other information it gathered.
In a statement on June 22, HRW said that Abdullo Ghurbati and Daleri Imomali, who were detained on June 15 and sent to pretrial detention for two months three days later, "are being targeted for their professional activities, despite being protected by Tajikistan’s laws and international obligations on freedom of expression and media freedom.”
“Criticizing state institutions is not a crime, and the bloggers should be released immediately and all charges against them dropped,” HRW's Central Asia researcher, Syinat Sultanalieva, said in the statement.
When: Friday, July 1, 2022 at 11am BST (arrive 15minutes early if you want to secure a seat on the bus).Where: Home Office, 2 Marsham St, London SW1P 4DFRegister https://www.eventbrite.co.uk/e/free-assange-open-top-bus-tour-rally-tickets-373210561837
The unmistakable fact is that Merrick Garland’s Justice Department is still actively pursuing the extradition of Julian Assange, in order for him to face charges under the Espionage Act and spend the rest of his life in prison. This is the same Espionage Act that the Nixon administration considered using against Daniel Ellsberg, for leaking what became known as the Pentagon Papers, which were published in the New York Times and elsewhere.
Unlike Ellsberg, Assange did not himself steal, hack, or otherwise make off with secret documents that exposed US war crimes. He only facilitated the leaking of these documents, and the eventual publication of redacted parts of them by Wikileaks, the New York Times, and most of the rest of the world’s media. But unlike with Ellsberg, the government is going ahead with prosecuting someone — a journalist and editor named Julian Assange — under the Espionage Act.
Ellsberg, like Assange, was put on trial for spying. Ellsberg, like Assange faced a lifetime in prison, only for the charges to be dismissed because of government misconduct against him.
He told the London Court that he felt an immense fellow feeling with the Wikileaks founder.
In an important statement, Ellsberg—the doyen of whistleblowers—explained that while he was serving in Vietnam, detailed knowledge of US war crimes remained confined to a tiny circle.
+ PEN America on Julian Assange’s extradition: “The Biden Administration must return to its stated principles and drop these charges, in the interest of press freedom and the United States’ global standing with respect to human rights.”
+ The key thing in American politics is to be the first to wrongly interpret a result (ie., the recent elections were a clear rebuke to criminal justice reformers) and to loudly stick with your take long after it has been disproven.
The second example is after Wikileaks was mysteriously gifted the CIA’s full set of hacking tools known as Vault 7, which they proceeded to publish. Fowler speaks with CIA management regarding and writes, “The documents provided an insight into the CIA’s operations, according to security analysts, but they did not give away the organisation’s key capabilities.” Nevertheless, the Agency over-reacted, although Fowler doesn’t call them on it. He continues: [...]
While Assange obviously has more skin in the game than anyone else in this particular case, he’s not the real target. The real target is the next journalist who catches the US government acting illegally. The goal is to make that journalist think twice before telling you about it.
For that reason, stopping the extradition of Julian Assange isn’t enough. Nor should we settle for an acquittal in court or a presidential pardon.
Crimes have been committed, and examples DO need to made of the criminals who committed them.
The 91,000 documents on Afghanistan, covering 2004-2009, were leaked in July 2010 and published in The New York Times, The Guardian, and Der Spiegel, which argued that the global public had a right to know what was happening. The Times wrote that the leak “offers an unvarnished and grim picture of the Afghan war.” The Guardian called the material “a devastating portrait of the failing war in Afghanistan, revealing how coalition forces have killed hundreds of civilians in unreported incidents, Taliban attacks have soared, and NATO commanders fear neighbouring Pakistan and Iran are fuelling the insurgency.” Der Spiegel wrote that the recipients of the leak were “unanimous in their belief that there is a justified public interest in the material.”
The Iraq war logs consisting of nearly 400,000 documents and covered the same period. They were leaked in October 2010 to the same three newspapers plus al-Jazeera, Le Monde, the Bureau of Investigative Journalism, and the Iraq Body Count website. These documents revealed that the US war had caused tens of thousands of civilian deaths, human rights abuses, arrests and disappearances. One video showed a US helicopter gunship firing on insurgents seeking to surrender while another pictured two Apache helicopters shooting down 10 men, including two Reuters journalists, in a small square in Baghdad. The torture and beatings administered to detainees at Abu Ghraib prison outside Baghdad (which I visited in 2004) were investigated only after after being revealed by WikiLeaks.
A number of girls “removed their hijab at the end of the sports event without observing the religious considerations and legal norms,” state news agency IRNA quoted Shiraz police chief Faraj Shojaee as saying.
“With the coordination of the judiciary, a number of perpetrators and people related to this gathering were identified and arrested on Thursday,” he said.
After the shocking brawl in an open-air swimming pool in Berlin last weekend, the President of the Association of Lifeguards, Peter Harzheim, has now commented in the newspaper “Bildzeitung” on the transformation of our open-air swimming pools into no-go areas.
After half a century, Americans' constitutional right to get an abortion has been overturned by the Supreme Court.
Bans on abortion, birth control, and same-sex marriage are at stake in November's elections.
At the same time, a number of European carriage providers appear to be adopting the Korean line of argument and putting pressure on the policy makers for measures to force content streamers to pay to have their content streamed to users. Their argument appears to be that these content streaming models have placed undue pressure on the carrier’s infrastructure investment models and the carrier is left with the incremental costs of infrastructure upgrades while the content provider is reaping the commercial benefit.
These representations relating to the of big tech enterprises appear to have struck a sympathetic chord at the European Commission (EC), and in May, the EC’s Commissioner for Competition, Margrethe Vestager, noted a need to consider the broader issue of a ‘fair contribution to telecommunications networks’. A study released by the European Telecommunications Network Operators’ Association (ETNO) at the time noted that the ‘big 5’ (Alphabet, Facebook, Netflix, Apple, Amazon, and Microsoft) collectively accounted for more than 56% of all Over the TOP (OTT) network traffic and are implying that they have not contributed their ‘fair share’ of the costs of infrastructure to handle that volume of traffic.
The European Union is preparing to launch an antitrust investigation into Broadcom Inc.’s proposed $61 billion acquisition of VMware Inc., the Financial Times reported today.
Broadcom is a major chipmaker that supplies processors used in data center switches, Apple Inc.’s iPhone lineup and many other devices. The company has over the past few years also established a presence in the enterprise software market. To accelerate its enterprise software strategy, Broadcom last month inked a deal to buy VMware for $61 billion.