Weird Editorial Choices in ‘Linux Today’ These Past Few Hours (Updatedx14)

Posted in Deception, Marketing at 10:49 pm by Dr. Roy Schestowitz

As of moments ago:

'Linux Today' spam

These aren’t articles or news, these are diploma mills:

ZDNet spam

ZDNet spam

Summary: Webspam from ZDNet‘s sister site is being promoted in Linux Today’s front page and RSS feed; paid-for promotional plugs?

Update: They’ve just done it again, less than a day later.

ZDNet again

Update #2: Fourth time in a day. ‘Linux Today’ probably gets paid to post this spam.

The fourth ZDNet spam

Update #3: Wow, fifth time in just over a day. Webspam from ZDNet’s sister site. What on Earth is going on here? Sunset for the site? Has ‘Linux Today’ sold its soul to diploma mills?

A fifth ZDNet spam

Update #4: For the sixth time in 2 days, ‘Linux Today’ posts spammy “plugs” as “news”.

This is at least the sixth such 'TechRepublic Academy' plug in 34 hours; not offensive when they say it?

Update #5: Again today.

LT spam

Update #6: Has ZDNet’s parent company ‘taken over’ Linux Today?

Troubleshooting Linux: An admin’s Guide

It is not even an article!

Spam marketing

Update #7: And again just hours apart.

Linux Today spam again

One can guess what’s happening here. Linux Today has basically sold out.

Spammy Linux Today

Update #8: The site seems like a spam machine.

Spammed today


Spammed to death. Will that ever stop?

Update #9: Still going… and a third time today.

LT premium

LT premium

Linux Today used to be a hub for Linux news. Now it’s just webspam operation for a sister site of ZDNet.

Update #10: Still happening… for nearly a week already.

Saturday spam

Update #11: It’s happening, still. Now for a whole week.

systemd spam

ZDNet's systemd spam

Update #12: It has now been over a week.

Premium one week

Update #13: More sales instead of news.

Selling stuff

Linux comparison

Update #14: More of that same old spam, even dated 2021. Certainly some back room deal to post garbage in Linux Today.

2021 spam

Premium spam

Links 02/08/2022: Emmabuntüs Debian Edition 4 1.02 and ScummVM 2.6.0

Posted in News Roundup at 8:38 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Mirantis Adds Lens Pro Edition to IDE Portfolio for Kubernetes – Container Journal

        Mirantis has made available a Lens Pro edition of its cloud-native application integrated development environment (IDE) that includes a local instance of Kubernetes. That instance can be automatically provisioned along with on-demand support and a streamlined set-up process for container image scanning and vulnerability reporting tools.

        Miska Kaipiainen, vice president of product engineering for Mirantis, says Lens Pro is aimed at enterprise IT organizations looking to improve productivity. It is priced at $19.90 per month per seat or $199 per seat for an annual license.

      • Istio / Announcing Istio 1.13.7

        This release contains a fix for CVE-2022-31045 and bug fixes to improve robustness. We recommend users install this release instead of Istio 1.13.6, which does not contain the above CVE fix. This release note describes what’s different between Istio 1.13.6 and Istio 1.13.7.

      • Istio / Announcing Istio 1.14.3

        This release contains a fix for CVE-2022-31045 and bug fixes to improve robustness. We recommend users install this release instead of Istio 1.14.2, which does not contain the above CVE fix. This release note describes what’s different between Istio 1.14.2 and Istio 1.14.3.

    • Audiocasts/Shows

    • Kernel Space

      • Make Use OfLinus Torvalds Upstages Own Linux 5.19 Kernel Release by Announcing It on Apple Silicon-Powered MacBook Air

        Linus Torvalds has announced the latest version of his Linux kernel, 5.19, but he might have upstaged his own release with how he announced it: from an Apple Silicon-powered Macbook Air laptop running Asahi Linux.

      • CollaboraKernel 5.19: Probably the final release of the 5.x series

        As usual, there are quite a few changes merged into the mainline; among the most interesting are:

        - Arm Scalable Matrix Extension
        - Intel “in-field scan” mechanism for CPU diagnosis
        - initial support for the LoongArch CPU architecture
        - support for running 32-bit binaries on 64-bit RISC-V systems
        - several io_uring subsystem enhancements
        - BIT TCP support for handling huge IPv6/TCP packets
        - Zstd compression support for firmware files
        - AMD’s Secure Nested Paging and Intel’s Trusted Domain Extensions for enhanced virtualization/containers security

        More details about the merge window are available on LWN.net: part 1.

        Looking at the version history, one may notice the 3.x kernel series ended with version 3.19, while the 4.x series ended at 4.20. As there is no clear naming convention for future kernel versions, it remains to be seen if Linus will decide to end this series with version 5.19 or to extend it to 5.20 or beyond.

    • Instructionals/Technical

      • RoseHostingHow to Install Neos CMS on Ubuntu 22.04 – RoseHosting

        In this tutorial, we are going to install Neos CMS on Ubuntu 22.04 OS.

        Neos CMS is an open-source Content Management System that allows developers and users to build their websites in a couple of steps quickly. Neos CMS is written in PHP and javascript and uses SQL. In this blog post, we will install Neos CMS with the LAMP stack so you can easily access it via a domain name.

      • LinuxTechiHow to Install KVM on RHEL 9 Step-by-Step

        In this guide, we will cover how to install KVM on RHEL 9 step-by-step.

        Kernel-based Virtual Machine, or KVM in short, is an opensource virtualization solution for the Linux kernel. It supports both Intel and AMD CPUs and allows users to create and manage virtual machines on a Linux system. The kernel functions as a hypervisor and allows you to virtualize your entire dedicated server and create multiple VMs.

      • nixCraftDNS settings to avoid email spoofing and phishing for unused domain

        As you may know, email spoofing allows attackers to pose as someone else to gain illegal profit. For example, I only use webmaster@cyberciti.biz for communication, but someone might create a spoofed-up email, say info@opensourceflare.com, to trick someone.

      • LinuxConfigHow to set filesystems mount order on modern Linux distributions

        In a previous tutorial we discussed about the /etc/fstab file, and how it is used to declare the filesystems which should be mounted on boot. In the pre-Systemd era, filesystem where mounted in the order specified in the /etc/fstab file; on modern Linux distributions, instead, for a faster boot, filesystem are mounted in parallel. Systemd manages the mounting of filesystems via specifically designed units automatically generated from /etc/fstab entries. For these reasons a different strategy must be adopted to establish the dependency between two filesystems, and therefore to set their correct mount order.

        In this tutorial we see how to establish an explicit dependency between two filesystems and set their mount order on modern Linux distributions.

      • Linux Made SimpleHow to install Gacha Club Edition Beta on a Chromebook

        Today we are looking at how to install Gacha Club Edition Beta on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • ByteXDHow To Use I/O redirections in Linux – ByteXD

        In this article you will be acquainted with the concept of I/O redirections, and the different ways to use standard output, standard input and standard error.

      • CitizixHow to install Java 11 in OpenSUSE in Rocky Linux/Alma Linux 9

        In this guide we are going to explore how to install Java Runtime Environment (JRE) and the Java Developer Kit (JDK) in Rocky Linux 9. This guide also works for RHEL 9/Alma Linux 9.

        Java and the JVM (Java’s virtual machine) are required for many kinds of software, including Tomcat, Jetty, Glassfish, Cassandra and Jenkins.

        Java is a high-level, class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. Java was developed by Sun Microsystems (which is now the subsidiary of Oracle) in the year 1995. James Gosling is known as the father of Java.

      • CitizixHow to install and set up Jenkins in Rocky Linux/Alma Linux 9

        In this Guide we are going to learn how to install and configure Jenkins in Rocky Linux 9. This will also work for other RHEL 9 derivatives like Alma Linux.

        Jenkins is a popular opensource automation tool to perform continuous integration and build automation. Jenkins allows to execute a predefined list of steps, e.g. to compile golang source code to build build binary file. The trigger for this execution can be time or event based.

      • LinuxConfigHow to disable Plymouth on Linux

        Plymouth is an application originally developed by Red Hat and later adopted basically by all the most commonly used Linux distributions. The software runs very early in the boot process, and provides eye-candy animations which accompany the user until he is prompted to login into the system. When Plymouth is used, boot messages are hidden, although they can be visualized simply by clicking the esc key. Some users, however, may prefer to visualize boot messages by default, and avoid any animation.

        In this article we see how disable Plymouth animations on some of the most used Linux distributions.

      • LinuxConfigHow to customize the SDDM display manager on Linux

        SDDM (Simple Desktop Display Manager) is a modern, free and open source Display Manager available on Linux and other Unix platforms like FreeBSD. It works both with X11 and Wayland, and is based on QtQuick, a framework to build QML applications. SDDM allows a great degree of customization and; thanks to this, a lot of custom themes are available for it.

        In this tutorial we see how to install and enable SDDM on some of the most used Linux distributions, and how to change its look by using custom themes.

      • LinuxConfigHow to create snapshots of QEMU/KVM guests

        KVM (Kernel-based Virtual Machine) is the virtualization solution (type 1 hypervisor) included in the Linux kernel, which, by default, is used together with QEMU, the userspace software which actually performs the guest systems emulation (type 2 hypervisor). In a previous tutorial we saw how to create and manage KVM virtual machines from the command line; in this article, instead, we will learn how to create and manage guest systems snapshots using tools like virsh and virt-manager.

        In this tutorial we learn how to create snapshots of guest systems emulated with QEMU/KVM, using virsh and virt-manager.

      • TechRepublicHow to install the Dolibarr ERP/CRM platform on Ubuntu Server 22.04 | TechRepublic

        If your business has grown to the point it requires help with planning and organizing details such as contacts, suppliers, invoices, orders, stock and schedules, you need an ERP tool. You can either turn to a third-party platform, or you can deploy an in-house solution to your data center or a third-party cloud host.

        Follow this step-by-step process of installing the Dolibarr ERP/CRM solution, which is perfectly suited for organizations of all sizes as well as for freelancers.

      • ZDNetHow to create a Linux virtual machine with VirtualBox | ZDNet

        Linux is everywhere — in phones, smart appliances, cloud storage services, cars, thermostats, and just about everything with an embedded system or a major third-party service.

        It can also be on your desktop. Linux is a fantastic choice as a desktop operating system because it’s incredibly reliable, secure, and more flexible than any other OS on the market. But for those who might be hesitant to install Linux over macOS or Windows, what can you do? One route that makes it very easy to test and use Linux, without doing anything to your primary operating system, is the virtual machine route.

      • LinuxSecurityInstalling SurfShark VPN On Kali Linux: The Authoritative Guide

        Virtual Private Networks (VPNs) were initially created to grant workers who are remote, workers who travel, or workers who do not tend to be in the office access to the local network over an insecure network connection when they are not physically within the local network. Essentially, a VPN can be used for various reasons however, the main purpose was for the use of businesses and companies. Not only would workers need to access resources on the company network but companies with multiple offices that need to work in unison as if they’re on the same network found that a VPN would be the ultimate solution. Nowadays, daily computer users use VPNs for many different use cases but mainly, they want to maintain their privacy and better control access to resources. VPNs are used to guard daily users and companies alike against cyber criminals on public networks and are also used for hiding your IP address, your browsing activity, and your personal data on any network you may be connected to, whether it be at home or at a coffee shop. Ultimately, what mostly all VPNs have in common is the ability to connect remotely to a private network over a public connection. VPNs are used to secure internet connections, protect against malware and hacking, maintain digital privacy, gain access to geo-restricted content, and conceal users’ physical locations. A VPN is an essential tool for staying safe and secure online as more and more users value their privacy, as well as companies with multiple offices and remote workers.

      • Keychron keyboards fixed on Linux | Bastian Venthur’s Blog

        Last year, I wrote about on how to get my buggy Keychron C1 keyboard working properly on Linux by setting a kernel module parameter. Afterwards, I contacted Hans de Goede since he was the last one that contributed a major patch to the relevant kernel module. After some debugging, it turned out that the Keychron keyboards are indeed misbehaving when set to Windows mode. Almost a year later, Bryan Cain provided a patch fixing the behavior, which has now been merged to the Linux kernel in 5.19.

    • WINE or Emulation

      • ScummVMScummVM 2.6.0 or: Insane Escapism

        Free your mind for yet another ScummVM release!

        Eight newly supported games on 6 engines will plunge you into a variety of different settings. Are you able to escape from an alien-infested planet? What about challenging the Lord of the Dead in the Underworld? And have you ever explored the deepest depth of your psyche to see if you really know yourself?

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • OMG UbuntuThis GNOME Extension Brings ’Material You’ Vibes to Linux Desktops

          When enabled, ‘Material You Color Theming’ GNOME extension generates a patched version of GNOME desktop’s stock libadwaita theme accented by colours pulled directly from the desktop wallpaper.

          Then, every time you change your wallpaper you can generate a new re-coloured Adwaita theme that affects the appearance all installed GTK4/libadwaita applications from the archive. Just mouse up to the tray icon the extension adds and hit the “Refresh Material Theme” option to VIBE CHANGE…

  • Distributions and Operating Systems

    • New Releases

      • On August 1st, 2022, Emma DE4 2nd update – Emmabuntüs

        On August 1st, 2022, the Emmabuntüs Collective is happy to announce its Emmabuntüs Debian Edition 4 1.02 (32 and 64 bits) update, based on Debian 11.4 Bullseye and supporting both Xfce and LXQt desktop environments.

        This distribution was originally designed to facilitate the reconditioning of computers donated to humanitarian organizations, starting with Emmaüs communities (which is where the distribution’s name obviously comes from), to promote the discovery of GNU/Linux by beginners, as well as to extend the lifespan of computer hardware, in order to reduce the waste induced by the over-consumption of raw materials.

        This new update of our distribution incorporates the improvements implemented in the recent Emmabutüs DE4 version supporting a better handling of both the UEFI and the Secure Boot, thanks to an update of our refurbishing key which now supports the saving and cloning operations with the Secure Boot option.

    • Canonical/Ubuntu Family

      • Linux MagazineLinux Mint 21 is Now Available

        Linux Mint 21 has arrived and it includes some interesting updates and features that will please both new and previous users alike. One big addition is the new upgrade tool that makes it even easier to upgrade to a major version with just a few clicks of a graphical tool. The new updater displays packages that have been upgraded as well as those that won’t and reports if any PPAs will no longer be supported in the new version.

        Linux Mint 21 also ships with a new Bluetooth application, Blueman, and the bluez backend. This was done for two reasons. First off Blueman is a superior application. The other reason is explained by Clement Lefèbvre (Linux Mint Lead Developer) when he said in a blog post back in March…

      • The Fridge: Ubuntu Weekly Newsletter Issue 746
      • Ubuntu Weekly Newsletter Issue 746

        Welcome to the Ubuntu Weekly Newsletter, Issue 746 for the week of July 24 – 30, 2022.

      • The Register UKCanonical adds instance modification to Multipass, and more • The Register [Ed: Canonical is working for Microsoft while Microsoft attacks Linux, moreover promoting WSL (Windows), which goes against Ubuntu, the prime brand of Canonical]

        Never one to shy away from tootling its own trumpet, Ubuntu Linux maker Canonical has talked up the instance modification features of version 1.10 of its lightweight VM manager, Multipass.

        Multipass is a handy tool for developers seeking to simulate a small cloud deployment on a workstation (so long as Ubuntu is your thing, of course) and – unlike something like Microsoft’s Windows Subsystem for Linux – will straddle platforms using KVM in Linux, HyperKit on macOS, and Hyper-V on Windows.

        The Canonical team has been quietly working away on the platform over the years and recently released version 1.10, a major update of which is the ability to modify the RAM use, disk space, and CPU core of existing instances. While it is a little surprising that it has taken so long for something that VM wranglers usually take for granted to arrive, the update is a welcome for developers less than keen to destroy and rebuild an instance just to add a bit more RAM.

      • UbuntuCanonical at SIGGRAPH 2022 | Ubuntu

        The VFX community beckoned, and we answered the call! Ubuntu by Canonical is proud to announce we will be attending SIGGRAPH 2022, and we have quite a bit to share with you all.

      • 10 Tech Terms You’re Saying Wrong (And How to Pronounce Them Correctly)

        These days most people share funny memes and GIFs with friends and family, but how often does someone say “JIF” or “me-me” out loud when referring to one? If that’s you, you’re saying it wrong.

        Tech terms, brands, and products often have weird names or words. For example, when you clear the cache on your computer, do you pronounce it as “cash-ay” or “cash”? Only one of those is correct. With that in mind, here are ten popular tech terms or brand names you’re saying wrong and how to say them right.

      • How to Install Plausible Analytics on Ubuntu 22.04 – LinuxWizardry

        Plausible Analytics is a lightweight and open-source web analytics tool. It is a simple and privacy-friendly alternative to Google Analytics. With Plausible, you can track your website visitors and get valuable statistics that help to improve the user’s experience.

        This tutorial will discuss how to install and set up Plausibe Analytics on Ubuntu 22.04 server.

    • Open Hardware/Modding

      • ArduinoDIY SawStop saves fingers from shop mishaps | Arduino Blog

        Many power tools have the potential to cause serious harm, but few are as dangerous as table saws. But table saws are also indispensable for woodworking, which means that people are willing to risk their fingers to use them. There is a manufacturer called SawStop that builds table saws that automatically stop the blade if they detect flesh. Unfortunately for hobbyists, SawStop table saws start at around $900 for even the most compact models. After receiving a free table saw from a friend, Ruth Amos decided to add DIY SawStop-style finger protection on a friendlier budget.

        SawStop table saws have braking systems built to work with special blades. They use capacitive touch sensing, just like a touch-sensitive button, to detect when a finger (or any other body part) touches the blade. When that happens, it deploys the brakes and brings the blade to stop in just a few milliseconds. As SawStop advertisements love to demonstrate, the blade stops before it can do more than knick a finger. The emergency brakes destroy SawStop blades, but that’s a small price to pay to save a finger. Amos’s DIY safety precaution works in a similar manner, but without destroying the blade.

      • ArduinoArduino-controlled robot solves Rubik’s Cubes in a couple seconds | Arduino Blog

        Rubik’s Cubes have been sold in stores for more than 40 years now, but most of us still can’t solve them. Others take the puzzles very seriously, competing in many speed-solving competitions around the world. The world record for the fastest Rubik’s Cube solution is a mere 3.47 seconds, set by China’s Yusheng Du. But this robot created by Redditor iBoot32 puts that record to shame by solving the 3D puzzle in less than two seconds.

        It may not seem like it, but the central square on each side of a Rubik’s Cube remains stationary. By spinning those squares, one can rotate the entire side of the cube. iBoot32’s robot design takes advantage of that fact and has six steppers motors that attach to the central squares on each of the Cube’s six sides. This arrangement gives the robot full manipulation of the Rubik’s cube.

      • Linux On MobileLINMOB.net – Weekly GNU-like Mobile Linux Update (30/2022): Ubuntu Touch on FairPhone 4, and, maybe, RISC-V phones in the future!

        Also, more and more apps get ported to GTK4/libadwaita, Phosh 0.20 beta 3, KDE progress and more._

      • LiliputingLilbits: Linux 5.19, Ryzen Embedded, and RISC-V – Liliputing

        The MangoPi MQ Pro is an inexpensive single-board computer that looks a lot like a Raspberry Pi Zero, but which features a RISC-V processor rather than an ARM chip. So can you use it for all the same things you’d use a Raspberry Pi Zero for? Kind of.

        RISC-V is a newer, less common CPU architecture and there’s not as much software optimized for it yet. But an independent developer has published a set of benchmarks that show the MangoPi MQ Pro does offer competitive performance, even if it costs a bit more and is a little harder to find in stock.

        In other recent tech news from around the web, Gigabyte’s GIGAIPC subsidiary has unveiled a new 3.5 inch embedded PC board powered by an AMD Ryzen V2000 series embedded processor, Linus Torvalds used an Apple laptop with an ARM64 processor and Asahi Linux software to release Linux 5.19, and TuxPhones raises some good questions about the role of Pine64 in the open hardware space.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

  • Leftovers

    • Digital Restrictions (DRM)

      • Public KnowledgePublic Knowledge Files Comments Urging FCC To Strengthen Phone Locking Reporting – Public Knowledge

        Today, Public Knowledge joined Consumer Reports and New America’s Open Technology Institute in filing comments in the Federal Communications Commission’s proceeding considering the state of competition in the communications marketplace.

        Phone locking, the controversial practice of using software locks to restrict a phone to just one carrier, has major effects on competition, disproportionately harms low-income consumers, creates e-waste, and frustrates users looking to switch carriers. Public Knowledge urges the agency to thoroughly report on phone locking as part of its upcoming 2022 Communications Marketplace Report to help create a competitive, more affordable mobile device market. In the filing, Public Knowledge also asks the Commission to continue a balanced spectrum policy that makes large, contiguous blocks of spectrum available for a diverse range of uses, including on an unlicensed and “license by rule” basis.

  • Gemini* and Gopher

    • Technical

      • Science

      • Programming

        • Re: Misadventures with bash shell

          I have to agree that shell syntax is often weird, the error messages can be confusing, variable quoting isn’t obvious and certain constructs are whitespace-sensitive. I encountered all of the problems StackSmith mentioned when I first started writing shell scripts and any one of them could have put me off from using or learning shell.

          I’m not sure why I stuck with them but after properly learning about the shell most of the issues went away. I must admit though that even after learning about it, it’s still a weird language with the potential for programs to fail in bad ways due to subtle bugs. Which is why I routinely pass my scripts to ShellCheck.

        • Making a COPR package

          For those who are not aware, COPR is basically the Fedora equivalent of openSUSE’s Open Build Service. Useful software that don’t quite meet Fedora’s Packaging Guidelines or experimental/newer versions of software than in the repos often make it into COPR.

          I use both Firejail and libimobiledevice but as mentioned previously, the former is too outdated (posing a security issue) and the current version of the latter doesn’t support newer versions of iOS. I pointed this problem out on IRC and got rebuffed with “well sounds like an upstream problem then.” So the natural solution is do the job myself.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

EPO Corruption: Internet Censorship or Why the World Wide Web and DNS Aren’t Enough When You Speak Truth to Power

Posted in Europe, Patents at 7:22 pm by Dr. Roy Schestowitz

Video download link | md5sum 0f89cf1335ac693c85cddc2855bc7cb9
Corruption and Censorship of Web Sites Using “IP”
Creative Commons Attribution-No Derivative Works 4.0

Summary: We’re about to release a series about EPO and Montenegro, a country as notorious as today's EPO when it comes to attacks on free press; the video above discusses censorship and what we’re still doing to tackle the problem (the EPO censors inwards and outwards, sometimes using bribes and blackmail)

THE epo.org propaganda machine has not said anything since its bizarre celebration of a country with one patent application per year (about 20,000 times less than Germany, a country with 134 times as many citizens). That’s just "Voting Fodder" for autocrats.

“As the video above notes, we’re embracing more protocols to lessen the incentive to censor us or even attempt to do this (wasting our time, to our inconvenience).”The EPO pivots in a truly terrible direction. Founding states and key applicant states are being drowned in a sea of voting fodder, by their very own admission. The EPO is out of control and it’s not run by scientists; it’s run by corrupt politicians from banks. Accordingly, and perhaps not surprisingly, today’s EPO undergoes a process of "financialization".

As the video above notes, we’re embracing more protocols to lessen the incentive to censor us or even attempt to do this (wasting our time, to our inconvenience). The EPO, like rogue states, has a long tradition of blackmailing publishers and threatening truth-tellers.

“The EPO has already hired multiple law firms to threaten me. Now it’s celebrating Montenegro!”Next month we’ll publish a series about EPO management and Montenegro. The country is known (or notorious) as a fierce enemy of democracy as it ranks notoriously low on press freedom and the EU therefore rejects it. Why does the EPO celebrate an impending accession? What does that say about the EPO? Montenegro attacks journalists, just like the EPO…

Apropos, we’re still learning the facts about what WIPO did to a domain with many articles, using “trademarks” as a weapon of censorship despite the basis being entirely invalid (the “trademark” was in the Public Domain, based on a former Project Leader who suggested relinquishing it). It seems like freedom of speech online is a dying dream. Oligarchs and autocrats no longer tolerate dissent. The EPO has already hired multiple law firms to threaten me. Now it’s celebrating Montenegro!

Montenegro convicts Jovo Martinović again, jeopardizing EU accession
Maybe EPO wants Russia too to join? The EPO already embraces Lukashenko's Belarus

Microsoft is Trying to Hire (Read: Pay Salaries to) Matthew Garrett

Posted in Microsoft at 6:31 pm by Dr. Roy Schestowitz

 Matthew Garrett and Microsoft

Summary: Matthew Garrett, who has helped Microsoft attack Linux (rendering it unbootable on many new computers), is pursued by Microsoft, just like systemd’s creator

[Meme] Breaking Out the Champagne for a “Landmark Occasion”

Posted in Europe, Patents at 5:05 pm by Dr. Roy Schestowitz

EPO - Our SoB

Summary: EPO President António Campinos queries the Montenegrin President Milo Djukanović about his unsavory reputation as an autocrat. Djukanović assures Campinos of his loyalty.

Djukanovic – a Balkan strongman and “stabilocrat” – has dominated the political life of the minuscule Adriatic state for the last three decades and he successfully led Montenegro into the NATO fold in June 2017.

In 2015, the investigative journalist network OCCRP designated Djukanović as Person of the Year in Corruption and Organised Crime.

To mark the “landmark occasion” of Montenegro's accession to the EPC – which will take effect on 1 October 2022 – an in-depth exposé of the EPO‘s new member state is in the pipeline and should be ready for publication in early September.

Links 01/08/2022: Q4OS 4.10 and EasyOS 32-bit in Action

Posted in News Roundup at 4:28 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Barry KaulerEasyOS 32-bit works on old Aspire 3681WXMi laptop

        Today has been a pleasant experience. My old Acer Aspire 3681WXMi laptop has an Intel Celeron 32-bit CPU and only 512MB RAM. I bought it circa-2005. It has been in the closet for years.

        I booted EasyOS on a USB-stick, and got a desktop, but lots of things broken. What I discovered is that it couldn’t handle the “top level zram”. I disabled that, went back to the old method of direct writes to the drive (that you can do via a checkbox via “save” icon on desktop), and everything came good.

        Not enough RAM to juggle the extra requirement of the zram. The laptop has a swap-partition, which is required — I checked and saw that it was being used.

        Audio works, wi-fi works. Connected to the Internet, Firefox works and is surprisingly snappy. LibreOffice works, also surprisingly snappy. Really, this has given this old laptop a new lease of life.

        Next up, I plan to put detection of RAM less than 1GB and automatically turn off “top level zram”.

        So, what are the lower-end specs that will work? I don’t know if Easy will work lower than 512MB RAM, so set that as the minimum. The CPU needs to be 32-bit i686 — 486/586 CPU is no good. The expansion bus needs to be PCI — the predecessor is the ISA bus, and the kernel will not work with that.

        I compiled the kernel, 5.15.57, for a single-core CPU, supporting 4GB RAM maximum. Also disabled EFI support in the kernel — this is for BIOS computers only.

    • Server

      • SUSE’s Corporate BlogALP Prototype is Evolving, Proof of Concept Expected in Fall | SUSE Communities

        The Adaptable Linux Platform (ALP) is switching from the UNIX-style centered, influenced structure of previous operating systems to a more workload and application-centric design. A flexible and secure platform with advancing concepts, as seen in both MicroOS and SLE Micro, along with the incorporation of other components, is evolving. This platform is designed to easily build, deploy and manage applications regardless of hardware or environment.

      • The Fathers of Kubernetes: Where Are They Now? – Container Journal

        Kubernetes, the open source project for container management, has taken the software development world by storm. The platform is used by countless organizations using containers due to its high scalability, elasticity and reliability. According to the CNCF Annual Survey 2021, 96% of organizations are either using or evaluating Kubernetes.

        Kubernetes is a de facto option for container orchestration and scheduling. But it wasn’t always that way. It took great minds to construct Kubernetes within Google and others to evangelize its use throughout the software industry. And nowadays, new leaders are emerging to carry the torch forward.

        Below, we’ll revisit the history of Kubernetes and check in with its original creators to see where they are today. We’ll also highlight several other prominent figures within the Kubernetes and open source cloud-native community to gauge where the inertia currently is.

    • Audiocasts/Shows

    • Kernel Space

      • GamingOnLinuxLinux 5.19 is out now, Torvalds released it using an Apple silicon MacBook [Ed: How to distract from Linux 5.19]

        The latest kernel release is out with Linux 5.19 and showing just how far Linux support for the newer Apple silicon MacBooks has come, Linus Torvalds did the release on one!

      • 9to5LinuxYou Can Now Install Linux Kernel 5.19 on Ubuntu and Ubuntu-Based Distributions

        If you’re using Ubuntu or an Ubuntu-based distribution you can now install Linux kernel 5.19 on your computer in case you need some of the new features or because your hardware is not fully supported by the default Linux kernel in your Ubuntu PC. But, if everything works well, you should stick to the default kernel. Whatever the case may be, installing Linux kernel 5.19 on Ubuntu or an Ubuntu-based distribution is quite easy with the Mainline tool.

      • 9to5LinuxGNU Linux-Libre 5.19 Kernel Arrives for Those Who Seek 100% Freedom for Their PCs

        Based on the recently released Linux 5.19 kernel series, the GNU Linux-libre 5.19 (codename Uhura in memory of Nichelle Nichols) kernel is here to clean up the pureLiFi X/XL/XC and TI AMx3 Wkup-M3 IPC drivers, adjust the cleanup logic for the AMDGPU, Qualcomm WCNSS PIL, Realtek Bluetooth, Mellanox Spectrum, Marvell WiFi-Ex, Silicon Labs WFX, as well as Intel AVS, IFS, and IPU3-ImgU drivers, and clean up the blobs requested by several new devicetree files for Qualcomm AArch64 SoCs.

      • AppleInsiderLinus Torvalds uses M2 MacBook Air to release Linux 5.19 | AppleInsider

        The latest release of Linux 5.19 has more of an Apple angle than usual, with Linus Torvalds releasing it using an M2 MacBook Air running a version of Linux ported to Apple Silicon.

        Linux, like other operating systems, receives updates periodically, with the open source software being no exception. Linus Torvalds, the driving force behind Linux, recently released version 5.19 of the operating system, enabling maintainers of the different Linux variants to incorporate the changes.

        Spotted by Asahi Linux, Torvalds has passed comment about the use of Apple products in an email to the Linux Kernel Mailing List. Posted on Sunday, Torvalds writes “the most interesting part here is that I did the release (and am writing this) on an arm64 laptop,” referring to the use of Apple Silicon.

      • ZDNetLinus Torvalds says he’s been waiting a ‘loong time’ for this Linux laptop option | ZDNet

        Linus Torvalds has announced Linux 5.19, and this time released a version of Linux from an Arm-based Apple MacBook running Asahi Linux.

        Torvalds says Linux 5.19 contains “nothing really interesting” and a “lot of random stuff”.

    • Applications

      • Its FOSSPadloc: An Intuitive Open-Source Password Manager

        Exploring an open-source password manager with a pleasing user interface, available cross-platform.

        There are plenty of free and premium password managers for individuals and teams.

        However, when it comes to open-source solutions, it is often limited to a couple of good ones like Seahorse, KeePassXC, and Bitwarden.

        If you have read through our list of the best password managers for Linux, you might already know some of them.

        I stumbled upon another interesting open-source password manager that could make it to that list for its user experience, i.e., Padloc.

      • Make Use OfAPT vs. DNF vs. YUM: Linux Package Managers Compared

        APT, DNF, and YUM are the three package managers Linux newcomers are likely to run into. So which one is better in terms of usability and performance?

        Using the command line to add or remove programs on Linux isn’t necessary, but it is faster than using a graphical application. Many people find that at some point in their Linux journey, they end up opening a terminal to install new apps or system updates.

        APT and DNF are two of the most popular package managers for the job. These two programs are very similar, but they do have some differences in how they function. Let’s dive in.

    • Instructionals/Technical

      • Make Use OfHow to SSH Into a Raspberry Pi for Remote Access

        When running a project on a headless Raspberry Pi, it may not always be convenient to plug it into a monitor when you want to change something, but you don’t need to. You can access and control the Raspberry Pi remotely via SSH (Secure SHell) from another computer or even a smartphone on the same network. This guide will first show you how to enable SSH, then how to SSH into Raspberry Pi from another device.

      • FOSSLinuxHow to install AWS command line interface (CLI) on Ubuntu | FOSS Linux

        In recent years, Cloud computing has increased rapidly, with 94% of all enterprises using cloud services. Many platforms provide cloud services, such as AWS, Microsoft Azure, Google Cloud, etc.

        There are four cloud computing types: private clouds, public clouds, hybrid clouds, and multi-clouds. Ubuntu fully supports all these clouds, making it the most popular Linux distribution for cloud platforms. This article will discuss AWS and installing AWS CLI (AWS Command Line Interface) on Ubuntu.

      • MakeTech EasierHow to Secure Your Linux Servers With SELinux – Make Tech Easier

        SELinux can help you secure your server from malfunctioning processes or applications. Developed by the NSA (National Security Agency) to secure government devices from attackers, the security enhanced (SE) Linux architecture uses security protocols to restrict access to system resources. Find out how you can use it for your own server.

      • Ubuntu HandbookHow to Install Linux Kernel 5.19 in Ubuntu 22.04 LTS | UbuntuHandbook

        Linux Kernel 5.19 was released! Ubuntu Mainline PPA has made the packages for testing purpose.

      • ByteXDHow to Use Autojump Advanced Navigation in Linux – ByteXD

        In this article you will learn how to use autojump to navigate easily between directories without specifying their full path or executing numerous cd commands.

      • ByteXDHow To Extract Tar Files Into a Specific Directory – ByteXD

        tar is a very old command line utility from the seventies. tar stands for Tape ARchive, and it is used for creating and extracting archive files. Additionally, tar can be used to compress and decompress these archived files.

        In other words, the tar program packs many files and folders into a single logical file for easy and fast transmission (e.g. FTP), optionally compressed. This essential tool is implementing various compression algorithms such as gzip, xz, and bzip2.

        Tar comes with an enormous amount of options which are and can be confusing for even experienced Linux users.

        However this article will cover only the subject of how to extract tar archives using special tar options to specify the target directory; in addition, we will mention other necessary tar arguments.

      • How to use the sudo Command in Linux – Pi My Life Up

        The sudo command allows any user within the sudo group to run commands as another user. By default, sudo will run as root, but you can specify any user you want. If you plan on using a Linux operating system, you will likely use this command quite a bit.

        You will most likely use this command when you run a command requiring root or super user privileges. For example, many user administration commands will need the user to have root privileges to run. In less likely scenarios, you may need to use a different user to run a specific command.

    • WINE or Emulation

      • GamingOnLinuxWindows compatibility layer Wine version 7.14 is out now

        Windows compatibility on Linux continues to improve thanks to Wine, with the latest development release out now with Wine 7.14 available. This is the compatibility layer that allows you to run various Windows applications and games on Linux (and forms part of Steam Play Proton). Once a year or so, a new stable release is made but the development versions are usually fine to use.

    • Games

      • GamingOnLinuxSteam gets support for Nintendo Online classic controllers

        Valve recently released an update for the main Steam client, which amongst other things brings support in Steam Input for the Nintendo Online classic controllers. These are the special controllers Nintendo offers for playing their classics on Nintendo Switch, although Steam having support for them makes sure they have a whole lot more life.

      • GamingOnLinuxValve bans devs from adding review scores and awards on Steam store assets

        There’s a lot of places where developers can have their game logo across Steam, and some developers have been going pretty overboard with noisy images filled with extras. Valve is putting a stop to it.

      • GamingOnLinuxLinux gaming overlay MangoHud version 0.6.8 out now

        MangoHud is probably one of my favourite open source projects giving Linux gamers a fancy HUD to display various performance metrics in a nice overlay. Version 0.6.8 is out now!

      • GamingOnLinuxOpenRazer new release adding support for more Razer hardware on Linux

        Razer make some pretty fancy hardware but, like a lot of vendors, don’t exactly support Linux directly and so the OpenRazer project helps you out there. It’s an open source driver and user-space daemon to control Razer lighting and other features on Linux, with version 3.4.0 officially out now.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Help us to test LibreOffice 7.4 RC2! – LibreOffice QA Blog

        The LibreOffice Quality Assurance (QA) Team is happy to announce that LibreOffice 7.4 Release Candidate 2 (RC2) is available for testing!

        LibreOffice 7.4 will be released as final in mid August, 2022 (check the Release Plan for more information), with LibreOffice 7.4 RC2 being the fourth pre-release since the development of version 7.4 started at the end of November 2021. Since the previous release, LibreOffice 7.4 RC1, 99 commits have been submitted to the code repository and 56 issues got fixed. Check the release notes to find the new features included in this version of LibreOffice.

      • Document FoundationTDF Annual Report 2021 – The Document Foundation Blog

        The Annual Report of The Document Foundation for the year 2020 is now available in PDF format from TDF Nextcloud in two different versions: low resolution (12.2MB) and high resolution (31.6MB). The annual report is based on the German version presented to the authorities in April.

    • Programming/Development

      • Declaring a Variable with const in JavaScript

        The const keyword is one of the three ways you can declare a variable in the JavaScript language.

        What differentiates JavaScript’s const keyword from the others is that once a variable is declared, it cannot be assigned a new value.

        This is incredibly useful when you need to declare a value that should never be changed during runtime. In fact, as a general rule, you should declare a variable using “const” unless you expect the value to be changed.

        By the end of this guide, you should have a good understanding of how to declare a variable in JavaScript using const.

      • Sergio Talens-Oliag: Using Git Server Hooks on GitLab CE to Validate Tags

        Since a long time ago I’ve been a gitlab-ce user, in fact I’ve set it up on three of the last four companies I’ve worked for (initially I installed it using the omnibus packages on a debian server but on the last two places I moved to the docker based installation, as it is easy to maintain and we don’t need a big installation as the teams using it are small).

        On the company I work for now (kyso) we are using it to host all our internal repositories and to do all the CI/CD work (the automatic deployments are triggered by web hooks in some cases, but the rest is all done using gitlab-ci).

        The majority of projects are using nodejs as programming language and we have automated the publication of npm packages on our gitlab instance npm registry and even the publication into the npmjs registry.

        To publish the packages we have added rules to the gitlab-ci configuration of the relevant repositories and we publish them when a tag is created.

      • Perl / Raku

        • Rakulang2022.31 JustinTimeRelease – Rakudo Weekly News

          Justin DeVuyst was able to release the 2022.07 Rakudo Compiler Release just before the end of the month. Which added inode, dev and devtype methods to IO::Path, and a new .snip method (inspired by Haskell’s span). And many other improvements and fixes! Updated Linux packages are now also available on rakudo.pkg, thanks to Claudio Ramirez.

      • Rust

  • Leftovers

    • ScheerpostGovernment Supervised Times, Wartime Reporting, and More

      We talk to Patrick Lawrence about Ukraine by diving deeper into his recent articles written for ScheerPost.

    • HackadayIndustrial Robot Repurposed To Make S’Mores

      It’s summer time in the Northern Hemisphere, and that means campfires for cooking hot dogs, keeping the mosquitoes away, and of course, making s’mores. For our far-flung friends, that’s a fire roasted marshmallow and a square of chocolate smashed between two graham crackers. So called because when you’re done, you’ll want s’more. It’s an easy enough recipe that any child can tell you how to make it. But what if you’re not a child? What if you don’t even have hands, because you’re an industrial robot? This is the challenge that [Excessive Overkill] has taken on in the video below the break.

    • HackadayAdding Perlin Noise To 3D Printed Parts, With Python

      Want to add a bit of visual flair to 3D printed parts that goes maybe a little more than skin-deep? That’s exactly what [volzo] was after, which led him to create a Python script capable of generating a chunk of Perlin noise, rendered as an STL file. What does that look like? An unpredictably-random landscape of hills and valleys.

    • Counter PunchCallers say – “Can’t Get Through” – Callees say – “Don’t Want to Let Them Through”

      Imagine the days when you’d pick up your phone, dial and get through to a human being. You couldn’t be waylaid by the evasive robotic operator who gives you the “press one, or two, or three or four” drill. Unfortunately, when you select “one” you often get another automatic recording. At some point you get a voicemail opportunity which is really voicefail.

      Oh, say the younger people – what about trying email or text messaging? Clutter, filters, distractions and sheer overloads can’t adequately describe the ways Callees can keep you from getting through to a human. The more difficult it is, the more people repeat their attempts, and the more overload there is for the digital gatekeepers. Call this the Callees’ power plays.

    • Hardware

      • HackadayTrippy Bicycle Uses Multiple Partial Wheels

        Bicycles need at least two wheels to be rideable, but [The Q] realized you don’t necessarily need the wheels to be in one piece. As long as you have at least two points of rolling contact with the ground, you can spread the load across multiple partial wheels. He demonstrated this by splitting the rear wheel of his bike first in half and then thirds to create an absolute head turner.

      • HackadayHackaday Prize 2022: An Eastern Bloc NES Clone

        If Nintendo is known for anything outside of their characters and admittedly top-notch video games, it’s being merciless to fans when it comes to using their intellectual property. They take legal action against people just for showing non-Nintendo hardware emulating games of theirs, and have even attempted to shut down the competitive scene for games like Super Smash Bros. To get away from the prying eyes of the Nintendo legal team extreme measures need to be taken — like building your Nintendo console clone behind the Iron Curtain.

      • The Register UKWhy the end of Optane is bad news for all IT

        Intel is ending its Optane product line of persistent memory and that is more disastrous for the industry than is visible on the surface.

        The influence of ideas from the late 1960s and early 1970s is now so pervasive that almost nobody can imagine anything else, and the best ideas from the following generation are mostly forgotten.

        Optane presented a radical, transformative technology but because of this legacy view, this technical debt, few in the industry realized just how radical Optane was. And so it bombed.

        To get to the heart of this, let’s step back for a long moment and ask, what is the primary function of a computer file?

        The first computers didn’t have file systems. The giant machines of the 1940s and 1950s, built from tens of thousands of thermionic valves, only had a few words of memory. At first, programs were entered by physically wiring them into the computer by hand: only the data was in memory. The program ran, and printed out some results.

    • Health/Nutrition/Agriculture

      • Common DreamsOpinion | Commission’s Report Shows Medicare for All Is Logical Next Step for California

        For years, the private insurance company lobby has falsely claimed that California can’t afford quality and universal healthcare. But a comprehensive new study shows we simply can’t afford not to adopt a universal healthcare system that will save California families and businesses over $100 billion per year.

      • Common DreamsOpinion | We Are Not ‘In This Together’: The Biden Adminstration’s Covid-19 Policy Is Still Killing Vulnerable People

        I have multiple sclerosis, a disease in which the immune system attacks the central nervous system. The myelin sheath that surrounds the nerve endings hardens during these attacks, preventing nerve impulses from traveling where they should. These hardened nerve endings, or lesions, accumulate on the brains and spinal cords of people with MS. Because the central nervous system regulates the other bodily systems, MS lesions can cause an endless list of debilitating symptoms including fatigue, numbness, spasticity, pain, incontinence, blindness, cognitive dysfunction, paralysis, difficulty swallowing and breathing, and death. MS is unpredictable, progressive, and there is no cure. Frankly, it’s terrifying.

      • Telex (Hungary)Mission: Impossible — Define goulash
    • Pseudo-Open Source

      • Openwashing

        • The Register UKUS DoD funds Google and SkyWater to enable open-source chips • The Register

          Google has linked up with chip fabrication company, SkyWater Technology, on an open source chip technology program with funding from the US Department of Defense (DoD) to build a reliable source of components for defense applications.

          SkyWater announced it has received $15 million in funding from the DoD to develop open source design capabilities for its 90nm production process. To enable this, the company has turned to Google to provide the compute resources and other expertise to realize the project.

          It seems the pair have some history in this respect, with Google working with US-investor-owned SkyWater in 2020 to enable open source design of custom ASICs to be manufactured on its 130nm mixed-signal CMOS process.

    • Linux Events and Linux Foundation

      • Buildroot Summer 2022 Hackathon – Bootlin’s blog

        Buildroot is an easy-to-use and popular embedded Linux build system, used by many as an alternative to Yocto/OpenEmbedded. Bootlin has expertise in both build systems, but as in particular been a long time contributor to the Buildroot project. Bootlin CEO’s Thomas Petazzoni is one of the co-maintainers of the project, to which he has contributed over 5000 patches.

        From July 23 to July 27, four members of the Buildroot community gathered in the sunny south of France for a 5-day long hackathon on Buildroot: Yann Morin, Romain Naour from Smile, Arnout Vandecappelle from Mind and Thomas Petazzoni from Bootlin.

        The main goal of this hackathon was to reduce the backlog of patches accumulated in the project’s patchwork, the tool used in the Buildroot community to record all contributed patches and make sure all of them are handled: reviewed, accepted, or potentially rejected.

      • LWNThe 2022 Linux Plumbers Conference schedule is out [LWN.net]

        The 2022 Linux Plumbers Conference (LPC) has announced its schedule. The conference will be held in Dublin, Ireland, September 12-14.

      • Business WireKIOXIA Introduces Sample PCIe NVMe Technology-Based Flash Hardware for the Linux Foundation’s Software-Enabled Flash Community Project
    • Security

      • LWNSecurity updates for Monday [LWN.net]

        Security updates have been issued by Debian (booth, libpgjava, and thunderbird), Fedora (3mux, act, age, antlr4-project, apache-cloudstack-cloudmonkey, apptainer, aquatone, aron, asnip, assetfinder, astral, bettercap, buildah, butane, caddy, cadvisor, cheat, chisel, clash, clipman, commit-stream, containerd, cri-o, darkman, deepin-gir-generator, direnv, dnscrypt-proxy, dnsx, docker-distribution, doctl, douceur, duf, ffuf, fzf, geoipupdate, git-lfs, git-octopus, git-time-metric, glide, gmailctl, gnutls, go-bindata, goaltdns, gobuster, godep, godoctor, godotenv, gojq, golist, goloris, gomtree, google-guest-agent, gotags, gotun, grafana, gron, grpcurl, hakrevdns, hcloud, htmltest, httprobe, hulk, ignition, jid, kata-containers, kiln, kompose, kubernetes, libldb, manifest-tool, mass3, meg, meshbird, micro, mingw-harfbuzz, mingw-poppler, moby-engine, mqttcli, nats-server, nebula, netscanner, oci-seccomp-bpf-hook, ohmybackup, onionscan, open-policy-agent, origin, osbuild-composer, podman-tui, popub, powerline-go, reposurgeon, restic, runc, samba, shellz, shhgit, skopeo, snapd, snowcrash, source-to-image, subfinder, syncthing, sysutil, terrier, thunderbird, tiedot, toolbox, vgrep, vultr, vultr-cli, webanalyze, webkit2gtk3, weldr-client, wgctrl, xe-guest-utilities-latest, xen, xq, yggdrasil, yubihsm-connector, and a vast number of golang packages), Mageia (chromium-browser-stable, firefox, gdk-pixbuf2.0, python-ujson, and webmin), Red Hat (firefox and thunderbird), Slackware (gnutls), and SUSE (chromium, firefox, mozilla-nss, rubygem-tzinfo, samba, and xen).

      • UEFI – Terra Firma for Attackers

        In today’s computing environment, firmware can mean several things, ranging from an entire operating system in embedded devices to a small flash program in a hardware component that tells your operating system (OS) about that hardware’s capabilities. In this blog post, we will focus on the vulnerabilities in the latter type of firmware popularized by the Uniform Extensible Firmware Interface (UEFI). I will explore how these vulnerabilities are a lucrative target for high-profile attackers, such as nation-states that are seeking vulnerabilities in the less-visible portions of today’s computing environment.

        First, to get our footing, it is important to understand what UEFI really is. UEFI replaces the legacy Basic Input/Output System (BIOS), interfacing hardware to the OS and provides an extensible intersection between hardware and the OS itself. The UEFI standard also identifies reliable ways to update this firmware from the OS. In essence, in today’s computers, there is another layer of software that can help the OS understand and use available hardware. Of course, this essential layer of software faces all the challenges of today’s software: bugs, security issues, patching, and maintenance. It also lacks visibility, making it hard for defenders to protect this part of their computing environments from ever-increasing threats.

      • UbuntuIs Linux secure? | Ubuntu

        Meet Pal. Pal is a senior developer working at PalBank. For the next 6 months, Pal will be responsible for leading the development of the bank’s web application client, which will be used daily by millions of customers.

        Pal invests considerable effort into designing and implementing the most secure app reasonably achievable: tightly controlled and secure development, build and deployment pipelines, static code analysis, pentesting by external parties, multi-factor authentication to access the app and encrypting data at rest. And the list goes on!

        Pal’s the best, isn’t he? Unfortunately, while such efforts are essential, they are insufficient! And even if we assumed, for the sake of argument and humour, that the PalBank’s client web app is completely free of all known and unknown software vulnerabilities, the app’s security guarantees are bound to be threatened once consumers run it on their endpoint devices. They will be threatened by the millions of lines of code which comprise the platform’s privileged system software, if it becomes either malicious or compromised. Within this context, system software includes the operating system, virtual machine manager and all the platforms’ firmware embedded within.

        To put it differently, it matters little if a user chooses a perfectly strong unique password, when their operating system is infected with a keylogger leaking it to malicious third-parties. Similarly, it matters little if your code has no buffer overflows, if your operating system is backdoored and simply decides to leak all your customers’ data to malicious third parties.

        So why does the security of user-level applications depend on the security of its underlying system software? The reason is the hierarchical architecture of commodity devices: privileged system software gets unrestricted access to all the resources of unprivileged user-level applications, because it controls its execution, memory, and access to the underlying hardware. Indeed, it’s a feature, not a bug!

      • LinuxSecurityBest Practices for PHP Security

        Following these best practices will help you secure your PHP applications and protect them from attack. Remember to always keep your software up to date, properly configure your web server and your PHP, and be sure to perform regular security audits to identify any vulnerabilities that may have slipped through the cracks. We hope you found this article useful and we hope you check out our other articles that may help in keeping your systems secure!

      • Privacy/Surveillance

        • Amazon finally admits giving cops Ring doorbell data without user consent | Ars Technica

          More than 10 million people rely on Ring video doorbells to monitor what’s happening directly outside the front doors of their homes. The popularity of the technology has raised a question that concerns privacy advocates: Should police have access to Ring video doorbell recordings without first gaining user consent?

        • Bruce SchneierRing Gives Videos to Police without a Warrant or User Consent

          Amazon has revealed that it gives police videos from its Ring doorbells without a warrant and without user consent.

        • Counter PunchThe Genetic Panopticon

          Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

          In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

        • HackadayRe-Creating The Unique Look Of Unobtainable Aerochrome Film

          Ever heard of Aerochrome? It’s a unique type of color infrared film, originally created for the US military and designed for surveillance planes. Photos taken with Aerochrome film show trees and other vegetation in vivid reds and pinks, creating images that aren’t quite like anything else.

    • Defence/Aggression

      • Common DreamsSanders Says GOP Shouldn’t Have Funded Wars If It Didn’t Want to Take Care of Vets

        Calling out Sen. Pat Toomey by name, Sen. Bernie Sanders on Sunday said Republicans blocking a bill aimed at providing care to veterans exposed to toxic chemicals overseas should not have voted to fund the wars that created the health nightmare for millions of people.

        “I say to Senator Toomey, if you don’t believe we can afford to take care of our veterans suffering from toxic burn pit exposure, then you should not have approved funding to go to war,” said Sanders (I-Vt.), who voted to authorize the U.S. war in Afghanistan but against the Iraq invasion.

      • ScheerpostWhat Are The CIA And Special Ops Doing In Ukraine?

        Katie Halper and Ben Norton discuss what exactly the CIA and Special Ops are doing on the ground in Ukraine.

      • Common DreamsOpinion | A CIA Whistleblower Reflects on the Persecution of Julian Assange

        It is difficult to talk about happenings in the world other than the continued, appalling Russian invasion of Ukraine and the recent mass shootings in Buffalo, Uvalde, Chicagoland, and elsewhere. Then, there is the Supreme Court which continues down a judicial road of eroding personal rights and towing the conservative party line. I don’t want to take attention away from those outrages. However, the shadow of one tragedy is not dispelled by the light of another.

      • PIAWhy Is July 30th National Whistleblower Day?
      • Counter PunchOkinawa (only) a War Zone?

        But of course: no one should be surprised by that.  If the US bases and/or the Japan Self-Defense Force (JSDF) bases in Okinawa are used to launch attacks on the Chinese mainland or at Chinese ships at sea, China will have the right under international law to retaliate, transforming Okinawa into a war zone.

        “War zone” doesn’t simply mean, a place where war is going on.  It means a place where war is legal.  By this I don’t mean, “ought to be legal”, I mean “legal in fact”.  Think: if somebody exploded a bomb inside a building full of people in Okinawa today that would be understood as a horrendous crime, and people would be arrested.  But if Okinawa becomes a war zone,  and a missile lands on a building full of people, someone might say “Oops, sorry”, but no one will be arrested.

      • Counter PunchFive Reasons Why Nancy Pelosi Should Postpone a Trip to Taiwan

        First, US-China tensions over Taiwan are running high. Both sides are responsible for that. President Biden has done his part by consistently misstating the US commitment to Taiwan—there is no security treaty, Mr. President—and by authorizing increased military assistance to Taiwan. To the Chinese, these steps look like a US effort to erode its official policy of “One China” and move closer to China’s red line: Taiwanese independence. Meantime, China’s air force patrols are more regularly intruding in Taiwan’s air defense zone, on occasion causing Taiwan’s air force to scramble. A military incident that could spark serious fighting becomes more likely with each passing week.

        Second, Xi Jinping is expected to be given another term as party leader at a national congress this fall. A high-level trip to Taiwan by a key US political figure in advance of that party congress could be seen as a personal provocation, particularly since Xi wants to be seen as the leader who will complete China’s national unification by “recovering” Taiwan. He may feel compelled to act.

      • Common DreamsOpinion | Nancy Pelosi Taiwan Visit Could Get Us All Killed

        The arrogance of power is especially ominous and despicable when a government leader risks huge numbers of lives in order to make a provocative move on the world’s geopolitical chessboard. Nancy Pelosi’s plan to visit Taiwan is in that category. Thanks to her, the chances of a military confrontation between China and the United States have spiked upward.

    • Environment

    • Finance

      • ScheerpostCan Biden’s New US $600B PGII Initiative “Replace” China’s Role in Africa?

        The launch of the Partnership for Global Infrastructure and Investment (PGII) at the recent G7 summit is another example of the Biden Administration’s relentless push to try to undermine the Chinese-led Belt and Road Initiative (BRI).

      • Common DreamsWith Sinema Opposing Tax Hikes for Rich, Progressives Say Carried Interest Provision Must Stay in IRA

        Sen. Kyrsten Sinema has not said yet whether she will support the Inflation Reduction Act, the $739 billion package hammered out by Sen. Joe Manchin and Senate Majority Leader Chuck Schumer and announced last Thursday, but as she reviewed the 725-page bill over the weekend, reports suggested she is likely to object to a $14 billion provision taking aim at the preferential tax rates for wealthy investors—who make up a large portion of her donor base.

        “The new reconciliation bill will lower the cost of prescription drugs. Sen. Sinema is holding it up to try to protect ultra-rich hedge fund managers so they can pay a lower tax.”

      • Common DreamsOpinion | Steps Biden Should Take to Rein in Excessive CEO Pay

        Working families are getting hammered by inflation while corporate leaders and politicians are calling for belt-tightening. But there’s one group of Americans that’s actually profited from increasing prices.

      • Counter PunchTo Reduce Inflation, Control Corporate Profits

        With all this concern over inflation, one wonders why so little heed has been paid to another “i” word: inequality.

        For decades, government officials, media pundits, mainstream economists, politicians, and others were content to allow and even enable money to flow upward, enriching the already wealthy. They paid little heed to increasing inequality, beyond shrugging their shoulders and lamenting the injustice of it all.

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

      • NYPostMan arrested with AK-47 outside of dissident Iranian journalist’s Brooklyn home

        The plan to kidnap Alinejad in the US allegedly included hiring private investigators to conduct multiple days of surveillance during which she and members of her household were photographed and recorded on video at and around her Brooklyn home.

      • NBCMan With Loaded AK-47 Arrested Near NYC Home of Iranian Dissident: Feds

        Alinejad is a well-known Iranian writer and dissident who last year was the alleged target of a kidnapping plot by Iranian agents, the FBI said. Iran has denied wrongdoing, calling the past kidnapping allegations “baseless.”

      • Yonkers Man Arrested for Lurking with AK-47 Outside of Dissident Iranian Journalist’s NYC Home

        Last year, Federal prosecutors charged four foreign agents with attempting to kidnap Alinejad. The defendants live in Iran and were never apprehended. The plan, according to the indictment, was to lure Alinejad to another country where she would be kidnapped.

      • AccessNowThe continued blocking of Al-Manassa’s and dozens of news websites in Egypt must stop – Access Now

        The undersigned civil society organizations condemn the blocking by the Egyptian authorities of three links to access the Al-Manassa website within approximately 72 hours, starting from Thursday, 14 July. The blocking occurs as part of a series of continued restrictions on the website, which is one of the few independent news sites operating from inside Egypt. The undersigned organizations call on the authorities to lift the blocking of Al-Manassa, stop its repeated targeting, and bring to an end the censorship imposed on other news websites.

        Egyptian authorities blocked the Al-Manassa website on the evening of 14 July. First, they blocked the IP address of the hosting company responsible for the website’s domain. An alternative address was then blocked on the morning of 16 July, only three hours after it was launched. A third address was repeatedly blocked, bringing the total number of times access to the website has been blocked to 15.

      • AccessNowWarning: blocking online platforms in Kenya will spread election disinformation – Access Now

        Following a report highlighting Meta’s failure to remove hate speech from the Facebook platform, the National Cohesion and Integration Commission threatened to suspend Facebook for “contravening hate prevention guidelines.” Disinformation and hate speech around the election period is a very serious issue in Kenya, but preventing people from using major communications platforms is not a proportionate or effective way to stem it. Access Now and the #KeepItOn coalition commends the government of Kenya for once again committing not to shut down the internet and social media platforms.

        “Internet shutdowns are not a solution to preventing the spread of misinformation or disinformation,” said Felicia Anthonio, #KeepItOn Campaign Manager at Access Now. “The U.N. Office of the High Commissioner for Human Rights has underscored that blocking major communications platforms not only attacks the rights to free expression and access to information and exacerbates violence and unrest, but also contributes to the spread of disinformation and hate speech, because it instills uncertainty and doubt.”

        As the Kenya general elections draw closer, there is legitimate fear over whether major online platforms can successfully combat hate speech and disinformation. Investigators and civil society are raising the alarm about content on Twitter, Facebook, and TikTok. However, these reports should prompt additional investment and work by the platforms in question to ensure election “preparedness,”not serve as a justification to deprive Kenyans of vital pathways for communication. In Meta’s case, this should include direct communication with Kenyan civil society regarding the exploitative way in which it engages its content moderators in Africa, which directly conflicts with the company’s own human rights policy.

    • Freedom of Information / Freedom of the Press

      • Site36German Investigations dropped: Indymedia platform was not a criminal association

        The German linksunten.indymedia, founded in 2008, was banned under the Associations Act, and the entire technical infrastructure and funds of a left-wing center were confiscated. Seized storage devices apparently could not be decrypted.

      • Counter PunchPenal Assassination: The Gradual Effort to Kill Assange

        In the context of Assange, Britain has been a willing jailor from the start, guided by the good offices of Washington and none too keen in seeing this spiller of secrets released into the world.  Bail has been repeatedly, and inexcusably, refused, despite the threats posed by COVID-19, the publisher’s own deteriorating health, and restrictions upon access, at regular intervals, to legal advice from his team.  Just as some banks are deemed too large to fail, Assange is considered too large a target to escape.  Let loose again, he might do what he does best: reveal government venalities in war and peace and prove the social contract a gross deception and mockery of our sensibilities.

        The UK legal system has been the ideal forum to execute the wishes of Washington.  Each legal branch that has examined the extradition case has assiduously avoided the bigger picture: the attack on press freedom, exposing war crimes, illegal surveillance of a political asylee in an embassy compound, the breaches of privacy and legal confidentiality, the encroachments upon family life, the evidence on proposed abduction and assassination, the questionable conflicts of interest by some judicial members, the collusion of State authorities.

      • TruthOutBiden Should Grant Clemency to Drone Warfare Whistleblower Daniel Hale
    • Civil Rights/Policing

      • ScheerpostWomb Service

        “Womb Service,” a new original cartoon by the inimitable Mr. Fish, looks at the future of women’s rights and sees the past.

      • TruthOutUnions Can Do Plenty to Help Defend Abortion Access
      • The DissenterRoger Waters’ ‘This Is Not A Drill’ Show Is A Revolutionary Concert Experience

        Kevin Gosztola reviews Roger Waters’ “This Is Not A Drill” show, which is touring North America from August to October. It is a revolutionary concert experience. The audience is in the round, which means they surround the stage where Roger and his band performs. Every song performed in the “This Is Not A Drill” show is packed with urgent messages that appeal to our humanity and plead with us to no longer be so comfortably numb. Two of the songs performed are featured in the video—”Déjà Vu” [19:35], which was on Roger’s 2017 album “Is This The Life We Really Want?”, and “Two Suns In the Sunset” [39:45], which is from Pink Floyd’s 1983 album “Final Cut” and about a nuclear holocaust. Each song is about ten minutes.The performance of “Déjà Vu” is where Roger incorporated a clip from the “Collateral Murder” video released by Chelsea Manning to WikiLeaks and urged the audience to join him in demanding that WikiLeaks founder Julian Assange be freed from prison. You may also watch the full review of Roger Waters’ “This Is Not A Drill” here.

      • Counter PunchWhy is “the Left” Red-Baiting Rise Up for Abortion Rights on the Eve of Fascist Destruction?

        Libelous Red Baiting and “Cult”-Charging

        Still, it’s bracing and a little bizarre in 2022 to see an anti-Communist jihad launched from “the left” (see below) against an organization that has been fighting to defend something commonly identified with mainstream liberalism: the right to an abortion.

      • TruthOutState of Alaska Recognizes 229 Tribes in Historic Bill
      • Public KnowledgePrivileged Conversations – Public Knowledge

        Public Knowledge has the pleasure of inviting you to a multifaceted program focused on training and developing the next generation of tech policy experts and public interest advocates that reflects the diversity of voices and experiences in our society.

        Please join us for our monthly Career Breakfast Series. This event is designed for students & recent graduates to learn about tech policy and public interest work, careers, and its community. This month you will have the opportunity of having a great conversation with Larry Irving.

        Larry Irving is the President of the Irving Group, a consulting firm providing strategic planning and consulting services to international telecommunications, media and technology companies, non-profit organizations, and philanthropies. Irving is also an operating partner and chief public policy, ESG, and DEI advisor to ZMC, a private equity firm.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Copyrights

        • Torrent Freak“You Wouldn’t Steal…” Research Shows Why Many Anti-Piracy Messages Fail

          You wouldn’t steal a car, right? So why are you pirating? With this 2004 message, the movie industry hoped to turn illegal downloaders into paying customers. This campaign eventually turned into a meme and it’s not the only anti-piracy advert to miss the mark. A new research paper identifies several behavioral insights that explain common mistakes made in these campaigns.

        • Torrent FreakIllegal Blocking of Copyrighted Content to Be Punished Under Russian Draft Law

          Every week copyright holders and their anti-piracy agents issue instructions for content to be removed or blocked. Most of these requests are made in good faith but malicious takedown requests are still a problem. A draft law tabled in Russia envisions financial compensation for those affected.

  • Gemini* and Gopher

    • Personal

      • SpellBinding: ABEWLVI Wordo: TREE
      • Week 29/30: Thoughts and Photos

        The amount of travel I engaged in during the month of July left me very little time to work on the chess service. As a result, I did not meet my target of having it back online by today. I have one more weekend trip coming up in the near future, but beyond that, my afternoons and evenings will now be free. My revised target date for having the chess service back online is 2022-08-15.

        One of the trips I took in July was to attend EAA’s AirVenture aerospace show in Oshkosh, WI. Many key companies in the American aerospace industry had pavilions at the show, and I had the opportunity to meet several recruiters with those companies. My hope is to get a job in aerospace, an industry I’m very passionate about.

      • Why I’m not a doomer (anymore)

        I found the solution to “climate anxiety”, and today I want to share it with you.

        The key to overcoming climate anxiety is understanding that the climate apocalypse is not a looming threat that will soon be upon us. It’s here — you and I are living through it right now. People are dying in heat waves and storms who wouldn’t be dying if we had averted climate apocalypse. But we didn’t. So here we are: living through the apocalpyse.

        Look — I’m not going to sugar coat this. Things are bad, and because of the way that the climate works, things are going to get worse before they get better, no matter what. Once you pull this uncomfortable knowledge down, through your brain and into your heart, the anxiety will dissipate. You’ll probably feel sad and angry instead, at least sometimes. Cut yourself some slack because you are living through an apocalypse.

    • Technical

      • Internet/Gemini

        • smolZINE – Issue 31
        • You Can Get a Weird Domain Today

          When I set this site up I chose a logical, grown-up, and kind of boring domain name. If you’re looking for logical, grown-up, and kind of boring domain names you’ll find that a whole lot are taken. Either by someone with a good reason to have it or by some company that squats on it in the hopes that someone will pay them a lot for it.

          But if you’re in the market for a silly, weird, and strange domain name I have a few for you that are still (as of writing this) up for grabs!

      • Programming

        • Misadventures with bash shell

          There is a Russian proverb that translates roughly as ‘if you are a bad dancer, your own testicles will get in the way’. While gendered, and somewhat offensive, it describes my relationship with bash — it feels like I get tangled up in my balls every time I use it.

          I am primarily a Common Lisp programmer, and bash makes zero sense to me.

          Bash has syntax (yuck) and it is really inconsistent – or at least, I can’t figure out how or why things are done without looking up numerous examples. I don’t know why I still use it – I guess every system I’ve used defaults to it… Why in the world does it exist?

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 01/08/2022: GNU Linux-libre 5.19 (Uhura) and pgAdmin 4 6.12

Posted in News Roundup at 6:55 am by Dr. Roy Schestowitz

  • GNU/Linux

    • 9to5Linux9to5Linux Weekly Roundup: July 31st, 2022

      This week we had a bunch of exciting news, starting with the launch of the final Linux Mint 21 release and the Firefox 103 web browser, and continuing with System76’s latest Pop!_OS Linux 22.04 distribution for Raspberry Pi 4 devices and a new Steam Client update with more improvements for Linux gamers.

      On top of that, we talked about some of the upcoming changes in the Endless OS distribution, a new Linux kernel security update for Debian GNU/Linux 11 users, and I prepared another roundup of updates for Xfce users. Below, you can enjoy these and much more in 9to5Linux’s Linux weekly roundup for July 31st, 2022.

    • Hacker NoonUnderstanding Linux Containers Before Changing the World | HackerNoon

      Driven by an array of factors—productivity, automation, and cost-effective deployments—organizations have grown to love container technology, especially as they make it possible to run infrastructure more efficiently. Container technology introduces something we call containers. Containers are application sandboxes.

      Containers provide a way to run your application by packaging it with the runtime, operating system, libraries, and every dependency it needs. This brings simplicity, speed, and flexibility to application development and deployment, with a more efficient way to utilize system resources. A major step up from virtual machines, I must say. Various container technologies are available, like Docker containers, Kubernetes containers, and Linux containers (LXC).

      This article will look at Linux containers and their uses.

    • Desktop/Laptop

    • Audiocasts/Shows

      • VideoNew Features in Linux Mint 21 [Quick Look] – Invidious

        Linux Mint 21 is finally available. It is based on Ubuntu 22.04 LTS and is codename Vanessa. The upgrade path from Mint 20.3 will be available soon. Meanwhile, you can see what’s all new in this quick review of Linux Mint 21. Mint 21 features: – New upgrade tool – New Bluetooth application – WebP image support – Improved thumbnail support – New wallpapers (not really a feature but well) – Fixing up a few shortcomings of Ubuntu 22.04 – Cinnamon 5.4 – New process monitor

      • Linux User Space: Episode 3:03: Text Ed

        0:00 Cold Open
        1:17 A Minty Fresh Release
        7:48 Lubuntu’s Backports
        9:36 Points for Ubuntu
        12:18 Text Ed: ed
        32:02 The Missing Thoughts on Ubuntu
        41:37 Minizilla Watch
        45:45 A Return to the Missing Thoughts
        55:49 Larry’s Feedback
        1:01:56 Community Focus: Stevesveryown
        1:05:20 App Focus: Thunderbird
        1:14:09 Next Time: EndeavourOS
        1:15:57 Stinger

    • Kernel Space

      • CNX SoftwareLinux 5.19 Release – Main changes, Arm, RISC-V and MIPS architectures – CNX Software

        Those look to be minor changes indeed. This was followed later with an update to build fix for Loongson-3 (fix compile mips cpu_hwmon as module build error).

        The full Linux 5.19 changelog with commit messages only is available, and I generated it with the command git log v5.18..v5.19-rc8 –stat. Alternatively, you could check out a detailed summary on KernelNewbies website.

      • Linux 5.19 released, Bootlin contributions inside – Bootlin’s blog

        Linux 5.19 has been released yesterday. We recommend the usual resources of LWN (part 1 and part 2) as well as KernelNewbies to get some high-level overview of the major additions. CNX-Software also has an article focused on the ARM/RISC-V/MIPS improvements.

      • Linux Kernel 5.19 Officially Released

        inux Kernel 5.19 Officially Released

        Linux Kernel 5.19 is now officially available. As usual, Linus made an announcement regarding the availability of Linux Kernel 5.19.

    • Instructionals/Technical

      • Linux HandbookRemove Exif Data in Linux Command Line

        Most images contain Exif (Exchangeable image file format) data which includes some crucial data such as the date and time of capturing an image, device, place, and so on.

        While this can be useful in various scenarios, it also has privacy threats and through this guide, I’ll show you how to remove Exif data from images using the Linux command line.

      • Red Hat OfficialHow to manage pods in Podman with the REST API | Enable Sysadmin

        The REST API became available in Podman two years ago, and it is still actively maintained with new features added with every release. This article explores how Podman’s REST API helps you manage pods. I’ll use the classic use case for a pod: a WordPress container and a MariaDB database container using Podman’s native REST API.

      • ID RootHow To Install FreeCAD on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install FreeCAD on Ubuntu 22.04 LTS. For those of you who didn’t know, FreeCAD is a parametric 3D modeler. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FreeCAD 3D parametric modeler on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • TecAdminConvert String to Lowercase in Bash – Easier Than You Think

        In Linux, the tr command is used to translate, squeeze, and/or delete characters. So with the help of the tr command, you can convert the case of any character. You can do this quickly with a single-line command.

        You can use the following command to convert a string to lowercase. Here the command takes the standard input of a string and processes it.

      • OpenSource.comHow I disabled IPv6 on Linux

        IPv6 is a good thing for the Internet in general, but I find it unnecessarily complex for use in most home and small- to medium-size businesses. Like many others, I continue to use private IPv4 address ranges for my own internal networks and those for which I have some level of responsibility. My ISP only provides IPv4 addresses anyway, so it makes no sense to use IPv6 internally when all external packets are IPv4. Besides, IPv4 is much simpler, and one of my Linux Philosophy tenets is “Find the Simplicity.”

        As a result, I disabled IPv6 on all my hosts. It seemed easy—at first. Here is how I did it.

      • Red HatHow to configure Helm charts using JKube, part 2 | Red Hat Developer

        Discover how to customize Helm charts and registries with the advanced configuration of the Eclipse JKube OpenShift Maven Plugin. (This is part 2 of a series.)

      • H2S MediaHow to install and use Ubuntu-Make for developer tools

        Let’s learn the steps to install the Ubuntu-Make tool to quickly download and set up standard tools that developers need to work on Ubuntu Linux.

        Ubuntu-Make is a tool that is listed on the official website of Ubuntu Linux. The key purpose of it is to let developers install the popular IDEs and other developing tools without leaving the command terminal such as PyCharm. Because these tools are not available to download and set up using the default APT package manager of Ubuntu.

        This command line not only installs the tool but also all the required dependencies, of course, root or sudo access is required.

        Further to help the developers easily install the tools required by their project, the developers of Ubuntu-Make have listed them in categories, for example- Android (java and native) development to games, frontend web (javascript and dart), backend (go and dart), and various IDE (python, C++ java…).

      • UbuntubuzzUbuntu 21.10 Reached EOL and How To Add Support

        Canonical announced that now Ubuntu 21.10 Impish Indri has reached End of Life (EOL). This means your Impish computer will not be able to install applications anymore, nor receive any security updates, although it can still be used without any time limits. This tutorial will explain how to check that out and add support provided by Canonical and also third-parties.

      • Red HatContainerize .NET applications without writing Dockerfiles [Ed: IBM/Red Hat employs Tom Deseyn to work for Microsoft while taking a salary from IBM. This never made any sense, but then again Red Hat even hired managers from Microsoft -- an epic mistake]

        This article introduces dotnet build-image, a tool that containerizes .NET applications automatically. You can use build-image to create Dockerfiles and containerized images. You will also discover how to use the tool in a GitHub workflow to create an image from a .NET application and push it to a repository.

      • nixCraftPHP Warning: Constant ABSPATH already defined in wp-config.php

        While looking into the nginx PHP error log file fixing unrelated issues, I noticed I was spammed with the following message…

    • Games

      • Unvanquished 0.53 Beta, what a milestone! – Unvanquished

        We are pleased to announce the 2nd Beta release of Unvanquished, a First Person Shooter featuring the ability to build and two factions with radically different abilities: humans who master technology versus aliens and their many specialized evolutions.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Rolisteam – July 2022 – Monthly update #2

          As you may know, rolisteam is now part of KDE. We are trying to enjoy that new status. One way to do it, it’s to change the way rolisteam is translated. The KDE project has huge translation team and they are really efficient.

  • Distributions and Operating Systems

    • Reviews

      • Distro WatchKaOS 2022.06 and KDE Plasma 5.25

        The KaOS distribution is a rolling release operating system which intentionally narrows its focus to provide one desktop environment (KDE Plasma), with applications built with one toolkit (Qt), running on one CPU architecture (x86_64). The distribution is developed independently and uses the pacman package manager.

    • Red Hat / IBM

      • Enterprisers ProjectCloud services: 4 ways to get the most from your committed spend [Ed: Red Hat is promoting stupid buzzwords to encourage companies to foolishly outsource and then rent, becoming slaves of corporate masters such as IBM]

        Cloud spending commitments can create a different mindset in the grander context of cloud costs – instead of focusing on what you’re spending money on (and why), you might naturally think more along the lines of “Well, we have to spend this money now.”

        This can produce significant effects, including increased susceptibility to the sunk cost fallacy and other potential inefficiencies.

        But let’s back up for a moment and define the term: In the world of cloud, “committed spend” refers to when an organization (the cloud customer) agrees to spend a minimum amount of money with a cloud provider – typically within a specified time period – in exchange for discounted pricing on their usage. (An enterprise agreement could also include other benefits, such as dedicated account management services.)

      • Enterprisers Project4 reasons IT leaders should champion sustainability [Ed: Mindless greenwashing nonsense]

        I’m a member of the Climate Change Community of Practice at Red Hat. This Community of Practice is an associate-led internal community to support the development and implementation of sustainability targets and initiatives, both operationally and across core business activities. We aim to connect passionate associates around the challenges humans are facing as a result of climate change.

        Managing our carbon footprint is Red Hat’s responsibility to the planet. In addition to fulfilling this responsibility, what do enterprises stand to gain from embracing more sustainable practices?

      • OpenSource.comWhy program management matters in open source [Ed: Master IBM insists on having managers in Free software communities, in order to herd the slaves (volunteers, developers)]

        I’ve used that line for a laugh at the beginning of talks, but it’s true. Program management is, at its core, the act of coordinating the interfaces between teams to produce something of value. In open source projects, the “something of value” is generally the software that the community produces. Most open source communities create software, and almost none of them have a formal program manager. So why have a program manager?

        The difference lies in managing the software development with intent instead of by accident. The smaller the community, the easier it is to self-coordinate. The need for intentional coordination increases as the community grows or the software becomes more complex.

        In The Mythical Man Month, Fred Brooks noted that the number of communication channels goes up dramatically faster than the number of people working on a project. A program manager can help simplify the communication overhead by serving as a centralized channel for information. By lurking on mailing lists and chat channels, the program manager sees what’s going on in the project and communicates that broadly to the community and the public. This way, anyone who needs to know the high-level details can look at the program manager’s summary instead of paying attention to every channel themselves.

      • Highly Secure API Enablement for IBM i

        The explosive growth of APIs (Application Programming Interfaces) over the past few years has dramatically transformed how business is conducted. APIs allow customers to increase revenue by leveraging new channels to reach their customers; they facilitate cost reduction by automating manual processes and raising an organization’s responsiveness. In many industries, the benefits of APIs are so compelling that it is already impossible to compete or participate in a business supply chain without supporting APIs.

      • Guru: IBM i Privileged Account Management, And What’s So Special About Special Authorities
      • IBM Finally Shows Some Growth In Sales And Profits [Ed: IBM-sponsored site spreads IBM-sponsored lies, using the company's dirty accounting 'tricks'; journalism has been replaced by PR]
      • Altair Delivers More Options for Running SAS Code

        Companies that have legacy SAS code for analytic applications running on IBM i servers and other platforms but don’t want to pay the SAS Institute for the runtime have another option from Altair, which recently acquired World Programming.

      • Power10 Entry Machines: The Power S1022 And Power L1022
    • Canonical/Ubuntu Family

      • DebugPointLubuntu Introduces Backport PPA to Experience Latest LXQt Desktop

        The Lubuntu team brings a backport PPA to help you install the latest LXQt desktop in the current Lubuntu LTS release.


        Dell and Canonical announced that the XPS 13 Plus is the first OEM PC certified for Ubuntu 22.04 Long-Term Support (LTS). That makes this a straightforward route to having a PC that just works without worrying about whether or not each component is ready to work with Linux. Linux-equipped Developer Edition models of the laptop were available with prices starting at $1,289, but currently ship with the older 20.04 LTS software. Long-term support releases deliver what it says on the tin for ten years of software updates, with the end of standard support for this version scheduled in 2027. Certified devices are lab tested to check the compatibility of each component, which means your device gets the specific drivers installed that will make all of its features work properly. The Ubuntu 22.04 LTS package has a long list of upgrades, including better power management, new touchpad gestures, and improved support for Bluetooth audio devices. According to Dell, if you’d like to have your XPS 13 Plus and its “capacitive touch function row” set up with a hardware-optimised version of 22.04.

  • Free, Libre, and Open Source Software

    • Linux LinksBest Free and Open Source Software – July 2022 Updates – LinuxLinks

      Here are the latest updates to our compilation of recommended software. This month’s focus has been on expanding our features on games and web apps. These sections are now fairly comprehensive.

      We’ve also published new articles in the fields of video, system administration, graphics, and coding.

      As always, We welcome suggestions for new articles or additional open source software to feature.

    • Web Browsers

      • Mozilla

        • When an Algorithm is Your Boss — The Internet Health Report 2022

          Gig workers around the world report directly to algorithms in precarious jobs created by secretive corporations. We take you to the streets of Quito, Ecuador where delivery workers are protesting against artificial intelligence, and we hear solutions from people in several countries on how to audit the algorithms and reclaim rights.

    • SaaS/Back End/Databases

      • TecMintAdminer – A Full-Featured MySQL Database Management Tool [Ed: Old but newly updated]

        Formerly phpMyAdmin, Adminer is a front-end database management tool written in PHP. Unlike phpMyAdmin, it only comprises a single PHP file that can be downloaded on the target server on which Adminer is to be installed.

        Adminer provides a stripped-down and leaner UI compared to phpMyAdmin. It works with popular SQL database management systems such as MariaDB, PostgreSQL, MySQL, Oracle, SQLite, MS SQL as well as Elasticsearch search engine.

        In this guide, we will walk you through the installation of Adminer on RHEL-based distributions.

      • PostgreSQLPostgreSQL: pgAdmin 4 v6.12 Released

        The pgAdmin Development Team is pleased to announce pgAdmin 4 version 6.12. This release of pgAdmin 4 includes 21 bug fixes and new features. For more details please see the release notes.

        pgAdmin is the leading Open Source graphical management tool for PostgreSQL. For more information, please see the website.

    • Productivity Software/LibreOffice/Calligra

    • GNU Projects

      • GNUGNU Linux-libre 5.19-gnu (Uhura)
        GNU Linux-libre 5.19-gnu cleaning-up scripts, cleaned-up sources, and
        cleaning-up logs (including tarball signatures) are now available from
        our git-based release archive git://linux-libre.fsfla.org/releases.git/
        tags {scripts,sources,logs}/v5.19-gnu.
        Compressed tarballs and incremental patches will soon also available at
        The cleanup scripts are unchanged aside for a typo fix since rc5, the
        first in this cycle.  Jason Self and I picked a new image from his
        beautiful Freedo-and-GNU-themed artwork collection for this release,
        check it out at https://linux-libre.fsfla.org/#news or the whole
        collection at https://jxself.org/git/?p=freedo.git;a=tree
        This release is codenamed Uhura in memory of Nichelle Nichols.  Her Star
        Trek character, and thus this release, are named after the word for
        freedom in Swahili.
        Freesh and RPMFreedom, the distributions of .deb and .rpm packages of
        GNU Linux-libre maintained by Jason Self, are expected to have binaries
        of 5.19-gnu available eventually.  Jason is taking well-deserved
        vacations, so that may take a bit longer than usual.  Thanks, Jason!
        The ATM Ambassador driver was removed upstream, so we could drop the
        corresponding cleaning up logic.  HDCP helper and Mellanox Core cleaning
        up bits were split into their newly-introduced separate kconfig
        identifiers, out of Direct Rendering Management and Mellanox Spectrum.
        A couple of new drivers required cleaning up: pureLiFi X/XL/XC and TI
        AMx3 Wkup-M3 IPC.  Silicon Labs WFX graduated out of the upstream
        staging area, in spite of still requiring cleaning up.
        Various preexisting drivers needed adjustments to their cleaning up
        logic, mainly out of new blob versions or names: amdgpu, Qualcomm WCNSS
        PIL, Realtek Bluetooth, Mellanox Spectrum, Marvell WiFi-Ex, and Intel
        AVS, IFS and ipu3-imgu.  Blobs requested through several new devicetree
        files for Qualcomm AArch64 SoCs have been cleaned up.
        New patterns have been added to our blob finder to match and accept a
        new file naming convention adopted by Sound Open Firmware.
        For up-to-the-minute news, join us on IRC (#gnu-linux-libre on
        libera.chat).  I often mention our releases on P2P or federated social
        media as well.  The link in my email signature has directions.
        Be Free! with GNU Linux-libre.
        What is GNU Linux-libre?
          GNU Linux-libre is a Free version of the kernel Linux (see below),
          suitable for use with the GNU Operating System in 100% Free
          GNU/Linux-libre System Distributions.
          It removes non-Free components from Linux, that are disguised as
          source code or distributed in separate files.  It also disables
          run-time requests for non-Free components, shipped separately or as
          part of Linux, and documentation pointing to them, so as to avoid
          (Free-)baiting users into the trap of non-Free Software.
          Linux-libre started within the gNewSense GNU/Linux distribution.
          It was later adopted by Jeff Moe, who coined its name, and in 2008
          it became a project maintained by FSF Latin America.  In 2012, it
          became part of the GNU Project.
          The GNU Linux-libre project takes a minimal-changes approach to
          cleaning up Linux, making no effort to substitute components that
          need to be removed with functionally equivalent Free ones.
          Nevertheless, we encourage and support efforts towards doing so.
          Our mascot is Freedo, a light-blue penguin that has just come out
          of the shower.  Although we like penguins, GNU is a much greater
          contribution to the entire system, so its mascot deserves more
          promotion.  See our web page for their images.
          If you are the author of an awesome program and want to join us in
          writing Free (libre) Software, please consider making it an official
          GNU program and become a GNU Maintainer.  You can find instructions
          on how to do so at https://www.gnu.org/help/evaluation.  We look
          forward to hacking with you! :)
        What is Linux?
          Linux is a clone of the Unix kernel [...]
        (snipped from Documentation/admin-guide/README.rst)
        Alexandre Oliva, happy hacker
    • Programming/Development

      • MedevelDeco IDE: The Open-source Free React IDE for macOS, Linux, and macOS

        Deco IDE is a free open-source IDE for React that allows developers to visually code, edit and build their React apps in a visual manner.

        It has been around for some time now, and it has many devoted users who are still using it, even though it did not receive any updates since 2016.

  • Leftovers

    • Security

      • Efficient Infrastructure Testing | Pen Test Partners

        Before we start let’s set the scene regarding vulnerability assessment. It is imperative that enterprises conduct their own continuous automated scanning, to have up-to-date assessments of threats that their networks may be susceptible to. Infrastructure penetration testing (discussed in this blog post) should be then used to delve further to expose issues and attack chains using manual testing that would have not been uncovered by automated techniques.

        To go one step further, mature environments with well-formed patch management policies and good security practice, should then consider Red Team engagements to assess response and detection against emulated real-world adversaries.

        On several infrastructure tests I’ve found myself performing vulnerability assessments on expansive networks. While Nessus and other scanning tools have their place, it is crucial to be able to work efficiently to provide much more value on an engagement rather than providing tool output that clients can run themselves (and should be doing, regularly).

      • IPFire Official Blogblog.ipfire.org – Celebrating 10 Years of Lightning Wire Labs (10% Off All Appliances)

        We are celebrating 10 years of Lightning Wire Labs!

        A whole decade where we have been working to make the Internet a safer place. Time that has been moving fast, has been full of challenges, as well as a time that has been a great success for ourselves, and our customers and partners we work with.

    • Environment

      • Energy

        • Is (cryptocurrency) winter coming?

          A ‘winter’ which significantly cooled the cryptocurrency bubble might allow more space for the development of cryptocurrency tech and systems more oriented towards facilitating forms of exchange much more rooted in environmental sustainability, capital circulation rather than capital accumulation, and economies which prioritise support for human thriving in general over support for the Four Monopolies[f].

          Or it might not. And anyway, it feels like this is probably moot: my guess is that there are yet more cryptocurrency bubbles to come in the near future.

    • Censorship/Free Speech

  • Gemini* and Gopher

    • Personal

      • Crimson and Clover

        Gonna listen to the Joan Jett and The Blackhearts version and then immediately listen to the original by Tommy James/The Shondells and decide which one I want to put on my “any/all genre” playlist.

        As I do so, I will write other stuff

        Been listening to “We Didn’t Start The Fire” by Billy Joel nightly for the past few nights, and it seems to be even more climactic/powerful each time I listen to it. Like a Pop song that gets stuck in one’s head, only instead of the “catchy-ness” being the draw, it’s the energy and catharsis of listening to it that makes me want to keep coming back.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Sunday, July 31, 2022

Posted in IRC Logs at 2:13 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmQie81hv4GWZwicnbvupdzRCvPNzv18fVJmc7nsVfDEav IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmRDNDdSNawHmweQLXFq4FU9HZJBS3nf5u5iqpRTzoxaJZ IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmTSwarHSCw55KFhggQUjT11SnaJknuX2C2yCHkNnaqthc IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmfEnooFj6fzvAtPhDLKPGqHEqXG1wKze7BCQZVtXxvk3V IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmaVg83L4akUmajzr5VSzP2ARvfVya5gZ6isNNPfmjf2d4 IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 Qmf82g7R2kQGbjGCtnfadNb73ZPvJzWgqcn66gbuwwrQRQ IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmQqsWTqya5QZGdytHnuukmeSf59ThmKo3ebFxsAyQcfXs IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmQkvV9h8sb6VtqS42iKjmKPVVaL2Vgf843JoCfiyCFAMC IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday


« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts