08.03.22

Links 03/08/2022: Peppermint OS Release

Posted in News Roundup at 7:17 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

    • Audiocasts/Shows

      • VideoFrom MIT To Linux: How Xorg Died Many Deaths – Invidious

        The history of Xorg and the x window system is far older than Linux and any project that long is going to have a troubled history, Im impressed that we even have a functioning display server in 2022.

      • Linux Made SimpleLinux Mint 21 Cinnamon

        Today we are looking at Linux Mint 21, Cinnamon edition. It is based on Ubuntu 22.04, Linux Kernel 5.15, Cinnamon 5.4, and uses about 1GB of ram when idling. Enjoy!

      • VideoLinux Mint 21 Cinnamon Run Through – Invidious

        In this video, we are looking at Linux Mint 21, the Cinnamon edition.

      • Sugar-Free Hammer

        Fedora dumps CC0. What does this mean for open source developers? Doc Searls, Shawn Powers and Jonathan Bennett discuss on FLOSS Weekly the implications of this move from Fedora and how it relates to developers. Intel plants its flag in the discrete GPU marketspace with ARC GPU. Shawn Powers feels this is a very good thing.

      • VideoSCaLE 19x – Canonical, AREDN, and System76 – Invidious

        SCaLE 19x was so much fun! In the second video in a series that will cover this year’s event, I’ll play back conversations I’ve had with three really awesome people: Monica Ayhens-Madon (Community Representative at Canonical), Tim Wilkinson (Technologist and Contributor for AREDN), and Adam Balla (Content Producer for System76). These individuals are very passionate about their projects, and the conversations we had were a lot of fun. Check it out! (And there’s definitely more to come).

    • Kernel Space

      • LWNLinux 5.18.16
        I'm announcing the release of the 5.18.16 kernel.
        
        All users of the 5.18 kernel series must upgrade.
        
        The updated 5.18.y git tree can be found at:
        	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.18.y
        and can be browsed at the normal kernel.org git web browser:
        
        https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
        
        thanks,
        
        greg k-h
        
      • LWN Linux 5.15.59
      • LWNLinux 5.10.135
      • LWNLinux 5.4.209
      • The Register UKRe: That proposal to remove DECNET support from Linux kernel • The Register

        There’s a proposal to remove the code for the DECnet networking protocol from the Linux kernel… but what was DECnet anyway?

        Microsoft software engineer Stephen Hemminger has proposed removing the DECnet protocol handling code from the Linux kernel. The timing is ironic, as this comes just two weeks after VMS Software Inc announced that OpenVMS 9.2 was really ready this time…

        That announcement, of course, came some months after the first time it announced [PDF] version 9.2, as we covered in The Reg in May.

        The last maintainer of the DECnet code was Red Hat’s Christine Caulfield, who flagged the code as orphaned in 2010. The change is unlikely to vastly inconvenience many people: VMS is the last even slightly mainstream OS that used DECnet, and VMS has supported TCP/IP for a long time. Indeed, for decades, the oldest email in this reporter’s “sent” folder was a 1993 enquiry about the freeware CMUIP stack for VMS.

      • Locking Engineering Hierarchy

        The first part of this series covered principles of locking engineering. This part goes through a pile of locking patterns and designs, from most favourable and easiest to adjust and hence resulting in a long term maintainable code base, to the least favourable since hardest to ensure it works correctly and stays that way while the code evolves. For convenience even color coded, with the dangerous levels getting progressively more crispy red indicating how close to the burning fire you are! Think of it as Dante’s Inferno, but for locking.

        As a reminder from the intro of the first part, with locking engineering I mean the art of ensuring that there’s sufficient consistency in reading and manipulating data structures, and not just sprinkling mutex_lock() and mutex_unlock() calls around until the result looks reasonable and lockdep has gone quiet.

        [...]

        Simple, dumb locking is good locking, since with that you have a fighting chance to make it correct locking.

      • LWNVetter: Locking engineering hierarchy

        Daniel Vetter continues his series on locking in the kernel.

    • Instructionals/Technical

      • CitizixHow to Install and Configure Postgres 14 on Rocky Linux 9

        In this guide we are going to install Postgresql 14 in Rocky Linux 9.

        Postgresql is an open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. Postgres, is a free and open-source relational database management system emphasizing extensibility and SQL compliance. It was originally named POSTGRES, referring to its origins as a successor to the Ingres database developed at the University of California, Berkeley. PostgreSQL is used as the primary data store or data warehouse for many web, mobile, geospatial, and analytics applications. PostgreSQL can store structured and unstructured data in a single product.

      • CitizixHow to run PGAdmin 4 Using Docker and Docker-Compose

        PGAdmin is a web-based GUI tool used to interact with the Postgres database sessions, both locally and remote servers as well. You can use PGAdmin to perform any sort of database administration required for a Postgres database.

        pgAdmin 4 is designed to meet the needs of both novice and experienced Postgres users alike, providing a powerful graphical interface that simplifies the creation, maintenance and use of database objects.

        In this guide, we are going to set up pgAdmin 4 in a container, the web based administration tool for the PostgreSQL database.

      • MakeTech EasierHow to Use Chroot in Linux and Fix Your Broken System – Make Tech Easier

        Chroot is a Linux/Unix utility that can change or modify the root filesystem. With the help of the chroot command, you can easily create an isolated filesystem inside your primary filesystem. Chroot is especially helpful to make your work and home environment separated or if you want a test environment to test software in isolation.

      • Linux JournalHow to Use the rsync Command | Linux Journal

        One of my favorite utilities on the Linux command-line, and block storage is one of my favorite features on Linode’s platform, so in this article I get to combine both of these together – because what I’m going to be doing is show you how to use rsync to copy data from one server to another, in the form of a backup. What’s really cool about this, is that this example will utilize block storage.

        Note: I’ll be using the Nextcloud server that was set up in a previous article, but it doesn’t really matter if it’s Nextcloud – you can back up any server that you’d like.

      • LinuxSecurityHow a WAF Could Improve the Security of Your Linux Web Applications
      • ZDNetHow I installed Chrome OS Flex in 30 minutes
      • How to find the current ChromeOS Flex image « Ville-Pekka Vainio’s blog

        My dad has an Acer Chromebook 14 CB3-431, codenamed Edgar. Google just stopped supporting it with ChromeOS, but it’s still working well. Luckily, Google also just released the first stable version of ChromeOS Flex.

        I decided to install the full UEFI image to the Chromebook from https://mrchromebox.tech/ so that starting Flex would be as easy as possible. That went well after finding and removing the write protect screw.

      • Peter Czanik: Vmware Photon OS 4.0: an interesting syslog-ng package
      • Verification CLT via flask && matplotlib

        Central limit theorems (CLT) are a class of theorems in probability theory stating that the sum of a sufficiently large number of weakly dependent random variables that have approximately the same scale (none of the terms dominates, does not make a decisive contribution to the sum), has a distribution close to normal. Since many random variables in applications are formed under the influence of several weakly dependent random factors, their distribution is considered normal. In this case, the condition must be observed that none of the factors is dominant. Central limit theorems in these cases justify the application of the normal distribution.

      • Linux Made SimpleHow to install GDevelop on a Chromebook

        Today we are looking at how to install GDevelop on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • LinuxiacHow to Create tar.gz Archive Using the tar Command on Linux

        This article shows you the best practices for creating tar.gz archives from the command line in Linux using the tar command.

        Using the tar command to create tar.gz archives in Linux is a must-have skill for any Linux administrator. For this reason, in this article, we will show you how to create tar.gz archives in Linux using real-world examples following best practices.

        Additionally, if you want to learn how to extract tar.gz files in Linux, check out our excellent guide, “How to Extract tar.gz File in Linux by Using the Command Line.”

      • Install Malcolm Network Traffic Analysis Tool on Ubuntu 22.04 – kifarunix.com

        Follow through this tutorial to learn how to install Malcolm network traffic analysis tool on Ubuntu 22.04. Malcolm is a network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs. The PCAP files or Zeek logs can be uploaded to Malcolm via browser, forwarded via the forwarders or can capture live traffic, parses and normalize the traffic for visualization via OpenSearch dashboards or Arkime.
        Read more about Malcolm network traffic analysis tool and its features on their page.

      • ID RootHow To Install ClamAV on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install ClamAV on Rocky Linux 9. For those of you who didn’t know, ClamAV is an open-source antivirus engine for detecting trojans, viruses, malware, adware, rootkits, and other malicious threats. ClamAV offers a Command-line scanner, a Milter interface for Sendmail, an Advanced database updater, and built-in support for archive formats, ELF executables + Portable Executable files, and popular document formats. Though it was created for Unix, it is also available in third-party versions for BSD, Linux, macOS, OpenVMS, OSF, and Solaris.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the ClamAV open-source antivirus on Rocky Linux. 9.

      • TechRepublicHow to clone a GitHub repository | TechRepublic

        Git is the most widely-used distributed version control system on the planet. It’s free, open-source and can handle anything from small to massive projects. Git makes it easy to create new project repositories on your local drive or clone them from remote repositories.

      • Unix MenThe Best Linux Commands Every User Should Know (Clear and Simple Documentation)

        Nearly 75% of all mobile phones run Android, based on the Linux kernel, and most servers that host websites and other content run on Linux. There are also several Linux distributions that individuals and organizations use to get their work done every day.

        Being new to Linux can be overwhelming since the look and feel of the distributions is quite different from what most Windows and macOS users are accustomed to. Furthermore, the command line interface can make learning to use Linux seem like rocket science.

        In this guide, we walk you through basic file manipulation commands and all the best Linux commands that every user should know. While this guide is based on Ubuntu 18.04, you should be able to use the commands on other distros just as easily.

    • Games

      • Boiling SteamNew Steam Games with Native Linux Clients – 2022-08-03 Edition – Boiling Steam

        Between 2022-07-27 and 2022-08-03 there were 28 New Steam games released with Native Linux clients. For reference, during the same time, there were 284 games released for Windows on Steam, so the Linux versions represent about 9.9 % of total released titles. Here’s a quick pick of the most interesting ones…

  • Distributions and Operating Systems

    • Make Use Of9 New Linux Distros to Try Out in 2022

      Hundreds of new Linux distros spawn each year, with many becoming the norm among the community. Here are some new distros for you to try in 2022.

      As an open-source operating system, Linux continues to rule the market, even in 2022. The highly malleable Linux kernel has come a long way, evolving into many avatars and spawning different desktops suitable for numerous use cases.

      As is custom, a slew of new Linux distributions has become available to believers looking for high-tech computing on low-end hardware. Each distro comes with its unique USP, which makes it stand out amongst its competitors.

      Without further ado, here are the top most-anticipated Linux distros within the open-source software community, which are worth a mention.

    • New Releases

      • 9to5LinuxPeppermint OS Now Offers Devuan-Based ISOs for Software Freedom Lovers

        Peppermint OS’s goal was always to provide a familiar operating system environment to new Linux users. Initially derived from Ubuntu, Peppermint OS was rebased on Debian Stable earlier this year, a release that came almost three years after the previous version, Peppermint 10.

        On August 2nd, 2022, Joseph Dickson announced that the first Devuan-based release of Peppermint OS is now ready for mass deployment, targeting everyone who doesn’t want systemd in their system and wants to build a 100% free computer without any proprietary software.

    • SUSE/OpenSUSE

      • Work Group Shifts to Feedback Session – openSUSE News

        Members of openSUSE’s Adaptable Linux Platform (ALP) community workgroup had a successful install workshop on August 2 and are transitioning to two install feedback sessions.

        The first feedback session is scheduled to take place on openSUSE’s Birthday on August 9 at 14:30 UTC. The second feedback session is scheduled to take place on August 11 during the community meeting at 19:00 UTC.

        Attendees of the workshop were asked to install MicroOS Desktop and temporarily use it. This is being done to gain some feedback on how people use their Operating System, which allows the work groups to develop a frame of reference for how ALP can progress.

    • Slackware Family

      • 9to5LinuxSlackware-Based Slax Linux Is Back After 9 Years of Hiatus


        In 2015, Slax Linux, a lightweight and portable GNU/Linux distribution based on Slackware Linux, disappeared from the Linux scene. Two years later, in late 2017, Slax Linux developer Tomas Matejicek announced the release of a new version of Slax Linux based on Debian GNU/Linux, not Slackware.

        In mid-July 2022, Tomas Matejicek announced that “having nothing better to do” he is considering bringing back the Slackware-based version, and today he released a new Slax release based on Slackware 15.0.

      • Linuxiac9 Years Later, Slax Linux Has Found Its Way Back Home

        Slax 15.0, the lightweight Live CD Linux distro, is now available, re-based back to its roots on Slackware Linux.

        Slax is a portable and fast Linux operating system with a modular architecture and beautiful design that can be operated from a USB stick. It supports many filesystems, including NTFS, FAT, EXT4, and Btrfs.

        The ability to persist data is one of the key features that distinguishes Slax from other Live CD Linux distributions. In other words, if you run Slax from a read-only media, such as a CD/DVD, it only saves system modifications in memory, which you lose when rebooting.

    • Fedora Family / IBM

      • Red Hat OfficialForrester Consulting Total Economic Impact™ study reveals Red Hat Services and Support for OpenShift delivered ROI of over 700% [Ed: Red Hat pays Microsoft marketing/de facto PR firm for fake, paid-for, manufactured “recommendation”, feeding a vicious and rogue industry of fake “analysts”]
      • Red Hat OfficialI will take the Red (Hat) SLSA please: Introducing a framework for measuring supply chain security maturity

        At Red Hat, we strive for transparency with our customers. It is who we are. It is what we do. But transparency in product security can be tricky. We must provide our customers with the information they need to make informed decisions without opening ourselves or them up to attacks. With the uptick in software supply chain attacks over the last couple of years, we have harnessed a particular focus on software supply chain security within our Product Security organization.

      • FOSSLifeWhat’s an Automation Engineer?

        Generally, automation involves “the use of technology to perform tasks with reduced human assistance,” says Red Hat. “Any industry that encounters repetitive tasks can use automation, but automation is more prevalent in the industries of manufacturing, robotics, and automotives, as well as in the world of technology — in IT systems and business decision software.”

        “Automation has been a cornerstone of the manufacturing industry for decades,” explains Sarah White, but now companies are automating IT and software processes as well.

        Specifically, Red Hat says, “IT automation, sometimes referred to as infrastructure automation, is the use of software to create repeatable instructions and processes to replace or reduce human interaction with IT systems.” In terms of software, automation can help improve efficiency and solve workflow challenges.

    • Devices/Embedded

      • CNX SoftwareNVIDIA Jetson AGX Orin 32GB production module is now available


        NVIDIA Jetson AGX Orin 32GB production module is now in mass production and available, after the 12-core Cortex-A78E system-on-module was first announced in November 2021, and the Jetson AGX Orin developer kit was launched last March for close to $2,000.

        Capable of up to 200 TOPS of AI inference performance, or up to 6 times faster than the Jetson AGX, the NVIDIA Jetson AGX Orin 32GB can be used for AI, IoT, embedded, and robotics deployments, and NVIDIA says nearly three dozen partners are offering commercially available products based on the new module.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • OSI BlogThe five stages of the Open Source Program Office [Ed: Two Microsoft front groups converge, LF and OSI. The LF and OSI nowadays exist for openwashing of proprietary software, i.e. to not actually change anything except buzzwords and perception.]
    • Productivity Software/LibreOffice/Calligra

      • Document FoundationLibreOffice is a flagship project for social service at UACM – The Document Foundation Blog

        This year, nine students from the Universidad Autónoma de la Ciudad de México (UACM), one of the most important universities in the country and in the capital of Mexico, have joined the social service programme that LibreOffice offers to all Mexican students. This is a record number in the three semesters that the programme has been running at the university.

      • GTK[3|4] GtkScrollbar for writer documents

        GTK4 screenshot of writer using true GtkScrollbars rather than themed Vcl ScrollBars. Long press enters gtk’s usual fine control mode for scrolling.

    • Content Management Systems (CMS)

      • Medevel16 Best Open-source Free Ghost Blog Themes for 2022

        Ghost blog is an open-source blogging platform, headless CMS for individuals and enterprise. We have been using it for years since the early version.

        Thanks to its developers and the community, Ghost blog came a long way in the recent releases by adding the search, improving the backend, the SEO features and more.

        However, the community is still small comparing to WordPress or other competitors, so it may look like there is no enough free open-source themes, but there are many.

        Therefore, we write this post as a guide for open-source Ghost themes for anyone who are sticking to the open-source realm.

    • Programming/Development

      • Tristan Van Berkom: BuildStream 2 news

        After a long time passed without any BuildStream updates, I’m proud to finally announce that unstable BuildStream 2 development phase is coming to a close.

        As of the 1.95.0 beta release, we have now made the promise to remain stable and refrain from introducing any more API breaking changes.

        At this time, we are encouraging people to try migrating to the BuildStream 2 API and to inform us of any issues you have via our issue tracker.

        [...]

        Plugins which used to be a part of the BuildStream core, along with some additional plugins, have been migrated to the buildstream-plugins repository. A list of migrated core plugins and their new homes can be found in the porting guide.

  • Leftovers

    • Hardware

      • The Next PlatformAMD Finally Reaps The Fortunes It Has Sown

        Sometimes, competing for business means coming up with better products than your rivals. And other times, competing means just not screwing up while your competitor stumbles. For the heated battle between AMD and its archrival, Intel, when it comes to compute engines in the datacenter, AMD is in the fortunate position of being able to leverage both tactics at the same time.

        And we say fortunate, we mean that AMD is raking in money and rapidly re-investing it into the further expansion of its business as well as buying up the stock that will allow it to reward employees who have worked hard for this day to come.

        Seven years ago, when the Epyc comeback plan was formulated, AMD could not have dreamed in a million years that Intel’s vaunted foundries would run into so many troubles with 10 nanometer and then 7 nanometer processes. The current situation has created as big of a gap for AMD to exploit as Intel’s stubborn decision to put forth the Itanium architecture as the future of datacenter compute back in the late 1990s and early 2000s, which gave AMD the immense opportunity to peddle 64-bit Xeon-compatible Opteron processors against 32-bit Xeons (which Intel initially refused to bit-wise embiggen) and 64-bit – and mostly non-compatible – Itaniums.

      • GoogleGlobalFoundries joins Google’s open source silicon initiative | Google Open Source Blog

        Over the last year we have been busy planning the expansion of our free open source silicon design and manufacturing program to further grow the community of developers and companies building custom silicon, and build a thriving ecosystem around open source hardware.

        Today, we’re excited to announce an expansion of this program and our partnership with GlobalFoundries. Together, we’re releasing the Process Design Kit (PDK) for the GlobalFoundries 180MCU technology platform under the Apache 2.0 license, along with a no-cost silicon realization program to manufacture open source designs on the Efabless platform. This open source PDK is the first result of our ongoing partnership with GF. Based on the scale and breadth of GF’s technology and manufacturing expertise, we expect to do more together to further access and innovation in semiconductor development and manufacturing.

    • Proprietary

      • DuoNVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux | Decipher

        NVIDIA, which makes graphics processing units (GPUs) for gaming systems, high-end PCs and handheld devices, has issued fixes for several high-severity vulnerabilities in its graphics drivers for Windows and Linux that in some cases could lead to code execution.

        The graphics driver (also known as the NVIDIA GPU Display Driver) is the software component that allows the device’s operating system and application to use its enthusiast gamer-optimized graphics hardware. NVIDIA’s graphics driver has previously been found to contain serious flaws, including ones disclosed in May that could allow attackers to execute arbitrary code and, in some cases, perform guest-to-host escapes on systems running virtual machines.

      • CISAVMware Releases Security Updates | CISA

        VMware has released security updates to address multiple vulnerabilities in VMware’s Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector, and vRealize Automation. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

    • Security

      • Privacy/Surveillance

        • AccessNowNo place for privacy in India as government withdraws Personal Data Protection Bill – Access Now

          The wait for meaningful legal protection of people’s privacy in India — long under ever-increasing attack — has just gotten longer. The government has withdrawn the Personal Data Protection Bill, which had been in the works for three years, slamming the brakes indefinitely on privacy safeguards in India. This decision, and the government’s consistent failure to advance a meaningful, people-centric data protection law, comes with a steep cost to human rights in the world’s largest democracy.

          The initial 2019 version of the legislation, and the following 2021 draft with recommendations by a parliamentary committee, each failed to adequately protect privacy and granted excessive discretionary powers to the government. However, these iterations could have served as a basic foundation that lawmakers could subsequently improve, creating a law that would have strengthened Indians’ rights and control over their personal data. The government’s withdrawal of the bill without any discussion in parliament, and without presenting a concrete replacement, deepens the uncertainties and risks surrounding privacy and erodes people’s confidence in the government.

          “As India celebrates 75 years of independence, we are also marking 12 years since policymakers first proposed a federal-level privacy and data protection law, and over five years since the Supreme Court of India ruled that privacy was a fundamental right, requiring government action to safeguard our personal data,” said Raman Jit Singh Chima, Asia Pacific Policy Director and Senior International Counsel at Access Now. “Today, far too many sessions of parliament have passed with zero progress on the Personal Data Protection Bill, when it should have been the top priority. The government’s withdrawal of legislation and failure to say when we will move forward on a strengthened, people-centric data protection law — one that does not privilege the interests of government and the tech sector over fundamental rights — is wholly unacceptable.”

        • AccessNowThe Jamaica NIDS digital identification program: a cautionary tale​​ – Access Now

          Within a matter of weeks, Jamaica will roll out a pilot program for the National Identification System (NIDS) — a voluntary biometric digital identification system created through the National Identification and Registration Act (NIRA). The Jamaica NIDs program is going ahead in spite of the very real privacy and security risks civil society has identified, as well the potential for the new digital ID to enable discrimination or even exclusion of vulnerable communities from government services and benefits.

          Before passing the NIRA, the Jamaican parliament failed to resolve all of the concerns that we and our partners flagged. Our hope is that other countries considering implementing similar programs will avoid making the same mistakes.

    • Finance

      • DaemonFC (Ryan Farmer)T.J. Maxx in trouble for knowingly selling recalled products that can cause fires and kill babies. This is the natural result of Republican political corruption. – BaronHK’s Rants

        The U.S. Consumer Product Safety Commission fined the company $13 million dollars for knowingly selling such items as “a portable speaker model that posed an explosion hazard, hoverboards linked to 16 reports of burn injuries and knives that broke and caused multiple lacerations requiring stitches.”

        The company also sold infant products that were known to have actually caused infants to be killed.

        T.J. Maxx runs stores under that name, Marshalls, and HomeGoods.

        The CPSC Web site lists at least 19 products that T.J. Maxx sold which it knew were recalled and dangerous to the American public.

        The problem going on here is that T.J. Maxx mainly runs stores for poor people. You see them in run down shopping malls and low end strip malls.

        They bring shoppers in mainly by selling things that didn’t sell at larger stores because of serious design flaws, but also due to liquidation sales.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 03/08/2022: Release of Slax 15.0 and Fedora 37′s Default Wallpaper

Posted in News Roundup at 1:39 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Linux HintBest Linux Distributions for an Old Laptop in 2022

        “Unlike Windows and Mac, Linux still provides lifelong support for older machines with its various distributions. This is what I like most about Linux and its distributions. Even if you cannot carry out larger tasks, you can still carry out normal day-to-day tasks such as web browsing, writing/editing word document, watching movies, or listening to music. So why throw your old machine if you can still make use of it?
        So, we will have a look at the best Linux distributions that can be easily used and installed on older computers with minimal hardware. Some of the Linux distributions listed here might be useful for beginners also.

        So, let’s get started and have a look at lightweight Linux distros for an old laptop as in 2022.”

    • Audiocasts/Shows

    • Applications

      • Ubuntu PitSpeek: An Open-source Anonymous Chat App Built on Tor Network

        Are you looking for an open-source chat app for your Linux to keep your information and data safe and secure? Well, Speek is the solution for you. It’s an anonymous chat app that uses the Tor network. In recent times, there are so many messaging apps that promise to provide high security and privacy.

        Speek stands out as the most feature-rich privacy-focused app for Linux. With this decentralized chat app, as a user, you don’t need to have an ID or a cell number. Everything will be anonymous for managing the safest online environment.

      • OMG! LinuxNew Version of Open Source Podcast Client gPodder Released – OMG! Linux

        Into Linux podcasts? With so many great shows out there publishing new episodes regularly it can be hard to keep up, which is what a podcast manager like gPodder can help with.

        This week a brand new version of gPodder was release. It’s the first significant update the podcast manager has received in over a year. Naturally, plenty of improvements are included.

        For instance, in gPodder 3.11.0 you can double-click (or tap Enter) on a podcast in the sidebar to open the channel settings dialog. From there you can edit the name and description, and manage subscriptions on a per-podcast basis — a nice time-saver.

    • Instructionals/Technical

      • ByteXDFFmpeg: How to Convert MKV To MP4 – ByteXD

        In this article you will learn how to use FFmpeg to effortlessly convert mkv to mp4, additionally, you will be acquainted with re-encoding video and audio using different ffmpeg encoders.

        We will discuss converting mkv files to mp4; there is a high probability that you might be in situations that require having mp4 files, or you may want to use systems that do not support the mkv container format. In these situations, it is imperative to convert the video file to another system-friendly file extension, such as the mp4 video format.

      • How to fix a read-only NTFS partition on Linux?

        Over the past ten years of Linux usage, I have frequently switched from Windows to Linux without properly restarting the Microsoft OS, which has caused me problems with NTFS/Windows partitions. To fix these problems, I was obliged to restart my Linux distro so that I could reboot the “hibernated Windows OS”; it was annoying.

        One day I said there must be a way less painful, so I went to my favorite web browser, Firefox, and did a simple search to find the helpful “ntfsfix” tool that got me rid of that annoyance. To not be stingy, I decided to share with you how to use this small and powerful tool.

      • TecAdminHow to Correctly Set the $PATH variable in Bash – TecAdmin

        Bash is an acronym of Bourne-Again Shell, which is the successor of Bourne Shell distributed with most of the Linux and GNU operating systems. It comes with multiple advanced features from the previous version.

        The PATH is an environment variable that stores the directories path containing the executable files.

      • nixCraftHow do you add comments on UFW firewall rule?

        The iptables and ip6tables commands are used to set up a Linux firewall. However, many new Linux sysadmins and users find it challenging to use iptables. Hence, the ufw program is for managing a Linux firewall and aims to provide an easy-to-use interface for the user. This page explains how to add a comment to your ufw firewall rules.

      • Linux BuzzHow to Install Linux Mint 21 (Vanessa) Step by Step

        Hello readers, much awaited Linux Mint 21 has been released. It is a LTS release, means we will get support and updates till 2027. Vanessa is the code name for Linux mint 21 and it is based on Ubuntu 22.04 LTS.

        In this post, we will cover how to install Linux Mint 21 with Xfce desktop environment step by step.

      • ID RootHow To Install FileZilla on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install FileZilla on Ubuntu 22.04 LTS. For those of you who didn’t know, FileZilla is a free and open-source FTP client. It powerful client for plain FTP, FTP over SSL/TLS (FTPS) and the SSH File Transfer Protocol (SFTP). Users can use it to copy files and folders via the Internet or local network from one PC to another computer. FileZilla is available for all popular OS such as Windows, macOS, and Linux.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FileZilla FTP client on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • H2S MediaInstall Stremio Streaming App on Ubuntu 22.04 LTS Jammy

        Learn the commands to install the Stremio desktop app on Ubuntu 22.04 LTS Jammy JellyFish Linux using the command terminal for streaming online videos.

        Stremio is an open-source application that is available for all popular platforms including Ubuntu 20.04 Linux or its previous versions. The below-given commands will be the same for Linux Mint, Elementary OS, DeepinOS, Zorin OS & Debian as well. The project is available on GitHub for users to download or create an add-on for it. Different add-ons created by the Stremio community allow it to stream online video, music, movies, and the website from various sources such as YouTube, Netflix, Amazon Prime, Torrent, Hotstar, etc.

      • Red Hat OfficialHow to restrict network access in Podman with systemd | Enable Sysadmin

        My previous article demonstrated that a socket-activated container can use an activated socket to serve the internet even when the network is disabled through the option –network=none for podman run. This article takes this idea one step further by also restricting internet access for Podman and its helper programs such as conmon and the OCI runtime.

      • markaicode by MarkHow to Clear the DNS Cache in Ubuntu 22.04/20.04 | Mark Ai Code

        In the realm of computers, machines do not use names in the same way that people do. They are identified by a series of numbers. All of these devices, including computers and phones, can identify and communicate with each other using these numbers, also known as IP addresses. In contrast, people know one another by their names, and it is difficult for us to recall long sequences of numbers. In order to overcome this communication gap between computers and people, architects have created a name system called as Domain Name System or DNS.

        The purpose of DNS is to convert names to numerical values. Specifically, it converts URLs to IP addresses. If a user puts google.com into their browser’s address bar and presses enter, the DNS will resolve this URL to “112.250.167.167” by searching its database and matching the URL with the IP address. Once your device gets this IP address, it may connect to Google and show the contents of the page. To eliminate communication between your computer and the server and save load times, these entries are cached locally, i.e., in the DNS cache, on your computer.

      • Linux CapableHow to Install Android Studio on Linux Mint 21 LTS

        Android Studio is a powerful and user-friendly IDE for developing apps on the Android platform. It features an intuitive interface, various built-in tools, and seamless integration with IntelliJ IDEA’s vast ecosystem of plugins and integrations. Thanks to its integration with IntelliJ IDEA, Android Studio has everything you need to develop Android apps in one place. There are never any lost connections or forgotten source files again! Android Studio’s user-friendly interface makes it easy to work efficiently and get the most out of your development time. Whether you’re a seasoned Android developer or just getting started, Android Studio is the perfect IDE for developing great Android apps.

        In the following tutorial, you will learn how to install the latest version of Android Studio on Linux Mint 21 LTS series using a recommended Launchpad PPA repository to provide the most up-to-date version using the command line terminal.

      • Linux CapableHow to Install Visual Studio Code on Linux Mint 21 LTS [Ed: Microsoft proprietary software that spies on the user]
      • Linux CapableHow to Install VSCodium on Linux Mint 21 LTS – LinuxCapable [Ed: A non-proprietary fork, but still helps Microsoft establish a monopoly over developers, so best to avoid]
  • Distributions and Operating Systems

    • New Releases

    • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

      • Linux MagazineOpenMandriva Lx ROME Technical Preview Released » Linux Magazine

        OpenMandriva’s rolling release distribution technical preview has been released for testing purposes and adds some of the latest/greatest software into the mix.

        Once upon a time, I hung out with the Mandrake Linux team at a Linux convention. That was back in the late 90s and things have changed quite a bit since then. Mandrake Linux is gone and, in its place, came Mandriva, which is a fusion of the Brazillian Connectiva Linux and Mandrake. From the ashes of Mandriva (which ceased being developed back in 2011) came OpenMandriva, which has since flourished.

        Recently, the developers of OpenMandriva announced the latest technical preview release of their Lx ROME distribution, which is a rolling release take on the open-source operating system. One thing of note is that the developers have switched off the auto-updater tool for ROME because they’ve been making some major changes to the tool-chain/system packages in the Cooker branch. Because of this, updates are unsafe (which is why it was shut off).

    • Fedora Family / IBM

      • 9to5LinuxAn Early Look at Fedora Linux 37 on Raspberry Pi 4

        Raspberry Pi 4 support in Fedora Linux is not a new thing. Users were able to run the Red Hat-sponsored distribution on the tiny computer, but some key features were missing, such as accelerated graphics, so the Fedora Project never officially supported it.

        With the upcoming Fedora Linux 37 release, Raspberry Pi 4 support will get the “official” status due to the implementation of accelerated graphics using the Broadcom V3D graphics driver. Accelerated graphics are provided in Fedora Linux 37 using the V3D GPU for both OpenGL-ES and Vulkan.

      • DebugPointFedora 37 Default Wallpaper Looks Refreshing

        Take a quick look at the Fedora 37 default wallpaper which features a night and dark theme with a nature theme.

    • Open Hardware/Modding

      • ArduinoAdding a battery gauge to a Citroën C-Zero electric car | Arduino Blog

        The Citroën C-Zero is an electric city card sold in the European market. It is a rebadged Mitsubishi i-MiEV, which is based on the Mitsubishi i kei car platform. Kei cars, in Japan, are a special class that receive government and insurance benefits for being so small. As a result, the C-Zero is tiny and cheap, unlike the Tesla electric cars that are so popular in the US. One way that Citroën cut corners was by omitting infotainment and dash screens, which means there isn’t any way for drivers to see detailed data on their battery status. Pierre Muth wanted that information and so he used an Arduino to add a new battery gauge to his Citroën C-Zero.

        The Citroën C-Zero may not show drivers detailed battery information, but the car’s computer does have that data. As with the car’s various sensor readings, statuses, and commands, that data flows through the CAN (controller area network) bus.However, Citroën (like most automakers) uses a proprietary protocol for their CAN bus and doesn’t publish its specifics. Users can access the CAN bus, but can’t read or inject messages without understanding the protocol. Fortunately for Muth, enthusiasts of the C-Zero/i-MiEV reverse engineered the CAN bus protocol and posted the details online.

      • The DIY Life3D Printed Bluetooth Transmission Line Speaker – The DIY Life

        A couple of weeks ago I was inspired by an old LTT video to try to make my own portable Bluetooth speaker. They used some 2″ full-range Dayton Audio drivers and 1″ tweeters along with an inexpensive Bluetooth amplifier module. They set themselves a goal of beating the $180 price tag that the LG XBOOM Go PL7 carried at the time. They came up with a pretty cool design, it had some quirks but overall performed reasonably well.

      • CNX SoftwareEncroPi – A Raspberry Pi RP2040 USB key to read, encrypt & store data (Crowdfunding) – CNX Software

        SB Components’ EncroPi is a USB key based on the Raspberry Pi RP2040 microcontroller that can be used to log data, encrypt data, or as a secure key, and it also features a DS3231 real-time clock with a backup battery to store the data and time.

      • Raspberry PiUsing e-textiles to deliver equitable computing lessons and broaden participation

        In our current series of research seminars, we are exploring how computing can be connected to other subjects using cross-disciplinary approaches. In July 2022, our speakers were Professor Yasmin Kafai from the University of Pennsylvania and Elaine Griggs, an award-winning teacher from Pembroke High School, Massachusetts, and we heard about their use of e-textiles to engage learners and broaden participation in computing.

  • Free, Libre, and Open Source Software

    • Programming/Development

      • Python

        • Red HatAdd custom windows to GDB: Programming the TUI in Python | Red Hat Developer

          The GNU Debugger (GDB), a popular free and open source tool for C and C++ programmers, offers a Text User Interface (TUI) to split the console into multiple windows and display different content in each window. One window will always be a command window, in which you enter the usual GDB commands, but you might also have a source code window, a register contents window, or a disassembly window. Since GDB 11, you can use a Python API to add new window types. This API can be incredibly useful, allowing you to customize GDB to visualize your application’s data in new ways.

          Note: The Python API for adding TUI windows was actually added to GDB 10. Unfortunately, prior to GDB 11, the gdb.TuiWindow.write call had some bugs that were not resolved until GDB 11.

          In this article, the first in a two-part series, you’ll learn how to create a window and load it with dynamic content. The real power of the TUI will be shown in the second article, which shows how to display useful information from GDB.

        • TecAdminScheduling a Python Script with Crontab – TecAdmin

          Many companies use the Python programming language for data science applications, machine learning models, and other types of analytical tasks. Since Python is often only used for specific projects, many businesses have to integrate it into their workflow programmatically. This means they need a way to automate the process so it runs independently when needed and on a schedule. Fortunately, there are ways to integrate Python with cron jobs to automate execution as frequently as necessary.

          In this article, you will learn how to schedule Python using cron and some useful examples of when and how you might use these practices in your organization.

  • Leftovers

    • HackadayToyota’s Cartridge Helps Make Hydrogen Portable

      Hydrogen has long been touted as the solution to cleaning up road transport. When used in fuel cells, the only emissions from its use are water, and it eliminates the slow recharging problem of battery-electric vehicles. It’s also been put forth as a replacement for everything from natural gas supplies to laptop batteries.

    • Counter PunchDefending the Big Wild: Mike Garrity’s Campaign to Protect the Northern Rockies Ecosystem

      Garrity grew up in Helena, Montana as one of six kids and, as he puts it: “Because I was part of a big family, a cheap form of entertainment for my parents was to take us hiking and backpacking since that was basically free. We ran around in the woods all day up on McDonald Pass where my grandfather had built a cabin and it was heaven for little kids. Spending so much time out in nature was probably the primary influence on my decision to be a dedicated wildlands advocate.”

      Indeed, his father was a plaintiff’s attorney who “represented people against corporations and tried to make the world a better place,” says Garrity, who has followed in those footsteps, not by becoming an attorney, but by having no qualms whatsoever about using the judiciary to hold the federal government land management agencies to the letter and intent of the laws intended to protect the rich natural legacy of the Northern Rockies ecosystems.

    • Counter PunchThanks, Bill

      Boston is now known as the City of Champions because of the success of its professional sports franchises over the last few decades. But when I moved to a Boston neighborhood (Southie) as a kid in the early 60s from suburban Kansas City, it was a pathetic little town of losers. The Bruins had languished at or near last place for a loooong time, albeit there were only the original 6 teams at the time. The Boston Patriots sucked, and had trouble even finding a stadium they could call home, from season, renting out the fields of universities — Harvard, BC, BU, any one of which could have beat the “sissies” in a game, we reckoned — or fucking up the turf in vain at Fenway Park so badly that it resembled the stockyard outside the abattoir in nearby Brighton. You felt for the groundskeeper.

      And the Red Sox, who I would listen to on the radio, could unman you, even as a boy, with their endless string of heartbreaking losses –early, late, and often — that had you wishing that relief pitcher Dick “The Monster” Radatz would just wind up and clock someone with an intimate chin music fastball (a repeated wish that might have led to local hero Tony Conigliaro’s karmic beaning), they were so laughably bad. Back then, many of us were a little bit like Sox star Jimmy Piersall, who pulled a nutty with a bat one season, threatening teammates, and was a real lip-doodler who could have been the straitjacketed mascot of the team, given their performance on the field.

    • HackadayUltimate Bokeh With A Projector Lens

      Bokeh is a photography term that’s a bit difficult to define but is basically soft, aesthetically pleasing background blur, often used to make a subject stand out. Also called “background separation” or “subject isolation”, achieving it optically requires a fast lens with an aperture below 2.8 or preferably lower. These lenses can get very expensive, but in the video after the break [Matt] from [DIY Perks] blows all the commercially available options out of the water. Using an old episcope projector, he built a photography rig with background separation equivalent to that of a non-existent 35mm f0.4 lens.

    • TediumBefore Batgirl: 10 Near-Complete Movies That Never Saw Release

      If you were holding your breath for the release of Batgirl, I hope your brief moment of unconsciousness was divine. Part of a big corporate culture shift on the part of its studio Warner Bros. Discovery (one that has already sidelined cable stars Joe Pera and Samantha Bee), the $90 million film isn’t getting released, despite being nearly finished. (Word on the street, per The Wrap, was that the film wasn’t a tentpole movie.) This, of course, got me to thinking about films that were basically complete but never saw release. The most infamous recent one was the Louis C.K. vehicle I Love You Daddy, which … let’s not talk about it. But over the years, there have been numerous others, each with different reasons for shelving. Today’s Tedium digs into ten.

    • Hardware

      • HackadayHam Radio Hacking: Thinking Inside The Box

        There are two ways to deal with improving ham radio receivers, or — for that matter — any sort of receiver. You can filter and modify the radio frequency including the radio’s intermediate frequency, or you can alter the audio frequency output. Historically, RF and IF techniques have been the most valued because rejecting unwanted noise and signals early allows the rest of the radio to focus on the actual signal of interest. However, audio filters are much easier to work with and until recently, DSPs that could handle RF frequencies were expensive and uncommon. However, [watersstanton] shows us how to make what could be the cheapest audio enhancer ever. It is little more than a modified cardboard box, and you can see and hear the result in the video below.

      • Linux HintRAID 5 vs. RAID 10 Explained

        RAID, or Redundant Array of Independent Drives (or Disks), is a phrase for information storage techniques that partition and copy data over several hard drives. RAID could be built to improve the validity and reliability of data or I/O efficiency, albeit one purpose may damage the other. RAID systems are software-based and hardware-based, and supported by Linux. You may utilize a variety of RAID levels, each with its own set of benefits, shortcomings, and overarching goals. This comparative article will compare RAID 5 (which employs a parity crisscross method for fault-tolerant) and RAID 10 (which also utilizes mirroring for redundant information). Certain RAID levels offer resilience, allowing them to withstand certain device failures. This article demonstrates well how to test software-based RAID systems composed of two or maybe more physical devices. So, let’s get started. Here comes the command we can use in our command-line shell to check the supported RAID configuration in our Ubuntu 20.04 system.

      • HackadayRevive Your Old E-Ink Tablet For Timetable Helper Duty

        In our drawers, there’s gonna be quite a few old devices that we’ve forgotten about, and perhaps we ought to make them work for us instead. [Jonatron] found a Nook Simple Touch in his drawer – with its E-ink screen, wireless connectivity and a workable Android version, this e-reader from 2011 has the guts for always-on display duty. Sadly, the soft touch covering on the back disintegrated into a sticky mess, as soft touch does, the LiIon battery has gone flat, and the software support’s lackluster. Both of these are likely to happen for a lot of tablets, which is why we’re happy [Jonatron] has shared his story about this e-reader’s revival.

    • Health/Nutrition/Agriculture

      • Democracy Now“The Viral Underclass”: Steven Thrasher on Monkeypox, Biden Failures & How Class Impacts Viral Spread

        As New York City declares monkeypox a public health emergency, and California and Illinois have also declared states of emergency over the rapid spread of monkeypox, we speak with LGBTQ+ scholar Steven Thrasher, author of the new book, “The Viral Underclass: The Human Toll When Inequality and Disease Collide,” which explores how social determinants impact the health outcomes of different communities. “This disease is one that in theory can infect anyone, but it has worked its way particularly into communities with men who have sex with men,” says Thrasher. “This does not mean that it’s a ‘gay disease,’ and shouldn’t be stigmatized that way, but we shouldn’t be ashamed to think about who it is affecting and how it is affecting people and to deal with it with a great sense of urgency.”

      • Common DreamsActivists Disrupt Global AIDS Conference to Demand Action on Monkeypox

        Campaigners frustrated by the international response to the rapid spread of monkeypox—in the midst of the ongoing Covid-19 pandemic—on Monday interrupted a global AIDS conference in Montreal.

        “We’re in a worsening outbreak that could have easily been prevented.”

    • Linux Foundation

    • Security

      • Krebs On SecurityNo SOCKS, No Shoes, No Malware Proxy Services!

        With the recent demise of several popular “proxy” services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. Compounding the problem, several remaining malware-based proxy services have chosen to block new registrations to avoid swamping their networks with a sudden influx of customers.

      • VideoThe Biggest Linux Security Mistakes – Invidious

        Security is a journey, not a destination So after making a couple videos showing how to increase performance in desktop computers running Linux, I was overwhelmed by the sheer scale of comments worried about mitigations.

      • LWNSecurity updates for Wednesday [LWN.net]

        Security updates have been issued by CentOS (389-ds-base, firefox, java-1.8.0-openjdk, java-11-openjdk, kernel, postgresql, python, python-twisted-web, python-virtualenv, squid, thunderbird, and xz), Fedora (ceph, firefox, java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-latest-openjdk, and kubernetes), Oracle (firefox, go-toolset and golang, libvirt libvirt-python, openssl, pcre2, qemu, and thunderbird), SUSE (connman, drbd, kernel, python-jupyterlab, samba, and seamonkey), and Ubuntu (linux-oem-5.14, linux-oem-5.17 and ntfs-3g).

      • Securing Containers With Zero-Trust Tools – Container Journal

        As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run.

        The security of the base image is critical to ensure that any derived images are trustworthy. Building security into a container pipeline involves starting with trusted images, managing access with a private registry, integrating security tests to automate deployments and continuously securing the infrastructure.

    • Defence/Aggression

      • Common Dreams‘Playing With Fire,’ Says China After Pelosi Lands in Taiwan

        Chinese warplanes took to the skies and U.S. warships were on the move Tuesday as U.S. House Speaker Nancy Pelosi ignored warnings from Beijing, the Biden administration, and peace activists by becoming the highest-ranking American official in 25 years to visit Taiwan.

        “Are you here to support Taiwan or to provoke a war? What the hell are you doing here, Pelosi?”

      • Common DreamsWeeks After Biden Fist-Bumps Saudi Prince, US OKs $5 Billion in Gulf Arms Deals

        Peace campaigners on Tuesday decried the Biden administration’s approval of more than $5 billion in missile sales to Saudi Arabia and the United Arab Emirates, a move that came weeks after U.S. President Joe Biden visited the leaders of both countries despite pleas from human rights defenders.

        The U.S. Department of Defense said the U.S. State Department approved the $3.05 billion sale of 300 Raytheon Patriot MIM-104E missiles to Saudi Arabia, as well as 96 Lockheed Martin Terminal High Altitude Area Defense (THAAD) missiles worth $2.25 billion for the UAE.

      • TruthOutConflict Over Vet Bill Brings Renewed Attention to Military’s Toxic Legacies
      • Counter PunchUS-Saudi Relationship: Beyond the Obvious

        Indeed, it should be a clear tenet of political analysis

        that stated goals are frequently not actual goals. US war planners used rhetorical concerns over non-existent Iraq WMDs as a pretext for invasion. Alleged human rights preoccupations were falsely heralded as the rationale for NATO bombings in Yugoslavia, Afghanistan and Libya.

      • Democracy NowThe Assassination of Ayman al-Zawahiri: CIA Drone Kills al-Qaeda Leader at Safe House in Kabul

        President Biden claimed Monday a CIA drone strike killed al-Qaeda leader Ayman al-Zawahiri in Kabul, Afghanistan. Trained as a surgeon in Egypt, where he was born into a prominent family, al-Zawahiri was a key figure in the jihadist movement since the 1980s. The U.S. has long accused al-Zawahiri of being a key 9/11 plotter along with Osama bin Laden, who was killed in a U.S. raid in Pakistan in 2011. The Taliban has since criticized the attack, saying the drone strike was a “violation of international principles.” For more, we’re joined by Afghan journalist Bilal Sarwary and national security expert Karen Greenberg, who say the Taliban’s apparent sheltering of al-Zawahiri in a prominent Kabul neighborhood was shocking. “This is a strike inside the heart of Kabul in an area that is very, very well known to the CIA and other Western intelligence agencies,” says Sarwary, whose sources report at least 12 Arab nationals were killed in the strike despite Biden announcing there were no civilian casualties.

      • Common DreamsOpinion | The Killing of al-Qaeda Chief Ayman al Zawahiri Will Not Make Us Safer

        President Joe Biden, to his credit, did not come out swaggering at his press conference announcing that the CIA had just killed al-Qaeda chief Ayman al Zawahiri. But he did make the dubious assertation that the assassination somehow “made us all safer.”

      • Counter PunchThe People in Hiroshima Didn’t Expect it Either

        Yet, the U.S. just illegally put nukes into a 6th nation (and virtually nobody in the U.S. can name either it or the other five that the U.S. already illegally had nukes in), while Russia is talking about putting nukes into another nation too, and the two governments with most of the nukes increasingly talk — publicly and privately — about nuclear war. The scientists who keep the doomsday clock think the risk is greater than ever. There’s a general consensus that shipping weapons to Ukraine at the risk of nuclear war is worth it — whatever “it” may be. And, at least within the head of U.S. Speaker of the House Nancy Pelosi, voices are unanimous that a trip to Taiwan is worth it too.

        Trump tore up the Iran agreement, and Biden has done everything possible to keep it that way. When Trump proposed talking with North Korea, the U.S. media went insane. But it’s the administration that hit the height of inflation-adjusted military spending, set the record for number of nations simultaneously bombed, and invented robot-plane warfare (that of Barack Obama) for which one must painfully now long, as he did the ridiculous-but-better-than-war Iran deal, refused to arm Ukraine, and didn’t have time to get a war going with China. The arming of Ukraine by Trump and Biden has done more for the chances of vaporizing you than anything else, and anything short of all-out bellicosity by Biden has been greeted with blood-thirsty howls by your friendly corporate U.S. news outlets.

      • Counter PunchThe Conflict in Ukraine and American Exceptionalism

        Why am I not really surprised at these phenomena? First and foremost because the mainstream media has done a great job of presenting NATO’S side in this war to the public. There are virtually no sources reporting any side but NATO’S side in the mainstream US media. Even on social media, any reports that leak through presenting another view are tagged as being controlled by the Russian government. This tagging would be bearable if the same thing occurred anytime a western news story showed up in the feed, but it doesn’t. Even antiwar pieces in alternative media that oppose all the governments participating in this war are attacked. This one is certain to suffer that fate.

        Then there’s the Russophobia of the west. This antagonism towards Russia goes back centuries and is informed by an assumption in certain western European circles that the Slavic peoples east of the steppes are inferior to the “true” European. Vladimir Putin’s version of Russian nationalism has apparently revived these prejudices, at least to a point where enough of the west’s population can be convinced that anything Russia says or does cannot be trusted. While I have never been a fan of President Putin, the absurd caricatures of him and his government are reminiscent of the hate filled and hysterical representations of the German people during World Wars One and Two. As anyone who has understands how wartime propaganda works knows , the impetus behind these mischaracterizations is to render the enemy to subhuman status. The fact that this indoctrination has occurred so easily says something about the ignorance and lack of curiosity of the US public.

      • Counter PunchOligarchs, Unite Now!

        Then terrorism became the fixation, the magic slate that allows everything else to be erased. In the first hour after the 9/11 attacks, British civil servants received a message from a special advisor to transport secretary Stephen Byers telling them, ‘It’s now a very good day to get out anything we want to bury.’ They could just use what would soon become known as the ‘war on terror’ to obscure any bad news, even if it had nothing to do with Osama bin Laden. Today the Russian government blames everything on Western ‘plots’; in the West it’s always ‘Moscow’s fault’.

        It’s the same with the falling standard of living. President Joe Biden constantly attributes soaring inflation in the US to ‘Putin’s tax on both food and gas’. Emmanuel Macron claims his poorest compatriots’ problems are due to the ‘war economy’. But if that’s true, France must have been at war for the last 40 years, because the indexation of wages to prices ended in 1982, when François Mitterrand and his finance minister Jacques Delors gave business owners their biggest ever gift in the form of letting prices (and profits) overtake average income; there was no such gift for their employees, whose purchasing power was permanently slashed.

      • Common DreamsYemen Truce Extension Applauded Amid Demands That US End Support for Saudi-Led War

        Anti-war campaigners on Tuesday applauded news that the United Nations-brokered truce in Yemen had been extended for another two months and called on U.S. lawmakers to help ensure more permanent peace by passing the Yemen War Powers Resolution.

        Both the Saudi-led military coalition, which receives backing from the U.S. government, and the Houthis have been accused of violating the four-month ceasefire, but anti-war groups and civilians report that access to fuel and freedom of movement since the United Nations brokered the truce in April have helped people return to some semblance of normalcy, as reports of civilian casualties have dropped.

      • TechdirtFifth Circuit: This Badge Wearing Serial Sexual Assaulter Is Beyond Even Our Expansive Definition Of Qualified Immunity

        Yikes.

      • Common DreamsOpinion | Three Tons of Fascism: Angry White Guys in Big-Ass Pickups

        In the United States during 16 months in 2020 and 2021, vehicles rammed into groups of protesters at least 139 times, according to a Boston Globe analysis. Three victims died and at least 100 were injured. Consider that a new level of all-American barbarity, thanks to the growing toxicity of right-wing politics, empowered by its embrace of ever-larger, more menacing vehicles being cranked out by the auto industry.

      • TruthOutTrump-Appointed DHS Watchdog Covered Up Secret Service Text Deletion, Dems Say
      • Common DreamsOpinion | The ‘Missing Text Messages’ Timeline: Incompetence, Obstruction, or Worse?

        Behind the story of missing text messages from the U.S. Secret Service and its parent agency, the Department of Homeland Security, is a bigger scandal: Former President Donald Trump placed his loyalists in key executive branch positions for a reason. Many are still there.

      • WiredDrone Contraband Deliveries Are Rampant at US Prisons | WIRED UK

        On August 26, 2019, at 1:30 am in rural Georgia, two men stopped a car 100 yards away from Telfair State Prison, a closed-custody facility that backs into a forest of cypresses and oaks. Inside a duffel bag, the men had a 1.9-pound Storm Drone 4, a Radio Link UAS controller, a Spektrum video monitor with DVR headset, 75 grams of loose tobacco, four rounds of loose ammunition, and 14 cell phones.

        Their plan, plotted out for over a month, was simple: To fly the drone over the prison’s walls, where it would drop the payload and soar off, undetected, into the night. But when they switched off the car lights, they caught the attention of deputies from the Telfair County Sheriff’s office stationed nearby.

        One of the deputies approached the vehicle to question the driver, who told him he was with two other men. Later identified as Nicolas Lo and Cheikh Hassane Toure, the men, who had fled to the woods, were taken into custody, and later indicted in the US District Court on grand jury charges for a plot to smuggle contraband into the prison. They were sentenced to 12 months in federal prison after pleading guilty to their roles in the scheme.

    • Environment

      • Energy

        • Common Dreams‘Come On, Kyrsten’: Koch Network Pleads With Sinema to Tank Senate Deal

          The Koch network, headed by billionaire oil and gas tycoon Charles Koch, is mobilizing its vast resources in an effort to convince holdout Sen. Kyrsten Sinema to tank the Democratic Party’s new reconciliation package ahead of a possible vote this week.

          Since the deal was announced last week, Sinema (D-Ariz.)—a frequent obstructionist of her own party’s agenda—has been completely silent about the bill, a hodgepodge of renewable energy investments, tax provisions, oil and gas industry giveaways, drug price reforms, and other measures. The bill was negotiated principally by Sen. Joe Manchin (D-W.Va.), another right-wing Democrat.

        • Common DreamsGiant Earth and Half a Million Signatures Demand Biden Declare ‘Climate Emergency’

          As fires and floods wreak havoc across the United States—from California to Kentucky—activists armed with a 16-foot inflatable globe and nearly half a million petition signatures gathered outside the White House on Tuesday to yet again demand that President Joe Biden declare a climate emergency.

          “Biden can take sweeping action to protect our climate and curb fossil fuels where Congress is failing to do so.”

    • Finance

      • Pro PublicaWhat Is a Private Equity Firm? [Ed: Pro Publica moaning about financial raiders while pocketing bribes from Famous Criminal Bill Gates (and of course never naming his crimes)]

        Private equity is seemingly inescapable. From housing to hospitals and fisheries to fast food, equity investors have acquired a host of businesses in recent decades. Private equity firms control more than $6 trillion in assets in the U.S. But what makes them different from any other type of investor putting their money into a business?

        Private equity investors — typified by firms like Bain Capital, Apollo Global Management, TPG, KKR and Blackstone — are different from venture capitalists, who provide a cash infusion to small startups and hope they blossom into the next Facebook. Nor are they stock traders making split-second decisions to buy or sell shares in public companies. Rather, private equity funds aim to take control of a business for a relatively short time, restructure it and resell the company at a profit.

      • TruthOutReport: Lobbyists Raked in Record $2 Billion in First 6 Months of 2022
      • Counter PunchGlobalization, Greed and Reality
      • Project CensoredElite Lapdogs Always Welcome in the Corporate Media – Censored Notebook, Dispatches from Project Censored: On Media and Politics

        The return of Chris Cuomo to television is the latest reminder that there is little accountability to speak of in corporate news media. Chris was ousted at CNN in late 2021 amidst an ethics investigation that claimed he utilized his position at the cable news juggernaut to consult his brother, then governor of New York, Andrew Cuomo. At the time, the governor was facing a series of sexual misconduct allegations. Chris was using his professional connections to identify what reporters knew about the allegations, and then using that information to consult Andrew on how to respond, all while hosting Andrew on his daily CNN program. In July 2022, Cuomo returned to television to promote his podcast The Chris Cuomo Project. Cuomo appeared on Dan Abrams show on NewsNation (where Cuomo recently secured a position and I have served as an expert guest) and Real Time with Bill Maher.

      • Common Dreams‘This Cannot Wait’: Groups Warn Democrats Not to Let Stock Trading Ban Die

        A coalition of watchdog organizations on Tuesday urged Democratic congressional leaders to “expeditiously” bring a ban on lawmaker stock trading up for a vote, warning that a proposal with broad support from the U.S. public is at growing risk of dying as the Senate prepares for August recess and the midterms loom.

        “We fear that without your strong leadership and advocacy, this critical good government reform will stall,” reads a letter that 22 groups, including Citizens for Responsibility and Ethics in Washington and Public Citizen, sent to Senate Majority Leader Chuck Schumer and House Speaker Nancy Pelosi (D-Calif) on Tuesday.

      • TruthOut22 Government Watchdogs Ask Pelosi and Schumer to Act on Congressional Stock Ban
      • TechdirtAT&T Gets Yet Another Pathetic Wrist Slap After Making Millions From Shitty Fees

        At some point U.S. regulators effectively declared that it was okay to rip off consumers with a dizzying array of bogus fees, letting companies falsely advertise one rate, then sock you with a bunch of additional surcharges when the bill comes due. That’s particularly true of the cable and broadband industry, which has saddled consumers with billions in fees for decades, with little real penalty.

    • AstroTurf/Lobbying/Politics

      • MeduzaThe Metropolitan’s projects Initiatives linked to ‘Putin’s confessor’ received $332 million from Russia’s government and state-owned companies — Meduza

        Initiatives linked to Metropolitan Tikhon (Shevkunov), a Russian Orthodox bishop said to be Vladimir Putin’s personal confessor, have received more than 20 billion rubles ($332 million) from the Russian government and state-owned companies, according to a new report by the investigative outlet iStories. 

      • Counter PunchCan Democrats Craft a Winning Message Off a Smorgasbord of Misogynist Madness?

        As shocking, as wildly insulting as that pussy-grabber winning the presidency was to American women and girls, it was just the beginning of what appears to be a long season of sadism.

        Who Let the Dogs Out?

      • Counter PunchBarbarians at the Gates

        However, the election of Donald Trump, a corrupt businessman, to the presidency in November 2016 brought to a head decades-long boiling undemocratic forces in America. January 6, 2021 was a dark day during which Trump launched an unsuccessful coup.

        Like an experienced tyrant, Trump invited his followers from all over America to Washington. He was determined to keep his power. He told his followers to go to the Capitol in order to prevent Vice President Mike Pence and the Senate from certifying the popular victory of Joe Biden to be the next president of the United States. He kept telling the angry mob that the Democrats had stolen the election.

      • Counter PunchSri Lanka’s Political and Economic Crisis

        Since April there have been protests against extensive shortages of food and fuel, as well as a profound crisis of trust in Sri Lanka’s political institutions, primarily parliament and the presidency (both have faced repeated charges of corruption and nepotism for decades, a situation unable to be surmounted by a cowed judicial system).

        The heart of the anti-government movement, at this point, was a demand for the resignation of the strongman president Gotabaya Rajapaksa, a member of a successional political family.

      • Common DreamsAlarm Raised Over Manchin Side Deal That Would Pave Way for Major ‘Climate Bomb’

        Environmentalists raised grave concerns Monday over newly reported details of a side deal between the Democratic leadership and Sen. Joe Manchin that would reform the permitting process for energy projects and clear the way for final approval of the Mountain Valley Pipeline, which would carry fracked gas through West Virginia.

        The agreement was reached as part of an effort to secure Manchin’s support for the Inflation Reduction Act, a proposed budget reconciliation bill that includes renewable energy investments, drug price reforms, and a number of giveaways to the fossil fuel industry. Because its provisions fall outside the bounds of reconciliation, the side deal must be passed as separate legislation.

      • TruthOutDems’ Deal With Manchin Would Expedite Approval of Climate-Harming Gas Pipeline
      • Common DreamsOpinion | Inside the Democrats’ Climate Deal That Includes Dirty Fossil Fuel Production

        Last week, Joe Manchin, the West Virginia senator whose decisive vote in the evenly split upper house has led some to brand him ‘President Manchin’, and Senate Majority leader Chuck Schumer surprised even the most clued-in political junkies by announcing support for a climate bill that had been declared dead just several weeks before.

      • Common DreamsOpinion | How the Radical ‘Independent State Legislature Theory’ Could Destroy US Democracy

        The follow­ing is adap­ted from oral testi­mony given Thursday before the United States House Commit­tee on Admin­is­tra­tion.

    • Censorship/Free Speech

      • Meduza‘Compassion, tolerance, and love for others’ What the Kremlin’s latest propaganda guides tell pro-government media outlets to say about the war — Meduza

        In July, the Putin administration distributed two new messaging guides to Russia’s pro-government media outlets and politicians. Both documents give detailed instructions for how to create parallels between Russia’s current war in Ukraine and well-known historical events in the public imagination. The first one focuses on the 988 “baptism of Rus,” when Kyivan Rus ruler Volodymyr the Great is said to have baptized the people of Kyiv after converting to Orthodox Christianity himself. The second is about the 1240 Battle of the Neva, when Prince Alexander of Novgorod is believed to have defeated Swedish invaders on the banks of the Neva River. The guides instruct the media to use these events to portray Russia’s current invasion of Ukraine as a preemptive war launched to protect Russia from a godless, resource-hungry West, as well as from Ukrainian Satanists who make ritual human sacrifices. These arguments have already begun appearing in state media — sometimes verbatim. Meduza has summarized their contents.

      • PIAHow to Block Websites on iPhone (& Any Device)

        Whether you’re trying to block websites to protect children from seeing inappropriate videos or minimize distractions, we’ve got you covered. With our simple guide, you’ll learn how to quickly create blocklists on iPhone, Android, Windows, Mac, as well as on various browsers, and routers. 

      • TechdirtUK’s Likely Next Prime Minister Wants A Pony: A Magic Internet Where No One Ever Says Any Bad Things

        Is it too much to ask that politicians try to live in reality? The obsession over the past few years that anything bad that people say on the internet is the fault of the internet (rather than the people using it) and must be outlawed is already problematic enough. But the politicians and their “solutions” are reaching ever more ridiculous heights.

    • Freedom of Information / Freedom of the Press

      • ShadowproofShadowproof’s Seventh Birthday: Looking Back On Another Year

        Shadowproof was launched seven years ago. With many crises facing our world, we are proud to still be publishing independent journalism.

        Since our last birthday, Shadowproof has published several articles from freelance journalists at our website and as part of The Dissenter, our newsletter focused on whistleblower stories and WikiLeaks founder Julian Assange’s case.

    • Civil Rights/Policing

      • TruthOutRepublican State Legislators Have an Ominous Plan to Rewrite the US Constitution
      • Democracy NowNo Means Yes to Abortion: Kansas Votes on Confusing GOP-Backed Constitutional Amdt. to Ban Abortion

        We go to Kansas, where voters today are deciding whether to pass a constitutional amendment that would override a 2019 state Supreme Court ruling establishing a constitutional right to terminate a pregnancy. If the amendment passes, it will clear the way for Republican state lawmakers to ban the procedure, which they have vowed to do. Kansas is the first state in the country to vote on the right to abortion and one of the last states in the region to still allow abortion, with clinics there having reported an influx of patients from neighboring states, including Arkansas, Missouri, Oklahoma and Texas, after the Supreme Court reversal of Roe v. Wade. Republicans are “strategically using tactics of voter suppression” to ensure the amendment passes by requiring strict registration guidelines and drafting “incredibly confusing” language in the amendment, says reproductive health reporter Amy Littlefield. Despite this, she says the abortion rights community feels “cautiously optimistic” that the enormous grassroots mobiliziation in response to the overruling of Roe “might just be enough” to strike down the amendment.

      • Common DreamsAnti-Choice Forces Push Disinformation as Kansas Votes on Abortion Rights

        After Kansas residents across the state received a misleading, anonymous message in recent days regarding an abortion rights referendum, pro-choice advocates doubled down on their calls for people to vote “no” Tuesday on a proposed constitutional amendment that would clear the way for an abortion ban in the state.

        An unknown group sent text messages warning voters, “Women in Kansas are losing their choice on reproductive rights.”

      • Counter PunchWhy the Great Migration Did Little to Bridge the Racial Divide
      • Common DreamsRebuffing GOP Attack, Pennsylvania Supreme Court Upholds Universal Mail-In Voting

        The Pennsylvania Supreme Court on Tuesday upheld a law that allows all of the state’s registered voters to submit their ballots by mail, rebuffing an effort by Republican lawmakers to overturn a statute they supported years earlier.

        In its ruling, the court’s majority declared that “we find no restriction in our constitution on the General Assembly’s ability to create universal mail-in voting.” The court’s two Republican justices, Sallie Updyke Mundy and Kevin Brobson, dissented.

      • TruthOutMichigan Judge Temporarily Blocks 91-Year-Old Anti-Abortion Law
      • TruthOutApproval of Supreme Court Among Democrats Has Hit Rock Bottom at 13 Percent
      • Common DreamsKentucky ‘Now a Forced-Birth State’ After Judge Reinstates Abortion Bans

        Reproductive freedom advocates across Kentucky and beyond vowed to keep fighting after a judge on Monday night allowed the GOP state attorney general to enforce a trigger law and six-week abortion ban.

        “It is irresponsible and dangerous to prevent people from accessing the care they need.”

      • TruthOutKansas Voters Receive Misleading Texts Prior to Vote on Abortion Amendment
      • Common DreamsOpinion | Welcome to the New Era of Rightwing Judicial Supremacy

        In Federalist No. 78, Alexander Hamilton famously predicted that the judicial branch of government would “always be the least dangerous to the political rights of the Constitution; because it will be least in a capacity to annoy or injure them.” In retrospect, Hamilton could not have been more wrong.

      • Common DreamsOpinion | How Big Tech Is Undermining Abortion Rights

        The Supreme Court’s attack on long-standing privacy rights via the Dobbs decision that overturned Roe v Wade comes at the same moment corporate lobby groups are pushing to restrict data privacy protections through a slate of new international trade agreements. If Big Tech gets their way in these pacts, many who seek and provide abortion services will be at increased risk of surveillance and criminal prosecution.

      • Pro PublicaPublic Defenders and Defense Attorneys: Help ProPublica Report on Criminal Justice

        ProPublica’s journalism is propelled by the people who share their observations, advice, expertise and inside knowledge with us. Public defenders and defense attorneys have long been important to our work.

        As our staff grows, we are experimenting with better ways to stay in touch. This is one of them: If you are a current or former public defender or criminal defense attorney, we invite you to add your name to our list of volunteer sources. We may contact you with questions about your expertise and the intricacies of the criminal justice system. We will also share occasional updates about stories in the works.

      • Pro PublicaA Right-Wing Think Tank Claimed to Be a Church. Now, Members of Congress Want to Investigate.

        Forty members of Congress on Monday asked the IRS and the Treasury to investigate what the lawmakers termed an “alarming pattern” of right-wing advocacy groups registering with the tax agency as churches, a move that allows the organizations to shield themselves from some financial reporting requirements and makes it easier to avoid audits.

        Reps. Jared Huffman, D-Calif., and Suzan DelBene, D-Wash., raised transparency concerns in a letter to the heads of both agencies following a ProPublica story about the Family Research Council, a right-wing Christian think tank based in Washington, D.C., getting reclassified as a church. Thirty-eight other lawmakers, including Reps. Adam Schiff, D-Calif., Debbie Wasserman Schultz, D-Fla., Rashida Tlaib, D-Mich., and Jamie Raskin, D-Md., signed onto the letter.

    • Internet Policy/Net Neutrality

      • TechdirtIs the California Legislature Addicted to Performative Election-Year Stunts That Threaten the Internet?

        It’s an election year, and like clockwork, legislators around the country want to show they care about protecting kids online. This pre-election frenzy leads performative bills that won’t actually help any kids. Today I’m blogging about one of those bills, California AB 2408, “Social media platform: child users: addiction.” (For more on how the California legislature is working to eliminate the Internet, see my posts on the pending bills AB587 and AB2273).

    • Monopolies

      • TechdirtWithout The Votes To Pass, Antitrust Bill Gets Delayed

        For the last few months we’ve been writing a lot about AICOA, the American Innovation and Choice Online Act, being pushed for by Senator Amy Klobuchar. It’s an antitrust bill, but not an antitrust bill designed to fix the whole host of problems we have today with industrial consolidation and anticompetitive practices. No, it’s just a bill to target a few specific practices of a narrow slice of the tech industry. And, it only has bipartisan support (barely) for one reason, and one reason only: because Republicans believe that the vaguely worded law will be a tool they can use to batter companies for content moderation decisions they disagree with. This isn’t some conspiracy theory. This is literally what the Republicans themselves are saying. Out loud. Over and over again.

      • Copyrights

        • Torrent FreakMajor Record Labels and ISP Settle Piracy Lawsuit One Day Before Trial

          Internet provider Bright House has resolved its legal dispute with several RIAA-backed record labels. The ISP stood accused of turning a blind eye to pirating subscribers and faced millions of dollars in potential damages. The parties reached an agreement at the last minute as the trial was scheduled to start tomorrow.

        • Torrent FreakWhy Nintendo Uses the DMCA to Take Down Piracy-Enabling SigPatches

          To reduce piracy on the Switch console, last week Nintendo used a DMCA notice to target a popular ‘sigpatch’ repository on Github. While the coding platform ultimately took the repo down, it appears there was a difference of opinion over what type of infringement they represent. So what are ‘sigpatches’, why do they even need to exist, and why might they breach copyright law?

  • Gemini* and Gopher

    • Technical

      • Science

        • Counter PunchThe Hollow Promise of Small Modular Nuclear Reactors

          In 2006, Elizabeth Holmes, founder of a Silicon Valley startup company called Theranos, was featured in Inc magazine’s annual list of 30 under 30 entrepreneurs. Her entrepreneurship involved blood, or more precisely, testing blood. Instead of the usual vials of blood, Holmes claimed to be able to obtain precise results about the health of patients using a very small sample of blood drawn from just a pinprick.

          The promise was enticing and Holmes had a great run for a decade. She was supported by a bevy of celebrities and powerful individuals, including former U.S. secretaries of state Henry Kissinger and George Shultz, James Mattis, who later served as U.S. secretary of defense, and media mogul Rupert Murdoch. Not that any of them would be expected to know much about medical science or blood testing. But all that public endorsement helped. As did savvy marketing by Holmes. Theranos raised over $700 million from investors, and receive a market valuation of nearly $9 billion by 2014.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

One Can Speculate Why Windows-Friendly OEMs Start Enforcing Windows-Only Boot on Laptops (Microsoft Blocking BSD and GNU/Linux With UEFI)

Posted in GNU/Linux, Microsoft, Windows at 8:00 am by Dr. Roy Schestowitz

“Operating System Market”, aside from Android (which dominates internationally and uses Linux)

Finland 2022 share in Operating Systems
Homeland of Linus Torvalds (from Helsinki), sharing a border with a very hostile neighbour that engages in cyberattacks. The above graph is missing the latter days of August (no legend, either, but it’s relative share in %). An associate squeezed in “an observation that these behaviors are not new, and they are not only decades old, but that they have not abated over the decades and [Microsoft] only resort to marketing spin to obscure their anti-competitive behaviors” (while looking to hire the saboteurs).

Summary: As Windows is spyware that surveys/surveils every single user of Windows, Microsoft knows best what’s going on and judging by this month’s numbers one can guess why they resort to overt antitrust violations with UEFI ‘killswitch’ while GNOME/IBM helps them (for money and favours)

Links 03/08/2022: SteamOS 3.3, GNU/Linux Hits New Highs in Steam

Posted in News Roundup at 7:17 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • VideoLinux Mint 21 XFCE Run Through – Invidious

        In this video, we are looking at Linux Mint 21, the XFCE edition

      • Linux Made SimpleLinux Mint 21 XFCE

        Today we are looking at Linux Mint 21, XFCE edition. It is based on Ubuntu 22.04, Linux Kernel 5.15, XFCE 4.16, and uses about 1GB of ram when idling. Enjoy!

    • Kernel Space

    • Applications

      • Linux LinksBest Free and Open Source Alternatives to Apple Calendar


        Apple Calendar (previously known as iCal) is a personal calendar app supporting multiple accounts, colour code work, family and personal events, event support, as well as calendar invitations.

        Calendar is free but proprietary software and it’s not available for Linux. We recommend the best free and open source alternatives.

    • Instructionals/Technical

      • ByteXDHow To Make a GET Request With cURL

        curl is one of the most useful command line utilities known to Linux users. curl is a free and open source tool that allow the transfer of data between a client and a server under the support of multiple protocols (HTTP, FTP, SMTP, POP…), in addition of making various types of requests.

        This tool is great for testing API functionalities, downloading files, checking response headers and making HTTP requests. Though many developers are leaning towards other programs such as postman to test APIs, but curl still a strong option in this domain.

        One of the most simple form of used HTTP request among developers, is the HTTP GET method with curl.

        In this article we will keep things fairly simple and cover only the GET method using the curl command tool.

      • TecMintHow to Install LMDE 5 “Elsie” Cinnamon Edition

        Linux Mint is one of the fastest-growing desktop Linux distributions today. Linux Mint is an Ubuntu-based distribution that aims to be a home user-friendly distribution that has a sleek, clean look as well as provides as much hardware compatibility as possible. All of this is paired with a development team that constantly tries to keep the distribution moving in a forward fashion.

        While Linux Mint‘s main releases (LM Cinnamon, LM Mate, and LM Xfce) are based on Ubuntu, there is a lesser-known variant that has been making great strides over the last couple of years. Of course, Linux Mint Debian Edition is the variant and the subject of this tutorial.

      • OpenSource.comA sysadmin’s guide to network interface configuration files | Opensource.com

        In the first article of this series, Get started with NetworkManager on Linux, I looked at what NetworkManager does and some of the tools it provides for viewing network connections and devices. I discussed using the nmcli command to view the status of network devices and connections on a host. I also mentioned that NetworkManager does not need interface configuration files for most hosts. However, it can create its own INI-style connection configuration files, and it recognizes the older and now deprecated network interface configuration files.

      • Trend OceansHow to Remove White Space from the File Name in Linux – TREND OCEANS

        When you look at your system directory structure, you’ll find that many files are stored in several ways, such as “somefilename.txt”, “some_file_name.txt”, “some-file-name.txt”, or “some file name.txt”.

        You’re probably wondering, “What’s wrong with this filename?” I don’t see a problem with it. Yes, you will not find any problems until you try to access the file from the terminal, or else some of the applications will not accept the file if it has a whitespace between filenames.

        On the other hand, operating systems like Windows and macOS allow you to access files that contain whitespace between filenames, but this is not the case with Linux.

      • TecMintHow to Fix Error: Failed to Download Metadata for Repo ‘AppStream’

        If you, for one reason or the other, are still actively using CentOS 8, you might probably have encountered the following error when trying to update your system or simply install a package.

        “Error: Failed to download metadata for repo ‘appstream’: Cannot prepare internal mirrorlist: No URLs in mirrorlist”

      • TecMintInstallation of Linux Mint 21 [Cinnamon Edition] Desktop

        Linux Mint is a modern, polished, easy-to-use, and comfortable community-driven GNU/Linux desktop distribution based on the popular Ubuntu Linux distribution. It is a great and recommended distribution for computer users switching from Windows or Mac OS X operating system to the Linux platform.

        Linux Mint 21 code-named “Vanessa” is the latest version of the popular Linux Mint desktop operating system that is available in three versions, namely Cinnamon, Xfce, and MATE. It is an LTS (Long Term Support) release that is built atop Ubuntu 22.04 and will be supported until 2027.

      • UNIX CopHow to install Java 18 on Rocky Linux 9 / AlmaLinux 9

        In this post, you will learn how to install Java 18 on Rocky Linux 9 / AlmaLinux 9. At the time of writing this post, we are in the presence of the latest stable version of Java.

        We all know that Java is a very popular programming language and a mainstay of today’s technology. This language is used for many things, from desktop applications to applications like Jenkins that are used to deploy other applications. In other words, Java is essential and for many it is the gateway to programming.

        This post is simple to do, but it can help developers to get a recent version of Java without too many problems.

        Another thing to keep in mind is that you need to have access to the root user, or the sudo command. So let’s get started.

      • Setting up a single-board desktop replacement with Consfigurator

        The ThinkPad x220 that I had been using as an ssh terminal at home finally developed one too many hardware problems a few weeks ago, and so I ordered a Raspberry Pi 4b to replace it. Debian builds minimal SD card images for these machines already, but I wanted to use the usual ext4-on-LVM-on-LUKS setup for GNU/Linux workstations. So I used Consfigurator to build a custom image.

      • Linux Made SimpleHow to install Mixcraft 9 on a Chromebook with Crossover

        Today we are looking at how to install Mixcraft 9 on a Chromebook with Crossover. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Part 2: How to automate graphics production with Inkscape – Máirín Duffy

        A couple weeks ago I recorded a 15-minute tutorial with supporting materials on how to automate graphics production in Inkscape by building a base template and automatically replacing various text strings in the file from an CSV using the Next Generator Inkscape extension from Maren Hachmann.

        Based on popular demand from that tutorial, I have created a more advanced tutorial that expands upon the last one, demonstrating how to automate image replacement and changing colors via the same method. (Which, oddly, also turned out to be roughly 15-minutes long!)

      • Raise the bar with an SBAR :: 🤠 Major Hayden

        You discovered a problem at work. If left unchecked, the problem could affect customers and impact revenue. You cannot ignore it.

        What now? Who do you tell? Will they listen? Better yet, will they understand?

        I find myself in situations like these constantly. My roles over the years involved problems that demanded discussion, thought, and solutions. Some problems were simple but others required complicated fixes that took months or years.

        Communicating with other people about complex problems remains a challenge for me, but I learned a new tool that helps me kick off these discussions and share my recommended solutions as efficiently as possible. The SBAR technique shows up frequently in medical settings but it also works well in IT.

        This post covers the nuts and bolts of the SBAR format, how to use it to your advantage, and how to communicate clearly with it.

      • ID RootHow To Install LibreWolf Browser on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install LibreWolf Browser on Linux Mint 21. For those of you who didn’t know, LibreWolf provides a more privacy-conscious alternative to Firefox that still offers a good user experience. It is the community-run successor to LibreFox and is a popular web browser in the web browsers category.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a LibreWolf web browser on Linux Mint 21 (Vanessa).

      • Barry KaulerInstall to hard drive tutorial rewritten

        So much “water under the bridge” since this tutorial was originally written, in March 2019. It has been “patched” a few times, but has become increasingly wrong, so have completely rewritten it…

    • WINE or Emulation

    • Games

    • Desktop Environments/WMs

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

  • Leftovers

    • The NationMarlen Haushofer’s Bucolic Apocalypse

      The disaster that gives Marlen Haushofer’s The Wall (1963) its name arrives with minimal fanfare in the opening pages of the novel. The unnamed narrator, who is staying in a hunting lodge in the mountains with her cousin Luise and her cousin’s husband, Hugo, remains at home while her companions head down to the nearby village for dinner. They do not return, and the next day the narrator discovers that she has been cut off from the rest of the world by an insuperable barrier. Looking through the invisible wall (“a smooth, cool resistance where there could be nothing but air”), she can see that something incredible has happened to the world below the mountain; in the little farmhouse downstream, an old man is now fixed like a statue in an eternal action, one hand cupped to bring water to his mouth. The stream beneath him is still flowing, but the man is motionless. It is as if everything living has been frozen in time. On her second trip to the wall, the narrator spots two stationary cows: “Their pink nostrils were no longer damp and smooth, and looked like prettily painted fine-grained stone.” Later, dead birds are blown into sight by a great storm: “They looked pretty, like painted toys. Their eyes shone like polished stone and the colors of their plumage hadn’t faded.”

    • Internet Freedom FoundationTelangana’s Agriculture data management policy: The good, bad, and ugly.

      The Agriculture & Cooperation (A&C) Department, Government of Telangana issued the Draft Agricultural Data Management Policy, 2022 (“Draft Policy”). Issued in July 2022, the draft policy is set to be taken into consideration after August 06, 2022. The Telangana Government, through this draft policy, aims to streamline and codify the processes, responsibilities, norms, and practices relating to the management of agricultural data for the overall benefit of all the stakeholders, principally the farmers. On the bright side, it includes several provisions that establish strengthened user consent, internationally recognised principles of purpose limitation as well as data minimisation. However, the grass is not so green on the other side. Inter alia, ambiguous phrasing, absence of a state-level data protection law, perverse monetisation incentives, and undefined anonymisation standards raise several key concerns regarding privacy and security of data. Read our comments on the draft policy here, wherein we have, in a detailed clause-by-clause analysis, listed our concerns, comments and suggestions, in the format prescribed by the state government.

    • HackadayA Classic TV Trope For An Escape Room

      No spooky mansion is complete without a secret passage accessed through a book shelf — or so Hollywood has taught us. What works as a cliché in movies works equally well in an escape room, and whenever there’s escape rooms paired with technology, [Alastair Aitchison] isn’t far. His latest creation: you guessed it, is a secret bookcase door.

    • Science

      • Quanta MagazineTwo Weeks In, the Webb Space Telescope Is Reshaping Astronomy

        In the days after the mega-telescope started delivering data, astronomers reported exciting new discoveries about galaxies, stars, exoplanets and even Jupiter.

      • Synthetic Data in Machine Learning: What, Why, How?

        In this episode, Nicolai Baldin (CEO) and Simon Swan (Machine Learning Lead) of Synthesized are welcoming the founder of Data Science Central and MLTechniques.com Vincent Granville to discuss synthetic data generation, share secrets about Machine Learning on synthetic data, key challenges with synthetic data, and using generative models to solve issues related to fairness and bias.

      • Penn Engineers Create Chip That Can Process and Classify Nearly Two Billion Images per Second – Penn Engineering Blog

        Artificial intelligence (AI) plays an important role in many systems, from predictive text to medical diagnoses. Inspired by the human brain, many AI systems are implemented based on artificial neural networks, where electrical equivalents of biological neurons are interconnected, trained with a set of known data, such as images, and then used to recognize or classify new data points.

        In traditional neural networks used for image recognition, the image of the target object is first formed on an image sensor, such as the digital camera in a smart phone. Then, the image sensor converts light into electrical signals, and ultimately into the binary data, which can then be processed, analyzed, stored and classified using computer chips. Speeding up these abilities is key to improving any number of applications, such as face recognition, automatically detecting text in photos, or helping self-driving cars recognize obstacles.

      • Sweet research: UC chemist unlocks secrets of molten salts | University Of Cincinnati

        A chemist at the University of Cincinnati has come up with a novel way to study the thermodynamic properties of molten salts, which are used in many nuclear and solar energy applications.

        UC College of Arts and Sciences research associate and computational chemist Yu Shi and his collaborators developed a new simulation method to calculate free energy using deep learning artificial intelligence.

        Molten salt is salt heated to high temperatures where it becomes liquid. UC researchers studied sodium chloride, commonly known as table salt. Shi said molten salt has properties that make it a valuable medium for cooling systems in nuclear power plants. In solar towers, they can be used to transfer heat or store energy.

      • Scientists expand entomological research using genome editing | Hiroshima University

        Genome sequencing, where scientists use laboratory methods to determine a specific organism’s genetic makeup, is becoming a common practice in insect research. A greater understanding of insect biology helps scientists better manage insects, both those that are beneficial to the ecosystem and those that damage the food supply and threaten human health by carrying diseases.

        Researchers have developed a work-flow method, called Fanflow4Insects, that annotates gene functions in insects. In functional annotation, scientists collect information about a gene’s biological identity. The team’s new method uses transcribed sequence information as well as genome and protein sequence databases. With Fanflow4Insects, the team has annotated the functional information of the Japanese stick insect and the silkworm, including gene expression as well as sequence analysis. The functional annotation information that their workflow provides will greatly expand the possibilities of entomological research using genome editing.

        The team, with scientists from Hiroshima University, Tokyo University of Agriculture and Technology, and RIKEN Center for Integrative Medical Sciences, has published their Fanflow4Insects method on June 27 in the journal Insects.

        Insects are so diverse and abundant that scientists need a way of studying them on a large scale. This is what led scientists to begin work on sequencing the genome of insects. As of May 2022, scientists had decoded and registered the genomes of around 3000 insect species. They are also using long-read sequencing technology to further accelerate the pace of insect genome sequencing.

      • Robots Learn Household Tasks by Watching Humans
    • OSTechNixHow To Add External USB Storage To Proxmox

      The default Proxmox local storage location is /var/liz/vz. This is where all the Proxmox containers, VMs, and their VZdump backups, ISO images, disk images, snippets and templates are stored. If you run Proxmox on production, you should not keep all containers and VMs in the local disk itself. You must add an additional backup storage to regularly backup Proxmox containers and virtual machines. Just in case if your Proxmox system is crashed, you will still have your containers and VMs. In this brief tutorial, we will see how to add an external USB storage to Proxmox VE.

  • Hardware

    • Linux GizmosFull-size PICMG 1.3 slot CPU Card supports 10th/11th Gen Intel processors

      The PCIE-Q470 is a slot CPU card that supports Intel 10th/11th Gen Core, Pentium and Celeron processors. This embedded device features several USB ports, dual GbE ports and one HDMI port with 4K support.

      Depending on the CPU selected, this slot CPU can support up to 10 cores and 20 threads for multitasking applications. The device can also handle up to 128GB of DDR4 memory (2933MHz) and features four SATAs with speeds of 6GB/s.

    • HackadayRC Lawnmower Is Built To Last

      Mowing the lawn is one of those tasks that someone will always be optimizing or automating. To allow him to mow the lawn while seated comfortably in the shade, [Workshop from Scratch] built an RC Lawnmower in his signature solid steel frame style.

    • HackadayThe Rollercoaster Of Developing The Ultimate Hackable Keyboard

      When designing anything with “hackable” in the punchline, scope creep is an integral part of the process. You end up trying to create something to potentially be an infinite number of things for an infinite number of users. [Zack Freedman] is going really deep down the rabbit hole with his MiRage keyboard and has been documenting the progress in his usual entertaining style, with some cautionary notes included.

  • Health/Nutrition/Agriculture

    • The NationThis Is Life in Paranoid America

      I have a brother with chronic schizophrenia. He had his first severe catatonic episode when he was 16 years old and I was 10. Later, he suffered from auditory hallucinations and heard voices saying nasty things to him. I remember my father reassuring him that the voices weren’t real and asking him whether he could ignore them. Sadly, it’s not that simple.

    • The NationThe US Is Bad at Handling Epidemics. Monkeypox Is the Latest Example.

      We have yet to put the coronavirus pandemic behind us, and already we are facing another public health crisis. New York has declared monkeypox a public health emergency as US cases of the disease tick upward. Once again, the United States is unprepared to keep an emerging virus at bay—and just as unprepared to talk about it.

  • Proprietary

    • The VergeUber receipt emails are crashing Microsoft Outlook

      Microsoft has acknowledged an issue where Outlook on Windows will stop responding or crash when you view Uber receipt emails. The issue started recently in what Microsoft calls the Current Channel Version of Outlook that’s available for Microsoft 365 subscribers. Microsoft is developing a fix, but it won’t be available until Patch Tuesday on August 9th.

      In a support note, spotted by BleepingComputer, Microsoft explains that opening, replying to, or forwarding an Uber receipt email will cause this issue. Uber uses “complex tables” in its emails, and it appears that Microsoft Word, which Outlook uses to view emails, is struggling to render these tables.

  • Security

    • Privacy/Surveillance

  • Defence/Aggression

    • ScheerpostNATO-Backed Network of Syria Dirty War Propagandists Identified

      Defaming journalism on the OPCW’s Syria cover-up scandal, The Guardian and its NATO-funded sources out themselves as the real “network of conspiray theorists.”

    • The NationFree Jeef Kazadi!

      On July 13, Nicolas Niarchos, a journalist on assignment for The Nation, along with his colleague and translator Joseph “Jeef” Kazadi, were extrajudicially detained in Lubumbashi, in the southern Democratic Republic of the Congo. They were reporting on connections between separatists in the region and artisanal mining for cobalt, a mineral that is a key ingredient in the manufacture of lithium-ion batteries. Both are fully accredited journalists and were conducting normal journalistic activities, interviewing key players related to their stories, setting up interviews, and taking photographs.

  • Environment

  • Finance

  • AstroTurf/Lobbying/Politics

    • Frontpage MagazineGoing to Mosque vs. Going to Church

      The sermons were usually in English, a language that I actually know and understand, so I was actually able to learn something useful and valuable. One of the churches I attended had a Farsi service for Iranian converts to Christianity, which I sometimes attended, and the interesting thing is that even though I was in the minority of English speakers who attended the Farsi service, there was always a translator who would translate the Farsi into English.

    • Court House NewsIn a 3rd test, Facebook still fails to block hate speech

      The ads, which the groups submitted both in English and in Swahili, spoke of beheadings, rape and bloodshed. They compared people to donkeys and goats. Some also included profanity and grammatical errors. The Swahili language ads easily made it through Facebook’s detection systems and were approved for publication.

      As for the English ads, some were rejected at first, but only because they contained profanities and mistakes in addition to hate speech. Once the profanities were removed and grammar errors fixed, however, the ads — still calling for killings and containing obvious hate speech — went through without a hitch.

    • Michael West MediaPauline, Pauline, we’re begging of you please don’t break our hearts – Michael West

      Pauline Hanson surprised exactly nobody on Wednesday when she flounced out of the Senate when respects were being paid to Indigenous Australians.

      It might have been the least surprising political intervention since Malcolm Turnbull assured us that independent candidates in Liberal-held seats were good for democracy.
      The new Senate president, Labor’s Sue Lines, acknowledged the Ngunnawal and Ngambri people as traditional custodians of the Canberra area and paid respect to elders past and present at the opening of the session. Hanson interjected, yelling “No, I won’t and never will”, before exiting the chamber.

    • CoryDoctorowPluralistic: 02 Aug 2022 – Pluralistic: Daily links from Cory Doctorow

      The high cost of “self-funded” Democrats

      It costs a lot to win a US election – even if it’s just a race for (formerly) low-stakes offices that have emerged as culture-war battlegrounds (like school and election boards). In the 12 years since Citizens United, the dark money firehose has turned many races into plute-on-plute economic warfare, where cash from the 1% matters far more than votes from the 99%.

      Republicans have a structural advantage when it comes to moneyball elections, because they are the party of rich people (or, more specifically, the party of rich farmers who convince poor turkeys to vote for Christmas by appealing to racism, xenophobia, transphobia, homophobia, misogyny and other forms of bigotry).

      It’s easy to make good on a campaign consisting of: “i) I will punish the people you hate and fear; ii) I will cut taxes for me and my rich pals; and iii) If governments were ever capable of doing good, that wisdom is lost to the ages, a forgotten art of a fallen civilization, like the secrets of pyramid-building. Today, the evil of governments is matched only by their incompetence.”

      It’s really easy to govern incompetently, especially if you’re committed to defunding all the agencies that protect regular people so that you can save enough on your taxes to send your failsons to The Citadel at $35k/year.

      For Democrats, this poses a problem. Decades of declining union membership (abetted, it must be noted, by Democratic leadership) has all but eliminated unions as a source of campaign funding and volunteers. But for the Democratic faction that wants the party to stand for the interest of the professional/managerial class, there is a solution: “decent” rich people who can self-fund their own campaigns.

      This is a terrible idea, even by the standards of the Democrats’ neoliberal technocrat wing. The self-funded candidates who enter primary races are, at best, idiot dilletantes whose inherited wealth is derived from their having won a lottery by emerging from an extremely lucky orifice.

    • ScheerpostBoris Johnson’s (Far From Final) Bill for Damages

      While the elderly white men who run Britain’s Conservative Party chose between two deeply depressing choices for new leader, let’s take a minute to reckon just how much ruin the disgraced prime min…

    • The NationBy Attacking Brittney Griner, Trump Signals to His Base: “I’m Still Racist”

      Donald Trump, contrary to widespread belief, does in fact have a core set of values and has lived by this moral code for 50 years. It’s not love of country, family, religion, or business ethics. He has treated these pillars of right-wing morality like a frat treats a freshly cleaned bathroom.

    • Telex (Hungary)Hundreds returned to Romania – thousands decided to stay

      Every year, more and more students are crossing the border into Hungary from Romania’s Hungarian-inhabited settlements to continue their secondary education. The Hungarian-language high schools in the once Hungarian region of Partium (present-day Romanian regions of Crişana and Banat) have been hit hard by the brain drain. In the long term, these communities in the Hungarian Diaspora may also face challenges if the educated population of the future decides to permanently settle in the land of their ancestors. A year and a half ago 16-year-old Örs started high school in Gyula, and although he loves his home village of Zerind, which is on the other side of the border, he says he now feels more at home in the Hungarian town than in his Romanian village. With the aid of his example, we present the story of the teens who are making the commute from Romania to Hungary.

  • Censorship/Free Speech

  • Civil Rights/Policing

    • Middle East EyeA Saudi Arabian woman built a new life in hiding. Then she disappeared

      In an effort to get answers, MENA Rights Group, a Geneva-based legal advocacy NGO, submitted her case to the UN Working Group on Enforced or Involuntary Disappearances (WGEID) last month.

      Albugamy’s case would be the latest disappearance at the hands of the Presidency of State Security (SSP), a force set up by royal decree in June 2017, a month before Mohammed bin Salman replaced his cousin as crown prince.

    • The NationWhy Human Rights Advocates Won’t Stop Fighting for Freedom in the Philippines

      On June 1, 1981, two Filipino-American union leaders from the Local 37 branch of the International Longshore and Warehouse Union (ILWU), Silme Domingo and Gene Viernes, were murdered in their union office in Seattle’s Pioneer Square.

  • Monopolies

    • Windows CentralSony says Xbox’s Call of Duty acquisition could ‘influence users’ console choice,’ Microsoft responds

      Sony has responded to Microsoft’s proposed acquisition of Activision Blizzard, providing further insight into the $68.7 billion deal set to bring Call of Duty and other hit video game franchises under the Xbox owner. Sony stated that Microsoft’s ownership of the Call of Duty brand could “influence users’ console choice,” pushing back on the deal first announced in early 2022.

      Sony’s latest comments come via filings from Brazil’s Administrative Council for Economic Defense (CADE), detailing various questions surrounding the acquisition and responses from direct competition.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Tuesday, August 02, 2022

Posted in IRC Logs at 2:48 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts