TUXEDO Computers are one of the few manufacturers that provide fine-tuned Linux experiences out of the box.
You can expect Ubuntu/TUXEDO OS as your default options with any of their devices, but they also support more Linux distributions.
Now, they have come up with a refreshed product lineup, i.e., InfinityBook Pro 14 (Gen 7). And, it happens to be one of their flagship offerings!
Announcing the release of Kubernetes v1.25!
This release includes a total of 40 enhancements. Fifteen of those enhancements are entering Alpha, ten are graduating to Beta, and thirteen are graduating to Stable. We also have two features being deprecated or removed.
The PodSecurityPolicy (PSP) admission controller has been removed, as of Kubernetes v1.25. Its deprecation was announced and detailed in the blog post PodSecurityPolicy Deprecation: Past, Present, and Future, published for the Kubernetes v1.21 release.
This article aims to provide historical context on the birth and evolution of PSP, explain why the feature never made it to stable, and show why it was removed and replaced by Pod Security admission control.
PodSecurityPolicy, like other specialized admission control plugins, provided fine-grained permissions on specific fields concerning the pod security settings as a built-in policy API. It acknowledged that cluster administrators and cluster users are usually not the same people, and that creating workloads in the form of a Pod or any resource that will create a Pod should not equal being "root on the cluster". It could also encourage best practices by configuring more secure defaults through mutation and decoupling low-level Linux security decisions from the deployment process.
Whether attending conferences or reading blogs, I often hear several misconceptions about sudo. Most of these misconceptions focus on security, flexibility, and central management. In this article, I will debunk some of these myths.
Many misconceptions likely arise because users know only the basic functionality of sudo. The sudoers file, by default, has only two rules: The root user, and members of the administrative wheel group, can do practically anything using sudo. There are barely any limits, and optional features are not enabled at all. Even this setup is better than sharing the root password, as you can usually follow who did what on your systems using the logs. However, learning some of the lesser-known old and new features gives you much more control and visibility on your systems.
[...]
I hope my article helped to resolve some of the myths surrounding sudo.
Discord is quickly becoming one of the main ways computer users communicate. It’s easy to see why with its ease of use and multiplatform support. If you’re a Kali Linux user and need to get the latest Discord to communicate with colleges, we can help. Here’s how to install Discord on Kali Linux.
Today we are looking at how to install 3Dash, a Geometry Dash alternative, on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
This tutorial will take you through how to install Dozzle real-time log viewer for docker containers on Ubuntu. Dozzle is a simple docker based application that has been created to enable you to viewer docker containers logs in real-time. Note that, Dozzle doesn’t store any logs.
In this post, you will learn how to install Podman on Ubuntu 22.04 and Linux Mint 21. This is the main alternative to Docker that is supported by RHEL.
Manually executing tasks is tiring and, in some cases, inapplicable. However, cron utility allows a user to schedule various jobs at various times. You can schedule your server to create a backup weekly or any other task you deem necessary. There is a way better way of running multiple commands in one cron job. You can schedule all the tasks in one cron job. Want to learn how to do that? Read on to find out.
The cron utility is a helpful tool for automating tasks to run for a specific date and time. For instance, you can automate a job to run every last day of the month at a given time. Automating tasks is something you can’t forego, especially as an administrator. It may be a backup that you need to create for run various scripts. To avoid forgetting to run scripts, the best option is to modify the crontab file and schedule cron jobs, which will run without your intervention.
This guide presents how you can create a cron job, particularly one that executes on the last day of each month.
Linux has a lot of great desktop music players like Cementine, Amarok, and Rhythm Box. MPD (Music Player Deamon) is a music player that can be controlled remotely or from the command line. MPD is not a media streamer. It is only for playback on the server’s hardware. MPD can be configured per user or system-wide. We will set this up as a stand-alone music system with MPD running as a system-wide service. A Raspberry Pi with USB-attached storage is perfect for this.
In this tutorial, we will show you how to install GIMP on Linux Mint 21. For those of you who didn’t know, GIMP (GNU Image Manipulation Program) is an open-source piece of software used for image manipulation. It offers advanced tools for graphic designers, photographers, graphical illustrators as well as scientists for high-quality image manipulation. GIMP is available for the Linux, macOS, and Windows operating systems.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a GIMP image editor on Linux Mint 21 (Vanessa).
Apache ShardingSphere 5.0.0-Beta version with DistSQL made the project even more beloved by developers and ops teams for its advantages, such as dynamic effects, no restart, and elegant syntax close to standard SQL. With upgrades to 5.0.0 and 5.1.0, the ShardingSphere community has once again added abundant syntax to DistSQL, bringing more practical features.
In this article, the community co-authors will share the latest functions of DistSQL from the perspective of cluster governance.
A package manager makes it simple to install GNU/Linux applications on a local computer. Before package management became commonplace, installing applications was a tedious, error-prone undertaking. The ease a package manager brings to installing an application on a Linux computer has been a major factor contributing to the widespread adoption of Linux as a mainstream operating system for both business and home users.
Looking to run Microsoft Windows software on Linux/macOS?
CrossOver (affiliate link) is a popular paid tool for the job.
It is not a FOSS product, but it incorporates open-source components to make things work. Furthermore, with every license you purchase, you get to support the development of WINE and Proton projects.
NVIDIA has released the latest update to their special Vulkan Beta Driver, for developers and users who want to test out the very-latest stuff. Designed mostly for developers, normal every-day users should probably just stick to the regular driver
After being announced back in June, we now actually have a release date for the latest Hearts of Iron IV expansion from Paradox with By Blood Alone coming on September 27th. By Blood Alone centers the political and military fortunes of Italy. The historical path, as always, is open to those who want to relive the dramatic years before and during the war. Alternatively, players can engineer the end of Mussolini's rule through a socialist revolution or a strong monarchy.
Creative Assembly and SEGA have announced the massive Total War: WARHAMMER III 2.0 patch which comes along with a Beta version of Immortal Empires. ICYMI: check out our previous review from BTRE.
ProtonUp-Qt is a simple and great way to manage the likes of GE-Proton (previously known as Proton GE), the Luxtorpeda compatibility tool for Native Linux game engines and more.
GOG are making a big splash with "The GOG Sale" which is live now until September 5th, 10 PM UTC. Time to pick up a bunch of DRM free goodies?
Valve has confirmed that production of the Steam Deck has gone better than expected, and so even more (yes again) people will be seeing their emails to purchase one.
Blackbox is a terminal emulator which supports GTK4. The developer created this project so that he could use a decent-looking terminal app on Linux.
So, don’t expect it to have ton of features. It is just a terminal emulator that utilizes GTK4 toolkit and has support for themes.
In other words, it is more about the looks than the features.
I have packaged KDE Gears 22.08 as well as the latest frameworks, and Plasma got a point release. The status is as follows (all for Debian/stable, testing, unstable...
I repeat (and update) instructions for all here, updated to use deb822 format (thanks to various comments on the blog here)...
Last month, I was fortunate enough to be able to attend GUADEC in Guadalajara. It was thrilling to see everyone in person after a two-year absence. Even better, after many attempts we finally were able to have GUADEC in Mexico!!
For those who don’t know, the genesis of all that came from these chain of events 2016. At the time, I was working at Intel, and one of the kernel developers at Guadalajara, who just happened to be the keynote speaker at GUADEC, connected me to Manuel Haro – he had a conference called CISOL that he was running and needed a keynote speaker.
It so happened that Neil McGovern had recently became the Executive Director of GNOME just a few weeks ago. I told Manuel that Neil would be the better option but he ended up wanting both of us to speak. So we both ended up in Zacatecas, MX. Incidentally, that was when I first met Neil and this sparked the beginning of a beautiful friendship!! So, really it seems quite fitting that his GNOME adventure began and ended in Mexico!!!
The conference itself was great, I enjoyed a number of the talks especially the ones by Endless folks. I missed some that I’m grateful to be able to go back and watch.
The climate crisis is no longer a thing future generations will one day have to deal with, like we were told as kids. It’s here, affecting all of us today, including in the global north. Some of the people travelling to this year’s Berlin Mini GUADEC were delayed by the massive heatwave, because train tracks on the way could not handle the heat.
There are already a number of unavoidable horrible consequences on the horizon. These include areas around the equator where the combination of temperature and humidity is deadly for humans for parts of the year, crop failures causing ever larger famines, conflicts around resources such as water, and general infrastructure breakdown caused by a combination of ever more extreme weather events and decreasing capacity to deal with them.
Second-order consequences will include billions of people having to flee to less affected areas, which in turn will have almost unimaginable political consequences – If 5 million refugees from the Syrian civil war caused a Europe-wide resurgence in proto-fascist parties, what will 100 million or more do?
And that’s not the worst of it.
Linux has an extensive range of open-source distributions that pentesters, ethical hackers and network defenders can use in their work, whether for pentesting, digital forensics or other cybersecurity uses.
Also known as “distros,” these distributions are variations of Linux that include the Linux kernel and usually a specific package manager.
For example, Kali Linux, one of the most popular pentesting OSs, is Debian-based, which means it’s based on the Debian Project. Ubuntu, a famous Linux distro you may already know, is also Debian-derived.
Here are eight of the best Linux distros for cybersecurity use cases, for beginners through advanced users, along with some issues to consider as you select a Linux security distro.
[...]
If you’re an absolute beginner, I would not recommend using a pentesting distro. Most pentesting distros have two major drawbacks: they can be overwhelming, and they require advanced knowledge.
You can meet with the Canonical telecom team virtually or on-site in US and pick our technical experts’ brains about your particular telco use case. Telecommunications is a key area of Canonical’s focus, and we are fully committed to providing a best-in-class experience of using open source software to enable mobile operators, network function developers and network equipment providers to scale and innovate efficiently.
WiCAN is an ESP32-C3 CAN bus adapter that works over USB, Wi-Fi, and Bluetooth LE, and designed for car hacking and general CAN bus development.
The device is available in USB-CAN and OBD-II form factors and comes with firmware that works with RealDash to create nice-looking dashboards with the data.
Display technology, from cathode-ray tubes to LCD screens, exists to convey information to humans visually and it does that very well. But the lack of physical presence makes visual displays useless for almost everything else. The blind can’t feel pixels and computers need resource-intensive algorithms to make sense of the images we feed them. That’s why engineers from MIT CSAIL and the University of Calgary have developed a new type of display technology that relies on magnetic pixels called “mixels.”
In this context, “mixels” are individual elements that form a magnetic picture. A SnapMaker CNC machine modified with an Arduino Nano-controlled electromagnetic head can set each mixel to a magnetic north polarity, south polarity, or demagnetized state. A Hall effect sensor on the head lets the Arduino detect the polarity of each mixel so it can scan the image. Like a raster image made up of traditional visual pixels, these mixel images can be complex. A mixel image could, for instance, represent a QR code in order to store data. Each mixel is a single bit that is readable with a low-cost Hall effect sensor.
James Bruton loves to experiment with unusual vehicle drive systems and configurations to find out how they perform under the dynamic conditions of real-world use. Internal combustion engines and driveshafts don’t tend to fit in those vehicles, so Bruton often utilizes electric motors. He usually turns to Arduino to control the motors and read the sensors in his contraptions. That remains true for his newest project: a strange two-wheel steering e-bike.
Imagine a bicycle, but with a rear wheel that also steers, and you’ve got a pretty good idea of the concept. But it would be really hard to steer both wheels at the same time, so Bruton came up with a unique control scheme. The front wheel has free steering, like a typical bicycle. The back wheel has active motor-driven steering. An encoder monitors the angle of the front steering so the back steering can rotate in response. There are three modes: one that locks the rear wheel to mimic a standard bike, one that matches the rear steering to the front, and one that mirrors the rear steering relative to the front.
Here's a fast-paced tour of Android version highlights from the platform's birth to present. (Feel free to skip ahead if you just want to see what’s new in Android 12 or Android 13.)
Yes, that’s right, Firefox 105 is now ready for public beta testing, and guess what? It brings back the long-anticipated two-finger swipe horizontal gesture on Linux for navigating back and forward on a website without having to hold down the Alt key.
While this feature was delayed over and over, and we really hoped that it would land in Firefox 104, it does appear to finally be ready for the masses with the next Firefox release, Firefox 105. It looks like the feature is working very well and there are no blocker bugs this time, so fingers crossed.
SQLite only comes with these few core functions. A few JSON functions have recently become builtin too.
Video recordings from BSDCan 2022 are now available.
As of this moment, Mesa is now using the Mold linker in CI for faster build times.
If you haven’t tried Mold yet, you’re just pointlessly wasting your own time.
When we create new classes, we can inherit methods and attributes from previously developed classes. These attributes are found in data structures that have been specified, as well as in the procedures that may be used to accomplish different functions. As the codebase becomes more modular, this encourages code reuse, which is regarded as one of the most significant industrial coding techniques. Newer classes in Python can inherit older classes. Without altering the older or previous class’s syntax, the new class or classes replicate all of its properties and functions into themselves. The term “base class” refers to the original classes and “derived classes” refers to the new classes.
The term “inheritance” is frequently used to refer to the passing of some essential functions from one generation to the next. Like parent classes, there are child and base classes. We create classes through inheritance by deriving them from other pre-existing classes. The parent/base classes, by which the child classes acquire their methods and attributes, are the already existent classes.
The default GUI toolkit for Python is called Tkinter. The combination of Python with Tkinter makes it quick and simple to develop the GUI apps. An effective object-oriented gateway for the Tk GUI toolkit is provided by Tkinter. It’s simple to build a Gui interface employing the Tkinter. Within this guide, we will show you the use of the Tkinter library to create a Tkinter GUI and add a Listbox widget to it.
Getting started with the Ubuntu 20.04 system, we update our system using some commands in the terminal shell. We launch the terminal application with the Ctrl+Alt+T and add the apt “update” instruction on it. The execution requires the password of the logged-in user and it updates the whole system after the addition of a password.
The ttk package, a unique modification of Python Tkinter, introduces this additional component. The Python Tkinter ComboBox exhibits each choice from a drop-down menu 1 at a moment. It has a contemporary appearance, making it suitable for locations where exposure is crucial. The gadget Entry is a class ability of the Python ComboBox. As a result, it adds some additional choices and functions while also inheriting several from the Entry class.
A crucial widget that may be seen in several programs is the ComboBox. The user is given a list of alternatives to choose from. It has several values, and only ever displays one at a moment. Today’s tutorial will cover how to use the ComboBox in Linux using Tkinter.
To create applications using Graphical User Interfaces (GUIs), Python offers a variety of libraries. The industry-standard GUI package, Tkinter, offers a quick and simple approach to developing GUI programs. This GUI toolkit for TCL (Tool Command Language) is unique. The simplicity of Tkinter is one of its greatest advantages. It comes with a large range of necessary widgets practically to everyday operations.
The Checkbutton widget is employed to present a user with a range of substitutes as toggle switches. By hitting the button beside each choice, the viewer can then choose one or more of them. Within this article, we will take a look at the Python’s Tkinter library to create the checkboxes in a graphical user interface. Getting started with this article, we have to make sure that the “Tkinter” utility of Python is already configured at our end. If not, try the following instruction in the console application query area.
By using the Mutex keyword, we may lock our variable from being accessed by several threads at once. Mutex is utilized to provide synchronization in C++, meaning only one thread can receive the object at once. Threads cannot access the locked piece of code once the lock has been established. The code has been locked using mutexes. So, even if thread 2 is scheduled while thread 1 is still consuming the shared resource, thread 2 will not be able to access that part of the code. As a result, synchronized access to shared resources in the code is ensured.
Data is stored locally on computers through file handling. We may insert the content in secondary memory by managing files.
In this guide, we’ll examine pair containers in C++ and their applications. In C++ Programming language, a pair container works similarly to a tuple. However, a pair could only contain two elements, whereas a tuple can contain many elements. The two components could have multiple data types or similar data types like a tuple. Pair is a container that is given by the <utility> module and is declared in C++ Programming language by utilizing the term ‘pair’. So, in essence, a pair is utilized to combine two components or integers within one. This enables the storage of heterogeneous elements or multiple data kinds as a single entity.
A process’s single sequence stream can be termed a thread. Threads are frequently referred to as “lightweight processes” since they have some characteristics with processes. A class is to represent distinct execution threads. A single thread of execution is represented by the class thread. Multiple functions can run at once because of threads. When a thread object is created, it instantly starts to execute (subject to any OS scheduling delays) starting at the highest function specified as a function constructor. The method’s defined value is disregarded and std::terminate is invoked if it exits by raising an error.
We will cover how to efficiently manage allocation in C++ utilizing the ‘new’ function through the use of practical examples.
In C++, the term “dynamic memory deployment” refers to the manual allotment of storage by a programmer. Heap is where distributed shared memory is deployed, while Stack is where non-static and local variables acquire memory resources.
The term “stream” in C++ describes the flow of characters between the program thread and i/o. C++ stream classes are needed to input and output actions on IO devices and files. These classes are designed to manage the program’s input and output and they have particular functionality.
Java comprises a class named Character, which belongs to java.lang package. The object of the Character class contains a single field “char” that is a primitive datatype in Java. A Java char has a 16-bit size, with a range of 0 to 65,536 characters. The data type char belongs to the characters group, a character set representing symbols such as alphabets and numerals.
This guide will discuss the method of checking if the specified character is a number or not.
In Java, a method is a combination of logical statements utilized to perform specific operations. Methods are commonly used because their added code can be reused as often as needed. Each method in Java is called using its name, and when the Java compiler reads it, the mentioned method is invoked, and the added operational code gets executed.
This tutorial will illustrate different ways of calling methods in a Java program.
Bolding a text helps highlight specific content for readers. The bold option makes a text thicker than others to emphasize it. In any article, research paper, technical and non-technical document, you can use bold text to draw attention to the relevant information.
Using bold text in a document is good, but LaTeX doesn’t offer a simple way to bold a text since it requires the correct source code. Read this guide if you are interested in learning how to create bold text in LaTeX.
The ⊥ symbol indicates two perpendicular lines. Suppose m and n are two traces dividing by 90, then perpendicular to each other and represented as m ⊥ n. In the concept of perpendicular, a point of intersection of both lines is called the foot of the vertical.
You can use the perpendicular symbol in the document processor like LaTeX. However, it requires a correct source code. So, in this tutorial, we will explain different source codes you can use to use perpendicular symbols in LaTeX.
A prime symbol (‘) denotes a specific operation at a particular variable. This symbol is used as a standard quotation mark to indicate a specific value as well. In Mathematics, a prime symbol represents feet or arc minutes. Similarly, the double prime symbol (“) shows the inches and arcsecs.
Prime symbols are also used to describe the derivative of a function f(x). So, these symbols have an essential role in Mathematics. That’s why LaTeX also offers a way to use prime symbols. If you also want to learn how to write and use a prime symbol in LaTeX, read this tutorial for more information and examples.
A landscape mode on any document processor is essential in efficiently representing large images, tables, and texts. Portrait mode has a few limitations, such as being unable to fit wide photos. Technical documents like research papers require large tables and diagrams to provide in-depth information. That’s why document processors, like LaTeX, provide methods to turn your pages from portrait to landscape.
Read this tutorial if you are also interested in learning how to use a landscape page in LaTeX. This tutorial will explain creating and using a landscape page in LaTeX.
ââ¬Æ In Algebra, the sigma symbol (ã) indicates the summation operator. The symbol, ã, offers the simplest form of writing the sum of components in a series. In mathematics, the sigma symbol is used to indicate a sum. The simple (ã) and double (ãã) are two sigma symbols you can use in Algebra.
The simple sigma symbol is used to express a sum of multiple values, while the double sigma symbol is used as the double sum in a specific situation. Hence, it is essential to write the sigma symbol when you are writing a research paper or a document. This tutorial will demonstrate how to write and use sigma symbols in LaTeX.
The congruent symbol in mathematics is used to show similarities between triangles. The symbol (ââ°â¦) is a combination of the equal (=) and tilde (~) symbols. A congruent symbol is one of geometry’s most commonly used symbols, representing the relation between the triangles.
This symbol may look simple, but many users occasionally become confused while writing it to the document processor. You may already know LaTeX (document processor) requires source code to create a congruent symbol. So, in this tutorial, we will explain a simple way to write and use a congruent symbol in LaTeX.
In articles, italic text is mainly used to emphasize a particular segment to draw a reader’s attention. Text editors, like MS Word and Google Docs, provide the simplest way to italicize text. You only have to press CTRL and I to italicize a text. However, the document processor doesn’t contain the same way as it requires a proper source code formation.
That’s why many users don’t know how to italicize a text in a document processor like LaTeX. If you also face the same issue, then please read this tutorial. This tutorial teaches you how to write italic text in LaTeX.
On August 23rd, 1997, I sent out this emailed newsletter — which was then called Up-To-Date — to various business school colleagues. That was exactly 25 years ago, and that began dragging me down the path of what became Techdirt early the following year (when I realized it might be nice to have a website to post the copies of the newsletter on, rather than just sending them out over email).
Ogletree sued the university on the grounds that the practice violated his rights under the Fourth Amendment, which protects US citizens against “unreasonable searches and seizures”. The university, in defense, argues that “room scans are ‘standard industry wide practice’”, and that “students frequently acquiesce in their use.”
Federal Judge J. Philip Calabrese sided with Ogletree yesterday, determining that the university’s room scan did constitute an unreasonable search. “Mr. Ogletree’s subjective expectation of privacy at issue is one that society views as reasonable and that lies at the core of the Fourth Amendment’s protections against governmental intrusion,” Calabrese wrote in the decision.
The Ministry of Social Affairs is drawing up a regulatory amendment that will allow for varieties of Cannabis sativa with a higher tetrahydrocannabinol (THC) content to be grown in Estonia. The change will significantly increase the number of varieties hemp farmers can choose from to grow.
Yesterday, Apple revealed it would expand its Self Service Repair program to let you fix your own MacBooks, and today the program is here. You can now download full repair manuals for your 2021 14-inch and 16-inch MacBook Pros and the 2020 13-inch M1 MacBook Pro and M1 MacBook Air — and shop for parts you might need.
According to a report by virtual private network (VPN) service provider NordVPN, 45 per cent respondents said there is no reason for their name to be on the internet, while 42 per cent said they feel used because companies collect their data and use it to their advantage.
While 34 per cent of the people surveyed said they feel that someone will eventually hack their devices, 31 per cent do not trust the Internet.
How the US leads by helping other people kill each other.
Six months after Russia’s invasion, it is becoming clear how differing physical and virtual approaches have shaped the conflict. Just as with its land invasion, Russia’s initial online plans appear to have fallen short. The country’s use of offensive cyber tools has been irresponsible and indiscriminate.
Their information operations have proven clumsy and have been challenged by the release of intelligence. And Russian military attempts to destroy the digital infrastructure of Ukraine and to sow discord using cyber capabilities have been met with staunch, professional and effective Ukrainian cyber defence.
Finnish Prime Minister Sanna Marin said on Tuesday that Finland should have listened more to the Baltics when it came to Russia, adding that Finland's NATO accession is bound to lead to closer relations.
If confirmed by the Ministry of Defence (MoD) on Tuesday, it will smash the record so far this year of 696 on August 1 and could come close to the highest daily total of 1,185 who reached the UK in 33 boats in November last year.
It would make August a record month for this year with around 6,000 migrants crossing the Channel. It raises the prospect that August could beat the all-time monthly highest total of 6,878 in November last year.
It means that some 22,500 migrants have crossed the Channel so far this year, double the rate at the same point last year. The total did not pass 20,000 until November in 2021.
"But that wasn't the defendants' ultimate goal," Kessler said. "They wanted to set off a second American civil war, a second American Revolution, something that they call the boogaloo. And they wanted to do it for a long time before they settled on Gov. Whitmer."
Ads posted on TikTok by people-smugglers to take refugees to French coast are described as ‘unacceptable’
True to its name, the Wall Street Journal never fails to lay bare its corporate sympathies. In a recent feature headlined “The Place With the Most Lithium is Blowing the Electric-Car Revolution” (8/10/22), the Journal warps anti-neoliberal and Indigenous resistance to ecological destruction and resource plundering into pesky obstacles to green capitalist innovation.
Jerry Cuomo described blockchain as an “odd duck” type of database with a few defining features, explaining that each blockchain has several administrators, that each transaction must be vetted by the administrators before being recorded to the digital “ledger,” and that transactions, once recorded to the ledger, are essentially impossible to change or delete. Cuomo also explained that each data point – or “block” – in each blockchain is heavily encrypted, which creates high levels of security and user trust.
China is forgiving 23 interest-free loans for 17 African countries, after already cancelling $3.4 billion and restructuring $15 billion of debt from 2000-2019.
Brett Wilkins reports on the Peruvian capital's decision to endorse the FFNPT.
Both CNN and the Washington Post are running stories today about Peiter Zatko, better known as Mudge, filing whistleblower reports on Twitter’s security practices, including a few shocking claims. Twitter is denying many of the claims and, frankly, at this point it’s difficult to tell who’s correct. However, I will note that Mudge is widely respected in security circles, and much of his initial claim to fame was about finding security vulnerabilities — and part of the reason Jack Dorsey brought him in to Twitter was this history of doing whatever necessary to fix security holes. That said, Twitter is insisting that Mudge didn’t understand how its systems worked, and is misrepresenting things. Of course, there’s also the Elon Musk aspect of this that complicates matters as well.
In response, Twitter blasted Zatko, who worked at the company from November 2020 to January 2022, saying he was spreading a "false narrative about Twitter" and was fired for "ineffective leadership and poor performance." The company also said Zatko's public remarks are "riddled with inconsistencies and inaccuracies and lacks important context."
Zatko first gained prominence as part of the L0pht, a Boston-based hacker collective known as an influential computer security research group in the 1990s. Notably, while the L0pht released software, the group also advised on policy, even giving testimony before the Senate on internet security in 1998. In his earlier hacking days, Zatko was also a member of the notorious hacker group Cult of the Dead Cow, which also counted former presidential candidate (and current Texas gubernatorial candidate) Beto O’Rourke as a member.
As his profile grew, Zatko took on roles with Defense Advanced Research Projects Agency (DARPA) and Google’s Advanced Technologies and Projects research group. He was hired by Twitter in 2020 in the months after a major security incident that saw hackers take over some of the platform’s most-followed celebrity accounts. But he stayed only just over a year, being fired by incoming CEO Agrawal in January 2022.
Twitter has hidden negligent security practices, misled federal regulators about its safety, and failed to properly estimate the number of bots on its platform, according to testimony from the company’s former head of security, the legendary hacker-turned-cybersecurity-expert Peiter “Mudge” Zatko. The explosive allegations could have huge consequences, including federal fines and the potential unraveling of Tesla CEO Elon Musk’s bid to buy Twitter.
Well, yes, Musk could have asked, but Dorsey, historically, is known for his indecision and inability to make good calls in a timely fashion. This was the heart of Elliott Management’s problems with him! It’s part of why he got fired the first time! If I’m Musk’s lawyers, I figure Dorsey’s interference is part of what caused this whole mess. And Dorsey being Dorsey — remember he loves being a cult leader and hates taking any blame whatsoever — is not going to defend the company he ran or even admit fault.
This morning, The Washington Post and CNN published dual reports into alarming new safety and security allegations raised against Twitter by Peiter “Mudge” Zatko, who was fired as the company’s head of security earlier this year. Zatko alleges that Twitter makes little effort to fight spam accounts and has shockingly insufficient cybersecurity defenses.
The whistleblower, who has agreed to be publicly identified, is Peiter "Mudge" Zatko, who was previously the company's head of security, reporting directly to the CEO. Zatko further alleges that Twitter's leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns. The whistleblower also alleges Twitter does not reliably delete users' data after they cancel their accounts, in some cases because the company has lost track of the information, and that it has misled regulators about whether it deletes the data as it is required to do. The whistleblower also says Twitter executives don't have the resources to fully understand the true number of bots on the platform, and were not motivated to. Bots have recently become central to Elon Musk's attempts to back out of a $44 billion deal to buy the company (although Twitter denies Musk's claims).
On Tuesday, The Washington Post reported that Twitter’s former head of security, Peiter Zatko, had filed a whistleblower complaint with federal regulators, including the Securities and Exchange Commission, accusing Twitter of “Lying about Bots to Elon Musk.” Zatko, a well-known figure in the security community, alleges that Twitter is not incentivized to tally the true number of bots and spammy accounts on the service, which counts 238 million daily users.
Zatko also alleges that Twitter deceived regulators regarding its defenses against hackers, a claim that could provide support to Musk's charge that Twitter has been untruthful in its reports to shareholders.
Zatko alleged that he warned colleagues about out-of-date and vulnerable software on the company's servers, adding that executives withheld important data about the number of breaches and insufficient protection for user data, per the Post.
But according to Zatko’s complaint, after Dorsey stepped down as CEO in November 2021, and Zatko informed members of Twitter’s board that protections for sensitive user data were weaker than they had been told, new CEO Parag Agrawal fired him.
The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
The Russian Foreign Ministry shared a video justifying the signing of the Molotov-Ribbentrop Pact between the Soviet Union and Nazi Germany back in 1939 to mark its anniversary. The video makes no mention of the MRP secret protocols used to divide Europe into spheres of influence.
Fennovoima has meanwhile initiated several arbitrations and other proceedings against various Rosatom entities, with claims amounting close to two billion euros.
The first tool is the Council Data Project. CDP is a truly incredible effort and tool, run by some fantastic people (Hi, Eva!). I’m not going to talk much about it, other than to say you should check out the Alameda and Oakland instances.
The second tool is something I’ve been working on recently: SQL-backed full text search of city meeting minutes. You can see this working for the cities of Alameda and Oakland right now. That’s 18,746 pages of city minutes for Alameda, and 37,172 pages of city minutes for Oakland, now fully searchable by anyone.
So let’s talk about how I did this, and how you can do this for your city, possibly with my help!
House Speaker Nancy Pelosi’s husband bought up to $1.5 million worth of Apple stock as well as up to $600,000 in Microsoft shares, according to recent financial disclosures submitted by the powerful Democratic lawmaker.
Paul Pelosi's stock option trades come in the midst of a roiling debate on Capitol Hill over whether lawmakers and their spouses should be allowed to trade stocks at all.
She also disclosed the purchase of Microsoft ($MSFT, NASDAQ) call options at a $180 strike price with an expiration date also on 6/16/2023.
Gyula Horváth, the Deputy Chairman of the National Meteorological Service, who was dismissed along with the Head of the Service on August 21st was on a 3-week holiday and did not even work on preparing the forecast for the fireworks. Many believe that he was sacked because the weather forecast submitted by the service for August 20th was not correct. He received no official reason for his dismissal. The deputy told Telex that he first heard about his supposed pre-existing “lack of competence” which was given as a reason for their dismissal at Tuesday’s government briefing.
The chiefs of the National Meteorological Service have been fired after – according to the government – they made the wrong weather forecast and the fireworks planned for Statehood Day had to be postponed. A day later, the sixteen department heads of the Service issued a statement about strong political pressure.
Senator Ron Johnson says he doesn’t need to testify before the House Select Committee to Investigate the January 6th Attack on the U.S. Capitol because he was only briefly involved with plotting to overturn the results of the 2020 election.
Social media posts circulating this week suggested it was banned from the middle school that holds his name.
But Brandie Egan, a district communications coordinator, said in a statement that the book had not been banned nor under reconsideration as part of the district’s challenge process.
Anyone in journalism who wants to regain that trust would do well to read American Dispatches and internalize the lessons that Robert Parry offers, writes Nat Parry.
No Criminalization of Defamation€
Iran’s religious leaders, however, are a good deal less interested in the requirements of international diplomacy, and have been remarkably forthright in saying so to anyone who cared to listen. Khomeini’s successor, Ayatollah Ali Khamenei, has repeatedly stated that the fatwa will not—indeed, cannot—be lifted, even if Rushdie “repents and becomes the most pious Muslim on Earth.” Just three years ago, the Supreme Leader’s Twitter account was briefly locked after it posted the following tweet: [...]
"Evidence has now been uncovered that the British intelligence agencies, MI5 and MI6, may have contributed to Jagtar's detention and torture by sharing intelligence with the Indian authorities," the NGOs said.
So, look, I’ve been pretty clear that for as much as Elon Musk refers to himself as a “free speech absolutist,” his actions suggest otherwise. He has regularly punished people for their speech, he recently embraced the EU’s highly censorial plans for social media regulation, and his filings in the Twitter case suggest that he is quite upset that the company is fighting for free speech in India. Indeed, all of the actual evidence suggests Musk is actively opposed to free speech, not supportive of it.
“Since I started as a journalist in 1989, I’ve denounced that we live in a narco-klepto-dictatorship that has us kidnapped and cowered,” Zamora said as he was being escorted by security forces to the tribunal building after his arrest. A couple of days later, the Guatemalan government temporarily froze elPeriódico’s bank accounts. Last week, police raided the home of elPeriódico’s director of finance, Flora Silva. She’s currently hospitalized and facing detention, Godoy said. This isn’t the first time the government has targeted elPeriódico or Zamora in retaliation for their work.
2022 has been one of the deadliest ever for journalists in Mexico, which is now considered the most dangerous country for reporters outside a war zone.
What's gotten less attention from the corporate news media is how publicly traded corporations like Amazon and Starbucks are doubling down on illegal or dubious strategies to defeat these organizing efforts, often in ways that are not in the long-term interest of workers, the nation, their brands or even their investors, but actually serve only to personally enrich the C-suite.
Such is evidently the case with the Gannett newspaper chain, which owns more than 250 newspapers across the country including USA Today. In my home state of New Jersey, Gannett now controls a long list of the Garden State's most trusted legacy local papers: the Asbury Park Press, The Bergen Record, the Courier News, The Courier Post, the Daily Record, the Home News Tribune, the Daily Journal, the New Jersey Herald and the Burlington County Times.
The virtual rapper — who describes himself as a robot in a the afromentioned “interview” and across his TikTok and Instagram pages — is pretty human-looking, save for a golden left hand and chin plate below his glowing green pupils. Though Meka is obviously not a person in storyline nor reality, he mostly looks it — and he doesn’t immediately look Black. This racial ambiguity, tied together with songs in which Meka raps the N-word, had drawn intense ire across the [Internet].
FN Meka, a virtual rapper powered by AI, was first created by Factory New in 2019, according to The New York Times. The virtual rapper has amassed more than 10 million followers on its TikTok profile.
A perfect storm of factors has propelled unemployment among 16- to 24-year-old urbanites to a record 19.3%, more than twice the comparable rate in the US. The government’s hardline coronavirus strategy has led to layoffs, while its regulatory crackdown on real estate and education companies has hit the private sector. At the same time, a record number of college and vocational school graduates—some 12 million—are entering the job market this summer. This highly educated cohort has intensified a mismatch between available roles and jobseekers’ expectations.
So it may shock many that the concept of “quiet quitting” is actually derived from a movement that began sweeping through China last year known as “lying flat” or tang ping.
"Police arrived 30 minutes later, followed our instructions as to not have them able to run off and therefore able to be spoken to and dealt with – some being the same as on CCTV from the day before.”
"We literally did their job for them, instructed them how to apprehend them, yet protecting them because of their age, the law is not on our side when it comes to youths.
It sounds absurd: Dennis Rodman has plans to travel to Russia to speak with Vladimir Putin about freeing Brittney Griner from prison. The NBA Hall of Famer, as famous for his flamboyance as for his rebounding, thinks he can succeed where the Antony Blinken State Department has failed and find a way to get WNBA superstar Griner out of a Russian cell. I can’t bring myself to mock Rodman like so many in the sports world seem content to do—and not just because some news outlets have spent more time discussing Rodman’s gambit in one week than they have spent raising the name of Brittney Griner over the last eight months. My reasons for not scoffing come down to two words: “Why not?” The State Department has so far failed to free Griner, and we’ve seen celebrity diplomacy work in the past, albeit with figures more esteemed than Rodman. Even if Rodman lacks the gravitas of a Muhammad Ali, he shares Ali’s currency of fame and that, in dealing with dictators, can be priceless.
Lopez filed suit on Tuesday, claiming that Pandora streamed two of his comedy albums, Right Now Right Now and Team Leader, without paying him royalties or obtaining the proper licenses from him. “[Pandora] decided it would infringe now to ensure it had this very valuable intellectual property on its platform to remain competitive, and deal with the consequences later,” the filing said. “Later is now.” A representative for Pandora’s parent company, SiriusXM, did not immediately respond to request for comment.
A lawsuit accusing YouTube of operating a two-tier copyright enforcement system is seen by some as a beacon of hope for smaller artists. YouTube's failure to have the case dismissed was recently publicized in entertainment media, but few outlets addressed the allegations of fraud that have dogged the case from the start. Google's latest filing offers a comprehensive reminder.
It can be fun to go back and revisit old cyberpunk novels. They were basically predictions of what the authors thought the era we’re living in now might be. Most of it was speculative fiction, but when Neal Stephenson came along in the early 90s with Snow Crash, one of his main goals was actually parody. The book was intended to poke quite a lot of fun at the sub-genre, as it was kind of getting driven into the ground after a decade or so of popularity. That isn’t to say he didn’t come up with any potential future technologies that our world in the here and now is exploring (the metaverse says hi). On the whole, the book was more tongue and cheek than anything else. People who are familiar with cyberpunk will get a lot more chuckles while reading Snow Crash, but even those not so clued in on the sub-genre can still enjoy it.
The story takes place in the near future, although it could be argued that the time period is right around now, but it was a good three decades away when Stephenson was writing the book. Most countries have collapsed and corporate franchises have taken their place. It would be like some neighbourhoods being owned by Amazon, another down the road owned by McDonald’s, maybe another by Tencent, and so forth. Each franchise is considered sovereign with their own sets of laws within their borders.
Do what you love and love what you do and success will automatically follow. Don't work for success but for love.
Energy costs have gone absolutely off the rails in the UK. The geopolitics of it are known, of course, but that doesn't change the domestic impact.
[...]
The main shortage is with gas, but the UK burns a lot of gas in turbines to generate electricity, so electricity prices are affected too. This house is expected to get through ~3MWh of electricity per year, and ~9MWh of gas. From Feb-Aug, we've managed to get through around 5.5MWh combined, so it's not a bad estimate.
[...]
A lot of people simply don't have a choice about paying - if you're on minimum wage, rent is ââ¦ârd of your income (optimistically) and energy is €½, you're left with ââ¦â¢th - €£2,000/yr, €£166/mo - for everything else: food, transport, toiletries. Let's not forget that food price inflation is very much a thing right now as well.
What’s good about block politics is that it fixes the mathematical problem with single-vote. You get the best of multi-party systems (you can get nuanced representation) and of two-party systems (you have the highest possible chance of avoiding the most disastrous outcomes, of voting out the worst of the fachos—assuming that the party you hate the most is in the opposite block).
In Sweden the parties on the nominal left hate block politics and each other (and for good reason because they’ve treated each other horribly). They don’t wanna govern together, which means that a vote for them is not a reliable vote against the far right.
Unfortunately, there’s no alternative except to vote for one of them and hope that they can sober up for three seconds and that it’ll be enough to keep the brownshirts off the throne for four more years. That’s unlikely since they’ve spent more of the campaign trail time pulling each other’s hair and breaking each other’s hearts than finding common ground.
I've created this capsule in gemini space but I'm still not known to others. I'm not in threads and searching engines. How to spread message about my capsule? How to create acceptable feed?
The main inspiration was `tig` - super druper console app for git. I'd like to have something similar for sql.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.