11.11.22

Links 11/11/2022: Alpine 3.16.3 and FreeBSD 12.4-RC2 Now Available

Posted in News Roundup at 6:07 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • HowTo Geek7 Mistakes New Linux Users Make (and How to Avoid Them)

      Learning Linux can be a frustrating experience where everything little thing feels like a battle. Avoiding these common mistakes will make your introduction and adoption of Linux much easier and less stressful.

      Using Linux is much simpler than it used to be, but it can still confound new users. It has long held a reputation as being difficult to set up and work with, but that’s no longer the case. Gone are the days when you had to struggle to tell your newly-booted installation what keyboard layout you had, using your misidentified and incorrectly-mapped keyboard.

    • Audiocasts/Shows

    • Applications

      • Make Use OfWhy You Should Be Using Pi-Apps to Install Software on Raspberry Pi

        Install apps the easy way on Raspberry Pi OS with Pi-Apps.

        Installing software on a Raspberry Pi is a bit of a pain, especially if you’re unfamiliar with the command line. While there is an add/remove programs tool, it’s a little clunky, especially when compared with similar tools on other operating systems.

        That’s where Pi-Apps comes in. It’s a handy one-click installer for over 200 Linux apps that are designed to run on the Raspberry Pi.

      • FOSSLinuxHow to run Android on Linux using Virtual Machine

        Android commenced its journey as a Palo Alto-based startup called Android Inc in 2003. The company initially set out to develop an operating system for digital cameras but abandoned those efforts to reach a more expansive and boosted market. This mobile OS is based on a modified version of the Linux kernel and other open-source software, primarily designed for touchscreen mobile devices like tablets and smartphones.

      • Linux LinksBest Free and Open Source Alternatives to Microsoft Planner [Ed: The second paragraph here is a bundle of Microsoft lies]

        This series looks at the best free and open source alternatives to products and services offered by Microsoft.

    • Instructionals/Technical

      • KifarunixEasy way to Integrate TheHive with Cortex – kifarunix.com

        In this tutorial, you will learn how an easy way to integrate TheHive with Cortex.

      • ID RootHow To Install pgAdmin on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install pgAdmin on Rocky Linux 9. For those of you who didn’t know, pgAdmin is a free and open-source graphical administration tool for PostgreSQL, one of the most advanced open-source databases. It allows one to manage the PostgreSQL database from the web interface by providing all the required features.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of pgAdmin4 on Rocky Linux. 9.

      • Red Hat OfficialHow I decreased the time to create and destroy an OCI container from 160ms to 5ms [Ed: Article seems to have been removed by Red Hat]

        The journey to speed up running OCI containers took longer than expected, but the effort was worth it.

      • HowTo ForgeHow to Install Nessus Security Scanner on Ubuntu 22.04

        Nessus is an open-source network vulnerability scanner for vulnerability assessments and penetration testing.

      • Make Tech EasierHow to Use AppArmor in Ubuntu – Make Tech Easier

        You have probably heard of AppArmor while using Ubuntu, but since it is not an application that shows up in the Application Menu and doesn’t appear in any graphical form, some may not know what it does and why it is essential for your system. In short, AppArmor is a security module that confines individual programs to a set of listed files and capabilities so that they don’t wreak havoc on your system.

      • ID RootHow To Install Nvidia Drivers on Debian 11 – idroot

        In this tutorial, we will show you how to install Nvidia Drivers on Debian 11. For those of you who didn’t know, Nvidia GPUs (Graphics Processing Units) have a wide variety of uses, from gaming to 3D rendering, and visualization. If your Computer has NVIDIA Graphic cards, Install Nvidia Graphic Driver to improve Graphics related performance.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Nvidia Drivers on a Debian 11 (Bullseye).

      • Make Use OfHow to Install Linux Mint on a PC

        Linux Mint is at the forefront of making Linux accessible to beginners switching from other operating systems. Although Linux Mint tries its best to help newcomers transition to Linux successfully, its installation process is often what catches most people off-guard.

      • H2S MediaHow to manually install Nginx on Ubuntu 20.04 LTS

        Nginx is a popular Apache web server alternative and open source as well. In this tutorial, we learn the simple commands to install Nginx on Ubuntu 20.04 Focal Fossa LTS Linux using the command terminal.

        Apart from using as a Web server, it is also used as a proxy, cache, and load-balancing server. To install it, you just need a Linux server such as Ubuntu 20.04 and sudo user rights along with the Internet connection.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • This Week in GNOME#69 Zapping Through Videos – This Week in GNOME

          Update on what happened across the GNOME project in the week from November 04 to November 11.

        • Jakub SteinerRunning Shell in Builder – Even a Stopped Clock

          Builder has been absolutely wonderful for a designer to dive in and fix up graphics assets for Application. It allows to easily build and test run patches before submitting a merge/pull request on apps hosted on gitlab or github. Ideally you’d press the run button and voilá.

          What has been far from wonderful — doing even one line fixes for the GNOME Shell was very hard to test for anyone not building shell daily. getting the environment ready every release has been a chore. From virtual machines, jhbuild, toolbox, jhbuild in VMs to jhbuild in toolbox there was a dozen of way to fail building the latest shell.

  • Distributions and Operating Systems

    • New Releases

      • Barry KaulerEasyOS Dunfell-series 64-bit version 4.5 released

        EasyOS Dunfell-series version 4.5 is a milestone release. The last release announced on Distrowatch was version 4.0, on June 9, 2022, over five months ago. There has been a lot of “water under the bridge” since 4.0, and the challenge now is to summarise the huge number of changes down into a short announcement…

        Here goes, an announcement blurb:
        The Dunfell-series of EasyOS is built from packages compiled from source using “meta-quirky”, a build system based on OpenEmbedded/Yocto (OE). The binary packages from a complete recompile based on Dunfell 3.1.20 release of OE was used to build EasyOS 4.5.

        There has been a major structural change, completely separating the EasyOS installation from the boot-loader, and the rEFInd/Syslinux bootloaders have been replaced with Limine. The latter handles both UEFI and legacy-BIOS computers.

        As the packages are cross-compiled from source, the repository is rather small compared to other distributions; however, this is compensated by a much increased collection of SFS files. These are large packages, even complete operating systems, that can run on the main filesystem or in a container. These are downloaded and installed by clicking on the “sfs” icon on the desktop — a very simple operation. New SFSs include Android Studio, Audacity, Blender, Openshot, QEMU, Shotcut, SmartGit, SuperTuxKart, VSCode and Zoom.
        It is expected that more will be added.
        SFSs can be thought of as being like appimages, snaps, or flatpaks, but more light-weight and flexible.

        Lots of packages have been updated, including the kernel now at 5.15.78 and Firefox is 106.0.5.

      • Alpine 3.16.3 released | Alpine Linux

        The Alpine Linux project is pleased to announce the immediate availability of version 3.16.3 of its Alpine Linux operating system.

    • BSD

      • FreeBSDFreeBSD 12.4-RC2 Now Available
        The second RC build of the 12.4-RELEASE release cycle is now available.
        
        Installation images are available for:
        
        o 12.4-RC2 amd64 GENERIC
        o 12.4-RC2 i386 GENERIC
        o 12.4-RC2 powerpc GENERIC
        o 12.4-RC2 powerpc64 GENERIC64
        o 12.4-RC2 powerpcspe MPC85XXSPE
        o 12.4-RC2 sparc64 GENERIC
        o 12.4-RC2 armv6 RPI-B
        o 12.4-RC2 armv7 BANANAPI
        o 12.4-RC2 armv7 CUBIEBOARD
        o 12.4-RC2 armv7 CUBIEBOARD2
        o 12.4-RC2 armv7 CUBOX-HUMMINGBOARD
        o 12.4-RC2 armv7 RPI2
        o 12.4-RC2 armv7 WANDBOARD
        o 12.4-RC2 armv7 GENERICSD
        o 12.4-RC2 aarch64 GENERIC
        o 12.4-RC2 aarch64 RPI3
        o 12.4-RC2 aarch64 PINE64
        o 12.4-RC2 aarch64 PINE64-LTS
        
        Note regarding arm SD card images: For convenience for those without
        console access to the system, a freebsd user with a password of
        freebsd is available by default for ssh(1) access.  Additionally,
        the root user password is set to root.  It is strongly recommended
        to change the password for both users after gaining access to the
        system.
        
        Installer images and memory stick images are available here:
        
        https://download.freebsd.org/releases/ISO-IMAGES/12.4/
        
        The image checksums follow at the end of this e-mail.
        
        If you notice problems you can report them through the Bugzilla PR
        system or on the -stable mailing list.
        
        If you would like to use Git to do a source based update of an existing
        system, use the "releng/12.4" branch.
        
        A summary of changes since 12.4-RC1 includes:
        
        o if_vxlan(4): Check the size of data available in mbuf before using
          them
        
        o ofed: allow using IPv6 address in rc_pingpong server
        
        o ssh: correct parse_cert_times case for hex "to" time
        
        o ipfw: Have NAT steal the TH_RES1 bit, instead of the TH_AE bit
        
        A list of changes since 12.3-RELEASE is available in the releng/12.4
        release notes:
        
        https://www.freebsd.org/releases/12.4R/relnotes/
        
        Please note, the release notes page is not yet complete, and will be
        updated on an ongoing basis as the 12.4-RELEASE cycle progresses.
        
        === Virtual Machine Disk Images ===
        
        VM disk images are available for the amd64, i386, and aarch64
        architectures.  Disk images may be downloaded from the following URL
        (or any of the FreeBSD download mirrors):
        
        https://download.freebsd.org/releases/VM-IMAGES/12.4-RC2/
        
        The partition layout is:
        
            ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label)
            ~ 1 GB  - freebsd-swap GPT partition type (swapfs GPT label)
            ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label)
        
        The disk images are available in QCOW2, VHD, VMDK, and raw disk image
        formats.  The image download size is approximately 135 MB and 165 MB
        respectively (amd64/i386), decompressing to a 21 GB sparse image.
        
        Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI
        loader file is needed for qemu-system-aarch64 to be able to boot the
        virtual machine images.  See this page for more information:
        
        https://wiki.freebsd.org/arm64/QEMU
        
        To boot the VM image, run:
        
            % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt  \
        	-bios QEMU_EFI.fd -serial telnet::4444,server -nographic \
        	-drive if=none,file=VMDISK,id=hd0 \
        	-device virtio-blk-device,drive=hd0 \
        	-device virtio-net-device,netdev=net0 \
        	-netdev user,id=net0
        
        Be sure to replace "VMDISK" with the path to the virtual machine image.
        
        === Amazon EC2 AMI Images ===
        
        FreeBSD/amd64 EC2 AMIs are available in the following regions:
        
          af-south-1 region: ami-0bb9241eb5b7ce3d6
          ap-south-1 region: ami-0527af8666dda5829
          eu-north-1 region: ami-0d6177cd754aa72dc
          eu-west-3 region: ami-08f680889e53634c2
          eu-south-1 region: ami-08ac6171a6fed25fb
          eu-west-2 region: ami-0fb4469bed6238be9
          eu-west-1 region: ami-0e8e36a247c8ed53d
          ap-northeast-3 region: ami-09c228acdad5d7a79
          ap-northeast-2 region: ami-0e7721f26bd4de3ec
          me-south-1 region: ami-0b02ae646b10c6de2
          ap-northeast-1 region: ami-0aec441df71470ea8
          me-central-1 region: ami-0d6ad0499882dce86
          ca-central-1 region: ami-0f2d11db9ea0b1aa4
          sa-east-1 region: ami-0b80e81dfe36d4fbb
          ap-east-1 region: ami-01e42305963671dc2
          ap-southeast-1 region: ami-0cd111eb6e15d09ec
          ap-southeast-2 region: ami-02cec3f2f7642419a
          eu-central-1 region: ami-04152d204e92e9f99
          ap-southeast-3 region: ami-0b73f7e14f7e0012d
          us-east-1 region: ami-0d6c71982e7c3f9e3
          us-east-2 region: ami-0a5c8791ac08ed8e0
          us-west-1 region: ami-068dd3ee6d391a9c2
          us-west-2 region: ami-02a1825d8f14de513
        
        These AMI IDs can be retrieved from the Systems Manager Parameter Store
        in each region using the keys:
        
        	/aws/service/freebsd/amd64/base/ufs/12.4/RC2
        
        FreeBSD/aarch64 EC2 AMIs are available in the following regions:
        
          af-south-1 region: ami-00c20ae46d8c9cb3e
          ap-south-1 region: ami-0ae33af93d0bebb0f
          eu-north-1 region: ami-06b32a5074a82fa79
          eu-west-3 region: ami-014bfd8fb0efa0959
          eu-south-1 region: ami-013b9ddd5a309a314
          eu-west-2 region: ami-041da668b00a5f253
          eu-west-1 region: ami-0020336a5d7d4d1cc
          ap-northeast-3 region: ami-03cd672d518d29d14
          ap-northeast-2 region: ami-047ad3d08bb9347f6
          me-south-1 region: ami-0f87d9fe1774c8e60
          ap-northeast-1 region: ami-08026b5278c3763ae
          me-central-1 region: ami-0f2e0e6e59eaaa35c
          ca-central-1 region: ami-01ace02b97682b91c
          sa-east-1 region: ami-0113afee2306ddb59
          ap-east-1 region: ami-09b5a1bcc45575039
          ap-southeast-1 region: ami-0538f0f2470e7e8cd
          ap-southeast-2 region: ami-0fbe1fc1c091462ec
          eu-central-1 region: ami-0fab18ffda73511e3
          ap-southeast-3 region: ami-0df8e3a770e4f6563
          us-east-1 region: ami-0c3f9257eff6424df
          us-east-2 region: ami-092f55aaddf0b33f8
          us-west-1 region: ami-0e4b71ec869a264df
          us-west-2 region: ami-02008ed41fe078a24
        
        These AMI IDs can be retrieved from the Systems Manager Parameter Store
        in each region using the keys:
        
        	/aws/service/freebsd/arm64/base/ufs/12.4/RC2
        
        === Vagrant Images ===
        
        FreeBSD/amd64 images are available on the Hashicorp Atlas site, and can
        be installed by running:
        
            % vagrant init freebsd/FreeBSD-12.4-RC2
            % vagrant up
        
        === Upgrading ===
        
        The freebsd-update(8) utility supports binary upgrades of amd64, i386,
        and aarch64 systems running earlier FreeBSD releases.  Systems running
        earlier FreeBSD releases can upgrade as follows:
        
        	# freebsd-update upgrade -r 12.4-RC2
        
        During this process, freebsd-update(8) may ask the user to help by
        merging some configuration files or by confirming that the automatically
        performed merging was done correctly.
        
        	# freebsd-update install
        
        The system must be rebooted with the newly installed kernel before
        continuing.
        
        	# shutdown -r now
        
        After rebooting, freebsd-update needs to be run again to install the new
        userland components:
        
        	# freebsd-update install
        
        It is recommended to rebuild and install all applications if possible,
        especially if upgrading from an earlier FreeBSD release, for example,
        FreeBSD 12.x.  Alternatively, the user can install misc/compat12x and
        other compatibility libraries, afterwards the system must be rebooted
        into the new userland:
        
        	# shutdown -r now
        
        Finally, after rebooting, freebsd-update needs to be run again to remove
        stale files:
        
        	# freebsd-update install
        
        
    • SUSE/OpenSUSE

      • Dominique LeuenbergeropenSUSE Tumbleweed – Review of the week 2022/45 – Dominique a.k.a. DimStar (Dim*)

        This week (the last weekend) has been a bit of a challenge for many of our users, due to an ill-prepared sudo config change. It was attempted to closer align how sudo works on other distros (using user’s password instead of root’s) but the configuration was far from complete and made nobody able to sudo anymore (su still worked, luckily). A heartfelt apology if you were hit by that. The change was reverted on Monday (through the update channel) to get you back to the usual config asap. But of course, the week was not defined by that one incident. Tumbleweed has been rolling on steadily with daily snapshots (1104…1110).

      • SUSE’s Corporate BlogOperate Kubernetes at scale with Clastix Kamaji and SUSE Rancher

        Clastix, a leader in Kubernetes multitenancy solutions, is now a SUSE ecosystem partner. Customers can now take advantage of innovative solutions that benefit from SUSE’s decades of engineering excellence and open source leadership coupled with Clastix’s unique solutions for Kubernetes deployments.
        Clastix has now published their Kamaji solution in the SUSE Rancher Apps and Marketplace catalog and we’ve invited Clastix for a guest blog so you can discover more about their solutions for Kubernetes multitenancy and deploying Kubernetes as a Service.

    • Fedora Family / IBM

      • ZDNetRed Hat Enterprise Linux 8.7 arrives | ZDNET

        If you haven’t switched over to the Red Hat Enterprise Linux (RHEL) 9 family, and your company lives and dies with RHEL, then chances are you’re running RHEL 8.x. If that’s you, pay attention because the latest version, RHEL 8.7, has just arrived at a download site near you.

        Why make a move at all? It’s not like RHEL 8.6 is going to fall apart on you. That’s true, but the latest RHEL does come with bigger, better security features. And, unless you’ve been hiding your head in the sand for the last few years, you know security attacks are happening more than ever.

      • Make Use OfRed Hat Enterprise Linux 8.7 Lands With Security, Server Adminstration Enhancements

        Red Hat has announced version 8.7 of its flagship Red Hat Enterprise Linux, or RHEL. The new release comes with a number of enhancements that aim to make server administration more manageable.

      • CentOSNovember Board Meeting Recap – Blog.CentOS.org

        The CentOS Board held its monthly meeting on Wednesday. The recording and minutes of that meeting are now available.

    • Canonical/Ubuntu Family

      • FOSSLinuxThe 20 best fonts for Ubuntu | FOSS Linux

        Despite more than 600 Linux distributions available for download today, Ubuntu stands out among the most popular distributions. That’s mainly because of the intuitive interface that makes it easy to use, even for beginners switching from a platform like Windows. Another reason is the large community support. If you encounter any problem while using Ubuntu, somebody is highly likely to have encountered those issues before and left a solution on Stack Overflow or Ubuntu forums.

        Like any other platform, Ubuntu also comes with several fonts installed. However, some users need to install additional fonts for different reasons. If you are one such person, you are lucky. This post will list the 20 best fonts you can install on your Ubuntu system.

      • Make Use OfUbuntu Desktop vs. Ubuntu Server: What’s the Difference?

        Unsure whether to choose Ubuntu Desktop or Ubuntu Server? Here’s what you need to know.

        Ubuntu ranks as arguably the most popular Linux-based operating system. It’s undoubtedly one of the best-known. However, Ubuntu varies quite a bit. Within Ubuntu, there are two distinct flavors: a stable release and long-term support (LTS) iteration.

        Further, Ubuntu splits into Ubuntu Cloud, Ubuntu Core, Ubuntu Desktop, and Ubuntu Server. Here, you’ll learn all about the differences between Ubuntu Server and Ubuntu Desktop.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Adventures with the mastodon herd

      All of the recent changes at Twitter inspired me to take a second look at mastodon. In short, mastodon is a federated social network that feels a bit like someone took Twitter and split it up into a vast network of independent servers.
      Why mastodon?
      It feels a lot like Twitter, but better.
      You can search for people, follow them, and publish messages (called toots). They can also follow you and see the messages you publish.
      The big difference is that you don’t join a central server with mastodon. There’s a massive network of servers to choose from and you can create accounts on one or more of those servers to get started. You can even run your own!
      Mastodon reminds me of email for many reasons:
      There’s no central server. You join a server (from the massive, growing list) and start publishing messages.
      Everything is on an eventual consistency model. If a mastodon server goes offline for a bit or has network issues, messages and other data will synchronize when it’s back online.

    • TechCrunchA beginner’s guide to Mastodon, the open source Twitter alternative – TechCrunch

      As Twitter users fret over the direction that new owner Elon Musk is taking the company, masses of users have hopped over to Mastodon, an open source Twitter alternative. Since October 27, when the SpaceX and Tesla CEO formalized his Twitter takeover, Mastodon has gained nearly 500,000 new users, effectively doubling its user base. But what is Mastodon, and should we all be getting our accounts set up?

      If you’re a Twitter purist who likes to use basic functionality like private DMing, quote-tweeting and user-friendly onboarding, Mastodon might not be for you. But if you’re looking to try something new on the social internet, then why not give Mastodon a whirl? Elon Musk isn’t there!

    • Mobilizon v3: Find events and groups throughout the fediverse! – Framablog

      Mobilizon is the alternative we have been developing since 2019 so that everyone can emancipate their events and groups from Facebook. Except, unlike Facebook, Mobilizon is not a single platform. It is a software that specialists can install on a server to create multiple events and groups platforms (called « instances »), which can be linked together within a federation.

    • Programming/Development

      • Ruby 3.2.0 Preview 3 Released

        We are pleased to announce the release of Ruby 3.2.0-preview3. Ruby 3.2 adds many features and performance improvements.

      • Sharing argparse arguments with subcommands

        argparse subcommands are great, but they have a quirk in which options are only available right after the subcommand that define them.

      • How to Make Vim the Default Editor for Git and OS in Ubuntu and Macos – LinuxWizardry

        Most git commands require you to either write or update a message. Typically, when you resolve a merge conflict or you try to modify a commit it opens up an editor for you to make the change. While this is not particular to Linux, on Linux systems you ussually have the option of using Emacs or Vim. By default git will use Emacs which in some cases can be annoying if you don’t know how to use it.

        In this article we are going to learn how to change the default editor to Vim so that any time you need to update a commit message or anything like that you get Vim to open up. Besically using the command below you can change the default editor to Vim

      • Ευάγγελος Μπαλάσκας – GitLab as a Terraform state backend – Evaggelos Balaskas – System Engineer

        Using Terraform for personal projects, is a good way to create your lab in a reproducible manner. Wherever your lab is, either in the “cloud” aka other’s people computers or in a self-hosted environment, you can run your Infrastructure as code (IaC) instead of performing manual tasks each time.

        My preferable way is to use QEMU/KVM (Kernel Virtual Machine) on my libvirt (self-hosted) lab. You can quickly build a k8s cluster or test a few virtual machines with different software, without paying extra money to cloud providers.

        Terraform uses a state file to store your entire infra in json format. This file will be the source of truth for your infrastructure. Any changes you make in the code, terraform will figure out what needs to add/destroy and run only what have changed.

      • Stack OverflowStop requiring only one assertion per unit test: Multiple assertions are fine – Stack Overflow Blog

        Assertion Roulette doesn’t mean that multiple assertions are bad.

        When I coach teams or individual developers in test-driven development (TDD) or unit testing, I frequently encounter a particular notion: Multiple assertions are bad. A test must have only one assertion.

        That idea is rarely helpful.

      • Medevel5 Open-Source JavaScript Data Chart Libraries Worth Considering

        Every business and organization has unique data requirements that a simple JavaScript timeline chart cannot satisfy. Consequently, a trusted and reliable JavaScript Chart Library is required. Effective data presentation is becoming more and more crucial in this digital age. This aids advancement and competitive analysis for firms and organizations. Continue reading to learn more about some top JavaScript chart libraries.

      • Perl / Raku

        • PerlThis Week in PSC (086) | Perl Steering Council [blogs.perl.org]

          We’re trying out new ways to send out these regular announcements of what we get up to on the Perl Steering Council. This will be a regular posting that gives a brief summary of what we discussed in our weekly (or at least, near-weekly, give or take scheduling clashes) meetings.

  • Leftovers

    • Tim Brayongoing by Tim Bray · Just Don’t

      Sometimes it’s wrong to begin a phrase with the word “just”. I offer as evidence two such situations. I think there’s a common thread to be drawn.

      Stuck · People with mental-health issues can get stuck. For example, when some combination of depression and anxiety means they can’t get out of bed all day, and can’t say why. Or when they really need to get dressed or packed or organized for some imminent un-reschedulable event, and can’t get started.

      It would be easy to  — sorry, it is easy, I know this because I have — say something like “Just stand up and look out the window, it’s sunny.” Or “Just grab some random underwear and drop them in the suitcase, then you’ll be started”. Or “Just get the binder out of your knapsack and look at the first page.”

      This. Will. Not. Help.

    • It’s not you.. A mental model for addressing burnout | by Dan Pupius | Oct, 2022 | Writing by Dan Pupius

      Last week I was on a panel addressing the topic of burnout. It’s a topic that pops up with some frequency, yet the misconception that burnout is a personal problem seems to persist.

    • Health/Nutrition/Agriculture

      • Digital First MediaUM’s Mott Children’s Hospital at 100% capacity amid respiratory virus surge

        Michigan Medicine’s C.S. Mott Children’s Hospital on Thursday said it has reached capacity and is experiencing a pediatric bed shortage as respiratory virus cases surge in children and flu season begins.

        Corewell Health East, previously known as Beaumont Health, treated 571 pediatric RSV cases in the week of Oct. 31 to Nov. 6, up from 72 during the last week in September.

        The Helen DeVos Children’s Hospital in Grand Rapids, operated by Corewell Health West, typically sees 145 kids a day in its Emergency Department but is now averaging over 225 cases a day. The hospital typically operates 24 beds in the intensive care unit but reported having 42 ICU patients on Wednesday. Around 60 children receiving inpatient care at the Hellen DeVos Children’s Hospital had RSV as of Wednesday.

        “We have never seen a surge in pediatric respiratory viruses like this before. Our hospital is 100% full,” Luanne Thomas Ewald, chief operating officer at Mott and Von Voigtlander Women’s Hospital, said in a news release. “This is incredibly concerning because we haven’t even seen the full impact of flu season yet.”

        Other hospitals also are experiencing high levels of RSV cases, but the pediatric intensive care unit occupancy rate in Michigan has dipped. Statewide data indicates an 86% pediatric ICU occupancy as of Thursday, down from 89% last Friday.

    • Proprietary

      • Microsoft is phoning home the content of your PowerPoint slides. | Roger Mexico’s Oscillator

        Were you aware of it: Microsoft is phoning home the content of your PowerPoint slides.

        Don’t just take my word for it: open up the network monitor of your choice. Close all of your other applications or perform a fresh restart.

        Fire up PowerPoint. Turn off all the cloud options. Make a new slide with a title of your choice. Choose “Designer.” Look at your network traffic as you do.

        It makes sense: the tool is reading your text and suggesting designs/delivering stock photography. But this means that any data that you might want to keep private is being sent to Microsoft.

        Did we consent to this?

    • Security

      • LWNSecurity updates for Friday [LWN.net]

        Security updates have been issued by Debian (chromium and exiv2), Fedora (curl, device-mapper-multipath, dotnet6.0, mediawiki, mingw-gcc, and php-pear-CAS), Gentoo (lesspipe), Slackware (php), SUSE (git, glibc, kernel, libarchive, python, python-rsa, python3-lxml, rpm, sudo, xen, and xwayland), and Ubuntu (wavpack).

      • Hacker NewsExperts Uncover Two Long-Running Android Spyware Campaigns Targeting Uyghurs

        Two long-running surveillance campaigns have been found targeting the Uyghur community in China and elsewhere with Android spyware tools designed to harvest sensitive information and track their whereabouts.

        This encompasses a previously undocumented malware strain called BadBazaar and updated variants of an espionage artifact dubbed MOONSHINE by researchers from the University of Toronto’s Citizen Lab in September 2019.

      • Reproducible Builds in October 2022 – reproducible-builds.org

        Welcome to the Reproducible Builds report for October 2022! In these reports we attempt to outline the most important things that we have been up to over the past month.

      • Hacker NewsMalicious Google Play Store App Spotted Distributing Xenomorph Banking Trojan

        Both the apps function as a dropper, meaning the apps themselves are harmless and are a conduit to retrieve the actual payload, which, in the case of Todo, is hosted on GitHub.

      • Bruce SchneierNew Book: A Hacker’s Mind – Schneier on Security

        I have a new book coming out in February. It’s about hacking.

        A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about hacking computer systems; it’s about hacking more general economic, political, and social systems. It generalizes the term hack as a means of subverting a system’s rules in unintended ways.

        What sorts of system? Any system of rules, really. Take the tax code, for example. It’s not computer code, but it’s a series of algorithms—supposedly deterministic—that take a bunch of inputs about your income and produce an output that’s the amount of money you owe. This code has vulnerabilities; we call them loopholes. It has exploits; those are tax avoidance strategies. And there is an entire industry of black-hat hackers who exploit vulnerabilities in the tax code: we call them accountants and tax attorneys.

        In my conception, a “hack” is something a system permits, but is unanticipated and unwanted by its designers. It’s unplanned: a mistake in the system’s design or coding. It’s subversion, or an exploitation. It’s a cheat—but only sort of. Just as a computer vulnerability can be exploited over the Internet because the code permits it, a tax loophole is “allowed” by the system because it follows the rules, even though it might subvert the intent of those rules.

      • Make Use OfWhat Is the VENOM Vulnerability and How Can You Protect Yourself From It?

        The VENOM vulnerability affects all major CPU vendors, including Intel, AMD, and ARM. VENOM allows malicious actors to read the content of your computer’s memory and potentially execute code remotely.

        If you have a vulnerable CPU, your computer may be at risk, so it’s crucial to know how to protect yourself against this exploit!

      • Privacy/Surveillance

        • Citizen LabA Good Start: ETHI Report on Facial Recognition Technology Informed by Citizen Lab Research and Recommendations — But Has Room for Improvement – The Citizen Lab

          In early October 2022, the House of Commons Standing Committee on Access to Information, Privacy and Ethics (“ETHI”) released the final report from their study on the “Use and Impact of Facial Recognition Technology”: Facial Recognition Technology and the Growing Power of Artificial Intelligence. The report concluded what prior Citizen Lab research has indicated, which is that “Canada’s current legislative framework does not adequately regulate FRT [facial recognition technology] and AI [artificial intelligence]. Without an appropriate framework, FRT and other AI tools could cause irreparable harm to some individuals.” The report includes nineteen recommendations to the federal government to address this issue.

          Many of ETHI’s key findings and recommendations align with research and recommendations provided in previous Citizen Lab reports and submissions concerning algorithmic policing technologies and similar government systems. These include, for example, To Surveil and Predict: A Human Rights Analysis of Algorithmic Policing in Canada and Bots at the Gate: A Human Rights Analysis of Automated Decision Making in Canada’s Immigration and Refugee System—both published in collaboration with the International Human Rights Program (IHRP) at the University of Toronto Faculty of Law—and a joint submission with the Women’s Legal Education and Action Fund (LEAF) to a public consultation by the Toronto Police Services Board regarding its proposed Use of Artificial Intelligence Technology Policy.

        • Citizen LabCynthia Khoo Delivers Testimony to the Standing Committee on Access to Information, Privacy and Ethics – The Citizen Lab

          On March 21, 2022, Citizen Lab fellow Cynthia Khoo appeared before the House of Commons Standing Committee on Access to Information, Privacy and Ethics (ETHI) as a witness in the Committee’s study on the use and impact on facial recognition technology. She was invited to provide testimony on the potential harms and human rights implications of facial recognition, including recommendations for how the Government of Canada should regulate such technology. Below is a written copy of her formal remarks.

    • Internet Policy/Net Neutrality

      • Michael GeistIndependence Lost: Why Bill C-18 Undermines An Independent Press Even as It Purports to Protect It

        Last week, I appeared before the Standing Committee on Canadian Heritage as part of the last panel of witnesses on Bill C-18, the Online News Act. For the first time since the start of the pandemic I attended in person, which provided the opportunity to witness a scene that partly occurred off-camera. NDP MP Peter Julian started his questioning by citing with approval a Postmedia editorial, itself based on a Brian Lilley column. The editorial expressed support for Bill C-18, criticized Facebook, and took the Conservatives to task for not being more supportive of the proposed legislation. Seeing an NDP MP rely on a Lilley-inspired Postmedia editorial was strange enough, but adding to the weirdness was Liberal MP Lisa Hepfner scrambling to find the editorial on her phone and showing it around to caucus colleagues. While some might merely chalk this up to a common enemy – Facebook – I believe there is a bigger enemy at work, namely the loss of an independent press.

        I’ve written before about how Bill C-18 is bad for press independence, stating:

        I know of cases where opinion pieces have been spiked by mainstream media outlets because they criticized the previous Heritage Minister at a time when he was being actively lobbied on a potential media bill. Those decisions come on top of blank front pages and advertorials designed to curry support for the measures. The blurring of editorial and financial may be a fact of life, but it ultimately diminishes the credibility of the media.

  • Gemini* and Gopher

    • Personal

      • Divorce All But Done

        Final papers sent in and I’m expecting response early next week. Then all of the practicalities are over. I’ll be the singular owner of the flat I live in and… uhm… I think I might sell it.

        It’s a one bedroom flat, and a two bedroom flat in the next building is out for sale for a decent price. I’m in discussions with a realtor about it and am going to talk to the bank next week.

      • If you played RuneScape in 2001-2012, you might have lost media

        If you’re not aware, RuneScape was an online java game created in 2001. The game was being continually updated with over 400 different versions existing, but the developers didn’t implement any full version control until 2012 (aside from a single tape backup they found of 2007).

        Therefore we’re appealing here to see if anybody has it saved on an old computer, or hard drive. Even if you just played it once for a minute to see what it was then never again, you should have the full game data, because it was automatically downloaded via browser.

      • 🔤SpellBinding: DNORYWU Wordo: CLOUT
    • Technical

      • An Exercise In Frustration

        In my circle of friends and family, I stand alone when it comes to using or even trying alternatives to proprietary silos and privacy-oriented apps and services. I’m the only one off social media, which isn’t surprising. I even deleted WhatsApp! However, it’s been nearly impossible to bring people over to any alternative I suggest, even just to try.

        Don’t even get me started on trying to shift from iOS or Windows. Any time I even bring up Linux I immediately get eye-rolls and dismissals. On top of that I’m sometimes chided for making my life, and somehow there’s, more difficult. They get irritated that they can’t add me on WhatsApp or that my email isn’t a “normal” Gmail. In turn I myself get extremely frustrated and disheartened.

      • Common LISP Problems

        One is expected to use emacs, and let it do whatever it does by way of indentation. If you show code not in emacs style, you’ll probably get yelled at, a point mfiano also touches on. A request for a tool that accepts LISP on standard input and emits properly formatted code on the output met with silence. And the default style looks like one of those print jobs where the carriage return never happen and the text helpfully stairsteps right off the page. I lean towards the low end of the optimal line length range, and almost never set my terminals wider than 80 columns.

      • “a practical guide to evil” was a good web serial

        as of now, the practical guide is still publically available for free on the wordpress site linked above, but ErraticErrata announced a publishing deal with a sketchy-ass mobile app called yonder, where it will be sold on a per-chapter basis as a sequence of microtransactions. the serial would very much benefit from an editor, and i would love it if it were eventually published as either a normal ebook or a traditional paper book, but i really don’t like this move as a whole.

      • Science

        • LP Records and analog sound

          Back when I was a young man, I was ready to jump on every new bandwagon. Screw the old stuff, new stuff is better, right?

          I got my first CD player early in the 80s, when I was trying to pretend to be a yuppy. I had a portable (roughly twice the size of an average walkman… Although I had a really tiny walkman smaller than a cassette case, that popped up and clamped onto the tape). Anyway, the sound was amazing (I thought), even through shitty foam-padded crapphones of the 80′s. No static at all…

          I know for a fact that my hearing is not what it was then (my kids hear frequencies I don’t). But today I am listening to Steely Dan’s Royal Scam on a low-end Audio-Technica turntable and those transparent Harman-Cardon speakers from some years back, and it’s freakin’ amazing. And digital stuff sounds just so-so.

        • Creating a pleasant to use dataset

          As a PhD student in robotics I’ve had the need to use several datasets, some more pleasant to use than others. This is a list of general guidelines, tips and often overlooked aspects than can make a dataset more pleasant to use. By pleasant to use I mean spending as little time as possible in downloading, pre-processing and using a dataset in order to maximize the time spent on actual research. Although the guidelines are mostly focused on robotics and computer vision datasets, most of them should be applicable to other domains as well.

          [...]

          Distributing uncompressed data results in slower downloads for users and increased storage space requirements for hosting the dataset. The ZIP format is a good candidate since it performs compression by default and can be easily decompressed on virtually any operating system.

          If your dataset is larger than 4 GiB it’s a good idea to split it into multiple ZIP archives for compatibility with older filesystems and beacause smaller downloads are less likely to be interrupted. If you do split the dataset prefer splitting it into independent ZIP files instead of a so called split or spanned ZIP archive. A split ZIP archive requires all of the individual ZIP files in order to be decompressed forcing users to download the whole dataset even if they’re only interested in a small part of it.

      • Internet/Gemini

        • Endemic Technologies

          There are stillborns. They born to die. We usually learn about them from happy threads on reddit and HN. It doesn’t even make sense to list them, there are thousands of them.

        • Fediverse is growing

          There is a long discussion about Twitter on the Internet. As the result, we are observing that many users joined Fediverse. Fediverse is very varied, so it’s hard to measure that. But it is said for eg. by [Mastodon Users Bot] that in the last week there were almost 700,000 new users on Mastodon. It’s about 10% of the overall user base. It has an impact on every server, and probably on every timeline, there were many introductions and new faces. Of course, in comparison to the 238,000,000 Twitter user base, it isn’t a big deal. However, one can risk a statement that these are the users who are closest to the idea of Fediverse. Because they were able to make an effort to change their habits. The rest of the users could change their minds as a snowball effect, the last and biggest group of them will be the least important event. They will do what they will have to do after collapsing Twitter.

          [...]

          I’ve realized that, and it isn’t good information. The current situation is like a special breeding ground for rare bacteria. The thought of a small network is slowly developing. Information rarely infects a new user. By increasing the surface of the experiment, we only dilute the essences. Despite the larger base, the development will slow down.

          The good thing is that there are special instances of Mastodon, like for eg. sdf.org and other Pubnixes. Maybe to reconcile users and their needs there will be introduced features with Local timeline, than Federated ones, in the future. Or maybe we are observing changes, which will be made small-net discussion go somewhere else?


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

2023 Should be the Year You’ve Lived Without Social Control Media (Any of It!)

Posted in Deception at 11:39 am by Dr. Roy Schestowitz

Video download link | md5sum dee2cd6893c97f1cd360788441b92ca6
2022 and the Social Control Media Tumble
Creative Commons Attribution-No Derivative Works 4.0

Summary: Social Control Media (or social control networks) is a failed experiment which left society worse off; it's time to press "eject"

THE FOSS-centric blogosphere has lot to say about Mastodon; some rightly bring up caveats and misconceptions about Mastodon.

I myself left Mastodon (and Pleroma) almost 2 years ago, having lost several accounts. All the instances in which I had an account no longer exist and having researched what it takes to run one (technically, not even factoring in the moderation tasks) I decided to never ever get involved in Mastodon… ever again. People invited me and I politely declined.

Almost a year ago I quit the remainder of Social Control Media, having come to the conclusion it was dying anyway and was rapidly becoming a waste of time/effort.

Looking back, not only was this decision correct; it was years overdue, i.e. I wish I had done this years earlier!

“Many politicians rely almost entirely on Facebook and Twitter for public presence/visibility.”Facebook lost about 80% of its "market value" in just one year and Twitter is collapsing at an alarming rate (the latest report we saw is entitled “Musk warns of Twitter bankruptcy as more senior executives quit”). This is not a joke; this will have profound impact on many people, companies, and countries. Many politicians rely almost entirely on Facebook and Twitter for public presence/visibility.

There aren’t just concerns about whether those platforms go offline, partly or fully. There are legitimate, well-founded (with a growing body of evidence already) concerns associated with ownership. Do “Democrats” (politicians on the “corporate left” in the US) realise that if they still “tweet” they do so while ‘bossed’ by a Republican called Elon Musk? Musk may brand himself “libertarian” or whatever, but days ago he alienated millions of Twitter users by unmasking himself as a booster of the violence party, a supporter of political militancy; he is also a cheerleader of “regime change” abroad (for natural resources of other countries; he wants to destroy other countries for Tesla batteries).

Do people want a ‘boss’ like this? He wants them not only to work for him ‘for free’… he wants to charge them a hefty monthly fee during economic crises. He can ban and hide “tweets” or users (at arbitrary whims)… some users report that this is already happening. We’ll see more and more of that (see Daily Links).

“Mr. Musk says he wants to authenticate all users. Well, that would eliminate many dissident accounts overnight.”Regarding Facebook, an associate has said that it doesn’t need so many people anymore now that the election has been tripped up properly. “Also,” he said, “people realize that although addicted social control media is a waste of time.”

We spoke about other long-term harms of social control media participation. People classify themselves for discrimination/punishment at the hands of future tyrants by enabling creation of “lists”. “Many countries have laws prohibiting making such lists especially when they encompass politics or ethnicity or religion,” the associate said. “Facebook does this explicitly as well as being able to generate more fine-tuned lists by aggregating several of the data points they collect on people. They not only do they have those lists as explicit data points but also can generate them and worse on the fly.”

Facebook already has some “real name” policies; is Twitter next to become as dangerous as Facebook? Mr. Musk says he wants to authenticate all users. Well, that would eliminate many dissident accounts overnight.

“Musk neither knows what he is doing nor cares,” our associate noted. “It is a mystery how he or his sponsors are going to recover $44bn from what’s left of Twitter. Maybe throw a few more elections over time. Like they’ve helped do so far. Eliminating ‘dissident’ accounts would be a happy side effect for his sponsors. They have an active history in suppressing dissidents, with or without the use of tandoori ovens.”

“Some people openly say that they’re quitting Twitter and going (back) to blogging.”For those who’ve missed it, a lot of the money for Musk’s takeover of Twitter came from the “royal” family of Saudi Arabia, which has a long tradition of controlling Twitter in the shadows, both from outside and the inside. Twitter tolrates some forms of political extremism (until it’s way too much), but not others.

People who have witnessed the ills of social control media can see this happening over and over again. There’s no benign or benevolent social control network; the whole paradigm is flawed and it becomes toxic over time. Some people openly say that they’re quitting Twitter and going (back) to blogging. Join these people.

Microsoft Shifting the Blame to Those Who Discover Microsoft’s Bug Doors and Exploit Windows Users

Posted in Deception, Microsoft, Security at 10:57 am by Dr. Roy Schestowitz

Video download link | md5sum a8af0b3937c382b8eea605fb27b1a2c7
Microsoft and Racism to Save Face
Creative Commons Attribution-No Derivative Works 4.0

Summary: Microsoft is trying to portray itself as some kind of moral and responsible security guru whilst its own actions suggest the exact opposite; some in the media play along with Microsoft’s false framing/narrative

THIS morning saw not only one article but three articles (just minutes apart) that blame “Russia” for what seems to be Windows breaches. Those 3 were in my RSS feeds, but it’s easy to imagine there are many dozens like them (also not in the English language) blaming “Russia” rather than what Russia may or may not be exploiting (maybe it’s not Russia at all; the attribution is taken at face value without independent fact-checking; see “Marble Framework” in Vault 7 and CIA leaks).

“We already encountered this kind of spin last year when Microsoft blamed “China”.”The video above discusses those three articles [1, 2, 3], which we’ve already included in Daily Links. We already encountered this kind of spin last year when Microsoft blamed "China".

To paraphrase an associate, the various so-called ‘news’ sites seem to be wrongly blaming the Mediabank breach on either a) not paying the ransom, or b) the ransomware gang itself, instead of where the blame really lies: Microsoft and those that brought Microsoft product into the working environment.

Techrights: How It Started in 2006

Posted in Site News at 10:12 am by Dr. Roy Schestowitz

Video download link | md5sum abac32879945bec39b30d1d37d9ce05b
16 Years Ago…
Creative Commons Attribution-No Derivative Works 4.0

Summary: Now that we’re entering our 17th year it’s worth looking back at why we’re called Techrights (for 12.5 years already) and how it all started (in Digg.com)

TELLING the story over and over again may seem pointless, but readers deserve to know how the site started now that we’re 16 and growing (very promising changes soon, including a new CMS we develop). I’m way beyond certain we’ll exceed 20 years and maybe 25 years, too. We don’t need to sell out.

“We’ll probably add more protocols in the next few years; the World Wide Web is waning.”Techrights has occupied nearly half my life and more importantly it gave a voice to countless people who wrote both/either anonymously or with full attribution by name. With 34,962 blog posts at this time we’re only days away from the coveted 35,000 milestone. It’s the labour of love and collaboration, I’m just the faithful editor. We research topics meticulously to ensure what we publish is accurate. Our track record is perfect when it comes to source protection and we rarely publish errors (if we do, we correct them as soon as possible).

Our IRC channel started in early 2008, i.e. 14.5 years ago, and our Gemini capsule turns 2 later this winter. Our text bulletin started just over 2 years ago; the same goes for IPFS. We’ll probably add more protocols in the next few years; the World Wide Web is waning.

Links 11/11/2022: Toward Matrix Support in Chats

Posted in News Roundup at 8:17 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • OpenSource.comHow to switch from Twitter to Mastodon | Opensource.com

        Like many people, I find social media somewhat exciting and also…a bit much. Sometimes you get deep-fried in algorithms, tracking data, and ads catered especially for you. You lack administrative control over what you want to see, especially on the old platforms many of us are used to. As usual, you must look to open source to fix the problem. And that’s exactly what Mastodon, an open source microblogging community, does.

        With Mastodon social, not only are you working with open source software, but everything is decentralized, which means you can pick what you want to see partly based on the instance you want to occupy. Mastodon uses separate instances, each with its own code of conduct, privacy options, and moderation policies. That means that when you join an instance, you’re less likely to see the stuff you’re not interested in and more likely to see messages from people who share your interests.

        However, you can also interact with other instances. All Mastodon installs have the potential to be “federated” in what its users call the “fediverse.”

    • Audiocasts/Shows

    • Kernel Space

      • Debugging Unrecoverable GPU Hangs – Danylo’s blog

        I already talked about debugging hangs in “Graphics Flight Recorder – unknown but handy tool to debug GPU hangs”, now I want to talk about the most nasty kind of GPU hangs – the ones which cannot be recovered from, where your computer becomes completely unresponsive and you cannot even ssh into it.

        How would one debug this? There is no data to get after the hang and it’s incredibly frustrating to even try different debug options and hypothesis, if you are wrong – you get to reboot the machine!

        If you are a hardware manufacturer creating a driver for your own GPU, you could just run the workload in your fancy hardware simulator, wait for a few hours for the result and call it a day. But what if you don’t have access to a simulator, or to some debug side channel?

      • Barry KaulerKernel 5.15.78 TCP syncookie enabled

        For a very long time, like forever, the firewall in EasyOS has complained about “TCP syncookie” not supported.

    • Applications

      • PurismToward Matrix support in Chats – Purism

        We have been aiming for proper Matrix support for the Chats application since the beginning of its development.

        The initial support for Matrix was provided with the purple-matrix plugin. It had rudimentary Matrix support for non-encrypted chats and decryption (but not for encryption).

        This plug-in has been unmaintained for quite a long time and making it work flawlessly would have been a bit difficult. It is limiting us to the libpurple workflow, and adding signals with callbacks would result them in being APIs which can’t ever be modified.

      • MedevelAppFlowy: an Open source Collaborative Note-taking for Creative Teams

        AppFlowy.IO is a free open-source note-taking software for teams. It allows you to create almost anything you want in a writing canvas, such as tasks, kanban boards, and more.

        AppFlowy is written in Flutter/ Dart, and it uses Rust for the backend.

        Compared to Notion, AppFlowy allows you to organize your text and paragraphs better, and use Markdown with a straightforward WYSIWYG editor.

      • It’s FOSSMeet Tabby, A New Open-Source Cross-Platform Terminal App

        There are a lot of terminal apps out there that offer a range of functionalities.

        So, what’s unique about Tabby?

        Tabby is a cross-platform customizable terminal app with SSH integration. It is a terminal emulator that does not try to be a new shell or Cygwin replacement.

        Let’s take a look at what Tabby aims to be.

      • It’s FOSSFOSS Weekly #22.42: Must Know Commands, New Apt Tool, Teams on Linux and More

        There is no crossword or any other puzzle this week except the answer for the puzzle in the previous newsletter.

        This is mostly because we’ve run out of ideas. Want to help and suggest some interesting topics for the Linux puzzles? Don’t hesitate to hit the reply button.

    • Instructionals/Technical

      • OpenSource.comDrop swap for zram on Linux | Opensource.com

        I spend a lot of time playing (I mean working) on my computers, and I’ve found a lot of interesting things. One that has most recently come to my attention is the zram0 device. I first noticed it when working on one of my Opensource.com articles several months ago.

        [...]

        When I began researching zram, all I found were a couple of basic articles about using zram for swap space. At first, this seemed a bit counterintuitive to me. After all, if you’re running out of RAM and you swap pages into a virtual drive in RAM, what’s gained?

        …]

        The rest of the page is about details, benefits, side effects, and feedback.

      • Linux HandbookHow to Show Process Tree in Linux

        So you used the killall command and it killed the parent process making your hours of work at waste?

        Well, I went through the same so it is always a better idea to check the parent processes, and listing the ongoing processes in tree manner is a good idea.

      • Checking changelogs with zypper – Zoltán’s Blog

        I have heard way to often the question from Linux and specially SUSE Linux users that “How can I check the changelog of a package or new version of a package available on the repository, but not yet installed”.
        There was no easy answer for that question, so I have decided to make a little tool for that.

      • DebugPointHow to Install Pantheon Desktop in Arch Linux [Beginner’s Guide]

        Pantheon is the default desktop environment for the elementary OS. This quick guide explains the steps to install the Pantheon desktop environment in Arch Linux.

        Pantheon is a beautiful desktop environment used by the elementary OS. It is based on GTK3 (GTK4 porting in progress) and Vala and is a nice and clean desktop that provides you with a refined experience of a Linux desktop.

        The desktop is primarily used by the elementary OS. Elementary OS provides a modified version of Pantheon desktop, which is based on the GNOME software base.

      • DebugPointHow to Install Xfce Desktop in Arch Linux [Complete Guide]

        This guide explains installing the latest Xfce desktop in Arch Linux. The guide explains the steps for the latest Xfce desktop release. However, it works for any Xfce version as well.

        The first part of the guide explains the steps for installing the base Arch system. The second part is installing the complete Xfce desktop on Arch Linux.

      • DebugPointHow to Install Packages from AUR in Arch Linux

        Simple tutorial for setting up your Arch Linux system to install packages from Arch User Repository (AUR).

        Arch Linux has several repositories. The official and stable ones are community, core, extra and multilib. These four main repo contains thousands of applications and packages which you can install using pacman command.

        However, another repo called Arch User Repository (AUR) primarily enables anyone to upload and distribute their application to end users. AUR is very popular since you can literally find everything in this repo.

      • DebugPoint4 Ways to Install deb Files in Ubuntu [Beginner’s Guide]

        This absolute beginner’s guide explains the steps required to install deb (*.deb) files in Ubuntu. This applies to all Ubuntu-based Linux distributions such as Linux Mint, elementary OS, etc.

  • Distributions and Operating Systems

    • SUSE/OpenSUSE

      • OpenSUSEGit, PostgreSQL, Btrfs update in Tumbleweed


        This week saw a new all-time high of continuous openSUSE Tumbleweed snapshots released, which surpasses the previous streak of 26.

        That streak continues and the snapshots have provided a few major version software updates along with several bug fixing updates.

    • Fedora / Red Hat

      • ZDNetRed Hat Enterprise Linux 8.7 arrives | ZDNET

        If you haven’t switched over to the Red Hat Enterprise Linux (RHEL) 9 family, and your company lives and dies with RHEL, then chances are you’re running RHEL 8.x. If that’s you, pay attention because the latest version, RHEL 8.7, has just arrived at a download site near you.

        Why make a move at all? It’s not like RHEL 8.6 is going to fall apart on you. That’s true, but the latest RHEL does come with bigger, better security features. And, unless you’ve been hiding your head in the sand for the last few years, you know security attacks are happening more than ever.

      • Fedora ProjectCPE Weekly Update – Week 45 2022 – Fedora Community Blog

        We provide you with both infographic and text versions of the weekly report. If you just want to look at what we did quickly, look at the infographic. If you are interested in more in-depth details look at the text version.

      • Enterprisers ProjectIT security: 3 areas to prioritize for the rest of 2022

        As 2022 winds down, it’s tempting to allocate all IT brain power and resources to 2023 planning. But it would be a mistake to assume that there are no remaining agenda items to address this year. The evolving cybersecurity landscape means new vulnerabilities and attack methods are continually emerging.

        While combating these threats is undoubtedly a priority for the year ahead, here are three key areas that should be dealt with before you close the door on 2022.

      • Red Hat OfficialUnix vs Linux: The history of how Unix started and influenced Linux | Enable Sysadmin

        Many of the commands in 1972′s Unix 2nd edition are still used in today’s Linux. Learn how Unix started and how it’s changed over time.

    • Canonical/Ubuntu Family

      • UbuntuAuto-scaling of Intel FlexRAN components based on MicroK8s and Ubuntu real-time kernel support

        RAN has incrementally evolved with every generation of mobile telecommunications, thus enabling faster data transfers between user devices and core networks. The amount of data has increased more than ever with an increase in the number of interlinked devices. With existing network architectures, challenges lie in handling increasing workloads with the ability to process, analyse and transfer data faster.   The 5G ecosystem requires virtual implementations of RAN. Fifth-generation mobile networks demand more flexibility to adapt, scalability to meet network conditions on run time, and automation for remote management which could only be delivered through virtualised RAN.  

        Intel FlexRAN addresses the challenges of traditional RAN architectures. It has the ability to abstract the underlying hardware from core network functions for optimal resource utilisation. FlexRAN is an enhancement and reference implementation of O-RAN (OpenRAN) with the flexibility of interoperation between different vendors’ equipment. Support for EPA (Enhanced Platrofrm Awareness) features empowers Intel FlexRAN to optimally run on Linux distributions. Canonical’s Ubuntu real-time kernel support and Intel’s FlexRAN both complement each other to enable telcos and mobile operators to scale resources as per needs and benefit from cost-savings. 

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Document FoundationSay hello to the team at The Document Foundation! – The Document Foundation Blog

        Joining a free and open source software project, such as LibreOffice, is a great way to build your skills, gain experience for future career options, meet new people – and have fun!

        But sometimes, joining a large and well-established project can be a bit daunting at the start. So here we’ll introduce you to the small team at The Document Foundation, the non-profit entity behind LibreOffice. Most team members oversee certain sub-projects in the LibreOffice community – click on their names to learn more in interviews…

    • Licensing / Legal

      • The Register UKGitHub’s Copilot faces first open source copyright lawsuit • The Register

        GitHub Copilot, Microsoft’s AI-driven, pair-programming service, is already wildly popular. Microsoft broke out GitHub’s revenue and subscription numbers in its latest quarterly report for the first time.

        GitHub now has an annual recurring revenue of $1 billion, up from a reported $200 to $300 million when it was acquired. It now boasts 90 million active users on the platform, up from last November’s 73 million. Much of its recent revenue and subscriber jump can be ascribed to CoPilot. Too bad the party may soon be over.

    • Programming/Development

      • Perl / Raku

        • DEV CommunityA gaze of iterators! – DEV Community

          This blog post provides an introduction to iterators in the Raku Programming Language.

          It requires some basic understanding of Raku code. One could consider the Don’t fear the grepper! series as a prerequisite for this series of blog posts.

          [...]

          This concludes the first part of the introduction to iterators, and possibly to the Raku Programming Language.

          It introduced the iterator and ^methods methods, as well as the pull-one method and the special IterationEnd sentinel value for iterators. And it casually introduced the := binding operator and the =:= identity operator.

          Questions and comments are always welcome. You can also drop into the #raku-beginner channel on Libera.chat, or on Discord if you’d like to have more immediate feedback.

      • Shell/Bash/Zsh/Ksh

        • CNX SoftwareArduino Lab for MicroPython – An experimental cross-platform MicroPython IDE for Arduino boards – CNX Software

          Arduino boards have traditionally been programmed with C-like language in the Arduino IDE, but with the Arduino Lab for MicroPython, Arduino added MicroPython to several official Arduino boards.

        • DebugPoint6 Best Python IDE(s) and Code Editor(s) [Ed: This list starts with proprietary software that lets Microsoft spy on the user, which kind of invalidates it]

          We list the six best Python code editor(s) for Ubuntu and other Linux distros and Windows in 2022.

          Python is everywhere today, and it is arguably the C programming language of the modern era. You can find Python everywhere, from websites, apps, data science projects, and AI to IoT devices. So being a popular programming language of this decade, it is essential to know the development environment of Python, where developers create applications, especially if you are starting afresh.

          Many Python development environments are available with features and utilities catering to your need. Some of them are useful for beginners learning Python by setting up the environment and other users for heavy Python development and complex setups.

          In this post, I will touch upon the best of them that would help you pick one for your need and use case.

  • Leftovers

    • HackadayDot-Painting Graffiti Machine Is Wonderfully Simple

      Traditionally, when many of us think of graffiti, we think of artists spraying away with simple paint cans. However, there’s often a lot of tech and art that goes into the field these days. [Vitaly Tesh] built himself a impressive dot-painting spray rig that’s really rather nifty.

    • Hardware

      • HackadayUpgrading A Line Trimmer With 3D Printed Parts

        Many have complained about the hassle of rewinding their weed whackers with fresh trimmer line. Manufacturers responded by making models with solid plastic blades instead. Some of these suck, though, like this Ozito model belonging to [Random Sequence]. 3D printing was the way forward, adapting the blade trimmer to use traditional line.

      • HackadayTrigger Your Home Automation Routines With Home Buttons

        Home automation systems are all well and good, so long as the person who built it all is around to drive it. Let’s face it, they’re quite often a complex web of interconnected systems, all tied to the specifics of one’s home — and someone less familiar with it all could get a little irritated if, on a chilly day, the interface to the boiler is via a Python script, and something won’t work. Just saying. Home Buttons by [Matej Planinšek] over on Hackaday.IO is a nicely polished project, which aims to take some of the hackiness out of such automation by providing a sleek front end to those automation routines, enabling anyone to rock on over and set one in action without hassle.

      • HackadayThe Importance Of Physical Models: How Not To Shoot Yourself In The Foot Or Anywhere Else

        We take shortcuts all the time with our physical models. We rarely consider that wire has any resistance, for example, or that batteries have a source impedance. That’s fine up until the point that it isn’t. Take the case of the Navy’s Grumman F11F Tiger aircraft. The supersonic aircraft was impressive, although it suffered from some fatal flaws. But it also has the distinction of being the first plane ever to shoot itself down.

    • Health/Nutrition/Agriculture

      • Insight HungaryHungary proposes judicial reforms to unlock EU funds

        Budapest has proposed extensive judicial reforms in a bid to unlock billions of euros from the EU’s post-pandemic recovery fund, according to Politico. The EU funds are being withheld from Hungary over rule-of-law and corruption concerns in the country.

        Civil society groups in Hungary warned that nationalist Prime Minister Viktor Orbán is duping the EU with his reform promises.  “In a system where corruption is so deeply linked to its functioning,” Sándor Léderer, director of K-Monitor, an anti-corruption group told the news outlet. “it’s very hard to imagine that at this political level anyone would take the fight against corruption seriously.” 

        I had a telephone conversation with @PM_ViktorOrban. Good that Finland can count on Hungary in our NATO ratification. I look forward to further strengthening our Fenno-Ugric connection also as allies.

        Hungarian-Finnish relations have an ancient history. Our cooperation has always been excellent, and will always be excellent! Thank you for the conversation, President @niinisto! https://t.co/t3qhwlyHrM

      • Common DreamsCalifornia Sues Manufacturers of ‘Forever Chemicals’ for Deception and Harm

        The state of California on Thursday sued 18 manufacturers of “forever chemicals” for harming people and the planet, and engaging in widespread deception.

        “We won’t let them off the hook for the pernicious damage done to our state.”

    • Proprietary

      • Hacker NewsRussian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks [Ed: Way to shift the blame away from Microsoft]

        The U.S. Department of Justice (DoJ) has announced charges against a dual Russian and Canadian national for his alleged participation in LockBit ransomware attacks across the world.

        The 33-year-old Ontario resident, Mikhail Vasiliev, has been taken into custody and is awaiting extradition to the U.S., where is likely to be sentenced for a maximum of five years in prison.

    • Privatisation/Privateering

      • EFFEFF Files Amicus Brief Challenging Orange County, CA’s Controversial DNA Collection Program

        Since 2007, the Orange County District Attorney’s Office (OCDA) has been running an expansive program that coerces thousands of Orange County residents annually to provide a DNA sample in exchange for dropping charges for low-level misdemeanor offenses. Through the program, the OCDA has amassed a database of over 182,000 DNA profiles, larger than the DNA databases of 25 states. OCDA claims a right to indefinitely retain the DNA samples it collects and to share them with third parties who may use them in new and unknown ways in the future. Unlike state and federal arrestee DNA databases, OCDA does not allow anyone to have their DNA expunged from its database.

        In 2021, two criminology professors from University of California, Irvine, William Thompson and Simon Cole, challenged OCDA’s program using a legal process called “taxpayer standing.” Under this process, anyone who pays taxes in the state can file a lawsuit to challenge government programs that constitute an illegal expenditure of public funds. This includes programs that violate the state or federal constitution, as alleged in this case.

        The plaintiffs sued Orange County and the district attorney, alleging that OCDA’s program violates the California Constitution’s right to privacy. At the trial court, the defendants filed a demurrer (a motion to dismiss the case), arguing misdemeanor arrestees waived their privacy rights by consenting to the collection of their DNA in exchange for having their charges dropped. The trial court granted the motion, and the plaintiffs appealed.

    • Security

      • Hacker NewsMultiple High-Severity Flaw Affect Widely Used OpenLiteSpeed Web Server Software

        Multiple high-severity flaws have been uncovered in the open source OpenLiteSpeed Web Server as well as its enterprise variant that could be weaponized to achieve remote code execution.

        “By chaining and exploiting the vulnerabilities, adversaries could compromise the web server and gain fully privileged remote code execution,” Palo Alto Networks Unit 42 said in a Thursday report.

      • Bruce SchneierNSA Over-surveillance

        Here in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of Americans.

      • BloombergNSA Watchdog Concluded One Analyst’s Surveillance Project Went Too Far

        Newly unearthed inspector general’s report is coda to Snowden-era controversy over NSA surveillance methods.

      • Privacy/Surveillance

        • TechdirtYet Another Study Shows Apple’s Hyped Privacy Standards Are Often Empty Theater

          For the last few years Apple has worked overtime trying to market itself as a more privacy-focused company. 40-foot billboards of the iPhone with the slogan “Privacy. That’s iPhone” have been a key part of company marketing for years. The only problem: researchers keep highlighting how a lot of Apple’s well-hyped privacy changes are performative in nature.

    • Defence/Aggression

    • Environment

      • TruthOut26 Climate Conferences Have Failed to Halt Emissions. Do We Need a New Strategy?
      • Common Dreams‘A Twisted Joke’: 636 Fossil Fuel Lobbyists Swarm COP27 Climate Talks

        The COP27 talks in Egypt have been billed as an opportunity for countries to “showcase unity” against the existential threat of climate change, but an analysis released Thursday shows there are more fossil fuel lobbyists attending the conference than representatives of the 10 nations most affected by the crisis, heightening concerns that industry influence will water down any agreements reached at the event.

        A data analysis of the United Nations’ provisional attendance list for the closely watched conference shows that 636 fossil fuel lobbyists have been registered at the talks, up 25% from last year’s COP26 conference in Glasgow.

      • Common DreamsOpinion | Biden Must Act to End Egypt’s Brutal Imprisonment of Alaa Abd El-Fattah

        United Nations delegates have gathered for two weeks in the exclusive Red Sea resort of Sharm El Sheikh, Egypt, seeking consensus on tackling catastrophic climate change. Unfortunately, this crucial summit, known as COP27 for the 27th Conference of Parties to the United Nations Climate Change Convention, is being hosted by Egypt, one of the world’s most repressive governments. Its autocratic ruler, Abdel Fattah El-Sisi, was a general when the Egyptian army refused to suppress the January, 2011 Arab Spring mass uprising centered in Cairo’s Tahrir Square. After the Egyptian people overthrew the long-standing, U.S.-backed dictator Hosni Mubarak, they held elections and formed a popular government. That didn’t last long. A 2013 military coup followed by a sham election put al-Sisi in power. He enjoys full support from the U.S. government despite being more repressive than Mubarak.

      • Common DreamsClimate Clock Erected at COP27 Says Richest Nations Owe $31.8 Trillion… and Counting

        As world leaders gather this week in the Egyptian city Sharm El-Sheikh for the United Nations Climate Change Conference, the Climate Clock team is using various displays as reminders of a looming deadline and just how much high-polluting nations owe the Global South.

        “Helping the most vulnerable nations transition to a sustainable economy is not just the right thing to do, it’s the smart thing to do.”

      • Common DreamsAutomakers Poised to Sell 400 Million More Gas-Powered Cars Than Planet Can Handle: Report

        The world’s automakers are on track to sell roughly 400 million more gasoline and diesel-powered vehicles than would align with the Paris climate agreement’s objective of limiting global heating to 1.5°C above preindustrial levels, according to a report published Thursday by Greenpeace Germany.

        “If traditional automakers fail to electrify, they will lose out to newer, all-electric competitors.”

      • MeduzaTeam Navalny: General Surovikin ‘liberated’ profitable phosphate mines in Syria — Meduza

        Team Navalny has published a new investigation, about General Sergey Surovikin and his Syrian campaign, which involved securing Russia’s access to two profitable phosphate mining sites, al-Sharqiya and Khneifis. The investigators trace Surovikin’s “tips” for his military assistance in phosphate extraction to a business co-founded by his wife, Anna Surovikina.

      • ScheerpostHerman Daly: An Economist Who Future Economists—and Societies—Will Dare Not Ignore

        Without greater equality, Herman Daly helped us understand, our environment has no real shot at renewal.

      • Energy

        • Common DreamsIn ‘Huge Victory’ for Planet, Norway’s Equinor Abandons Arctic Oil Field Plans

          Climate campaigners in Norway applauded Thursday as state-owned energy giant Equinor announced it would postpone plans to develop an oil field in the Arctic Ocean, as analysts suggested the proposal will likely be put aside indefinitely.

          Equinor said the proposed Wisting oil field, which would have been its fourth hydrocarbon project in the Arctic, has grown too expensive due to global inflation and supply chain issues—but campaigners credited sustained pressure as a factor that pushed the company to abandon the project.

        • Common DreamsOil and Gas Industry’s Expansion Plans Decried as Attack on ‘Livable Planet’

          Despite repeated warnings that new fossil fuel projects are incompatible with averting climate disaster, oil and gas corporations “are on a massive expansion course” to increase dirty energy production in the coming years, according to an analysis released Thursday at the United Nations COP27 meeting in Egypt.

          “Keeping these oil and gas resources in the ground is the bare minimum of what is needed to keep 1.5°C attainable.”

        • TruthOut636 Fossil Fuel Lobbyists Swarm Climate Talks, Up 25% From Last Year’s COP26
        • Common DreamsAt Least 16 US Climate Activists Arrested at Global Protests Against Private Jets

          At least 16 activists were arrested for shutting down the entrances to airports serving private jets across the United States on Thursday as part of worldwide climate protests led by groups including Extinction Rebellion, Scientist Rebellion, New York Communities for Change, and the New York City chapter of the youth-led Sunrise Movement.

          “Taking a private jet while the planet is on fire is utter insanity.”

    • Finance

    • AstroTurf/Lobbying/Politics

    • Civil Rights/Policing

      • Common DreamsHarperCollins Employees Begin Indefinite Strike to Demand Fair Pay

        Unionized employees at HarperCollins Publishers in New York began a work stoppage Thursday, walking out after seven months of working without a contract and nearly a year of negotiations for fair pay and benefits.

        Workers from the prestigious publishing company’s editorial, publicity, design, legal, and other departments are represented by Local 2110 of the UAW. The strike that began Thursday is set to go on for “as long as it takes” until executives meet the employees’ demands, associate editor Stephanie Guerdan told The Guardian on Thursday.

      • Democracy NowThe Story of Baby O: Rebecca Nagle on the Supreme Court Case That Could Gut Native Sovereignty

        The Supreme Court heard oral arguments Tuesday in Haaland v. Brackeen, a case challenging the Indian Child Welfare Act and ultimately threatening the legal foundations of federal Indian law. ICWA was created in 1978 to address the systemic crisis of family separation in Native communities waged by the U.S. and requires the government to ensure foster children are adopted by members of their Indigenous tribes, as well as blood relatives, before being adopted by non-Indigenous parents. Now right-wing groups are supporting white foster parents to challenge the law as discriminatory. “Not only are our children on the line, but the legal foundation, the legal structure that defends the rights of Indigenous nations in the United States is literally at stake,” says journalist Rebecca Nagle, who has been reporting on the case for years and says it’s likely the Supreme Court will strike ICWA down. Nagle also comments on the oral arguments, saying the Supreme Court’s majority has “many racist stereotypes in their minds about Native people.”

      • ScheerpostVoters in Four States Approve Bans on Forced Prison Labor

        “There should be no exceptions to a ban on slavery,” said Democratic U.S. Senator Jeff Merkley following passage of Measure 112 in Oregon.

      • TruthOutFour States Voted to End Slavery — But Not Louisiana. Here’s Why.
      • TruthOutDems May Lose House Because Party’s NY Leaders Focused on Defeating the Left
      • TechdirtHouston PD Drops Cases Tainted By Corrupt Narcotics Officers, But Decides It Can Still Keep Seized Cash

        In 2019, Houston police officers — relying on information generated by narcotic squad office Gerald Goines (who is now facing multiple criminal charges) — raided the home of Rhogena Nicholas and Dennis Tuttle. Both occupants of the home were killed during the raid — one predicated on lies from Officer Goines. The fallout resulted in the suspension of the drug unit Goines worked for, as well as the indictment of 11 more officers from the PD’s narcotics unit.

      • ShadowproofProtest Song Of The Week: ‘Waltzing Will Trilogy’ By Lavender Country

        Originally published at Ongoing History of Protest MusicOn October 31, 2022, trailblazing singer-songwriter and activist Patrick Haggerty died at the age of 78. A few weeks earlier he suffered a stroke. He fronted Lavender Country which is widely believed to be the first openly gay country band. In 1973, they released their self-titled debut often cited as the first gay-themed country album.

        Initially, there were only 1000 copies printed. The album later garnered interest from historians, music journalists, and record collectors. In 2014, the album was reissued by the Paradise of Bachelors label. Haggerty also embarked on a nationwide tour, which introduced a new generation to his music.

    • Internet Policy/Net Neutrality

    • MoviePass/DRM

      • TechdirtMoviePass Execs Charged With Securities Fraud

        You’ll be shocked to learn that the same MoviePass executives that routinely misled investors (and once even covertly changed user passwords to try and keep them from using a service they paid for) are now in even more trouble for their dodgy business practices.

    • Monopolies

      • Patents

        • Common DreamsOutrage as Investigation Shows How Big Pharma ‘Snuffed Out’ Vaccine Patent Waiver

          While Big Pharma made no secret of its opposition to waiving patents for coronavirus vaccines, a new investigation published Thursday details the extent of the powerful industry’s behind-the-scenes lobbying push as it sought to crush an effort to ramp up global production and distribution of the lifesaving shots.

          Joint reporting by Politico and The Bureau of Investigative Journalism (TBIJ) revealed that pharmaceutical giants threatened several countries, including Belgium and Indonesia, with investment cuts if they decided to support a popular proposal to temporarily lift patent protections that have hindered vaccine production and distribution throughout the ongoing Covid-19 pandemic.

        • Common DreamsOpinion | An Open Letter to Bill Gates on Food, Farming, and Africa
      • Copyrights


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 11/11/2022: Twitter Bankruptcy Possible

Posted in News Roundup at 4:11 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Linux in the Ham ShackLHS Episode #488: M17 Deep Dive 2 | Linux in the Ham Shack

        Hello and welcome to the 488th edition of Linux in the Ham Shack. In this episode, the hosts interview Ed, N2XDD, and Steve, KC1AWV, of the M17 project. We last had them on the show in March of 2021. Today, we discuss the M17 project, what’s new, what’s old and what’s happening. Thank you for tuning in and we hope you have a great week.

      • VideoVim Key Maps How To Create Custom Key Maps In Vim – Invidious

        Customizing your key maps in Vim is one of the most powerful features of using Vim. By using key mappings, its possible to do things other text editors just can’t do. In this video I go over the basics of key mappings to introduce you to how they work and show you a couple of cool bindings to do things from text to speech using espeak to generating pdf documents from markdown with pandoc.

      • Video2022 Search Engines | What are our Options? – Invidious

        Today we will talk about what search engines we are using to see if we need to make any changes. We have seen earlier this year that DuckDuckGo will start curating results, Google and Bing already do that. StartPage has connections to a data minding company, so what options do we have?

      • VideoArch Linux Finally Ships OpenSSL 3: Chaos Ensues – Invidious

        Finally Arch Linux started shipping OpenSSL 3.0 but by doing so it lead to tons of AUR packages especially but even packages in 3rd party repos suddenly breaking and requiring a rebuild but that’s what you get relying on a 3rd party repo like that.

      • VideoHow to install Intellij Idea Community on Linux Mint 21 – Invidious

        In this video, we are looking at how to install Intellij Idea Community on Linux Mint 21.

      • Jupiter BroadcastingLinux Action News 266 [Ed: .NET is not “goodies”; then again, this site is controlled by Microsofters]

        Microsoft’s new goodies for Linux users, the Ubuntu Summit wraps up, and our takeaways from the recent fireside chat with Linus Torvalds.

    • Graphics Stack

    • Instructionals/Technical

      • Manuel MatuzovicDay 35: forgiving selectors

        There’s a difference between listing selectors in :where(), :is(), and :has() and listing them in a regular selector list.

      • Manuel MatuzovicDay 34: :is() or :where()

        Sometimes we need selectors with higher specificity to improve readability and comprehensibility, or to limit the elements styles will be applied to.

      • Matt RickardWhat are Containers?

        Partitioning resources with Linux namespaces – partitions resources so that a set of processes only sees a certain set of resources. Namespaces take global resources like – process ids (pids), mount points (mnt), network stack (net), and abstract them so that each process has its own view of them. There are currently 8 different namespaces (mnt, pid, net, ipc, UTS, user, cgroup, and time).

      • Carlos BeckerIssuing and using SSH Certificates

        SSH certificates allow system administrators to SSH into machines without having to manage authorized keys in the servers.

        In summary, you create a key pair to be used as a Certificate Authority (CA), and add the public key of that key pair to the server: [...]

      • uni TorontoLinux swap files don’t seem to update their modification time when you swap

        Not updating the swap file’s modification time is a sensible decision that reduces both IO and complexity. Updating file inode times is a known source of unnecessary IO (updating the access time is frequently disabled or significantly limited), and it would add extra work to the ‘swap pages out’ path to mark the relevant inode for update as well (it might also require taking internal kernel locks to modify the inode’s in-memory data). This is clearly a special kernel path, since even using mmap() updates the file modification time (although I believe not necessarily to a completely predictable time).

      • Terence EdenBetter sharing of WordPress posts to Mastodon

        WordPress’s Jetpack plugin allows you to easily syndicate your blog to Twitter, LinkedIn, Tumblr, Email, and a few other services. But there’s no native way to publish directly to your Mastodon feed.

        This is a guide to how I got my blog to publish every new post to Mastodon with a nicely formatted preview. This uses Jan’s “Share on Mastodon” plugin which you’ll need to install and configure.

        Once you’ve followed these instructions, you’ll get a share which has a headline, excerpt, link, hashtags, and images. Ready? Let’s go!

      • Josh JusticeSelf-Publishing on Leanpub

        I wanted to share some brief notes on my experience self-publishing on Leanpub. This isn’t an authoritative assessment of publishing options, but that’s actually kind of the point: I love Leanpub because it made it easy for me to self-publish without having to become an expert.

      • Jan Piet MensRed means Kaputt: when DNSSEC turns into a treasure hunt

        It occurred to me to use Perl Net::DNS to see if I could obtain more details. I asked for a bit of help, and Oli Schacher came to the rescue. First I verify that the current zone is OK so I use the current NS RRset and its RRSIG: [...]

      • H2S MediaInstall Google Chrome for Fedora 37/36/35 Linux – Linux Shout

        Fedora is a Linux distribution and upstream project for highly stable Redhat Enterprise Linux. It is meant to offer particularly up-to-date programs and multiple desktop environments. In this tutorial, we learn the command to install Google chrome on any currently available version of Fedora.

        Well, this Linux only comes with free software. However, we can add third-party repo or enable Fedora’s supplement repository to install propriety applications such as Google Chrome.

      • ID RootHow To Install WoeUSB on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install WoeUSB on Linux Mint 21. For those of you who didn’t know, WoeUSB is a simple Linux program that enables you to create a bootable Windows USB drive from a Windows ISO file. To use WoeUSB, you’ll need a Windows ISO file and a USB drive with at least 4GB of storage. If you need to install Windows from a bootable USB stick, WoeUSB is the ideal tool for the job.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of WoeUSB on Linux Mint 21 (Vanessa).

      • TecMintHow to Configure FirewallD in RHEL, Rocky – AlmaLinux [Ed: Updated page]

        Net-filter as we all know it’s a firewall in Linux. Firewalld is a dynamic daemon to manage firewalls with support for network zones. In the earlier version, RHEL & CentOS we have been using iptables as a daemon for packet filtering framework.

        In newer versions of RHEL-based distributions such as Fedora, Rocky Linux, CentOS Stream, AlmaLinux, and openSUSE – the iptables interface is being replaced by firewalld.

      • FAQForgeWhat is my IP – on Ubuntu Linux

        In this guide, I will show you how to find your IP address (private IP address and public IP address) on Ubuntu Linux. I will cover also the steps for an IP location lookup to get IP location. The same steps will work on other Linux distributions like CentOS, Debian, Fedora, Linux Mint, and Rocky Linux.

      • Implementing pf-scrub no-df bit in a Netfilter Linux Kernel Module hook – IPV4 Packet Header Rewrite [Ed: Outsourced to Microsoft and to proprietary software, but then again he boasts about Macs, so software freedom is a missing angle]
      • Pi My Life UpHow to Logout a User on Linux – Pi My Life Up

        Knowing how to logout a user in Linux is vital to maintaining a healthy operating system. You might need an ex-employee you want removed from the system, or you have identified a rogue user logged in. Luckily the process of logging out the user is very straightforward.

        We will also go into detail about logging out your user from the system if you are using SSH. This process is easy and will help close an SSH connection to your server correctly.

      • Pi My Life UpSyncing Time from the Network on the Raspberry Pi – Pi My Life Up

        To maintain your Raspberry Pi’s time, the operating system calls external servers to get the current time for your time zone.

        This time synchronization is beneficial for your Raspberry Pi since it doesn’t have its own real-time clock to maintain the time. While you can add an RTC to the Pi, it requires you to purchase an additional component.

      • Linux Made SimpleHow to install Kega Fusion on a Chromebook

        Today we are looking at how to install Kega Fusion on a Chromebook.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

      • UNIX CopHow to install PostgreSQL on Rocky Linux 9 / Alma Linux 9

        In this post, you will learn how to install PostgreSQL on Rocky Linux 9 / Alma Linux 9

        As we all know, PostgreSQL is one of the most important relational database managers we can find. It is the basis of many large projects that require the advanced features of PostgreSQL.

        Another aspect is that Rocky Linux 9 / Alma Linux 9 are recent versions of very server-focused operating systems, so it can be quickly interesting to learn about PostgreSQL in these environments.

      • ID RootHow To Install Chkrootkit on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Chkrootkit on Ubuntu 22.04 LTS. For those of you who didn’t know, The Chkrootkit security scanner is a popular security tool that allows administrators to check the local system for evidence of a rootkit infection. It consists of a shell script that checks various security issues and system binaries for rootkit modification. You can use Chkrootkit in the command line or GUI. It is similar to rkhunter which is another rootkit detection and removal tool.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Chkrootkit security scanner on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • DebugPointHow to Install FFmpeg in Ubuntu and Other Linux

        This tutorial outlines the steps required to install FFmpeg in Ubuntu and Other Linux systems.

        The ffmpeg is a collection library and software program to manipulate multimedia files. The entire ffmpeg is a robust set of libraries that allows you to convert, stream, and manipulate audio and video files. Many frontend Linux applications use it as a backend and hence depend on it. For example, a screen recording application may need ffmpeg to convert recorded streams to gif images.

        Popular applications and services that use FFmpeg are VLC Media Player, YouTube, Blender, Kodi, Shotcut, and Handbrake – to name a few.

        Fun fact: NASA’s Mars 2020 mission rover Perseverance used FFmpeg to complete and process images and video before beaming back to Earth!

      • Linux NightlyLinux Convert xlsx to csv – Linux Nightly

        Learn how to convert xlsx spreadsheets to csv files by using command line and GUI methods in Linux.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Web Pro News[Older] KDE Neon Is Now Based on Ubuntu 22.04 LTS

          KDE Neon, the non-distro distribution, is now based on Ubuntu 22.04 LTS.

          KDE Neon is released by the KDE Community. While the developers say it isn’t a standalone distro, but rather a way for them to showcase the latest KDE technologies, many use Neon as they would any other distro.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Tim BrayMastodon Moment

      My first Mastodon post (that I can find) dates from April 6, 2017. I try to check out interesting new life-online technologies, and this was one. But I found it sort of quiet and empty and didn’t say much. Now, following on Muskification, Twitter may become an unattractive online home, so it’s time to explore alternatives. I’ve been digging deeper into Mastodon (so have really a lot of other people) and this is a progress report.

    • Mastodon, the Fediverse, and A Warning About Mastodon.social

      Social.coop is my third Fediverse home. I joined Identi.ca in 2009, the same year I joined Twitter. Then, in 2017, I switched to Mastodon, moving to the flagship instance at Mastodon.social. It was easy to discover mastodon.social and to register an account, and for years I was fine with staying where I’d landed. I also found that my conversations in the Fediverse tend to be better than ones on Twitter — people disagree more productively, for instance. And, even though I only had hundreds of Fediverse followers compared to a few thousand Twitter followers, I seemed to get more useful feedback and publicity from the Fediverse than from Twitter — probably partly because Twitter’s recommendations algorithm dislikes my hyperlink-heavy posting style and suppresses my tweets in people’s timelines, relative to linkless tweets.

    • Kodi FoundationSkip 1s – a new (old) way to control Kodi

      The Skip 1s Universal Remote is our first remote built on a strong foundation with big future plans. We plan on having tight integration with Kodi and custom products as we continue our journey. But Flirc wouldn’t exist if not for the Kodi community and their support.

    • Web Browsers/Web Servers

      • Evolution of the Web.

        A website is an online place where you can tell people to follow you on different social media so they might have a chance, if the algorithm allows it, to read what you hope to write in the future.

      • Chris HannahArc Browser

        I have to point out that I am not completely against Arc, nor am I declaring its existence to be a failure. I’ve just decided that it’s clearly designed for a different type of user.

      • Jim NielsenBrowsers, JSON, and FormData

        While getting browser-native support for transitions could act as an antidote to the JavaScript-heavy SPA experiences common today, I think there’s another equally significant change that could decrease the amount of JavaScript shipped to modern websites: we need either 1) more APIs that speak FormData, or 2) browsers that speak JSON.

        Allow me to try and explain.

    • Education

      • RlangPreparing to Thrive by Collaborating with Local Universities

        Vivek Patil is a Professor of Marketing at Gonzaga University, where he used to teach the SPSS to his students for marketing research in the School of Business. After learning about R and attending a course on Data Analysis from Coursera, he learned R to expand his knowledge and introduced R to his students in the Business School.

      • Lawrence TrattWhat is a Research Summer School?

        I’ve co-organised four in-person research summer schools, most recently as part of the Programming Language Implementation Summer School (PLISS) series, and spoken at two others, and one thing that I’ve realised is that many people don’t really know what they involve. Indeed, I didn’t fully realise what they are, or could be, even after I’d been involved in several! This post is my brief attempt to pass on some of what I’ve learnt about research summer schools.

    • Openness/Sharing/Collaboration

      • Open Data

        • RlangUse data from Wikipedia

          Scrape and geolocate data from Wikipedia. We will map the active space launch sites.

    • Programming/Development

      • Unix SheikhWhen you use open source software you are not entitled to anything!

        Some people who use open source software think or feel that they somehow have a right upon the developers of such software to provide support or service of some kind. Some are even so deluded that they think threating the developers with promises of not using the software will somehow force the developers into compliance.

      • Daniel LemireMeasuring the memory usage of your C++ program

        In C++, we might implement dynamic lists using the vector template. The int-valued constructor of the vector template allocates at least enough memory to store the provided number of elements in a contiguous manner. How much memory does the following code use?

      • Andy DoteQA and Continuous Delivery

        This article is going to rely heavily on Feature Flags, so a passing familiarity is useful. In summary, feature flags are the ability to switch features on and off at runtime of the application without requiring re-deployment. Feature flags can also be used to switch on features for specific users or groups of users.

      • Chris HannahIdiot Proof Git

        For people that want to use Git, but either aren’t a developer, or just want an easier way to use common functionality via the command line, these may be for you.

      • Trail Of BitsLook out! Divergent representations are everywhere!

        This blog post examines divergent representations of the same source code variable produced by compiler optimizations. We’ll attempt to define divergent representations and look at the SQLite vulnerability we discovered, which was made easier to exploit by the divergent representation of a source code variable (one exhibiting undefined behavior). We’ll then describe the binary and source code analyses that we used to find more divergent representations in existing open-source codebases. Finally, we’ll share some suggestions for eliminating the risk that a program will be compiled with divergent representations.

      • Pi My Life UpUsing the count() Function in PHP – Pi My Life Up

        The count() function in PHP allows you to count all elements within an array or an object that implements the Countable interface.

    • Standards/Consortia

      • APNICComparing TCP and QUIC

        There is a common view out there that the Quick UDP Internet Connections (QUIC) transport protocol (RFC 9000) is just another refinement to the original Transmission Control Protocol (TCP) transport protocol (RFC 9293, RFC 793). I find it hard to agree with this sentiment, and for me, QUIC represents a significant shift in the set of transport capabilities available to applications in terms of communication privacy, session control integrity, and flexibility. QUIC embodies a different communications model that makes it intrinsically useful to many more forms of application behaviours. Oh, yes. It’s also faster than TCP!

        In my opinion, it’s likely that over time QUIC will replace TCP in the public Internet. So, for me, QUIC is a lot more than just a few tweaks to TCP. Here, we will describe both TCP and QUIC and look at the changes that QUIC has brought to the transport table.

      • JoinupThe EIF Online Assistant is live!

        The National Interoperability Framework Observatory (NIFO) that designed the EIF Toolbox is now providing the EIF Online Assistant. The EIF Online Assistant offers an interactive and intuitive interface for seeking open-source digital solutions that help align with the EIF.

  • Leftovers

    • VarietyJennifer Aniston Says ‘There Are No More Movie Stars’ and Hates Social Media: ‘It’s Torture for Me’

      Jennifer Aniston briefly lamented on Hollywood’s fading glamour during a recent Allure magazine cover story. The writer of the piece read a text aloud to Aniston in which a friend wrote the following about the “Friends” superstar: “No one’s ever going to be famous the way she is. That kind of mass-fame phenomenon burning so bright for so long, it’s just not achievable today. She’s like a silent-film star among a generation of TikTok dipshits.”

    • RachelGetting it or not getting it, and then what?

      It’s kind of useful since you have this group that makes things terrible for other people, and there they are, jumping up and down, waving flags and screaming to get attention because they will never get attention for excelling, since, well, they can’t. It’s like, gee, you don’t have to kick out most of the people. Just get the few assholes in that group – they’ll even help you find them! Your group will be far healthier for it.

    • Eesti RahvusringhäälingExplainer: Why do I need to wear a reflector during winter in Estonia?

      It’s a surprise to many new arrivals in Estonia that wearing a reflector is obligatory throughout the long winter months. In deepest winter, the sun rises at 10 a.m. and sets by 4 p.m., so drivers can need a little extra help seeing pedestrians.

      The small, reflective disks should be hung from a pocket, coat or bag and must be clearly visible. Other forms of reflective clothing are also permitted.

    • Science

      • Science NewsCatastrophic solar storms may not explain shadows of radiation in trees

        In the last decade, scientists have discovered traces on Earth of six intense bursts of radiation, known as Miyake events, scattered over the last 9,300 years. The most popular explanation is that these mysterious signatures were left behind by massive solar storms, leading some scientists to warn that the next Miyake event could cripple the world’s electrical grid. But new research, published in the October Proceedings of the Royal Society A, suggests that more than just solar flares might be behind the enigmatic radiation.

        The finding underscores the need for further investigations into these strange bursts, which could potentially harm our society in the future, says physicist Gianluca Quarta of the University of Salento in Lecce, Italy, who was not involved in the study. “Something is not fitting with what we know at the moment.”

      • The ConversationHow maths can help the BBC with impartial reporting

        This is where a maths concept called information theory can guide us. According to information theory, impartiality can be measured by a metric called mutual information. Mutual information measures the amount of knowledge about a topic of interest that you can extract from a message.

    • Education

      • Jacobin MagazineThe Results Are In: Americans Love Public Schools

        The Right has long pushed a narrative that parents are ready to turn away from public schools. But in this week’s midterms, voters in several states approved ballot measures that increase school funding.

    • Hardware

      • India TimesCisco to open new chip design center in Barcelona, Spain says

        It said the project was part of the so-called PERTE plan of government subsidies for semiconductor research and development using the European Union’s pandemic relief funds, which allocates up to 12 billion euros ($12.17 billion), though it did not provide any financial details on the investment.

      • HackadayA DIY Equatorial Mount Using Harmonic Drives

        As an amateur astrophotographer will tell you, you just don’t get to capture the really interesting objects without spending a ton of money on some decent pieces of kit. Telescope aside, there really is a surprising amount of complexity, weight, and associated costs with the telescope mount alone, let alone one that is capable of any sort of programmable tracking. [Alan (Jialiang) Zhao] clearly wanted to up their game, and having suffered some of the shortcomings of their Sky-Watcher HEQ-5 pro Equatorial mount decided to go ahead and build an open-source mount, Alkaid, which hopefully works a bit better for them.

      • HackadayBuilding A Sinclair ZX81 In 2022 With All New Parts

        As the supply of genuine retrocomputers dwindles and their prices skyrocket, enthusiasts are turning their eyes in other directions to satisfy their need for 8-bit pixelated goodness. Some take the emulation route, but others demand a solution that’s closer to the original hardware. Following the latter path, [iNimbleSloth] is answering the question as to whether it’s possible to build a Sinclair ZX81 from all-new parts in 2022.

    • Health/Nutrition/Agriculture

      • Terence EdenAlgorithm Induced Alcoholism

        But one day their marketing algorithm obviously decided that I was about to become a lost prospect and sent me an irresistible offer. “We miss you! Please enjoy a crate of 36 craft beers for £40.”

        Nice! I certainly won’t look a gift-beer in the bottle. So I grabbed the bargain and stuck the tinnies in the cupboard.

        And then the algorithm went haywire.

      • ABCCalifornia sues over ‘forever chemicals’ that taint water

        Attorney General Rob Bonta announced the lawsuit against the manufacturers of compounds that have been used in consumer goods and industry since the 1940s. The chemicals are found in firefighting foams, nonstick frying pans, cleaning sprays, water-repellent sports gear, stain-resistant rugs, cosmetics and countless other products.

        Bonta said these so-called forever chemicals are so strong that they do not degrade or do so only slowly in the environment and remain in a person’s bloodstream indefinitely.

    • Proprietary

      • TechTargetTop public cloud providers of 2023: A brief comparison [Ed: A bubble, a trap, and spying. Clown computing is a fad.]
      • Silicon AngleDigitalOcean’s weak outlook raises concerns of cloud computing slowdown

        Revenue for the period rose 37%, to $152.1 million, above the consensus estimate of $149 million. DigitalOcean’s own guidance called for sales of between $145.5 million and $147 million. The company also reported an annual revenue run rate of $640.6 million, up 41% from a year earlier, and average revenue per customer of $79.22, up 28%.

      • Scoop News GroupLockBit ransomware suspect arrested in Canada, faces charges in US [iophk: Windows TCO]

        The Justice Department identified the suspect as Mikhail Vasiliev who, according to court documents unsealed Thursday, faces charges related to conspiracy to damage computers and transmitting ransom demands. Vasiliev faces up to five years in prison and is awaiting extradition to the U.S.

      • Scoop News GroupInsurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup [iophk: Windows TCO]

        Now, however, it’s increasingly clear insurers aren’t off the hook for NotPetya payouts or from covering losses from other attacks with clear links to nation-state [attackers].

        That’s because in this case, what Mondelez and many other corporations endured was not an act of war, but “collateral damage” in a much larger cyberconflict that had nothing to do with them, said James Lewis, director of the Strategic Technologies Program at the Center for Strategic and International Studies.

      • Hacker NewsMicrosoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland [Ed: Microsoft should blame Microsoft, but it resorts to nationalism to distract from its products being shoddy]

        Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlaps with the Russian state-sponsored Sandworm group.

      • IT WireMedibank attackers based in Russia, claims AFP chief [Ed: Distracting from Microsoft as culpable party]

        The attackers behind the ransomware heist on medical insurer Medibank Group are believed to be in Russia, the Australian Federal Police claims, without naming any of those involved.

        Commissioner Reece Kershaw told the media in Canberra on Friday afternoon that the intelligence collected thus far pointed to “a group of loosely affiliated cyber criminals, who are likely responsible for past significant breaches in countries across the world”.

      • Krebs On SecurityLawsuit Seeks Food Benefits Stolen By Skimmers

        A nonprofit organization is suing the state of Massachusetts on behalf of thousands of low-income families who were collectively robbed of more than a $1 million in food assistance benefits by card skimming devices secretly installed at cash machines and grocery store checkout lanes across the state. Federal law bars states from replacing these benefits using federal funds, and a recent rash of skimming incidents nationwide has disproportionately affected those receiving food assistance via state-issued prepaid debit cards.

        The Center for Law and Social Policy (CLASP) recently published Five Ways State Agencies Can Support EBT Users at Risk of Skimming. CLASP says while it is true states can’t use federal funds to replace benefits unless the loss was due to a “system error,” states could use their own funds.

    • Security

      • Scoop News GroupRansomware costs top $1 billion as White House inks new threat-sharing initiative [iophk: Windows TCO]

        U.S. financial institutions observed nearly $1.2 billion in costs associated with ransomware attacks in 2021, a nearly 200 percent increase over the previous year, according to data reported by banks to the U.S. Treasury Department and released in a report Tuesday.

        The report comes amid an effort by the Biden administration to crack down on ransomware operators globally and illustrates the scale of the challenge facing law enforcement agencies and policymakers.

      • Scoop News GroupWhite House cyber official advocates nimbler NATO to confront digital threats

        A top White House cyber official spoke at a NATO meeting in Rome Thursday, convening with allies to hone plans for rapidly responding to nation-state [breaches] and other digital threats.

        Thursday’s meeting follows a June commitment from officials representing 30 NATO countries to significantly boost NATO’s cyber defenses as an alliance and at the national level.

      • IT WireBad smell! VMware quietly removes page about service to Medibank

        Multi-cloud services provider VMware has excised a document from the site of its fully-owned security provider Carbon Black which details services provided to Medibank Group, the medical insurer that has been hit by attackers and had its data purloined.

        This was disclosed on Friday by the Australian Financial Review’s national correspondent Michael Roddan in the newspaper’s Rear Window section.

        Roddan wrote that he had not been able to access the page even on the Wayback Machine aka the Internet Archive which stores pages from the Web.

        [...]

        Back in 2017, the global security firm Sophos removed a page touting its work for the British National Health Service after the latter was overwhelmed by an attack of the WannaCry ransomware.

      • IT WireiTWire – MacGibbon conflict of interest: ABC caught changing online story

        The ABC has been caught out changing an online news report after iTWire pointed out that the report in question — about Thursday’s Q+A program — contained no mention of the fact that Alastair MacGibbon, the chief technology officer of security shop CyberCX, is currently providing advice to Medibank Group, a company which recently suffered a devastating network attack.

        MacGibbon was given a platform to tout his wares on the ABC’s Q+A program on Thursday with only a fleeting mention of the fact that his firm is now advising Medibank how to deal with its ransomware attack and subsequent data leak.

        But even that kind of mention was absent in the online news report as can be seen from the screenshots included in this article.

      • IT WirePC vendor Lenovo issues fixes for UEFI flaws discovered by ESET [Ed: UEFI remains an anti-security mechanism, owing to complexity and dishonesty]

        Global PC vendor Lenovo has fixed two vulnerabilities in some of its laptop models that could lead to a disabling of secure boot, thus exposing a user to the injection of malicious code at boot time.

        In an advisory, the company said the following three issues had been reported in the UEFI firmware of its notebooks:

        “CVE-2022-3430: A potential vulnerability in the WMI Setup driver on some consumer Lenovo Notebook devices may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.

        “CVE-2022-3431: A potential vulnerability in a driver used during manufacturing process on some consumer Lenovo Notebook devices that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.

      • Integrity/Availability/Authenticity

        • APNICWhat can be learned from BGP hijacks targeting cryptocurrency services?

          On 17 August 2022, an attacker was able to steal approximately USD 235,000 in cryptocurrency by employing a BGP hijack against the Celer Bridge, a service that allows users to convert between cryptocurrencies.

          In this blog post, I discuss this and previous infrastructure attacks against cryptocurrency services. While these episodes revolve around the theft of cryptocurrency, the underlying attacks hold lessons for securing the BGP routing of any organization that conducts business on the Internet.

      • Privacy/Surveillance

        • NYOBGDPR Rights in Sweden: Court confirms that authority must investigate complaints.

          GDPR Rights in Sweden: Court confirms that authority must investigate complaints. So far, the Swedish IMY has taken the view that users don’t have party rights in GDPR procedures.

          The Stockholm administrative court held that a complainant under Article 77 GDPR has the right to request a decision from the Swedish Data Protection Authority (IMY) after six months. So far, the IMY took the view that users are not a party in procedures concerning their own GDPR rights. The right to get a decision within six months also applies if the IMY opens a parallel ex officio investigation into the same company.

        • Jacobin MagazineElon Musk’s Twitter Takeover Means New Threats to User Privacy

          With all this collection of data, it’s difficult for users to get a sense of what their privacy rights are and how they can protect themselves from illicit uses of their data. Every company has privacy policies, which range from opaque legalese to gamified, easy-to-read versions. Usually, when you sign up to use a social media platform, you agree to many things, including having your data stored by that platform. If you’re concerned with how your data might be used, your one option for protecting yourself is to opt out completely from using the platform.

        • RTLStable release 0.4.7.11

          We’ve also extended greatly the relay statistics exported on the MetricsPort in order to help us gather more easily information that we can graph over time. As a reminder, that data, as a relay operator, should NEVER be made available publicly.

        • Patrick BreyerCybersecurity: EU bans anonymous Internet sites

          The EU Parliament today approved the directive to increase cyber security (“NIS 2”) by a large majority. According to it, the registration of [Internet] domain names shall in the future require the correct identification of the owner in the Whois database (Article 28). The obligation to register the identity explicitly also applies to “privacy” and “proxy” registration services and resellers (Article 6). Public authorities and private individuals wil have access in case of “legitimate interest”. “Whois privacy” services for proxy registration of domains thus become illegal, threatening the safety of activists and whistleblowers.

    • Defence/Aggression

      • New York Times84 Years Later, a New Look at the Nazi Attacks of Kristallnacht

        The chilling photos of the 1938 Nazi pogrom were released on Wednesday, the 84th anniversary of what is known as the night of broken glass, or Kristallnacht, the organized and widespread attacks on Jews that are widely commemorated as the start of the Holocaust.

        The pictures, taken in the Bavarian cities of Fürth and Nuremberg, were in an album that had been secreted away by a former American soldier and then donated to Yad Vashem, the World Holocaust Remembrance Center in Israel, after his death.

        On Nov. 9 and 10, 1938, Nazi thugs, often accompanied by cheering civilians, attacked Jewish people and their homes, businesses and synagogues, in a coordinated assault that the Nazi leadership wanted to appear spontaneous.

      • PBS“Kristallnacht”

        On the night of November 9, 1938, the sounds of breaking glass shattered the air in cities throughout Germany and parts of Austria while fires across the countries devoured synagogues and Jewish institutions. By the end of the rampage, gangs of Nazi storm troopers had destroyed 7,000 Jewish businesses, set fire to more than 900 synagogues, killed 91 Jews and deported some 30,000 Jewish men to concentration camps. In a report back to the State Department a few days later, a U.S official in Leipzig described what he saw of the atrocities. “Having demolished dwellings and hurled most of the moveable effects to the streets,” he wrote, “the insatiably sadistic perpetrators threw many of the trembling inmates into a small stream that flows through the zoological park, commanding horrified spectators to spit at them, defile them with mud and jeer at their plight.”

      • History AEArmistice Day: World War I ends

        At the 11th hour on the 11th day of the 11th month of 1918, the Great War ends. At 5 a.m. that morning, Germany, bereft of manpower and supplies and faced with imminent invasion, signed an armistice agreement with the Allies in a railroad car outside Compiégne, France. The First World War left nine million soldiers dead and 21 million wounded, with Germany, Russia, Austria-Hungary, France and Great Britain each losing nearly a million or more lives. In addition, at least five million civilians died from disease, starvation, or exposure.

      • Armistice Day

        After four terrible years, fighting in the First World War finally ended with the signing of an armistice between Germany and the Allies on 11 November 1918. On the 11th hour of the 11th day of the 11th month, the guns fell silent. New Zealanders celebrated enthusiastically, despite having recently celebrated the surrenders of the three other Central Powers – Bulgaria, Turkey and Austria-Hungary – and the premature news of an armistice with Germany.

      • The Telegraph UKArmistice Day 2022: Poppies, commemorations and why the act of remembrance matters

        November 11, 2022, Armistice Day, marks 104 years since the end of the First World War. Every year the nation comes together to remember the bravery of the men and women who played a role.

      • Arrangements for Armistice Day and Remembrance Sunday 2022

        An Act of Remembrance will take place at 10.50am on Friday, 11 November at the War Memorial in Old Town Churchyard.

      • Evening Standard UKRemembrance Day 2022: What time is the silence and how many minutes is it?

        A two-minute silence is held at 11am on November 11, in a tradition that was first started 100 years ago by King George V in 1919.

      • ANF NewsActivists in Dresden and Halle protest Turkish use of chemical weapons

        The tent protest, which started on Monday in Albertplatz to protest the chemical attacks by the Turkish state in Dresden, continued on Tuesday.

    • Transparency/Investigative Reporting

    • Environment

      • NPRHere are 3 dangerous climate tipping points the world is on track for

        It’s still possible to avoid such widespread calamities, but only if countries move far more aggressively to cut the pollution driving climate change. The Earth has warmed about 1 degree Celsius so far. If countries, including the United States, follow through on current promises to reduce greenhouse gas emissions, the latest estimates suggest that Earth’s temperature will still top out around 2.8 degrees Celsius of warming.

        Here are the three most important and well-studied changes, from collapsing ice sheets to thawing Arctic permafrost, to disappearing coral reefs.

      • BBCCOP27: Key climate goal of 1.5C rise faces new challenge

        The report said that if emissions stay so high, the world faces a 50% risk of breaching a key 1.5C temperature rise threshold in nine years.

      • The RevelatorMidterms 2022: A Green Wave on the Horizon?
      • Energy

        • APNICGetting serious about the Internet and energy

          Subsequently, on the IETF mailing list, there has been continuing discussion and the Internet Architecture Board (IAB) has announced three half-day sessions to be held from December 2022 to discuss the environmental impact of Internet applications and systems. The workshop is inviting discussion paper submissions.

        • David RosenthalMatt Levine’s “The [Cryptocurrency] Story”: Part 2

          Again, Levine explains why as a financial journalist, he is interested: [...]

        • NPRAs Harvard’s endowment abandons fossil fuels, oil-rich University of Texas catches up

          According to Margaret Chen, who runs Cambridge Associates’ endowment and foundation practice, colleges and universities are figuring out how to transition away from traditional energy.

          “The thing about divestment from fossil fuels is it’s important, and it’s a continuing trend,” Chen says.

          It is possible to have a diversified portfolio that performs well that does not include fossil fuels, Chen says.

        • The Daily BeastClimate Activists Are Deflating the Tires of SUVs in NYC

          A band of climate activists is prowling the streets of New York City at night, deflating tires on SUVs it believes are destroying the earth.

        • H2 ViewEU and Namibia sign MoU to develop green hydrogen

          Namibia has high hopes for green hydrogen, given its onshore wind, solar, abundant land and sea export opportunities, and wants to become a hub for the synthetic fuels industry.

    • Finance

      • Matt RickardDecoy Effect

        The Decoy Effect is a cognitive bias that occurs when people are presented with two options, and one of the options is clearly inferior to the other. The inferior option acts as a decoy, and people are more likely to choose the superior option if it is presented alongside the inferior option.

    • AstroTurf/Lobbying/Politics

      • IT WireiTWire – Ex-chief of ASPI Jennings again pushing the anti-China line

        The former chief of the Australian Strategic Policy Institute, Peter Jennings, appears to be in serious denial about one thing: no matter the state of bilateral relations with China, Australia is dependent on that country for its economic well-being.

        That’s probably why he is always dishing out his propaganda to the Federal Government or the states to dissociate themselves from this or that involvement with a Chinese entity.

        As iTWire has detailed quite often, ASPI, mostly funded by the Australian Government, calls itself an independent think-tank but is a lobby group for the defence industry and big technology companies.

        Jennings periodically ventilates his views — which are nauseatingly similar from week to week — in theThe Australian, trying to push the government to toe the US line. In fact, he seems to think he has a better idea of how to run the country, judging by the gratuitous advice he often doles out to Prime Minister Anthony Albanese.

      • NBCThere’s an exodus of Twitter executives, including the head of trust and safety, as Musk’s chaotic reign continues

        A spokesperson for the Federal Trade Commission said in an emailed statement that it is keeping watch on the situation.

      • Rolling StoneFake Verification, Twitter Is Burning: Bankruptcy Talk, FTC Threats, Executive Exodus

        The most visible problem arose from Musk’s harebrained idea of selling verification badges for $8 a month — without a mechanism for confirming the user’s identity. For years, you could trust that a blue check next to, for example, the name “Rudy W. Giuliani” indicated that the account was controlled by the former mayor of New York. Now, for a quite reasonable price, anybody can log on as the “real” Giuliani and tweet stuff like “I shidded” until they’re suspended.

      • Broadband BreakfastTwitter Loses Senior Officers, Gains White House and Federal Trade Commission Scrutiny

        Asked if Musk was “a threat to U.S. national security” and whether the federal government should “investigate his joint acquisition of Twitter with foreign governments, which include the Saudis,” Biden replied, choosing his words carefully:

        “I think that Elon Musk’s cooperation and/or technical relationships with other countries is worthy of being looked at,” Biden said. “Whether or not he is doing anything inappropriate, I’m not suggesting that. I’m suggesting that it [is] worth being looked at. And — and — but that’s all I’ll say.”

      • India TimesMusk warns Twitter’s survival is at stake as staff quits

        The developments were part of another whirlwind day in Musk’s acquisition of the social media platform. It began with an email to employees from Musk on Wednesday night ordering workers to stop working from home and show up in the office Thursday morning. He called his first “all-hands” meeting Thursday afternoon. Before that, many were relying on the billionaire Tesla CEO’s public tweets for clues about Twitter’s future.

      • France24Elon Musk warns Twitter could go bankrupt amid company turmoil

        Twitter’s new owner Elon Musk on Thursday raised the possibility of the social media platform going bankrupt, capping a chaotic day that included a warning from a U.S. regulator and departures of senior executives viewed as future leaders.

      • NPRSome Twitter users flying the coop hope Mastodon will be a safe landing

        But Mastodon is not the most intuitive social media platform. Mastodon is open-source software, meaning anyone so inclined could set up a server to host users and connect to other servers, making for a decentralized network.

        b “Nobody is in control of the entire network,” Rochko said.

        “It is, in effect, more democratic,” he asserts, because the operators of each individual server can set content standards based on the preferences of the communities they’re trying to serve.

        But he admits many new users get hung up on choosing which server from thousands to join.

      • DaemonFC (Ryan Farmer)Facebook is dying. Part II.

        In my last post, I mentioned that Social (Control) Media is dying off, and we’re no worse for wear because of it.

        I noted that Musk was ruining Twitter (as a business) and clearly had no idea what to do, because he has no successful businesses on their own merit, which make profit without ripping off the public via government theft of wages. (Taxation to give to private companies as endless bailouts.)

        Musk is hardly alone. Many of the large US corporations operate this way.

      • CNBCStripe lays off 14% of workers

        The cuts are a result of operating costs growing too quickly. Leadership misjudged how much the [Internet] economy would continue to grow, Collison wrote in the memo.

      • StripeCEO Patrick Collison’s email to Stripe employees

        Around 14% of people at Stripe will be leaving the company. We, the founders, made this decision. We overhired for the world we’re in (more on that below), and it pains us to be unable to deliver the experience that we hoped that those impacted would have at Stripe.

      • Business InsiderMeta’s and Stripe’s layoff memos are a lesson for companies on accountability and empathy

        Stripe’s memo told laid-off employees they would receive pay until at least February 21, 2023, annual bonuses for 2022, pay for unused time off, healthcare for six months, accelerated stock-option vesting, career support, and immigration-services support for visa holders. Meta’s memo pointed to similar benefits for laid-off employees based in the US; at least 16 weeks of base pay, paid-out PTO, healthcare for six months, and career and immigration support.

      • New York Times‘Economic Picture Ahead Is Dire,’ Elon Musk Tells Twitter Employees

        At the meeting on Thursday, Mr. Musk warned employees that Twitter did not have the necessary cash to survive, said seven people familiar with the meeting who spoke on the condition of anonymity. The social media company was running a negative cash flow of several billion dollars, Mr. Musk added, without specifying if that was an annual figure. He mentioned bankruptcy.

      • Tom’s HardwareApple Reportedly Helped China Chipmaker YMTC Hire US Engineers

        Apple assisted YMTC in hiring engineers from established Western companies in order to improve its yields and productivity, according to the NYT report that cites three people familiar with the matter. So far, neither Apple nor YMTC have confirmed or denied the information, though the California-based consumer electronics giant is known for helping its manufacturing partners to build their operations.

      • Misinformation/Disinformation/Propaganda

        • NBCAlex Jones ordered to pay an additional $473 million to Sandy Hook families

          Thursday’s order, imposed by Connecticut Judge Barabara Bellis, is in addition to the $965 million jurors last month ordered Jones to pay to the families of the shooting victims and an FBI agent who responded to the attack for the suffering he caused them by spreading the lies on his platforms, including his show Infowars, about the massacre.

        • VarietyAlex Jones Must Pay Extra $473 Million to Sandy Hook Families, Bringing Total to Nearly $1.5 Billion

          Alex Jones and his media company Infowars have been ordered to pay an additional $473 million to Sandy Hook families for promoting false conspiracy theories about the 2012 school shooting, bringing his total damages up to nearly $1.5 billion.

        • Associated PressAlex Jones ordered to pay $473M more to Sandy Hook families

          Infowars host Alex Jones and his company were ordered by a judge Thursday to pay an extra $473 million for promoting false conspiracy theories about the Sandy Hook school massacre, bringing the total judgment against him in a lawsuit filed by the victims’ families to a staggering $1.44 billion.

          Connecticut Judge Barbara Bellis imposed the punitive damages on the Infowars host and Free Speech Systems. Jones repeatedly told his millions of followers the massacre that killed 20 first graders and six educators was staged by “crisis actors” to enact more gun control.

        • Scoop News GroupOnline disinformation fuels violent threats against poll workers

          Disinformation researchers and security companies say that discussion on the [Internet] of violence against poll workers has surged in the run-up to the 2020 elections. In the three months leading up to Tuesday’s vote, online conversations about “violence against poll workers” spiked by 137% on Twitter, compared to the same time period before the 2020 election, according to an analysis carried out by the social-media monitoring firm Zignal Labs.

          Across all social media platforms, discussions of “election violence” increased by 790% in October compared to the previous month. Conversations about violence against poll workers increased by 225% over the same time period.

        • Scoop News GroupThe disinformation threat facing US midterms extends beyond Election Day

          “I certainly would not expect the disinformation to end on Election Day,” said Suzanne Spaulding, a former undersecretary at the Department of Homeland Security who now directs the Defending Democratic Institutions project at the Center for Strategic and International Studies. “I think in fact, that it will grow, particularly in a context in which it appears as though, for example, somebody who’s an election denier is losing.”

          Researchers and national security officials warn that how these narratives play out and whether they gain widespread acceptance could determine if a significant percentage of the public rejects the outcome of the elections. And if they don’t, they warn, that could trigger outbursts of political violence.

    • Censorship/Free Speech

      • VOA NewsIran Security Officials Arrest Spanish Nationals in Connection with Protests

        The most recent arrest was 24-year-old Ana Baneira, who HRANA says was taken into custody during the protests and jailed “in recent days,” citing sources close to her family, though they said the actual date she was arrested and her whereabouts are unknown.

      • Walled CultureThe Czech Republic’s proposed version of upload filters has a bad idea that could become a great one

        Over on the Communia blog, Paul Keller has a good exploration of how the Czech Republic is tackling the issue. The current Czech proposal is particularly interesting because it is one of the first to be available after the EU’s top court, the Court of Justice of the European Union (CJEU), brought a little clarity on the safeguards that need to be included in national implementations of Article 17. Notably, the language of the latest version of the Czech law: [...]

      • NCACAmy Coney Barrett And The Freedom To Read

        It concludes, “We do not state these propositions in the comfortable belief that what people read is unimportant. We believe rather that what people read is deeply important; that ideas can be dangerous; but that the suppression of ideas is fatal to a democratic society. Freedom itself is a dangerous way of life, but it is ours.”

      • PHRGlobal Organizations Condemn Turkish Government’s Arbitrary Detention of Leading Doctor, Demand Release

        Dr. Fincancı is a globally renowned forensic physician, anti-torture expert, and human rights champion. She has devoted her professional life to the investigation and documentation of torture. Preparing reports on cases of torture and writing on medical ethics in the 1990s, when torture was prevalent in Turkey, she was met with oppression and resistance by the state. During this period Dr. Fincancı co-developed the Istanbul Protocol, the UN-endorsed, global standard for the investigation and documentation of torture.

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • NBCLegally blind Florida man arrested when cane is confused for a gun

        Hunter said the investigation showed the deputies violated policies. Harrison faces a suspension of seven days without pay. He will not be eligible for any “favorable action” for two years, Hunter said. Gohde faces suspension without pay for two days, Hunter said.

      • NPRSupreme Court struggles with a case dealing with the rights of Native American Tribes

        ICWA established minimum federal standards for removing native children from their homes. It required state courts to notify tribes when an American Indian child is removed from her family, and it required that in foster and adoption placements, preference be given first to a child’s extended family, then to other members of the tribe, and, if neither is available, the preference is for a child to be placed with a different tribe.

        In the court Wednesday, lawyers for the state of Texas and for non-Native adoptive parents told the justices that ICWA violates the Constitution by discriminating based on race. But the tribes and the U.S. government countered that the courts have long considered American Indians to be a political group, not a racial group.

      • International Business TimesBritish tourist dies after being ‘starved and beaten’ in Dubai police station

        “His behaviour caused people to become perplexed and annoyed as he was using foul language which some of the Muslim prisoners took great offence to,” added the statement.

        “I was told he was beaten up at the prosecutor’s office and then beaten in the van. I was told by many prisoners’ guards had boasted about having beaten him,” read another excerpt from his statement.

      • France24Taliban bars Afghan women from public parks, funfairs in Kabul

        The new rule, introduced this week, further squeezes women out of an ever-shrinking public space that already sees them banned from traveling without a male escort and forced to wear a hijab or burqa whenever out of the home.

        Schools for teenage girls have also been shut for over a year across most of the country.

      • teleSURFirst Indigenous Water Utility To Operate in Canada

        A transfer agreement was formally signed on Monday to make the Atlantic First Nations Water Authority (AFNWA) become the first indigenous water utility in Canada.

        The agreement, signed by Potlotek First Nation Chief Wilbert Marshall, AFNWA Chief Executive Officer Carl Yates and the federal Minister of Indigenous Services Patty Hajdu, initiated the transfer of responsibility for the operation, maintenance, and capital upgrades of all water and wastewater assets in participating First Nations to the Indigenous-led AFNWA.

      • BBCAfghanistan: Taliban ban women from Kabul parks

        A spokesman for the Vice and Virtue Ministry told the BBC those managing parks in the capital had been told not to allow women in.

        The group claims Islamic laws were not being followed at parks.

      • ABCTaliban official: Women banned from Afghanistan’s gyms

        The Taliban overran the country last year, seizing power in August 2021. They have banned girls from middle school and high school, despite initial promises to the contrary, restricted women from most fields of employment, and ordered them to wear head-to-toe clothing in public.

        A spokesman from the Ministry of Virtue and Vice said the ban was being introduced because people were ignoring gender segregation orders and that women were not wearing the required headscarf, or hijab. Women are also banned from parks.

      • ABCIran protests rage on streets as officials renew threats

        At least 328 people have been killed and 14,825 others arrested in the unrest, according to Human Rights Activists in Iran, a group that’s been monitoring the protests over their 54 days. Iran’s government for weeks has remained silent on casualty figures while state media counterfactually claims security forces have killed no one.

        As demonstrators now return to the streets to mark 40th-day remembrances for those slain earlier — commemorations common in Iran and the wider Middle East — the protests may turn into cyclical confrontations between an increasingly disillusioned public and security forces that turn to greater violence to suppress them.

      • NBCTaliban ban women from parks and gyms in Afghanistan

        Mohammed Akef Mohajer, a Taliban-appointed spokesman for the ministry, said the group had “tried its best” over the past 15 months to avoid closing parks and gyms for women, ordering separate days of the week for male and female access or imposing gender segregation. “But, unfortunately, the orders were not obeyed and the rules were violated, and we had to close parks and gyms for women,” he said.

    • Monopolies

      • Patents

      • Copyrights

        • Torrent FreakMindGeek Wins $32m in Damages from Adult Pirate Site Daftsex.com

          Popular adult entertainment site DaftSex will soon lose its domain name. MindGeek defeated the pirate site in court and also secured more than $32 million in damages. The verdict comes after the court previously denied a broad injunction that required hosting and CDN providers to take action as well.

        • Locus MagazineCommentary by Cory Doctorow: The Swerve

          There are five major publishers (maybe four, by the time you read this, depending on whether the FTC allows Penguin Random House to go ahead with its acquisition of Simon and Schuster). There’s one major national brick-and-mortar book­store chain. There’s one major global ebook seller (which also sells more than 40% of all trade books, and sells nearly every trade audiobook). There’s one independent national trade book distributor.

          Between them, these firms demand an ever-greater share of the wages of writers’ creative labor. Contracts demand more – ebook rights, graphic novel rights, TV and film rights, worldwide English rights – and pay less. Writers are expected to hustle more – on social media, on book blogs, on review sites – while publicity departments dwindle.

          We’re the hungry schoolkids. The cartels that control access to our audiences are the bullies. The lunch money is copyright.

  • Gemini* and Gopher

    • Personal

      • Bingeing Time Travel shows

        This happens to me every so often, and I am old enough to just let it roll off. I’ve hit a local low. My brain function is at a sad level, and I am muddled and confused about simple things. I must not do anything important for a few days. I managed to sign myself out of my Amazon account on the TV trying to get to Netflix. Doi.

        Actually I am definitely past the low. I stepped up excercise, and ran a couple of miles today on the treadmill in addition to a ton of walking, way more than double my target. That generally helps.

      • Mysterious spells

        Introducing “mysterious spells” helped solve all those weird timing issues and made the spell identification rules an optional benefit to PCs and NPCs as opposed to a chore to slow down the game when it doesn’t matter.

        Making the spell “mysterious” doesn’t cost anything, it’s just a free, optional cloak, and it’s always better but it’s such a drag so we usually only do it rarely. But when it matters it matters.

    • Technical

      • Internet/Gemini

        • Evolution of the Web.

          A website is an online place where you can tell people to follow you on different social media so they might have a chance, if the algorithm allows it, to read what you hope to write in the future.

          A social media is a platform where you can create an account, get an audience and ask them to follow you on another social media platform.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Thursday, November 10, 2022

Posted in IRC Logs at 2:49 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmNoS5pwjbVFhXgeM4Z5r9Faun6zY4ZF9Ky4aTQyaVNVPo IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmTzycM9XfHBWJHt7FryqniBjxA7qPNmtyA76XGdGurxHu IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmVFPcX4HcGD2XmDuX1kPs2mVtCKbyNdqxN5Cu41k5NsoN IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmbQPTRXgQuhMynGtRFbUCC5qViRUHPPhJBx5XR41NMudv IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmZYjEMq4PzJBM2No8aBcfemF7EJfYzdGkr17fSY8XVgMw IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmXJhxPqaHbmQ9zskUp7gXybBcnHEwpKuz4ccsYRHyhT87 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 Qmdx5SGTinnmthJ8KZURSvuEzwZC7Kj7mthCn7cNQn4f6n IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 Qmeb5sB133nGs4PmksgxMPbKUq6Bxc1QCSSbHoRxRPN542 IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmY1X6m9vp1ra3VDuZ2GjBhKAvVsGutnYCpd4oKRpMw4SV

Our Sixteenth Anniversary

Posted in Site News at 12:48 am by Dr. Roy Schestowitz

BN's registry

BN's first post

Summary: This coming Sunday our first post turns 16; this coming year should be an exciting one

This coming weekend (assuming we count first post rather than domain registration; details above) we’ll turn 16. There’s only good news, not bad news, for the site. We gradually continue our migration to an Alpine server (Git was successfully migrated this week) and we expect to have even more time to devote to this site, likely meaning more output (articles, IRC and so on).

“The demise of Social Control Media has had no impact of us; we never participated in such stuff.”There’s no major celebration, even though in prior anniversaries we had cakes and stuff [1, 2, 3]. Last night we opened a couple of small cakes here (chocolate and carrot cakes), but due to pandemic (still lots of deaths here in the UK) we stay home.

Our upcoming (seventeenth) year will bring many changes as we strive to simplify the site from an engineering perspective. We have our own (custom-made) CMS now and we’re seeing a healthy level of interest in the site and the Gemini capsule. The demise of Social Control Media has had no impact of us; we never participated in such stuff. Social Control Networks were a waste of time all along — a temporary bubble of sorts.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts