Kali Linux is a powerful and versatile operating system designed for hackers and security professionals. It is a Debian-based distribution that comes loaded with a variety of security and hacking tools that are essential for penetration testing, vulnerability analysis, and digital forensics.
This week’s episode of Destination Linux, we will be discussing Linux Kernel 6.2 and all it's glorious wonder. Then we talk about open source wrestling robots Plus, we have our tips/tricks and software picks.
We're celebrating 500 episodes with the biggest announcement yet.
Whisper is an automatic speech recognition (ASR) system trained on 680,000 hours of multilingual and multitask supervised data collected from the web. Powered by deep learning and neural networks, Whisper is a natural language processing system that’s built on PyTorch.
The software offers transcription in multiple languages, as well as translation from those languages into English.
This is free and open source software.
In this tutorial, we will show you how to install Darkstat on Rocky Linux 9. For those of you who didn’t know, Darkstat is an open-source, web-based network traffic analyzer that captures and analyzes network traffic.
It can be a bit different when installing and removing packages in NixOS. Here, we explain it to make things easy.
Pigz is a faster compression tool. Learn how to use it for generating .gz compressed file faster in Linux.
Clearing the buffer, cache, and swap memory in Linux can be done easily with a few simple commands.
Assume you are a system administrator of a big project, and you often receive complaints from the QA team that the development team is messing up the codebase and vice versa. Upon close inspection, you find out that two teams are a part of the same group, sharing the same codebase. So you ask your senior to help with the problem, and he advises you to make two groups for all the users of the development and QA teams. But, you have no clue how to add users to a group in Linux. Well, we are here to help solve this problem. In this article, we have explained how to create a new group, create new users, and then add a user to a group in Linux.
After completing a massive project, your team and you decided to use containerization for the entire project in the staging and production steps to avoid any environment-related issues and last-minute “it works on my machine” statements. But, while creating a container, you encountered the “exec user process caused: exec format error” and have no clue how to fix this. Don’t worry, as we are here to help. In this guide, we will explain the possible reasons for this issue, along with some reliable fixes to solve the “exec user process caused: exec format error” on your Linux system.
Every week, the Epic Games Store gives away a new game from their catalog.
Nitrux is a desktop-focused Linux distribution based on the Debian unstable branch, featuring a heavily modified KDE Plasma desktop environment called NX Desktop, the MauiKit application framework, and a unique approach to package management.
That means there will be no conventional package management here. Instead, all the apps you need can be installed as Flatpak packages, AppImages, or inside Distrobox containers.
Precisely one month ago I joined KDE e.V., the non-profit organization behind KDE, as Software Platform Engineer. This is part of three positions in KDE's "Make a living" initiative.
The exact scope of this position is a bit vague. I like to describe it as "Taking care of everything needed so that people can build and enjoy awesome software". A large part of that is taking care of foundational libraries such as Qt and KDE Frameworks, but it can be really anything that helps people do awesome things. This is pretty much what I've been doing as a volunteer for the last couple of years anyway.
I've been using Linux as my primary desktop OS since 1997 and I've used and tested just about every flavor imaginable. During that time, I've tried many Linux distributions claiming to be perfectly suited for users with little or no experience. Sometimes those claims are founded, while others… not so much.
Even so, every time I hear of a new distribution release geared toward new users, I get excited because it means there's one more version of the open-source operating system that can be used to sway new users away from their proprietary OSs. So, when I read there was a new release of Emmabuntüs, you can bet I wanted to try it right away.
LibreELEC is a lightweight free and open source operating system designed to turn a computer into a media center. The GNU/Linux distribution provides “just enough” of an OS to run the Kodi media center application, which allows your PC to quickly boot straight to Kodi.
Linux distro openSUSE has begun enforcing Kernel Lockdown when Secure Boot is enabled, creating issues for many users.
Kernel Lockdown was introduced in version 5.4 of the Linux kernel and is designed to help protect the kernel from tampering and unauthorized modification, and serves as an important security feature. It works together with Secure Boot, which is a system to ensure the bootloader process is running legitimate, trusted code signed by Microsoft-controlled master keys.
Yellow Tail Tech is an EdTech company focused on helping people—with little to no IT or technical background—acquire the required competencies to land a career in IT. Founded by industry professionals Paloma Vilceus and RHCSA Jubee Vilceus, the YTT team brings real-world demands into accessible training courses.
The company is again raising the bar and setting the standard for innovation in the industry by partnering up with Red Hat, Inc., a US-based software company known for developing enterprise open-source software solutions. Red Hat Enterprise Linux offers an open-source platform that allows companies to develop app development, storage, virtualization, automation, and more technologies.
Red Hat OpenShift GitOps provides a compelling out-of-the-box experience for the majority of Red Hat OpenShift customers. However, there are times when organizations have specific requirements to satisfy that require additional tuning. OpenShift GitOps provides a number of global-level environment variables that organizations can apply to tailor their experience.
5 Environment variables: Overview
OpenShift GitOps supports the use of environment variables to control operator behavior in specific areas. The following table provides a brief overview of five variables from the upstream documentation. Note that this list can change between releases, so it's always a good idea to verify new, deprecated, or removed variables.
rpminspect 1.11 is now available. The last release was in June of 2022. This release is definitely the largest so far. There are 258 closed issues in this release across 211 pull requests in 354 different€ commits.
This release saw a lot of continued fixes in specific inspections, such as annocheck and abidiff. There was a lot of good reporting from different users and I was able to address a lot of issues with very specific reproducers. I also received a lot of feedback on how best to report changes, which improves the usability for developers, QA, and other€ teams.
I bought a MACCHIATObin Single Shot a few months ago with the idea of creating a NAS out of it. The results have been very good and, to begin in an easy way, I decided to install Fedora 37 Server Edition.
Now that I’ve decided exactly what I want out of it, I reinstalled Fedora and started from scratch with exactly what I wanted. I decided to install Fedora 37 IoT, which is an rpm-ostree based release.
When I paint postcards I tend to start with a draft (usually on lightweight (250 g/m€²) watercolour paper, then trace1 the drawing on blank postcards and paint it again.
I keep the drafts for a number of reasons; for the views / architectural ones I’m using a landscape photo album that I bought many years ago, but lately I’ve also sent a few cards with my historical outfits to people who like to be kept updated on that, and I wanted a different book for those, both for better organization and to be able to keep them in the portrait direction.
If you know me, you can easily guess that buying one wasn’t considered as an option.
My credit card and bank account rarely agree on the date for when I pay it off1. Since I added balance assertions for bank account transactions, I need the transaction in my ledger to match what the bank thinks, otherwise the balance assertions would start to fail.
The skew is not normally more than a couple of days, and could be corrected by changing the date for just one of the two postings. But the skew is not very important, and altering the posting date could be used for something more useful.
date warping credit card repayments
My credit card bills land halfway through the month, so February's bill covers transactions between January 15th and February 14th. I pay off the bill in full each month using Direct Debit. The credit card company consider the bill paid immediately, but they don't actually draw it until the end of the month (Jan 31 in the running example). This means the payment transaction for a given month lands halfway through the period covered by the next month's bill.
Akvorado collects sFlow and IPFIX flows, stores them in a ClickHouse database, and presents them in a web console. Although it lacks built-in DDoS detection, it’s possible to create one by crafting custom ClickHouse queries.
DDoS detectionââ¬â¹
Let’s assume we want to detect DDoS targeting our customers. As an example, we consider a DDoS attack as a collection of flows over one minute targeting a single customer IP address, from a single source port and matching one of these conditions:
- an average bandwidth of 1 Gbps,
- an average bandwidth of 200 Mbps when the protocol is UDP,
- more than 20 source IP addresses and an average bandwidth of 100 Mbps, or
- more than 10 source countries and an average bandwidth of 100 Mbps.
Hello everyone! It’s a great day with a new release of the Kubuntu Manual to match the recently-released Kubuntu 22.04.2 update.
Snapcraft, Charmcraft, Rockcraft … you may have heard of these tools, but have you ever wondered how – and by who – they are developed? These tools are the intellectual and keyboard-driven product of Canonical’s Craft team. Officially, the team’s name is *Craft, and the asterisk symbol can easily be seen as a “star” (The asterisk is also a play on the glob wildcard character because the *Craft team maintains all Canonical tools whose name ends in ‘craft’). However, due to obvious trademark implications in calling the team Starcraft, we will stick with the shorter and somewhat less glamorous Craft henceforth.
In this article, a first of many, we’d like to share the work being done in the team. After all, if you’re using these tools to build your snaps or charms, you may also be interested to know what the team is doing day to day, or rather fortnight to fortnight, as we conduct our business on a bi-weekly cadence. So let us show you what we have done in the last two weeks.
Snapcraft, call for testing, core24
Are you interested in the latest trends in open source technologies? Look no further than Everything Open 2023 in Melbourne, Australia!
Join us at the 6th edition of Operator Day at KubeCon Europe - Speakers will talk about their software operator journey, from configuration management to application management.
There was a post to the forum that VPN does not work in Easy:
https://forum.puppylinux.com/viewtopic.php?t=8157
Alfons reported that he got openvpn working, by installing DEB packages.
So, I have compiled openvpn in OE and posted to the above forum thread.I have added 'openvpn' to the package-list so it will be builtin in the next release of EasyOS.€ € €
For reasons I won't bore anyone with I needed to build a 32-bit big-endian system with the Yocto Project to test a package, and I thought I'd write the steps down in case I ever need to do it again (or, even more unlikely, someone else needs to do it).
For unsurprising reasons I thought I'd do a big-endian Arm build. So we start by picking the
qemuarm
machine, which is a Armv7-A processor (Cortex-A15, specifically) in little-endian mode by default.
moteus r4.11 has two external connectors, the ABS connector (AUX2) and the ENC/AUX1 connector. The ABS connector was designed initially just to have 2 I2C pins. The ENC connector just has the random pins that were used for the onboard encoder SPI plus one more.
Telegram is a popular messaging app that has gained immense popularity. Its easy-to-use interface, end-to-end encryption, and numerous features have become the go-to messaging app for millions of users worldwide.
What is HIPAA?
HIPAA was enacted in 1996 by the United States Congress as a federal law. It establishes national standards for electronic healthcare transactions and protects personal health information (PHI).
hof is an exceptional tool that brings together various aspects of development into a cohesive and streamlined workflow. With hof, you can easily create and modify data models, generate code, and automate tasks with CUE.
Note: This article is also available in Korean.
As discussed before, South Korea’s banking websites demand installation of various so-called security applications. At the same time, we’ve seen that these applications like TouchEn nxKey and IPinside lack auto-update functionality. So even in case of security issues, it is almost impossible to deliver updates to users timely.
And that’s only two applications. Korea’s banking websites typically expect around five applications, and it will be different applications for different websites. That’s a lot of applications to install and to keep up-to-date.
Luckily, the Veraport application by Wizvera will take care of that. This application will automatically install everything necessary to use a particular website. And it will also install updates if deemed necessary.
[...]
Remaining issues
Application signature validation was still broken in Veraport 3.8.6.4. Presumably, that’s still the case in Veraport 3.8.6.5, but verifying is complicated. This is no longer a significant issue since the connection integrity can be trusted now.
While
checkProcess
is no longer available, thegetPreDownInfo
command is still accessible in the latest Veraport version. So any website can still see what security applications are installed. Merely the version numbers have been censored and are no longer usable.It seems that even Veraport 3.8.6.5 still uses the eight years old mongoose 5.5 library for its local web server, this one hasn’t been upgraded.
None of the conceptual issues have been addressed of course, these are far more complicated to solve. Veraport customers still have the power to force installation of arbitrary applications, including outdated and malicious software. And they aren’t restricted to their own website but can sign a policy file for any website.
A compromised signing certificate of a Veraport customer still cannot be revoked, and neither is it possible to revoke a known malicious policy. Finally, the outdated root certificate (1024 bits, MD5) is still present in the application.
As Mozilla reaches its 25th anniversary this year, we’re working hard to set up our 'next chapter' — thinking bigger and being bolder about how we can shape the coming era of the internet. We’re working to expand our product offerings, creating multiple options for consumers, audiences and business models.
Last week, we talked to Ximena Alcaman who's working on LibreOffice installer improvements as part of the Outreachy programme. Outreachy provides internships to people subject to systemic bias and impacted by underrepresentation in the technical industry where they are living.
On March 7, 2003, a struggling company called The SCO Group filed a lawsuit against IBM, claiming that the success of Linux was the result of a theft of SCO's technology. Two decades later, it is easy to look back on that incident as a somewhat humorous side-story in the development of Linux. At the time, though, it shook our community to its foundations. It is hard to overestimate how much the community we find ourselves in now was shaped by a ridiculous lawsuit 20 years ago.
SCO claimed to be the owner of the Unix operating system which, it said, was the power behind the "global technology economy"; the company sold a proprietary Unix system that ran on x86 hardware. By that point, of course, the heyday of proprietary Unix was already well in the past, and SCO's offerings were not doing particularly well. The reason for that, SCO reasoned, was the growth of Linux — which was true to a point, though Windows had been pushing a lot of Unix systems aside for years.
In this article I use the words “librism” and “librist” as direct borrows from the French “librisme” and “libriste”. You can define librism as a conjunction of the free software and free culture movements. I prefer to define it as the fringe of the anticapitalist struggles that strives to destroy intellectual property by creating new intangible commons and protecting them.
The following is a translation of an interview published in the February 2023 issue of Alternative Libertaire. I conducted this interview with the goal of offering to its readers a glimpse of what the free culture movement is. The magazine doesn’t target free software or free culture enthusiasts, and its printed edition constrains the size of its content. Please excuse the resulting briefness and simplifications.
I recently ran into this problem and couldn't find a solution online:
How do you compute the nested permutations of an array that contains sub-arrays? This is all the ways to shuffle an array, including shuffling sub-arrays
Nothing short of wacky usage of plot() function with xspline to interpolate the points, but still a “parameter” short of Bezier’s curve.
Practical tutorial on how to use the read() function to read the files and the methods that the C language provides to detect and identify the errors.
Guide on what a string consists of in the C language, their elements, the kind of data they use, how they are encoded, and what characters each type supports.
Practical tutorial on how to use the free() function to free the dynamically allocated memory using its syntax and the theoretical description of how it works.
Tutorial on how to use the pthread_cancel() function to ask the system to terminate a running thread and how to compile the programs from the pthread library.
In programming, modulus or remainder is the operation that returns the remainder of a division. In Bash, the modulus operator is represented by the % symbol. The modulus operator is commonly used in programming to check if a number is divisible by another number or to perform operations that require a cyclic pattern.
In programming, finding the remainder of a division is a common task. In Bash, the modulus operator "%" can be used to calculate the remainder of a division. However, the output of the modulus operator can be negative when dealing with negative numbers.
Researchers at Nivaagaard Collection overjoyed to reunite ‘Double Portrait of a Father and Son’ with their missing matriarch
Eren Can who lost both his mother and father, Hatice Can and Mithat Can, in the February 6 earthquakes, invited everyone to light candles in front of their windows starting this evening in order to unite our pain and mourning.
The construction of 13,866 housing units began in the quake-hit region, according to the minister.
In part 3 of her series, Christina Whiteley relates the importance of "time freedom" and how she and her family have found it in Mexico.
For years I took pride in arriving on the dot – sometimes to the mild chagrin of my host, author Robert Klose writes in an essay.
Sometime in the 2010s, intersectionality left the ivory tower and got thoroughly wrapped up in the culture wars.
Elsewhere, the oldest hedgehog in the world is Danish
A team from U-M has developed a new software tool to help researchers across the life sciences more efficiently analyze animal behaviors.
A study by a team of researchers, including two from U-M, aims to help society, including regulators considering AI safety regulations and organizations considering adopting AI.
Is there another Earth out there?
Are we alone out there?
Natural selection before the origin of life.
There may have been two 'Big Bangs'.
The most massive single objects in the Universe.
It’s widely known from test scores that the pandemic set back students across the country. But many parents don’t realize that includes their own child. Opportunities to catch up are plentiful in some places, thanks to federal COVID aid, but won’t last forever. It will take better communication with parents to help students get the tutoring and other support they need, experts say.
The last resort.
It’s tearing birds apart from the inside.
The World Economic Forum’s Blue Food Partnership launched today a Global Sustainable Aquaculture Roadmap at the Our Ocean Conference in Panama, in collaboration with FUTUREFISH and the Aquaculture Stewardship Council and in consultation with the Partnership’s Sustainable Aquaculture Working Group, to strengthen sustainable growth in aquaculture.
With tens of millions of poultry culled every year to contain avian influenza, scientists are rushing to find new ways to protect flocks from infection and avert a human pandemic.
In a study of 334 male track athletes, researchers found that air pollution levels in the Air Quality Index’s “good-to-moderate” range led to 5k race times by more than 10 seconds.
Despite rules and ethical guidelines put in place, users are still finding ways to manipulate ChatGPT.
Metabase Q documents FiXS, a new malware family targeting ATMs in Latin America.
Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.
Health systems buffeted by labor and supply chain costs and broader economic woes have another unwieldy financial problem: the soaring costs of cyber insurance.
Why it matters: It may not be sexy — or the first thing you think about when cybercriminals wreak havoc on hospital infrastructure. But the sheer scope of the problem, and insurers' reluctance to cover losses stemming from ransomware attacks, is hitting hospitals in a very real way, Moody's Investors Services points out.
When a security vulnerability has been found and confirmed in curl, we request a CVE Id for the issue. This is a global unique identifier for this specific problem. We request the ID from our CVE Numbering Authority (CNA), Hackerone, which once we make the issue public will publish all details about it to MITRE,
There are nearly 900 vulnerabilities in CISA's Known Exploited Vulnerabilities (KEV) catalog, including nearly 100 discovered in 2022.
Carding marketplace BidenCash last week released information on more than 2.1 million credit and debit cards.
Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).
Although electronic or 'e-voting' has been used in Estonia for many years now, the chances of a similar system being adopted in Latvia appear to remain extremely slim, reports Latvian Radio.
Play ransomware operators have leaked data allegedly stolen from the City of Oakland last month.
Authorities disrupted an international cybercrime gang which has been blackmailing large companies and institutions for years.
EDRi’s new position paper outlines how the European Commission’s proposal for a European Health Data Space, in an attempt to make use of people’s health data, would sabotage the rights of patients to make decisions about their private medical information.
As we’ve added more connected devices to our homes and more connectivity to cars, we’ve become locked into the app economy. What the heck ever happened to the good ol’ web? I recently asked myself that question as I was€ testing a de-Googled smartphone; it runs the open source version of Android, or AOSP.
The US can stop Twitter Inc. from releasing details about the government’s demands for user information in national security investigations, a court ruled, in the same week House Republicans are to grill national security officials over surveillance.
Twitter had protested the government’s redactions to a 2014 “transparency report” that featured a numerical breakdown of national security-related data requests from the previous year. The US appeals court in San Francisco on Monday agreed with a lower-court judge that the Justice Department had shown a “compelling” interest in keeping that information secret.
Twitter is experiencing a bevy of glitches as links stopped working, some users were unable to log in and Tweetdeck stopped working for others. The company, which has experienced an uptick instability and bugs in recent months after Elon Musk decimated its staff, said Twitter said Monday: “Some parts of Twitter may not be working as expected right now. We made an internal change that had some unintended consequences. We’re working on this now and will share an update when it’s fixed.”
Twitter is, once again, not working very well. The site has faced an increasing number of technical snafus since Elon Musk took over the platform in October 2022, and began gutting the company’s staff in multiple rounds of layoffs.
Politicians lean on the financial industry to target activities they don’t like.
The online counseling service BetterHelp has agreed to return $7.8 million to customers to settle with the Federal Trade Commission for sharing health data it had promised to keep private
The battle for Bakhmut is not over — at least not yet. Ukrainian assault brigades offered Moscow a bloody reminder of that over the weekend.
Everything is in order regarding the€ with the loyalty of€ State Police (VP) employees, and there are no pro-Kremlin employees in the police at all, said Latvia's senior police officer€ Armands Ruks, on€ the "Morning Panorama" program of Latvian Television March 6.
Ukrainian military leaders are vowing to hold onto Bakhmut as Russian forces encroach on the devastated eastern city. The Kremlin has sought to capture it for six months at the cost of thousands of lives. Less than a week ago, an adviser to Ukrainian President Volodymyr Zelenskyy said the Ukrainian defenders might retreat from Bakhmut and fall back to nearby positions. But Zelenskyy’s office said Monday that he chaired a meeting in which the country’s top military brass spoke in favor of continuing the defense and strengthening the Ukrainian positions.
Daniel Ellsberg, whose leaking of the Pentagon Papers and decades of antiwar activity have inspired generations of whistleblowers and activists, said Wednesday that he has terminal cancer, but that there's "tons more" movement work for him to do before he's gone.
Suppose that the U.S. were at war with Canada. Don’t laugh; South Park devoted an entire episode to just such a conflagration; if they, with their usual keen insight, could depict such an eventuality, it could indeed actually occur. Also posit that Russia took the side of our neighbor to the north in this altercation.
The following is an adapted version of the presentation made at the webinar "Connecting Dots" on 2.25.2023. Other speakers were Dr. Marwa Osman and Dr. Atif Kubursi. Introduction Syria has been at war since 2011. The conflict is in a stalemate. US troops control nearly a third of the country.
Appointed as Federal Minister of Defence of Germany in January, B.Pistorius will conduct his first visit to Lithuania on March 7. According to the Lithuanian Ministry of Defence, he will meet with his troops deployed with the NATO enhanced Forward Presence Battalion Battle Group Lithuania.
Since the invasion of Ukraine in February 2022, there has been an unprecedented number of sanctions imposed on Russia and Russian citizens. However, while 10,100 restrictions have been imposed, only a few of the 100 richest Russian individuals have been reached by them.
The man who will lead international climate talks later this year in Dubai, United Arab Emirates spoke Monday at the premier oil and gas industry conference in Houston, Texas, known as Ceraweek. Sultan al Jaber is also CEO of the Abu Dhabi Oil company. The climate talks have come in for criticism for choosing an oil company CEO to lead them this year.
Three years after New York legalized micro-mobility bikes and scooters, lawmakers and building managers are grappling with how to make them safer in the wake of numerous fires, some fatal.
The Central Asia Energy Trade and Investment Forum 2023 that took place in London, March 2-3, convened policymakers from Kazakhstan, Kyrgyz Republic, Tajikistan and Uzbekistan, as well representatives of international financial institutions and the private sector to discuss the interlinked challenges of energy security, decarbonization, and economic growth.€
The United Nations has created a treaty that protects marine life in nearly two-thirds of Earth’s oceans. The treaty establishes a new group to manage conservation, and it outlines rules for conducting environmental impact assessments for commercial work.
Under pressure from animal rights activists, HelloFresh will stop selling coconut milk sourced from Thailand in its meal kits in the coming months over monkey labor allegations, the company confirmed to Axios.
As they escalate a debt-limit standoff, House Republicans blame President Biden’s spending bills for an increase in deficits. Voting records show otherwise.
Data published March 6€ by the Central Statistical Bureau of Latvia (CSB) show that in January€ 2023, compared to January€ 2022, industrial production output€ decreased by 9.8€ % (according to calendar adjusted data at constant prices).€ Output downturns were€ recorded in manufacturing (6.1€ %) as well as mining and quarrying (20.8€ %).
The Lebanese pound has lost as much as 98% in value since late 2019, and now most restaurants and many stores are demanding to be paid in dollars to bypass what’s seen as a nearly useless currency. This month, the government is allowing grocery stores to do the same. While this “dollarization” aims to ease inflation and stabilize the economy, it could deepen the financial crisis and push more people into poverty.
New evidence shows that many employers are mislabeling rank-and-file workers as managers to avoid paying them overtime.
What explains this year's pop in consumer spending? Boomers might be at least partially to blame.
The big picture: Social security recipients (of which retirees make up an overwhelming share) received an 8.7% cost-of-living adjustment this year — the single-largest increase in more than four decades.
Once Credit Suisse’s largest shareholder, Harris Associates no longer holds any stock in the Swiss bank, which warned of losses for this year and witnessed unprecedented client exodus.
Walmart said the closures followed a “careful review of their overall performance."
SiriusXM joins tech titans such as Microsoft € and Google-parent Alphabet€ that€ cut headcount by the thousands€ to weather a tough economy.
Jeffrey Epstein wasn’t the only billionaire philanthropist who had houses in Palm Beach, New York, Paris, London, and an island paradise, and threw elite sex parties for the rich and famous. Meet George Huntington Hartford II, the Original Jeffrey Epstein.
The leak to the WaPo about a dispute last summer about the stolen document investigation is concerning for what it reveals about how cowed Washington FBI agents remain by Trump's bullying. But it raises new concerns about a leak to Devlin Barrett in November, which seemed another attempt to preempt further investigation.
Mary Robinson, the former president of Ireland, will deliver the Wege Lecture on Sustainability on March 13. Her talk will focus on "Climate Justice: Hope, Resilience and the Fight for a Sustainable Future."
The devastating earthquake that hit Turkey on February 6 killed at least 45,000 people, rendered millions homeless across almost a dozen cities and caused immediate damage estimated at $34 billion -- or roughly 4% of the country's annual economic output, according to the World Bank.
Argentina has a track record of producing winning films about its dictatorship. But, Santiago Mitre’s “Argentina, 1985” stands out for its focus on the aftermath.
At least 14 U.S. states have introduced bipartisan voting rights bills this year to restore voting rights to felons. Former prisoners say the right to vote after finishing their sentence aids an easy transition back into society.
Judy Heumann, who died Saturday, was a disability rights activist. Her efforts led to the implementation of important legislation such as the Americans with Disabilities Act, the Individuals with Disabilities Education Act, and the Rehabilitation Act.
Teenagers and young adults are flummoxed. The reason it keeps happening involves an online prompt and product design.
The State’s Attorney of Lake County, Illinois, Eric Rinehart, played “Pin the Tail on The Black Guy”, and got caught, again. In cahoots with the police department of Gurnee, Illinois,
The Foreign Ministry has asked the ambassador to "explain" the visit.
The clock is ticking on TikTok. Sen. Mark Warner (D-Va) said he is planning to introduce a bipartisan bill this week that would grant the government authority to “ban or prohibit” foreign technology like the China-owned TikTok. The€ Senate€ Intelligence Committee chairman told “Fox News Sunday” he is working with Sen. John Thune (R-S.D.) on a bill...
Ceylan à žahinli was not yet a journalist when the events mentioned in the indictment took place.
South Korea on Monday announced a deal to compensate victims of forced labor by Japan during its occupation of Korea as the two United States allies try to smooth relations in the face of an increasingly turbulent Indo-Pacific security situation.
Meena Kotwal started€ a news outlet focused on Dalit and other marginalized groups in India, hoping that telling their stories would help improve their lives.
I've long been fascinated by the concept of the "public intellectual." I view this person as embodying two characteristics: first, an intellectual, as measured by scholarship; second, a public-facing scholar, as measured by media exposure.
The Central Staff Committee of the European Patent Office supports the initiative of important European companies who’ve requested to do something about declining patent quality at the EPO.
I’ve become somewhat callous toward patent eligibility jurisprudence and so was surprised when I read the Federal Circuit’s decision in ADASA Inc. v. Avery Dennison Corp., 55 F.4th 900 (Fed. Cir. Dec 16, 2022). The case concluded that constructively dividing a fixed-length binary number into different sub-portions was not an abstract idea.€ Now, the accused infringer has asked the Supreme Court for review.
Bill C-18, the Online News Act, has been at the centre of growing firestorm in Canada following reports that Google has begun testing the removal of links to Canadian news services for a small percentage of its users.
The first race of the season should have been dull and predictable. Verstappen coasted to an easy win. Ferrari had an engine failure. Mercedes look like they've gone backwards. But the race was fun to watch because of Fernando Alonso who lost positions at the start, and got them back by making audacious moves in unexpected places.
Oh the joys. I felt the first symptoms of coming down with something on Monday. Somehow I coughed and struggled through a four hour workshop that had already been postponed a few times and pretty much collapsed into bed immediately after dinner. You know, man-flu.
Seriously though, this is the third time in a couple of months that I have fallen sick. I do think that generally speaking I do take care of myself, but the situation at work is getting to me more and more. I neglected the first two outbreaks and went back to work relatively fast. This time hopefully I'm smart enough to take some rest.
While I concede that most coffee drinkers I know wouldn't drink the coffee without the caffeine, I don't think they enjoy it any less than someone who likes tea. While tea drinkers may have more tastes to note with the wide variety of teas out there, you can ask coffee drinkers what kinds of coffee they like and you'll get a variety of answers. As a reformed coffee AND tea drinker myself (I can't drink a lot of caffeine anymore), I can say that I loved finding different types of coffee beans, from Cuban/caribbean, to Ethiopian, to Kona, to my old stand-by, Colombian. I did frequently put some milk and sweeteners in it, but I wasn't heavy-handed, and as ~Skyjake mentioned in his own reply [1], different tastes can be drawn out with the different mixers, much like a good milk in any breakfast or chai tea.
As I try to get myself back into something that resembles a routine after the holiday break I started to poke around at some things that have been needing attention. It seems that my microblog to gemini renderer has been broken for about a month. A quick fix and it seems to be functioning but that gave me an excuse to tweak the overall layout. Previously I rendered gemtext headings for the years and the months, leaving the individual entries as just simple paragraphs, however it seems more logical to expose individual entries so you can navigate the in-reply-to chain using your user-agent, assuming it has the ability to navigate headings (Lagrange does).
I've got a compulsive nature, and so spartan abolishment of junk food (both mental and physical) is typically the only solution that helps me stay healthy long-term. Hence no smartphone, no booze in the house, and no computer powerful enough to run a video game newer than, say, Hexen. Still, the black pit of the internet beckons, and I was spending far too much time there.
I was willing to live without a personal computer entirely, just using an OS on a thumb drive at the local library when necessary, but the security issues are manifold. It's just not practical.
A workable definition of a genre buster bomb would be a work in a genre that destroys or significantly changes said genre, often by some form of often violent deconstruction.
Gmail is painful even with mutt; there is too much lag. And the login is slow. One might expect mail to be at least as fast as it was in the 1990s, but instead we got...the web. Dun dun dunnnn! I may misremember how quick pine wasn't in the fishbowl era. OAUTHBEARER was also a pain to setup; the website was horrible, go here click that go there revisit that, all very Java-y Object-y Enterprise-y and too complicated. And the CPU fan was running. People who want to run mutt are not their demographic, I'm guessing. And gmail labels too much of the OpenBSD mailing list mails as spam spam spam spam lovely spam!
While the front face of Rob's Gemini Capsule hasn't seen much activity, I've continued to make lots of changes behind the scenes. I continue to update my weight graph and "Where in the World?" log, though I did neglect the latter for some time. Other projects have taken up my time too: diving into git's `fetch` and `push` commands to see if they can be adapted to use an asynchronous protocol like NNCP, as well as setting up Yggdrasil nodes on my home network. Other tidbits are appearing on various pages as I have time.
I've had the Framework laptop for a while now, so time to add to my previous post. No particular order; this is as things pop into my head...
[...]
Ok, so not really the laptop, but this is the first time I've used Fedora and the first OS I've had on Wayland.
Fedora is great!
Boots exceptionally quickly, rock solid, and I've had zero update snafus. The only issues, to date: Signal doesn't work (no idea) I couldn't find an RPM for Texture Packer. RPMs, or the lack of them, have held me back from Redhat spins for the longest time, so it's nice that Flatpacks are becoming the norm. Or at least, more common. It's almost a solved problem, annnd no Snaps! Hurrah!
But it's not perfect. Wayland's crashed on me twice. Is that normal?
It is the annoying habit of written words that they tend to resurface. These words mean nothing to me anymore nor the person to whom I gifted them. Yet they remind me. Not of memories or lessons but of images. I remember everything that I've ever seen and I wish I could forget half of it. That is as my dad calls it "the curse of a good memory" but I'm not bothered by them, I am further than I have ever been from being bothered by the past. The title is a click bait but I still believe that "The past is a place only fitting for the dead". So let us summon the spirit of dead words.
Over the years I've gathered some nice browser extensions to help manage browsing the web. They kind of deserve to be written down somewhere and maybe someone else finds use for them.
I’ve been seeing the Matrix bridge to IRC networks like Libera as an overall good thing. IRC has been dying and this bridge is, in some sense of the word, an IRC client, and it’s an IRC client that people can get behind. Don’t ask me why they’re so into it because I don’t like using it, but that’s the point of clients and protocols: you use a client you like, I use a client I like, it’s all kumbaya and good.
However, IRC is set up so that you can join channels / rooms about topics and talk about topics there. It’s not set up so you can just go in and take your pick of users all across the network and start a convo with a rando. I know that /names with channel and server omitted is supposed to list all names, but that’s disabled on Libera.
With the release of version 4 of Mastodon [1] there has been a problem of links to profile pages or conversation threads "going dark" within shell based browsers, such as Lynx [2]. In version 3.x you would get a text rendering of each page, but now you only get a terse *"To use the Mastodon web application, please enable JavaScript"* message.
The reactions to my previous post were interesting—it wasn't a “unit test.” At best, it might have been an “integration test” but because it involved actual work (i.e. (that is) interaction with the outside world via nasty nasty side effects, aka (also known as) I/O (Input/Output)) it immediately disqualified it as a “unit test.” And to be honest, I was expecting that type of reaction—it appears to me that most unit test proponents tend to avoid such “entanglements” when writing their “battle tested” code (but I'm also willing to admit that's the cynical side of me talking). There were also comments about how 100% code coverage was “unrealistic.”
Sigh.
One respondent [2] even quoted me out of context—“… that we as programmers are not trusted to write code without tests …” and cut the rest of the sentence: “… yet we're trusted to write a ton of code untested as long as such code is testing code.” Which was my cynical take that the “unit tests” (or the code that implements “unit tests” ) are, themselves, not subjected to “unit tests.” Something I kept trying to impart to my former manager, “stop taking the unit tests as gospel! I don't even trust them!” (mainly because the business logic of the project was convoluted and marketing kept using different terms from engineering, at least engineering in my department)
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.