Rewind to four/five years back, I did not use Linux as my daily driver. Yes, in a virtual machine or dual-boot, sure.
I stuck with Windows saying – “Linux isn’t user-friendly, and it’s all about the commands/terminal.”
In my defense, I did not know a lot of things back then. But, when I finally took the leap of faith and started using Linux as a daily driver, I began to explore how things work and was blown away by many things.
Including some of the compelling reasons why Linux is better than Windows.
It took me a couple of days to understand the fundamentals and learn about the software utilities not available for Linux.
But, surprisingly, I did not need to use Windows for most of my tasks, except multiplayer gaming. And, thanks to Valve, that’s about to change with the support for BattleEye, and Easy-Anti Cheat added to Linux.
Fret not; I’m not one of those who recommends ditching other operating systems. You should always use what you are comfortable with.
On this episode of This Week in Linux, Google has released Android 12 and Desktop Linux is working on Apple M1 Mac thanks to Asahi Linux. Mozilla has announced the release of Firefox 93. In the Enterprise Linux world, Red Hat Enterprise Linux 8.5 Beta is out, CERN Reveals their opinion of CentOS Stream and AlmaLinux Foundation Opens Up Memberships. In Security News, Twitch.tv had a Data Leak and Google announced funding for Open Source Security. Modular smartphone, Fairphone 4 will be available soon as discussed on Hardware Addicts. Sony talks about their efforts for contributions to Open Source and Linux. All that and much more on Your Weekly Source for Linux GNews!
As it turns out, Perl is amazing! Find out why, and how to start using it.
The Asahi Linux project is working on porting the free operating system to the current M1 architecture from Apple. Progress is explained in a monthly status report. The primary focus of the latest development is the inclusion of important components in the Linux kernel. The declared goal of Asahi Linux is to publish all improvements directly in the respective upstream projects.
The have already been merged for the 5.16 kernel PCIe bindings , which also allow other operating systems such as OpenBSD to use the same boot loader. In addition, the required could already be included PCIe and USB-C drivers in the kernel tree. A driver to support the power management is in the verification , as is the CPU frequency scaling phase , on which the final work is being carried out.
Future AMD processors could be coming with USB4 support and DisplayPort tunneling sometime soon. According to Phoronix, AMD Linux driver engineers are working on a new AMDGPU kernel graphics driver featuring initial support for USB4 DisplayPort tunneling technology.
We don't know exactly what architecture will come with USB4, however, rumors are floating around that AMD's Ryzen 6000 series APUs codenamed "Yellow Carp" and "Rembrandt" could feature USB4 connectivity. If so, then AMD will likely be targeting laptops for USB4 adoption first before bringing it over to desktop Ryzen-based CPUs and Radeon RDNA-based graphics cards.
Apache, also known as Apache HTTP server, has been one of the most widely used web server applications globally for the past few decades. It is a free and open-source web application software maintained by the Apache Software Foundation. Apache provides some powerful features with dynamically loadable modules, easy integration with other software, and handling of static files, among other popular features.
In the following tutorial, you will learn how to Install Apache Web Server on Debian 11 Bullseye.
Discord is a free voice, video, and text chat app used by tens of millions of people ages 13+ to talk and hang out with their communities and friends. Users communicate with voice calls, video calls, text messaging, media, and files in private chats or as part of communities called “servers.” Discord is available on Windows, macOS, and Linux Distros.
If you want to get a wild-card certificate with let’s-encrypt then you’ll have to use the DNS verification method. I made an example Docker file and script that can quickly and automatically spin up a Debian container to run the letsencrypt command line interface. You can then connect to the container via a local HTTP URL (http://127.0.0.1:8080) and interact with the process to set the DNS TXT record and then verify the entry and then download the signed cert chain & key pem files!
I’m currently testing Zidoo M6 with Android 11. The mini PC is mostly designed for industrial and commercial use cases, so it may not need to be certified by Google in order to access Google apps and services like a consumer device.
Foxit PDF Reader is a free multi-platform PDF reader for Linux, macOS, and Windows. The PDF reader is a small, fast, and feature-rich PDF Reader to view, annotate, form-fill, and sign PDF documents. PDF Reader easily integrates with popular ECMs and cloud storage.
At the end of the tutorial, you will know how to install Foxit PDF Reader on Fedora.
Most modern Linux Desktop systems such as Fedora come with an Nvidia driver pre-installed in the Nouveau open-source graphics device driver for Nvidia video cards. For the most part, this is acceptable; however, if you are using your Linux system for graphical design or gaming, you may get better drivers.
Historically, the Nouveau proprietary drivers are slower than Nvidia’s, which lacks the latest graphics card hardware’s latest features, software technology, and support. In most situations, upgrading your Nvidia Drivers using the following guide is more beneficial than not doing it. In some cases, you may see some substantial improvements overall.
The Graphical User Interfaces allow the users to perform their tasks very easily by clicking or by just drag and drop. But the use of commands will remain important in all flavors of Linux.
This article provides an overview of 15 useful basic Linux commands that you should know.
This is especially important if you are a beginner or you want to know the basic Linux commands for an interview. So, keep on reading!
Twenty years ago today, on Tue Oct 9 16:30:12 2001, Ludvig Strigeus pushed the initial revision of the ScummVM code, which was version 0.0.1 of the project. Time flew quickly and, fast-forward to the present day, we are proudly releasing ScummVM 2.5.0 “Twenty years ago today…”
The list of changes is tremendous.
First of all, this is the first release that supports 2.5D games (almost 3D), thanks to the merger with ResidualVM. With this release we announce support for Grim Fandango, The Longest Journey and Myst 3: Exile. This is why we jumped straight to 2.5 in our versioning. Please note that only desktop platforms currently support these games and other platforms may or may not gain the support later depending on their capabilities.
KDE Frameworks packages have been updated to 5.87.0. This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner. It is recommended that you reboot after updating to avoid a possible KIO file protocol error in Dolphin.
From September the 8th to October the 7th, OpenSUSE has helped me host a survey on how developers are using Rust in their environments. As the maintainer of the Rust packages in SUSE and OpenSUSE it was important for me to get a better understanding of how people are using Rust so that we can make decisions that match how the community is working.
First, to every single one of the 1360 people who responded to this survey, thank you! This exceeded my expectations and it means a lot to have had so many people take the time to help with this.
The TeX Live contrib repository has been for many years now a valuable source of packages that cannot enter proper TeX Live due to license restrictions etc. I took over maintenance of it in 2017 from Taco, and since then the repository has been available via my server. Since a few weeks, tlcontrib is now available via the CTAN mirror network, the Comprehensive TeX Archive Network.
[...]
Thanks to the whole CTAN team, and please switch your repositories to the CTAN mirror to get load of my server, thanks a lot!
This month I accepted 224 and rejected 47 packages. This is almost thrice the rejects of last month. Please, be more careful and check your package twice before uploading. The overall number of packages that got accepted was 233.
It all started when Brandon Withrow created a replica of The Simpson’s family TV that plays episodes of the classic cartoon. The idea took the Raspberry Pi community by storm and makers everywhere have started making their own cartoon-themed TV projects. Today the adventure continues as we have this awesome BMO-themed TV project to share created by a maker known on Reddit as Davidforthewynne.
This project features a shell shaped like the Adventure Time character BMO. When the Pi inside boots, you get a glimpse of BMO’s face on the desktop before it begins to play episodes of Adventure Time.
[...]
Inside you’ll find a Raspberry Pi Zero running Raspberry Pi Video Looper to continuously show episodes. It features a power button capable of safely shutting BMO on and off, a 7-inch screen for the face and has a speaker mounted to the back for audio output.
If there’s one thing we can say definitively, it’s 'rhombus'. This project is algebraic! The best Raspberry Pi projects are ones you can recreate at home and this is one of them. To get a closer look at how it all goes together, check out the original thread shared to Imgur and be sure to follow Davidforthewynne for more cool projects.
We (Koen and Elco) recently converted a Koen’s fridge into a BrewPi fermentation chamber and made a lot of photos of the progress. This guide will show you various options to convert a fridge or freezer into a temperature controlled fermentation chamber for your homebrew.
It is up to you how far you want to go in hacking the fridge electronics, this guide will show you 3 options to mod your fridge: [...]
A lot of phrases surrounding phones don’t make sense anymore. With a modern cellphone, you don’t really “hang up” and there’s certainly no “dial” to be had. However, with [jakeofalltrades’] project, you can read an old-fashioned phone dial using an Arduino.
The idea behind a phone dial is actually pretty simple. When you pull the dial back to the stop using one of the numbered holes and release it, it causes a switch to open and close the same number of times as the hole you selected. That is, if you pull back the 5 hole, you should get 5 switch closures. The duration of each switch event and the time between switch events is a function of the speed the dial moves because of its internal spring. The zero hole actually produces ten pulses.
React Help Desk is an open source live chat application that comes with an administrative control panel that lets you manage multiple chats. The control panel written with React, Node.js, and web sockets.
React Help Desk offers a real-time support system with a simple interface which allows you to communicate with many clients at the same time.
Created by Jason Gallagher, a web developer with 20 years of experience, who created it for his personal use and currently using it at his website.
How many of us who have a few decades of adulthood under our belts would like to talk to our 17 year old selves? “Hey kid, it’s all gonna be OK. Also, Duke Nukem Forever does come out eventually, but it’s not going to be pretty!” Being honest, exposure to the hot takes of one’s naive teenage self would almost certainly be as cringeworthy as the time-worn-but-familiar adult would be to the teenager, but there’s one way in which you can in a sense have a conversation with your teenage self. [Mad Ned] had this opportunity, when he discovered a printed BASIC listing for a game he’d written for the TRS-80 back in 1981. Could he make it run again, and what did it tell him about his teenage years?
All Linux and Mac-based computers pull their time zones from a massively important database — the time zone database. The process of defining time zones is centralized. This is actually quite a big deal in its own right because people tend to grossly underestimate how pivotal Linux is to … the entire [Internet] and technology as we know it. It may constitute a small percentage of desktop users and be an OS largely favored by nerds and computer developers. But in server-land it’s actually the dominant operating system, especially on the public cloud infrastructure that is rapidly usurping the diminishing role that on-premises infrastructure has to play in getting packets of data from hosts to users (in normal language: making the [Internet] work). AWS instances, for instance, default to Amazon’s Linux spin-off. Virtually all the world’s supercomputers used for everything from weather forecasting to simulating physics experiments run on Linux. Android is a fork of Linux. (I don’t play the “will this be Linux’s year on the desktop?” game. People have been wrong too many times and I don’t particularly care either way). If you’ve ever used an Android device, received a weather forecast, or accessed a website (you’ve probably done all those things), then you’ve benefited from the existence of Linux.
The AITI-KACE and GIFEC are sister agencies under the Ministry of Communications and Digitilisation. The two agencies have in the past signed an MoU of collaboration through which some projects were delivered. The two heads agreed to pick the MoU for review. Both were optimistic that the two agencies can work together for a greater good.
Reproductive rights advocates lashed out overnight following a ruling by the 5th Circuit Court of Appeals which reinstated a near-total ban on abortion in Texas just days after a separate federal court had placed the state's law on hold pending final judicial review, most likely by the U.S. Supreme Court.
"[A] violation of half a century of precedent upholding the constitutional right to abortion."
Democrats in Congress and their supporters inside the beltway have taken single payer off the table.
Doctors spend an average of over 16 minutes in the EHR for each patient visit—a significant portion of their work day, according to a 2020 study of 155,000 US physicians in the Annals of Internal Medicine.
One report revealed that company researchers had themselves determined that Instagram, which is owned by Facebook, has a psychologically damaging effect on teen girls, even as it denied this publicly and plowed ahead with a version of Instagram for under-thirteens. Another found that the company’s 2018 rejigging of its algorithm to promote “meaningful social interactions,” or MSI, had instead incentivized posts and content based in outrage, social division, violence, and bullshit. Others show that Facebook was intentionally targeting kids and finding ways to hook them on the product early, and that it dragged its feet on taking down posts it knew were made by drug cartels and human traffickers.
Deepfake voice technology based on voice cloning, or quasi-perfect reproductions of a person’s voice, can be used both for the good and for the bad. It can be put in the service of voice synthesis that can give a voice back to people who would otherwise lose it due to acute or chronic conditions such as ALS, apraxia, traumatic brain injury, stroke, etc.
It is already being used in the film and TV industry, gaming, call centers, and it is also potentially convenient for encryption and therapy. However, there is no denying that it can pose a significant threat to democratic processes, particularly to those related to the value of privacy. If used inappropriately, deepfake voice technology can perpetrate deceit and harassment.
ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting operating systems running Linux. Modules used by this malware family, which ESET dubbed FontOnLake, are constantly under development and provide remote access to the operators, collect credentials, and serve as a proxy server. The location of the C & C server and the countries from which the samples were uploaded to VirusTotal might indicate that its targets include Southeast Asia.
The US government's pivot to a so-called "zero trust" cyber architecture - which assumes all devices in a network to be untrustworthy by default - will require the support of industry partners as well as the Defense Department, Fletcher added.
Well, the Internet Apocalypse came and went! Due to the recent expiration of the Let's Encrypt intermediate and root certificates, I saw more widespread issues than I was expecting, but on different devices and for different reasons than I thought. Let's take a look at what happened and why.
To state the obvious, even as Joe Biden will be meeting virtually with Xi Jinping by year's end, AUKUS (Australia, UK and US alliance) and the QUAD formation are geopolitical earthquakes that greatly increase the dangers of catastrophic great power war.
Afghanistan's humanitarian situation is spiraling into catastrophe.
Horrifying as these crimes are, they are now being eclipsed by an even more heinous one: a deliberate attempt by the Ethiopian government to starve its own citizens. Since the fighting broke out Tigray has suffered an increasingly restrictive blockade by government forces. Since July it has received only a fraction of the food needed to keep its 6m inhabitants alive, hardly any fuel and no medical supplies at all. More than 5m people do not have enough to eat. Some 400,000 of those are facing what aid agencies call “catastrophic” hunger—the last step on the path to mass starvation. Aid workers compare the crisis to Ethiopia’s famine of the 1980s, when 400,000-700,000 died.
The number of people killed by police officers in the U.S. has been massively underreported in official statistics over the past four decades, with an additional 17,000 deaths over that period, according to our new research.
Our study, which was published on Oct. 2, 2021, in The Lancet, compared statistics from the National Vital Statistics System, a federal database that looks at death certificates, with data from three nongovernmental organizations that more accurately track police violence: Mapping Police Violence, Fatal Encounters, and The Counted.
We found more than 30,000 deaths from police violence between 1980 and 2018. During that time, the National Vital Statistics System underreported fatal police violence by 55.5%.
The FBI and the Justice Department are investigating the task force after security footage emerged of a violent arrest in September.
Ugandan activist Vanessa Nakate, a key leader of the international youth climate movement, was in Germany on Saturday where she joined opponents of the country's largest lignite coal mine to denounce its proposed expansion in the face of the ever-growing threat of fossil fuels and planet-heating emissions.
"With the expansion of this coal mine, it means people's cultures will be destroyed, people’s traditions, people’s histories of this place," she said of the mining operation known as Garzweiler and plans to destroy the nearby village of Luetzerath to allow for the owners, German utility giant RWE, to expand its already vast footprint.
Twenty state Attorneys General on Friday filed a joint complaint in an effort to block changes to the U.S. Postal Service enacted last week by Postmaster General Louis DeJoy and which critics warn are an overt effort to cripple the mail service from within by slowing delivery times while also increasing the cost to consumers.
The official complaint filed by the 20 AGs is directed at the Postal Regulatory Commission (PRC), which is charged with providing independent oversight of the USPS, but which the suit alleges betrayed its mandate by allowing the controversial plan put forth by DeJoy to move into implementation on October 1 without proper review.
The Wisconsin Legislature is now openly at war with democracy.
When the great social media blackout of October 4, 2021, struck, I was in the picturesque village of Himarë in southern Albania with my feet propped up on a balcony railing, half-gazing at the Ionian Sea, while impatiently awaiting Al Jazeera's publication of my latest article on New York Times columnist Thomas Friedman.
After former President Donald Trump urged supporters Friday to attend a rally on the steps of the Michigan Capitol building in Lansing next week in order to demand an audit of the 2020 election in which Trump was soundly defeated by President Joe Biden, at least one top Democrat in the state warns that the ongoing Republican obsession with what has become known as the "Big Lie" is a threat that cannot be ignored.€
"This is the same inflammatory rhetoric that brought men armed with assault rifles to these very steps last year and endangered the lives of our lawmakers and staff."
One America News, the far-right network whose fortunes and viewership rose amid the triumph and tumult of the Trump administration, has flourished with support from a surprising source: AT&T Inc, the world's largest communications company.
A Reuters review of court records shows the role AT&T played in creating and funding OAN, a network that continues to spread conspiracy theories about the 2020 election and the COVID-19 pandemic.
OAN founder and chief executive Robert Herring Sr has testified that the inspiration to launch OAN in 2013 came from AT&T executives.
“They told us they wanted a conservative network,” Herring said during a 2019 deposition seen by Reuters. “They only had one, which was Fox News, and they had seven others on the other [leftwing] side. When they said that, I jumped to it and built one.”
Nobel Peace Prize winner Maria Ressa used her new prominence to criticize Facebook as a threat to democracy, saying the social media giant fails to protect against the spread of hate and disinformation and is "biased against facts."
The veteran journalist and head of Philippine news site Rappler told Reuters in an interview after winning the award that Facebook's algorithms "prioritize the spread of lies laced with anger and hate over facts."
Her comments add to the pile of recent pressure on Facebook, used by more than 3 billion people, which a former employee turned whistleblower accused of putting profit over the need to curb hate speech and misinformation. Facebook denies any wrongdoing.
This attack on Stock is yet another unsettling example of how independent thinkers are subject to intimidation in today's climate. The notion that biological males should not be allowed to enter female-only spaces was a widespread view a mere five years ago. Now, thanks to the speed of cultural transformation driven by social media, activist demands harden into orthodoxies virtually overnight. It takes brave professors of Kathleen Stock's meld to stand up to them, not with force, or retaliatory intimidation, but with argument and deliberation. We owe her a deep gratitude.
Drug dogs are man's best friend, if that man happens to be The Man. "Probable cause on four legs" is the unofficial nickname of these clever non-pets, which give signals only their handlers can detect which give cops permission to perform searches that otherwise would require a warrant.
“It’s none of your business whether I wear a dupatta or not,” I retorted, and he backed down apologising. However, the incident stuck with me. The idea that a complete stranger could tell me what to wear wasn’t alien to me. I had grown up in Saudi Arabia, where an entire brigade of men called the mutawa, were tasked with going around town to check how many strands of hair were showing from women’s hijabs and admonish them and their next-of-kin males accordingly.
These courageous campaigners received little or no support from young western feminists. Yet when French coastal resorts, including Nice – which had just seen 86 people murdered in an Islamist attack – banned the burkini, the reaction was swift.
Kace’s legal team, however, allege that prison officials also played a role in the attack and in an attempted cover up. CCTV was disabled in the room where Kace was attacked and cell guards were dismissed early from their duties.
This post summarises detailed information about ethernet splitter, its speed, and different FAQ to help you choose the best hardware.
Switches, hubs, and ethernet splitters are just some of the networking equipment that helps to expand a network. Small ethernet splitters are the most basic of these devices. Ethernet splitters are small network devices that split one Ethernet signal into two. They are cost-effective while being easier to use. These are also some of the simplest networking devices, as they don’t need a power source and don’t have any specific buttons or status LEDs on their bodies. There are just three ethernet ports on this small gadget, two on one side and one on the other. A short ethernet cable with an RJ45 connection on one end and two ethernet ports on the other is included with some kinds.
Although splitters have been around for a long time in the networking world, many people still don’t know how to utilize them efficiently. Contrary to popular belief, ethernet splitters should always be purchased in pairs. Directly attaching one end of the splitter to the router and then connecting two devices to the splitter’s two ethernet ports on the other side will not work. There is a correct technique to set up ethernet splitters in a network so that they function properly.
The operators of around two dozen torrent sites and pirate streaming services are at risk of having their identities obtained by the Alliance for Creativity and Entertainment. The global anti-piracy coalition has obtained a pair of DMCA subpoenas that compel CDN company Cloudflare to hand over whatever information it holds on these individuals. Combined traffic to the sites is huge.