A portal effect inspired by the terrifically over-the-top cartoon Ricky & Morty is the latest addition to the terrifically-over-the-top Burn My Windows extension.
As with other animations available through this add-on, you can assign the new portal effect to play when closing app windows and/or opening windows too:
Hi guys, wishing you the best. Just to let you know that I have greatly appreciated the feedback and help with EasyOS development over the year and before.
Developments around compute engines and Linux in 2022 included geopolitical competition and a new Kubernetes-based startup. Review the 10 most-read stories.
The CPU is the part of the computer that makes everything else tick. While GPUs have increasingly become a key part of overall system performance, we still find ourselves wanting to know how our CPU is doing. CoreFreq is a new tool that aims to tell you everything you want to know about your modern 64-bit CPU.
In this tutorial, you will learn how to access the workbook, worksheet and Cell contents using LibreOffice Calc basic macros.
Spreadsheet applications like Calc consist of workbooks, worksheets and individual Cells. It is often required to process those using Macro to automate various tasks.
This tutorial will demonstrate the basic processing of worksheets and cells, which is the foundation of many complex macros.
Note: This tutorial assumes you have the initial set up on creating a basic Macro in LibreOffice Calc.
The killall command is a powerful tool in the Linux command line that allows you to terminate processes by their name. It is a convenient way to stop multiple processes at once, saving you the time and effort of manually killing each process individually.
The basic syntax of the killall command is killall process_name, where process_name is the name of the process you want to terminate. For example, to kill all instances of the firefox process, you would use the command killall firefox.
One useful feature of the killall command is the ability to specify a signal to be sent to the processes being terminated. The default signal is SIGTERM, which asks the process to terminate gracefully. However, you can also use other signals such as SIGKILL to force the process to terminate immediately. To specify a signal, you can use the -s option followed by the signal number or name. For example, to force all instances of the firefox process to terminate immediately, you would use the command killall -s SIGKILL firefox.
The Linux shell (specifically, “Bash“) takes each executed command as an event and saves the command in the “.bash_history” file located in the user’s home directory.
Now, there are two ways to view the history record of a user’s executed command: one using the history command, and the other by reading the “.bash_history” file using the cat command.
In this tutorial, we will show you how to install Wireguard VPN on Ubuntu 22.04 LTS. For those of you who didn’t know, WireGuard is a free and open-source virtual private network (VPN) software that uses state-of-the-art cryptography to secure and encrypt internet connections. It is designed to be simple, fast, and easy to use, and it has a small codebase that is easy to review and audit.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Wireguard on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.
OpenCV (Open Source Computer Vision) is a free and open-source library of computer vision and machine learning algorithms that can be used to process and analyze images and video. It is widely used in a variety of applications, including object detection, image, and video processing, and augmented reality.
In this article, we will cover two different methods for installing OpenCV in Python: using “PIP” (the Python Package Manager) and using “Anaconda” (a free and open-source distribution of Python and R for data science and machine learning).
To count the overall number of lines, syllables, and letters in a text document, use the “wc” Bash function, which means “word count”. It is presented with four columns in the output. The first of which displays the number of lines. The second column lists the words in the file. The third column lists the characters. And the final column lists the file name. This “wc” command gives us access to several flags including “-c”, “-w”, and others which we will cover in this article.
When writing a script or executing a command, it makes sense to know if it succeeded. In Linux, when a command is run, we get an exit code which confirms whether the executed command was successful. When running a command that relies on the output of the other command, you must fetch the exit code of the first command to determine whether the other command will run. This guide focuses on two ways of checking whether a command succeeded in Bash.
In a BASH environment, we construct an alias for a set of files. Alias can be made more programmatic and versatile by using BASH functions, variables, etc. Bash Alias is a method for creating a few shortcut commands for numerous and repetitive operations. Here, we will discuss a way to create the bash alias with the arguments and parameters. Unfortunately, there are some cases when the alias does not accept parameters or arguments. However, we can utilize functions to accept parameters and arguments while executing alias commands. We use the bash aliases and functions to use the command line more efficiently.
Kubernetes is challenging. Of that, there is no debate. Not only are there a lot of moving parts that go into deploying a container to a Kubernetes cluster, but so much can go wrong along the way. To complicate matters even further, deploying the Kubernetes cluster can be a hair-pulling affair.
That’s why tools like Canonical’s MicroK8s have been developed. With such software, the process of deploying a Kubernetes cluster is significantly less challenging, so you can focus more on getting up to speed with deploying applications and services to the cluster.
Want to install the popular Mozilla Firefox alternative Google Chrome browser in Redhat 9 or RHEL 8? Then there here are the steps to follow, given in the tutorial.
Chromium-based Chrome browser is the most preferred choice for home or regular desktop users. It is available free of cost to install not only on Mac and Windows but also on most of Linux systems. Although Chromium is open source, Google’s Chrome is a proprietary browser.
“Burn My Windows” is a GNOME and KDE extension that allows you to play many different window effects when you close or open any window on your system.
It’s quite fantastic, and brings back the memories of the good old Compiz and gnome 2.X, allowing you once again to play window effects on Linux.
Depending on your calendar system, another year is coming to a close very soon. While this year was a lot more enjoyable for many of us than the last two, we surely didn’t expect things to go downhill even more for others. As I am looking forward to some days off with my family, let me take a step back and reflect on some of the things I did in KDE in the last twelve months.
[...]
One of my personal goals is for every file type imaginable to have a thumbnailer, metadata extractor, or at least a lovely Breeze icon and file type registration in shared-mime-info to go with it. This year I spent a lot of time in our KFileMetaData Framework, which is what extracts metadata from files for the file manager sidebar, file properties dialog, and our Baloo desktop search. For starters, today we’re able to index OpenDocument files of the “Flat XML” variant, where all data is in a single XML file, rather than bundled as a ZIP archive. Open Document Graphics vector images are also supported now. Additionally, for Office 2007 files line and word count is recorded.
Enough of this "2 years" nonsense. We're finally ready for lift off. It is with immense pleasure we can finally announce that Serpent OS has transitioned from a promise to a deliverable. Bye bye, phantomware!
We exist
As mentioned, we spent 2 years working on tooling and process. That's .. well. Kinda dull, honestly. You're not here for the tooling, you're here for the OS. To that end I made a decision to accelerate development of the actual Linux distro - and shift development of tooling into a parallel effort.
Infrastructure .. intelligently deferred
I deferred final enabling of the infrastructure until January to rectify the chicken/egg scenario whilst allowing us to grow a base of contributors and an actual distro to work with. We're in a good position with minimal blockers so no concern there.
A real software collection
This is our term for the classical "package repository". We're using a temporary collection right now to store all of the builds we produce. In keeping with the Avalanche requirements, this is the volatile software collection. Changes a lot, hasn't got a release policy.
A community.
It goes without saying, really, that our project isn't remotely possible without a community. I want to take the time to personally thank everyone that stepped up to the plate lately and contributed to Serpent OS. Without the work of the team, in which I include the contributors to our venom recipe repository, an ISO was never possible. Additionally contributions to tooling has helped us make significant strides.
It should be noted we've practically folded our old "team" concept and ensured we operate across the board as a singular community, with some members having additional responsibilites. Our belief is all in the community have equal share and say. With that said, to the original "team", members both past and present, I thank for their (long) support and contributions to the project.
Since we released Ruah in June all our developer teams worked hard to get the next release of Manjaro out there. We call it Sikaris.
Manjaro 22.0 “Sikaris” is in all its glory, with the most recent versions of KDE Plasma 5.26, GNOME 43, and Xfce 4.18.
Manjaro is an Arch-based Linux distribution that aims to provide a simple and easy-to-use desktop environment. Thanks to its user-friendly design, great support, and powerful features in the last few years, Manjaro has gained a huge user base among Linux users.
And just in time for Christmas, the good news has arrived! Today, the brand-new release of Manjaro 22.0, “Sikaris,” has been announced as a beautiful Christmas present not only for Manjaro users but for all Linux lovers. So, let’s see what’s new.
Tomorrow is one of the most important days of the year -- Jesus Christ's birthday! Also known as "Christmas," many people celebrate the holiday by giving gifts to friends and family. And of course, Santa Claus will be delivering many great presents to all the non-naughty children of the world too.
As an early Christmas gift, the Linux community is getting something very special today -- Manjaro 22.0! Code-named "Sikaris," this operating system is based on the excellent Arch Linux. If you love using a modern kernel, you will be happy to know Manjaro 22.0 comes with version 6.1. There are three desktop environments from which to choose -- GNOME (43), KDE Plasma (5.26), and Xfce (4.18).
I have been quite busy! I have been working on several projects so my cover image is a lovely sunset where I live.
[...]
I have reworked the CI to now do Core22 snaps! They will publish to the beta channel until we get them tested. First snap completed is the ever important KDE Frameworks / QT content snap + SDK! Applications will start after I tackle the kde-neon extention in snapcraft.
Like each month, have a look at the work funded by Freexian’s Debian LTS offering.
Merry Christmas to you all. Here is a small gift to all those with IP cameras following the ONVIF specification. There is finally a nice command line and GUI tool in Debian to manage ONVIF IP cameras. After working with upstream for a few months and sponsoring the upload, I am very happy to report that the libonvif package entered Debian Sid last night.
The package provide a C library to communicate with such cameras, a command line tool to locate and update settings of (like password) the cameras and a GUI tool to configure and control the units as well as preview the video from the camera. Libonvif is available on Both Linux and Windows and the GUI tool uses the Qt library.
M5Stack T-Lite is a Wi-Fi thermal imager with the same MLX90640 IR array thermal camera found in the M5Stack Thermal Camera 2 Unit plus a 1.14-inch color display to visualize the results on the device itself.
Based on the ESP32-PICO-D4 system-in-package with WiFi and Bluetooth, the solution allows the user to access the 32Ãâ24 pixels thermal image either on the built-in display, or streamed to the local network or the cloud.
Every year, several of the biggest names in the maker world on YouTube get together for an international Secret Santa exchange. Each participate gets to decide on a gift for the assigned recipient and the only rule is that they must make the gift themselves. Sam Battle, of the LOOK MUM NO COMPUTER YouTube channel, made this awesome flip-dot display Etch A Sketch for Ruth and Shawn of KidsInventStuff.
A modern Android smartphone relies on a lot of services, from app stores and calendars to messaging and push notifications. Most of them have open alternatives, but until now, the only option for push notifications was Google’s proprietary service, Firebase Cloud Messaging (FCM). UnifiedPush is a new alternative that allows you to get push notifications without being tied to a single company.
Push notifications are essential to the modern mobile experience because they allow apps to communicate with users in real-time, even when not actively in use. Relying on Google-provided push notifications is a concern for both privacy and independence. The proprietary FCM library cannot be included in F-Droid apps and relies on having Google services. As a result, it is common to see FOSS applications adopt a persistent direct connection between the application and the server as an alternative.
OpenAI has extended the capabilities of its text-to-image software from two dimensions into three with the release of Point●E, an open source project that produces 3D images from text prompts.
The AI research firm has attracted considerable attention for its DALL●E software, which like rival projects Stable Diffusion and Midjourney can generate realistic or fantastical images from descriptive text.
While Point●E shares the bullet point symbol used in OpenAI's DALL●E branding, it relies on a different machine learning model called GLIDE. And presently, it's not nearly as capable. Given a text directive like "a traffic cone," Point●E produces a low-resolution point cloud – a set of points in space – that resembles a traffic cone.
It was 2014 when David Heinemeier Hansson set the Software Development world on fire. He was on a RailsConf stage when he proclaimed that "TDD is Death".
It was a bold move. But he was the leader that many unhappy with testing were looking for. Many followed along, splitting developers into two camps.
What is a name? A name is a label, a handle, a pointer in your brain’s memory. A complex idea neatly encapsulated. A name lets you refer to “the economy” , or “dogfooding” mid-sentence without needing a three-paragraph essay to explain the term.
If you think of software development as just carving up data into boxes and labeling them, it becomes clear why Naming Things is one of the two hard problems in computer science. Your brain has only so much space in working memory, and a good name makes the most of it. A good name is succinct, evocative, fitting. It reduces cognitive load and stand outs in your mind. Bad names are obscure, misleading, fuzzy or outright lies.
In software, really good names are meaningful, descriptive, short, consistent, and distinct. You will notice that ‘descriptive’ and ‘short’ are diametrically opposed. As are ‘consistent’ and ‘distinct’. There is no solution, only tradeoffs.
Descriptive names are safe, legible, clear. They tell you what exactly you’re dealing with, bring you up to speed, don’t require you to be an expert in the codebase or a mind reader. I understand exactly what BasicReviewableFlaggedPostSerializer is on my first time seeing it. But they can also be bulky and unwieldy.
A was a new student when they started complaining about their teammates. “Don’t they see that we need this & that & this & that? They need to let me make these changes.”
The business domain A & their team worked in was incredibly complex. The current system had been built emphasizing the behavior of the system & not the structure. As always, this led to a structure not well suited for further change.
A had been working in the system long enough to have ideas for how things could be better. There needed to be a hierarchy of these things & a factory for those things & a factory for the factory because eventually we wanted to do this & that. The diagram of the system as A imagined it was full of boxes & arrows.
The team was having none of it. They had features to ship. A’s pull requests were piling up, unreviewed. Stale PRs led to bigger PRs, further slowing the pace of structure change. A was, reasonably, frustrated.
I’ve been a proponent of pipenv for several years now, particularly for application development (rather than library development). While the features around virtual environment management and the integration with pyenv to automatically install the version of python necessary for an application are nice, the features that I’ve really advocated for are the separation of direct dependencies and transient dependencies, via Pipfile and Pipfile.lock, and the hash validation provided by Pipfile.lock. I find it helpful in improving the deterministic nature of builds (not solving, mind you, but improving), making sure everyone in the engineering organization is using the same versions of packages as everyone else. It’s also a minor reassurance against supply chain attacks, which is sort of what I want to write about today.
In C++, we need a mechanism to interact with users, or to get information from the users. For this purpose, C++ provides a standard library to entertain the input-output statement. The ‘iostream’, here ‘io’ means input and output, this stream deals with the input and output statements. This library contains all the methods that we need to input data from the user or output data on the console. First, we import this library and to input data we use ‘cin>>’.
The ‘iostream’ library has predefined variables ‘std::cin’ is one of them. The ‘std’ stands for standard and ‘cin’ means character input. The ‘iostream’ supports many built-in functions that we can use in our code by just importing the library.
I use GnuPG to compute cryptographic signatures for my emails, git commits/tags, and software release artifacts (tarballs). Part of GnuPG is gpg-agent which talks to OpenSSH, which I login to remote servers and to clone git repositories. I dislike storing cryptographic keys on general-purpose machines, and have used hardware-backed OpenPGP keys since around 2006 when I got a FSFE Fellowship Card. GnuPG via gpg-agent handles this well, and the private key never leaves the hardware. These ZeitControl cards were (to my knowledge) proprietary hardware running some non-free operating system and OpenPGP implementation. By late 2012 the YubiKey NEO supported OpenPGP, and while the hardware and operating system on it was not free, at least it ran a free software OpenPGP implementation and eventually I setup my primary RSA key on it. This worked well for a couple of years, and when I in 2019 wished to migrate to a new key, the FST-01G device with open hardware running free software that supported Ed25519 had become available. I created a key and have been using the FST-01G on my main laptop since then. This little device has been working, the signature counter on it is around 14501 which means around 10 signatures/day since then!
This post was inspired by @codesections recent posts on sigils, particularly the notion of coding as a trialog between the writer, the reader and the machine.
[...]
We are dealing with coding languages. As with natural languages, syntax is a key marker that triggers cognitive mechanisms learned since childhood. While the base cultural setting for most of this is English, most human languages carry the notions of noun, verb, adjective and so on.
In computer networking, the term “localhost” refers to the current device used to access it. It is used to access the network services that are running on the host via the loopback network interface. Using the loopback interface bypasses any local network interface hardware.
The term “localhost” is derived from the combination of the words “local” and “host”. The word “local” refers to the device itself, while the word “host” refers to the device hosting a service or application. Therefore, “localhost” literally means “the local host.”
In so many ways, Santa Claus, a cultural touchstone that evolved from folklore into perhaps the most mainstream entity the world has ever seen, has transcended religion and evolved into a pop-culture discussion point with few, if any, equivalents. Like green bean casserole and pecan pie, the modern form of Santa Claus was heavily shaped by commercial entities, yet never came to be completely defined by them. Over at Tedium, we have written a lot related to Santa Claus over the years, but never have we actually written straight-up Santa Claus content. That changes today. Today’s Tedium talks about Santa Claus as a visual and cultural icon who has had more changes in style than Madonna, a figure that seemingly every single celebrity has dressed up as at some point in their careers. Ho, ho, ho.
Mathieu Stern tells PetaPixel that he generated the fantasy cameras using Midjourney before working on them in Photoshop.
“The generation itself only takes less than a minute, what takes time is to create a good prompt, this trial and error part can take hours,” he says.
Okta, a leading provider of authentication services and Identity and Access Management (IAM) solutions, says that its private GitHub repositories were hacked this month.
According to a 'confidential' email notification sent by Okta and seen by BleepingComputer, the security incident involves threat actors stealing Okta's source code
AWS has released Finch, an open-source, cloud-agnostic, command-line client for building, running, and publishing Linux containers. Finch bundles together a number of open-source components such as Lima, nerdctl, containerd, and BuildKit. At the time of release, Finch is a native macOS client with support for all Mac CPU architectures.
According to Phil Estes, Principle Engineer at AWS, and Chris Short, Senior Developer Advocate at AWS, "Finch is our response to the complexity of curating and assembling an open source container development tool for macOS initially, followed by Windows and Linux in the future". They note that the core Finch client will always be comprised of curated open-source, vendor-neutral projects.
The nonprofit Linux Foundation not only pays the salary of Linus Torvalds and Greg Kroah-Hartman. It also runs the AgStack Foundation, which seeks more efficient agriculture through "free, re-usable, open and specialized digital infrastructure for data and applications."
And this week that Foundation announced a new open source code base for creating and maintaining a global dataset that's a kind of registry for the boundaries of agricultural fields to enable field-level analytics like carbon tracking, food traceability, and crop production.
Merry Christmas, Linux systems administrators: Here's a kernel vulnerability with a CVSS score of 10 in your SMB server for the holiday season giving an unauthenticated user remote code execution.
Yes, this sounds bad, and a score of 10 isn't reassuring at all. Luckily for the sysadmins reaching for more brandy to pour in that eggnog, it doesn't appear to be that widespread.
Discovered the Thalium Team vulnerability research team at French aerospace firm Thales Group in July, the vulnerability is specific to the ksmbd module that was added to the Linux kernel in version 5.15. Disclosure was responsibly held until a patch was issued.
[...]
Lots of ready-made kit for would-be hackers can be found on the dark web; one trend recently noticed by the team at Cybersixgill has been gift card generators not only guess card numbers, but also check their validity by the thousands.
Like brute force password crackers, the tools being sold online randomly guess the digits of gift cards issued by companies like Amazon, Microsoft, Sony, Apple and others, with varying degrees of speed and accuracy based on how predictable a card's number sequence is.
When Kelly Conlon joined her daughter’s Girl Scout troop for a fun outing to see the Rockettes perform their Christmas Spectacular show at Radio City Music Hall in New York, she had no idea she would end up booted from the show once she entered the building.
Security stopped Conlon, NBC New York reported, because she is a New Jersey lawyer. It seems that Madison Square Garden Entertainment has begun using facial recognition technology to identify any visitor to any of its venues—including Radio City Music Hall—who is involved with any law firm that is actively involved in litigation against MSG Entertainment.
Conlon has never practiced law in New York nor personally been involved in litigation against MSG Entertainment. Instead, she is guilty by association, as an associate for Davis, Saperstein and Solomon, which has spent years tangled up in litigation against a restaurant that NBC reported is “now under the umbrella of MSG Entertainment.”
According to Conlon, she became aware of this supposed conflict of interest when security guards approached her in the Radio City Music Hall lobby just as she passed through the metal detector. Over the speakers, Conlon heard a warning about a woman in a gray scarf, then security confirmed the warning was about her, telling her, “Our recognition picked you up.”
The Winter session of Parliament was held from December 07, 2022 to December 23, 2022. Parliament adjourned sine die four working days ahead of schedule, having sat for 13 working days. In the ongoing 17th Lok Sabha, this is the eighth consecutive session that has been cut short. The session was in itself a delayed one to begin with, because of ongoing assembly elections in many states. This Parliamentary session was disrupted frequently from the second week onwards, due to the Opposition’s objections on several issues, including alleged misuse of probe agencies by the government, the Bihar Hooch tragedy, the recent Indo-China conflict, etc. The Rajya Sabha lost a session runtime of 1 hour and 46 minutes owing to such disruptions. With respect to digital rights in particular, no significant developments took place in both Houses. In a belated but welcome move, the second-last day of the session saw the introduction of the Jan Vishwas (Amendment of Provisions) Act, 2022 which omits the contentious Section 66A of the Information Technology Act, 2000. (More on our work on this here)
Anandita, Farkhanda, Krishnesh, Rohin, and Shivani transitioned out of their roles at IFF after completing an average of two years or more. We wish them the best and will continue to support them in their future endeavors. Meanwhile, our tiny team has grown with the addition of Gayatri, Gautam, Prateek, Ramya, Tejasi, and Shilpa. We encourage you to reach out to any of us with any advice or offers to volunteer your time. You can find us on email, the IFF Forum, and “IFF Chats” (click here) - your tech policy telegram group. Continuing our journey to be a truly public centered organization IFF’s board formalized by-laws, increased governance disclosures, and will commence a public process to induct two trustees next year.
As you may know, last year fundraising results at IFF showed a lag. It is concerning that we have a monthly burn rate of 40-50% (individual donations in 2022 averaged INR 4,00,998, while our costs totaled INR 888,383 per month) that is primarily covered by organizational donations. This is not sustainable in the long run, which is why we're turning to you, our valued members, for help. By setting up a monthly mandate, you can help us continue our important work independently and effectively. Your support is crucial to our success, and every donation counts. So please, consider donating today and help us make a difference. And if you're feeling extra generous, don't hesitate to spread the word about IFF and encourage others to support us as well. We need your help to keep moving forward next year. Donate today (click here), set up a mandate and commit for next year!
December is, for some, a month of puzzles. Over on the web many, many people are working in parallel on puzzling problems, one per day and all just for fun. For those who like mathematics and also make music, I have not a calendar's worth but just one puzzle to add to the pile. The task is to decipher a somewhat arcane system of music notation. You are given sheet music of one work but it is not given which work. You should deduce how the notation works: a correct answer is an explanation of how to interpret a score that uses this system. In the process, you'll likely discover which piece of music is depicted (or quite possibly you will not), but that is not part of the objective. Good luck!
Previously, I installed the Linux 5.15 kernel to troubleshoot an unrelated issue. And I uninstalled 5.15 using the "Kernel" applet within the Manjaro Settings Manager. It seems like one of the uninstallation scripts did work correctly because I've had two issues since then. One, I still had the option to boot 5.15 from GRUB. So the boot menu was not updated. Two, I noticed the error above while updating Manjaro.
trek is a rather old computer game, 1971, ported to BSD at some point and thus included in OpenBSD by way of /usr/games. A notable design choice for the original was that only a Teletype Model 33 ASR was available, therefore no fancy graphics, nor even the fancy interactive terminal that rogue (1980) eventually used.
Two weeks ago I announced GNUnet++, my C++ wrapper for common GNUnet functions. It's christmas time and I'm happy to share that I've made progress.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.