[Teaser] Don’t Worry, Miguel, the Press Will Never Find Out… (About Nat Friedman)

Posted in Microsoft at 4:47 pm by Dr. Roy Schestowitz

GitHub: on power by de Icaza

Microsoft loves LinuxSummary: Today was the first day Nat Friedman is no longer the CEO of GitHub; later in the series we’ll see the role played by the so-called ‘tech’ media gaslighting/censoring women to protect GitHub’s misogynists

“Gentoo is eternally broken.”

Miguel de Icaza

Links 15/11/2021: Kdenlive 21.12 Beta and Extra Aggression by Microsoft

Posted in News Roundup at 4:27 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • Torvalds releases Linux 5.16 rc1 with a small but mighty upgrade

        One of the improvements in the upcoming Linux kernel v5.16 is an improvement to the kernel’s memory management functionality, which will reportedly improve the performance of certain workloads by upto 10%.

        Dubbed memory folios, the new feature debuted in Linux kernel 5.16-rc1, the first release candidate (RC) of the next version of the Linux kernel, released yesterday by Linus Torvalds, the maintainer of the mainline Linux kernel.

      • Kernel prepatch 5.16-rc1

        The 5.16-rc1 kernel prepatch is out and the merge window is closed for this cycle.

      • Linux 5.16 Features Include FUTEX2, Intel AMX, Folios, DG2/Alchemist, More Apple Silicon Support

        Now that the Linux 5.16 merge window has ended with yesterday’s Linux 5.16-rc1 release, here is my lengthy original overview of what I find most interesting out of this new kernel version. Linux 5.16 won’t be out as stable until around the end of the calendar year or early next year, but it will sure make one nice Christmas gift with all of the shiny new features in tow.

        See the feature list below for everything I found interesting from my close monitoring of the Git repositories and mailing list, but here are some of the quick lights… Linux 5.16 adds FUTEX2′s futex_waitv syscall as another improvement for Windows games running on Linux and even potentially helping native games in the future, memory folios finally made it in, Intel AMX was merged ahead of Sapphire Rapids, DAMON memory reclamation landed, there is now support for the Raspberry Pi Compute Module 4 on mainline, continued enablement around the Apple Silicon (M1), the Nintendo Switch controller driver was merged, AMD and Intel preparations for DisplayPort 2.0, stable Intel Alder Lake S graphics, Intel DG2/Alchemist bring-up, newer Zstd implementation, and much more.

    • Applications

      • Best Free and Open Source Alternatives to Adobe Animate

        Adobe is a large multinational computer software company with over 22,000 employees. Its flagship products include Photoshop, Illustrator, InDesign, Premiere Pro, XD, Acrobat DC, and the Portable Document Format (PDF). The products are wrapped up and marketed as the Creative Cloud, a subscription-only way of accessing more than 20 desktop and mobile apps and services for photography, design, video, web, UX, and more

        We are long-standing admirers of Adobe’s products. They develop many high quality proprietary programs. It’s true there are security and privacy concerns in relation to some of their products. And there’s considerable criticism attached to their pricing practices. But the real issue is Adobe Creative Cloud does not support Linux. And there’s no prospect of support forthcoming.

        What if you are looking to move away from Adobe and embark on a new world of online freedom, where you are not tracked, monetised and attached to Adobe’s ecosystem. We only recommend free and open source alternatives. Our recommended software don’t necessarily replicate every feature of their Adobe counterparts but they offer sufficient functionality for many tasks.

      • Top 3 Open Source Math Software & Matlab Alternatives

        Perhaps you have heard about Matlab, and how great it can be used for mathematics, modeling, computing and simulation tasks. It is indeed a great software, but it has one deadly flow: It is proprietary, and requires a very expensive license to use it.

        That’s why, open source alternatives emerged to take the place of Matlab and other similar mathematics software.

        In today’s article, we’ll be seeing 3 of the best open source math software in the market.

    • Instructionals/Technical

      • What is Terraform and how to install and use it on AWS EC2

        Terraform is the “Infrastructure as Code (IaC)” tool. It is used to build, manage and change infrastructure in a safe and repeatable way.

        It is used to manage environments with a configuration language called the HashiCorp Configuration Language (HCL) for human-readable, automated deployments.

        Terraform can be used to manage infrastructure on multiple clouds like AWS, GCP and others. Terraform creates a state file which is the source of truth for the resource configurations. This means whenever resources are created this state file is updated with the state of the resources being created.
        In this article we will see the steps to install Terraform on Ubuntu and use it to create a VPC on AWS cloud.

      • [Solved] Repository Doesn’t Support Architecture ‘i386′

        Recently, an It’s FOSS reader asked for an issue he was facing with Vivaldi browser while updating his Ubuntu system. The apt update command showed an ‘error message’:

        N: Skipping acquisition of configured file ‘main/binary-i386/Packages’, as repository ‘http://repo.vivaldi.com/stable/deb stable InRelease’ doesn’t support architecture ‘i386’

        Since I already had Vivaldi installed on my Ubuntu, it was easy for me to reproduce the issue.

      • How To Upgrade To Raspberry Pi OS 11 Bullseye (From Buster) – Linux Uprising Blog

        Raspberry Pi OS “Bullseye” (based on Debian 11 Bullseye) has been released recently, and this article covers the instructions for upgrading from the older Raspberry Pi OS Buster to this new Bullseye version. This should work with any Raspberry Pi model.

      • How to Install Notepad++ on Linux

        Notepad++ is a popular source-code editor among Windows users. It supports close to 78 different programming language syntaxes and includes a ton of features to improve the text editing experience.

        However, one caveat of Notepad++ is that it’s only limited to Windows. So, if you’ve been a Notepad++ user for a long time and recently switched operating systems to Linux, you’ll probably feel the void of Notepad++ very dearly.

        Fortunately, though, there are a couple of ways to install and get Notepad++ running on a Linux machine. In this guide, we’ll go over these methods in detail.

      • How to Install Zabbix on Rocky Linux and AlmaLinux

        Proper monitoring is an essential ingredient for the effective management of your overall IT infrastructure. A robust real-time monitoring solution provides detailed visibility of your network and application performance.

        It helps to identify actual moments when errors and incidents occur and sends alerts. By doing so, operation teams can take intervention measures in a timely fashion and ensure business continuity in the shortest time possible.

        This helps you make the most of your IT resources and, in turn, maximize your revenue. As such, one cannot undermine the importance of investing in an efficient and reliable monitoring tool.

      • How to Type Unusual Characters and Symbols in Ubuntu GNOME | UbuntuHandbook

        Without using a virtual keyboard, the standard physical keyboard supports for inserting alternate characters and symbols using the Compose key in Linux. Here’s how to enable and use the key in Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.10 & higher with default GNOME desktop.

      • How to Use APT with Proxy on Ubuntu and Debian

        This guide will show you how to set proxy for APT package manger so that you may be able to install and update packages from remote repos.

        Using a proxy server as an internet access intermediary is a common business scenario. If you are running Ubuntu or Debian system behind a proxy server, chances are you have unsuccessfully tried to install packages.

      • How to backup and restore databases in Mysql or Mariadb

        In this guide we will learn how to back up and restore – inporting and exporting data in Mysql or Mariadb – the commands are interchangeable. Importing and exporting databases is a common task in software development. You can use data dumps to back up and restore your information.

      • Linux: How to Avoid Linus Tech Tips’ Mistakes
      • Linux overview | Red Hat Enterprise Linux 8.5 – Invidious

        In this video, I am going to show an overview of Red Hat Enterprise Linux 8.5 and some of the applications pre-installed.

      • Fix dock not showing in Gnome – LinuxH2O

        In this article, you will see how to fix the dock not showing in the newer version of the Gnome desktop environment, particularly starting from Gnome 40. This guide works for all the Linux distributions like Ubuntu, Fedora, Majaro, Pop OS, MX, etc.

        Just like me and many other Linux users who have switched to the newer version of the Gnome desktop environment start with Gnome 40, 41, or above. We have faced this issue of the bottom dock is not showing up. It only shows itself when you overview the windows or press the super key. This make makes it harder to access the frequently used applications such as file manager, browser, document editor, etc.

        Another issue is that the dock that you see is not a good-looking one, it is so big that it ruins the modern look and feel of Gnome. So in this article, I’m gonna guide you to solve both of these issues with the help of an extension.

      • Add an OLED Stats Display to Raspberry Pi OS Bullseye – The DIY Life

        Raspberry Pi OS Bullseye has recently been released and with it comes a number of improvements, but most of them are under the hood. There aren’t that many visual differences, the most noticeable is probably the new default desktop background which is now a sunset over a dam or lake.

        With this operating system upgrade, we’ve also got the usual bugs and software incompatibilities. These have caused my previous OLED stats display tutorial, that I used for my Raspberry Pi Desktop Case, to no longer work correctly. If you follow the previous tutorial, you’ll be presented with a host of errors.

    • Games

      • Puzzle game Superliminal gets a Battle Royale mode | GamingOnLinux

        The very clever puzzle game Superliminal, where everything is about your perspective now has multiplayer was a “Battle Royale” mode where you’re all a Chess piece. It’s a little weird but it also looks like plenty of fun.

        Superliminal is a first-person puzzle game that uses perception as a mechanic. You play as someone who wakes up in a surprisingly lucid dream. You complete puzzles to reach each exit, while looking around to grab objects and change them based on how you’re looking at them. It’s all about thinking outside the box. What you see is what you get. Literally.

      • This new mode puts Jazz Jackrabbit in the Doom engine | GamingOnLinux

        Jazz Jackrabbit and Doom together? Can’t say I ever expected that but Doom engine modders constantly surprise me. Jazz Jackrabbit Doom – Episode 1 is out now.

        “Jazz Jackrabbit is at it again to rescue his love, Eva Earlong, from his nemesis Devan Shell and his goons. It’s up to you to finally end this chase once and for all. Episode 1: Rabbit Rescue follows Jazz, as he starts his journey to save his family and take down Devan once and for all. Taking you through Carrotus, Diamondus, Tubelectric, Medivo, Letni, Technoir and Orbitus, with some hidden maps for the keen-eyed ones.”

      • Daniel García Moreno: Endless Orange Week: Hack content creators platform (2)

        The past Friday was the last day of the Endless Orange Week. It was a nice and fun experience, and even if I was not able to do as much as I wanted, we were able to make something that “works” in the Hack project.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE developer thinks they will become the ‘Windows or Android’ of the FOSS world

          KDE developer Nate Graham, who is known for writing the ‘This week in KDE” blog posts keeping us up to speed on all the latest changes has a fresh update about plans for taking over the world, and Graham has some interesting things to say.

          There’s certainly no shortage of desktop environments on Linux and a number of ways to build software, each with their own goal and way of doing things. It’s both a strength for choice and a reported weakness with so much. It’s always interesting to read the point of view from developers whose work we rely on so much in the FOSS community. Especially when Graham came from a background in working with Apple, while now a KDE developer.

          Here, it wasn’t quite what I expected to read. The post goes over talking about the market leaders like Windows and Android, noting neither was the first to come to market but they’ve successfully captured the biggest slices. Noting that “Neither is picky about what kind of software you run on them or write for them, so they are used on a wide range of devices by lots of different people. Both work with others in adjacent industries, rather than taking a ‘my way or the highway’ approach. They are flexible.”

        • How to change the Plasma system menu height

          We can rest and relax, as we pay another tribute to the OCD demons. But you have to admit, even with the little snags and problems here and there, the Plasma desktop still gives you an amazing range of options that you can change, tweak and customize to your liking. And at the same time, it still manages to look good, behave reasonably, and not diverge from being posh, elegant and consistent.

          In general, QML-ing allows you to really go wild and make any which change you like to your desktop. Editing the private, local copy of the relevant plasmoid files also means that your tweaks are fully reversible, so if you do something naughty, you can go back to system defaults. Very handy and convenient. Anyway, system menu height (or width if you like), sorted. And we’re done.

        • Kdenlive 21.12 beta out for testing

          With version 21.12 just around the corner, we are releasing the first beta version (21.11.80) for testing. Try it out and help find breakages in your daily usage or bugs in these new features…

          You may now import your video footage or audio recording folder while automatically ignoring the folder structures created by some devices like Sony XDCam, Panasonic P2, Canon camcorders or Zoom audio recorders.
          Please report any issues you are facing at https://bugs.kde.org/enter_bug.cgi?product=kdenlive. In the report don’t forget to set 21.11.80 as your version!

    • Distributions

      • 8 Best Lightweight Linux distros for VM- Virtual Machine for 2022

        “Lightweight Linux distribution terms” can be different from one to another. It’s all depends on whether he /she wants whether a Linux with GUI or CLI and how much system resource he/she can provide to their Virtual machine running Linux system. Here we are considering that you are a user of either Virtual Box, Vmware Player, or Hyper-V and looking for a Lightweight Linux distro with fewer resources consumption to run on VM (memory, CPU, and Hard disk). Also, if you are a user of Windows 10 or 11 then can consider WSL to start learning Linux.

      • BSD

        • FreeBSD Quarterly Status Report 3rd Quarter 2021

          This report covers FreeBSD related projects for the period between July and September, and is the third of four planned reports for 2021, and contains 42 entries.

          The third quarter of 2021 was quite active in lots of different areas, so the report covers a bunch of interesting work including but not limited to boot performance, compile-time analysis, hole-punching support, various drivers, ZFS raidz expansion, an update to the sound mixer, and many more.

          Regrettably, the status report got a bit delayed, but we hope that the aphorism better late than never can apply here.

          Daniel Ebdrup Jensen, with status hat on.

      • IBM/Red Hat/Fedora

        • Managing and automating kernel settings with RHEL System Roles

          The Red Hat Enterprise Linux (RHEL) kernel provides hundreds of settings that can be customized. These settings are frequently customized to increase performance on systems or when performing security hardening.

          Implementing consistent kernel settings across a large RHEL environment can be challenging without automation. Red Hat introduced the kernel_settings RHEL System Role to automate the implementation of settings under /proc/sys, /sys, and other settings such as CPU affinity. The role uses tuned to implement these settings on hosts.

          RHEL System Roles are a collection of Ansible roles and modules that are included in RHEL to help provide consistent workflows and streamline the execution of manual tasks. For more information on kernel settings in RHEL, refer to the RHEL documentation on Managing, monitoring, and updating the kernel.

        • Stefanie Chiras to lead Red Hat global partner ecosystem [Ed: It says “leading Red Hat partners such as Microsoft”]

          I got involved in the Linux space while at IBM as part of the Power Systems team, and since then I’ve remained fascinated by the immense value that Linux brings to the industry. Linux really has taught us how development is meant to be done, through open source and the heart of innovation unifying a community. I joined Red Hat in order to lead the Red Hat Enterprise Linux organization, working together with customers and partners on the successful definition, execution and delivery of Red Hat Enterprise Linux. Linux is the language of the wider ecosystem, pulling together the best technologies and platforms from an extensive list of software providers and solutions. Our strategy is built on being able to consume Linux wherever and however you want it, and the commitment we have seen to Red Hat Enterprise Linux from our partner ecosystem has been phenomenal and is essential to create value.

        • Being a Technical Account Manager (TAM) – A day in the life

          IT operations team members work hard to keep systems up and running, often pulling their hair out for resolutions after hours behind the scenes to ensure a seamless front-end experience for their users. But, even superheroes need saving sometimes.

          If you’ve struggled to fix your encryption policies after reading article after article online or need some guidance to pull together a proof of concept for your organization’s big migration to the cloud, perhaps a Red Hat Technical Account Manager (TAM) can be a part of the answer you’ve been searching for.

          Or maybe you’re an expert troubleshooter and audit log guru and want to use those superhero skills to help more companies manage their operations. Some time back, I read a post over on Reddit (written by someone who was considering working for Red Hat) asking if there were any TAMs that would be willing to talk about their job. Here’s a glimpse into a day on the job as a Red Hat TAM.

        • 6 benefits of AIOps

          As IT systems continue to evolve and grow, their scale and complexity are becoming increasingly difficult to manage. The sheer volume of data these systems generate is overwhelming, and — without sufficiently intelligent monitoring and analysis tools — can result in missed alerts, opportunities and excessive (and expensive) downtime.

          With the advent of big data and machine learning, however, a new category of IT operations tool has emerged: AIOps.

        • David Cantrell: rpminspect-1.8 released

          rpminspect 1.8 is now available. I know it’s been merely days since the previous release, but this release includes bug fixes for the new unicode inspection.

        • Debarshi Ray: Toolbx: Red Hat is hiring a software engineer

          The Desktop Team at Red Hat wants to hire a software engineer to work full-time on Toolbx (formerly known as Toolbox) with me, and hopefully go on to maintain it in the near future. You will be working upstream and downstream (Fedora and RHEL) to improve the developer and troubleshooting experience on OSTree-based Linux operating systems like Fedora Silverblue and CoreOS, and extend some of the benefits to even traditional package-based OSes like Fedora Workstation.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Blender 3.0 Will Have AMD HIP-Based GPU Acceleration – Phoronix

        With the big Blender 3.0 release due out near year’s end there was the Cycles X rewrite that landed and unfortunately removed OpenCL support in the process. While that left AMD Radeon graphics without Blender GPU-accelerated support, in time for the v3.0 release there is now AMD HIP support in place.

        AMD has been working with Blender developers to improve GPU rendering by supporting AMD’s HIP API in place of the removed OpenCL support. The HIP C++ Runtime API should offer better AMD GPU support than the poor OpenCL back-end of the past. This does require users though to be on the latest AMD Radeon Software Windows driver or on Linux with the Radeon ROCm driver stack in place and working or their Radeon Software for Linux packaged driver stack.

      • Willy Tarreau on HAProxy at Its 20-Year Anniversary

        Willy Tarreau, the founder of the HAProxy load balancer, 20 years past its initial, open-source release, still guides the project, often submitting code patches and writing long and meticulous replies on the community forum. Over the years, he has been joined by a cast of regular contributors, but also newcomers. This collaboration has kept the project evolving over time.

        In this interview, Willy describes his views on the success of the project, and how it grew over the years. He also discusses how the open-source model has evolved and other forces at play in the software industry.

      • LF/Openwashing/Greenwashing by Linux Foundation

      • Programming/Development

        • GCC Patches Pending For RISC-V’s Scalar Cryptography Extension – Phoronix

          Patches were recently sent out that implement support for RISC-V’s Scalar Cryptography Extension within the GNU Compiler Collection.

          The RISC-V Scalar Cryptography Extension work recently wrapped up its public review period for the set of instructions proposed for this open-source processor ISA. The set of extensions aim to enhance RISC-V’s capabilities for crypto workloads with AES encryption/decryption, SM4 and SM4 cipher instructions, an entropy source extension, bit manipulation instructions for crypto, carry-less multiply, and more.

        • Drew DeVault’s blog: Status update, November 2021

          In other news, we have decided to delay the release of our new programming language, perhaps by as much as a year. We were aiming for February ‘22, but slow progress on some key areas such as cryptography and the self-hosting compiler, plus the looming necessity of the full-scale acceptance testing of the whole language and standard library, compound to make us unsure about meeting the original release plans. However, progress is slow but moving. We have incorporated the first parts of AES support in our cryptography library, and ported the language to FreeBSD. A good start on date/time support has been under development and I’m pretty optimistic about the API design we’ve come up with. Things are looking good, but it will take longer than expected.

        • Haskell Gemini server framework

          I’m in the process of building a Gemini server framework for Haskell. I know that one already exists (which has very heavily influenced mine) but mine doesn’t need to be linked against OpenSSL, which is not hard to do, bit the process is inconsistent from OS to OS. I wanted something that was pure Haskell.

          It’s not completed yet, but I welcome any feedback. I’m also livestreaming the coding process when I do work on it. I can supply information on that too if there’s interest.

        • API Stability is No Black Magic!

          You might be surprised how much time R&D teams spend on fixing breaking APIs. Imagine you are the Head of Product, and your R&D team just finished a ground-breaking product after two years of software development. You are ramping up and fine-tuning the production with various global variants for six months to crank out that new product in volumes. Shipping large quantities of products, you get customer feedback that you haven’t received before, and you ask your R&D team to improve the software. Now the R&D team tells you that – instead of only fixing the customer issue – the team also needs to fix the APIs of the product because the latest release of the cross-platform UI toolkit broke several of the APIs you are using. Instead of spending a few days to the customer’s issue, your team spends weeks updating everything, including API documentation and integration tests. Does this sound like an unrealistic scenario?

        • C++ Global Variables

          The concept of global variables plays a very vital role in C++ programming. It lets us use a variable anywhere within our whole program and change its values as per our requirements. The cause behind writing this guide is to introduce you to the concept of global variables in C++. After doing that, we also want to share with you some examples through which you will be able to understand the usage of global variables in C++ in Ubuntu 20.04 very clearly.

        • YAML Tutorial | Getting Started With YAML – OSTechNix
        • Perl/Raku

          • A dream resyntaxed

            When I read Curtis’s post I almost decided to bin this one, as he managed to cover everything necessary in his usual succinct, eloquent, and engaging style. But he has encouraged me to post my version of this discussion too, as it provides a little more detail on some of the issues we’re addressing, and on the design rationale for the changes we are jointly proposing.

            Personally, I always relish the opportunity to read two versions of exactly the same story by two very different authors, or to watch two directors’ very different takes on the same screenplay. In fact, that’s what initially attracted me away from SmallTalk/C++/Eiffel and into Perl: I read Larry’s version of “Object Orientation”, and found it much more entertaining, and also more enlightening than the other earlier interpretations.

        • Rust

          • Please welcome The 8472 and Ashley Mannix to Library Contributors

            Ashley Mannix maintains several popular Rust crates and used to be a part of the Library (API) Team. Ashley is now getting back into Rust open source work, and will be helping out with maintenance of the standard library and some official rust-lang crates such as log.

  • Leftovers

    • Hardware

      • Propel Paper Planes, Bisect Sausages With Electromagnets | Hackaday

        Are you still launching paper airplanes using your hands? That’s like a baby’s toy! [Tom Stanton] and his homebrew electromagnetic rail launcher are sure to bring your paper airplane game into the 21st century.

        To be fair, these kinds of linear motors can be used for more than just launching paper airplanes, and can already be found in niche industrial applications, mass transportation systems and roller coasters. And, yes, the potential to leverage electromagnetism in the theater of war is also being vigorously explored by many of the world’s superpowers in the form of Gauss rifles and railguns. In the meantime, the video (after the break) proves that it’s entirely possible to build a rudimentary yet effective linear motor in your makerspace, using relatively basic components and fundamental physics.

    • Integrity/Availability

      • Proprietary

        • Windows 11 Will Soon Block All Default Browser Workarounds

          Daniel Aleksandersen, the creator of EdgeDeflector, wrote a blog post (h/t Thurrott). He said the latest Windows 11 Insider Preview builds prevent apps like EdgeDeflector and other workarounds from getting around Microsoft’s complicated process of changing the default browser and fighting off “microsoft-edge:// links.” Here’s what the post says:

        • Security

          • Southern Poverty Law Center warns parents that perfectly reasonable applications are “used by extremists”.

            They list Brave Browser, and Riot Chat (now known as Element), various VPNs, the Tor Browser.

            Not to be left out, pretty much everything “mainstream” is wrong too, including YouTube, Discord, and Reddit.

            Of course, to make this sound really bad, let’s throw in some things that actually are dodgy that you may have heard about.

          • Windows 10, 11 Users Need 3rd-Party Patch for Security Vulnerability 1 [Ed: Microsoft is a threat to national security]

            Microsoft has had plenty of time to fix a security vulnerability. After the vulnerability was disclosed, a patch was released, and it was proven not to be 100 percent successful. But a third-party security specialist has stepped in to develop a patch for the Windows 10 and 11 security vulnerability.

          • Security updates for Monday

            Security updates have been issued by Debian (ffmpeg and tomcat9), Fedora (et and kernel), openSUSE (binutils, rubygem-activerecord-5_1, samba, and tinyxml), Oracle (freerdp and httpd:2.4), Red Hat (devtoolset-11-gcc, gcc-toolset-10-binutils, kernel, kernel-rt, and kpatch-patch), and Scientific Linux (freerdp).

          • Securing your digital life, part three: How smartphones make us vulnerable

            There are, by some estimates, more smart phones on this planet than human beings to use them. People who have never used a desktop computer use smart phones and other mobile devices every day and have much of their lives tethered to them—maybe more than they should.

            As a result, cyber-grifters have shifted their focus from sending emails to gullible personal computer users (pretending to be Nigerian princes in need of banking assistance) and have instead set their sights on the easier target of cell phone users. Criminals are using smartphone apps and text messages to lure vulnerable people into traps—some with purely financial consequences, and some that put the victims in actual physical jeopardy.

            I recently outlined some ways to apply a bit of armor to our digital lives, but recent trends in online scams have underscored just how easily smartphones and their apps can be turned against their users. It’s worth reviewing these worst-case scenarios to help others spot and avoid them—and we aren’t just talking about helping older users with this. This stuff affects everyone.

          • Warning Issued For Millions Of Microsoft Windows 10, Windows 11 Users

            Windows users need to be on high alert. Microsoft has confirmed a critical vulnerability has been found in all versions of Windows which presents an immediate threat, and you need to act now.

    • Finance

Microsoft Announces That It Will Soon Break Every Method to Avoid Accidentally Loading Edge

Posted in Antitrust, Microsoft at 2:41 pm by Guest Editorial Team

Guest post by Ryan, reprinted with permission from the original

Microsoft announces that it will soon break every method to avoid accidentally loading Edge.

I don’t know why anyone would use an OS (Windows “11”) that doesn’t understand what the word “No” means. Jeffrey Epstein OS. Good pals with Uncle Bill.

Anyway, if you continue using Windows “11”, at some point, Microsoft will plug all of these “user choice” holes and you’ll be stuck swatting at Edge all the time.

There are some Windows programs that can match window titles and automatically close them for you that may still work to avoid some of the aggravation. But switching to GNU/Linux now is a good idea.

Here’s some Debian 11 Live images with device firmware included. You can make a Live USB and try it out with Rufus if you use Windows.

It respects your default decisions!

Mozilla puts Firefox in the Windows 11 store.

Microsoft bandits: “You picked a bad time to get lost, friend! I’ll enjoy counting your coin!”

Windows and Edge are like adaptive malware that just figures out how the antivirus programs (in this case, the Edge deflectors and closers) work, and automatically install updates from a botmaster. (Microsoft)

Links 15/11/2021: Reviving Old PCs, Red Hat Software Collections 3.8

Posted in News Roundup at 9:21 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Revive Your Old Computer with GNU/Linux Made Easy

        Do you have an old desktop PC or laptop? We have happy news to you. You can reuse it, rather than throw it away or leaving it unused. To revive your computer, install a GNU/Linux operating system that supports old computers and is actively supported. This will give your old computer a fresh life once again, for general purpose, as well as for specific purpose like multimedia creativity and programming. You can receive latest software and security updates by using one of them on your old machine. Finally, we compile these choices in alphabetical order from antiX to Zorin OS that still support up to 15 years old computers a.k.a. 32-bit PCs with tens of thousands latest software packages. Happy computing!

    • Kernel Space

      • Graphics Stack

        • Dave Airlie: h264: more AMD hw worked on

          Previously I mentioned having AMD VCN h264 support. Today I added initial support for the older UVD engine[1]. This is found on chips from Vega back to SI.

          I’ve only tested it on my Vega so far.

          I also worked out the “correct” answer to the how to I send the reset command correctly, however the nvidia player I’m using as a demo doesn’t do things that way yet, so I’ve forked it for now[2].

    • Instructionals/Technical

      • Command to add folder in linux path permanently – Linux Shout

        What is Environment Variable in Linux? The variable is a path of the executable files that Linux systems can recognize globally on the Command terminal or by any other application. For example, We can open firefox via the command terminal by simply typing its name rather than the whole path of the actual executable file where it resides. In the same way when we install Java its executable binary can be used by other applications easily even GUI ones.

      • Linux tips for using cron to schedule tasks | Opensource.com

        Making things happen on a regular and predictable schedule is important on computers. It’s important because, as humans, we can sometimes be bad at remembering to do things reliably because we get distracted, have too much on our minds, or we’re on holiday. Computers are really good at doing things on a schedule, but a human has to program the computer before the computer takes action.

        In a way, the cron system is an easy and rudimentary introduction to programming. You can make your computer do what you want it to do just by editing a file. You don’t even have to know where the file is kept. You have only to type in a simple command, enter the “recipe” you want your computer to follow, and save your work. From then on, your computer executes your instructions at the specified time until it is told to stop.

        By design, cron is not a complex system. Here’s what you need to know about it.

      • Running Jenkins with Docker Compose – Unixcop the Unix / Linux the admins deams

        Hello, friends. We really like Docker and Jenkins so I thought why not make a post about both? Yeah, that’s a good idea. So, in this post, you will learn how to run Jenkins with Docker Compose. The process is simple and quick to do.

      • How To Install CUDA on Linux Mint 20

        In this tutorial, we will show you how to install CUDA on Linux Mint 20. For those of you who didn’t know, The Nvidia CUDA toolkit is an extension of the GPU parallel computing platform and programming model. It allows your applications to use different types of GPUs very conveniently.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a CUDA Nvidia on a Linux Mint 20 (Ulyana).

      • How To Install Python 3.10 on Ubuntu, Debian & Linux Mint – TecAdmin

        Python is an object-oriented, high-level programming language. As of today, Python 3.10 is the latest stable version available for productions environments. Most of the Debian-based Linux distribution includes older versions of Python in software repositories. Also, the Debian packages are not available for all distributions. This tutorial has been tested on Ubuntu 20.04 Linux system.

        This tutorial will help you to how to install Python 3.10 on Ubuntu, Debian, and LinuxMint systems using source code. T

      • How to Install / Enable RPM Fusion on Fedora 35 – LinuxCapable

        RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL that a group of community volunteers maintains. RPM Fusion is not a standalone repository but an extension of Fedora’s default packages that could not be included due to Fedora being bound by the same legal restrictions as Red Hat.

        The RPM Fusion repository comes in two flavors, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.

        In the following tutorial, you will learn how to install RPM Fusion on your Fedora 35 operating system.

      • How to Uninstall Android Bloatware Without Root On Ubuntu Linux? – Fosslicious

        When buying an Android smartphone, users may notice that there are some unwanted applications (bloatware), which are installed but cannot be removed, because these applications are installed in the system. And in order to change the system rules and be able to remove the default apps installed in the system, the user needs root privileges.

        But, rooting in android in my country, can void the warranty if the smartphone was recently purchased. So I don’t recommend doing this. If you don’t like some of the default applications on your smartphone, users can actually disable them. But sometimes some default applications cannot be disabled.

      • How to install KernelCare and clear Kernelcare Cache in Linux – Unixcop the Unix / Linux the admins deams

        KernelCare is fabulous kernel update tool by CloudLinux. We started testing this kernel patch in a few servers and the result has been truly amazing, allowing us to avoid server downtime after kernel updates because of each server reboot we had to apply after the kernel was updated. Today we will show you how to run a KernelCare installation.

      • How to install and use Podman in Fedora 34/35

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • How to install and use Podman in OpenSUSE Leap 15.3

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • Use Ansible tags to save time on playbook runs | Enable Sysadmin

        As a frequent Ansible user, I’m always looking at ways to simplify my playbooks and save time during playbook debugging. One of my favorite features for writing robust Ansible playbooks is its support for tags. This article introduces tags, walks through some common tag scenarios, and outlines more advanced usage.

      • How to Rename Multiple Files in Linux

        In a Linux system, you can easily rename a file using mv command. But, if you have multiple files which you want to rename, in this situation you need some extra tools or built-in Linux utilities for solving this problem.

        In this tutorial, we learn the different methods to rename multiple files in a Linux system at once.

      • How to Build an E-Paper To-Do List with Raspberry Pi | Tom’s Hardware

        I’ve often struggled with procrastination, and to-do applications have been lifesaving. I sometimes find myself needing a reminder to just focus on getting the most important task done before working on anything else.

        With that in mind, I created a simple photo frame to sit on my desk and remind me of my most important task of the day using e-paper and a Raspberry Pi. I wanted to use e-Paper specifically since it’s low-power and not as distracting as a standard display would be. If you’re the kind of person who likes a simple reminder of your most important tasks, here’s how to build it for yourself.

      • Install Apache JMeter on Ubuntu 20.04 LTS Focal Fossa

        Apache JMeter is open-source like any other Apache foundation project. It is meant to analyze system functional behavior by running performance tests, regression tests, stress tests, and database servers based on different technologies. However, earlier it was designed to test only web applications.

        JMeter is Java-based, hence can be used to know what would be the performance of various applications and software. It sends a request to web or application servers for different loads by simulating browser behavior. The scripting language for JMeter is Groovy (an object-oriented programming language used for the Java platform). Browser plugins are also supported in this testing platform.

      • How to View Hardware Information in Linux

        Being a Linux enthusiast implies that you are familiar with both the hardware and software entities of your system.

      • How to Run Linux Shell Command / Script in Background

        The usual style of executing a command on a Linux terminal is to simply run it and wait for it to gracefully exit. Once the command exits, you can then proceed to execute other commands in succession. This is what is known as running commands in the foreground. As the word suggests, you can visually see the output of the command on the terminal.

        Sometimes, however, running commands in the foreground can present a set of challenges. The command can take too long to exit causing you to waste precious time and other times, it can be totally attached to the shell session leaving you stuck.

        In such cases, running a command in the background is your best bet. You can send a command(s) to the background as you concurrently execute other commands in the foreground. This improves the efficiency of working on the terminal and saves you time.

        In this guide, we focus on how you can run Linux shell command or script in the background.

      • How to Capture top command output to a file

        Linux top command is widely used by Linux system administrators in real time to check system resources utilization such as CPU, disk I/O, system load average, running processes and memory utilization.

        I usually use Oracle OSWatcher Black Box (OSWbb) to collect various system data to diagnose performance issues for a period of time.

        But if you want to collect a list of processes that consume high CPU and memory on your system for a specific period of time, you can do this using the top command.

        To redirect the top command output to a text file, the top command must be executed in batch mode.

        In this guide, we will show you how to capture the top command output in files for a specific duration for troubleshooting performance issues.

    • Distributions

      • IBM/Red Hat/Fedora

        • Automation by the numbers: 11 stats to know | The Enterprisers Project

          Automation pervades most other contemporary IT trends. Cloud and cloud-native? You’re talking about automation. Security and DevSecOps? Again, you’re talking about automation. Talent and culture? Yep, you’re still talking about automation.

          IT is both in the midst of its own automation transformation and also an indispensable catalyst of organization-wide automation strategies. It’s actually difficult to exaggerate the role that automation is playing in businesses and industries of all kinds today. (The “automate all the things” meme has a kernel of truth to it.)

        • Change management: 9 ways to build resilient teams

          Resilience, in the context of psychology, refers to ability to adapt well to adversity, trauma, tragedy, or other sources of significant stress. Being resilient has benefits for both individuals and organizations – as has clearly been on display over the last two tumultuous years.

          CIOs know well how their team members’ capacity to adjust positively to workplace pressures, changes, and setbacks contributes to the IT function’s performance.

          Because resilience is a set of learnable skills and approaches rather than a fixed characteristic, there are ways that IT leaders can help to build and hone resilience among their people. “Just as with ourselves, fostering resilience in our teams is a matter of helping them build skills and mindset that support a hopeful, solution-oriented response to obstacles, challenges, and unanticipated change,” says Erika Andersen, leader readiness consultant and author of Change from the Inside Out.

          However, doing this well requires a nuanced understanding of what constitutes resilience and a deft touch in encouraging this critical capability in healthy ways. Here are some ways IT leaders can help their team members develop and deploy their resilience:

        • Red Hat Software Collections 3.8 and Red Hat Developer Toolset 11 now generally available

          The latest versions of Red Hat Software Collections and Red Hat Developer Toolset for Red Hat Enterprise Linux (RHEL) 7 are now generally available. Software Collections 3.8 delivers the latest stable versions of many popular open source runtime languages, web servers, and databases natively to the world’s leading enterprise Linux platform. These components are supported for up to five years, helping to enable a more consistent, efficient, and reliable developer experience.

          Here’s a quick overview of the updated development tools and collections you’ll find in this release.

        • Announcing the 2021 Call for Code Engagement Awards

          Since 2019, the Call for Code Engagement Awards have recognized organizations that have answered the call and exhibited a deep commitment to Call for Code.

          Call for Code inspires a community of change agents to build, contribute to, and deploy solutions for the most pressing global social issues and humanitarian causes. As Call for Code has grown over the last few years, so have the ways corporations and universities have stepped up and engaged with us to help drive tech-for-good solutions. These organizations help us make Call for Code solutions tangible and scalable. Some have provided pathways for their employees to participate in our global challenge. Others have hosted spot challenges to address causes that align with both their own corporate responsibility goals as well as the issues of focus for Call for Code, such as natural disasters, climate change, COVID-19, and racial justice. Whether they provided technology or data sets for challenge participants to use in their solutions, or offered deployment support for winning solutions, or brought Call for Code initiatives into the classroom as a way to engage university students, every one of our sponsors and partners has been instrumental in the success of Call for Code initiatives.

          This year a new Call for Code Ecosystem Engagement Award has been added, providing us the opportunity to also recognize non-profit organizations that are essential in ensuring Call for Code solutions are applicable to real-world problems and adopted by impacted communities to create real change.

          We’re pleased to announce the full list of 2021 Call for Code Engagement Award winners. The Call for Code team is so grateful for the collaboration and commitment from all of this year’s award recipients, as well as our dedicated sponsors.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Programming/Development

        • How to Use std::array

          The std::array notation in C++ is an alternate method of declaring and initializing the arrays in C++. However, a question might arise in your mind that when we can declare and initialize the arrays already, then why do we even need this notation in the first place? In this article, we will try to explore the answer to this question. After that, we will share some examples with you to demonstrate the usage of the std::array notation in C++ in Ubuntu 20.04.

          The std::array Notation in C++:

          We have already stated that the std::array notation in C++ is an alternate method of declaring and initializing the arrays. However, we still need to figure out the need to use this notation. Generally, there are two types of arrays in C++, i.e., static and dynamic. Both these types of arrays have their pros and cons. The static arrays lose all the information regarding their size once they are passed to a function as a pointer, whereas the dynamic arrays’ deallocation is very problematic.

          Therefore, the std::array notation is used to make the best usage of both of these types, i.e., using this particular notation, a static array never loses the information that it contains even when it is passed to a function. This is exactly why we use this notation in C++. You will learn more about the usage of this notation in C++ by going through the next section of this article.

        • Perl/Raku

        • PHP

          • PHP file_get_contents() Function

            PHP contains many built-in functions to read the content of any existing non-empty file. The file_get_contents() is one of the built-in functions of PHP to read the entire content of an existing file as a string. The syntax of this function is given below.

          • PHP in_array() Function

            Array variables are used to store multiple values where each value is accessed by using the index value. Sometimes we need to search a particular element in an array for programming purposes. The in_array() is a built-in function of PHP to search specific elements into an array. It searches data in a case-sensitive manner. The way to use this function for searching value in an array has been described in this tutorial.

          • PHP json_encode() Function

            The JSON is a popular data format that is used to serialize and transmit structured data between the web server and application because the JSON file is human-readable and lightweight. The json_encode() is a built-in function of PHP that converts the array or object into JSON data for various purposes. The various uses of this function have shown in this tutorial.

          • PHP password_verify() Function

            The password_verify() function is used to match the hash password with the original password. Another function, password_hash() is used to generate the hash value based on the hashing algorithm, cost, and salt value. The password_verify() function contains all hashing information to verify the hash with the password. The uses of this function have been shown in this tutorial by using multiple examples.

          • PHP require_once() Function

            When a PHP script is used in multiple files for programming purposes, then it is better to write the script in one file and include the file in those files without writing where the script is required. PHP has many built-in functions to include any existing file in a script. These are require(), require_once(), include(), and include_once().

            The task of require() and require_once() are the same, but the one difference is that the require() function does not check the file has been included before or not but the require_once() function check the file has been included before or not. If the file has been included in the script before, then the require_once() function will not include the same file again. How the require_once() function is used to include files in PHP has been shown in this tutorial.

          • PHP unset() Function

            The unset() function is used to reset any variable that has been defined earlier. Two types of variables are used in any programming language. One is a global variable and another is a local variable. The variable defined outside the function is called a global variable that is accessible from anywhere in the script. The variable defined inside the function is called a local variable that is accessible inside the function only.

            If the unset function is used for the local and global variables, then it resets both variables locally. That means the value of the global variable remains unchanged that was defined before changing inside the function. The $GLOBALS array or global keyword can be used to unset the global variable permanently. The uses of this function to reset PHP variables have shown in this tutorial.

          • PHP var_dump() Function

            The var_dump() function is a built-in function of PHP to find out the information about the value and data type of one or more variables. It also provides information about the length of the data for the string variable. The information about both scalar and compound variables can be retrieved by using this function. Different uses of this function have been shown in this tutorial.

  • Leftovers

    • Education

    • Health/Nutrition/Agriculture

    • Integrity/Availability

    • Defence/Aggression

    • Environment

      • Opinion | As Climate Emergency Worsens, Freak Storm Sends Snow, Scorpion Plague on Egypt’s Aswan

        How freakish and biblical our climate emergency could become was illustrated this week in the Upper Egyptian city of Aswan, which was struck in November by rolling lightning storms, downpours, snow, and a plague of scorpions. High winds blew the deadly Egyptian black, fat-tailed scorpions from the surrounding desert into the city and into people’s homes. The scorpions killed three persons with their venom and left hundreds sickened, as Egyptian rescue crews tried to distribute the antidote.

      • Opinion | Biden-Xi Summit Seeks to Avoid ‘Clash of the Titans’ Moment

        U.S. President Joe Biden and Chinese President Xi Jinping are expected to hold a virtual summit on Monday evening, their most high-profile meeting yet following phone calls in February and September. It comes at a moment of immense uncertainty and flux in the U.S.-China relationship, and its outcome has the potential to set the two sides on a course they will follow for the remainder of Biden’s presidency, for better or for worse.

      • Energy

        • Stately Deception: Obama at COP26

          “Collectively and individually we are still falling short,” bellowed Obama, in his signature manner. “We have not done nearly enough to address this crisis. We are going to have to do more. Whether that happens or not to a large degree is going to depend on you.”

          The crux of Obama’s speech was directed at the world’s youth, placing the burden of curtailing climate change on their shoulders. No doubt, if the planet’s young people were in charge of COP26, there wouldn’t be empty pledges and sneaky cop-outs (like the US/India/China/Russia refusing to end their coal production), there would be tangible goals, and harsh, real-world consequences for not abiding by these agreements.

        • Why China’s cryptocurrency ban is an opportunity for India?

          China’s latest blanket ban did send the [cryptocurrency] space in a tizzy for a while. But then, don’t we already know that Bitcoin and Altcoins are particularly good at ‘bouncing back’.

          Speculations and possibilities aside, China’s [cryptocurrency] crackdown in 2021 has been rather uncompromising. Despite being considered a running joke by experts, which is to fade out in time, the tough approach hasn’t been all that pleasant for the traders. With the latest announcement coming in with disparate figures, exchanges like CoinSwitch Kuber reported an almost 30 per cent fall in weekend transactions immediately after the ban was reported.

        • Karnataka Bitcoin scam: Arrested accused hacked Bitfinex exchange twice

          Meanwhile, former Karnataka chief minister and Congress leader Siddaramaiah alleged that politicians and officials were involved in a Bitcoin scam in the state. Siddaramaiah has also claimed that there was an effort to cover up the alleged scam but did not mention who the politicians were.

          However, the Karnataka government has referred ‘bitcoin scam’ to the Enforcement Directorate (ED) and Central Bureau of Investigation (CBI) because of the international nature of transactions.

    • Finance

    • AstroTurf/Lobbying/Politics

      • If You Don’t Give People a Reason to Vote, They Won’t

        Finding reasons for local or state elections in national politics won’t necessarily produce a full picture, particularly in New Jersey, where voters have the habit of electing Democratic congressional and state legislative delegations, consistently voting Democrat in presidential elections but often voting for Republican governors. This time around, particularly in the New York City mayoral race and local races in the city’s Long Island suburbs, unfounded fears of crime waves that largely existed only in the feverish imaginations of right-wing commentators seemed to have tipped more than a few votes. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Do Not Underestimate Evangelical Politicians In Latin America

        In the past two decades evangelicals in Latin America have gone from being marginalised foreign missionaries to powerful political mouthpieces. Explaining their rise as a religious phenomenon in which the lively “garage churches” of poor urban neighbourhoods displaced the theologically stick-in-the-mud Catholic church isn’t very enlightening. In quantitative terms, it seems simple enough: they’ve turned their numerical heft into political capital. But the important point is that the political arena in which they operate is neoliberalism for which, as a kind of theological superstructure or at least justification, they’ve become one of the Hydra’s many monstruous heads.

        To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Opinion | We Need to Shut Down ICE’s Mass Immigration Detention Machine

        Every day, ICE locks up over 20,000 people in a sprawling nationwide network of more than 200 detention facilities. The ACLU believes that this system of mass incarceration of immigrants should be dismantled—it’s unnecessary and inhumane. For as long as ICE maintains its detention network, though, it has a responsibility to create an oversight system that is actually effective at detecting, addressing, and deterring abuse of detained people. Our analysis of recent ICE inspection documents shows that ICE’s inspection system remains ineffective at identifying violations by detention facilities and ensuring compliance with detention standards, allowing facilities with clear records of poor conditions, including some of the deadliest facilities, such as the Stewart Detention Facility in Georgia, to evade accountability.

      • Inside Nicaragua’s 2021 elections – and the latest US/OAS coup attempt
      • Tech disputes at Rittenhouse trial not new issue for courts

        Rittenhouse’s defense, though, argued that the method used by a state investigator to enlarge the photos couldn’t be trusted to accurately show Rittenhouse’s actions.

        James Armstrong, a senior forensic imaging specialist with the Wisconsin State Crime Lab, acknowledged on the stand Thursday that enlarging an image requires the addition of pixels. But prosecutors said the software Armstrong used is widely accepted – as is the method he used to enlarge the photos.

        Software programs used to analyze video evidence provide several ways to enlarge photo or videos, based on algorithms. The attorneys’ debate over which is more accurate created a technical slog as testimony wound down this week.

    • Misinformation/Disinformation

      • WTF happened to The BMJ?

        The British Medical Journal (now The BMJ) is one of the oldest and most respected medical journals in the world that also has a history of publishing some excellent investigative journalism. For instance, over a decade ago, it was The BMJ that published investigative journalist Brian Deer’s articles recounting the strong evidence indicating that Wakefield’s case series published in The Lancet that linked the measles-mumps-rubella (MMR) vaccine to autism was based on fraud. That study launched the modern iteration of the antivaccine movement and is, as I like to say, the study that launched a thousand quackeries directed at autistic children to “cure” them of their “vaccine-induced autism.” The headline of Deer’s accompanying commentary after his account of how the “case against the MMR was fixed” even referred to Wakefield’s study as “Piltdown medicine“, after the infamous Piltdown Man fraud. 

    • Civil Rights/Policing

      • Infiltrating Amazon: What I learned going undercover at the corporate giant

        I thought this was a critical moment to stop merely reading about the abuses Amazon workers face, and to work there myself, while hiding my identity as an organizer who advocates for workers’ rights. I wanted to understand on the ground level what the work environment is like. Most importantly, I wanted to understand what kind of organization we will need to challenge and confront not only Amazon, but the entire system of just-in-time delivery and logistics, which has become central to our contemporary economy and its accompanying inequalities.

    • Monopolies

      • Copyrights

        • Piracy Release Group EVO ‘Blames’ Movie Industry For Its Popularity

          P2P release group EVO has built quite a reputation in recent years by being the first to release pirated copies of screeners and popular movies. But what drives the group to take such an immense risk? Talking to TorrentFreak, EVO says that it’s mostly fun and partly motivated by Hollywood’s profit focus.

Guest Article: Michael Larabel at Phoronix is Getting Desperate With the Daily Spam

Posted in FUD, GNU/Linux, Microsoft at 7:55 am by Guest Editorial Team

Guest post by Ryan, reprinted with permission from the original

Summary: Today, Ryan takes a look at Phoronix benchmarks that served to embolden many Microsoft-connected sites which proudly herald Vista 11 is a lot better/faster than “Linux” (we saw many such articles, citing Phoronix); the problem is, Phoronix is comparing apples to oranges (or crude code/misconfigured kernel to a final release), as people already point out in the comments, so this is misleading to say the least and it is part of a pattern which worries us

Phoronix has been a joyless cash grab for a while, but is getting worse.

Not only has Michael Larabel been posting many articles about Windows or Microsoft which aren’t GNU/Linux-related in the slightest and are not of interest to people who want genuine news, but now he resorts to just plain old shitposting.

Moments ago, he declared that Intel’s Alder Lake CPUs have a major performance issue on Linux 5.16.

What’s the problem? There is no Linux 5.16!

Linux 5.15 was released today, and in the article he mentions he tested 5.16-rc1, which no distribution is pushing to their users, and few people other than kernel developers would ever try to compile and run.

In the headline, which I won’t link to, he doesn’t mention that it’s an rc (release candidate) kernel at all. He makes it sound like the sky is falling in on a stable kernel that someone is using in production.

It’s not uncommon, or anything to be alarmed about, that a kernel at this very early stage, might have a bug like this. There’s usually 6-8 release candidates before a stable kernel series goes out, and a week or so passes between them.

Look, I hate Intel as much as anyone, but AMD got caught up in this as well, and it will be fixed before you ever see the 5.16 kernel.

In #techrights we’re starting to call him MicroLarabel because of all of the Microsoft posts.

He has no credibility anymore.

Years ago, I used to read Phoronix because it was always mildly interesting, but now I barely skim over it. This is one example of why.

Another is the Microsoft shitposting.

Another, is if you go in without an ad blocker for whatever reason, you’ll have about 1×1 of screen left and won’t be able to read it anyway.

We live in a world where the US CDC has to warn people not to put condoms in a dishwasher, so even though it goes without saying, don’t put too much faith in Phoronix.

Some people, in the comments, act like this guy is contributing to Linux with his self-serving articles that are just vehicles for ads and Microsoft puff pieces.

Microsoft GitHub Exposé — Part VI — The Media Has Mischaracterised Nat Friedman’s Departure (Effective Now)

Posted in Deception, Microsoft at 7:14 am by Dr. Roy Schestowitz

Series parts:

  1. Microsoft GitHub Exposé — Part I — Inside a Den of Corruption and Misogynists
  2. Microsoft GitHub Exposé — Part II — The Campaign Against GPL Compliance and War on Copyleft Enforcement
  3. Microsoft GitHub Exposé — Part III — A Story of Plagiarism and Likely Securities Fraud
  4. Microsoft GitHub Exposé — Part IV — Mr. MobileCoin: From Mono to Plagiarism… and to Unprecedented GPL Violations at GitHub (Microsoft)
  5. Microsoft GitHub Exposé — Part V — Why Nat Friedman is Leaving GitHub
  6. YOU ARE HERE ☞ The Media Has Mischaracterised Nat Friedman’s Departure (Effective Now)

GitHub: Where everything comes to die

Summary: We take another detour to discuss the poor state of journalism, which is mostly amplifying self-serving statements from corporations, without ever bothering to properly investigate the facts

BY THIS point we were hoping to already deal with corruption and misconduct, but two weeks ago Nat Friedman announced his impending “departure” as CEO (he had gotten the boot).

We think it’s extremely important to get the facts right, seeing media revisionism such as this. Not only Microsoft sites did this; even some Microsoft-funded sites did the same, contributing to revisionism.

The Register says “Nat Friedman to quit this month,” but he was compelled to leave, he did not quit. Techrights will show why… just be patient as this series will last months, not days/weeks. We have plenty of material.

On balance, The Register has become more harm than good, or more nonsense than information, especially on topics like Microsoft. Too much influence from Microsoft operatives (such as Microsoft Tim), which is likely related to why the founder of The Register left. He left in protest over the direction which the site had taken. Most mentions of Microsoft in The Register this past week can be described as brand boosting*, no matter what the context may be. At the same time they mostly ignore the biggest Microsoft scandals and crime.

Microsoft loves to take over publishers. It is very important if not imperative to understand what happened to The Register because Microsoft does the same to other publishers, sometimes through Bill Gates with his bribes disguised as “donations”.

The Register is not yet as bad as ZDNet, but gradually it is getting there… much like Slashdot over a decade ago.

In Microsoft’s own words [PDF]: “Mind Control: To control mental output you have to control mental input. Take control of the channels by which developers receive information, then they can only think about the things you tell them. Thus, you control mindshare!”

Of course The Register wasn’t alone in perpetuating Microsoft’s face-saving narrative (which gives Friedman a chance of finding a job elsewhere); for instance, SPAMnil’s site (propped up by the Linux Foundation for PR SPAM) repeats Microsoft’s narrative: “Nat Friedman Steps Down As GitHub CEO”…

But real journalists should actually investigate (e.g. interview people) and know he was pushed out. Then, they should find out why and report on it. As we shall show later in the series, the so-called ‘tech’ media silenced/gagged/chose to gaslight women; that media basically protected abusive men from negative coverage… at a later stage/part of the series we’ll name the sites that did this.

When the “media” isn’t about journalism and isn’t employing actual journalists but a bunch of Microsoft mouthpieces and hacks (like SPAMnil, who lies for Microsoft) truth itself becomes “weird” and “contradictory”, whereas PR seems “legit”. Suddenly the actual facts get labeled a “conspiracy theory” and relegated/censored. Likewise, women who suffer abuse are portrayed as the aggressors and those who oppressed them are defended by sexist companies like Microsoft.

Thankfully, however, many people read our series because they want facts, not Microsoft’s face-saving PR… in service of the financial agenda of GitHub.

“GitHub (Microsoft) wants us to think that everything is fine now and women are safe because Friedman is out (they got rid of this awful CEO, but that’s not enough), yet GitHub is still not getting rid of the ICE contract.”It’s Nat Friedman’s last day today, or contrariwise the first day of another CEO (he said “I am excited to announce that effective November 15th [...] GitHub’s Chief Product Officer, will become CEO and I will become Chairman Emeritus.”), but don’t worry, Mr. Friedman. We know what you did last summer and we have evidence.

GitHub (Microsoft) wants us to think that everything is fine now and women are safe because Friedman is out (they got rid of this awful CEO, but that’s not enough), yet GitHub is still not getting rid of the ICE contract. Forcibly sterilising women? Fine! “Please stay with us while we participate in human rights abuses” is their implicit message. Back in the days they googlebombed the media with “Arctic Vault” to distract from what they had done for ICE. GitHub also bombarded the media with a bunch of fluff when its employees defended insurrection and fired opponents of the January 6th insurrection.

In the next part we’ll get back to our normal publication schedule in this series.
* To give two recent examples, here’s The Register promoting a misleading narrative which strangely enough omits the mention of Microsoft and Windows. It is a serious incident exclusive to Windows, but you would not know this is you read The Register. It generally ‘feels’ (we did not count, but we did an exhaustive survey of this past week’s headlines) like 20% of ‘articles’ in The Register are about Microsoft and the majority of these can be classified as “spammy” PR.

Pushing Back Towards ‘Libre’ (Freedom), Partly as an Act of Defiance/Resistance Against a World Wide Web Which Gravitates Towards Endless Spying and DRM

Posted in Free/Libre Software at 5:17 am by Dr. Roy Schestowitz

Video download link | md5sum 9a68c168749c81610ddd2e7f65d47836

Summary: There are opportunities for principled revolt on the Web, thanks to a bunch of clones and forks seeking to undo the disturbing trends of “mainstream” Web browsers, which have also become the base or a template of lesser-known browsers (so monoculture around Chromium in particular remains a serious problem)

THE WEB is getting worse, not better, over time. Despite a lot of talk (no walk) from surveillance companies such as Facebook, Microsoft, Google and so on, privacy is further eroded. Politicians are failing to keep up and their privacy legislation is barely enforced; meanwhile the Web is being ‘extended’ — almost always in a negative direction (except from the point of view of corporate interests and shareholders).

“The media won’t help as we know whose pockets it is in.”So what we be done? Well, the Web as a whole may be too late to repair; it’s a lost cause so Gemini gives us hope (it’s probably the most advanced in the ‘small Internet’ at the moment) and for things that still strictly require the Web (as in Web sites), assuming we reject Google’s codebase, there are some Firefox alternatives, the latest of which is LibreWolf (focused on privacy/liberty). It’s unrealistic, not just idealistic, to foretell a post-Web era. It might take another decade or more, but we need to push in the right direction. The media won’t help as we know whose pockets it is in.

IRC Proceedings: Sunday, November 14, 2021

Posted in IRC Logs at 2:28 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmUqPDoKy5n93Mx7f5AbmE8nMvtFc9cytyTFjdgxynZooE IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmWyBPqZHXBe4cdgNDKjFMUwAAXfJJ9B366cJ5LkMfQ9bv IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmRNjNqcUqUtyhBXGDwRgzqCwup6nMrhg2bZzHWyC73MrQ IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVx4stjWnykqvhvEG8WuWvUHsx3RFR7s5UGKcjsm3nGkX IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmPXyTWGHHqToLhBDArGzAc7gas7Rp3fnwUuVT8JbGs4Rn IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmUXZgV4TDyaACoA8DnPPfCiQftcxHSotB2DScCrEJwaF3 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmUURFB4ZGty9hztTCmm6mjNuJBsEMNxd1iogPRmZZXdyG IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmaLxsGBstW7wJ4imehz7BqPtYm5HJDLqcACq9oEjR9dgP IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): Qmak6N1wRPKAPf9DxMtCC9P4rZVS2rKi58Zcinr7iLRtd5

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts