09.06.22

The New Content Management System (CMS) in Action, Even in Geminispace

Posted in Site News at 5:12 pm by Dr. Roy Schestowitz

Video download link | md5sum 6a080090aff9befcce699b1c974656da
Lagrange in New Tux Machines
Creative Commons Attribution-No Derivative Works 4.0

Summary: Tux Machines is ready to roll in HTTP/S and in Gemini; here’s how Lagrange accesses news and code

TODAY in Tux Machines we had about 70 new pages and updates. We’ve also pushed an image uploader to Git, which means we’re one small step away from feature parity compared to what we had in Drupal. We’re implementing our own CMS with Bash and Perl.

“We’re implementing our own CMS with Bash and Perl.”One thing that Tux Machines readers aren’t so familiar with is Gemini. Well, Gemini is a relatively new protocol, so not many people heard of it. The above video shows how it’s used to browse pages, feeds (Atom), and the Git repository of Tux Machines.

Techrights will be next to adopt this CMS, probably some time in winter.

Dear KDE, Please Don’t Become Another GNOME

Posted in GNU/Linux, KDE at 4:59 pm by Dr. Roy Schestowitz

Video download link | md5sum 2d32b4df0b6b874da5ee9bc90e2eddfe
KDE Neon and Latest of Plasma
Creative Commons Attribution-No Derivative Works 4.0

Summary: Judging by what I’m seeing this week in KDE Neon (a sort of testbed or workbench for KDE development), there’s an overhaul in the window- and application-specific settings/customisations; it does not appear to prioritise functionality but supposed simplicity

THIS week I decided that, following an update and reboot of KDE Neon, I’d re-configure some applications to behave in a unique way, but I was greeted by a new and unfamiliar GUI. Not only did it not work as expected; I did not find it intuitive and it resulted in several crashes.

“KDE is for advanced users, but it’s also suitable for rookies and novices.”I totally know what KDE Neon is and recognise what it’s for. I knew it when I installed it, so my complaint isn’t about stability. It’s the interface, which at the moment seems half-baked (semi-cooked) and in no way resembles what KDE3, KDE4 and KDE5 have had. It’s looking like an attempt to over-simplify things or copy GNOME, which in turn tries to imitate some stuff from Apple.

KDE is for advanced users, but it’s also suitable for rookies and novices. Quite a few people in my family use KDE, and they use it out of choice. Gone are the days of KDE being just “by developers, for developers”, but some of these recent changes (in a test distro, KDE Neon) seems not to work, not be made intuitive enough, and feel like work in progress. The video above explains more.

Links 06/09/2022: KDE Plasma 5.25.5 and YaST Development Report

Posted in News Roundup at 1:46 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Applications

      • Make Use OfThe 5 Best Linux IRC Clients Still Worth Using in 2022

        While it’s certainly past its prime, IRC is still alive and kicking today. Here are some of the best open-source and free IRC clients for Linux.

        Despite being overshadowed by other forms of social media, there are people who still use IRC. It’s been one of the most resilient forms of conversation in the history of online communication, and while it’s certainly past its prime, IRC is still alive and kicking today. It’s so alive that dozens of clients are still being actively developed.

        Here are some of the best Linux IRC clients to choose from today.

      • MakeTech Easier7 Best Apps to View Disk Usage in Linux

        Linux desktops has a lot of utilities to view disk usage. These utilities gives us information on what programs or files uses large chunk of our disk space. Here we will show you some of the best apps for you to view disk usage in Linux.

        [...]

        Disk usage analyzer or Baobab is a GUI tool comes preinstalled with many popular Linux distributions. If you are using Gnome desktop environment, then Baobab is already preinstalled in your system.

        In addition to local disk usage, disk usage analyzer can also view remote disks mounted in your system. You can see the disk usage in a very intuitive spherical graph.

        [...]

        The most popular option to work with disks in Linux is gnome-disk-utility. You can use this to not only view all the disks, but also format, change filesystems and make encrypted disks.

        Alternatively, you can also view disks connected with your device using the file manager application. Open your file manager and click on the other location tab at the bottom to see all the disks connected with your device.

    • Instructionals/Technical

      • H2S MediaHow to install Thinkorswim on Ubuntu 22.04 LTS Linux

        Thinkorswim was launched in 1999 as an options brokerage platform. However, later it was acquired by TD Ameritrade, although Thinkorswim’s brokerage services were shut down, the trading platform is still active and distributed by TD Ameritrade for its clients. Besides the trading feature, Thinkorswim users also have access to trading and analysis tools, online courses, etc.

        Unlike TradingView which can be linked to the trading accounts of many different brokers, Thinkorswim is only used by TD Ameritrade clients.

        Thinkorswim allows users to freely set alerts based on parameters of technical indicators and price movements. Meanwhile, TradingView allows users to receive only 12 different alert conditions. However

      • UNIX CopHow to install LibreCad on Ubuntu 22.04 | Linux Mint 21

        In this post, you will learn how to install LibreCad on Ubuntu 22.04 | Linux Mint 21.

        [...]

        One of the main advantages of LibreCad is that it is free and therefore is used in educational or professional environments.

        It’s available in over 30 languages with cross-platform support for macOS, Windows, and Linux. So many people worldwide can use it without too many problems.

        With LibreCAD you can do many designs and all with a robust, open-source platform.

      • Julia EvansHow to send raw network packets in Python with tun/tap

        Recently I’ve been working on a project where I implement a bunch of tiny toy working versions of computer networking protocols in Python without using any libraries, as a way to explain how computer networking works.

        I’m still working on writing up that project, but today I wanted to talk about how to do the very first step: sending network packets in Python.

        In this post we’re going to send a SYN packet (the first packet in a TCP connection) from a tiny Python program, and get a reply from example.com. All the code from this post is in this gist.

      • ZDNetHow to run websites as apps with ease in Linux | ZDNET

        Most of what we do happens from within a web browser. However, that doesn’t mean we want every single page we use to run as yet another tab. If you’re like me, those tabs can add up. And if you’re not using a browser with a solid tab management feature (such as Opera’s Workspaces – which is the best tab manager, hands down), those tabs can very quickly become overwhelming.

      • Laptop refreshment

        This resulotion is 1920*x , the scaling seems very small for me with 12 inch. So I decided to adjust it. I was using libinput drivers for the trackpad. But It was horrible for thinkpad trackpad. So I decided to move back to synaptics.

      • TechRepublicHow to install Docker on ChromeOS | TechRepublic

        Jack Wallen shows you how to install Docker on your Chromebook so you can start developing containers on the go.

      • TechRepublicHow to install the macOS Homebrew package manager on Linux | TechRepublic

        Homebrew is a command line package manager for macOS that is similar to apt-get or dnf. Homebrew makes installing over 5,000 applications from the command line very simple. Some of the tools found in Homebrew aren’t available to any of the default Linux package managers and some packages found in the apt and yum repositories aren’t exactly well maintained.

      • VideoHow to install BigLinux 2022.08.29 – Invidious

        In this video, I am going to show how to install BigLinux 2022.08.29

      • H2S MediaHow To Install Consul by HashiCorp on Ubuntu 20.04 LTS

        Consul is an open-source multi-networking tool that offers a fully-featured service mesh solution that solves the networking and security challenges of operating microservices and cloud infrastructure (multi-cloud and hybrid cloud).

        Consul manages services and nodes in the form of a “directory service”, i.e. in the form of what runs where? Access is via DNS or HTTP(s). Consul operates in either Server or Agent mode. The servers store the data, if several are used, the data is automatically synchronized.

        The data can be accessed directly on the servers via DNS or HTTP(s) or via the required agent anyway. Any node or host logs on to Consul via the agent and is registered as a node. Services can also be registered. A web server, for example, registers as a new cluster member to an existing service. In addition, tags can also be set, which then display themselves as aliases via DNS query.

      • Red Hat OfficialHow to use Satellite 6.11 for bulk Convert2RHEL operations

        Convert2RHEL is a Red Hat utility that converts operating systems that are similar to or derived from Red Hat Enterprise Linux (RHEL), such as CentOS Linux and Oracle Linux. For a full list of supported operating systems, please read this document. For more information, read Terry Bowling’s blog entries here and here on Oracle Linux.

      • ID RootHow To Install Opera Browser on Fedora 36 – idroot

        In this tutorial, we will show you how to install Opera Browser on Fedora 36. For those of you who didn’t know, Opera is one of the most popular and widely used web browsers globally, developed by Opera Software. The browser is based on Chromium but distinguishes itself from other Chromium-based browsers through its user interface and other features such as battery-saving and built-in VPN.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Opera Browser on a Fedora 36.

      • Linux.orgVirtualBox Explored (Part 1) | Linux.org

        Many people that use VirtualBox, at some point come across a problem they have not encountered before.

        In this article, I want to cover as many issues that may arise and how to fix them. This may be hum drum to some, but I’m sure there may be some tidbits in here that can be useful. The first part of the article is more basic than the second part.

      • TechRepublicHow to cluster Webmin 2.0 for easier data center administration | TechRepublic

        How many Linux servers do you administer? Chances are pretty good you’re working with considerably more servers running the open-source operating system than ever before. That can be a time-consuming task when you have to SSH into each server and run your daily admin tasks.

      • TechRepublicHow to upgrade Rocky Linux from 8.5 to 9 using the CLI | TechRepublic

        Rocky Linux has quickly become a darling of the open source industry, poised to help users and admins alike totally forget that CentOS ever lived on their servers and data centers. Rocky Linux is as fine a server OS as you’ll ever use and has all but been guaranteed that it will never go away.

        But, like all operating systems, you’re going to need to upgrade. Why? Security patches, bug fixes and new features. I realize many admins are hesitant to migrate their production servers from one release to another and that’s an understandable proposition. After all, everything is working to perfection, so why would you want to risk it? As with any operating system, with major updates come major features.

      • Borg corrupted hints file

        I’ve been using Borg backup for a couple of years and it has seemingly worked very well for me. One difference I really appreciate from my previous arrangement (rdiff-backup) is the freedom to move large files or file hierarchies around (including between different filesystems) without provoking large backup incrementals.

      • ID RootHow To Install NVM on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install NVM on Ubuntu 22.04 LTS. For those of you who didn’t know, NVM is a Node Version Manager tool. Using the NVM utility, you can install multiple node.js versions on a single system. Its works on any POSIX-compliant shell (sh, dash, ksh, zsh, bash), in particular on these platforms Linux, macOS, and Windows WSL.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the NVM (Node Version Manager) on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Linux HintLinux PAM Tutorial

        Linux-PAM is a rich collection of shared modules that interactively authenticate a user to programs (or services) in a Linux system. Linux-PAM is an acronym for Pluggable Authentication Modules, which developed from the Unix-PAM design. It combines numerous low-level authentication modules with a high-level API to provide dynamic authentication for apps. Despite the underlying authentication scheme, this enables developers to create applications that require authentication. Linux-PAM (also known as “PAM”) is frequently supported by default in contemporary Linux variants.

        The most crucial thing for a system administrator to understand is how PAM configuration files provide the link between services and PAMs that carry out the actual authentication activities. You don’t need to comprehend PAM’s inner workings. PAM could significantly alter your Linux system’s security. Incorrect settings may fully or partially prohibit access to your machine.

      • Ubuntu HandbookHow to Install LXQt 1.1.0 in (L)Ubuntu 22.04 via PPA | UbuntuHandbook

        This simple tutorial shows how to install the latest LXQt desktop 1.1.0 in (L)Ubuntu 22.04 via its official PPA.

        The light LXQt desktop environment has reached version 1.1.0 for a few months, which LUbuntu 22.04 ships the 0.17 version by default.

      • Linux HintGIT Compare Two Branches

        Git is the most popular version control system. Many developers and teams use Git for their activities. One common practice when working with Git is to create branches that help create a separate working environment. With branches, you can mess around with things without affecting the other sections of the code, and at long last, you can compare your branches and then merge them. The question is, “how do you compare two branches using Git?”

      • TechRepublicHow to deploy the Malcolm network traffic analysis tool with Ubuntu Server 22.04 | TechRepublic

        Malcolm is an open-source network traffic analysis tool that uses a framework of tools to create a robust analysis tool for network admins. Malcolm accepts network traffic data in the form of PCAP (full packet capture) files and Zeek logs.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • 9to5LinuxKDE Plasma 5.25.5 Is Out as the Last Update in the Series, Improves Multi-Monitor Support

          Arriving a month after KDE Plasma 5.25.4, the KDE Plasma 5.25.5 point release is here to address more significant bugs and regressions, such as the major regression in multi-monitor support for the Plasma Wayland session that could cause screens to not display the output.

          Also in the Plasma Wayland session, KDE Plasma 5.25.5 fixes a KWin crash that occurred when dragging an attachment from the Mozilla Thunderbird email client and improves support for some apps like the GIMP image editor to no longer fail to appear in the Task Manager when it’s opened.

  • Distributions and Operating Systems

    • SUSE/OpenSUSE

      • YaST Development Report – Chapter 8 of 2022 | YaST

        Time for another development report from the YaST Team including, as usual, much more than only YaST.

        [...]

        Over the last year or so, we got some reports about the graphical interface of YaST presenting rendering issues, specially on HiDPI displays and on openQA. The reporters provided screenshots that showed how some widgets were apparently drawn on top of the previous ones without an intermediate cleanup, so the screen ended up displaying a mixture of old and new widgets that were very hard to read.

        We were unable to reproduce the problem and we tried to involve people from different areas (like graphic drivers maintainers, virtualization experts or X11 developers) to track the problem down with no luck… until now! We finally found where the bug was hiding and hunted it down.

        See the pull request that fixes the issue if you are interested in a technical description including faulty HiDPI detection, unexpected Qt behavior and QSS style sheets oddities. It also includes a screenshot of the described (and now fixed) problem.

      • SUSE’s Corporate BlogSUSE BYOS Images and the AWS Marketplace | SUSE Communities

        Recently we have had a run on Bring Your Own Subscription (BYOS) topics in the cloud, here is another.

    • Fedora Family / IBM

      • CentOSHow updates work in CentOS [Ed: IBM views CentOS as little but an upselling strategy for RHEL]

        Fedora is where day-to-day development and innovation happens. Fedora Linux releases every 6 months and each release is maintained for about 13 months. Major changes should be (and almost always are) deployed in Fedora first, following the Change process. Fedora packages sources are maintained in dist-git and built in Fedora Koji.

        At the beginning of the development cycle of a new CentOS major release (meaning, 9, 10, etc.), Fedora is branched into the new distribution. Historically, this is done from the current stable Fedora release at the branching time (e.g. Fedora 34 for CentOS Stream 9). After the distribution is branched, the development cycle for the new CentOS Stream release begins.

        Nowawadys, Fedora ELN helps prepare for the branching process by continuously rebuilding Rawhide (the development version of Fedora). This provides a view into what a new CentOS Stream could look like if it were branched from Fedora today, and ensures that the spec file logic stays compatible with the future set of EL macros and build flags at any given point in time.

      • GSoC Post 2: FlatpakKCM Update 2

        My previous post in this series tracked what I had done until the 5th week, and gave some information on the technical aspects of the project. This post covers the work done since.

        [...]

        The KCM didn’t actually work like a KCM because changing a permission on the interface would instantly change the permission in the overrides file as well, instead of sending it to a “waiting” area until the user hits “Apply” button. Similarly, the “Default” and “Reset” buttons did nothing.

        Most KCMs use a KConfig file, instead of an overrides file like being used here, to store the settings. This caused me to stall for a while since I wasn’t sure how to proceed, but after my mentors referred me to the tablets KCM, work picked up again and I proceeded to implementing the 3 buttons.

    • Debian Family

      • Debian on Phone – Experiences in the community

        Now because I was not there so my understanding and knowledge would be disadvantageously asymmetrical to Guido and others who were there and could talk and share more. Having a Debian mobile or Debian on the mobile could also make Debian more popular and connectable to the masses, one of the things that were not pointed out in the Debian India BOF sadly. At the same time, there are some facts that are not on the table and hence not thought about.

        [...]

        FWIW, while I do have GNOME and do use a couple of tools from the GNOME stack, I hate GNOME with a passion. I have been a mate user for almost a decade now and really love the simplicity that mate has vis-a-vis GNOME. And with each release, MATE has only become better. So, it would be nice if we can have MATE on the mobile phone. How ‘adaptive’ the apps might be on the smaller area, I dunno. It would be interesting to find out if and how people are looking at debugging memory leaks on mobile phones. Although finding memory leaks on any platform is good, finding them and fixing them on a mobile phone is pretty much critical as most phones have fixed & relatively small amounts of memory and it is and can get quickly exhausted.

        One of the things that were asked in the Q&A was about payments. The interesting thing is both UK and India are the same or markedly similar in regard as far as contactless payments being concerned. What most Indians have or use is basically UPI which is basically backed by your bank. Unlike in some other countries where you have a selection of wallets and even temporary/permanent virtual accounts whereby you can minimize your risks in case your mobile gets stolen or something, here we don’t have that. There are three digital wallets that I know – Paytm – Not used (have heard it’s creepy, but don’t really know), Google pay (Unfortunately, this is the one I use, they bought multiple features, and in the last couple of years have really taken the game away from Paytm but also creepy.). The last one is Samsung Pay (haven’t really used it as their find my phone app. always crashes, dunno how it is supposed to work.) But I do find that the apps. are vulnerable. Every day there is some or other news of fraud happening. Previously, only States like Bihar and Jharkhand used to be infamous for cybercrime as a hub, but now even States like Andhra Pradesh have joined and surpassed them :(. People have lost lakhs and crores, this is just a few days back. Some more info. on UPI can be found here and GitHub has a few implementation examples that anybody could look at and run away with it.

    • Canonical/Ubuntu Family

      • TechRepublicUbuntu 22.10 offers subtle changes to an already outstanding platform

        Ah, the impending smell of autumn. The crunch of leaves, the smell of pumpkin spice everything… and a new release of Ubuntu. ‘Tis the season for the .10 release of Canonical’s flagship operating system, and this time around, the name is Kinetic Kudu. On Sept. 29, 2022, the new release will be available to the masses, and although it doesn’t offer up a single feature that will blow anyone away, it does have a few nice tricks up its sleeve that are sure to please longtime fans.

      • Linux MagazineUbuntu 20.04.5 LTS Release Now Available – Linux Magazine

        The latest point release of the Ubuntu 20.04 LTS distribution is now available and sports kernel 5.15.

        As you might expect, there’s another point release available for the LTS version of Ubuntu. Although this update doesn’t include much in the way of new features, it does offer plenty of bug fixes, security patches, app updates, and kernel 5.15.

        If you’re already using Ubuntu 20.04, you can get the .5 release by way of the built-in upgrade system, which means there’s no need to do a fresh install.

        One thing to keep in mind is that 20.04 is not the latest LTS release for Canonical’s flagship operating system. That title would belong to 22.04. However, since there are still a large number of users still working with 20.04 (and since it is still supported until April 2025), Canonical continues to push upgrades.

    • Open Hardware/Modding

      • ArduinoMass scale with the new Arduino Cloud CLI [Ed: Arduino outsourced its 'Clown' CLI to a proprietary prison controlled by Microsoft/NSA (GithHub). Very poor decision.]

        The Arduino IoT Cloud enables makers, IoT enthusiasts and professionals to build easily connected projects based on a wide range of Arduino, ESP32 and ESP8266 boards.

        Following Arduino’s vision, it has been carefully designed to provide the most user-friendly and intuitive experience, abstracting the complex tasks that create barriers for users who are not familiar with coding.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • CollaboraOpen source machine learning at IBC 2022

      Returning for a long awaited reunion, IBC is back at the RAI in Amsterdam! The content and technology community will connect at this 4 day event, starting September 9, to gain the latest insights on empowering content. Collabora will be present to take part and share in this exciting edition for 2022. If you are planning on attending, please make sure to add booth F57 in Hall 5 to your itinerary & come say hello!

    • Web Browsers

      • Mozilla

        • Using VS Code for merges in Mercurial [Ed: Mozilla praises and promotes Microsoft's proprietary software (which also spies)]
        • MozillaThe Tech Talk [Ed: Mozilla is nowadays committed to Web censorship in the name of "protecting children" from "misinformation" (like politics that Mozilla managers don't like)]

          The internet is a great place for families. It gives us new opportunities to discover the world, connect with others and just generally make our lives easier and more colorful.

        • Firefox Nightly: These Weeks In Firefox: Issue 122
    • SaaS/Back End/Databases

      • The Register UKWhy open source databases have achieved dominance • The Register

        For developers, there is no debate. The future of the database is open source. A glance at the 2022 Stack Overflow survey of around 70,000 code-wranglers shows nearly all pros use one of the two leading open source RDBMSes, PostgreSQL (46.5 percent) or MySQL (45.7 percent), although they use other systems as well.

        Oracle, which built a global software empire starting with an RDBMS, is only used by about 12 percent of developers, while Db2, the IBM data workhorse used by banks and global retailers, is only used by 2 percent.

        There is no question that the leading edge is open source – the people who build new systems are making it so by their choice. The question is why they are achieving dominance among devs.

        Peter Zaitsev, CEO of database consultancy Percona, was an early employee of MySQL AB under the leadership of original open source database author Michael “Monty” Widenius. To Zaitsev, it is a question of economics in the startup scene of the early Noughties.

        “If you look at Oracle and Db2, they can be very, very expensive systems. In the early 2000s, just after the dotcom era, the new generation of startups, starved of capital, needed but could not afford Oracle, Db2 or SQL Server,” he says.

    • Productivity Software/LibreOffice/Calligra

      • Crash fixes for LibreOffice, part 1: segfaults – LibreOffice Development Blog

        One of the bugs that we see in computer programs including LibreOffice is the crash. You’re working with the application, and suddenly the program is suddenly closed! Here we discuss the usual causes for these crashes, and how to fix some of them.

      • LibreOffice QA/Dev Report: August 2022

        LibreOffice 7.4.0 was released on August 18

        Rafael Lima added documentation in Help for the new method Normalize in ScriptForge FileSystem and made the Templates dialog work better with HiDPI displays

        Olivier Hallot (TDF) made some smaller fixes and cleanups in Help

    • Content Management Systems (CMS)

      • Kiwi TCMS 11.5

        This is a small release which contains several improvements, bug fixes and new translations!

    • GNU Projects

      • Taler“Zero-Knowledge Age Restriction for GNU Taler”

        We propose a design for a privacy-friendly method of age restriction in e-commerce that is aligned with the principle of subsidiarity. The design is presented as an extension of a privacy-friendly payment protocol with a zero-knowledge scheme that cryprographically augments coins for this purpose. Our scheme enables buyers to prove to be of sufficient age for a particular transaction without disclosing it. Our modification preserves the privacy and security properties of the payment system such as the anonymity of minors as buyers as well as unlinkability of transactions. We show how our scheme can be instantiated with ECDSA as well with a variant of EdDSA, respectively, and how it can be integrated with the GNU Taler payment system. We provide formal proofs and implementation of our proposal. Key performance measurements for various CPU architectures and implementations are presented.

    • Programming/Development

      • A story of binary search and bezier curves :: Shidao’s blog

        For my GSoC project, I wanted to find the intersecting point of two arbitrary bezier curves. There are some existing algorithms for this purpose, but since it can be interesting, I decided to try to find one algorithm myself. I did some not successful research on finding it, here’s the story and what I learned.

        The bezier curves in Krita are 2 variable cubic equations, so naturally, I thought of finding the intersecting point by solving the equations of the two curves. I wrote down the equation, type them into Wolfram Mathematica and hoped MMA to give me a result. There must be some performance regression between MMA 11 and MMA 13. The MMA 13 I’m using stuck there and never gave any result. I had to ask my friend who’s still on MMA 11 to calculate it.

        Yes, though I have more or less thought that the general solution of the equation would be complicated, however, when I saw my friend sending me a 1.1M picture of the result, I knew the actual result was way wilder than I expected. (You may view this picture on a new page to see how big it is.)

      • GNUGNU C Language Intro and Reference Manual

        This is to announce release of the GNU C Language Intro and Reference
        Manual. See https://savannah.gnu.org/git/?group=c-intro-and-ref.

        This manual is intended for learning the C language, if you know how
        to program in some other language. It is also a reference manual for
        GNU C.

      • VideoFriendship with iostream ENDED fmt is my best friend now! – Invidious

        The fmt library is an awesome C++ library for printing and formatting text. I highly recommend using it in your projects. For more information about this library and to read the documentation

  • Leftovers

    • Pseudo-Open Source

      • Openwashing/Microsoft Pushers

        • OSI BlogEpisode 4: Building creative restrictions to curb AI abuse [Ed: OSI is at it again, and some people promote Microsoft’s proprietary software at the expense of better stuff that’s Free/libre; OSI’s podcasts are still full of Microsofters and Microsoft talking points; OSI has been thoroughly corrupted since taking bribes from Microsoft; it nowadays promotes proprietary lock-in and abets GPL violations. OSI is so incredibly corrupt that just like insecure despots it’s working to censor critics and even works to deplatform critics]

          He’s conducted his research at Intel Labs, Microsoft and NASA’s Jet Propulsion Laboratory.

        • TechRepublicHow to deploy a Docker Container with VS Code [Ed: Jack Wallen helps Microsoft spread that lie that "VS Code is one of the most popular open-source IDEs" when it is in fact proprietary software and spyware (many reject it; popularity as a self-fulfilling prophecy/PR tactic?); ZDNet and this sister site are paid by Microsoft to keep pushing such lies. Jack Wallen used to write for Linux.com before Jim Zemlin and other Microsoft charlatans sacked him.]
    • Security

      • Open Source Security (Audio Show)Why has software supply chain security exploded? – Open Source Security [Ed: SBOM is not a solution but a product pushed by FOSS-hostile entities through imposters at the 'Linux' Foundation]

        I take a bike ride every morning, it’s a nice way to think about topics of the day. I’ve been wondering lately why software supply chain security has exploded in popularity in the last year or so. Nothing happens by accident, so there must be some series of events we can point at that has led to everyone suddenly making this a priority. Software supply chain security is not new, I’ve been doing it since about 2002 when I was helping track and coordinate security vulnerabilities in Linux distributions. We didn’t call it a supply chain back then, and nobody really paid attention to it. So what changed between then and now?

      • Dark ReadingDefenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration [Ed: Conflating attacks with actual compromise. Typical Microsoft nonsense.]
      • CISACISA Releases Five Industrial Control Systems Advisories | CISA [Ed: Some of these are CISAWindows issues, but CISA goes out of its way not to name the culprit]

        CISA has released five Industrial Control Systems (ICS) advisories on September 06, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • USCERT#StopRansomware: Vice Society [Ed: Stop using Microsoft Windows; Windows is the king of ransomware.]

        CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint Cybersecurity Advisory (CSA), #StopRansomware: Vice Society, to disseminate tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with Vice Society actors identified through FBI investigations as recently as September 2022.

    • Civil Rights/Policing

      • Internet Freedom FoundationSC directs States to take action against pending 66A cases

        The Supreme Court (SC) heard the People’s Union of Civil Liberties’ (PUCL) Application seeking directions to ensure that authorities do not prosecute individuals under S.66A of the Information Technology Act, 2000 (IT Act, 2000), considering the SC has struck down S.66A as unconstitutional in Shreya Singhal v Union of India & Ors., (2015) 5 SCC 1. Since the last date of hearing, 12 High Courts, 10 States and 1 Union Territory (UT) replied to the Application and several of them admitted that S. 66A cases were still pending in their jurisdiction. Today, after hearing submissions from counsels, SC directed Advocate Zoheb Hossain, the counsel for the Union of India, to write to States where S.66A cases are pending, on behalf of the Supreme Court of India, and impress upon them the need to take remedial measures. Senior Advocate Sanjay Parikh represented PUCL and IFF provided legal assistance.

      • Linux HandbookLHB Linux Digest #22.10: Linux Server Security, Know Your System and More

        Unfortunately, I’ll have to start this month’s newsletter with sad news. The co-creator of Let’s Encrypt, Peter Eckersley, lost his battle with cancer at the age of 43. He was also the director of computer science at the Electronic Frontier Foundation and has worked on Certbot, Privacy Badger, HTTPS Everywhere and many other privacy-related projects. RIP, Peter.

  • Gemini* and Gopher

    • Personal

      • Confusion on Interacting

        This is a community of writers, I can tell. While I would like to say that I am a writer as well, admittedly, I write a lot faster than most. I started writing when I started roleplaying, and I’ve gotten in the habit of quickly writing things down then eagerly awaiting responses. That can be alright, in an environment such as that, but here everyone types elegantly and verbosely, and I feel a bit out of place. I can write detailed and powerful, but I just don’t always do that, always aiming for a weird combination of humor and seriousness when writing.

      • Re: Confusion on Interacting

        To answer your question impulse, I think you should write whatever you feel like writing, be it short or long.

        I get your apprehension though. I definitely felt overwhelmed by all the technical posts here initially. I know considerably less than most people on here about programming and general tech stuff, so I felt a bit out of place when it came to the drivel I personally felt like writing.

        [...]

        For me the draw of Gemini is in it’s ease of use and the fact that you’re free to write long or short pieces.

      • BENOSWY Wordo: POOLS

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

In At Least 10 Countries Already Windows’ Market Share is Measured at Under 10% (Even Among Large Populations or Countries Like Turkey)

Posted in GNU/Linux, Microsoft, Windows at 10:45 am by Dr. Roy Schestowitz

Turkey this month (and also thus far this year) on desktops/laptops alone:

Turkey 2022 OS share
Notice the very sharp rate of decreases, with Windows falling from almost 90% to less than 70% in a matter of 8 months

When mobile devices too get counted:

Turkey OS share

And it’s not just Turkey:

August Android share
See the underlying data as OpenDocument Format (ODF)

Summary: Microsoft Windows is not as mighty and important as Microsoft wants us to think and is paying the media to tell us; as Edward Snowden pointed out, as did others last week, people move to mobile (where Linux already dominates though it does not mean freedom); the trend in Africa is fascinating to say the least

Links 06/09/2022: Gawk 5.2.0 and KPhotoAlbum 5.9.1

Posted in News Roundup at 7:33 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Its FOSSAdvantages and Disadvantages of Using Linux

      Basically, Linux is everywhere and everyone keeps talking about it. And that gives you FOMO.

      So, you wonder about the advantages of Linux and whether is it really worth trying.

      I have compiled various possible advantages and disadvantages of Linux in this article.

      If you are on the fence about choosing Linux over your preferred operating system, we would like to help you out.

    • Applications

      • Trend Oceansnnn: A Linux Terminal File Manager To Reduce Your Terminal Navigational Stress – TREND OCEANS

        Throw your desktop environment and start using the terminal app for your daily routine. Sounds easy! Those who did this can easily relate to the pain of navigating to the different directories using the cd command.

        For instance, you may ignore the stress of navigating to different directories from the terminal. However, over time, this hidden stress will exhaust your mental power, which will reduce your productivity.

        To tackle the pain of navigation and increase your productivity on the terminal can be easily achieved using the nnn terminal-based file browser.

    • Instructionals/Technical

      • RoseHostingHow to Install Tomcat on Ubuntu 22.04 – RoseHosting

        Apache Tomcat or Tomcat is a widely known and used Java application server. It is an open-source web server and servlet container developed and maintained by a community of developers of the Apache Software Foundation. In this tutorial, we will guide you through the steps of installing Tomcat on Ubuntu 22.04. At the time of this writing, Tomcat 10 is the latest stable version available to download.

      • ID RootHow To Install PlayOnLinux on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install PlayOnLinux on Linux Mint 21. For those of you who didn’t know, PlayOnLinux is an open-source gaming framework (software) based on Wine, that allows you to easily install any Windows-based applications and games on Linux operating systems. The purpose of PlayOnLinux software is to simplify and automates the process of installing and running Windows applications on Linux platforms. Apart from Linux OS, it also offers PlayOnMac to run Windows programs on macOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a PlayOnLinux on Linux Mint 21 (Vanessa).

      • Install MySQL 8 on Oracle Linux 9 – kifarunix.com

        Follow through this tutorial to learn how to install MySQL 8 on Oracle Linux 9. Being a popular open-source relational database management system, MySQL is available and can be installed on Oracle Linux 9.

      • chown Command in Linux – Complete Guide – Linux Stans

        This is a complete, beginner-friendly, detailed guide to the chown command in Linux. This tutorial will teach you what the chown command does, and how to use it, along with a few useful examples.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Hotfix: KPhotoAlbum 5.9.1 | KPhotoAlbum

          Due to a problem with releaseme’s tarme.rb script, the release tarball for KPhotoAlbum 5.9.0 didn’t contain any translation data. Alas, I noticed this not before the tarball already spread the mirrors, so we had to withdraw it an create a new one, with a bumped version number.

  • Distributions and Operating Systems

    • HackadayKittyOS: Writing A Toy OS For The ATmega168 From Scratch

      Writing an operating system for a computing platform is one of those non-trivial tasks few people actually need to do, regardless of whether it’s for a small microcontroller or a larger general-purpose computer. Many of us spend a large amount of our time working on producing robust code for embedded systems, occasionally diving deeper into the abstraction when we’re stuck on a problem. Quite often this work is sitting on top of an RTOS, which we consider a solved problem. [Jonathan Diamond] had picked up a fair bit of knowledge of some of the low-level AVR black magic, as well as some details of how operating systems work internally, and so decided to have a crack a building a toy operating system called KittyOS, for the learning experience alone.

  • Free, Libre, and Open Source Software

    • Its FOSSLapce is a Fast, Lightweight Open-Source Code Editor in Making

      There are plenty of open-source code editors available for Linux.

      What would you think about another option: A Rust-based open source code editor focusing on performance?

      It should be exciting, right?

      Lapce is one such project in development that aims to present a feature-rich and fast code editor as an alternative to Microsoft’s Visual Studio Code.

      The developer also mentions that it was inspired by Xi-editor (which is no longer in active development).

    • Web Browsers

      • Best Privacy-Centric Web Browsers For Linux

        I wrote an article about the best web browsers for Linux a while ago. Since then, a slew of web browsers have appeared, many of which appear to be based on Chromium or Firefox. However, many of those cool-looking Linux web browsers are not as private as you might think. In this article, I’ll go over the best privacy-focused web browsers for Linux.

        I’ve used more than ten web browsers on my Linux in the last few months. Each one focuses on providing secure web browsing, regular feature updates, and customizability, but there are few developers who actually focus on providing not only secure but private web browsing, no matter how far they have to go to do so.

        Remember that bad actors aren’t the only ones to be wary of these days; tech behemoths like Google, Facebook, Instagram, and others are constantly monitoring users’ activities across the Internet, even when the user isn’t on their website. Typically, internet users are unaware of how these tech juggernauts track their online activities, so they make no effort to avoid it. Some even do not consider it a matter of privacy, which is a topic for another day.

    • Productivity Software/LibreOffice/Calligra

    • Content Management Systems (CMS)

      • Linux Links7 Top Free and Open Source Lua Web Frameworks – LinuxLinks

        One of the types of software that’s important for a web developer is the web framework. A framework “is a code library that makes a developer’s life easier when building reliable, scalable, and maintainable web applications” by providing reusable code or extensions for common operations. By saving development time, developers can concentrate on application logic rather than mundane elements.

        A web framework offers the developer a choice about how to solve a specific problem. By using a framework, a developer lets the framework control portions of their application. While it’s perfectly possible to code a web application without using a framework, it’s more practical to use one.

        Lua is a lightweight, small, compact, and fast programming language designed as an embeddable scripting language. This cross-platform interpreted language has a simple syntax with powerful data description constructs. It has automatic memory management and incremental garbage collection, making it ideal for configuration, scripting, and rapid prototyping.

        [...]

        Here’s our recommended web frameworks for Lua captured in a legendary chart.

    • FSFE

      • FSFE information desk on Veganmania Danube Island 2022

        It was the usual information stall like described several times before in this blog. Unfortunately I didn’t have time yet to write more about it. I created an updated information leaflet and really should get a tent because this time we had heavy rain twice and it was very hard to protect the paper materials with only an umbrella as cover.

      • FSFELibrem 5: a PC in your pocket +++ Booths are back – FSFE

        In this issue we look into the software development of Librem 5 phone and of Phosh, the popular graphical environment for Linux phones. And booths are back! We are happy to discuss Free Software in person again.

    • GNU Projects

      • LWNGawk 5.2.0 released [LWN.net]
        Version 5.2.0 of the GNU Awk implementation is out. The biggest change, perhaps, is the addition of "persistent memory" support that allows gawk to keep values around between runs. Old-timers will be disappointed by the removal of VAX/VMS support.
        
        
        [...]
        
        Greetings all.
        
        This note announces the next major release of GNU Awk: version 5.2.0.
        
        The following files may be retrieved via HTTPS from
        
        https://ftp.gnu.org/gnu/gawk:
        
        -rw-rw-r-- 1 arnold arnold 6540181 Sep  4 18:52 gawk-5.2.0.tar.gz
        -rw-rw-r-- 1 arnold arnold 3228577 Sep  4 18:52 gawk-5.2.0.tar.lz
        -rw-rw-r-- 1 arnold arnold 3386344 Sep  4 18:52 gawk-5.2.0.tar.xz
        
        This is a major new release.  The relevant part of the NEWS file
        is appended below.
        
        This release represents a lot of very hard work by a number of people.
        I thank them all for their contributions, I could not have done it
        by myself.
        
        Differences from gawk 5.1.1 are not available; they would be too large.
        
        The online documentation on the GNU web site is already updated,
        including a manual for the new persistent memory feature.
        
        The usual GNU build incantation should be used:
        
        	tar -xpvzf gawk-5.2.0.tar.gz
        	cd gawk-5.2.0
        	./configure && make && make check
        
        Please use the new buggawk script to report bugs. If it doesn't
        work for you, then send email to bug-gawk@gnu.org.
        
        NOTE that the manual's instructions for sending bug reports have
        been updated. Please review them carefully before submitting a report!
        
        ONLY bug reports should be submitted to the bug-gawk list. All other
        questions should use the relatively new help-gawk@gnu.org mailing list.
        
        Enjoy!
        
        Arnold Robbins (on behalf of all the gawk developers)
        arnold@skeeve.com
        ------------------------------------------------------------
           Copyright (C) 2019, 2020, 2021, 2022 Free Software Foundation, Inc.
           
           Copying and distribution of this file, with or without modification,
           are permitted in any medium without royalty provided the copyright
           notice and this notice are preserved.
        
        Changes from 5.1.x to 5.2.0
        ---------------------------
        
        *****************************************************************************
        * MPFR mode (the -M option) is now ON PAROLE.  This feature is now being    *
        * supported by a volunteer in the development team and not by the primary   *
        * maintainer.  If this situation changes, then the feature will be removed. *
        * For more information see this section in the manual:                      *
        * https://www.gnu.org/software/gawk/manual/html_node/MPFR-O...    *
        *****************************************************************************
        
        1. Infrastructure upgrades: Libtool 2.4.7, Bison 3.8.2.
        
        2. Numeric scalars now compare in the same way as C for the relational
           operators. Comparison order for sorting has not changed.  This only
           makes a difference when comparing Infinity and NaN values with
           regular numbers; it should not be noticeable most of the time.
        
        3. If the AWK_HASH environment variable is set to "fnv1a" gawk will
           use the FNV1-A hash function for associative arrays.
        
        4. The CMake infrastructure has been removed. In the five years it was in
           the tree, nobody used it, and it was not updated.
        
        5. There is now a new function, mkbool(), that creates Boolean-typed
           values.  These values *are* numbers, but they are also tagged as
           Boolean. This is mainly for use with data exchange to/from languages
           or environments that support real Boolean values. See the manual
           for details.
        
        6. As BWK awk has supported interval expressions since 2019, they are
           now enabled even if --traditional is supplied. The -r/--re-interval option
           remains, but it does nothing.
        
        7. The rwarray extension has two new functions, writeall() and readall(),
           for saving / restoring all of gawk's variables and arrays.
        
        8. The new `gawkbug' script should be used for reporting bugs.
        
        9. The manual page (doc/gawk.1) has been considerably reduced in size.
           Wherever possible, details were replaced with references to the online
           copy of the manual.
        
        10. Gawk now supports Terence Kelly's "persistent malloc" (pma),
            allowing gawk to preserve its variables, arrays and user-defined
            functions between runs. THIS IS AN EXPERIMENTAL FEATURE!
           
            For more information, see the manual. A new pm-gawk.1 man page
            is included, as is a separate user manual that focuses on the feature.
        
        11. Support for OS/2 has been removed. It was not being actively
            maintained.
        
        12. Similarly, support for DJGPP has been removed. It also was not
            being actively maintained.
        
        13. VAX/VMS is no longer supported, as it can no longer be tested.
            The files for it remain in the distribution but will be removed
            eventually.
        
        14. Some subtle issues with untyped array elements being passed to
            functions have been fixed.
        
        15. Syntax errors are now immediately fatal. This prevents problems
            with errors from fuzzers and other such things.
        
        16. There have been numerous minor code cleanups and bug fixes. See the
            ChangeLog for details.
        
        Changes from 5.1.1 to 5.1.x
        ---------------------------
        
        1. Infrastructure upgrades: Automake 1.16.5, Texinfo 6.8.
        
        2. The rwarray extension now supports writing and reading GMP and
           MPFR values. As a result, a bug in the API code was fixed.
        
    • Programming/Development

      • QtCode coverage integrated into your IDE with Coco

        The new release of Coco is now available and offers a huge step forward in usability and functionality for your testing. Developers can now review code coverage directly from their Integrated Development Environment (IDE) without switching back and forth between tools.

        By bringing this information into the IDE, you’re empowering your developers to consider code testing and coverage as part of their ongoing development rather than seeing it as a separate process.

      • QtRelease of Coco 6.0 With IDE Integrations
  • Leftovers

    • Science

      • HackadayToday’s The Day You Finally Learn Quaternions

        If you’ve ever dealt with orbital mechanics or sophisticated computer graphics, you’ve probably run across the math term quaternions. [Anyleaf] has a guide to the practical use of this math concept which focuses more on practicality than theory. We like it!

      • Common DreamsOpinion | Biden’s “Safer America Plan” Should Follow the Science of Public Safety

        Last week, President Biden addressed a crowd in Wilkes-Barre, Pennsylvania, pitching his plan to combat crime and gun violence, dubbed the “Safer America Plan”. The plan includes a number of important measures in line with what advocates of criminal justice reform have been fighting for, with these specific measures receiving praise from organizations like the ACLU.

      • HackadayNanoparticles Rip Hydrogen From Water

        Hydrogen fuel is promising, and while there’s plenty of hydrogen in the air and water, the problem is extracting it. Researchers have developed a way to use aluminum nanoparticles to rip hydrogen out of water with no additional energy input. It does, however, require gallium to enable the reaction. The reaction isn’t unknown (see the video below), but the new research has some interesting twists.

    • Education

    • Hardware

      • CNX SoftwareSensirion SCD40 CO2 sensor units for makers: M5Stack UNIT CO2 and TeHyBug ESP8285 device – CNX Software

        We just wrote about the Infineon XENSIV PAS CO2 Shield2Go board to measure carbon dioxide (CO2) levels last week, but I’ve just come across two more hardware with a CO2 sensor designed for makers, but based on Sensirion SCD40 sensor instead, and mostly designed to monitor indoor CO2 levels since high concentrations may impact your health negatively.

        The first one is the M5Stack UNIT CO2 that’s designed to be connected to one of the company’s Core modules through an I2C interface, and TeHyBug portable mini sensor device equipped with ESP8285 WiFi microcontroller, as well as optional AHT10 temperature & humidity sensor and BMP280 pressure sensor, besides the SCD40 sensor.

    • Health/Nutrition/Agriculture

      • Telex (Hungary)Government-backed study finds Chinese Covid vaccine performs worst

        The third part of the HUN-VE series of studies was published at the end of July. This is a study that systematically assesses the efficacy of coronavirus vaccines used in Hungary and is unique in that it has government support as well as high professional quality. HUN-VE 3 tested vaccine efficacy against the then dominant Delta variant during last autumn’s epidemic wave and found that although the efficacy of all vaccines declines over time after vaccination, the Chinese Sinopharm vaccine offers the lowest protection in almost all respects. According to the authors, this is the first study to investigate the efficacy of Sinopharm’s booster vaccine, particularly in comparison with mRNA-based booster vaccines. The study was published more than a month ago, but its results have not been communicated anywhere.

      • The NationWeaponizing Food
      • HackadayFood Safe 3D Printing: A Study

        [Matt Thomas] wanted to answer the question of whether 3D printed structures can be food-safe or even medical-safe, since there is an awful lot of opinion out there but not a lot of actual science about the subject. As a mechanical engineer who dabbles in medical technical matters, he designed as series of tests using a wide range of nasty-sounding pathogens, to find once and for all what works and what does not.

      • Counter PunchBrewing Pandemic Pestilence

        The second source of pestilence is the centuries-long devastation of the natural world by mining, fossil fuels extraction, the logging of forests, industrialized fishing and one-crop mechanized agriculture relying on synthetic fertilizers and pesticides. Nature also suffers from wastes dumping in the oceans, the intentional burning of the Amazon and other forests in several countries for the growing of soybeans, corn, and other cash crops. Wars and vast armies inflict destruction and death to nature.

      • Common DreamsOpinion | How This Rural Wisconsin County Put Publicly Funded, Non-Profit, National Health Care on the Ballot

        Citizens of Dunn County, Wisconsin, have a plan to place national, publicly-funded health care for everyone on their November 8th county ballot.  In June and July at meetings of the County Board of Supervisors, many spoke of a broken health care system and their proposal to fix it.  After the third meeting, the Board voted unanimously to put the following question on the ballot:  

    • Security and Clown Computing/Kubernetes

      • LWNSecurity updates for Tuesday [LWN.net] [Ed: Some hype, outsourcing, and unnecessary complexity come at a cost]

        Security updates have been issued by Red Hat (pcs), SUSE (389-ds and firefox), and Ubuntu (linux-hwe-5.4 and linux-oracle).

      • Help Net SecurityBest practices for Kubernetes security in the enterprise market – Help Net Security

        As part of digital transformation, more and more organizations are transforming their application using cloud native architecture to become more agile and accelerate time to market. They are increasingly adopting containers and Kubernetes to do so. However, the increasing Kubernetes adoption has also increased security risks.

        In this Help Net Security video, Deepak Goel, CTO at D2iQ, talks about best practices for Kubernetes security in the enterprise market.

      • The Top 7 Kubernetes Alternatives for Container Orchestration – Container Journal

        Container management is a heated subject when it comes to developing software. Containerization has revolutionized how we look at infrastructure, making it easier to execute software in production. But, you don’t need to become a developer or administrator to take advantage of containers. There are several orchestration tools available that can help you automate the management of your containers.

      • Privacy/Surveillance

        • TorBoosting Adoption of Tor Browser Using Behavioral Science

          As part of our research, we used an experiment to test the effectiveness of different nudging interventions at increasing adoption of Tor Browser. We found that our nudge based on Protection Motivation Theory nearly doubled the odds that participants would use Tor Browser. Our results also show that users commonly encounter usability challenges when using Tor Browser, and that people use Tor Browser for a variety of benign activities. Our study contributes to a greater understanding of factors influencing the adoption of Tor Browser, and how nudges might be used to encourage the adoption of Tor Browser and similar privacy enhancing technologies.

    • Defence/Aggression

    • Transparency/Investigative Reporting

      • Counter PunchWhat I Learned About Governments by Reading Classified Documents

        When I first began plowing through masses of official records in the 1970s, I was attempting to discover the role of the U.S. government in the Greek civil war of the 1940s, which inspired the Truman Doctrine and a broad pattern of overseas U.S. military intervention. After official review, the relevant State Department files, many of them previously classified, had recently been opened to researchers at the U.S. National Archives. But when I started digging through these records, I found that a considerable number of classified documents remained unavailable. When I complained about this to another historian, he responded: “Those are exactly the documents you should see. File for them under FOIA” (the Freedom of Information Act). So that’s what I did. As a result, after another review, some were declassified, sometimes with sections redacted (“sanitized”).

    • Environment

      • Energy

        • Common DreamsZelenskyy Accuses Russia of Using Zaporizhzhia Power Plant as ‘Nuclear Weapon’

          Zaporizhzhia, which the Russians took over soon after invading Ukraine on February 24, is the largest power plant in Europe, and Zelenskyy compared the occupation to the Russians occupying “six Chernobyls,” referring to the deadliest nuclear disaster in history.

        • MeduzaZaporizhzhia Nuclear Power Plant disconnected from Ukrainian power grid — Meduza

          Ukraine’s electrical grid has been disconnected from the last remaining power line that was connecting it to the Zaporizhzhia Nuclear Power Plant (NPP), the Ukrainian state energy company Enerhoatom reported on Monday. According to the company, Russian troops have shelled the facility repeatedly throughout the last three days. On September 5, it said in a statement, the attacks caused a fire to break out on the station’s territory.

        • TruthOutDangerous Mountain Valley Pipeline Has No Place in Manchin’s Deal With Democrats
        • HackadayAluminium-Sulphur Batteries For Local Grid Storage?

          Lithium-Sulphur batteries have been on the cusp of commercial availability for a little while now, but nothing much has hit the shelves as of yet. There are still issues with lifetime due to cell degradation, and news about developments seems to be drying up a little. Not to worry, because MIT have come along with a new battery technology using some of the most available and cheap materials found on this planet of ours. The Aluminium-Sulphur battery developed has very promising characteristics for use with static and automotive applications, specifically its scalability and its incredible charge/discharge performance.

        • HackadayHackaday Prize 2022: A Backup Battery Pack

          These days, we’re all running around toting smartphones and laptops that could always use a bit more charge. Portable battery packs have become popular, and [Anuradha] has designed one that packs plenty of juice to keep everything humming.

        • Common Dreams‘Beyond Bleak’: UK Show Rebuked for Squid Game-Esque Segment Amid Energy Crisis

          Aired on the same day that the ruling Tory government chose a new leader in Liz Truss to become the nation’s next Prime Minister, the segment on This Morning! featured a rotating wheel where the prize was either a £1,000 or four-months payment of “Energy Bills.”

        • Common Dreams‘Gas Is Green… Washing’: Greenpeace Disrupts Industry Conference in Milan

          Greenpeace Italy led the direct action including more than 50 campaigners from across Europe, confronting officials there to promote gas, liquefied natural gas (LNG), and hydrogen as “greener” alternatives to oil and coal.

      • Wildlife/Nature

        • Counter PunchOur Forests are a Sanctuary

          Seeing these giants hacked down is like watching old friends killed. An ugly new road now crosses the trail and stumps are everywhere.

    • Finance

    • AstroTurf/Lobbying/Politics

      • ScheerpostMark Lloyd: A Letter From Washington on Communication Policy

        Choose Your Elected Representatives in Congress Wisely: They Will Determine the Future of Our Democratic Deliberation.

      • Meduza‘Potential threats to the country’: How EU-recommended sanctions are affecting Russian students in the Czech Republic — Meduza
      • Democracy Now“You Can’t Be Neutral on a Moving Train”: Remembering the People’s Historian Howard Zinn at 100

        We remember the legendary historian, author, professor, playwright and activist Howard Zinn, who was born 100 years ago this August. Zinn was a regular guest on Democracy Now!, from the start of the program in 1996 up until his death in 2010 at age 87. After witnessing the horrors of World War II as a bombardier, Zinn became a peace and justice activist who picketed with his students at Spelman College during the civil rights movement and joined in actions such as opposing the Vietnam War. He later spoke out against the U.S. wars in Afghanistan and Iraq. “I believe neutrality is impossible, because the world is already moving in certain directions. Wars are going on. Children are starving,” Zinn said in a 2005 interview. “To be neutral … is to collaborate with whatever is going on, to allow it to happen.”

      • Democracy NowLabor Day Special Featuring Howard Zinn & Voices of a People’s History of the United States

        This year marks 100 years since the birth of the historian Howard Zinn. In 1980, Zinn published his classic work, “A People’s History of the United States.” The book would go on to sell over a million copies and change the way many look at history in America. We begin today’s special with highlights from a production of Howard Zinn’s “Voices of a People’s History of the United States,” where Zinn introduced dramatic readings from history. We hear Alfre Woodard read the words of labor activist Mother Jones and Howard’s son Jeff Zinn read the words of an IWW poet and organizer Arturo Giovannitti.

      • Telex (Hungary)Hungarian government to set up an anti-corruption authority
      • Counter PunchThe OHCHR Report on China’s Human Rights Situation: The Conundrum of Balancing State Sovereignty with International Obligations

        Even before she went to China, Bachelet was criticized for her China agenda. Over 220 regional groups expressed concerns that the trip risked “walking into a propaganda minefield laid out by the Chinese Communist Party.”

      • Counter PunchThe Story of Ted Hall, the Atomic Spy

        Joseph Allbright and Marcia Kunstel, former Moscow correspondents and authors of the book on Ted Hall, Bombshell (1997), appear on numerous occasions in the film to offer expert historical commentary on the Hall narrative. Photos of Hiroshima and an interview with the pilot of Enola Gay, Paul Tibbets, provide historical evidence of the nuclear devastation that Ted Hall helped create and wished to end. Well-chosen music evokes past events.

      • Common Dreams‘Unfit for the Bench’: Trump-Appointed Judge Orders Halt to DOJ Review of Seized Materials

        Cannon, who was appointed by the former Republican president and confirmed after he lost the 2020 election, ruled that Trump “faces an unquantifiable potential harm by way of improper disclosure of sensitive information to the public” if the review of the materials, which included documents marked “confidential” and “top secret” continues.

      • Telex (Hungary)Director with close ties to Orbán government upset over EU leaders not attending Gorbachev funeral
      • TruthOutFar Right Liz Truss Replaces Boris Johnson as UK Prime Minister
      • Common Dreams‘Buckle Up, It’s Going to Be a Rough Ride’: Far-Right Liz Truss Named New UK Prime Minister

        “New prime minister, same old deceit!”

      • DeSmogAnalysis: New UK Prime Minister Liz Truss’s Links to Climate Science Denial

        A vocal advocate of free-market economics, during her campaign Truss called solar farms on agricultural land “depressing” and on Sunday claimed “gas is a very important transition fuel” to help reach net zero. 

      • Counter PunchDoubting Thomas and the Fallen Court

        He was the lone dissenter in the Court’s February 2021 ruling dismissing baseless MAGA claims of voter fraud and in its January 2021 ruling allowing the National Archives to release to the January 6 committee Trump White House documents, rejecting monarchical claims of executive privilege. Ethics 101: you don’t rule on cases which concern your family. Given his wife’s active role in promoting voter fraud claims and in the January 6 coup attempt being investigated by Congress he obviously should not have ruled in these cases. His outlier views in them affirm his lack of impartiality and further tarnish the Court.

      • Counter PunchJoe Biden’s Battle for “the Soul of This Nation” is a Fascist versus Fascist Cage Match

        He’s not wrong, but his emphasis on a single aspect — Donald Trump’s cult of personality — obscures the real nature of “semi-fascism” and comes a century too late.

      • Counter PunchThe Flaws in the “Assessment” Report of the Office of the High Commissioner for Human Rights on China

        High Commissioner Bachelet did well in delaying publication of the Xinjiang “assessment” and returning to Chile before the unappetizing and destructive debates start during the forthcoming 51st session of the Council (12 September-7 October 2022).  Already the Chinese mission has rejected[2]the “assessment” as unprofessional and incompatible with the end-of-mission statement issued by Michelle Bachelet after her successful mission to China and Xinjiang in May 2022, a statement, which I consider balanced, detailed and constructive[3].  Alas, Bachelet’s statement after her well-prepared visit did not succeed in silencing the Washington and Brussels critics that have been systematically misrepresenting the situation in Xinjiang and misusing it for purposes of their geopolitical hybrid war against China.  Bachelet’s sedate statement was met by hostility, media mobbing and calls for her resignation.

      • Counter PunchWhy Putin’s Failure in Ukraine will be as Momentous as Gorbachev’s in Russia

        In other words, Putin is doubling down on winning a war that is proving as risky for the Russian state as the radical changes introduced by Gorbachev during his years in power between 1985 and 1991. Unsurprisingly, Putin wants to avoid any close association with a man who presided over the dissolution of the USSR and failed utterly in his ambition to modernise the Communist party and the Soviet state.

      • Counter PunchDemocracies have Prosecuted Corrupt Leaders – America Can Too

        In a democratic republic, after their term in office ends, the person who was the executive returns to the same status as everyone else; being a citizen of that nation—a nation where all citizens have the same legal rights and responsibilities. Consequently, a former executive must obey the laws, no matter how long they served as the executive or how popular they were while in office. This is the second important characteristic of a democratic republic.

    • Censorship/Free Speech

      • MeduzaIndependent newspaper Novaya Gazeta banned by Russian court — Meduza

        A Moscow court has revoked the print license of independent newspaper Novaya Gazeta, effectively banning the outlet from operating inside Russia. Russia’s federal censor, Roskomnadzor, first asked the Basmanny District Court to declare the 29-year-old paper’s license invalid in July.

    • Freedom of Information / Freedom of the Press

      • Counter PunchThe Helsingin Sanomat Case: Prosecuting Journalists in Finland

        As the paper noted in scathing tone, the MPs debating the matter in Parliament seemed ignorant about what was actually at stake and taking place at Tikkakoski.  In the miasma of celebrated political ignorance, powers could be enlarged with little care and worry, elected representatives remaining, as they often have in history, asleep as the needle is administered.

    • Civil Rights/Policing

      • MeduzaEx-journalist Ivan Safronov sentenced to 22 years in prison for treason — Meduza

        The Moscow City Court has sentenced former journalist Ivan Safronov to 22 years in a high-security prison colony, as well as a 500,000-ruble ($8,200) fine and two years of “restrictions on freedom” after his release, on treason charges. Safronov’s defense team said they plan to appeal the sentence.

      • Telex (Hungary)Hungarian students protest for their teachers

        Several thousand people protested in Budapest the day after the new school year began, demanding a solution to the many problems in the Hungarian education system. Many of the students told us that there is a lack of teachers in their schools, and said that even those who are there are overworked and always tired and would deserve more money for their work.

      • Common Dreams‘We’ll Come Back Stronger,’ Vows Chilean Left After Visionary Constitution Rejected

        “We resisted for 500 years and will continue to do so.”

      • Counter PunchBlack Girls are More Than 4 Times as Likely to Get Suspended Than White Girls, But Hiring More Teachers of Color is Only Part of the Solution

        Most recently my work has focused on understanding and addressing racially disproportional school suspensions and the ways in which those are also gender disproportionate. For example, we know nationally that in the 2017-2018 academic year, over 2.5 million children received one or more out-of-school suspensions. While these numbers are going down compared to years prior, students of color and students with disabilities are receiving a greater share of suspensions and expulsions.

      • Counter PunchSilliness About the Jump in Labor Force Participation

        While this was bothersome, folks who follow the data closely know that the household survey often does weird things. On a month to month basis its movements are largely noise, and even over a period of several months it can often follow a path that is inconsistent with what we know about the economy.

      • Common DreamsOpinion | Barbara Ehrenreich and the Real Work of Labor Day

        Only a week of two before Barbara Ehrenreich’s death I was in a used bookstore, where I found and bought an out-of-print pamphlet she co-wrote in 1988 with journalist and author Annette Fuentes. It’s called “Women in the Global Factory.”

      • EFFHonoring Peter Eckersley, Who Made the Internet a Safer Place for Everyone

        His most ambitious project was probably Let’s Encrypt, the free and automated certificate authority, which entered public beta in 2015. Peter had been incubating the project for several years, but was able to leverage the famous “smiley face” image from the Edward Snowden leaks showing where SSL was added and removed, to build a coalition that actually made it happen. Let’s Encrypt fostered the web’s transition from non-secure HTTP connections that were vulnerable to eavesdropping, content injection, and cookie stealing, to the more secure HTTPS, so websites could offer secure connections to their users and protect them from network-based threats. 

      • Public KnowledgePublic Knowledge Joins 20 Groups Urging Congress To Shelve Journalism Competition and Preservation Act – Public Knowledge

        Today, Public Knowledge joined 20 public interest, consumer advocacy, and civil society groups as well as media companies and both antitrust and copyright law experts in a letter urging Senate Judiciary Committee Chairman Dick Durbin (D-IL), Ranking Member Chuck Grassley (R-IA), and other members of Congress to reconsider the “Journalism Competition and Preservation Act” (JCPA). The groups argue that the bill remains “enormously problematic,” worsening some of the biggest problems in journalism while simultaneously failing to support local news.

        The following is an excerpt from the letter:

        “[We] represent a broad cross-section of organizations focused on protecting and advancing our democracy. We include civil society organizations; librarians and archivists; creators; technology companies; experts in antitrust, copyright, constitutional and digital rights law; and media and news groups. While we represent a broad range of policy positions, we join in the view that this legislation should not be passed.

    • Monopolies

  • Gemini* and Gopher

    • Technical

      • Internet/Gemini

        • Week 34/35: Thoughts and Photos

          A few comments around Antenna recently have noted that the service will order links by their apparent post date, even if that post date is in the future. Right now the community is well-meaning enough that such behavior is not a problem, but I worry that it could be abused. Were a bad actor to try to spam the service, he could force junk posts to always appear at the top by giving them a date far out in the future, then simply re-submitting them from a different IP address when the offending is banned. It might be paranoia on my part, and I hope such checks will never be necessary in this space.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 06/09/2022: OpenWrt 22.03.0 Released

Posted in News Roundup at 4:19 am by Dr. Roy Schestowitz

  • GNU/Linux

    • DebugPointUnix History: A Mighty Origin Story

      The world today runs on Linux. Billions of mobile phones and servers today run Linux. But before Linux, there was Unix, and without it, Linux would not have existed today.

      Unix’s origin can be traced back to the moon landing days. In 1965, three famous institutions started a joint venture to create an operating system that could serve multiple users and share data and resources

      The history of Unix, and here’s the brief chronology of events that led us to where we are today with millions of lives touched.

    • Desktop/Laptop

      • GamingOnLinuxThe Kubuntu Focus NX is a small and mighty Linux desktop

        The Kubuntu Focus team recently announced the Kubuntu Focus NX, a small but surprisingly mighty little Linux desktop. Nice to see more vendors continue to push out new Linux products, although Kubuntu Focus still only ships to US + Canada.

    • Audiocasts/Shows

    • Instructionals/Technical

      • Linux HandbookHow to create a systemd service in Linux

        Since its introduction in March 2010, people have had various opinions about systemd. But one thing that you can not deny is that systemd is now present in almost all Linux distributions!

      • uni TorontoSupport for ‘kill -SIGNAME …’ was added in 4BSD

        The Unix ‘kill’ command that we’re familiar with (and that was standardized as POSIX kill(1)) accepts and even perhaps prefers to be invoked with a signal name, as ‘kill -SIGNAME …’ (well, POSIX would like you to use ‘kill -s SIGNAME’). For reasons beyond the scope of this blog entry, I was curious about when and where in Unix history this was added to kill. The somewhat surprising answer turns out to be in 4BSD.

      • Linux HintTouch Command in Ubuntu 22.04

        Every Linux distro has numerous commands, and many of them are astonishingly helpful. One is the “touch” command which has many uses but mainly alters the timestamp on any file, including access and modification time.

        This article will go through all the basic and advanced touch commands to help you change your file’s timestamp in Ubuntu 22.04.

      • TecMintHow to Monitor Website and Application with Uptime Kuma

        Uptime Kuma is a fancy self-hosted monitoring tool that you can use to monitor websites and applications in real time.

      • How to install Streamlit on Ubuntu 22.04 – NextGenTips

        In this tutorial, we are going to learn how to install Streamlit on Ubuntu 22.04

        Streamlit is an open-source Python library that makes it easy to create and share beautiful, custom web apps for machine learning and data science. This is a faster way to build and share data apps. Streamlit turns data scripts into shareable web apps in minutes.

        You don’t need to write the backend or frontend to define Streamlit, you only need to add widgets which is the same as declaring variables. This makes it easy to use and also deploy. Deploying your app is just a click of a button and your application is in the cloud.

      • Trend OceansAtuin: A Powerful Alternative for Shell History (SQLite Database) in Linux – TREND OCEANS

        Atuin is a powerful replacement for your existing conventional history command with an SQLite database, which will record extra context for your executed commands like log exit code, CWD, hostname, session, command duration, etc.

        In addition to that, you will also get the power to sync your history between all of your machines with end-to-end encryption. By default, Atuin provides its own server for synchronisation. However, you can deploy your own server and configure it with Atuin.

      • ID RootHow To Install CMake on Fedora 36 – idroot

        In this tutorial, we will show you how to install CMake on Fedora 36. For those of you who didn’t know, CMake is a multi-platform software designed for automated compilation on various operating systems. Additionally, CMake can generate wrappers and executables in any combination, making it very versatile.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the CMake on a Fedora 36.

      • LibreOffice 7.4 Calc Guide published – Taming LibreOffice

        The LibreOffice documentation team published a new user guide in August: LibreOffice 7.4 Calc Guide, available in free PDF and ODT. Low-cost printed copies are available from Lulu.com.

      • PC LinuxGIMP Tutorial: Make A Shadow Using Your Subject

        I saw this tutorial for creating a shadow, and thought it might be useful. Sometimes we want to create a different scene, but have some item we want to include. This may help. I saw a car in a parade that I thought might look good in a different scene, so I’ll put it in. You can do this too.

        Open the background you want to use, and the car. The trick with mine was to cut the car out of the parade, and make sure everything was gone except the car. I didn’t do the greatest job…. but it will work. I’m sure you will do an awesome job.

      • PC LinuxArt Project In GIMP 2022

        Recently, in the ‘Camera Talk’ section of the forum, TheCrankyZombie posted a great photo of the full ‘Sturgeon’ Moon. It had lots of great sharp detail, and most importantly, it was huge in the frame.

      • PC LinuxOTA Broadcast TV With Kaffeine

        As I promised last month, I’m winding up my series of articles on how to watch OTA (over the air) TV broadcasts on your PCLinuxOS computer. You will, of course, have to have the hardware (or access to the hardware … namely, a TV tuner card/dongle that’s supported under Linux) to be able to receive these broadcasts, hooked to an antenna/aerial or cable TV input.

        In the July issue of The PCLinuxOS Magazine, I covered how to use VLC to receive and watch OTA TV broadcasts. I included a bash script to make it easier to scan for the channel information and save it to a file that can be loaded into VLC at will. In the August issue of The PCLinuxOS Magazine, I covered how to use MPlayer to receive and watch OTA TV broadcasts. I included two bash scripts with that article. One was to simplify scanning for channels, and the other was to make it easier to watch those TV stations with MPlayer.

        If you are one of those Linux users who prefer to avoid the Linux command line and/or bash scripts, you will be relieved to know that by using Kaffeine to view OTA TV broadcasts, you won’t have to mess with any of that. By far, Kaffeine is the EASIEST to use to watch OTA TV broadcasts. All of the abilities are built into Kaffeine for scanning for the channels available in your area, and then watching them.

      • RGB on Linux with OpenRGB – Control Gigabyte RGB Fusion, Asus Aura, Razer Chroma, Nanoleaf, iCue from Linux

        Gone are the days of mounting cold cathode tubes and UV-reactive accessories in computer cases. Modern computer cases, motherboards, GPUs, fans, and even NVMe drives now feature integrated lighting by means of LEDs. Through the use of primary-color LEDs – Red, Blue, and Green – these devices can create nearly any color combination to illuminate computer components. With the addition on an RGB controller, whether smart or “dumb”, each individual LED (or sometimes “zone” of LEDs) can be controlled to create incredible patterns and effects, bringing more life and entertainment to computer components than cold cathodes ever could.

      • Install VirtualBox Guest Additions on Oracle Linux 9 – kifarunix.com

        Follow through this tutorial to learn how to install VirtualBox guest additions on Oracle Linux 9. VirtualBox guest additions “consist of device drivers and system applications that optimize the guest operating system for better performance and usability“.
        VirtualBox guest additions can only be installed after the OS has been installed on VirtualBox. In our previous guide, we learnt how to install Oracle Linux 9 on VirtualBox;

      • Linux Made SimpleHow to install The Pedestrian on a Chromebook

        Today we are looking at how to install The Pedestrian on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • TecAdminHow To Install MySQL 8 on Amazon Linux 2 – TecAdmin

        MySQL is a very popular open-source relational database management system that can run on Linux, Windows, and Mac OS. It’s typically used as the back-end database for web applications, though it can also be used to store data for other software. You can use MySQL to store and organize data, retrieve it when needed, and transform it into a different format (e.g. changing it from text to numbers). It’s commonly used by companies of all sizes as the database for their websites and applications.

        This article will walk through the process of installing MySQL 8 on Amazon Linux 2. When you’re finished, you’ll have a fully-functioning MySQL database that you can use with either the AWS Console or your own application. You can also use Amazon RDS to configure other databases besides MySQL.

      • Linux HintSed Replace Newline With Space

        In UNIX/Linux, the sed command is a dedicated tool for editing streams. It can perform various operations on a text stream, such as searching, finding and replacing, and insertion/deletion. For the most part, however, sed is used to find and replace text contents.

      • Linux HintHow to Save Username and Password in Git

        Git is a freely available decentralized version control system used by multiple people around the globe. However, sometimes it becomes time-consuming and difficult to prove your identity whenever you want to interact with a Git remote repository for performing different operations. To make these operations more feasible, permanently save these credentials and connect the Git local repository with the remote repository.

        This study will briefly discuss the procedure of saving the username and password in Git.

      • Linux HintHow to Turn Off RetroPie Safely

        RetroPie is a software and an operating system designed for playing retro games on a Raspberry Pi device. It’s a perfect platform for gamers who want to play classic games on their Raspberry Pi system without requiring to update their outdated consoles. Besides, people enjoy playing games on RetroPie; they probably make one fatal mistake by leaving their RetroPie running in the background or turning off the device by removing the power supply. Doing this will cause severe issues to your Raspberry Pi, which may reduce its lifespan.

        In this article, we will show you how you can safely turn off RetroPie to avoid damaging your Raspberry Pi device.

      • Linux HintHow to Update Python on Raspberry Pi

        Python and Raspberry Pi OS are made for each other, as without Python, you will face issues while accessing your Raspberry Pi terminal or running other applications that require Python. There are other advantages of having Python on Raspberry Pi as well, such as ease of use, versatility, and freedom to access several Python libraries that are included in the Raspberry Pi libraries list.

        Since replacing the older Python version with the new one is a complex task because you won’t be able to remove the previous Python version as it will result in system failure. So, to help you out in this situation, we present this article to provide your guidelines on how you can update Python on Raspberry Pi.

    • WINE or Emulation

      • Its FOSSWii U Emulator Cemu 2.0 Goes Open Source With Linux Support

        Now, we have another exciting project to join the list, i.e., Cemu Wii U emulator.

        Wii U was one of the most loved video game consoles developed by Nintendo in 2012.

        Of course, Wii U games were popular back then, and now that it is no longer available as a new product, gamers use emulators to enjoy those games.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Updates On Space Actions Merge Request- GSoC’22 post #15

          I created a merge request to submit my additions for Space Home and Space Creation/ Editing functionality. The merge request can be found here.

          This merge request recieved a lot of helpful suggestions by Carl Schwan and Jan Bidler. I tried implementing a lot of them.

          There were a couple of UI fixes. Non privileged accounts were restricted from accessing options to edit child rooms of Spaces on UI.

          There were some syntax related changes too.

          Functionality wise, I will be creating a new list model for the child room editor. It will contain the rooms user is part of as well as rooms that are children of Space. I also have to set up connections to update Space home page whenever changes to Space settings are made.

      • GNOME Desktop/GTK

        • Crosswords 0.3.5: Border Styles – Jonathan Blandford

          It’s time for another GNOME Crosswords update. We’ve been busy since GUADEC and have managed to add quite a few user-visible features. We also fixed a bad bug where undo would break autosaving and added French translations. Buckle up, as this release goes to eleven!

  • Distributions and Operating Systems

    • New Releases

      • LinuxiacSalix 15.0 Is Here, A Ready-Made Slackware-based Desktop

        Salix Linux 15.0 is a desktop-oriented operating system based on Slackware 15, including Xfce 4.16 and built-in Flatpak support.

        Slackware is a legendary Linux distribution that seems to have risen from the ashes with version 15 after a long slumber. However, user-friendliness has never been one of its strong points.

        This is where Salix Linux comes into play – a lightweight, easy-to-use, with stability in mind Slackware-based desktop-oriented Linux distro. However, it is unlikely to be familiar to the average Linux user.

        So, if we can draw a parallel, Salix is to Slackware what Manjaro is to Arch Linux. Or, to put it another way, a more user-friendly and ready-to-use desktop.

      • 9to5LinuxSlackware-Based Salix 15.0 Released with Flatpak Support, Xfce 4.16, New Look, and More

        Salix is one of the oldest GNU/Linux distributions based on Slackware, and the new release, Salix 15.0, doesn’t disappoint fans. It comes with the latest and greatest Xfce 4.16 desktop environment that has received a fresh coat of paint with new default GTK, WM, and icon themes, new default wallpaper, and a dark mode.

        This release uses the light mode by default, but if you want to go to the dark side, you can now easily switch to the dark version of Salix from the Appearance panel. Another big change is that Salix now uses Whiskermenu as our default application launcher for Xfce.

      • [OpenWrt Wiki] OpenWrt 22.03.0 – First Stable Release – 6 September 2022

        The OpenWrt community is proud to announce the first stable release of the OpenWrt 22.03 stable version series. It incorporates over 3800 commits since branching the previous OpenWrt 21.02 release and has been under development for about one year.

      • LWNOpenWrt 22.03.0 released

        Version 22.03.0 of the OpenWrt distribution for routers (and beyond) has been released. “It incorporates over 3800 commits since branching the previous OpenWrt 21.02 release and has been under development for about one year”. Changes include a new firewall implementation using nftables, year-2032 readiness, dark mode in the LuCI web-based administration tool, and support for many more devices.

    • Screenshots/Screencasts

      • Videodeepin 20.7 Run Through – Invidious

        In this video, we are looking at deepin 20.7.

      • Linux Made Simpledeepin 20.7

        Today we are looking at deepin 20.7. It comes with Linux kernel 5.18, based on Debian 11, and uses about 1.5 – 2GB of ram when idling. Enjoy!

    • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

      • PC LinuxRepo Review: Rapid Photo Downloader

        Rapid Photo Downloader is a handy tool to help you download and organize photos and videos from your digital cameras. It allows you to easily copy, rename, and backup all of your camera’s important data, while supporting most common image and video formats, including RAW photos. Rapid Photo Downloader also has a very nice, easy to use interface.

      • PC LinuxPCLinuxOS Screenshot Showcase
      • PC LinuxFrom The Chief Editor’s Desk…

        This month’s cover, designed by Meemaw, celebrates International Bacon Day, on September 3, 2022. The “unofficial” holiday is celebrated annually on the first Saturday of September.

    • Red Hat / IBM

      • Enterprisers Project4 tips to make meetings more meaningful

        Between one-on-ones, coaching sessions, strategy meetings, town halls, and company-wide forums, IT leaders’ calendars can get filled up quickly, leaving little to no time to think before joining the next video meeting.

        But meetings are important – for those working remotely, it can be the only time in their day they see and connect with their peers. In a hybrid work era, leaders must take steps to rethink meetings to keep the benefits, minimize time-wasting activities, and preserve time in the day to get work done.

        We asked IT leaders who recently won a 2022 Seattle CIO of the Year ORBIE Award what they have learned over their careers about making meetings more meaningful and effective. Here are four tried and true tips you can use to reclaim some time in your calendar.

      • Enterprisers ProjectEdge infrastructure: 7 key facts CIOs should know about security

        The cybersecurity landscape is as complex as it is vast. And, sorry to say, growing adoption of edge computing use cases (and related technologies like IoT) isn’t going to magically simplify things.

        That certainly doesn’t mean you can’t build out an edge architecture more securely. It’s just a (big, in all likelihood) change to your threat model since by definition you’re moving infrastructure, applications, and data well beyond your central or primary environments.

        “Edge computing brings fantastic benefits to the user experience but comes at the cost of introducing fundamental security concerns,” Christopher Sestito, CEO of HiddenLayer, told us recently.

        Many of those concerns – access control and management, data in transit, loads of new internet-connected devices – should sound familiar. They’re not insurmountable in the least bit, even in highly distributed, diverse edge environments.

      • Red HatRed Hat Developer roundup: Best of August 2022 | Red Hat Developer

        It’s officially September, and we’re back with our monthly roundup to catch you up on the latest top articles and community resources featured on Red Hat Developer.

      • OpenSource.comApplying open organization principles to save factory energy

        The problem with energy costs is that most people don’t think about them. They just look at their overall bill without considering how the energy was used. By monitoring and measuring energy use through sensors in very specific locations, energy waste can be made transparent and reduced.

        That’s the premise of the book Reinventing Fire: Bold Business Solutions for the New Energy Era, which offers methods to eliminate the use of fossil fuels by 2050 through energy waste reduction. It’s also the premise of a story I began in an earlier article about two retired utilities salespeople-turned-consultants who started an open organization community to reduce energy waste in their region, which they call the “Reinventing Fire Community.” Their work depends on the open organization principles of Community, Transparency, Collaboration, Inclusivity, and Adaptability.

        In that article, I talked about actions one of my imaginary consultants recommended for home and commercial building owners. In this article, I discuss the other fictional consultant, who sold electricity to factories.

        It may be surprising how much energy is wasted in factories. The fact is, there aren’t enough energy specialists available right now, and most production managers have their attention on other things, particularly production volume. Too many top managers look at sales, profit margins, and gross profit and miss “boring” expenses. In addition, small savings are hard to see until they’re multiplied hundreds of times.

      • OpenSource.comA beginner’s guide to making a dark theme for a website

        Having a dark theme for your website is a common feature these days. There are various ways to add a dark theme to your website, and in this article, I demonstrate a beginner-friendly way of programming a dark theme for the web. Feel free to explore, make mistakes, and, more importantly, learn by manipulating the code in your own way.

    • Canonical/Ubuntu Family

    • Devices/Embedded

      • CNX SoftwareTopton N1 dual-bay NAS features AMD Athlon 3050e CPU, four Ethernet ports – CNX Software

        Powered by an AMD Athlon Silver 3050e dual-core processor, Topton N1 (aka TP-N1) NAS comes with two SATA bays for 2.5-inch or 3.5-inch drives, as well as four gigabit Ethernet ports.

        The system can support up to 32GB RAM, relies on M.2 SSD storage for the OS, and can provide up to 40TB of data storage through the two SATA bays. It is also equipped with an HDMI output port, several USB 3.x/2.0 ports, as well as a 3.5mm audio jack.

      • Linux GizmosESP32-S3 development board integrates OV2640 camera and mPCIe slot

        LILIGO’s T-SIMCAM is a development board featuring the ESP32-S3 System on Chip (SoC) enabled with Wi-Fi and BLE support. Additionally, this compact board features the OV2640 camera module, a SIM card slot and a mPCIe slot for T-PCIE SIM modules.

        The SoC found on the T-SIMCAM is the ESP32-S3R8 which features a dual-core LX7 Tensilica microprocessor with a maximum frequency of 240MHz. The T-SIMCAM also includes 16MB of Flash storage and up to 8MB of PSRAM. 

      • Linux HintIs Arduino a Microcontroller

        Arduino is a hardware and software programming platform based upon Atmel ATmega microcontrollers. It is an open-source platform which means all the codes and libraries are openly available and easy to modify by students, beginners, and experts in the Arduino community. Arduino is popular among people as it doesn’t need any external hardware for programming. It is a development board based upon microcontroller and easy to program by just using USB cable.

    • Open Hardware/Modding

      • NetzpolitikThe first time we encountered law enforcement malware

        Mikko Hyppönen is a security expert and author. In an excerpt from his new book “If It’s Smart, It’s Vulnerable” he writes about government malware and the techniques of law enforcers. He also reveals how he learnt about German law enforcement malware and how the Chaos Computer Club made sure that everybody could detect it.

      • Roberto FrennaRooting a Hikvision Indoor Station to set a static IP address

        Recently, I’ve been tinkering with a Hikvision surveillance system which includes an Android Indoor Station aptly named DS-KH9510-WTE1. Whilst this runs Android behind the scenes, it exposes a custom UI made by Hikvision that completely hides the standard Android screens and menus.

      • Old VCRWhat the KIM-1 really needs is bubble memory (plus: 20mA current loop for fun and profit)

        It seems like everything has flash. Flash mobs, flash photography, Flash Gordon, flash memory. (Other than the past couple years, of course, which haven’t been very flash.) And, because solid-state-all-the-things, you can get flash storage devices for tons of classic computers where even the tiny microcontroller in the SD cards is probably more powerful than the systems they’re being interfaced to. Why, you can even connect one to an MOS KIM-1, the famous mid-1970s MOS 6502 single-board computer. Now at last you don’t need to rekey everything in or screw around with an audio recorder.

  • Free, Libre, and Open Source Software

    • MedevelAmusewiki is an Open-Source Wiki Engine for Publishers

      Amusewiki is a free and open-source wiki engine that also can be used as authoring, archiving and publishing platform.

      Amusewiki is also an amazing EPUB editor, viewer and authoring tool.

      Unlike many other wiki engines, Amusewiki uses Emacs Muse Markup instead of Wiki syntax, or Markdown.

    • Web Browsers

      • Chromium

        • MedevelView DICOM Images on Google Chrome with DICOM Image Viewer Extension

          Google Chrome properly is the most used web browser, it gains popularity as many users prefers it for speed and usability.

          With its vast ecosystem of extensions and themes, you can add more features or change looks to your browser just by heading to the Chrome store, search, and download the extension.

    • SaaS/Back End/Databases

      • SQLite Release 3.39.35

        A complete list of SQLite releases in a single page and a chronology are both also available. A detailed history of every check-in is available at SQLite version control site.

      • PostgreSQLCall for New Members for the Community Code of Conduct Committee

        This message is being sent from the Community Code of Conduct Committee, with the approval of the Core Team.

        As part of the Community CoC policy, the Committee membership is to be refreshed on an annual basis. We are seeking up to three (3) volunteers to serve on the Committee for the coming year, October 1, 2022 – September 30, 2023.

        We are seeking people who reflect the diversity of the PostgreSQL community, with the goal to have members from multiple countries and varied demographics.

        The time commitment for Committee involvement varies, based on internal administrative work and the number of active investigations. We estimate an average of 5 to 10 hours per month, but that could increase if there is an increase in the number of incident reports.

    • Openness/Sharing/Collaboration

      • Open Access/Content

        • Unicorn MediaMonday Morning: Open Source and the War on Covid

          Although the phrase “open source” wasn’t used at all in NPR’s article (I’m sure of this because I have the transcript on screen as I write), it was obvious that the vaccine had been inspired by the open source development model, which had allowed it to not only be successfully developed, but developed at a price much, much lower that Pfizer’s and Moderna’s vaccines, which don’t fit the budgets of most developing nations.

          The vaccine was developed using proven long established methods for developing vaccines that are no longer covered by patents, if they ever were, and with no new patents being added to the work that was done for this particular vaccine. This means there’s practically no licensing costs to biotech companies in countries like India, which means they can afford to manufacture the vaccine and get the locals vaccinated.

          It was also developed with an eye toward cultural diversity, another important aspect of open source. In this case that means the developers were careful to make sure that no animal products were required to manufacture the medicine.

    • Programming/Development

      • MedevelBuild a Kanban based project management tool with this Open-source React Dashboard

        Kanban is a framework and a method for organizing and implementing agile project management system for software development.

        It is originally developed as scheduling system for lean manufacturing Taiichi Ohno for Toyota to streamline automotive manufacturing processes.

      • Linux HintRedis ZSCAN

        As you all know, Redis sorted sets are derived from the regular sets where each member is ordered by its score value in ascending order. If two or more members hold the same score value, they are ordered by lexicographical order. Usually, the members and scores can be directly retrieved using the ZRANGE command. When you have a big sorted set with thousands of members, the ZRANGE command might block the server for a long time like the SMEMBERS and KEYS commands which is a drawback. So, Redis offers a special command called ZSCAN which is derived from the SCAN command to iterate over the members of a sorted set. Since the ZSCAN command inherits from the SCAN command, almost all the behaviors are the same as the general purpose SCAN command.

      • Linux HintRedis LSET

        A Redis list is a data structure that holds a sequence of string elements in the insertion order. It is based on Linked List. So, the insertion of an element at the head and tail is performed in constant time. The only downside of the Redis lists is that querying elements by an index is a bit costly, which takes time directly proportional to the index of the accessing element. The reason behind the Linked list-based implementation is to make the data insertion faster for a very long list of items.

      • The Forty-Year Programmer

        I’m not going to tell you what language or framework to learn. If you’re good at the basics you can learn anything you want. Until then, you can be bad at whichever one you want. That’s what I did, anyway.

        Instead I’ll talk about things that didn’t make sense to me when I started, and now they’re the guiding stars in my sky. That means it’s not about specific technologies. Technologies come and go. Languages come and go. They can’t be your sky.

        Let’s start with this: software is young.

      • Matt RickardLibraries > Languages

        What matters more? A programming language’s ergonomics and features or the libraries available for that language? Libraries are often the reason why programmers adopt languages. Most programs contain much more third-party code than code you wrote Libraries create network effects, not languages

      • DEV CommunityI’m leaving Github

        I Am Using GitHub Under Protest

        Github’s decision to sponsor me is so recent that I haven’t been able to cash out the $550 payment yet.

        In spite of that, I can’t leave the platform fast enough. I certainly do not have the spare-time to move hundreds of projects to a new home… but I’m getting started.

        GitHub is a proprietary, trade-secret system that is not Free and Open Source Software (FOSS). I am deeply concerned about using a proprietary system like GitHub to develop FOSS projects.

      • Terence Eden“Writing an app is like coding for LaserDisc”

        The web has none of that. The earliest websites are viewable on modern browsers3. Sure, sometimes they might render in unexpected ways. And you might hope the servers they run on have been updated with security patches. But a website from the 1990s still works three decades later.

        An app released a single decade ago is unlikely to run.

        Even if the OS had a compatibility mode, it still requires the developer to stay up to date with all the various changes to app store policies. App stores are a gatekeeper.

      • Red HatBuild trust in continuous integration for your Rust library | Red Hat Developer

        A demo of how to build trust into a Continuous Integration system for your Rust library. (Part 4 of 4 in the series covering Linux system libraries in Rust.)

      • Python

        • Linux HintTkinter Progress Bar

          You may update the client on the status of a lengthy process with a progress bar widget. The widget’s goal is to provide the user confidence that something is occurring. It has two different modes of operation. When in determinate mode, the widget displays an indication that travels in a predetermined direction. The widget is moved in an indeterminate state to allow the client an impression that something is happening. The signal oscillates back and forth between the extremities of the widget throughout this style. The usage of determinate and indeterminate progress bars in Python will be covered in this tutorial.

          Let’s start with the configuration of a Tkinter library of Python. After the successful launch of the terminal, try the following query to configure the Tkinter package. Make sure to have Python already installed before using this instruction.

        • Linux HintPandas Fuzzy Match

          Fuzzy string matching is the term that best describes the process of locating similar strings. We’re going to make use of the fuzzywuzzy library. Despite having a silly name, it is a widely used library for string matching. The fuzzywuzzy package offers a few strong functions that is helpful in fuzzy string matching, including calculating the Levenshtein distance. In this article, we’ll look at how to use Python to perform fuzzy matches on the DataFrame column in pandas. We can identify matches using fuzzy matching, which finds patterns in the target object or items even when it doesn’t match exactly. Search engines are built on fuzzy matching. Because of this, every time we enter a search term into a browser, we receive numerous recommendations or suggestions.

      • Java

        • Linux HintHow to Install Java in Linux Mint 20.3

          Java is one of the most widely used high level programming languages available in the market. Along with that, this programming language is extremely easy to learn and once you get your hands on it, it will help you a lot with the complex programmatic tasks. In this guide, we will learn to install the Java programming language on a Linux Mint 20.3 system together.

        • Linux HintHow to Use Regex Whitespace in Java

          Regex or Regular Expression is a set of special characters that combine to form a pattern to search characters in strings. In computer programming and software engineering, learning regex will be very helpful in finding information in any text. All kinds of text search, formatting, and text replacement operations can be carried out using regular expressions.

          This tutorial will guide you about using the regex whitespace in Java.

  • Leftovers

    • Björn WärmedalSneakernet in a Free, Developed Society

      Regardless, the coolness of the very idea of sneakernet is incredible. I just want to use one. For something! I don’t even know what, just something. When I talk about “sneakernet” in this post I don’t mean the occasional file moved on a USB thumb drive between friends once in a while (even though that technically counts). I’m thinking about organised sneakernets between several actors, be they individuals or organisations.

    • Computers Are Bad2022-08-22 preventing loss dot jp2

      Previously on Deep Space Nine, we discussed the landscape of common retail EAS systems: electromagnetic, acousto-magnetic, and RFID. I now want to extend on this by discussing some peripheral systems that serve as part of the larger retail loss prevention technology stack. I will follow up on that by saying a bit about why none of these approaches seem to end up working that well.

    • You most likely don’t need metrics

      The main difference between my small home brew setup and a web platform is the scale. While I’m sending metrics once every 15 minutes, your platform will have thousands of requests every second (or at least, that’s the hope).

      A web platform will also need to track way more data than I need with my fermentations. There will be user agents, IP addresses, user IDs, and much more that you need to know about within your observability data to be able to properly investigate issues.

    • VarietySerena Williams Is Most Tweeted About Female Athlete Ever, Twitter Says

      Following Williams’ exit from the U.S. Open, Twitter Sports announced that the 23-time Grand Slam champion was the most tweeted about female athlete ever on the social network. Twitter launched in 2006, so obviously athletes whose active careers have played out within that window would be more highly represented. According to Twitter, 74% of those who tweeted about Serena in August and through Sept. 2 had not previously tweeted about her all year.

    • Science

      • AAASHuman speech may have a universal transmission rate: 39 bits per second

        Some languages were clearly faster than others: no surprise there. But when the researchers took their final step—multiplying this rate by the bit rate to find out how much information moved per second—they were shocked by the consistency of their results. No matter how fast or slow, how simple or complex, each language gravitated toward an average rate of 39.15 bits per second, they report today in Science Advances. In comparison, the world’s first computer modem (which came out in 1959) had a transfer rate of 110 bits per second, and the average home internet connection today has a transfer rate of 100 megabits per second (or 100 million bits).

    • Education

      • Carl SvenssonThe Problem With Computer Analogies: On different kinds of literacy

        I therefore propose that such analogies (which I’ve probably used myself at some point) are if not dishonest, then at least poorly thought through.

      • FuturismAmerican Kids’ Math And Reading Scores Have Plummeted Since The Pandemic

        The COVID-19 pandemic had drastic negative impacts on American schoolchildren , new statistics show. This week the National Center for Education Statistics (NCES) released the results of a survey indicating that 9-year-old students declined five points in reading and seven points in mathematics compared to 2020. “This is the largest average score decline in reading since 1990, and the first ever score decline in mathematics,” the NCES wrote in its report. In a statement, NCES commissioner Peggy Carr said this is the first national report that compares student performance before and after the pandemic.

    • Health/Nutrition/Agriculture

    • Proprietary

      • Helsinki TimesThese iPhone models will no longer support WhatsApp following this month’s Apple event: Find out

        Ahead of Apple’s upcoming launch event where the new iPhone 14 lineup will be unveiled, a recent update from the company suggests that the instant messaging platform, WhatsApp, will no longer function on some older iPhone devices.

        Mashable India has reported that from October 24 onwards, the messaging app will reportedly discontinue supporting iOS 10 and iOS 11 devices, according to one of WABetaInfo’s earlier sources.

      • [Old] Carlos FenollosaDo you feel like Google search results keep getting worse?

        SEO techniques try to reverse engineer Google algorithms to appear on top of organic searches. Everybody is gaming the system in their favor.

        It is a cat and mouse game where Google does its best to provide a good experience, but in the end, they are judge and jury. Because…

        Google is also the top advertiser in the world. Business use SEM to promote their services, and the incentive for Google is to promote SEM results, as they are the ones bringing money to the table.

        In the end, everybody is getting worse results. We see aggregator sites which add no value, webs optimized for Google instead of the visitors, and plain scams.

    • Security

      • PC LinuxShort Topix: New Free, Open Source AI Tool Can Fix Most Old Photos In Seconds

        Apple iOS users didn’t escape the past month unscathed. According to an article on Lifehacker, security researcher Alex Kleber discovered seven malware apps hiding in plain sight. While initially appearing to be by separate publishers, Kleber discovered that the malware apps were all created by a single group of hackers in China.

        Here’s a BIG oops! With the Google Pixel 6a hitting stores, reports have emerged about ANYONE’S fingerprint being able to unlock the phone … not just the user who registered their fingerprint, according to an article on 9 to 5 Google.

        Still think all of those so-called “smart devices” are worth the trouble or a great idea? Well, here’s an excellent exposé from Lifehacker about how all of these “smart devices” and IoT (which I’ve always called I(di)oT) devices sacrifice your privacy all in the name of convenience. This is what I’ve been saying all along. Remember that there is a literal GOLDMINE available in the reselling of your data, so it’s going to be difficult (without legal or legislative restraints) to limit ANY company from profiting off of your data by selling and reselling your data to other “interested” parties … whose only interest is in serving up advertising and other tracking information. Even metadata or anonymized data, given enough of it, can paint a pretty accurate picture of a user from bits of innocent-looking data. In aggregate, it’s not so innocent. THIS article deserves your attention, since the markets are now inundated by smart appliances, smart bulbs, smart thermostats, smart speakers, etc. (when I recently purchased a new thermostat for my house, the “non-smart” thermostats were buried on the retailer’s website, and harder to find than they should have been). Scary, scary times ahead concerning privacy!

        According to an article on BleepingComputer, another batch of 35 malware apps has been found in the Google Play Store. This latest batch of malware has been installed more than 2,000,000 times.

        Research from cybersecurity provider Kaspersky found nearly 7 million users being affected by unwanted software disguised as browser add-ons, with many being found on Google Chrome. As reported, 4.3 million unique users were attacked by adware sneaking their way onto systems, while over 2.6 million users were affected by malware, according to an article from Laptop Mag.

        “Bad actors” have been discovered creating false Google Ads in an effort to deliver malware to your computer, according to an article from Lifehacker. The “malvertising” disguises itself as a bona fide Google Ad to lure unsuspecting/less savvy users to a fake version of the site that’s being searched for. We all knew ads were bad, but now they are even worse.

        If you haven’t changed to Bitwarden to help manage your online passwords, you may want to after hearing this. LastPass, one of the world’s largest password managers, has confirmed on a blog post that it has been hacked, according to an article on Forbes. LastPass, which recently switched from a free service to a fee-based subscription service, has about 25 million users. While user data was never compromised, the hackers did gain access to some proprietary LastPass technical information, and gained access to some portions of source code.

      • Bleeping ComputerMicrosoft Defender falsely detects Win32/Hive.ZY in Google Chrome, Electron apps [Ed: If Microsoft Defender actually worked, it would flag Windows as malware. This is spin from Microsoft's devoted booster Lawrence Abrams.]

        A bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps as ‘Win32/Hive.ZY’ each time the apps are opened in Windows.

      • DaemonFC (Ryan Farmer)Illinois electric company, ComEd, changes to Microsoft Azure hosting, and now I can’t pay my power bill in SeaMonkey. Lots of Microsoft corruption in Illinois state government. | BaronHK’s Rants

        The Illinois electric company, ComEd, changed to Microsoft Azure hosting, and now I can’t pay my power bill in SeaMonkey.

        In Firefox, I had to whitelist a bunch of Microsoft domains to run JavaScript to pay my power bill, but in SeaMonkey, it won’t even load. Just a permanent spinny beachball of death.

        The old site worked fine.

        That’s on top of something that Roy Schestowitz mentioned for me in passing the other day on Techrights, that is the Illinois state court system leans on people to use Microsoft garbage. In that case, they implied that you need Microsoft Edge to view/edit PDFs and if you edit them with anything but Microsoft Edge, an unnamed (but presumably bad) type of thing could happen to your case.

        In reality, you could view, edit, save, and “flatten” (print to a non-fillable form) when you were done with other PDF editors. I tried it out in Okular (KDE but runs fine in GNOME via Flatpak), GNOME’s Evince document viewer, and Firefox, at the least. So the court is simply putting up Microsoft spam.

        The United States Customs and Immigration “Services” makes you fill out an insane number of confusing forms, but I managed to file a case with them using only KDE’s Okular in 2021, and it was approved.

      • Privacy/Surveillance

        • CNETAre You Owed Money From Facebook’s $90 Million Data-Tracking Settlement?

          You’ll need to act soon, though: The deadline for filing a valid claim is just weeks away.

          Plaintiffs in Davis v. Facebook allege the social media giant was aware it violated privacy, communications and wiretap laws — and its own contracts with customers — by tracking logged-out users to sites that had Facebook’s “Like” button on them.

        • [Old] The WireOne Year After Pegasus Project Revelations, the State of Israel Continues to Evade Scrutiny

          In the US Congress’s report, it was concluded that “Israel appears to have sold technical assistance on a regular basis… We believe that the Israeli government was fully aware of most or all of the trade.” But just before the report was published, to moderate the backlash, on March 13, 1987, the Israeli government announced that it would not sign new arms deals with the South African government. Although this did not prevent the continuing of existing arms contracts worth of billions of dollars right up until the end of the apartheid regime in April 1994, it was enough to moderate criticism of Israel in the US.

    • Defence/Aggression

      • CS MonitorEx-cop who attacked Capitol police officer on Jan. 6 gets 10 years

        Thomas Webster’s prison sentence is the longest so far among roughly 250 people who have been punished for their conduct during the riot on Jan. 6, 2021. The previous longest was shared by two other rioters, who were sentenced separately to seven years and three months in prison.

    • Environment

      • OverpopulationPopulation and the Great Transition

        In June, the Great Transition Initiative ran a month-long forum under the title The Population Debate Revisited. The collection of contributed essays is now accessible on the GTI’s site, and makes for interesting reading. We thought three of the essays held particular merit and will republish them here over the next few weeks. The first is the opening essay of the forum, by eminent Australian environmental scientist Ian Lowe.

      • Helsinki TimesStudy: Arctic lakes are vanishing in surprise climate finding

        The lake decline comes as a surprise. Scientists had predicted that climate change would initially expand lakes across the tundra, due to land surface changes resulting from melting ground ice, with eventual drying in the mid-21st or 22nd century. Instead, it appears that thawing permafrost, the frozen soil that blankets the Arctic, may drain lakes and outweigh this expansion effect, says Webb. The team theorized that thawing permafrost may decrease lake area by creating drainage channels and increasing soil erosion into the lakes.

    • AstroTurf/Lobbying/Politics

      • ScheerpostChris Hedges: Let’s Stop Pretending America Is a Functioning Democracy

        The political philosopher Sheldon Wolin in Democracy Incorporated: Managed Democracy and the Specter of Inverted Totalitarianism calls our system “inverted totalitarianism.” The façade of democratic institutions and the rhetoric, symbols and iconography of state power have not changed. The Constitution remains a sacred document. The U.S. continues to posit itself as a champion of opportunity, freedom, human rights and civil liberties, even as half the country struggles at subsistence level, militarized police gun down and imprison the poor with impunity, and the primary business of the state is war.

        This collective self-delusion masks who we have become — a nation where the citizenry has been stripped of economic and political power and where the brutal militarism we practice overseas is practiced at home.

    • Censorship/Free Speech

      • JURISTSaudi Arabia court sentences woman to 45 years for tweets

        Al-Qahtani was tried and sentenced by the Appellate Division of the Specialized Criminal Court (SCC) under Saudi Arabia’s Counter-Terrorism Law and Anti-Cyber Crime Law for “using the Internet to tear the [country’s] social fabric” and “violating the public order by using social media.” Her sentence comes on the heels of the sentencing of another Saudi woman named Salma Al-Shehab to 34 years in prison, followed by a 34-year travel ban. Like al-Qahtani, Salma Al-Shehab was sentenced for having a Twitter account and retweeting posts from Saudi dissidents and human rights activists.

      • VarietyInstagram Removes Pornhub’s Account

        Before the sex site’s account was removed from Instagram, Pornhub had 13.1 million followers and more than 6,200 posts. Reps for Meta, Instagram’s parent company, did not respond to a request for comment.

        The move comes one month after Visa and Mastercard cut off payment privileges of TrafficJunky, the advertising arm of Pornhub parent company MindGeek. That followed a federal court ruling in July rejecting Visa’s request to be removed from a case in which MindGeek is being sued for allegedly distributing child pornography and that alleges Visa knowingly facilitated MindGeek’s ability to monetize the illegal content.

    • Freedom of Information / Freedom of the Press

      • NPRIsraeli army says a soldier likely killed a Palestinian-American journalist

        The Israeli army said Monday there was a “high possibility” that a soldier killed a well-known Al Jazeera journalist in May, as it announced the results of its investigation into the killing. But it said the shooting was accidental and no one would be punished.

        Shireen Abu Akleh was killed in May while covering Israeli military raids in the occupied West Bank. The Palestinians blamed Israel for the killing. Israel initially said she may have been killed by militant fire, but later said a soldier may have hit her by mistake during an exchange of fire.

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

  • Gemini* and Gopher

    • Personal

      • Three Questions answere

        I used to have impostor syndrome in my job. I knew I was better at it than some people, but I thought that if I met the real experts I’d be out of my depth. Then one day, out of the blue, I thought “I’m good enough at this.” And since then I’ve felt like it’s ok for me to do it. I’m not an impostor.

      • I am culling those photos…

        I’ve uploaded the ones with decent stock potential to a photo sharing site, licensed under CC BY-SA. It doesn’t solve the problem of taking up space on a hard drive in a warehouse somewhere, but this way at least they can be of use to another human being. Hopefully a non-evil human being.

        I wonder now if they should have been shared under CC BY or CC0. I may never use them, may never have them help me pay my bills, so why place restrictions on someone else being able to do something with it? Maybe this argument is moot. I’m sure if someone wanted to capitalise on those photos without crediting, they’re gonna do it anyway most likely in such a fashion that I’d have no idea it’s happening.

      • I can’t believe I sort of like Frasier

        But this new job feels different. Just the couple of days I’ve done feel light years from where I was with the Psych Department. Maybe I won’t feel the same fatigue. Maybe I can start bringing my diary with me to work and write in it on the way home if I take the Flatiron Flyer. Maybe I’ll feel more like doing things like this (this Gemlog) and playing games and listening to music when I get home. That partly involves work, but also setting more boundaries with Trevor about what I/we do when we are home together at the end of the day. I’m hoping for more parallel play-type scenarios, since he only ever seems to want to be watching something. Maybe I’ll just start sleeping for a couple of hours when I get home, that seemed to help my motivation Friday.

      • Wisdom brings patience, Patience brings wisdom,
      • arguments #0

        The moment when you’re trying to explain something to the person, then that person keeps avoiding the topic by trying to compromise, just to wait for you to say one wrong word and cling into that instead of the argument itself.

    • Technical

      • NixOS Bento: new reporting feature

        Bento received a new feature, it is now able to report if the remote hosts are up-to-date, how much time passed since their last update, and if they are not up-to-date, how long passed since the configuration change.

        As Bento is using SFTP, it’s possible to deposit information on the central server, I’m currently using log files from the builds, and compare this date to the date of the configuration.

        This will be very useful to track deployments across the fleet. I plan to also check the version expected for a host and make them report their version after an update, this should possible for flakes system at least.

      • What is it the Free Software Foundation *does*, exactly?

        The open source and free software movements undoubtedly stem from the philosophy and practices of the Free Software Foundation. The FSF champions the use of such code, and has written a handful of licenses in its over 35 years in operation to ensure the continued proliferation of code that is free to receive, examine, operate, extend, and share.

        There are few issues more central to the FSF’s mission than the log4j debacle. In yet another case among countless others, code released for free, by a handful of unpaid maintainers, has been spread across the entire world, literally. “Apple, Microsoft, Steam, Twitter, Baidu, and Cloudflare” are only a small (but critically important and valuable) handful of companies that rely on this code, according to TNW’s Ivan Mehta[1]. These companies, some of the most massive engineering organizations in the world, have built their software on top of a project maintained by a handful of people in their spare time, and now that the vulnerability has been revealed, those handful of maintainers have spent nearly all their time patching and testing security fixes while the whole Internet breathes down their necks.

        [...]

        It is long past time for the software development community to take a step back and try and figure out how the hell we got to this point. The FSF has been an integral part in ensuring that programmers don’t get paid for their work, and if they *aren’t* responsible for that, then I honestly can’t point to anything they *have* done, and their vaunted position in the software community—and the philosophy that has nurtured the climate we live in today as programmers and users—needs critical re-examination.

      • Internet/Gemini

        • Welcome to my blog !

          My name is Masséna. I’m French, and I am currently a 2d animation student.

          I enjoy making smol games, and drawing smol stuff.

        • Writing about Gemini

          Taking a few to write up a little post on getting set up and using Gemini.

        • The Antenna Time Machine

          I’m sitting here, 7:13pm on Sunday, September 4th, looking at a link on Antenna dated to September 5th.
          We have a time traveler! I have so many questions.

      • Programming

        • Trying to Revive sml_tk

          After the previous post, I intermittently worked on sml_tk. In particular, as mentioned I wrote a usable .smackspec and .use files for package management and build system respectiely. Of interest is that I wrote the .use file to only expose core Tk functionality and not any of the test code or SML extensions.

        • LZR day one

          After writing yesterday’s article, the itch of writing the successor to LZY came stronger. So, for a sleepless night, I put down the basis.

        • Looking back on LZY

          LZY is a small C game framework I built. It was meant to be used as an abstraction layer to help building games for two different targets at once; namely SDL2 and gint. I tried to keep it as simple as possible, while prioritizing ease of use and understanding.

        • Basic photo editing recipes for the command line

          When I started using Linux systems I was initially attracted to the free cost, its lineage of open source software, and the challenge and adventure of using new tools. I still like those things. But more and more I’ve come to realize that those feel closer to personal preferences than clear advantages. Sure, free is nice, but open source software is often maligned as kludgy – awkward interfaces, for example, or tools that don’t quite work without fine tuning your system settings. To be fair, that does occasionally trip me up.

          But one of the huge advantages of Linux that I’ve learned over time is the composability of commands in the command line. With a few terse words you can coax out powerful tools rather than the amount of time searching in GUI software. And more importantly, you can by its very CLI nature automate repetitive tasks, even complex ones.

        • Just clone the source (part 1)

          It is natural for anyone who work with free software to clone git repository of dependency whenever there are any doubts or issues. Source do not lie. It could be more convenient, though. For example, to fetch source repository of “optics” haskell library, I have to open “https://hackage.haskell.org/package/optics” page (and wait for it to load), copy git repository url, open another tab in terminal emulator, type “git clone” and paste repository url. Not fatal, but annoying paper cut.

        • Standard ML in Production

          I have a small backlog of posts to get out, this is the first one.

          I’ve read and enjoyed several blog posts like this. In particular, Prolog was an eye-opener for me. I studied it in college, but didn’t realise until long afterwards that there was an industrial-quality infrastructure and libraries beyond the fragment we learned, perfectly suitable for commercial software development.

          My minor contribution to the genre is for Standard ML. First, I recommend a book, it is much better than this post.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Monday, September 05, 2022

Posted in IRC Logs at 2:42 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmY9ysd5jXRAp5yMbReP12VSDTznK2arSBHHvp8QBkPzZR IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmYn1ifTk59Cbx2DMEMrb6L2TttoZcSFQ4sfMb5G8kkQ82 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmRJHPuCX8k4dqo912Kaj1xurDXkGNtnkYJnVeCcf7UotP IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmTP6Yk4PKFgYkDBf6x4H62j78jMsBJNXe7N1BQZo13qrg IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmVxXVNxFX2RKihXCnJFcmAw1otyVaXYfDRMwdNcBQP4DV IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmNRKdDStdCwQYTS77meV7Bp8PXkCoJfJhCZoJARFkT1z9 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmfRVoQzY18Bq1kaLB1jfMeEBpj9NbJ2nDekYMrra9RqWe IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmSFdMJGgP8SzQhdTHpdd9k5gj3YhHas1cDJQJvd5nchA6 IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmWERMsn1DfZrtyJQLRpzrUSCM3So8WboRGV5qBDKU6pKo

Techrights in Haiku

Posted in Site News at 12:02 am by Dr. Roy Schestowitz

Recent: Techrights Compatible With Computers From 30+ Years Ago

Techrights in Haiku

Summary: The power of standards and open protocols

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts