So, instead of having three separate chat apps running on my desktop, cluttering up the taskbar and system tray, I just installed the Flatpak version of Ungoogled Chromium and am using the web versions of those apps. I keep my regular web browsing in Firefox. I've found this to be optimal. The chat apps I use are Cinny (Matrix client), Discord, Android Messages for Web, Slack, and The Lounge (IRC client).
dns-query-async.py is a tool to perform DNS queries in parallel.
I’m not going to delve into those, as many others have already written about that. Rather, I’m going to dig a bit into some other things I’ve done to make the fonts and images on this blog smaller, and some of the pain points around it.
One of the well-known and generally accepted OpenSSH best security practices is to configure and use public key authentication a.k.a passwordless authentication. Although this approach is fundamentally for security, on a lighter note, it also allows for ease of use because of not having to type a password every time you attempt to log on to your server.
This guide will walk you through the required steps to configure SSH passwordless authentication as well as disable password authentication on openSUSE 15.3.
There isn’t a perfect operating system user experience. We will always run into errors that are user-initiated, OS-initiated, or ones due to the installation or set up of an application package.
The good thing with errors associated with any Linux operating system distribution is that they are solutions in waiting. This article guide will walk us through solving the error “cannot open shared object file” which is somewhat prominent in Linux Ubuntu distributions.
Fedora is a stable and reputable Linux operating system distribution whose developmental credits go to the Fedora Project (Red Hat sponsored). Other companies and organizations also have a role to play in the development of Fedora through additional support and sponsorship.
This article guide will walk us through the upgrading from Fedora 34/35 to Fedora 36 using the Fedora upgrade plugin.
Socat or SOcket CAT is a Linux command-line/terminal-based utility used to establish and transfer data between two bidirectional byte streams.
Although it is not as popular as in previous years, an FTP server is still used in many servers and companies for downloading and transferring files on a network. That is why it is still worthwhile to learn how to set one up. To do so, we will use perhaps the best and most secure of its implementations, such as vsftpd.
In the last post, I told about Understanding Linux system security for Users After reading this post you have knowledge about the Linux file system, and where usernames and passwords are stored in Linux? where you can dump this password? when you dump the password, it will be in plain text or encrypted format? so for finding the password, walkthrough this post Unshadow the file and dump Linux password
thc-hydra is A very fast network logon cracker with a dictionary attack tool that supports many different services. You can use the thc-hydra tool for cracking the password. Many hackers love this tool due to its GUI and Cmdline interface.
If you are new to ethical hacking and don’t know how to use thc-hydra, still you can use it easily due to the GUI interface.
In this tutorial, we will show you how to install SFTPGo on Ubuntu 22.04 LTS. For those of you who didn’t know, SFTPGo software which stands for Secure File Transfer Protocol(SFTP) written in the Go programming language. SFTPGo can be used to run SFTP with added HTTP, WebDAV, and FTP/S support. Furthermore, it supports several storage backends such as S3 (compatible) Object Storage, local filesystem, encrypted local filesystem, Azure Blob Storage, Google Cloud Storage e.t.c
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the SFTPGo on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.
Nano command in Linux is not just a command but it is a text editor. Nano text editor is used to create and edit files, included in most Linux distributions.
It has a very simple interface, Which makes it a great choice for Linux beginners. If you are not pro in Linux then this tutorial is very useful.
I will cover of nano text editor of nano command in Linux with appropriate images.
Today, I am using CentOS 8, So I will show demonstration images on it.
Bottles, the fantastic and fast-moving free and open source application for managing the Wine compatibility layer has a new release out with a new code-name and a refreshed look. It's such a big release internally, they're now calling the releases by Brescia instead of Trento. So, what's new? A lot, as usual.
Two goodies for fans of the open source Heroic Games Launcher today. Those sticking with the stable release get some fixes, and those who want some fun can try out a huge new Beta.
The Wandering Village, a city-builder set on the back of a giant animal is now confirmed to be having Native Linux support at the Early Access release. Created by Stray Fawn Studio, the same team behind Nimbatus - The Space Drone Constructor, Retimed and Niche - a genetics survival game.
A game I really haven't spent enough time with because it's great, Vintage Story is a blocky survival game that's thoroughly challenging and a huge upgrade is out now. Inspired by lovecraftian horror themes, it's definitely one of the more unique open-world survival games around.
Dwerve is a bit of an odd one, blending together elements of a dungeon-crawling action adventure with tower defense and it's out now. Created by Half Human Games, they previously made the space shooter Blacksea Odyssey. Note: key provided by the developer.
With the new 0.25 release of BeamNG.drive, the developers have now put up an experimental Native Linux version for you to try and give feedback.
Striving for Light is a new Native Linux release from Igniting Spark Games, one to check out for ARPG fans who love building up crazy characters.
For those running Qubes 4.0.4 looking to upgrade to 4.1.0, let’s review the upgrade process using a Librem 14. To get started, you’ll need a USB hard drive to store your backup and a USB flash drive to boot the upgrade ISO.
Most file system formats will work as long as they support large files, but you’ll need something more than fat32. If your drive uses fat you’ll need to reformat with ext4, exFAT or NTFS.€ To reformat, install GParted.
Connecting face to face with educators around the world is a key part of our mission at the Raspberry Pi Foundation, and it’s something that we’ve sorely missed doing over the last two years. We’re therefore thrilled to be joining over 1000 computing educators in the USA at the Computer Science Teachers Association (CSTA) Annual Conference in Chicago in July.
Well, that's the way it was done for hundreds of years. In early 1978, I started working on an idea that eventually became VisiCalc. And the next year it shipped running on something new called an Apple II personal computer. You could tell that things had really changed when, six years later, the Wall Street Journal ran an editorial that assumed you knew what VisiCalc was and maybe even were using it.
Steve Jobs back in 1990 said that "spreadsheets propelled the industry forward." "VisiCalc propelled the success of Apple more than any other single event." On a more personal note, Steve said, "If VisiCalc had been written for some other computer, you'd be interviewing somebody else right now."
In machine learning, optimizations algorithms often move towards a local minimum (or maximum) by a process called gradient descent that finds the path of steepest descent. In smaller dimensions, this looks a lot like the path of least resistance.
Consumers often choose products that are on the path of least resistance.
For the past few years I've been working on the async-std library, which provides an async implementation of the APIs exposed by std. However, we also added several new APIs related to things unique to async Rust: concurrency, control over execution, and the interaction between the two.
These APIs were initially introduced in async-std as "unstable", and have been the main focus of my work to design since. On this blog there are numerous posts related to for example: concurrency, cancellation, and parallelism. Today I want to share a new experiment I've been working for time-based operations in async Rust. I've designed it as a stand-alone crate for now, but I intend to PR its addition to async-std in the near future.
Write your idea first. You then have a script to follow, a consistent way to share your story with others. We’re this, not that, here’s why.
The article also states that the pound sign # is more commonly used in North America, which explains a ton of examples in technical documentation that I’ve read of late. I might even prefer it; it’s certainly more succinct.
Joras: What is QUIC? QUIC is the next internet transport protocol. In terms of the more traditional OSI layering model that everyone's probably familiar with, you have application, security, and transport layers. At the very top, you have HTTP semantics. These are things like GET, POST, other things like that, that form the basis of HTTP requests. Under that is the mapping of those semantics to an actual protocol. The one that's existed for a while now is HTTP/2. As you might expect, HTTP/3 being three is the next version and is QUIC specific. Both of these provide things like prioritization and header compression. In HTTP/2 it provides the stream multiplexing. The next layer is the security layer. This is where things start to diverge a little bit. With the traditional stack with HTTP/2, underneath that is usually TLS, and usually TLS 1.3. TLS provides things like authentication, decryption, and generally makes the transport secure for use on the internet. On the QUIC side, you notice that there's not really a clean delineation. This is because TLS is baked into QUIC. Then, what that means is there's only one handshake, there's not like a separate TLS handshake and QUIC handshake, there's just the QUIC handshake. Also, the encryption is done on a per packet basis.
i collect old-ish sewing magazines (mostly 80s) and i wanna scan (at least some of) them. i've posted one from 1987 on my website today, check it out if vintage fashion interests you! it's up on internet archive so you can read it in-browser or download it for all your datahoarding needs.
I don't have much free time at home, due to the busyness of taking care of three little kids. But I got a rare 30 minute break recently, and I used it fix my little indoor dipole antenna for 2 meters. I figured out that a connector was not making contact with another connector. I then dusted off my HF/VHF radio and keyed up the nearby UAF repeater. Unfortunately due to my bad geographical position besides a dirt-bank, and inside an apartment, I cannot key up the more popular KL7KC or KL1AC repeaters, at least at the low power settings I am using.
[...]
I wanted to start writing drivers for a 4x4 keypad matrix. I bought the usual cheap model off Amazon, but got sick of dealing with the cheap solderpads which don't hardly transfer heat, and break off easily. So, I tossed that, and instead bought the Silicone Elastomer keypad from adafruit, which looked nice, along with their I2C interface board for it.
I swear, I oftentimes wonder how when I was 18 years old, I wound up enlisting in the military, and didn't ship off to fine arts school, instead? Failed parenting to the extent that everything that *shouldn't* have been done, DID get done :(
When browsing through the captivating images of the cosmos that we routinely publish you may have asked yourself ‘how did they take this image?’ The answer is… complicated. In this blog post we’ll tell you how these pictures come to be and the role of everyone that makes them possible.
The news has been abuzz lately with the news that a Google engineer — since put on leave — has announced that he believes the chatbot he was testing achieved sentience. This is the Turing test gone wild, and it isn’t the first time someone has anthropomorphized a computer in real life and in fiction. I’m not a neuroscientist so I’m even less qualified to explain how your brain works than the neuroscientists who, incidentally, can’t explain it either. But I can tell you this: your brain works like a computer, in the same way that you building something out of plastic works like a 3D printer. The result may be similar, but the path to get there is totally different.
“There are jobs everywhere,” says Donna Ginther, a professor of economics at the University of Kansas, Lawrence, who studies the scientific workforce. Postdocs in general aren’t paid well, she points out, and amid the current labor shortage, higher paid jobs outside of academia have become more available. “Ph.D.s are looking at the labor market, seeing opportunities out there, and taking them,” she says. “Those skills that we teach our Ph.D. students are in demand.”
However, luck as an explanation didn't get me very far when I looked at other people. The first hint was after I'd seen several instances where, for a given group of people, of a similar age, background, and talents, some ended up being more successful than others. What surprised me was how often my gut feeling about who would go on to do well, or not, turned out to be correct — far too often for luck, mine or theirs, to be a convincing explanation. The second hint was when I realised from reading history that some people were successful multiple times in their lives: it didn't seem plausible to me that all of them had done so purely through luck.
Vejdirektoratet’s figures show that a stretch of road averaging 100 cyclists in 2000 would now average only 94 cyclists.
The lives of 338,000 people who died of COVID-19 could have been saved if the United States had a universal healthcare system. That’s the finding of a new study published in the Proceedings of the National Academy of Sciences of the United States of America. The study also estimates a universal healthcare system would have saved the United States $459 billion in healthcare costs in the year 2020. The study’s lead author, Alison Galvani of the Yale School of Public Health, told Scientific American, “Medicare for All would be both an economic stimulus and life-saving transformation of our health care system. It will cost people far less than the status quo.”
Illegal fishing “negatively affects the livelihoods of people who depend on fisheries in the African coastal countries,” Abdennaji Laamrich, ATLAFCO’s head of cooperation and information systems, said in a report by Ghanaian newspaper Daily Graphic. “Regardless of where we live, the food we eat, and the language we speak, we all rely on the oceans to keep us alive. Illegal, unreported and unregulated (IUU) fishing threatens this vital resource.”
Warren’s Health and Location Protection Act — cosponsored by a slate of Democratic senators, including Sens. Bernie Sanders (I-VT) and Ron Wyden (D-OR) — would bar “data brokers from selling or transferring location data and health data.” There are few limitations, making the bill one of the most strident proposals aimed at regulating data sales.
“Data brokers profit from the location data of millions of people, posing serious risks to Americans everywhere by selling their most private information,” Warren said in a statement on Wednesday. “With this extremist Supreme Court poised to overturn Roe v. Wade and states seeking to criminalize essential health care, it is more crucial than ever for Congress to protect consumers’ sensitive data.”
The YouTube figures account for logged-in users who have viewed at least one Shorts video on the platform in the span of a month, which doesn’t necessarily differentiate between users who are intentionally seeking out Shorts videos or those who accidentally happen upon them when using YouTube.
NordVPN will be shutting down its servers in India from June 26, becoming the third virtual private network provider to pull out servers from India. The move will follow a data demand directive from the government's top cybersecurity agency that goes into effect from June end.
A company spokesperson said it will be removing its servers on June 26, stating that NordVPN will not be able to guarantee privacy for its users.
NordVPN users will start receiving notifications about the shutdown in the app from June 20.
A joint investigation by Reveal from The Center for Investigative Reporting and The Markup found that the world’s largest social media platform is already collecting data about people who visit the websites of hundreds of crisis pregnancy centers, which are quasi-health clinics, mostly run by religiously aligned organizations whose mission is to persuade people to choose an option other than abortion.
Prosecutors allege that Adrian Pena, 48, of Del Rio, Texas, later lied about having used the law enforcement tool, a service operated by Securus Technologies, Inc.
French troops in Mali have captured a senior member of the Sahel affiliate of the Islamic State group, the French military said Wednesday.
In Mali, the United Nations peacekeeping force MINUSMA responded by deploying two units to the tri-border area where Mali, Burkina Faso and Niger converge.
The United Nations condemned the attack that "claimed many victims" in a statement on Monday and called on authorities to bring perpetrators to justice.
Bishop Jude Ayodeji Arogundade of Ondo was responding to a statement issued by Irish president Michael Higgins after the June 5 massacre at St. Francis Xavier Catholic Church in Owo, southwestern Nigeria.
Nor is this bad news limited to Yellowstone. Salon reached out to a number of scientists who agreed that, while it is unclear exactly to what extent the Yellowstone flood was exacerbated by climate change, it is certain that climate change is going to increase the frequency and severity of floods all over the world, making Yellowstone-like events increasingly common. To understand why, one must first understand the dynamics at play in the Yellowstone flood.
Many parts of India are facing an acute shortage of drinking water as rivers are drying up due to heat waves and groundwater is depleted. Delhi Jal Board (DJB) Vice-Chairman Saurabh Bharadwaj recently expressed deep concern over river Yamuna's dipping water levels and urged the Haryana government to release Delhi's share of water in the river to manage the water crisis in the national capital.
Just because there is an inch of undeveloped land and the possibility of another dollar in the pockets of the city, it doesn't mean it has to be built on. Too many people, too much traffic, too much pollution, not enough water. Stop building now!
The average Californian used 83 gallons of water per day in April, compared with 73 in April 2020. That’s far from the 15 percent decrease that Gov. Gavin Newsom has called for as our reservoirs and the snowpack dwindle. (This underperformance has persisted since January.)
Even if it has a low population density, this doesn’t necessarily mean it’s not overpopulated. Population density doesn’t tell the degree of urbanization or population distribution in the state. Although the state is very big, a large part is mountainous, and there’s also a hostile desert in its south. This means the population in the state isn’t evenly distributed. Some parts of the state don’t have as much concentration as others. Five counties, Los Angeles, San Bernardino, Riverside, Orange, and San Diego, contain over 19 million people, about half the state population.
Some answers have started to leak — many of them presumably from the upper echelons of Disney. Sources tell THR there was a group inside the company, including influential CFO Christine McCarthy, who saw Rice as an outsider who never adapted to Disney’s culture. (McCarthy also played a role in ousting Morrell.) But the explanations that have emerged came across as garden-variety power-struggle stuff, well short of explaining the seeming vitriol of the firing. The Wall Street Journal reported on Juneââ¬Â¯13, for example, that there were “tensions with other senior executives” and that Rice had tried to spend unused money in his programming budget. On gambling and drugs? No, to promote Abbott Elementary, Dopesick and Only Murders in the Building. Another apparent sin: Rice’s “British mannerisms” made him seem aloof, the Journal revealed.
In this context, the General Federation of Local Government (FGFC) also demanded official responses to the findings from Taina Bofferding, Minister for Home Affairs, and Emile Eicher, President of the Association of Luxembourg Cities and Municipalities (Syvicol).
And then there are individual NPR stations, so many of which have no reputation for innovation. As consumers find more ways to get NPR in their ears, they have fewer reasons to tune in to their local broadcaster.
This month, the European Union announced a mandate that will require all new portable devices like smartphones, earbuds and wireless keyboards to use a common charger by 2024. Two years later, the same rules will apply to new laptops.
Although the law will be enforced throughout Europe, it may affect consumers worldwide. That’s because it will most likely be costly for tech companies to make products with different charging technology only for European countries.
The advisory did not include the names of those affected by the campaign, nor did it detail the impact it has had. But US officials did point out the specific networking devices, such as routers and switches, that hackers in China are thought to have targeted repeatedly, exploiting severe and well-known vulnerabilities that effectively gave the attackers free rein over their targets.
In the national implementations of the DSA, we must pay close attention that content removal and user surveillance orders are reserved to independent Courts and narrowly limited. And we must now fight all the more passionately for digital civil rights in the negotiations that are still ongoing: in the ePrivacy negotiations, we must fight for a right to encryption and a ‘do not track’ browser setting; regarding the proposal on political advertising, I will campaign for the protection of elections against manipulation relying ondigital surveillance data. We must finally take the digital age into our own hands instead of surrendering it to corporations and authorities!”
He said the government had built a case that was “literally forensically impossible” after singling him out for prosecution as the guilty party during a “political witch hunt” and then working backward to present jurors with “an alternative reality, an upside-down world, a government twilight zone.”
Speaking about the leak, he said, “Someone stole their crown jewels and they failed to realize that for an entire year. It’s not a good look for the CIA.”
The so-called “Vault 7” material that was published by WikiLeaks in 2017 showed, in part, how the agency could [break into] smartphones in spying operations abroad and detailed its attempts to turn certain televisions into listening devices.
Schulte told jurors the [cracked] information was kept in a space so unsecure it was nicknamed “the wild wild west by the programmers who worked on it.”
The staff writer Patrick Radden Keefe recently published a piece about Joshua Schulte, a former C.I.A. [cracker] who has been accused of the largest leak in the agency’s history. The newsletter editor Jessie Li spoke to Keefe about what it was like to go inside the world of the C.I.A., and what to expect from Schulte’s new trial, in June.
Joshua Schulte, 33, worked for the CIA’s engineering development programme called the operations support branch, which created [cracking] tools for cyberspying. He is on trial in New York for spying, charged with handing more than two billion pages of secret data to WikiLeaks in April 2016.
His first trial, in February 2020, ended with a hung jury on the most serious charges.
The so-called Vault 7 leak revealed how the CIA hacked Apple and Android smartphones in overseas spying operations and efforts to turn internet-connected televisions into listening devices.
Prior to his arrest, Schulte worked as a coder at the agency’s headquarters in Langley, Virginia.
Janine Jackson interviewed Steffie Woolhandler about Covid and health insurance for the June 10, 2022, episode of CounterSpin. This is a lightly edited transcript.
In an internal memo from late April obtained by The Verge, the Meta executive in charge of Facebook, Tom Alison, spelled out the plan: rather than prioritize posts from accounts people follow, Facebook’s main feed will, like TikTok, start heavily recommending posts regardless of where they come from. And years after Messenger and Facebook split up as separate apps, the two will be brought back together, mimicking TikTok’s messaging functionality.
Rehmat Masih has been in prison for five months and his family threatened. He had refused to convert to Islam. They blame him for some pages of the sacred text of Muslims found in the sewer drain, but there is no evidence against him.
An exploding tire led the driver of the unmarked police car carrying Vilks to lose control over the vehicle, which crashed head-on with a truck on Oct. 4, Swedish authorities said in a statement. The crash killed three people, including the 75-year-old cartoonist.
Since Vilks was facing death threats for his drawings and had faced previous attempts on his life, the crash raised the question of whether the crash was a terror attack instead of an accident.
On Saturday, renowned international human rights lawyer Jennifer Robinson announced a settlement with the British government over its surveillance of her while she has acted as a legal representative of persecuted WikiLeaks publisher Julian Assange.
The Dicle Fñrat Journalists Association (DFG) and the Mesopotamia Women Journalists Platform (MKGP) made a statement in front of Diyarbakñr Courthouse in solidarity with 22 people, 20 of them being journalists, who were detained in the city 8 days ago and referred to the prosecutor’s office today to give their statements.
Colleagues of the detained journalists, families, representatives of non-governmental organizations (NGOs) and political parties participated in the event, displaying a banner that read "You Can't Silence Us".
The new tour is called the LIV Golf International Series. It’s a classic case of idiotic “sportswashing” by the Saudis, with help from some soulless professional golfers. In my view, it is terrible for golf and even worse for the Saudis. It is only drawing attention to what the Saudis are trying to get people to forget — the 2018 murder of Saudi journalist Jamal Khashoggi — rather than what they want people to embrace — Saudi Arabia as a future sports and entertainment mecca.
The list includes high-profile journalists, news anchors, editors and senior managers, including the editors-in-chief of the Times, Daily Telegraph, Independent and Guardian newspapers.
Moscow had promised to retaliate for foreign sanctions against Russian officials and bans on Russia media overseas.
It has already barred dozens of U.S. and Canadian officials and journalists from entering.
I've always been rubbed the wrong way by phrases like "white privilege" and so forth. I mean, privilege is usually something that a person can easily relinquish, not a thing that is entirely outside of the control of an individual. I don't talk about "sighted privilege" for instance. I suppose sighted people can easily relinquish their "sighted privilege" by gouging out their eyes, but I don't recommend it. Terms like "x privilege" or "y privilege" sound accusatory, with the accusation falling on an individual, and not a society. Despite arguments over language, the whole thing, be it white privilege, male privilege, sighted privilege, whatever, this shit really does exist.
The victim’s family claim that Abdullah is an extremist who has a history of harassing and assaulting Christians.
The suspect was also arrested, said a media report. The Hindu girl was rescued from the Singhoi area within the limits of the Chotala police station of Jhelum.
President Joe Biden nominated consumer advocate Gigi Sohn to the Federal Communications Committee last October, yet the Senate has still failed to bring her nomination to a vote (FAIR.org, 4/19/22). Behind the scenes, corporate media, afraid of having a staunch defender of the public interest on the commission, are lobbying against her. One of those corporations, Comcast, owns a major cable news network that has been conspicuously silent about the stalled nomination.