if the user wants to know who or what is lurking behind the house… the user needs to view live streams of surveillance cams on GNU Linux. mplayer does the job nicely 🙂 (thanks all involved!) of course 99% of […]
“floating point arithmetic is considered an esoteric subject by many people” (src: What Every Computer Scientist Should Know About Floating Point Arithmetic – David Goldberg 1991.pdf) some even do “transcendental calculations” (src) make no mistake: computer make mistakes too! not […]
if hfs+ is greyed out in gparted there is hfs+ compatibility software missing hint: sudo should be up and running, or gparted won’t be able to open a display (as root) and won’t be able to create partitions (as non […]
SecurityLab, [02.11.20 11:52] The 50-year-old businessman (Hunter Biden?) in April 2019 brought his device to the IT store Mac Shop in Delaware for repair, but never returned to pick it up. The device was soon seized by the FBI. According […]
“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
hostnamectl; # tested on Static hostname: hpServerG6 Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-12-amd64 Architecture: x86-64 su – root; apt update; apt install qemu-kvm libvirt-clients libvirt-daemon-system bridge-utils virtinst libvirt-daemon virt-manager usermod -a -G libvirt user; # give user […]
to recover the data: how to mount luks2 encrypted volume possibility: remove harddisk, attach to sata2usb adapter, then mount on different machine like this: # unlock encrypted harddisk udisksctl unlock -b /dev/sdb5 udisksctl mount -b /dev/mapper/ubuntu–vg-root Mounted /dev/dm-1 at /media/dpm/e8cf82c0-f0a3-41b3-ab28-1f9d23fcfa72 […]
update: while this benchmark is still valid, very simple, very cross platform, with a focus on the team cpu (why is there no multi core md5? (putting many many core arm servers at disadvantage) + harddisk (two very important components) […]
“Better Than Nothing” Starlink-Beta started across the US & Canada Starlink: amazing but and also a bit “crazy” “On 15 October 2019, the United States Federal Communications Commission submitted filings to the International Telecommunication Union on SpaceX’s behalf to […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
Bitcoin’s annual electricity consumption adds up to 45.8 TWh (45.800.000.000 kWh) The corresponding annual carbon emissions range from 22.0 to 22.9 MtCO2 This level sits between the levels produced by the nations of Jordan and Sri Lanka src: https://www.sciencedirect.com/science/article/pii/S2542435119302557 a […]
(plain) text is (still) the universal “interface” or “format” processing, viewing, diffing text is important to stop small changes in otherwise extensive and identical config files. the heavy weight eclipse gui diff: an optical nice diff brings the otherwise slow […]
“Knights, Orks and Skeletons (of course)” Severance Blade of Darkness (2001) is an very very old (almost 20 (!!!) years now) open world adventure game almost a “Lara Croft” in “the middle ages” meeting Orks from “Lord of the Rings” […]
ffmpeg / avconv is pretty nice. it can even do mp4 to gif conversion! 🙂 so what the user can do is: use SimpleScreenRecorder, to record a fixed rectangle of the screen to mp4 and then use ffmpeg / avconv […]
in short: STAY AWAY FROM IT! all in all this mp3 player is a waste of resources and the user’s time (unless someone comes along and fixes the firmware X-D (but the playback problem could also be “in hardware”)) what […]
Connection refused nothing has changed on server or client side so was the server hacked? NO! the solution is way more simple: the guest wifi might block ssh traffic give it a try: if not even telnet can get at […]
JavaScript can compromise the user’s network devices! pretty evil are devices/routers with security problems, that can be exploited from javascript. so basically opening a webpage with a browser that has javascript enabled (which most browsers have) might scan the user’s […]
Statistics By Project Statistics Last Updated: 8/17/20 00:06:03 (UTC) [9 hour(s) ago] Project Points Generated Results Returned Total Run Time (y:d:h:m:s) Badges Earned OpenPandemics – COVID-19 project website Scripps youtube channel Problem COVID-19 is a disease caused by SARS-CoV2, a virus […]
finally summer and climate change have both reached Europe and had several weeks of 30 C straight… without ventilation, anything above 30 is just “too much to think” (so maybe the brain CPU also would need active cooling?) of course […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
first some praise: the maintainers of grub did their best they could to bring about a great piece of software, no doubt about that. the question is: could less be more? when Greg Kroah-Hartman (can’t find the source) suggested to […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
the for loop when the user wants a command to be run exactly x times for i in $(seq 1 5); do echo $i; done # for example generate a file with 1 million lines # and messure the time […]
The Great A.I. Awakening: A Conversation with Eric Schmidt Feb 23, 2017 as user might have noticed, the battle Amazon vs Microsoft who will get the $10Billion DoD cloud computing contract is still hot. And maybe the contract is split. […]
SecurityLab, [04.06.20 15:05] The Chinese-language cybercrime group Cycldek (also known as Goblin Panda or Conimes) has developed the malicious tool USBCulprit to carry out attacks on physically isolated systems and steal confidential data. Cycldek APT has developed a malware for […]
the nice: NAT is nice as it provides some form of protection/shielding of vms from the internet, by placing the host between (doing all the fire walling) the problem: server is exposed to regular dovecot and exim password bruteforce attempts, […]
KEEP BLUETOOTH OFF AT ALL TIMES! (switch it on when you need it and off when done (file transfer etc)) also saves energy on phones does usage of stylish ear bud bluetooth headsets increases security risk? (Bluetooth permanent on) this […]
versus is the wrong word. They are both great great GNU Linux distributions with a different focus and imho the perfect combination. Debian (apt based) “the universal operating system” (because has great hardware compatibility amd64 (64Bit intel) arm64 armel armhf […]