136 private links
I’ve been writing about running Docker on Raspberry Pi for five years now and things have got a lot easier than when I started back in the day. There’s now no need to patch the kernel, use a bespoke OS, or even build Go and Docker from scratch.
Ncdu is a command line tool to view and analyse disk space usage on linux. It can drill down into directories and report space used by individual directories. This way it is very easy to track down space consuming files/directories. It actually allows the user to do this much faster than even a gui file manager. On the server ofcourse gui tools are not present.
The decision in 2017 to move back to a monolith considered all the trade-offs, including being comfortable with losing the benefits of microservices. The resulting architecture, named Centrifuge, is able to handle billions of messages per day sent to dozens of public APIs. There is now a single code repository, and all destination workers use the same version of the shared library. The larger worker is better able to handle spikes in load. Adding new destinations no longer adds operational overhead, and deployments only take minutes. Most important for the business, they were able to start building new products again. The team felt all these benefits were worth the reduced modularity, environmental isolation, and visibility that came for free with microservices.
SSHHeatmap
Generates a heatmap of IPs that made failed SSH login attempts on linux systems, using /var/log/auth.log to get failed attempts. Uses the ipinfo.io library to fetch the IP address coordinates, and folium to generate the heatmap
The xpipe command reads input from stdin and splits it by the given number of bytes, lines, or if matching the given pattern. It then invokes the given utility repeatedly, feeding it the generated data chunks as input.
You can think of it as a Unix love-child of the split(1), tee(1), and xargs(1) commands.
It's usefulness might best be illustrated by an example. Suppose you have a file 'certs.pem' containing a number of x509 certificates in PEM format, and you wish to extract e.g., the subject and validity dates from each.
The openssl s_client(1) utility can only accept a single certificate at a time, so you'll have to first split the input into individual files containing exactly one cert, then repeatedly run the s_client(1) command against each file.
And, let's be honest, you probably have to google how to use sed(1) or awk(1) to extract subsequent blocks from a flip-flop pattern.
xpipe(1) can do the job for you in a single command:
In this letter, the minister agrees to the principle of Free Software by default ("Open Source by default") for procurement, which can be considered a parallel to the 'comply or explain' policy that is already in effect for the adoption of open standards. The minister also agrees to the government actively developing and publishing Free Software.
As part two (see previous attempt) of my ongoing series in ‘computational necromancy,’ I’ve spent the last year and a half or so constructing my own 1/10-scale, binary-compatible, cycle-accurate Cray-1. This project falls purely into the “because I can!” category – I was poking around the internet one day looking for a Cray emulator and came up dry, so I decided to do something about it. Luckily, the Cray-1 hardware reference manual turned out to be useful enough that implementing most of this was pretty straightforward. The Cray-1 is one of those iconic machines that just makes you say “Now that‘s a super computer!” Sure, your iPhone is 10X faster, and it’s completely useless to own one, but admit it . . you really want one, don’t you?
Play Fortress battles from the comfort of your home
"Protesting is a non-essential activity." That's what the police said.
Humans are complex beings, and we are capable of holding more than two thoughts in our minds at once. That's how I'm able to recognize that these protestors were, at best, the unwitting patsies of a bigoted death cult — while also acknowledging that a police department deeming protest as "non-essential" is, at best, dumb, and at worst, utterly horrifying.
Resource monitor that shows usage and stats for processor, memory, disks, network and processes.
What Should the US Federal Government and the States Do to Fight the Coronavirus
Die Novelle soll am Dienstag im Nationalrat beschlossen werden. Die Änderung des Epidemiegesetzes, die ohne Ankündigung im Gesundheitsausschuss von ÖVP und Grünen beschlossen wurde, schlug zuletzt hohen Wellen. Die Opposition kritisierte, dass die Bestimmung, die künftig erlaubt, Veranstaltungen auf „bestimmte Personengruppen“ zu beschränken, bedeute: Andere Personengruppen, etwa CoV-Risikogruppen und Personen, die keine App installiert haben, werden ausgeschlossen.
security.tls.version.min specifies the minimum required protocol version (thus, the lowest version allowed to fall back to when higher versions are not available).
security.tls.version.max specifies the maximum supported protocol version (thus, the highest version to initiate a connection with before falling back to lower versions).
0
SSL 3.0 is the minimum required / maximum supported encryption protocol. (Default up to FF/TB 33.0 and SM 2.30 for minimum version.)
1
TLS 1.0 is the minimum required / maximum supported encryption protocol. (This is the current default for the minimum required version.)
2
TLS 1.1 is the minimum required / maximum supported encryption protocol.
3
TLS 1.2 is the minimum required / maximum supported encryption protocol. (This is the current default for the maximum supported version.)
Malte Engler dekonstruiert den Mythos einer Freiwilligkeit für Corona Tracing Apps als notwendig.
Let me add some technical things to this blog and talk a little bit about the things I learned while preparing our own Youtube live streams.
This video will show you How to make a Bluetooth Cassette Adapter
You can buy similar products on Amazon or Aliexpress:
Experts from epicenter.works, noyb.eu and SBA Research evaluated the Austrian Red Cross' "Stopp Corona" app for data security and privacy. No critical security gaps were found, but some potential for improvement in data protection implementation was identified.
Many recommended improvements have already been implemented by the Austrian Red Cross. Within the existing system, some of these have already been implemented, others require long-term changes - including by Apple and Google.
The Austrian Red Cross and Accenture GmbH have provided the source code of the Stopp Corona app (version 1.1) to epicenter.works, noyb.eu and SBA for an analysis in order to check the software with regard to IT security, data protection and legal aspects. The analysis was free of charge.