5 approaches to learning Python | Opensource.com
Whatever your learning style, there’s a resource for learning Python designed just for you. Here are five popular options.
learning  python  opensource 
8 hours ago
Lion's Commentary on UNIX 6th Edition with Source Code
Ihr kennt möglicherweise das Buch "Lion's Commentary on UNIX 6th Edition with Source Code" von John Lions. Das gibt es jetzt auch online. Und zwar in hübsch aufbereitet: Wenn man in der linken Hälfte – dem Textteil – auf die gerade erläuterte Quellcodezeilennummer klickt, wird die passende Quellcodestelle in der rechten Hälfte des Browserfensters dargestellt.
unix  book  ebook  history 
10 hours ago
Google Online Security Blog: Securing communications between Google services with Application Layer Transport Security
How google secures production traffic between services. (Kommentar @gplus: If you're interested in building something like this yourselves, check out spiffe.io)
2 days ago
The Internet of Shit is so manifestly insecure that people are staying away from it in droves / Boing Boing
In Deloitte's new 2017 Global Mobile Consumer Survey, the company notes that "connected home systems—a category that includes home security, thermostats, and lighting—continue to lag behind other connected devices such as entertainment systems and connected vehicles," which the report attributes to "concerns about security and privacy."
2 days ago
USB Spy Cables
4 days ago
Dirk von Gehlen: Warum ich die Kopie lobe – iRights.info
Dirk von Gehlen, Journalist und Chefredakteur von jetzt.de, beschäftigt sich in seinem jetzt erschienenen Buch „Mashup: Lob der Kopie” mit den kulturellen Folgen der – nicht nur digitalen – Kopie. Seine These: Kopieren ist eine allgegenwärtige, aber abgewertete Kulturtechnik. In Zeiten der digitalen Kopie gilt es das zu überwinden.
5 days ago
LessigLinks - LessigWiki
This page is for links to repositories of LL's work and appearances. Links to item relating to issues related to LL's work should go here if there isn't any more specific page to put them on. Use reverse chronological order so more recent links come first.
larry-lessig  talk  video  xrefs 
5 days ago
GIMPS - Free Prime95 software downloads - PrimeNet
Any modern personal computer with Windows, Mac OS X, Linux, or FreeBSD can participate. The How it Works page answers many questions you may have before downloading the software. You must also agree to the GIMPS free software license. -==- Prime95 has been a popular choice for stress / torture testing a CPU since it's introduction, especially with overclockers and system builders. Since the software makes heavy use of the processor's integer and floating point instructions, it feeds the processor a consistent and verifiable workload to test the stability of the CPU and the L1/L2/L3 processor cache. Additionally, it uses all of the cores of a multi-CPU / multi-core system to ensure a high-load stress test environment.
hardware  primes  software 
5 days ago
Sony MDR-1000X im Test: Perfekte Alternative zum Bose QC 35 - NETZWELT
Wer auf der Suche nach einem Bluetooth-Kopfhörer mit aktiver Geräuschunterdrückung (ANC) ist, landet meist bei Bose. Das Noise Cancelling des QC 25 und QC 35 funktioniert erstaunlich gut. Doch gerade hier und nicht nur hier punktet auch der neue Sony MDR-1000X im Test. Haben wir hier gerade den neuen Testsieger auf dem Kopf?
hardware  sound  sony  kopfhörer 
6 days ago
Contrast Rebellion - to hell with unreadable, low-contrast texts!
Clearly, aesthetics are important but aren't the ultimate goal of design. And often poor readability doesn't get noticed during the design process, as we are not like our users. We don't read the texts as a visitor does.
waccessibility  design  typography  usability  webdesign 
7 days ago
#heiseshow: DSGVO und Noyb – Bekommt Europas Datenschutz jetzt Zähne?
Immer donnerstags um 16 Uhr diskutieren wir in der #heiseshow mit Gästen über aktuelle Ereignisse aus der Hightech-Welt und der Netzpolitik [http://pca.st/Jd3n]
podcast  heise  2fhg 
7 days ago
Wie die Kontroverse um das Google-Manifest aus dem Ruder lief
Es geht Damore überhaupt nicht um Antifeminismus, sondern um die Frage der angemessenen Vertretung der verschiedenen Gruppen in der Firma. Er schreibt, man solle über Unterschiede bei diesen Gruppen reden. Tue man dies nicht, gebe es keine echte Lösung. Die aktuelle Repräsentation der Geschlechter ist seines Erachtens nicht richtig, weshalb er für ein Arbeitsumfeld plädiert, das nicht das Kollektiv, sondern den Einzelnen in den Mittelpunkt stellt. Frauen könne durch flexiblere Arbeitszeiten geholfen werden. Größere Gruppen und soziale Kompetenzen berücksichtigende Tätigkeiten könnten helfen, den Anteil der Frauen zu erhöhen, und Männer sollten aus ihren erfolgsorientierten Rollenbildern ausbrechen können.
google  googlem 
8 days ago
SONY MDR-1000X - Hilfe
Verwenden Sie dieses Handbuch, wenn Probleme oder Fragen auftreten.
hardware  audio  sony  kopfhörer 
8 days ago
Shariff: Social-Media-Buttons mit Datenschutz | c't Magazin
Mit Shariff schützen Webseiten-Betreiber die Privatsphäre ihrer Besucher vor der übertriebenen Neugierde sozialer Netzwerke wie Facebook, Google+ und Twitter. Für die Besucher reicht ein Klick, um eine Seite mit Freunden zu teilen. -==- Mit Shariff können Sie Social Media nutzen, ohne Ihre Privatsphäre unnötig aufs Spiel zu setzen. Das c't-Projekt Shariff ersetzt die üblichen Share-Buttons der Social Networks und schützt Ihr Surf-Verhalten vor neugierigen Blicken. Dennoch reicht ein einziger Klick auf den Button, um Informationen mit anderen zu teilen. Sie müssen hierfür nichts weiter unternehmen – der Webmaster hat sich bereits um alles gekümmert.
datenschutz  facebook  social-media  webdesign  webmaster 
8 days ago
RIP Lightroom 6: Death by subscription model: Digital Photography Review
With a subscription model, that's no longer true. Instead you end up paying for support for ever more cameras you don't have and features you don't necessarily want, in the knowledge that you'll lose most of the software's capability if, for whatever reason, you don't choose to continue your subscription. The idea that your existing work becomes less controllable, less dynamic, is uncomfortable.
lightroom  adobe  fotografie 
8 days ago
TeamViewer Rushes Fix for Permissions Bug | Threatpost | The first stop for security news
The bug impacts Windows, macOS and Linux versions of TeamViewer. A patch for macOS and Linux versions of the software are expected late Tuesday or Wednesday, said Axel Schmidt, senior PR manager for TeamViewer. -==- This proof-of-concept vulnerability, allows an attacker to gain control of the presenter’s session or the viewer’s session without permission, said TJ Nelson, security researcher with Arbor Networks and the ASERT Research team that reviewed the PoC.
9 days ago
Firmware-Bug: Codeausführung in deaktivierter Intel-ME möglich - Golem.de
Wie bereits vor Monaten von den Forschern angekündigt, können sie auf der Version 11 der ME über einen lokalen Exploit beliebigen unsignierten Code ausführen. Die Forscher zeigten in einem Demovideo, wie sie damit einen Rechner komplett übernehmen können.
intel  security  insecurity  hack  hardware 
9 days ago
(Virtually) No one should ever own an Echo or any other "voice assistant" product / Boing Boing
If you buy one of those intrinsically insecure, always-on "smart speakers" from Google, Amazon, Apple or other players, you're installing a constantly listening presence in your home that by design listens to every work you say, and which is very likely to suffer at least one catastrophic breach that allows hackers (possibly low-level dum-dums like the ransomware creeps who took whole hospitals hostage this year, then asked for a mere $300 to give them back because they were such penny-ante grifters) to gain access to millions of these gadgets, along with machine-learning-trained models that will help them pluck blackmail material, credit card numbers, and humiliating disclosures out of the stream of speech they're capturing.
surveillance  security  2fhg 
9 days ago
New Algorithm Repairs Corrupted Digital Images in One Step | College of Computer, Mathematical, and Natural Sciences
Technique uses the power of artificial neural networks to address several types of flaws and degradations in a single image at once
image  tool  ai  neural-net 
10 days ago
The Untold Story of Japan's First People - SAPIENS
In the 20th century, Japanese anthropologists and officials tried to hide the existence of the Indigenous Ainu. Then the Ainu fought back like their cousins, the bears.
culture  history  japan  politik 
10 days ago
Apple iOS 11 security 'downgrade' decried as 'horror show' • The Register
Ability to reset iTunes Backup passwords unravels layered protection, claims researcher
apple  ios  bug  security 
10 days ago
ASN.1 key structures in DER and PEM - Knowledge Base - mbed TLS (Previously PolarSSL)
Everybody loves PEM and the very documented ASN.1 structures that are used in saving cryptographic keys and certificates in a portable format. Well.. Everybody would if they would actually be documented. But it is rather a big feat to find what the structure is inside each DER or PEM formatted file.

As we need this information, we will share it here as well, to help others in their quest for knowledge and understanding ;)
certificate  openssl  knowhow  pki 
10 days ago
Praktische Tipps für die Arbeit mit OpenSSL - Export, Import, Transfer der Formate
SSL-Zertifikate sind für alle Plattformen bestimmt und von Zeit zu Zeit ist es erforderlich, das Zertifikat zwischen Servern zu übertragen oder mit ihm auf eine andere Weise zu arbeiten. Besitzer der GeoTrust- und RapidSSL-Zertifikate können ihr Zertifikat für mehrere Server verwenden, die Anleitung für den Transfer der Zertifikate kann für sie also sicherlich nützlich sein.
certificate  conversion  howto  openssl  pki 
10 days ago
Every grain of sand is a met­ro­polis for bac­teria | Max Planck Society
Just ima­gine, you are sit­ting on a sunny beach, con­ten­tedly let­ting the warm sand trickle through your fin­gers. Mil­lions of sand grains. What you prob­ably can't ima­gine: at the same time, bil­lions upon bil­lions of bac­teria are also trick­ling through your fin­gers. Between 10,000 and 100,000 mi­croor­gan­isms live on each single grain of sand, as re­vealed in a study by researchers from the Max Planck Institute for Marine Microbiology in Bremen. This means that an in­di­vidual grain of sand can have twice as many res­id­ents as, say, the city of Fairb­anks, Alaska!
biologie  mikrokosmos  umwelt 
10 days ago
Lesempfehlung: Adrian Tchaikowsky - CHILDREN OF TIME - PhantaNews
Was der Bri­te Tchai­kow­sky hier ab­ge­lie­fert hat, reiht sich in sei­ner In­no­va­ti­on und Ge­nia­li­tät pro­blem­los bei ei­ni­gen der größ­ten Klas­si­ker des Gen­res aus den 1960er bis 1980 Jah­ren ein.
biblio  rezension  science-fiction 
10 days ago
SSH Can Do That? Productivity Tips for Working with Remote Servers | Smylers [blogs.perl.org]
SSH has many features which are helpful when working regularly with files on remote servers; together they can give a vast increase in productivity over the bare use of SSH. If you regularly use SSH, it’s worth spending a little time learning about these and configuring your environment to make your life easier.
linux  ssh  knowhow 
11 days ago
Once again: if you carry a sensor of any kind, you must assume it's active
Once again: If you carry a sensor of any kind, you must assume it to be active and collecting data, you can’t trust pinky promises
privacy  security  surveillance  mobile 
11 days ago
​Computer vendors start disabling Intel Management Engine | ZDNet
Intel has admitted that its in-chip Intel Management Engine program has major security holes. Some PC vendors are now disabling Management Engine to protect their customers.
hardware  intel  insecurity 
11 days ago
Blockchain Graveyard
These cryptocurrency institutions have suffered intrusions resulting in stolen financials, or shutdown of the product. Nearly all closed down afterward. 

Nearly every attack could have been prevented: […]
11 days ago
Waterfox | heise online
Alternative zum "modernen" Firefox.
browser  firefox 
11 days ago
The Vortex: why we're all to blame for the nightmare of online debate | Media | The Guardian
When we feud over Trump or Brexit, it’s easy to believe our in-group is the lone voice of sanity. But our tribalistic clashes send us spiralling deeper into the void
social-media  psychology 
13 days ago
The hole in economic theory: Natural capital accounting

Much of modern economics is little more than neomercantilism, burning down centuries, millennia, and even billions of years of natural capital accumulation, to produce a few decades of liquidity flow.

Oh, and the final other twist, which again has probably been there since the Nile salt plains flooded but is especially urgent post-WW2?

You can do things, lots of clever things, that in the short term and locally 'increase productive capacity' but in the long term and far away actively DESTROY productive capacity.

Pollution, CO2, species extinction, shredding the social fabric. All these are HUGE net planetary 'capital losses' but marked up financially as 'capital gains'.

One of several long and interesting threads today on Mastodon.

14 days ago
Testing the Waters: How to Perform Internal Phishing Campaigns | Linux Journal
Phishing is one of the most dangerous threats to modern computing. Phishing attacks have evolved from sloppily written mass email blasts to targeted attacks designed to fool even the most cautious users. No defense is bulletproof, and most experts agree education and common sense are the best tools to combat the problem. The question is how can you safely test your users to determine their response? The answer in most cases is a phishing campaign—an ongoing attempt to test your own users on these types of risks.
phishing  security  2fhg 
14 days ago
Linux Journal | The Original Magazine of the Linux Community
Through the years, I've used all sorts of router and firewall solutions at home and at work. For home networks, I usually recommend something like DD-WRT, OpenWRT or Tomato on an off-the-shelf router. For business, my recommendations typically are something like a Ubiquiti router or a router/firewall solution like Untangled or ClearOS. A few years ago, however, a coworker suggested I try pfSense instead of a Linux-based solution. I was hesitant, but I have to admit, pfSense with its BSD core is a rock-solid performer that I've used over and over at multiple sites
pfsense  firewall  freebsd  security  linux 
14 days ago
Drohnen: EU-Gremien einigen sich auf Pflicht zur Registrierung | heise online
"Gefährliche" zivile Drohnen und ihre Betreiber müssen sich in der EU künftig behördlich eintragen lassen, die Datenschutzbestimmungen werden verschärft. Darauf haben sich Unterhändler aus dem EU-Parlament und dem Rat verständigt.
copter  recht  2017 
15 days ago
Die Kriegsmaschinen sind da - Ausland: Standard - thunertagblatt.ch
An der Grenze zwischen Süd- und Nordkorea hat die Kriegsführung der Zukunft begonnen. Killer­roboter bewachen im Auftrag Südkoreas den Todesstreifen zwischen den verfeindeten Staaten. Konstruiert wurden die Maschinen von Samsung: Die Apparate beobachten Gebiete, identifizieren Eindringlinge und können das Feuer eröffnen. Alles automatisch – alles autonom. Menschen spielen bei der Entscheidung über Leben und Tod keine Rolle.
robotik  drohne  2fhg 
15 days ago
Todo: Nextcloud durch eigenes Interface ersetzen?
app  opensource  security  password 
16 days ago
Understanding Gmail and CSS Part II: Images & More
This article will dive into some of the challenges that designers grapple with when their campaigns are viewed in Gmail.
css  email  gmail 
16 days ago
Understanding Gmail and CSS: Part 1 – Litmus Software, Inc.
In this two-part series, we take a look at everything you need to know about Gmail and CSS:
css  gmail  email 
16 days ago
Three quarters of Android apps track users with third party tools – study | Technology | The Guardian
More than three in four Android apps contain at least one third-party “tracker”, according to a new analysis of hundreds of apps. -==- The study by French research organisation Exodus Privacy and Yale University’s Privacy Lab analysed the mobile apps for the signatures of 25 known trackers, which use various techniques to glean personal information about users to better target them for advertisements and services. -==- Among the apps found to be using some sort of tracking plugin were some of the most popular apps on the Google Play Store, including Tinder, Spotify, Uber and OKCupid. All four apps use a service owned by Google, called Crashlytics, that primarily tracks app crash reports, but can also provide the ability to “get insight into your users, what they’re doing, and inject live social content to delight them”.
data-dealer  app  tracking  android 
17 days ago
“Slaughterbots” and Other (Anticipated) Autonomous Weapons Problems - Lawfare
The Future of Life Institute recently released “Slaughterbots,” a seven-minute video that looks like an episode of Black Mirror (a science-fiction anthology show focused on technology-induced nightmares). It describes a near future where a defense contractor develops small autonomous unmanned aerial vehicles (UAV), the same size as a small toy and armed with a small, explosively formed penetrator (a small explosive which drives a small piece of metal though its victim’s skull). In short, a “slaughterbot.”
copter  security  face-id 
17 days ago
Use the hidden powers of the w3m textmode webbrowser | box.matto.nl
Most people will use graphical browsers like Firefox, Vimprobable or even Google Chrome. Textmode webbrowsers seem to be old fashioned, however they do have many advantages. -==- The most important advantages of textmode webbrowsers are: very fast -- very high readability -- focussed on what really matters (no distracting flashing images, no distracting google-ads) -- clean display (no unnecessary elements on your screen, every pixel counts) -- works in a text only environment too (so can be run from within Gnu Screen or on a remote box from a ssh connection) -==- There are many good textmode webbrowsers. Elinks had been my favorite browser for many years.
browser  w3m  howto  shortcuts 
17 days ago
Beispiel für die Zusammenführung fraktaler Interessensgruppen dank Vernetzung.
17 days ago
How to enable the root user on your Mac or change your root password - Apple Support
The user account named ”root” is a superuser with read and write privileges to more areas of the system, including files in other macOS user accounts. The root user is disabled by default. If you can log in to your Mac with an administrator account, you can enable the root user, then log in as the root user to complete your task.
osx  security  2fhg 
17 days ago
OSX, Perl, Curses, and @INC | Unfinished Bitness
Each time an upgrade to OS X comes along, I end up have to go through a whole mess of updating Perl modules. Why? I made the mistake of writing a utility in Perl that relies on several CPAN modules, including Curses, Curses::UI, Mac::iTunes::Library, and File::HomeDir. At the time I wanted to learn to use Curses. I should remake this utility in something else, but when Perl is working the utility works like I need it to. The utility allows me to sync playlists from my iTunes library to SD cards, without the chore of manually moving them around.
curses  perl  osx 
17 days ago
« earlier      
2017 2fhg @goodie @toread accessibility admin ai ajax android animation apache apple architecture art article articles artikel artist audio authentication backup biblio blog bogard bonn book books botanik browser cartoon certificate cgi coding collaboration comic common-lisp community cool critique cryptography css culture database datenschutz debian del.icio.us design deutsch development dhtml dns documentation ebook editor emacs email encoding encryption ernährung essay essen faq filesystem firefox flash forum foto fotografie framework frankreich free fun funny gallery game garten geek generator geschichte gesundheit google gpg graph graphics gtd hack hal-faber hardware hausbau heise history howto html humor identity image imagemagick interview itunes java javascript knowhow kochen kunst lang:fr language latex library linux lisp literature lvm mac macintosh mailing-list map math microsoft mta mua museum music musik mysql networking newsticker opensource openssl opinion oreilly osx palm paper password pdf people perl pflanzen pgp philosophy photography php pki politik portal postfix privacy productivity programming proxy psychology python random recht reference region religion research resource review rfid robots.txt ruby satire science scripting sdw security software spam sprache ssh ssl standard stock sysadmin technology tim-oreilly tips tool tools tour tutorial typography ubuntu umwelt unicode unix urlaub usability usenet utility via:usenet video visualization web web2.0 webdesign webmaster wiki wikipedia win32 writing wwww xml xrefs ökologie

Copy this bookmark: