4736
pure-bash-bible/README.md at master · dylanaraps/pure-bash-bible · GitHub
The goal of this book is to document known and unknown methods of doing various tasks using only built-in bash features. Using the snippets from this bible can help remove unneeded dependencies from scripts and in most cases make them faster. I came across these tips and discovered a few while developing neofetch, pxltrm and other smaller projects.
bash  shell  ebook 
8 days ago
Erste Konkretisierungen zur DSGVO im Juni
Von den deutschen Aufsichtsbehörden für den Datenschutz und von dem Europäischen Datenschutzausschuss (EDPB) kommen erste Konkretisierungen für Vorgaben der Daten­schutz-Grundverordnung (DSGVO / GDPR). Dazu gehört eine Liste von Verfahren, bei denen eine Daten­schutz-Folgen­abschätzung (DSFA) durchgeführt werden muss. Es gibt also Handlungsbedarf für Unternehmen.
DSGVO  2fhg 
17 days ago
Alpenveilchen-Narzisse (Narcissus cyclamineus)
Den Trivialnamen Alpenveilchen-Narzisse verdankt Narcissus cyclamineus ihren nach hinten geklappten Kronblättern. Die Blütenstände sollen denen der Alpenveilchen ähnlich sehen.
garten 
27 days ago
Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug • The Register
Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug
Brinkmann files third signature spoof vulnerability in a month
gnupg  security  vulnerability 
27 days ago
“Hilfe! Ist meine Datenschutzerklärung korrekt?!” – Mojomag
Der Verantwortliche für die DSGVO im Europaparlament Jan-Philipp Albrecht hat sich kürzlich auf seiner Website gerechtfertigt für seinen Gesetzesentwurf. Die Angst der kleinen Website-Betreiber fegt er arrogant als unbegründet weg, Kritiken am Gesetz nennt er „Mythen“ und er relativiert, dass man doch gar nicht so viel tun müsse im Vergleich zu vorher. Das stimmt aber nicht.
DSGVO 
29 days ago
Resize a Sparse Bundle Image using Terminal | Ray's Weblog
A Sparse Bundle Image will increase in size automatically but will not shrink automatically. Before shrinking the sparse bundle, mount it and empty the trash to get rid of any deleted items from the image.
osx  sparsebundle  filesystem 
4 weeks ago
Auto Save and Backup Every Save | Pragmatic Emacs
Emacs has two useful ways of protecting you from data loss. The first is auto save, which saves a copy of a file every so often while you are editing it. [...] The other way Emacs protects you is to make backups of your files. By default the backup file is made in the same directory as the original with a name like file~.
backup  emacs 
5 weeks ago
The Ex-Googlers Building Drones That Anybody Can Pilot With a Phone | WIRED
Skydio's co-founders believe you shouldn't need a pilot's understanding of the mechanics of flight to find uses for a drone. -==- The answer, Bry says, is cameras powered by software that recognize obstacles as they appear. It's that software, fused with the right lightweight hardware, that Skydio is working to build.
google  drohne  AI 
5 weeks ago
Hintergründe zum Skandal – Amazon-Mitarbeiter enthüllen: Sie vernichten im Auftrag des Onlineriesen täglich zehntausende neue Produkte! - Wortfilter.de Der Marktplatz Blog
In diesem Bericht erhaltet ihr Antworten auf alle Fragen, damit ihr die aktuelle Berichterstattung reflektieren könnt. Um die gegen Amazon erhobenen Vorwürfe einzuordnen, ist es notwendig, auch einmal die Grundlagen zur Retourensituation und -handhabung im Onlinehandel sowie die Verwertungsmöglichkeiten bei Amazon selbst aufzuarbeiten.
amazon 
5 weeks ago
The Fading Battlefields of World War I - The Atlantic
This year will mark the passing of a full century since the end of World War I—a hundred years since the “War to End All Wars.” In that time, much of the battle-ravaged landscape along the Western Front has been reclaimed by nature or returned to farmland, and the scars of the war are disappearing. Some zones remain toxic a century later, and others are still littered with unexploded ordnance, closed off to the public. But across France and Belgium, significant battlefields and ruins were preserved as monuments, and farm fields that became battlegrounds ended up as vast cemeteries. In these places, the visible physical damage to the landscape remains as evidence of the phenomenal violence and destruction that took so many lives so long ago.
geschichte  europa 
6 weeks ago
Back to basics: What sysadmins must know about logging and monitoring | HPE
With containers springing up and down in minutes and virtual machines coming and going in hours, some sysadmins have neglected their system logs. Log files still provide invaluable insight into how systems are operating! Here’s what you -- still -- need to know.
container  linux  sysadmin 
6 weeks ago
Hans-Dieter Arntz
Willkommen auf der regionalhistorischen Homepage von Hans-Dieter Arntz. Diese befasst sich mit folgenden Themen:
Geschichte des Judentums, Nationalsozialismus und 2. Weltkrieg
sowie Geschichte der Eifel und Voreifel.
geschichte  region  eifel 
6 weeks ago
Taking Back the DNS
Taking Back the DNS -- By Paul Vixie (Jul 30, 2010) I am stunned by the simplicity and truth of that observation. Every day lots of new names are added to the global DNS, and most of them belong to scammers, spammers, e-criminals, and speculators. The DNS industry has a lot of highly capable and competitive registrars and registries who have made it possible to reserve or create a new name in just seconds, and to create millions of them per day. Domains are cheap, domains are plentiful, and as a result most of them are dreck or worse.
dns  security  spam 
6 weeks ago
Die Abmahnungen und Lizenzforderungen von Thomas Wolf tw-photomedia wegen Creative Commons-Lizenzverstößen hören einfach nicht auf » Rechtsanwalt Markus Kompa – Fachanwalt für Urheber- und Medienrecht, Köln
Obwohl die Gerichte dem geschäftstüchtigen Foto-Lizenzgeldeintreiber Thomas Wolf seit Jahren die Grenzen aufzeigen und einige inzwischen gar keine finanziellen Ansprüche für unter kostenfreien Creative-Commons lizenzierte Lichtbilder zubilligen, will Thomas Wolf einfach nicht von seinen Lizenzforderungen wegen unterlassener Namens- und Lizenznennung lassen.
fotografie  recht  wikmedia 
6 weeks ago
Amazon vor Google: Fünf Gründe für den Erfolg des Onlineriesen
Fünf Gründe für den Erfolg von Amazon – und ein Warnsignal -==- Der Internethändler überholt Google und ist nun das zweitwertvollste Unternehmen der Welt. Fünf Gründe, warum Anleger Amazon so schätzen.
amazon  google 
7 weeks ago
The Philip Cross Affair - Craig Murray
Aktivitäten von Interessengruppen auf Wikipedia.
critique  history  wikipedia 
7 weeks ago
Interview: Der Tag, als Philip Roth anrief - Bücher - FAZ
Philip Roth meidet eigentlich die Medien. Dann aber meldete sich der Schriftsteller plötzlich am Telefon - und gab Auskunft über seine Bücher, Ruhm, den Irakkrieg, Günter Grass und das Internet. (08/2005)
philosophy 
7 weeks ago
How to live without Google - AlternativeTo.net
For many the Internet is Google: Search, mail, videos, web browser, cloud services, mobile OS, etc. - Google is the major player in all these fields. But Google uses all data it gathers across its services to post targeted ads, and to massively profit from the data many share so freely with the Internet giant. Your personal data can also be subpoenaed by lawyers, including for civil cases like divorce.
google  privacy  tracking 
8 weeks ago
Tracking nur noch mit Opt-In? Kritische Anmerkungen zum DSK-Papier
Die Datenschutzbehörden haben Position bezogen: Das User-Tracking auf Websites und in Apps sei mit Geltung der DSGVO nur noch mit Opt-In zulässig. Auch wenn ich den Aufsichtsbehörden in grundlegenden Punkten zustimme, halte ich Timing und Details der Positionierung für kritikwürdig.
DSGVO  data-dealer  tracking  2018 
8 weeks ago
Command Line Mac: How to find out which files were installed with a Mac package
An applications that follows Mac standards will leave a record of what was installed in the /Library/Receipts/app-name directory.
osx  sysadmin 
8 weeks ago
Zsh Workshop: Array Parameters
An array parameter is simply a variable in zsh that holds a list of zero or more items. The two easiest ways to assign a value to an array parameter are:

array_name=(value1 value2 ... valueN)
set -A array_name value1 value2 .. valueN
knowhow  shell  zsh 
8 weeks ago
Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site — Krebs on Security
LocationSmart, a U.S. based company that acts as an aggregator of real-time data about the precise location of mobile phone devices, has been leaking this information to anyone via a buggy component of its Web site — without the need for any password or other form of authentication or authorization — KrebsOnSecurity has learned. The company took the vulnerable service offline early this afternoon after being contacted by KrebsOnSecurity, which verified that it could be used to reveal the location of any AT&T, Sprint, T-Mobile or Verizon phone in the United States to an accuracy of within a few hundred yards.
data-dealer  tracking  phone 
8 weeks ago
DSGVO: Last-Minute-Hilfe gegen Abmahnungen und Bußgelder | c't Magazin
In einer Woche wird das neue EU-Datenschutzrecht (DSGVO) wirksam. Wer jetzt noch Hilfe sucht, um die drohende Abmahngefahr zu vermeiden, sollte mit unseren Tipps letzte Vorbereitungen treffen.
DSGVO 
8 weeks ago
Blockchain's Two-Flavored Appeal
A recent story in Medium describes yet again quite well why blockchains don't solve any real problems: Blockchain is not only crappy technology but a bad vision for the future. So what is their irresistible appeal?
blockchain  bitcoin  critique 
8 weeks ago
Ten years in, nobody has come up with a use for blockchain
Everyone says the blockchain, the technology underpinning cryptocurrencies such as bitcoin, is going to change EVERYTHING. And yet, after years of tireless effort and billions of dollars invested, nobody has actually come up with a use for the blockchain—besides currency speculation and illegal transactions.
blockchain  bitcoin  critique 
8 weeks ago
Alan Turing’s chemistry hypothesis turned into a desalination filter | Ars Technica
Entsalzung: Alan Turing is rightly famed for his contributions to computer science. But one of his key concepts—an autonomous system that can generate complex behavior from a few simple rules—also has applications in unexpected places, like animal behavior. One area where Turing himself applied the concept is in chemistry, and he published a paper describing how a single chemical reaction could create complex patterns like stripes if certain conditions are met.
wasser  alan-turing  chemie 
8 weeks ago
Rant: Warum die DSGVO eine Datenschutz-Karikatur ist | ❤ t3n
Die DSGVO bürdet zahllosen Menschen umfangreiche bürokratische Pflichten auf und schafft Rechtsunsicherheit. Doch vor was schützt sie uns eigentlich?
DSGVO  critique 
9 weeks ago
BishopBlog: How to survive on Twitter – a simple rule to reduce stress
In recent weeks, I’ve seen tweets from a handful of people I follow saying they are thinking of giving up Twitter because it has become so negative. Of course they are entitled to do so, and they may find that it frees up time and mental space that could be better used for other things. The problem, though, is that I detect a sense of regret. And this is appropriate because Twitter, used judiciously, has great potential for good.
social-media  howto  gplus  twitter 
9 weeks ago
How to speed up your MySQL queries 300 times | Opensource.com
MySQL has a built-in slow query log. To use it, open the my.cnf file and set the slow_query_log variable to "On." Set long_query_time to the number of seconds that a query should take to be considered slow, say 0.2. Set slow_query_log_file to the path where you want to save the file. Then run your code and any query above the specified threshold will be added to that file.
database  mysql  knowhow  performance 
9 weeks ago
Creating a 8192 bit GPG key to replace my 1024 bit one - Nick
My GPG key from 2003 to know has been a 1024 bit DSA key, which uses a 160 bit SHA-1 hash. As per the Debian Guidance, this isn't ideal, and I (along with many) have decided to move to a new, stronger key with a stronger hash.
gpg  security 
9 weeks ago
Thread by @yungneocon: "I wonder if having taught people in High School that Fascism is a definite social system & not just like people being mean would have ma […]"
I wonder if having taught people in High School that Fascism is a definite social system & not just like people being mean would have made a difference for modern discourse. -==- Mostly I think not—there’s a way that certain subjects (Fascism, the Holocaust, MLK, Racism, Civil Right’s, Activism, Supply & Demand) can only enter the discourse partially & in a motivated substance-less manner
geschichte 
9 weeks ago
CPU utilization is wrong, says Netflix's Brendan Gregg | Opensource.com
CPU utilization is the metric everyone uses to measure a processor's performance. But %CPU is a misleading measure of how busy your processor really is, says Brendan Gregg, senior performance architect at Netflix, in what he calls a "five-minute public service announcement," at the 16th annual Southern California Linux Expo (SCALE).
linux  knowhow 
9 weeks ago
ss command: Display Linux TCP / UDP Network/Socket Information - nixCraft
The ss command is used to show socket statistics. It can display stats for PACKET sockets, TCP sockets, UDP sockets, DCCP sockets, RAW sockets, Unix domain sockets, and more. It allows showing information similar to netstat command. It can display more TCP and state information than other tools. It is a new, incredibly useful and faster (as compared to netstat) tool for tracking TCP connections and sockets. SS can provide information about:
linux  networking  sysadmin 
9 weeks ago
The Professional Pentester Guide – eLearnSecurity Blog
The demand for information security professionals and experts is rising as there is a huge skills gap! An introduction to aspiring students who want to understand what penetration testing really is and what a penetration tester does.
pentesting  security 
10 weeks ago
Wortistik » plenken
Wer sich intensiver mit dem Schreiben von Texten im Internet beschäftigt, kennt diesen Begriff wahrscheinlich schon. Da aber nicht nur der Wortist, sondern auch der Duden bislang das Verb plenken nicht kannten, sei es hiermit auch anderen Unwissenden mitgeteilt: Plenken bezeichnet die nur von Online-Texten bekannte (Un-)Sitte, Leerzeichen einzustreuen, wo sie eigentlich nicht hingehören, um damit Aufmerksamkeit zu erregen.
rechtschreibung  sprache 
10 weeks ago
Say yes to the progressive web | HPE
Say yes to the progressive web
If you’re doing native mobile app development, you’re doing it wrong. These days, writes Larry Seltzer, the best option is progressive web apps: websites that work like apps on a mobile device. They have all the capabilities of native apps, including offline functionality, but also the considerable advantages of websites.
app  programming  web  2fhg 
10 weeks ago
What is KM? Knowledge Management Explained - KMWorld Magazine
The classic one-line definition of Knowledge Management was offered up by Tom Davenport early on (Davenport, 1994): “Knowledge Management is the process of capturing, distributing, and effectively using knowledge.” Probably no better or more succinct single-line definition has appeared since.

However, Knowledge Management can best and most quickly be explained by recapping its origins. Later in this article, its stages of development will also be recapped.
knowledge  management  history 
10 weeks ago
20. Mai 2018: Einige ältere Versionen der Google+ App und Fotosicherung werden eingestellt - Google+ Hilfe
20. Mai 2018: Einige ältere Versionen der Google+ App und Fotosicherung werden eingestellt
google  android  app 
10 weeks ago
Tracing a packet journey using Linux tracepoints, perf and eBPF | Yet another enthusiast blog!
What I’d need is a tool which could tell me “Hey, I’ve seen your packet: It’s gone this way, on this interface, in this network namespace”. Basically, what I’d need is a mtr for L2. Does not exist? Let’s build one!
linux  network  debugging 
10 weeks ago
Mein erster DSGVO Rant - Zu viele Mythen und gefährliches Halbwissen zum neuen europäischen Datenschutzrecht - Internet, Social Media & Recht
Nun bringt mich aber auch die DSGVO bzw. eigentlich das ganze diesbezüglich im Internet verbreitete, gefährliche Halbwissen dazu, mich hier im Blog ein wenig aufzuregen und einigen DSGVO Mythen den Garaus zu machen.
DSGVO  recht  2fhg 
10 weeks ago
« earlier      
2017 2fhg @goodie @toread accessibility admin ai ajax algorithm amazon android animation apache app apple architecture art article articles artikel audio authentication backup biblio blog bonn book books botanik browser cartoon certificate cgi coding collaboration comic common-lisp community cool critique cryptography css culture database datenschutz debian del.icio.us design deutsch development dhtml dns documentation dsgvo ebook editor emacs email encoding encryption ernährung essay essen faq filesystem firefox flash forum foto fotografie framework frankreich free fun funny gallery game garten geek generator geschichte gesundheit gnupg google gpg graphics gtd hack hal-faber hardware hausbau heise history howto html humor identity image imagemagick intel internet interview java javascript knowhow kochen kultur kunst lang:fr language latex library linux lisp literature lvm mac macintosh mailing-list map math microsoft mta mua museum music musik mysql network networking newsticker opensource openssl opinion oreilly orgmode osx palm paper password pdf people perl pflanzen pgp philosophy photography php pki politik portal postfix privacy productivity programming proxy psychology python recht reference region religion research resource review rezept rfid ruby satire science scripting sdw security social-media software spam sprache ssh ssl standard surveillance sysadmin technology tim-oreilly tips tool tools tour tracking tutorial ubuntu umwelt unicode unix urlaub usability usenet utility via:usenet video visualization web web2.0 webdesign webmaster wiki wikipedia writing wwww xml xrefs ökologie

Copy this bookmark:



description:


tags: