Your smartphone is making you stupid, antisocial and unhealthy. So why can’t you put it down? - The Globe and Mail
A decade ago, smart devices promised to change the way we think and interact, and they have – but not by making us smarter. Eric Andrew-Gee explores the growing body of scientific evidence that digital distraction is damaging our minds
smartphone  psychology  damage  readings 
2 days ago
ck :: zypper vs. apt and rpm vs. dpkg command comparison ::
The following table shows a comparison of the most important and most used commands for package/software management in SuSE and Debian systems.
Linux  Ubuntu  OpenSUSE  apt  zypper  comparison 
3 days ago
Spamnesty - Home
Spamnesty is a way to waste spammers' time. If you get a spam email, simply forward it to sp@mnesty.com, and Spamnesty will strip your email address, pretend it's a real person and reply to the email. Just remember to strip out any personal information from the body of the email, as it will be used so the reply looks more legitimate.

That way, the spammer will start talking to a bot, and hopefully waste some time there instead of spending it on a real victim. Meanwhile, Spamnesty will send you an email with a link to the conversation, so you can watch it unfold live!
spam  email  bot  mail 
10 days ago
How to Create a Multilingual Website with Divi and Polylang | Divi Theme Help & Tutorials
This time I’m going to write a quick guide on how you can create a multilingual website with Divi theme and Polylang. So you will need the Divi theme and the Polylang plugin. Polylang is free and you can download it from the WordPress plugin repository here.
Page archived here: https://archive.is/AhBcy
WordPress  Divi  translation  language 
13 days ago
Questo sito è stato creato da un piccolo gruppo di appassionati di penne stilografiche, come quaderno di appunti virtuale dove raccogliere le loro informazioni e poterle condividere.
penna  stilografica  wiki  calligraphy 
17 days ago
How can I extract embedded fonts from a PDF as valid font files? - Stack Overflow
You have several options. All these methods work on Linux as well as on Windows or Mac OS X. However, be aware that most PDFs do not include to full, complete fontface when they have a font embedded. Mostly they include just the subset of glyphs used in the document.
fonts  PDF 
18 days ago
Manuale WebOS di LG
TV  Televisione 
22 days ago
TV Ultra HD 4K LED 43 pollici: LG 43UJ630V | LG Italia
ULTRA HD 4K Schermo IPS, Active HDR, Design Slim, Sistema Audio Ultra Surround 2.0 Ch. 20W, Smart TV webOS 3.5
TV  Televisione 
23 days ago
Installing 09-texlive-fonts.conf to /etc/fonts/conf.d on Ubuntu 16.04 breaks fonts in Firefox - TeX - LaTeX Stack Exchange
I noticed that after I symlinked the 09-texlive-fonts.conf file from /etc/fonts/conf.d it interfered with fonts system wide, notably firefox. On https://reddit.com/r/aww all the fonts in the header were showing 'squares' and in other applications font glyphs were not even rendering.

Is there any way to install the TexLive fonts without interfering with the system?
LaTeX  Firefox  fonts  forum 
4 weeks ago
The Big Debate, 2048 vs. 4096, Yubico’s Position | Yubico
While it is true that a longer key provides better security, we have shown that by doubling the length of the key from 2048 to 4096, the increase in bits of security is only 18, a mere 16%.
GnuPG  gpg  security  encryption  keys 
4 weeks ago
GnuPG Frequently Asked Questions
At the time the decision was made, 2048-bit RSA was thought to provide reasonable security for the next decade or more while still being compatible with the overwhelming majority of the OpenPGP ecosystem.
GnuPG  gpg  security  encryption  keys  faq 
4 weeks ago
Simple, cross platform tool for lossless trimming / cutting of video and audio files. Great for rough processing of large video files taken from a video camera, GoPro, drone, etc. It lets you quickly extract the good parts from your videos and discard GBs of data without losing quality. It doesn't do any decoding / encoding and is therefore extremely fast. Also allows for taking JPEG snapshots of the video at the selected time. This app uses the awesome ffmpeg for doing the grunt work. Also supports lossless cutting in the most common audio formats. ffmpeg is included in the app.
Software  video  video_editing 
6 weeks ago
CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
9 weeks ago
operational pgp - draft
This is a guide on how to email securely.
email  encryption  gpg  security  GnuPG 
11 weeks ago
OpenPGP Best Practices - riseup.net
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  privacy  cryptography 
11 weeks ago
drduh/YubiKey-Guide: Guide to using YubiKey as a SmartCard for GPG and SSH
This is a practical guide to using YubiKey as a SmartCard for storing GPG encryption and signing keys.
An authentication key can also be created for SSH and used with gpg-agent.
Keys stored on a smartcard like YubiKey seem more difficult to steal than ones stored on disk, and are convenient for everyday use.
gpg  GnuPG  SSH  YubiKey  security 
12 weeks ago
Using GPG and SSH keys (GnuPG 2.1) with a Smartcard (Yubikey 4) - Suva.sh's blog
The primary intention of this post is to document the research and the steps I’ve taken for my current ‘GPG & SSH keys on a smartcard’ setup, so that I can look it up for future reference and possible improvements. There are plenty of good articles around the same subject, but most of them are partly dated either regarding GnuPG versions, subkey separation or an older Yubikey.
gpg  GnuPG  SSH  YubiKey  security 
12 weeks ago
La sonda Cassini non esiste più - Il Post
Intorno alle 12:30 si è polverizzata nell'atmosfera di Saturno a 1,5 miliardi di chilometri da noi, dopo 20 anni di onoratissimo servizio.
science  space 
september 2017
Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
july 2017
La mafia del fuoco: pressioni alla politica e affari dei clan, ecco perché l’Italia sta bruciando - Repubblica.it
Dietro gli incendi non c’è un disegno eversivo o una regia unica. Ma una serie di ragioni che mettono lo Stato in ginocchio. Si evocano piani eversivi per nascondere la realtà dei territori abbandonati. È la bonifica criminale per eccellenza: con le fiamme si fa spazio a discariche e ad aree in cui si potrebbe stoccare di tutto. Il territorio è in balìa di se stesso senza alcuna seria possibilità di prevenzione, previsione, monitoraggio e intervento.
Saviano  incendi  criminalità  letture 
july 2017
Spectral is a Font That’s Interactive & Customisable
While fonts come in many forms, most, if not all of them, are usually static in design. However, fonts may soon become a lot more flexible as Google has introduced a new font type that is both customizable and interactive – called Spectral.
july 2017
Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
july 2017
Estrarre dati da dischi NTFS danneggiati – Andrea Lazzarotto
L’analisi dei file system è una parte molto importante dell’attività di digital forensics. Molte indagini riguardano dischi rigidi il cui contenuto deve essere analizzato. In alcuni casi, anche i file eliminati potrebbero dover essere recuperati. Ci sono diversi tipi di file system e NTFS è attualmente uno dei più popolari.
harddisk  data  recovery 
july 2017
Orologio per scacchi DGT2010 - L'orologio ufficiale della FIDE
L`orologio DGT è l`orologio ufficiale omologato dalla Federazione Scacchistica Internazionale, ed è utilizzato nei tornei ad alto livello di tutto il mondo, poiché è impostabile con le nuove cadenze di gioco ad incremento - oltre a consentire quelle tradizionali.
Scacchi  wishlist 
july 2017
Completo scacchi piombati + scacchiera da torneo con borsa
Completo da torneo scacchi doppio piombo+scacchiera+borsa, prezzo imbattibile!
Scacchi  wishlist 
july 2017
Analfabeti funzionali, il dramma italiano: chi sono e perché il nostro Paese è tra i peggiori - l'Espresso
Sono capaci di leggere e scrivere, ma hanno difficoltà a comprendere testi semplici e sono privi di molte competenze utili nella vita quotidiana. Nessuna nazione in Europa, a parte la Turchia, ne conta così tanti. Tutti i numeri per capire la dimensione di un fenomeno spesso sottovalutato.
analfabetismo_funzionale  letture 
july 2017
Secure Salted Password Hashing - How to do it Properly
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
password  hashing  cryptography  security 
july 2017
NarcoRoma, la nuova capitale della cocaina - Repubblica.it
La città trasformata nella centrale internazionale del traffico di droga. Gestito da gruppi criminali romani, in affari con i boss della ‘ndrangheta e della camorra. Un business straordinario che permette di raccogliere con un solo carico un miliardo e 300 milioni di euro: più del valore in Borsa di Roma e Juventus. Il procuratore Pignatone: la rotta che parte dalla Capitale ha come obiettivo l'intera Europa.
Saviano  Roma  criminalità  narcotraffico  letture 
july 2017
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017
Custom Fields vs. Custom Taxonomies, when to (not) use? - Meta Box
Another question that I usually see developers are confused is when to use custom fields and when to use custom taxonomies? Should I use a taxonomy instead of a custom field or vise versa? Assume that you have a custom post type “Book” and you want to store publisher name. Will you store it as a custom field or a taxonomy?
wordpress  custom-taxonomies  custom-fields  webdev 
july 2017
How to 301 Redirect a WordPress Site
I find working as a WordPress developer to be relatively low-stress. Giving people a beautiful web presence is both a huge service, and something that doesn’t lead to massive tragedy if you’re not perfect at it right away. It’s not like being a fireman or a fighter pilot, for example.

There are exceptions, though: a few times when I’ve been so stressed-out and guilt-ridden that I’ve felt like quitting my job. What’s more, they’re all the same kind of exception.
WordPress  redirect  from pocket
july 2017
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017
Tales Of Job Burnout: How To Fix The Aftermath Of An Overachiever Attitude
Lately, it feels like if you’re not working 80-hour weeks, you’re not working hard enough. The willingness to work long hours in the hopes of rapid career growth has a name, and it’s not spelled B-O-S-S. Chronic overachievers often rely on a “I can do it all” attitude to feel accomplished and secure in their jobs. But what this attitude doesn’t rely on is reality. When you try to do everything all the time, you’re mostly likely to only achieve one thing: burnout.
job  burnout  from pocket
july 2017
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
FCC  data  ISP  privacy  from pocket
july 2017
Nearly One Million Systems Provide "Guest" SMB Access, Most Are Linux
There are 2,306,820 devices connected to the Internet at the moment that feature open ports for SMB services, the same protocol that was used to infect hundreds of thousands of computers with the WannaCry ransomworm a month ago.
Linux  Samba  security  SMB  WannaCry  from pocket
july 2017
WikiLeaks rivela Cherry Blossom, il malware della Cia per compromettere i router
Sono operativi che conducono missioni in tutto il mondo con licenza di uccidere, supportati anche da cyber armi create nei loro laboratori, ma tra killer e nerd, sembrano avere anche slanci romantici, tanto da chiamare uno dei loro programmi Cherry Blossom, ovvero fior di ciliegio. Cherry Blossom, in realtà, di poetico e gentile ha ben poco: è un micidiale programma segreto messo a punto dalla Cia nel 2004, ma che è andato avanti almeno fino al 2012 e non è escluso che sia ancora in corso, considerato quanto longevo e ambizioso.
malware  router  security  WikiLeaks  from pocket
july 2017
How Spammers, Superstars, and Tech Giants Gamed Music
Some of the ways artists are hacking the music-streaming service Spotify.
Spotify  hacking  music 
july 2017
Git Flow: come funziona aka Back to the future - Bitbull
I sistemi di controllo di versione consentono di tenere traccia delle modifiche fatte nel tempo e di collaborare più efficacemente all’interno di team composti da molte persone in particolare se, come in Bitbull, lavorano da remoto.
Non ci addentreremo nella spiegazione di che cos’è un sistema di controllo di versione, ma bensì vedremo come gestire al meglio il flusso di sviluppo con Git, il software di controllo versione distribuito.
Git  git-flow  development 
june 2017
git-flow cheatsheet
Branching efficiente usando git-flow realizzato da Vincent Driessen
Git  git-flow  development 
june 2017
7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.
security  Samba 
may 2017
WannaCry Ransomware: Everything You Need To Know Immediately
The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable awareness article, you would be so cautious that you can save yourself from WannaCry, as well as other similar cyber attacks in the future.
security  malware  ransomware 
may 2017
Journey to the centre of the Earth | Visual.ly
How far would you have to travel to reach the Earth's core? And what would you see along the way? Discover what lies beneath...
may 2017
Installing Neon on top of Kubuntu without reinstall • KDE Community Forums
So I have decided to install Neon on top of my Kubuntu-16.04 (+ backports PPA + libreoffice PPA).
KDE  KDE-Neon  Kubuntu 
may 2017
How to upgrade kubuntu 16.04 -> KDE neon
How to upgrade kubuntu 16.04 -> KDE neon
KDE  KDE-Neon  Kubuntu 
may 2017
Cronaca di un attacco di ransomware: in chat con i criminali
Quello che segue è un racconto di un grave attacco informatico a un'azienda che ho seguito personalmente come giornalista, arrivando a dialogare con gli aggressori, ma è soprattutto un promemoria del fatto che storie come questa possono capitare a chiunque e dovunque e hanno conseguenze pesanti per chi non fa prevenzione.
malware  ransomware 
april 2017
A successful Git branching model » nvie.com
In this post I present the development model that I’ve introduced for some of my projects (both at work and private) about a year ago, and which has turned out to be very successful. I’ve been meaning to write about it for a while now, but I’ve never really found the time to do so thoroughly, until now. I won’t talk about any of the projects’ details, merely about the branching strategy and release management.
Git  workflow  development  programming 
april 2017
Redirect Query String via .htaccess
This quick tutorial aims to clear up any confusion and explains how to redirect any URL based on its query string.
Apache  redirect 
april 2017
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
march 2017
"Proof Mode" for your Smartphone Camera
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered
photo  camera  proof  signature  security 
march 2017
E-Ink Tablets | Digital Paper & Notepads | Sony US
In a world overwhelmed with paper, Sony introduces a revolutionary way to work. Digital Paper from Sony, in conjunction with a cloud service, gives you the power to annotate, share, and save your documents – all from a handy device that's light enough to carry anywhere.
notetaking  notes  hardware  devices 
february 2017
reMarkable | The paper tablet
The paper tablet for people who prefer paper. Here to replace your notebooks, sketchbooks and printouts. Paper-like reading, writing and sketching with digital powers.
notetaking  notes  devices  hardware 
february 2017
“These 25 Productivity Principles Will Change How You Work Forever”
Everyone struggles to get work done everyday. Here is a summary of all you need to know and do to get real work done everyday without losing your mind.
february 2017
My Google Keep 2017 Wishlist
I then decided to... (insert drum roll sound effect) ...stick with Google. Meaning, using Google Keep for all kinds of lists and notes, and Google Drive for longer drafts.
productivity  Google  note  notetaking 
february 2017
Material Design Color Palette Generator - Material Palette
Making over your site’s typography isn’t just about finding the right font or size. Nope, it’s also about finding the right color. If you haven’t experimented with this Material Design Palette yet, take a moment to do so now. You’ll see that regardless of which branding colors you select, the primary and secondary font color are always black or a shade of grey.
color  palette  icons  material_design  webdesign  webdev 
february 2017
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
february 2017
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
february 2017
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
february 2017
« earlier      
@font-face admin aldolat.it android apache apple apps archive art astronomy audio authentication backup bazaar best blackberry blog blogging books browser bug buttons cache calendar canonical cheatsheet chess chiesa cloud cms code color colore comments content converter copyright cryptography css css3 cultura custom custom-fields custom-post-type database design desktop development dictionary dns documentation dropbox dropdown ebook ecommerce education email encryption english enti evolution faq fcm federazioni feed feedburner files filesharing filesystem firefox flash fonts forensics forum fotografia framework free free_music freelance freeware functions gallery generator git gmail gnome gnu/ubuntu gnupg google gpg grafica grafica_dtp graphics grid grub gtd guide hacks hardware help hooks hosting hotlinking howto htaccess html html5 icons ie ie6 image images inkscape inspiration internet iso italiano javascript jobs joomla jquery kde language latex launchpad lavoro layout learning letture libri linguistica linux logos loop mac mail malware management maps media mediawiki menu meteo mobile modding moving mozilla multimedia music mysql nas nautilus navigation netiquette networking news news_informatica nopost notes oop openfont openoffice opensource optimization options osx86 password patterns pdf performance persone pgp photo photography photoshop php play plugin podcast politica post privacy productivity quotidiani recovery redirect reference repository reset resources responsive router rss samsung scacchi science search security seo server servizi sharing shopping shortcodes skype slider slideshow social software space spam ssh ssl standards statistics storage streaming subversion svago svn sync sysadmin tema_k2 templates test text textures themes thumbnail time tips tools tracking translation tricks truecrypt tutorials tv twitter type typography ubuntu unread url utilities utility video virtualbox w3c web web2.0 webapp webdesign webdev wiki windows wishlist wordpress wp_query

Copy this bookmark: