today's leftovers
-
Manjaro Shipped Broken Kernel on Apple M1 Systems - Invidious
I don't know how Manjaro keeps doing it but it seems like everytime something happens Manjaro is here to break something, now they decided to ship a broken build of the Asahi Linux kernel to people running Apple M1/M2 hardware
-
396 - Ransomware Goes Wild – mintCast
First up in the news, Stallman goes manual on C, DNF5 arrives in Fedora, LibreOffice gets fumigated, GNOME comes into its Shell, they have put hair in the Blender, Avast buys your cookies, and Intel fogs the processor market; In security and privacy, we have multi-stage malware, website leaks, and shell attacks; Then in our Wanderings, Norbert is cutting corners, Moss tries a different mint, Joe keeps modding, and Bill fixes a broken Arch â¦again.
-
Automate and systematize all the things! - Adventures in Linux and KDE
As announced at Akademy a few days ago, Iâm honored that my goal â Automate and Systematize Internal Processes â has been chosen by the KDE community! Those are a bunch of fancy words, but the idea is pretty simple: get our expertise (knowledge, skill, and wisdom) out of our heads, and onto KDEâs infrastructure.
Why? to reduce the burden on us personally to provide so much of that expertise on demand as an ongoing service, and to reduce the impact of breaks, vacations, and departures. Ultimately this will preserve expertise publicly in KDE where itâs easier to learn from, and free us all up to do other things!
-
Current State: 2019 Third Party Security Audit of Kubernetes | Kubernetes
We expect the brand new Third Party Security Audit of Kubernetes will be published later this month (Oct 2022).
In preparation for that, let's look at the state of findings that were made public as part of the last third party security audit of 2019 that was based on Kubernetes v1.13.4.
-
HelpSystems Goes on the Security Offensive Again - IT Jungle
Penetration testing has become popular as security vulnerabilities in corporate systems have become more apparent. Adversary simulation, or âred teaming,â is a similar technique that involves an active defense against a live adversary. If penetration testing is a passive activity designed to identify static flaws in your defenses, then red teaming is the dynamic version of it that allows your internal cybersecurity team to test their abilities in real time against the bad guys (i.e. the red team).
-
My 2020 Lenovo laptop is acting strangely again, and it's not even two years old. | BaronHKâs Rants
Today, my left Control key has been working intermittently, although itâs working now and has been for a while, knock on wood.
[...]
If the SHTF, then I suppose I could use my older laptop to wait out the 30 days and have a Lenovo tech come out to my house and repair it again.
I tried calling down to ubrekifix in Gurnee and the guy basically said they wanted $100 just to look at it but they couldnât do very much because all of their diagnostic tooling is for Windows (of course) and they donât know much about âLinuxâ (of course) and then we could go from there, but I could subscribe to a protection plan for everything in the house forâ¦.and thatâs when I hung up.
-
Announcing the second group of Open Source Peer Bonus winners in 2022 | Google Open Source Blog
Weâre excited to announce our second group of Open Source Peer Bonus winners in 2022! The Google Open Source Peer Bonus program is designed to recognize external open source contributors nominated by Googlers for their open source contributions. This cycle, we are pleased to announce a total of 141 winners across 110+ projects, residing in 36 countries.
-
Android Studio SFS created
Download and install the usual way, by clicking on the "sfs" icon. Beware, the SFS file is 1GB, and after installation, at first run it will want to download more files -- in my case, about 1.3GB.
It can be launched from a terminal window, by running "astudio".