today's howtos
-
Barry Kauler ☛ Hopeful fix fstrim on USB SSD
I posted about compiling the kernel 6.12.11 with change to hopefully support TRIM over USB: [...]
-
CubicleNate ☛ No Keyboard Input on Some Flatpak Games
The author encountered issues with keyboard input in Flatpak games GZDoom and Xonotic while using Wayland. After extensive searching for solutions, they discovered that unchecking the Wayland windowing system permission in Flatpak settings resolves the problem. This experience underscored the importance of adjusting such settings for optimal gameplay on Linux.
-
How to Add Apps to the Dock in Ubuntu 24.04 or 22.04 LTS Linux
Ubuntu 24.04, the latest Long-term support distro from Canonical developers, has been adopted widely by GNU/Linux Desktop users. Due to its Sleek interface, latest & stable features, user-friendly experience, and one of the most convenient features of all Ubuntu Desktop versions, including 24.04 is the “Dock.”
-
ID Root ☛ How To Install Python on CentOS Stream 10
In this tutorial, we will show you how to install Python on CentOS Stream 10. Python is a versatile and powerful programming language widely used for web development, data analysis, artificial intelligence, scientific computing, and more.
-
Red Hat ☛ How to name, version, and reference container images
In my time working in the software industry, I have encountered recurring issues involving versioning. Which version scheme should we use for project X? When should we bump the major version? Is this pull request a breaking change? We want to cut a new release, but what should the next version be?
Versioning schemes communicate new features, bug fixes, and even breaking changes to our users. Some schemes are like a contract with users, giving them guarantees for types of version changes. For instance, a major version bump from version 2.4 to 3.0 usually implies a breaking change and a substantial new functionality. Consumers of software (e.g., Linux distributions) can decide when and how to use the new versions.
-
Klara ☛ Controlling Your Core Infrastructure: DNS
Take charge of your network's performance and privacy by setting up your own DNS server. Learn how DNS queries work, why ISP-provided servers may hold you back, and how a well-configured caching DNS server can drastically improve speed and control across your infrastructure.
-
Dan Langille ☛ Configuration of net-mgmt/net-snmp on FreeBSD
I have several posts about net-mgmt/net-snmp – this is the latest. I wrote it back in June and it’s been sitting in drafts ever since.
If you read the previous post, you’ll understand why I wrote a new one.
-
University of Toronto ☛ Our well-prepared phish spammer may have been chasing lucrative prey
Yesterday I wrote about how we got hit by an alarmingly well-prepared phish spammer. This spammer sent a moderate amount of spam through us, in two batches; most of it was immediately delivered or bounced (and was effectively lost), but we managed to capture one message due to delivery problems. We can't be definite from a single captured spam message (and our logs suggesting that the other messages were similar to it), but it's at least suggestive.
-
University of Toronto ☛ We got hit by an alarmingly well-prepared phish spammer
Yesterday evening, we were hit by a run of phish spam that I would call 'vaguely customized' for us, for example the display name in the From: header was "U of T | CS Dept" (but then the actual email address was that of the compromised account elsewhere that was used to send the phish spam). The destination addresses here weren't particularly well chosen, and some of them didn't even exist. So far, so normal. One person here fell for the phish spam that evening but realized it almost immediately and promptly changed their password. Today that person got in touch with us because they'd started receiving email bounces for (spam) email that they hadn't sent. Investigation showed that the messages were being sent through us, but in an alarmingly clever way.