Does anyone here use #AWX? I just had AAP pitched at me by some Red Hat sales people and they made it sound like RH has deliberately hamstrung the project to force people behind their paywall.
Speaking of in-place upgrades, I recently returned from #RedHat Summit in Denver, #Colorado where I picked up a bunch of cool tricks with #Ansible, including some RedHat-supported playbooks that can pretty reliably upgrade #RHEL 7 to RHEL 8. This will make my work life much less miserable :)
Since #debian 11 is nearing EOL I was looking into what it would take to update my router. I was pleased to see that #unifi has sorted out whatever licensing issues they had with #mongodb and now support versions greater than 3.6. Sadly, the newest version of mongodb supported in debian 12 is 5.0 which also happens to require #avx extensions which my older Celeron CPU doesn't have. So, it looks like I'll have to invest in new hardware. I guess on the bright side I can keep the old box around as-is as an emergency spare and start the new one from a fresh install instead of crossing my fingers and doing an in-place upgrade.
I updated to Fedora 40, which now includes KDE 6 and along with it a native Matrix client called NeoChat. I played with it for a bit, and it seems to have most of the features I'm used to from Element (including some cool extras like user-defined emoji). However, it won't decrypt any messages in rooms from before I first signed in with it, which kind of sucks. I guess I'll check back on it in a few months and see how it's progressed.
I'm in need of a little Nerd-Pr0n... what little useful thing comes into your mind as tool of at the Linux command line? Not a super-nerdy command to sophisticated resolve a problem, but a tool for actual problems that would also be useful for n00bs to take their fear about using the CLI?
So curling wttr.in is a nice trick - but yesterday I discovered v2 of the service (probably around for a million years but new to me).
curl v2.wttr.in/Berlin
yt-dlp and wget to fetch files from the Intenets without having to open a browser were on the list yesterday as well, but I'm eager to (re)discover some other nice tools.
> If you installed a Linux system with disk encryption more than a couple of years ago, there's a decent chance it's using a weak key derivation function and someone who cares enough would be in a position to brute-force it. https://mjg59.dreamwidth.org/66429.html has more details and instructions on how to update to a better KDF.
Oft ist es richtig, eine Anforderung zu analysieren, bevor man sich mit möglichen Lösungen beschäftigt. Also, worum geht es hier? Man hat eine PDF-Datei, die man auf allen Seiten mit einem Wasserzeichen versehen möchte. Das Wasserzeichen ist ein diagonal verlaufender Text. Dabei soll das Wasserzeichen im Hintergrund liegen, damit die PDF-Datei nicht vom Wasserzeichen verdeckt wird. Somit muss die PDF-Datei transparent sein, damit das darunterliegende Wasserzeichen nicht von der PDF-Datei verdeckt wird.
Nachdem die Anforderung verstanden wurde, kann man nach möglichen Lösungen suchen.
My perception is that once there's $SOFTWARE Community Edition and $SOFTWARE Enterprise Edition, the sponsoring company will usually gradually suffocate the CE version in order to push users into buying licenses for the EE version. I'm not saying this is happening here, but if I were building a #NAS box, I'd keep that in mind when deciding what software stack to run on it.
200+ #npm and #pypi packages caught dropping #Linux cryptominers.
> These packages are largely typosquats of widely used libraries and each one of them downloads a Bash script on Linux systems that run cryptominers.
> It appears that both registries cleared the typosquats fairly quickly from their platforms before these could do more harm to developers.
This appears to be a characteristic behavior of #monero / #xmr #cryptocurrency users. This is by no means the first wave of mining attacks against servers.
> Researchers have unearthed a discovery that doesn’t occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some cases even with a forensic investigation.
> On Thursday, researchers from Intezer and The BlackBerry Threat Research & Intelligence Team said that the previously undetected backdoor combines high levels of access with the ability to scrub any sign of infection from the file system, system processes, and network traffic. Dubbed Symbiote, it targets financial institutions in Brazil and was first detected in November.