/ topics / technology.html

Technology topic

Last update
Apr 28, 2018 at 15:11

summon: assemble user config files (aka dotfiles)

If you manage dozens of dotfiles in a Git repository summon can help you to setup them using the Unix-like systems symbolic link capability.

If you are a GNU Stow user, summon is for you! It shares basically the same concept with the key difference of not setting up links to directories to avoid non-tracked files inside it pollute your Git repository.

Although not tested on BSDs, Mac OS X, cygnus and the like, it should work fine in any machine with GNU coreutils, findutils, diffutils, [...] Read more

Better Emacs defaults with minimal intervention

99essential.el provides better GNU Emacs configuration defaults. It is intended to be installed system-wide. Copy the file below to /etc/emacs/site-start.d/99essential.el or equivalent path in your system.

;;; 99essential.el --- Better defaults with minimal intervention

;; Copyright (C) 2017, 2018  Guilherme Gondim 

;; Author: Guilherme Gondim
;; URL: https://semente.io/emacs.el
;; Version: 2018-04-28

;; This file is NOT part of GNU Emacs.

;;; Commentary:

;; [...] Read more

Building a community internet network

Motherboard & VICE are building a community internet network.

“In order to preserve net neutrality and the free and open internet, we must end our reliance on monopolistic corporations and build something fundamentally different: internet infrastructure that is locally owned and operated and is dedicated to serving the people who connect to it.”

Hopefully it inspire other groups to do the same.

Meltdown & Spectre: upgrade your software!

From: newsletter@lists.riseup.net
Subject: Security Bulletin
Date: 2018-01-06

As you have probably read, there are three related security problems in
contemporary CPUs. These vulnerabilities open the potential for a nefarious
program to steal passwords, secrets, and personal information from you computer,
even if the program is just Javascript loaded from a web site you visit. These
vulnerabilities are as serious as they sound, and you should take action to
upgrade your software.

- The first [...] Read more

Riseup Story / Historia / Histoire

From: newsletter@lists.riseup.net
Subject: Riseup Story / Historia / Histoire
Date: 2017-12-17


Today, we present a Riseup story.

Once upon a time, there were a couple of fired-up twenty-somethings who
had just come out of an exhausting and exhilarating week of beautiful
protests against the World Trade Organization in Seattle. They had a
question in their burning hearts: what's the best way we can help build
justice movements in the world? Being of the hacker and geeky
persuasion, [...] Read more

1.4 billion plain-text leaked passwords found circulating online

4iQ discovered a single file with a database of 1.4 billion clear text credentials – the largest aggregate database found to date.

The 41GB dump was found on 5th December 2017 in an underground community forum. The database was recently updated with the last set of data inserted on 11/29/2017. The total amount of credentials (usernames/clear text password pairs) is 1,400,553,869.

Detecting the Intel Management Engine (ME) vulnerability

Researchers has identified security vulnerabilities on Intel Management Engine (Intel ME) that could potentially impact certain PCs, servers, and IoT platforms.

There is now a Linux-compatible detection tool released by Intel for confirming ME vulnerabilities (also available for MS Windows). If you are affected, that is the usual output you get from the GNU/Linux’s command-line tool:

$ sudo python ./intel_sa00086.py
INTEL-SA-00086 Detection Tool
Copyright(C) 2017, Intel Corporation, [...] Read more