Monday, August 22, 2022

What's New in Firefox 104? Here it is

 Scheduled to be released on August 23, 2022, Mozilla Firefox 104 is officially available for download, both for Linux, macOS and Windows platforms.


Firefox 104 version came as a beta testing version at the end of last July, by offering features that many parties have been waiting for, namely swipe left and right as a two-finger gesture without touching the alt key. Unfortunately, this feature seems immature, so the two-finger gesture feature will be coming from Firefox 105.

Linux Kernel 5.18 is Unsupported! Upgrade Immediately

Believe it or not, it seems that it is time for us to start leaving the Linux 5.18 kernel which has entered the EOL (end of life) period based on information from the kernel.org website.


Linux kernel 5.18 was released at the end of May 2022 yesterday. This version is indeed one of the versions of the Linux kernel that is included in the short-lived series category. This kernel introduces new features such as support for "user events" in system tracing, support for AMD's "host system management port" function, support for 64-bit integrity checks on NVMe devices, support for the "hardware feedback interface" feature. Intel, as well as indirect branch tracking support for x86 architectures.

Thursday, August 18, 2022

Dotnet 6 Docker Container in Ubuntu 22.04 Is Available

.NET 6 is now available with Chiseled Ubuntu Containers. Our friends at Canonical have developed a new chisel approach for making ultra-small container images. We’re very excited about it. The Chiseled Ubuntu image is 100MB smaller than the Ubuntu images you’ve been using until now!

Here’s the command to pull the new ASP.NET Chiseled image:

docker pull mcr.microsoft.com/dotnet/nightly/aspnet:6.0-jammy-chiseled

We also updated our dotnetapp and aspnetapp samples so that you can try out .NET with Chiseled Ubuntu Containers.

How to Install DotNet 6 on Ubuntu 22.04

 .NET 6 is now included in Ubuntu 22.04 (Jammy) and can be installed with just apt install dotnet6. This change is a major improvement and simplification for Ubuntu users. We’re also releasing .NET with Chiseled Ubuntu Containers, a new small and secure container offering from Canonical. These improvements are the result of a new partnership between Canonical and Microsoft. 

Here’s the commands to install the .NET 6 SDK on Ubuntu 22.04:

Wednesday, August 17, 2022

VLC Officially Banned in India, What's Up?

Downloading the VLC app is no longer officially possible in India. This happened, due to the massive Cicada virus attack. VLC was one of the applications that fell victim to the Cicada malware attack, which can stay in RAM as a computer virus.

Cicada malware can duplicate itself and insert itself into the MBR, the master boot record on the hard disk on the computer. The danger is, this Cicada malware begins to erase the hard drive and displays a warning related to virus infection to computer users.

There's Zero Day Exploit, Update Your Google Chrome Immediately


Google on Tuesday, released a special patch suddenly that addresses the exploit CVE-2022-2856 that specifically attacks the Chrome browser. The CVE above has the highest status, namely High-severity Zero-day Flaw.

CVE-2022-2856, the issue has been described as a case of insufficient validation of untrusted input in Intents. Security researchers Ashley Shen and Christian Resell of Google Threat Analysis Group have been credited with reporting the flaw on July 19, 2022.

RedAlpha Group from China Attacks NGOs

A hacker group that is thought to be backed by the Chinese government, RedAlpha reportedly managed to mass attack humanitarian activists, think tanks and a number of state institutions within a year. They reportedly succeeded in hacking to access the email accounts and chat communications of their victims, both personal and institutional.

CitizenLab started reporting on this hacker group last January 2018 in its report. Since then, this group has not stopped carrying out espionage, surveillance and information theft for some Tibetans and Indians through a malware called NjRAT backdoor.

Beware, Many Malware Appears As Browser Extensions

More than 1.3 million users have fallen victim to a malware-infected browser extension, at least once. This was conveyed by the security firm Karspersky yesterday.

According to company data from Russia, at least from January 2020 to June 2022 there have been more than 4.3 million unique users who were attacked using adware that sneaked in as browser extensions. On average, about 70% of them are victims of unwanted addons.

North Korean Hacker, Attacking Job Seeker with Malicious MacOS Executable


 Hacker group from North Korea, Lazarus is reportedly attacking job seekers in cyberspace with malware that can specifically attack Apple Macs with Intel and M1 chipsets.


It was ESET Security who reported this in a report entitled "Operation In(ter)ception" which was issued since last June 2020. The Lazarus Group reportedly uses social engineering tactics to trick job seekers in the aerospace and military fields with fake job vacancies, so that their data will be very easily collected and used to attack them in the future.

What is RubyGems?

 RubyGems is a package manager for the Ruby programming language that provides a standard format for distributing Ruby programs and libraries (in a self-contained format called a "gem"), a tool designed to easily manage the installation of gems, and a server for distributing them. It was created by Chad Fowler, Jim Weirich, David Alan Black, Paul Brannan and Richard Kilmer during RubyConf 2004.

The interface for RubyGems is a command-line tool called gem which can install and manage libraries (the gems). RubyGems integrates with Ruby run-time loader to help find and load installed gems from standardized library folders. Though it is possible to use a private RubyGems repository, the public repository is most commonly used for gem management.

RubyGem Requires Multi-Factor Authentication


The Ruby Package Manager now follows in the same footsteps as NPM and PyPi by requiring multifactor authentication to access Ruby packages.

Starting on August 15, 2022, all RubyGems users with a total of more than 180 million downloads are required to activate MFA to be able to enjoy the Ruby package download service. If some maintainers have exceeded 165 million package downloads, they will receive a notification to enable the MFA feature.

Tuesday, August 16, 2022

New SOVA Android Banking Trojan: Attack with New Capabilities & Targets

SOVA, a trojan on the android platform that attacks banking applications has now been detected as having new capabilities and targets. Around 200 mobile applications were recorded as being the target of one of the most vicious banking trojans in the world. Apart from attacking banking applications, SOVA trojan is also a crypto wallet and crypto exchange.

Shuckworm Malware is Attacking Ukraine, Sponsored by Russia?

Hackers allegedly supported by the Russian government, again attacked several institutions in Ukraine and carried out information theft by placing malware as an espionage operation.

Symantec is a security firm that released several names of malware used by these hackers. The malware includes Shuckworm, which other security vendors call Actinium, Armageddon, Gamaredon, PrimitiveBear and Trident Ursa.

Twilio Hacked! 1900 Signal Messenger Account in Big Risk

The management of the Signal app announced a disclosure this week regarding Twilio being hacked. Around 1900 vulnerable users became victims of the hack.

How can hacking on Twilio affect Signal apps? Investigate an investigation because Signal uses Twilio to send SMS verification when registering a new user.

Saturday, August 13, 2022

What is AttackForge? The best Pen testing tool?

AttackForge is A pen test management and collaboration tool and it was developed to make security testing easier for both big and small businesses.

The Daily Swig previously reported that the creators showed off an early iteration of the tool at Black Hat Europe 2021.

The new capabilities in this year's ReportGen, according to Stas Filshtinskiy, co-founder of the DevSecOps tool, are intended to eliminate the "most hated element" of pen testing.

How to Start Child Coding

It's probable that you've heard a lot about coding and how crucial it is for kids to begin learning about it as soon as possible. We're not simply referring to the laptop or desktop computer you might have at home or on your desk at work when we say that computers have become a part of our lives. Computers are in charge of your phone, microwave, and car, and they require instructions to tell them what to do. These instructions must be written using coding, often known as computer programming.

This is a tool and platform to start teaching coding to your child.

What is CrowPi2?

CrowPi2 is a new product that has been launched by Elecrow on KickStarter. It is a laptop-style shell that includes a huge selection of pre-connected sensors, switches and displays. As with the original CrowPi the idea behind it is that you can easily create and test projects without needing to worry about lots of wiring.

Sign-up Now, New Webinar Pipeline Implementation with Atlassian

When the entirety of developer productivity rests on your shoulders, it can be daunting to introduce pipeline changes. 😰 That's why Atlassian Open DevOps is introducing DevOps Talks. In this series, we're bringing together DevOps leaders to share their learnings, cautionary tales, and answers to any questions you might have!

In this virtual fireside chat, join CICD experts from Bitbucket Pipelines, CircleCI, Harness and Octopus Deploy as they share the lessons they've learned from implementing pipelines for development teams of all topologies, sizes, and industries.

In this webinar, you will learn:

What to do and what not to do when implementing and configuring your CICD pipeline

How to alter your pipelines to meet industry specific standards

Where they think the future of CICD is going

Are you ready to optimize your developers' productivity? Save your seat to learn more.

Sign-up Now here

Friday, August 12, 2022

Ikuti Webinar Storage Baremetal dari Biznet Gio

R&D atau lab riset yang terdapat pada perusahaan atau institusi pendidikan umumnya membutuhkan server yang mampu menampung workload dan storage yang besar. Namun, apakah sudah ada layanan bare metal server yang memiliki penyimpanan dengan skalabilitas tinggi?

Menjawab permasalahan tersebut, Biznet Gio menghadirkan NEO Metal, layanan Bare Metal Server berteknologi canggih dengan NEO Elastic Storage, sebagai expandable storage yang membuat kedua layanan ini cocok untuk mendukung pengembangan produk digital yang inovatif.

Tuesday, August 9, 2022

Thursday, August 4, 2022

Watch PiHut Tear-downing the Raspberry Pi 400!

 The new Raspberry Pi four hundred is an altogether unique type of product than we`re used to seeing from Raspberry Pi. 

 Whilst The Pi400 keeps comparable functions and overall performance to the Raspberry Pi 4, and really tons borrows it`s `clicky elements` from the present Raspberry Pi keyboard, having the running elements hidden away isn`t some thing we`re used to seeing from the smart parents at Raspberry Pi. 

 Whilst this eliminates a whole lot of the distraction for plenty information customers starting off on a brand new coding journey, a lot of us pro Raspberry Pi customers are keen to look what`s taking place below the hood! 

How to Monitor 3D Printer with Raspberry Pi Zero 2


Many of you're proud proprietors of 3-d Printers AND virtually have the time to make cool stuff with them! We`re very jealous of you. 

Envy aside, some thing we see quite a few our clients making with the Raspberry Pi Zero are 3-d printer tracking projects - combining a Raspberry Pi Zero with a digital digicam module and streaming the output over the integrated Wi-Fi, permitting you to maintain a watch in your print from the consolation of your sofa. 

How to Create DIY Camera for Raspberry Pi Zero 2

The Raspberry Pi Zero 2 has a small camera connection at one end. This can be connected to a ZeroCam camera, or one of the official Raspberry Pi Camera Modules, with the use of an adapter cable.

During 2021, Raspberry Pi cameras were used for many projects, one of the most popular being to make a webcam for family and work video calls. USB webcams were hard to come by that year, so the Raspberry Pi webcam was a great solution.

Raspberry Pi Zero webcam DIYs are making great quality cameras using Raspberry Pi mounting plates and Jeff Geerling's Raspberry Pi Camera. Our favorite example of this is the HQ Camera.

You can watch the full video tutorial from Jeff Geerling here:


How to Block Internet Ads in Your Entire House with Raspberry Pi


Raspberry Pi Zero 2 can become a free ad-blocker on your network in less than an hour, blocking ads on websites and streaming services. Ads are not so bad, as long as the content to ad ratio is reasonable. Unfortunately this is rarely the case.

Pi-hole blocks ads, trackers, and other things network-wide. This means that there is no need to install blockers on every PC or browser, and manage their settings separately. This can help with privacy, network speed, safe surfing, and most importantly, frustration.

Pi-hole does an awesome job of documenting their install process and settings on their website, which youll have to log into your router and change a few things. The YouTube ads can still get through, but with the right settings, you can stop them on 4OD and ITV Player.

The Raspberry Pi Zero 2 is a small and resource-less computer, which makes it the perfect choice for running the project wirelessly.

Yo u can install by  read this documentation: https://docs.pi-hole.net/  

Amazon Rekognition OCR Example Apps


Our project structure we'll be like this:

|-- config
|   |-- __init__.py
|   |-- aws_config.py
|-- images
|   |-- aircraft.png
|   |-- challenging.png
|   |-- park.png
|   |-- street_signs.png
|-- amazon_ocr.py

edit the aws_config.py and add your own AWS access key, secret key and regions.

# define our AWS Access Key, Secret Key, and Region

ACCESS_KEY = "YOUR_ACCESS_KEY"

SECRET_KEY = "YOUR_SECRET_KEY"

REGION = "YOUR_AWS_REGION"

then

# import the necessary packages
from config import aws_config as config
import argparse
import boto3
import cv2

def draw_ocr_results(image, text, poly, color=(0, 255, 0)):
   # unpack the bounding box, taking care to scale the coordinates
   # relative to the input image size
   (h, w) = image.shape[:2]
   tlX = int(poly[0]["X"] * w)
   tlY = int(poly[0]["Y"] * h)
   trX = int(poly[1]["X"] * w)
   trY = int(poly[1]["Y"] * h)
   brX = int(poly[2]["X"] * w)
   brY = int(poly[2]["Y"] * h)
   blX = int(poly[3]["X"] * w)
   blY = int(poly[3]["Y"] * h)

# build a list of points and use it to construct each vertex
   # of the bounding box
   pts = ((tlX, tlY), (trX, trY), (brX, brY), (blX, blY))
   topLeft = pts[0]
   topRight = pts[1]
   bottomRight = pts[2]
   bottomLeft = pts[3]

   # draw the bounding box of the detected text
   cv2.line(image, topLeft, topRight, color, 2)
   cv2.line(image, topRight, bottomRight, color, 2)
   cv2.line(image, bottomRight, bottomLeft, color, 2)
   cv2.line(image, bottomLeft, topLeft, color, 2)

   # draw the text itself
   cv2.putText(image, text, (topLeft[0], topLeft[1] - 10),
      cv2.FONT_HERSHEY_SIMPLEX, 0.8, color, 2)

   # return the output image
   return image

   # construct the argument parser and parse the arguments
	ap = argparse.ArgumentParser()
	ap.add_argument("-i", "--image", required=True,
	   help="path to input image that we'll submit to AWS Rekognition")
	ap.add_argument("-t", "--type", type=str, default="line",
	   choices=["line", "word"],
	   help="output text type (either 'line' or 'word')")
	args = vars(ap.parse_args())

	# connect to AWS so we can use the Amazon Rekognition OCR API
	client = boto3.client(
	   "rekognition",
	   aws_access_key_id=config.ACCESS_KEY,
	   aws_secret_access_key=config.SECRET_KEY,
	   region_name=config.REGION)

	# load the input image as a raw binary file and make a request to
	# the Amazon Rekognition OCR API
	print("[INFO] making request to AWS Rekognition API...")
	image = open(args["image"], "rb").read()
	response = client.detect_text(Image={"Bytes": image})

	# grab the text detection results from the API and load the input
	# image again, this time in OpenCV format
	detections = response["TextDetections"]
	image = cv2.imread(args["image"])

	# make a copy of the input image for final output
	final = image.copy()


# loop over the text detection bounding boxes
for detection in detections:
   # extract the OCR'd text, text type, and bounding box coordinates
   text = detection["DetectedText"]
   textType = detection["Type"]
   poly = detection["Geometry"]["Polygon"]

   # only draw show the output of the OCR process if we are looking
   # at the correct text type
   if args["type"] == textType.lower():
      # draw the output OCR line-by-line
      output = image.copy()
      output = draw_ocr_results(output, text, poly)
      final = draw_ocr_results(final, text, poly)

      # show the output OCR'd line
      print(text)
      cv2.imshow("Output", output)
      cv2.waitKey(0)

# show the final output image
cv2.imshow("Final Output", final)
cv2.waitKey(0)

To use it, we can type:

$ python amazon_ocr.py --image images/aircraft.png
[INFO] making request to AWS Rekognition API...
WARNING!
LOW FLYING AND DEPARTING AIRCRAFT
BLAST CAN CAUSE PHYSICAL INJURY

Happy coding!

How to Install Amazon Rekognition Python Package

To be able to se Amazon Rekognition API for OCR, we need to have the openCV library installed on the system. We can install it by using pip. To interface with the Amazon Rekognition API, we need to use the boto3 package: the AWS SDK. Luckily, boto3 is incredibly simple to install, requiring only a single pip-install command: 

$ pip install boto3 

If you are using a Python virtual environment or an Anaconda environment, be sure to use the appropriate command to access your Python environment before running the above command (otherwise, boto3 will be installed in the system install of Python).