Skip to main content

Posts

Showing posts from August, 2022

What's New in Firefox 104? Here it is

 Scheduled to be released on August 23, 2022, Mozilla Firefox 104 is officially available for download, both for Linux, macOS and Windows platforms. Firefox 104 version came as a beta testing version at the end of last July, by offering features that many parties have been waiting for, namely swipe left and right as a two-finger gesture without touching the alt key. Unfortunately, this feature seems immature, so the two-finger gesture feature will be coming from Firefox 105.

Linux Kernel 5.18 is Unsupported! Upgrade Immediately

Believe it or not, it seems that it is time for us to start leaving the Linux 5.18 kernel which has entered the EOL (end of life) period based on information from the kernel.org website. Linux kernel 5.18 was released at the end of May 2022 yesterday. This version is indeed one of the versions of the Linux kernel that is included in the short-lived series category. This kernel introduces new features such as support for "user events" in system tracing, support for AMD's "host system management port" function, support for 64-bit integrity checks on NVMe devices, support for the "hardware feedback interface" feature. Intel, as well as indirect branch tracking support for x86 architectures.

Star Lab Unveils Starbook Mk VI Linux Laptop with 12th Gen Intel or AMD Ryzen 7 CPU

An UK vendor, Star Labs, has just released a Linux laptop with an Intel 12th generation "alder-lake" with the name StarBook, the StarBook Mk VI.

Dotnet 6 Docker Container in Ubuntu 22.04 Is Available

.NET 6 is now available with Chiseled Ubuntu Containers. Our friends at Canonical have developed a new chisel approach for making ultra-small container images. We’re very excited about it. The Chiseled Ubuntu image is 100MB smaller than the Ubuntu images you’ve been using until now! Here’s the command to pull the new ASP.NET Chiseled image: docker pull mcr.microsoft.com/dotnet/nightly/aspnet:6.0-jammy-chiseled We also updated our dotnetapp and aspnetapp samples so that you can try out .NET with Chiseled Ubuntu Containers.

How to Install DotNet 6 on Ubuntu 22.04

 .NET 6 is now included in Ubuntu 22.04 (Jammy) and can be installed with just apt install dotnet6. This change is a major improvement and simplification for Ubuntu users. We’re also releasing .NET with Chiseled Ubuntu Containers, a new small and secure container offering from Canonical. These improvements are the result of a new partnership between Canonical and Microsoft.  Here’s the commands to install the .NET 6 SDK on Ubuntu 22.04:

How to Create Linux Command Line with Bash Aliases

If you’ve never created an alias before, create a file called .bash_aliases in your $HOME path if it doesn’t exist yet. Open a terminal and make sure that you are located in the $HOME directory.

VLC Officially Banned in India, What's Up?

Downloading the VLC app is no longer officially possible in India. This happened, due to the massive Cicada virus attack. VLC was one of the applications that fell victim to the Cicada malware attack, which can stay in RAM as a computer virus. Cicada malware can duplicate itself and insert itself into the MBR, the master boot record on the hard disk on the computer. The danger is, this Cicada malware begins to erase the hard drive and displays a warning related to virus infection to computer users.

There's Zero Day Exploit, Update Your Google Chrome Immediately

Google on Tuesday, released a special patch suddenly that addresses the exploit CVE-2022-2856 that specifically attacks the Chrome browser. The CVE above has the highest status, namely High-severity Zero-day Flaw. CVE-2022-2856, the issue has been described as a case of insufficient validation of untrusted input in Intents. Security researchers Ashley Shen and Christian Resell of Google Threat Analysis Group have been credited with reporting the flaw on July 19, 2022.

RedAlpha Group from China Attacks NGOs

A hacker group that is thought to be backed by the Chinese government, RedAlpha reportedly managed to mass attack humanitarian activists, think tanks and a number of state institutions within a year. They reportedly succeeded in hacking to access the email accounts and chat communications of their victims, both personal and institutional. CitizenLab started reporting on this hacker group last January 2018 in its report. Since then, this group has not stopped carrying out espionage, surveillance and information theft for some Tibetans and Indians through a malware called NjRAT backdoor.

Beware, Many Malware Appears As Browser Extensions

More than 1.3 million users have fallen victim to a malware-infected browser extension, at least once. This was conveyed by the security firm Karspersky yesterday. According to company data from Russia, at least from January 2020 to June 2022 there have been more than 4.3 million unique users who were attacked using adware that sneaked in as browser extensions. On average, about 70% of them are victims of unwanted addons.

North Korean Hacker, Attacking Job Seeker with Malicious MacOS Executable

 Hacker group from North Korea, Lazarus is reportedly attacking job seekers in cyberspace with malware that can specifically attack Apple Macs with Intel and M1 chipsets. It was ESET Security who reported this in a report entitled "Operation In(ter)ception" which was issued since last June 2020. The Lazarus Group reportedly uses social engineering tactics to trick job seekers in the aerospace and military fields with fake job vacancies, so that their data will be very easily collected and used to attack them in the future.

What is RubyGems?

  RubyGems is a package manager for the Ruby programming language that provides a standard format for distributing Ruby programs and libraries (in a self-contained format called a "gem"), a tool designed to easily manage the installation of gems, and a server for distributing them . It was created by Chad Fowler, Jim Weirich, David Alan Black, Paul Brannan and Richard Kilmer during RubyConf 2004. The interface for RubyGems is a command-line tool called gem which can install and manage libraries (the gems). RubyGems integrates with Ruby run-time loader to help find and load installed gems from standardized library folders. Though it is possible to use a private RubyGems repository, the public repository is most commonly used for gem management.

RubyGem Requires Multi-Factor Authentication

The Ruby Package Manager now follows in the same footsteps as NPM and PyPi by requiring multifactor authentication to access Ruby packages. Starting on August 15, 2022, all RubyGems users with a total of more than 180 million downloads are required to activate MFA to be able to enjoy the Ruby package download service. If some maintainers have exceeded 165 million package downloads, they will receive a notification to enable the MFA feature.

New SOVA Android Banking Trojan: Attack with New Capabilities & Targets

SOVA, a trojan on the android platform that attacks banking applications has now been detected as having new capabilities and targets. Around 200 mobile applications were recorded as being the target of one of the most vicious banking trojans in the world. Apart from attacking banking applications, SOVA trojan is also a crypto wallet and crypto exchange.

Shuckworm Malware is Attacking Ukraine, Sponsored by Russia?

Hackers allegedly supported by the Russian government, again attacked several institutions in Ukraine and carried out information theft by placing malware as an espionage operation. Symantec is a security firm that released several names of malware used by these hackers. The malware includes Shuckworm, which other security vendors call Actinium, Armageddon, Gamaredon, PrimitiveBear and Trident Ursa.

Twilio Hacked! 1900 Signal Messenger Account in Big Risk

The management of the Signal app announced a disclosure this week regarding Twilio being hacked. Around 1900 vulnerable users became victims of the hack. How can hacking on Twilio affect Signal apps? Investigate an investigation because Signal uses Twilio to send SMS verification when registering a new user.

What is AttackForge? The best Pen testing tool?

AttackForge is A pen test management and collaboration tool and it was developed to make security testing easier for both big and small businesses. The Daily Swig previously reported that the creators showed off an early iteration of the tool at Black Hat Europe 2021. The new capabilities in this year's ReportGen, according to Stas Filshtinskiy, co-founder of the DevSecOps tool, are intended to eliminate the "most hated element" of pen testing.

How to Start Child Coding

It's probable that you've heard a lot about coding and how crucial it is for kids to begin learning about it as soon as possible. We're not simply referring to the laptop or desktop computer you might have at home or on your desk at work when we say that computers have become a part of our lives. Computers are in charge of your phone, microwave, and car, and they require instructions to tell them what to do. These instructions must be written using coding, often known as computer programming. This is a tool and platform to start teaching coding to your child.

What is CrowPi2?

CrowPi2 is a new product that has been launched by Elecrow on KickStarter. It is a laptop-style shell that includes a huge selection of pre-connected sensors, switches and displays. As with the original CrowPi the idea behind it is that you can easily create and test projects without needing to worry about lots of wiring.

Sign-up Now, New Webinar Pipeline Implementation with Atlassian

When the entirety of developer productivity rests on your shoulders, it can be daunting to introduce pipeline changes. 😰 That's why Atlassian Open DevOps is introducing DevOps Talks. In this series, we're bringing together DevOps leaders to share their learnings, cautionary tales, and answers to any questions you might have! In this virtual fireside chat, join CICD experts from Bitbucket Pipelines, CircleCI, Harness and Octopus Deploy as they share the lessons they've learned from implementing pipelines for development teams of all topologies, sizes, and industries. In this webinar, you will learn: • What to do and what not to do when implementing and configuring your CICD pipeline • How to alter your pipelines to meet industry specific standards • Where they think the future of CICD is going Are you ready to optimize your developers' productivity? Save your seat to learn more. Sign-up Now here

Ikuti Webinar Storage Baremetal dari Biznet Gio

R&D atau lab riset yang terdapat pada perusahaan atau institusi pendidikan umumnya membutuhkan server yang mampu menampung workload dan storage yang besar. Namun, apakah sudah ada layanan bare metal server yang memiliki penyimpanan dengan skalabilitas tinggi? Menjawab permasalahan tersebut, Biznet Gio menghadirkan NEO Metal, layanan Bare Metal Server berteknologi canggih dengan NEO Elastic Storage, sebagai expandable storage yang membuat kedua layanan ini cocok untuk mendukung pengembangan produk digital yang inovatif.

FFMPEG Tutorial: Stacking 4 Video Input by 2x2 Matrix Output

  Use the   vstack   (vertical),   hstack   (horizontal), or   xstack   (custom layout) filters. It is easier and faster than other methods. Combine/stack two videos or images Vertical

Watch PiHut Tear-downing the Raspberry Pi 400!

 The new Raspberry Pi four hundred is an altogether unique type of product than we`re used to seeing from Raspberry Pi.   Whilst The Pi400 keeps comparable functions and overall performance to the Raspberry Pi 4, and really tons borrows it`s `clicky elements` from the present Raspberry Pi keyboard, having the running elements hidden away isn`t some thing we`re used to seeing from the smart parents at Raspberry Pi.   Whilst this eliminates a whole lot of the distraction for plenty information customers starting off on a brand new coding journey, a lot of us pro Raspberry Pi customers are keen to look what`s taking place below the hood! 

How to Monitor 3D Printer with Raspberry Pi Zero 2

Many of you're proud proprietors of 3-d Printers AND virtually have the time to make cool stuff with them! We`re very jealous of you.  Envy aside, some thing we see quite a few our clients making with the Raspberry Pi Zero are 3-d printer tracking projects - combining a Raspberry Pi Zero with a digital digicam module and streaming the output over the integrated Wi-Fi, permitting you to maintain a watch in your print from the consolation of your sofa. 

How to Create DIY Camera for Raspberry Pi Zero 2

The Raspberry Pi Zero 2 has a small camera connection at one end. This can be connected to a ZeroCam camera, or one of the official Raspberry Pi Camera Modules, with the use of an adapter cable. During 2021, Raspberry Pi cameras were used for many projects, one of the most popular being to make a webcam for family and work video calls. USB webcams were hard to come by that year, so the Raspberry Pi webcam was a great solution. Raspberry Pi Zero webcam DIYs are making great quality cameras using Raspberry Pi mounting plates and Jeff Geerling's Raspberry Pi Camera. Our favorite example of this is the HQ Camera. You can watch the full video tutorial from Jeff Geerling here:

How to Block Internet Ads in Your Entire House with Raspberry Pi

Raspberry Pi Zero 2 can become a free ad-blocker on your network in less than an hour, blocking ads on websites and streaming services. Ads are not so bad, as long as the content to ad ratio is reasonable. Unfortunately this is rarely the case. Pi-hole blocks ads, trackers, and other things network-wide. This means that there is no need to install blockers on every PC or browser, and manage their settings separately. This can help with privacy, network speed, safe surfing, and most importantly, frustration. Pi-hole does an awesome job of documenting their install process and settings on their website, which youll have to log into your router and change a few things. The YouTube ads can still get through, but with the right settings, you can stop them on 4OD and ITV Player. The Raspberry Pi Zero 2 is a small and resource-less computer, which makes it the perfect choice for running the project wirelessly. Yo u can install by  read this documentation:  https://docs.pi-hole.net/  

Amazon Rekognition OCR Example Apps

Our project structure we'll be like this: |-- config | |-- __init__.py | |-- aws_config.py |-- images | |-- aircraft.png | |-- challenging.png | |-- park.png | |-- street_signs.png |-- amazon_ocr.py edit the aws_config.py and add your own AWS access key, secret key and regions. # define our AWS Access Key, Secret Key, and Region ACCESS_KEY = "YOUR_ACCESS_KEY" SECRET_KEY = "YOUR_SECRET_KEY" REGION = "YOUR_AWS_REGION" then # import the necessary packages from config import aws_config as config import argparse import boto3 import cv2 def draw_ocr_results(image, text, poly, color=(0, 255, 0)): # unpack the bounding box, taking care to scale the coordinates # relative to the input image size (h, w) = image.shape[:2] tlX = int(poly[0]["X"] * w) tlY = int(poly[0]["Y"] * h) trX = int(poly[1]["X"] * w) trY = int(poly[1]["Y"] * h) brX = int(poly[2]["X"] * w) brY = int(po

How to Install Amazon Rekognition Python Package

To be able to se Amazon Rekognition API for OCR, we need to have the openCV library installed on the system. We can install it by using pip. To interface with the Amazon Rekognition API, we need to use the boto3 package: the AWS SDK. Luckily, boto3 is incredibly simple to install, requiring only a single pip-install command:  $ pip install boto3  If you are using a Python virtual environment or an Anaconda environment, be sure to use the appropriate command to access your Python environment before running the above command (otherwise, boto3 will be installed in the system install of Python).