Knoppix 8.6 first wide public release to abandon systemd (techrepublic.com)
https://www.techrepublic.com/article/knoppix-8-6-first-wide-public-release-to-abandon-systemd/
https://redd.it/csv2nb
@r_linux
https://www.techrepublic.com/article/knoppix-8-6-first-wide-public-release-to-abandon-systemd/
https://redd.it/csv2nb
@r_linux
Pine64 Plans to Give PinePhone Profits to "the development community and third-party Linux-on-phone projects"
https://www.pine64.org/2019/08/19/its-time-to-start-giving-back/
https://redd.it/cssu0t
@r_linux
https://www.pine64.org/2019/08/19/its-time-to-start-giving-back/
https://redd.it/cssu0t
@r_linux
pine64.org
Its time to start giving back
PINE64’s commitment to giving back to the community, partner projects and the society has been outlined by TL Lim during our community meetup in Hyde Park, London on 18 August, 2018.
Command Line Heroes: The Infrastructure Effect - COBOL and GO
https://www.redhat.com/en/command-line-heroes/season-3/the-infrastructure-effect
https://redd.it/csvoa3
@r_linux
https://www.redhat.com/en/command-line-heroes/season-3/the-infrastructure-effect
https://redd.it/csvoa3
@r_linux
Redhat
The Infrastructure Effect | Command Line Heroes
Languages used for IT infrastructure don’t have expiration dates. COBOL’s been around for 60 years—and isn’t going anywhere anytime soon. We maintain billions of lines of classic code for mainframes. But we’re also building new infrastructures for the cloud…
Will a desktop independent utilities like EasyStroke (custom gestures) and xdotool ever be possible on Wayland?
Also how do stuff like clipboards work? Are they all compositor specific too?
https://redd.it/cswdkt
@r_linux
Also how do stuff like clipboards work? Are they all compositor specific too?
https://redd.it/cswdkt
@r_linux
reddit
r/linux - Will a desktop independent utilities like EasyStroke (custom gestures) and xdotool ever be possible on Wayland?
8 votes and 5 comments so far on Reddit
10 Tricks to paint faster & better with Krita [Official Channel]
https://share.tube/videos/watch/17d33ffb-8b78-42bf-9066-be71910e5595
https://redd.it/cswv2a
@r_linux
https://share.tube/videos/watch/17d33ffb-8b78-42bf-9066-be71910e5595
https://redd.it/cswv2a
@r_linux
share.tube
10 Tricks to paint faster & better with Krita
Hello everybody! and welcome to this new video. In this video you will learn fast tricks to paint faster and better because saving time is important in daily work.
I hope you like it. Iy you want to support Krita, then subscribe and enjoy the upcoming videos.…
I hope you like it. Iy you want to support Krita, then subscribe and enjoy the upcoming videos.…
PSA: Reddit Bug affecting comments/posting
PSA:
Reddit seems to have a sitewide bug on commenting at the least, possibly submitting:
https://www.reddit.com/r/bugs/comments/cssy0m/comments_arent_showing_up/
/r/ModSupport/comments/cst2rr/psa_theres_a_reddit_bug_going_around_not_showing/
So far the admins haven't provided news. Please be aware that your comments may not show up and there's nothing the mods can do at this time.
https://redd.it/ct0cxk
@r_linux
PSA:
Reddit seems to have a sitewide bug on commenting at the least, possibly submitting:
https://www.reddit.com/r/bugs/comments/cssy0m/comments_arent_showing_up/
/r/ModSupport/comments/cst2rr/psa_theres_a_reddit_bug_going_around_not_showing/
So far the admins haven't provided news. Please be aware that your comments may not show up and there's nothing the mods can do at this time.
https://redd.it/ct0cxk
@r_linux
reddit
r/bugs - Comments aren't showing up
4 votes and 8 comments so far on Reddit
The OpenPOWER foundation joins the Linux foundation.
https://openpowerfoundation.org/the-next-step-in-the-openpower-foundation-journey/
https://redd.it/ct1q2k
@r_linux
https://openpowerfoundation.org/the-next-step-in-the-openpower-foundation-journey/
https://redd.it/ct1q2k
@r_linux
IBM Open Sources Power Chip Instruction Set
https://www.nextplatform.com/2019/08/20/big-blue-open-sources-power-chip-instruction-set/
https://redd.it/ct2uh4
@r_linux
https://www.nextplatform.com/2019/08/20/big-blue-open-sources-power-chip-instruction-set/
https://redd.it/ct2uh4
@r_linux
The Next Platform
Big Blue Open Sources Power Chip Instruction Set - The Next Platform
It has been a long time coming, and it might have been better if this had been done a decade ago. But with a big injection of open source spirit from its
Video tutorials for Linux and shell beginners
I created some videos for linux beginners but also to give a very short overview about certain topics:
[https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8\_rkyOKU](https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8_rkyOKU)
I would like to get some feedback about the videos here and also some ideas what would be worth a video.
I played around with the voice. My final choice is to use Amazon aws for text to speech. I am not a native english speaker ;)
https://redd.it/ct45mv
@r_linux
I created some videos for linux beginners but also to give a very short overview about certain topics:
[https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8\_rkyOKU](https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8_rkyOKU)
I would like to get some feedback about the videos here and also some ideas what would be worth a video.
I played around with the voice. My final choice is to use Amazon aws for text to speech. I am not a native english speaker ;)
https://redd.it/ct45mv
@r_linux
Youtube
Oops! Something went wrong. - YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Reflinks vs symlinks vs hard links, and how they can help machine learning projects
A new type of link, the Reflink (copy-on-write), is starting to be available in newer releases of Mac OS X (APFS) and Linux (BTRFS, XFS, OCFS2, with the desired filesystem driver). The following article explains use each of them in turn and see how well they work for managing machine learning projects when setting up new experiments, to rearrange data files quickly and efficiently while avoiding the risk of polluting the data files with erroneous edits: [Reflinks vs symlinks vs hard links, and how they can help machine learning projects](https://hackernoon.com/reflinks-vs-symlinks-vs-hard-links-and-how-they-can-help-machine-learning-projects-wz2ej3xa7)
https://redd.it/ct26qb
@r_linux
A new type of link, the Reflink (copy-on-write), is starting to be available in newer releases of Mac OS X (APFS) and Linux (BTRFS, XFS, OCFS2, with the desired filesystem driver). The following article explains use each of them in turn and see how well they work for managing machine learning projects when setting up new experiments, to rearrange data files quickly and efficiently while avoiding the risk of polluting the data files with erroneous edits: [Reflinks vs symlinks vs hard links, and how they can help machine learning projects](https://hackernoon.com/reflinks-vs-symlinks-vs-hard-links-and-how-they-can-help-machine-learning-projects-wz2ej3xa7)
https://redd.it/ct26qb
@r_linux
Hackernoon
Reflinks vs symlinks vs hard links, and how they can help machine learning projects | Hacker Noon
Hard links and symbolic links have been available since time immemorial, and we use them all the time without even thinking about it. In machine learning projects they can help us, when setting up new experiments, to rearrange data files quickly and efficiently…
Can anyone point me to see good video resources for learning SED and AWK?
I've realized I need to up my game. Anyone have some good resources?
https://redd.it/ct7bc1
@r_linux
I've realized I need to up my game. Anyone have some good resources?
https://redd.it/ct7bc1
@r_linux
reddit
r/linux - Can anyone point me to see good video resources for learning SED and AWK?
0 votes and 1 comment so far on Reddit
[Tutorial for beginners] GnuPG: how to export, import, delete and revoke your keys
Hello, friends!
​
In my first [post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/), I taught you how to install, create and use GnuPG keys on GNU/Linux. Now, this tutorial is a reference to export, import, delete and revoke any GPG key. This is very useful when you work as system administrator and employees working in your company need to have their keys saved in the servers.
For this tutorial, I'm going to use the parameter `--armour` (you can use it without letter 'u'). But, why? Some times, you need a readable file (file in text format, similar to .TXT, or any other plain text format) for a specific situation, for example, include your public key in your GitHub account. It's up to you if you want to use or not the *armour* parameter.
Let's start!
Open a terminal and list your keys:
$ gpg --list-keys
https://i.redd.it/76pz3v7vloh31.png
Did you get a return? Are your keys listed?
If no, please read my [first post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/).
If yes, here is the first step: export your keys (public and private) and create your revocation certificate.
Maybe, you are asking to yourself: what is this revocation certificate?
In the worst case scenario, someone discovered your GnuPG password and, somehow, got your keys. Unhappily, they are compromised. A revocation certificate makes your keys become useless.
There's one thing I'd like to let you know: once you try to export any key (and revocation certificate), the default output is redirected to the screen, but we need to save it into a file. The parameter `--output` is used to redirect this output from your screen to a file. There's another way you can redirect it: with `> filename`, for example: `gpg --export` `john.doe@email.com` `> public.key`. With this in mind, type the commands bellow:
$ gpg --armour --output public-key.asc --export john.doe@email.com
$ gpg --armour --output private-key.asc --export-secret-keys john.doe@email.com
# Type your GnuPG password
$ gpg --armour --output revoke.asc --generate-revocation john.doe@email.com
# This command is going to ask you about the reason why you're creating a revocation certificate.
# Select the option, press ENTER and write an optional denoscription.
# Later, confirm with 'y'.
# Type your GnuPG password
https://i.redd.it/6p2hassmmoh31.png
Now, you can send your public key to someone you trust. And keep your keys and certificate save in an external hard drive. Just send (and use) your revocation certificate once your keys are compromised. Otherwise, keep it with you.
To see how the revoke process works, you can do this:
* List your keys with `gpg --list-keys`.
* You can see lines starting with 'pub', 'uid' and 'sub'.
* In the line 'uid', it mentions the trust of this key, like *\[ultimate\]*, and your personal denoscription (full name, comment and email).
* Type:
* $ gpg --import revoke.asc
* The output in your screen is informing you that it was processed with success.
* Now, list again you keys. The 'sub' line disappeared and the 'uid' line is informing you that your key is *\[revoked\]* (check it with `gpg --list-keys`).
https://i.redd.it/klw5qd00noh31.png
Once it's done, delete your GPG key with the command bellow:
$ gpg --delete-secret-and-public-keys john.doe@email.com
GnuPG is going to ask you (with 'yes-no' prompt) to continue. Confirm all questions that are prompted to you.
https://i.redd.it/j65msulcnoh31.png
After that, you can try list again (`gpg --list-keys`) and you're going to see two lines which say:
>***gpg: checking the trustdb***
>
>***gpg: no ultimately trusted keys found***
These lines above mean that your system doesn't have any key, because you deleted them.
Now, the last step: how to import any GnuPG key to your system.
Type in your terminal:
$ gpg --import public-key.asc
$ gpg --import --allow-secret-key-impor
Hello, friends!
​
In my first [post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/), I taught you how to install, create and use GnuPG keys on GNU/Linux. Now, this tutorial is a reference to export, import, delete and revoke any GPG key. This is very useful when you work as system administrator and employees working in your company need to have their keys saved in the servers.
For this tutorial, I'm going to use the parameter `--armour` (you can use it without letter 'u'). But, why? Some times, you need a readable file (file in text format, similar to .TXT, or any other plain text format) for a specific situation, for example, include your public key in your GitHub account. It's up to you if you want to use or not the *armour* parameter.
Let's start!
Open a terminal and list your keys:
$ gpg --list-keys
https://i.redd.it/76pz3v7vloh31.png
Did you get a return? Are your keys listed?
If no, please read my [first post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/).
If yes, here is the first step: export your keys (public and private) and create your revocation certificate.
Maybe, you are asking to yourself: what is this revocation certificate?
In the worst case scenario, someone discovered your GnuPG password and, somehow, got your keys. Unhappily, they are compromised. A revocation certificate makes your keys become useless.
There's one thing I'd like to let you know: once you try to export any key (and revocation certificate), the default output is redirected to the screen, but we need to save it into a file. The parameter `--output` is used to redirect this output from your screen to a file. There's another way you can redirect it: with `> filename`, for example: `gpg --export` `john.doe@email.com` `> public.key`. With this in mind, type the commands bellow:
$ gpg --armour --output public-key.asc --export john.doe@email.com
$ gpg --armour --output private-key.asc --export-secret-keys john.doe@email.com
# Type your GnuPG password
$ gpg --armour --output revoke.asc --generate-revocation john.doe@email.com
# This command is going to ask you about the reason why you're creating a revocation certificate.
# Select the option, press ENTER and write an optional denoscription.
# Later, confirm with 'y'.
# Type your GnuPG password
https://i.redd.it/6p2hassmmoh31.png
Now, you can send your public key to someone you trust. And keep your keys and certificate save in an external hard drive. Just send (and use) your revocation certificate once your keys are compromised. Otherwise, keep it with you.
To see how the revoke process works, you can do this:
* List your keys with `gpg --list-keys`.
* You can see lines starting with 'pub', 'uid' and 'sub'.
* In the line 'uid', it mentions the trust of this key, like *\[ultimate\]*, and your personal denoscription (full name, comment and email).
* Type:
* $ gpg --import revoke.asc
* The output in your screen is informing you that it was processed with success.
* Now, list again you keys. The 'sub' line disappeared and the 'uid' line is informing you that your key is *\[revoked\]* (check it with `gpg --list-keys`).
https://i.redd.it/klw5qd00noh31.png
Once it's done, delete your GPG key with the command bellow:
$ gpg --delete-secret-and-public-keys john.doe@email.com
GnuPG is going to ask you (with 'yes-no' prompt) to continue. Confirm all questions that are prompted to you.
https://i.redd.it/j65msulcnoh31.png
After that, you can try list again (`gpg --list-keys`) and you're going to see two lines which say:
>***gpg: checking the trustdb***
>
>***gpg: no ultimately trusted keys found***
These lines above mean that your system doesn't have any key, because you deleted them.
Now, the last step: how to import any GnuPG key to your system.
Type in your terminal:
$ gpg --import public-key.asc
$ gpg --import --allow-secret-key-impor
reddit
[Tutorial for beginners] How to install and use GnuPG on GNU/Linux
Posted in r/linux by u/alencc1986 • 78 points and 17 comments
t private-key.asc
# Type your GnuPG password
https://i.redd.it/0f4sd30nnoh31.png
Once your keys were imported, you need to edit and trust them.
$ gpg --edit-key john.doe@email.com
# Type 'trust' (without quotes)
# Select an option depending on how much do you trust this key you're importing
# Confirm with 'y'
# Then type quit
https://i.redd.it/eyvly4wrqoh31.png
With these commands, you learned the basics about import (and trust keys), export, revoke and delete GPG keys.
If you have any question about this tutorial, just ask me here in the comments.
​
Thank you!
https://redd.it/ct7yjr
@r_linux
# Type your GnuPG password
https://i.redd.it/0f4sd30nnoh31.png
Once your keys were imported, you need to edit and trust them.
$ gpg --edit-key john.doe@email.com
# Type 'trust' (without quotes)
# Select an option depending on how much do you trust this key you're importing
# Confirm with 'y'
# Then type quit
https://i.redd.it/eyvly4wrqoh31.png
With these commands, you learned the basics about import (and trust keys), export, revoke and delete GPG keys.
If you have any question about this tutorial, just ask me here in the comments.
​
Thank you!
https://redd.it/ct7yjr
@r_linux