Jimmy Wales (Wikipedia founder) has decided that the code of WT.Social (his new Facebook alternative) would be released under GPLv3
https://twitter.com/jimmy_wales/status/1197447535260000256
https://redd.it/e4bbu1
@r_linux
https://twitter.com/jimmy_wales/status/1197447535260000256
https://redd.it/e4bbu1
@r_linux
Twitter
Jimmy Wales
I have decided to freely license the code for https://t.co/x4CpI3FFM1 .
This week in KDE: GTK CSD support and more!
https://pointieststick.com/2019/11/30/this-week-in-kde-gtk-csd-support-and-more/
https://redd.it/e4d5xb
@r_linux
https://pointieststick.com/2019/11/30/this-week-in-kde-gtk-csd-support-and-more/
https://redd.it/e4d5xb
@r_linux
Adventures in Linux and KDE
This week in KDE: GTK CSD support and more!
I’ve got big news today. Something major landed: full support for the GTK_FRAME_EXTENTS_ protocol, which hugely improves the user experience for running GTK apps that use client-side decorati…
A tool to forward game controllers and other input devices over SSH – I couldn't find one, so I wrote my own!
https://yingtongli.me/blog/2019/12/01/input-over-ssh-2.html
https://redd.it/e4fxqo
@r_linux
https://yingtongli.me/blog/2019/12/01/input-over-ssh-2.html
https://redd.it/e4fxqo
@r_linux
The xkcd font is available with a CC BY-NC license!
https://github.com/ipython/xkcd-font
https://redd.it/e4fu1b
@r_linux
https://github.com/ipython/xkcd-font
https://redd.it/e4fu1b
@r_linux
GitHub
GitHub - ipython/xkcd-font: The xkcd font
The xkcd font. Contribute to ipython/xkcd-font development by creating an account on GitHub.
Intermediate linux usage: pipe data into a commit message.
https://gist.github.com/kuberlog/e2caf4d332aa331c70f1bbe03fe58a15
https://redd.it/e4ha7j
@r_linux
https://gist.github.com/kuberlog/e2caf4d332aa331c70f1bbe03fe58a15
https://redd.it/e4ha7j
@r_linux
Gist
This is an example of piping some command output into a commit message.
This is an example of piping some command output into a commit message. - commit-message-pipe.sh
High CPU usage on newly installed Fedora
hey guys
​
I've just install Fedora but my cpu usage so high even if I didn't do anything.
​
is it because of newly installed OS ?
​
Because I use before Ubuntu and Ubuntu was very silent. I installed Fedora the disk where the windows install before. Is it because of format issue of disk?
https://redd.it/e4g3c3
@r_linux
hey guys
​
I've just install Fedora but my cpu usage so high even if I didn't do anything.
​
is it because of newly installed OS ?
​
Because I use before Ubuntu and Ubuntu was very silent. I installed Fedora the disk where the windows install before. Is it because of format issue of disk?
https://redd.it/e4g3c3
@r_linux
reddit
High CPU usage on newly installed Fedora
hey guys I've just install Fedora but my cpu usage so high even if I didn't do anything. is it because of newly installed...
Canonical released a whitepaper on integrating Ubuntu into AD
https://ubuntu.com/engage/microsoft-active-directory?utm_source=Linkedin&utm_medium=Social&utm_campaign=CY19_IOT_Desktop_Whitepaper_ActiveDirectory
https://redd.it/e4ik2v
@r_linux
https://ubuntu.com/engage/microsoft-active-directory?utm_source=Linkedin&utm_medium=Social&utm_campaign=CY19_IOT_Desktop_Whitepaper_ActiveDirectory
https://redd.it/e4ik2v
@r_linux
Ubuntu
How to integrate Ubuntu Desktop with Active Directory | Ubuntu
I found a nice write up on how DNS works on Linux Hosts
https://zwischenzugs.com/2018/06/08/anatomy-of-a-linux-dns-lookup-part-i/
https://redd.it/e4j7ti
@r_linux
https://zwischenzugs.com/2018/06/08/anatomy-of-a-linux-dns-lookup-part-i/
https://redd.it/e4j7ti
@r_linux
Kali Linux Adds 'Undercover' Mode to Impersonate Windows 10
https://www.bleepingcomputer.com/news/security/kali-linux-adds-undercover-mode-to-impersonate-windows-10/
https://redd.it/e4kugm
@r_linux
https://www.bleepingcomputer.com/news/security/kali-linux-adds-undercover-mode-to-impersonate-windows-10/
https://redd.it/e4kugm
@r_linux
BleepingComputer
Kali Linux Adds 'Undercover' Mode to Impersonate Windows 10
Kali Linux 2019.4 was released last week and with it comes an 'Undercover' mode that can be used to quickly make the Kali desktop look like Windows 10.
Is oh-my-zsh safe?
Hello folks,
I have kinda unsual question.
How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other things. So question is can we really trust to oh-my-zsh team, is it safe to deploy it and what are your opinion to this?
Thanks for any answers
https://redd.it/e4fwk3
@r_linux
Hello folks,
I have kinda unsual question.
How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other things. So question is can we really trust to oh-my-zsh team, is it safe to deploy it and what are your opinion to this?
Thanks for any answers
https://redd.it/e4fwk3
@r_linux
reddit
Is oh-my-zsh safe?
Hello folks, I have kinda unsual question. How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other...
Thermal testing Raspberry Pi 4
https://www.raspberrypi.org/blog/thermal-testing-raspberry-pi-4/
https://redd.it/e4nzdd
@r_linux
https://www.raspberrypi.org/blog/thermal-testing-raspberry-pi-4/
https://redd.it/e4nzdd
@r_linux
Raspberry Pi
Thermal testing Raspberry Pi 4 - Raspberry Pi
Raspberry Pi 4 just got a lot cooler! The last four months of firmware updates have taken over half a watt out of idle power and nearly a watt out of fully loaded power
Linux Experiences/Rants or Education/Certifications thread - December 02, 2019
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have used Linux (GNU or otherwise) for a long time.
Let us know what's annoying you, whats making you happy, or something that you want to get out to r/linux but didn't make the cut into a full post of it's own.
For those looking for certifications please use this megathread to ask about how to get certified whether it's for the business world or for your own satisfaction. Be sure to check out r/linuxadmin for more discussion in the SysAdmin world!
_Please keep questions in r/linuxquestions, r/linux4noobs, or the Wednesday automod thread._
https://redd.it/e4tfzz
@r_linux
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have used Linux (GNU or otherwise) for a long time.
Let us know what's annoying you, whats making you happy, or something that you want to get out to r/linux but didn't make the cut into a full post of it's own.
For those looking for certifications please use this megathread to ask about how to get certified whether it's for the business world or for your own satisfaction. Be sure to check out r/linuxadmin for more discussion in the SysAdmin world!
_Please keep questions in r/linuxquestions, r/linux4noobs, or the Wednesday automod thread._
https://redd.it/e4tfzz
@r_linux
reddit
Linux Experiences/Rants or Education/Certifications thread -...
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have...
Bliss OS 12 Allow Users to Run Android 10 on Linux or Windows 10 PC
https://techdator.net/bliss-os-12-allow-users-to-run-android-10-on-linux-or-windows-10-pc/
https://redd.it/e4x2sg
@r_linux
https://techdator.net/bliss-os-12-allow-users-to-run-android-10-on-linux-or-windows-10-pc/
https://redd.it/e4x2sg
@r_linux
TechDator
Bliss OS 12 Allow Users to Run Android 10 on Linux or Windows 10 PC – TechDator
Finally the stunning Bliss OS 12 comes to the market in the beta format which lets users run stuff simultaneously on any and all platforms.
LUKS unlock with TPM2 - A guide with noscripts
[I created a detailed walkthrough](https://github.com/anguianoewi/tpm2KeyUnlock) complete with instructions to fight issues I had during installation.
Over thanksgiving vacation, I spent a couple all-nighters setting up TPM2 unlock on my computer. After looking for different solutions, [This article for TPM2 unlock](https://threat.tevora.com/secure-boot-tpm-2/) seemed to be the most convenient and transparent for me. However, the article is outdated and the tools have been updated, so the information is more of a proof-of-concept rather than implementation.
The process should take no more than 20 minutes, and so far I have managed to recreate it with the included noscripts in less than 10 minutes.
There are a couple issues I still have to work on with the noscripts. The manual walkthrough itself works fine. The rest of the issues are listed in the readme.
If there are any issues with the process, I would appreciate issue tickets so I can work on them. Of course, if anyone is willing to help contribute, I would be more than thankful.
https://redd.it/e527qs
@r_linux
[I created a detailed walkthrough](https://github.com/anguianoewi/tpm2KeyUnlock) complete with instructions to fight issues I had during installation.
Over thanksgiving vacation, I spent a couple all-nighters setting up TPM2 unlock on my computer. After looking for different solutions, [This article for TPM2 unlock](https://threat.tevora.com/secure-boot-tpm-2/) seemed to be the most convenient and transparent for me. However, the article is outdated and the tools have been updated, so the information is more of a proof-of-concept rather than implementation.
The process should take no more than 20 minutes, and so far I have managed to recreate it with the included noscripts in less than 10 minutes.
There are a couple issues I still have to work on with the noscripts. The manual walkthrough itself works fine. The rest of the issues are listed in the readme.
If there are any issues with the process, I would appreciate issue tickets so I can work on them. Of course, if anyone is willing to help contribute, I would be more than thankful.
https://redd.it/e527qs
@r_linux
GitHub
anguianoewi/tpm2KeyUnlock
Adds an automated unlock function based on TPM policy installation - anguianoewi/tpm2KeyUnlock
Netdata release v1.19
Hey all,
Introducing a major rewrite of our web log collector, [cmocka](https://www.facebook.com/hashtag/cmocka?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) unit testing, improvements on our [Unbound](https://www.facebook.com/hashtag/unbound?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) collector and even more! Check out our blog post for full details or read our release notes below.
Release v1.19.0 contains 2 new collectors, 19 bug fixes, 17 improvements, and 19 documentation updates. Full release notes can be found [here](https://github.com/netdata/netdata/releases/tag/v1.19.0).
**At a glance**
We completed a major rewrite of our web log collector to dramatically improve its flexibility and performance. The [new collector](https://github.com/netdata/go.d.plugin/pull/141), written entirely in Go, can parse and chart logs from Nginx and Apache servers, and combines numerous improvements. Netdata now supports the LTSV log format, creates charts for TLS and cipher usage, and is amazingly fast. In a test using SSD storage, the collector parsed the logs for 200,000 requests in about 200ms, using 30% of a single core.
This Go-based collector also has powerful custom log parsing capabilities, which means we're one step closer to a generic application log parser for Netdata. We're continuing to work on this parser to support more application log formatting in the future.
We have a new tutorial on [enabling the Go web log collector](https://docs.netdata.cloud/docs/tutorials/collect-apache-nginx-web-logs/) and using it with Nginx and/or Apache access logs with minimal configuration. Thanks to [Wing924](https://github.com/Wing924) for starting the Go rewrite!
We introduced more **cmocka unit testing** to Netdata. In this release, we're testing how Netdata's internal web server processes HTTP requests—the first step to improve the quality of code throughout, reduce bugs, and make refactoring easier. We wanted to validate the web server's behavior but needed to build a layer of parametric testing on top of the CMocka test runner. Read all about our process of testing and selecting cmocka on our blog post: [Building an agile team's 'safety harness' with cmocka and FOSS](https://blog.netdata.cloud/agile-team-cmocka-foss/).
Netdata's **Unbound collector** was also [completely rewritten in Go](https://github.com/netdata/go.d.plugin/pull/287) to improve how it collects and displays metrics. This new version can get dozens of metrics, including details on queries, cache, uptime, and even show per-thread metrics. See our [tutorial](https://docs.netdata.cloud/docs/tutorials/collect-unbound-metrics/) on enabling the new collector via Netdata's amazing auto-detection feature.
We [fixed an error](https://github.com/netdata/netdata/pull/7220) where **invalid spikes** appeared on certain charts by improving the incremental counter reset/wraparound detection algorithm.
Netdata can now send [**health alarm notifications to IRC channels**](https://docs.netdata.cloud/health/notifications/irc/) thanks to [Strykar](https://github.com/Strykar)!
And, Netdata can now monitor [**AM2320 sensors**](https://docs.netdata.cloud/collectors/python.d.plugin/am2320/), thanks to hard work from [Tom Buck](https://github.com/tommybuck).
**Improvements**
* **New Collectors**
* AM2320 sensor collector plugin
Hey all,
Introducing a major rewrite of our web log collector, [cmocka](https://www.facebook.com/hashtag/cmocka?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) unit testing, improvements on our [Unbound](https://www.facebook.com/hashtag/unbound?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) collector and even more! Check out our blog post for full details or read our release notes below.
Release v1.19.0 contains 2 new collectors, 19 bug fixes, 17 improvements, and 19 documentation updates. Full release notes can be found [here](https://github.com/netdata/netdata/releases/tag/v1.19.0).
**At a glance**
We completed a major rewrite of our web log collector to dramatically improve its flexibility and performance. The [new collector](https://github.com/netdata/go.d.plugin/pull/141), written entirely in Go, can parse and chart logs from Nginx and Apache servers, and combines numerous improvements. Netdata now supports the LTSV log format, creates charts for TLS and cipher usage, and is amazingly fast. In a test using SSD storage, the collector parsed the logs for 200,000 requests in about 200ms, using 30% of a single core.
This Go-based collector also has powerful custom log parsing capabilities, which means we're one step closer to a generic application log parser for Netdata. We're continuing to work on this parser to support more application log formatting in the future.
We have a new tutorial on [enabling the Go web log collector](https://docs.netdata.cloud/docs/tutorials/collect-apache-nginx-web-logs/) and using it with Nginx and/or Apache access logs with minimal configuration. Thanks to [Wing924](https://github.com/Wing924) for starting the Go rewrite!
We introduced more **cmocka unit testing** to Netdata. In this release, we're testing how Netdata's internal web server processes HTTP requests—the first step to improve the quality of code throughout, reduce bugs, and make refactoring easier. We wanted to validate the web server's behavior but needed to build a layer of parametric testing on top of the CMocka test runner. Read all about our process of testing and selecting cmocka on our blog post: [Building an agile team's 'safety harness' with cmocka and FOSS](https://blog.netdata.cloud/agile-team-cmocka-foss/).
Netdata's **Unbound collector** was also [completely rewritten in Go](https://github.com/netdata/go.d.plugin/pull/287) to improve how it collects and displays metrics. This new version can get dozens of metrics, including details on queries, cache, uptime, and even show per-thread metrics. See our [tutorial](https://docs.netdata.cloud/docs/tutorials/collect-unbound-metrics/) on enabling the new collector via Netdata's amazing auto-detection feature.
We [fixed an error](https://github.com/netdata/netdata/pull/7220) where **invalid spikes** appeared on certain charts by improving the incremental counter reset/wraparound detection algorithm.
Netdata can now send [**health alarm notifications to IRC channels**](https://docs.netdata.cloud/health/notifications/irc/) thanks to [Strykar](https://github.com/Strykar)!
And, Netdata can now monitor [**AM2320 sensors**](https://docs.netdata.cloud/collectors/python.d.plugin/am2320/), thanks to hard work from [Tom Buck](https://github.com/tommybuck).
**Improvements**
* **New Collectors**
* AM2320 sensor collector plugin
Facebook
#cmocka | Facebook
View about #cmocka on Facebook. Facebook gives people the power to share and makes the world more open and connected.
* Added parsing of /proc/pagetypeinfo to provide metrics on fragmentation of free memory pages
* The unbound collector module was completely rewritten, in Go [go.d.plugin/#287](https://github.com/netdata/go.d.plugin/pull/287)
**Collector improvements**
* **We rewrote our web log parser in Go, drastically improving its flexibility and performance**
* The [Kubernetes kubelet collector](https://docs.netdata.cloud/collectors/go.d.plugin/modules/k8s_kubelet/) now reads the service account token and uses it for authorization. We also added a new default job to collect metrics from https://localhost:10250/metrics
* Added a new default job to the [Kubernetes coredns](https://docs.netdata.cloud/collectors/go.d.plugin/modules/coredns/) collector to collect metrics from [http://kube-dns.kube-system.svc.cluster.local:9153/metrics](http://kube-dns.kube-system.svc.cluster.local:9153/metrics)
* apps.plugin: Synced FRRouting daemons configuration with the frr 7.2 release
* apps.plugin: Added process group for git-related processes-apps.plugin: Added balena to the container-engines application group
* web\_log: Treat 401 Unauthorized requests as successful
* xenstat.plugin: Prepare for xen 4.13 by checking for check xenstat\_vbd\_errorpresence
* mysql: Added galera cluster\_statusalarm
* **Metrics Database**
* Netdata generates alarms if the disk cannot keep up with data collection
* **Health**
* Fine tune various default alarm configurations
* Update SYN cookie alarm to be less aggressive
* Added support for IRC alarm notifications
* **Installation/Packages**
* Corrected the Makefile.am files indentation, to prevent unexpected errors
* Rationalized ownership and permissions of /etc/netdata
* Made various improvements to the installer noscript netdata-installer.sh
* Include go.d.plugin version v0.11.0
* **Other**
* Improve Travis build warnings
* cmocka testing for http requests
* CI/CD: Prevented nightly jobs from timing out
https://redd.it/e54cn3
@r_linux
* The unbound collector module was completely rewritten, in Go [go.d.plugin/#287](https://github.com/netdata/go.d.plugin/pull/287)
**Collector improvements**
* **We rewrote our web log parser in Go, drastically improving its flexibility and performance**
* The [Kubernetes kubelet collector](https://docs.netdata.cloud/collectors/go.d.plugin/modules/k8s_kubelet/) now reads the service account token and uses it for authorization. We also added a new default job to collect metrics from https://localhost:10250/metrics
* Added a new default job to the [Kubernetes coredns](https://docs.netdata.cloud/collectors/go.d.plugin/modules/coredns/) collector to collect metrics from [http://kube-dns.kube-system.svc.cluster.local:9153/metrics](http://kube-dns.kube-system.svc.cluster.local:9153/metrics)
* apps.plugin: Synced FRRouting daemons configuration with the frr 7.2 release
* apps.plugin: Added process group for git-related processes-apps.plugin: Added balena to the container-engines application group
* web\_log: Treat 401 Unauthorized requests as successful
* xenstat.plugin: Prepare for xen 4.13 by checking for check xenstat\_vbd\_errorpresence
* mysql: Added galera cluster\_statusalarm
* **Metrics Database**
* Netdata generates alarms if the disk cannot keep up with data collection
* **Health**
* Fine tune various default alarm configurations
* Update SYN cookie alarm to be less aggressive
* Added support for IRC alarm notifications
* **Installation/Packages**
* Corrected the Makefile.am files indentation, to prevent unexpected errors
* Rationalized ownership and permissions of /etc/netdata
* Made various improvements to the installer noscript netdata-installer.sh
* Include go.d.plugin version v0.11.0
* **Other**
* Improve Travis build warnings
* cmocka testing for http requests
* CI/CD: Prevented nightly jobs from timing out
https://redd.it/e54cn3
@r_linux